Arama Sonuçları Computer Security. - Daraltılmış: Beytepe Genel Koleksiyon
SirsiDynix Enterprise
https://katalog.hacettepe.edu.tr/client/tr_TR/default_tr/default_tr/qu$003dComputer$002bSecurity.$0026qf$003dLOCATION$002509Shelf$002bLocation$0025091$00253ABEYTEPEGEN$002509Beytepe$002bGenel$002bKoleksiyon$002509$0026te$003dILS$0026ps$003d300?dt=list
2024-12-27T04:38:55Z
Computer security handbook
ent://SD_ILS/0/SD_ILS:10921
2024-12-27T04:38:55Z
2024-12-27T04:38:55Z
Yazar Computer Security Research Group.<br/>Yer Numarası HF 5548.2 C58177 1973<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>
Computer security fundamentals
ent://SD_ILS/0/SD_ILS:108620
2024-12-27T04:38:55Z
2024-12-27T04:38:55Z
Yazar Easttom, Chuck.<br/>Yer Numarası QA76.9.A25 E325 2006<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>
Computer security sourcebook
ent://SD_ILS/0/SD_ILS:94615
2024-12-27T04:38:55Z
2024-12-27T04:38:55Z
Yazar Caldwell, Wilma, ed.<br/>Yer Numarası QA 76.9.A25 C658 2003<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>
Computer security basic
ent://SD_ILS/0/SD_ILS:41083
2024-12-27T04:38:55Z
2024-12-27T04:38:55Z
Yazar Russell, Deborah. Gangemi, G. T., ort. yaz.<br/>Yer Numarası QA 76.9.A25 R87 1991<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>
Computer security solutions
ent://SD_ILS/0/SD_ILS:32336
2024-12-27T04:38:55Z
2024-12-27T04:38:55Z
Yazar Hruska, Jan, 1957- Jackson, K. M., ort. yaz.<br/>Yer Numarası QA 76.76.C6 H78 1990<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>
Practical computer network security
ent://SD_ILS/0/SD_ILS:61567
2024-12-27T04:38:55Z
2024-12-27T04:38:55Z
Yazar Hendry, Mike.<br/>Yer Numarası TK 5105.59 H46 1995<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>
Computer security risk management
ent://SD_ILS/0/SD_ILS:32379
2024-12-27T04:38:55Z
2024-12-27T04:38:55Z
Yazar Palmer, Ian C. Potter, G. A., ort. yaz.<br/>Yer Numarası QA 76.9.A25 P182 1989<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>
Computer security : principles and practice
ent://SD_ILS/0/SD_ILS:313473
2024-12-27T04:38:55Z
2024-12-27T04:38:55Z
Yazar Stallings, William. Brown, Lawrie<br/>Yer Numarası QA76.9 S73 2012<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>
Computer security : art and science
ent://SD_ILS/0/SD_ILS:314021
2024-12-27T04:38:55Z
2024-12-27T04:38:55Z
Yazar Bishop, Matt (Matthew A.)<br/>Yer Numarası QA76.9.A25 B56 2003<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>
A handbook of computer security
ent://SD_ILS/0/SD_ILS:32378
2024-12-27T04:38:55Z
2024-12-27T04:38:55Z
Yazar Hearnden, K., ed. by<br/>Yer Numarası QA 76.9.A25 H191 1990<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>
Sequrity for computer networks : an introduction to data security in teleprocessing and electronic funds transfer
ent://SD_ILS/0/SD_ILS:62188
2024-12-27T04:38:55Z
2024-12-27T04:38:55Z
Yazar Davies, Donald Watts, 1924- Price, W. L., ort.yaz.<br/>Yer Numarası TK 5105 D43 1989<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>
Computer architecture and security : fundamentals of designing secure computer systems
ent://SD_ILS/0/SD_ILS:248865
2024-12-27T04:38:55Z
