Arama Sonu&ccedil;lar&#305; Computer Security. - Daralt&#305;lm&#305;&#351;: Beytepe Genel Koleksiyon SirsiDynix Enterprise https://katalog.hacettepe.edu.tr/client/tr_TR/default_tr/default_tr/qu$003dComputer$002bSecurity.$0026qf$003dLOCATION$002509Shelf$002bLocation$0025091$00253ABEYTEPEGEN$002509Beytepe$002bGenel$002bKoleksiyon$002509$0026te$003dILS$0026ps$003d300?dt=list 2024-12-27T04:38:55Z Computer security handbook ent://SD_ILS/0/SD_ILS:10921 2024-12-27T04:38:55Z 2024-12-27T04:38:55Z Yazar&#160;Computer Security Research Group.<br/>Yer Numaras&#305;&#160;HF 5548.2 C58177 1973<br/>Format:&#160;Kitap<br/>Durum&#160;Beytepe K&uuml;t&uuml;phanesi~1<br/> Computer security fundamentals ent://SD_ILS/0/SD_ILS:108620 2024-12-27T04:38:55Z 2024-12-27T04:38:55Z Yazar&#160;Easttom, Chuck.<br/>Yer Numaras&#305;&#160;QA76.9.A25 E325 2006<br/>Format:&#160;Kitap<br/>Durum&#160;Beytepe K&uuml;t&uuml;phanesi~1<br/> Computer security sourcebook ent://SD_ILS/0/SD_ILS:94615 2024-12-27T04:38:55Z 2024-12-27T04:38:55Z Yazar&#160;Caldwell, Wilma, ed.<br/>Yer Numaras&#305;&#160;QA 76.9.A25 C658 2003<br/>Format:&#160;Kitap<br/>Durum&#160;Beytepe K&uuml;t&uuml;phanesi~1<br/> Computer security basic ent://SD_ILS/0/SD_ILS:41083 2024-12-27T04:38:55Z 2024-12-27T04:38:55Z Yazar&#160;Russell, Deborah.&#160;Gangemi, G. T., ort. yaz.<br/>Yer Numaras&#305;&#160;QA 76.9.A25 R87 1991<br/>Format:&#160;Kitap<br/>Durum&#160;Beytepe K&uuml;t&uuml;phanesi~1<br/> Computer security solutions ent://SD_ILS/0/SD_ILS:32336 2024-12-27T04:38:55Z 2024-12-27T04:38:55Z Yazar&#160;Hruska, Jan, 1957-&#160;Jackson, K. M., ort. yaz.<br/>Yer Numaras&#305;&#160;QA 76.76.C6 H78 1990<br/>Format:&#160;Kitap<br/>Durum&#160;Beytepe K&uuml;t&uuml;phanesi~1<br/> Practical computer network security ent://SD_ILS/0/SD_ILS:61567 2024-12-27T04:38:55Z 2024-12-27T04:38:55Z Yazar&#160;Hendry, Mike.<br/>Yer Numaras&#305;&#160;TK 5105.59 H46 1995<br/>Format:&#160;Kitap<br/>Durum&#160;Beytepe K&uuml;t&uuml;phanesi~1<br/> Computer security risk management ent://SD_ILS/0/SD_ILS:32379 2024-12-27T04:38:55Z 2024-12-27T04:38:55Z Yazar&#160;Palmer, Ian C.&#160;Potter, G. A., ort. yaz.<br/>Yer Numaras&#305;&#160;QA 76.9.A25 P182 1989<br/>Format:&#160;Kitap<br/>Durum&#160;Beytepe K&uuml;t&uuml;phanesi~1<br/> Computer security : principles and practice ent://SD_ILS/0/SD_ILS:313473 2024-12-27T04:38:55Z 2024-12-27T04:38:55Z Yazar&#160;Stallings, William.&#160;Brown, Lawrie<br/>Yer Numaras&#305;&#160;QA76.9 S73 2012<br/>Format:&#160;Kitap<br/>Durum&#160;Beytepe K&uuml;t&uuml;phanesi~1<br/> Computer security : art and science ent://SD_ILS/0/SD_ILS:314021 2024-12-27T04:38:55Z 2024-12-27T04:38:55Z Yazar&#160;Bishop, Matt (Matthew A.)<br/>Yer Numaras&#305;&#160;QA76.9.A25 B56 2003<br/>Format:&#160;Kitap<br/>Durum&#160;Beytepe K&uuml;t&uuml;phanesi~1<br/> A handbook of computer security ent://SD_ILS/0/SD_ILS:32378 2024-12-27T04:38:55Z 2024-12-27T04:38:55Z Yazar&#160;Hearnden, K., ed. by<br/>Yer Numaras&#305;&#160;QA 76.9.A25 H191 1990<br/>Format:&#160;Kitap<br/>Durum&#160;Beytepe K&uuml;t&uuml;phanesi~1<br/> Sequrity for computer networks : an introduction to data security in teleprocessing and electronic funds transfer ent://SD_ILS/0/SD_ILS:62188 2024-12-27T04:38:55Z 2024-12-27T04:38:55Z Yazar&#160;Davies, Donald Watts, 1924-&#160;Price, W. L., ort.yaz.