Search Results for Computer Security - Narrowed by: Beytepe General Collection
SirsiDynix Enterprise
https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dComputer$002bSecurity$0026qf$003dLOCATION$002509Shelf$002bLocation$0025091$00253ABEYTEPEGEN$002509Beytepe$002bGeneral$002bCollection$0026ps$003d300$0026isd$003dtrue?
2024-11-06T03:05:18Z
Computer security handbook
ent://SD_ILS/0/SD_ILS:10921
2024-11-06T03:05:18Z
2024-11-06T03:05:18Z
Author Computer Security Research Group.<br/>Preferred Shelf Number HF 5548.2 C58177 1973<br/>Format: Books<br/>Availability Beytepe Library~1<br/>
Computer security fundamentals
ent://SD_ILS/0/SD_ILS:108620
2024-11-06T03:05:18Z
2024-11-06T03:05:18Z
Author Easttom, Chuck.<br/>Preferred Shelf Number QA76.9.A25 E325 2006<br/>Format: Books<br/>Availability Beytepe Library~1<br/>
Computer security sourcebook
ent://SD_ILS/0/SD_ILS:94615
2024-11-06T03:05:18Z
2024-11-06T03:05:18Z
Author Caldwell, Wilma, ed.<br/>Preferred Shelf Number QA 76.9.A25 C658 2003<br/>Format: Books<br/>Availability Beytepe Library~1<br/>
Computer security basic
ent://SD_ILS/0/SD_ILS:41083
2024-11-06T03:05:18Z
2024-11-06T03:05:18Z
Author Russell, Deborah. Gangemi, G. T., ort. yaz.<br/>Preferred Shelf Number QA 76.9.A25 R87 1991<br/>Format: Books<br/>Availability Beytepe Library~1<br/>
Computer security solutions
ent://SD_ILS/0/SD_ILS:32336
2024-11-06T03:05:18Z
2024-11-06T03:05:18Z
Author Hruska, Jan, 1957- Jackson, K. M., ort. yaz.<br/>Preferred Shelf Number QA 76.76.C6 H78 1990<br/>Format: Books<br/>Availability Beytepe Library~1<br/>
Practical computer network security
ent://SD_ILS/0/SD_ILS:61567
2024-11-06T03:05:18Z
2024-11-06T03:05:18Z
Author Hendry, Mike.<br/>Preferred Shelf Number TK 5105.59 H46 1995<br/>Format: Books<br/>Availability Beytepe Library~1<br/>
Computer security risk management
ent://SD_ILS/0/SD_ILS:32379
2024-11-06T03:05:18Z
2024-11-06T03:05:18Z
Author Palmer, Ian C. Potter, G. A., ort. yaz.<br/>Preferred Shelf Number QA 76.9.A25 P182 1989<br/>Format: Books<br/>Availability Beytepe Library~1<br/>
Computer security : principles and practice
ent://SD_ILS/0/SD_ILS:313473
2024-11-06T03:05:18Z
2024-11-06T03:05:18Z
Author Stallings, William. Brown, Lawrie<br/>Preferred Shelf Number QA76.9 S73 2012<br/>Format: Books<br/>Availability Beytepe Library~1<br/>
Computer security : art and science
ent://SD_ILS/0/SD_ILS:314021
2024-11-06T03:05:18Z
2024-11-06T03:05:18Z
Author Bishop, Matt (Matthew A.)<br/>Preferred Shelf Number QA76.9.A25 B56 2003<br/>Format: Books<br/>Availability Beytepe Library~1<br/>
A handbook of computer security
ent://SD_ILS/0/SD_ILS:32378
2024-11-06T03:05:18Z
2024-11-06T03:05:18Z
Author Hearnden, K., ed. by<br/>Preferred Shelf Number QA 76.9.A25 H191 1990<br/>Format: Books<br/>Availability Beytepe Library~1<br/>
