Arama Sonuçları 2 - Daraltılmış: Computer security.SirsiDynix Enterprisehttps://katalog.hacettepe.edu.tr/client/tr_TR/default_tr/default_tr/qu$003d2$0026qf$003dSUBJECT$002509Subject$002509Computer$002bsecurity.$002509Computer$002bsecurity.$0026ic$003dtrue$0026ps$003d300$0026isd$003dtrue?dt=list2026-01-08T08:38:55ZSnort 2.1 intrusion detectionent://SD_ILS/0/SD_ILS:2539892026-01-08T08:38:55Z2026-01-08T08:38:55ZYazar Beale, Jay. Alder, Raven.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836043">http://www.sciencedirect.com/science/book/9781931836043</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Snort 2.0 intrusion detectionent://SD_ILS/0/SD_ILS:2540052026-01-08T08:38:55Z2026-01-08T08:38:55ZYazar Beale, Jay. Foster, James C.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836746">http://www.sciencedirect.com/science/book/9781931836746</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Official (ISC)2 guide to the CSSLPent://SD_ILS/0/SD_ILS:5417542026-01-08T08:38:55Z2026-01-08T08:38:55ZYazar Paul, Mano., author.<br/>Yer Numarası QA76.76 .D47 P3775 2011<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9781439826065">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>IT Convergence and Security 2017 Volume 2ent://SD_ILS/0/SD_ILS:4021182026-01-08T08:38:55Z2026-01-08T08:38:55ZYazar Kim, Kuinam J. editor. Kim, Hyuncheol. editor. Baek, Nakhoon. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-981-10-6454-8">https://doi.org/10.1007/978-981-10-6454-8</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Google hacking for penetration testers. Volume 2ent://SD_ILS/0/SD_ILS:1480292026-01-08T08:38:55Z2026-01-08T08:38:55ZYazar Long, Johnny.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491761">http://www.sciencedirect.com/science/book/9781597491761</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Securing IM and P2P applications for the enterpriseent://SD_ILS/0/SD_ILS:2539392026-01-08T08:38:55Z2026-01-08T08:38:55ZYazar Piccard, Paul L. Sachs, Marcus H.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490177">http://www.sciencedirect.com/science/book/9781597490177</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Hacking exposed Web 2.0 Web 2.0 security secrets and solutionsent://SD_ILS/0/SD_ILS:2933522026-01-08T08:38:55Z2026-01-08T08:38:55ZYazar Cannings, Rich. Dwivedi, Himanshu. Lackey, Zane.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://mhebooklibrary.com/reader/hacking-exposed-web-20-security-secrets-solutions">Subscription required</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Official (ISC)2 guide to the ISSMP CBKent://SD_ILS/0/SD_ILS:5443752026-01-08T08:38:55Z2026-01-08T08:38:55ZYazar Tipton, Harold F.<br/>Yer Numarası QA76.9 .A25 O34 2011<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9781420094442">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>Security Issues in Communication Devices, Networks and Computing Models. Volume 2ent://SD_ILS/0/SD_ILS:5804492026-01-08T08:38:55Z2026-01-08T08:38:55ZYazar Kumar, Budati Anil editor Ramakrishna, Akella editor Makkena, Goutham editor Ghinea, Gheorghita, editor.<br/>Yer Numarası QA76.9 .A25<br/>Elektronik Erişim Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003591788">https://www.taylorfrancis.com/books/9781003591788</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Development of Transport by Telematics 19th International Conference on Transport System Telematics, TST 2019, Jaworze, Poland, February 27 – March 2, 2019, Selected Papersent://SD_ILS/0/SD_ILS:4827292026-01-08T08:38:55Z2026-01-08T08:38:55ZYazar Mikulski, Jerzy. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-030-27547-1">https://doi.org/10.1007/978-3-030-27547-1</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Codes, Cryptology and Information Security Third International Conference, C2SI 2019, Rabat, Morocco, April 22–24, 2019, Proceedings - In Honor of Said El Hajjient://SD_ILS/0/SD_ILS:4834622026-01-08T08:38:55Z2026-01-08T08:38:55ZYazar Carlet, Claude. editor. Guilley, Sylvain. editor. (orcid)0000-0002-5044-3534 Nitaj, Abderrahmane. editor. (orcid)0000-0002-0372-1757 Souidi, El Mamoun. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-030-16458-4">https://doi.org/10.1007/978-3-030-16458-4</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Privacy and Identity Management. Fairness, Accountability, and Transparency in the Age of Big Data 13th IFIP WG 9.2, 9.6/11.7, 11.6/SIG 9.2.2 International Summer School, Vienna, Austria, August 20-24, 2018, Revised Selected Papersent://SD_ILS/0/SD_ILS:4867862026-01-08T08:38:55Z2026-01-08T08:38:55ZYazar Kosta, Eleni. editor. Pierson, Jo. editor. Slamanig, Daniel. editor. (orcid)0000-0002-4181-2561 Fischer-Hübner, Simone. editor. (orcid)0000-0002-6938-4466 Krenn, Stephan. editor.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-030-16744-8">https://doi.org/10.1007/978-3-030-16744-8</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Open Source Systems 15th IFIP WG 2.13 International Conference, OSS 2019, Montreal, QC, Canada, May 26–27, 2019, Proceedingsent://SD_ILS/0/SD_ILS:4831942026-01-08T08:38:55Z2026-01-08T08:38:55ZYazar Bordeleau, Francis. editor. Sillitti, Alberto. editor. Meirelles, Paulo. editor. (orcid)0000-0002-8923-2814 Lenarduzzi, Valentina. editor. (orcid)0000-0003-0511-5133 SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-030-20883-7">https://doi.org/10.1007/978-3-030-20883-7</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Recent Trends in Image Processing and Pattern Recognition Second International Conference, RTIP2R 2018, Solapur, India, December 21–22, 2018, Revised Selected Papers, Part IIIent://SD_ILS/0/SD_ILS:4832852026-01-08T08:38:55Z2026-01-08T08:38:55ZYazar Santosh, K. C. editor. Hegadi, Ravindra S. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-981-13-9187-3">https://doi.org/10.1007/978-981-13-9187-3</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Information Security Theory and Practice 12th IFIP WG 11.2 International Conference, WISTP 2018, Brussels, Belgium, December 10–11, 2018, Revised Selected Papersent://SD_ILS/0/SD_ILS:4845182026-01-08T08:38:55Z2026-01-08T08:38:55ZYazar Blazy, Olivier. editor. (orcid)0000-0001-6205-8249 Yeun, Chan Yeob. editor. (orcid)0000-0002-1398-952X SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-030-20074-9">https://doi.org/10.1007/978-3-030-20074-9</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Emerging Technologies in Computer Engineering: Microservices in Big Data Analytics Second International Conference, ICETCE 2019, Jaipur, India, February 1–2, 2019, Revised Selected Papersent://SD_ILS/0/SD_ILS:4868182026-01-08T08:38:55Z2026-01-08T08:38:55ZYazar Somani, Arun K. editor. Ramakrishna, Seeram. editor. (orcid)0000-0001-8479-8686 Chaudhary, Anil. editor. Choudhary, Chothmal. editor. Agarwal, Basant. editor.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-981-13-8300-7">https://doi.org/10.1007/978-981-13-8300-7</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Big Digital Forensic Data Volume 2: Quick Analysis for Evidence and Intelligenceent://SD_ILS/0/SD_ILS:3992512026-01-08T08:38:55Z2026-01-08T08:38:55ZYazar Quick, Darren. author. Choo, Kim-Kwang Raymond. author. (orcid)0000-0001-9208-5336 SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-981-13-0263-3">https://doi.org/10.1007/978-981-13-0263-3</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Proceedings of the 2nd Workshop on Communication Security Cryptography and Physical Layer Securityent://SD_ILS/0/SD_ILS:3995202026-01-08T08:38:55Z2026-01-08T08:38:55ZYazar Baldi, Marco. editor. (orcid)0000-0002-8754-5526 Quaglia, Elizabeth A. editor. Tomasin, Stefano. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-319-59265-7">https://doi.org/10.1007/978-3-319-59265-7</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Internet of Things, Smart Spaces, and Next Generation Networks and Systems 18th International Conference, NEW2AN 2018, and 11th Conference, ruSMART 2018, St. Petersburg, Russia, August 27–29, 2018, Proceedingsent://SD_ILS/0/SD_ILS:3998602026-01-08T08:38:55Z2026-01-08T08:38:55ZYazar Galinina, Olga. editor. (orcid)0000-0002-5386-1061 Andreev, Sergey. editor. (orcid)0000-0001-8223-3665 Balandin, Sergey. editor. (orcid)0000-0003-3238-4830 Koucheryavy, Yevgeni. editor. (orcid)0000-0003-3976-297X SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-030-01168-0">https://doi.org/10.1007/978-3-030-01168-0</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Financial Cryptography and Data Security 22nd International Conference, FC 2018, Nieuwpoort, Curaçao, February 26 – March 2, 2018, Revised Selected Papersent://SD_ILS/0/SD_ILS:3999572026-01-08T08:38:55Z2026-01-08T08:38:55ZYazar Meiklejohn, Sarah. editor. Sako, Kazue. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-662-58387-6">https://doi.org/10.1007/978-3-662-58387-6</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Advanced Monitoring in P2P Botnets A Dual Perspectiveent://SD_ILS/0/SD_ILS:4007672026-01-08T08:38:55Z2026-01-08T08:38:55ZYazar Karuppayah, Shankar. author. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-981-10-9050-9">https://doi.org/10.1007/978-981-10-9050-9</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Applied Cryptography and Network Security 16th International Conference, ACNS 2018, Leuven, Belgium, July 2-4, 2018, Proceedingsent://SD_ILS/0/SD_ILS:4014872026-01-08T08:38:55Z2026-01-08T08:38:55ZYazar Preneel, Bart. editor. (orcid)0000-0003-2005-9651 Vercauteren, Frederik. editor. (orcid)0000-0002-7208-9599 SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-319-93387-0">https://doi.org/10.1007/978-3-319-93387-0</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Privacy and Identity Management. The Smart Revolution 12th IFIP WG 9.2, 9.5, 9.6/11.7, 11.6/SIG 9.2.2 International Summer School, Ispra, Italy, September 4-8, 2017, Revised Selected Papersent://SD_ILS/0/SD_ILS:4014912026-01-08T08:38:55Z2026-01-08T08:38:55ZYazar Hansen, Marit. editor. Kosta, Eleni. editor. Nai-Fovino, Igor. editor. Fischer-Hübner, Simone. editor. (orcid)0000-0002-6938-4466 SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-319-92925-5">https://doi.org/10.1007/978-3-319-92925-5</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Digital Forensics and Cyber Crime 9th International Conference, ICDF2C 2017, Prague, Czech Republic, October 9-11, 2017, Proceedingsent://SD_ILS/0/SD_ILS:4019482026-01-08T08:38:55Z2026-01-08T08:38:55ZYazar Matoušek, Petr. editor. Schmiedecker, Martin. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-319-73697-6">https://doi.org/10.1007/978-3-319-73697-6</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Image and Signal Processing 8th International Conference, ICISP 2018, Cherbourg, France, July 2-4, 2018, Proceedingsent://SD_ILS/0/SD_ILS:4019962026-01-08T08:38:55Z2026-01-08T08:38:55ZYazar Mansouri, Alamin. editor. El Moataz, Abderrahim. editor. Nouboud, Fathallah. editor. Mammass, Driss. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-319-94211-7">https://doi.org/10.1007/978-3-319-94211-7</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Information Security Theory and Practice 11th IFIP WG 11.2 International Conference, WISTP 2017, Heraklion, Crete, Greece, September 28–29, 2017, Proceedingsent://SD_ILS/0/SD_ILS:4022152026-01-08T08:38:55Z2026-01-08T08:38:55ZYazar Hancke, Gerhard P. editor. Damiani, Ernesto. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-319-93524-9">https://doi.org/10.1007/978-3-319-93524-9</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Trust, Privacy, and Security in Digital Business 11th International Conference, TrustBus 2014, Munich, Germany, September 2-3, 2014. Proceedingsent://SD_ILS/0/SD_ILS:4889472026-01-08T08:38:55Z2026-01-08T08:38:55ZYazar Eckert, Claudia. editor. Katsikas, Sokratis K. editor. Pernul, Günther. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-319-09770-1">https://doi.org/10.1007/978-3-319-09770-1</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Service-Oriented and Cloud Computing Third European Conference, ESOCC 2014, Manchester, UK, September 2-4, 2014, Proceedingsent://SD_ILS/0/SD_ILS:4890002026-01-08T08:38:55Z2026-01-08T08:38:55ZYazar Villari, Massimo. editor. Zimmermann, Wolf. editor. Lau, Kung-Kiu. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-662-44879-3">https://doi.org/10.1007/978-3-662-44879-3</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Privacy and Identity Management for Emerging Services and Technologies 8th IFIP WG 9.2, 9.5, 9.6/11.7, 11.4, 11.6 International Summer School, Nijmegen, The Netherlands, June 17-21, 2013, Revised Selected Papersent://SD_ILS/0/SD_ILS:4890602026-01-08T08:38:55Z2026-01-08T08:38:55ZYazar Hansen, Marit. editor. Hoepman, Jaap-Henk. editor. Leenes, Ronald. editor. Whitehouse, Diane. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-642-55137-6">https://doi.org/10.1007/978-3-642-55137-6</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>ICT Systems Security and Privacy Protection 29th IFIP TC 11 International Conference, SEC 2014, Marrakech, Morocco, June 2-4, 2014, Proceedingsent://SD_ILS/0/SD_ILS:4892012026-01-08T08:38:55Z2026-01-08T08:38:55ZYazar Cuppens-Boulahia, Nora. editor. Cuppens, Frederic. editor. Jajodia, Sushil. editor. Abou El Kalam, Anas. editor. Sans, Thierry. editor.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-642-55415-5">https://doi.org/10.1007/978-3-642-55415-5</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Information Security Theory and Practice. Securing the Internet of Things 8th IFIP WG 11.2 International Workshop, WISTP 2014, Heraklion, Crete, Greece, June 30 - July 2, 2014, Proceedingsent://SD_ILS/0/SD_ILS:4895412026-01-08T08:38:55Z2026-01-08T08:38:55ZYazar Naccache, David. editor. Sauveron, Damien. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-662-43826-8">https://doi.org/10.1007/978-3-662-43826-8</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Trust and Trustworthy Computing 7th International Conference, TRUST 2014, Heraklion, Crete, Greece, June 30 -- July 2, 2014, Proceedingsent://SD_ILS/0/SD_ILS:4855942026-01-08T08:38:55Z2026-01-08T08:38:55ZYazar Holz, Thorsten. editor. (orcid)0000-0002-2783-1264 Ioannidis, Sotiris. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-319-08593-7">https://doi.org/10.1007/978-3-319-08593-7</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Digital Forensics and Cyber Crime Fifth International Conference, ICDF2C 2013, Moscow, Russia, September 26-27, 2013, Revised Selected Papersent://SD_ILS/0/SD_ILS:4885222026-01-08T08:38:55Z2026-01-08T08:38:55ZYazar Gladyshev, Pavel. editor. Marrington, Andrew. editor. Baggili, Ibrahim. editor. (orcid)0000-0002-9574-9537 SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-319-14289-0">https://doi.org/10.1007/978-3-319-14289-0</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Trusted Computing Platforms TPM2.0 in Contextent://SD_ILS/0/SD_ILS:4886342026-01-08T08:38:55Z2026-01-08T08:38:55ZYazar Proudler, Graeme. author. Chen, Liqun. author. Dalton, Chris. author. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-319-08744-3">https://doi.org/10.1007/978-3-319-08744-3</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Information security policy development for compliance : ISO/IEC 27001, NIST SP 800-53, HIPAA standard, PCI DSS V2.0, and AUP V5.0ent://SD_ILS/0/SD_ILS:5451282026-01-08T08:38:55Z2026-01-08T08:38:55ZYazar Williams, Barry L., author.<br/>Yer Numarası QA76.9 .A25 .W5495 2013<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9781466580596">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>Next generation SSH2 implementation securing data in motionent://SD_ILS/0/SD_ILS:1462752026-01-08T08:38:55Z2026-01-08T08:38:55ZYazar Liu, Dale.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492836">http://www.sciencedirect.com/science/book/9781597492836</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>The healthy PC preventive care, home remedies, and green computingent://SD_ILS/0/SD_ILS:2934642026-01-08T08:38:55Z2026-01-08T08:38:55ZYazar Hart-Davis, Guy. Holzman, Carey. Healthy PC.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://mhebooklibrary.com/reader/healthy-pc-preventive-care-home-remedies-green-computing-2nd-edition">Subscription required</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>IT auditing using controls to protect information assetsent://SD_ILS/0/SD_ILS:2932622026-01-08T08:38:55Z2026-01-08T08:38:55ZYazar Davis, Chris (Christopher Michael) Schiller, Mike. Wheeler, Kevin.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://mhebooklibrary.com/reader/auditing-using-controls-to-protect-information-assets-2nd-edition">Subscription required</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>EXPERT IN THE NEXT OFFICE managing operations & security in the era of cyberspace.ent://SD_ILS/0/SD_ILS:5695482026-01-08T08:38:55Z2026-01-08T08:38:55ZYazar Kabay, M. E.<br/>Yer Numarası HF5548.2<br/>Elektronik Erişim Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003354536">https://www.taylorfrancis.com/books/9781003354536</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Why CISOs failent://SD_ILS/0/SD_ILS:5772072026-01-08T08:38:55Z2026-01-08T08:38:55ZYazar Engel, Barak, author.<br/>Yer Numarası HD30.2<br/>Elektronik Erişim Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003302759">https://www.taylorfrancis.com/books/9781003302759</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>A’dan Z’ye siber güvenlikent://SD_ILS/0/SD_ILS:5243032026-01-08T08:38:55Z2026-01-08T08:38:55ZYazar Polat, A. Can. Karakaş, Burak.