Arama Sonu&ccedil;lar&#305; Book. - Daralt&#305;lm&#305;&#351;: Computer security. SirsiDynix Enterprise https://katalog.hacettepe.edu.tr/client/tr_TR/default_tr/default_tr/qu$003dBook.$0026qf$003dSUBJECT$002509Konu$002509Computer$002bsecurity.$002509Computer$002bsecurity.$0026ic$003dtrue$0026ps$003d300$0026isd$003dtrue? 2026-01-26T23:04:42Z The complete book of data anonymization : from planning to implementation ent://SD_ILS/0/SD_ILS:540169 2026-01-26T23:04:42Z 2026-01-26T23:04:42Z Yazar&#160;Raghunathan, Balaji., author.<br/>Yer Numaras&#305;&#160;QA76.9 .A25 R338 2013<br/>Elektronik Eri&#351;im&#160;<a href="https://www.taylorfrancis.com/books/9781439877319">Click here to view.</a><br/>Format:&#160;Kitap<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> The best damn IT security management book period ent://SD_ILS/0/SD_ILS:145274 2026-01-26T23:04:42Z 2026-01-26T23:04:42Z Yazar&#160;Cunningham, Bryan, JD.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492270">http://www.sciencedirect.com/science/book/9781597492270</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Building effective privacy programs : cybersecurity from principles to practice ent://SD_ILS/0/SD_ILS:600111 2026-01-26T23:04:42Z 2026-01-26T23:04:42Z Yazar&#160;Edwards, Jason (Cybersecurity expert), author.&#160;Weaver, Griffin, author.&#160;John Wiley &amp; Sons, publisher.<br/>Yer Numaras&#305;&#160;QA76.9 .P735 E34 2026<br/>Elektronik Eri&#351;im&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394342662">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394342662</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Defense in depth : modern cybersecurity strategies and evolving threats ent://SD_ILS/0/SD_ILS:600191 2026-01-26T23:04:42Z 2026-01-26T23:04:42Z Yazar&#160;Zangana, Hewa Majeed, 1987- editor.<br/>Yer Numaras&#305;&#160;QA76.9 .A25 D44 2026<br/>Elektronik Eri&#351;im&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394340750">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394340750</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Digital immune system : principles and practices ent://SD_ILS/0/SD_ILS:600243 2026-01-26T23:04:42Z 2026-01-26T23:04:42Z Yazar&#160;Priyambada Dash, Sujata, editor.&#160;Mishra, Vaibhav.&#160;Shaw, Bijeta.&#160;Panda, Sandeep Kumar.&#160;Balamurugan, S.<br/>Yer Numaras&#305;&#160;QA76.9 .A25 D54 2026<br/>Elektronik Eri&#351;im&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394383788">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394383788</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Inside cyber : how AI, 5G, IoT, and quantum computing will transform privacy and our security ent://SD_ILS/0/SD_ILS:599222 2026-01-26T23:04:42Z 2026-01-26T23:04:42Z Yazar&#160;Brooks, Chuck (Writer of Inside cyber), author.<br/>Yer Numaras&#305;&#160;HC79 .T4 B735 2025<br/>Elektronik Eri&#351;im&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394310562">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394310562</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Open-source security operations center (SOC) : a complete guide to establishing, managing, and maintaining a modern SOC ent://SD_ILS/0/SD_ILS:599434 2026-01-26T23:04:42Z 2026-01-26T23:04:42Z Yazar&#160;Basta, Alfred, author.&#160;Basta, Nadine, author.&#160;Anwar, Waqar, author.&#160;Essar, Mohammad Ilyas, author.&#160;John Wiley &amp; Sons, publisher.<br/>Yer Numaras&#305;&#160;QA76.9 .A25<br/>Elektronik Eri&#351;im&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394201631">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394201631</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Information security and privacy quick reference the essential handbook for every CISO, CSO, and Chief Privacy Officer ent://SD_ILS/0/SD_ILS:599946 2026-01-26T23:04:42Z 2026-01-26T23:04:42Z Yazar&#160;Chapple, Mike, author.&#160;Shelley, Joe.&#160;Stewart, James Michael.<br/>Yer Numaras&#305;&#160;QA76.9 .A25 C43 2025<br/>Elektronik Eri&#351;im&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394353347">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394353347</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Generative AI, cybersecurity, and ethics ent://SD_ILS/0/SD_ILS:599597 2026-01-26T23:04:42Z 2026-01-26T23:04:42Z Yazar&#160;Islam, Ray (Mohammad Rubyet), author.<br/>Yer Numaras&#305;&#160;QA76.9 .A25<br/>Elektronik Eri&#351;im&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394279326">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394279326</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Digital twins and cybersecurity : safeguarding the future of connected systems ent://SD_ILS/0/SD_ILS:599615 2026-01-26T23:04:42Z 2026-01-26T23:04:42Z Yazar&#160;Naveen, Palanichamy, author.&#160;Maheswar, R., author.&#160;Ragupathy, U.S., author.<br/>Yer Numaras&#305;&#160;QA76.9 .C65 N38 2025<br/>Elektronik Eri&#351;im&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394272501">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394272501</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Next-generation systems and secure computing ent://SD_ILS/0/SD_ILS:599779 2026-01-26T23:04:42Z 2026-01-26T23:04:42Z Yazar&#160;Barman, Subhabrata, editor.&#160;Koley, Santanu, editor.&#160;Joardar, Subhankar, editor.<br/>Yer Numaras&#305;&#160;QA76.9 .A25 N49 2025<br/>Elektronik Eri&#351;im&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394228522">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394228522</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> The cybersecurity control playbook : from fundamentals to advanced strategies ent://SD_ILS/0/SD_ILS:599789 2026-01-26T23:04:42Z 2026-01-26T23:04:42Z Yazar&#160;Edwards, Jason (Cybersecurity expert), author.&#160;John Wiley &amp; Sons, publisher.<br/>Yer Numaras&#305;&#160;QA76.9 .A25 E3884 2025<br/>Elektronik Eri&#351;im&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394331888">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394331888</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> The techno-legal dynamics of cyber crimes in Industry 5.0 ent://SD_ILS/0/SD_ILS:599801 2026-01-26T23:04:42Z 2026-01-26T23:04:42Z Yazar&#160;Kaur, Gagandeep, editor&#160;Choudhury, Tanupriya editor&#160;Balamurugan, S. editor<br/>Yer Numaras&#305;&#160;QA76.9 .A25<br/>Elektronik Eri&#351;im&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394242177">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394242177</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Securing cyber-physical systems : fundamentals, applications and challenges ent://SD_ILS/0/SD_ILS:600260 2026-01-26T23:04:42Z 2026-01-26T23:04:42Z Yazar&#160;Ananthajothi, K., editor.<br/>Yer Numaras&#305;&#160;TK5105.59 .S43 2025<br/>Elektronik Eri&#351;im&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394287765">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394287765</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Protection of electrical power distribution systems : smart grid, microgrid, AI, and cyber security ent://SD_ILS/0/SD_ILS:600371 2026-01-26T23:04:42Z 2026-01-26T23:04:42Z Yazar&#160;Masood, Tariq, author.&#160;Abdo, Jamil, author.&#160;Iqbal, Atif, author.<br/>Yer Numaras&#305;&#160;TK3001 .M37 2026<br/>Elektronik Eri&#351;im&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394327676">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394327676</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Rise of the machines : when AI and zero trust collide : a Project Zero Trust story ent://SD_ILS/0/SD_ILS:599932 2026-01-26T23:04:42Z 2026-01-26T23:04:42Z Yazar&#160;Finney, George, author.&#160;Vinduska, Zach, author.<br/>Yer Numaras&#305;&#160;QA76.9 .A25 F56 2025<br/>Elektronik Eri&#351;im&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394352517">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394352517</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Emerging threats and countermeasures in cybersecurity ent://SD_ILS/0/SD_ILS:599561 2026-01-26T23:04:42Z 2026-01-26T23:04:42Z Yer Numaras&#305;&#160;QA76.9 .A25 E44 2025<br/>Elektronik Eri&#351;im&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394230600">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394230600</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Alice and Bob learn secure coding ent://SD_ILS/0/SD_ILS:599664 2026-01-26T23:04:42Z 2026-01-26T23:04:42Z Yazar&#160;Janca, Tanya. author.<br/>Yer Numaras&#305;&#160;QA76.76 .D47<br/>Elektronik Eri&#351;im&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394277179">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394277179</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Quantum computing models for cybersecurity and wireless communications ent://SD_ILS/0/SD_ILS:599707 2026-01-26T23:04:42Z 2026-01-26T23:04:42Z Yazar&#160;Kumar, Budati Anil, edited.&#160;Kumar, Singamaneni Kranthi, edited.&#160;Li, Xingwang (Computer scientist), edited.<br/>Yer Numaras&#305;&#160;QA76.9 .A25 Q36 2025<br/>Elektronik Eri&#351;im&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394271429">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394271429</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Securing the digital frontier : threats and advanced techniques in security and forensics ent://SD_ILS/0/SD_ILS:599732 2026-01-26T23:04:42Z 2026-01-26T23:04:42Z Yazar&#160;Sharma, Kavita, 1985- editor.<br/>Yer Numaras&#305;&#160;QA76.9 .A25 S43 2025<br/>Elektronik Eri&#351;im&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394268917">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394268917</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Protecting and mitigating against cyber threats : deploying artificial intelligence and machine learning ent://SD_ILS/0/SD_ILS:599999 2026-01-26T23:04:42Z 2026-01-26T23:04:42Z Yazar&#160;Mohanty, Sachi Nandan, editor.<br/>Yer Numaras&#305;&#160;QA76.9 .A25 P76 2025<br/>Elektronik Eri&#351;im&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394305216">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394305216</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Cyber defense : best practices for digital safety ent://SD_ILS/0/SD_ILS:600003 2026-01-26T23:04:42Z 2026-01-26T23:04:42Z Yazar&#160;Edwards, Jason, author.<br/>Yer Numaras&#305;&#160;QA76.9 .A25 E39 2025<br/>Elektronik Eri&#351;im&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394337040">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394337040</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Taming the hacking storm : a framework for securing and defending networks ent://SD_ILS/0/SD_ILS:599858 2026-01-26T23:04:42Z 2026-01-26T23:04:42Z Yazar&#160;Grimes, Roger A., author.<br/>Yer Numaras&#305;&#160;QA76.9 .A25 G75 2025<br/>Elektronik Eri&#351;im&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394352289">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394352289</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> x86 software reverse-engineering, cracking, and counter-measures ent://SD_ILS/0/SD_ILS:598920 2026-01-26T23:04:42Z 2026-01-26T23:04:42Z Yazar&#160;Domas, Stephanie, author.&#160;Domas, Christopher, author.<br/>Yer Numaras&#305;&#160;QA76.9 .A25 D66 2024<br/>Elektronik Eri&#351;im&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394277131">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394277131</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Effective vulnerability management : managing risk in the vulnerable digital ecosystem ent://SD_ILS/0/SD_ILS:599047 2026-01-26T23:04:42Z 2026-01-26T23:04:42Z Yazar&#160;Hughes, Chris (Christopher Matthew), author.&#160;Robinson, Nikki, author.<br/>Yer Numaras&#305;&#160;QA76.9 .A25 H84 2024<br/>Elektronik Eri&#351;im&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394277155">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394277155</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Realizing the Metaverse : a communications and networking perspective ent://SD_ILS/0/SD_ILS:599057 2026-01-26T23:04:42Z 2026-01-26T23:04:42Z Yazar&#160;Lim, Wei Yang Bryan, editor.&#160;Xiong, Zehui, editor.&#160;Niyato, Dusit, editor.&#160;Zhang, Junshan (Electrical engineer), editor.&#160;Shen, X. (Xuemin), 1958- editor.<br/>Yer Numaras&#305;&#160;TK5105.8864 .R43 2024<br/>Elektronik Eri&#351;im&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394188932">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394188932</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> CYBERSECURITY IN THE TRANSPORTATION INDUSTRY. ent://SD_ILS/0/SD_ILS:599238 2026-01-26T23:04:42Z 2026-01-26T23:04:42Z Yer Numaras&#305;&#160;HE194 .C93 2024<br/>Elektronik Eri&#351;im&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394204472">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394204472</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Automated secure computing for next-generation systems ent://SD_ILS/0/SD_ILS:598752 2026-01-26T23:04:42Z 2026-01-26T23:04:42Z Yazar&#160;Tyagi, Amit Kumar, editor.<br/>Yer Numaras&#305;&#160;QA76.9 .A25 A98 2024<br/>Elektronik Eri&#351;im&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394213948">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394213948</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> The DevSecOps playbook : deliver continuous security at speed ent://SD_ILS/0/SD_ILS:598634 2026-01-26T23:04:42Z 2026-01-26T23:04:42Z Yazar&#160;Mack, Sean D., author.<br/>Yer Numaras&#305;&#160;QA76.9 .A25 M33 2024<br/>Elektronik Eri&#351;im&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394189281">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394189281</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Cryptography : algorithms, protocols, and standards for computer security ent://SD_ILS/0/SD_ILS:598914 2026-01-26T23:04:42Z 2026-01-26T23:04:42Z Yazar&#160;Mammeri, Zoubir, author.<br/>Yer Numaras&#305;&#160;QA268 .M34 2024<br/>Elektronik Eri&#351;im&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394207510">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394207510</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> The cybersecurity guide to governance, risk, and compliance ent://SD_ILS/0/SD_ILS:598945 2026-01-26T23:04:42Z 2026-01-26T23:04:42Z Yazar&#160;Edwards, Jason (Cybersecurity expert), author.&#160;Weaver, Griffin, author.<br/>Yer Numaras&#305;&#160;HD30.38 .E34 2024<br/>Elektronik Eri&#351;im&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394250226">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394250226</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Stepping through cybersecurity risk management : a systems thinking approach ent://SD_ILS/0/SD_ILS:599021 2026-01-26T23:04:42Z 2026-01-26T23:04:42Z Yazar&#160;Bayuk, Jennifer L., author.<br/>Yer Numaras&#305;&#160;QA76.9 .A25 B39 2024<br/>Elektronik Eri&#351;im&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394213986">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394213986</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Cyber Operations : A Case Study Approach ent://SD_ILS/0/SD_ILS:599117 2026-01-26T23:04:42Z 2026-01-26T23:04:42Z Yazar&#160;Couretas, Jerry M., 1966- author.