Arama Sonuçları Bilgisayar güvenliği.SirsiDynix Enterprisehttps://katalog.hacettepe.edu.tr/client/tr_TR/default_tr/default_tr/qu$003dBilgisayar$002bg$0025C3$0025BCvenli$0025C4$00259Fi.$0026ps$003d300$0026isd$003dtrue?dt=list2024-11-25T11:50:26ZBilgisayar ağları ve güvenliğient://SD_ILS/0/SD_ILS:1065912024-11-25T11:50:26Z2024-11-25T11:50:26ZYazar Özbilen, Alper.<br/>Yer Numarası TK5105.5 .O994 2006<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>Bilgi ve bilgisayar güvenliği : casus yazılımlar ve korunma yöntemlerient://SD_ILS/0/SD_ILS:5154692024-11-25T11:50:26Z2024-11-25T11:50:26ZYazar Canbek, Gürol. Sağıroğlu, Şeref.<br/>Yer Numarası QA76.9.A25 C36 2006<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>Dijital güvenlik : dijital ortamlarda güvenle var olmakent://SD_ILS/0/SD_ILS:5171792024-11-25T11:50:26Z2024-11-25T11:50:26ZYazar Özer, Fatih. Şahin, Yusuf Levent, editör<br/>Yer Numarası QA76.9.E74 O94 2022<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>Ağ yönetimi ve bilgi güvenliğient://SD_ILS/0/SD_ILS:5162752024-11-25T11:50:26Z2024-11-25T11:50:26ZYazar Bilge, Alper. Kaçmaz, Emre.<br/>Yer Numarası TK5105.59 A98 2021<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>Türkiye’de ve dünyada siber güvenlikent://SD_ILS/0/SD_ILS:5149582024-11-25T11:50:26Z2024-11-25T11:50:26ZYazar Çeliktaş, Barış .<br/>Yer Numarası UG485 C45 2020<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>Uygulamalarla siber güvenliğe girişent://SD_ILS/0/SD_ILS:5101512024-11-25T11:50:26Z2024-11-25T11:50:26ZYazar Akyıldız, M. Alparslan.<br/>Yer Numarası TK5105.59.A39 U94 2020<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~2<br/>Yeni başlayanlar için bilgi güvenliği ve uygulamalı hacking yöntemlerient://SD_ILS/0/SD_ILS:4231842024-11-25T11:50:26Z2024-11-25T11:50:26ZYazar Aslanbakan, Enes, yazar<br/>Yer Numarası QA76.9.A25 A75 2019<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>Ethical hacking : (hacking kursu)ent://SD_ILS/0/SD_ILS:4239502024-11-25T11:50:26Z2024-11-25T11:50:26ZYazar Usta, Gökhan.<br/>Yer Numarası QA76.9.A25 U88 2019<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>Siber güvenlik ve savunma : standartlar ve uygulamalarent://SD_ILS/0/SD_ILS:4622832024-11-25T11:50:26Z2024-11-25T11:50:26ZYazar Sağıroğlu, Şeref.<br/>Yer Numarası TK5105.59 S53 2019<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~2<br/>Exploit geliştirme 101ent://SD_ILS/0/SD_ILS:3890772024-11-25T11:50:26Z2024-11-25T11:50:26ZYazar Akyıldız, M. Alparslan.<br/>Yer Numarası QA76.9.A25 A59 2018<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~2<br/>Some'ler için ağ ve malware analizient://SD_ILS/0/SD_ILS:4795262024-11-25T11:50:26Z2024-11-25T11:50:26ZYazar Akyıldız, M. Alparslan.<br/>Yer Numarası TK5105.59 A395 2018<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>Java programlama diliyle kriptoloji uygulamalarıent://SD_ILS/0/SD_ILS:3803192024-11-25T11:50:26Z2024-11-25T11:50:26ZYazar Bodur, Hüseyin<br/>Yer Numarası QA76.9.A25 B63 2016<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>Ethical hacking : offensive & defensiveent://SD_ILS/0/SD_ILS:5134502024-11-25T11:50:26Z2024-11-25T11:50:26ZYazar Çıtak, Ömer.<br/>Yer Numarası QA76.9.A25 C58 2016<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>Hacking Interfaceent://SD_ILS/0/SD_ILS:5134522024-11-25T11:50:26Z2024-11-25T11:50:26ZYazar Elbahadır, Hamza.<br/>Yer Numarası QA76.9.A25 E43 2016<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>Siber istihbaratent://SD_ILS/0/SD_ILS:3840512024-11-25T11:50:26Z2024-11-25T11:50:26ZYazar Keleştemur, Atalay<br/>Yer Numarası QA76.9.A25 K45 2015<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>Siber güvenlik ve elektronik bileşenlerient://SD_ILS/0/SD_ILS:3802812024-11-25T11:50:26Z2024-11-25T11:50:26ZYazar Ünal, Ahmet Naci<br/>Yer Numarası UG485 U53 2015<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>Hacking Interfaceent://SD_ILS/0/SD_ILS:3178472024-11-25T11:50:26Z2024-11-25T11:50:26ZYazar Elbahadır, Hamza.