Search Results for Art. - Narrowed by: Computer security.SirsiDynix Enterprisehttps://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dArt.$0026qf$003dSUBJECT$002509Subject$002509Computer$002bsecurity.$002509Computer$002bsecurity.$0026ps$003d300?2025-12-15T12:57:53ZComputer security : art and scienceent://SD_ILS/0/SD_ILS:3140212025-12-15T12:57:53Z2025-12-15T12:57:53ZAuthor Bishop, Matt (Matthew A.)<br/>Preferred Shelf Number QA76.9.A25 B56 2003<br/>Format: Books<br/>Availability Beytepe Library~1<br/>Social engineering : the art of human hackingent://SD_ILS/0/SD_ILS:3779762025-12-15T12:57:53Z2025-12-15T12:57:53ZAuthor Hadnagy, Christopher.<br/>Preferred Shelf Number QA76.9.C66 H33 2011<br/>Format: Books<br/>Availability Beytepe Library~1<br/>Zen and the art of information securityent://SD_ILS/0/SD_ILS:1456802025-12-15T12:57:53Z2025-12-15T12:57:53ZAuthor Winkler, Ira.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491686">http://www.sciencedirect.com/science/book/9781597491686</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Zen and the art of information securityent://SD_ILS/0/SD_ILS:1122142025-12-15T12:57:53Z2025-12-15T12:57:53ZAuthor Winkler, Ira. ScienceDirect (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491686">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>The Art of Modelling Computational Systems: A Journey from Logic and Concurrency to Security and Privacy Essays Dedicated to Catuscia Palamidessi on the Occasion of Her 60th Birthdayent://SD_ILS/0/SD_ILS:4868592025-12-15T12:57:53Z2025-12-15T12:57:53ZAuthor Alvim, Mário S. editor. Chatzikokolakis, Kostas. editor. Olarte, Carlos. editor. Valencia, Frank. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-31175-9">https://doi.org/10.1007/978-3-030-31175-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>The state of the art in intrusion prevention and detectionent://SD_ILS/0/SD_ILS:5436762025-12-15T12:57:53Z2025-12-15T12:57:53ZAuthor Pathan, Al-Sakib Khan, editor.<br/>Preferred Shelf Number QA76.9 .A25 S7354 2014<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781482203523">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>PRAGMATIC security metrics : applying metametrics to information securityent://SD_ILS/0/SD_ILS:5417972025-12-15T12:57:53Z2025-12-15T12:57:53ZAuthor Brotby, W. Krag., author. Hinson, Gary. Kabay, Michel E.<br/>Preferred Shelf Number HD30.38 .B76 2013<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781439881538">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>Insider computer fraud : an in-depth framework for detecting and defending against insider IT attacksent://SD_ILS/0/SD_ILS:5443962025-12-15T12:57:53Z2025-12-15T12:57:53ZAuthor Brancik, Kenneth C., author.<br/>Preferred Shelf Number QA76.9 .A25 B725 2008<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781420046601">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>