Search Results for Information security. - Narrowed by: Beytepe Library SirsiDynix Enterprise https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dInformation$002bsecurity.$0026qf$003dLIBRARY$002509Library$0025091$00253ABEYTEPE$002509Beytepe$002bLibrary$0026ic$003dtrue$0026ps$003d300?dt=list 2026-01-18T06:42:05Z Elementary information security ent://SD_ILS/0/SD_ILS:271272 2026-01-18T06:42:05Z 2026-01-18T06:42:05Z Author&#160;Smith, Richard E.<br/>Preferred Shelf Number&#160;QA76.9.A25 S652 2013<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Information security : contemporary cases ent://SD_ILS/0/SD_ILS:111021 2026-01-18T06:42:05Z 2026-01-18T06:42:05Z Author&#160;Wright, Marie A.&#160;Kakalik, John S.<br/>Preferred Shelf Number&#160;QA76.9.A25 W75 2007<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Handbook of information security ent://SD_ILS/0/SD_ILS:108909 2026-01-18T06:42:05Z 2026-01-18T06:42:05Z Author&#160;Bidgoli, Hossein, ed.<br/>Preferred Shelf Number&#160;TK5105.59 H35 2006 V.1<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~3<br/> Information security for managers ent://SD_ILS/0/SD_ILS:516570 2026-01-18T06:42:05Z 2026-01-18T06:42:05Z Author&#160;Workman, Michael D., 1957-.&#160;Phelps, Daniel C.&#160;Gathegi, John N.<br/>Preferred Shelf Number&#160;HF5548.37 W67 2013<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Information security : principles and practice ent://SD_ILS/0/SD_ILS:109477 2026-01-18T06:42:05Z 2026-01-18T06:42:05Z Author&#160;Stamp, Mark.<br/>Preferred Shelf Number&#160;QA76.9.A25 S69 2006<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Integration of information for environmental security : environmental security, information security, disaster forecast and prevention, water resources management ent://SD_ILS/0/SD_ILS:113618 2026-01-18T06:42:05Z 2026-01-18T06:42:05Z Author&#160;NATO Advanced Research Workshop on Integration of Information for Environmental Security (2006 : Istanbul, Turkey)&#160;Coskun, H. Gonca.&#160;Cigizoglu, H. Kerem.&#160;Maktav, M. Derya.<br/>Preferred Shelf Number&#160;TD170.2 .N38 2008<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Strategic intelligence management : national security imperatives and information and communications technologies ent://SD_ILS/0/SD_ILS:270363 2026-01-18T06:42:05Z 2026-01-18T06:42:05Z Author&#160;Akhgar, Babak.&#160;Yates, Simeon.<br/>Preferred Shelf Number&#160;TK5102.85 A44 2013<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Readings and cases in information security : law and ethics ent://SD_ILS/0/SD_ILS:267743 2026-01-18T06:42:05Z 2026-01-18T06:42:05Z Author&#160;Whitman, Michael E.&#160;Mattord, Herbert J.<br/>Preferred Shelf Number&#160;TK5105.878 W54 2011<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Intelligence and security informatics for international security : information sharing and data mining ent://SD_ILS/0/SD_ILS:119786 2026-01-18T06:42:05Z 2026-01-18T06:42:05Z Author&#160;Chen, Hsinchun.<br/>Preferred Shelf Number&#160;QA76.76.E95 C44 2006<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Information security architecture : an integrated approach to security in the organization ent://SD_ILS/0/SD_ILS:110865 2026-01-18T06:42:05Z 2026-01-18T06:42:05Z Author&#160;Tudor, Jan Killmeyer.<br/>Preferred Shelf Number&#160;QA76.9.A25 T83 2006<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Data warehousing and data mining techniques for cyber security ent://SD_ILS/0/SD_ILS:110434 2026-01-18T06:42:05Z 2026-01-18T06:42:05Z Author&#160;Singhal, Anoop, 1958-<br/>Preferred Shelf Number&#160;QA76.9.A25 S563 2007<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> CryptoGraphics : exploiting graphics cards for security ent://SD_ILS/0/SD_ILS:119741 2026-01-18T06:42:05Z 2026-01-18T06:42:05Z Author&#160;Cook, Debra L.