Arama Sonuçları Computer Security - Daraltılmış: 2010
SirsiDynix Enterprise
https://katalog.hacettepe.edu.tr/client/tr_TR/default_tr/default_tr/qu$003dComputer$002bSecurity$0026qf$003dPUBDATE$002509Yay$0025C4$0025B1n$002bY$0025C4$0025B1l$0025C4$0025B1$0025092010$0025092010$0026ic$003dtrue$0026ps$003d300?dt=list
2025-12-06T22:24:59Z
Elements of Computer Security
ent://SD_ILS/0/SD_ILS:168393
2025-12-06T22:24:59Z
2025-12-06T22:24:59Z
Yazar Salomon, David. author. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-0-85729-006-9">http://dx.doi.org/10.1007/978-0-85729-006-9</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Sequrity for computer networks : an introduction to data security in teleprocessing and electronic funds transfer
ent://SD_ILS/0/SD_ILS:62188
2025-12-06T22:24:59Z
2025-12-06T22:24:59Z
Yazar Davies, Donald Watts, 1924- Price, W. L., ort.yaz.<br/>Yer Numarası TK 5105 D43 1989<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>
Computer Security – ESORICS 2010 15th European Symposium on Research in Computer Security, Athens, Greece, September 20-22, 2010. Proceedings
ent://SD_ILS/0/SD_ILS:192988
2025-12-06T22:24:59Z
2025-12-06T22:24:59Z
Yazar Gritzalis, Dimitris. editor. Preneel, Bart. editor. Theoharidou, Marianthi. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-15497-3">http://dx.doi.org/10.1007/978-3-642-15497-3</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Computer Safety, Reliability, and Security 29th International Conference, SAFECOMP 2010, Vienna, Austria, September 14-17, 2010. Proceedings
ent://SD_ILS/0/SD_ILS:193040
2025-12-06T22:24:59Z
2025-12-06T22:24:59Z
Yazar Schoitsch, Erwin. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-15651-9">http://dx.doi.org/10.1007/978-3-642-15651-9</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Computer Network Security 5th International Conference on Mathematical Methods, Models and Architectures for Computer Network Security, MMM-ACNS 2010, St. Petersburg, Russia, September 8-10, 2010. Proceedings
ent://SD_ILS/0/SD_ILS:192743
2025-12-06T22:24:59Z
2025-12-06T22:24:59Z
Yazar Kotenko, Igor. editor. Skormin, Victor. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-14706-7">http://dx.doi.org/10.1007/978-3-642-14706-7</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Advances in Information and Computer Security 5th International Workshop on Security, IWSEC 2010, Kobe, Japan, November 22-24, 2010. Proceedings
ent://SD_ILS/0/SD_ILS:193422
2025-12-06T22:24:59Z
2025-12-06T22:24:59Z
Yazar Echizen, Isao. editor. Kunihiro, Noboru. editor. Sasaki, Ryoichi. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-16825-3">http://dx.doi.org/10.1007/978-3-642-16825-3</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Information security management handbook
ent://SD_ILS/0/SD_ILS:539793
2025-12-06T22:24:59Z
2025-12-06T22:24:59Z
Yazar Tipton, Harold F. Nozaki, Micki Krause.<br/>Yer Numarası QA76.9 .A25 I54165 2007<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9781439893159">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>
Information security management handbook
ent://SD_ILS/0/SD_ILS:542831
2025-12-06T22:24:59Z
2025-12-06T22:24:59Z
Yazar Tipton, Harold F. Krause, Micki.<br/>Yer Numarası QA76.9 .A25 I54165 2003<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9781420003406">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>
Information security management handbook
ent://SD_ILS/0/SD_ILS:538782
2025-12-06T22:24:59Z
2025-12-06T22:24:59Z
Yazar Tipton, Harold F. Nozaki, Micki Krause.<br/>Yer Numarası QA76.9 .A25 I54165<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9781439853467">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>
Dijital kale
ent://SD_ILS/0/SD_ILS:126135
2025-12-06T22:24:59Z
2025-12-06T22:24:59Z
Yazar Brown, Dan, 1964- Soner, Sezer.<br/>Yer Numarası PS 3552.R685434 D542 2010<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>
Seven deadliest Microsoft attacks
ent://SD_ILS/0/SD_ILS:149018
2025-12-06T22:24:59Z
2025-12-06T22:24:59Z
Yazar Kraus, Rob.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495516">http://www.sciencedirect.com/science/book/9781597495516</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Seven deadliest wireless technologies attacks
ent://SD_ILS/0/SD_ILS:149033
2025-12-06T22:24:59Z
2025-12-06T22:24:59Z
Yazar Haines, Brad.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495417">http://www.sciencedirect.com/science/book/9781597495417</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Seven deadliest network attacks
ent://SD_ILS/0/SD_ILS:149185
2025-12-06T22:24:59Z
2025-12-06T22:24:59Z
Yazar Prowell, Stacy J. Kraus, Rob. Borkin, Mike.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495493">http://www.sciencedirect.com/science/book/9781597495493</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