Sequrity for computer networks : an introduction to data security in teleprocessing and electronic funds transfer
ent://SD_ILS/0/SD_ILS:62188
2024-11-06T03:05:18Z
2024-11-06T03:05:18Z
Author Davies, Donald Watts, 1924- Price, W. L., ort.yaz.<br/>Preferred Shelf Number TK 5105 D43 1989<br/>Format: Books<br/>Availability Beytepe Library~1<br/>
Computer architecture and security : fundamentals of designing secure computer systems
ent://SD_ILS/0/SD_ILS:248865
2024-11-06T03:05:18Z
2024-11-06T03:05:18Z
Author Wang, Shuangbao Paul. Ledley, Robert Steven.<br/>Preferred Shelf Number QA76.9.A73 W36 2012<br/>Format: Books<br/>Availability Beytepe Library~1<br/>
Enhanced methods in computer security, biometric and artificial intelligence systems
ent://SD_ILS/0/SD_ILS:109864
2024-11-06T03:05:18Z
2024-11-06T03:05:18Z
Author Pejas, Jerzy, 1954-, ed. Piegat, Andrzej, 1947-, ed.<br/>Preferred Shelf Number QA76.9.A25 E545 2005<br/>Format: Books<br/>Availability Beytepe Library~1<br/>
Dijital güvenlik : dijital ortamlarda güvenle var olmak
ent://SD_ILS/0/SD_ILS:517179
2024-11-06T03:05:18Z
2024-11-06T03:05:18Z
Author Özer, Fatih. Şahin, Yusuf Levent, editör<br/>Preferred Shelf Number QA76.9.E74 O94 2022<br/>Format: Books<br/>Availability Beytepe Library~1<br/>
Elektronik harp
ent://SD_ILS/0/SD_ILS:514348
2024-11-06T03:05:18Z
2024-11-06T03:05:18Z
Author Pakfiliz, Ahmet Güngör.<br/>Preferred Shelf Number UG485 P35 2021<br/>Format: Books<br/>Availability Beytepe Library~1<br/>
Ağ yönetimi ve bilgi güvenliği
ent://SD_ILS/0/SD_ILS:516275
2024-11-06T03:05:18Z
2024-11-06T03:05:18Z
Author Bilge, Alper. Kaçmaz, Emre.<br/>Preferred Shelf Number TK5105.59 A98 2021<br/>Format: Books<br/>Availability Beytepe Library~1<br/>
Uygulamalarla siber güvenliğe giriş
ent://SD_ILS/0/SD_ILS:510151
2024-11-06T03:05:18Z
2024-11-06T03:05:18Z
Author Akyıldız, M. Alparslan.<br/>Preferred Shelf Number TK5105.59.A39 U94 2020<br/>Format: Books<br/>Availability Beytepe Library~2<br/>
Türkiye’de ve dünyada siber güvenlik
ent://SD_ILS/0/SD_ILS:514958
2024-11-06T03:05:18Z
2024-11-06T03:05:18Z
Author Çeliktaş, Barış .<br/>Preferred Shelf Number UG485 C45 2020<br/>Format: Books<br/>Availability Beytepe Library~1<br/>
Ethical hacking : (hacking kursu)
ent://SD_ILS/0/SD_ILS:423950
2024-11-06T03:05:18Z
2024-11-06T03:05:18Z
Author Usta, Gökhan.<br/>Preferred Shelf Number QA76.9.A25 U88 2019<br/>Format: Books<br/>Availability Beytepe Library~1<br/>
Siber güvenlik ve savunma : standartlar ve uygulamalar
ent://SD_ILS/0/SD_ILS:462283
2024-11-06T03:05:18Z
2024-11-06T03:05:18Z
Author Sağıroğlu, Şeref.<br/>Preferred Shelf Number TK5105.59 S53 2019<br/>Format: Books<br/>Availability Beytepe Library~2<br/>
Yeni başlayanlar için bilgi güvenliği ve uygulamalı hacking yöntemleri