<br/>Yer Numarası QA 76.9 A25 E43 2014<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~2<br/>Veri gizlemeent://SD_ILS/0/SD_ILS:3709952024-11-25T11:50:26Z2024-11-25T11:50:26ZYazar Yalman,Yıldıray Çetin, Özdemir. Ertürk, İsmail. Akar, Feyzi.<br/>Yer Numarası QA76.9 Y35 2014<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>Türk ceza kanununda bilişim suçları : (Avrupa Konseyi siber suç sözleşmesi ve yargıtay kararları ile)ent://SD_ILS/0/SD_ILS:3097782024-11-25T11:50:26Z2024-11-25T11:50:26ZYazar Erdoğan, Yavuz.<br/>Yer Numarası KKX80.C65 E725 2013<br/>Format: Kitap<br/>Durum Hukuk Kütüphanesi~1<br/>Information security for managersent://SD_ILS/0/SD_ILS:5165702024-11-25T11:50:26Z2024-11-25T11:50:26ZYazar Workman, Michael D., 1957-. Phelps, Daniel C. Gathegi, John N.<br/>Yer Numarası HF5548.37 W67 2013<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>Social engineering : the art of human hackingent://SD_ILS/0/SD_ILS:3779762024-11-25T11:50:26Z2024-11-25T11:50:26ZYazar Hadnagy, Christopher.<br/>Yer Numarası QA76.9.C66 H33 2011<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>Dijital kaleent://SD_ILS/0/SD_ILS:1261352024-11-25T11:50:26Z2024-11-25T11:50:26ZYazar Brown, Dan, 1964- Soner, Sezer.<br/>Yer Numarası PS 3552.R685434 D542 2010<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>Computer forensics and cyber crime : an introductionent://SD_ILS/0/SD_ILS:1340362024-11-25T11:50:26Z2024-11-25T11:50:26ZYazar Britz, Marjie.<br/>Yer Numarası QA76.9.A25 B77 2009<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>ISA server 2006ent://SD_ILS/0/SD_ILS:1150802024-11-25T11:50:26Z2024-11-25T11:50:26ZYazar İnan, Yüksel. Demirli, Nihat.<br/>Yer Numarası TK5105.59 .I536 2008<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~2<br/>Information security : contemporary casesent://SD_ILS/0/SD_ILS:1110212024-11-25T11:50:26Z2024-11-25T11:50:26ZYazar Wright, Marie A. Kakalik, John S.<br/>Yer Numarası QA76.9.A25 W75 2007<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>Configuring Juniper Networks NetScreen & SSG firewallsent://SD_ILS/0/SD_ILS:1121542024-11-25T11:50:26Z2024-11-25T11:50:26ZYazar Cameron, Rob. ScienceDirect (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491181">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>FISMA certification & accreditation handbookent://SD_ILS/0/SD_ILS:1121692024-11-25T11:50:26Z2024-11-25T11:50:26ZYazar Taylor, Laura. Shepherd, Matthew. ScienceDirect (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491167">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>WarDriving & wireless penetration testingent://SD_ILS/0/SD_ILS:1122102024-11-25T11:50:26Z2024-11-25T11:50:26ZYazar Hurley, Chris. ScienceDirect (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491112">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>How to cheat at securing sql server 2005ent://SD_ILS/0/SD_ILS:1121742024-11-25T11:50:26Z2024-11-25T11:50:26ZYazar ScienceDirect (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491969">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Metasploit Toolkit for Penetration Testing, Exploit Development, And Vulnerabiity Researchent://SD_ILS/0/SD_ILS:1121792024-11-25T11:50:26Z2024-11-25T11:50:26ZYazar ScienceDirect (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490740">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Data warehousing and data mining techniques for