Search Results for Computer Security - Narrowed by: Book - Computer security.
SirsiDynix Enterprise
https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dComputer$002bSecurity$0026qf$003dITYPE$002509Material$002bType$0025091$00253AKITAP$002509Book$0026qf$003dSUBJECT$002509Subject$002509Computer$002bsecurity.$002509Computer$002bsecurity.$0026ic$003dtrue$0026te$003dILS$0026ps$003d300?
2024-09-10T02:09:24Z
Computer security fundamentals
ent://SD_ILS/0/SD_ILS:108620
2024-09-10T02:09:24Z
2024-09-10T02:09:24Z
Author Easttom, Chuck.<br/>Preferred Shelf Number QA76.9.A25 E325 2006<br/>Format: Books<br/>Availability Beytepe Library~1<br/>
Computer security sourcebook
ent://SD_ILS/0/SD_ILS:94615
2024-09-10T02:09:24Z
2024-09-10T02:09:24Z
Author Caldwell, Wilma, ed.<br/>Preferred Shelf Number QA 76.9.A25 C658 2003<br/>Format: Books<br/>Availability Beytepe Library~1<br/>
Computer security : principles and practice
ent://SD_ILS/0/SD_ILS:313473
2024-09-10T02:09:24Z
2024-09-10T02:09:24Z
Author Stallings, William. Brown, Lawrie<br/>Preferred Shelf Number QA76.9 S73 2012<br/>Format: Books<br/>Availability Beytepe Library~1<br/>
Computer security : art and science
ent://SD_ILS/0/SD_ILS:314021
2024-09-10T02:09:24Z
2024-09-10T02:09:24Z
Author Bishop, Matt (Matthew A.)<br/>Preferred Shelf Number QA76.9.A25 B56 2003<br/>Format: Books<br/>Availability Beytepe Library~1<br/>
Computer architecture and security : fundamentals of designing secure computer systems
ent://SD_ILS/0/SD_ILS:248865
2024-09-10T02:09:24Z
2024-09-10T02:09:24Z
Author Wang, Shuangbao Paul. Ledley, Robert Steven.<br/>Preferred Shelf Number QA76.9.A73 W36 2012<br/>Format: Books<br/>Availability Beytepe Library~1<br/>
Enhanced methods in computer security, biometric and artificial intelligence systems
ent://SD_ILS/0/SD_ILS:109864
2024-09-10T02:09:24Z
2024-09-10T02:09:24Z
Author Pejas, Jerzy, 1954-, ed. Piegat, Andrzej, 1947-, ed.<br/>Preferred Shelf Number QA76.9.A25 E545 2005<br/>Format: Books<br/>Availability Beytepe Library~1<br/>
Uygulamalarla siber güvenliğe giriş
ent://SD_ILS/0/SD_ILS:510151
2024-09-10T02:09:24Z
2024-09-10T02:09:24Z
Author Akyıldız, M. Alparslan.<br/>Preferred Shelf Number TK5105.59.A39 U94 2020<br/>Format: Books<br/>Availability Beytepe Library~2<br/>
Türkiye’de ve dünyada siber güvenlik
ent://SD_ILS/0/SD_ILS:514958
2024-09-10T02:09:24Z
2024-09-10T02:09:24Z
Author Çeliktaş, Barış .<br/>Preferred Shelf Number UG485 C45 2020<br/>Format: Books<br/>Availability Beytepe Library~1<br/>
Yeni başlayanlar için bilgi güvenliği ve uygulamalı hacking yöntemleri
ent://SD_ILS/0/SD_ILS:423184
2024-09-10T02:09:24Z
2024-09-10T02:09:24Z
Author Aslanbakan, Enes, yazar<br/>Preferred Shelf Number QA76.9.A25 A75 2019<br/>Format: Books<br/>Availability Beytepe Library~1<br/>
Ethical hacking : (hacking kursu)
ent://SD_ILS/0/SD_ILS:423950
2024-09-10T02:09:24Z
2024-09-10T02:09:24Z
Author Usta, Gökhan.<br/>Preferred Shelf Number QA76.9.A25 U88 2019<br/>Format: Books<br/>Availability Beytepe Library~1<br/>