&#160;Keromytis, Angelos.<br/>Preferred Shelf Number&#160;QA76.9.D314 C66 2006<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Hacker techniques, tools, and incident handling ent://SD_ILS/0/SD_ILS:271438 2026-01-18T06:42:05Z 2026-01-18T06:42:05Z Author&#160;Oriyano, Sean-Philip.&#160;Gregg, Michael (Michael C.)<br/>Preferred Shelf Number&#160;TK5105.59 O786 2011<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Network security firewalls and VPNs ent://SD_ILS/0/SD_ILS:271452 2026-01-18T06:42:05Z 2026-01-18T06:42:05Z Author&#160;Stewart, James Michael.<br/>Preferred Shelf Number&#160;TK5105.59 S758 2011<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Auditing IT infrastructures for compliance ent://SD_ILS/0/SD_ILS:271151 2026-01-18T06:42:05Z 2026-01-18T06:42:05Z Author&#160;Weiss, Martin M.&#160;Solomon, Michael G.<br/>Preferred Shelf Number&#160;QA76.9.A25 W428 2011<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> System forensics, investigation, and response ent://SD_ILS/0/SD_ILS:271533 2026-01-18T06:42:05Z 2026-01-18T06:42:05Z Author&#160;Vacca, John R.&#160;Rudolph, K.<br/>Preferred Shelf Number&#160;HV8079.C65 V32 2011<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Security policies and implementation issues ent://SD_ILS/0/SD_ILS:271534 2026-01-18T06:42:05Z 2026-01-18T06:42:05Z Author&#160;Johnson, Rob (Robert)&#160;Merkow, Mark S.<br/>Preferred Shelf Number&#160;QA76.9.A25 J64 2011<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Security strategies in Web applications and social networking ent://SD_ILS/0/SD_ILS:271538 2026-01-18T06:42:05Z 2026-01-18T06:42:05Z Author&#160;Harwood, Mike.<br/>Preferred Shelf Number&#160;HM742 H38 2011<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Security strategies in Linux platforms and applications ent://SD_ILS/0/SD_ILS:271539 2026-01-18T06:42:05Z 2026-01-18T06:42:05Z Author&#160;Jang, Michael H.<br/>Preferred Shelf Number&#160;QA76.76.O63 J3638 2011<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Metasploit ve penetrasyon testleri ent://SD_ILS/0/SD_ILS:524302 2026-01-18T06:42:05Z 2026-01-18T06:42:05Z Author&#160;Altunta&#351;, Abdulaziz .<br/>Preferred Shelf Number&#160;TK5105 A48 2024<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Dijital g&uuml;venlik : dijital ortamlarda g&uuml;venle var olmak ent://SD_ILS/0/SD_ILS:517179 2026-01-18T06:42:05Z 2026-01-18T06:42:05Z Author&#160;&Ouml;zer, Fatih.&#160;&#350;ahin, Yusuf Levent, edit&ouml;r<br/>Preferred Shelf Number&#160;QA76.9.E74 O94 2022<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Web s&#305;zma testleri el kitab&#305; ent://SD_ILS/0/SD_ILS:479521 2026-01-18T06:42:05Z 2026-01-18T06:42:05Z Author&#160;Aky&#305;ld&#305;z, M. Alparslan.&#160;Saner, Do&#287;ukan.<br/>Preferred Shelf Number&#160;QA76.9 A39 2020<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Bilgi g&uuml;venli&#287;i y&ouml;netim sistemi : ISO 27001 : 2013 uygulama k&#305;lavuzu ent://SD_ILS/0/SD_ILS:423191 2026-01-18T06:42:05Z 2026-01-18T06:42:05Z Author&#160;&Ccedil;ubuk&ccedil;u, Faruk.<br/>Preferred Shelf Number&#160;TS156.6 C838 2018<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Metasploit ve penetrasyon testleri ent://SD_ILS/0/SD_ILS:513451 2026-01-18T06:42:05Z 2026-01-18T06:42:05Z Author&#160;Altunta&#351;, Abdulaziz .<br/>Preferred Shelf Number&#160;TK5105 A48 2015<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Multilingual dictionary of IT security : English, German, French, Spanish, Italian ent://SD_ILS/0/SD_ILS:78796 2026-01-18T06:42:05Z 2026-01-18T06:42:05Z Author&#160;Vollnhals, Otto.<br/>Preferred Shelf Number&#160;REF/QA 76.9.A25 V887 1999<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/>