Search Results for Security Measures. - Narrowed by: Beytepe General Collection
SirsiDynix Enterprise
https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dSecurity$002bMeasures.$0026qf$003dLOCATION$002509Shelf$002bLocation$0025091$00253ABEYTEPEGEN$002509Beytepe$002bGeneral$002bCollection$0026te$003dILS$0026ps$003d300?
2024-11-03T00:39:01Z
Dijital güvenlik : dijital ortamlarda güvenle var olmak
ent://SD_ILS/0/SD_ILS:517179
2024-11-03T00:39:01Z
2024-11-03T00:39:01Z
Author Özer, Fatih. Şahin, Yusuf Levent, editör<br/>Preferred Shelf Number QA76.9.E74 O94 2022<br/>Format: Books<br/>Availability Beytepe Library~1<br/>
Elektronik harp
ent://SD_ILS/0/SD_ILS:514348
2024-11-03T00:39:01Z
2024-11-03T00:39:01Z
Author Pakfiliz, Ahmet Güngör.<br/>Preferred Shelf Number UG485 P35 2021<br/>Format: Books<br/>Availability Beytepe Library~1<br/>
Ağ yönetimi ve bilgi güvenliği
ent://SD_ILS/0/SD_ILS:516275
2024-11-03T00:39:01Z
2024-11-03T00:39:01Z
Author Bilge, Alper. Kaçmaz, Emre.<br/>Preferred Shelf Number TK5105.59 A98 2021<br/>Format: Books<br/>Availability Beytepe Library~1<br/>
Web sızma testleri el kitabı
ent://SD_ILS/0/SD_ILS:479521
2024-11-03T00:39:01Z
2024-11-03T00:39:01Z
Author Akyıldız, M. Alparslan. Saner, Doğukan.<br/>Preferred Shelf Number QA76.9 A39 2020<br/>Format: Books<br/>Availability Beytepe Library~1<br/>
Yeni medyada gözetim ve mahremiyetin dönüşümü : gözetimin yeniden üretildiği bir alan olarak yeni medya ve mahremiyet algısındaki değişim
ent://SD_ILS/0/SD_ILS:511780
2024-11-03T00:39:01Z
2024-11-03T00:39:01Z
Author Rizanaj, Flora Hajdarmataj.<br/>Preferred Shelf Number HM742 R59 2020<br/>Format: Books<br/>Availability Beytepe Library~1<br/>
Türkiye’de ve dünyada siber güvenlik
ent://SD_ILS/0/SD_ILS:514958
2024-11-03T00:39:01Z
2024-11-03T00:39:01Z
Author Çeliktaş, Barış .<br/>Preferred Shelf Number UG485 C45 2020<br/>Format: Books<br/>Availability Beytepe Library~1<br/>
Uygulamalarla siber güvenliğe giriş
ent://SD_ILS/0/SD_ILS:510151
2024-11-03T00:39:01Z
2024-11-03T00:39:01Z
Author Akyıldız, M. Alparslan.<br/>Preferred Shelf Number TK5105.59.A39 U94 2020<br/>Format: Books<br/>Availability Beytepe Library~2<br/>
Ethical hacking : (hacking kursu)
ent://SD_ILS/0/SD_ILS:423950
2024-11-03T00:39:01Z
2024-11-03T00:39:01Z
Author Usta, Gökhan.<br/>Preferred Shelf Number QA76.9.A25 U88 2019<br/>Format: Books<br/>Availability Beytepe Library~1<br/>
Siber güvenlik ve savunma : standartlar ve uygulamalar
ent://SD_ILS/0/SD_ILS:462283
2024-11-03T00:39:01Z
2024-11-03T00:39:01Z
Author Sağıroğlu, Şeref.<br/>Preferred Shelf Number TK5105.59 S53 2019<br/>Format: Books<br/>Availability Beytepe Library~2<br/>
Exploit geliştirme 101
ent://SD_ILS/0/SD_ILS:389077
2024-11-03T00:39:01Z
2024-11-03T00:39:01Z
Author Akyıldız, M. Alparslan.<br/>Preferred Shelf Number QA76.9.A25 A59 2018<br/>Format: Books<br/>Availability Beytepe Library~2<br/>
Dijital mahremiyet : Yeni medya ve gözetim toplumu
ent://SD_ILS/0/SD_ILS:462621
2024-11-03T00:39:01Z
2024-11-03T00:39:01Z
Author Arık, Emel.<br/>Preferred Shelf Number HM742 A75 2018<br/>Format: Books<br/>Availability Beytepe Library~1<br/>
Hacking Interface
ent://SD_ILS/0/SD_ILS:513452
2024-11-03T00:39:01Z
2024-11-03T00:39:01Z
