Search Results for Security Measures. - Narrowed by: Beytepe General Collection SirsiDynix Enterprise https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dSecurity$002bMeasures.$0026qf$003dLOCATION$002509Shelf$002bLocation$0025091$00253ABEYTEPEGEN$002509Beytepe$002bGeneral$002bCollection$0026te$003dILS$0026ps$003d300? 2024-11-03T00:39:01Z Dijital g&uuml;venlik : dijital ortamlarda g&uuml;venle var olmak ent://SD_ILS/0/SD_ILS:517179 2024-11-03T00:39:01Z 2024-11-03T00:39:01Z Author&#160;&Ouml;zer, Fatih.&#160;&#350;ahin, Yusuf Levent, edit&ouml;r<br/>Preferred Shelf Number&#160;QA76.9.E74 O94 2022<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Elektronik harp ent://SD_ILS/0/SD_ILS:514348 2024-11-03T00:39:01Z 2024-11-03T00:39:01Z Author&#160;Pakfiliz, Ahmet G&uuml;ng&ouml;r.<br/>Preferred Shelf Number&#160;UG485 P35 2021<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> A&#287; y&ouml;netimi ve bilgi g&uuml;venli&#287;i ent://SD_ILS/0/SD_ILS:516275 2024-11-03T00:39:01Z 2024-11-03T00:39:01Z Author&#160;Bilge, Alper.&#160;Ka&ccedil;maz, Emre.<br/>Preferred Shelf Number&#160;TK5105.59 A98 2021<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Web s&#305;zma testleri el kitab&#305; ent://SD_ILS/0/SD_ILS:479521 2024-11-03T00:39:01Z 2024-11-03T00:39:01Z Author&#160;Aky&#305;ld&#305;z, M. Alparslan.&#160;Saner, Do&#287;ukan.<br/>Preferred Shelf Number&#160;QA76.9 A39 2020<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Yeni medyada g&ouml;zetim ve mahremiyetin d&ouml;n&uuml;&#351;&uuml;m&uuml; : g&ouml;zetimin yeniden &uuml;retildi&#287;i bir alan olarak yeni medya ve mahremiyet alg&#305;s&#305;ndaki de&#287;i&#351;im ent://SD_ILS/0/SD_ILS:511780 2024-11-03T00:39:01Z 2024-11-03T00:39:01Z Author&#160;Rizanaj, Flora Hajdarmataj.<br/>Preferred Shelf Number&#160;HM742 R59 2020<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> T&uuml;rkiye&rsquo;de ve d&uuml;nyada siber g&uuml;venlik ent://SD_ILS/0/SD_ILS:514958 2024-11-03T00:39:01Z 2024-11-03T00:39:01Z Author&#160;&Ccedil;elikta&#351;, Bar&#305;&#351; .<br/>Preferred Shelf Number&#160;UG485 C45 2020<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Uygulamalarla siber g&uuml;venli&#287;e giri&#351; ent://SD_ILS/0/SD_ILS:510151 2024-11-03T00:39:01Z 2024-11-03T00:39:01Z Author&#160;Aky&#305;ld&#305;z, M. Alparslan.<br/>Preferred Shelf Number&#160;TK5105.59.A39 U94 2020<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~2<br/> Ethical hacking : (hacking kursu) ent://SD_ILS/0/SD_ILS:423950 2024-11-03T00:39:01Z 2024-11-03T00:39:01Z Author&#160;Usta, G&ouml;khan.<br/>Preferred Shelf Number&#160;QA76.9.A25 U88 2019<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Siber g&uuml;venlik ve savunma : standartlar ve uygulamalar ent://SD_ILS/0/SD_ILS:462283 2024-11-03T00:39:01Z 2024-11-03T00:39:01Z Author&#160;Sa&#287;&#305;ro&#287;lu, &#350;eref.<br/>Preferred Shelf Number&#160;TK5105.59 S53 2019<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~2<br/> Exploit geli&#351;tirme 101 ent://SD_ILS/0/SD_ILS:389077 2024-11-03T00:39:01Z 2024-11-03T00:39:01Z Author&#160;Aky&#305;ld&#305;z, M. Alparslan.<br/>Preferred Shelf Number&#160;QA76.9.A25 A59 2018<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~2<br/> Dijital mahremiyet : Yeni medya ve g&ouml;zetim toplumu ent://SD_ILS/0/SD_ILS:462621 2024-11-03T00:39:01Z 2024-11-03T00:39:01Z Author&#160;Ar&#305;k, Emel.