Search Results for Security Systems. - Narrowed by: Beytepe General Collection SirsiDynix Enterprise https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dSecurity$002bSystems.$0026qf$003dLOCATION$002509Shelf$002bLocation$0025091$00253ABEYTEPEGEN$002509Beytepe$002bGeneral$002bCollection$0026ps$003d300$0026isd$003dtrue? 2024-11-15T07:08:23Z Computer architecture and security : fundamentals of designing secure computer systems ent://SD_ILS/0/SD_ILS:248865 2024-11-15T07:08:23Z 2024-11-15T07:08:23Z Author&#160;Wang, Shuangbao Paul.&#160;Ledley, Robert Steven.<br/>Preferred Shelf Number&#160;QA76.9.A73 W36 2012<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Enhanced methods in computer security, biometric and artificial intelligence systems ent://SD_ILS/0/SD_ILS:109864 2024-11-15T07:08:23Z 2024-11-15T07:08:23Z Author&#160;Pejas, Jerzy, 1954-, ed.&#160;Piegat, Andrzej, 1947-, ed.<br/>Preferred Shelf Number&#160;QA76.9.A25 E545 2005<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Hacker techniques, tools, and incident handling ent://SD_ILS/0/SD_ILS:271438 2024-11-15T07:08:23Z 2024-11-15T07:08:23Z Author&#160;Oriyano, Sean-Philip.&#160;Gregg, Michael (Michael C.)<br/>Preferred Shelf Number&#160;TK5105.59 O786 2011<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Network security firewalls and VPNs ent://SD_ILS/0/SD_ILS:271452 2024-11-15T07:08:23Z 2024-11-15T07:08:23Z Author&#160;Stewart, James Michael.<br/>Preferred Shelf Number&#160;TK5105.59 S758 2011<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Auditing IT infrastructures for compliance ent://SD_ILS/0/SD_ILS:271151 2024-11-15T07:08:23Z 2024-11-15T07:08:23Z Author&#160;Weiss, Martin M.&#160;Solomon, Michael G.<br/>Preferred Shelf Number&#160;QA76.9.A25 W428 2011<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> System forensics, investigation, and response ent://SD_ILS/0/SD_ILS:271533 2024-11-15T07:08:23Z 2024-11-15T07:08:23Z Author&#160;Vacca, John R.&#160;Rudolph, K.<br/>Preferred Shelf Number&#160;HV8079.C65 V32 2011<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Security policies and implementation issues ent://SD_ILS/0/SD_ILS:271534 2024-11-15T07:08:23Z 2024-11-15T07:08:23Z Author&#160;Johnson, Rob (Robert)&#160;Merkow, Mark S.<br/>Preferred Shelf Number&#160;QA76.9.A25 J64 2011<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Security strategies in Web applications and social networking ent://SD_ILS/0/SD_ILS:271538 2024-11-15T07:08:23Z 2024-11-15T07:08:23Z Author&#160;Harwood, Mike.<br/>Preferred Shelf Number&#160;HM742 H38 2011<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Security strategies in Linux platforms and applications ent://SD_ILS/0/SD_ILS:271539 2024-11-15T07:08:23Z 2024-11-15T07:08:23Z Author&#160;Jang, Michael H.<br/>Preferred Shelf Number&#160;QA76.76.O63 J3638 2011<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Web s&#305;zma testleri el kitab&#305; ent://SD_ILS/0/SD_ILS:479521 2024-11-15T07:08:23Z 2024-11-15T07:08:23Z Author&#160;Aky&#305;ld&#305;z, M. Alparslan.&#160;Saner, Do&#287;ukan.<br/>Preferred Shelf Number&#160;QA76.9 A39 2020<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Microwave and millimeter-wave remote sensing for security applications ent://SD_ILS/0/SD_ILS:269586 2024-11-15T07:08:23Z 2024-11-15T07:08:23Z Author&#160;Nanzer, Jeffrey A. (Jeffrey Allan)<br/>Preferred Shelf Number&#160;TH9730 N369 2012<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Handbook of loss prevention and crime prevention ent://SD_ILS/0/SD_ILS:270043 2024-11-15T07:08:23Z 2024-11-15T07:08:23Z Author&#160;Fennelly, Lawrence J., 1940-<br/>Preferred Shelf Number&#160;HV8290 H345 2012<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> &#304;z b&#305;rakmadan : dijital ayakizlerinizi silip s&#305;rra kadem basman&#305;n yollar&#305; ent://SD_ILS/0/SD_ILS:362318 2024-11-15T07:08:23Z 2024-11-15T07:08:23Z Author&#160;Ahearn, Frank M.&#160;Horan, Elieen C.&#160;Pardo, Avi.<br/>Preferred Shelf Number&#160;BF575.S35 A28 2012<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> G&uuml;venlik hizmetlerinde &ccedil;a&#287;da&#351; yakla&#351;&#305;mlar ent://SD_ILS/0/SD_ILS:135399 2024-11-15T07:08:23Z 2024-11-15T07:08:23Z Author&#160;G&uuml;l, Serdar Kenan.&#160;Karakaya, Muhittin.<br/>Preferred Shelf Number&#160;UA810 .G8 2011<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~2<br/> The handbook of technology management ent://SD_ILS/0/SD_ILS:134517 2024-11-15T07:08:23Z 2024-11-15T07:08:23Z Author&#160;Bidgoli, Hossein.<br/>Preferred Shelf Number&#160;HD45 .H294 2010 V.1<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~3<br/> &Ouml;zel g&uuml;venlik tedbirleri ent://SD_ILS/0/SD_ILS:114430 2024-11-15T07:08:23Z 2024-11-15T07:08:23Z Author&#160;&Uuml;nsal, Faruk&#160;&#304;peko&#287;lu, Murat.<br/>Preferred Shelf Number&#160;HV8291.T9 U573 2005<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Principles of secure communication systems ent://SD_ILS/0/SD_ILS:86272 2024-11-15T07:08:23Z 2024-11-15T07:08:23Z Author&#160;Torrieri, Don J.<br/>Preferred Shelf Number&#160;TK 5102.5 T625 1992<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/>