ent://SD_ILS/0/SD_ILS:423184
2024-11-06T03:05:18Z
2024-11-06T03:05:18Z
Author Aslanbakan, Enes, yazar<br/>Preferred Shelf Number QA76.9.A25 A75 2019<br/>Format: Books<br/>Availability Beytepe Library~1<br/>
Exploit geliştirme 101
ent://SD_ILS/0/SD_ILS:389077
2024-11-06T03:05:18Z
2024-11-06T03:05:18Z
Author Akyıldız, M. Alparslan.<br/>Preferred Shelf Number QA76.9.A25 A59 2018<br/>Format: Books<br/>Availability Beytepe Library~2<br/>
Ethical hacking : offensive & defensive
ent://SD_ILS/0/SD_ILS:513450
2024-11-06T03:05:18Z
2024-11-06T03:05:18Z
Author Çıtak, Ömer.<br/>Preferred Shelf Number QA76.9.A25 C58 2016<br/>Format: Books<br/>Availability Beytepe Library~1<br/>
Hacking Interface
ent://SD_ILS/0/SD_ILS:513452
2024-11-06T03:05:18Z
2024-11-06T03:05:18Z
Author Elbahadır, Hamza.<br/>Preferred Shelf Number QA76.9.A25 E43 2016<br/>Format: Books<br/>Availability Beytepe Library~1<br/>
Java programlama diliyle kriptoloji uygulamaları
ent://SD_ILS/0/SD_ILS:380319
2024-11-06T03:05:18Z
2024-11-06T03:05:18Z
Author Bodur, Hüseyin<br/>Preferred Shelf Number QA76.9.A25 B63 2016<br/>Format: Books<br/>Availability Beytepe Library~1<br/>
Siber güvenlik ve elektronik bileşenleri
ent://SD_ILS/0/SD_ILS:380281
2024-11-06T03:05:18Z
2024-11-06T03:05:18Z
Author Ünal, Ahmet Naci<br/>Preferred Shelf Number UG485 U53 2015<br/>Format: Books<br/>Availability Beytepe Library~1<br/>
Siber istihbarat
ent://SD_ILS/0/SD_ILS:384051
2024-11-06T03:05:18Z
2024-11-06T03:05:18Z
Author Keleştemur, Atalay<br/>Preferred Shelf Number QA76.9.A25 K45 2015<br/>Format: Books<br/>Availability Beytepe Library~1<br/>
Introduction to modern cryptography
ent://SD_ILS/0/SD_ILS:364315
2024-11-06T03:05:18Z
2024-11-06T03:05:18Z
Author Katz, Jonathan, 1974- Lindell, Yehuda.<br/>Preferred Shelf Number QA76.9.A25 K36 2015<br/>Format: Books<br/>Availability Beytepe Library~2<br/>
Tam kapsamlı sanal test laboratuvarı kurulumu ve uygulamalı sızma testleri
ent://SD_ILS/0/SD_ILS:513467
2024-11-06T03:05:18Z
2024-11-06T03:05:18Z
Author Yalçınkaya, Mehmet Ali, yazar. Küçüksille, Ecir Uğur, yazar.<br/>Preferred Shelf Number TK5105.59 Y35 2015<br/>Format: Regular print<br/>Availability Beytepe Library~1<br/>
Ağ ve yazılım güvenliği
ent://SD_ILS/0/SD_ILS:379758
2024-11-06T03:05:18Z
2024-11-06T03:05:18Z
Author Çontar, Furkan.<br/>Preferred Shelf Number TK5105.59 C66 2015<br/>Format: Books<br/>Availability Beytepe Library~1<br/>
Hacking Interface
ent://SD_ILS/0/SD_ILS:317847
2024-11-06T03:05:18Z
2024-11-06T03:05:18Z
Author Elbahadır, Hamza.<br/>Preferred Shelf Number QA 76.9 A25 E43 2014<br/>Format: Books<br/>Availability Beytepe Library~2<br/>
Network security essentials : applications and standards
ent://SD_ILS/0/SD_ILS:354232
2024-11-06T03:05:18Z