<br/>Preferred Shelf Number&#160;HM742 A75 2018<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Hacking Interface ent://SD_ILS/0/SD_ILS:513452 2024-11-03T00:39:01Z 2024-11-03T00:39:01Z Author&#160;Elbahad&#305;r, Hamza.<br/>Preferred Shelf Number&#160;QA76.9.A25 E43 2016<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Siber g&uuml;venlik ve elektronik bile&#351;enleri ent://SD_ILS/0/SD_ILS:380281 2024-11-03T00:39:01Z 2024-11-03T00:39:01Z Author&#160;&Uuml;nal, Ahmet Naci<br/>Preferred Shelf Number&#160;UG485 U53 2015<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Siber istihbarat ent://SD_ILS/0/SD_ILS:384051 2024-11-03T00:39:01Z 2024-11-03T00:39:01Z Author&#160;Kele&#351;temur, Atalay<br/>Preferred Shelf Number&#160;QA76.9.A25 K45 2015<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> A&#287; ve yaz&#305;l&#305;m g&uuml;venli&#287;i ent://SD_ILS/0/SD_ILS:379758 2024-11-03T00:39:01Z 2024-11-03T00:39:01Z Author&#160;&Ccedil;ontar, Furkan.<br/>Preferred Shelf Number&#160;TK5105.59 C66 2015<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Tam kapsaml&#305; sanal test laboratuvar&#305; kurulumu ve uygulamal&#305; s&#305;zma testleri ent://SD_ILS/0/SD_ILS:513467 2024-11-03T00:39:01Z 2024-11-03T00:39:01Z Author&#160;Yal&ccedil;&#305;nkaya, Mehmet Ali, yazar.&#160;K&uuml;&ccedil;&uuml;ksille, Ecir U&#287;ur, yazar.<br/>Preferred Shelf Number&#160;TK5105.59 Y35 2015<br/>Format:&#160;Regular print<br/>Availability&#160;Beytepe Library~1<br/> Network security essentials : applications and standards ent://SD_ILS/0/SD_ILS:354232 2024-11-03T00:39:01Z 2024-11-03T00:39:01Z Author&#160;Stallings, William.<br/>Preferred Shelf Number&#160;TK5105.59 S725 2014<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Secure Messaging on the Internet ent://SD_ILS/0/SD_ILS:354937 2024-11-03T00:39:01Z 2024-11-03T00:39:01Z Author&#160;Oppliger, Rolf.<br/>Preferred Shelf Number&#160;TK5105.73 O67 2014<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Cryptography and network security : principles and practice ent://SD_ILS/0/SD_ILS:371288 2024-11-03T00:39:01Z 2024-11-03T00:39:01Z Author&#160;Stallings, William.<br/>Preferred Shelf Number&#160;TK5105.59 S713 2014<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Hacking Interface ent://SD_ILS/0/SD_ILS:317847 2024-11-03T00:39:01Z 2024-11-03T00:39:01Z Author&#160;Elbahad&#305;r, Hamza.<br/>Preferred Shelf Number&#160;QA 76.9 A25 E43 2014<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~2<br/> Data analysis for network cyber-security ent://SD_ILS/0/SD_ILS:354757 2024-11-03T00:39:01Z 2024-11-03T00:39:01Z Author&#160;Adams, Niall M., 1968-&#160;Heard, Nicholas.<br/>Preferred Shelf Number&#160;TK5105.59 D375 2014<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Data protection for photographers : a guide to storing and protecting your valuable digital assets ent://SD_ILS/0/SD_ILS:364242 2024-11-03T00:39:01Z 2024-11-03T00:39:01Z Author&#160;Corrigan, Patrick H.<br/>Preferred Shelf Number&#160;TK7895.M4 C67 2014<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Introduction to security ent://SD_ILS/0/SD_ILS:270130 2024-11-03T00:39:01Z 2024-11-03T00:39:01Z Author&#160;Fischer, Robert J.&#160;Halibozek, Edward P.&#160;Walters, David, 1963-<br/>Preferred Shelf Number&#160;HV8290 G74 2013<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Information security for managers ent://SD_ILS/0/SD_ILS:516570 2024-11-03T00:39:01Z 2024-11-03T00:39:01Z Author&#160;Workman, Michael D., 1957-.