2024-12-27T04:38:55Z
Yazar Wang, Shuangbao Paul. Ledley, Robert Steven.<br/>Yer Numarası QA76.9.A73 W36 2012<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>
Enhanced methods in computer security, biometric and artificial intelligence systems
ent://SD_ILS/0/SD_ILS:109864
2024-12-27T04:38:55Z
2024-12-27T04:38:55Z
Yazar Pejas, Jerzy, 1954-, ed. Piegat, Andrzej, 1947-, ed.<br/>Yer Numarası QA76.9.A25 E545 2005<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>
Hacking Interface
ent://SD_ILS/0/SD_ILS:524308
2024-12-27T04:38:55Z
2024-12-27T04:38:55Z
Yazar Elbahadır, Hamza.<br/>Yer Numarası QA76.9.A25 E43 2024<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>
Kali Linux
ent://SD_ILS/0/SD_ILS:524304
2024-12-27T04:38:55Z
2024-12-27T04:38:55Z
Yazar Altuntaş, Abdulaziz.<br/>Yer Numarası QA76.9.A25 A48 2024<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>
Ağ ve yazılım güvenliği
ent://SD_ILS/0/SD_ILS:524301
2024-12-27T04:38:55Z
2024-12-27T04:38:55Z
Yazar Çontar, Furkan.<br/>Yer Numarası TK5105.59 C66 2023<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>
A’dan Z’ye siber güvenlik
ent://SD_ILS/0/SD_ILS:524303
2024-12-27T04:38:55Z
2024-12-27T04:38:55Z
Yazar Polat, A. Can. Karakaş, Burak.<br/>Yer Numarası QA76.9 P65 2023<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>
Dijital güvenlik : dijital ortamlarda güvenle var olmak
ent://SD_ILS/0/SD_ILS:517179
2024-12-27T04:38:55Z
2024-12-27T04:38:55Z
Yazar Özer, Fatih. Şahin, Yusuf Levent, editör<br/>Yer Numarası QA76.9.E74 O94 2022<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>
Kendi siteni kendin koru
ent://SD_ILS/0/SD_ILS:524306
2024-12-27T04:38:55Z
2024-12-27T04:38:55Z
Yazar Büyükgöze, Selma. El, Çağrı.<br/>Yer Numarası TK5105.59 B898 2022<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>
Elektronik harp
ent://SD_ILS/0/SD_ILS:514348
2024-12-27T04:38:55Z
2024-12-27T04:38:55Z
Yazar Pakfiliz, Ahmet Güngör.<br/>Yer Numarası UG485 P35 2021<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>
Ağ yönetimi ve bilgi güvenliği
ent://SD_ILS/0/SD_ILS:516275
2024-12-27T04:38:55Z
2024-12-27T04:38:55Z
Yazar Bilge, Alper. Kaçmaz, Emre.<br/>Yer Numarası TK5105.59 A98 2021<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>
Uygulamalarla siber güvenliğe giriş
ent://SD_ILS/0/SD_ILS:510151
2024-12-27T04:38:55Z
2024-12-27T04:38:55Z
Yazar Akyıldız, M. Alparslan.<br/>Yer Numarası TK5105.59.A39 U94 2020<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~2<br/>
Türkiye’de ve dünyada siber güvenlik
ent://SD_ILS/0/SD_ILS:514958
2024-12-27T04:38:55Z
2024-12-27T04:38:55Z
Yazar Çeliktaş, Barış .<br/>Yer Numarası UG485 C45 2020<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>
Yeni başlayanlar için bilgi güvenliği ve uygulamalı hacking yöntemleri
ent://SD_ILS/0/SD_ILS:423184
2024-12-27T04:38:55Z
2024-12-27T04:38:55Z
Yazar Aslanbakan, Enes, yazar<br/>Yer Numarası QA76.9.A25 A75 2019<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>
Ethical hacking : (hacking kursu)
ent://SD_ILS/0/SD_ILS:423950
2024-12-27T04:38:55Z
2024-12-27T04:38:55Z
Yazar Usta, Gökhan.<br/>Yer Numarası QA76.9.A25 U88 2019<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>
