Arama Sonuçları Book. - Daraltılmış: Computer security.SirsiDynix Enterprisehttps://katalog.hacettepe.edu.tr/client/tr_TR/default_tr/default_tr/qu$003dBook.$0026qf$003dSUBJECT$002509Konu$002509Computer$002bsecurity.$002509Computer$002bsecurity.$0026ps$003d300$0026isd$003dtrue?2026-01-26T23:05:03ZThe complete book of data anonymization : from planning to implementationent://SD_ILS/0/SD_ILS:5401692026-01-26T23:05:03Z2026-01-26T23:05:03ZYazar Raghunathan, Balaji., author.<br/>Yer Numarası QA76.9 .A25 R338 2013<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9781439877319">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>The best damn IT security management book periodent://SD_ILS/0/SD_ILS:1452742026-01-26T23:05:03Z2026-01-26T23:05:03ZYazar Cunningham, Bryan, JD.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492270">http://www.sciencedirect.com/science/book/9781597492270</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Building effective privacy programs : cybersecurity from principles to practiceent://SD_ILS/0/SD_ILS:6001112026-01-26T23:05:03Z2026-01-26T23:05:03ZYazar Edwards, Jason (Cybersecurity expert), author. Weaver, Griffin, author. John Wiley & Sons, publisher.<br/>Yer Numarası QA76.9 .P735 E34 2026<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394342662">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394342662</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Defense in depth : modern cybersecurity strategies and evolving threatsent://SD_ILS/0/SD_ILS:6001912026-01-26T23:05:03Z2026-01-26T23:05:03ZYazar Zangana, Hewa Majeed, 1987- editor.<br/>Yer Numarası QA76.9 .A25 D44 2026<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394340750">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394340750</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Digital immune system : principles and practicesent://SD_ILS/0/SD_ILS:6002432026-01-26T23:05:03Z2026-01-26T23:05:03ZYazar Priyambada Dash, Sujata, editor. Mishra, Vaibhav. Shaw, Bijeta. Panda, Sandeep Kumar. Balamurugan, S.<br/>Yer Numarası QA76.9 .A25 D54 2026<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394383788">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394383788</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Inside cyber : how AI, 5G, IoT, and quantum computing will transform privacy and our securityent://SD_ILS/0/SD_ILS:5992222026-01-26T23:05:03Z2026-01-26T23:05:03ZYazar Brooks, Chuck (Writer of Inside cyber), author.<br/>Yer Numarası HC79 .T4 B735 2025<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394310562">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394310562</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Open-source security operations center (SOC) : a complete guide to establishing, managing, and maintaining a modern SOCent://SD_ILS/0/SD_ILS:5994342026-01-26T23:05:03Z2026-01-26T23:05:03ZYazar Basta, Alfred, author. Basta, Nadine, author. Anwar, Waqar, author. Essar, Mohammad Ilyas, author. John Wiley & Sons, publisher.<br/>Yer Numarası QA76.9 .A25<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394201631">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394201631</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Information security and privacy quick reference the essential handbook for every CISO, CSO, and Chief Privacy Officerent://SD_ILS/0/SD_ILS:5999462026-01-26T23:05:03Z2026-01-26T23:05:03ZYazar Chapple, Mike, author. Shelley, Joe. Stewart, James Michael.<br/>Yer Numarası QA76.9 .A25 C43 2025<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394353347">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394353347</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Generative AI, cybersecurity, and ethicsent://SD_ILS/0/SD_ILS:5995972026-01-26T23:05:03Z2026-01-26T23:05:03ZYazar Islam, Ray (Mohammad Rubyet), author.<br/>Yer Numarası QA76.9 .A25<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394279326">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394279326</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Digital twins and cybersecurity : safeguarding the future of connected systemsent://SD_ILS/0/SD_ILS:5996152026-01-26T23:05:03Z2026-01-26T23:05:03ZYazar Naveen, Palanichamy, author. Maheswar, R., author. Ragupathy, U.S., author.<br/>Yer Numarası QA76.9 .C65 N38 2025<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394272501">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394272501</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Next-generation systems and secure computingent://SD_ILS/0/SD_ILS:5997792026-01-26T23:05:03Z2026-01-26T23:05:03ZYazar Barman, Subhabrata, editor. Koley, Santanu, editor. Joardar, Subhankar, editor.<br/>Yer Numarası QA76.9 .A25 N49 2025<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394228522">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394228522</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>The cybersecurity control playbook : from fundamentals to advanced strategiesent://SD_ILS/0/SD_ILS:5997892026-01-26T23:05:03Z2026-01-26T23:05:03ZYazar Edwards, Jason (Cybersecurity expert), author. John Wiley & Sons, publisher.<br/>Yer Numarası QA76.9 .A25 E3884 2025<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394331888">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394331888</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>The techno-legal dynamics of cyber crimes in Industry 5.0ent://SD_ILS/0/SD_ILS:5998012026-01-26T23:05:03Z2026-01-26T23:05:03ZYazar Kaur, Gagandeep, editor Choudhury, Tanupriya editor Balamurugan, S. editor<br/>Yer Numarası QA76.9 .A25<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394242177">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394242177</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Securing cyber-physical systems : fundamentals, applications and challengesent://SD_ILS/0/SD_ILS:6002602026-01-26T23:05:03Z2026-01-26T23:05:03ZYazar Ananthajothi, K., editor.<br/>Yer Numarası TK5105.59 .S43 2025<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394287765">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394287765</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Protection of electrical power distribution systems : smart grid, microgrid, AI, and cyber securityent://SD_ILS/0/SD_ILS:6003712026-01-26T23:05:03Z2026-01-26T23:05:03ZYazar Masood, Tariq, author. Abdo, Jamil, author. Iqbal, Atif, author.<br/>Yer Numarası TK3001 .M37 2026<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394327676">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394327676</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Rise of the machines : when AI and zero trust collide : a Project Zero Trust storyent://SD_ILS/0/SD_ILS:5999322026-01-26T23:05:03Z2026-01-26T23:05:03ZYazar Finney, George, author. Vinduska, Zach, author.<br/>Yer Numarası QA76.9 .A25 F56 2025<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394352517">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394352517</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Emerging threats and countermeasures in cybersecurityent://SD_ILS/0/SD_ILS:5995612026-01-26T23:05:03Z2026-01-26T23:05:03ZYer Numarası QA76.9 .A25 E44 2025<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394230600">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394230600</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Alice and Bob learn secure codingent://SD_ILS/0/SD_ILS:5996642026-01-26T23:05:03Z2026-01-26T23:05:03ZYazar Janca, Tanya. author.<br/>Yer Numarası QA76.76 .D47<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394277179">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394277179</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Quantum computing models for cybersecurity and wireless communicationsent://SD_ILS/0/SD_ILS:5997072026-01-26T23:05:03Z2026-01-26T23:05:03ZYazar Kumar, Budati Anil, edited. Kumar, Singamaneni Kranthi, edited. Li, Xingwang (Computer scientist), edited.<br/>Yer Numarası QA76.9 .A25 Q36 2025<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394271429">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394271429</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Securing the digital frontier : threats and advanced techniques in security and forensicsent://SD_ILS/0/SD_ILS:5997322026-01-26T23:05:03Z2026-01-26T23:05:03ZYazar Sharma, Kavita, 1985- editor.<br/>Yer Numarası QA76.9 .A25 S43 2025<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394268917">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394268917</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Protecting and mitigating against cyber threats : deploying artificial intelligence and machine learningent://SD_ILS/0/SD_ILS:5999992026-01-26T23:05:03Z2026-01-26T23:05:03ZYazar Mohanty, Sachi Nandan, editor.<br/>Yer Numarası QA76.9 .A25 P76 2025<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394305216">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394305216</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Cyber defense : best practices for digital safetyent://SD_ILS/0/SD_ILS:6000032026-01-26T23:05:03Z2026-01-26T23:05:03ZYazar Edwards, Jason, author.<br/>Yer Numarası QA76.9 .A25 E39 2025<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394337040">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394337040</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Taming the hacking storm : a framework for securing and defending networksent://SD_ILS/0/SD_ILS:5998582026-01-26T23:05:03Z2026-01-26T23:05:03ZYazar Grimes, Roger A., author.<br/>Yer Numarası QA76.9 .A25 G75 2025<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394352289">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394352289</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>x86 software reverse-engineering, cracking, and counter-measuresent://SD_ILS/0/SD_ILS:5989202026-01-26T23:05:03Z2026-01-26T23:05:03ZYazar Domas, Stephanie, author. Domas, Christopher, author.<br/>Yer Numarası QA76.9 .A25 D66 2024<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394277131">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394277131</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Effective vulnerability management : managing risk in the vulnerable digital ecosystement://SD_ILS/0/SD_ILS:5990472026-01-26T23:05:03Z2026-01-26T23:05:03ZYazar Hughes, Chris (Christopher Matthew), author. Robinson, Nikki, author.<br/>Yer Numarası QA76.9 .A25 H84 2024<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394277155">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394277155</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Realizing the Metaverse : a communications and networking perspectiveent://SD_ILS/0/SD_ILS:5990572026-01-26T23:05:03Z2026-01-26T23:05:03ZYazar Lim, Wei Yang Bryan, editor. Xiong, Zehui, editor. Niyato, Dusit, editor. Zhang, Junshan (Electrical engineer), editor. Shen, X. (Xuemin), 1958- editor.<br/>Yer Numarası TK5105.8864 .R43 2024<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394188932">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394188932</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>CYBERSECURITY IN THE TRANSPORTATION INDUSTRY.ent://SD_ILS/0/SD_ILS:5992382026-01-26T23:05:03Z2026-01-26T23:05:03ZYer Numarası HE194 .C93 2024<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394204472">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394204472</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Automated secure computing for next-generation systemsent://SD_ILS/0/SD_ILS:5987522026-01-26T23:05:03Z2026-01-26T23:05:03ZYazar Tyagi, Amit Kumar, editor.<br/>Yer Numarası QA76.9 .A25 A98 2024<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394213948">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394213948</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>The DevSecOps playbook : deliver continuous security at speedent://SD_ILS/0/SD_ILS:5986342026-01-26T23:05:03Z2026-01-26T23:05:03ZYazar Mack, Sean D., author.<br/>Yer Numarası QA76.9 .A25 M33 2024<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394189281">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394189281</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Cryptography : algorithms, protocols, and standards for computer securityent://SD_ILS/0/SD_ILS:5989142026-01-26T23:05:03Z2026-01-26T23:05:03ZYazar Mammeri, Zoubir, author.<br/>Yer Numarası QA268 .M34 2024<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394207510">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394207510</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>The cybersecurity guide to governance, risk, and complianceent://SD_ILS/0/SD_ILS:5989452026-01-26T23:05:03Z2026-01-26T23:05:03ZYazar Edwards, Jason (Cybersecurity expert), author. Weaver, Griffin, author.<br/>Yer Numarası HD30.38 .E34 2024<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394250226">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394250226</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Stepping through cybersecurity risk management : a systems thinking approachent://SD_ILS/0/SD_ILS:5990212026-01-26T23:05:03Z2026-01-26T23:05:03ZYazar Bayuk, Jennifer L., author.<br/>Yer Numarası QA76.9 .A25 B39 2024<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394213986">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394213986</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Cyber Operations : A Case Study Approachent://SD_ILS/0/SD_ILS:5991172026-01-26T23:05:03Z2026-01-26T23:05:03ZYazar Couretas, Jerry M., 1966- author.