cyber securityent://SD_ILS/0/SD_ILS:1104342024-11-25T11:50:26Z2024-11-25T11:50:26ZYazar Singhal, Anoop, 1958-<br/>Yer Numarası QA76.9.A25 S563 2007<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>Security in computingent://SD_ILS/0/SD_ILS:1106822024-11-25T11:50:26Z2024-11-25T11:50:26ZYazar Pfleeger, Charles P., 1948-<br/>Yer Numarası QA76.9.A25 P45 2007<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>Windows forensic analysis DVD toolkitent://SD_ILS/0/SD_ILS:1122112024-11-25T11:50:26Z2024-11-25T11:50:26ZYazar Carvey, Harlan A. ScienceDirect (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491563">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Zen and the art of information securityent://SD_ILS/0/SD_ILS:1122142024-11-25T11:50:26Z2024-11-25T11:50:26ZYazar Winkler, Ira. ScienceDirect (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491686">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Microsoft Vista for IT security professionalsent://SD_ILS/0/SD_ILS:1121822024-11-25T11:50:26Z2024-11-25T11:50:26ZYazar Piltzecker, Tony, 1975- Chaffin, Larry. ScienceDirect (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491396">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Microsoft windows security fundamentalsent://SD_ILS/0/SD_ILS:1121832024-11-25T11:50:26Z2024-11-25T11:50:26ZYazar Clercq, Jan de, 1968- Grillenmeier, Guido. ScienceDirect (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781555583408">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Network security assessment from vulnerability to patchent://SD_ILS/0/SD_ILS:1121862024-11-25T11:50:26Z2024-11-25T11:50:26ZYazar Manzuik, Steve. Gold, André. Gatford, Chris. ScienceDirect (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491013">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Security convergence managing enterprise security riskent://SD_ILS/0/SD_ILS:1121982024-11-25T11:50:26Z2024-11-25T11:50:26ZYazar Tyson, Dave. ScienceDirect (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780750684255">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Stealing the network how to own a shadow: the chase for Knuthent://SD_ILS/0/SD_ILS:1122002024-11-25T11:50:26Z2024-11-25T11:50:26ZYazar Long, Johnny. Russell, Ryan, 1969- Mullen, Timothy M. Pinzon, D. Scott. ScienceDirect (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490818">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Techno Security's guide to managing risks for IT managers, auditors, and investigatorsent://SD_ILS/0/SD_ILS:1122032024-11-25T11:50:26Z2024-11-25T11:50:26ZYazar Wiles, Jack. ScienceDirect (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491389">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>The history of information security a comprehensive handbookent://SD_ILS/0/SD_ILS:1122052024-11-25T11:50:26Z2024-11-25T11:50:26ZYazar Leeuw, Karl de. Bergstra, J. A. ScienceDirect (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780444516084">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>The official CHFI study guide (Exam 312-49) for computer hacking forensic investigator.ent://SD_ILS/0/SD_ILS:1122062024-11-25T11:50:26Z2024-11-25T11:50:26ZYazar Kleiman, Dave. ScienceDirect (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491976">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Information security : principles and practiceent://SD_ILS/0/SD_ILS:1094772024-11-25T11:50:26Z2024-11-25T11:50:26ZYazar Stamp, Mark.<br/>Yer Numarası QA76.9.A25 S69 2006<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>Information security architecture : an integrated approach to security in the organizationent://SD_ILS/0/SD_ILS:1108652024-11-25T11:50:26Z2024-11-25T11:50:26ZYazar Tudor, Jan Killmeyer.