Siber güvenlik ve savunma : standartlar ve uygulamalar
ent://SD_ILS/0/SD_ILS:462283
2024-12-27T04:38:55Z
2024-12-27T04:38:55Z
Yazar Sağıroğlu, Şeref.<br/>Yer Numarası TK5105.59 S53 2019<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~2<br/>
Exploit geliştirme 101
ent://SD_ILS/0/SD_ILS:389077
2024-12-27T04:38:55Z
2024-12-27T04:38:55Z
Yazar Akyıldız, M. Alparslan.<br/>Yer Numarası QA76.9.A25 A59 2018<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~2<br/>
Java programlama diliyle kriptoloji uygulamaları
ent://SD_ILS/0/SD_ILS:380319
2024-12-27T04:38:55Z
2024-12-27T04:38:55Z
Yazar Bodur, Hüseyin<br/>Yer Numarası QA76.9.A25 B63 2016<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>
Ethical hacking : offensive & defensive
ent://SD_ILS/0/SD_ILS:513450
2024-12-27T04:38:55Z
2024-12-27T04:38:55Z
Yazar Çıtak, Ömer.<br/>Yer Numarası QA76.9.A25 C58 2016<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>
Hacking Interface
ent://SD_ILS/0/SD_ILS:513452
2024-12-27T04:38:55Z
2024-12-27T04:38:55Z
Yazar Elbahadır, Hamza.<br/>Yer Numarası QA76.9.A25 E43 2016<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>
Siber güvenlik ve elektronik bileşenleri
ent://SD_ILS/0/SD_ILS:380281
2024-12-27T04:38:55Z
2024-12-27T04:38:55Z
Yazar Ünal, Ahmet Naci<br/>Yer Numarası UG485 U53 2015<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>
Siber istihbarat
ent://SD_ILS/0/SD_ILS:384051
2024-12-27T04:38:55Z
2024-12-27T04:38:55Z
Yazar Keleştemur, Atalay<br/>Yer Numarası QA76.9.A25 K45 2015<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>
Ağ ve yazılım güvenliği
ent://SD_ILS/0/SD_ILS:379758
2024-12-27T04:38:55Z
2024-12-27T04:38:55Z
Yazar Çontar, Furkan.<br/>Yer Numarası TK5105.59 C66 2015<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>
Introduction to modern cryptography
ent://SD_ILS/0/SD_ILS:364315
2024-12-27T04:38:55Z
2024-12-27T04:38:55Z
Yazar Katz, Jonathan, 1974- Lindell, Yehuda.<br/>Yer Numarası QA76.9.A25 K36 2015<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~2<br/>
Tam kapsamlı sanal test laboratuvarı kurulumu ve uygulamalı sızma testleri
ent://SD_ILS/0/SD_ILS:513467
2024-12-27T04:38:55Z
2024-12-27T04:38:55Z
Yazar Yalçınkaya, Mehmet Ali, yazar. Küçüksille, Ecir Uğur, yazar.<br/>Yer Numarası TK5105.59 Y35 2015<br/>Format: Gri Yayınlar<br/>Durum Beytepe Kütüphanesi~1<br/>
Network security essentials : applications and standards
ent://SD_ILS/0/SD_ILS:354232
2024-12-27T04:38:55Z
2024-12-27T04:38:55Z
Yazar Stallings, William.<br/>Yer Numarası TK5105.59 S725 2014<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>
Data analysis for network cyber-security
ent://SD_ILS/0/SD_ILS:354757
2024-12-27T04:38:55Z
2024-12-27T04:38:55Z
Yazar Adams, Niall M., 1968- Heard, Nicholas.<br/>Yer Numarası TK5105.59 D375 2014<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>
Cryptography and network security : principles and practice
ent://SD_ILS/0/SD_ILS:371288
2024-12-27T04:38:55Z
2024-12-27T04:38:55Z
Yazar Stallings, William.<br/>Yer Numarası TK5105.59 S713 2014<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>
Hacking Interface
ent://SD_ILS/0/SD_ILS:317847
2024-12-27T04:38:55Z