<br/>Yer Numarası QA76.9 P65 2023<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>The Security Hippie.ent://SD_ILS/0/SD_ILS:5875632026-01-08T08:38:55Z2026-01-08T08:38:55ZYazar Engel, Barak.<br/>Yer Numarası HD30.2<br/>Elektronik Erişim Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003133308">https://www.taylorfrancis.com/books/9781003133308</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Cybersecurity for coaches and therapists : a practical guide for protecting client dataent://SD_ILS/0/SD_ILS:5886642026-01-08T08:38:55Z2026-01-08T08:38:55ZYazar Fouracres, Alexandra J. S., author.<br/>Yer Numarası RC455.2 .M38 F88 2022 EB<br/>Elektronik Erişim Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003184805">https://www.taylorfrancis.com/books/9781003184805</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Türkiye’de ve dünyada siber güvenlikent://SD_ILS/0/SD_ILS:5149582026-01-08T08:38:55Z2026-01-08T08:38:55ZYazar Çeliktaş, Barış .<br/>Yer Numarası UG485 C45 2020<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>Uygulamalarla siber güvenliğe girişent://SD_ILS/0/SD_ILS:5101512026-01-08T08:38:55Z2026-01-08T08:38:55ZYazar Akyıldız, M. Alparslan.<br/>Yer Numarası TK5105.59.A39 U94 2020<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~2<br/>Advanced Information Systems Engineering 31st International Conference, CAiSE 2019, Rome, Italy, June 3–7, 2019, Proceedingsent://SD_ILS/0/SD_ILS:4826782026-01-08T08:38:55Z2026-01-08T08:38:55ZYazar Giorgini, Paolo. editor. (orcid)0000-0003-4152-9683 Weber, Barbara. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-030-21290-2">https://doi.org/10.1007/978-3-030-21290-2</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Practical Security Properties on Commodity Computing Platforms The uber eXtensible Micro-Hypervisor Frameworkent://SD_ILS/0/SD_ILS:4828682026-01-08T08:38:55Z2026-01-08T08:38:55ZYazar Vasudevan, Amit. author. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-030-25049-2">https://doi.org/10.1007/978-3-030-25049-2</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Advances in Knowledge Discovery and Data Mining 23rd Pacific-Asia Conference, PAKDD 2019, Macau, China, April 14-17, 2019, Proceedings, Part IIIent://SD_ILS/0/SD_ILS:4830342026-01-08T08:38:55Z2026-01-08T08:38:55ZYazar Yang, Qiang. editor. Zhou, Zhi-Hua. editor. Gong, Zhiguo. editor. Zhang, Min-Ling. editor. Huang, Sheng-Jun. editor.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-030-16142-2">https://doi.org/10.1007/978-3-030-16142-2</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Information Security Practice and Experience 15th International Conference, ISPEC 2019, Kuala Lumpur, Malaysia, November 26–28, 2019, Proceedingsent://SD_ILS/0/SD_ILS:4830992026-01-08T08:38:55Z2026-01-08T08:38:55ZYazar Heng, Swee-Huay. editor. (orcid)0000-0003-3627-2131 Lopez, Javier. editor. (orcid)0000-0001-8066-9991 SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-030-34339-2">https://doi.org/10.1007/978-3-030-34339-2</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Highlights of Practical Applications of Survivable Agents and Multi-Agent Systems. The PAAMS Collection International Workshops of PAAMS 2019, Ávila, Spain, June 26–28, 2019, Proceedingsent://SD_ILS/0/SD_ILS:4836542026-01-08T08:38:55Z2026-01-08T08:38:55ZYazar De La Prieta, Fernando. editor. (orcid)0000-0002-8239-5020 González-Briones, Alfonso. editor. Pawleski, Pawel. editor. Calvaresi, Davide. editor. (orcid)0000-0001-9816-7439 Del Val, Elena. editor.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-030-24299-2">https://doi.org/10.1007/978-3-030-24299-2</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>ECML PKDD 2018 Workshops Nemesis 2018, UrbReas 2018, SoGood 2018, IWAISe 2018, and Green Data Mining 2018, Dublin, Ireland, September 10-14, 2018, Proceedingsent://SD_ILS/0/SD_ILS:4869542026-01-08T08:38:55Z2026-01-08T08:38:55ZYazar Alzate, Carlos. editor. (orcid)0000-0003-2434-2534 Monreale, Anna. editor. (orcid)0000-0001-8541-0284 Assem, Haytham. editor. Bifet, Albert. editor. Buda, Teodora Sandra. editor.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-030-13453-2">https://doi.org/10.1007/978-3-030-13453-2</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Yeni başlayanlar için bilgi güvenliği ve uygulamalı hacking yöntemlerient://SD_ILS/0/SD_ILS:4231842026-01-08T08:38:55Z2026-01-08T08:38:55ZYazar Aslanbakan, Enes, yazar<br/>Yer Numarası QA76.9.A25 A75 2019<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>Ethical hacking : (hacking kursu)ent://SD_ILS/0/SD_ILS:4239502026-01-08T08:38:55Z2026-01-08T08:38:55ZYazar Usta, Gökhan.<br/>Yer Numarası QA76.9.A25 U88 2019<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>Trust Management XIII 13th IFIP WG 11.11 International Conference, IFIPTM 2019, Copenhagen, Denmark, July 17-19, 2019, Proceedingsent://SD_ILS/0/SD_ILS:4830092026-01-08T08:38:55Z2026-01-08T08:38:55ZYazar Meng, Weizhi. editor. (orcid)0000-0003-4384-5786 Cofta, Piotr. editor. Jensen, Christian Damsgaard. editor. Grandison, Tyrone. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-030-33716-2">https://doi.org/10.1007/978-3-030-33716-2</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Security and Safety Interplay of Intelligent Software Systems ESORICS 2018 International Workshops, ISSA 2018 and CSITS 2018, Barcelona, Spain, September 6–7, 2018, Revised Selected Papersent://SD_ILS/0/SD_ILS:4830242026-01-08T08:38:55Z2026-01-08T08:38:55ZYazar Hamid, Brahim. editor. Gallina, Barbara. editor. (orcid)0000-0002-6952-1053 Shabtai, Asaf. editor. (orcid)0000-0003-0630-4059 Elovici, Yuval. editor. Garcia-Alfaro, Joaquin. editor. (orcid)0000-0002-7453-4393<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-030-16874-2">https://doi.org/10.1007/978-3-030-16874-2</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Security and Privacy in New Computing Environments Second EAI International Conference, SPNCE 2019, Tianjin, China, April 13–14, 2019, Proceedingsent://SD_ILS/0/SD_ILS:4834962026-01-08T08:38:55Z2026-01-08T08:38:55ZYazar Li, Jin. editor. Liu, Zheli. editor. Peng, Hao. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-030-21373-2">https://doi.org/10.1007/978-3-030-21373-2</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Applied Cryptography and Network Security 17th International Conference, ACNS 2019, Bogota, Colombia, June 5–7, 2019, Proceedingsent://SD_ILS/0/SD_ILS:4835042026-01-08T08:38:55Z2026-01-08T08:38:55ZYazar Deng, Robert H. editor. (orcid)0000-0003-3491-8146 Gauthier-Umaña, Valérie. editor. (orcid)0000-0003-0909-7091 Ochoa, Martín. editor. (orcid)0000-0002-7816-5775 Yung, Moti. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-030-21568-2">https://doi.org/10.1007/978-3-030-21568-2</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Proceedings of International Ethical Hacking Conference 2018 eHaCON 2018, Kolkata, Indiaent://SD_ILS/0/SD_ILS:4864822026-01-08T08:38:55Z2026-01-08T08:38:55ZYazar Chakraborty, Mohuya. editor. Chakrabarti, Satyajit. editor. Balas, Valentina Emilia. editor. Mandal, J. K. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-981-13-1544-2">https://doi.org/10.1007/978-981-13-1544-2</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Developments in information security and cybernetic warsent://SD_ILS/0/SD_ILS:4821872026-01-08T08:38:55Z2026-01-08T08:38:55ZYazar Sarfraz, Muhammad, editor. IGI Global, publisher.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-8304-2">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-8304-2</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Trusted Computing and Information Security 12th Chinese Conference, CTCIS 2018, Wuhan, China, October 18, 2018, Revised Selected Papersent://SD_ILS/0/SD_ILS:4829822026-01-08T08:38:55Z2026-01-08T08:38:55ZYazar Zhang, Huanguo. editor. Zhao, Bo. editor. Yan, Fei. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-981-13-5913-2">https://doi.org/10.1007/978-981-13-5913-2</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Computer Security ESORICS 2018 International Workshops, CyberICPS 2018 and SECPRE 2018, Barcelona, Spain, September 6–7, 2018, Revised Selected Papersent://SD_ILS/0/SD_ILS:4833912026-01-08T08:38:55Z2026-01-08T08:38:55ZYazar Katsikas, Sokratis K. editor. (orcid)0000-0003-2966-9683 Cuppens, Frédéric. editor. Cuppens, Nora. editor. Lambrinoudakis, Costas. editor. (orcid)0000-0002-6575-9814 Antón, Annie. editor.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-030-12786-2">https://doi.org/10.1007/978-3-030-12786-2</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Smart Card Research and Advanced Applications 17th International Conference, CARDIS 2018, Montpellier, France, November 12–14, 2018, Revised Selected Papersent://SD_ILS/0/SD_ILS:4853242026-01-08T08:38:55Z2026-01-08T08:38:55ZYazar Bilgin, Begül. editor. Fischer, Jean-Bernard. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-030-15462-2">https://doi.org/10.1007/978-3-030-15462-2</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Innovative Security Solutions for Information Technology and Communications 11th International Conference, SecITC 2018, Bucharest, Romania, November 8–9, 2018, Revised Selected Papersent://SD_ILS/0/SD_ILS:4863522026-01-08T08:38:55Z2026-01-08T08:38:55ZYazar Lanet, Jean-Louis. editor. (orcid)0000-0002-4751-3941 Toma, Cristian. editor. (orcid)0000-0001-9316-7739 SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-030-12942-2">https://doi.org/10.1007/978-3-030-12942-2</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Advances in Human Factors in Cybersecurity Proceedings of the AHFE 2017 International Conference on Human Factors in Cybersecurity, July 17−21, 2017, The Westin Bonaventure Hotel, Los Angeles, California, USAent://SD_ILS/0/SD_ILS:3990392026-01-08T08:38:55Z2026-01-08T08:38:55ZYazar Nicholson, Denise. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-319-60585-2">https://doi.org/10.1007/978-3-319-60585-2</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>ICT Systems Security and Privacy Protection 33rd IFIP TC 11 International Conference, SEC 2018, Held at the 24th IFIP World Computer Congress, WCC 2018, Poznan, Poland, September 18-20, 2018, Proceedingsent://SD_ILS/0/SD_ILS:4000452026-01-08T08:38:55Z2026-01-08T08:38:55ZYazar Janczewski, Lech Jan. editor. (orcid)0000-0003-3319-924X Kutyłowski, Mirosław. editor. (orcid)0000-0003-3192-2430 SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-319-99828-2">https://doi.org/10.1007/978-3-319-99828-2</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Combinatorial Algorithms 29th International Workshop, IWOCA 2018, Singapore, July 16–19, 2018, Proceedingsent://SD_ILS/0/SD_ILS:4001582026-01-08T08:38:55Z2026-01-08T08:38:55ZYazar Iliopoulos, Costas. editor. Leong, Hon Wai. editor. Sung, Wing-Kin. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-319-94667-2">https://doi.org/10.1007/978-3-319-94667-2</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Mobile Ad-hoc and Sensor Networks 13th International Conference, MSN 2017, Beijing, China, December 17-20, 2017, Revised Selected Papersent://SD_ILS/0/SD_ILS:4008562026-01-08T08:38:55Z2026-01-08T08:38:55ZYazar Zhu, Liehuang. editor. Zhong, Sheng. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-981-10-8890-2">https://doi.org/10.1007/978-981-10-8890-2</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Cyber Security: Power and Technologyent://SD_ILS/0/SD_ILS:4010032026-01-08T08:38:55Z2026-01-08T08:38:55ZYazar Lehto, Martti. editor. Neittaanmäki, Pekka. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-319-75307-2">https://doi.org/10.1007/978-3-319-75307-2</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Information Systems Security and Privacy Third International Conference, ICISSP 2017, Porto, Portugal, February 19-21, 2017, Revised Selected Papersent://SD_ILS/0/SD_ILS:4014862026-01-08T08:38:55Z2026-01-08T08:38:55ZYazar Mori, Paolo. editor. Furnell, Steven. editor. (orcid)0000-0003-0984-7542 Camp, Olivier. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-319-93354-2">https://doi.org/10.1007/978-3-319-93354-2</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Geo-Spatial Knowledge and Intelligence 5th International Conference, GSKI 2017, Chiang Mai, Thailand, December 8-10, 2017, Revised Selected Papers, Part Ient://SD_ILS/0/SD_ILS:4015172026-01-08T08:38:55Z2026-01-08T08:38:55ZYazar Yuan, Hanning. editor. Geng, Jing. editor. Liu, Chuanlu. editor. Bian, Fuling. editor. Surapunt, Tisinee. editor.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-981-13-0893-2">https://doi.org/10.1007/978-981-13-0893-2</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Detection of Intrusions and Malware, and Vulnerability Assessment 15th International Conference, DIMVA 2018, Saclay, France, June 28–29, 2018, Proceedingsent://SD_ILS/0/SD_ILS:4016462026-01-08T08:38:55Z2026-01-08T08:38:55ZYazar Giuffrida, Cristiano. editor. Bardin, Sébastien. editor. Blanc, Gregory. editor. (orcid)0000-0001-8150-6617 SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-319-93411-2">https://doi.org/10.1007/978-3-319-93411-2</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Designing Usable and Secure Software with IRIS and CAIRISent://SD_ILS/0/SD_ILS:4018262026-01-08T08:38:55Z2026-01-08T08:38:55ZYazar Faily, Shamal. author. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-319-75493-2">https://doi.org/10.1007/978-3-319-75493-2</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Exploit geliştirme 101ent://SD_ILS/0/SD_ILS:3890772026-01-08T08:38:55Z2026-01-08T08:38:55ZYazar Akyıldız, M. Alparslan.<br/>Yer Numarası QA76.9.A25 A59 2018<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~2<br/>Modeling Decisions for Artificial Intelligence 15th International Conference, MDAI 2018, Mallorca, Spain, October 15–18, 2018, Proceedingsent://SD_ILS/0/SD_ILS:3991042026-01-08T08:38:55Z2026-01-08T08:38:55ZYazar Torra, Vicenç. editor. (orcid)0000-0002-0368-8037 Narukawa, Yasuo. editor. Aguiló, Isabel. editor. González-Hidalgo, Manuel. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-030-00202-2">https://doi.org/10.1007/978-3-030-00202-2</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Multi-Agent Systems and Agreement Technologies 15th European Conference, EUMAS 2017, and 5th International Conference, AT 2017, Evry, France, December 14-15, 2017, Revised Selected Papersent://SD_ILS/0/SD_ILS:3991132026-01-08T08:38:55Z2026-01-08T08:38:55ZYazar Belardinelli, Francesco. editor. (orcid)0000-0002-7768-1794 Argente, Estefanía. editor. (orcid)0000-0002-5431-3868 SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-030-01713-2">https://doi.org/10.1007/978-3-030-01713-2</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Smart Card Research and Advanced Applications 16th International Conference, CARDIS 2017, Lugano, Switzerland, November 13–15, 2017, Revised Selected Papersent://SD_ILS/0/SD_ILS:3995282026-01-08T08:38:55Z2026-01-08T08:38:55ZYazar Eisenbarth, Thomas. editor. (orcid)0000-0003-1116-6973 Teglia, Yannick. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-319-75208-2">https://doi.org/10.1007/978-3-319-75208-2</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Introduction to modern cryptographyent://SD_ILS/0/SD_ILS:3643152026-01-08T08:38:55Z2026-01-08T08:38:55ZYazar Katz, Jonathan, 1974- Lindell, Yehuda.<br/>Yer Numarası QA76.9.A25 K36 2015<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~2<br/>Hardware security : design, threats, and safeguardsent://SD_ILS/0/SD_ILS:5436202026-01-08T08:38:55Z2026-01-08T08:38:55ZYazar Mukhopadhyay, Debdeep, author. Subhra, Rajat, author.<br/>Yer Numarası QA76.9 .A25 M85 2015<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9781439895849">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>Cyber and electromagnetic threats in modern relay protectionent://SD_ILS/0/SD_ILS:5434462026-01-08T08:38:55Z2026-01-08T08:38:55ZYazar Gurevich, Vladimir, 1956, author.<br/>Yer Numarası TK2861 .G87 2015<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9781482264326">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>Network security essentials : applications and standardsent://SD_ILS/0/SD_ILS:3542322026-01-08T08:38:55Z2026-01-08T08:38:55ZYazar Stallings, William.<br/>Yer Numarası TK5105.59 S725 2014<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>Privacy in Statistical Databases UNESCO Chair in Data Privacy, International Conference, PSD 2014, Ibiza, Spain, September 17-19, 2014. Proceedingsent://SD_ILS/0/SD_ILS:4890252026-01-08T08:38:55Z2026-01-08T08:38:55ZYazar Domingo-Ferrer, Josep. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-319-11257-2">https://doi.org/10.1007/978-3-319-11257-2</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Security and Trust Management 10th International Workshop, STM 2014, Wroclaw, Poland, September 10-11, 2014, Proceedingsent://SD_ILS/0/SD_ILS:4890262026-01-08T08:38:55Z2026-01-08T08:38:55ZYazar Mauw, Sjouke. editor. Damsgaard Jensen, Christian. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-319-11851-2">https://doi.org/10.1007/978-3-319-11851-2</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Decision and Game Theory for Security 5th International Conference, GameSec 2014, Los Angeles, CA, USA, November 6-7, 2014, Proceedingsent://SD_ILS/0/SD_ILS:4890332026-01-08T08:38:55Z2026-01-08T08:38:55ZYazar Poovendran, Radha. editor. (orcid)0000-0003-0269-8097 Saad, Walid. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-319-12601-2">https://doi.org/10.1007/978-3-319-12601-2</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Digital-Forensics and Watermarking 12th International Workshop, IWDW 2013, Auckland, New Zealand, October 1-4, 2013. Revised Selected Papersent://SD_ILS/0/SD_ILS:4896032026-01-08T08:38:55Z2026-01-08T08:38:55ZYazar Shi, Yun Qing. editor. Kim, Hyoung-Joong. editor. Pérez-González, Fernando. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-662-43886-2">https://doi.org/10.1007/978-3-662-43886-2</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Cryptography and network security : principles and practiceent://SD_ILS/0/SD_ILS:3712882026-01-08T08:38:55Z2026-01-08T08:38:55ZYazar Stallings, William.<br/>Yer Numarası TK5105.59 S713 2014<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>E-Democracy, Security, Privacy and Trust in a Digital World 5th International Conference, E-Democracy 2013, Athens, Greece, December 5-6, 2013, Revised Selected Papersent://SD_ILS/0/SD_ILS:4867012026-01-08T08:38:55Z2026-01-08T08:38:55ZYazar Sideridis, Alexander B. editor. Kardasiadou, Zoe. editor. Yialouris, Constantine P. editor. Zorkadis, Vasilios. editor. (orcid)0000-0003-4399-2495 SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-319-11710-2">https://doi.org/10.1007/978-3-319-11710-2</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Recent Trends in Computer Networks and Distributed Systems Security Second International Conference, SNDS 2014, Trivandrum, India, March 13-14, 2014. Proceedingsent://SD_ILS/0/SD_ILS:4879662026-01-08T08:38:55Z2026-01-08T08:38:55ZYazar Martinez Perez, Gregorio. editor. Thampi, Sabu M. editor. Ko, Ryan. editor. Shu, Lei. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-642-54525-2">https://doi.org/10.1007/978-3-642-54525-2</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>The state of the art in intrusion prevention and detectionent://SD_ILS/0/SD_ILS:5436762026-01-08T08:38:55Z2026-01-08T08:38:55ZYazar Pathan, Al-Sakib Khan, editor.<br/>Yer Numarası QA76.9 .A25 S7354 2014<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9781482203523">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>Security without obscurity : a guide to confidentiality, authentication, and integrityent://SD_ILS/0/SD_ILS:5441182026-01-08T08:38:55Z2026-01-08T08:38:55ZYazar Stapleton, Jeffrey James, author.<br/>Yer Numarası QA76.9 .A25 S734 2014<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9781466592155">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>Security management : a critical thinking approachent://SD_ILS/0/SD_ILS:5397252026-01-08T08:38:55Z2026-01-08T08:38:55ZYazar Land, Michael (Industrial engineer), author. Ricks, Truett A., author. Ricks, Bob, author.<br/>Yer Numarası HD61.5 .L36 2014<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9781466561786">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>What every engineer should know about cyber security and digital forensicsent://SD_ILS/0/SD_ILS:5397262026-01-08T08:38:55Z2026-01-08T08:38:55ZYazar DeFranco, Joanna F., author.<br/>Yer Numarası TK5105.59 .D44 2014<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9781466564541">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>Network Science and Cybersecurityent://SD_ILS/0/SD_ILS:4847562026-01-08T08:38:55Z2026-01-08T08:38:55ZYazar Pino, Robinson E. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-1-4614-7597-2">https://doi.org/10.1007/978-1-4614-7597-2</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Secure and Trustworthy Service Composition The Aniketos Approachent://SD_ILS/0/SD_ILS:4858132026-01-08T08:38:55Z2026-01-08T08:38:55ZYazar Brucker, Achim. editor. Dalpiaz, Fabiano. editor. (orcid)0000-0003-4480-3887 Giorgini, Paolo. editor. Meland, Per Håkon. editor. Rios, Erkuden. editor.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-319-13518-2">https://doi.org/10.1007/978-3-319-13518-2</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Passive and Active Measurement 15th International Conference, PAM 2014, Los Angeles, CA, USA, March 10-11, 2014, Proceedingsent://SD_ILS/0/SD_ILS:4868742026-01-08T08:38:55Z2026-01-08T08:38:55ZYazar Faloutsos, Michalis. editor. Kuzmanovic, Aleksandar. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-319-04918-2">https://doi.org/10.1007/978-3-319-04918-2</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Trustworthy Global Computing 8th International Symposium, TGC 2013, Buenos Aires, Argentina, August 30-31, 2013, Revised Selected Papersent://SD_ILS/0/SD_ILS:4868862026-01-08T08:38:55Z2026-01-08T08:38:55ZYazar Abadi, Martín. editor. Lluch Lafuente, Alberto. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-319-05119-2">https://doi.org/10.1007/978-3-319-05119-2</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Advances in Information and Computer Security 9th International Workshop on Security, IWSEC 2014, Hirosaki, Japan, August 27-29, 2014. Proceedingsent://SD_ILS/0/SD_ILS:4873722026-01-08T08:38:55Z2026-01-08T08:38:55ZYazar Yoshida, Maki. editor. Mouri, Koichi. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-319-09843-2">https://doi.org/10.1007/978-3-319-09843-2</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Advances in Cryptology -- CRYPTO 2014 34th Annual Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2014, Proceedings, Part Ient://SD_ILS/0/SD_ILS:4890662026-01-08T08:38:55Z2026-01-08T08:38:55ZYazar Garay, Juan A. editor. Gennaro, Rosario. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-662-44371-2">https://doi.org/10.1007/978-3-662-44371-2</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Progress in Cryptology -- INDOCRYPT 2014 15th International Conference on Cryptology in India, New Delhi, India, December 14-17, 2014, Proceedingsent://SD_ILS/0/SD_ILS:4890682026-01-08T08:38:55Z2026-01-08T08:38:55ZYazar Meier, Willi. editor. Mukhopadhyay, Debdeep. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-319-13039-2">https://doi.org/10.1007/978-3-319-13039-2</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Elementary information securityent://SD_ILS/0/SD_ILS:2712722026-01-08T08:38:55Z2026-01-08T08:38:55ZYazar Smith, Richard E.<br/>Yer Numarası QA76.9.A25 S652 2013<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>Secret history : the story of cryptologyent://SD_ILS/0/SD_ILS:3652582026-01-08T08:38:55Z2026-01-08T08:38:55ZYazar Bauer, Craig P.<br/>Yer Numarası QA76.9.A25 B384 2013<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>Delivering London 2012 ICT implementation and operationsent://SD_ILS/0/SD_ILS:5098892026-01-08T08:38:55Z2026-01-08T08:38:55ZYazar IET, ed.<br/>Yer Numarası XX(509889.1)<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1049/PERICP2E">http://dx.doi.org/10.1049/PERICP2E</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>The complete book of data anonymization : from planning to implementationent://SD_ILS/0/SD_ILS:5401692026-01-08T08:38:55Z2026-01-08T08:38:55ZYazar Raghunathan, Balaji., author.<br/>Yer Numarası QA76.9 .A25 R338 2013<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9781439877319">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>PRAGMATIC security metrics : applying metametrics to information securityent://SD_ILS/0/SD_ILS:5417972026-01-08T08:38:55Z2026-01-08T08:38:55ZYazar Brotby, W. Krag., author. Hinson, Gary. Kabay, Michel E.<br/>Yer Numarası HD30.38 .B76 2013<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9781439881538">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>Security for wireless sensor networks using identity-based cryptographyent://SD_ILS/0/SD_ILS:5446122026-01-08T08:38:55Z2026-01-08T08:38:55ZYazar Patil, Harsh Kupwade., author. Szygenda, Stephen A.<br/>Yer Numarası QA76.9 .A25 P38 2013<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9781439869024">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>Discrete dynamical systems and chaotic machines : theory and applicationsent://SD_ILS/0/SD_ILS:5457152026-01-08T08:38:55Z2026-01-08T08:38:55ZYazar Bahi, Jacques Mohcine., author. Guyeux, Christophe.<br/>Yer Numarası QA76.9 .A25 B344 2013<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9781466554511">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>The complete guide to physical securityent://SD_ILS/0/SD_ILS:5459602026-01-08T08:38:55Z2026-01-08T08:38:55ZYazar Baker, Paul, 1958, author. Benny, Daniel J.<br/>Yer Numarası HV8290 .B34 2013<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9781420099645">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>Digital forensics for handheld devicesent://SD_ILS/0/SD_ILS:5414292026-01-08T08:38:55Z2026-01-08T08:38:55ZYazar Doherty, Eamon P., author.