<br/>Yer Numaras&#305;&#160;QA76.9 .A25<br/>Elektronik Eri&#351;im&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119712121">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119712121</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> A&rsquo;dan Z&rsquo;ye siber g&uuml;venlik ent://SD_ILS/0/SD_ILS:524303 2026-01-26T23:04:42Z 2026-01-26T23:04:42Z Yazar&#160;Polat, A. Can.&#160;Karaka&#351;, Burak.<br/>Yer Numaras&#305;&#160;QA76.9 P65 2023<br/>Format:&#160;Kitap<br/>Durum&#160;Beytepe K&uuml;t&uuml;phanesi~1<br/> Sustainably investing in digital assets globally ent://SD_ILS/0/SD_ILS:597764 2026-01-26T23:04:42Z 2026-01-26T23:04:42Z Yazar&#160;Ozelli, Selva, author.<br/>Yer Numaras&#305;&#160;HG4515.15 .O38 2023<br/>Elektronik Eri&#351;im&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394320530">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394320530</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Cybercrime during the SARS-CoV-2 pandemic (2019-2022) ent://SD_ILS/0/SD_ILS:598517 2026-01-26T23:04:42Z 2026-01-26T23:04:42Z Yazar&#160;Ventre, Daniel, editor.&#160;Loiseau, Hugo, 1974- editor.<br/>Yer Numaras&#305;&#160;HV6773 .C93 2023<br/>Elektronik Eri&#351;im&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394226344">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394226344</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Symmetric cryptography. Volume 1 : Design and security proofs ent://SD_ILS/0/SD_ILS:598803 2026-01-26T23:04:42Z 2026-01-26T23:04:42Z Yazar&#160;Boura, Christina, editor.&#160;Naya-Plasencia, Maria, editor.<br/>Yer Numaras&#305;&#160;Z104 .S966 2023<br/>Elektronik Eri&#351;im&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394256358">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394256358</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Quantum computing in cybersecurity ent://SD_ILS/0/SD_ILS:598685 2026-01-26T23:04:42Z 2026-01-26T23:04:42Z Yazar&#160;Rawat, Romil, editor.<br/>Yer Numaras&#305;&#160;QA76.9 .A25 Q83 2023<br/>Elektronik Eri&#351;im&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394167401">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394167401</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Wireless communication in cyber security ent://SD_ILS/0/SD_ILS:598705 2026-01-26T23:04:42Z 2026-01-26T23:04:42Z Yazar&#160;Sountharrajan, S. editor&#160;Maheswar, R. editor&#160;Rathee, Geetanjali, editor&#160;Akila, M. editor<br/>Yer Numaras&#305;&#160;QA76.9 .A25 W57 2023<br/>Elektronik Eri&#351;im&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119910619">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119910619</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Cyber investigations : a research based textbook for advanced studies ent://SD_ILS/0/SD_ILS:597931 2026-01-26T23:04:42Z 2026-01-26T23:04:42Z Yazar&#160;&Aring;rnes, Andr&eacute;, 1976- editor.<br/>Yer Numaras&#305;&#160;HV8079 .C65 C933 2023<br/>Elektronik Eri&#351;im&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119582021">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119582021</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Intelligent security systems : how artificial intelligence, machine learning and data science work for and against computer security ent://SD_ILS/0/SD_ILS:597085 2026-01-26T23:04:42Z 2026-01-26T23:04:42Z Yazar&#160;Reznik, Leonid, 1955- author.<br/>Yer Numaras&#305;&#160;QA76.9 .A25 R438 2022<br/>Elektronik Eri&#351;im&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119771579">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119771579</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Perceptions and Analysis of Digital Risks ent://SD_ILS/0/SD_ILS:597226 2026-01-26T23:04:42Z 2026-01-26T23:04:42Z Yazar&#160;Capelle, Camille.&#160;Liqu&egrave;te, Vincent.<br/>Yer Numaras&#305;&#160;QA76.575<br/>Elektronik Eri&#351;im&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119887959">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119887959</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Cyber security and network security ent://SD_ILS/0/SD_ILS:597484 2026-01-26T23:04:42Z 2026-01-26T23:04:42Z Yazar&#160;Pramanik, Sabyasachi, editor.&#160;Samanta, Debabrata, 1987- editor.&#160;Vinay, M., editor.&#160;Guha, Abhijit, editor.<br/>Yer Numaras&#305;&#160;QA76.9 .A25<br/>Elektronik Eri&#351;im&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119812555">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119812555</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Managing cybersecurity in the process industries ent://SD_ILS/0/SD_ILS:597508 2026-01-26T23:04:42Z 2026-01-26T23:04:42Z Yazar&#160;American Institute of Chemical Engineers. Center for Chemical Process Safety.<br/>Yer Numaras&#305;&#160;TP155.7<br/>Elektronik Eri&#351;im&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119861812">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119861812</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Cybersecurity in smart homes : architectures, solutions and technologies ent://SD_ILS/0/SD_ILS:597626 2026-01-26T23:04:42Z 2026-01-26T23:04:42Z Yazar&#160;Khatoun, Rida, author.<br/>Yer Numaras&#305;&#160;QA76.9 .A25<br/>Elektronik Eri&#351;im&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119987451">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119987451</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Executive's guide to cyber risk : securing the future today ent://SD_ILS/0/SD_ILS:597567 2026-01-26T23:04:42Z 2026-01-26T23:04:42Z Yazar&#160;Moyo, Siegfried, author.<br/>Yer Numaras&#305;&#160;HF5548.37 .M68 2022<br/>Elektronik Eri&#351;im&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394320578">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394320578</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Trust in computer systems and the cloud ent://SD_ILS/0/SD_ILS:597142 2026-01-26T23:04:42Z 2026-01-26T23:04:42Z Yazar&#160;Bursell, Mike, author.<br/>Yer Numaras&#305;&#160;QA76.9 .A25<br/>Elektronik Eri&#351;im&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119695158">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119695158</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Cyber security and digital forensics ent://SD_ILS/0/SD_ILS:597326 2026-01-26T23:04:42Z 2026-01-26T23:04:42Z Yazar&#160;Ghonge, Mangesh, 1984- editor.<br/>Yer Numaras&#305;&#160;QA76.9 .A25<br/>Elektronik Eri&#351;im&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119795667">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119795667</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> The CISO evolution : business knowledge for cybersecurity executives ent://SD_ILS/0/SD_ILS:597056 2026-01-26T23:04:42Z 2026-01-26T23:04:42Z Yazar&#160;Sharp, Matthew K., author.&#160;Lambros, Kyriakos P., author.<br/>Yer Numaras&#305;&#160;HD30.2 .S5325 2022<br/>Elektronik Eri&#351;im&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119782513">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119782513</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Blockchain security from the bottom up : securing and preventing attacks on cryptocurrencies, decentralized applications, nfts, and smart contracts ent://SD_ILS/0/SD_ILS:597703 2026-01-26T23:04:42Z 2026-01-26T23:04:42Z Yazar&#160;Poston, Howard E., III, author.<br/>Yer Numaras&#305;&#160;QA76.9 .B56 P67 2022<br/>Elektronik Eri&#351;im&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394320691">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394320691</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Computer science security : concepts and tools ent://SD_ILS/0/SD_ILS:597739 2026-01-26T23:04:42Z 2026-01-26T23:04:42Z Yazar&#160;Zaidoun, Ameur Salem, author.<br/>Yer Numaras&#305;&#160;QA76.9 .A25 Z35 2022<br/>Elektronik Eri&#351;im&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394163847">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394163847</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Trust-based communication systems for internet of things applications ent://SD_ILS/0/SD_ILS:597744 2026-01-26T23:04:42Z 2026-01-26T23:04:42Z Yazar&#160;Madaan, Vishu, editor.&#160;Agrawal, Prateek, editor.&#160;Sharma, Anand, editor.&#160;Sharma, Dilip Kumar, editor.&#160;Agrawal, Akshat, 1986- editor.<br/>Yer Numaras&#305;&#160;TK5105.8857<br/>Elektronik Eri&#351;im&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119896746">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119896746</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> VMware&reg; Certified Professional Data Center Virtualization on vSphere 6.7 Exam 2V0-21.19 : study guide ent://SD_ILS/0/SD_ILS:596289 2026-01-26T23:04:42Z 2026-01-26T23:04:42Z Yazar&#160;Hall, Jon, 1963- author.&#160;Andrews, Joshua, author.<br/>Yer Numaras&#305;&#160;QA76.9 .V5<br/>Elektronik Eri&#351;im&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119539698">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119539698</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> You can stop stupid : stopping losses from accidental and malicious actions ent://SD_ILS/0/SD_ILS:596502 2026-01-26T23:04:42Z 2026-01-26T23:04:42Z Yazar&#160;Winkler, Ira, author.&#160;Brown, Tracy Celaya, author.<br/>Yer Numaras&#305;&#160;HD61.5 .W55 2021<br/>Elektronik Eri&#351;im&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119623946">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119623946</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Artificial intelligence and data mining approaches in security frameworks ent://SD_ILS/0/SD_ILS:596957 2026-01-26T23:04:42Z 2026-01-26T23:04:42Z Yazar&#160;Bhargava, Neeraj.&#160;Bhargava, Ritu.&#160;Rathore, Pramod Singh, 1988-&#160;Agrawal, Rashmi, 1978-<br/>Yer Numaras&#305;&#160;Q335<br/>Elektronik Eri&#351;im&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119760429">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119760429</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Hacking multifactor authentication ent://SD_ILS/0/SD_ILS:596326 2026-01-26T23:04:42Z 2026-01-26T23:04:42Z Yazar&#160;Grimes, Roger A., author.<br/>Yer Numaras&#305;&#160;QA76.9 .A25 G75 2021<br/>Elektronik Eri&#351;im&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119672357">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119672357</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Privacy, regulations, and cybersecurity : the essential business guide ent://SD_ILS/0/SD_ILS:596472 2026-01-26T23:04:42Z 2026-01-26T23:04:42Z Yazar&#160;Moschovitis, Christos J. P., author.<br/>Yer Numaras&#305;&#160;HD61.5 .M675 2021 EB<br/>Elektronik Eri&#351;im&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119660156">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119660156</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Security issues and privacy concerns in Industry 4.0 applications ent://SD_ILS/0/SD_ILS:596945 2026-01-26T23:04:42Z 2026-01-26T23:04:42Z Yazar&#160;David, Shiblin, author.&#160;Anand, R. S., author.&#160;Jeyakrishnan, V., author.&#160;Niranjanamurthy, M., author.<br/>Yer Numaras&#305;&#160;QA76.9 .A25 D38 2021<br/>Elektronik Eri&#351;im&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119776529">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119776529</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Uygulamalarla siber g&uuml;venli&#287;e giri&#351; ent://SD_ILS/0/SD_ILS:510151 2026-01-26T23:04:42Z 2026-01-26T23:04:42Z Yazar&#160;Aky&#305;ld&#305;z, M. Alparslan.<br/>Yer Numaras&#305;&#160;TK5105.59.A39 U94 2020<br/>Format:&#160;Kitap<br/>Durum&#160;Beytepe K&uuml;t&uuml;phanesi~2<br/> T&uuml;rkiye&rsquo;de ve d&uuml;nyada siber g&uuml;venlik ent://SD_ILS/0/SD_ILS:514958 2026-01-26T23:04:42Z 2026-01-26T23:04:42Z Yazar&#160;&Ccedil;elikta&#351;, Bar&#305;&#351; .<br/>Yer Numaras&#305;&#160;UG485 C45 2020<br/>Format:&#160;Kitap<br/>Durum&#160;Beytepe K&uuml;t&uuml;phanesi~1<br/> Cybersecurity and decision makers : data security and digital trust ent://SD_ILS/0/SD_ILS:595943 2026-01-26T23:04:42Z 2026-01-26T23:04:42Z Yazar&#160;Fr&eacute;minville, Marie de, author.<br/>Yer Numaras&#305;&#160;HF5548.37 .F74 2020<br/>Elektronik Eri&#351;im&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119720362">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119720362</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Tribe of hackers blue team : tribal knowledge from the best in defensive cybersecurity ent://SD_ILS/0/SD_ILS:596276 2026-01-26T23:04:42Z 2026-01-26T23:04:42Z Yazar&#160;Carey, Marcus J. (Cybersecurity professional)&#160;Jin, Jennifer.<br/>Yer Numaras&#305;&#160;QA76.9 .A25 C3673 2020<br/>Elektronik Eri&#351;im&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119643432">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119643432</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Cybersecurity in humanities and social sciences : a research methods approach ent://SD_ILS/0/SD_ILS:596373 2026-01-26T23:04:42Z 2026-01-26T23:04:42Z Yazar&#160;Loiseau, Hugo, editor.&#160;Ventre, Daniel, editor.&#160;Aden, Hartmut, editor.<br/>Yer Numaras&#305;&#160;QA76.9 .A25<br/>Elektronik Eri&#351;im&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119777588">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119777588</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Hands on hacking ent://SD_ILS/0/SD_ILS:596316 2026-01-26T23:04:42Z 2026-01-26T23:04:42Z Yazar&#160;Hickey, Matthew (Computer security expert), author.&#160;Arcuri, Jennifer, author.<br/>Yer Numaras&#305;&#160;QA76.9 .A25 H53 2020 EB<br/>Elektronik Eri&#351;im&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119561507">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119561507</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Artificial intelligence, cybersecurity and cyber defense ent://SD_ILS/0/SD_ILS:596423 2026-01-26T23:04:42Z 2026-01-26T23:04:42Z Yazar&#160;Ventre, Daniel, author.<br/>Yer Numaras&#305;&#160;Q335 .V46 2020 EB<br/>Elektronik Eri&#351;im&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119788195">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119788195</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Security engineering : a guide to building dependable distributed systems ent://SD_ILS/0/SD_ILS:596480 2026-01-26T23:04:42Z 2026-01-26T23:04:42Z Yazar&#160;Anderson, Ross. http://viaf.org/viaf/sourceID/LC%7cnb2004300232<br/>Yer Numaras&#305;&#160;QA76.9 .A25<br/>Elektronik Eri&#351;im&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119644682">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119644682</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Tribe of hackers security leaders : tribal knowledge from the best in cybersecurity leadership ent://SD_ILS/0/SD_ILS:595887 2026-01-26T23:04:42Z 2026-01-26T23:04:42Z Yazar&#160;Carey, Marcus J. (Cybersecurity professional), author.&#160;Jin, Jennifer.