Search Results for Bilgisayar g&uuml;venli&#287;i SirsiDynix Enterprise https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dBilgisayar$002bg$0025C3$0025BCvenli$0025C4$00259Fi$0026pe$003dd$00253A$0026ps$003d300? 2024-11-10T12:34:02Z Bilgisayar a&#287;lar&#305; ve g&uuml;venli&#287;i ent://SD_ILS/0/SD_ILS:106591 2024-11-10T12:34:02Z 2024-11-10T12:34:02Z Author&#160;&Ouml;zbilen, Alper.<br/>Preferred Shelf Number&#160;TK5105.5 .O994 2006<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Bilgi ve bilgisayar g&uuml;venli&#287;i : casus yaz&#305;l&#305;mlar ve korunma y&ouml;ntemleri ent://SD_ILS/0/SD_ILS:515469 2024-11-10T12:34:02Z 2024-11-10T12:34:02Z Author&#160;Canbek, G&uuml;rol.&#160;Sa&#287;&#305;ro&#287;lu, &#350;eref.<br/>Preferred Shelf Number&#160;QA76.9.A25 C36 2006<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Dijital g&uuml;venlik : dijital ortamlarda g&uuml;venle var olmak ent://SD_ILS/0/SD_ILS:517179 2024-11-10T12:34:02Z 2024-11-10T12:34:02Z Author&#160;&Ouml;zer, Fatih.&#160;&#350;ahin, Yusuf Levent, edit&ouml;r<br/>Preferred Shelf Number&#160;QA76.9.E74 O94 2022<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> A&#287; y&ouml;netimi ve bilgi g&uuml;venli&#287;i ent://SD_ILS/0/SD_ILS:516275 2024-11-10T12:34:02Z 2024-11-10T12:34:02Z Author&#160;Bilge, Alper.&#160;Ka&ccedil;maz, Emre.<br/>Preferred Shelf Number&#160;TK5105.59 A98 2021<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Uygulamalarla siber g&uuml;venli&#287;e giri&#351; ent://SD_ILS/0/SD_ILS:510151 2024-11-10T12:34:02Z 2024-11-10T12:34:02Z Author&#160;Aky&#305;ld&#305;z, M. Alparslan.<br/>Preferred Shelf Number&#160;TK5105.59.A39 U94 2020<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~2<br/> T&uuml;rkiye&rsquo;de ve d&uuml;nyada siber g&uuml;venlik ent://SD_ILS/0/SD_ILS:514958 2024-11-10T12:34:02Z 2024-11-10T12:34:02Z Author&#160;&Ccedil;elikta&#351;, Bar&#305;&#351; .<br/>Preferred Shelf Number&#160;UG485 C45 2020<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Siber g&uuml;venlik ve savunma : standartlar ve uygulamalar ent://SD_ILS/0/SD_ILS:462283 2024-11-10T12:34:02Z 2024-11-10T12:34:02Z Author&#160;Sa&#287;&#305;ro&#287;lu, &#350;eref.<br/>Preferred Shelf Number&#160;TK5105.59 S53 2019<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~2<br/> Ethical hacking : (hacking kursu) ent://SD_ILS/0/SD_ILS:423950 2024-11-10T12:34:02Z 2024-11-10T12:34:02Z Author&#160;Usta, G&ouml;khan.<br/>Preferred Shelf Number&#160;QA76.9.A25 U88 2019<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Yeni ba&#351;layanlar i&ccedil;in bilgi g&uuml;venli&#287;i ve uygulamal&#305; hacking y&ouml;ntemleri ent://SD_ILS/0/SD_ILS:423184 2024-11-10T12:34:02Z 2024-11-10T12:34:02Z Author&#160;Aslanbakan, Enes, yazar<br/>Preferred Shelf Number&#160;QA76.9.A25 A75 2019<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Exploit geli&#351;tirme 101 ent://SD_ILS/0/SD_ILS:389077 2024-11-10T12:34:02Z 2024-11-10T12:34:02Z Author&#160;Aky&#305;ld&#305;z, M. Alparslan.<br/>Preferred Shelf Number&#160;QA76.9.A25 A59 2018<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~2<br/> Some'ler i&ccedil;in a&#287; ve malware analizi ent://SD_ILS/0/SD_ILS:479526 2024-11-10T12:34:02Z 2024-11-10T12:34:02Z Author&#160;Aky&#305;ld&#305;z, M. Alparslan.<br/>Preferred Shelf Number&#160;TK5105.59 A395 2018<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Ethical hacking : offensive &amp; defensive ent://SD_ILS/0/SD_ILS:513450 2024-11-10T12:34:02Z 2024-11-10T12:34:02Z Author&#160;&Ccedil;&#305;tak, &Ouml;mer.<br/>Preferred Shelf Number&#160;QA76.9.A25 C58 2016<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Hacking Interface ent://SD_ILS/0/SD_ILS:513452 2024-11-10T12:34:02Z 2024-11-10T12:34:02Z Author&#160;Elbahad&#305;r, Hamza.