Author Elbahadır, Hamza.<br/>Preferred Shelf Number QA76.9.A25 E43 2016<br/>Format: Books<br/>Availability Beytepe Library~1<br/>
Siber güvenlik ve elektronik bileşenleri
ent://SD_ILS/0/SD_ILS:380281
2024-11-03T00:39:01Z
2024-11-03T00:39:01Z
Author Ünal, Ahmet Naci<br/>Preferred Shelf Number UG485 U53 2015<br/>Format: Books<br/>Availability Beytepe Library~1<br/>
Siber istihbarat
ent://SD_ILS/0/SD_ILS:384051
2024-11-03T00:39:01Z
2024-11-03T00:39:01Z
Author Keleştemur, Atalay<br/>Preferred Shelf Number QA76.9.A25 K45 2015<br/>Format: Books<br/>Availability Beytepe Library~1<br/>
Ağ ve yazılım güvenliği
ent://SD_ILS/0/SD_ILS:379758
2024-11-03T00:39:01Z
2024-11-03T00:39:01Z
Author Çontar, Furkan.<br/>Preferred Shelf Number TK5105.59 C66 2015<br/>Format: Books<br/>Availability Beytepe Library~1<br/>
Tam kapsamlı sanal test laboratuvarı kurulumu ve uygulamalı sızma testleri
ent://SD_ILS/0/SD_ILS:513467
2024-11-03T00:39:01Z
2024-11-03T00:39:01Z
Author Yalçınkaya, Mehmet Ali, yazar. Küçüksille, Ecir Uğur, yazar.<br/>Preferred Shelf Number TK5105.59 Y35 2015<br/>Format: Regular print<br/>Availability Beytepe Library~1<br/>
Network security essentials : applications and standards
ent://SD_ILS/0/SD_ILS:354232
2024-11-03T00:39:01Z
2024-11-03T00:39:01Z
Author Stallings, William.<br/>Preferred Shelf Number TK5105.59 S725 2014<br/>Format: Books<br/>Availability Beytepe Library~1<br/>
Secure Messaging on the Internet
ent://SD_ILS/0/SD_ILS:354937
2024-11-03T00:39:01Z
2024-11-03T00:39:01Z
Author Oppliger, Rolf.<br/>Preferred Shelf Number TK5105.73 O67 2014<br/>Format: Books<br/>Availability Beytepe Library~1<br/>
Cryptography and network security : principles and practice
ent://SD_ILS/0/SD_ILS:371288
2024-11-03T00:39:01Z
2024-11-03T00:39:01Z
Author Stallings, William.<br/>Preferred Shelf Number TK5105.59 S713 2014<br/>Format: Books<br/>Availability Beytepe Library~1<br/>
Hacking Interface
ent://SD_ILS/0/SD_ILS:317847
2024-11-03T00:39:01Z
2024-11-03T00:39:01Z
Author Elbahadır, Hamza.<br/>Preferred Shelf Number QA 76.9 A25 E43 2014<br/>Format: Books<br/>Availability Beytepe Library~2<br/>
Data analysis for network cyber-security
ent://SD_ILS/0/SD_ILS:354757
2024-11-03T00:39:01Z
2024-11-03T00:39:01Z
Author Adams, Niall M., 1968- Heard, Nicholas.<br/>Preferred Shelf Number TK5105.59 D375 2014<br/>Format: Books<br/>Availability Beytepe Library~1<br/>
Data protection for photographers : a guide to storing and protecting your valuable digital assets
ent://SD_ILS/0/SD_ILS:364242
2024-11-03T00:39:01Z
2024-11-03T00:39:01Z
Author Corrigan, Patrick H.<br/>Preferred Shelf Number TK7895.M4 C67 2014<br/>Format: Books<br/>Availability Beytepe Library~1<br/>
Introduction to security
ent://SD_ILS/0/SD_ILS:270130
2024-11-03T00:39:01Z
2024-11-03T00:39:01Z
Author Fischer, Robert J. Halibozek, Edward P. Walters, David, 1963-<br/>Preferred Shelf Number HV8290 G74 2013<br/>Format: Books<br/>Availability Beytepe Library~1<br/>
Information security for managers
ent://SD_ILS/0/SD_ILS:516570
2024-11-03T00:39:01Z
2024-11-03T00:39:01Z
Author Workman, Michael D., 1957-. Phelps, Daniel C. Gathegi, John N.<br/>Preferred Shelf Number HF5548.37 W67 2013<br/>Format: Books<br/>Availability Beytepe Library~1<br/>