<br/>Yer Numaras&#305;&#160;TK 5105 D43 1989<br/>Format:&#160;Kitap<br/>Durum&#160;Beytepe K&uuml;t&uuml;phanesi~1<br/> Computer architecture and security : fundamentals of designing secure computer systems ent://SD_ILS/0/SD_ILS:248865 2024-12-27T04:38:55Z 2024-12-27T04:38:55Z Yazar&#160;Wang, Shuangbao Paul.&#160;Ledley, Robert Steven.<br/>Yer Numaras&#305;&#160;QA76.9.A73 W36 2012<br/>Format:&#160;Kitap<br/>Durum&#160;Beytepe K&uuml;t&uuml;phanesi~1<br/> Enhanced methods in computer security, biometric and artificial intelligence systems ent://SD_ILS/0/SD_ILS:109864 2024-12-27T04:38:55Z 2024-12-27T04:38:55Z Yazar&#160;Pejas, Jerzy, 1954-, ed.&#160;Piegat, Andrzej, 1947-, ed.<br/>Yer Numaras&#305;&#160;QA76.9.A25 E545 2005<br/>Format:&#160;Kitap<br/>Durum&#160;Beytepe K&uuml;t&uuml;phanesi~1<br/> Hacking Interface ent://SD_ILS/0/SD_ILS:524308 2024-12-27T04:38:55Z 2024-12-27T04:38:55Z Yazar&#160;Elbahad&#305;r, Hamza.<br/>Yer Numaras&#305;&#160;QA76.9.A25 E43 2024<br/>Format:&#160;Kitap<br/>Durum&#160;Beytepe K&uuml;t&uuml;phanesi~1<br/> Kali Linux ent://SD_ILS/0/SD_ILS:524304 2024-12-27T04:38:55Z 2024-12-27T04:38:55Z Yazar&#160;Altunta&#351;, Abdulaziz.<br/>Yer Numaras&#305;&#160;QA76.9.A25 A48 2024<br/>Format:&#160;Kitap<br/>Durum&#160;Beytepe K&uuml;t&uuml;phanesi~1<br/> A&#287; ve yaz&#305;l&#305;m g&uuml;venli&#287;i ent://SD_ILS/0/SD_ILS:524301 2024-12-27T04:38:55Z 2024-12-27T04:38:55Z Yazar&#160;&Ccedil;ontar, Furkan.<br/>Yer Numaras&#305;&#160;TK5105.59 C66 2023<br/>Format:&#160;Kitap<br/>Durum&#160;Beytepe K&uuml;t&uuml;phanesi~1<br/> A&rsquo;dan Z&rsquo;ye siber g&uuml;venlik ent://SD_ILS/0/SD_ILS:524303 2024-12-27T04:38:55Z 2024-12-27T04:38:55Z Yazar&#160;Polat, A. Can.&#160;Karaka&#351;, Burak.<br/>Yer Numaras&#305;&#160;QA76.9 P65 2023<br/>Format:&#160;Kitap<br/>Durum&#160;Beytepe K&uuml;t&uuml;phanesi~1<br/> Dijital g&uuml;venlik : dijital ortamlarda g&uuml;venle var olmak ent://SD_ILS/0/SD_ILS:517179 2024-12-27T04:38:55Z 2024-12-27T04:38:55Z Yazar&#160;&Ouml;zer, Fatih.&#160;&#350;ahin, Yusuf Levent, edit&ouml;r<br/>Yer Numaras&#305;&#160;QA76.9.E74 O94 2022<br/>Format:&#160;Kitap<br/>Durum&#160;Beytepe K&uuml;t&uuml;phanesi~1<br/> Kendi siteni kendin koru ent://SD_ILS/0/SD_ILS:524306 2024-12-27T04:38:55Z 2024-12-27T04:38:55Z Yazar&#160;B&uuml;y&uuml;kg&ouml;ze, Selma.&#160;El, &Ccedil;a&#287;r&#305;.<br/>Yer Numaras&#305;&#160;TK5105.59 B898 2022<br/>Format:&#160;Kitap<br/>Durum&#160;Beytepe K&uuml;t&uuml;phanesi~1<br/> Elektronik harp ent://SD_ILS/0/SD_ILS:514348 2024-12-27T04:38:55Z 2024-12-27T04:38:55Z Yazar&#160;Pakfiliz, Ahmet G&uuml;ng&ouml;r.<br/>Yer Numaras&#305;&#160;UG485 P35 2021<br/>Format:&#160;Kitap<br/>Durum&#160;Beytepe K&uuml;t&uuml;phanesi~1<br/> A&#287; y&ouml;netimi ve bilgi g&uuml;venli&#287;i ent://SD_ILS/0/SD_ILS:516275 2024-12-27T04:38:55Z 2024-12-27T04:38:55Z Yazar&#160;Bilge, Alper.&#160;Ka&ccedil;maz, Emre.<br/>Yer Numaras&#305;&#160;TK5105.59 A98 2021<br/>Format:&#160;Kitap<br/>Durum&#160;Beytepe K&uuml;t&uuml;phanesi~1<br/> Uygulamalarla siber g&uuml;venli&#287;e giri&#351; ent://SD_ILS/0/SD_ILS:510151 2024-12-27T04:38:55Z 2024-12-27T04:38:55Z Yazar&#160;Aky&#305;ld&#305;z, M. Alparslan.