<br/>Preferred Shelf Number&#160;QA76.9.A25 E43 2016<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Java programlama diliyle kriptoloji uygulamalar&#305; ent://SD_ILS/0/SD_ILS:380319 2024-11-10T12:34:02Z 2024-11-10T12:34:02Z Author&#160;Bodur, H&uuml;seyin<br/>Preferred Shelf Number&#160;QA76.9.A25 B63 2016<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Siber g&uuml;venlik ve elektronik bile&#351;enleri ent://SD_ILS/0/SD_ILS:380281 2024-11-10T12:34:02Z 2024-11-10T12:34:02Z Author&#160;&Uuml;nal, Ahmet Naci<br/>Preferred Shelf Number&#160;UG485 U53 2015<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Siber istihbarat ent://SD_ILS/0/SD_ILS:384051 2024-11-10T12:34:02Z 2024-11-10T12:34:02Z Author&#160;Kele&#351;temur, Atalay<br/>Preferred Shelf Number&#160;QA76.9.A25 K45 2015<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Hacking Interface ent://SD_ILS/0/SD_ILS:317847 2024-11-10T12:34:02Z 2024-11-10T12:34:02Z Author&#160;Elbahad&#305;r, Hamza.<br/>Preferred Shelf Number&#160;QA 76.9 A25 E43 2014<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~2<br/> Veri gizleme ent://SD_ILS/0/SD_ILS:370995 2024-11-10T12:34:02Z 2024-11-10T12:34:02Z Author&#160;Yalman,Y&#305;ld&#305;ray&#160;&Ccedil;etin, &Ouml;zdemir.&#160;Ert&uuml;rk, &#304;smail.&#160;Akar, Feyzi.<br/>Preferred Shelf Number&#160;QA76.9 Y35 2014<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> T&uuml;rk ceza kanununda bili&#351;im su&ccedil;lar&#305; : (Avrupa Konseyi siber su&ccedil; s&ouml;zle&#351;mesi ve yarg&#305;tay kararlar&#305; ile) ent://SD_ILS/0/SD_ILS:309778 2024-11-10T12:34:02Z 2024-11-10T12:34:02Z Author&#160;Erdo&#287;an, Yavuz.<br/>Preferred Shelf Number&#160;KKX80.C65 E725 2013<br/>Format:&#160;Books<br/>Availability&#160;Law Library~1<br/> Information security for managers ent://SD_ILS/0/SD_ILS:516570 2024-11-10T12:34:02Z 2024-11-10T12:34:02Z Author&#160;Workman, Michael D., 1957-.&#160;Phelps, Daniel C.&#160;Gathegi, John N.<br/>Preferred Shelf Number&#160;HF5548.37 W67 2013<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Social engineering : the art of human hacking ent://SD_ILS/0/SD_ILS:377976 2024-11-10T12:34:02Z 2024-11-10T12:34:02Z Author&#160;Hadnagy, Christopher.<br/>Preferred Shelf Number&#160;QA76.9.C66 H33 2011<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Dijital kale ent://SD_ILS/0/SD_ILS:126135 2024-11-10T12:34:02Z 2024-11-10T12:34:02Z Author&#160;Brown, Dan, 1964-&#160;Soner, Sezer.<br/>Preferred Shelf Number&#160;PS 3552.R685434 D542 2010<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Computer forensics and cyber crime : an introduction ent://SD_ILS/0/SD_ILS:134036 2024-11-10T12:34:02Z 2024-11-10T12:34:02Z Author&#160;Britz, Marjie.<br/>Preferred Shelf Number&#160;QA76.9.A25 B77 2009<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> ISA server 2006 ent://SD_ILS/0/SD_ILS:115080 2024-11-10T12:34:02Z 2024-11-10T12:34:02Z Author&#160;&#304;nan, Y&uuml;ksel.&#160;Demirli, Nihat.<br/>Preferred Shelf Number&#160;TK5105.59 .I536 2008<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~2<br/> Configuring Juniper Networks NetScreen &amp; SSG firewalls ent://SD_ILS/0/SD_ILS:112154 2024-11-10T12:34:02Z 2024-11-10T12:34:02Z Author&#160;Cameron, Rob.&#160;ScienceDirect (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491181">An electronic book accessible through the World Wide Web; click for information</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> FISMA certification &amp; accreditation handbook ent://SD_ILS/0/SD_ILS:112169 2024-11-10T12:34:02Z 2024-11-10T12:34:02Z Author&#160;Taylor, Laura.