Arama Sonuçları Computer Security. - Daraltılmış: 2013SirsiDynix Enterprisehttps://katalog.hacettepe.edu.tr/client/tr_TR/default_tr/default_tr/qu$003dComputer$002bSecurity.$0026qf$003dPUBDATE$002509Yay$0025C4$0025B1n$002bY$0025C4$0025B1l$0025C4$0025B1$0025092013$0025092013$0026te$003dILS$0026ps$003d300?dt=list2024-12-27T05:34:38ZGuide to Computer Network Securityent://SD_ILS/0/SD_ILS:3310052024-12-27T05:34:38Z2024-12-27T05:34:38ZYazar Kizza, Joseph Migga. author. SpringerLink (Online service)<br/>Yer Numarası ONLINE(331005.1)<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-1-4471-4543-1">http://dx.doi.org/10.1007/978-1-4471-4543-1</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Sequrity for computer networks : an introduction to data security in teleprocessing and electronic funds transferent://SD_ILS/0/SD_ILS:621882024-12-27T05:34:38Z2024-12-27T05:34:38ZYazar Davies, Donald Watts, 1924- Price, W. L., ort.yaz.<br/>Yer Numarası TK 5105 D43 1989<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>Computer security literacy staying safe in a digital worldent://SD_ILS/0/SD_ILS:2908392024-12-27T05:34:38Z2024-12-27T05:34:38ZYazar Jacobson, Douglas. Idziorek, Joseph.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://marc.crcnetbase.com/isbn/9781439856192">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Computer Safety, Reliability, and Security 32nd International Conference, SAFECOMP 2013, Toulouse, France, September 24-27, 2013. Proceedingsent://SD_ILS/0/SD_ILS:3350052024-12-27T05:34:38Z2024-12-27T05:34:38ZYazar Bitsch, Friedemann. editor. Guiochet, Jérémie. editor. Kaâniche, Mohamed. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE(335005.1)<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-40793-2">http://dx.doi.org/10.1007/978-3-642-40793-2</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Advances in Information and Computer Security 8th International Workshop on Security, IWSEC 2013, Okinawa, Japan, November 18-20, 2013, Proceedingsent://SD_ILS/0/SD_ILS:3350982024-12-27T05:34:38Z2024-12-27T05:34:38ZYazar Sakiyama, Kazuo. editor. Terada, Masayuki. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE(335098.1)<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-41383-4">http://dx.doi.org/10.1007/978-3-642-41383-4</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Computer Security – ESORICS 2013 18th European Symposium on Research in Computer Security, Egham, UK, September 9-13, 2013. Proceedingsent://SD_ILS/0/SD_ILS:3349092024-12-27T05:34:38Z2024-12-27T05:34:38ZYazar Crampton, Jason. editor. Jajodia, Sushil. editor. Mayes, Keith. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE(334909.1)<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-40203-6">http://dx.doi.org/10.1007/978-3-642-40203-6</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Information security management handbookent://SD_ILS/0/SD_ILS:2903202024-12-27T05:34:38Z2024-12-27T05:34:38ZYazar Tipton, Harold F. Krause, Micki.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://marc.crcnetbase.com/isbn/9781420003406">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Information security management handbookent://SD_ILS/0/SD_ILS:2871232024-12-27T05:34:38Z2024-12-27T05:34:38ZYazar Tipton, Harold F. Nozaki, Micki Krause.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://marc.crcnetbase.com/isbn/9781439893159">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Information security management handbookent://SD_ILS/0/SD_ILS:2891512024-12-27T05:34:38Z2024-12-27T05:34:38ZYazar Tipton, Harold F. Krause, Micki.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://marc.crcnetbase.com/isbn/9780203325438">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Elementary information securityent://SD_ILS/0/SD_ILS:2712722024-12-27T05:34:38Z2024-12-27T05:34:38ZYazar Smith, Richard E.<br/>Yer Numarası QA76.9.A25 S652 2013<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>Data security, data mining and data management : technologies and challengesent://SD_ILS/0/SD_ILS:2809142024-12-27T05:34:38Z2024-12-27T05:34:38ZYazar O'Byrne, Serge, editor of compilation.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim EBSCOhost <a href="http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=570680">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=570680</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Handbook on mobile and ubiquitous computing status and perspectiveent://SD_ILS/0/SD_ILS:2862622024-12-27T05:34:38Z2024-12-27T05:34:38ZYazar Yang, Laurence Tianruo. Syukur, Evi. Loke, Seng.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://marc.crcnetbase.com/isbn/9781439848128">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Official (ISC)[superscript 2] guide to the CAP CBKent://SD_ILS/0/SD_ILS:2880562024-12-27T05:34:38Z2024-12-27T05:34:38ZYazar Howard, Patrick D.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://marc.crcnetbase.com/isbn/9781439820766">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Handbook of SCADA/control systems securityent://SD_ILS/0/SD_ILS:2881552024-12-27T05:34:38Z2024-12-27T05:34:38ZYazar Radvanovsky, Robert. Brodsky, Jacob.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://marc.crcnetbase.com/isbn/9781466502277">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Iris biometric model for secured network accessent://SD_ILS/0/SD_ILS:2881602024-12-27T05:34:38Z2024-12-27T05:34:38ZYazar Khoury, Franjieh El.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://marc.crcnetbase.com/isbn/9781466502147">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Information security policy development for compliance ISO/IEC 27001, NIST SP 800-53, HIPAA standard, PCI DSS V2.0, and AUP V5.0ent://SD_ILS/0/SD_ILS:2881732024-12-27T05:34:38Z2024-12-27T05:34:38ZYazar Williams, Barry L.