<br/>Yer Numarası HV8079 .C65 D64 2013<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9781439898789">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>Handbook of SCADA/control systems securityent://SD_ILS/0/SD_ILS:5478552026-01-08T08:38:55Z2026-01-08T08:38:55ZYazar Radvanovsky, Robert. Brodsky, Jacob.<br/>Yer Numarası TK5105.59 .H3532 2013<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9781466502277">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>Hacking exposed 7 : network security secrets & solutionsent://SD_ILS/0/SD_ILS:2700332026-01-08T08:38:55Z2026-01-08T08:38:55ZYazar McClure, Stuart. Scambray, Joel. Kurtz, George.<br/>Yer Numarası TK5105.59 M48 2012<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>Computer security : principles and practiceent://SD_ILS/0/SD_ILS:3134732026-01-08T08:38:55Z2026-01-08T08:38:55ZYazar Stallings, William. Brown, Lawrie<br/>Yer Numarası QA76.9 S73 2012<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>Computer architecture and security : fundamentals of designing secure computer systemsent://SD_ILS/0/SD_ILS:2488652026-01-08T08:38:55Z2026-01-08T08:38:55ZYazar Wang, Shuangbao Paul. Ledley, Robert Steven.<br/>Yer Numarası QA76.9.A73 W36 2012<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>RC4 stream cipher and its variantsent://SD_ILS/0/SD_ILS:5387542026-01-08T08:38:55Z2026-01-08T08:38:55ZYazar Paul, Goutam., author. Maitra, Subhamoy, 1970-<br/>Yer Numarası QA76.9 .A25 P385 2012<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9781439831373">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>Cybersecurity for industrial control systems : SCADA, DCS, PLC, HMI, and SISent://SD_ILS/0/SD_ILS:5431192026-01-08T08:38:55Z2026-01-08T08:38:55ZYazar Macaulay, Tyson., author. Singer, Bryan.<br/>Yer Numarası TS156.8 .M328 2012<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9781439801987">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>The 7 qualities of highly secure softwareent://SD_ILS/0/SD_ILS:5449512026-01-08T08:38:55Z2026-01-08T08:38:55ZYazar Paul, Mano., author.<br/>Yer Numarası QA76.9 .A25 P38 2012<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9781439814475">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>Network and application security fundamentals and practicesent://SD_ILS/0/SD_ILS:5416272026-01-08T08:38:55Z2026-01-08T08:38:55ZYazar Ganguly, Debashis., author. Lahiri, Shibamouli.<br/>Yer Numarası TK5105.59 .G36 2012<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9781466502451">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>Data mining tools for malware detectionent://SD_ILS/0/SD_ILS:5457962026-01-08T08:38:55Z2026-01-08T08:38:55ZYazar Masud, Mehedy., author. Khan, Latifur. Thuraisingham, Bhavani M.<br/>Yer Numarası QA76.9 .D343 M385 2012<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9781439854556">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>Auditing IT infrastructures for complianceent://SD_ILS/0/SD_ILS:2711512026-01-08T08:38:55Z2026-01-08T08:38:55ZYazar Weiss, Martin M. Solomon, Michael G.<br/>Yer Numarası QA76.9.A25 W428 2011<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>Managing risk in information systemsent://SD_ILS/0/SD_ILS:2712512026-01-08T08:38:55Z2026-01-08T08:38:55ZYazar Gibson, Darril.<br/>Yer Numarası QA76.9.A25 G5 2011<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>Hacker techniques, tools, and incident handlingent://SD_ILS/0/SD_ILS:2714382026-01-08T08:38:55Z2026-01-08T08:38:55ZYazar Oriyano, Sean-Philip. Gregg, Michael (Michael C.)<br/>Yer Numarası TK5105.59 O786 2011<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>Security policies and implementation issuesent://SD_ILS/0/SD_ILS:2715342026-01-08T08:38:55Z2026-01-08T08:38:55ZYazar Johnson, Rob (Robert) Merkow, Mark S.<br/>Yer Numarası QA76.9.A25 J64 2011<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>Security strategies in Windows platforms and applicationsent://SD_ILS/0/SD_ILS:2715372026-01-08T08:38:55Z2026-01-08T08:38:55ZYazar Solomon, Michael.<br/>Yer Numarası QA76.76.O63 S64 2011<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>Security strategies in Linux platforms and applicationsent://SD_ILS/0/SD_ILS:2715392026-01-08T08:38:55Z2026-01-08T08:38:55ZYazar Jang, Michael H.<br/>Yer Numarası QA76.76.O63 J3638 2011<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>Security in computingent://SD_ILS/0/SD_ILS:3132972026-01-08T08:38:55Z2026-01-08T08:38:55ZYazar Pfleeger, Charles P., 1948-<br/>Yer Numarası QA76.9 A25 P45 2011<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>Social engineering : the art of human hackingent://SD_ILS/0/SD_ILS:3779762026-01-08T08:38:55Z2026-01-08T08:38:55ZYazar Hadnagy, Christopher.<br/>Yer Numarası QA76.9.C66 H33 2011<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>Data mining and machine learning in cybersecurityent://SD_ILS/0/SD_ILS:5406142026-01-08T08:38:55Z2026-01-08T08:38:55ZYazar Dua, Sumeet., author. Du, Xian.<br/>Yer Numarası QA76.9 .D343 D825 2011<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9781439839430">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>Adaptive security management architectureent://SD_ILS/0/SD_ILS:5418522026-01-08T08:38:55Z2026-01-08T08:38:55ZYazar Tiller, James S., author.<br/>Yer Numarası QA76.9 .A25 T55 2011<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9781420013375">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>Security patch managementent://SD_ILS/0/SD_ILS:5427632026-01-08T08:38:55Z2026-01-08T08:38:55ZYazar Nicastro, Felicia M., author.<br/>Yer Numarası QA76.9 .A25 N53 2011<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9781439825006">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>The security risk assessment handbook : a complete guide for performing security risk assessmentsent://SD_ILS/0/SD_ILS:5397432026-01-08T08:38:55Z2026-01-08T08:38:55ZYazar Landoll, Douglas J., author.<br/>Yer Numarası HF5548.37 .L358 2011<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9781439821497">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>Security and policy driven computingent://SD_ILS/0/SD_ILS:5397612026-01-08T08:38:55Z2026-01-08T08:38:55ZYazar Liu, Lei, 1968, author.<br/>Yer Numarası QA76.9 .A25 L587 2011<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9781439825808">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>Machine learning forensics for law enforcement, security, and intelligenceent://SD_ILS/0/SD_ILS:5447652026-01-08T08:38:55Z2026-01-08T08:38:55ZYazar Mena, Jesus., author.<br/>Yer Numarası HV8073 .M395 2011<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9781439860700">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>Honeypot : a new paradigm to information securityent://SD_ILS/0/SD_ILS:5455902026-01-08T08:38:55Z2026-01-08T08:38:55ZYazar Joshi, R. C., author. Sardana, Anjali.<br/>Yer Numarası QA76.9 .A25 J66 2011<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9781439869994">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>Security de-engineering : solving the problems in information risk managementent://SD_ILS/0/SD_ILS:5456082026-01-08T08:38:55Z2026-01-08T08:38:55ZYazar Tibble, Ian., author.<br/>Yer Numarası HF5548.37 .T53 2011<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9781439868355">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>Seven deadliest social network attacksent://SD_ILS/0/SD_ILS:1491452026-01-08T08:38:55Z2026-01-08T08:38:55ZYazar Timm, Carl. Perez, Richard, 1969 Oct. 17- Ely, Adam.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495455">http://www.sciencedirect.com/science/book/9781597495455</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>The executive MBA in information securityent://SD_ILS/0/SD_ILS:5399482026-01-08T08:38:55Z2026-01-08T08:38:55ZYazar Trinckes, John J., author.<br/>Yer Numarası HF5548.37 .T75 2010<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9781439810088">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>Vulnerability managementent://SD_ILS/0/SD_ILS:5456982026-01-08T08:38:55Z2026-01-08T08:38:55ZYazar Foreman, Park., author.<br/>Yer Numarası QA76.9 .A25 F656 2010<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9781439801512">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>Risk analysis and security countermeasure selectionent://SD_ILS/0/SD_ILS:5394022026-01-08T08:38:55Z2026-01-08T08:38:55ZYazar Norman, Thomas L., author.<br/>Yer Numarası HV8290 .N67 2010<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9781420078718">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>Cryptanalysis of RSA and its variantsent://SD_ILS/0/SD_ILS:5420782026-01-08T08:38:55Z2026-01-08T08:38:55ZYazar Hinek, M. Jason., author.<br/>Yer Numarası TK5102.94 .H56 2010<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9781420075199">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>Secure and resilient software developmentent://SD_ILS/0/SD_ILS:5450972026-01-08T08:38:55Z2026-01-08T08:38:55ZYazar Merkow, Mark S., author. Raghavan, Lakshmikanth.