<br/>Yer Numaras&#305;&#160;QA76.9 .A25 C37 2020<br/>Elektronik Eri&#351;im&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119643784">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119643784</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Applied incident response ent://SD_ILS/0/SD_ILS:595744 2026-01-26T23:04:42Z 2026-01-26T23:04:42Z Yazar&#160;Anson, Steve.<br/>Yer Numaras&#305;&#160;QA76.9 .A25<br/>Elektronik Eri&#351;im&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119560302">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119560302</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Yeni ba&#351;layanlar i&ccedil;in bilgi g&uuml;venli&#287;i ve uygulamal&#305; hacking y&ouml;ntemleri ent://SD_ILS/0/SD_ILS:423184 2026-01-26T23:04:42Z 2026-01-26T23:04:42Z Yazar&#160;Aslanbakan, Enes, yazar<br/>Yer Numaras&#305;&#160;QA76.9.A25 A75 2019<br/>Format:&#160;Kitap<br/>Durum&#160;Beytepe K&uuml;t&uuml;phanesi~1<br/> Ethical hacking : (hacking kursu) ent://SD_ILS/0/SD_ILS:423950 2026-01-26T23:04:42Z 2026-01-26T23:04:42Z Yazar&#160;Usta, G&ouml;khan.<br/>Yer Numaras&#305;&#160;QA76.9.A25 U88 2019<br/>Format:&#160;Kitap<br/>Durum&#160;Beytepe K&uuml;t&uuml;phanesi~1<br/> Hardware security : a hands-on learning approach ent://SD_ILS/0/SD_ILS:460410 2026-01-26T23:04:42Z 2026-01-26T23:04:42Z Yazar&#160;Bhunia, Swarup, author.&#160;Tehranipoor, Mohammad H., 1974- author.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="https://www.sciencedirect.com/science/book/9780128124772">https://www.sciencedirect.com/science/book/9780128124772</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Cyber smart : five habits to protect your family, money, and identity from cyber criminals ent://SD_ILS/0/SD_ILS:594967 2026-01-26T23:04:42Z 2026-01-26T23:04:42Z Yazar&#160;McDonough, Bart R., author.<br/>Yer Numaras&#305;&#160;TK5105.59<br/>Elektronik Eri&#351;im&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119559658">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119559658</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Cyber security in parallel and distributed computing : concepts, techniques, applications and case studies ent://SD_ILS/0/SD_ILS:595099 2026-01-26T23:04:42Z 2026-01-26T23:04:42Z Yazar&#160;Le, Dac-Nhuong, 1983- editor.&#160;Kumar, Raghvendra, 1987- editor.&#160;Mishra, Brojo Kishore, 1979- editor.&#160;Khari, Manju, editor.&#160;Chatterjee, Jyotir Moy, editor.<br/>Yer Numaras&#305;&#160;QA76.9 .A25<br/>Elektronik Eri&#351;im&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119488330">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119488330</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> The Digital Big Bang : the Hard Stuff, the Soft Stuff, and the Future of Cybersecurity ent://SD_ILS/0/SD_ILS:595435 2026-01-26T23:04:42Z 2026-01-26T23:04:42Z Yazar&#160;Quade, Phil.<br/>Yer Numaras&#305;&#160;QA76.9 .A25<br/>Elektronik Eri&#351;im&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119617396">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119617396</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Cybersecurity blue team toolkit ent://SD_ILS/0/SD_ILS:595209 2026-01-26T23:04:42Z 2026-01-26T23:04:42Z Yazar&#160;Tanner, Nadean H., author.<br/>Yer Numaras&#305;&#160;QA76.9 .A25 T36 2019 EB<br/>Elektronik Eri&#351;im&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119552963">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119552963</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Tribe of hackers red team : tribal knowledge from the best in offensive cybersecurity ent://SD_ILS/0/SD_ILS:595415 2026-01-26T23:04:42Z 2026-01-26T23:04:42Z Yazar&#160;Carey, Marcus J. (Cybersecurity professional), author.&#160;Jin, Jennifer, author.<br/>Yer Numaras&#305;&#160;QA76.9 .A25 C368 2019<br/>Elektronik Eri&#351;im&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119643357">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119643357</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Cyber-vigilance and digital trust : cyber security in the era of cloud computing and IoT ent://SD_ILS/0/SD_ILS:595279 2026-01-26T23:04:42Z 2026-01-26T23:04:42Z Yazar&#160;Tounsi, Wiem, editor.<br/>Yer Numaras&#305;&#160;QA76.9 .A25 C93 2019 EB<br/>Elektronik Eri&#351;im&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119618393">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119618393</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Transformational security awareness : what neuroscientists, storytellers, and marketers can teach us about driving secure behaviors ent://SD_ILS/0/SD_ILS:595304 2026-01-26T23:04:42Z 2026-01-26T23:04:42Z Yazar&#160;Carpenter, Perry, author.<br/>Yer Numaras&#305;&#160;QA76.9 .A25 C37 2019 EB<br/>Elektronik Eri&#351;im&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119566380">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119566380</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Tribe of hackers : cybersecurity advice from the best hackers in the world ent://SD_ILS/0/SD_ILS:595418 2026-01-26T23:04:42Z 2026-01-26T23:04:42Z Yazar&#160;Carey, Marcus J. (Cybersecurity professional), author.&#160;Jin, Jennifer, author.<br/>Yer Numaras&#305;&#160;QA76.9 .A25 C37 2019 EB<br/>Elektronik Eri&#351;im&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119643395">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119643395</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> We have root : even more advice from Schneier on security ent://SD_ILS/0/SD_ILS:595432 2026-01-26T23:04:42Z 2026-01-26T23:04:42Z Yazar&#160;Schneier, Bruce, 1963- author.<br/>Yer Numaras&#305;&#160;QA76.9 .A25 S36 2019<br/>Elektronik Eri&#351;im&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119653554">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119653554</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Digital forensics ent://SD_ILS/0/SD_ILS:593346 2026-01-26T23:04:42Z 2026-01-26T23:04:42Z Yazar&#160;&Aring;rnes, Andr&eacute;, 1976- editor.<br/>Yer Numaras&#305;&#160;HV8079 .C65<br/>Elektronik Eri&#351;im&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119262442">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119262442</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Social engineering : the science of human hacking ent://SD_ILS/0/SD_ILS:594635 2026-01-26T23:04:42Z 2026-01-26T23:04:42Z Yazar&#160;Hadnagy, Christopher, author.<br/>Yer Numaras&#305;&#160;HM668 .H33 2018<br/>Elektronik Eri&#351;im&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119433729">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119433729</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> An introduction to cyber modeling and simulation ent://SD_ILS/0/SD_ILS:594699 2026-01-26T23:04:42Z 2026-01-26T23:04:42Z Yazar&#160;Couretas, Jerry M., 1966- author.<br/>Yer Numaras&#305;&#160;QA76.9 .C65<br/>Elektronik Eri&#351;im&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119420842">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119420842</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Windows security monitoring : scenarios and patterns ent://SD_ILS/0/SD_ILS:594404 2026-01-26T23:04:42Z 2026-01-26T23:04:42Z Yazar&#160;Miroshnikov, Andrei, author.<br/>Yer Numaras&#305;&#160;QA76.9 .A25<br/>Elektronik Eri&#351;im&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119390909">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119390909</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Insider threats ent://SD_ILS/0/SD_ILS:594407 2026-01-26T23:04:42Z 2026-01-26T23:04:42Z Yazar&#160;Arduin, Pierre-Emmanuel, author.<br/>Yer Numaras&#305;&#160;QA76.9 .A25<br/>Elektronik Eri&#351;im&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119419785">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119419785</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Exploit geli&#351;tirme 101 ent://SD_ILS/0/SD_ILS:389077 2026-01-26T23:04:42Z 2026-01-26T23:04:42Z Yazar&#160;Aky&#305;ld&#305;z, M. Alparslan.<br/>Yer Numaras&#305;&#160;QA76.9.A25 A59 2018<br/>Format:&#160;Kitap<br/>Durum&#160;Beytepe K&uuml;t&uuml;phanesi~2<br/> Handbook of system safety and security : cyber risk and risk management, cyber security, threat analysis, functional safety, software systems, and cyber physical systems ent://SD_ILS/0/SD_ILS:459145 2026-01-26T23:04:42Z 2026-01-26T23:04:42Z Yazar&#160;Griffor, Edward R., editor.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128037737">http://www.sciencedirect.com/science/book/9780128037737</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Building a practical information security program ent://SD_ILS/0/SD_ILS:459146 2026-01-26T23:04:42Z 2026-01-26T23:04:42Z Yazar&#160;Andress, Jason, author.&#160;Leary, Mark, author.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128020425">http://www.sciencedirect.com/science/book/9780128020425</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Information security fundamentals ent://SD_ILS/0/SD_ILS:539922 2026-01-26T23:04:42Z 2026-01-26T23:04:42Z Yazar&#160;Peltier, Thomas R.<br/>Yer Numaras&#305;&#160;QA76.9 .A25<br/>Elektronik Eri&#351;im&#160;<a href="https://www.taylorfrancis.com/books/9780429130281">Taylor & Francis eBooks</a> Taylor & Francis <a href="https://www.taylorfrancis.com/books/9780429130281">https://www.taylorfrancis.com/books/9780429130281</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Security for Service Oriented Architectures. ent://SD_ILS/0/SD_ILS:542633 2026-01-26T23:04:42Z 2026-01-26T23:04:42Z Yazar&#160;Williams, Walter, author.&#160;CRC Press LLC.<br/>Yer Numaras&#305;&#160;TK5105.5828 .W55 2017<br/>Elektronik Eri&#351;im&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9780429072185">https://www.taylorfrancis.com/books/9780429072185</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> The basics of cyber safety : computer and mobile device safety made easy ent://SD_ILS/0/SD_ILS:459044 2026-01-26T23:04:42Z 2026-01-26T23:04:42Z Yazar&#160;Sammons, John, author.&#160;Cross, Michael, 1965- author.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780124166509">http://www.sciencedirect.com/science/book/9780124166509</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Advanced persistent security : a cyberwarfare approach to implementing adaptive enterprise protection, detection, and reaction strategies ent://SD_ILS/0/SD_ILS:459204 2026-01-26T23:04:42Z 2026-01-26T23:04:42Z Yazar&#160;Winkler, Ira, author.&#160;Gomes, Araceli Treu, author.&#160;Shackleford, Dave, editor.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="https://www.sciencedirect.com/science/book/9780128093160">https://www.sciencedirect.com/science/book/9780128093160</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Wireshark for security professionals : using Wireshark and the Metasploit Framework ent://SD_ILS/0/SD_ILS:593472 2026-01-26T23:04:42Z 2026-01-26T23:04:42Z Yazar&#160;Bullock, Jessey, author.&#160;Gordon, Adam, author.<br/>Yer Numaras&#305;&#160;QA76.9 .A25<br/>Elektronik Eri&#351;im&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119183457">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119183457</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Hacking the hacker : learn from the experts who take down hackers ent://SD_ILS/0/SD_ILS:593636 2026-01-26T23:04:42Z 2026-01-26T23:04:42Z Yazar&#160;Grimes, Roger A., author.<br/>Yer Numaras&#305;&#160;QA76.9 .A25<br/>Elektronik Eri&#351;im&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119396260">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119396260</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Securing the internet of things ent://SD_ILS/0/SD_ILS:459335 2026-01-26T23:04:42Z 2026-01-26T23:04:42Z Yazar&#160;Li, Shancang, author.&#160;Xu, Li D., author.&#160;Romdhani, Imed, contributor.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="https://www.sciencedirect.com/science/book/9780128044582">https://www.sciencedirect.com/science/book/9780128044582</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> DNS security management ent://SD_ILS/0/SD_ILS:593802 2026-01-26T23:04:42Z 2026-01-26T23:04:42Z Yazar&#160;Dooley, Michael, 1962- author.&#160;Rooney, Timothy, 1962- author.<br/>Yer Numaras&#305;&#160;QA76.9 .A25<br/>Elektronik Eri&#351;im&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119328292">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119328292</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Cybersecurity essentials ent://SD_ILS/0/SD_ILS:594756 2026-01-26T23:04:42Z 2026-01-26T23:04:42Z Yazar&#160;Brooks, Charles J., author.&#160;Grow, Christopher, author.&#160;Craig, Philip, author.&#160;Short, Donald, author.<br/>Yer Numaras&#305;&#160;TK5105.59<br/>Elektronik Eri&#351;im&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119369141">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119369141</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Cyber security awareness for CEOs and management ent://SD_ILS/0/SD_ILS:458665 2026-01-26T23:04:42Z 2026-01-26T23:04:42Z Yazar&#160;Willson, David (Lawyer), author.&#160;Dalziel, Henry, editor.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128047545">http://www.sciencedirect.com/science/book/9780128047545</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Windows registry forensics : advanced digital forensic analysis of the Windows registry ent://SD_ILS/0/SD_ILS:458777 2026-01-26T23:04:42Z 2026-01-26T23:04:42Z Yazar&#160;Carvey, Harlan A., author.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128032916">http://www.sciencedirect.com/science/book/9780128032916</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> OS X incident response : scripting and analysis ent://SD_ILS/0/SD_ILS:458869 2026-01-26T23:04:42Z 2026-01-26T23:04:42Z Yazar&#160;Bradley, Jaron, author.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128044568">http://www.sciencedirect.com/science/book/9780128044568</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Threat forecasting : leveraging big data for predictive analysis ent://SD_ILS/0/SD_ILS:458886 2026-01-26T23:04:42Z 2026-01-26T23:04:42Z Yazar&#160;Pirc, John, author.&#160;DeSanto, David, author.&#160;Davison, Iain, author.&#160;Gragido, Will, author.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="https://www.sciencedirect.com/science/book/9780128000069">https://www.sciencedirect.com/science/book/9780128000069</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Mobile data loss : threats and countermeasures ent://SD_ILS/0/SD_ILS:458729 2026-01-26T23:04:42Z 2026-01-26T23:04:42Z Yazar&#160;Raggo, Michael T.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="https://www.sciencedirect.com/science/book/9780128028643">https://www.sciencedirect.com/science/book/9780128028643</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Data breach preparation and response : breaches are certain, impact is not ent://SD_ILS/0/SD_ILS:458926 2026-01-26T23:04:42Z 2026-01-26T23:04:42Z Yazar&#160;Fowler, Kevvie, author.