<br/>Yer Numarası QA76.9 .A25<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119712121">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119712121</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>A’dan Z’ye siber güvenlikent://SD_ILS/0/SD_ILS:5243032026-01-26T23:05:03Z2026-01-26T23:05:03ZYazar Polat, A. Can. Karakaş, Burak.<br/>Yer Numarası QA76.9 P65 2023<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>Sustainably investing in digital assets globallyent://SD_ILS/0/SD_ILS:5977642026-01-26T23:05:03Z2026-01-26T23:05:03ZYazar Ozelli, Selva, author.<br/>Yer Numarası HG4515.15 .O38 2023<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394320530">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394320530</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Cybercrime during the SARS-CoV-2 pandemic (2019-2022)ent://SD_ILS/0/SD_ILS:5985172026-01-26T23:05:03Z2026-01-26T23:05:03ZYazar Ventre, Daniel, editor. Loiseau, Hugo, 1974- editor.<br/>Yer Numarası HV6773 .C93 2023<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394226344">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394226344</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Symmetric cryptography. Volume 1 : Design and security proofsent://SD_ILS/0/SD_ILS:5988032026-01-26T23:05:03Z2026-01-26T23:05:03ZYazar Boura, Christina, editor. Naya-Plasencia, Maria, editor.<br/>Yer Numarası Z104 .S966 2023<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394256358">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394256358</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Quantum computing in cybersecurityent://SD_ILS/0/SD_ILS:5986852026-01-26T23:05:03Z2026-01-26T23:05:03ZYazar Rawat, Romil, editor.<br/>Yer Numarası QA76.9 .A25 Q83 2023<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394167401">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394167401</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Wireless communication in cyber securityent://SD_ILS/0/SD_ILS:5987052026-01-26T23:05:03Z2026-01-26T23:05:03ZYazar Sountharrajan, S. editor Maheswar, R. editor Rathee, Geetanjali, editor Akila, M. editor<br/>Yer Numarası QA76.9 .A25 W57 2023<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119910619">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119910619</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Cyber investigations : a research based textbook for advanced studiesent://SD_ILS/0/SD_ILS:5979312026-01-26T23:05:03Z2026-01-26T23:05:03ZYazar Årnes, André, 1976- editor.<br/>Yer Numarası HV8079 .C65 C933 2023<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119582021">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119582021</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Intelligent security systems : how artificial intelligence, machine learning and data science work for and against computer securityent://SD_ILS/0/SD_ILS:5970852026-01-26T23:05:03Z2026-01-26T23:05:03ZYazar Reznik, Leonid, 1955- author.<br/>Yer Numarası QA76.9 .A25 R438 2022<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119771579">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119771579</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Perceptions and Analysis of Digital Risksent://SD_ILS/0/SD_ILS:5972262026-01-26T23:05:03Z2026-01-26T23:05:03ZYazar Capelle, Camille. Liquète, Vincent.<br/>Yer Numarası QA76.575<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119887959">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119887959</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Cyber security and network securityent://SD_ILS/0/SD_ILS:5974842026-01-26T23:05:03Z2026-01-26T23:05:03ZYazar Pramanik, Sabyasachi, editor. Samanta, Debabrata, 1987- editor. Vinay, M., editor. Guha, Abhijit, editor.<br/>Yer Numarası QA76.9 .A25<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119812555">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119812555</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Managing cybersecurity in the process industriesent://SD_ILS/0/SD_ILS:5975082026-01-26T23:05:03Z2026-01-26T23:05:03ZYazar American Institute of Chemical Engineers. Center for Chemical Process Safety.<br/>Yer Numarası TP155.7<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119861812">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119861812</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Cybersecurity in smart homes : architectures, solutions and technologiesent://SD_ILS/0/SD_ILS:5976262026-01-26T23:05:03Z2026-01-26T23:05:03ZYazar Khatoun, Rida, author.<br/>Yer Numarası QA76.9 .A25<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119987451">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119987451</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Executive's guide to cyber risk : securing the future todayent://SD_ILS/0/SD_ILS:5975672026-01-26T23:05:03Z2026-01-26T23:05:03ZYazar Moyo, Siegfried, author.<br/>Yer Numarası HF5548.37 .M68 2022<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394320578">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394320578</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Trust in computer systems and the cloudent://SD_ILS/0/SD_ILS:5971422026-01-26T23:05:03Z2026-01-26T23:05:03ZYazar Bursell, Mike, author.<br/>Yer Numarası QA76.9 .A25<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119695158">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119695158</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Cyber security and digital forensicsent://SD_ILS/0/SD_ILS:5973262026-01-26T23:05:03Z2026-01-26T23:05:03ZYazar Ghonge, Mangesh, 1984- editor.<br/>Yer Numarası QA76.9 .A25<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119795667">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119795667</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>The CISO evolution : business knowledge for cybersecurity executivesent://SD_ILS/0/SD_ILS:5970562026-01-26T23:05:03Z2026-01-26T23:05:03ZYazar Sharp, Matthew K., author. Lambros, Kyriakos P., author.<br/>Yer Numarası HD30.2 .S5325 2022<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119782513">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119782513</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Blockchain security from the bottom up : securing and preventing attacks on cryptocurrencies, decentralized applications, nfts, and smart contractsent://SD_ILS/0/SD_ILS:5977032026-01-26T23:05:03Z2026-01-26T23:05:03ZYazar Poston, Howard E., III, author.<br/>Yer Numarası QA76.9 .B56 P67 2022<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394320691">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394320691</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Computer science security : concepts and toolsent://SD_ILS/0/SD_ILS:5977392026-01-26T23:05:03Z2026-01-26T23:05:03ZYazar Zaidoun, Ameur Salem, author.<br/>Yer Numarası QA76.9 .A25 Z35 2022<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394163847">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394163847</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Trust-based communication systems for internet of things applicationsent://SD_ILS/0/SD_ILS:5977442026-01-26T23:05:03Z2026-01-26T23:05:03ZYazar Madaan, Vishu, editor. Agrawal, Prateek, editor. Sharma, Anand, editor. Sharma, Dilip Kumar, editor. Agrawal, Akshat, 1986- editor.<br/>Yer Numarası TK5105.8857<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119896746">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119896746</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>VMware® Certified Professional Data Center Virtualization on vSphere 6.7 Exam 2V0-21.19 : study guideent://SD_ILS/0/SD_ILS:5962892026-01-26T23:05:03Z2026-01-26T23:05:03ZYazar Hall, Jon, 1963- author. Andrews, Joshua, author.<br/>Yer Numarası QA76.9 .V5<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119539698">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119539698</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>You can stop stupid : stopping losses from accidental and malicious actionsent://SD_ILS/0/SD_ILS:5965022026-01-26T23:05:03Z2026-01-26T23:05:03ZYazar Winkler, Ira, author. Brown, Tracy Celaya, author.<br/>Yer Numarası HD61.5 .W55 2021<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119623946">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119623946</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Artificial intelligence and data mining approaches in security frameworksent://SD_ILS/0/SD_ILS:5969572026-01-26T23:05:03Z2026-01-26T23:05:03ZYazar Bhargava, Neeraj. Bhargava, Ritu. Rathore, Pramod Singh, 1988- Agrawal, Rashmi, 1978-<br/>Yer Numarası Q335<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119760429">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119760429</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Hacking multifactor authenticationent://SD_ILS/0/SD_ILS:5963262026-01-26T23:05:03Z2026-01-26T23:05:03ZYazar Grimes, Roger A., author.<br/>Yer Numarası QA76.9 .A25 G75 2021<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119672357">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119672357</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Privacy, regulations, and cybersecurity : the essential business guideent://SD_ILS/0/SD_ILS:5964722026-01-26T23:05:03Z2026-01-26T23:05:03ZYazar Moschovitis, Christos J. P., author.<br/>Yer Numarası HD61.5 .M675 2021 EB<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119660156">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119660156</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Security issues and privacy concerns in Industry 4.0 applicationsent://SD_ILS/0/SD_ILS:5969452026-01-26T23:05:03Z2026-01-26T23:05:03ZYazar David, Shiblin, author. Anand, R. S., author. Jeyakrishnan, V., author. Niranjanamurthy, M., author.<br/>Yer Numarası QA76.9 .A25 D38 2021<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119776529">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119776529</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Uygulamalarla siber güvenliğe girişent://SD_ILS/0/SD_ILS:5101512026-01-26T23:05:03Z2026-01-26T23:05:03ZYazar Akyıldız, M. Alparslan.<br/>Yer Numarası TK5105.59.A39 U94 2020<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~2<br/>Türkiye’de ve dünyada siber güvenlikent://SD_ILS/0/SD_ILS:5149582026-01-26T23:05:03Z2026-01-26T23:05:03ZYazar Çeliktaş, Barış .<br/>Yer Numarası UG485 C45 2020<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>Cybersecurity and decision makers : data security and digital trustent://SD_ILS/0/SD_ILS:5959432026-01-26T23:05:03Z2026-01-26T23:05:03ZYazar Fréminville, Marie de, author.<br/>Yer Numarası HF5548.37 .F74 2020<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119720362">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119720362</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Tribe of hackers blue team : tribal knowledge from the best in defensive cybersecurityent://SD_ILS/0/SD_ILS:5962762026-01-26T23:05:03Z2026-01-26T23:05:03ZYazar Carey, Marcus J. (Cybersecurity professional) Jin, Jennifer.<br/>Yer Numarası QA76.9 .A25 C3673 2020<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119643432">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119643432</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Cybersecurity in humanities and social sciences : a research methods approachent://SD_ILS/0/SD_ILS:5963732026-01-26T23:05:03Z2026-01-26T23:05:03ZYazar Loiseau, Hugo, editor. Ventre, Daniel, editor. Aden, Hartmut, editor.<br/>Yer Numarası QA76.9 .A25<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119777588">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119777588</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Hands on hackingent://SD_ILS/0/SD_ILS:5963162026-01-26T23:05:03Z2026-01-26T23:05:03ZYazar Hickey, Matthew (Computer security expert), author. Arcuri, Jennifer, author.<br/>Yer Numarası QA76.9 .A25 H53 2020 EB<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119561507">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119561507</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Artificial intelligence, cybersecurity and cyber defenseent://SD_ILS/0/SD_ILS:5964232026-01-26T23:05:03Z2026-01-26T23:05:03ZYazar Ventre, Daniel, author.<br/>Yer Numarası Q335 .V46 2020 EB<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119788195">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119788195</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Security engineering : a guide to building dependable distributed systemsent://SD_ILS/0/SD_ILS:5964802026-01-26T23:05:03Z2026-01-26T23:05:03ZYazar Anderson, Ross. http://viaf.org/viaf/sourceID/LC%7cnb2004300232<br/>Yer Numarası QA76.9 .A25<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119644682">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119644682</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Tribe of hackers security leaders : tribal knowledge from the best in cybersecurity leadershipent://SD_ILS/0/SD_ILS:5958872026-01-26T23:05:03Z2026-01-26T23:05:03ZYazar Carey, Marcus J. (Cybersecurity professional), author. Jin, Jennifer.