<br/>Yer Numaras&#305;&#160;TK5105.59.A39 U94 2020<br/>Format:&#160;Kitap<br/>Durum&#160;Beytepe K&uuml;t&uuml;phanesi~2<br/> T&uuml;rkiye&rsquo;de ve d&uuml;nyada siber g&uuml;venlik ent://SD_ILS/0/SD_ILS:514958 2024-12-27T04:38:55Z 2024-12-27T04:38:55Z Yazar&#160;&Ccedil;elikta&#351;, Bar&#305;&#351; .<br/>Yer Numaras&#305;&#160;UG485 C45 2020<br/>Format:&#160;Kitap<br/>Durum&#160;Beytepe K&uuml;t&uuml;phanesi~1<br/> Yeni ba&#351;layanlar i&ccedil;in bilgi g&uuml;venli&#287;i ve uygulamal&#305; hacking y&ouml;ntemleri ent://SD_ILS/0/SD_ILS:423184 2024-12-27T04:38:55Z 2024-12-27T04:38:55Z Yazar&#160;Aslanbakan, Enes, yazar<br/>Yer Numaras&#305;&#160;QA76.9.A25 A75 2019<br/>Format:&#160;Kitap<br/>Durum&#160;Beytepe K&uuml;t&uuml;phanesi~1<br/> Ethical hacking : (hacking kursu) ent://SD_ILS/0/SD_ILS:423950 2024-12-27T04:38:55Z 2024-12-27T04:38:55Z Yazar&#160;Usta, G&ouml;khan.<br/>Yer Numaras&#305;&#160;QA76.9.A25 U88 2019<br/>Format:&#160;Kitap<br/>Durum&#160;Beytepe K&uuml;t&uuml;phanesi~1<br/> Siber g&uuml;venlik ve savunma : standartlar ve uygulamalar ent://SD_ILS/0/SD_ILS:462283 2024-12-27T04:38:55Z 2024-12-27T04:38:55Z Yazar&#160;Sa&#287;&#305;ro&#287;lu, &#350;eref.<br/>Yer Numaras&#305;&#160;TK5105.59 S53 2019<br/>Format:&#160;Kitap<br/>Durum&#160;Beytepe K&uuml;t&uuml;phanesi~2<br/> Exploit geli&#351;tirme 101 ent://SD_ILS/0/SD_ILS:389077 2024-12-27T04:38:55Z 2024-12-27T04:38:55Z Yazar&#160;Aky&#305;ld&#305;z, M. Alparslan.<br/>Yer Numaras&#305;&#160;QA76.9.A25 A59 2018<br/>Format:&#160;Kitap<br/>Durum&#160;Beytepe K&uuml;t&uuml;phanesi~2<br/> Java programlama diliyle kriptoloji uygulamalar&#305; ent://SD_ILS/0/SD_ILS:380319 2024-12-27T04:38:55Z 2024-12-27T04:38:55Z Yazar&#160;Bodur, H&uuml;seyin<br/>Yer Numaras&#305;&#160;QA76.9.A25 B63 2016<br/>Format:&#160;Kitap<br/>Durum&#160;Beytepe K&uuml;t&uuml;phanesi~1<br/> Ethical hacking : offensive &amp; defensive ent://SD_ILS/0/SD_ILS:513450 2024-12-27T04:38:55Z 2024-12-27T04:38:55Z Yazar&#160;&Ccedil;&#305;tak, &Ouml;mer.<br/>Yer Numaras&#305;&#160;QA76.9.A25 C58 2016<br/>Format:&#160;Kitap<br/>Durum&#160;Beytepe K&uuml;t&uuml;phanesi~1<br/> Hacking Interface ent://SD_ILS/0/SD_ILS:513452 2024-12-27T04:38:55Z 2024-12-27T04:38:55Z Yazar&#160;Elbahad&#305;r, Hamza.<br/>Yer Numaras&#305;&#160;QA76.9.A25 E43 2016<br/>Format:&#160;Kitap<br/>Durum&#160;Beytepe K&uuml;t&uuml;phanesi~1<br/> Siber g&uuml;venlik ve elektronik bile&#351;enleri ent://SD_ILS/0/SD_ILS:380281 2024-12-27T04:38:55Z 2024-12-27T04:38:55Z Yazar&#160;&Uuml;nal, Ahmet Naci<br/>Yer Numaras&#305;&#160;UG485 U53 2015<br/>Format:&#160;Kitap<br/>Durum&#160;Beytepe K&uuml;t&uuml;phanesi~1<br/> Siber istihbarat ent://SD_ILS/0/SD_ILS:384051 2024-12-27T04:38:55Z 2024-12-27T04:38:55Z Yazar&#160;Kele&#351;temur, Atalay<br/>Yer Numaras&#305;&#160;QA76.9.A25 K45 2015<br/>Format:&#160;Kitap<br/>Durum&#160;Beytepe K&uuml;t&uuml;phanesi~1<br/> A&#287; ve yaz&#305;l&#305;m g&uuml;venli&#287;i ent://SD_ILS/0/SD_ILS:379758 2024-12-27T04:38:55Z 2024-12-27T04:38:55Z Yazar&#160;&Ccedil;ontar, Furkan.<br/>Yer Numaras&#305;&#160;TK5105.59 C66 2015<br/>Format:&#160;Kitap<br/>Durum&#160;Beytepe K&uuml;t&uuml;phanesi~1<br/> Introduction to modern cryptography ent://SD_ILS/0/SD_ILS:364315 2024-12-27T04:38:55Z 2024-12-27T04:38:55Z Yazar&#160;Katz, Jonathan, 1974-&#160;Lindell, Yehuda.