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="https://www.sciencedirect.com/science/book/9780128034514">https://www.sciencedirect.com/science/book/9780128034514</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> DNS security : defending the domain name system ent://SD_ILS/0/SD_ILS:458935 2026-01-26T23:04:42Z 2026-01-26T23:04:42Z Yazar&#160;Liska, Allan, author.&#160;Stowe, Geoffrey, author.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128033067">http://www.sciencedirect.com/science/book/9780128033067</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Information security science : measuring the vulnerability to data compromises ent://SD_ILS/0/SD_ILS:458968 2026-01-26T23:04:42Z 2026-01-26T23:04:42Z Yazar&#160;Young, Carl S., author.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128096437">http://www.sciencedirect.com/science/book/9780128096437</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Cyber and electromagnetic threats in modern relay protection ent://SD_ILS/0/SD_ILS:543446 2026-01-26T23:04:42Z 2026-01-26T23:04:42Z Yazar&#160;Gurevich, Vladimir, 1956, author.<br/>Yer Numaras&#305;&#160;TK2861 .G87 2015<br/>Elektronik Eri&#351;im&#160;<a href="https://www.taylorfrancis.com/books/9781482264326">Click here to view.</a><br/>Format:&#160;Kitap<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Hardware security : design, threats, and safeguards ent://SD_ILS/0/SD_ILS:543620 2026-01-26T23:04:42Z 2026-01-26T23:04:42Z Yazar&#160;Mukhopadhyay, Debdeep, author.&#160;Subhra, Rajat, author.<br/>Yer Numaras&#305;&#160;QA76.9 .A25 M85 2015<br/>Elektronik Eri&#351;im&#160;<a href="https://www.taylorfrancis.com/books/9781439895849">Click here to view.</a><br/>Format:&#160;Kitap<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> CSA guide to cloud computing implementing cloud privacy and security ent://SD_ILS/0/SD_ILS:355449 2026-01-26T23:04:42Z 2026-01-26T23:04:42Z Yazar&#160;Samani, Raj, author.&#160;Honan, Brian, author.&#160;Reavis, Jim, author.&#160;Jirasek, Vladimir, editor.&#160;CSA (Organization), issuing body.<br/>Yer Numaras&#305;&#160;ONLINE(355449.1)<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780124201255">http://www.sciencedirect.com/science/book/9780124201255</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Dissecting the hack : the v3rb0ten network ent://SD_ILS/0/SD_ILS:458624 2026-01-26T23:04:42Z 2026-01-26T23:04:42Z Yazar&#160;Street, Jayson E., author.&#160;Sims, Kristin, author.&#160;Baskin, Brian, author.&#160;Martin, Brian, editor.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="https://www.sciencedirect.com/science/book/9780128042786">https://www.sciencedirect.com/science/book/9780128042786</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Measuring and managing information risk : a FAIR approach ent://SD_ILS/0/SD_ILS:355576 2026-01-26T23:04:42Z 2026-01-26T23:04:42Z Yazar&#160;Freund, Jack, author.&#160;Jones, Jack, author.<br/>Yer Numaras&#305;&#160;ONLINE(355576.1)<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780124202313">http://www.sciencedirect.com/science/book/9780124202313</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Introduction to modern cryptography ent://SD_ILS/0/SD_ILS:364315 2026-01-26T23:04:42Z 2026-01-26T23:04:42Z Yazar&#160;Katz, Jonathan, 1974-&#160;Lindell, Yehuda.<br/>Yer Numaras&#305;&#160;QA76.9.A25 K36 2015<br/>Format:&#160;Kitap<br/>Durum&#160;Beytepe K&uuml;t&uuml;phanesi~2<br/> Information security analytics finding security insights, patterns, and anomalies in big data ent://SD_ILS/0/SD_ILS:355388 2026-01-26T23:04:42Z 2026-01-26T23:04:42Z Yazar&#160;Talabis, Mark, author.&#160;McPherson, Robert, author.&#160;Miyamoto, I, author.&#160;Martin, Jason L., author.<br/>Yer Numaras&#305;&#160;ONLINE(355388.1)<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128002070">http://www.sciencedirect.com/science/book/9780128002070</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Security management : a critical thinking approach ent://SD_ILS/0/SD_ILS:539725 2026-01-26T23:04:42Z 2026-01-26T23:04:42Z Yazar&#160;Land, Michael (Industrial engineer), author.&#160;Ricks, Truett A., author.&#160;Ricks, Bob, author.<br/>Yer Numaras&#305;&#160;HD61.5 .L36 2014<br/>Elektronik Eri&#351;im&#160;<a href="https://www.taylorfrancis.com/books/9781466561786">Click here to view.</a><br/>Format:&#160;Kitap<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> What every engineer should know about cyber security and digital forensics ent://SD_ILS/0/SD_ILS:539726 2026-01-26T23:04:42Z 2026-01-26T23:04:42Z Yazar&#160;DeFranco, Joanna F., author.<br/>Yer Numaras&#305;&#160;TK5105.59 .D44 2014<br/>Elektronik Eri&#351;im&#160;<a href="https://www.taylorfrancis.com/books/9781466564541">Click here to view.</a><br/>Format:&#160;Kitap<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> The state of the art in intrusion prevention and detection ent://SD_ILS/0/SD_ILS:543676 2026-01-26T23:04:42Z 2026-01-26T23:04:42Z Yazar&#160;Pathan, Al-Sakib Khan, editor.<br/>Yer Numaras&#305;&#160;QA76.9 .A25 S7354 2014<br/>Elektronik Eri&#351;im&#160;<a href="https://www.taylorfrancis.com/books/9781482203523">Click here to view.</a><br/>Format:&#160;Kitap<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Network security essentials : applications and standards ent://SD_ILS/0/SD_ILS:354232 2026-01-26T23:04:42Z 2026-01-26T23:04:42Z Yazar&#160;Stallings, William.<br/>Yer Numaras&#305;&#160;TK5105.59 S725 2014<br/>Format:&#160;Kitap<br/>Durum&#160;Beytepe K&uuml;t&uuml;phanesi~1<br/> Cyber threat! : how to manage the growing risk of cyber attacks ent://SD_ILS/0/SD_ILS:342020 2026-01-26T23:04:42Z 2026-01-26T23:04:42Z Yazar&#160;Ulsch, N. MacDonnell, 1951-<br/>Yer Numaras&#305;&#160;ONLINE(342020.1)<br/>Elektronik Eri&#351;im&#160;ebrary <a href="http://alltitles.ebrary.com/Doc?id=10895757">An electronic book accessible through the World Wide Web; click to view</a> Ebook Library <a href="http://public.eblib.com/choice/publicfullrecord.aspx?p=1742833">http://public.eblib.com/choice/publicfullrecord.aspx?p=1742833</a> John Wiley <a href="http://dx.doi.org/10.1002/9781118915028">http://dx.doi.org/10.1002/9781118915028</a> MyiLibrary <a href="http://www.myilibrary.com?id=629214">http://www.myilibrary.com?id=629214</a> Cover <a href="http://swbplus.bsz-bw.de/bsz410564842cov.htm">http://swbplus.bsz-bw.de/bsz410564842cov.htm</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Industrial network security : securing critical infrastructure networks for Smart Grid, SCADA , and other industrial control systems ent://SD_ILS/0/SD_ILS:355352 2026-01-26T23:04:42Z 2026-01-26T23:04:42Z Yazar&#160;Knapp, Eric D.&#160;Langill, Joel Thomas.<br/>Yer Numaras&#305;&#160;ONLINE(355352.1)<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780124201149">http://www.sciencedirect.com/science/book/9780124201149</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Online security for the business traveler ent://SD_ILS/0/SD_ILS:355575 2026-01-26T23:04:42Z 2026-01-26T23:04:42Z Yazar&#160;Gonzalez, Deborah, author.<br/>Yer Numaras&#305;&#160;ONLINE(355575.1)<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128000694">http://www.sciencedirect.com/science/book/9780128000694</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Cryptography and network security : principles and practice ent://SD_ILS/0/SD_ILS:371288 2026-01-26T23:04:42Z 2026-01-26T23:04:42Z Yazar&#160;Stallings, William.<br/>Yer Numaras&#305;&#160;TK5105.59 S713 2014<br/>Format:&#160;Kitap<br/>Durum&#160;Beytepe K&uuml;t&uuml;phanesi~1<br/> Cloud management and security ent://SD_ILS/0/SD_ILS:341816 2026-01-26T23:04:42Z 2026-01-26T23:04:42Z Yazar&#160;Abbadi, Imad M., author.<br/>Yer Numaras&#305;&#160;ONLINE(341816.1)<br/>Elektronik Eri&#351;im&#160;ebrary <a href="http://alltitles.ebrary.com/Doc?id=10881234">An electronic book accessible through the World Wide Web; click to view</a> <a href="http://www.lib.uts.edu.au/sso/goto.php?url=http://www.UTS.eblib.com.AU/EBLWeb/patron/?target=patron&extendedid=P_1701403_0">Electronic version</a> Cover image <a href="http://catalogimages.wiley.com/images/db/jimages/9781118817094.jpg">http://catalogimages.wiley.com/images/db/jimages/9781118817094.jpg</a> John Wiley <a href="http://dx.doi.org/10.1002/9781118817087">http://dx.doi.org/10.1002/9781118817087</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Collaboration with cloud computing : security, social media, and unified communications ent://SD_ILS/0/SD_ILS:355829 2026-01-26T23:04:42Z 2026-01-26T23:04:42Z Yazar&#160;Messier, Ric, author.<br/>Yer Numaras&#305;&#160;ONLINE(355829.1)<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780124170407">http://www.sciencedirect.com/science/book/9780124170407</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Windows forensic analysis toolkit : advanced analysis techniques for Windows 8 ent://SD_ILS/0/SD_ILS:355909 2026-01-26T23:04:42Z 2026-01-26T23:04:42Z Yazar&#160;Carvey, Harlan A., author.<br/>Yer Numaras&#305;&#160;ONLINE(355909.1)<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780124171572">http://www.sciencedirect.com/science/book/9780124171572</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Security without obscurity : a guide to confidentiality, authentication, and integrity ent://SD_ILS/0/SD_ILS:544118 2026-01-26T23:04:42Z 2026-01-26T23:04:42Z Yazar&#160;Stapleton, Jeffrey James, author.<br/>Yer Numaras&#305;&#160;QA76.9 .A25 S734 2014<br/>Elektronik Eri&#351;im&#160;<a href="https://www.taylorfrancis.com/books/9781466592155">Click here to view.</a><br/>Format:&#160;Kitap<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Linux Malware Incident Response an Excerpt from Malware Forensic Field Guide for Linux Systems. ent://SD_ILS/0/SD_ILS:306697 2026-01-26T23:04:42Z 2026-01-26T23:04:42Z Yazar&#160;Malin, Cameron H.&#160;Casey, Eoghan.&#160;Aquilina, James M.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780124095076">http://www.sciencedirect.com/science/book/9780124095076</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Federated identity primer ent://SD_ILS/0/SD_ILS:306461 2026-01-26T23:04:42Z 2026-01-26T23:04:42Z Yazar&#160;Rountree, Derrick.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780124071896">http://www.sciencedirect.com/science/book/9780124071896</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Digital forensics for handheld devices ent://SD_ILS/0/SD_ILS:541429 2026-01-26T23:04:42Z 2026-01-26T23:04:42Z Yazar&#160;Doherty, Eamon P., author.<br/>Yer Numaras&#305;&#160;HV8079 .C65 D64 2013<br/>Elektronik Eri&#351;im&#160;<a href="https://www.taylorfrancis.com/books/9781439898789">Click here to view.</a><br/>Format:&#160;Kitap<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Security for wireless sensor networks using identity-based cryptography ent://SD_ILS/0/SD_ILS:544612 2026-01-26T23:04:42Z 2026-01-26T23:04:42Z Yazar&#160;Patil, Harsh Kupwade., author.&#160;Szygenda, Stephen A.<br/>Yer Numaras&#305;&#160;QA76.9 .A25 P38 2013<br/>Elektronik Eri&#351;im&#160;<a href="https://www.taylorfrancis.com/books/9781439869024">Click here to view.</a><br/>Format:&#160;Kitap<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Information security policy development for compliance : ISO/IEC 27001, NIST SP 800-53, HIPAA standard, PCI DSS V2.0, and AUP V5.0 ent://SD_ILS/0/SD_ILS:545128 2026-01-26T23:04:42Z 2026-01-26T23:04:42Z Yazar&#160;Williams, Barry L., author.<br/>Yer Numaras&#305;&#160;QA76.9 .A25 .W5495 2013<br/>Elektronik Eri&#351;im&#160;<a href="https://www.taylorfrancis.com/books/9781466580596">Click here to view.</a><br/>Format:&#160;Kitap<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> PRAGMATIC security metrics : applying metametrics to information security ent://SD_ILS/0/SD_ILS:541797 2026-01-26T23:04:42Z 2026-01-26T23:04:42Z Yazar&#160;Brotby, W. Krag., author.&#160;Hinson, Gary.&#160;Kabay, Michel E.<br/>Yer Numaras&#305;&#160;HD30.38 .B76 2013<br/>Elektronik Eri&#351;im&#160;<a href="https://www.taylorfrancis.com/books/9781439881538">Click here to view.</a><br/>Format:&#160;Kitap<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Discrete dynamical systems and chaotic machines : theory and applications ent://SD_ILS/0/SD_ILS:545715 2026-01-26T23:04:42Z 2026-01-26T23:04:42Z Yazar&#160;Bahi, Jacques Mohcine., author.&#160;Guyeux, Christophe.<br/>Yer Numaras&#305;&#160;QA76.9 .A25 B344 2013<br/>Elektronik Eri&#351;im&#160;<a href="https://www.taylorfrancis.com/books/9781466554511">Click here to view.</a><br/>Format:&#160;Kitap<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> The complete guide to physical security ent://SD_ILS/0/SD_ILS:545960 2026-01-26T23:04:42Z 2026-01-26T23:04:42Z Yazar&#160;Baker, Paul, 1958, author.&#160;Benny, Daniel J.<br/>Yer Numaras&#305;&#160;HV8290 .B34 2013<br/>Elektronik Eri&#351;im&#160;<a href="https://www.taylorfrancis.com/books/9781420099645">Click here to view.</a><br/>Format:&#160;Kitap<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Handbook of SCADA/control systems security ent://SD_ILS/0/SD_ILS:547855 2026-01-26T23:04:42Z 2026-01-26T23:04:42Z Yazar&#160;Radvanovsky, Robert.&#160;Brodsky, Jacob.<br/>Yer Numaras&#305;&#160;TK5105.59 .H3532 2013<br/>Elektronik Eri&#351;im&#160;<a href="https://www.taylorfrancis.com/books/9781466502277">Click here to view.</a><br/>Format:&#160;Kitap<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Elementary information security ent://SD_ILS/0/SD_ILS:271272 2026-01-26T23:04:42Z 2026-01-26T23:04:42Z Yazar&#160;Smith, Richard E.<br/>Yer Numaras&#305;&#160;QA76.9.A25 S652 2013<br/>Format:&#160;Kitap<br/>Durum&#160;Beytepe K&uuml;t&uuml;phanesi~1<br/> Information protection playbook ent://SD_ILS/0/SD_ILS:306649 2026-01-26T23:04:42Z 2026-01-26T23:04:42Z Yazar&#160;Kane, Greg, editor of compilation.&#160;Koppel, Lorna, editor of compilation.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780124172326">http://www.sciencedirect.com/science/book/9780124172326</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Data hiding exposing concealed data in multimedia, operating systems, mobile devices and network protocols ent://SD_ILS/0/SD_ILS:147602 2026-01-26T23:04:42Z 2026-01-26T23:04:42Z Yazar&#160;Raggo, Michael T.&#160;Hosmer, Chet.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597497435">http://www.sciencedirect.com/science/book/9781597497435</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Violent Python a cookbook for hackers, forensic analysts, penetration testers and security engineers ent://SD_ILS/0/SD_ILS:146917 2026-01-26T23:04:42Z 2026-01-26T23:04:42Z Yazar&#160;O'Connor, T. J.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597499576">http://www.sciencedirect.com/science/book/9781597499576</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Secret history : the story of cryptology ent://SD_ILS/0/SD_ILS:365258 2026-01-26T23:04:42Z 2026-01-26T23:04:42Z Yazar&#160;Bauer, Craig P.<br/>Yer Numaras&#305;&#160;QA76.9.A25 B384 2013<br/>Format:&#160;Kitap<br/>Durum&#160;Beytepe K&uuml;t&uuml;phanesi~1<br/> Network and application security fundamentals and practices ent://SD_ILS/0/SD_ILS:541627 2026-01-26T23:04:42Z 2026-01-26T23:04:42Z Yazar&#160;Ganguly, Debashis., author.&#160;Lahiri, Shibamouli.