Arama Sonuçları Computer Security - Daraltılmış: 2009
SirsiDynix Enterprise
https://katalog.hacettepe.edu.tr/client/tr_TR/default_tr/default_tr/qu$003dComputer$002bSecurity$0026qf$003dPUBDATE$002509Yay$0025C4$0025B1n$002bY$0025C4$0025B1l$0025C4$0025B1$0025092009$0025092009$0026ps$003d300?dt=list
2025-12-06T22:26:19Z
Computer and information security handbook
ent://SD_ILS/0/SD_ILS:148884
2025-12-06T22:26:19Z
2025-12-06T22:26:19Z
Yazar Vacca, John R.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780123743541">http://www.sciencedirect.com/science/book/9780123743541</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
A Guide to Computer Network Security
ent://SD_ILS/0/SD_ILS:175855
2025-12-06T22:26:19Z
2025-12-06T22:26:19Z
Yazar Kizza, Joseph Migga. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-1-84800-917-2">http://dx.doi.org/10.1007/978-1-84800-917-2</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Sequrity for computer networks : an introduction to data security in teleprocessing and electronic funds transfer
ent://SD_ILS/0/SD_ILS:62188
2025-12-06T22:26:19Z
2025-12-06T22:26:19Z
Yazar Davies, Donald Watts, 1924- Price, W. L., ort.yaz.<br/>Yer Numarası TK 5105 D43 1989<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>
Advances in Computer Science - ASIAN 2009. Information Security and Privacy 13th Asian Computing Science Conference, Seoul, Korea, December 14-16, 2009. Proceedings
ent://SD_ILS/0/SD_ILS:191425
2025-12-06T22:26:19Z
2025-12-06T22:26:19Z
Yazar Datta, Anupam. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-10622-4">http://dx.doi.org/10.1007/978-3-642-10622-4</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Computer Security – ESORICS 2009 14th European Symposium on Research in Computer Security, Saint-Malo, France, September 21-23, 2009. Proceedings
ent://SD_ILS/0/SD_ILS:190950
2025-12-06T22:26:19Z
2025-12-06T22:26:19Z
Yazar Backes, Michael. editor. Ning, Peng. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-04444-1">http://dx.doi.org/10.1007/978-3-642-04444-1</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Computer Safety, Reliability, and Security 28th International Conference, SAFECOMP 2009, Hamburg, Germany, September 15-18, 2009. Proceedings
ent://SD_ILS/0/SD_ILS:190960
2025-12-06T22:26:19Z
2025-12-06T22:26:19Z
Yazar Buth, Bettina. editor. Rabe, Gerd. editor. Seyfarth, Till. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-04468-7">http://dx.doi.org/10.1007/978-3-642-04468-7</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Advances in Information and Computer Security 4th International Workshop on Security, IWSEC 2009 Toyama, Japan, October 28-30, 2009 Proceedings
ent://SD_ILS/0/SD_ILS:191078
2025-12-06T22:26:19Z
2025-12-06T22:26:19Z
Yazar Takagi, Tsuyoshi. editor. Mambo, Masahiro. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-04846-3">http://dx.doi.org/10.1007/978-3-642-04846-3</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Information security management handbook
ent://SD_ILS/0/SD_ILS:539793
2025-12-06T22:26:19Z
2025-12-06T22:26:19Z
Yazar Tipton, Harold F. Nozaki, Micki Krause.<br/>Yer Numarası QA76.9 .A25 I54165 2007<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9781439893159">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>
Information security management handbook
ent://SD_ILS/0/SD_ILS:542831
2025-12-06T22:26:19Z
2025-12-06T22:26:19Z
Yazar Tipton, Harold F. Krause, Micki.<br/>Yer Numarası QA76.9 .A25 I54165 2003<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9781420003406">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>
Information security management handbook
ent://SD_ILS/0/SD_ILS:538782
2025-12-06T22:26:19Z
2025-12-06T22:26:19Z
Yazar Tipton, Harold F. Nozaki, Micki Krause.<br/>Yer Numarası QA76.9 .A25 I54165<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9781439853467">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>
SAP security configuration and deployment the IT administrator's guide to best practices
ent://SD_ILS/0/SD_ILS:148994
2025-12-06T22:26:19Z
2025-12-06T22:26:19Z
Yazar Wun-Young, Leslie. Hirao, Joey.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492843">http://www.sciencedirect.com/science/book/9781597492843</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Information security governance a practical development and implementation approach
ent://SD_ILS/0/SD_ILS:297743
2025-12-06T22:26:19Z
2025-12-06T22:26:19Z
Yazar Brotby, W. Krag.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim Ebook Library <a href="http://public.eblib.com/EBLPublic/PublicView.do?ptiID=433807">http://public.eblib.com/EBLPublic/PublicView.do?ptiID=433807</a>
John Wiley <a href="http://dx.doi.org/10.1002/9780470476017">http://dx.doi.org/10.1002/9780470476017</a>
<a href="http://site.ebrary.com/lib/alltitles/Doc?id=10313652">http://site.ebrary.com/lib/alltitles/Doc?id=10313652</a>
<a href="http://swb.eblib.com/patron/FullRecord.aspx?p=433807">http://swb.eblib.com/patron/FullRecord.aspx?p=433807</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Security risk management body of knowledge
