Search Results for Computer Security - Narrowed by: 2001SirsiDynix Enterprisehttps://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dComputer$002bSecurity$0026qf$003dPUBDATE$002509Publication$002bDate$0025092001$0025092001$0026ic$003dtrue$0026ps$003d300$0026isd$003dtrue?2024-11-06T12:39:16ZSequrity for computer networks : an introduction to data security in teleprocessing and electronic funds transferent://SD_ILS/0/SD_ILS:621882024-11-06T12:39:16Z2024-11-06T12:39:16ZAuthor Davies, Donald Watts, 1924- Price, W. L., ort.yaz.<br/>Preferred Shelf Number TK 5105 D43 1989<br/>Format: Books<br/>Availability Beytepe Library~1<br/>Digital watermarkingent://SD_ILS/0/SD_ILS:2538892024-11-06T12:39:16Z2024-11-06T12:39:16ZAuthor Cox, I. J. (Ingemar J.) Miller, Matthew L. Bloom, Jeffrey A. (Jeffrey Adam), 1964-<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781558607149">http://www.sciencedirect.com/science/book/9781558607149</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Hack proofing your e-commerce site the only way to stop a hacker is to think like oneent://SD_ILS/0/SD_ILS:2539682024-11-06T12:39:16Z2024-11-06T12:39:16ZAuthor Russell, Ryan. Syngress Media, Inc.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781928994275">http://www.sciencedirect.com/science/book/9781928994275</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Hack proofing your Web applicationsent://SD_ILS/0/SD_ILS:2539692024-11-06T12:39:16Z2024-11-06T12:39:16ZAuthor Traxler, Julie.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781928994312">http://www.sciencedirect.com/science/book/9781928994312</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Hack proofing Windows 2000 Serverent://SD_ILS/0/SD_ILS:2539992024-11-06T12:39:16Z2024-11-06T12:39:16ZAuthor Todd, Chad. Johnson, Norris L.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836494">http://www.sciencedirect.com/science/book/9781931836494</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>A technical guide to IPSec virtual private networksent://SD_ILS/0/SD_ILS:2874752024-11-06T12:39:16Z2024-11-06T12:39:16ZAuthor Tiller, James S.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9780203997499">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Hack proofing Linux a guide to open source securityent://SD_ILS/0/SD_ILS:2540462024-11-06T12:39:16Z2024-11-06T12:39:16ZAuthor Stanger, James.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781928994343">http://www.sciencedirect.com/science/book/9781928994343</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Hack proofing Sun Solaris 8ent://SD_ILS/0/SD_ILS:2540472024-11-06T12:39:16Z2024-11-06T12:39:16ZAuthor Miles, Wyman. Mitchell, Ed, 1945- Lynch, F. William. Cook, Randy (Randy R.)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781928994442">http://www.sciencedirect.com/science/book/9781928994442</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Technology and privacy : the new landscapeent://SD_ILS/0/SD_ILS:1129992024-11-06T12:39:16Z2024-11-06T12:39:16ZAuthor Agre, Philip. Rotenberg, Marc.<br/>Preferred Shelf Number QA76.9.A25 T43 2001<br/>Format: Books<br/>Availability Beytepe Library~1<br/>Proceedings of Sixth ACM Symposium on Access Control Models and Technologies : SACMAT 2001 : Litton-TASC, Westfields II Conference Facility, May 3-4, 2001, Chantilly, Virginia, USAent://SD_ILS/0/SD_ILS:724522024-11-06T12:39:16Z2024-11-06T12:39:16ZAuthor ACM Symposium on Access Control Models and Technologies (6th : 2001 : Chantilly, V.A.) Association for Computing Machinery. Special Interest Group on Security, Audit, and Control.<br/>Preferred Shelf Number QA 76.9.A25 A292 2001<br/>Format: Books<br/>Availability Beytepe Library~1<br/>GSM güvenlik mekanizmasının incelenmesi ve geliştirilmesient://SD_ILS/0/SD_ILS:742362024-11-06T12:39:16Z2024-11-06T12:39:16ZAuthor Kasım, Başar.<br/>Preferred Shelf Number TEZ/5165 K151 2001<br/>Format: Books<br/>Availability Beytepe Library~1<br/>New Security Paradigms Workshop : proceedings, September 10 -13, 2001, Cloudcroft, NM, USAent://SD_ILS/0/SD_ILS:1180092024-11-06T12:39:16Z2024-11-06T12:39:16ZAuthor ACM SIGSAC New Security Paradigms Workshop (2001 : Cloudcroft, NM, USA) Raskin, V. Hempelmann, C.F. Association for Computing Machinery. Special Interest Group on Security, Audit, and Control.<br/>Preferred Shelf Number QA76.9.A25 A34 2001<br/>Format: Books<br/>Availability Beytepe Library~1<br/>Securing e-business applications and communicationsent://SD_ILS/0/SD_ILS:2904362024-11-06T12:39:16Z2024-11-06T12:39:16ZAuthor Held, Jonathan S. Bowers, John R.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781420031553">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>