Arama Sonu&ccedil;lar&#305; Bilgisayar G&uuml;venli&#287;i. - Daralt&#305;lm&#305;&#351;: B&#304;LG&#304;SAYAR G&Uuml;VENL&#304;&#286;&#304;. SirsiDynix Enterprise https://katalog.hacettepe.edu.tr/client/tr_TR/default_tr/default_tr/qu$003dBilgisayar$002bG$0025C3$0025BCvenli$0025C4$00259Fi.$0026qf$003dSUBJECT$002509Konu$002509B$0025C4$0025B0LG$0025C4$0025B0SAYAR$002bG$0025C3$00259CVENL$0025C4$0025B0$0025C4$00259E$0025C4$0025B0.$002509B$0025C4$0025B0LG$0025C4$0025B0SAYAR$002bG$0025C3$00259CVENL$0025C4$0025B0$0025C4$00259E$0025C4$0025B0.$0026ic$003dtrue$0026ps$003d300?dt=list 2024-11-29T03:08:09Z Exploiting software : how to break code ent://SD_ILS/0/SD_ILS:96556 2024-11-29T03:08:09Z 2024-11-29T03:08:09Z Yazar&#160;Hoglund, Greg.&#160;McGraw, Gary, 1966- ort. yaz.<br/>Yer Numaras&#305;&#160;QA 76.9.A25 H635 2004<br/>Format:&#160;Kitap<br/>Durum&#160;Beytepe K&uuml;t&uuml;phanesi~1<br/> Hacking : Bili&#351;im korsanl&#305;&#287;&#305; ve korunma y&ouml;ntemleri ent://SD_ILS/0/SD_ILS:88578 2024-11-29T03:08:09Z 2024-11-29T03:08:09Z Yazar&#160;Y&#305;lmaz, Davut.<br/>Yer Numaras&#305;&#160;TK 5105.59 Y56 2004<br/>Format:&#160;Kitap<br/>Durum&#160;Beytepe K&uuml;t&uuml;phanesi~1<br/> Computer security sourcebook ent://SD_ILS/0/SD_ILS:94615 2024-11-29T03:08:09Z 2024-11-29T03:08:09Z Yazar&#160;Caldwell, Wilma, ed.<br/>Yer Numaras&#305;&#160;QA 76.9.A25 C658 2003<br/>Format:&#160;Kitap<br/>Durum&#160;Beytepe K&uuml;t&uuml;phanesi~1<br/> GSM g&uuml;venlik mekanizmas&#305;n&#305;n incelenmesi ve geli&#351;tirilmesi ent://SD_ILS/0/SD_ILS:74236 2024-11-29T03:08:09Z 2024-11-29T03:08:09Z Yazar&#160;Kas&#305;m, Ba&#351;ar.<br/>Yer Numaras&#305;&#160;TEZ/5165 K151 2001<br/>Format:&#160;Kitap<br/>Durum&#160;Beytepe K&uuml;t&uuml;phanesi~1<br/> Yeni ekonomide ba&#351;ar&#305;n&#305;n anahtar&#305; : e-ticaret strateji ve y&ouml;ntemleri ent://SD_ILS/0/SD_ILS:67835 2024-11-29T03:08:09Z 2024-11-29T03:08:09Z Yazar&#160;Dolanbay, Co&#351;kun.<br/>Yer Numaras&#305;&#160;HF 5548.32 D685 2000<br/>Format:&#160;Kitap<br/>Durum&#160;Beytepe K&uuml;t&uuml;phanesi~2<br/> Security in computing ent://SD_ILS/0/SD_ILS:59768 2024-11-29T03:08:09Z 2024-11-29T03:08:09Z Yazar&#160;Pfleeger, Charles P., 1948-<br/>Yer Numaras&#305;&#160;QA 76.9.A25 P45 1997<br/>Format:&#160;Kitap<br/>Durum&#160;Beytepe K&uuml;t&uuml;phanesi~1<br/> Secure electronic commerce : building the infrastructure for digital signatures and encryption ent://SD_ILS/0/SD_ILS:61926 2024-11-29T03:08:09Z 2024-11-29T03:08:09Z Yazar&#160;Ford, Warwick.&#160;Baum, Michael S., ort. yaz.<br/>Yer Numaras&#305;&#160;QA 76.9.A25 F66 1997<br/>Format:&#160;Kitap<br/>Durum&#160;Beytepe K&uuml;t&uuml;phanesi~1<br/> Information warfare : chaos on the electronic superhighway ent://SD_ILS/0/SD_ILS:31599 2024-11-29T03:08:09Z 2024-11-29T03:08:09Z Yazar&#160;Schwartau, Winn.<br/>Yer Numaras&#305;&#160;QA 76.9.A25 S354 1994<br/>Format:&#160;Kitap<br/>Durum&#160;Beytepe K&uuml;t&uuml;phanesi~1<br/> Contemporary cryptology : the science of information integrity ent://SD_ILS/0/SD_ILS:58119 2024-11-29T03:08:09Z 2024-11-29T03:08:09Z Yazar&#160;Simmons, Gustavus J., ed.<br/>Yer Numaras&#305;&#160;QA 76.9.A25 C6678 1992<br/>Format:&#160;Kitap<br/>Durum&#160;Beytepe K&uuml;t&uuml;phanesi~1<br/> Computer security basic ent://SD_ILS/0/SD_ILS:41083 2024-11-29T03:08:09Z 2024-11-29T03:08:09Z Yazar&#160;Russell, Deborah.&#160;Gangemi, G. T., ort. yaz.<br/>Yer Numaras&#305;&#160;QA 76.9.A25 R87 1991<br/>Format:&#160;Kitap<br/>Durum&#160;Beytepe K&uuml;t&uuml;phanesi~1<br/> A handbook of computer security ent://SD_ILS/0/SD_ILS:32378 2024-11-29T03:08:09Z 2024-11-29T03:08:09Z Yazar&#160;Hearnden, K., ed. by<br/>Yer Numaras&#305;&#160;QA 76.9.A25 H191 1990<br/>Format:&#160;Kitap<br/>Durum&#160;Beytepe K&uuml;t&uuml;phanesi~1<br/> Computer security risk management ent://SD_ILS/0/SD_ILS:32379 2024-11-29T03:08:09Z 2024-11-29T03:08:09Z Yazar&#160;Palmer, Ian C.&#160;Potter, G. A., ort. yaz.<br/>Yer Numaras&#305;&#160;QA 76.9.A25 P182 1989<br/>Format:&#160;Kitap<br/>Durum&#160;Beytepe K&uuml;t&uuml;phanesi~1<br/>