<br/>Yer Numaras&#305;&#160;QA76.9.A25 K36 2015<br/>Format:&#160;Kitap<br/>Durum&#160;Beytepe K&uuml;t&uuml;phanesi~2<br/> Tam kapsaml&#305; sanal test laboratuvar&#305; kurulumu ve uygulamal&#305; s&#305;zma testleri ent://SD_ILS/0/SD_ILS:513467 2024-12-27T04:38:55Z 2024-12-27T04:38:55Z Yazar&#160;Yal&ccedil;&#305;nkaya, Mehmet Ali, yazar.&#160;K&uuml;&ccedil;&uuml;ksille, Ecir U&#287;ur, yazar.<br/>Yer Numaras&#305;&#160;TK5105.59 Y35 2015<br/>Format:&#160;Gri Yay&#305;nlar<br/>Durum&#160;Beytepe K&uuml;t&uuml;phanesi~1<br/> Network security essentials : applications and standards ent://SD_ILS/0/SD_ILS:354232 2024-12-27T04:38:55Z 2024-12-27T04:38:55Z Yazar&#160;Stallings, William.<br/>Yer Numaras&#305;&#160;TK5105.59 S725 2014<br/>Format:&#160;Kitap<br/>Durum&#160;Beytepe K&uuml;t&uuml;phanesi~1<br/> Data analysis for network cyber-security ent://SD_ILS/0/SD_ILS:354757 2024-12-27T04:38:55Z 2024-12-27T04:38:55Z Yazar&#160;Adams, Niall M., 1968-&#160;Heard, Nicholas.<br/>Yer Numaras&#305;&#160;TK5105.59 D375 2014<br/>Format:&#160;Kitap<br/>Durum&#160;Beytepe K&uuml;t&uuml;phanesi~1<br/> Cryptography and network security : principles and practice ent://SD_ILS/0/SD_ILS:371288 2024-12-27T04:38:55Z 2024-12-27T04:38:55Z Yazar&#160;Stallings, William.<br/>Yer Numaras&#305;&#160;TK5105.59 S713 2014<br/>Format:&#160;Kitap<br/>Durum&#160;Beytepe K&uuml;t&uuml;phanesi~1<br/> Hacking Interface ent://SD_ILS/0/SD_ILS:317847 2024-12-27T04:38:55Z 2024-12-27T04:38:55Z Yazar&#160;Elbahad&#305;r, Hamza.<br/>Yer Numaras&#305;&#160;QA 76.9 A25 E43 2014<br/>Format:&#160;Kitap<br/>Durum&#160;Beytepe K&uuml;t&uuml;phanesi~2<br/> Elementary information security ent://SD_ILS/0/SD_ILS:271272 2024-12-27T04:38:55Z 2024-12-27T04:38:55Z Yazar&#160;Smith, Richard E.<br/>Yer Numaras&#305;&#160;QA76.9.A25 S652 2013<br/>Format:&#160;Kitap<br/>Durum&#160;Beytepe K&uuml;t&uuml;phanesi~1<br/> Secret history : the story of cryptology ent://SD_ILS/0/SD_ILS:365258 2024-12-27T04:38:55Z 2024-12-27T04:38:55Z Yazar&#160;Bauer, Craig P.<br/>Yer Numaras&#305;&#160;QA76.9.A25 B384 2013<br/>Format:&#160;Kitap<br/>Durum&#160;Beytepe K&uuml;t&uuml;phanesi~1<br/> Information security for managers ent://SD_ILS/0/SD_ILS:516570 2024-12-27T04:38:55Z 2024-12-27T04:38:55Z Yazar&#160;Workman, Michael D., 1957-.&#160;Phelps, Daniel C.&#160;Gathegi, John N.<br/>Yer Numaras&#305;&#160;HF5548.37 W67 2013<br/>Format:&#160;Kitap<br/>Durum&#160;Beytepe K&uuml;t&uuml;phanesi~1<br/> Hacking exposed 7 : network security secrets &amp; solutions ent://SD_ILS/0/SD_ILS:270033 2024-12-27T04:38:55Z 2024-12-27T04:38:55Z Yazar&#160;McClure, Stuart.&#160;Scambray, Joel.&#160;Kurtz, George.<br/>Yer Numaras&#305;&#160;TK5105.59 M48 2012<br/>Format:&#160;Kitap<br/>Durum&#160;Beytepe K&uuml;t&uuml;phanesi~1<br/> Auditing IT infrastructures for compliance ent://SD_ILS/0/SD_ILS:271151 2024-12-27T04:38:55Z 2024-12-27T04:38:55Z Yazar&#160;Weiss, Martin M.&#160;Solomon, Michael G.<br/>Yer Numaras&#305;&#160;QA76.9.A25 W428 2011<br/>Format:&#160;Kitap<br/>Durum&#160;Beytepe K&uuml;t&uuml;phanesi~1<br/> Managing risk in information systems ent://SD_ILS/0/SD_ILS:271251 2024-12-27T04:38:55Z 2024-12-27T04:38:55Z Yazar&#160;Gibson, Darril.