2024-12-27T04:38:55Z
Yazar Elbahadır, Hamza.<br/>Yer Numarası QA 76.9 A25 E43 2014<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~2<br/>
Elementary information security
ent://SD_ILS/0/SD_ILS:271272
2024-12-27T04:38:55Z
2024-12-27T04:38:55Z
Yazar Smith, Richard E.<br/>Yer Numarası QA76.9.A25 S652 2013<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>
Secret history : the story of cryptology
ent://SD_ILS/0/SD_ILS:365258
2024-12-27T04:38:55Z
2024-12-27T04:38:55Z
Yazar Bauer, Craig P.<br/>Yer Numarası QA76.9.A25 B384 2013<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>
Information security for managers
ent://SD_ILS/0/SD_ILS:516570
2024-12-27T04:38:55Z
2024-12-27T04:38:55Z
Yazar Workman, Michael D., 1957-. Phelps, Daniel C. Gathegi, John N.<br/>Yer Numarası HF5548.37 W67 2013<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>
Hacking exposed 7 : network security secrets & solutions
ent://SD_ILS/0/SD_ILS:270033
2024-12-27T04:38:55Z
2024-12-27T04:38:55Z
Yazar McClure, Stuart. Scambray, Joel. Kurtz, George.<br/>Yer Numarası TK5105.59 M48 2012<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>
Auditing IT infrastructures for compliance
ent://SD_ILS/0/SD_ILS:271151
2024-12-27T04:38:55Z
2024-12-27T04:38:55Z
Yazar Weiss, Martin M. Solomon, Michael G.<br/>Yer Numarası QA76.9.A25 W428 2011<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>
Managing risk in information systems
ent://SD_ILS/0/SD_ILS:271251
2024-12-27T04:38:55Z
2024-12-27T04:38:55Z
Yazar Gibson, Darril.<br/>Yer Numarası QA76.9.A25 G5 2011<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>
Hacker techniques, tools, and incident handling
ent://SD_ILS/0/SD_ILS:271438
2024-12-27T04:38:55Z
2024-12-27T04:38:55Z
Yazar Oriyano, Sean-Philip. Gregg, Michael (Michael C.)<br/>Yer Numarası TK5105.59 O786 2011<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>
Network security essentials : applications and standards
ent://SD_ILS/0/SD_ILS:271446
2024-12-27T04:38:55Z
2024-12-27T04:38:55Z
Yazar Stallings, William.<br/>Yer Numarası TK5105.59 S782 2011<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>
Network security firewalls and VPNs
ent://SD_ILS/0/SD_ILS:271452
2024-12-27T04:38:55Z
2024-12-27T04:38:55Z
Yazar Stewart, James Michael.<br/>Yer Numarası TK5105.59 S758 2011<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>
Security policies and implementation issues
ent://SD_ILS/0/SD_ILS:271534
2024-12-27T04:38:55Z
2024-12-27T04:38:55Z
Yazar Johnson, Rob (Robert) Merkow, Mark S.<br/>Yer Numarası QA76.9.A25 J64 2011<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>
Security strategies in Windows platforms and applications
ent://SD_ILS/0/SD_ILS:271537
2024-12-27T04:38:55Z
2024-12-27T04:38:55Z
Yazar Solomon, Michael.<br/>Yer Numarası QA76.76.O63 S64 2011<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>
Security strategies in Linux platforms and applications
ent://SD_ILS/0/SD_ILS:271539
2024-12-27T04:38:55Z
2024-12-27T04:38:55Z
Yazar Jang, Michael H.<br/>Yer Numarası QA76.76.O63 J3638 2011<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>
Readings and cases in information security : law and ethics
