Arama Sonuçları Computer Security - Daraltılmış: 2005SirsiDynix Enterprisehttps://katalog.hacettepe.edu.tr/client/tr_TR/default_tr/default_tr/qu$003dComputer$002bSecurity$0026qf$003dPUBDATE$002509Yay$0025C4$0025B1n$002bY$0025C4$0025B1l$0025C4$0025B1$0025092005$0025092005$0026ps$003d300?dt=list2025-12-07T10:34:25ZComputer Network Securityent://SD_ILS/0/SD_ILS:1651132025-12-07T10:34:25Z2025-12-07T10:34:25ZYazar Kizza, Joseph Migga. author. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/b106962">http://dx.doi.org/10.1007/b106962</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Statistical methods in computer securityent://SD_ILS/0/SD_ILS:5469382025-12-07T10:34:25Z2025-12-07T10:34:25ZYazar Chen, William W. S.<br/>Yer Numarası QA76.9 .A25 S737 2005<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9781420030884">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>Computer Security in the 21st Centuryent://SD_ILS/0/SD_ILS:1650012025-12-07T10:34:25Z2025-12-07T10:34:25ZYazar Lee, D. T. editor. Shieh, S. P. editor. Tygar, J. D. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/b104203">http://dx.doi.org/10.1007/b104203</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Sequrity for computer networks : an introduction to data security in teleprocessing and electronic funds transferent://SD_ILS/0/SD_ILS:621882025-12-07T10:34:25Z2025-12-07T10:34:25ZYazar Davies, Donald Watts, 1924- Price, W. L., ort.yaz.<br/>Yer Numarası TK 5105 D43 1989<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>Computer Security – ESORICS 2005 10th European Symposium on Research in Computer Security, Milan, Italy, September 12-14, 2005. Proceedingsent://SD_ILS/0/SD_ILS:1830522025-12-07T10:34:25Z2025-12-07T10:34:25ZYazar Vimercati, Sabrina de Capitani. editor. Syverson, Paul. editor. Gollmann, Dieter. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/11555827">http://dx.doi.org/10.1007/11555827</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Computer Network Security Third International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2005, St. Petersburg, Russia, September 24-28, 2005. Proceedingsent://SD_ILS/0/SD_ILS:1830662025-12-07T10:34:25Z2025-12-07T10:34:25ZYazar Gorodetsky, Vladimir. editor. Kotenko, Igor. editor. Skormin, Victor. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/11560326">http://dx.doi.org/10.1007/11560326</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Computer Safety, Reliability, and Security 24th International Conference, SAFECOMP 2005, Fredrikstad, Norway, September 28-30, 2005. Proceedingsent://SD_ILS/0/SD_ILS:1830682025-12-07T10:34:25Z2025-12-07T10:34:25ZYazar Winther, Rune. editor. Gran, Bjørn Axel. editor. Dahll, Gustav. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/11563228">http://dx.doi.org/10.1007/11563228</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Enhanced methods in computer security, biometric and artificial intelligence systemsent://SD_ILS/0/SD_ILS:1098642025-12-07T10:34:25Z2025-12-07T10:34:25ZYazar Pejas, Jerzy, 1954-, ed. Piegat, Andrzej, 1947-, ed.<br/>Yer Numarası QA76.9.A25 E545 2005<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>Enhanced Methods in Computer Security, Biometric and Artificial Intelligence Systemsent://SD_ILS/0/SD_ILS:1649312025-12-07T10:34:25Z2025-12-07T10:34:25ZYazar Pejaś, Jerzy. editor. Piegat, Andrzej. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/b101135">http://dx.doi.org/10.1007/b101135</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Formal Aspects in Security and Trust IFIP TC1 WG1.7 Workshop on Formal Aspects in Security and Trust (FAST), World Computer Congress, August 22–27, 2004, Toulouse, Franceent://SD_ILS/0/SD_ILS:1650112025-12-07T10:34:25Z2025-12-07T10:34:25ZYazar Dimitrakos, Theo. editor. Martinelli, Fabio. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/b104303">http://dx.doi.org/10.1007/b104303</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Information security management handbookent://SD_ILS/0/SD_ILS:5428312025-12-07T10:34:25Z2025-12-07T10:34:25ZYazar Tipton, Harold F. Krause, Micki.<br/>Yer Numarası QA76.9 .A25 I54165 2003<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9781420003406">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>The Law and Economics of Cybersecurityent://SD_ILS/0/SD_ILS:2355182025-12-07T10:34:25Z2025-12-07T10:34:25ZYazar Grady, Mark F.. Parisi, Francesco.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1017/CBO9780511511523">Access by subscription</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Stealing the network how to own an identityent://SD_ILS/0/SD_ILS:2536632025-12-07T10:34:25Z2025-12-07T10:34:25ZYazar Alder, Raven. Mullen, Timothy M. Long, Johnny.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490061">http://www.sciencedirect.com/science/book/9781597490061</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Software piracy exposedent://SD_ILS/0/SD_ILS:2536642025-12-07T10:34:25Z2025-12-07T10:34:25ZYazar Craig, Paul. Honick, Ron. Burnett, Mark (Mark M.)