Search Results for Computer Security - Narrowed by: 2016 SirsiDynix Enterprise https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dComputer$002bSecurity$0026qf$003dPUBDATE$002509Publication$002bDate$0025092016$0025092016$0026ps$003d300$0026isd$003dtrue? 2024-11-19T02:39:32Z Sequrity for computer networks : an introduction to data security in teleprocessing and electronic funds transfer ent://SD_ILS/0/SD_ILS:62188 2024-11-19T02:39:32Z 2024-11-19T02:39:32Z Author&#160;Davies, Donald Watts, 1924-&#160;Price, W. L., ort.yaz.<br/>Preferred Shelf Number&#160;TK 5105 D43 1989<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Information security management handbook ent://SD_ILS/0/SD_ILS:289151 2024-11-19T02:39:32Z 2024-11-19T02:39:32Z Author&#160;Tipton, Harold F.&#160;Krause, Micki.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9780203325438">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information security management handbook ent://SD_ILS/0/SD_ILS:290320 2024-11-19T02:39:32Z 2024-11-19T02:39:32Z Author&#160;Tipton, Harold F.&#160;Krause, Micki.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781420003406">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information security management handbook ent://SD_ILS/0/SD_ILS:287123 2024-11-19T02:39:32Z 2024-11-19T02:39:32Z Author&#160;Tipton, Harold F.&#160;Nozaki, Micki Krause.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781439893159">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Java programlama diliyle kriptoloji uygulamalar&#305; ent://SD_ILS/0/SD_ILS:380319 2024-11-19T02:39:32Z 2024-11-19T02:39:32Z Author&#160;Bodur, H&uuml;seyin<br/>Preferred Shelf Number&#160;QA76.9.A25 B63 2016<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Mobile data loss : threats and countermeasures ent://SD_ILS/0/SD_ILS:458729 2024-11-19T02:39:32Z 2024-11-19T02:39:32Z Author&#160;Raggo, Michael T.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="https://www.sciencedirect.com/science/book/9780128028643">https://www.sciencedirect.com/science/book/9780128028643</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cyber guerilla ent://SD_ILS/0/SD_ILS:458953 2024-11-19T02:39:32Z 2024-11-19T02:39:32Z Author&#160;Haaster, Jelle van, author.&#160;Gevers, Rickey, author.&#160;Sprengers, Martijn, author.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128051979">http://www.sciencedirect.com/science/book/9780128051979</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cybersecurity and applied mathematics ent://SD_ILS/0/SD_ILS:458966 2024-11-19T02:39:32Z 2024-11-19T02:39:32Z Author&#160;Metcalf, Leigh, author.&#160;Casey, William, author.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128044520">http://www.sciencedirect.com/science/book/9780128044520</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information security science : measuring the vulnerability to data compromises ent://SD_ILS/0/SD_ILS:458968 2024-11-19T02:39:32Z 2024-11-19T02:39:32Z Author&#160;Young, Carl S., author.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128096437">http://www.sciencedirect.com/science/book/9780128096437</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Protecting patient information : a decision-maker's guide to risk, prevention, and damage control ent://SD_ILS/0/SD_ILS:458833 2024-11-19T02:39:32Z 2024-11-19T02:39:32Z Author&#160;Cerrato, Paul, author.&#160;Andress, Jason, editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="https://www.sciencedirect.com/science/book/9780128043929">https://www.sciencedirect.com/science/book/9780128043929</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> OS X incident response : scripting and analysis ent://SD_ILS/0/SD_ILS:458869 2024-11-19T02:39:32Z 2024-11-19T02:39:32Z Author&#160;Bradley, Jaron, author.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128044568">http://www.sciencedirect.com/science/book/9780128044568</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Data breach preparation and response : breaches are certain, impact is not ent://SD_ILS/0/SD_ILS:458926 2024-11-19T02:39:32Z 2024-11-19T02:39:32Z Author&#160;Fowler, Kevvie, author.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="https://www.sciencedirect.com/science/book/9780128034514">https://www.sciencedirect.com/science/book/9780128034514</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> DNS security : defending the domain name system ent://SD_ILS/0/SD_ILS:458935 2024-11-19T02:39:32Z 2024-11-19T02:39:32Z Author&#160;Liska, Allan, author.&#160;Stowe, Geoffrey, author.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128033067">http://www.sciencedirect.com/science/book/9780128033067</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Windows registry forensics : advanced digital forensic analysis of the Windows registry ent://SD_ILS/0/SD_ILS:458777 2024-11-19T02:39:32Z 2024-11-19T02:39:32Z Author&#160;Carvey, Harlan A., author.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128032916">http://www.sciencedirect.com/science/book/9780128032916</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Network performance and security : testing and analyzing using open source and low-cost tools ent://SD_ILS/0/SD_ILS:458789 2024-11-19T02:39:32Z 2024-11-19T02:39:32Z Author&#160;Chapman, Chris, author.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128035849">http://www.sciencedirect.com/science/book/9780128035849</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Coding for penetration testers : building better tools ent://SD_ILS/0/SD_ILS:459217 2024-11-19T02:39:32Z 2024-11-19T02:39:32Z Author&#160;Andress, Jason, author.&#160;Linn, Ryan, author.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128054727">http://www.sciencedirect.com/science/book/9780128054727</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Threat forecasting : leveraging big data for predictive analysis ent://SD_ILS/0/SD_ILS:458886 2024-11-19T02:39:32Z 2024-11-19T02:39:32Z Author&#160;Pirc, John, author.&#160;DeSanto, David, author.&#160;Davison, Iain, author.&#160;Gragido, Will, author.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="https://www.sciencedirect.com/science/book/9780128000069">https://www.sciencedirect.com/science/book/9780128000069</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Eleventh Hour CISSP&reg; ent://SD_ILS/0/SD_ILS:459073 2024-11-19T02:39:32Z 2024-11-19T02:39:32Z Author&#160;Conrad, Eric, author.&#160;Seth Misenar, author.&#160;Joshua Feldman, author.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128112489">http://www.sciencedirect.com/science/book/9780128112489</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Ethical hacking : offensive &amp; defensive ent://SD_ILS/0/SD_ILS:513450 2024-11-19T02:39:32Z 2024-11-19T02:39:32Z Author&#160;&Ccedil;&#305;tak, &Ouml;mer.<br/>Preferred Shelf Number&#160;QA76.9.A25 C58 2016<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Hacking Interface ent://SD_ILS/0/SD_ILS:513452 2024-11-19T02:39:32Z 2024-11-19T02:39:32Z Author&#160;Elbahad&#305;r, Hamza.<br/>Preferred Shelf Number&#160;QA76.9.A25 E43 2016<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Cyber security awareness for CEOs and management ent://SD_ILS/0/SD_ILS:458665 2024-11-19T02:39:32Z 2024-11-19T02:39:32Z Author&#160;Willson, David (Lawyer), author.&#160;Dalziel, Henry, editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128047545">http://www.sciencedirect.com/science/book/9780128047545</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/>