Strategic intelligence management : national security imperatives and information and communications technologies
ent://SD_ILS/0/SD_ILS:270363
2024-11-03T00:39:01Z
2024-11-03T00:39:01Z
Author Akhgar, Babak. Yates, Simeon.<br/>Preferred Shelf Number TK5102.85 A44 2013<br/>Format: Books<br/>Availability Beytepe Library~1<br/>
Hacking exposed 7 : network security secrets & solutions
ent://SD_ILS/0/SD_ILS:270033
2024-11-03T00:39:01Z
2024-11-03T00:39:01Z
Author McClure, Stuart. Scambray, Joel. Kurtz, George.<br/>Preferred Shelf Number TK5105.59 M48 2012<br/>Format: Books<br/>Availability Beytepe Library~1<br/>
Handbook of loss prevention and crime prevention
ent://SD_ILS/0/SD_ILS:270043
2024-11-03T00:39:01Z
2024-11-03T00:39:01Z
Author Fennelly, Lawrence J., 1940-<br/>Preferred Shelf Number HV8290 H345 2012<br/>Format: Books<br/>Availability Beytepe Library~1<br/>
The death of the Internet
ent://SD_ILS/0/SD_ILS:270436
2024-11-03T00:39:01Z
2024-11-03T00:39:01Z
Author Jakobsson, Markus.<br/>Preferred Shelf Number TK5105.875.I57 D43 2012<br/>Format: Books<br/>Availability Beytepe Library~1<br/>
Auditing IT infrastructures for compliance
ent://SD_ILS/0/SD_ILS:271151
2024-11-03T00:39:01Z
2024-11-03T00:39:01Z
Author Weiss, Martin M. Solomon, Michael G.<br/>Preferred Shelf Number QA76.9.A25 W428 2011<br/>Format: Books<br/>Availability Beytepe Library~1<br/>
Cryptography and network security
ent://SD_ILS/0/SD_ILS:386241
2024-11-03T00:39:01Z
2024-11-03T00:39:01Z
Author Kahate, Atul.<br/>Preferred Shelf Number TK5105.59 K12 2011<br/>Format: Books<br/>Availability Beytepe Library~1<br/>
Hacker techniques, tools, and incident handling
ent://SD_ILS/0/SD_ILS:271438
2024-11-03T00:39:01Z
2024-11-03T00:39:01Z
Author Oriyano, Sean-Philip. Gregg, Michael (Michael C.)<br/>Preferred Shelf Number TK5105.59 O786 2011<br/>Format: Books<br/>Availability Beytepe Library~1<br/>
Network security essentials : applications and standards
ent://SD_ILS/0/SD_ILS:271446
2024-11-03T00:39:01Z
2024-11-03T00:39:01Z
Author Stallings, William.<br/>Preferred Shelf Number TK5105.59 S782 2011<br/>Format: Books<br/>Availability Beytepe Library~1<br/>
Network security firewalls and VPNs
ent://SD_ILS/0/SD_ILS:271452
2024-11-03T00:39:01Z
2024-11-03T00:39:01Z
Author Stewart, James Michael.<br/>Preferred Shelf Number TK5105.59 S758 2011<br/>Format: Books<br/>Availability Beytepe Library~1<br/>
Readings and cases in information security : law and ethics
ent://SD_ILS/0/SD_ILS:267743
2024-11-03T00:39:01Z
2024-11-03T00:39:01Z
Author Whitman, Michael E. Mattord, Herbert J.<br/>Preferred Shelf Number TK5105.878 W54 2011<br/>Format: Books<br/>Availability Beytepe Library~1<br/>
Effective security management
ent://SD_ILS/0/SD_ILS:269968
2024-11-03T00:39:01Z
2024-11-03T00:39:01Z
Author Sennewald, Charles A.<br/>Preferred Shelf Number HV8290 S46 2011<br/>Format: Books<br/>Availability Beytepe Library~1<br/>
Security strategies in Web applications and social networking
ent://SD_ILS/0/SD_ILS:271538
2024-11-03T00:39:01Z
2024-11-03T00:39:01Z
Author Harwood, Mike.<br/>Preferred Shelf Number HM742 H38 2011<br/>Format: Books<br/>Availability Beytepe Library~1<br/>