ent://SD_ILS/0/SD_ILS:267743
2024-12-27T04:38:55Z
2024-12-27T04:38:55Z
Yazar Whitman, Michael E. Mattord, Herbert J.<br/>Yer Numarası TK5105.878 W54 2011<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>
Cryptography and network security
ent://SD_ILS/0/SD_ILS:386241
2024-12-27T04:38:55Z
2024-12-27T04:38:55Z
Yazar Kahate, Atul.<br/>Yer Numarası TK5105.59 K12 2011<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>
Social engineering : the art of human hacking
ent://SD_ILS/0/SD_ILS:377976
2024-12-27T04:38:55Z
2024-12-27T04:38:55Z
Yazar Hadnagy, Christopher.<br/>Yer Numarası QA76.9.C66 H33 2011<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>
Security in computing
ent://SD_ILS/0/SD_ILS:313297
2024-12-27T04:38:55Z
2024-12-27T04:38:55Z
Yazar Pfleeger, Charles P., 1948-<br/>Yer Numarası QA76.9 A25 P45 2011<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>
Dijital kale
ent://SD_ILS/0/SD_ILS:126135
2024-12-27T04:38:55Z
2024-12-27T04:38:55Z
Yazar Brown, Dan, 1964- Soner, Sezer.<br/>Yer Numarası PS 3552.R685434 D542 2010<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>
Digital fortress
ent://SD_ILS/0/SD_ILS:354167
2024-12-27T04:38:55Z
2024-12-27T04:38:55Z
Yazar Brown, Dan, 1964- .<br/>Yer Numarası PS3552.R685434 D53 2009<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>
Applied algebra : codes, ciphers, and discrete algorithms
ent://SD_ILS/0/SD_ILS:312768
2024-12-27T04:38:55Z
2024-12-27T04:38:55Z
Yazar Hardy, Darel W. Walker, Carol L., 1935- Richman, Fred, 1938-<br/>Yer Numarası QA268 H37 2009<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>
Computer forensics and cyber crime : an introduction
ent://SD_ILS/0/SD_ILS:134036
2024-12-27T04:38:55Z
2024-12-27T04:38:55Z
Yazar Britz, Marjie.<br/>Yer Numarası QA76.9.A25 B77 2009<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>
ISA server 2006
ent://SD_ILS/0/SD_ILS:115080
2024-12-27T04:38:55Z
2024-12-27T04:38:55Z
Yazar İnan, Yüksel. Demirli, Nihat.<br/>Yer Numarası TK5105.59 .I536 2008<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~2<br/>
Security in computing
ent://SD_ILS/0/SD_ILS:110682
2024-12-27T04:38:55Z
2024-12-27T04:38:55Z
Yazar Pfleeger, Charles P., 1948-<br/>Yer Numarası QA76.9.A25 P45 2007<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>
Data warehousing and data mining techniques for cyber security
ent://SD_ILS/0/SD_ILS:110434
2024-12-27T04:38:55Z
2024-12-27T04:38:55Z
Yazar Singhal, Anoop, 1958-<br/>Yer Numarası QA76.9.A25 S563 2007<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>
Information security : contemporary cases
ent://SD_ILS/0/SD_ILS:111021
2024-12-27T04:38:55Z
2024-12-27T04:38:55Z
Yazar Wright, Marie A. Kakalik, John S.<br/>Yer Numarası QA76.9.A25 W75 2007<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>
Grid computing security
ent://SD_ILS/0/SD_ILS:248747
2024-12-27T04:38:55Z
2024-12-27T04:38:55Z
Yazar Chakrabarti, Anirban.<br/>Yer Numarası QA76.9.C58 C53 2007<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>
Information security : principles and practice
ent://SD_ILS/0/SD_ILS:109477
2024-12-27T04:38:55Z
2024-12-27T04:38:55Z
