Search Results for B&#304;LG&#304;SAYAR G&Uuml;VENL&#304;&#286;&#304;. - Narrowed by: B&#304;LG&#304;SAYAR G&Uuml;VENL&#304;&#286;&#304;. SirsiDynix Enterprise https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dB$0025C4$0025B0LG$0025C4$0025B0SAYAR$002bG$0025C3$00259CVENL$0025C4$0025B0$0025C4$00259E$0025C4$0025B0.$0026qf$003dSUBJECT$002509Subject$002509B$0025C4$0025B0LG$0025C4$0025B0SAYAR$002bG$0025C3$00259CVENL$0025C4$0025B0$0025C4$00259E$0025C4$0025B0.$002509B$0025C4$0025B0LG$0025C4$0025B0SAYAR$002bG$0025C3$00259CVENL$0025C4$0025B0$0025C4$00259E$0025C4$0025B0.$0026ps$003d300? 2024-10-28T20:40:53Z Exploiting software : how to break code ent://SD_ILS/0/SD_ILS:96556 2024-10-28T20:40:53Z 2024-10-28T20:40:53Z Author&#160;Hoglund, Greg.&#160;McGraw, Gary, 1966- ort. yaz.<br/>Preferred Shelf Number&#160;QA 76.9.A25 H635 2004<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Hacking : Bili&#351;im korsanl&#305;&#287;&#305; ve korunma y&ouml;ntemleri ent://SD_ILS/0/SD_ILS:88578 2024-10-28T20:40:53Z 2024-10-28T20:40:53Z Author&#160;Y&#305;lmaz, Davut.<br/>Preferred Shelf Number&#160;TK 5105.59 Y56 2004<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Computer security sourcebook ent://SD_ILS/0/SD_ILS:94615 2024-10-28T20:40:53Z 2024-10-28T20:40:53Z Author&#160;Caldwell, Wilma, ed.<br/>Preferred Shelf Number&#160;QA 76.9.A25 C658 2003<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> GSM g&uuml;venlik mekanizmas&#305;n&#305;n incelenmesi ve geli&#351;tirilmesi ent://SD_ILS/0/SD_ILS:74236 2024-10-28T20:40:53Z 2024-10-28T20:40:53Z Author&#160;Kas&#305;m, Ba&#351;ar.<br/>Preferred Shelf Number&#160;TEZ/5165 K151 2001<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Yeni ekonomide ba&#351;ar&#305;n&#305;n anahtar&#305; : e-ticaret strateji ve y&ouml;ntemleri ent://SD_ILS/0/SD_ILS:67835 2024-10-28T20:40:53Z 2024-10-28T20:40:53Z Author&#160;Dolanbay, Co&#351;kun.<br/>Preferred Shelf Number&#160;HF 5548.32 D685 2000<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~2<br/> Security in computing ent://SD_ILS/0/SD_ILS:59768 2024-10-28T20:40:53Z 2024-10-28T20:40:53Z Author&#160;Pfleeger, Charles P., 1948-<br/>Preferred Shelf Number&#160;QA 76.9.A25 P45 1997<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Secure electronic commerce : building the infrastructure for digital signatures and encryption ent://SD_ILS/0/SD_ILS:61926 2024-10-28T20:40:53Z 2024-10-28T20:40:53Z Author&#160;Ford, Warwick.&#160;Baum, Michael S., ort. yaz.<br/>Preferred Shelf Number&#160;QA 76.9.A25 F66 1997<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Information warfare : chaos on the electronic superhighway ent://SD_ILS/0/SD_ILS:31599 2024-10-28T20:40:53Z 2024-10-28T20:40:53Z Author&#160;Schwartau, Winn.<br/>Preferred Shelf Number&#160;QA 76.9.A25 S354 1994<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Contemporary cryptology : the science of information integrity ent://SD_ILS/0/SD_ILS:58119 2024-10-28T20:40:53Z 2024-10-28T20:40:53Z Author&#160;Simmons, Gustavus J., ed.<br/>Preferred Shelf Number&#160;QA 76.9.A25 C6678 1992<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Computer security basic ent://SD_ILS/0/SD_ILS:41083 2024-10-28T20:40:53Z 2024-10-28T20:40:53Z Author&#160;Russell, Deborah.&#160;Gangemi, G. T., ort. yaz.<br/>Preferred Shelf Number&#160;QA 76.9.A25 R87 1991<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> A handbook of computer security ent://SD_ILS/0/SD_ILS:32378 2024-10-28T20:40:53Z 2024-10-28T20:40:53Z Author&#160;Hearnden, K., ed. by<br/>Preferred Shelf Number&#160;QA 76.9.A25 H191 1990<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Computer security risk management ent://SD_ILS/0/SD_ILS:32379 2024-10-28T20:40:53Z 2024-10-28T20:40:53Z Author&#160;Palmer, Ian C.&#160;Potter, G. A., ort. yaz.<br/>Preferred Shelf Number&#160;QA 76.9.A25 P182 1989<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/>