Remote sensing of global croplands for food security
ent://SD_ILS/0/SD_ILS:268573
2024-11-03T00:39:01Z
2024-11-03T00:39:01Z
Author Thenkabail, Prasad Srinivasa, 1958-<br/>Preferred Shelf Number S494.5.R4 R454 2009<br/>Format: Books<br/>Availability Beytepe Library~1<br/>
ISA server 2006
ent://SD_ILS/0/SD_ILS:115080
2024-11-03T00:39:01Z
2024-11-03T00:39:01Z
Author İnan, Yüksel. Demirli, Nihat.<br/>Preferred Shelf Number TK5105.59 .I536 2008<br/>Format: Books<br/>Availability Beytepe Library~2<br/>
The future of the internet and how to stop it
ent://SD_ILS/0/SD_ILS:134946
2024-11-03T00:39:01Z
2024-11-03T00:39:01Z
Author Zittrain, Jonathan L.<br/>Preferred Shelf Number TK5105.875.I57 Z53 2008<br/>Format: Books<br/>Availability Beytepe Library~1<br/>
İnternet kullanımı ve aile
ent://SD_ILS/0/SD_ILS:139901
2024-11-03T00:39:01Z
2024-11-03T00:39:01Z
Preferred Shelf Number TK5105.888 .I58 2008<br/>Format: Books<br/>Availability Beytepe Library~1<br/>
The library security and safety guide to prevention, planning, and response
ent://SD_ILS/0/SD_ILS:316537
2024-11-03T00:39:01Z
2024-11-03T00:39:01Z
Author Kahn, Miriam (Miriam B.)<br/>Preferred Shelf Number Z679.6 K34 2008<br/>Format: Books<br/>Availability Beytepe Library~1<br/>
Power analysis attacks : revealing the secrets of smart cards
ent://SD_ILS/0/SD_ILS:110687
2024-11-03T00:39:01Z
2024-11-03T00:39:01Z
Author Mangard, Stefan. Oswald, Elisabeth. Popp, Thomas.<br/>Preferred Shelf Number TK7895.S62 M36 2007<br/>Format: Books<br/>Availability Beytepe Library~1<br/>
Information security : contemporary cases
ent://SD_ILS/0/SD_ILS:111021
2024-11-03T00:39:01Z
2024-11-03T00:39:01Z
Author Wright, Marie A. Kakalik, John S.<br/>Preferred Shelf Number QA76.9.A25 W75 2007<br/>Format: Books<br/>Availability Beytepe Library~1<br/>
Assessment of the fate and effects of toxic agents on water resources : [proceedings of the NATO Advanced Study Institute on Advanced Modeling Techniques for Rapid Diagnosis and Assessment of CBRN Agents Effects on Water Resources, Istanbul, Turkey, 4-16 December 2005]
ent://SD_ILS/0/SD_ILS:424009
2024-11-03T00:39:01Z
2024-11-03T00:39:01Z
Author Gönenç, I. Ethem. NATO Advanced Study Institute on Advanced Modeling Techniques for Rapid Diagnosis and Assessment of CBRN Agents Effects on Water Resources (2005 : Istanbul, Turkey)<br/>Preferred Shelf Number TD353 A88 2007<br/>Format: Books<br/>Availability Beytepe Library~1<br/>
Computer security fundamentals
ent://SD_ILS/0/SD_ILS:108620
2024-11-03T00:39:01Z
2024-11-03T00:39:01Z
Author Easttom, Chuck.<br/>Preferred Shelf Number QA76.9.A25 E325 2006<br/>Format: Books<br/>Availability Beytepe Library~1<br/>
Handbook of information security
ent://SD_ILS/0/SD_ILS:108909
2024-11-03T00:39:01Z
2024-11-03T00:39:01Z
Author Bidgoli, Hossein, ed.<br/>Preferred Shelf Number TK5105.59 H35 2006 V.1<br/>Format: Books<br/>Availability Beytepe Library~3<br/>
TCP / IP ve ağ güvenliği : teori ve uygulamalar ile
ent://SD_ILS/0/SD_ILS:112813
2024-11-03T00:39:01Z
2024-11-03T00:39:01Z
Author Dirican, Can Okan.<br/>Preferred Shelf Number TK 5105.55 D5753 2005<br/>Format: Books<br/>Availability Beytepe Library~2<br/>
Acing the security+ certification exam
ent://SD_ILS/0/SD_ILS:313492