<br/>Yer Numaras&#305;&#160;TK5105.59 .G36 2012<br/>Elektronik Eri&#351;im&#160;<a href="https://www.taylorfrancis.com/books/9781466502451">Click here to view.</a><br/>Format:&#160;Kitap<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Data mining tools for malware detection ent://SD_ILS/0/SD_ILS:545796 2026-01-26T23:04:42Z 2026-01-26T23:04:42Z Yazar&#160;Masud, Mehedy., author.&#160;Khan, Latifur.&#160;Thuraisingham, Bhavani M.<br/>Yer Numaras&#305;&#160;QA76.9 .D343 M385 2012<br/>Elektronik Eri&#351;im&#160;<a href="https://www.taylorfrancis.com/books/9781439854556">Click here to view.</a><br/>Format:&#160;Kitap<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Secure and resilient software : requirements, test cases, and testing methods ent://SD_ILS/0/SD_ILS:540156 2026-01-26T23:04:42Z 2026-01-26T23:04:42Z Yazar&#160;Merkow, Mark S., author.&#160;Raghavan, Lakshmikanth.<br/>Yer Numaras&#305;&#160;QA76.76 .T48 M47 2012<br/>Elektronik Eri&#351;im&#160;<a href="https://www.taylorfrancis.com/books/9781439866221">Click here to view.</a><br/>Format:&#160;Kitap<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> RC4 stream cipher and its variants ent://SD_ILS/0/SD_ILS:538754 2026-01-26T23:04:42Z 2026-01-26T23:04:42Z Yazar&#160;Paul, Goutam., author.&#160;Maitra, Subhamoy, 1970-<br/>Yer Numaras&#305;&#160;QA76.9 .A25 P385 2012<br/>Elektronik Eri&#351;im&#160;<a href="https://www.taylorfrancis.com/books/9781439831373">Click here to view.</a><br/>Format:&#160;Kitap<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Cybersecurity for industrial control systems : SCADA, DCS, PLC, HMI, and SIS ent://SD_ILS/0/SD_ILS:543119 2026-01-26T23:04:42Z 2026-01-26T23:04:42Z Yazar&#160;Macaulay, Tyson., author.&#160;Singer, Bryan.<br/>Yer Numaras&#305;&#160;TS156.8 .M328 2012<br/>Elektronik Eri&#351;im&#160;<a href="https://www.taylorfrancis.com/books/9781439801987">Click here to view.</a><br/>Format:&#160;Kitap<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Hacking exposed 7 : network security secrets &amp; solutions ent://SD_ILS/0/SD_ILS:270033 2026-01-26T23:04:42Z 2026-01-26T23:04:42Z Yazar&#160;McClure, Stuart.&#160;Scambray, Joel.&#160;Kurtz, George.<br/>Yer Numaras&#305;&#160;TK5105.59 M48 2012<br/>Format:&#160;Kitap<br/>Durum&#160;Beytepe K&uuml;t&uuml;phanesi~1<br/> Computer architecture and security : fundamentals of designing secure computer systems ent://SD_ILS/0/SD_ILS:248865 2026-01-26T23:04:42Z 2026-01-26T23:04:42Z Yazar&#160;Wang, Shuangbao Paul.&#160;Ledley, Robert Steven.<br/>Yer Numaras&#305;&#160;QA76.9.A73 W36 2012<br/>Format:&#160;Kitap<br/>Durum&#160;Beytepe K&uuml;t&uuml;phanesi~1<br/> Windows forensic analysis toolkit advanced analysis techniques for Windows 7 ent://SD_ILS/0/SD_ILS:145689 2026-01-26T23:04:42Z 2026-01-26T23:04:42Z Yazar&#160;Carvey, Harlan A.&#160;Kolde, Jennifer.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597497275">http://www.sciencedirect.com/science/book/9781597497275</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Malware forensics field guide for Windows dystems digital forensics field guides ent://SD_ILS/0/SD_ILS:147898 2026-01-26T23:04:42Z 2026-01-26T23:04:42Z Yazar&#160;Malin, Cameron H.&#160;Casey, Eoghan.&#160;Aquilina, James M.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597494724">http://www.sciencedirect.com/science/book/9781597494724</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> The hacker's guide to OS X exploiting OS X from the root up ent://SD_ILS/0/SD_ILS:148006 2026-01-26T23:04:42Z 2026-01-26T23:04:42Z Yazar&#160;Bathurst, Robert.&#160;Rogers, Russ.&#160;Ghassemlouei, Alijohn.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597499507">http://www.sciencedirect.com/science/book/9781597499507</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Hacking web apps detecting and preventing web application security problems ent://SD_ILS/0/SD_ILS:148161 2026-01-26T23:04:42Z 2026-01-26T23:04:42Z Yazar&#160;Shema, Mike.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597499514">http://www.sciencedirect.com/science/book/9781597499514</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> SQL injection attacks and defense ent://SD_ILS/0/SD_ILS:148516 2026-01-26T23:04:42Z 2026-01-26T23:04:42Z Yazar&#160;Clarke, Justin.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597499637">http://www.sciencedirect.com/science/book/9781597499637</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Advances in intelligence and security informatics ent://SD_ILS/0/SD_ILS:146055 2026-01-26T23:04:42Z 2026-01-26T23:04:42Z Yazar&#160;Mao, Wenji.&#160;Wang, Fei-Yue.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780123972002">http://www.sciencedirect.com/science/book/9780123972002</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Embedded systems security practical methods for safe and secure software and systems development ent://SD_ILS/0/SD_ILS:146451 2026-01-26T23:04:42Z 2026-01-26T23:04:42Z Yazar&#160;Kleidermacher, David.&#160;Kleidermacher, Mike.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780123868862">http://www.sciencedirect.com/science/book/9780123868862</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Low tech hacking street smarts for security professionals ent://SD_ILS/0/SD_ILS:147742 2026-01-26T23:04:42Z 2026-01-26T23:04:42Z Yazar&#160;Wiles, Jack.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597496650">http://www.sciencedirect.com/science/book/9781597496650</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Computer security : principles and practice ent://SD_ILS/0/SD_ILS:313473 2026-01-26T23:04:42Z 2026-01-26T23:04:42Z Yazar&#160;Stallings, William.&#160;Brown, Lawrie<br/>Yer Numaras&#305;&#160;QA76.9 S73 2012<br/>Format:&#160;Kitap<br/>Durum&#160;Beytepe K&uuml;t&uuml;phanesi~1<br/> The 7 qualities of highly secure software ent://SD_ILS/0/SD_ILS:544951 2026-01-26T23:04:42Z 2026-01-26T23:04:42Z Yazar&#160;Paul, Mano., author.<br/>Yer Numaras&#305;&#160;QA76.9 .A25 P38 2012<br/>Elektronik Eri&#351;im&#160;<a href="https://www.taylorfrancis.com/books/9781439814475">Click here to view.</a><br/>Format:&#160;Kitap<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Security in computing ent://SD_ILS/0/SD_ILS:313297 2026-01-26T23:04:42Z 2026-01-26T23:04:42Z Yazar&#160;Pfleeger, Charles P., 1948-<br/>Yer Numaras&#305;&#160;QA76.9 A25 P45 2011<br/>Format:&#160;Kitap<br/>Durum&#160;Beytepe K&uuml;t&uuml;phanesi~1<br/> Data mining and machine learning in cybersecurity ent://SD_ILS/0/SD_ILS:540614 2026-01-26T23:04:42Z 2026-01-26T23:04:42Z Yazar&#160;Dua, Sumeet., author.&#160;Du, Xian.<br/>Yer Numaras&#305;&#160;QA76.9 .D343 D825 2011<br/>Elektronik Eri&#351;im&#160;<a href="https://www.taylorfrancis.com/books/9781439839430">Click here to view.</a><br/>Format:&#160;Kitap<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Machine learning forensics for law enforcement, security, and intelligence ent://SD_ILS/0/SD_ILS:544765 2026-01-26T23:04:42Z 2026-01-26T23:04:42Z Yazar&#160;Mena, Jesus., author.<br/>Yer Numaras&#305;&#160;HV8073 .M395 2011<br/>Elektronik Eri&#351;im&#160;<a href="https://www.taylorfrancis.com/books/9781439860700">Click here to view.</a><br/>Format:&#160;Kitap<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Honeypot : a new paradigm to information security ent://SD_ILS/0/SD_ILS:545590 2026-01-26T23:04:42Z 2026-01-26T23:04:42Z Yazar&#160;Joshi, R. C., author.&#160;Sardana, Anjali.<br/>Yer Numaras&#305;&#160;QA76.9 .A25 J66 2011<br/>Elektronik Eri&#351;im&#160;<a href="https://www.taylorfrancis.com/books/9781439869994">Click here to view.</a><br/>Format:&#160;Kitap<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Official (ISC)2 guide to the ISSMP CBK ent://SD_ILS/0/SD_ILS:544375 2026-01-26T23:04:42Z 2026-01-26T23:04:42Z Yazar&#160;Tipton, Harold F.<br/>Yer Numaras&#305;&#160;QA76.9 .A25 O34 2011<br/>Elektronik Eri&#351;im&#160;<a href="https://www.taylorfrancis.com/books/9781420094442">Click here to view.</a><br/>Format:&#160;Kitap<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Security de-engineering : solving the problems in information risk management ent://SD_ILS/0/SD_ILS:545608 2026-01-26T23:04:42Z 2026-01-26T23:04:42Z Yazar&#160;Tibble, Ian., author.<br/>Yer Numaras&#305;&#160;HF5548.37 .T53 2011<br/>Elektronik Eri&#351;im&#160;<a href="https://www.taylorfrancis.com/books/9781439868355">Click here to view.</a><br/>Format:&#160;Kitap<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> The security risk assessment handbook : a complete guide for performing security risk assessments ent://SD_ILS/0/SD_ILS:539743 2026-01-26T23:04:42Z 2026-01-26T23:04:42Z Yazar&#160;Landoll, Douglas J., author.<br/>Yer Numaras&#305;&#160;HF5548.37 .L358 2011<br/>Elektronik Eri&#351;im&#160;<a href="https://www.taylorfrancis.com/books/9781439821497">Click here to view.</a><br/>Format:&#160;Kitap<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Security and policy driven computing ent://SD_ILS/0/SD_ILS:539761 2026-01-26T23:04:42Z 2026-01-26T23:04:42Z Yazar&#160;Liu, Lei, 1968, author.<br/>Yer Numaras&#305;&#160;QA76.9 .A25 L587 2011<br/>Elektronik Eri&#351;im&#160;<a href="https://www.taylorfrancis.com/books/9781439825808">Click here to view.</a><br/>Format:&#160;Kitap<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Official (ISC)2 guide to the CSSLP ent://SD_ILS/0/SD_ILS:541754 2026-01-26T23:04:42Z 2026-01-26T23:04:42Z Yazar&#160;Paul, Mano., author.<br/>Yer Numaras&#305;&#160;QA76.76 .D47 P3775 2011<br/>Elektronik Eri&#351;im&#160;<a href="https://www.taylorfrancis.com/books/9781439826065">Click here to view.</a><br/>Format:&#160;Kitap<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Adaptive security management architecture ent://SD_ILS/0/SD_ILS:541852 2026-01-26T23:04:42Z 2026-01-26T23:04:42Z Yazar&#160;Tiller, James S., author.<br/>Yer Numaras&#305;&#160;QA76.9 .A25 T55 2011<br/>Elektronik Eri&#351;im&#160;<a href="https://www.taylorfrancis.com/books/9781420013375">Click here to view.</a><br/>Format:&#160;Kitap<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Security patch management ent://SD_ILS/0/SD_ILS:542763 2026-01-26T23:04:42Z 2026-01-26T23:04:42Z Yazar&#160;Nicastro, Felicia M., author.<br/>Yer Numaras&#305;&#160;QA76.9 .A25 N53 2011<br/>Elektronik Eri&#351;im&#160;<a href="https://www.taylorfrancis.com/books/9781439825006">Click here to view.</a><br/>Format:&#160;Kitap<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Managing risk in information systems ent://SD_ILS/0/SD_ILS:271251 2026-01-26T23:04:42Z 2026-01-26T23:04:42Z Yazar&#160;Gibson, Darril.<br/>Yer Numaras&#305;&#160;QA76.9.A25 G5 2011<br/>Format:&#160;Kitap<br/>Durum&#160;Beytepe K&uuml;t&uuml;phanesi~1<br/> Security strategies in Windows platforms and applications ent://SD_ILS/0/SD_ILS:271537 2026-01-26T23:04:42Z 2026-01-26T23:04:42Z Yazar&#160;Solomon, Michael.<br/>Yer Numaras&#305;&#160;QA76.76.O63 S64 2011<br/>Format:&#160;Kitap<br/>Durum&#160;Beytepe K&uuml;t&uuml;phanesi~1<br/> Security strategies in Linux platforms and applications ent://SD_ILS/0/SD_ILS:271539 2026-01-26T23:04:42Z 2026-01-26T23:04:42Z Yazar&#160;Jang, Michael H.<br/>Yer Numaras&#305;&#160;QA76.76.O63 J3638 2011<br/>Format:&#160;Kitap<br/>Durum&#160;Beytepe K&uuml;t&uuml;phanesi~1<br/> Security policies and implementation issues ent://SD_ILS/0/SD_ILS:271534 2026-01-26T23:04:42Z 2026-01-26T23:04:42Z Yazar&#160;Johnson, Rob (Robert)&#160;Merkow, Mark S.<br/>Yer Numaras&#305;&#160;QA76.9.A25 J64 2011<br/>Format:&#160;Kitap<br/>Durum&#160;Beytepe K&uuml;t&uuml;phanesi~1<br/> Auditing IT infrastructures for compliance ent://SD_ILS/0/SD_ILS:271151 2026-01-26T23:04:42Z 2026-01-26T23:04:42Z Yazar&#160;Weiss, Martin M.&#160;Solomon, Michael G.<br/>Yer Numaras&#305;&#160;QA76.9.A25 W428 2011<br/>Format:&#160;Kitap<br/>Durum&#160;Beytepe K&uuml;t&uuml;phanesi~1<br/> Hacker techniques, tools, and incident handling ent://SD_ILS/0/SD_ILS:271438 2026-01-26T23:04:42Z 2026-01-26T23:04:42Z Yazar&#160;Oriyano, Sean-Philip.&#160;Gregg, Michael (Michael C.)<br/>Yer Numaras&#305;&#160;TK5105.59 O786 2011<br/>Format:&#160;Kitap<br/>Durum&#160;Beytepe K&uuml;t&uuml;phanesi~1<br/> Information security principles and practice ent://SD_ILS/0/SD_ILS:298878 2026-01-26T23:04:42Z 2026-01-26T23:04:42Z Yazar&#160;Stamp, Mark.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;Wiley InterScience <a href="http://dx.doi.org/10.1002/9781118027974">An electronic book accessible through the World Wide Web; click for information</a> Ebook Library <a href="http://public.eblib.com/EBLPublic/PublicView.do?ptiID=738753">http://public.eblib.com/EBLPublic/PublicView.do?ptiID=738753</a> <a href="http://site.ebrary.com/lib/alltitles/Doc?id=10478419">http://site.ebrary.com/lib/alltitles/Doc?id=10478419</a> <a href="http://swb.eblib.com/patron/FullRecord.aspx?p=738753">http://swb.eblib.com/patron/FullRecord.aspx?p=738753</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> The basics of information security understanding the fundamentals of InfoSec in theory and practice ent://SD_ILS/0/SD_ILS:145371 2026-01-26T23:04:42Z 2026-01-26T23:04:42Z Yazar&#160;Andress, Jason.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597496537">http://www.sciencedirect.com/science/book/9781597496537</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Industrial network security securing critical infrastructure networks for Smart Grid, SCADA, and other industrial control systems ent://SD_ILS/0/SD_ILS:145457 2026-01-26T23:04:42Z 2026-01-26T23:04:42Z Yazar&#160;Knapp, Eric.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597496452">http://www.sciencedirect.com/science/book/9781597496452</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Windows Registry Forensics Advanced Digital Forensic Analysis of the Windows Registry. ent://SD_ILS/0/SD_ILS:145659 2026-01-26T23:04:42Z 2026-01-26T23:04:42Z Yazar&#160;Carvey, Harlan.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495806">http://www.sciencedirect.com/science/book/9781597495806</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Securing the cloud cloud computer security techniques and tactics ent://SD_ILS/0/SD_ILS:148980 2026-01-26T23:04:42Z 2026-01-26T23:04:42Z Yazar&#160;Winkler, J. R. (Joachim R.)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495929">http://www.sciencedirect.com/science/book/9781597495929</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Securing SQL server protecting your database from attackers ent://SD_ILS/0/SD_ILS:149034 2026-01-26T23:04:42Z 2026-01-26T23:04:42Z Yazar&#160;Cherry, Denny.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597496254">http://www.sciencedirect.com/science/book/9781597496254</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Web application obfuscation -/WAFs.. Evasion.. Filters//alert (/Obfuscation/)- ent://SD_ILS/0/SD_ILS:146922 2026-01-26T23:04:42Z 2026-01-26T23:04:42Z Yazar&#160;Heiderich, Mario.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597496049">http://www.sciencedirect.com/science/book/9781597496049</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Security 2020 reduce security risks this decade ent://SD_ILS/0/SD_ILS:318966 2026-01-26T23:04:42Z 2026-01-26T23:04:42Z Yazar&#160;Howard, Doug.