&#160;Shepherd, Matthew.&#160;ScienceDirect (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491167">An electronic book accessible through the World Wide Web; click for information</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> How to cheat at securing sql server 2005 ent://SD_ILS/0/SD_ILS:112174 2024-11-10T12:34:02Z 2024-11-10T12:34:02Z Author&#160;ScienceDirect (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491969">An electronic book accessible through the World Wide Web; click for information</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Metasploit Toolkit for Penetration Testing, Exploit Development, And Vulnerabiity Research ent://SD_ILS/0/SD_ILS:112179 2024-11-10T12:34:02Z 2024-11-10T12:34:02Z Author&#160;ScienceDirect (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490740">An electronic book accessible through the World Wide Web; click for information</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Microsoft Vista for IT security professionals ent://SD_ILS/0/SD_ILS:112182 2024-11-10T12:34:02Z 2024-11-10T12:34:02Z Author&#160;Piltzecker, Tony, 1975-&#160;Chaffin, Larry.&#160;ScienceDirect (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491396">An electronic book accessible through the World Wide Web; click for information</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Microsoft windows security fundamentals ent://SD_ILS/0/SD_ILS:112183 2024-11-10T12:34:02Z 2024-11-10T12:34:02Z Author&#160;Clercq, Jan de, 1968-&#160;Grillenmeier, Guido.&#160;ScienceDirect (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781555583408">An electronic book accessible through the World Wide Web; click for information</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Network security assessment from vulnerability to patch ent://SD_ILS/0/SD_ILS:112186 2024-11-10T12:34:02Z 2024-11-10T12:34:02Z Author&#160;Manzuik, Steve.&#160;Gold, Andr&eacute;.&#160;Gatford, Chris.&#160;ScienceDirect (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491013">An electronic book accessible through the World Wide Web; click for information</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security convergence managing enterprise security risk ent://SD_ILS/0/SD_ILS:112198 2024-11-10T12:34:02Z 2024-11-10T12:34:02Z Author&#160;Tyson, Dave.&#160;ScienceDirect (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780750684255">An electronic book accessible through the World Wide Web; click for information</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Stealing the network how to own a shadow: the chase for Knuth ent://SD_ILS/0/SD_ILS:112200 2024-11-10T12:34:02Z 2024-11-10T12:34:02Z Author&#160;Long, Johnny.&#160;Russell, Ryan, 1969-&#160;Mullen, Timothy M.&#160;Pinzon, D. Scott.&#160;ScienceDirect (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490818">An electronic book accessible through the World Wide Web; click for information</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Techno Security's guide to managing risks for IT managers, auditors, and investigators ent://SD_ILS/0/SD_ILS:112203 2024-11-10T12:34:02Z 2024-11-10T12:34:02Z Author&#160;Wiles, Jack.&#160;ScienceDirect (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491389">An electronic book accessible through the World Wide Web; click for information</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> The history of information security a comprehensive handbook ent://SD_ILS/0/SD_ILS:112205 2024-11-10T12:34:02Z 2024-11-10T12:34:02Z Author&#160;Leeuw, Karl de.&#160;Bergstra, J. A.