&#160;Phelps, Daniel C.&#160;Gathegi, John N.<br/>Preferred Shelf Number&#160;HF5548.37 W67 2013<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Strategic intelligence management : national security imperatives and information and communications technologies ent://SD_ILS/0/SD_ILS:270363 2024-11-03T00:39:01Z 2024-11-03T00:39:01Z Author&#160;Akhgar, Babak.&#160;Yates, Simeon.<br/>Preferred Shelf Number&#160;TK5102.85 A44 2013<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Hacking exposed 7 : network security secrets &amp; solutions ent://SD_ILS/0/SD_ILS:270033 2024-11-03T00:39:01Z 2024-11-03T00:39:01Z Author&#160;McClure, Stuart.&#160;Scambray, Joel.&#160;Kurtz, George.<br/>Preferred Shelf Number&#160;TK5105.59 M48 2012<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Handbook of loss prevention and crime prevention ent://SD_ILS/0/SD_ILS:270043 2024-11-03T00:39:01Z 2024-11-03T00:39:01Z Author&#160;Fennelly, Lawrence J., 1940-<br/>Preferred Shelf Number&#160;HV8290 H345 2012<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> The death of the Internet ent://SD_ILS/0/SD_ILS:270436 2024-11-03T00:39:01Z 2024-11-03T00:39:01Z Author&#160;Jakobsson, Markus.<br/>Preferred Shelf Number&#160;TK5105.875.I57 D43 2012<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Auditing IT infrastructures for compliance ent://SD_ILS/0/SD_ILS:271151 2024-11-03T00:39:01Z 2024-11-03T00:39:01Z Author&#160;Weiss, Martin M.&#160;Solomon, Michael G.<br/>Preferred Shelf Number&#160;QA76.9.A25 W428 2011<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Cryptography and network security ent://SD_ILS/0/SD_ILS:386241 2024-11-03T00:39:01Z 2024-11-03T00:39:01Z Author&#160;Kahate, Atul.<br/>Preferred Shelf Number&#160;TK5105.59 K12 2011<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Hacker techniques, tools, and incident handling ent://SD_ILS/0/SD_ILS:271438 2024-11-03T00:39:01Z 2024-11-03T00:39:01Z Author&#160;Oriyano, Sean-Philip.&#160;Gregg, Michael (Michael C.)<br/>Preferred Shelf Number&#160;TK5105.59 O786 2011<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Network security essentials : applications and standards ent://SD_ILS/0/SD_ILS:271446 2024-11-03T00:39:01Z 2024-11-03T00:39:01Z Author&#160;Stallings, William.<br/>Preferred Shelf Number&#160;TK5105.59 S782 2011<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Network security firewalls and VPNs ent://SD_ILS/0/SD_ILS:271452 2024-11-03T00:39:01Z 2024-11-03T00:39:01Z Author&#160;Stewart, James Michael.<br/>Preferred Shelf Number&#160;TK5105.59 S758 2011<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Readings and cases in information security : law and ethics ent://SD_ILS/0/SD_ILS:267743 2024-11-03T00:39:01Z 2024-11-03T00:39:01Z Author&#160;Whitman, Michael E.&#160;Mattord, Herbert J.<br/>Preferred Shelf Number&#160;TK5105.878 W54 2011<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Effective security management ent://SD_ILS/0/SD_ILS:269968 2024-11-03T00:39:01Z 2024-11-03T00:39:01Z Author&#160;Sennewald, Charles A.<br/>Preferred Shelf Number&#160;HV8290 S46 2011<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Security strategies in Web applications and social networking ent://SD_ILS/0/SD_ILS:271538 2024-11-03T00:39:01Z 2024-11-03T00:39:01Z Author&#160;Harwood, Mike.