2024-11-06T03:05:18Z
Author Stallings, William.<br/>Preferred Shelf Number TK5105.59 S725 2014<br/>Format: Books<br/>Availability Beytepe Library~1<br/>
Cryptography and network security : principles and practice
ent://SD_ILS/0/SD_ILS:371288
2024-11-06T03:05:18Z
2024-11-06T03:05:18Z
Author Stallings, William.<br/>Preferred Shelf Number TK5105.59 S713 2014<br/>Format: Books<br/>Availability Beytepe Library~1<br/>
Data analysis for network cyber-security
ent://SD_ILS/0/SD_ILS:354757
2024-11-06T03:05:18Z
2024-11-06T03:05:18Z
Author Adams, Niall M., 1968- Heard, Nicholas.<br/>Preferred Shelf Number TK5105.59 D375 2014<br/>Format: Books<br/>Availability Beytepe Library~1<br/>
Elementary information security
ent://SD_ILS/0/SD_ILS:271272
2024-11-06T03:05:18Z
2024-11-06T03:05:18Z
Author Smith, Richard E.<br/>Preferred Shelf Number QA76.9.A25 S652 2013<br/>Format: Books<br/>Availability Beytepe Library~1<br/>
Secret history : the story of cryptology
ent://SD_ILS/0/SD_ILS:365258
2024-11-06T03:05:18Z
2024-11-06T03:05:18Z
Author Bauer, Craig P.<br/>Preferred Shelf Number QA76.9.A25 B384 2013<br/>Format: Books<br/>Availability Beytepe Library~1<br/>
Information security for managers
ent://SD_ILS/0/SD_ILS:516570
2024-11-06T03:05:18Z
2024-11-06T03:05:18Z
Author Workman, Michael D., 1957-. Phelps, Daniel C. Gathegi, John N.<br/>Preferred Shelf Number HF5548.37 W67 2013<br/>Format: Books<br/>Availability Beytepe Library~1<br/>
Hacking exposed 7 : network security secrets & solutions
ent://SD_ILS/0/SD_ILS:270033
2024-11-06T03:05:18Z
2024-11-06T03:05:18Z
Author McClure, Stuart. Scambray, Joel. Kurtz, George.<br/>Preferred Shelf Number TK5105.59 M48 2012<br/>Format: Books<br/>Availability Beytepe Library~1<br/>
Security in computing
ent://SD_ILS/0/SD_ILS:313297
2024-11-06T03:05:18Z
2024-11-06T03:05:18Z
Author Pfleeger, Charles P., 1948-<br/>Preferred Shelf Number QA76.9 A25 P45 2011<br/>Format: Books<br/>Availability Beytepe Library~1<br/>
Auditing IT infrastructures for compliance
ent://SD_ILS/0/SD_ILS:271151
2024-11-06T03:05:18Z
2024-11-06T03:05:18Z
Author Weiss, Martin M. Solomon, Michael G.<br/>Preferred Shelf Number QA76.9.A25 W428 2011<br/>Format: Books<br/>Availability Beytepe Library~1<br/>
Readings and cases in information security : law and ethics
ent://SD_ILS/0/SD_ILS:267743
2024-11-06T03:05:18Z
2024-11-06T03:05:18Z
Author Whitman, Michael E. Mattord, Herbert J.<br/>Preferred Shelf Number TK5105.878 W54 2011<br/>Format: Books<br/>Availability Beytepe Library~1<br/>
Managing risk in information systems
ent://SD_ILS/0/SD_ILS:271251
2024-11-06T03:05:18Z
2024-11-06T03:05:18Z
Author Gibson, Darril.<br/>Preferred Shelf Number QA76.9.A25 G5 2011<br/>Format: Books<br/>Availability Beytepe Library~1<br/>