Exploit geliştirme 101
ent://SD_ILS/0/SD_ILS:389077
2024-09-10T02:09:24Z
2024-09-10T02:09:24Z
Author Akyıldız, M. Alparslan.<br/>Preferred Shelf Number QA76.9.A25 A59 2018<br/>Format: Books<br/>Availability Beytepe Library~2<br/>
Introduction to modern cryptography
ent://SD_ILS/0/SD_ILS:364315
2024-09-10T02:09:24Z
2024-09-10T02:09:24Z
Author Katz, Jonathan, 1974- Lindell, Yehuda.<br/>Preferred Shelf Number QA76.9.A25 K36 2015<br/>Format: Books<br/>Availability Beytepe Library~2<br/>
Cryptography and network security : principles and practice
ent://SD_ILS/0/SD_ILS:371288
2024-09-10T02:09:24Z
2024-09-10T02:09:24Z
Author Stallings, William.<br/>Preferred Shelf Number TK5105.59 S713 2014<br/>Format: Books<br/>Availability Beytepe Library~1<br/>
Network security essentials : applications and standards
ent://SD_ILS/0/SD_ILS:354232
2024-09-10T02:09:24Z
2024-09-10T02:09:24Z
Author Stallings, William.<br/>Preferred Shelf Number TK5105.59 S725 2014<br/>Format: Books<br/>Availability Beytepe Library~1<br/>
Elementary information security
ent://SD_ILS/0/SD_ILS:271272
2024-09-10T02:09:24Z
2024-09-10T02:09:24Z
Author Smith, Richard E.<br/>Preferred Shelf Number QA76.9.A25 S652 2013<br/>Format: Books<br/>Availability Beytepe Library~1<br/>
Secret history : the story of cryptology
ent://SD_ILS/0/SD_ILS:365258
2024-09-10T02:09:24Z
2024-09-10T02:09:24Z
Author Bauer, Craig P.<br/>Preferred Shelf Number QA76.9.A25 B384 2013<br/>Format: Books<br/>Availability Beytepe Library~1<br/>
Hacking exposed 7 : network security secrets & solutions
ent://SD_ILS/0/SD_ILS:270033
2024-09-10T02:09:24Z
2024-09-10T02:09:24Z
Author McClure, Stuart. Scambray, Joel. Kurtz, George.<br/>Preferred Shelf Number TK5105.59 M48 2012<br/>Format: Books<br/>Availability Beytepe Library~1<br/>
Hacker techniques, tools, and incident handling
ent://SD_ILS/0/SD_ILS:271438
2024-09-10T02:09:24Z
2024-09-10T02:09:24Z
Author Oriyano, Sean-Philip. Gregg, Michael (Michael C.)<br/>Preferred Shelf Number TK5105.59 O786 2011<br/>Format: Books<br/>Availability Beytepe Library~1<br/>
Security policies and implementation issues
ent://SD_ILS/0/SD_ILS:271534
2024-09-10T02:09:24Z
2024-09-10T02:09:24Z
Author Johnson, Rob (Robert) Merkow, Mark S.<br/>Preferred Shelf Number QA76.9.A25 J64 2011<br/>Format: Books<br/>Availability Beytepe Library~1<br/>
Security strategies in Windows platforms and applications
ent://SD_ILS/0/SD_ILS:271537
2024-09-10T02:09:24Z
2024-09-10T02:09:24Z
Author Solomon, Michael.<br/>Preferred Shelf Number QA76.76.O63 S64 2011<br/>Format: Books<br/>Availability Beytepe Library~1<br/>
Security strategies in Linux platforms and applications
ent://SD_ILS/0/SD_ILS:271539
2024-09-10T02:09:24Z
2024-09-10T02:09:24Z
Author Jang, Michael H.<br/>Preferred Shelf Number QA76.76.O63 J3638 2011<br/>Format: Books<br/>Availability Beytepe Library~1<br/>
Managing risk in information systems
ent://SD_ILS/0/SD_ILS:271251