<br/>Yer Numarası QA76.9.A25 T83 2006<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>How to cheat at Windows System Administration using command line scriptsent://SD_ILS/0/SD_ILS:1121072024-11-25T11:50:26Z2024-11-25T11:50:26ZYazar Bhardwaj, Pawan K. Andreou, Kimon. Barber, Brian. Kleiman, Dave. Satyanarayana, Mahesh.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491051">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Linux Patch Management : keeping Linux systems up to dateent://SD_ILS/0/SD_ILS:1195502024-11-25T11:50:26Z2024-11-25T11:50:26ZYazar Jang, Michael H.<br/>Yer Numarası QA76.76.O63 J368 2006<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>Intelligence and security informatics for international security : information sharing and data miningent://SD_ILS/0/SD_ILS:1197862024-11-25T11:50:26Z2024-11-25T11:50:26ZYazar Chen, Hsinchun.<br/>Yer Numarası QA76.76.E95 C44 2006<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>Computer security fundamentalsent://SD_ILS/0/SD_ILS:1086202024-11-25T11:50:26Z2024-11-25T11:50:26ZYazar Easttom, Chuck.<br/>Yer Numarası QA76.9.A25 E325 2006<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>Enhanced methods in computer security, biometric and artificial intelligence systemsent://SD_ILS/0/SD_ILS:1098642024-11-25T11:50:26Z2024-11-25T11:50:26ZYazar Pejas, Jerzy, 1954-, ed. Piegat, Andrzej, 1947-, ed.<br/>Yer Numarası QA76.9.A25 E545 2005<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>Secure architectures with OpenBSDent://SD_ILS/0/SD_ILS:1095062024-11-25T11:50:26Z2024-11-25T11:50:26ZYazar Palmer, Brandon. Nazario, Jose, ort. yaz.<br/>Yer Numarası QA76.76.O63 P335 2004<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>How to break software security : effective technigues for security testingent://SD_ILS/0/SD_ILS:1055842024-11-25T11:50:26Z2024-11-25T11:50:26ZYazar Whittaker, James A., 1965- Thomson, Herbert H., ort. yaz.<br/>Yer Numarası QA 76.9.A25 W48 2004<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~2<br/>Hacking : Bilişim korsanlığı ve korunma yöntemlerient://SD_ILS/0/SD_ILS:885782024-11-25T11:50:26Z2024-11-25T11:50:26ZYazar Yılmaz, Davut.<br/>Yer Numarası TK 5105.59 Y56 2004<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>Dijital kaleent://SD_ILS/0/SD_ILS:963222024-11-25T11:50:26Z2024-11-25T11:50:26ZYazar Brown, Dan, 1964- Soner, Sezer, çev. Huvaj, Muharrem Nesij, haz.<br/>Yer Numarası PS3552.R685434 D542 2004<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~7<br/>Exploiting software : how to break codeent://SD_ILS/0/SD_ILS:965562024-11-25T11:50:26Z2024-11-25T11:50:26ZYazar Hoglund, Greg. McGraw, Gary, 1966- ort. yaz.<br/>Yer Numarası QA 76.9.A25 H635 2004<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>İnternette güvenlik ve Hacker Cracker meselesi : el kitabıent://SD_ILS/0/SD_ILS:1041302024-11-25T11:50:26Z2024-11-25T11:50:26ZYazar Güven, Mehmet.<br/>Yer Numarası QA 76.9.A25 G88 2004<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~2<br/>Computer security sourcebookent://SD_ILS/0/SD_ILS:946152024-11-25T11:50:26Z2024-11-25T11:50:26ZYazar Caldwell, Wilma, ed.<br/>Yer Numarası QA 76.9.A25 C658 2003<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>Nokia network security solutions handbookent://SD_ILS/0/SD_ILS:811492024-11-25T11:50:26Z2024-11-25T11:50:26ZYazar Maxwell, Doug. Amon, Cherie, ort. yaz.<br/>Yer Numarası TK 5105.59 M451 2002<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>New Security Paradigms Workshop : proceedings, September 10 -13, 2001, Cloudcroft, NM, USAent://SD_ILS/0/SD_ILS:1180092024-11-25T11:50:26Z2024-11-25T11:50:26ZYazar ACM SIGSAC New Security Paradigms Workshop (2001 : Cloudcroft, NM, USA) Raskin, V. Hempelmann, C.F. Association for Computing Machinery. Special Interest Group on Security, Audit, and Control.