Yazar Stamp, Mark.<br/>Yer Numarası QA76.9.A25 S69 2006<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>
Information security architecture : an integrated approach to security in the organization
ent://SD_ILS/0/SD_ILS:110865
2024-12-27T04:38:55Z
2024-12-27T04:38:55Z
Yazar Tudor, Jan Killmeyer.<br/>Yer Numarası QA76.9.A25 T83 2006<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>
Linux Patch Management : keeping Linux systems up to date
ent://SD_ILS/0/SD_ILS:119550
2024-12-27T04:38:55Z
2024-12-27T04:38:55Z
Yazar Jang, Michael H.<br/>Yer Numarası QA76.76.O63 J368 2006<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>
Intelligence and security informatics for international security : information sharing and data mining
ent://SD_ILS/0/SD_ILS:119786
2024-12-27T04:38:55Z
2024-12-27T04:38:55Z
Yazar Chen, Hsinchun.<br/>Yer Numarası QA76.76.E95 C44 2006<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>
Handbook of information security
ent://SD_ILS/0/SD_ILS:108909
2024-12-27T04:38:55Z
2024-12-27T04:38:55Z
Yazar Bidgoli, Hossein, ed.<br/>Yer Numarası TK5105.59 H35 2006 V.1<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~3<br/>
Bilgi ve bilgisayar güvenliği : casus yazılımlar ve korunma yöntemleri
ent://SD_ILS/0/SD_ILS:515469
2024-12-27T04:38:55Z
2024-12-27T04:38:55Z
Yazar Canbek, Gürol. Sağıroğlu, Şeref.<br/>Yer Numarası QA76.9.A25 C36 2006<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>
Acing the security+ certification exam
ent://SD_ILS/0/SD_ILS:313492
2024-12-27T04:38:55Z
2024-12-27T04:38:55Z
Yazar Regan, Patrick E.<br/>Yer Numarası QA76.3 R455 2005<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>
TCP / IP ve ağ güvenliği : teori ve uygulamalar ile
ent://SD_ILS/0/SD_ILS:112813
2024-12-27T04:38:55Z
2024-12-27T04:38:55Z
Yazar Dirican, Can Okan.<br/>Yer Numarası TK 5105.55 D5753 2005<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~2<br/>
Malware : fighting malicious code
ent://SD_ILS/0/SD_ILS:267737
2024-12-27T04:38:55Z
2024-12-27T04:38:55Z
Yazar Skoudis, Ed. Zeltser, Lenny.<br/>Yer Numarası QA76.9.A25 S58 2004<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>
Secure architectures with OpenBSD
ent://SD_ILS/0/SD_ILS:109506
2024-12-27T04:38:55Z
2024-12-27T04:38:55Z
Yazar Palmer, Brandon. Nazario, Jose, ort. yaz.<br/>Yer Numarası QA76.76.O63 P335 2004<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>
Exploiting software : how to break code
ent://SD_ILS/0/SD_ILS:96556
2024-12-27T04:38:55Z
2024-12-27T04:38:55Z
Yazar Hoglund, Greg. McGraw, Gary, 1966- ort. yaz.<br/>Yer Numarası QA 76.9.A25 H635 2004<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>
İnternette güvenlik ve Hacker Cracker meselesi : el kitabı
ent://SD_ILS/0/SD_ILS:104130
2024-12-27T04:38:55Z
2024-12-27T04:38:55Z
Yazar Güven, Mehmet.<br/>Yer Numarası QA 76.9.A25 G88 2004<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~2<br/>
How to break software security : effective technigues for security testing
ent://SD_ILS/0/SD_ILS:105584
2024-12-27T04:38:55Z
2024-12-27T04:38:55Z
Yazar Whittaker, James A., 1965- Thomson, Herbert H., ort. yaz.<br/>Yer Numarası QA 76.9.A25 W48 2004<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~2<br/>