Hacker techniques, tools, and incident handling
ent://SD_ILS/0/SD_ILS:271438
2024-11-06T03:05:18Z
2024-11-06T03:05:18Z
Author Oriyano, Sean-Philip. Gregg, Michael (Michael C.)<br/>Preferred Shelf Number TK5105.59 O786 2011<br/>Format: Books<br/>Availability Beytepe Library~1<br/>
Network security essentials : applications and standards
ent://SD_ILS/0/SD_ILS:271446
2024-11-06T03:05:18Z
2024-11-06T03:05:18Z
Author Stallings, William.<br/>Preferred Shelf Number TK5105.59 S782 2011<br/>Format: Books<br/>Availability Beytepe Library~1<br/>
Network security firewalls and VPNs
ent://SD_ILS/0/SD_ILS:271452
2024-11-06T03:05:18Z
2024-11-06T03:05:18Z
Author Stewart, James Michael.<br/>Preferred Shelf Number TK5105.59 S758 2011<br/>Format: Books<br/>Availability Beytepe Library~1<br/>
Security policies and implementation issues
ent://SD_ILS/0/SD_ILS:271534
2024-11-06T03:05:18Z
2024-11-06T03:05:18Z
Author Johnson, Rob (Robert) Merkow, Mark S.<br/>Preferred Shelf Number QA76.9.A25 J64 2011<br/>Format: Books<br/>Availability Beytepe Library~1<br/>
Security strategies in Windows platforms and applications
ent://SD_ILS/0/SD_ILS:271537
2024-11-06T03:05:18Z
2024-11-06T03:05:18Z
Author Solomon, Michael.<br/>Preferred Shelf Number QA76.76.O63 S64 2011<br/>Format: Books<br/>Availability Beytepe Library~1<br/>
Security strategies in Linux platforms and applications
ent://SD_ILS/0/SD_ILS:271539
2024-11-06T03:05:18Z
2024-11-06T03:05:18Z
Author Jang, Michael H.<br/>Preferred Shelf Number QA76.76.O63 J3638 2011<br/>Format: Books<br/>Availability Beytepe Library~1<br/>
Cryptography and network security
ent://SD_ILS/0/SD_ILS:386241
2024-11-06T03:05:18Z
2024-11-06T03:05:18Z
Author Kahate, Atul.<br/>Preferred Shelf Number TK5105.59 K12 2011<br/>Format: Books<br/>Availability Beytepe Library~1<br/>
Social engineering : the art of human hacking
ent://SD_ILS/0/SD_ILS:377976
2024-11-06T03:05:18Z
2024-11-06T03:05:18Z
Author Hadnagy, Christopher.<br/>Preferred Shelf Number QA76.9.C66 H33 2011<br/>Format: Books<br/>Availability Beytepe Library~1<br/>
Dijital kale
ent://SD_ILS/0/SD_ILS:126135
2024-11-06T03:05:18Z
2024-11-06T03:05:18Z
Author Brown, Dan, 1964- Soner, Sezer.<br/>Preferred Shelf Number PS 3552.R685434 D542 2010<br/>Format: Books<br/>Availability Beytepe Library~1<br/>
Applied algebra : codes, ciphers, and discrete algorithms
ent://SD_ILS/0/SD_ILS:312768
2024-11-06T03:05:18Z
2024-11-06T03:05:18Z
Author Hardy, Darel W. Walker, Carol L., 1935- Richman, Fred, 1938-<br/>Preferred Shelf Number QA268 H37 2009<br/>Format: Books<br/>Availability Beytepe Library~1<br/>
Computer forensics and cyber crime : an introduction
ent://SD_ILS/0/SD_ILS:134036
2024-11-06T03:05:18Z
2024-11-06T03:05:18Z
Author Britz, Marjie.<br/>Preferred Shelf Number QA76.9.A25 B77 2009<br/>Format: Books<br/>Availability Beytepe Library~1<br/>
