Search Results for Computer Security. - Narrowed by: Bilgisayar güvenliği.SirsiDynix Enterprisehttps://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dComputer$002bSecurity.$0026qf$003dSUBJECT$002509Subject$002509Bilgisayar$002bg$0025C3$0025BCvenli$0025C4$00259Fi.$002509Bilgisayar$002bg$0025C3$0025BCvenli$0025C4$00259Fi.$0026ic$003dtrue$0026ps$003d300?2024-11-04T14:56:08ZComputer security fundamentalsent://SD_ILS/0/SD_ILS:1086202024-11-04T14:56:08Z2024-11-04T14:56:08ZAuthor Easttom, Chuck.<br/>Preferred Shelf Number QA76.9.A25 E325 2006<br/>Format: Books<br/>Availability Beytepe Library~1<br/>Enhanced methods in computer security, biometric and artificial intelligence systemsent://SD_ILS/0/SD_ILS:1098642024-11-04T14:56:08Z2024-11-04T14:56:08ZAuthor Pejas, Jerzy, 1954-, ed. Piegat, Andrzej, 1947-, ed.<br/>Preferred Shelf Number QA76.9.A25 E545 2005<br/>Format: Books<br/>Availability Beytepe Library~1<br/>Uygulamalarla siber güvenliğe girişent://SD_ILS/0/SD_ILS:5101512024-11-04T14:56:08Z2024-11-04T14:56:08ZAuthor Akyıldız, M. Alparslan.<br/>Preferred Shelf Number TK5105.59.A39 U94 2020<br/>Format: Books<br/>Availability Beytepe Library~2<br/>Yeni başlayanlar için bilgi güvenliği ve uygulamalı hacking yöntemlerient://SD_ILS/0/SD_ILS:4231842024-11-04T14:56:08Z2024-11-04T14:56:08ZAuthor Aslanbakan, Enes, yazar<br/>Preferred Shelf Number QA76.9.A25 A75 2019<br/>Format: Books<br/>Availability Beytepe Library~1<br/>Ethical hacking : (hacking kursu)ent://SD_ILS/0/SD_ILS:4239502024-11-04T14:56:08Z2024-11-04T14:56:08ZAuthor Usta, Gökhan.<br/>Preferred Shelf Number QA76.9.A25 U88 2019<br/>Format: Books<br/>Availability Beytepe Library~1<br/>Exploit geliştirme 101ent://SD_ILS/0/SD_ILS:3890772024-11-04T14:56:08Z2024-11-04T14:56:08ZAuthor Akyıldız, M. Alparslan.<br/>Preferred Shelf Number QA76.9.A25 A59 2018<br/>Format: Books<br/>Availability Beytepe Library~2<br/>Social engineering : the art of human hackingent://SD_ILS/0/SD_ILS:3779762024-11-04T14:56:08Z2024-11-04T14:56:08ZAuthor Hadnagy, Christopher.<br/>Preferred Shelf Number QA76.9.C66 H33 2011<br/>Format: Books<br/>Availability Beytepe Library~1<br/>Computer forensics and cyber crime : an introductionent://SD_ILS/0/SD_ILS:1340362024-11-04T14:56:08Z2024-11-04T14:56:08ZAuthor Britz, Marjie.<br/>Preferred Shelf Number QA76.9.A25 B77 2009<br/>Format: Books<br/>Availability Beytepe Library~1<br/>Data warehousing and data mining techniques for cyber securityent://SD_ILS/0/SD_ILS:1104342024-11-04T14:56:08Z2024-11-04T14:56:08ZAuthor Singhal, Anoop, 1958-<br/>Preferred Shelf Number QA76.9.A25 S563 2007<br/>Format: Books<br/>Availability Beytepe Library~1<br/>FISMA certification & accreditation handbookent://SD_ILS/0/SD_ILS:1121692024-11-04T14:56:08Z2024-11-04T14:56:08ZAuthor Taylor, Laura. Shepherd, Matthew. ScienceDirect (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491167">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>How to cheat at securing sql server 2005ent://SD_ILS/0/SD_ILS:1121742024-11-04T14:56:08Z2024-11-04T14:56:08ZAuthor ScienceDirect (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491969">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Metasploit Toolkit for Penetration Testing, Exploit Development, And Vulnerabiity Researchent://SD_ILS/0/SD_ILS:1121792024-11-04T14:56:08Z2024-11-04T14:56:08ZAuthor ScienceDirect (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490740">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Microsoft Vista for IT security professionalsent://SD_ILS/0/SD_ILS:1121822024-11-04T14:56:08Z2024-11-04T14:56:08ZAuthor Piltzecker, Tony, 1975- Chaffin, Larry. ScienceDirect (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491396">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Microsoft windows security fundamentalsent://SD_ILS/0/SD_ILS:1121832024-11-04T14:56:08Z2024-11-04T14:56:08ZAuthor Clercq, Jan de, 1968- Grillenmeier, Guido. ScienceDirect (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781555583408">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Security convergence managing enterprise security riskent://SD_ILS/0/SD_ILS:1121982024-11-04T14:56:08Z2024-11-04T14:56:08ZAuthor Tyson, Dave. ScienceDirect (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780750684255">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Techno Security's guide to managing risks for IT managers, auditors, and investigatorsent://SD_ILS/0/SD_ILS:1122032024-11-04T14:56:08Z2024-11-04T14:56:08ZAuthor Wiles, Jack. ScienceDirect (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491389">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>The official CHFI study guide (Exam 312-49) for computer hacking forensic investigator.ent://SD_ILS/0/SD_ILS:1122062024-11-04T14:56:08Z2024-11-04T14:56:08ZAuthor Kleiman, Dave. ScienceDirect (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491976">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>WarDriving & wireless penetration testingent://SD_ILS/0/SD_ILS:1122102024-11-04T14:56:08Z2024-11-04T14:56:08ZAuthor Hurley, Chris. ScienceDirect (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491112">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Windows forensic analysis DVD toolkitent://SD_ILS/0/SD_ILS:1122112024-11-04T14:56:08Z2024-11-04T14:56:08ZAuthor Carvey, Harlan A. ScienceDirect (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491563">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Zen and the art of information securityent://SD_ILS/0/SD_ILS:1122142024-11-04T14:56:08Z2024-11-04T14:56:08ZAuthor Winkler, Ira. ScienceDirect (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491686">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>How to cheat at Windows System Administration using command line scriptsent://SD_ILS/0/SD_ILS:1121072024-11-04T14:56:08Z2024-11-04T14:56:08ZAuthor Bhardwaj, Pawan K. Andreou, Kimon. Barber, Brian. Kleiman, Dave. Satyanarayana, Mahesh.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491051">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Linux Patch Management : keeping Linux systems up to dateent://SD_ILS/0/SD_ILS:1195502024-11-04T14:56:08Z2024-11-04T14:56:08ZAuthor Jang, Michael H.<br/>Preferred Shelf Number QA76.76.O63 J368 2006<br/>Format: Books<br/>Availability Beytepe Library~1<br/>Intelligence and security informatics for international security : information sharing and data miningent://SD_ILS/0/SD_ILS:1197862024-11-04T14:56:08Z2024-11-04T14:56:08ZAuthor Chen, Hsinchun.<br/>Preferred Shelf Number QA76.76.E95 C44 2006<br/>Format: Books<br/>Availability Beytepe Library~1<br/>Bilgi ve bilgisayar güvenliği : casus yazılımlar ve korunma yöntemlerient://SD_ILS/0/SD_ILS:5154692024-11-04T14:56:08Z2024-11-04T14:56:08ZAuthor Canbek, Gürol. Sağıroğlu, Şeref.<br/>Preferred Shelf Number QA76.9.A25 C36 2006<br/>Format: Books<br/>Availability Beytepe Library~1<br/>How to break software security : effective technigues for security testingent://SD_ILS/0/SD_ILS:1055842024-11-04T14:56:08Z2024-11-04T14:56:08ZAuthor Whittaker, James A., 1965- Thomson, Herbert H., ort. yaz.<br/>Preferred Shelf Number QA 76.9.A25 W48 2004<br/>Format: Books<br/>Availability Beytepe Library~2<br/>İnternette güvenlik ve Hacker Cracker meselesi : el kitabıent://SD_ILS/0/SD_ILS:1041302024-11-04T14:56:08Z2024-11-04T14:56:08ZAuthor Güven, Mehmet.<br/>Preferred Shelf Number QA 76.9.A25 G88 2004<br/>Format: Books<br/>Availability Beytepe Library~2<br/>Technology and privacy : the new landscapeent://SD_ILS/0/SD_ILS:1129992024-11-04T14:56:08Z2024-11-04T14:56:08ZAuthor Agre, Philip. Rotenberg, Marc.<br/>Preferred Shelf Number QA76.9.A25 T43 2001<br/>Format: Books<br/>Availability Beytepe Library~1<br/>Data privacy in the information ageent://SD_ILS/0/SD_ILS:1351252024-11-04T14:56:08Z2024-11-04T14:56:08ZAuthor Klosek, Jacqueline.<br/>Preferred Shelf Number QA76.9.A25 K57 2000<br/>Format: Books<br/>Availability Beytepe Library~1<br/>