Search Results for Software Testing. - Narrowed by: Computer security. SirsiDynix Enterprise https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dSoftware$002bTesting.$0026qf$003dSUBJECT$002509Subject$002509Computer$002bsecurity.$002509Computer$002bsecurity.$0026ic$003dtrue$0026ps$003d300?dt=list 2026-03-22T08:35:00Z Secure and resilient software : requirements, test cases, and testing methods ent://SD_ILS/0/SD_ILS:540156 2026-03-22T08:35:00Z 2026-03-22T08:35:00Z Author&#160;Merkow, Mark S., author.&#160;Raghavan, Lakshmikanth.<br/>Preferred Shelf Number&#160;QA76.76 .T48 M47 2012<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781439866221">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> How to break software security : effective technigues for security testing ent://SD_ILS/0/SD_ILS:105584 2026-03-22T08:35:00Z 2026-03-22T08:35:00Z Author&#160;Whittaker, James A., 1965-&#160;Thomson, Herbert H., ort. yaz.<br/>Preferred Shelf Number&#160;QA 76.9.A25 W48 2004<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~2<br/> Quantum computing models for cybersecurity and wireless communications ent://SD_ILS/0/SD_ILS:599707 2026-03-22T08:35:00Z 2026-03-22T08:35:00Z Author&#160;Kumar, Budati Anil, edited.&#160;Kumar, Singamaneni Kranthi, edited.&#160;Li, Xingwang (Computer scientist), edited.<br/>Preferred Shelf Number&#160;QA76.9 .A25 Q36 2025<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394271429">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394271429</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Alice and Bob learn secure coding ent://SD_ILS/0/SD_ILS:599664 2026-03-22T08:35:00Z 2026-03-22T08:35:00Z Author&#160;Janca, Tanya. author.<br/>Preferred Shelf Number&#160;QA76.76 .D47<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394277179">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394277179</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Hands on hacking ent://SD_ILS/0/SD_ILS:596316 2026-03-22T08:35:00Z 2026-03-22T08:35:00Z Author&#160;Hickey, Matthew (Computer security expert), author.&#160;Arcuri, Jennifer, author.<br/>Preferred Shelf Number&#160;QA76.9 .A25 H53 2020 EB<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119561507">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119561507</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Hacking the hacker : learn from the experts who take down hackers ent://SD_ILS/0/SD_ILS:593636 2026-03-22T08:35:00Z 2026-03-22T08:35:00Z Author&#160;Grimes, Roger A., author.<br/>Preferred Shelf Number&#160;QA76.9 .A25<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119396260">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119396260</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Official (ISC)2 guide to the CSSLP ent://SD_ILS/0/SD_ILS:541754 2026-03-22T08:35:00Z 2026-03-22T08:35:00Z Author&#160;Paul, Mano., author.<br/>Preferred Shelf Number&#160;QA76.76 .D47 P3775 2011<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781439826065">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> The basics of hacking and penetration testing ethical hacking and penetration testing made easy ent://SD_ILS/0/SD_ILS:145199 2026-03-22T08:35:00Z 2026-03-22T08:35:00Z Author&#160;Engebretson, Pat (Patrick Henry), 1974-<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597496551">http://www.sciencedirect.com/science/book/9781597496551</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Secure and resilient software development ent://SD_ILS/0/SD_ILS:545097 2026-03-22T08:35:00Z 2026-03-22T08:35:00Z Author&#160;Merkow, Mark S., author.&#160;Raghavan, Lakshmikanth.<br/>Preferred Shelf Number&#160;QA76.76 .D47 M466 2010<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781439826973">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> Testing code security ent://SD_ILS/0/SD_ILS:546167 2026-03-22T08:35:00Z 2026-03-22T08:35:00Z Author&#160;Van der Linden, Maura A., author.<br/>Preferred Shelf Number&#160;QA76.9 .A25 V359 2007<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781420013795">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> Exploiting software : how to break code ent://SD_ILS/0/SD_ILS:96556 2026-03-22T08:35:00Z 2026-03-22T08:35:00Z Author&#160;Hoglund, Greg.&#160;McGraw, Gary, 1966- ort. yaz.<br/>Preferred Shelf Number&#160;QA 76.9.A25 H635 2004<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/>