Search Results for Bilgisayar güvenliği. - Narrowed by: Beytepe Library
SirsiDynix Enterprise
https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dBilgisayar$002bg$0025C3$0025BCvenli$0025C4$00259Fi.$0026qf$003dLIBRARY$002509Library$0025091$00253ABEYTEPE$002509Beytepe$002bLibrary$0026te$003dILS$0026ps$003d300?dt=list
2024-12-23T08:36:16Z
Bilgisayar ağları ve güvenliği
ent://SD_ILS/0/SD_ILS:106591
2024-12-23T08:36:16Z
2024-12-23T08:36:16Z
Author Özbilen, Alper.<br/>Preferred Shelf Number TK5105.5 .O994 2006<br/>Format: Books<br/>Availability Beytepe Library~1<br/>
Bilgi ve bilgisayar güvenliği : casus yazılımlar ve korunma yöntemleri
ent://SD_ILS/0/SD_ILS:515469
2024-12-23T08:36:16Z
2024-12-23T08:36:16Z
Author Canbek, Gürol. Sağıroğlu, Şeref.<br/>Preferred Shelf Number QA76.9.A25 C36 2006<br/>Format: Books<br/>Availability Beytepe Library~1<br/>
Kali Linux
ent://SD_ILS/0/SD_ILS:524304
2024-12-23T08:36:16Z
2024-12-23T08:36:16Z
Author Altuntaş, Abdulaziz.<br/>Preferred Shelf Number QA76.9.A25 A48 2024<br/>Format: Books<br/>Availability Beytepe Library~1<br/>
Hacking Interface
ent://SD_ILS/0/SD_ILS:524308
2024-12-23T08:36:16Z
2024-12-23T08:36:16Z
Author Elbahadır, Hamza.<br/>Preferred Shelf Number QA76.9.A25 E43 2024<br/>Format: Books<br/>Availability Beytepe Library~1<br/>
A’dan Z’ye siber güvenlik
ent://SD_ILS/0/SD_ILS:524303
2024-12-23T08:36:16Z
2024-12-23T08:36:16Z
Author Polat, A. Can. Karakaş, Burak.<br/>Preferred Shelf Number QA76.9 P65 2023<br/>Format: Books<br/>Availability Beytepe Library~1<br/>
Dijital güvenlik : dijital ortamlarda güvenle var olmak
ent://SD_ILS/0/SD_ILS:517179
2024-12-23T08:36:16Z
2024-12-23T08:36:16Z
Author Özer, Fatih. Şahin, Yusuf Levent, editör<br/>Preferred Shelf Number QA76.9.E74 O94 2022<br/>Format: Books<br/>Availability Beytepe Library~1<br/>
Ağ yönetimi ve bilgi güvenliği
ent://SD_ILS/0/SD_ILS:516275
2024-12-23T08:36:16Z
2024-12-23T08:36:16Z
Author Bilge, Alper. Kaçmaz, Emre.<br/>Preferred Shelf Number TK5105.59 A98 2021<br/>Format: Books<br/>Availability Beytepe Library~1<br/>
Uygulamalarla siber güvenliğe giriş
ent://SD_ILS/0/SD_ILS:510151
2024-12-23T08:36:16Z
2024-12-23T08:36:16Z
Author Akyıldız, M. Alparslan.<br/>Preferred Shelf Number TK5105.59.A39 U94 2020<br/>Format: Books<br/>Availability Beytepe Library~2<br/>
Türkiye’de ve dünyada siber güvenlik
ent://SD_ILS/0/SD_ILS:514958
2024-12-23T08:36:16Z
2024-12-23T08:36:16Z
Author Çeliktaş, Barış .<br/>Preferred Shelf Number UG485 C45 2020<br/>Format: Books<br/>Availability Beytepe Library~1<br/>
Yeni başlayanlar için bilgi güvenliği ve uygulamalı hacking yöntemleri
ent://SD_ILS/0/SD_ILS:423184
2024-12-23T08:36:16Z
2024-12-23T08:36:16Z
Author Aslanbakan, Enes, yazar<br/>Preferred Shelf Number QA76.9.A25 A75 2019<br/>Format: Books<br/>Availability Beytepe Library~1<br/>
Ethical hacking : (hacking kursu)
ent://SD_ILS/0/SD_ILS:423950
2024-12-23T08:36:16Z
2024-12-23T08:36:16Z
Author Usta, Gökhan.<br/>Preferred Shelf Number QA76.9.A25 U88 2019<br/>Format: Books<br/>Availability Beytepe Library~1<br/>