<br/>Yer Numarası QA76.76 .D47 M466 2010<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9781439826973">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>Computer forensics and cyber crime : an introductionent://SD_ILS/0/SD_ILS:1340362026-01-08T08:38:55Z2026-01-08T08:38:55ZYazar Britz, Marjie.<br/>Yer Numarası QA76.9.A25 B77 2009<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>Architecting secure software systemsent://SD_ILS/0/SD_ILS:5389622026-01-08T08:38:55Z2026-01-08T08:38:55ZYazar Talukder, Asoke K., author. Chaitanya, Manish.<br/>Yer Numarası QA76.9 .A25 T34 2009<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9781420087857">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>Security software development : assessing and managing security risksent://SD_ILS/0/SD_ILS:5438362026-01-08T08:38:55Z2026-01-08T08:38:55ZYazar Ashbaugh, Douglas A., author.<br/>Yer Numarası QA76.9 .A25 A8246 2009<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9781420063813">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>Data protection : governance, risk management, and complianceent://SD_ILS/0/SD_ILS:5439182026-01-08T08:38:55Z2026-01-08T08:38:55ZYazar Hill, David G. (David Gary), 1943, author.<br/>Yer Numarası QA76.9 .A25 H52 2009<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9781439806937">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>CISO soft skills : securing organizations impaired by employee politics, apathy, and intolerant perspectivesent://SD_ILS/0/SD_ILS:5441532026-01-08T08:38:55Z2026-01-08T08:38:55ZYazar Collette, Ronald D., author. Gentile, Michael. Gentile, Skye.<br/>Yer Numarası HF5548.37 .G462 2009<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9781420089110">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>Profiling hackers : the science of criminal profiling as applied to the world of hackingent://SD_ILS/0/SD_ILS:5459732026-01-08T08:38:55Z2026-01-08T08:38:55ZYazar Chiesa, Raoul, 1973, author. Ducci, Stefania. Ciappi, Silvio, 1965-<br/>Yer Numarası HV6773 .C477 2009<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9781420086942">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>Information security management metrics : a definitive guide to effective security monitoring and measurementent://SD_ILS/0/SD_ILS:5469522026-01-08T08:38:55Z2026-01-08T08:38:55ZYazar Brotby, W. Krag., author.<br/>Yer Numarası HD30.2 .B78 2009<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9781420052862">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>Information assurance architectureent://SD_ILS/0/SD_ILS:5398302026-01-08T08:38:55Z2026-01-08T08:38:55ZYazar Willett, Keith D., author.<br/>Yer Numarası QA76.9 .A25 W5487 2008<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9780849380686">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>Digital privacy : theory, technologies, and practicesent://SD_ILS/0/SD_ILS:5477742026-01-08T08:38:55Z2026-01-08T08:38:55ZYazar Acquisti, Alessandro.<br/>Yer Numarası QA76.9 .A25 D528 2008<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9781420052183">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>Building an effective information security policy architectureent://SD_ILS/0/SD_ILS:5409852026-01-08T08:38:55Z2026-01-08T08:38:55ZYazar Bacik, Sandy., author.<br/>Yer Numarası QA76.9 .A25 B335 2008<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9781420059069">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>Insider computer fraud : an in-depth framework for detecting and defending against insider IT attacksent://SD_ILS/0/SD_ILS:5443962026-01-08T08:38:55Z2026-01-08T08:38:55ZYazar Brancik, Kenneth C., author.<br/>Yer Numarası QA76.9 .A25 B725 2008<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9781420046601">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>Grid computing securityent://SD_ILS/0/SD_ILS:2487472026-01-08T08:38:55Z2026-01-08T08:38:55ZYazar Chakrabarti, Anirban.<br/>Yer Numarası QA76.9.C58 C53 2007<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>Data warehousing and data mining techniques for cyber securityent://SD_ILS/0/SD_ILS:1104342026-01-08T08:38:55Z2026-01-08T08:38:55ZYazar Singhal, Anoop, 1958-<br/>Yer Numarası QA76.9.A25 S563 2007<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>Security in computingent://SD_ILS/0/SD_ILS:1106822026-01-08T08:38:55Z2026-01-08T08:38:55ZYazar Pfleeger, Charles P., 1948-<br/>Yer Numarası QA76.9.A25 P45 2007<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>Mechanics of user identification and authentication : fundamentals of identity managementent://SD_ILS/0/SD_ILS:5399402026-01-08T08:38:55Z2026-01-08T08:38:55ZYazar Todorov, Dobromir., author.<br/>Yer Numarası TK5105.59 .T575 2007<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9781420052206">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>Testing code securityent://SD_ILS/0/SD_ILS:5461672026-01-08T08:38:55Z2026-01-08T08:38:55ZYazar Van der Linden, Maura A., author.<br/>Yer Numarası QA76.9 .A25 V359 2007<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9781420013795">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>Data-driven block ciphers for fast telecommunication systemsent://SD_ILS/0/SD_ILS:5469482026-01-08T08:38:55Z2026-01-08T08:38:55ZYazar Moldovyan, Nick., author. Moldovyan, Alex.<br/>Yer Numarası QA76.9 .A25 M664 2007<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9781420054125">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>Software deployment, updating, and patchingent://SD_ILS/0/SD_ILS:5449662026-01-08T08:38:55Z2026-01-08T08:38:55ZYazar Stackpole, Bill., author. Hanrion, Patrick.<br/>Yer Numarası QA76.76 .C69 S74 2007<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9781420013290">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>Information security : design, implementation, measurement, and complianceent://SD_ILS/0/SD_ILS:5458392026-01-08T08:38:55Z2026-01-08T08:38:55ZYazar Layton, Timothy P., author.<br/>Yer Numarası HF5548.37 .L393 2007<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9781420013412">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>Intelligence and security informatics for international security : information sharing and data miningent://SD_ILS/0/SD_ILS:1197862026-01-08T08:38:55Z2026-01-08T08:38:55ZYazar Chen, Hsinchun.<br/>Yer Numarası QA76.76.E95 C44 2006<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>Bilgi ve bilgisayar güvenliği : casus yazılımlar ve korunma yöntemlerient://SD_ILS/0/SD_ILS:5154692026-01-08T08:38:55Z2026-01-08T08:38:55ZYazar Canbek, Gürol. Sağıroğlu, Şeref.<br/>Yer Numarası QA76.9.A25 C36 2006<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>Computer security fundamentalsent://SD_ILS/0/SD_ILS:1086202026-01-08T08:38:55Z2026-01-08T08:38:55ZYazar Easttom, Chuck.<br/>Yer Numarası QA76.9.A25 E325 2006<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>Information security : principles and practiceent://SD_ILS/0/SD_ILS:1094772026-01-08T08:38:55Z2026-01-08T08:38:55ZYazar Stamp, Mark.<br/>Yer Numarası QA76.9.A25 S69 2006<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>Linux Patch Management : keeping Linux systems up to dateent://SD_ILS/0/SD_ILS:1195502026-01-08T08:38:55Z2026-01-08T08:38:55ZYazar Jang, Michael H.<br/>Yer Numarası QA76.76.O63 J368 2006<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>Information security architecture : an integrated approach to security in the organizationent://SD_ILS/0/SD_ILS:1108652026-01-08T08:38:55Z2026-01-08T08:38:55ZYazar Tudor, Jan Killmeyer.<br/>Yer Numarası QA76.9.A25 T83 2006<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>Information security architecture : an integrated approach to security in the organizationent://SD_ILS/0/SD_ILS:5412382026-01-08T08:38:55Z2026-01-08T08:38:55ZYazar Tudor, Jan Killmeyer., author.<br/>Yer Numarası QA76.9 .A25 T83 2006<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9780203488751">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>Enhancing computer security with smart technologyent://SD_ILS/0/SD_ILS:5448232026-01-08T08:38:55Z2026-01-08T08:38:55ZYazar Vemuri, V. Rao.<br/>Yer Numarası TK5105.59 .E62 2005<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9781420031225">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>The CISO handbook : a practical guide to securing your companyent://SD_ILS/0/SD_ILS:5392042026-01-08T08:38:55Z2026-01-08T08:38:55ZYazar Gentile, Michael., author. Collette, Ronald D. August, Thomas D.<br/>Yer Numarası HF5548.37 .G46 2006<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9781420031379">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>The security risk assessment handbook : a complete guide for performing security risk assessmentsent://SD_ILS/0/SD_ILS:5451672026-01-08T08:38:55Z2026-01-08T08:38:55ZYazar Landoll, Douglas J., author.