Digital fortress
ent://SD_ILS/0/SD_ILS:354167
2024-11-06T03:05:18Z
2024-11-06T03:05:18Z
Author Brown, Dan, 1964- .<br/>Preferred Shelf Number PS3552.R685434 D53 2009<br/>Format: Books<br/>Availability Beytepe Library~1<br/>
ISA server 2006
ent://SD_ILS/0/SD_ILS:115080
2024-11-06T03:05:18Z
2024-11-06T03:05:18Z
Author İnan, Yüksel. Demirli, Nihat.<br/>Preferred Shelf Number TK5105.59 .I536 2008<br/>Format: Books<br/>Availability Beytepe Library~2<br/>
Security in computing
ent://SD_ILS/0/SD_ILS:110682
2024-11-06T03:05:18Z
2024-11-06T03:05:18Z
Author Pfleeger, Charles P., 1948-<br/>Preferred Shelf Number QA76.9.A25 P45 2007<br/>Format: Books<br/>Availability Beytepe Library~1<br/>
Grid computing security
ent://SD_ILS/0/SD_ILS:248747
2024-11-06T03:05:18Z
2024-11-06T03:05:18Z
Author Chakrabarti, Anirban.<br/>Preferred Shelf Number QA76.9.C58 C53 2007<br/>Format: Books<br/>Availability Beytepe Library~1<br/>
Information security : contemporary cases
ent://SD_ILS/0/SD_ILS:111021
2024-11-06T03:05:18Z
2024-11-06T03:05:18Z
Author Wright, Marie A. Kakalik, John S.<br/>Preferred Shelf Number QA76.9.A25 W75 2007<br/>Format: Books<br/>Availability Beytepe Library~1<br/>
Data warehousing and data mining techniques for cyber security
ent://SD_ILS/0/SD_ILS:110434
2024-11-06T03:05:18Z
2024-11-06T03:05:18Z
Author Singhal, Anoop, 1958-<br/>Preferred Shelf Number QA76.9.A25 S563 2007<br/>Format: Books<br/>Availability Beytepe Library~1<br/>
Information security : principles and practice
ent://SD_ILS/0/SD_ILS:109477
2024-11-06T03:05:18Z
2024-11-06T03:05:18Z
Author Stamp, Mark.<br/>Preferred Shelf Number QA76.9.A25 S69 2006<br/>Format: Books<br/>Availability Beytepe Library~1<br/>
Linux Patch Management : keeping Linux systems up to date
ent://SD_ILS/0/SD_ILS:119550
2024-11-06T03:05:18Z
2024-11-06T03:05:18Z
Author Jang, Michael H.<br/>Preferred Shelf Number QA76.76.O63 J368 2006<br/>Format: Books<br/>Availability Beytepe Library~1<br/>
Intelligence and security informatics for international security : information sharing and data mining
ent://SD_ILS/0/SD_ILS:119786
2024-11-06T03:05:18Z
2024-11-06T03:05:18Z
Author Chen, Hsinchun.<br/>Preferred Shelf Number QA76.76.E95 C44 2006<br/>Format: Books<br/>Availability Beytepe Library~1<br/>
Information security architecture : an integrated approach to security in the organization
ent://SD_ILS/0/SD_ILS:110865
2024-11-06T03:05:18Z
2024-11-06T03:05:18Z
Author Tudor, Jan Killmeyer.<br/>Preferred Shelf Number QA76.9.A25 T83 2006<br/>Format: Books<br/>Availability Beytepe Library~1<br/>
Handbook of information security
ent://SD_ILS/0/SD_ILS:108909
2024-11-06T03:05:18Z
2024-11-06T03:05:18Z