Hacking : Bilişim korsanlığı ve korunma yöntemleri
ent://SD_ILS/0/SD_ILS:88578
2024-12-27T04:38:55Z
2024-12-27T04:38:55Z
Yazar Yılmaz, Davut.<br/>Yer Numarası TK 5105.59 Y56 2004<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>
Dijital kale
ent://SD_ILS/0/SD_ILS:96322
2024-12-27T04:38:55Z
2024-12-27T04:38:55Z
Yazar Brown, Dan, 1964- Soner, Sezer, çev. Huvaj, Muharrem Nesij, haz.<br/>Yer Numarası PS3552.R685434 D542 2004<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~7<br/>
Building firewalls with OpenBSD and PF
ent://SD_ILS/0/SD_ILS:113220
2024-12-27T04:38:55Z
2024-12-27T04:38:55Z
Yazar Artymiak, Jacek.<br/>Yer Numarası TK5105.59 .A77 2003<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>
Introduction to communication electronic warfare systems
ent://SD_ILS/0/SD_ILS:76559
2024-12-27T04:38:55Z
2024-12-27T04:38:55Z
Yazar Poisel, Richard.<br/>Yer Numarası UG 590 P65 2002<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>
Nokia network security solutions handbook
ent://SD_ILS/0/SD_ILS:81149
2024-12-27T04:38:55Z
2024-12-27T04:38:55Z
Yazar Maxwell, Doug. Amon, Cherie, ort. yaz.<br/>Yer Numarası TK 5105.59 M451 2002<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>
Technology and privacy : the new landscape
ent://SD_ILS/0/SD_ILS:112999
2024-12-27T04:38:55Z
2024-12-27T04:38:55Z
Yazar Agre, Philip. Rotenberg, Marc.<br/>Yer Numarası QA76.9.A25 T43 2001<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>
New Security Paradigms Workshop : proceedings, September 10 -13, 2001, Cloudcroft, NM, USA
ent://SD_ILS/0/SD_ILS:118009
2024-12-27T04:38:55Z
2024-12-27T04:38:55Z
Yazar ACM SIGSAC New Security Paradigms Workshop (2001 : Cloudcroft, NM, USA) Raskin, V. Hempelmann, C.F. Association for Computing Machinery. Special Interest Group on Security, Audit, and Control.<br/>Yer Numarası QA76.9.A25 A34 2001<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>
Proceedings of Sixth ACM Symposium on Access Control Models and Technologies : SACMAT 2001 : Litton-TASC, Westfields II Conference Facility, May 3-4, 2001, Chantilly, Virginia, USA
ent://SD_ILS/0/SD_ILS:72452
2024-12-27T04:38:55Z
2024-12-27T04:38:55Z
Yazar ACM Symposium on Access Control Models and Technologies (6th : 2001 : Chantilly, V.A.) Association for Computing Machinery. Special Interest Group on Security, Audit, and Control.<br/>Yer Numarası QA 76.9.A25 A292 2001<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>
Data privacy in the information age
ent://SD_ILS/0/SD_ILS:135125
2024-12-27T04:38:55Z
2024-12-27T04:38:55Z
Yazar Klosek, Jacqueline.<br/>Yer Numarası QA76.9.A25 K57 2000<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>
Applied cryptography : protocols, algorithms, and source code in C
ent://SD_ILS/0/SD_ILS:108014
2024-12-27T04:38:55Z
2024-12-27T04:38:55Z
Yazar Schneier, Bruce.<br/>Yer Numarası QA76.9.A25 S35 1996<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>
Auditing IT infrastructures for compliance
ent://SD_ILS/0/SD_ILS:270164
2024-12-27T04:38:55Z
2024-12-27T04:38:55Z
Yazar Weiss, Martin M. Solomon, Michael G.<br/>Yer Numarası QA76.9.A25 W428<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>