Siber güvenlik ve savunma : standartlar ve uygulamalar
ent://SD_ILS/0/SD_ILS:462283
2024-12-23T08:36:16Z
2024-12-23T08:36:16Z
Author Sağıroğlu, Şeref.<br/>Preferred Shelf Number TK5105.59 S53 2019<br/>Format: Books<br/>Availability Beytepe Library~2<br/>
Some'ler için ağ ve malware analizi
ent://SD_ILS/0/SD_ILS:479526
2024-12-23T08:36:16Z
2024-12-23T08:36:16Z
Author Akyıldız, M. Alparslan.<br/>Preferred Shelf Number TK5105.59 A395 2018<br/>Format: Books<br/>Availability Beytepe Library~1<br/>
Exploit geliştirme 101
ent://SD_ILS/0/SD_ILS:389077
2024-12-23T08:36:16Z
2024-12-23T08:36:16Z
Author Akyıldız, M. Alparslan.<br/>Preferred Shelf Number QA76.9.A25 A59 2018<br/>Format: Books<br/>Availability Beytepe Library~2<br/>
Java programlama diliyle kriptoloji uygulamaları
ent://SD_ILS/0/SD_ILS:380319
2024-12-23T08:36:16Z
2024-12-23T08:36:16Z
Author Bodur, Hüseyin<br/>Preferred Shelf Number QA76.9.A25 B63 2016<br/>Format: Books<br/>Availability Beytepe Library~1<br/>
Ethical hacking : offensive & defensive
ent://SD_ILS/0/SD_ILS:513450
2024-12-23T08:36:16Z
2024-12-23T08:36:16Z
Author Çıtak, Ömer.<br/>Preferred Shelf Number QA76.9.A25 C58 2016<br/>Format: Books<br/>Availability Beytepe Library~1<br/>
Hacking Interface
ent://SD_ILS/0/SD_ILS:513452
2024-12-23T08:36:16Z
2024-12-23T08:36:16Z
Author Elbahadır, Hamza.<br/>Preferred Shelf Number QA76.9.A25 E43 2016<br/>Format: Books<br/>Availability Beytepe Library~1<br/>
Siber istihbarat
ent://SD_ILS/0/SD_ILS:384051
2024-12-23T08:36:16Z
2024-12-23T08:36:16Z
Author Keleştemur, Atalay<br/>Preferred Shelf Number QA76.9.A25 K45 2015<br/>Format: Books<br/>Availability Beytepe Library~1<br/>
Siber güvenlik ve elektronik bileşenleri
ent://SD_ILS/0/SD_ILS:380281
2024-12-23T08:36:16Z
2024-12-23T08:36:16Z
Author Ünal, Ahmet Naci<br/>Preferred Shelf Number UG485 U53 2015<br/>Format: Books<br/>Availability Beytepe Library~1<br/>
Hacking Interface
ent://SD_ILS/0/SD_ILS:317847
2024-12-23T08:36:16Z
2024-12-23T08:36:16Z
Author Elbahadır, Hamza.<br/>Preferred Shelf Number QA 76.9 A25 E43 2014<br/>Format: Books<br/>Availability Beytepe Library~2<br/>
Veri gizleme
ent://SD_ILS/0/SD_ILS:370995
2024-12-23T08:36:16Z
2024-12-23T08:36:16Z
Author Yalman,Yıldıray Çetin, Özdemir. Ertürk, İsmail. Akar, Feyzi.<br/>Preferred Shelf Number QA76.9 Y35 2014<br/>Format: Books<br/>Availability Beytepe Library~1<br/>
Information security for managers
ent://SD_ILS/0/SD_ILS:516570
2024-12-23T08:36:16Z
2024-12-23T08:36:16Z
Author Workman, Michael D., 1957-. Phelps, Daniel C. Gathegi, John N.<br/>Preferred Shelf Number HF5548.37 W67 2013<br/>Format: Books<br/>Availability Beytepe Library~1<br/>
Social engineering : the art of human hacking
ent://SD_ILS/0/SD_ILS:377976
2024-12-23T08:36:16Z
2024-12-23T08:36:16Z
Author Hadnagy, Christopher.<br/>Preferred Shelf Number QA76.9.C66 H33 2011<br/>Format: Books<br/>Availability Beytepe Library~1<br/>
Dijital kale
ent://SD_ILS/0/SD_ILS:126135
2024-12-23T08:36:16Z
2024-12-23T08:36:16Z
Author Brown, Dan, 1964- Soner, Sezer.<br/>Preferred Shelf Number PS 3552.R685434 D542 2010<br/>Format: Books<br/>Availability Beytepe Library~1<br/>