2024-09-10T02:09:24Z
2024-09-10T02:09:24Z
Author Gibson, Darril.<br/>Preferred Shelf Number QA76.9.A25 G5 2011<br/>Format: Books<br/>Availability Beytepe Library~1<br/>
Auditing IT infrastructures for compliance
ent://SD_ILS/0/SD_ILS:271151
2024-09-10T02:09:24Z
2024-09-10T02:09:24Z
Author Weiss, Martin M. Solomon, Michael G.<br/>Preferred Shelf Number QA76.9.A25 W428 2011<br/>Format: Books<br/>Availability Beytepe Library~1<br/>
Security in computing
ent://SD_ILS/0/SD_ILS:313297
2024-09-10T02:09:24Z
2024-09-10T02:09:24Z
Author Pfleeger, Charles P., 1948-<br/>Preferred Shelf Number QA76.9 A25 P45 2011<br/>Format: Books<br/>Availability Beytepe Library~1<br/>
Social engineering : the art of human hacking
ent://SD_ILS/0/SD_ILS:377976
2024-09-10T02:09:24Z
2024-09-10T02:09:24Z
Author Hadnagy, Christopher.<br/>Preferred Shelf Number QA76.9.C66 H33 2011<br/>Format: Books<br/>Availability Beytepe Library~1<br/>
Computer forensics and cyber crime : an introduction
ent://SD_ILS/0/SD_ILS:134036
2024-09-10T02:09:24Z
2024-09-10T02:09:24Z
Author Britz, Marjie.<br/>Preferred Shelf Number QA76.9.A25 B77 2009<br/>Format: Books<br/>Availability Beytepe Library~1<br/>
Grid computing security
ent://SD_ILS/0/SD_ILS:248747
2024-09-10T02:09:24Z
2024-09-10T02:09:24Z
Author Chakrabarti, Anirban.<br/>Preferred Shelf Number QA76.9.C58 C53 2007<br/>Format: Books<br/>Availability Beytepe Library~1<br/>
Data warehousing and data mining techniques for cyber security
ent://SD_ILS/0/SD_ILS:110434
2024-09-10T02:09:24Z
2024-09-10T02:09:24Z
Author Singhal, Anoop, 1958-<br/>Preferred Shelf Number QA76.9.A25 S563 2007<br/>Format: Books<br/>Availability Beytepe Library~1<br/>
Security in computing
ent://SD_ILS/0/SD_ILS:110682
2024-09-10T02:09:24Z
2024-09-10T02:09:24Z
Author Pfleeger, Charles P., 1948-<br/>Preferred Shelf Number QA76.9.A25 P45 2007<br/>Format: Books<br/>Availability Beytepe Library~1<br/>
Information security : principles and practice
ent://SD_ILS/0/SD_ILS:109477
2024-09-10T02:09:24Z
2024-09-10T02:09:24Z
Author Stamp, Mark.<br/>Preferred Shelf Number QA76.9.A25 S69 2006<br/>Format: Books<br/>Availability Beytepe Library~1<br/>
Linux Patch Management : keeping Linux systems up to date
ent://SD_ILS/0/SD_ILS:119550
2024-09-10T02:09:24Z
2024-09-10T02:09:24Z
Author Jang, Michael H.<br/>Preferred Shelf Number QA76.76.O63 J368 2006<br/>Format: Books<br/>Availability Beytepe Library~1<br/>
Information security architecture : an integrated approach to security in the organization
ent://SD_ILS/0/SD_ILS:110865
2024-09-10T02:09:24Z
2024-09-10T02:09:24Z
Author Tudor, Jan Killmeyer.<br/>Preferred Shelf Number QA76.9.A25 T83 2006<br/>Format: Books<br/>Availability Beytepe Library~1<br/>
Intelligence and security informatics for international security : information sharing and data mining
ent://SD_ILS/0/SD_ILS:119786
2024-09-10T02:09:24Z
2024-09-10T02:09:24Z
Author Chen, Hsinchun.<br/>Preferred Shelf Number QA76.76.E95 C44 2006<br/>Format: Books<br/>Availability Beytepe Library~1<br/>