<br/>Preferred Shelf Number&#160;HM742 H38 2011<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Remote sensing of global croplands for food security ent://SD_ILS/0/SD_ILS:268573 2024-11-03T00:39:01Z 2024-11-03T00:39:01Z Author&#160;Thenkabail, Prasad Srinivasa, 1958-<br/>Preferred Shelf Number&#160;S494.5.R4 R454 2009<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> ISA server 2006 ent://SD_ILS/0/SD_ILS:115080 2024-11-03T00:39:01Z 2024-11-03T00:39:01Z Author&#160;&#304;nan, Y&uuml;ksel.&#160;Demirli, Nihat.<br/>Preferred Shelf Number&#160;TK5105.59 .I536 2008<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~2<br/> The future of the internet and how to stop it ent://SD_ILS/0/SD_ILS:134946 2024-11-03T00:39:01Z 2024-11-03T00:39:01Z Author&#160;Zittrain, Jonathan L.<br/>Preferred Shelf Number&#160;TK5105.875.I57 Z53 2008<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> &#304;nternet kullan&#305;m&#305; ve aile ent://SD_ILS/0/SD_ILS:139901 2024-11-03T00:39:01Z 2024-11-03T00:39:01Z Preferred Shelf Number&#160;TK5105.888 .I58 2008<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> The library security and safety guide to prevention, planning, and response ent://SD_ILS/0/SD_ILS:316537 2024-11-03T00:39:01Z 2024-11-03T00:39:01Z Author&#160;Kahn, Miriam (Miriam B.)<br/>Preferred Shelf Number&#160;Z679.6 K34 2008<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Power analysis attacks : revealing the secrets of smart cards ent://SD_ILS/0/SD_ILS:110687 2024-11-03T00:39:01Z 2024-11-03T00:39:01Z Author&#160;Mangard, Stefan.&#160;Oswald, Elisabeth.&#160;Popp, Thomas.<br/>Preferred Shelf Number&#160;TK7895.S62 M36 2007<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Information security : contemporary cases ent://SD_ILS/0/SD_ILS:111021 2024-11-03T00:39:01Z 2024-11-03T00:39:01Z Author&#160;Wright, Marie A.&#160;Kakalik, John S.<br/>Preferred Shelf Number&#160;QA76.9.A25 W75 2007<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Assessment of the fate and effects of toxic agents on water resources : [proceedings of the NATO Advanced Study Institute on Advanced Modeling Techniques for Rapid Diagnosis and Assessment of CBRN Agents Effects on Water Resources, Istanbul, Turkey, 4-16 December 2005] ent://SD_ILS/0/SD_ILS:424009 2024-11-03T00:39:01Z 2024-11-03T00:39:01Z Author&#160;G&ouml;nen&ccedil;, I. Ethem.&#160;NATO Advanced Study Institute on Advanced Modeling Techniques for Rapid Diagnosis and Assessment of CBRN Agents Effects on Water Resources (2005 : Istanbul, Turkey)<br/>Preferred Shelf Number&#160;TD353 A88 2007<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Computer security fundamentals ent://SD_ILS/0/SD_ILS:108620 2024-11-03T00:39:01Z 2024-11-03T00:39:01Z Author&#160;Easttom, Chuck.<br/>Preferred Shelf Number&#160;QA76.9.A25 E325 2006<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Handbook of information security ent://SD_ILS/0/SD_ILS:108909 2024-11-03T00:39:01Z 2024-11-03T00:39:01Z Author&#160;Bidgoli, Hossein, ed.<br/>Preferred Shelf Number&#160;TK5105.59 H35 2006 V.1<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~3<br/> TCP / IP ve a&#287; g&uuml;venli&#287;i : teori ve uygulamalar ile ent://SD_ILS/0/SD_ILS:112813 2024-11-03T00:39:01Z 2024-11-03T00:39:01Z Author&#160;Dirican, Can Okan.