&#160;ScienceDirect (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780444516084">An electronic book accessible through the World Wide Web; click for information</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> The official CHFI study guide (Exam 312-49) for computer hacking forensic investigator. ent://SD_ILS/0/SD_ILS:112206 2024-11-10T12:34:02Z 2024-11-10T12:34:02Z Author&#160;Kleiman, Dave.&#160;ScienceDirect (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491976">An electronic book accessible through the World Wide Web; click for information</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> WarDriving &amp; wireless penetration testing ent://SD_ILS/0/SD_ILS:112210 2024-11-10T12:34:02Z 2024-11-10T12:34:02Z Author&#160;Hurley, Chris.&#160;ScienceDirect (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491112">An electronic book accessible through the World Wide Web; click for information</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Windows forensic analysis DVD toolkit ent://SD_ILS/0/SD_ILS:112211 2024-11-10T12:34:02Z 2024-11-10T12:34:02Z Author&#160;Carvey, Harlan A.&#160;ScienceDirect (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491563">An electronic book accessible through the World Wide Web; click for information</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Zen and the art of information security ent://SD_ILS/0/SD_ILS:112214 2024-11-10T12:34:02Z 2024-11-10T12:34:02Z Author&#160;Winkler, Ira.&#160;ScienceDirect (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491686">An electronic book accessible through the World Wide Web; click for information</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security in computing ent://SD_ILS/0/SD_ILS:110682 2024-11-10T12:34:02Z 2024-11-10T12:34:02Z Author&#160;Pfleeger, Charles P., 1948-<br/>Preferred Shelf Number&#160;QA76.9.A25 P45 2007<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Data warehousing and data mining techniques for cyber security ent://SD_ILS/0/SD_ILS:110434 2024-11-10T12:34:02Z 2024-11-10T12:34:02Z Author&#160;Singhal, Anoop, 1958-<br/>Preferred Shelf Number&#160;QA76.9.A25 S563 2007<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Information security : contemporary cases ent://SD_ILS/0/SD_ILS:111021 2024-11-10T12:34:02Z 2024-11-10T12:34:02Z Author&#160;Wright, Marie A.&#160;Kakalik, John S.<br/>Preferred Shelf Number&#160;QA76.9.A25 W75 2007<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> How to cheat at Windows System Administration using command line scripts ent://SD_ILS/0/SD_ILS:112107 2024-11-10T12:34:02Z 2024-11-10T12:34:02Z Author&#160;Bhardwaj, Pawan K.&#160;Andreou, Kimon.&#160;Barber, Brian.&#160;Kleiman, Dave.&#160;Satyanarayana, Mahesh.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491051">An electronic book accessible through the World Wide Web; click for information</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Intelligence and security informatics for international security : information sharing and data mining ent://SD_ILS/0/SD_ILS:119786 2024-11-10T12:34:02Z 2024-11-10T12:34:02Z Author&#160;Chen, Hsinchun.<br/>Preferred Shelf Number&#160;QA76.76.E95 C44 2006<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Linux Patch Management : keeping Linux systems up to date ent://SD_ILS/0/SD_ILS:119550 2024-11-10T12:34:02Z 2024-11-10T12:34:02Z Author&#160;Jang, Michael H.<br/>Preferred Shelf Number&#160;QA76.76.O63 J368 2006<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Computer security fundamentals ent://SD_ILS/0/SD_ILS:108620 2024-11-10T12:34:02Z 2024-11-10T12:34:02Z Author&#160;Easttom, Chuck.<br/>Preferred Shelf Number&#160;QA76.9.A25 E325 2006<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Information security : principles and practice ent://SD_ILS/0/SD_ILS:109477 2024-11-10T12:34:02Z 2024-11-10T12:34:02Z Author&#160;Stamp, Mark.