China's cyberwarfare capability
ent://SD_ILS/0/SD_ILS:281481
2025-12-06T22:24:59Z
2025-12-06T22:24:59Z
Yazar Marvel, Elisabette M.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim EBSCOhost <a href="http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=581824">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=581824</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Information technology risk management in enterprise environments a review of industry practices and a practical guide to risk management teams
ent://SD_ILS/0/SD_ILS:297862
2025-12-06T22:24:59Z
2025-12-06T22:24:59Z
Yazar Kouns, Jake. Minoli, Daniel, 1952- Wiley InterScience (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim John Wiley <a href="http://dx.doi.org/10.1002/9780470558133">http://dx.doi.org/10.1002/9780470558133</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Hashing in computer science fifty years of slicing and dicing
ent://SD_ILS/0/SD_ILS:298025
2025-12-06T22:24:59Z
2025-12-06T22:24:59Z
Yazar Konheim, Alan G., 1934-<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://proquest.safaribooksonline.com/?fpi=9781118031834">Available by subscription from Safari Books Online</a>
John Wiley <a href="http://dx.doi.org/10.1002/9780470630617">http://dx.doi.org/10.1002/9780470630617</a>
Contributor biographical information <a href="http://catdir.loc.gov/catdir/enhancements/fy1106/2009052123-b.html">http://catdir.loc.gov/catdir/enhancements/fy1106/2009052123-b.html</a>
Volltext <a href="http://proquest.tech.safaribooksonline.de/9781118031834">http://proquest.tech.safaribooksonline.de/9781118031834</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Mac security bible
ent://SD_ILS/0/SD_ILS:303881
2025-12-06T22:24:59Z
2025-12-06T22:24:59Z
Yazar Kissell, Joe.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim Wiley InterScience <a href="http://dx.doi.org/10.1002/9781118257739">An electronic book accessible through the World Wide Web; click for information</a>
Safari Books Online <a href="http://proquest.safaribooksonline.com/640">http://proquest.safaribooksonline.com/640</a> <a href="http://proquest.safaribooksonline.com/?fpi=9780470474198">http://proquest.safaribooksonline.com/?fpi=9780470474198</a>
Safari Books Online <a href="http://proquest.safaribooksonline.com/9780470474198">http://proquest.safaribooksonline.com/9780470474198</a>
Books24x7 <a href="http://www.books24x7.com/marc.asp?bookid=40737">http://www.books24x7.com/marc.asp?bookid=40737</a>
<a href="http://site.ebrary.com/lib/alltitles/Doc?id=10358774">http://site.ebrary.com/lib/alltitles/Doc?id=10358774</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Seven deadliest USB attacks
ent://SD_ILS/0/SD_ILS:306328
2025-12-06T22:24:59Z
2025-12-06T22:24:59Z
Yazar Anderson, Brian (Brian James)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495530">http://www.sciencedirect.com/science/book/9781597495530</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Network Security A Decision and Game-Theoretic Approach
ent://SD_ILS/0/SD_ILS:237887
2025-12-06T22:24:59Z
2025-12-06T22:24:59Z
Yazar Alpcan, Tansu. Başar, Tamer.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1017/CBO9780511760778">Access by subscription</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Cognitive Radio Networking and Security A Game-Theoretic View
ent://SD_ILS/0/SD_ILS:238948
2025-12-06T22:24:59Z
2025-12-06T22:24:59Z
Yazar Liu, K. J. Ray. Wang, Beibei.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1017/CBO9780511778773">Access by subscription</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Security 2020 reduce security risks this decade
ent://SD_ILS/0/SD_ILS:303839
2025-12-06T22:24:59Z
2025-12-06T22:24:59Z
Yazar Howard, Doug. Prince, Kevin. Wiley InterScience (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim Wiley InterScience <a href="http://dx.doi.org/10.1002/9781118255803">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
IT audit, control, and security
ent://SD_ILS/0/SD_ILS:304008
2025-12-06T22:24:59Z
2025-12-06T22:24:59Z
Yazar Moeller, Robert R.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim Wiley InterScience <a href="http://dx.doi.org/10.1002/9781118269138">An electronic book accessible through the World Wide Web; click for information</a>
Ebook Library <a href="http://public.eblib.com/EBLPublic/PublicView.do?ptiID=624573">http://public.eblib.com/EBLPublic/PublicView.do?ptiID=624573</a>
Books24x7 <a href="http://www.books24x7.com/marc.asp?bookid=40717">http://www.books24x7.com/marc.asp?bookid=40717</a>
<a href="http://site.ebrary.com/lib/alltitles/Doc?id=10469768">http://site.ebrary.com/lib/alltitles/Doc?id=10469768</a>