&#160;Prince, Kevin.<br/>Yer Numaras&#305;&#160;ONLINE(318966.1)<br/>Elektronik Eri&#351;im&#160;Wiley InterScience <a href="http://dx.doi.org/10.1002/9781118255803">An electronic book accessible through the World Wide Web; click for information</a> Books24x7 <a href="http://www.books24x7.com/marc.asp?bookid=40805">http://www.books24x7.com/marc.asp?bookid=40805</a> Ebook Library <a href="http://public.eblib.com/choice/publicfullrecord.aspx?p=694289">http://public.eblib.com/choice/publicfullrecord.aspx?p=694289</a> ebrary <a href="http://site.ebrary.com/id/10469690">http://site.ebrary.com/id/10469690</a> MyiLibrary <a href="http://www.myilibrary.com?id=294413">http://www.myilibrary.com?id=294413</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Social engineering : the art of human hacking ent://SD_ILS/0/SD_ILS:377976 2026-01-26T23:04:42Z 2026-01-26T23:04:42Z Yazar&#160;Hadnagy, Christopher.<br/>Yer Numaras&#305;&#160;QA76.9.C66 H33 2011<br/>Format:&#160;Kitap<br/>Durum&#160;Beytepe K&uuml;t&uuml;phanesi~1<br/> Security 2020 reduce security risks this decade ent://SD_ILS/0/SD_ILS:303839 2026-01-26T23:04:42Z 2026-01-26T23:04:42Z Yazar&#160;Howard, Doug.&#160;Prince, Kevin.&#160;Wiley InterScience (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;Wiley InterScience <a href="http://dx.doi.org/10.1002/9781118255803">An electronic book accessible through the World Wide Web; click for information</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> IT audit, control, and security ent://SD_ILS/0/SD_ILS:304008 2026-01-26T23:04:42Z 2026-01-26T23:04:42Z Yazar&#160;Moeller, Robert R.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;Wiley InterScience <a href="http://dx.doi.org/10.1002/9781118269138">An electronic book accessible through the World Wide Web; click for information</a> Ebook Library <a href="http://public.eblib.com/EBLPublic/PublicView.do?ptiID=624573">http://public.eblib.com/EBLPublic/PublicView.do?ptiID=624573</a> Books24x7 <a href="http://www.books24x7.com/marc.asp?bookid=40717">http://www.books24x7.com/marc.asp?bookid=40717</a> <a href="http://site.ebrary.com/lib/alltitles/Doc?id=10469768">http://site.ebrary.com/lib/alltitles/Doc?id=10469768</a> <a href="http://swb.eblib.com/patron/FullRecord.aspx?p=624573">http://swb.eblib.com/patron/FullRecord.aspx?p=624573</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Seven deadliest USB attacks ent://SD_ILS/0/SD_ILS:306328 2026-01-26T23:04:42Z 2026-01-26T23:04:42Z Yazar&#160;Anderson, Brian (Brian James)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495530">http://www.sciencedirect.com/science/book/9781597495530</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Virtualization and forensics a digital forensic investigator's guide to virtual environments ent://SD_ILS/0/SD_ILS:306330 2026-01-26T23:04:42Z 2026-01-26T23:04:42Z Yazar&#160;Barrett, Diane.&#160;Kipper, Gregory.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495578">http://www.sciencedirect.com/science/book/9781597495578</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Vulnerability management ent://SD_ILS/0/SD_ILS:545698 2026-01-26T23:04:42Z 2026-01-26T23:04:42Z Yazar&#160;Foreman, Park., author.<br/>Yer Numaras&#305;&#160;QA76.9 .A25 F656 2010<br/>Elektronik Eri&#351;im&#160;<a href="https://www.taylorfrancis.com/books/9781439801512">Click here to view.</a><br/>Format:&#160;Kitap<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Risk analysis and security countermeasure selection ent://SD_ILS/0/SD_ILS:539402 2026-01-26T23:04:42Z 2026-01-26T23:04:42Z Yazar&#160;Norman, Thomas L., author.<br/>Yer Numaras&#305;&#160;HV8290 .N67 2010<br/>Elektronik Eri&#351;im&#160;<a href="https://www.taylorfrancis.com/books/9781420078718">Click here to view.</a><br/>Format:&#160;Kitap<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Information security risk analysis ent://SD_ILS/0/SD_ILS:538713 2026-01-26T23:04:42Z 2026-01-26T23:04:42Z Yazar&#160;Peltier, Thomas R., author.<br/>Yer Numaras&#305;&#160;QA76.9 .A25 P429 2010<br/>Elektronik Eri&#351;im&#160;<a href="https://www.taylorfrancis.com/books/9781439839577">Click here to view.</a><br/>Format:&#160;Kitap<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> The executive MBA in information security ent://SD_ILS/0/SD_ILS:539948 2026-01-26T23:04:42Z 2026-01-26T23:04:42Z Yazar&#160;Trinckes, John J., author.<br/>Yer Numaras&#305;&#160;HF5548.37 .T75 2010<br/>Elektronik Eri&#351;im&#160;<a href="https://www.taylorfrancis.com/books/9781439810088">Click here to view.</a><br/>Format:&#160;Kitap<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Cryptanalysis of RSA and its variants ent://SD_ILS/0/SD_ILS:542078 2026-01-26T23:04:42Z 2026-01-26T23:04:42Z Yazar&#160;Hinek, M. Jason., author.<br/>Yer Numaras&#305;&#160;TK5102.94 .H56 2010<br/>Elektronik Eri&#351;im&#160;<a href="https://www.taylorfrancis.com/books/9781420075199">Click here to view.</a><br/>Format:&#160;Kitap<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Mac security bible ent://SD_ILS/0/SD_ILS:303881 2026-01-26T23:04:42Z 2026-01-26T23:04:42Z Yazar&#160;Kissell, Joe.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;Wiley InterScience <a href="http://dx.doi.org/10.1002/9781118257739">An electronic book accessible through the World Wide Web; click for information</a> Safari Books Online <a href="http://proquest.safaribooksonline.com/640">http://proquest.safaribooksonline.com/640</a> <a href="http://proquest.safaribooksonline.com/?fpi=9780470474198">http://proquest.safaribooksonline.com/?fpi=9780470474198</a> Safari Books Online <a href="http://proquest.safaribooksonline.com/9780470474198">http://proquest.safaribooksonline.com/9780470474198</a> Books24x7 <a href="http://www.books24x7.com/marc.asp?bookid=40737">http://www.books24x7.com/marc.asp?bookid=40737</a> <a href="http://site.ebrary.com/lib/alltitles/Doc?id=10358774">http://site.ebrary.com/lib/alltitles/Doc?id=10358774</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Safety of computer architectures ent://SD_ILS/0/SD_ILS:304132 2026-01-26T23:04:42Z 2026-01-26T23:04:42Z Yazar&#160;Boulanger, Jean-Louis.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://lib.myilibrary.com?id=450000">Connect to MyiLibrary resource.</a> Wiley <a href="http://onlinelibrary.wiley.com/book/10.1002/9781118600696">http://onlinelibrary.wiley.com/book/10.1002/9781118600696</a> John Wiley <a href="http://dx.doi.org/10.1002/9781118600696">http://dx.doi.org/10.1002/9781118600696</a> ebrary <a href="http://site.ebrary.com/id/10657623">http://site.ebrary.com/id/10657623</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Dissecting the hack the forb1dd3n network ent://SD_ILS/0/SD_ILS:146585 2026-01-26T23:04:42Z 2026-01-26T23:04:42Z Yazar&#160;Street, Jayson E.&#160;Street, Jayson E. Dissecting the hack.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495684">http://www.sciencedirect.com/science/book/9781597495684</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Virtualization and forensics a digital forensic investigator's guide to virtual environments ent://SD_ILS/0/SD_ILS:146715 2026-01-26T23:04:42Z 2026-01-26T23:04:42Z Yazar&#160;Barrett, Diane.&#160;Kipper, Gregory.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495578">http://www.sciencedirect.com/science/book/9781597495578</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Managed code rootkits hooking into runtime environments ent://SD_ILS/0/SD_ILS:147836 2026-01-26T23:04:42Z 2026-01-26T23:04:42Z Yazar&#160;Metula, Erez.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495745">http://www.sciencedirect.com/science/book/9781597495745</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> System assurance beyond detecting vulnerabilities ent://SD_ILS/0/SD_ILS:148532 2026-01-26T23:04:42Z 2026-01-26T23:04:42Z Yazar&#160;Mansourov, Nikolai.&#160;Campara, Djenana.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780123814142">http://www.sciencedirect.com/science/book/9780123814142</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Seven deadliest USB attacks ent://SD_ILS/0/SD_ILS:148953 2026-01-26T23:04:42Z 2026-01-26T23:04:42Z Yazar&#160;Anderson, Brian (Brian James)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495530">http://www.sciencedirect.com/science/book/9781597495530</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Seven deadliest Microsoft attacks ent://SD_ILS/0/SD_ILS:149018 2026-01-26T23:04:42Z 2026-01-26T23:04:42Z Yazar&#160;Kraus, Rob.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495516">http://www.sciencedirect.com/science/book/9781597495516</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Seven deadliest wireless technologies attacks ent://SD_ILS/0/SD_ILS:149033 2026-01-26T23:04:42Z 2026-01-26T23:04:42Z Yazar&#160;Haines, Brad.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495417">http://www.sciencedirect.com/science/book/9781597495417</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> The basics of hacking and penetration testing ethical hacking and penetration testing made easy ent://SD_ILS/0/SD_ILS:145199 2026-01-26T23:04:42Z 2026-01-26T23:04:42Z Yazar&#160;Engebretson, Pat (Patrick Henry), 1974-<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597496551">http://www.sciencedirect.com/science/book/9781597496551</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Digital forensics for network, Internet, and cloud computing a forensic evidence guide for moving targets and data ent://SD_ILS/0/SD_ILS:146482 2026-01-26T23:04:42Z 2026-01-26T23:04:42Z Yazar&#160;Lillard, Terrence.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495370">http://www.sciencedirect.com/science/book/9781597495370</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> A guide to kernel exploitation attacking the core ent://SD_ILS/0/SD_ILS:148059 2026-01-26T23:04:42Z 2026-01-26T23:04:42Z Yazar&#160;Perla, Enrico.&#160;Massimiliano, Oldani.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597494861">http://www.sciencedirect.com/science/book/9781597494861</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Seven deadliest social network attacks ent://SD_ILS/0/SD_ILS:149145 2026-01-26T23:04:42Z 2026-01-26T23:04:42Z Yazar&#160;Timm, Carl.&#160;Perez, Richard, 1969 Oct. 17-&#160;Ely, Adam.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495455">http://www.sciencedirect.com/science/book/9781597495455</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Secure and resilient software development ent://SD_ILS/0/SD_ILS:545097 2026-01-26T23:04:42Z 2026-01-26T23:04:42Z Yazar&#160;Merkow, Mark S., author.&#160;Raghavan, Lakshmikanth.<br/>Yer Numaras&#305;&#160;QA76.76 .D47 M466 2010<br/>Elektronik Eri&#351;im&#160;<a href="https://www.taylorfrancis.com/books/9781439826973">Click here to view.</a><br/>Format:&#160;Kitap<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Security software development : assessing and managing security risks ent://SD_ILS/0/SD_ILS:543836 2026-01-26T23:04:42Z 2026-01-26T23:04:42Z Yazar&#160;Ashbaugh, Douglas A., author.<br/>Yer Numaras&#305;&#160;QA76.9 .A25 A8246 2009<br/>Elektronik Eri&#351;im&#160;<a href="https://www.taylorfrancis.com/books/9781420063813">Click here to view.</a><br/>Format:&#160;Kitap<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Profiling hackers : the science of criminal profiling as applied to the world of hacking ent://SD_ILS/0/SD_ILS:545973 2026-01-26T23:04:42Z 2026-01-26T23:04:42Z Yazar&#160;Chiesa, Raoul, 1973, author.&#160;Ducci, Stefania.&#160;Ciappi, Silvio, 1965-<br/>Yer Numaras&#305;&#160;HV6773 .C477 2009<br/>Elektronik Eri&#351;im&#160;<a href="https://www.taylorfrancis.com/books/9781420086942">Click here to view.</a><br/>Format:&#160;Kitap<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Architecting secure software systems ent://SD_ILS/0/SD_ILS:538962 2026-01-26T23:04:42Z 2026-01-26T23:04:42Z Yazar&#160;Talukder, Asoke K., author.&#160;Chaitanya, Manish.<br/>Yer Numaras&#305;&#160;QA76.9 .A25 T34 2009<br/>Elektronik Eri&#351;im&#160;<a href="https://www.taylorfrancis.com/books/9781420087857">Click here to view.</a><br/>Format:&#160;Kitap<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Cyber fraud : tactics, techniques, and procedures ent://SD_ILS/0/SD_ILS:540157 2026-01-26T23:04:42Z 2026-01-26T23:04:42Z Yazar&#160;Graham, James.&#160;Howard, Rick.<br/>Yer Numaras&#305;&#160;HV6773 .H69 2009<br/>Elektronik Eri&#351;im&#160;<a href="https://www.taylorfrancis.com/books/9781420091281">Click here to view.</a><br/>Format:&#160;Kitap<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Data protection : governance, risk management, and compliance ent://SD_ILS/0/SD_ILS:543918 2026-01-26T23:04:42Z 2026-01-26T23:04:42Z Yazar&#160;Hill, David G. (David Gary), 1943, author.<br/>Yer Numaras&#305;&#160;QA76.9 .A25 H52 2009<br/>Elektronik Eri&#351;im&#160;<a href="https://www.taylorfrancis.com/books/9781439806937">Click here to view.</a><br/>Format:&#160;Kitap<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> SQL injection attacks and defense ent://SD_ILS/0/SD_ILS:148576 2026-01-26T23:04:42Z 2026-01-26T23:04:42Z Yazar&#160;Clarke, Justin.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597494243">http://www.sciencedirect.com/science/book/9781597494243</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Computer forensics and cyber crime : an introduction ent://SD_ILS/0/SD_ILS:134036 2026-01-26T23:04:42Z 2026-01-26T23:04:42Z Yazar&#160;Britz, Marjie.<br/>Yer Numaras&#305;&#160;QA76.9.A25 B77 2009<br/>Format:&#160;Kitap<br/>Durum&#160;Beytepe K&uuml;t&uuml;phanesi~1<br/> Next generation SSH2 implementation securing data in motion ent://SD_ILS/0/SD_ILS:146275 2026-01-26T23:04:42Z 2026-01-26T23:04:42Z Yazar&#160;Liu, Dale.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492836">http://www.sciencedirect.com/science/book/9781597492836</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> CISO soft skills : securing organizations impaired by employee politics, apathy, and intolerant perspectives ent://SD_ILS/0/SD_ILS:544153 2026-01-26T23:04:42Z 2026-01-26T23:04:42Z Yazar&#160;Collette, Ronald D., author.&#160;Gentile, Michael.&#160;Gentile, Skye.<br/>Yer Numaras&#305;&#160;HF5548.37 .G462 2009<br/>Elektronik Eri&#351;im&#160;<a href="https://www.taylorfrancis.com/books/9781420089110">Click here to view.</a><br/>Format:&#160;Kitap<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Information security management metrics : a definitive guide to effective security monitoring and measurement ent://SD_ILS/0/SD_ILS:546952 2026-01-26T23:04:42Z 2026-01-26T23:04:42Z Yazar&#160;Brotby, W. Krag., author.<br/>Yer Numaras&#305;&#160;HD30.2 .B78 2009<br/>Elektronik Eri&#351;im&#160;<a href="https://www.taylorfrancis.com/books/9781420052862">Click here to view.</a><br/>Format:&#160;Kitap<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Building an effective information security policy architecture ent://SD_ILS/0/SD_ILS:540985 2026-01-26T23:04:42Z 2026-01-26T23:04:42Z Yazar&#160;Bacik, Sandy., author.<br/>Yer Numaras&#305;&#160;QA76.9 .A25 B335 2008<br/>Elektronik Eri&#351;im&#160;<a href="https://www.taylorfrancis.com/books/9781420059069">Click here to view.