<br/>Yer Numaras&#305;&#160;QA76.9.A25 G5 2011<br/>Format:&#160;Kitap<br/>Durum&#160;Beytepe K&uuml;t&uuml;phanesi~1<br/> Hacker techniques, tools, and incident handling ent://SD_ILS/0/SD_ILS:271438 2024-12-27T04:38:55Z 2024-12-27T04:38:55Z Yazar&#160;Oriyano, Sean-Philip.&#160;Gregg, Michael (Michael C.)<br/>Yer Numaras&#305;&#160;TK5105.59 O786 2011<br/>Format:&#160;Kitap<br/>Durum&#160;Beytepe K&uuml;t&uuml;phanesi~1<br/> Network security essentials : applications and standards ent://SD_ILS/0/SD_ILS:271446 2024-12-27T04:38:55Z 2024-12-27T04:38:55Z Yazar&#160;Stallings, William.<br/>Yer Numaras&#305;&#160;TK5105.59 S782 2011<br/>Format:&#160;Kitap<br/>Durum&#160;Beytepe K&uuml;t&uuml;phanesi~1<br/> Network security firewalls and VPNs ent://SD_ILS/0/SD_ILS:271452 2024-12-27T04:38:55Z 2024-12-27T04:38:55Z Yazar&#160;Stewart, James Michael.<br/>Yer Numaras&#305;&#160;TK5105.59 S758 2011<br/>Format:&#160;Kitap<br/>Durum&#160;Beytepe K&uuml;t&uuml;phanesi~1<br/> Security policies and implementation issues ent://SD_ILS/0/SD_ILS:271534 2024-12-27T04:38:55Z 2024-12-27T04:38:55Z Yazar&#160;Johnson, Rob (Robert)&#160;Merkow, Mark S.<br/>Yer Numaras&#305;&#160;QA76.9.A25 J64 2011<br/>Format:&#160;Kitap<br/>Durum&#160;Beytepe K&uuml;t&uuml;phanesi~1<br/> Security strategies in Windows platforms and applications ent://SD_ILS/0/SD_ILS:271537 2024-12-27T04:38:55Z 2024-12-27T04:38:55Z Yazar&#160;Solomon, Michael.<br/>Yer Numaras&#305;&#160;QA76.76.O63 S64 2011<br/>Format:&#160;Kitap<br/>Durum&#160;Beytepe K&uuml;t&uuml;phanesi~1<br/> Security strategies in Linux platforms and applications ent://SD_ILS/0/SD_ILS:271539 2024-12-27T04:38:55Z 2024-12-27T04:38:55Z Yazar&#160;Jang, Michael H.<br/>Yer Numaras&#305;&#160;QA76.76.O63 J3638 2011<br/>Format:&#160;Kitap<br/>Durum&#160;Beytepe K&uuml;t&uuml;phanesi~1<br/> Readings and cases in information security : law and ethics ent://SD_ILS/0/SD_ILS:267743 2024-12-27T04:38:55Z 2024-12-27T04:38:55Z Yazar&#160;Whitman, Michael E.&#160;Mattord, Herbert J.<br/>Yer Numaras&#305;&#160;TK5105.878 W54 2011<br/>Format:&#160;Kitap<br/>Durum&#160;Beytepe K&uuml;t&uuml;phanesi~1<br/> Cryptography and network security ent://SD_ILS/0/SD_ILS:386241 2024-12-27T04:38:55Z 2024-12-27T04:38:55Z Yazar&#160;Kahate, Atul.<br/>Yer Numaras&#305;&#160;TK5105.59 K12 2011<br/>Format:&#160;Kitap<br/>Durum&#160;Beytepe K&uuml;t&uuml;phanesi~1<br/> Social engineering : the art of human hacking ent://SD_ILS/0/SD_ILS:377976 2024-12-27T04:38:55Z 2024-12-27T04:38:55Z Yazar&#160;Hadnagy, Christopher.<br/>Yer Numaras&#305;&#160;QA76.9.C66 H33 2011<br/>Format:&#160;Kitap<br/>Durum&#160;Beytepe K&uuml;t&uuml;phanesi~1<br/> Security in computing ent://SD_ILS/0/SD_ILS:313297 2024-12-27T04:38:55Z 2024-12-27T04:38:55Z Yazar&#160;Pfleeger, Charles P., 1948-<br/>Yer Numaras&#305;&#160;QA76.9 A25 P45 2011<br/>Format:&#160;Kitap<br/>Durum&#160;Beytepe K&uuml;t&uuml;phanesi~1<br/> Dijital kale ent://SD_ILS/0/SD_ILS:126135 2024-12-27T04:38:55Z 2024-12-27T04:38:55Z Yazar&#160;Brown, Dan, 1964-&#160;Soner, Sezer.