<a href="http://swb.eblib.com/patron/FullRecord.aspx?p=624573">http://swb.eblib.com/patron/FullRecord.aspx?p=624573</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Safety of computer architectures
ent://SD_ILS/0/SD_ILS:304132
2025-12-06T22:24:59Z
2025-12-06T22:24:59Z
Yazar Boulanger, Jean-Louis.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://lib.myilibrary.com?id=450000">Connect to MyiLibrary resource.</a>
Wiley <a href="http://onlinelibrary.wiley.com/book/10.1002/9781118600696">http://onlinelibrary.wiley.com/book/10.1002/9781118600696</a>
John Wiley <a href="http://dx.doi.org/10.1002/9781118600696">http://dx.doi.org/10.1002/9781118600696</a>
ebrary <a href="http://site.ebrary.com/id/10657623">http://site.ebrary.com/id/10657623</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Virtualization and forensics a digital forensic investigator's guide to virtual environments
ent://SD_ILS/0/SD_ILS:306330
2025-12-06T22:24:59Z
2025-12-06T22:24:59Z
Yazar Barrett, Diane. Kipper, Gregory.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495578">http://www.sciencedirect.com/science/book/9781597495578</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
The basics of hacking and penetration testing ethical hacking and penetration testing made easy
ent://SD_ILS/0/SD_ILS:145199
2025-12-06T22:24:59Z
2025-12-06T22:24:59Z
Yazar Engebretson, Pat (Patrick Henry), 1974-<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597496551">http://www.sciencedirect.com/science/book/9781597496551</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Eleventh hour network+ exam N10-004 study guide
ent://SD_ILS/0/SD_ILS:146455
2025-12-06T22:24:59Z
2025-12-06T22:24:59Z
Yazar Alpern, Naomi J. Shimonski, Robert.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597494281">http://www.sciencedirect.com/science/book/9781597494281</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Digital forensics for network, Internet, and cloud computing a forensic evidence guide for moving targets and data
ent://SD_ILS/0/SD_ILS:146482
2025-12-06T22:24:59Z
2025-12-06T22:24:59Z
Yazar Lillard, Terrence.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495370">http://www.sciencedirect.com/science/book/9781597495370</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Dissecting the hack the forb1dd3n network
ent://SD_ILS/0/SD_ILS:146585
2025-12-06T22:24:59Z
2025-12-06T22:24:59Z
Yazar Street, Jayson E. Street, Jayson E. Dissecting the hack.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495684">http://www.sciencedirect.com/science/book/9781597495684</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Virtualization and forensics a digital forensic investigator's guide to virtual environments
ent://SD_ILS/0/SD_ILS:146715
2025-12-06T22:24:59Z
2025-12-06T22:24:59Z
Yazar Barrett, Diane. Kipper, Gregory.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495578">http://www.sciencedirect.com/science/book/9781597495578</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Professional penetration testing creating and operating a formal hacking lab
ent://SD_ILS/0/SD_ILS:147348
2025-12-06T22:24:59Z
2025-12-06T22:24:59Z
Yazar Wilhelm, Thomas.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597494250">http://www.sciencedirect.com/science/book/9781597494250</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Security for Microsoft Windows System Administrators introduction to key information security concepts
ent://SD_ILS/0/SD_ILS:149122
2025-12-06T22:24:59Z
2025-12-06T22:24:59Z
Yazar Rountree, Derrick.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495943">http://www.sciencedirect.com/science/book/9781597495943</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Seven deadliest social network attacks
ent://SD_ILS/0/SD_ILS:149145
2025-12-06T22:24:59Z
2025-12-06T22:24:59Z
Yazar Timm, Carl. Perez, Richard, 1969 Oct. 17- Ely, Adam.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495455">http://www.sciencedirect.com/science/book/9781597495455</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Managed code rootkits hooking into runtime environments
ent://SD_ILS/0/SD_ILS:147836
2025-12-06T22:24:59Z
2025-12-06T22:24:59Z
Yazar Metula, Erez.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495745">http://www.sciencedirect.com/science/book/9781597495745</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
A guide to kernel exploitation attacking the core
ent://SD_ILS/0/SD_ILS:148059
2025-12-06T22:24:59Z
2025-12-06T22:24:59Z
Yazar Perla, Enrico. Massimiliano, Oldani.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597494861">http://www.sciencedirect.com/science/book/9781597494861</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
PCI compliance understand and implement effective PCI data security standard compliance.