</a><br/>Format:&#160;Kitap<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Digital privacy : theory, technologies, and practices ent://SD_ILS/0/SD_ILS:547774 2026-01-26T23:04:42Z 2026-01-26T23:04:42Z Yazar&#160;Acquisti, Alessandro.<br/>Yer Numaras&#305;&#160;QA76.9 .A25 D528 2008<br/>Elektronik Eri&#351;im&#160;<a href="https://www.taylorfrancis.com/books/9781420052183">Click here to view.</a><br/>Format:&#160;Kitap<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Insider computer fraud : an in-depth framework for detecting and defending against insider IT attacks ent://SD_ILS/0/SD_ILS:544396 2026-01-26T23:04:42Z 2026-01-26T23:04:42Z Yazar&#160;Brancik, Kenneth C., author.<br/>Yer Numaras&#305;&#160;QA76.9 .A25 B725 2008<br/>Elektronik Eri&#351;im&#160;<a href="https://www.taylorfrancis.com/books/9781420046601">Click here to view.</a><br/>Format:&#160;Kitap<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Information assurance architecture ent://SD_ILS/0/SD_ILS:539830 2026-01-26T23:04:42Z 2026-01-26T23:04:42Z Yazar&#160;Willett, Keith D., author.<br/>Yer Numaras&#305;&#160;QA76.9 .A25 W5487 2008<br/>Elektronik Eri&#351;im&#160;<a href="https://www.taylorfrancis.com/books/9780849380686">Click here to view.</a><br/>Format:&#160;Kitap<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Infosecurity 2008 threat analysis ent://SD_ILS/0/SD_ILS:145541 2026-01-26T23:04:42Z 2026-01-26T23:04:42Z Yazar&#160;Clark, Champ, III.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492249">http://www.sciencedirect.com/science/book/9781597492249</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Information assurance dependability and security in networked systems ent://SD_ILS/0/SD_ILS:145553 2026-01-26T23:04:42Z 2026-01-26T23:04:42Z Yazar&#160;Qian, Yi, 1962-<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780123735669">http://www.sciencedirect.com/science/book/9780123735669</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Microsoft forefront security administration guide ent://SD_ILS/0/SD_ILS:146369 2026-01-26T23:04:42Z 2026-01-26T23:04:42Z Yazar&#160;Varsalone, Jesse.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492447">http://www.sciencedirect.com/science/book/9781597492447</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> No tech hacking a guide to social engineering, dumpster diving, and shoulder surfing ent://SD_ILS/0/SD_ILS:146362 2026-01-26T23:04:42Z 2026-01-26T23:04:42Z Yazar&#160;Long, Johnny.&#160;Mitnick, Kevin D. (Kevin David), 1963-<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492157">http://www.sciencedirect.com/science/book/9781597492157</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Malware forensics investigating and analyzing malicious code ent://SD_ILS/0/SD_ILS:147914 2026-01-26T23:04:42Z 2026-01-26T23:04:42Z Yazar&#160;Aquilina, James M.&#160;Casey, Eoghan.&#160;Malin, Cameron H.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492683">http://www.sciencedirect.com/science/book/9781597492683</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Google hacking for penetration testers. Volume 2 ent://SD_ILS/0/SD_ILS:148029 2026-01-26T23:04:42Z 2026-01-26T23:04:42Z Yazar&#160;Long, Johnny.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491761">http://www.sciencedirect.com/science/book/9781597491761</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> OS X exploits and defense ent://SD_ILS/0/SD_ILS:148242 2026-01-26T23:04:42Z 2026-01-26T23:04:42Z Yazar&#160;Baccas, Paul.&#160;Finisterre, Kevin.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492546">http://www.sciencedirect.com/science/book/9781597492546</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Scene of the cybercrime ent://SD_ILS/0/SD_ILS:148955 2026-01-26T23:04:42Z 2026-01-26T23:04:42Z Yazar&#160;Cross, Michael, 1965-&#160;Shinder, Debra Littlejohn. Scene of the cybercrime.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492768">http://www.sciencedirect.com/science/book/9781597492768</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Securing Windows server 2008 prevent attacks from outside and inside your organization. ent://SD_ILS/0/SD_ILS:148982 2026-01-26T23:04:42Z 2026-01-26T23:04:42Z Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492805">http://www.sciencedirect.com/science/book/9781597492805</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Securing Citrix XenApp Server in the enterprise ent://SD_ILS/0/SD_ILS:149050 2026-01-26T23:04:42Z 2026-01-26T23:04:42Z Yazar&#160;Bin Azad, Tariq.&#160;Wilson, Connie.&#160;Wright., Michael.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492812">http://www.sciencedirect.com/science/book/9781597492812</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Digital watermarking and steganography ent://SD_ILS/0/SD_ILS:146474 2026-01-26T23:04:42Z 2026-01-26T23:04:42Z Yazar&#160;Cox, I. J. (Ingemar J.)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780123725851">http://www.sciencedirect.com/science/book/9780123725851</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> OSSEC host-based intrusion detection guide ent://SD_ILS/0/SD_ILS:148333 2026-01-26T23:04:42Z 2026-01-26T23:04:42Z Yazar&#160;Hay, Andrew.&#160;Cid, Daniel.&#160;Bray, Rory.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492409">http://www.sciencedirect.com/science/book/9781597492409</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Practical embedded security building secure resource-constrained systems ent://SD_ILS/0/SD_ILS:147416 2026-01-26T23:04:42Z 2026-01-26T23:04:42Z Yazar&#160;Stapko, Timothy John.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780750682152">http://www.sciencedirect.com/science/book/9780750682152</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Metasploit toolkit for penetration testing, exploit development, and vulnerability research ent://SD_ILS/0/SD_ILS:306469 2026-01-26T23:04:42Z 2026-01-26T23:04:42Z Yazar&#160;Maynor, David.&#160;Mookhey, K. K.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490740">http://www.sciencedirect.com/science/book/9781597490740</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Software deployment, updating, and patching ent://SD_ILS/0/SD_ILS:544966 2026-01-26T23:04:42Z 2026-01-26T23:04:42Z Yazar&#160;Stackpole, Bill., author.&#160;Hanrion, Patrick.<br/>Yer Numaras&#305;&#160;QA76.76 .C69 S74 2007<br/>Elektronik Eri&#351;im&#160;<a href="https://www.taylorfrancis.com/books/9781420013290">Click here to view.</a><br/>Format:&#160;Kitap<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Information security : design, implementation, measurement, and compliance ent://SD_ILS/0/SD_ILS:545839 2026-01-26T23:04:42Z 2026-01-26T23:04:42Z Yazar&#160;Layton, Timothy P., author.<br/>Yer Numaras&#305;&#160;HF5548.37 .L393 2007<br/>Elektronik Eri&#351;im&#160;<a href="https://www.taylorfrancis.com/books/9781420013412">Click here to view.</a><br/>Format:&#160;Kitap<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Security in Distributed, Grid, Mobile, and Pervasive Computing. ent://SD_ILS/0/SD_ILS:544847 2026-01-26T23:04:42Z 2026-01-26T23:04:42Z Yer Numaras&#305;&#160;QA76.9<br/>Elektronik Eri&#351;im&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9780429119347">https://www.taylorfrancis.com/books/9780429119347</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Mechanics of user identification and authentication : fundamentals of identity management ent://SD_ILS/0/SD_ILS:539940 2026-01-26T23:04:42Z 2026-01-26T23:04:42Z Yazar&#160;Todorov, Dobromir., author.<br/>Yer Numaras&#305;&#160;TK5105.59 .T575 2007<br/>Elektronik Eri&#351;im&#160;<a href="https://www.taylorfrancis.com/books/9781420052206">Click here to view.</a><br/>Format:&#160;Kitap<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> How to cheat at securing your network ent://SD_ILS/0/SD_ILS:306503 2026-01-26T23:04:42Z 2026-01-26T23:04:42Z Yazar&#160;Dubrawsky, Ido.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492317">http://www.sciencedirect.com/science/book/9781597492317</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Grid computing security ent://SD_ILS/0/SD_ILS:248747 2026-01-26T23:04:42Z 2026-01-26T23:04:42Z Yazar&#160;Chakrabarti, Anirban.<br/>Yer Numaras&#305;&#160;QA76.9.C58 C53 2007<br/>Format:&#160;Kitap<br/>Durum&#160;Beytepe K&uuml;t&uuml;phanesi~1<br/> Botnets the killer web app ent://SD_ILS/0/SD_ILS:145283 2026-01-26T23:04:42Z 2026-01-26T23:04:42Z Yazar&#160;Schiller, Craig A.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491358">http://www.sciencedirect.com/science/book/9781597491358</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> How to cheat at securing your network ent://SD_ILS/0/SD_ILS:145654 2026-01-26T23:04:42Z 2026-01-26T23:04:42Z Yazar&#160;Dubrawsky, Ido.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492317">http://www.sciencedirect.com/science/book/9781597492317</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> How to cheat at securing SQL server 2005 ent://SD_ILS/0/SD_ILS:145655 2026-01-26T23:04:42Z 2026-01-26T23:04:42Z Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491969">http://www.sciencedirect.com/science/book/9781597491969</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Windows forensic analysis DVD toolkit ent://SD_ILS/0/SD_ILS:145678 2026-01-26T23:04:42Z 2026-01-26T23:04:42Z Yazar&#160;Carvey, Harlan A.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491563">http://www.sciencedirect.com/science/book/9781597491563</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Zen and the art of information security ent://SD_ILS/0/SD_ILS:145680 2026-01-26T23:04:42Z 2026-01-26T23:04:42Z Yazar&#160;Winkler, Ira.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491686">http://www.sciencedirect.com/science/book/9781597491686</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Microsoft windows security fundamentals ent://SD_ILS/0/SD_ILS:146346 2026-01-26T23:04:42Z 2026-01-26T23:04:42Z Yazar&#160;Clercq, Jan de, 1968-&#160;Grillenmeier, Guido.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781555583408">http://www.sciencedirect.com/science/book/9781555583408</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> WarDriving &amp; wireless penetration testing ent://SD_ILS/0/SD_ILS:146805 2026-01-26T23:04:42Z 2026-01-26T23:04:42Z Yazar&#160;Hurley, Chris.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491112">http://www.sciencedirect.com/science/book/9781597491112</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Physical and logical security convergence powered by enterprise security management ent://SD_ILS/0/SD_ILS:148192 2026-01-26T23:04:42Z 2026-01-26T23:04:42Z Yazar&#160;Contos, Brian T.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491228">http://www.sciencedirect.com/science/book/9781597491228</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Techno Security's guide to managing risks for IT managers, auditors, and investigators ent://SD_ILS/0/SD_ILS:148641 2026-01-26T23:04:42Z 2026-01-26T23:04:42Z Yazar&#160;Wiles, Jack.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491389">http://www.sciencedirect.com/science/book/9781597491389</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> FISMA certification &amp; accreditation handbook ent://SD_ILS/0/SD_ILS:145876 2026-01-26T23:04:42Z 2026-01-26T23:04:42Z Yazar&#160;Taylor, Laura.&#160;Shepherd, Matthew.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491167">http://www.sciencedirect.com/science/book/9781597491167</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Developer's guide to web application security ent://SD_ILS/0/SD_ILS:147664 2026-01-26T23:04:42Z 2026-01-26T23:04:42Z Yazar&#160;Cross, Michael, 1965-<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490610">http://www.sciencedirect.com/science/book/9781597490610</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> The official CHFI study guide (Exam 312-49) for computer hacking forensic investigator. ent://SD_ILS/0/SD_ILS:148388 2026-01-26T23:04:42Z 2026-01-26T23:04:42Z Yazar&#160;Kleiman, Dave.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491976">http://www.sciencedirect.com/science/book/9781597491976</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Open source fuzzing tools ent://SD_ILS/0/SD_ILS:148412 2026-01-26T23:04:42Z 2026-01-26T23:04:42Z Yazar&#160;Rathaus, Noam.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491952">http://www.sciencedirect.com/science/book/9781597491952</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Techno security's guide to e-discovery and digital forensics ent://SD_ILS/0/SD_ILS:148564 2026-01-26T23:04:42Z 2026-01-26T23:04:42Z Yazar&#160;Wiles, Jack.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492232">http://www.sciencedirect.com/science/book/9781597492232</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Security convergence managing enterprise security risk ent://SD_ILS/0/SD_ILS:149080 2026-01-26T23:04:42Z 2026-01-26T23:04:42Z Yazar&#160;Tyson, Dave.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;Volltext <a href="http://www.sciencedirect.com/science/book/9780750684255">http://www.sciencedirect.com/science/book/9780750684255</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Microsoft Vista for IT security professionals ent://SD_ILS/0/SD_ILS:146242 2026-01-26T23:04:42Z 2026-01-26T23:04:42Z Yazar&#160;Piltzecker, Tony, 1975-&#160;Chaffin, Larry.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491396">http://www.sciencedirect.com/science/book/9781597491396</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Web application vulnerabilities detect, exploit, prevent ent://SD_ILS/0/SD_ILS:146908 2026-01-26T23:04:42Z 2026-01-26T23:04:42Z Yazar&#160;Cross, Michael, 1965-<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492096">http://www.sciencedirect.com/science/book/9781597492096</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Metasploit Toolkit for Penetration Testing, Exploit Development, And Vulnerabiity Research ent://SD_ILS/0/SD_ILS:147051 2026-01-26T23:04:42Z 2026-01-26T23:04:42Z Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490740">http://www.sciencedirect.com/science/book/9781597490740</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Developer's guide to web application security ent://SD_ILS/0/SD_ILS:306464 2026-01-26T23:04:42Z 2026-01-26T23:04:42Z Yazar&#160;Cross, Michael, 1965-<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490610">http://www.sciencedirect.com/science/book/9781597490610</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Data warehousing and data mining techniques for cyber security ent://SD_ILS/0/SD_ILS:110434 2026-01-26T23:04:42Z 2026-01-26T23:04:42Z Yazar&#160;Singhal, Anoop, 1958-<br/>Yer Numaras&#305;&#160;QA76.9.A25 S563 2007<br/>Format:&#160;Kitap<br/>Durum&#160;Beytepe K&uuml;t&uuml;phanesi~1<br/> Security in computing ent://SD_ILS/0/SD_ILS:110682 2026-01-26T23:04:42Z 2026-01-26T23:04:42Z Yazar&#160;Pfleeger, Charles P., 1948-<br/>Yer Numaras&#305;&#160;QA76.9.A25 P45 2007<br/>Format:&#160;Kitap<br/>Durum&#160;Beytepe K&uuml;t&uuml;phanesi~1<br/> FISMA certification &amp; accreditation handbook ent://SD_ILS/0/SD_ILS:112169 2026-01-26T23:04:42Z 2026-01-26T23:04:42Z Yazar&#160;Taylor, Laura.