<br/>Yer Numaras&#305;&#160;PS 3552.R685434 D542 2010<br/>Format:&#160;Kitap<br/>Durum&#160;Beytepe K&uuml;t&uuml;phanesi~1<br/> Digital fortress ent://SD_ILS/0/SD_ILS:354167 2024-12-27T04:38:55Z 2024-12-27T04:38:55Z Yazar&#160;Brown, Dan, 1964- .<br/>Yer Numaras&#305;&#160;PS3552.R685434 D53 2009<br/>Format:&#160;Kitap<br/>Durum&#160;Beytepe K&uuml;t&uuml;phanesi~1<br/> Applied algebra : codes, ciphers, and discrete algorithms ent://SD_ILS/0/SD_ILS:312768 2024-12-27T04:38:55Z 2024-12-27T04:38:55Z Yazar&#160;Hardy, Darel W.&#160;Walker, Carol L., 1935-&#160;Richman, Fred, 1938-<br/>Yer Numaras&#305;&#160;QA268 H37 2009<br/>Format:&#160;Kitap<br/>Durum&#160;Beytepe K&uuml;t&uuml;phanesi~1<br/> Computer forensics and cyber crime : an introduction ent://SD_ILS/0/SD_ILS:134036 2024-12-27T04:38:55Z 2024-12-27T04:38:55Z Yazar&#160;Britz, Marjie.<br/>Yer Numaras&#305;&#160;QA76.9.A25 B77 2009<br/>Format:&#160;Kitap<br/>Durum&#160;Beytepe K&uuml;t&uuml;phanesi~1<br/> ISA server 2006 ent://SD_ILS/0/SD_ILS:115080 2024-12-27T04:38:55Z 2024-12-27T04:38:55Z Yazar&#160;&#304;nan, Y&uuml;ksel.&#160;Demirli, Nihat.<br/>Yer Numaras&#305;&#160;TK5105.59 .I536 2008<br/>Format:&#160;Kitap<br/>Durum&#160;Beytepe K&uuml;t&uuml;phanesi~2<br/> Security in computing ent://SD_ILS/0/SD_ILS:110682 2024-12-27T04:38:55Z 2024-12-27T04:38:55Z Yazar&#160;Pfleeger, Charles P., 1948-<br/>Yer Numaras&#305;&#160;QA76.9.A25 P45 2007<br/>Format:&#160;Kitap<br/>Durum&#160;Beytepe K&uuml;t&uuml;phanesi~1<br/> Data warehousing and data mining techniques for cyber security ent://SD_ILS/0/SD_ILS:110434 2024-12-27T04:38:55Z 2024-12-27T04:38:55Z Yazar&#160;Singhal, Anoop, 1958-<br/>Yer Numaras&#305;&#160;QA76.9.A25 S563 2007<br/>Format:&#160;Kitap<br/>Durum&#160;Beytepe K&uuml;t&uuml;phanesi~1<br/> Information security : contemporary cases ent://SD_ILS/0/SD_ILS:111021 2024-12-27T04:38:55Z 2024-12-27T04:38:55Z Yazar&#160;Wright, Marie A.&#160;Kakalik, John S.<br/>Yer Numaras&#305;&#160;QA76.9.A25 W75 2007<br/>Format:&#160;Kitap<br/>Durum&#160;Beytepe K&uuml;t&uuml;phanesi~1<br/> Grid computing security ent://SD_ILS/0/SD_ILS:248747 2024-12-27T04:38:55Z 2024-12-27T04:38:55Z Yazar&#160;Chakrabarti, Anirban.<br/>Yer Numaras&#305;&#160;QA76.9.C58 C53 2007<br/>Format:&#160;Kitap<br/>Durum&#160;Beytepe K&uuml;t&uuml;phanesi~1<br/> Information security : principles and practice ent://SD_ILS/0/SD_ILS:109477 2024-12-27T04:38:55Z 2024-12-27T04:38:55Z Yazar&#160;Stamp, Mark.<br/>Yer Numaras&#305;&#160;QA76.9.A25 S69 2006<br/>Format:&#160;Kitap<br/>Durum&#160;Beytepe K&uuml;t&uuml;phanesi~1<br/> Information security architecture : an integrated approach to security in the organization ent://SD_ILS/0/SD_ILS:110865 2024-12-27T04:38:55Z 2024-12-27T04:38:55Z Yazar&#160;Tudor, Jan Killmeyer.<br/>Yer Numaras&#305;&#160;QA76.9.A25 T83 2006<br/>Format:&#160;Kitap<br/>Durum&#160;Beytepe K&uuml;t&uuml;phanesi~1<br/> Linux Patch Management : keeping Linux systems up to date ent://SD_ILS/0/SD_ILS:119550 2024-12-27T04:38:55Z 2024-12-27T04:38:55Z Yazar&#160;Jang, Michael H.<br/>Yer Numaras&#305;&#160;QA76.76.O63 J368 2006<br/>Format:&#160;Kitap<br/>Durum&#160;Beytepe K&uuml;t&uuml;phanesi~1<br/> Intelligence and security informatics for international security : information sharing and data mining ent://SD_ILS/0/SD_ILS:119786 2024-12-27T04:38:55Z 2024-12-27T04:38:55Z Yazar&#160;Chen, Hsinchun.