Computer forensics and cyber crime : an introduction
ent://SD_ILS/0/SD_ILS:134036
2024-12-23T08:36:16Z
2024-12-23T08:36:16Z
Author Britz, Marjie.<br/>Preferred Shelf Number QA76.9.A25 B77 2009<br/>Format: Books<br/>Availability Beytepe Library~1<br/>
ISA server 2006
ent://SD_ILS/0/SD_ILS:115080
2024-12-23T08:36:16Z
2024-12-23T08:36:16Z
Author İnan, Yüksel. Demirli, Nihat.<br/>Preferred Shelf Number TK5105.59 .I536 2008<br/>Format: Books<br/>Availability Beytepe Library~2<br/>
Data warehousing and data mining techniques for cyber security
ent://SD_ILS/0/SD_ILS:110434
2024-12-23T08:36:16Z
2024-12-23T08:36:16Z
Author Singhal, Anoop, 1958-<br/>Preferred Shelf Number QA76.9.A25 S563 2007<br/>Format: Books<br/>Availability Beytepe Library~1<br/>
Security in computing
ent://SD_ILS/0/SD_ILS:110682
2024-12-23T08:36:16Z
2024-12-23T08:36:16Z
Author Pfleeger, Charles P., 1948-<br/>Preferred Shelf Number QA76.9.A25 P45 2007<br/>Format: Books<br/>Availability Beytepe Library~1<br/>
Information security : contemporary cases
ent://SD_ILS/0/SD_ILS:111021
2024-12-23T08:36:16Z
2024-12-23T08:36:16Z
Author Wright, Marie A. Kakalik, John S.<br/>Preferred Shelf Number QA76.9.A25 W75 2007<br/>Format: Books<br/>Availability Beytepe Library~1<br/>
Linux Patch Management : keeping Linux systems up to date
ent://SD_ILS/0/SD_ILS:119550
2024-12-23T08:36:16Z
2024-12-23T08:36:16Z
Author Jang, Michael H.<br/>Preferred Shelf Number QA76.76.O63 J368 2006<br/>Format: Books<br/>Availability Beytepe Library~1<br/>
Intelligence and security informatics for international security : information sharing and data mining
ent://SD_ILS/0/SD_ILS:119786
2024-12-23T08:36:16Z
2024-12-23T08:36:16Z
Author Chen, Hsinchun.<br/>Preferred Shelf Number QA76.76.E95 C44 2006<br/>Format: Books<br/>Availability Beytepe Library~1<br/>
Computer security fundamentals
ent://SD_ILS/0/SD_ILS:108620
2024-12-23T08:36:16Z
2024-12-23T08:36:16Z
Author Easttom, Chuck.<br/>Preferred Shelf Number QA76.9.A25 E325 2006<br/>Format: Books<br/>Availability Beytepe Library~1<br/>
Information security : principles and practice
ent://SD_ILS/0/SD_ILS:109477
2024-12-23T08:36:16Z
2024-12-23T08:36:16Z
Author Stamp, Mark.<br/>Preferred Shelf Number QA76.9.A25 S69 2006<br/>Format: Books<br/>Availability Beytepe Library~1<br/>
Information security architecture : an integrated approach to security in the organization
ent://SD_ILS/0/SD_ILS:110865
2024-12-23T08:36:16Z
2024-12-23T08:36:16Z
Author Tudor, Jan Killmeyer.<br/>Preferred Shelf Number QA76.9.A25 T83 2006<br/>Format: Books<br/>Availability Beytepe Library~1<br/>
Enhanced methods in computer security, biometric and artificial intelligence systems
ent://SD_ILS/0/SD_ILS:109864
2024-12-23T08:36:16Z
2024-12-23T08:36:16Z
Author Pejas, Jerzy, 1954-, ed. Piegat, Andrzej, 1947-, ed.<br/>Preferred Shelf Number QA76.9.A25 E545 2005<br/>Format: Books<br/>Availability Beytepe Library~1<br/>
İnternette güvenlik ve Hacker Cracker meselesi : el kitabı
ent://SD_ILS/0/SD_ILS:104130
2024-12-23T08:36:16Z
2024-12-23T08:36:16Z
