Search Results for Bilgisayar güvenliği. - Narrowed by: BİLGİSAYAR GÜVENLİĞİ.
SirsiDynix Enterprise
https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dBilgisayar$002bg$0025C3$0025BCvenli$0025C4$00259Fi.$0026qf$003dSUBJECT$002509Subject$002509B$0025C4$0025B0LG$0025C4$0025B0SAYAR$002bG$0025C3$00259CVENL$0025C4$0025B0$0025C4$00259E$0025C4$0025B0.$002509B$0025C4$0025B0LG$0025C4$0025B0SAYAR$002bG$0025C3$00259CVENL$0025C4$0025B0$0025C4$00259E$0025C4$0025B0.$0026te$003dILS$0026ps$003d300?dt=list
2024-12-23T08:44:33Z
Hacking : Bilişim korsanlığı ve korunma yöntemleri
ent://SD_ILS/0/SD_ILS:88578
2024-12-23T08:44:33Z
2024-12-23T08:44:33Z
Author Yılmaz, Davut.<br/>Preferred Shelf Number TK 5105.59 Y56 2004<br/>Format: Books<br/>Availability Beytepe Library~1<br/>
Exploiting software : how to break code
ent://SD_ILS/0/SD_ILS:96556
2024-12-23T08:44:33Z
2024-12-23T08:44:33Z
Author Hoglund, Greg. McGraw, Gary, 1966- ort. yaz.<br/>Preferred Shelf Number QA 76.9.A25 H635 2004<br/>Format: Books<br/>Availability Beytepe Library~1<br/>
Computer security sourcebook
ent://SD_ILS/0/SD_ILS:94615
2024-12-23T08:44:33Z
2024-12-23T08:44:33Z
Author Caldwell, Wilma, ed.<br/>Preferred Shelf Number QA 76.9.A25 C658 2003<br/>Format: Books<br/>Availability Beytepe Library~1<br/>
GSM güvenlik mekanizmasının incelenmesi ve geliştirilmesi
ent://SD_ILS/0/SD_ILS:74236
2024-12-23T08:44:33Z
2024-12-23T08:44:33Z
Author Kasım, Başar.<br/>Preferred Shelf Number TEZ/5165 K151 2001<br/>Format: Books<br/>Availability Beytepe Library~1<br/>
Yeni ekonomide başarının anahtarı : e-ticaret strateji ve yöntemleri
ent://SD_ILS/0/SD_ILS:67835
2024-12-23T08:44:33Z
2024-12-23T08:44:33Z
Author Dolanbay, Coşkun.<br/>Preferred Shelf Number HF 5548.32 D685 2000<br/>Format: Books<br/>Availability Beytepe Library~2<br/>
Security in computing
ent://SD_ILS/0/SD_ILS:59768
2024-12-23T08:44:33Z
2024-12-23T08:44:33Z
Author Pfleeger, Charles P., 1948-<br/>Preferred Shelf Number QA 76.9.A25 P45 1997<br/>Format: Books<br/>Availability Beytepe Library~1<br/>
Secure electronic commerce : building the infrastructure for digital signatures and encryption
ent://SD_ILS/0/SD_ILS:61926
2024-12-23T08:44:33Z
2024-12-23T08:44:33Z
Author Ford, Warwick. Baum, Michael S., ort. yaz.<br/>Preferred Shelf Number QA 76.9.A25 F66 1997<br/>Format: Books<br/>Availability Beytepe Library~1<br/>
Information warfare : chaos on the electronic superhighway
ent://SD_ILS/0/SD_ILS:31599
2024-12-23T08:44:33Z
2024-12-23T08:44:33Z
Author Schwartau, Winn.<br/>Preferred Shelf Number QA 76.9.A25 S354 1994<br/>Format: Books<br/>Availability Beytepe Library~1<br/>
Contemporary cryptology : the science of information integrity
ent://SD_ILS/0/SD_ILS:58119
2024-12-23T08:44:33Z
2024-12-23T08:44:33Z
Author Simmons, Gustavus J., ed.<br/>Preferred Shelf Number QA 76.9.A25 C6678 1992<br/>Format: Books<br/>Availability Beytepe Library~1<br/>
Computer security basic
ent://SD_ILS/0/SD_ILS:41083
2024-12-23T08:44:33Z
2024-12-23T08:44:33Z
Author Russell, Deborah. Gangemi, G. T., ort. yaz.<br/>Preferred Shelf Number QA 76.9.A25 R87 1991<br/>Format: Books<br/>Availability Beytepe Library~1<br/>
A handbook of computer security
ent://SD_ILS/0/SD_ILS:32378
2024-12-23T08:44:33Z
2024-12-23T08:44:33Z
Author Hearnden, K., ed. by<br/>Preferred Shelf Number QA 76.9.A25 H191 1990<br/>Format: Books<br/>Availability Beytepe Library~1<br/>
Computer security risk management
ent://SD_ILS/0/SD_ILS:32379
2024-12-23T08:44:33Z
2024-12-23T08:44:33Z
Author Palmer, Ian C. Potter, G. A., ort. yaz.<br/>Preferred Shelf Number QA 76.9.A25 P182 1989<br/>Format: Books<br/>Availability Beytepe Library~1<br/>