<br/>Yer Numaras&#305;&#160;QA76.76.E95 C44 2006<br/>Format:&#160;Kitap<br/>Durum&#160;Beytepe K&uuml;t&uuml;phanesi~1<br/> Handbook of information security ent://SD_ILS/0/SD_ILS:108909 2024-12-27T04:38:55Z 2024-12-27T04:38:55Z Yazar&#160;Bidgoli, Hossein, ed.<br/>Yer Numaras&#305;&#160;TK5105.59 H35 2006 V.1<br/>Format:&#160;Kitap<br/>Durum&#160;Beytepe K&uuml;t&uuml;phanesi~3<br/> Bilgi ve bilgisayar g&uuml;venli&#287;i : casus yaz&#305;l&#305;mlar ve korunma y&ouml;ntemleri ent://SD_ILS/0/SD_ILS:515469 2024-12-27T04:38:55Z 2024-12-27T04:38:55Z Yazar&#160;Canbek, G&uuml;rol.&#160;Sa&#287;&#305;ro&#287;lu, &#350;eref.<br/>Yer Numaras&#305;&#160;QA76.9.A25 C36 2006<br/>Format:&#160;Kitap<br/>Durum&#160;Beytepe K&uuml;t&uuml;phanesi~1<br/> Acing the security+ certification exam ent://SD_ILS/0/SD_ILS:313492 2024-12-27T04:38:55Z 2024-12-27T04:38:55Z Yazar&#160;Regan, Patrick E.<br/>Yer Numaras&#305;&#160;QA76.3 R455 2005<br/>Format:&#160;Kitap<br/>Durum&#160;Beytepe K&uuml;t&uuml;phanesi~1<br/> TCP / IP ve a&#287; g&uuml;venli&#287;i : teori ve uygulamalar ile ent://SD_ILS/0/SD_ILS:112813 2024-12-27T04:38:55Z 2024-12-27T04:38:55Z Yazar&#160;Dirican, Can Okan.<br/>Yer Numaras&#305;&#160;TK 5105.55 D5753 2005<br/>Format:&#160;Kitap<br/>Durum&#160;Beytepe K&uuml;t&uuml;phanesi~2<br/> Malware : fighting malicious code ent://SD_ILS/0/SD_ILS:267737 2024-12-27T04:38:55Z 2024-12-27T04:38:55Z Yazar&#160;Skoudis, Ed.&#160;Zeltser, Lenny.<br/>Yer Numaras&#305;&#160;QA76.9.A25 S58 2004<br/>Format:&#160;Kitap<br/>Durum&#160;Beytepe K&uuml;t&uuml;phanesi~1<br/> Secure architectures with OpenBSD ent://SD_ILS/0/SD_ILS:109506 2024-12-27T04:38:55Z 2024-12-27T04:38:55Z Yazar&#160;Palmer, Brandon.&#160;Nazario, Jose, ort. yaz.<br/>Yer Numaras&#305;&#160;QA76.76.O63 P335 2004<br/>Format:&#160;Kitap<br/>Durum&#160;Beytepe K&uuml;t&uuml;phanesi~1<br/> Exploiting software : how to break code ent://SD_ILS/0/SD_ILS:96556 2024-12-27T04:38:55Z 2024-12-27T04:38:55Z Yazar&#160;Hoglund, Greg.&#160;McGraw, Gary, 1966- ort. yaz.<br/>Yer Numaras&#305;&#160;QA 76.9.A25 H635 2004<br/>Format:&#160;Kitap<br/>Durum&#160;Beytepe K&uuml;t&uuml;phanesi~1<br/> &#304;nternette g&uuml;venlik ve Hacker Cracker meselesi : el kitab&#305; ent://SD_ILS/0/SD_ILS:104130 2024-12-27T04:38:55Z 2024-12-27T04:38:55Z Yazar&#160;G&uuml;ven, Mehmet.<br/>Yer Numaras&#305;&#160;QA 76.9.A25 G88 2004<br/>Format:&#160;Kitap<br/>Durum&#160;Beytepe K&uuml;t&uuml;phanesi~2<br/> How to break software security : effective technigues for security testing ent://SD_ILS/0/SD_ILS:105584 2024-12-27T04:38:55Z 2024-12-27T04:38:55Z Yazar&#160;Whittaker, James A., 1965-&#160;Thomson, Herbert H., ort. yaz.<br/>Yer Numaras&#305;&#160;QA 76.9.A25 W48 2004<br/>Format:&#160;Kitap<br/>Durum&#160;Beytepe K&uuml;t&uuml;phanesi~2<br/> Hacking : Bili&#351;im korsanl&#305;&#287;&#305; ve korunma y&ouml;ntemleri ent://SD_ILS/0/SD_ILS:88578 2024-12-27T04:38:55Z 2024-12-27T04:38:55Z Yazar&#160;Y&#305;lmaz, Davut.<br/>Yer Numaras&#305;&#160;TK 5105.59 Y56 2004<br/>Format:&#160;Kitap<br/>Durum&#160;Beytepe K&uuml;t&uuml;phanesi~1<br/> Dijital kale ent://SD_ILS/0/SD_ILS:96322 2024-12-27T04:38:55Z 2024-12-27T04:38:55Z Yazar&#160;Brown, Dan, 1964-&#160;Soner, Sezer, &ccedil;ev.