ent://SD_ILS/0/SD_ILS:148342
2025-12-06T22:24:59Z
2025-12-06T22:24:59Z
Yazar Chuvakin, Anton. Williams, Branden R. Spangenberg, Ward.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597494991">http://www.sciencedirect.com/science/book/9781597494991</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
System assurance beyond detecting vulnerabilities
ent://SD_ILS/0/SD_ILS:148532
2025-12-06T22:24:59Z
2025-12-06T22:24:59Z
Yazar Mansourov, Nikolai. Campara, Djenana.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780123814142">http://www.sciencedirect.com/science/book/9780123814142</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Seven deadliest USB attacks
ent://SD_ILS/0/SD_ILS:148953
2025-12-06T22:24:59Z
2025-12-06T22:24:59Z
Yazar Anderson, Brian (Brian James)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495530">http://www.sciencedirect.com/science/book/9781597495530</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Seven deadliest web application attacks
ent://SD_ILS/0/SD_ILS:149103
2025-12-06T22:24:59Z
2025-12-06T22:24:59Z
Yazar Shema, Mike.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495431">http://www.sciencedirect.com/science/book/9781597495431</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Risk analysis and security countermeasure selection
ent://SD_ILS/0/SD_ILS:539402
2025-12-06T22:24:59Z
2025-12-06T22:24:59Z
Yazar Norman, Thomas L., author.<br/>Yer Numarası HV8290 .N67 2010<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9781420078718">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>
Information security risk analysis
ent://SD_ILS/0/SD_ILS:538713
2025-12-06T22:24:59Z
2025-12-06T22:24:59Z
Yazar Peltier, Thomas R., author.<br/>Yer Numarası QA76.9 .A25 P429 2010<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9781439839577">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>
Official (ISC)2 guide to the CISSP CBK
ent://SD_ILS/0/SD_ILS:540690
2025-12-06T22:24:59Z
2025-12-06T22:24:59Z
Yazar Tipton, Harold F.<br/>Yer Numarası QA76.3 .T565 2010<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9781439809600">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>
Cryptanalysis of RSA and its variants
ent://SD_ILS/0/SD_ILS:542078
2025-12-06T22:24:59Z
2025-12-06T22:24:59Z
Yazar Hinek, M. Jason., author.<br/>Yer Numarası TK5102.94 .H56 2010<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9781420075199">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>
Handbook of financial cryptography and security
ent://SD_ILS/0/SD_ILS:542098
2025-12-06T22:24:59Z
2025-12-06T22:24:59Z
Yazar Rosenberg, Burton.<br/>Yer Numarası HG1710 .H34 2010<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9781420059823">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>
Secure and resilient software development
ent://SD_ILS/0/SD_ILS:545097
2025-12-06T22:24:59Z
2025-12-06T22:24:59Z
Yazar Merkow, Mark S., author. Raghavan, Lakshmikanth.<br/>Yer Numarası QA76.76 .D47 M466 2010<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9781439826973">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>
Managing an information security and privacy awareness and training program
ent://SD_ILS/0/SD_ILS:538947
2025-12-06T22:24:59Z
2025-12-06T22:24:59Z
Yazar Herold, Rebecca., author.<br/>Yer Numarası QA76.9 .A25 H46 2010<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9781439815465">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>
The executive MBA in information security
ent://SD_ILS/0/SD_ILS:539948
2025-12-06T22:24:59Z
2025-12-06T22:24:59Z
Yazar Trinckes, John J., author.<br/>Yer Numarası HF5548.37 .T75 2010<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9781439810088">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>
Information security management handbook. Volume 4
ent://SD_ILS/0/SD_ILS:540034
2025-12-06T22:24:59Z
2025-12-06T22:24:59Z
Yazar Tipton, Harold F. Krause, Micki.<br/>Yer Numarası QA76.9 .A25 I54 2010<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9781439819036">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>
Vulnerability management
ent://SD_ILS/0/SD_ILS:545698
2025-12-06T22:24:59Z
2025-12-06T22:24:59Z
Yazar Foreman, Park., author.<br/>Yer Numarası QA76.9 .A25 F656 2010<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9781439801512">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>