<br/>Yer Numarası QA76.9 .A25 C37 2020<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119643784">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119643784</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Applied incident responseent://SD_ILS/0/SD_ILS:5957442026-01-26T23:05:03Z2026-01-26T23:05:03ZYazar Anson, Steve.<br/>Yer Numarası QA76.9 .A25<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119560302">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119560302</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Yeni başlayanlar için bilgi güvenliği ve uygulamalı hacking yöntemlerient://SD_ILS/0/SD_ILS:4231842026-01-26T23:05:03Z2026-01-26T23:05:03ZYazar Aslanbakan, Enes, yazar<br/>Yer Numarası QA76.9.A25 A75 2019<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>Ethical hacking : (hacking kursu)ent://SD_ILS/0/SD_ILS:4239502026-01-26T23:05:03Z2026-01-26T23:05:03ZYazar Usta, Gökhan.<br/>Yer Numarası QA76.9.A25 U88 2019<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>Hardware security : a hands-on learning approachent://SD_ILS/0/SD_ILS:4604102026-01-26T23:05:03Z2026-01-26T23:05:03ZYazar Bhunia, Swarup, author. Tehranipoor, Mohammad H., 1974- author.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="https://www.sciencedirect.com/science/book/9780128124772">https://www.sciencedirect.com/science/book/9780128124772</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Cyber smart : five habits to protect your family, money, and identity from cyber criminalsent://SD_ILS/0/SD_ILS:5949672026-01-26T23:05:03Z2026-01-26T23:05:03ZYazar McDonough, Bart R., author.<br/>Yer Numarası TK5105.59<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119559658">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119559658</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Cyber security in parallel and distributed computing : concepts, techniques, applications and case studiesent://SD_ILS/0/SD_ILS:5950992026-01-26T23:05:03Z2026-01-26T23:05:03ZYazar Le, Dac-Nhuong, 1983- editor. Kumar, Raghvendra, 1987- editor. Mishra, Brojo Kishore, 1979- editor. Khari, Manju, editor. Chatterjee, Jyotir Moy, editor.<br/>Yer Numarası QA76.9 .A25<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119488330">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119488330</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>The Digital Big Bang : the Hard Stuff, the Soft Stuff, and the Future of Cybersecurityent://SD_ILS/0/SD_ILS:5954352026-01-26T23:05:03Z2026-01-26T23:05:03ZYazar Quade, Phil.<br/>Yer Numarası QA76.9 .A25<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119617396">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119617396</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Cybersecurity blue team toolkitent://SD_ILS/0/SD_ILS:5952092026-01-26T23:05:03Z2026-01-26T23:05:03ZYazar Tanner, Nadean H., author.<br/>Yer Numarası QA76.9 .A25 T36 2019 EB<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119552963">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119552963</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Tribe of hackers red team : tribal knowledge from the best in offensive cybersecurityent://SD_ILS/0/SD_ILS:5954152026-01-26T23:05:03Z2026-01-26T23:05:03ZYazar Carey, Marcus J. (Cybersecurity professional), author. Jin, Jennifer, author.<br/>Yer Numarası QA76.9 .A25 C368 2019<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119643357">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119643357</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Cyber-vigilance and digital trust : cyber security in the era of cloud computing and IoTent://SD_ILS/0/SD_ILS:5952792026-01-26T23:05:03Z2026-01-26T23:05:03ZYazar Tounsi, Wiem, editor.<br/>Yer Numarası QA76.9 .A25 C93 2019 EB<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119618393">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119618393</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Transformational security awareness : what neuroscientists, storytellers, and marketers can teach us about driving secure behaviorsent://SD_ILS/0/SD_ILS:5953042026-01-26T23:05:03Z2026-01-26T23:05:03ZYazar Carpenter, Perry, author.<br/>Yer Numarası QA76.9 .A25 C37 2019 EB<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119566380">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119566380</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Tribe of hackers : cybersecurity advice from the best hackers in the worldent://SD_ILS/0/SD_ILS:5954182026-01-26T23:05:03Z2026-01-26T23:05:03ZYazar Carey, Marcus J. (Cybersecurity professional), author. Jin, Jennifer, author.<br/>Yer Numarası QA76.9 .A25 C37 2019 EB<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119643395">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119643395</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>We have root : even more advice from Schneier on securityent://SD_ILS/0/SD_ILS:5954322026-01-26T23:05:03Z2026-01-26T23:05:03ZYazar Schneier, Bruce, 1963- author.<br/>Yer Numarası QA76.9 .A25 S36 2019<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119653554">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119653554</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Digital forensicsent://SD_ILS/0/SD_ILS:5933462026-01-26T23:05:03Z2026-01-26T23:05:03ZYazar Årnes, André, 1976- editor.<br/>Yer Numarası HV8079 .C65<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119262442">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119262442</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Social engineering : the science of human hackingent://SD_ILS/0/SD_ILS:5946352026-01-26T23:05:03Z2026-01-26T23:05:03ZYazar Hadnagy, Christopher, author.<br/>Yer Numarası HM668 .H33 2018<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119433729">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119433729</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>An introduction to cyber modeling and simulationent://SD_ILS/0/SD_ILS:5946992026-01-26T23:05:03Z2026-01-26T23:05:03ZYazar Couretas, Jerry M., 1966- author.<br/>Yer Numarası QA76.9 .C65<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119420842">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119420842</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Windows security monitoring : scenarios and patternsent://SD_ILS/0/SD_ILS:5944042026-01-26T23:05:03Z2026-01-26T23:05:03ZYazar Miroshnikov, Andrei, author.<br/>Yer Numarası QA76.9 .A25<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119390909">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119390909</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Insider threatsent://SD_ILS/0/SD_ILS:5944072026-01-26T23:05:03Z2026-01-26T23:05:03ZYazar Arduin, Pierre-Emmanuel, author.<br/>Yer Numarası QA76.9 .A25<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119419785">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119419785</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Exploit geliştirme 101ent://SD_ILS/0/SD_ILS:3890772026-01-26T23:05:03Z2026-01-26T23:05:03ZYazar Akyıldız, M. Alparslan.<br/>Yer Numarası QA76.9.A25 A59 2018<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~2<br/>Handbook of system safety and security : cyber risk and risk management, cyber security, threat analysis, functional safety, software systems, and cyber physical systemsent://SD_ILS/0/SD_ILS:4591452026-01-26T23:05:03Z2026-01-26T23:05:03ZYazar Griffor, Edward R., editor.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128037737">http://www.sciencedirect.com/science/book/9780128037737</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Building a practical information security programent://SD_ILS/0/SD_ILS:4591462026-01-26T23:05:03Z2026-01-26T23:05:03ZYazar Andress, Jason, author. Leary, Mark, author.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128020425">http://www.sciencedirect.com/science/book/9780128020425</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Information security fundamentalsent://SD_ILS/0/SD_ILS:5399222026-01-26T23:05:03Z2026-01-26T23:05:03ZYazar Peltier, Thomas R.<br/>Yer Numarası QA76.9 .A25<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9780429130281">Taylor & Francis eBooks</a>
Taylor & Francis <a href="https://www.taylorfrancis.com/books/9780429130281">https://www.taylorfrancis.com/books/9780429130281</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Security for Service Oriented Architectures.ent://SD_ILS/0/SD_ILS:5426332026-01-26T23:05:03Z2026-01-26T23:05:03ZYazar Williams, Walter, author. CRC Press LLC.<br/>Yer Numarası TK5105.5828 .W55 2017<br/>Elektronik Erişim Taylor & Francis <a href="https://www.taylorfrancis.com/books/9780429072185">https://www.taylorfrancis.com/books/9780429072185</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>The basics of cyber safety : computer and mobile device safety made easyent://SD_ILS/0/SD_ILS:4590442026-01-26T23:05:03Z2026-01-26T23:05:03ZYazar Sammons, John, author. Cross, Michael, 1965- author.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780124166509">http://www.sciencedirect.com/science/book/9780124166509</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Advanced persistent security : a cyberwarfare approach to implementing adaptive enterprise protection, detection, and reaction strategiesent://SD_ILS/0/SD_ILS:4592042026-01-26T23:05:03Z2026-01-26T23:05:03ZYazar Winkler, Ira, author. Gomes, Araceli Treu, author. Shackleford, Dave, editor.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="https://www.sciencedirect.com/science/book/9780128093160">https://www.sciencedirect.com/science/book/9780128093160</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Wireshark for security professionals : using Wireshark and the Metasploit Frameworkent://SD_ILS/0/SD_ILS:5934722026-01-26T23:05:03Z2026-01-26T23:05:03ZYazar Bullock, Jessey, author. Gordon, Adam, author.<br/>Yer Numarası QA76.9 .A25<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119183457">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119183457</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Hacking the hacker : learn from the experts who take down hackersent://SD_ILS/0/SD_ILS:5936362026-01-26T23:05:03Z2026-01-26T23:05:03ZYazar Grimes, Roger A., author.<br/>Yer Numarası QA76.9 .A25<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119396260">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119396260</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Securing the internet of thingsent://SD_ILS/0/SD_ILS:4593352026-01-26T23:05:03Z2026-01-26T23:05:03ZYazar Li, Shancang, author. Xu, Li D., author. Romdhani, Imed, contributor.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="https://www.sciencedirect.com/science/book/9780128044582">https://www.sciencedirect.com/science/book/9780128044582</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>DNS security managementent://SD_ILS/0/SD_ILS:5938022026-01-26T23:05:03Z2026-01-26T23:05:03ZYazar Dooley, Michael, 1962- author. Rooney, Timothy, 1962- author.<br/>Yer Numarası QA76.9 .A25<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119328292">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119328292</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Cybersecurity essentialsent://SD_ILS/0/SD_ILS:5947562026-01-26T23:05:03Z2026-01-26T23:05:03ZYazar Brooks, Charles J., author. Grow, Christopher, author. Craig, Philip, author. Short, Donald, author.<br/>Yer Numarası TK5105.59<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119369141">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119369141</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Cyber security awareness for CEOs and managementent://SD_ILS/0/SD_ILS:4586652026-01-26T23:05:03Z2026-01-26T23:05:03ZYazar Willson, David (Lawyer), author. Dalziel, Henry, editor.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128047545">http://www.sciencedirect.com/science/book/9780128047545</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Windows registry forensics : advanced digital forensic analysis of the Windows registryent://SD_ILS/0/SD_ILS:4587772026-01-26T23:05:03Z2026-01-26T23:05:03ZYazar Carvey, Harlan A., author.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128032916">http://www.sciencedirect.com/science/book/9780128032916</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>OS X incident response : scripting and analysisent://SD_ILS/0/SD_ILS:4588692026-01-26T23:05:03Z2026-01-26T23:05:03ZYazar Bradley, Jaron, author.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128044568">http://www.sciencedirect.com/science/book/9780128044568</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Threat forecasting : leveraging big data for predictive analysisent://SD_ILS/0/SD_ILS:4588862026-01-26T23:05:03Z2026-01-26T23:05:03ZYazar Pirc, John, author. DeSanto, David, author. Davison, Iain, author. Gragido, Will, author.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="https://www.sciencedirect.com/science/book/9780128000069">https://www.sciencedirect.com/science/book/9780128000069</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Mobile data loss : threats and countermeasuresent://SD_ILS/0/SD_ILS:4587292026-01-26T23:05:03Z2026-01-26T23:05:03ZYazar Raggo, Michael T.