Arama Sonuçları A. S. - Daraltılmış: Computer security.SirsiDynix Enterprisehttps://katalog.hacettepe.edu.tr/client/tr_TR/default_tr/default_tr/qu$003dA.$002bS.$0026qf$003dSUBJECT$002509Konu$002509Computer$002bsecurity.$002509Computer$002bsecurity.$0026te$003dILS$0026ps$003d300?dt=list2024-12-29T03:13:00ZWeb application security a beginner's guideent://SD_ILS/0/SD_ILS:2932412024-12-29T03:13:00Z2024-12-29T03:13:00ZYazar Sullivan, Bryan, 1974- Liu, Vincent.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://mhebooklibrary.com/reader/web-application-security-beginners-guide">Subscription required</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Virtualization and forensics a digital forensic investigator's guide to virtual environmentsent://SD_ILS/0/SD_ILS:3063302024-12-29T03:13:00Z2024-12-29T03:13:00ZYazar Barrett, Diane. Kipper, Gregory.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495578">http://www.sciencedirect.com/science/book/9781597495578</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Virtualization and forensics a digital forensic investigator's guide to virtual environmentsent://SD_ILS/0/SD_ILS:1467152024-12-29T03:13:00Z2024-12-29T03:13:00ZYazar Barrett, Diane. Kipper, Gregory.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495578">http://www.sciencedirect.com/science/book/9781597495578</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Information security policies and procedures a practitioner's referenceent://SD_ILS/0/SD_ILS:2901372024-12-29T03:13:00Z2024-12-29T03:13:00ZYazar Peltier, Thomas R.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://marc.crcnetbase.com/isbn/9780203488737">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>The Art of Modelling Computational Systems: A Journey from Logic and Concurrency to Security and Privacy Essays Dedicated to Catuscia Palamidessi on the Occasion of Her 60th Birthdayent://SD_ILS/0/SD_ILS:4868592024-12-29T03:13:00Z2024-12-29T03:13:00ZYazar Alvim, Mário S. editor. Chatzikokolakis, Kostas. editor. Olarte, Carlos. editor. Valencia, Frank. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-030-31175-9">https://doi.org/10.1007/978-3-030-31175-9</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Fundamentals of Sketch-Based Passwords A General Frameworkent://SD_ILS/0/SD_ILS:4873932024-12-29T03:13:00Z2024-12-29T03:13:00ZYazar Riggan, Benjamin S. author. Snyder, Wesley E. author. Wang, Cliff. author. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-319-13629-5">https://doi.org/10.1007/978-3-319-13629-5</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>A practical guide to security engineering and information assuranceent://SD_ILS/0/SD_ILS:2904612024-12-29T03:13:00Z2024-12-29T03:13:00ZYazar Herrmann, Debra S.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://marc.crcnetbase.com/isbn/9781420031492">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Cyber threat! : how to manage the growing risk of cyber attacksent://SD_ILS/0/SD_ILS:3420202024-12-29T03:13:00Z2024-12-29T03:13:00ZYazar Ulsch, N. MacDonnell, 1951-<br/>Yer Numarası ONLINE(342020.1)<br/>Elektronik Erişim ebrary <a href="http://alltitles.ebrary.com/Doc?id=10895757">An electronic book accessible through the World Wide Web; click to view</a>
Ebook Library <a href="http://public.eblib.com/choice/publicfullrecord.aspx?p=1742833">http://public.eblib.com/choice/publicfullrecord.aspx?p=1742833</a>
John Wiley <a href="http://dx.doi.org/10.1002/9781118915028">http://dx.doi.org/10.1002/9781118915028</a>
MyiLibrary <a href="http://www.myilibrary.com?id=629214">http://www.myilibrary.com?id=629214</a>
Cover <a href="http://swbplus.bsz-bw.de/bsz410564842cov.htm">http://swbplus.bsz-bw.de/bsz410564842cov.htm</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>The complete guide to physical securityent://SD_ILS/0/SD_ILS:2906672024-12-29T03:13:00Z2024-12-29T03:13:00ZYazar Baker, Paul, 1958- Benny, Daniel J.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://marc.crcnetbase.com/isbn/9781420099645">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Elementary information securityent://SD_ILS/0/SD_ILS:2712722024-12-29T03:13:00Z2024-12-29T03:13:00ZYazar Smith, Richard E.<br/>Yer Numarası QA76.9.A25 S652 2013<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>Security 2020 reduce security risks this decadeent://SD_ILS/0/SD_ILS:3189662024-12-29T03:13:00Z2024-12-29T03:13:00ZYazar Howard, Doug. Prince, Kevin.<br/>Yer Numarası ONLINE(318966.1)<br/>Elektronik Erişim Wiley InterScience <a href="http://dx.doi.org/10.1002/9781118255803">An electronic book accessible through the World Wide Web; click for information</a>
Books24x7 <a href="http://www.books24x7.com/marc.asp?bookid=40805">http://www.books24x7.com/marc.asp?bookid=40805</a>
Ebook Library <a href="http://public.eblib.com/choice/publicfullrecord.aspx?p=694289">http://public.eblib.com/choice/publicfullrecord.aspx?p=694289</a>
ebrary <a href="http://site.ebrary.com/id/10469690">http://site.ebrary.com/id/10469690</a>
MyiLibrary <a href="http://www.myilibrary.com?id=294413">http://www.myilibrary.com?id=294413</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Data warehousing and data mining techniques for cyber securityent://SD_ILS/0/SD_ILS:1104342024-12-29T03:13:00Z2024-12-29T03:13:00ZYazar Singhal, Anoop, 1958-<br/>Yer Numarası QA76.9.A25 S563 2007<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>Information security : principles and practiceent://SD_ILS/0/SD_ILS:1094772024-12-29T03:13:00Z2024-12-29T03:13:00ZYazar Stamp, Mark.<br/>Yer Numarası QA76.9.A25 S69 2006<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>Malware : fighting malicious codeent://SD_ILS/0/SD_ILS:2677372024-12-29T03:13:00Z2024-12-29T03:13:00ZYazar Skoudis, Ed. Zeltser, Lenny.<br/>Yer Numarası QA76.9.A25 S58 2004<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>Applied cryptography : protocols, algorithms, and source code in Cent://SD_ILS/0/SD_ILS:1080142024-12-29T03:13:00Z2024-12-29T03:13:00ZYazar Schneier, Bruce.<br/>Yer Numarası QA76.9.A25 S35 1996<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>