Search Results for -- UYGARLIK, ORTAÇAĞ, EDEBİYATTA. - Narrowed by: English - Beytepe General Collection - 2011 - Computer security.SirsiDynix Enterprisehttps://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003d--$002bUYGARLIK$00252C$002bORTA$0025C3$002587A$0025C4$00259E$00252C$002bEDEB$0025C4$0025B0YATTA.$0026qf$003dLANGUAGE$002509Language$002509ENG$002509English$0026qf$003dLOCATION$002509Shelf$002bLocation$0025091$00253ABEYTEPEGEN$002509Beytepe$002bGeneral$002bCollection$0026qf$003dPUBDATE$002509Publication$002bDate$0025092011$0025092011$0026qf$003dSUBJECT$002509Subject$002509Computer$002bsecurity.$002509Computer$002bsecurity.$0026ic$003dtrue$0026te$003dILS$0026ps$003d300?dt=list2024-08-12T06:29:04ZAuditing IT infrastructures for complianceent://SD_ILS/0/SD_ILS:2711512024-08-12T06:29:04Z2024-08-12T06:29:04ZAuthor Weiss, Martin M. Solomon, Michael G.<br/>Preferred Shelf Number QA76.9.A25 W428 2011<br/>Format: Books<br/>Availability Beytepe Library~1<br/>Hacker techniques, tools, and incident handlingent://SD_ILS/0/SD_ILS:2714382024-08-12T06:29:04Z2024-08-12T06:29:04ZAuthor Oriyano, Sean-Philip. Gregg, Michael (Michael C.)<br/>Preferred Shelf Number TK5105.59 O786 2011<br/>Format: Books<br/>Availability Beytepe Library~1<br/>Security policies and implementation issuesent://SD_ILS/0/SD_ILS:2715342024-08-12T06:29:04Z2024-08-12T06:29:04ZAuthor Johnson, Rob (Robert) Merkow, Mark S.<br/>Preferred Shelf Number QA76.9.A25 J64 2011<br/>Format: Books<br/>Availability Beytepe Library~1<br/>Security strategies in Windows platforms and applicationsent://SD_ILS/0/SD_ILS:2715372024-08-12T06:29:04Z2024-08-12T06:29:04ZAuthor Solomon, Michael.<br/>Preferred Shelf Number QA76.76.O63 S64 2011<br/>Format: Books<br/>Availability Beytepe Library~1<br/>Security strategies in Linux platforms and applicationsent://SD_ILS/0/SD_ILS:2715392024-08-12T06:29:04Z2024-08-12T06:29:04ZAuthor Jang, Michael H.<br/>Preferred Shelf Number QA76.76.O63 J3638 2011<br/>Format: Books<br/>Availability Beytepe Library~1<br/>Managing risk in information systemsent://SD_ILS/0/SD_ILS:2712512024-08-12T06:29:04Z2024-08-12T06:29:04ZAuthor Gibson, Darril.<br/>Preferred Shelf Number QA76.9.A25 G5 2011<br/>Format: Books<br/>Availability Beytepe Library~1<br/>Social engineering : the art of human hackingent://SD_ILS/0/SD_ILS:3779762024-08-12T06:29:04Z2024-08-12T06:29:04ZAuthor Hadnagy, Christopher.<br/>Preferred Shelf Number QA76.9.C66 H33 2011<br/>Format: Books<br/>Availability Beytepe Library~1<br/>Security in computingent://SD_ILS/0/SD_ILS:3132972024-08-12T06:29:04Z2024-08-12T06:29:04ZAuthor Pfleeger, Charles P., 1948-<br/>Preferred Shelf Number QA76.9 A25 P45 2011<br/>Format: Books<br/>Availability Beytepe Library~1<br/>