2024-11-03T00:39:01Z
2024-11-03T00:39:01Z
Author Regan, Patrick E.<br/>Preferred Shelf Number QA76.3 R455 2005<br/>Format: Books<br/>Availability Beytepe Library~1<br/>
Real 802.11 security : Wi-Fi protected access and 802.11i
ent://SD_ILS/0/SD_ILS:312698
2024-11-03T00:39:01Z
2024-11-03T00:39:01Z
Author Edney, Jon. Arbaugh, William A.<br/>Preferred Shelf Number TK5105.59 E36 2004<br/>Format: Books<br/>Availability Beytepe Library~1<br/>
Malware : fighting malicious code
ent://SD_ILS/0/SD_ILS:267737
2024-11-03T00:39:01Z
2024-11-03T00:39:01Z
Author Skoudis, Ed. Zeltser, Lenny.<br/>Preferred Shelf Number QA76.9.A25 S58 2004<br/>Format: Books<br/>Availability Beytepe Library~1<br/>
Computer security sourcebook
ent://SD_ILS/0/SD_ILS:94615
2024-11-03T00:39:01Z
2024-11-03T00:39:01Z
Author Caldwell, Wilma, ed.<br/>Preferred Shelf Number QA 76.9.A25 C658 2003<br/>Format: Books<br/>Availability Beytepe Library~1<br/>
Building firewalls with OpenBSD and PF
ent://SD_ILS/0/SD_ILS:113220
2024-11-03T00:39:01Z
2024-11-03T00:39:01Z
Author Artymiak, Jacek.<br/>Preferred Shelf Number TK5105.59 .A77 2003<br/>Format: Books<br/>Availability Beytepe Library~1<br/>
Introduction to communication electronic warfare systems
ent://SD_ILS/0/SD_ILS:76559
2024-11-03T00:39:01Z
2024-11-03T00:39:01Z
Author Poisel, Richard.<br/>Preferred Shelf Number UG 590 P65 2002<br/>Format: Books<br/>Availability Beytepe Library~1<br/>
Nokia network security solutions handbook
ent://SD_ILS/0/SD_ILS:81149
2024-11-03T00:39:01Z
2024-11-03T00:39:01Z
Author Maxwell, Doug. Amon, Cherie, ort. yaz.<br/>Preferred Shelf Number TK 5105.59 M451 2002<br/>Format: Books<br/>Availability Beytepe Library~1<br/>
New Security Paradigms Workshop : proceedings, September 10 -13, 2001, Cloudcroft, NM, USA
ent://SD_ILS/0/SD_ILS:118009
2024-11-03T00:39:01Z
2024-11-03T00:39:01Z
Author ACM SIGSAC New Security Paradigms Workshop (2001 : Cloudcroft, NM, USA) Raskin, V. Hempelmann, C.F. Association for Computing Machinery. Special Interest Group on Security, Audit, and Control.<br/>Preferred Shelf Number QA76.9.A25 A34 2001<br/>Format: Books<br/>Availability Beytepe Library~1<br/>
Applied cryptography : protocols, algorithms, and source code in C
ent://SD_ILS/0/SD_ILS:108014
2024-11-03T00:39:01Z
2024-11-03T00:39:01Z
Author Schneier, Bruce.<br/>Preferred Shelf Number QA76.9.A25 S35 1996<br/>Format: Books<br/>Availability Beytepe Library~1<br/>
Principles of secure communication systems
ent://SD_ILS/0/SD_ILS:86272
2024-11-03T00:39:01Z
2024-11-03T00:39:01Z
Author Torrieri, Don J.<br/>Preferred Shelf Number TK 5102.5 T625 1992<br/>Format: Books<br/>Availability Beytepe Library~1<br/>
IAEA safeguards : Implementation at nuclear fuel cycle facilities
ent://SD_ILS/0/SD_ILS:90436
2024-11-03T00:39:01Z
2024-11-03T00:39:01Z
Author International Atomic Energy Agency.<br/>Preferred Shelf Number TK 9152 I8 1985<br/>Format: Books<br/>Availability Beytepe Library~1<br/>
Auditing IT infrastructures for compliance
ent://SD_ILS/0/SD_ILS:270164
2024-11-03T00:39:01Z
2024-11-03T00:39:01Z
Author Weiss, Martin M. Solomon, Michael G.<br/>Preferred Shelf Number QA76.9.A25 W428<br/>Format: Books<br/>Availability Beytepe Library~1<br/>