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="https://www.sciencedirect.com/science/book/9780128028643">https://www.sciencedirect.com/science/book/9780128028643</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Data breach preparation and response : breaches are certain, impact is notent://SD_ILS/0/SD_ILS:4589262026-01-26T23:05:03Z2026-01-26T23:05:03ZYazar Fowler, Kevvie, author.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="https://www.sciencedirect.com/science/book/9780128034514">https://www.sciencedirect.com/science/book/9780128034514</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>DNS security : defending the domain name systement://SD_ILS/0/SD_ILS:4589352026-01-26T23:05:03Z2026-01-26T23:05:03ZYazar Liska, Allan, author. Stowe, Geoffrey, author.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128033067">http://www.sciencedirect.com/science/book/9780128033067</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Information security science : measuring the vulnerability to data compromisesent://SD_ILS/0/SD_ILS:4589682026-01-26T23:05:03Z2026-01-26T23:05:03ZYazar Young, Carl S., author.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128096437">http://www.sciencedirect.com/science/book/9780128096437</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Cyber and electromagnetic threats in modern relay protectionent://SD_ILS/0/SD_ILS:5434462026-01-26T23:05:03Z2026-01-26T23:05:03ZYazar Gurevich, Vladimir, 1956, author.<br/>Yer Numarası TK2861 .G87 2015<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9781482264326">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>Hardware security : design, threats, and safeguardsent://SD_ILS/0/SD_ILS:5436202026-01-26T23:05:03Z2026-01-26T23:05:03ZYazar Mukhopadhyay, Debdeep, author. Subhra, Rajat, author.<br/>Yer Numarası QA76.9 .A25 M85 2015<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9781439895849">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>CSA guide to cloud computing implementing cloud privacy and securityent://SD_ILS/0/SD_ILS:3554492026-01-26T23:05:03Z2026-01-26T23:05:03ZYazar Samani, Raj, author. Honan, Brian, author. Reavis, Jim, author. Jirasek, Vladimir, editor. CSA (Organization), issuing body.<br/>Yer Numarası ONLINE(355449.1)<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780124201255">http://www.sciencedirect.com/science/book/9780124201255</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Dissecting the hack : the v3rb0ten networkent://SD_ILS/0/SD_ILS:4586242026-01-26T23:05:03Z2026-01-26T23:05:03ZYazar Street, Jayson E., author. Sims, Kristin, author. Baskin, Brian, author. Martin, Brian, editor.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="https://www.sciencedirect.com/science/book/9780128042786">https://www.sciencedirect.com/science/book/9780128042786</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Measuring and managing information risk : a FAIR approachent://SD_ILS/0/SD_ILS:3555762026-01-26T23:05:03Z2026-01-26T23:05:03ZYazar Freund, Jack, author. Jones, Jack, author.<br/>Yer Numarası ONLINE(355576.1)<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780124202313">http://www.sciencedirect.com/science/book/9780124202313</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Introduction to modern cryptographyent://SD_ILS/0/SD_ILS:3643152026-01-26T23:05:03Z2026-01-26T23:05:03ZYazar Katz, Jonathan, 1974- Lindell, Yehuda.<br/>Yer Numarası QA76.9.A25 K36 2015<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~2<br/>Information security analytics finding security insights, patterns, and anomalies in big dataent://SD_ILS/0/SD_ILS:3553882026-01-26T23:05:03Z2026-01-26T23:05:03ZYazar Talabis, Mark, author. McPherson, Robert, author. Miyamoto, I, author. Martin, Jason L., author.<br/>Yer Numarası ONLINE(355388.1)<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128002070">http://www.sciencedirect.com/science/book/9780128002070</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Security management : a critical thinking approachent://SD_ILS/0/SD_ILS:5397252026-01-26T23:05:03Z2026-01-26T23:05:03ZYazar Land, Michael (Industrial engineer), author. Ricks, Truett A., author. Ricks, Bob, author.<br/>Yer Numarası HD61.5 .L36 2014<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9781466561786">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>What every engineer should know about cyber security and digital forensicsent://SD_ILS/0/SD_ILS:5397262026-01-26T23:05:03Z2026-01-26T23:05:03ZYazar DeFranco, Joanna F., author.<br/>Yer Numarası TK5105.59 .D44 2014<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9781466564541">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>The state of the art in intrusion prevention and detectionent://SD_ILS/0/SD_ILS:5436762026-01-26T23:05:03Z2026-01-26T23:05:03ZYazar Pathan, Al-Sakib Khan, editor.<br/>Yer Numarası QA76.9 .A25 S7354 2014<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9781482203523">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>Network security essentials : applications and standardsent://SD_ILS/0/SD_ILS:3542322026-01-26T23:05:03Z2026-01-26T23:05:03ZYazar Stallings, William.<br/>Yer Numarası TK5105.59 S725 2014<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>Cyber threat! : how to manage the growing risk of cyber attacksent://SD_ILS/0/SD_ILS:3420202026-01-26T23:05:03Z2026-01-26T23:05:03ZYazar Ulsch, N. MacDonnell, 1951-<br/>Yer Numarası ONLINE(342020.1)<br/>Elektronik Erişim ebrary <a href="http://alltitles.ebrary.com/Doc?id=10895757">An electronic book accessible through the World Wide Web; click to view</a>
Ebook Library <a href="http://public.eblib.com/choice/publicfullrecord.aspx?p=1742833">http://public.eblib.com/choice/publicfullrecord.aspx?p=1742833</a>
John Wiley <a href="http://dx.doi.org/10.1002/9781118915028">http://dx.doi.org/10.1002/9781118915028</a>
MyiLibrary <a href="http://www.myilibrary.com?id=629214">http://www.myilibrary.com?id=629214</a>
Cover <a href="http://swbplus.bsz-bw.de/bsz410564842cov.htm">http://swbplus.bsz-bw.de/bsz410564842cov.htm</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Industrial network security : securing critical infrastructure networks for Smart Grid, SCADA , and other industrial control systemsent://SD_ILS/0/SD_ILS:3553522026-01-26T23:05:03Z2026-01-26T23:05:03ZYazar Knapp, Eric D. Langill, Joel Thomas.<br/>Yer Numarası ONLINE(355352.1)<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780124201149">http://www.sciencedirect.com/science/book/9780124201149</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Online security for the business travelerent://SD_ILS/0/SD_ILS:3555752026-01-26T23:05:03Z2026-01-26T23:05:03ZYazar Gonzalez, Deborah, author.<br/>Yer Numarası ONLINE(355575.1)<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128000694">http://www.sciencedirect.com/science/book/9780128000694</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Cryptography and network security : principles and practiceent://SD_ILS/0/SD_ILS:3712882026-01-26T23:05:03Z2026-01-26T23:05:03ZYazar Stallings, William.<br/>Yer Numarası TK5105.59 S713 2014<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>Cloud management and securityent://SD_ILS/0/SD_ILS:3418162026-01-26T23:05:03Z2026-01-26T23:05:03ZYazar Abbadi, Imad M., author.<br/>Yer Numarası ONLINE(341816.1)<br/>Elektronik Erişim ebrary <a href="http://alltitles.ebrary.com/Doc?id=10881234">An electronic book accessible through the World Wide Web; click to view</a>
<a href="http://www.lib.uts.edu.au/sso/goto.php?url=http://www.UTS.eblib.com.AU/EBLWeb/patron/?target=patron&extendedid=P_1701403_0">Electronic version</a>
Cover image <a href="http://catalogimages.wiley.com/images/db/jimages/9781118817094.jpg">http://catalogimages.wiley.com/images/db/jimages/9781118817094.jpg</a>
John Wiley <a href="http://dx.doi.org/10.1002/9781118817087">http://dx.doi.org/10.1002/9781118817087</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Collaboration with cloud computing : security, social media, and unified communicationsent://SD_ILS/0/SD_ILS:3558292026-01-26T23:05:03Z2026-01-26T23:05:03ZYazar Messier, Ric, author.<br/>Yer Numarası ONLINE(355829.1)<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780124170407">http://www.sciencedirect.com/science/book/9780124170407</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Windows forensic analysis toolkit : advanced analysis techniques for Windows 8ent://SD_ILS/0/SD_ILS:3559092026-01-26T23:05:03Z2026-01-26T23:05:03ZYazar Carvey, Harlan A., author.<br/>Yer Numarası ONLINE(355909.1)<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780124171572">http://www.sciencedirect.com/science/book/9780124171572</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Security without obscurity : a guide to confidentiality, authentication, and integrityent://SD_ILS/0/SD_ILS:5441182026-01-26T23:05:03Z2026-01-26T23:05:03ZYazar Stapleton, Jeffrey James, author.<br/>Yer Numarası QA76.9 .A25 S734 2014<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9781466592155">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>Linux Malware Incident Response an Excerpt from Malware Forensic Field Guide for Linux Systems.ent://SD_ILS/0/SD_ILS:3066972026-01-26T23:05:03Z2026-01-26T23:05:03ZYazar Malin, Cameron H. Casey, Eoghan. Aquilina, James M.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780124095076">http://www.sciencedirect.com/science/book/9780124095076</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Federated identity primerent://SD_ILS/0/SD_ILS:3064612026-01-26T23:05:03Z2026-01-26T23:05:03ZYazar Rountree, Derrick.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780124071896">http://www.sciencedirect.com/science/book/9780124071896</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Digital forensics for handheld devicesent://SD_ILS/0/SD_ILS:5414292026-01-26T23:05:03Z2026-01-26T23:05:03ZYazar Doherty, Eamon P., author.<br/>Yer Numarası HV8079 .C65 D64 2013<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9781439898789">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>Security for wireless sensor networks using identity-based cryptographyent://SD_ILS/0/SD_ILS:5446122026-01-26T23:05:03Z2026-01-26T23:05:03ZYazar Patil, Harsh Kupwade., author. Szygenda, Stephen A.<br/>Yer Numarası QA76.9 .A25 P38 2013<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9781439869024">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>Information security policy development for compliance : ISO/IEC 27001, NIST SP 800-53, HIPAA standard, PCI DSS V2.0, and AUP V5.0ent://SD_ILS/0/SD_ILS:5451282026-01-26T23:05:03Z2026-01-26T23:05:03ZYazar Williams, Barry L., author.<br/>Yer Numarası QA76.9 .A25 .W5495 2013<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9781466580596">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>PRAGMATIC security metrics : applying metametrics to information securityent://SD_ILS/0/SD_ILS:5417972026-01-26T23:05:03Z2026-01-26T23:05:03ZYazar Brotby, W. Krag., author. Hinson, Gary. Kabay, Michel E.<br/>Yer Numarası HD30.38 .B76 2013<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9781439881538">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>Discrete dynamical systems and chaotic machines : theory and applicationsent://SD_ILS/0/SD_ILS:5457152026-01-26T23:05:03Z2026-01-26T23:05:03ZYazar Bahi, Jacques Mohcine., author. Guyeux, Christophe.<br/>Yer Numarası QA76.9 .A25 B344 2013<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9781466554511">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>The complete guide to physical securityent://SD_ILS/0/SD_ILS:5459602026-01-26T23:05:03Z2026-01-26T23:05:03ZYazar Baker, Paul, 1958, author. Benny, Daniel J.<br/>Yer Numarası HV8290 .B34 2013<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9781420099645">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>Handbook of SCADA/control systems securityent://SD_ILS/0/SD_ILS:5478552026-01-26T23:05:03Z2026-01-26T23:05:03ZYazar Radvanovsky, Robert. Brodsky, Jacob.<br/>Yer Numarası TK5105.59 .H3532 2013<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9781466502277">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>Elementary information securityent://SD_ILS/0/SD_ILS:2712722026-01-26T23:05:03Z2026-01-26T23:05:03ZYazar Smith, Richard E.<br/>Yer Numarası QA76.9.A25 S652 2013<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>Information protection playbookent://SD_ILS/0/SD_ILS:3066492026-01-26T23:05:03Z2026-01-26T23:05:03ZYazar Kane, Greg, editor of compilation. Koppel, Lorna, editor of compilation.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780124172326">http://www.sciencedirect.com/science/book/9780124172326</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Data hiding exposing concealed data in multimedia, operating systems, mobile devices and network protocolsent://SD_ILS/0/SD_ILS:1476022026-01-26T23:05:03Z2026-01-26T23:05:03ZYazar Raggo, Michael T. Hosmer, Chet.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597497435">http://www.sciencedirect.com/science/book/9781597497435</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Violent Python a cookbook for hackers, forensic analysts, penetration testers and security engineersent://SD_ILS/0/SD_ILS:1469172026-01-26T23:05:03Z2026-01-26T23:05:03ZYazar O'Connor, T. J.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597499576">http://www.sciencedirect.com/science/book/9781597499576</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Secret history : the story of cryptologyent://SD_ILS/0/SD_ILS:3652582026-01-26T23:05:03Z2026-01-26T23:05:03ZYazar Bauer, Craig P.