&#160;Huvaj, Muharrem Nesij, haz.<br/>Yer Numaras&#305;&#160;PS3552.R685434 D542 2004<br/>Format:&#160;Kitap<br/>Durum&#160;Beytepe K&uuml;t&uuml;phanesi~7<br/> Building firewalls with OpenBSD and PF ent://SD_ILS/0/SD_ILS:113220 2024-12-27T04:38:55Z 2024-12-27T04:38:55Z Yazar&#160;Artymiak, Jacek.<br/>Yer Numaras&#305;&#160;TK5105.59 .A77 2003<br/>Format:&#160;Kitap<br/>Durum&#160;Beytepe K&uuml;t&uuml;phanesi~1<br/> Introduction to communication electronic warfare systems ent://SD_ILS/0/SD_ILS:76559 2024-12-27T04:38:55Z 2024-12-27T04:38:55Z Yazar&#160;Poisel, Richard.<br/>Yer Numaras&#305;&#160;UG 590 P65 2002<br/>Format:&#160;Kitap<br/>Durum&#160;Beytepe K&uuml;t&uuml;phanesi~1<br/> Nokia network security solutions handbook ent://SD_ILS/0/SD_ILS:81149 2024-12-27T04:38:55Z 2024-12-27T04:38:55Z Yazar&#160;Maxwell, Doug.&#160;Amon, Cherie, ort. yaz.<br/>Yer Numaras&#305;&#160;TK 5105.59 M451 2002<br/>Format:&#160;Kitap<br/>Durum&#160;Beytepe K&uuml;t&uuml;phanesi~1<br/> Technology and privacy : the new landscape ent://SD_ILS/0/SD_ILS:112999 2024-12-27T04:38:55Z 2024-12-27T04:38:55Z Yazar&#160;Agre, Philip.&#160;Rotenberg, Marc.<br/>Yer Numaras&#305;&#160;QA76.9.A25 T43 2001<br/>Format:&#160;Kitap<br/>Durum&#160;Beytepe K&uuml;t&uuml;phanesi~1<br/> New Security Paradigms Workshop : proceedings, September 10 -13, 2001, Cloudcroft, NM, USA ent://SD_ILS/0/SD_ILS:118009 2024-12-27T04:38:55Z 2024-12-27T04:38:55Z Yazar&#160;ACM SIGSAC New Security Paradigms Workshop (2001 : Cloudcroft, NM, USA)&#160;Raskin, V.&#160;Hempelmann, C.F.&#160;Association for Computing Machinery. Special Interest Group on Security, Audit, and Control.<br/>Yer Numaras&#305;&#160;QA76.9.A25 A34 2001<br/>Format:&#160;Kitap<br/>Durum&#160;Beytepe K&uuml;t&uuml;phanesi~1<br/> Proceedings of Sixth ACM Symposium on Access Control Models and Technologies : SACMAT 2001 : Litton-TASC, Westfields II Conference Facility, May 3-4, 2001, Chantilly, Virginia, USA ent://SD_ILS/0/SD_ILS:72452 2024-12-27T04:38:55Z 2024-12-27T04:38:55Z Yazar&#160;ACM Symposium on Access Control Models and Technologies (6th : 2001 : Chantilly, V.A.)&#160;Association for Computing Machinery. Special Interest Group on Security, Audit, and Control.<br/>Yer Numaras&#305;&#160;QA 76.9.A25 A292 2001<br/>Format:&#160;Kitap<br/>Durum&#160;Beytepe K&uuml;t&uuml;phanesi~1<br/> Data privacy in the information age ent://SD_ILS/0/SD_ILS:135125 2024-12-27T04:38:55Z 2024-12-27T04:38:55Z Yazar&#160;Klosek, Jacqueline.<br/>Yer Numaras&#305;&#160;QA76.9.A25 K57 2000<br/>Format:&#160;Kitap<br/>Durum&#160;Beytepe K&uuml;t&uuml;phanesi~1<br/> Applied cryptography : protocols, algorithms, and source code in C ent://SD_ILS/0/SD_ILS:108014 2024-12-27T04:38:55Z 2024-12-27T04:38:55Z Yazar&#160;Schneier, Bruce.<br/>Yer Numaras&#305;&#160;QA76.9.A25 S35 1996<br/>Format:&#160;Kitap<br/>Durum&#160;Beytepe K&uuml;t&uuml;phanesi~1<br/> Auditing IT infrastructures for compliance ent://SD_ILS/0/SD_ILS:270164 2024-12-27T04:38:55Z 2024-12-27T04:38:55Z Yazar&#160;Weiss, Martin M.&#160;Solomon, Michael G.<br/>Yer Numaras&#305;&#160;QA76.9.A25 W428<br/>Format:&#160;Kitap<br/>Durum&#160;Beytepe K&uuml;t&uuml;phanesi~1<br/>