Author Güven, Mehmet.<br/>Preferred Shelf Number QA 76.9.A25 G88 2004<br/>Format: Books<br/>Availability Beytepe Library~2<br/>
How to break software security : effective technigues for security testing
ent://SD_ILS/0/SD_ILS:105584
2024-12-23T08:36:16Z
2024-12-23T08:36:16Z
Author Whittaker, James A., 1965- Thomson, Herbert H., ort. yaz.<br/>Preferred Shelf Number QA 76.9.A25 W48 2004<br/>Format: Books<br/>Availability Beytepe Library~2<br/>
Hacking : Bilişim korsanlığı ve korunma yöntemleri
ent://SD_ILS/0/SD_ILS:88578
2024-12-23T08:36:16Z
2024-12-23T08:36:16Z
Author Yılmaz, Davut.<br/>Preferred Shelf Number TK 5105.59 Y56 2004<br/>Format: Books<br/>Availability Beytepe Library~1<br/>
Dijital kale
ent://SD_ILS/0/SD_ILS:96322
2024-12-23T08:36:16Z
2024-12-23T08:36:16Z
Author Brown, Dan, 1964- Soner, Sezer, çev. Huvaj, Muharrem Nesij, haz.<br/>Preferred Shelf Number PS3552.R685434 D542 2004<br/>Format: Books<br/>Availability Beytepe Library~7<br/>
Exploiting software : how to break code
ent://SD_ILS/0/SD_ILS:96556
2024-12-23T08:36:16Z
2024-12-23T08:36:16Z
Author Hoglund, Greg. McGraw, Gary, 1966- ort. yaz.<br/>Preferred Shelf Number QA 76.9.A25 H635 2004<br/>Format: Books<br/>Availability Beytepe Library~1<br/>
Secure architectures with OpenBSD
ent://SD_ILS/0/SD_ILS:109506
2024-12-23T08:36:16Z
2024-12-23T08:36:16Z
Author Palmer, Brandon. Nazario, Jose, ort. yaz.<br/>Preferred Shelf Number QA76.76.O63 P335 2004<br/>Format: Books<br/>Availability Beytepe Library~1<br/>
Computer security sourcebook
ent://SD_ILS/0/SD_ILS:94615
2024-12-23T08:36:16Z
2024-12-23T08:36:16Z
Author Caldwell, Wilma, ed.<br/>Preferred Shelf Number QA 76.9.A25 C658 2003<br/>Format: Books<br/>Availability Beytepe Library~1<br/>
Nokia network security solutions handbook
ent://SD_ILS/0/SD_ILS:81149
2024-12-23T08:36:16Z
2024-12-23T08:36:16Z
Author Maxwell, Doug. Amon, Cherie, ort. yaz.<br/>Preferred Shelf Number TK 5105.59 M451 2002<br/>Format: Books<br/>Availability Beytepe Library~1<br/>
New Security Paradigms Workshop : proceedings, September 10 -13, 2001, Cloudcroft, NM, USA
ent://SD_ILS/0/SD_ILS:118009
2024-12-23T08:36:16Z
2024-12-23T08:36:16Z
Author ACM SIGSAC New Security Paradigms Workshop (2001 : Cloudcroft, NM, USA) Raskin, V. Hempelmann, C.F. Association for Computing Machinery. Special Interest Group on Security, Audit, and Control.<br/>Preferred Shelf Number QA76.9.A25 A34 2001<br/>Format: Books<br/>Availability Beytepe Library~1<br/>
Technology and privacy : the new landscape
ent://SD_ILS/0/SD_ILS:112999
2024-12-23T08:36:16Z
2024-12-23T08:36:16Z
Author Agre, Philip. Rotenberg, Marc.<br/>Preferred Shelf Number QA76.9.A25 T43 2001<br/>Format: Books<br/>Availability Beytepe Library~1<br/>
Proceedings of Sixth ACM Symposium on Access Control Models and Technologies : SACMAT 2001 : Litton-TASC, Westfields II Conference Facility, May 3-4, 2001, Chantilly, Virginia, USA
ent://SD_ILS/0/SD_ILS:72452
2024-12-23T08:36:16Z
2024-12-23T08:36:16Z