<br/>Preferred Shelf Number&#160;QA76.9.A25 S69 2006<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Information security architecture : an integrated approach to security in the organization ent://SD_ILS/0/SD_ILS:110865 2024-11-10T12:34:02Z 2024-11-10T12:34:02Z Author&#160;Tudor, Jan Killmeyer.<br/>Preferred Shelf Number&#160;QA76.9.A25 T83 2006<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Enhanced methods in computer security, biometric and artificial intelligence systems ent://SD_ILS/0/SD_ILS:109864 2024-11-10T12:34:02Z 2024-11-10T12:34:02Z Author&#160;Pejas, Jerzy, 1954-, ed.&#160;Piegat, Andrzej, 1947-, ed.<br/>Preferred Shelf Number&#160;QA76.9.A25 E545 2005<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Hacking : Bili&#351;im korsanl&#305;&#287;&#305; ve korunma y&ouml;ntemleri ent://SD_ILS/0/SD_ILS:88578 2024-11-10T12:34:02Z 2024-11-10T12:34:02Z Author&#160;Y&#305;lmaz, Davut.<br/>Preferred Shelf Number&#160;TK 5105.59 Y56 2004<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Dijital kale ent://SD_ILS/0/SD_ILS:96322 2024-11-10T12:34:02Z 2024-11-10T12:34:02Z Author&#160;Brown, Dan, 1964-&#160;Soner, Sezer, &ccedil;ev.&#160;Huvaj, Muharrem Nesij, haz.<br/>Preferred Shelf Number&#160;PS3552.R685434 D542 2004<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~7<br/> Exploiting software : how to break code ent://SD_ILS/0/SD_ILS:96556 2024-11-10T12:34:02Z 2024-11-10T12:34:02Z Author&#160;Hoglund, Greg.&#160;McGraw, Gary, 1966- ort. yaz.<br/>Preferred Shelf Number&#160;QA 76.9.A25 H635 2004<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> How to break software security : effective technigues for security testing ent://SD_ILS/0/SD_ILS:105584 2024-11-10T12:34:02Z 2024-11-10T12:34:02Z Author&#160;Whittaker, James A., 1965-&#160;Thomson, Herbert H., ort. yaz.<br/>Preferred Shelf Number&#160;QA 76.9.A25 W48 2004<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~2<br/> Secure architectures with OpenBSD ent://SD_ILS/0/SD_ILS:109506 2024-11-10T12:34:02Z 2024-11-10T12:34:02Z Author&#160;Palmer, Brandon.&#160;Nazario, Jose, ort. yaz.<br/>Preferred Shelf Number&#160;QA76.76.O63 P335 2004<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> &#304;nternette g&uuml;venlik ve Hacker Cracker meselesi : el kitab&#305; ent://SD_ILS/0/SD_ILS:104130 2024-11-10T12:34:02Z 2024-11-10T12:34:02Z Author&#160;G&uuml;ven, Mehmet.<br/>Preferred Shelf Number&#160;QA 76.9.A25 G88 2004<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~2<br/> Computer security sourcebook ent://SD_ILS/0/SD_ILS:94615 2024-11-10T12:34:02Z 2024-11-10T12:34:02Z Author&#160;Caldwell, Wilma, ed.<br/>Preferred Shelf Number&#160;QA 76.9.A25 C658 2003<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Nokia network security solutions handbook ent://SD_ILS/0/SD_ILS:81149 2024-11-10T12:34:02Z 2024-11-10T12:34:02Z Author&#160;Maxwell, Doug.&#160;Amon, Cherie, ort. yaz.<br/>Preferred Shelf Number&#160;TK 5105.59 M451 2002<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Proceedings of Sixth ACM Symposium on Access Control Models and Technologies : SACMAT 2001 : Litton-TASC, Westfields II Conference Facility, May 3-4, 2001, Chantilly, Virginia, USA ent://SD_ILS/0/SD_ILS:72452 2024-11-10T12:34:02Z 2024-11-10T12:34:02Z Author&#160;ACM Symposium on Access Control Models and Technologies (6th : 2001 : Chantilly, V.A.)&#160;Association for Computing Machinery. Special Interest Group on Security, Audit, and Control.<br/>Preferred Shelf Number&#160;QA 76.9.A25 A292 2001<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> GSM g&uuml;venlik mekanizmas&#305;n&#305;n incelenmesi ve geli&#351;tirilmesi ent://SD_ILS/0/SD_ILS:74236 2024-11-10T12:34:02Z 2024-11-10T12:34:02Z Author&#160;Kas&#305;m, Ba&#351;ar.