Bilgi ve bilgisayar güvenliği : casus yazılımlar ve korunma yöntemleri
ent://SD_ILS/0/SD_ILS:515469
2024-09-10T02:09:24Z
2024-09-10T02:09:24Z
Author Canbek, Gürol. Sağıroğlu, Şeref.<br/>Preferred Shelf Number QA76.9.A25 C36 2006<br/>Format: Books<br/>Availability Beytepe Library~1<br/>
Malware : fighting malicious code
ent://SD_ILS/0/SD_ILS:267737
2024-09-10T02:09:24Z
2024-09-10T02:09:24Z
Author Skoudis, Ed. Zeltser, Lenny.<br/>Preferred Shelf Number QA76.9.A25 S58 2004<br/>Format: Books<br/>Availability Beytepe Library~1<br/>
Hacking : Bilişim korsanlığı ve korunma yöntemleri
ent://SD_ILS/0/SD_ILS:88578
2024-09-10T02:09:24Z
2024-09-10T02:09:24Z
Author Yılmaz, Davut.<br/>Preferred Shelf Number TK 5105.59 Y56 2004<br/>Format: Books<br/>Availability Beytepe Library~1<br/>
İnternette güvenlik ve Hacker Cracker meselesi : el kitabı
ent://SD_ILS/0/SD_ILS:104130
2024-09-10T02:09:24Z
2024-09-10T02:09:24Z
Author Güven, Mehmet.<br/>Preferred Shelf Number QA 76.9.A25 G88 2004<br/>Format: Books<br/>Availability Beytepe Library~2<br/>
How to break software security : effective technigues for security testing
ent://SD_ILS/0/SD_ILS:105584
2024-09-10T02:09:24Z
2024-09-10T02:09:24Z
Author Whittaker, James A., 1965- Thomson, Herbert H., ort. yaz.<br/>Preferred Shelf Number QA 76.9.A25 W48 2004<br/>Format: Books<br/>Availability Beytepe Library~2<br/>
Exploiting software : how to break code
ent://SD_ILS/0/SD_ILS:96556
2024-09-10T02:09:24Z
2024-09-10T02:09:24Z
Author Hoglund, Greg. McGraw, Gary, 1966- ort. yaz.<br/>Preferred Shelf Number QA 76.9.A25 H635 2004<br/>Format: Books<br/>Availability Beytepe Library~1<br/>
Secure architectures with OpenBSD
ent://SD_ILS/0/SD_ILS:109506
2024-09-10T02:09:24Z
2024-09-10T02:09:24Z
Author Palmer, Brandon. Nazario, Jose, ort. yaz.<br/>Preferred Shelf Number QA76.76.O63 P335 2004<br/>Format: Books<br/>Availability Beytepe Library~1<br/>
Technology and privacy : the new landscape
ent://SD_ILS/0/SD_ILS:112999
2024-09-10T02:09:24Z
2024-09-10T02:09:24Z
Author Agre, Philip. Rotenberg, Marc.<br/>Preferred Shelf Number QA76.9.A25 T43 2001<br/>Format: Books<br/>Availability Beytepe Library~1<br/>
Data privacy in the information age
ent://SD_ILS/0/SD_ILS:135125
2024-09-10T02:09:24Z
2024-09-10T02:09:24Z
Author Klosek, Jacqueline.<br/>Preferred Shelf Number QA76.9.A25 K57 2000<br/>Format: Books<br/>Availability Beytepe Library~1<br/>
Applied cryptography : protocols, algorithms, and source code in C
ent://SD_ILS/0/SD_ILS:108014
2024-09-10T02:09:24Z
2024-09-10T02:09:24Z
Author Schneier, Bruce.<br/>Preferred Shelf Number QA76.9.A25 S35 1996<br/>Format: Books<br/>Availability Beytepe Library~1<br/>
Auditing IT infrastructures for compliance
ent://SD_ILS/0/SD_ILS:270164
2024-09-10T02:09:24Z
2024-09-10T02:09:24Z
Author Weiss, Martin M. Solomon, Michael G.<br/>Preferred Shelf Number QA76.9.A25 W428<br/>Format: Books<br/>Availability Beytepe Library~1<br/>