&#160;Shepherd, Matthew.&#160;ScienceDirect (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491167">An electronic book accessible through the World Wide Web; click for information</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> How to cheat at securing sql server 2005 ent://SD_ILS/0/SD_ILS:112174 2026-01-26T23:04:42Z 2026-01-26T23:04:42Z Yazar&#160;ScienceDirect (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491969">An electronic book accessible through the World Wide Web; click for information</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Metasploit Toolkit for Penetration Testing, Exploit Development, And Vulnerabiity Research ent://SD_ILS/0/SD_ILS:112179 2026-01-26T23:04:42Z 2026-01-26T23:04:42Z Yazar&#160;ScienceDirect (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490740">An electronic book accessible through the World Wide Web; click for information</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Microsoft Vista for IT security professionals ent://SD_ILS/0/SD_ILS:112182 2026-01-26T23:04:42Z 2026-01-26T23:04:42Z Yazar&#160;Piltzecker, Tony, 1975-&#160;Chaffin, Larry.&#160;ScienceDirect (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491396">An electronic book accessible through the World Wide Web; click for information</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Microsoft windows security fundamentals ent://SD_ILS/0/SD_ILS:112183 2026-01-26T23:04:42Z 2026-01-26T23:04:42Z Yazar&#160;Clercq, Jan de, 1968-&#160;Grillenmeier, Guido.&#160;ScienceDirect (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781555583408">An electronic book accessible through the World Wide Web; click for information</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Open source fuzzing tools ent://SD_ILS/0/SD_ILS:112187 2026-01-26T23:04:42Z 2026-01-26T23:04:42Z Yazar&#160;Rathaus, Noam&#160;ScienceDirect (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491952">An electronic book accessible through the World Wide Web; click for information</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Security convergence managing enterprise security risk ent://SD_ILS/0/SD_ILS:112198 2026-01-26T23:04:42Z 2026-01-26T23:04:42Z Yazar&#160;Tyson, Dave.&#160;ScienceDirect (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780750684255">An electronic book accessible through the World Wide Web; click for information</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Techno Security's guide to managing risks for IT managers, auditors, and investigators ent://SD_ILS/0/SD_ILS:112203 2026-01-26T23:04:42Z 2026-01-26T23:04:42Z Yazar&#160;Wiles, Jack.&#160;ScienceDirect (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491389">An electronic book accessible through the World Wide Web; click for information</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> The official CHFI study guide (Exam 312-49) for computer hacking forensic investigator. ent://SD_ILS/0/SD_ILS:112206 2026-01-26T23:04:42Z 2026-01-26T23:04:42Z Yazar&#160;Kleiman, Dave.&#160;ScienceDirect (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491976">An electronic book accessible through the World Wide Web; click for information</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> WarDriving &amp; wireless penetration testing ent://SD_ILS/0/SD_ILS:112210 2026-01-26T23:04:42Z 2026-01-26T23:04:42Z Yazar&#160;Hurley, Chris.&#160;ScienceDirect (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491112">An electronic book accessible through the World Wide Web; click for information</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Windows forensic analysis DVD toolkit ent://SD_ILS/0/SD_ILS:112211 2026-01-26T23:04:42Z 2026-01-26T23:04:42Z Yazar&#160;Carvey, Harlan A.&#160;ScienceDirect (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491563">An electronic book accessible through the World Wide Web; click for information</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Zen and the art of information security ent://SD_ILS/0/SD_ILS:112214 2026-01-26T23:04:42Z 2026-01-26T23:04:42Z Yazar&#160;Winkler, Ira.&#160;ScienceDirect (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491686">An electronic book accessible through the World Wide Web; click for information</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Testing code security ent://SD_ILS/0/SD_ILS:546167 2026-01-26T23:04:42Z 2026-01-26T23:04:42Z Yazar&#160;Van der Linden, Maura A., author.<br/>Yer Numaras&#305;&#160;QA76.9 .A25 V359 2007<br/>Elektronik Eri&#351;im&#160;<a href="https://www.taylorfrancis.com/books/9781420013795">Click here to view.</a><br/>Format:&#160;Kitap<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Data-driven block ciphers for fast telecommunication systems ent://SD_ILS/0/SD_ILS:546948 2026-01-26T23:04:42Z 2026-01-26T23:04:42Z Yazar&#160;Moldovyan, Nick., author.&#160;Moldovyan, Alex.<br/>Yer Numaras&#305;&#160;QA76.9 .A25 M664 2007<br/>Elektronik Eri&#351;im&#160;<a href="https://www.taylorfrancis.com/books/9781420054125">Click here to view.</a><br/>Format:&#160;Kitap<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Enhancing computer security with smart technology ent://SD_ILS/0/SD_ILS:544823 2026-01-26T23:04:42Z 2026-01-26T23:04:42Z Yazar&#160;Vemuri, V. Rao.<br/>Yer Numaras&#305;&#160;TK5105.59 .E62 2005<br/>Elektronik Eri&#351;im&#160;<a href="https://www.taylorfrancis.com/books/9781420031225">Click here to view.</a><br/>Format:&#160;Kitap<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> The security risk assessment handbook : a complete guide for performing security risk assessments ent://SD_ILS/0/SD_ILS:545167 2026-01-26T23:04:42Z 2026-01-26T23:04:42Z Yazar&#160;Landoll, Douglas J., author.<br/>Yer Numaras&#305;&#160;HF5548.37 .L358 2006<br/>Elektronik Eri&#351;im&#160;<a href="https://www.taylorfrancis.com/books/9781420031232">Click here to view.</a><br/>Format:&#160;Kitap<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> The CISO handbook : a practical guide to securing your company ent://SD_ILS/0/SD_ILS:539204 2026-01-26T23:04:42Z 2026-01-26T23:04:42Z Yazar&#160;Gentile, Michael., author.&#160;Collette, Ronald D.&#160;August, Thomas D.<br/>Yer Numaras&#305;&#160;HF5548.37 .G46 2006<br/>Elektronik Eri&#351;im&#160;<a href="https://www.taylorfrancis.com/books/9781420031379">Click here to view.</a><br/>Format:&#160;Kitap<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Information security architecture : an integrated approach to security in the organization ent://SD_ILS/0/SD_ILS:541238 2026-01-26T23:04:42Z 2026-01-26T23:04:42Z Yazar&#160;Tudor, Jan Killmeyer., author.<br/>Yer Numaras&#305;&#160;QA76.9 .A25 T83 2006<br/>Elektronik Eri&#351;im&#160;<a href="https://www.taylorfrancis.com/books/9780203488751">Click here to view.</a><br/>Format:&#160;Kitap<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Bilgi ve bilgisayar g&uuml;venli&#287;i : casus yaz&#305;l&#305;mlar ve korunma y&ouml;ntemleri ent://SD_ILS/0/SD_ILS:515469 2026-01-26T23:04:42Z 2026-01-26T23:04:42Z Yazar&#160;Canbek, G&uuml;rol.&#160;Sa&#287;&#305;ro&#287;lu, &#350;eref.<br/>Yer Numaras&#305;&#160;QA76.9.A25 C36 2006<br/>Format:&#160;Kitap<br/>Durum&#160;Beytepe K&uuml;t&uuml;phanesi~1<br/> Insider threat protecting the enterprise from sabotage, spying, and theft ent://SD_ILS/0/SD_ILS:253661 2026-01-26T23:04:42Z 2026-01-26T23:04:42Z Yazar&#160;Cole, Eric.&#160;Ring, Sandra.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;Volltext <a href="http://www.sciencedirect.com/science/book/9781597490481">http://www.sciencedirect.com/science/book/9781597490481</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> How to cheat at designing security for a Windows Server 2003 network ent://SD_ILS/0/SD_ILS:253670 2026-01-26T23:04:42Z 2026-01-26T23:04:42Z Yazar&#160;Amini, Rob.&#160;Hunter, Laura E.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492430">http://www.sciencedirect.com/science/book/9781597492430</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Penetration tester's open source toolkit ent://SD_ILS/0/SD_ILS:253676 2026-01-26T23:04:42Z 2026-01-26T23:04:42Z Yazar&#160;Long, Johnny.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490214">http://www.sciencedirect.com/science/book/9781597490214</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Securing HP NonStop servers in an open systems world TCP/IP, OSS &amp; SQL ent://SD_ILS/0/SD_ILS:253863 2026-01-26T23:04:42Z 2026-01-26T23:04:42Z Yazar&#160;XYPRO Technology Corporation.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781555583446">http://www.sciencedirect.com/science/book/9781555583446</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Multimedia security technologies for digital rights management ent://SD_ILS/0/SD_ILS:254554 2026-01-26T23:04:42Z 2026-01-26T23:04:42Z Yazar&#160;Zeng, Wenjun, 1967-&#160;Yu, Hong Heather, 1967-&#160;Lin, Ching-Yung.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780123694768">http://www.sciencedirect.com/science/book/9780123694768</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Securing IM and P2P applications for the enterprise ent://SD_ILS/0/SD_ILS:253939 2026-01-26T23:04:42Z 2026-01-26T23:04:42Z Yazar&#160;Piccard, Paul L.&#160;Sachs, Marcus H.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490177">http://www.sciencedirect.com/science/book/9781597490177</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Combating spyware in the enterprise ent://SD_ILS/0/SD_ILS:254075 2026-01-26T23:04:42Z 2026-01-26T23:04:42Z Yazar&#160;Baskin, Brian.&#160;Piltzecker, Tony, 1975-<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490641">http://www.sciencedirect.com/science/book/9781597490641</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Trusted platform module basics using TPM in embedded systems ent://SD_ILS/0/SD_ILS:254421 2026-01-26T23:04:42Z 2026-01-26T23:04:42Z Yazar&#160;Kinney, Steven.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780750679602">http://www.sciencedirect.com/science/book/9780750679602</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Information security : principles and practice ent://SD_ILS/0/SD_ILS:109477 2026-01-26T23:04:42Z 2026-01-26T23:04:42Z Yazar&#160;Stamp, Mark.<br/>Yer Numaras&#305;&#160;QA76.9.A25 S69 2006<br/>Format:&#160;Kitap<br/>Durum&#160;Beytepe K&uuml;t&uuml;phanesi~1<br/> How to cheat at Windows System Administration using command line scripts ent://SD_ILS/0/SD_ILS:112107 2026-01-26T23:04:42Z 2026-01-26T23:04:42Z Yazar&#160;Bhardwaj, Pawan K.&#160;Andreou, Kimon.&#160;Barber, Brian.&#160;Kleiman, Dave.&#160;Satyanarayana, Mahesh.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491051">An electronic book accessible through the World Wide Web; click for information</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Linux Patch Management : keeping Linux systems up to date ent://SD_ILS/0/SD_ILS:119550 2026-01-26T23:04:42Z 2026-01-26T23:04:42Z Yazar&#160;Jang, Michael H.<br/>Yer Numaras&#305;&#160;QA76.76.O63 J368 2006<br/>Format:&#160;Kitap<br/>Durum&#160;Beytepe K&uuml;t&uuml;phanesi~1<br/> Intelligence and security informatics for international security : information sharing and data mining ent://SD_ILS/0/SD_ILS:119786 2026-01-26T23:04:42Z 2026-01-26T23:04:42Z Yazar&#160;Chen, Hsinchun.<br/>Yer Numaras&#305;&#160;QA76.76.E95 C44 2006<br/>Format:&#160;Kitap<br/>Durum&#160;Beytepe K&uuml;t&uuml;phanesi~1<br/> How to cheat at Windows System Administration using command line scripts ent://SD_ILS/0/SD_ILS:145623 2026-01-26T23:04:42Z 2026-01-26T23:04:42Z Yazar&#160;Bhardwaj, Pawan K.&#160;Andreou, Kimon.&#160;Barber, Brian.&#160;Kleiman, Dave.&#160;Satyanarayana, Mahesh.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491051">http://www.sciencedirect.com/science/book/9781597491051</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Essential computer security everyone's guide to e-mail, Internet, and wireless security ent://SD_ILS/0/SD_ILS:145840 2026-01-26T23:04:42Z 2026-01-26T23:04:42Z Yazar&#160;Bradley, Tony, 1969-&#160;Carvey, Harlan A.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491143">http://www.sciencedirect.com/science/book/9781597491143</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Hack the stack using snort and ethereal to master the 8 layers of an insecure network ent://SD_ILS/0/SD_ILS:147954 2026-01-26T23:04:42Z 2026-01-26T23:04:42Z Yazar&#160;Gregg, Michael (Michael C.)&#160;Watkins, Stephen.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491099">http://www.sciencedirect.com/science/book/9781597491099</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Enemy at the water cooler real-life stories of insider threats and Enterprise Security Management countermeasures ent://SD_ILS/0/SD_ILS:146475 2026-01-26T23:04:42Z 2026-01-26T23:04:42Z Yazar&#160;Contos, Brian T.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491297">http://www.sciencedirect.com/science/book/9781597491297</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Syngress force emerging threat analysis from mischief to malicious ent://SD_ILS/0/SD_ILS:148488 2026-01-26T23:04:42Z 2026-01-26T23:04:42Z Yazar&#160;Maynor, David.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490566">http://www.sciencedirect.com/science/book/9781597490566</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Information security architecture : an integrated approach to security in the organization ent://SD_ILS/0/SD_ILS:110865 2026-01-26T23:04:42Z 2026-01-26T23:04:42Z Yazar&#160;Tudor, Jan Killmeyer.<br/>Yer Numaras&#305;&#160;QA76.9.A25 T83 2006<br/>Format:&#160;Kitap<br/>Durum&#160;Beytepe K&uuml;t&uuml;phanesi~1<br/> Computer security fundamentals ent://SD_ILS/0/SD_ILS:108620 2026-01-26T23:04:42Z 2026-01-26T23:04:42Z Yazar&#160;Easttom, Chuck.<br/>Yer Numaras&#305;&#160;QA76.9.A25 E325 2006<br/>Format:&#160;Kitap<br/>Durum&#160;Beytepe K&uuml;t&uuml;phanesi~1<br/> Syngress force emerging threat analysis from mischief to malicious ent://SD_ILS/0/SD_ILS:112202 2026-01-26T23:04:42Z 2026-01-26T23:04:42Z Yazar&#160;Maynor, David.&#160;ScienceDirect (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490566">An electronic book accessible through the World Wide Web; click for information</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Information security risk analysis ent://SD_ILS/0/SD_ILS:544821 2026-01-26T23:04:42Z 2026-01-26T23:04:42Z Yazar&#160;Peltier, Thomas R., author.<br/>Yer Numaras&#305;&#160;QA76.9 .A25 P429 2005<br/>Elektronik Eri&#351;im&#160;<a href="https://www.taylorfrancis.com/books/9781420031195">Click here to view.</a><br/>Format:&#160;Kitap<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Information security fundamentals ent://SD_ILS/0/SD_ILS:545226 2026-01-26T23:04:42Z 2026-01-26T23:04:42Z Yazar&#160;Peltier, Thomas R., author.&#160;Peltier, Justin.&#160;Blackley, John A.<br/>Yer Numaras&#305;&#160;QA76.9 .A25 P427 2005<br/>Elektronik Eri&#351;im&#160;<a href="https://www.taylorfrancis.com/books/9781135493738">Click here to view.</a><br/>Format:&#160;Kitap<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/>