<br/>Preferred Shelf Number&#160;TEZ/5165 K151 2001<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Technology and privacy : the new landscape ent://SD_ILS/0/SD_ILS:112999 2024-11-10T12:34:02Z 2024-11-10T12:34:02Z Author&#160;Agre, Philip.&#160;Rotenberg, Marc.<br/>Preferred Shelf Number&#160;QA76.9.A25 T43 2001<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> New Security Paradigms Workshop : proceedings, September 10 -13, 2001, Cloudcroft, NM, USA ent://SD_ILS/0/SD_ILS:118009 2024-11-10T12:34:02Z 2024-11-10T12:34:02Z Author&#160;ACM SIGSAC New Security Paradigms Workshop (2001 : Cloudcroft, NM, USA)&#160;Raskin, V.&#160;Hempelmann, C.F.&#160;Association for Computing Machinery. Special Interest Group on Security, Audit, and Control.<br/>Preferred Shelf Number&#160;QA76.9.A25 A34 2001<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Yeni ekonomide ba&#351;ar&#305;n&#305;n anahtar&#305; : e-ticaret strateji ve y&ouml;ntemleri ent://SD_ILS/0/SD_ILS:67835 2024-11-10T12:34:02Z 2024-11-10T12:34:02Z Author&#160;Dolanbay, Co&#351;kun.<br/>Preferred Shelf Number&#160;HF 5548.32 D685 2000<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~2<br/> Data privacy in the information age ent://SD_ILS/0/SD_ILS:135125 2024-11-10T12:34:02Z 2024-11-10T12:34:02Z Author&#160;Klosek, Jacqueline.<br/>Preferred Shelf Number&#160;QA76.9.A25 K57 2000<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Security in computing ent://SD_ILS/0/SD_ILS:59768 2024-11-10T12:34:02Z 2024-11-10T12:34:02Z Author&#160;Pfleeger, Charles P., 1948-<br/>Preferred Shelf Number&#160;QA 76.9.A25 P45 1997<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Secure electronic commerce : building the infrastructure for digital signatures and encryption ent://SD_ILS/0/SD_ILS:61926 2024-11-10T12:34:02Z 2024-11-10T12:34:02Z Author&#160;Ford, Warwick.&#160;Baum, Michael S., ort. yaz.<br/>Preferred Shelf Number&#160;QA 76.9.A25 F66 1997<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Applied cryptography : protocols, algorithms, and source code in C ent://SD_ILS/0/SD_ILS:108014 2024-11-10T12:34:02Z 2024-11-10T12:34:02Z Author&#160;Schneier, Bruce.<br/>Preferred Shelf Number&#160;QA76.9.A25 S35 1996<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Information warfare : chaos on the electronic superhighway ent://SD_ILS/0/SD_ILS:31599 2024-11-10T12:34:02Z 2024-11-10T12:34:02Z Author&#160;Schwartau, Winn.<br/>Preferred Shelf Number&#160;QA 76.9.A25 S354 1994<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Contemporary cryptology : the science of information integrity ent://SD_ILS/0/SD_ILS:58119 2024-11-10T12:34:02Z 2024-11-10T12:34:02Z Author&#160;Simmons, Gustavus J., ed.<br/>Preferred Shelf Number&#160;QA 76.9.A25 C6678 1992<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Computer security basic ent://SD_ILS/0/SD_ILS:41083 2024-11-10T12:34:02Z 2024-11-10T12:34:02Z Author&#160;Russell, Deborah.&#160;Gangemi, G. T., ort. yaz.<br/>Preferred Shelf Number&#160;QA 76.9.A25 R87 1991<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> A handbook of computer security ent://SD_ILS/0/SD_ILS:32378 2024-11-10T12:34:02Z 2024-11-10T12:34:02Z Author&#160;Hearnden, K., ed. by<br/>Preferred Shelf Number&#160;QA 76.9.A25 H191 1990<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Computer security risk management ent://SD_ILS/0/SD_ILS:32379 2024-11-10T12:34:02Z 2024-11-10T12:34:02Z Author&#160;Palmer, Ian C.&#160;Potter, G. A., ort. yaz.<br/>Preferred Shelf Number&#160;QA 76.9.A25 P182 1989<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/>