Arama Sonu&ccedil;lar&#305; ART. - Daralt&#305;lm&#305;&#351;: Computer security. SirsiDynix Enterprise https://katalog.hacettepe.edu.tr/client/tr_TR/default_tr/default_tr/qu$003dART.$0026qf$003dSUBJECT$002509Konu$002509Computer$002bsecurity.$002509Computer$002bsecurity.$0026ic$003dtrue$0026ps$003d300? 2026-01-21T19:13:48Z Computer security : art and science ent://SD_ILS/0/SD_ILS:314021 2026-01-21T19:13:48Z 2026-01-21T19:13:48Z Yazar&#160;Bishop, Matt (Matthew A.)<br/>Yer Numaras&#305;&#160;QA76.9.A25 B56 2003<br/>Format:&#160;Kitap<br/>Durum&#160;Beytepe K&uuml;t&uuml;phanesi~1<br/> Social engineering : the art of human hacking ent://SD_ILS/0/SD_ILS:377976 2026-01-21T19:13:48Z 2026-01-21T19:13:48Z Yazar&#160;Hadnagy, Christopher.<br/>Yer Numaras&#305;&#160;QA76.9.C66 H33 2011<br/>Format:&#160;Kitap<br/>Durum&#160;Beytepe K&uuml;t&uuml;phanesi~1<br/> Zen and the art of information security ent://SD_ILS/0/SD_ILS:112214 2026-01-21T19:13:48Z 2026-01-21T19:13:48Z Yazar&#160;Winkler, Ira.&#160;ScienceDirect (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491686">An electronic book accessible through the World Wide Web; click for information</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Zen and the art of information security ent://SD_ILS/0/SD_ILS:145680 2026-01-21T19:13:48Z 2026-01-21T19:13:48Z Yazar&#160;Winkler, Ira.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491686">http://www.sciencedirect.com/science/book/9781597491686</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> The art of cyber defense : from risk assessment to threat intelligence ent://SD_ILS/0/SD_ILS:586305 2026-01-21T19:13:48Z 2026-01-21T19:13:48Z Yazar&#160;Baddi, Youssef, editor.<br/>Yer Numaras&#305;&#160;QA76.9 .A25<br/>Elektronik Eri&#351;im&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781032714806">https://www.taylorfrancis.com/books/9781032714806</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> The Art of Modelling Computational Systems: A Journey from Logic and Concurrency to Security and Privacy Essays Dedicated to Catuscia Palamidessi on the Occasion of Her 60th Birthday ent://SD_ILS/0/SD_ILS:486859 2026-01-21T19:13:48Z 2026-01-21T19:13:48Z Yazar&#160;Alvim, M&aacute;rio S. editor.&#160;Chatzikokolakis, Kostas. editor.&#160;Olarte, Carlos. editor.&#160;Valencia, Frank. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-3-030-31175-9">https://doi.org/10.1007/978-3-030-31175-9</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> The state of the art in intrusion prevention and detection ent://SD_ILS/0/SD_ILS:543676 2026-01-21T19:13:48Z 2026-01-21T19:13:48Z Yazar&#160;Pathan, Al-Sakib Khan, editor.<br/>Yer Numaras&#305;&#160;QA76.9 .A25 S7354 2014<br/>Elektronik Eri&#351;im&#160;<a href="https://www.taylorfrancis.com/books/9781482203523">Click here to view.</a><br/>Format:&#160;Kitap<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Generative AI, cybersecurity, and ethics ent://SD_ILS/0/SD_ILS:599597 2026-01-21T19:13:48Z 2026-01-21T19:13:48Z Yazar&#160;Islam, Ray (Mohammad Rubyet), author.<br/>Yer Numaras&#305;&#160;QA76.9 .A25<br/>Elektronik Eri&#351;im&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394279326">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394279326</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Stepping through cybersecurity risk management : a systems thinking approach ent://SD_ILS/0/SD_ILS:599021 2026-01-21T19:13:48Z 2026-01-21T19:13:48Z Yazar&#160;Bayuk, Jennifer L., author.<br/>Yer Numaras&#305;&#160;QA76.9 .A25 B39 2024<br/>Elektronik Eri&#351;im&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394213986">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394213986</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Cyber security and network security ent://SD_ILS/0/SD_ILS:597484 2026-01-21T19:13:48Z 2026-01-21T19:13:48Z Yazar&#160;Pramanik, Sabyasachi, editor.&#160;Samanta, Debabrata, 1987- editor.&#160;Vinay, M., editor.&#160;Guha, Abhijit, editor.<br/>Yer Numaras&#305;&#160;QA76.9 .A25<br/>Elektronik Eri&#351;im&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119812555">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119812555</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Artificial intelligence and data mining approaches in security frameworks ent://SD_ILS/0/SD_ILS:596957 2026-01-21T19:13:48Z 2026-01-21T19:13:48Z Yazar&#160;Bhargava, Neeraj.&#160;Bhargava, Ritu.&#160;Rathore, Pramod Singh, 1988-&#160;Agrawal, Rashmi, 1978-<br/>Yer Numaras&#305;&#160;Q335<br/>Elektronik Eri&#351;im&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119760429">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119760429</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Hands on hacking ent://SD_ILS/0/SD_ILS:596316 2026-01-21T19:13:48Z 2026-01-21T19:13:48Z Yazar&#160;Hickey, Matthew (Computer security expert), author.&#160;Arcuri, Jennifer, author.<br/>Yer Numaras&#305;&#160;QA76.9 .A25 H53 2020 EB<br/>Elektronik Eri&#351;im&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119561507">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119561507</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Transformational security awareness : what neuroscientists, storytellers, and marketers can teach us about driving secure behaviors ent://SD_ILS/0/SD_ILS:595304 2026-01-21T19:13:48Z 2026-01-21T19:13:48Z Yazar&#160;Carpenter, Perry, author.<br/>Yer Numaras&#305;&#160;QA76.9 .A25 C37 2019 EB<br/>Elektronik Eri&#351;im&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119566380">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119566380</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> PRAGMATIC security metrics : applying metametrics to information security ent://SD_ILS/0/SD_ILS:541797 2026-01-21T19:13:48Z 2026-01-21T19:13:48Z Yazar&#160;Brotby, W. Krag., author.&#160;Hinson, Gary.&#160;Kabay, Michel E.<br/>Yer Numaras&#305;&#160;HD30.38 .B76 2013<br/>Elektronik Eri&#351;im&#160;<a href="https://www.taylorfrancis.com/books/9781439881538">Click here to view.</a><br/>Format:&#160;Kitap<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Insider computer fraud : an in-depth framework for detecting and defending against insider IT attacks ent://SD_ILS/0/SD_ILS:544396 2026-01-21T19:13:48Z 2026-01-21T19:13:48Z Yazar&#160;Brancik, Kenneth C., author.<br/>Yer Numaras&#305;&#160;QA76.9 .A25 B725 2008<br/>Elektronik Eri&#351;im&#160;<a href="https://www.taylorfrancis.com/books/9781420046601">Click here to view.</a><br/>Format:&#160;Kitap<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/>