ent://SD_ILS/0/SD_ILS:297759
2025-12-06T22:26:19Z
2025-12-06T22:26:19Z
Yazar Talbot, Julian. Jakeman, Miles Gareth. Wiley InterScience (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim John Wiley <a href="http://dx.doi.org/10.1002/9780470494974">http://dx.doi.org/10.1002/9780470494974</a>
Books24x7 <a href="http://www.books24x7.com/marc.asp?bookid=43285">http://www.books24x7.com/marc.asp?bookid=43285</a>
MyiLibrary, Table of contents <a href="http://www.myilibrary.com?id=230340&ref=toc">http://www.myilibrary.com?id=230340&ref=toc</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Applied algebra : codes, ciphers, and discrete algorithms
ent://SD_ILS/0/SD_ILS:312768
2025-12-06T22:26:19Z
2025-12-06T22:26:19Z
Yazar Hardy, Darel W. Walker, Carol L., 1935- Richman, Fred, 1938-<br/>Yer Numarası QA268 H37 2009<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>
Digital fortress
ent://SD_ILS/0/SD_ILS:354167
2025-12-06T22:26:19Z
2025-12-06T22:26:19Z
Yazar Brown, Dan, 1964- .<br/>Yer Numarası PS3552.R685434 D53 2009<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>
SIP security
ent://SD_ILS/0/SD_ILS:297791
2025-12-06T22:26:19Z
2025-12-06T22:26:19Z
Yazar Sisalem, Dorgham. Wiley InterScience (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://onlinelibrary.wiley.com/book/10.1002/9780470516997">http://onlinelibrary.wiley.com/book/10.1002/9780470516997</a>
John Wiley <a href="http://dx.doi.org/10.1002/9780470516997">http://dx.doi.org/10.1002/9780470516997</a>
<a href="http://site.ebrary.com/lib/alltitles/Doc?id=10298102">http://site.ebrary.com/lib/alltitles/Doc?id=10298102</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Information warfare
ent://SD_ILS/0/SD_ILS:304069
2025-12-06T22:26:19Z
2025-12-06T22:26:19Z
Yazar Ventre, Daniel.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim John Wiley <a href="http://dx.doi.org/10.1002/9781118381533">http://dx.doi.org/10.1002/9781118381533</a>
<a href="http://lib.myilibrary.com?id=477736">http://lib.myilibrary.com?id=477736</a>
OverDrive (PDF) <a href="http://www.contentreserve.com/TitleInfo.asp?ID={02D73229-3728-4EE5-942B-28D4B82AED18}&Format=50">http://www.contentreserve.com/TitleInfo.asp?ID={02D73229-3728-4EE5-942B-28D4B82AED18}&Format=50</a>
OverDrive (EPUB) <a href="http://www.contentreserve.com/TitleInfo.asp?ID={02D73229-3728-4EE5-942B-28D4B82AED18}&Format=410">http://www.contentreserve.com/TitleInfo.asp?ID={02D73229-3728-4EE5-942B-28D4B82AED18}&Format=410</a>
OverDrive (READ) <a href="http://www.contentreserve.com/TitleInfo.asp?ID={02D73229-3728-4EE5-942B-28D4B82AED18}&Format=610">http://www.contentreserve.com/TitleInfo.asp?ID={02D73229-3728-4EE5-942B-28D4B82AED18}&Format=610</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Computer forensics and cyber crime : an introduction
ent://SD_ILS/0/SD_ILS:134036
2025-12-06T22:26:19Z
2025-12-06T22:26:19Z
Yazar Britz, Marjie.<br/>Yer Numarası QA76.9.A25 B77 2009<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>
Cloud security and privacy
ent://SD_ILS/0/SD_ILS:144722
2025-12-06T22:26:19Z
2025-12-06T22:26:19Z
Yazar Mather, Tim. Kumaraswamy, Subra. Latif, Shahed.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim EBSCOhost <a href="http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=414816">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=414816</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Disappearing cryptography information hiding : steganography & watermarking
ent://SD_ILS/0/SD_ILS:146450
2025-12-06T22:26:19Z
2025-12-06T22:26:19Z
Yazar Wayner, Peter, 1964-<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780123744791">http://www.sciencedirect.com/science/book/9780123744791</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Eleventh hour security+ exam SYO-201 study guide
ent://SD_ILS/0/SD_ILS:146534
2025-12-06T22:26:19Z
2025-12-06T22:26:19Z
Yazar Dubrawsky, Ido.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597494274">http://www.sciencedirect.com/science/book/9781597494274</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Virtualization for security including sandboxing, disaster recovery, high availability, forensic analysis, and honeypotting
ent://SD_ILS/0/SD_ILS:146775
2025-12-06T22:26:19Z
2025-12-06T22:26:19Z
Yazar Hoopes, John.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597493055">http://www.sciencedirect.com/science/book/9781597493055</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
GFI network security and PCI compliance power tools
ent://SD_ILS/0/SD_ILS:148143
2025-12-06T22:26:19Z
2025-12-06T22:26:19Z
Yazar Posey, Brien. Thompson, Troy.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492850">http://www.sciencedirect.com/science/book/9781597492850</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Nokia firewall, VPN, and IPSO configuration guide
ent://SD_ILS/0/SD_ILS:146197
2025-12-06T22:26:19Z
2025-12-06T22:26:19Z