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781932266986">http://www.sciencedirect.com/science/book/9781932266986</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Cisco PIX firewalls configure, manage, & troubleshootent://SD_ILS/0/SD_ILS:2536672025-12-07T10:34:25Z2025-12-07T10:34:25ZYazar Behrens, Thorsten. Riley, Charles. Khan, Umer.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490047">http://www.sciencedirect.com/science/book/9781597490047</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Aggressive network self-defenseent://SD_ILS/0/SD_ILS:2536722025-12-07T10:34:25Z2025-12-07T10:34:25ZYazar Wyler, Neil R.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836203">http://www.sciencedirect.com/science/book/9781931836203</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Cyber spying tracking your family's (sometimes) secret online livesent://SD_ILS/0/SD_ILS:2536732025-12-07T10:34:25Z2025-12-07T10:34:25ZYazar Fair, Ted. Nordfelt, Michael. Ring, Sandra. Cole, Eric.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836418">http://www.sciencedirect.com/science/book/9781931836418</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>InfoSec career hacking sell your skillz, not your soulent://SD_ILS/0/SD_ILS:2536812025-12-07T10:34:25Z2025-12-07T10:34:25ZYazar Bayles, Aaron W. Brindley, Ed. Foster, James C. Hurley, Chris. Long, Johnny.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490115">http://www.sciencedirect.com/science/book/9781597490115</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Network security a practical approachent://SD_ILS/0/SD_ILS:2537072025-12-07T10:34:25Z2025-12-07T10:34:25ZYazar Harrington, Jan L.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780123116338">http://www.sciencedirect.com/science/book/9780123116338</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>IM, instant messaging, securityent://SD_ILS/0/SD_ILS:2537252025-12-07T10:34:25Z2025-12-07T10:34:25ZYazar Rittinghouse, John W. Ransome, James F.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781555583385">http://www.sciencedirect.com/science/book/9781555583385</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Firewalls jumpstart for network and systems administratorsent://SD_ILS/0/SD_ILS:2538422025-12-07T10:34:25Z2025-12-07T10:34:25ZYazar Vacca, John R. Ellis, Scott (Scott Raymond), 1968-<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781555582975">http://www.sciencedirect.com/science/book/9781555582975</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Physical security for ITent://SD_ILS/0/SD_ILS:2538552025-12-07T10:34:25Z2025-12-07T10:34:25ZYazar Erbschloe, Michael, 1951-<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781555583279">http://www.sciencedirect.com/science/book/9781555583279</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Implementing database security and auditing a guide for DBAs, information security administrators and auditorsent://SD_ILS/0/SD_ILS:2538602025-12-07T10:34:25Z2025-12-07T10:34:25ZYazar Ben-Natan, Ron.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781555583347">http://www.sciencedirect.com/science/book/9781555583347</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Business continuity and disaster recovery for infosec managersent://SD_ILS/0/SD_ILS:2538622025-12-07T10:34:25Z2025-12-07T10:34:25ZYazar Rittinghouse, John W. Ransome, James F.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781555583392">http://www.sciencedirect.com/science/book/9781555583392</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Sockets, shellcode, porting & coding reverse engineering exploits and tool coding for security professionalsent://SD_ILS/0/SD_ILS:2539382025-12-07T10:34:25Z2025-12-07T10:34:25ZYazar Foster, James C. Price, Mike (Mike Morgan) McClure, Stuart.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490054">http://www.sciencedirect.com/science/book/9781597490054</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Host integrity monitoring using Osiris and Samhainent://SD_ILS/0/SD_ILS:2539402025-12-07T10:34:25Z2025-12-07T10:34:25ZYazar Wotring, Brian. Potter, Bruce. Ranum, Marcus J.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490184">http://www.sciencedirect.com/science/book/9781597490184</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Nessus, Snort, & Ethereal power tools customizing open source security applicationsent://SD_ILS/0/SD_ILS:2539422025-12-07T10:34:25Z2025-12-07T10:34:25ZYazar Archibald, Neil. Ramirez, Gilbert, 1972- Rathaus, Noam. Syngress Media, Inc.