<br/>Yer Numarası QA76.9.A25 B384 2013<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>Network and application security fundamentals and practicesent://SD_ILS/0/SD_ILS:5416272026-01-26T23:05:03Z2026-01-26T23:05:03ZYazar Ganguly, Debashis., author. Lahiri, Shibamouli.<br/>Yer Numarası TK5105.59 .G36 2012<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9781466502451">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>Data mining tools for malware detectionent://SD_ILS/0/SD_ILS:5457962026-01-26T23:05:03Z2026-01-26T23:05:03ZYazar Masud, Mehedy., author. Khan, Latifur. Thuraisingham, Bhavani M.<br/>Yer Numarası QA76.9 .D343 M385 2012<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9781439854556">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>Secure and resilient software : requirements, test cases, and testing methodsent://SD_ILS/0/SD_ILS:5401562026-01-26T23:05:03Z2026-01-26T23:05:03ZYazar Merkow, Mark S., author. Raghavan, Lakshmikanth.<br/>Yer Numarası QA76.76 .T48 M47 2012<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9781439866221">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>RC4 stream cipher and its variantsent://SD_ILS/0/SD_ILS:5387542026-01-26T23:05:03Z2026-01-26T23:05:03ZYazar Paul, Goutam., author. Maitra, Subhamoy, 1970-<br/>Yer Numarası QA76.9 .A25 P385 2012<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9781439831373">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>Cybersecurity for industrial control systems : SCADA, DCS, PLC, HMI, and SISent://SD_ILS/0/SD_ILS:5431192026-01-26T23:05:03Z2026-01-26T23:05:03ZYazar Macaulay, Tyson., author. Singer, Bryan.<br/>Yer Numarası TS156.8 .M328 2012<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9781439801987">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>Hacking exposed 7 : network security secrets & solutionsent://SD_ILS/0/SD_ILS:2700332026-01-26T23:05:03Z2026-01-26T23:05:03ZYazar McClure, Stuart. Scambray, Joel. Kurtz, George.<br/>Yer Numarası TK5105.59 M48 2012<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>Computer architecture and security : fundamentals of designing secure computer systemsent://SD_ILS/0/SD_ILS:2488652026-01-26T23:05:03Z2026-01-26T23:05:03ZYazar Wang, Shuangbao Paul. Ledley, Robert Steven.<br/>Yer Numarası QA76.9.A73 W36 2012<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>Windows forensic analysis toolkit advanced analysis techniques for Windows 7ent://SD_ILS/0/SD_ILS:1456892026-01-26T23:05:03Z2026-01-26T23:05:03ZYazar Carvey, Harlan A. Kolde, Jennifer.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597497275">http://www.sciencedirect.com/science/book/9781597497275</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Malware forensics field guide for Windows dystems digital forensics field guidesent://SD_ILS/0/SD_ILS:1478982026-01-26T23:05:03Z2026-01-26T23:05:03ZYazar Malin, Cameron H. Casey, Eoghan. Aquilina, James M.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597494724">http://www.sciencedirect.com/science/book/9781597494724</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>The hacker's guide to OS X exploiting OS X from the root upent://SD_ILS/0/SD_ILS:1480062026-01-26T23:05:03Z2026-01-26T23:05:03ZYazar Bathurst, Robert. Rogers, Russ. Ghassemlouei, Alijohn.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597499507">http://www.sciencedirect.com/science/book/9781597499507</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Hacking web apps detecting and preventing web application security problemsent://SD_ILS/0/SD_ILS:1481612026-01-26T23:05:03Z2026-01-26T23:05:03ZYazar Shema, Mike.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597499514">http://www.sciencedirect.com/science/book/9781597499514</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>SQL injection attacks and defenseent://SD_ILS/0/SD_ILS:1485162026-01-26T23:05:03Z2026-01-26T23:05:03ZYazar Clarke, Justin.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597499637">http://www.sciencedirect.com/science/book/9781597499637</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Advances in intelligence and security informaticsent://SD_ILS/0/SD_ILS:1460552026-01-26T23:05:03Z2026-01-26T23:05:03ZYazar Mao, Wenji. Wang, Fei-Yue.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780123972002">http://www.sciencedirect.com/science/book/9780123972002</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Embedded systems security practical methods for safe and secure software and systems developmentent://SD_ILS/0/SD_ILS:1464512026-01-26T23:05:03Z2026-01-26T23:05:03ZYazar Kleidermacher, David. Kleidermacher, Mike.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780123868862">http://www.sciencedirect.com/science/book/9780123868862</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Low tech hacking street smarts for security professionalsent://SD_ILS/0/SD_ILS:1477422026-01-26T23:05:03Z2026-01-26T23:05:03ZYazar Wiles, Jack.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597496650">http://www.sciencedirect.com/science/book/9781597496650</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Computer security : principles and practiceent://SD_ILS/0/SD_ILS:3134732026-01-26T23:05:03Z2026-01-26T23:05:03ZYazar Stallings, William. Brown, Lawrie<br/>Yer Numarası QA76.9 S73 2012<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>The 7 qualities of highly secure softwareent://SD_ILS/0/SD_ILS:5449512026-01-26T23:05:03Z2026-01-26T23:05:03ZYazar Paul, Mano., author.<br/>Yer Numarası QA76.9 .A25 P38 2012<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9781439814475">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>Security in computingent://SD_ILS/0/SD_ILS:3132972026-01-26T23:05:03Z2026-01-26T23:05:03ZYazar Pfleeger, Charles P., 1948-<br/>Yer Numarası QA76.9 A25 P45 2011<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>Data mining and machine learning in cybersecurityent://SD_ILS/0/SD_ILS:5406142026-01-26T23:05:03Z2026-01-26T23:05:03ZYazar Dua, Sumeet., author. Du, Xian.<br/>Yer Numarası QA76.9 .D343 D825 2011<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9781439839430">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>Machine learning forensics for law enforcement, security, and intelligenceent://SD_ILS/0/SD_ILS:5447652026-01-26T23:05:03Z2026-01-26T23:05:03ZYazar Mena, Jesus., author.<br/>Yer Numarası HV8073 .M395 2011<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9781439860700">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>Honeypot : a new paradigm to information securityent://SD_ILS/0/SD_ILS:5455902026-01-26T23:05:03Z2026-01-26T23:05:03ZYazar Joshi, R. C., author. Sardana, Anjali.<br/>Yer Numarası QA76.9 .A25 J66 2011<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9781439869994">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>Official (ISC)2 guide to the ISSMP CBKent://SD_ILS/0/SD_ILS:5443752026-01-26T23:05:03Z2026-01-26T23:05:03ZYazar Tipton, Harold F.<br/>Yer Numarası QA76.9 .A25 O34 2011<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9781420094442">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>Security de-engineering : solving the problems in information risk managementent://SD_ILS/0/SD_ILS:5456082026-01-26T23:05:03Z2026-01-26T23:05:03ZYazar Tibble, Ian., author.<br/>Yer Numarası HF5548.37 .T53 2011<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9781439868355">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>The security risk assessment handbook : a complete guide for performing security risk assessmentsent://SD_ILS/0/SD_ILS:5397432026-01-26T23:05:03Z2026-01-26T23:05:03ZYazar Landoll, Douglas J., author.<br/>Yer Numarası HF5548.37 .L358 2011<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9781439821497">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>Security and policy driven computingent://SD_ILS/0/SD_ILS:5397612026-01-26T23:05:03Z2026-01-26T23:05:03ZYazar Liu, Lei, 1968, author.<br/>Yer Numarası QA76.9 .A25 L587 2011<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9781439825808">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>Official (ISC)2 guide to the CSSLPent://SD_ILS/0/SD_ILS:5417542026-01-26T23:05:03Z2026-01-26T23:05:03ZYazar Paul, Mano., author.<br/>Yer Numarası QA76.76 .D47 P3775 2011<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9781439826065">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>Adaptive security management architectureent://SD_ILS/0/SD_ILS:5418522026-01-26T23:05:03Z2026-01-26T23:05:03ZYazar Tiller, James S., author.<br/>Yer Numarası QA76.9 .A25 T55 2011<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9781420013375">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>Security patch managementent://SD_ILS/0/SD_ILS:5427632026-01-26T23:05:03Z2026-01-26T23:05:03ZYazar Nicastro, Felicia M., author.<br/>Yer Numarası QA76.9 .A25 N53 2011<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9781439825006">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>Managing risk in information systemsent://SD_ILS/0/SD_ILS:2712512026-01-26T23:05:03Z2026-01-26T23:05:03ZYazar Gibson, Darril.<br/>Yer Numarası QA76.9.A25 G5 2011<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>Security strategies in Windows platforms and applicationsent://SD_ILS/0/SD_ILS:2715372026-01-26T23:05:03Z2026-01-26T23:05:03ZYazar Solomon, Michael.<br/>Yer Numarası QA76.76.O63 S64 2011<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>Security strategies in Linux platforms and applicationsent://SD_ILS/0/SD_ILS:2715392026-01-26T23:05:03Z2026-01-26T23:05:03ZYazar Jang, Michael H.<br/>Yer Numarası QA76.76.O63 J3638 2011<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>Security policies and implementation issuesent://SD_ILS/0/SD_ILS:2715342026-01-26T23:05:03Z2026-01-26T23:05:03ZYazar Johnson, Rob (Robert) Merkow, Mark S.<br/>Yer Numarası QA76.9.A25 J64 2011<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>Auditing IT infrastructures for complianceent://SD_ILS/0/SD_ILS:2711512026-01-26T23:05:03Z2026-01-26T23:05:03ZYazar Weiss, Martin M. Solomon, Michael G.<br/>Yer Numarası QA76.9.A25 W428 2011<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>Hacker techniques, tools, and incident handlingent://SD_ILS/0/SD_ILS:2714382026-01-26T23:05:03Z2026-01-26T23:05:03ZYazar Oriyano, Sean-Philip. Gregg, Michael (Michael C.)<br/>Yer Numarası TK5105.59 O786 2011<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>Information security principles and practiceent://SD_ILS/0/SD_ILS:2988782026-01-26T23:05:03Z2026-01-26T23:05:03ZYazar Stamp, Mark.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim Wiley InterScience <a href="http://dx.doi.org/10.1002/9781118027974">An electronic book accessible through the World Wide Web; click for information</a>
Ebook Library <a href="http://public.eblib.com/EBLPublic/PublicView.do?ptiID=738753">http://public.eblib.com/EBLPublic/PublicView.do?ptiID=738753</a>
<a href="http://site.ebrary.com/lib/alltitles/Doc?id=10478419">http://site.ebrary.com/lib/alltitles/Doc?id=10478419</a>
<a href="http://swb.eblib.com/patron/FullRecord.aspx?p=738753">http://swb.eblib.com/patron/FullRecord.aspx?p=738753</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>The basics of information security understanding the fundamentals of InfoSec in theory and practiceent://SD_ILS/0/SD_ILS:1453712026-01-26T23:05:03Z2026-01-26T23:05:03ZYazar Andress, Jason.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597496537">http://www.sciencedirect.com/science/book/9781597496537</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Industrial network security securing critical infrastructure networks for Smart Grid, SCADA, and other industrial control systemsent://SD_ILS/0/SD_ILS:1454572026-01-26T23:05:03Z2026-01-26T23:05:03ZYazar Knapp, Eric.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597496452">http://www.sciencedirect.com/science/book/9781597496452</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Windows Registry Forensics Advanced Digital Forensic Analysis of the Windows Registry.ent://SD_ILS/0/SD_ILS:1456592026-01-26T23:05:03Z2026-01-26T23:05:03ZYazar Carvey, Harlan.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495806">http://www.sciencedirect.com/science/book/9781597495806</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Securing the cloud cloud computer security techniques and tacticsent://SD_ILS/0/SD_ILS:1489802026-01-26T23:05:03Z2026-01-26T23:05:03ZYazar Winkler, J. R. (Joachim R.)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495929">http://www.sciencedirect.com/science/book/9781597495929</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Securing SQL server protecting your database from attackersent://SD_ILS/0/SD_ILS:1490342026-01-26T23:05:03Z2026-01-26T23:05:03ZYazar Cherry, Denny.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597496254">http://www.sciencedirect.com/science/book/9781597496254</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Web application obfuscation -/WAFs.. Evasion.. Filters//alert (/Obfuscation/)-ent://SD_ILS/0/SD_ILS:1469222026-01-26T23:05:03Z2026-01-26T23:05:03ZYazar Heiderich, Mario.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597496049">http://www.sciencedirect.com/science/book/9781597496049</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Security 2020 reduce security risks this decadeent://SD_ILS/0/SD_ILS:3189662026-01-26T23:05:03Z2026-01-26T23:05:03ZYazar Howard, Doug. Prince, Kevin.<br/>Yer Numarası ONLINE(318966.1)<br/>Elektronik Erişim Wiley InterScience <a href="http://dx.doi.org/10.1002/9781118255803">An electronic book accessible through the World Wide Web; click for information</a>