Author ACM Symposium on Access Control Models and Technologies (6th : 2001 : Chantilly, V.A.) Association for Computing Machinery. Special Interest Group on Security, Audit, and Control.<br/>Preferred Shelf Number QA 76.9.A25 A292 2001<br/>Format: Books<br/>Availability Beytepe Library~1<br/>
GSM güvenlik mekanizmasının incelenmesi ve geliştirilmesi
ent://SD_ILS/0/SD_ILS:74236
2024-12-23T08:36:16Z
2024-12-23T08:36:16Z
Author Kasım, Başar.<br/>Preferred Shelf Number TEZ/5165 K151 2001<br/>Format: Books<br/>Availability Beytepe Library~1<br/>
Data privacy in the information age
ent://SD_ILS/0/SD_ILS:135125
2024-12-23T08:36:16Z
2024-12-23T08:36:16Z
Author Klosek, Jacqueline.<br/>Preferred Shelf Number QA76.9.A25 K57 2000<br/>Format: Books<br/>Availability Beytepe Library~1<br/>
Yeni ekonomide başarının anahtarı : e-ticaret strateji ve yöntemleri
ent://SD_ILS/0/SD_ILS:67835
2024-12-23T08:36:16Z
2024-12-23T08:36:16Z
Author Dolanbay, Coşkun.<br/>Preferred Shelf Number HF 5548.32 D685 2000<br/>Format: Books<br/>Availability Beytepe Library~2<br/>
Security in computing
ent://SD_ILS/0/SD_ILS:59768
2024-12-23T08:36:16Z
2024-12-23T08:36:16Z
Author Pfleeger, Charles P., 1948-<br/>Preferred Shelf Number QA 76.9.A25 P45 1997<br/>Format: Books<br/>Availability Beytepe Library~1<br/>
Secure electronic commerce : building the infrastructure for digital signatures and encryption
ent://SD_ILS/0/SD_ILS:61926
2024-12-23T08:36:16Z
2024-12-23T08:36:16Z
Author Ford, Warwick. Baum, Michael S., ort. yaz.<br/>Preferred Shelf Number QA 76.9.A25 F66 1997<br/>Format: Books<br/>Availability Beytepe Library~1<br/>
Applied cryptography : protocols, algorithms, and source code in C
ent://SD_ILS/0/SD_ILS:108014
2024-12-23T08:36:16Z
2024-12-23T08:36:16Z
Author Schneier, Bruce.<br/>Preferred Shelf Number QA76.9.A25 S35 1996<br/>Format: Books<br/>Availability Beytepe Library~1<br/>
Information warfare : chaos on the electronic superhighway
ent://SD_ILS/0/SD_ILS:31599
2024-12-23T08:36:16Z
2024-12-23T08:36:16Z
Author Schwartau, Winn.<br/>Preferred Shelf Number QA 76.9.A25 S354 1994<br/>Format: Books<br/>Availability Beytepe Library~1<br/>
Contemporary cryptology : the science of information integrity
ent://SD_ILS/0/SD_ILS:58119
2024-12-23T08:36:16Z
2024-12-23T08:36:16Z
Author Simmons, Gustavus J., ed.<br/>Preferred Shelf Number QA 76.9.A25 C6678 1992<br/>Format: Books<br/>Availability Beytepe Library~1<br/>
Computer security basic
ent://SD_ILS/0/SD_ILS:41083
2024-12-23T08:36:16Z
2024-12-23T08:36:16Z
Author Russell, Deborah. Gangemi, G. T., ort. yaz.<br/>Preferred Shelf Number QA 76.9.A25 R87 1991<br/>Format: Books<br/>Availability Beytepe Library~1<br/>
A handbook of computer security
ent://SD_ILS/0/SD_ILS:32378
2024-12-23T08:36:16Z
2024-12-23T08:36:16Z
Author Hearnden, K., ed. by<br/>Preferred Shelf Number QA 76.9.A25 H191 1990<br/>Format: Books<br/>Availability Beytepe Library~1<br/>
Computer security risk management
ent://SD_ILS/0/SD_ILS:32379
2024-12-23T08:36:16Z
2024-12-23T08:36:16Z
Author Palmer, Ian C. Potter, G. A., ort. yaz.<br/>Preferred Shelf Number QA 76.9.A25 P182 1989<br/>Format: Books<br/>Availability Beytepe Library~1<br/>