<br/>Yer Numarası HF5548.37 .L358 2006<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9781420031232">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>Enhanced methods in computer security, biometric and artificial intelligence systemsent://SD_ILS/0/SD_ILS:1098642026-01-08T08:38:55Z2026-01-08T08:38:55ZYazar Pejas, Jerzy, 1954-, ed. Piegat, Andrzej, 1947-, ed.<br/>Yer Numarası QA76.9.A25 E545 2005<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>Assessing and managing security risk in IT systems : a structured methodologyent://SD_ILS/0/SD_ILS:5422502026-01-08T08:38:55Z2026-01-08T08:38:55ZYazar McCumber, John, 1956, author.<br/>Yer Numarası QA76.9 .A25 M4284 2005<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9781135488970">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>Curing the patch management headacheent://SD_ILS/0/SD_ILS:5438152026-01-08T08:38:55Z2026-01-08T08:38:55ZYazar Nicastro, Felicia M., author.<br/>Yer Numarası QA76.9 .A25 N526 2005<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9781420031294">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>Database and applications security : integrating information security and data managementent://SD_ILS/0/SD_ILS:5402202026-01-08T08:38:55Z2026-01-08T08:38:55ZYazar Thuraisingham, Bhavani M., author.<br/>Yer Numarası QA76.9 .D314 T47 2005<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9780203486061">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>Information security risk analysisent://SD_ILS/0/SD_ILS:5448212026-01-08T08:38:55Z2026-01-08T08:38:55ZYazar Peltier, Thomas R., author.<br/>Yer Numarası QA76.9 .A25 P429 2005<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9781420031195">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>Information security fundamentalsent://SD_ILS/0/SD_ILS:5452262026-01-08T08:38:55Z2026-01-08T08:38:55ZYazar Peltier, Thomas R., author. Peltier, Justin. Blackley, John A.<br/>Yer Numarası QA76.9 .A25 P427 2005<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9781135493738">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>A practical guide to security assessmentsent://SD_ILS/0/SD_ILS:5452772026-01-08T08:38:55Z2026-01-08T08:38:55ZYazar Kairab, Sudhanshu., author.<br/>Yer Numarası HF5548.32 .K345 2005<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9781135500313">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>Codes : the guide to secrecy from ancient to modern timesent://SD_ILS/0/SD_ILS:5460622026-01-08T08:38:55Z2026-01-08T08:38:55ZYazar Mollin, Richard A., 1947, author.<br/>Yer Numarası QA76.9 .A25 M67 2005<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9781420035087">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>Malware : fighting malicious codeent://SD_ILS/0/SD_ILS:2677372026-01-08T08:38:55Z2026-01-08T08:38:55ZYazar Skoudis, Ed. Zeltser, Lenny.<br/>Yer Numarası QA76.9.A25 S58 2004<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>Secure architectures with OpenBSDent://SD_ILS/0/SD_ILS:1095062026-01-08T08:38:55Z2026-01-08T08:38:55ZYazar Palmer, Brandon. Nazario, Jose, ort. yaz.<br/>Yer Numarası QA76.76.O63 P335 2004<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>Hacking : Bilişim korsanlığı ve korunma yöntemlerient://SD_ILS/0/SD_ILS:885782026-01-08T08:38:55Z2026-01-08T08:38:55ZYazar Yılmaz, Davut.<br/>Yer Numarası TK 5105.59 Y56 2004<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>Exploiting software : how to break codeent://SD_ILS/0/SD_ILS:965562026-01-08T08:38:55Z2026-01-08T08:38:55ZYazar Hoglund, Greg. McGraw, Gary, 1966- ort. yaz.<br/>Yer Numarası QA 76.9.A25 H635 2004<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>İnternette güvenlik ve Hacker Cracker meselesi : el kitabıent://SD_ILS/0/SD_ILS:1041302026-01-08T08:38:55Z2026-01-08T08:38:55ZYazar Güven, Mehmet.<br/>Yer Numarası QA 76.9.A25 G88 2004<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~2<br/>How to break software security : effective technigues for security testingent://SD_ILS/0/SD_ILS:1055842026-01-08T08:38:55Z2026-01-08T08:38:55ZYazar Whittaker, James A., 1965- Thomson, Herbert H., ort. yaz.<br/>Yer Numarası QA 76.9.A25 W48 2004<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~2<br/>Investigator's guide to steganographyent://SD_ILS/0/SD_ILS:5412812026-01-08T08:38:55Z2026-01-08T08:38:55ZYazar Kipper, Gregory., author.<br/>Yer Numarası QA76.9 .A25 K544 2004<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9780203504765">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>Public key infrastructure : building trusted applications and Web servicesent://SD_ILS/0/SD_ILS:5432812026-01-08T08:38:55Z2026-01-08T08:38:55ZYazar Vacca, John R.<br/>Yer Numarası QA76.9 .A25 P85 2004<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9780203498156">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>Information security policies and procedures : a practitioner's referenceent://SD_ILS/0/SD_ILS:5472282026-01-08T08:38:55Z2026-01-08T08:38:55ZYazar Peltier, Thomas R., author.<br/>Yer Numarası QA76.9 .A25 P428 2004<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9780203488737">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>UMTS securityent://SD_ILS/0/SD_ILS:2958612026-01-08T08:38:55Z2026-01-08T08:38:55ZYazar Niemi, Valtteri. Nyberg, Kaisa, 1948-<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://www.contentreserve.com/TitleInfo.asp?ID={465C10B2-1465-4D2B-AAAD-DED651D62D3D}&Format=50">Click for information</a>
Wiley InterScience - Full text online <a href="http://onlinelibrary.wiley.com/book/10.1002/0470091584">http://onlinelibrary.wiley.com/book/10.1002/0470091584</a>
John Wiley <a href="http://dx.doi.org/10.1002/0470091584">http://dx.doi.org/10.1002/0470091584</a>
HathiTrust Digital Library, Limited view (search only) <a href="http://catalog.hathitrust.org/api/volumes/oclc/53183293.html">http://catalog.hathitrust.org/api/volumes/oclc/53183293.html</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Computer security : art and scienceent://SD_ILS/0/SD_ILS:3140212026-01-08T08:38:55Z2026-01-08T08:38:55ZYazar Bishop, Matt (Matthew A.)<br/>Yer Numarası QA76.9.A25 B56 2003<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>Computer security sourcebookent://SD_ILS/0/SD_ILS:946152026-01-08T08:38:55Z2026-01-08T08:38:55ZYazar Caldwell, Wilma, ed.<br/>Yer Numarası QA 76.9.A25 C658 2003<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>Information security policies, procedures, and standards : guidelines for effective information security managementent://SD_ILS/0/SD_ILS:5468172026-01-08T08:38:55Z2026-01-08T08:38:55ZYazar Peltier, Thomas R., author.<br/>Yer Numarası QA76.9 .A25 P46 2002<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9780849390326">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>A practical guide to security engineering and information assuranceent://SD_ILS/0/SD_ILS:5449732026-01-08T08:38:55Z2026-01-08T08:38:55ZYazar Herrmann, Debra S., author.<br/>Yer Numarası QA76.9 .A25 H47 2002<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9781420031492">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>Technology and privacy : the new landscapeent://SD_ILS/0/SD_ILS:1129992026-01-08T08:38:55Z2026-01-08T08:38:55ZYazar Agre, Philip. Rotenberg, Marc.<br/>Yer Numarası QA76.9.A25 T43 2001<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>GSM güvenlik mekanizmasının incelenmesi ve geliştirilmesient://SD_ILS/0/SD_ILS:742362026-01-08T08:38:55Z2026-01-08T08:38:55ZYazar Kasım, Başar.<br/>Yer Numarası TEZ/5165 K151 2001<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>Securing e-business applications and communicationsent://SD_ILS/0/SD_ILS:5458212026-01-08T08:38:55Z2026-01-08T08:38:55ZYazar Held, Jonathan S., author. Bowers, John R.<br/>Yer Numarası QA76.9 .A25 H435 2001<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9781420031553">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>Data privacy in the information ageent://SD_ILS/0/SD_ILS:1351252026-01-08T08:38:55Z2026-01-08T08:38:55ZYazar Klosek, Jacqueline.<br/>Yer Numarası QA76.9.A25 K57 2000<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>Applied cryptography : protocols, algorithms, and source code in Cent://SD_ILS/0/SD_ILS:1080142026-01-08T08:38:55Z2026-01-08T08:38:55ZYazar Schneier, Bruce.<br/>Yer Numarası QA76.9.A25 S35 1996<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>Auditing IT infrastructures for complianceent://SD_ILS/0/SD_ILS:2701642026-01-08T08:38:55Z2026-01-08T08:38:55ZYazar Weiss, Martin M. Solomon, Michael G.<br/>Yer Numarası QA76.9.A25 W428<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>