Books24x7 <a href="http://www.books24x7.com/marc.asp?bookid=40805">http://www.books24x7.com/marc.asp?bookid=40805</a>
Ebook Library <a href="http://public.eblib.com/choice/publicfullrecord.aspx?p=694289">http://public.eblib.com/choice/publicfullrecord.aspx?p=694289</a>
ebrary <a href="http://site.ebrary.com/id/10469690">http://site.ebrary.com/id/10469690</a>
MyiLibrary <a href="http://www.myilibrary.com?id=294413">http://www.myilibrary.com?id=294413</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Social engineering : the art of human hackingent://SD_ILS/0/SD_ILS:3779762026-01-26T23:05:03Z2026-01-26T23:05:03ZYazar Hadnagy, Christopher.<br/>Yer Numarası QA76.9.C66 H33 2011<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>Security 2020 reduce security risks this decadeent://SD_ILS/0/SD_ILS:3038392026-01-26T23:05:03Z2026-01-26T23:05:03ZYazar Howard, Doug. Prince, Kevin. Wiley InterScience (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim Wiley InterScience <a href="http://dx.doi.org/10.1002/9781118255803">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>IT audit, control, and securityent://SD_ILS/0/SD_ILS:3040082026-01-26T23:05:03Z2026-01-26T23:05:03ZYazar Moeller, Robert R.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim Wiley InterScience <a href="http://dx.doi.org/10.1002/9781118269138">An electronic book accessible through the World Wide Web; click for information</a>
Ebook Library <a href="http://public.eblib.com/EBLPublic/PublicView.do?ptiID=624573">http://public.eblib.com/EBLPublic/PublicView.do?ptiID=624573</a>
Books24x7 <a href="http://www.books24x7.com/marc.asp?bookid=40717">http://www.books24x7.com/marc.asp?bookid=40717</a>
<a href="http://site.ebrary.com/lib/alltitles/Doc?id=10469768">http://site.ebrary.com/lib/alltitles/Doc?id=10469768</a>
<a href="http://swb.eblib.com/patron/FullRecord.aspx?p=624573">http://swb.eblib.com/patron/FullRecord.aspx?p=624573</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Seven deadliest USB attacksent://SD_ILS/0/SD_ILS:3063282026-01-26T23:05:03Z2026-01-26T23:05:03ZYazar Anderson, Brian (Brian James)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495530">http://www.sciencedirect.com/science/book/9781597495530</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Virtualization and forensics a digital forensic investigator's guide to virtual environmentsent://SD_ILS/0/SD_ILS:3063302026-01-26T23:05:03Z2026-01-26T23:05:03ZYazar Barrett, Diane. Kipper, Gregory.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495578">http://www.sciencedirect.com/science/book/9781597495578</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Vulnerability managementent://SD_ILS/0/SD_ILS:5456982026-01-26T23:05:03Z2026-01-26T23:05:03ZYazar Foreman, Park., author.<br/>Yer Numarası QA76.9 .A25 F656 2010<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9781439801512">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>Risk analysis and security countermeasure selectionent://SD_ILS/0/SD_ILS:5394022026-01-26T23:05:03Z2026-01-26T23:05:03ZYazar Norman, Thomas L., author.<br/>Yer Numarası HV8290 .N67 2010<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9781420078718">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>Information security risk analysisent://SD_ILS/0/SD_ILS:5387132026-01-26T23:05:03Z2026-01-26T23:05:03ZYazar Peltier, Thomas R., author.<br/>Yer Numarası QA76.9 .A25 P429 2010<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9781439839577">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>The executive MBA in information securityent://SD_ILS/0/SD_ILS:5399482026-01-26T23:05:03Z2026-01-26T23:05:03ZYazar Trinckes, John J., author.<br/>Yer Numarası HF5548.37 .T75 2010<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9781439810088">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>Cryptanalysis of RSA and its variantsent://SD_ILS/0/SD_ILS:5420782026-01-26T23:05:03Z2026-01-26T23:05:03ZYazar Hinek, M. Jason., author.<br/>Yer Numarası TK5102.94 .H56 2010<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9781420075199">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>Mac security bibleent://SD_ILS/0/SD_ILS:3038812026-01-26T23:05:03Z2026-01-26T23:05:03ZYazar Kissell, Joe.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim Wiley InterScience <a href="http://dx.doi.org/10.1002/9781118257739">An electronic book accessible through the World Wide Web; click for information</a>
Safari Books Online <a href="http://proquest.safaribooksonline.com/640">http://proquest.safaribooksonline.com/640</a> <a href="http://proquest.safaribooksonline.com/?fpi=9780470474198">http://proquest.safaribooksonline.com/?fpi=9780470474198</a>
Safari Books Online <a href="http://proquest.safaribooksonline.com/9780470474198">http://proquest.safaribooksonline.com/9780470474198</a>
Books24x7 <a href="http://www.books24x7.com/marc.asp?bookid=40737">http://www.books24x7.com/marc.asp?bookid=40737</a>
<a href="http://site.ebrary.com/lib/alltitles/Doc?id=10358774">http://site.ebrary.com/lib/alltitles/Doc?id=10358774</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Safety of computer architecturesent://SD_ILS/0/SD_ILS:3041322026-01-26T23:05:03Z2026-01-26T23:05:03ZYazar Boulanger, Jean-Louis.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://lib.myilibrary.com?id=450000">Connect to MyiLibrary resource.</a>
Wiley <a href="http://onlinelibrary.wiley.com/book/10.1002/9781118600696">http://onlinelibrary.wiley.com/book/10.1002/9781118600696</a>
John Wiley <a href="http://dx.doi.org/10.1002/9781118600696">http://dx.doi.org/10.1002/9781118600696</a>
ebrary <a href="http://site.ebrary.com/id/10657623">http://site.ebrary.com/id/10657623</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Dissecting the hack the forb1dd3n networkent://SD_ILS/0/SD_ILS:1465852026-01-26T23:05:03Z2026-01-26T23:05:03ZYazar Street, Jayson E. Street, Jayson E. Dissecting the hack.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495684">http://www.sciencedirect.com/science/book/9781597495684</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Virtualization and forensics a digital forensic investigator's guide to virtual environmentsent://SD_ILS/0/SD_ILS:1467152026-01-26T23:05:03Z2026-01-26T23:05:03ZYazar Barrett, Diane. Kipper, Gregory.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495578">http://www.sciencedirect.com/science/book/9781597495578</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Managed code rootkits hooking into runtime environmentsent://SD_ILS/0/SD_ILS:1478362026-01-26T23:05:03Z2026-01-26T23:05:03ZYazar Metula, Erez.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495745">http://www.sciencedirect.com/science/book/9781597495745</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>System assurance beyond detecting vulnerabilitiesent://SD_ILS/0/SD_ILS:1485322026-01-26T23:05:03Z2026-01-26T23:05:03ZYazar Mansourov, Nikolai. Campara, Djenana.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780123814142">http://www.sciencedirect.com/science/book/9780123814142</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Seven deadliest USB attacksent://SD_ILS/0/SD_ILS:1489532026-01-26T23:05:03Z2026-01-26T23:05:03ZYazar Anderson, Brian (Brian James)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495530">http://www.sciencedirect.com/science/book/9781597495530</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Seven deadliest Microsoft attacksent://SD_ILS/0/SD_ILS:1490182026-01-26T23:05:03Z2026-01-26T23:05:03ZYazar Kraus, Rob.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495516">http://www.sciencedirect.com/science/book/9781597495516</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Seven deadliest wireless technologies attacksent://SD_ILS/0/SD_ILS:1490332026-01-26T23:05:03Z2026-01-26T23:05:03ZYazar Haines, Brad.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495417">http://www.sciencedirect.com/science/book/9781597495417</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>The basics of hacking and penetration testing ethical hacking and penetration testing made easyent://SD_ILS/0/SD_ILS:1451992026-01-26T23:05:03Z2026-01-26T23:05:03ZYazar Engebretson, Pat (Patrick Henry), 1974-<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597496551">http://www.sciencedirect.com/science/book/9781597496551</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Digital forensics for network, Internet, and cloud computing a forensic evidence guide for moving targets and dataent://SD_ILS/0/SD_ILS:1464822026-01-26T23:05:03Z2026-01-26T23:05:03ZYazar Lillard, Terrence.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495370">http://www.sciencedirect.com/science/book/9781597495370</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>A guide to kernel exploitation attacking the coreent://SD_ILS/0/SD_ILS:1480592026-01-26T23:05:03Z2026-01-26T23:05:03ZYazar Perla, Enrico. Massimiliano, Oldani.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597494861">http://www.sciencedirect.com/science/book/9781597494861</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Seven deadliest social network attacksent://SD_ILS/0/SD_ILS:1491452026-01-26T23:05:03Z2026-01-26T23:05:03ZYazar Timm, Carl. Perez, Richard, 1969 Oct. 17- Ely, Adam.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495455">http://www.sciencedirect.com/science/book/9781597495455</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Secure and resilient software developmentent://SD_ILS/0/SD_ILS:5450972026-01-26T23:05:03Z2026-01-26T23:05:03ZYazar Merkow, Mark S., author. Raghavan, Lakshmikanth.<br/>Yer Numarası QA76.76 .D47 M466 2010<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9781439826973">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>Security software development : assessing and managing security risksent://SD_ILS/0/SD_ILS:5438362026-01-26T23:05:03Z2026-01-26T23:05:03ZYazar Ashbaugh, Douglas A., author.<br/>Yer Numarası QA76.9 .A25 A8246 2009<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9781420063813">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>Profiling hackers : the science of criminal profiling as applied to the world of hackingent://SD_ILS/0/SD_ILS:5459732026-01-26T23:05:03Z2026-01-26T23:05:03ZYazar Chiesa, Raoul, 1973, author. Ducci, Stefania. Ciappi, Silvio, 1965-<br/>Yer Numarası HV6773 .C477 2009<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9781420086942">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>Architecting secure software systemsent://SD_ILS/0/SD_ILS:5389622026-01-26T23:05:03Z2026-01-26T23:05:03ZYazar Talukder, Asoke K., author. Chaitanya, Manish.<br/>Yer Numarası QA76.9 .A25 T34 2009<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9781420087857">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>Cyber fraud : tactics, techniques, and proceduresent://SD_ILS/0/SD_ILS:5401572026-01-26T23:05:03Z2026-01-26T23:05:03ZYazar Graham, James. Howard, Rick.<br/>Yer Numarası HV6773 .H69 2009<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9781420091281">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>Data protection : governance, risk management, and complianceent://SD_ILS/0/SD_ILS:5439182026-01-26T23:05:03Z2026-01-26T23:05:03ZYazar Hill, David G. (David Gary), 1943, author.<br/>Yer Numarası QA76.9 .A25 H52 2009<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9781439806937">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>SQL injection attacks and defenseent://SD_ILS/0/SD_ILS:1485762026-01-26T23:05:03Z2026-01-26T23:05:03ZYazar Clarke, Justin.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597494243">http://www.sciencedirect.com/science/book/9781597494243</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Computer forensics and cyber crime : an introductionent://SD_ILS/0/SD_ILS:1340362026-01-26T23:05:03Z2026-01-26T23:05:03ZYazar Britz, Marjie.<br/>Yer Numarası QA76.9.A25 B77 2009<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>Next generation SSH2 implementation securing data in motionent://SD_ILS/0/SD_ILS:1462752026-01-26T23:05:03Z2026-01-26T23:05:03ZYazar Liu, Dale.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492836">http://www.sciencedirect.com/science/book/9781597492836</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>CISO soft skills : securing organizations impaired by employee politics, apathy, and intolerant perspectivesent://SD_ILS/0/SD_ILS:5441532026-01-26T23:05:03Z2026-01-26T23:05:03ZYazar Collette, Ronald D., author. Gentile, Michael. Gentile, Skye.<br/>Yer Numarası HF5548.37 .G462 2009<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9781420089110">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>Information security management metrics : a definitive guide to effective security monitoring and measurementent://SD_ILS/0/SD_ILS:5469522026-01-26T23:05:03Z2026-01-26T23:05:03ZYazar Brotby, W. Krag., author.<br/>Yer Numarası HD30.2 .B78 2009<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9781420052862">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>Building an effective information security policy architectureent://SD_ILS/0/SD_ILS:5409852026-01-26T23:05:03Z2026-01-26T23:05:03ZYazar Bacik, Sandy., author.