Yazar Hay, Andrew, 1973- Giannoulis, Peter. Hay, Keli.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492867">http://www.sciencedirect.com/science/book/9781597492867</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Next generation SSH2 implementation securing data in motion
ent://SD_ILS/0/SD_ILS:146275
2025-12-06T22:26:19Z
2025-12-06T22:26:19Z
Yazar Liu, Dale.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492836">http://www.sciencedirect.com/science/book/9781597492836</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
SQL injection attacks and defense
ent://SD_ILS/0/SD_ILS:148576
2025-12-06T22:26:19Z
2025-12-06T22:26:19Z
Yazar Clarke, Justin.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597494243">http://www.sciencedirect.com/science/book/9781597494243</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Cisco router and switch forensics investigating and analyzing malicious network activity
ent://SD_ILS/0/SD_ILS:148703
2025-12-06T22:26:19Z
2025-12-06T22:26:19Z
Yazar Liu, Dale.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597494182">http://www.sciencedirect.com/science/book/9781597494182</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Contemporary ergonomics 2009
ent://SD_ILS/0/SD_ILS:542236
2025-12-06T22:26:19Z
2025-12-06T22:26:19Z
Yazar Bust, Philip D. Ergonomics Society (Great Britain). Conference (60th : 2009 : London, UK)<br/>Yer Numarası TA166 .C66 2009<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9781135212612">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>
Security software development : assessing and managing security risks
ent://SD_ILS/0/SD_ILS:543836
2025-12-06T22:26:19Z
2025-12-06T22:26:19Z
Yazar Ashbaugh, Douglas A., author.<br/>Yer Numarası QA76.9 .A25 A8246 2009<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9781420063813">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>
Data protection : governance, risk management, and compliance
ent://SD_ILS/0/SD_ILS:543918
2025-12-06T22:26:19Z
2025-12-06T22:26:19Z
Yazar Hill, David G. (David Gary), 1943, author.<br/>Yer Numarası QA76.9 .A25 H52 2009<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9781439806937">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>
Architecting secure software systems
ent://SD_ILS/0/SD_ILS:538962
2025-12-06T22:26:19Z
2025-12-06T22:26:19Z
Yazar Talukder, Asoke K., author. Chaitanya, Manish.<br/>Yer Numarası QA76.9 .A25 T34 2009<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9781420087857">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>
Cyber fraud : tactics, techniques, and procedures
ent://SD_ILS/0/SD_ILS:540157
2025-12-06T22:26:19Z
2025-12-06T22:26:19Z
Yazar Graham, James. Howard, Rick.<br/>Yer Numarası HV6773 .H69 2009<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9781420091281">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>
Human-computer interaction. Design issues, solutions, and applications
ent://SD_ILS/0/SD_ILS:541058
2025-12-06T22:26:19Z
2025-12-06T22:26:19Z
Yazar Sears, Andrew. Jacko, Julie A.<br/>Yer Numarası QA76.9 .H85 H8564 2009<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9781420088861">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>
CISO soft skills : securing organizations impaired by employee politics, apathy, and intolerant perspectives
ent://SD_ILS/0/SD_ILS:544153
2025-12-06T22:26:19Z
2025-12-06T22:26:19Z
Yazar Collette, Ronald D., author. Gentile, Michael. Gentile, Skye.<br/>Yer Numarası HF5548.37 .G462 2009<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9781420089110">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>
Security in an IPv6 environment
ent://SD_ILS/0/SD_ILS:546853
2025-12-06T22:26:19Z
2025-12-06T22:26:19Z
Yazar Minoli, Daniel, 1952, author. Kouns, Jake.<br/>Yer Numarası TK5105.59 .M56 2009<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9781420092301">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>
Information security management handbook
ent://SD_ILS/0/SD_ILS:546827
2025-12-06T22:26:19Z
2025-12-06T22:26:19Z
Yazar Tipton, Harold F. Krause, Micki.<br/>Yer Numarası QA76.9 .A25 I54165 2007<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9781420090956">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>
Profiling hackers : the science of criminal profiling as applied to the world of hacking
ent://SD_ILS/0/SD_ILS:545973
2025-12-06T22:26:19Z
2025-12-06T22:26:19Z
Yazar Chiesa, Raoul, 1973, author. Ducci, Stefania. Ciappi, Silvio, 1965-<br/>Yer Numarası HV6773 .C477 2009<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9781420086942">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>
Information security management metrics : a definitive guide to effective security monitoring and measurement
ent://SD_ILS/0/SD_ILS:546952
2025-12-06T22:26:19Z
2025-12-06T22:26:19Z
Yazar Brotby, W. Krag., author.<br/>Yer Numarası HD30.2 .B78 2009<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9781420052862">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>