<br/>Yer Numarası QA76.9.A25 A34 2001<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>Technology and privacy : the new landscapeent://SD_ILS/0/SD_ILS:1129992024-11-25T11:50:26Z2024-11-25T11:50:26ZYazar Agre, Philip. Rotenberg, Marc.<br/>Yer Numarası QA76.9.A25 T43 2001<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>GSM güvenlik mekanizmasının incelenmesi ve geliştirilmesient://SD_ILS/0/SD_ILS:742362024-11-25T11:50:26Z2024-11-25T11:50:26ZYazar Kasım, Başar.<br/>Yer Numarası TEZ/5165 K151 2001<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>Proceedings of Sixth ACM Symposium on Access Control Models and Technologies : SACMAT 2001 : Litton-TASC, Westfields II Conference Facility, May 3-4, 2001, Chantilly, Virginia, USAent://SD_ILS/0/SD_ILS:724522024-11-25T11:50:26Z2024-11-25T11:50:26ZYazar ACM Symposium on Access Control Models and Technologies (6th : 2001 : Chantilly, V.A.) Association for Computing Machinery. Special Interest Group on Security, Audit, and Control.<br/>Yer Numarası QA 76.9.A25 A292 2001<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>Data privacy in the information ageent://SD_ILS/0/SD_ILS:1351252024-11-25T11:50:26Z2024-11-25T11:50:26ZYazar Klosek, Jacqueline.<br/>Yer Numarası QA76.9.A25 K57 2000<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>Yeni ekonomide başarının anahtarı : e-ticaret strateji ve yöntemlerient://SD_ILS/0/SD_ILS:678352024-11-25T11:50:26Z2024-11-25T11:50:26ZYazar Dolanbay, Coşkun.<br/>Yer Numarası HF 5548.32 D685 2000<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~2<br/>Secure electronic commerce : building the infrastructure for digital signatures and encryptionent://SD_ILS/0/SD_ILS:619262024-11-25T11:50:26Z2024-11-25T11:50:26ZYazar Ford, Warwick. Baum, Michael S., ort. yaz.<br/>Yer Numarası QA 76.9.A25 F66 1997<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>Security in computingent://SD_ILS/0/SD_ILS:597682024-11-25T11:50:26Z2024-11-25T11:50:26ZYazar Pfleeger, Charles P., 1948-<br/>Yer Numarası QA 76.9.A25 P45 1997<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>Applied cryptography : protocols, algorithms, and source code in Cent://SD_ILS/0/SD_ILS:1080142024-11-25T11:50:26Z2024-11-25T11:50:26ZYazar Schneier, Bruce.<br/>Yer Numarası QA76.9.A25 S35 1996<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>Information warfare : chaos on the electronic superhighwayent://SD_ILS/0/SD_ILS:315992024-11-25T11:50:26Z2024-11-25T11:50:26ZYazar Schwartau, Winn.<br/>Yer Numarası QA 76.9.A25 S354 1994<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>Contemporary cryptology : the science of information integrityent://SD_ILS/0/SD_ILS:581192024-11-25T11:50:26Z2024-11-25T11:50:26ZYazar Simmons, Gustavus J., ed.<br/>Yer Numarası QA 76.9.A25 C6678 1992<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>Computer security basicent://SD_ILS/0/SD_ILS:410832024-11-25T11:50:26Z2024-11-25T11:50:26ZYazar Russell, Deborah. Gangemi, G. T., ort. yaz.<br/>Yer Numarası QA 76.9.A25 R87 1991<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>A handbook of computer securityent://SD_ILS/0/SD_ILS:323782024-11-25T11:50:26Z2024-11-25T11:50:26ZYazar Hearnden, K., ed. by<br/>Yer Numarası QA 76.9.A25 H191 1990<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>Computer security risk managementent://SD_ILS/0/SD_ILS:323792024-11-25T11:50:26Z2024-11-25T11:50:26ZYazar Palmer, Ian C. Potter, G. A., ort. yaz.<br/>Yer Numarası QA 76.9.A25 P182 1989<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>