Search Results for -- UYGARLIK, ORTA&Ccedil;A&#286;, EDEB&#304;YATTA. - Narrowed by: English - 2010 - Computer security. SirsiDynix Enterprise https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003d--$002bUYGARLIK$00252C$002bORTA$0025C3$002587A$0025C4$00259E$00252C$002bEDEB$0025C4$0025B0YATTA.$0026qf$003dLANGUAGE$002509Language$002509ENG$002509English$0026qf$003dPUBDATE$002509Publication$002bDate$0025092010$0025092010$0026qf$003dSUBJECT$002509Subject$002509Computer$002bsecurity.$002509Computer$002bsecurity.$0026te$003dILS$0026ps$003d300$0026isd$003dtrue? 2024-09-10T16:56:57Z Seven deadliest USB attacks ent://SD_ILS/0/SD_ILS:148953 2024-09-10T16:56:57Z 2024-09-10T16:56:57Z Author&#160;Anderson, Brian (Brian James)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495530">http://www.sciencedirect.com/science/book/9781597495530</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Seven deadliest Microsoft attacks ent://SD_ILS/0/SD_ILS:149018 2024-09-10T16:56:57Z 2024-09-10T16:56:57Z Author&#160;Kraus, Rob.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495516">http://www.sciencedirect.com/science/book/9781597495516</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Seven deadliest wireless technologies attacks ent://SD_ILS/0/SD_ILS:149033 2024-09-10T16:56:57Z 2024-09-10T16:56:57Z Author&#160;Haines, Brad.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495417">http://www.sciencedirect.com/science/book/9781597495417</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Seven deadliest social network attacks ent://SD_ILS/0/SD_ILS:149145 2024-09-10T16:56:57Z 2024-09-10T16:56:57Z Author&#160;Timm, Carl.&#160;Perez, Richard, 1969 Oct. 17-&#160;Ely, Adam.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495455">http://www.sciencedirect.com/science/book/9781597495455</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Managed code rootkits hooking into runtime environments ent://SD_ILS/0/SD_ILS:147836 2024-09-10T16:56:57Z 2024-09-10T16:56:57Z Author&#160;Metula, Erez.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495745">http://www.sciencedirect.com/science/book/9781597495745</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> A guide to kernel exploitation attacking the core ent://SD_ILS/0/SD_ILS:148059 2024-09-10T16:56:57Z 2024-09-10T16:56:57Z Author&#160;Perla, Enrico.&#160;Massimiliano, Oldani.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597494861">http://www.sciencedirect.com/science/book/9781597494861</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> The basics of hacking and penetration testing ethical hacking and penetration testing made easy ent://SD_ILS/0/SD_ILS:145199 2024-09-10T16:56:57Z 2024-09-10T16:56:57Z Author&#160;Engebretson, Pat (Patrick Henry), 1974-<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597496551">http://www.sciencedirect.com/science/book/9781597496551</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Virtualization and forensics a digital forensic investigator's guide to virtual environments ent://SD_ILS/0/SD_ILS:146715 2024-09-10T16:56:57Z 2024-09-10T16:56:57Z Author&#160;Barrett, Diane.&#160;Kipper, Gregory.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495578">http://www.sciencedirect.com/science/book/9781597495578</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> System assurance beyond detecting vulnerabilities ent://SD_ILS/0/SD_ILS:148532 2024-09-10T16:56:57Z 2024-09-10T16:56:57Z Author&#160;Mansourov, Nikolai.&#160;Campara, Djenana.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780123814142">http://www.sciencedirect.com/science/book/9780123814142</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Digital forensics for network, Internet, and cloud computing a forensic evidence guide for moving targets and data ent://SD_ILS/0/SD_ILS:146482 2024-09-10T16:56:57Z 2024-09-10T16:56:57Z Author&#160;Lillard, Terrence.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495370">http://www.sciencedirect.com/science/book/9781597495370</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Dissecting the hack the forb1dd3n network ent://SD_ILS/0/SD_ILS:146585 2024-09-10T16:56:57Z 2024-09-10T16:56:57Z Author&#160;Street, Jayson E.&#160;Street, Jayson E. Dissecting the hack.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495684">http://www.sciencedirect.com/science/book/9781597495684</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> The executive MBA in information security ent://SD_ILS/0/SD_ILS:286931 2024-09-10T16:56:57Z 2024-09-10T16:56:57Z Author&#160;Trinckes, John J.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781439810088">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Vulnerability management ent://SD_ILS/0/SD_ILS:287895 2024-09-10T16:56:57Z 2024-09-10T16:56:57Z Author&#160;Foreman, Park.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781439801512">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Risk analysis and security countermeasure selection ent://SD_ILS/0/SD_ILS:288785 2024-09-10T16:56:57Z 2024-09-10T16:56:57Z Author&#160;Norman, Thomas L.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781420078718">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information security risk analysis ent://SD_ILS/0/SD_ILS:288856 2024-09-10T16:56:57Z 2024-09-10T16:56:57Z Author&#160;Peltier, Thomas R.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781439839577">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cryptanalysis of RSA and its variants ent://SD_ILS/0/SD_ILS:291418 2024-09-10T16:56:57Z 2024-09-10T16:56:57Z Author&#160;Hinek, M. Jason.