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490207">http://www.sciencedirect.com/science/book/9781597490207</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Configuring Check Point NGX VPN-1/fire wall-ent://SD_ILS/0/SD_ILS:2539432025-12-07T10:34:25Z2025-12-07T10:34:25ZYazar Stephens, Robert. Stiefel, Barry J. Watkins, Stephen (Information security professional)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490313">http://www.sciencedirect.com/science/book/9781597490313</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Network security evaluation using the NSA IEMent://SD_ILS/0/SD_ILS:2539452025-12-07T10:34:25Z2025-12-07T10:34:25ZYazar Rogers, Russ. Cunningham, Bryan.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490351">http://www.sciencedirect.com/science/book/9781597490351</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Configuring NetScreen firewallsent://SD_ILS/0/SD_ILS:2540162025-12-07T10:34:25Z2025-12-07T10:34:25ZYazar Cameron, Rob.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781932266399">http://www.sciencedirect.com/science/book/9781932266399</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Intrusion prevention and active response deploying network and host IPSent://SD_ILS/0/SD_ILS:2540172025-12-07T10:34:25Z2025-12-07T10:34:25ZYazar Rash, Michael (Michael Brandon)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781932266474">http://www.sciencedirect.com/science/book/9781932266474</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Buffer overflow attacks detect, exploit, preventent://SD_ILS/0/SD_ILS:2540232025-12-07T10:34:25Z2025-12-07T10:34:25ZYazar Foster, James C.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781932266672">http://www.sciencedirect.com/science/book/9781932266672</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Black Hat physical device security exploiting hardware and softwareent://SD_ILS/0/SD_ILS:2540252025-12-07T10:34:25Z2025-12-07T10:34:25ZYazar Miller, Drew, 1978-<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781932266818">http://www.sciencedirect.com/science/book/9781932266818</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Trusted Computingent://SD_ILS/0/SD_ILS:2478712025-12-07T10:34:25Z2025-12-07T10:34:25ZYazar Mitchell, Chris, ed.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1049/PBPC006E">http://dx.doi.org/10.1049/PBPC006E</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Acing the security+ certification exament://SD_ILS/0/SD_ILS:3134922025-12-07T10:34:25Z2025-12-07T10:34:25ZYazar Regan, Patrick E.<br/>Yer Numarası QA76.3 R455 2005<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>Error correcting coding and security for data networks analysis of the superchannel conceptent://SD_ILS/0/SD_ILS:3011472025-12-07T10:34:25Z2025-12-07T10:34:25ZYazar Kabatiansky, G. Krouk, E. Semenov, S. John Wiley & Sons.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim John Wiley <a href="http://dx.doi.org/10.1002/0470867574">http://dx.doi.org/10.1002/0470867574</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Cryptography, information theory, and error-correction a handbook for the 21st centuryent://SD_ILS/0/SD_ILS:3018602025-12-07T10:34:25Z2025-12-07T10:34:25ZYazar Bruen, Aiden A., 1941- Forcinito, Mario, 1962- Wiley InterScience (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim Wiley InterScience <a href="http://dx.doi.org/10.1002/9781118033296">An electronic book accessible through the World Wide Web; click for information</a>
Contributor biographical information <a href="http://catdir.loc.gov/catdir/enhancements/fy0618/2004058044-b.html">http://catdir.loc.gov/catdir/enhancements/fy0618/2004058044-b.html</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>TCP / IP ve ağ güvenliği : teori ve uygulamalar ileent://SD_ILS/0/SD_ILS:1128132025-12-07T10:34:25Z2025-12-07T10:34:25ZYazar Dirican, Can Okan.<br/>Yer Numarası TK 5105.55 D5753 2005<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~2<br/>Beginning cryptography with Javaent://SD_ILS/0/SD_ILS:1442032025-12-07T10:34:25Z2025-12-07T10:34:25ZYazar Hook, David, 1962-<br/>Yer Numarası ONLINE<br/>Elektronik Erişim EBSCOhost <a href="http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=142234">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=142234</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Information security and ethics social and organizational issuesent://SD_ILS/0/SD_ILS:1529662025-12-07T10:34:25Z2025-12-07T10:34:25ZYazar Quigley, Marian.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim EBSCOhost <a href="http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=108396">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=108396</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Advances in Elliptic Curve Cryptographyent://SD_ILS/0/SD_ILS:2360582025-12-07T10:34:25Z2025-12-07T10:34:25ZYazar Blake, Ian F.. Seroussi, Gadiel. Smart, Nigel P..<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1017/CBO9780511546570">Access by subscription</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Assessing and managing security risk in IT systems : a structured methodologyent://SD_ILS/0/SD_ILS:5422502025-12-07T10:34:25Z2025-12-07T10:34:25ZYazar McCumber, John, 1956, author.