<br/>Yer Numarası QA76.9 .A25 B335 2008<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9781420059069">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>Digital privacy : theory, technologies, and practicesent://SD_ILS/0/SD_ILS:5477742026-01-26T23:05:03Z2026-01-26T23:05:03ZYazar Acquisti, Alessandro.<br/>Yer Numarası QA76.9 .A25 D528 2008<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9781420052183">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>Insider computer fraud : an in-depth framework for detecting and defending against insider IT attacksent://SD_ILS/0/SD_ILS:5443962026-01-26T23:05:03Z2026-01-26T23:05:03ZYazar Brancik, Kenneth C., author.<br/>Yer Numarası QA76.9 .A25 B725 2008<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9781420046601">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>Information assurance architectureent://SD_ILS/0/SD_ILS:5398302026-01-26T23:05:03Z2026-01-26T23:05:03ZYazar Willett, Keith D., author.<br/>Yer Numarası QA76.9 .A25 W5487 2008<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9780849380686">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>Infosecurity 2008 threat analysisent://SD_ILS/0/SD_ILS:1455412026-01-26T23:05:03Z2026-01-26T23:05:03ZYazar Clark, Champ, III.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492249">http://www.sciencedirect.com/science/book/9781597492249</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Information assurance dependability and security in networked systemsent://SD_ILS/0/SD_ILS:1455532026-01-26T23:05:03Z2026-01-26T23:05:03ZYazar Qian, Yi, 1962-<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780123735669">http://www.sciencedirect.com/science/book/9780123735669</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Microsoft forefront security administration guideent://SD_ILS/0/SD_ILS:1463692026-01-26T23:05:03Z2026-01-26T23:05:03ZYazar Varsalone, Jesse.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492447">http://www.sciencedirect.com/science/book/9781597492447</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>No tech hacking a guide to social engineering, dumpster diving, and shoulder surfingent://SD_ILS/0/SD_ILS:1463622026-01-26T23:05:03Z2026-01-26T23:05:03ZYazar Long, Johnny. Mitnick, Kevin D. (Kevin David), 1963-<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492157">http://www.sciencedirect.com/science/book/9781597492157</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Malware forensics investigating and analyzing malicious codeent://SD_ILS/0/SD_ILS:1479142026-01-26T23:05:03Z2026-01-26T23:05:03ZYazar Aquilina, James M. Casey, Eoghan. Malin, Cameron H.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492683">http://www.sciencedirect.com/science/book/9781597492683</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Google hacking for penetration testers. Volume 2ent://SD_ILS/0/SD_ILS:1480292026-01-26T23:05:03Z2026-01-26T23:05:03ZYazar Long, Johnny.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491761">http://www.sciencedirect.com/science/book/9781597491761</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>OS X exploits and defenseent://SD_ILS/0/SD_ILS:1482422026-01-26T23:05:03Z2026-01-26T23:05:03ZYazar Baccas, Paul. Finisterre, Kevin.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492546">http://www.sciencedirect.com/science/book/9781597492546</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Scene of the cybercrimeent://SD_ILS/0/SD_ILS:1489552026-01-26T23:05:03Z2026-01-26T23:05:03ZYazar Cross, Michael, 1965- Shinder, Debra Littlejohn. Scene of the cybercrime.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492768">http://www.sciencedirect.com/science/book/9781597492768</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Securing Windows server 2008 prevent attacks from outside and inside your organization.ent://SD_ILS/0/SD_ILS:1489822026-01-26T23:05:03Z2026-01-26T23:05:03ZYer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492805">http://www.sciencedirect.com/science/book/9781597492805</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Securing Citrix XenApp Server in the enterpriseent://SD_ILS/0/SD_ILS:1490502026-01-26T23:05:03Z2026-01-26T23:05:03ZYazar Bin Azad, Tariq. Wilson, Connie. Wright., Michael.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492812">http://www.sciencedirect.com/science/book/9781597492812</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Digital watermarking and steganographyent://SD_ILS/0/SD_ILS:1464742026-01-26T23:05:03Z2026-01-26T23:05:03ZYazar Cox, I. J. (Ingemar J.)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780123725851">http://www.sciencedirect.com/science/book/9780123725851</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>OSSEC host-based intrusion detection guideent://SD_ILS/0/SD_ILS:1483332026-01-26T23:05:03Z2026-01-26T23:05:03ZYazar Hay, Andrew. Cid, Daniel. Bray, Rory.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492409">http://www.sciencedirect.com/science/book/9781597492409</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Practical embedded security building secure resource-constrained systemsent://SD_ILS/0/SD_ILS:1474162026-01-26T23:05:03Z2026-01-26T23:05:03ZYazar Stapko, Timothy John.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780750682152">http://www.sciencedirect.com/science/book/9780750682152</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Metasploit toolkit for penetration testing, exploit development, and vulnerability researchent://SD_ILS/0/SD_ILS:3064692026-01-26T23:05:03Z2026-01-26T23:05:03ZYazar Maynor, David. Mookhey, K. K.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490740">http://www.sciencedirect.com/science/book/9781597490740</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Software deployment, updating, and patchingent://SD_ILS/0/SD_ILS:5449662026-01-26T23:05:03Z2026-01-26T23:05:03ZYazar Stackpole, Bill., author. Hanrion, Patrick.<br/>Yer Numarası QA76.76 .C69 S74 2007<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9781420013290">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>Information security : design, implementation, measurement, and complianceent://SD_ILS/0/SD_ILS:5458392026-01-26T23:05:03Z2026-01-26T23:05:03ZYazar Layton, Timothy P., author.<br/>Yer Numarası HF5548.37 .L393 2007<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9781420013412">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>Security in Distributed, Grid, Mobile, and Pervasive Computing.ent://SD_ILS/0/SD_ILS:5448472026-01-26T23:05:03Z2026-01-26T23:05:03ZYer Numarası QA76.9<br/>Elektronik Erişim Taylor & Francis <a href="https://www.taylorfrancis.com/books/9780429119347">https://www.taylorfrancis.com/books/9780429119347</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Mechanics of user identification and authentication : fundamentals of identity managementent://SD_ILS/0/SD_ILS:5399402026-01-26T23:05:03Z2026-01-26T23:05:03ZYazar Todorov, Dobromir., author.<br/>Yer Numarası TK5105.59 .T575 2007<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9781420052206">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>How to cheat at securing your networkent://SD_ILS/0/SD_ILS:3065032026-01-26T23:05:03Z2026-01-26T23:05:03ZYazar Dubrawsky, Ido.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492317">http://www.sciencedirect.com/science/book/9781597492317</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Grid computing securityent://SD_ILS/0/SD_ILS:2487472026-01-26T23:05:03Z2026-01-26T23:05:03ZYazar Chakrabarti, Anirban.<br/>Yer Numarası QA76.9.C58 C53 2007<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>Botnets the killer web appent://SD_ILS/0/SD_ILS:1452832026-01-26T23:05:03Z2026-01-26T23:05:03ZYazar Schiller, Craig A.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491358">http://www.sciencedirect.com/science/book/9781597491358</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>How to cheat at securing your networkent://SD_ILS/0/SD_ILS:1456542026-01-26T23:05:03Z2026-01-26T23:05:03ZYazar Dubrawsky, Ido.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492317">http://www.sciencedirect.com/science/book/9781597492317</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>How to cheat at securing SQL server 2005ent://SD_ILS/0/SD_ILS:1456552026-01-26T23:05:03Z2026-01-26T23:05:03ZYer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491969">http://www.sciencedirect.com/science/book/9781597491969</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Windows forensic analysis DVD toolkitent://SD_ILS/0/SD_ILS:1456782026-01-26T23:05:03Z2026-01-26T23:05:03ZYazar Carvey, Harlan A.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491563">http://www.sciencedirect.com/science/book/9781597491563</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Zen and the art of information securityent://SD_ILS/0/SD_ILS:1456802026-01-26T23:05:03Z2026-01-26T23:05:03ZYazar Winkler, Ira.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491686">http://www.sciencedirect.com/science/book/9781597491686</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Microsoft windows security fundamentalsent://SD_ILS/0/SD_ILS:1463462026-01-26T23:05:03Z2026-01-26T23:05:03ZYazar Clercq, Jan de, 1968- Grillenmeier, Guido.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781555583408">http://www.sciencedirect.com/science/book/9781555583408</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>WarDriving & wireless penetration testingent://SD_ILS/0/SD_ILS:1468052026-01-26T23:05:03Z2026-01-26T23:05:03ZYazar Hurley, Chris.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491112">http://www.sciencedirect.com/science/book/9781597491112</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Physical and logical security convergence powered by enterprise security managementent://SD_ILS/0/SD_ILS:1481922026-01-26T23:05:03Z2026-01-26T23:05:03ZYazar Contos, Brian T.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491228">http://www.sciencedirect.com/science/book/9781597491228</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Techno Security's guide to managing risks for IT managers, auditors, and investigatorsent://SD_ILS/0/SD_ILS:1486412026-01-26T23:05:03Z2026-01-26T23:05:03ZYazar Wiles, Jack.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491389">http://www.sciencedirect.com/science/book/9781597491389</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>FISMA certification & accreditation handbookent://SD_ILS/0/SD_ILS:1458762026-01-26T23:05:03Z2026-01-26T23:05:03ZYazar Taylor, Laura. Shepherd, Matthew.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491167">http://www.sciencedirect.com/science/book/9781597491167</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Developer's guide to web application securityent://SD_ILS/0/SD_ILS:1476642026-01-26T23:05:03Z2026-01-26T23:05:03ZYazar Cross, Michael, 1965-<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490610">http://www.sciencedirect.com/science/book/9781597490610</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>The official CHFI study guide (Exam 312-49) for computer hacking forensic investigator.ent://SD_ILS/0/SD_ILS:1483882026-01-26T23:05:03Z2026-01-26T23:05:03ZYazar Kleiman, Dave.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491976">http://www.sciencedirect.com/science/book/9781597491976</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Open source fuzzing toolsent://SD_ILS/0/SD_ILS:1484122026-01-26T23:05:03Z2026-01-26T23:05:03ZYazar Rathaus, Noam.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491952">http://www.sciencedirect.com/science/book/9781597491952</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Techno security's guide to e-discovery and digital forensicsent://SD_ILS/0/SD_ILS:1485642026-01-26T23:05:03Z2026-01-26T23:05:03ZYazar Wiles, Jack.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492232">http://www.sciencedirect.com/science/book/9781597492232</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Security convergence managing enterprise security riskent://SD_ILS/0/SD_ILS:1490802026-01-26T23:05:03Z2026-01-26T23:05:03ZYazar Tyson, Dave.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim Volltext <a href="http://www.sciencedirect.com/science/book/9780750684255">http://www.sciencedirect.com/science/book/9780750684255</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Microsoft Vista for IT security professionalsent://SD_ILS/0/SD_ILS:1462422026-01-26T23:05:03Z2026-01-26T23:05:03ZYazar Piltzecker, Tony, 1975- Chaffin, Larry.