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781420075199">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Hashing in computer science fifty years of slicing and dicing ent://SD_ILS/0/SD_ILS:298025 2024-09-10T16:56:57Z 2024-09-10T16:56:57Z Author&#160;Konheim, Alan G., 1934-<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://proquest.safaribooksonline.com/?fpi=9781118031834">Available by subscription from Safari Books Online</a> John Wiley <a href="http://dx.doi.org/10.1002/9780470630617">http://dx.doi.org/10.1002/9780470630617</a> Contributor biographical information <a href="http://catdir.loc.gov/catdir/enhancements/fy1106/2009052123-b.html">http://catdir.loc.gov/catdir/enhancements/fy1106/2009052123-b.html</a> Volltext <a href="http://proquest.tech.safaribooksonline.de/9781118031834">http://proquest.tech.safaribooksonline.de/9781118031834</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Secure and resilient software development ent://SD_ILS/0/SD_ILS:290714 2024-09-10T16:56:57Z 2024-09-10T16:56:57Z Author&#160;Merkow, Mark S.&#160;Raghavan, Lakshmikanth.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781439826973">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information technology risk management in enterprise environments a review of industry practices and a practical guide to risk management teams ent://SD_ILS/0/SD_ILS:297862 2024-09-10T16:56:57Z 2024-09-10T16:56:57Z Author&#160;Kouns, Jake.&#160;Minoli, Daniel, 1952-&#160;Wiley InterScience (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;John Wiley <a href="http://dx.doi.org/10.1002/9780470558133">http://dx.doi.org/10.1002/9780470558133</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> IT audit, control, and security ent://SD_ILS/0/SD_ILS:304008 2024-09-10T16:56:57Z 2024-09-10T16:56:57Z Author&#160;Moeller, Robert R.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;Wiley InterScience <a href="http://dx.doi.org/10.1002/9781118269138">An electronic book accessible through the World Wide Web; click for information</a> Ebook Library <a href="http://public.eblib.com/EBLPublic/PublicView.do?ptiID=624573">http://public.eblib.com/EBLPublic/PublicView.do?ptiID=624573</a> Books24x7 <a href="http://www.books24x7.com/marc.asp?bookid=40717">http://www.books24x7.com/marc.asp?bookid=40717</a> <a href="http://site.ebrary.com/lib/alltitles/Doc?id=10469768">http://site.ebrary.com/lib/alltitles/Doc?id=10469768</a> <a href="http://swb.eblib.com/patron/FullRecord.aspx?p=624573">http://swb.eblib.com/patron/FullRecord.aspx?p=624573</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Safety of computer architectures ent://SD_ILS/0/SD_ILS:304132 2024-09-10T16:56:57Z 2024-09-10T16:56:57Z Author&#160;Boulanger, Jean-Louis.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://lib.myilibrary.com?id=450000">Connect to MyiLibrary resource.</a> Wiley <a href="http://onlinelibrary.wiley.com/book/10.1002/9781118600696">http://onlinelibrary.wiley.com/book/10.1002/9781118600696</a> John Wiley <a href="http://dx.doi.org/10.1002/9781118600696">http://dx.doi.org/10.1002/9781118600696</a> ebrary <a href="http://site.ebrary.com/id/10657623">http://site.ebrary.com/id/10657623</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Seven deadliest USB attacks ent://SD_ILS/0/SD_ILS:306328 2024-09-10T16:56:57Z 2024-09-10T16:56:57Z Author&#160;Anderson, Brian (Brian James)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495530">http://www.sciencedirect.com/science/book/9781597495530</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Virtualization and forensics a digital forensic investigator's guide to virtual environments ent://SD_ILS/0/SD_ILS:306330 2024-09-10T16:56:57Z 2024-09-10T16:56:57Z Author&#160;Barrett, Diane.&#160;Kipper, Gregory.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495578">http://www.sciencedirect.com/science/book/9781597495578</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security 2020 reduce security risks this decade ent://SD_ILS/0/SD_ILS:303839 2024-09-10T16:56:57Z 2024-09-10T16:56:57Z Author&#160;Howard, Doug.&#160;Prince, Kevin.&#160;Wiley InterScience (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;Wiley InterScience <a href="http://dx.doi.org/10.1002/9781118255803">An electronic book accessible through the World Wide Web; click for information</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Mac security bible ent://SD_ILS/0/SD_ILS:303881 2024-09-10T16:56:57Z 2024-09-10T16:56:57Z Author&#160;Kissell, Joe.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;Wiley InterScience <a href="http://dx.doi.org/10.1002/9781118257739">An electronic book accessible through the World Wide Web; click for information</a> Safari Books Online <a href="http://proquest.safaribooksonline.com/640">http://proquest.safaribooksonline.com/640</a> <a href="http://proquest.safaribooksonline.com/?fpi=9780470474198">http://proquest.safaribooksonline.com/?fpi=9780470474198</a> Safari Books Online <a href="http://proquest.safaribooksonline.com/9780470474198">http://proquest.safaribooksonline.com/9780470474198</a> Books24x7 <a href="http://www.books24x7.com/marc.asp?bookid=40737">http://www.books24x7.com/marc.asp?bookid=40737</a> <a href="http://site.ebrary.com/lib/alltitles/Doc?id=10358774">http://site.ebrary.com/lib/alltitles/Doc?id=10358774</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/>