Search Results for Computer security. - Narrowed by: 2001 SirsiDynix Enterprise https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dComputer$002bsecurity.$0026qf$003dPUBDATE$002509Publication$002bDate$0025092001$0025092001$0026ps$003d300$0026isd$003dtrue?dt=list 2024-11-23T19:12:32Z Sequrity for computer networks : an introduction to data security in teleprocessing and electronic funds transfer ent://SD_ILS/0/SD_ILS:62188 2024-11-23T19:12:32Z 2024-11-23T19:12:32Z Author&#160;Davies, Donald Watts, 1924-&#160;Price, W. L., ort.yaz.<br/>Preferred Shelf Number&#160;TK 5105 D43 1989<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Technology and privacy : the new landscape ent://SD_ILS/0/SD_ILS:112999 2024-11-23T19:12:32Z 2024-11-23T19:12:32Z Author&#160;Agre, Philip.&#160;Rotenberg, Marc.<br/>Preferred Shelf Number&#160;QA76.9.A25 T43 2001<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> New Security Paradigms Workshop : proceedings, September 10 -13, 2001, Cloudcroft, NM, USA ent://SD_ILS/0/SD_ILS:118009 2024-11-23T19:12:32Z 2024-11-23T19:12:32Z Author&#160;ACM SIGSAC New Security Paradigms Workshop (2001 : Cloudcroft, NM, USA)&#160;Raskin, V.&#160;Hempelmann, C.F.&#160;Association for Computing Machinery. Special Interest Group on Security, Audit, and Control.<br/>Preferred Shelf Number&#160;QA76.9.A25 A34 2001<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Proceedings of Sixth ACM Symposium on Access Control Models and Technologies : SACMAT 2001 : Litton-TASC, Westfields II Conference Facility, May 3-4, 2001, Chantilly, Virginia, USA ent://SD_ILS/0/SD_ILS:72452 2024-11-23T19:12:32Z 2024-11-23T19:12:32Z Author&#160;ACM Symposium on Access Control Models and Technologies (6th : 2001 : Chantilly, V.A.)&#160;Association for Computing Machinery. Special Interest Group on Security, Audit, and Control.<br/>Preferred Shelf Number&#160;QA 76.9.A25 A292 2001<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> GSM g&uuml;venlik mekanizmas&#305;n&#305;n incelenmesi ve geli&#351;tirilmesi ent://SD_ILS/0/SD_ILS:74236 2024-11-23T19:12:32Z 2024-11-23T19:12:32Z Author&#160;Kas&#305;m, Ba&#351;ar.<br/>Preferred Shelf Number&#160;TEZ/5165 K151 2001<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Hack proofing Linux a guide to open source security ent://SD_ILS/0/SD_ILS:254046 2024-11-23T19:12:32Z 2024-11-23T19:12:32Z Author&#160;Stanger, James.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781928994343">http://www.sciencedirect.com/science/book/9781928994343</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Hack proofing Sun Solaris 8 ent://SD_ILS/0/SD_ILS:254047 2024-11-23T19:12:32Z 2024-11-23T19:12:32Z Author&#160;Miles, Wyman.&#160;Mitchell, Ed, 1945-&#160;Lynch, F. William.&#160;Cook, Randy (Randy R.)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781928994442">http://www.sciencedirect.com/science/book/9781928994442</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Securing e-business applications and communications ent://SD_ILS/0/SD_ILS:290436 2024-11-23T19:12:32Z 2024-11-23T19:12:32Z Author&#160;Held, Jonathan S.&#160;Bowers, John R.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781420031553">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> A technical guide to IPSec virtual private networks ent://SD_ILS/0/SD_ILS:287475 2024-11-23T19:12:32Z 2024-11-23T19:12:32Z Author&#160;Tiller, James S.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9780203997499">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Digital watermarking ent://SD_ILS/0/SD_ILS:253889 2024-11-23T19:12:32Z 2024-11-23T19:12:32Z Author&#160;Cox, I. J. (Ingemar J.)&#160;Miller, Matthew L.&#160;Bloom, Jeffrey A. (Jeffrey Adam), 1964-<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781558607149">http://www.sciencedirect.com/science/book/9781558607149</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Hack proofing your e-commerce site the only way to stop a hacker is to think like one ent://SD_ILS/0/SD_ILS:253968 2024-11-23T19:12:32Z 2024-11-23T19:12:32Z Author&#160;Russell, Ryan.&#160;Syngress Media, Inc.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781928994275">http://www.sciencedirect.com/science/book/9781928994275</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Hack proofing your Web applications ent://SD_ILS/0/SD_ILS:253969 2024-11-23T19:12:32Z 2024-11-23T19:12:32Z Author&#160;Traxler, Julie.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781928994312">http://www.sciencedirect.com/science/book/9781928994312</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Hack proofing Windows 2000 Server ent://SD_ILS/0/SD_ILS:253999 2024-11-23T19:12:32Z 2024-11-23T19:12:32Z Author&#160;Todd, Chad.&#160;Johnson, Norris L.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836494">http://www.sciencedirect.com/science/book/9781931836494</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/>