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491396">http://www.sciencedirect.com/science/book/9781597491396</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Web application vulnerabilities detect, exploit, preventent://SD_ILS/0/SD_ILS:1469082026-01-26T23:05:03Z2026-01-26T23:05:03ZYazar Cross, Michael, 1965-<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492096">http://www.sciencedirect.com/science/book/9781597492096</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Metasploit Toolkit for Penetration Testing, Exploit Development, And Vulnerabiity Researchent://SD_ILS/0/SD_ILS:1470512026-01-26T23:05:03Z2026-01-26T23:05:03ZYer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490740">http://www.sciencedirect.com/science/book/9781597490740</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Developer's guide to web application securityent://SD_ILS/0/SD_ILS:3064642026-01-26T23:05:03Z2026-01-26T23:05:03ZYazar Cross, Michael, 1965-<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490610">http://www.sciencedirect.com/science/book/9781597490610</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Data warehousing and data mining techniques for cyber securityent://SD_ILS/0/SD_ILS:1104342026-01-26T23:05:03Z2026-01-26T23:05:03ZYazar Singhal, Anoop, 1958-<br/>Yer Numarası QA76.9.A25 S563 2007<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>Security in computingent://SD_ILS/0/SD_ILS:1106822026-01-26T23:05:03Z2026-01-26T23:05:03ZYazar Pfleeger, Charles P., 1948-<br/>Yer Numarası QA76.9.A25 P45 2007<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>FISMA certification & accreditation handbookent://SD_ILS/0/SD_ILS:1121692026-01-26T23:05:03Z2026-01-26T23:05:03ZYazar Taylor, Laura. Shepherd, Matthew. ScienceDirect (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491167">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>How to cheat at securing sql server 2005ent://SD_ILS/0/SD_ILS:1121742026-01-26T23:05:03Z2026-01-26T23:05:03ZYazar ScienceDirect (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491969">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Metasploit Toolkit for Penetration Testing, Exploit Development, And Vulnerabiity Researchent://SD_ILS/0/SD_ILS:1121792026-01-26T23:05:03Z2026-01-26T23:05:03ZYazar ScienceDirect (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490740">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Microsoft Vista for IT security professionalsent://SD_ILS/0/SD_ILS:1121822026-01-26T23:05:03Z2026-01-26T23:05:03ZYazar Piltzecker, Tony, 1975- Chaffin, Larry. ScienceDirect (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491396">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Microsoft windows security fundamentalsent://SD_ILS/0/SD_ILS:1121832026-01-26T23:05:03Z2026-01-26T23:05:03ZYazar Clercq, Jan de, 1968- Grillenmeier, Guido. ScienceDirect (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781555583408">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Open source fuzzing toolsent://SD_ILS/0/SD_ILS:1121872026-01-26T23:05:03Z2026-01-26T23:05:03ZYazar Rathaus, Noam ScienceDirect (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491952">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Security convergence managing enterprise security riskent://SD_ILS/0/SD_ILS:1121982026-01-26T23:05:03Z2026-01-26T23:05:03ZYazar Tyson, Dave. ScienceDirect (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780750684255">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Techno Security's guide to managing risks for IT managers, auditors, and investigatorsent://SD_ILS/0/SD_ILS:1122032026-01-26T23:05:03Z2026-01-26T23:05:03ZYazar Wiles, Jack. ScienceDirect (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491389">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>The official CHFI study guide (Exam 312-49) for computer hacking forensic investigator.ent://SD_ILS/0/SD_ILS:1122062026-01-26T23:05:03Z2026-01-26T23:05:03ZYazar Kleiman, Dave. ScienceDirect (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491976">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>WarDriving & wireless penetration testingent://SD_ILS/0/SD_ILS:1122102026-01-26T23:05:03Z2026-01-26T23:05:03ZYazar Hurley, Chris. ScienceDirect (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491112">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Windows forensic analysis DVD toolkitent://SD_ILS/0/SD_ILS:1122112026-01-26T23:05:03Z2026-01-26T23:05:03ZYazar Carvey, Harlan A. ScienceDirect (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491563">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Zen and the art of information securityent://SD_ILS/0/SD_ILS:1122142026-01-26T23:05:03Z2026-01-26T23:05:03ZYazar Winkler, Ira. ScienceDirect (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491686">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Testing code securityent://SD_ILS/0/SD_ILS:5461672026-01-26T23:05:03Z2026-01-26T23:05:03ZYazar Van der Linden, Maura A., author.<br/>Yer Numarası QA76.9 .A25 V359 2007<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9781420013795">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>Data-driven block ciphers for fast telecommunication systemsent://SD_ILS/0/SD_ILS:5469482026-01-26T23:05:03Z2026-01-26T23:05:03ZYazar Moldovyan, Nick., author. Moldovyan, Alex.<br/>Yer Numarası QA76.9 .A25 M664 2007<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9781420054125">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>Enhancing computer security with smart technologyent://SD_ILS/0/SD_ILS:5448232026-01-26T23:05:03Z2026-01-26T23:05:03ZYazar Vemuri, V. Rao.<br/>Yer Numarası TK5105.59 .E62 2005<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9781420031225">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>The security risk assessment handbook : a complete guide for performing security risk assessmentsent://SD_ILS/0/SD_ILS:5451672026-01-26T23:05:03Z2026-01-26T23:05:03ZYazar Landoll, Douglas J., author.<br/>Yer Numarası HF5548.37 .L358 2006<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9781420031232">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>The CISO handbook : a practical guide to securing your companyent://SD_ILS/0/SD_ILS:5392042026-01-26T23:05:03Z2026-01-26T23:05:03ZYazar Gentile, Michael., author. Collette, Ronald D. August, Thomas D.<br/>Yer Numarası HF5548.37 .G46 2006<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9781420031379">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>Information security architecture : an integrated approach to security in the organizationent://SD_ILS/0/SD_ILS:5412382026-01-26T23:05:03Z2026-01-26T23:05:03ZYazar Tudor, Jan Killmeyer., author.<br/>Yer Numarası QA76.9 .A25 T83 2006<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9780203488751">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>Bilgi ve bilgisayar güvenliği : casus yazılımlar ve korunma yöntemlerient://SD_ILS/0/SD_ILS:5154692026-01-26T23:05:03Z2026-01-26T23:05:03ZYazar Canbek, Gürol. Sağıroğlu, Şeref.<br/>Yer Numarası QA76.9.A25 C36 2006<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>Insider threat protecting the enterprise from sabotage, spying, and theftent://SD_ILS/0/SD_ILS:2536612026-01-26T23:05:03Z2026-01-26T23:05:03ZYazar Cole, Eric. Ring, Sandra.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim Volltext <a href="http://www.sciencedirect.com/science/book/9781597490481">http://www.sciencedirect.com/science/book/9781597490481</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>How to cheat at designing security for a Windows Server 2003 networkent://SD_ILS/0/SD_ILS:2536702026-01-26T23:05:03Z2026-01-26T23:05:03ZYazar Amini, Rob. Hunter, Laura E.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492430">http://www.sciencedirect.com/science/book/9781597492430</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Penetration tester's open source toolkitent://SD_ILS/0/SD_ILS:2536762026-01-26T23:05:03Z2026-01-26T23:05:03ZYazar Long, Johnny.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490214">http://www.sciencedirect.com/science/book/9781597490214</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Securing HP NonStop servers in an open systems world TCP/IP, OSS & SQLent://SD_ILS/0/SD_ILS:2538632026-01-26T23:05:03Z2026-01-26T23:05:03ZYazar XYPRO Technology Corporation.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781555583446">http://www.sciencedirect.com/science/book/9781555583446</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Multimedia security technologies for digital rights managementent://SD_ILS/0/SD_ILS:2545542026-01-26T23:05:03Z2026-01-26T23:05:03ZYazar Zeng, Wenjun, 1967- Yu, Hong Heather, 1967- Lin, Ching-Yung.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780123694768">http://www.sciencedirect.com/science/book/9780123694768</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Securing IM and P2P applications for the enterpriseent://SD_ILS/0/SD_ILS:2539392026-01-26T23:05:03Z2026-01-26T23:05:03ZYazar Piccard, Paul L. Sachs, Marcus H.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490177">http://www.sciencedirect.com/science/book/9781597490177</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Combating spyware in the enterpriseent://SD_ILS/0/SD_ILS:2540752026-01-26T23:05:03Z2026-01-26T23:05:03ZYazar Baskin, Brian. Piltzecker, Tony, 1975-<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490641">http://www.sciencedirect.com/science/book/9781597490641</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Trusted platform module basics using TPM in embedded systemsent://SD_ILS/0/SD_ILS:2544212026-01-26T23:05:03Z2026-01-26T23:05:03ZYazar Kinney, Steven.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780750679602">http://www.sciencedirect.com/science/book/9780750679602</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Information security : principles and practiceent://SD_ILS/0/SD_ILS:1094772026-01-26T23:05:03Z2026-01-26T23:05:03ZYazar Stamp, Mark.<br/>Yer Numarası QA76.9.A25 S69 2006<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>How to cheat at Windows System Administration using command line scriptsent://SD_ILS/0/SD_ILS:1121072026-01-26T23:05:03Z2026-01-26T23:05:03ZYazar Bhardwaj, Pawan K. Andreou, Kimon. Barber, Brian. Kleiman, Dave. Satyanarayana, Mahesh.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491051">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Linux Patch Management : keeping Linux systems up to dateent://SD_ILS/0/SD_ILS:1195502026-01-26T23:05:03Z2026-01-26T23:05:03ZYazar Jang, Michael H.<br/>Yer Numarası QA76.76.O63 J368 2006<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>Intelligence and security informatics for international security : information sharing and data miningent://SD_ILS/0/SD_ILS:1197862026-01-26T23:05:03Z2026-01-26T23:05:03ZYazar Chen, Hsinchun.<br/>Yer Numarası QA76.76.E95 C44 2006<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>How to cheat at Windows System Administration using command line scriptsent://SD_ILS/0/SD_ILS:1456232026-01-26T23:05:03Z2026-01-26T23:05:03ZYazar Bhardwaj, Pawan K. Andreou, Kimon. Barber, Brian. Kleiman, Dave. Satyanarayana, Mahesh.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491051">http://www.sciencedirect.com/science/book/9781597491051</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Essential computer security everyone's guide to e-mail, Internet, and wireless securityent://SD_ILS/0/SD_ILS:1458402026-01-26T23:05:03Z2026-01-26T23:05:03ZYazar Bradley, Tony, 1969- Carvey, Harlan A.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491143">http://www.sciencedirect.com/science/book/9781597491143</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Hack the stack using snort and ethereal to master the 8 layers of an insecure networkent://SD_ILS/0/SD_ILS:1479542026-01-26T23:05:03Z2026-01-26T23:05:03ZYazar Gregg, Michael (Michael C.) Watkins, Stephen.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491099">http://www.sciencedirect.com/science/book/9781597491099</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Enemy at the water cooler real-life stories of insider threats and Enterprise Security Management countermeasuresent://SD_ILS/0/SD_ILS:1464752026-01-26T23:05:03Z2026-01-26T23:05:03ZYazar Contos, Brian T.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491297">http://www.sciencedirect.com/science/book/9781597491297</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Syngress force emerging threat analysis from mischief to maliciousent://SD_ILS/0/SD_ILS:1484882026-01-26T23:05:03Z2026-01-26T23:05:03ZYazar Maynor, David.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490566">http://www.sciencedirect.com/science/book/9781597490566</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Information security architecture : an integrated approach to security in the organizationent://SD_ILS/0/SD_ILS:1108652026-01-26T23:05:03Z2026-01-26T23:05:03ZYazar Tudor, Jan Killmeyer.<br/>Yer Numarası QA76.9.A25 T83 2006<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>Computer security fundamentalsent://SD_ILS/0/SD_ILS:1086202026-01-26T23:05:03Z2026-01-26T23:05:03ZYazar Easttom, Chuck.<br/>Yer Numarası QA76.9.A25 E325 2006<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>Syngress force emerging threat analysis from mischief to maliciousent://SD_ILS/0/SD_ILS:1122022026-01-26T23:05:03Z2026-01-26T23:05:03ZYazar Maynor, David. ScienceDirect (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490566">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Information security risk analysisent://SD_ILS/0/SD_ILS:5448212026-01-26T23:05:03Z2026-01-26T23:05:03ZYazar Peltier, Thomas R., author.<br/>Yer Numarası QA76.9 .A25 P429 2005<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9781420031195">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>Information security fundamentalsent://SD_ILS/0/SD_ILS:5452262026-01-26T23:05:03Z2026-01-26T23:05:03ZYazar Peltier, Thomas R., author. Peltier, Justin. Blackley, John A.<br/>Yer Numarası QA76.9 .A25 P427 2005<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9781135493738">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>