Author Bidgoli, Hossein, ed.<br/>Preferred Shelf Number TK5105.59 H35 2006 V.1<br/>Format: Books<br/>Availability Beytepe Library~3<br/>
Bilgi ve bilgisayar güvenliği : casus yazılımlar ve korunma yöntemleri
ent://SD_ILS/0/SD_ILS:515469
2024-11-06T03:05:18Z
2024-11-06T03:05:18Z
Author Canbek, Gürol. Sağıroğlu, Şeref.<br/>Preferred Shelf Number QA76.9.A25 C36 2006<br/>Format: Books<br/>Availability Beytepe Library~1<br/>
Acing the security+ certification exam
ent://SD_ILS/0/SD_ILS:313492
2024-11-06T03:05:18Z
2024-11-06T03:05:18Z
Author Regan, Patrick E.<br/>Preferred Shelf Number QA76.3 R455 2005<br/>Format: Books<br/>Availability Beytepe Library~1<br/>
TCP / IP ve ağ güvenliği : teori ve uygulamalar ile
ent://SD_ILS/0/SD_ILS:112813
2024-11-06T03:05:18Z
2024-11-06T03:05:18Z
Author Dirican, Can Okan.<br/>Preferred Shelf Number TK 5105.55 D5753 2005<br/>Format: Books<br/>Availability Beytepe Library~2<br/>
Secure architectures with OpenBSD
ent://SD_ILS/0/SD_ILS:109506
2024-11-06T03:05:18Z
2024-11-06T03:05:18Z
Author Palmer, Brandon. Nazario, Jose, ort. yaz.<br/>Preferred Shelf Number QA76.76.O63 P335 2004<br/>Format: Books<br/>Availability Beytepe Library~1<br/>
Malware : fighting malicious code
ent://SD_ILS/0/SD_ILS:267737
2024-11-06T03:05:18Z
2024-11-06T03:05:18Z
Author Skoudis, Ed. Zeltser, Lenny.<br/>Preferred Shelf Number QA76.9.A25 S58 2004<br/>Format: Books<br/>Availability Beytepe Library~1<br/>
How to break software security : effective technigues for security testing
ent://SD_ILS/0/SD_ILS:105584
2024-11-06T03:05:18Z
2024-11-06T03:05:18Z
Author Whittaker, James A., 1965- Thomson, Herbert H., ort. yaz.<br/>Preferred Shelf Number QA 76.9.A25 W48 2004<br/>Format: Books<br/>Availability Beytepe Library~2<br/>
Hacking : Bilişim korsanlığı ve korunma yöntemleri
ent://SD_ILS/0/SD_ILS:88578
2024-11-06T03:05:18Z
2024-11-06T03:05:18Z
Author Yılmaz, Davut.<br/>Preferred Shelf Number TK 5105.59 Y56 2004<br/>Format: Books<br/>Availability Beytepe Library~1<br/>
Exploiting software : how to break code
ent://SD_ILS/0/SD_ILS:96556
2024-11-06T03:05:18Z
2024-11-06T03:05:18Z
Author Hoglund, Greg. McGraw, Gary, 1966- ort. yaz.<br/>Preferred Shelf Number QA 76.9.A25 H635 2004<br/>Format: Books<br/>Availability Beytepe Library~1<br/>
Dijital kale
ent://SD_ILS/0/SD_ILS:96322
2024-11-06T03:05:18Z
2024-11-06T03:05:18Z
Author Brown, Dan, 1964- Soner, Sezer, çev. Huvaj, Muharrem Nesij, haz.<br/>Preferred Shelf Number PS3552.R685434 D542 2004<br/>Format: Books<br/>Availability Beytepe Library~7<br/>
İnternette güvenlik ve Hacker Cracker meselesi : el kitabı
ent://SD_ILS/0/SD_ILS:104130
2024-11-06T03:05:18Z
2024-11-06T03:05:18Z
Author Güven, Mehmet.<br/>Preferred Shelf Number QA 76.9.A25 G88 2004<br/>Format: Books<br/>Availability Beytepe Library~2<br/>
Building firewalls with OpenBSD and PF