<br/>Yer Numarası QA76.9 .A25 M4284 2005<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9781135488970">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>Distributed sensor networksent://SD_ILS/0/SD_ILS:5428022025-12-07T10:34:25Z2025-12-07T10:34:25ZYazar Iyengar, S. S. (Sundararaja S.) Brooks, R. R. (Richard R.)<br/>Yer Numarası TK7872 .D48 D57 2005<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9781439870785">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>Disruptive security technologies with mobile code and peer-to-peer networksent://SD_ILS/0/SD_ILS:5456512025-12-07T10:34:25Z2025-12-07T10:34:25ZYazar Brooks, R. R. (Richard R.), author.<br/>Yer Numarası TK5105.525 .B76 2004<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9781420038880">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>Codes : the guide to secrecy from ancient to modern timesent://SD_ILS/0/SD_ILS:5460622025-12-07T10:34:25Z2025-12-07T10:34:25ZYazar Mollin, Richard A., 1947, author.<br/>Yer Numarası QA76.9 .A25 M67 2005<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9781420035087">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>Database and applications security : integrating information security and data managementent://SD_ILS/0/SD_ILS:5402202025-12-07T10:34:25Z2025-12-07T10:34:25ZYazar Thuraisingham, Bhavani M., author.<br/>Yer Numarası QA76.9 .D314 T47 2005<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9780203486061">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>Scalable and secure internet services and architectureent://SD_ILS/0/SD_ILS:5450702025-12-07T10:34:25Z2025-12-07T10:34:25ZYazar Xu, Chengzhong., author.<br/>Yer Numarası TK5105.875 .I57 X8 2005<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9781420035209">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>Information security fundamentalsent://SD_ILS/0/SD_ILS:5452262025-12-07T10:34:25Z2025-12-07T10:34:25ZYazar Peltier, Thomas R., author. Peltier, Justin. Blackley, John A.<br/>Yer Numarası QA76.9 .A25 P427 2005<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9781135493738">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>A practical guide to security assessmentsent://SD_ILS/0/SD_ILS:5452772025-12-07T10:34:25Z2025-12-07T10:34:25ZYazar Kairab, Sudhanshu., author.<br/>Yer Numarası HF5548.32 .K345 2005<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9781135500313">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>Building a global information assurance programent://SD_ILS/0/SD_ILS:5433572025-12-07T10:34:25Z2025-12-07T10:34:25ZYazar Curts, Raymond J., author. Campbell, Douglas E., 1954- author.<br/>Yer Numarası QA76.9 .A25<br/>Elektronik Erişim Taylor & Francis <a href="https://www.taylorfrancis.com/books/9780429225215">https://www.taylorfrancis.com/books/9780429225215</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Curing the patch management headacheent://SD_ILS/0/SD_ILS:5438152025-12-07T10:34:25Z2025-12-07T10:34:25ZYazar Nicastro, Felicia M., author.<br/>Yer Numarası QA76.9 .A25 N526 2005<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9781420031294">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>Computers, Software Engineering, and Digital Devicesent://SD_ILS/0/SD_ILS:5424932025-12-07T10:34:25Z2025-12-07T10:34:25ZYazar Dorf, Richard C., author. Taylor and Francis.<br/>Yer Numarası TK7885<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9781420037050">Click here to view.</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>The ethical hack : a framework for business value penetration testingent://SD_ILS/0/SD_ILS:5462622025-12-07T10:34:25Z2025-12-07T10:34:25ZYazar Tiller, James S., author.<br/>Yer Numarası TK5105.59 .T55 2005<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9781135502485">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>Information security management handbook. Volume 2ent://SD_ILS/0/SD_ILS:5462902025-12-07T10:34:25Z2025-12-07T10:34:25ZYazar Tipton, Harold F. Krause, Micki.<br/>Yer Numarası QA76.9 .A25 I54 2005<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9781135484002">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>Financial investigation and forensic accountingent://SD_ILS/0/SD_ILS:5473902025-12-07T10:34:25Z2025-12-07T10:34:25ZYazar Manning, George A., author.<br/>Yer Numarası HV8079 .W47 M35 2005<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9781420039061">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>Information security risk analysisent://SD_ILS/0/SD_ILS:5448212025-12-07T10:34:25Z2025-12-07T10:34:25ZYazar Peltier, Thomas R., author.<br/>Yer Numarası QA76.9 .A25 P429 2005<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9781420031195">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>