<br/>Preferred Shelf Number&#160;TK 5105.55 D5753 2005<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~2<br/> Acing the security+ certification exam ent://SD_ILS/0/SD_ILS:313492 2024-11-03T00:39:01Z 2024-11-03T00:39:01Z Author&#160;Regan, Patrick E.<br/>Preferred Shelf Number&#160;QA76.3 R455 2005<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Real 802.11 security : Wi-Fi protected access and 802.11i ent://SD_ILS/0/SD_ILS:312698 2024-11-03T00:39:01Z 2024-11-03T00:39:01Z Author&#160;Edney, Jon.&#160;Arbaugh, William A.<br/>Preferred Shelf Number&#160;TK5105.59 E36 2004<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Malware : fighting malicious code ent://SD_ILS/0/SD_ILS:267737 2024-11-03T00:39:01Z 2024-11-03T00:39:01Z Author&#160;Skoudis, Ed.&#160;Zeltser, Lenny.<br/>Preferred Shelf Number&#160;QA76.9.A25 S58 2004<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Computer security sourcebook ent://SD_ILS/0/SD_ILS:94615 2024-11-03T00:39:01Z 2024-11-03T00:39:01Z Author&#160;Caldwell, Wilma, ed.<br/>Preferred Shelf Number&#160;QA 76.9.A25 C658 2003<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Building firewalls with OpenBSD and PF ent://SD_ILS/0/SD_ILS:113220 2024-11-03T00:39:01Z 2024-11-03T00:39:01Z Author&#160;Artymiak, Jacek.<br/>Preferred Shelf Number&#160;TK5105.59 .A77 2003<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Introduction to communication electronic warfare systems ent://SD_ILS/0/SD_ILS:76559 2024-11-03T00:39:01Z 2024-11-03T00:39:01Z Author&#160;Poisel, Richard.<br/>Preferred Shelf Number&#160;UG 590 P65 2002<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Nokia network security solutions handbook ent://SD_ILS/0/SD_ILS:81149 2024-11-03T00:39:01Z 2024-11-03T00:39:01Z Author&#160;Maxwell, Doug.&#160;Amon, Cherie, ort. yaz.<br/>Preferred Shelf Number&#160;TK 5105.59 M451 2002<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> New Security Paradigms Workshop : proceedings, September 10 -13, 2001, Cloudcroft, NM, USA ent://SD_ILS/0/SD_ILS:118009 2024-11-03T00:39:01Z 2024-11-03T00:39:01Z Author&#160;ACM SIGSAC New Security Paradigms Workshop (2001 : Cloudcroft, NM, USA)&#160;Raskin, V.&#160;Hempelmann, C.F.&#160;Association for Computing Machinery. Special Interest Group on Security, Audit, and Control.<br/>Preferred Shelf Number&#160;QA76.9.A25 A34 2001<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Applied cryptography : protocols, algorithms, and source code in C ent://SD_ILS/0/SD_ILS:108014 2024-11-03T00:39:01Z 2024-11-03T00:39:01Z Author&#160;Schneier, Bruce.<br/>Preferred Shelf Number&#160;QA76.9.A25 S35 1996<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Principles of secure communication systems ent://SD_ILS/0/SD_ILS:86272 2024-11-03T00:39:01Z 2024-11-03T00:39:01Z Author&#160;Torrieri, Don J.<br/>Preferred Shelf Number&#160;TK 5102.5 T625 1992<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> IAEA safeguards : Implementation at nuclear fuel cycle facilities ent://SD_ILS/0/SD_ILS:90436 2024-11-03T00:39:01Z 2024-11-03T00:39:01Z Author&#160;International Atomic Energy Agency.<br/>Preferred Shelf Number&#160;TK 9152 I8 1985<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Auditing IT infrastructures for compliance ent://SD_ILS/0/SD_ILS:270164 2024-11-03T00:39:01Z 2024-11-03T00:39:01Z Author&#160;Weiss, Martin M.&#160;Solomon, Michael G.<br/>Preferred Shelf Number&#160;QA76.9.A25 W428<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/>