ent://SD_ILS/0/SD_ILS:113220
2024-11-06T03:05:18Z
2024-11-06T03:05:18Z
Author Artymiak, Jacek.<br/>Preferred Shelf Number TK5105.59 .A77 2003<br/>Format: Books<br/>Availability Beytepe Library~1<br/>
Introduction to communication electronic warfare systems
ent://SD_ILS/0/SD_ILS:76559
2024-11-06T03:05:18Z
2024-11-06T03:05:18Z
Author Poisel, Richard.<br/>Preferred Shelf Number UG 590 P65 2002<br/>Format: Books<br/>Availability Beytepe Library~1<br/>
Nokia network security solutions handbook
ent://SD_ILS/0/SD_ILS:81149
2024-11-06T03:05:18Z
2024-11-06T03:05:18Z
Author Maxwell, Doug. Amon, Cherie, ort. yaz.<br/>Preferred Shelf Number TK 5105.59 M451 2002<br/>Format: Books<br/>Availability Beytepe Library~1<br/>
Technology and privacy : the new landscape
ent://SD_ILS/0/SD_ILS:112999
2024-11-06T03:05:18Z
2024-11-06T03:05:18Z
Author Agre, Philip. Rotenberg, Marc.<br/>Preferred Shelf Number QA76.9.A25 T43 2001<br/>Format: Books<br/>Availability Beytepe Library~1<br/>
Proceedings of Sixth ACM Symposium on Access Control Models and Technologies : SACMAT 2001 : Litton-TASC, Westfields II Conference Facility, May 3-4, 2001, Chantilly, Virginia, USA
ent://SD_ILS/0/SD_ILS:72452
2024-11-06T03:05:18Z
2024-11-06T03:05:18Z
Author ACM Symposium on Access Control Models and Technologies (6th : 2001 : Chantilly, V.A.) Association for Computing Machinery. Special Interest Group on Security, Audit, and Control.<br/>Preferred Shelf Number QA 76.9.A25 A292 2001<br/>Format: Books<br/>Availability Beytepe Library~1<br/>
New Security Paradigms Workshop : proceedings, September 10 -13, 2001, Cloudcroft, NM, USA
ent://SD_ILS/0/SD_ILS:118009
2024-11-06T03:05:18Z
2024-11-06T03:05:18Z
Author ACM SIGSAC New Security Paradigms Workshop (2001 : Cloudcroft, NM, USA) Raskin, V. Hempelmann, C.F. Association for Computing Machinery. Special Interest Group on Security, Audit, and Control.<br/>Preferred Shelf Number QA76.9.A25 A34 2001<br/>Format: Books<br/>Availability Beytepe Library~1<br/>
Data privacy in the information age
ent://SD_ILS/0/SD_ILS:135125
2024-11-06T03:05:18Z
2024-11-06T03:05:18Z
Author Klosek, Jacqueline.<br/>Preferred Shelf Number QA76.9.A25 K57 2000<br/>Format: Books<br/>Availability Beytepe Library~1<br/>
Applied cryptography : protocols, algorithms, and source code in C
ent://SD_ILS/0/SD_ILS:108014
2024-11-06T03:05:18Z
2024-11-06T03:05:18Z
Author Schneier, Bruce.<br/>Preferred Shelf Number QA76.9.A25 S35 1996<br/>Format: Books<br/>Availability Beytepe Library~1<br/>
Auditing IT infrastructures for compliance
ent://SD_ILS/0/SD_ILS:270164
2024-11-06T03:05:18Z
2024-11-06T03:05:18Z
Author Weiss, Martin M. Solomon, Michael G.<br/>Preferred Shelf Number QA76.9.A25 W428<br/>Format: Books<br/>Availability Beytepe Library~1<br/>