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://marc.crcnetbase.com/isbn/9781466580596">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>The complete guide to physical securityent://SD_ILS/0/SD_ILS:2906672024-12-27T05:34:38Z2024-12-27T05:34:38ZYazar Baker, Paul, 1958- Benny, Daniel J.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://marc.crcnetbase.com/isbn/9781420099645">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Network attacks and defenses a hands-on approachent://SD_ILS/0/SD_ILS:2909242024-12-27T05:34:38Z2024-12-27T05:34:38ZYazar Trabelsi, Zouheir.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://marc.crcnetbase.com/isbn/9781466517974">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>FISMA and the risk management framework the new practice of federal cyber securityent://SD_ILS/0/SD_ILS:1459362024-12-27T05:34:38Z2024-12-27T05:34:38ZYazar Gantz, Stephen D. Philpott, Daniel R.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597496414">http://www.sciencedirect.com/science/book/9781597496414</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Privacy, Confidentiality, and Health Researchent://SD_ILS/0/SD_ILS:2379942024-12-27T05:34:38Z2024-12-27T05:34:38ZYazar Lowrance, William W..<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1017/CBO9781139107969">Access by subscription</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Advances in cyber security technology, operations, and experiencesent://SD_ILS/0/SD_ILS:2395912024-12-27T05:34:38Z2024-12-27T05:34:38ZYazar Hsu, D. Frank (Derbiau Frank), 1948- Project Muse.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://muse.jhu.edu/books/9780823250325/">Full text available: </a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Technocrime, policing and surveillanceent://SD_ILS/0/SD_ILS:2606742024-12-27T05:34:38Z2024-12-27T05:34:38ZYazar Leman-Langlois, Stéphane, 1965-<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://www.tandfebooks.com/isbn/9780203105245">Click here to view</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Automatic defense against zero-day polymorphic worms in communication networksent://SD_ILS/0/SD_ILS:2863072024-12-27T05:34:38Z2024-12-27T05:34:38ZYazar Mohammed, Mohssen, 1982- Pathan, Al-Sakib Khan.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://marc.crcnetbase.com/isbn/9781466557284">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Digital forensics for handheld devicesent://SD_ILS/0/SD_ILS:2862482024-12-27T05:34:38Z2024-12-27T05:34:38ZYazar Doherty, Eamon P.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://marc.crcnetbase.com/isbn/9781439898789">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>The complete book of data anonymization from planning to implementationent://SD_ILS/0/SD_ILS:2890652024-12-27T05:34:38Z2024-12-27T05:34:38ZYazar Raghunathan, Balaji.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://marc.crcnetbase.com/isbn/9781439877319">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Security for wireless sensor networks using identity-based cryptographyent://SD_ILS/0/SD_ILS:2862522024-12-27T05:34:38Z2024-12-27T05:34:38ZYazar Patil, Harsh Kupwade. Szygenda, Stephen A.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://marc.crcnetbase.com/isbn/9781439869024">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Windows networking tools the complete guide to management, troubleshooting, and securityent://SD_ILS/0/SD_ILS:2916572024-12-27T05:34:38Z2024-12-27T05:34:38ZYazar Held, Gilbert, 1943-<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://marc.crcnetbase.com/isbn/9781466511071">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Discrete dynamical systems and chaotic machines theory and applicationsent://SD_ILS/0/SD_ILS:2917402024-12-27T05:34:38Z2024-12-27T05:34:38ZYazar Bahi, Jacques Mohcine. Guyeux, Christophe.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://marc.crcnetbase.com/isbn/9781466554511">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Official (ISC)2 guide to the CISSP CBKent://SD_ILS/0/SD_ILS:2917432024-12-27T05:34:38Z2024-12-27T05:34:38ZYazar Tipton, Harold F., editor of compilation. Hernandez, Steven, editor of compilation.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://marc.crcnetbase.com/isbn/9781466569782">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Windows 8 kickstartent://SD_ILS/0/SD_ILS:2934082024-12-27T05:34:38Z2024-12-27T05:34:38ZYazar Russell, James Howard.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://mhebooklibrary.com/reader/windows-8-kickstart">Subscription required</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Cyber power : crime, conflict and security in cyberspaceent://SD_ILS/0/SD_ILS:3425982024-12-27T05:34:38Z2024-12-27T05:34:38ZYazar Ghernaouti-Hélie, Solange, 1958- author.<br/>Yer Numarası ONLINE(342598.1)<br/>Elektronik Erişim <a href="http://marc.crcnetbase.com/isbn/9781466573055">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Delivering London 2012 ICT implementation and operationsent://SD_ILS/0/SD_ILS:5098892024-12-27T05:34:38Z2024-12-27T05:34:38ZYazar IET, ed.<br/>Yer Numarası XX(509889.1)<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1049/PERICP2E">http://dx.doi.org/10.1049/PERICP2E</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Resilience, Security & Risk in Transportent://SD_ILS/0/SD_ILS:5098922024-12-27T05:34:38Z2024-12-27T05:34:38ZYazar IET, ed.<br/>Yer Numarası XX(509892.1)<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1049/PERRSR3E">http://dx.doi.org/10.1049/PERRSR3E</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>PRAGMATIC security metrics applying metametrics to information securityent://SD_ILS/0/SD_ILS:2899742024-12-27T05:34:38Z2024-12-27T05:34:38ZYazar Brotby, W. Krag. Hinson, Gary. Kabay, Michel E.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://marc.crcnetbase.com/isbn/9781439881538">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Wireless reconnaissance in penetration testingent://SD_ILS/0/SD_ILS:3064602024-12-27T05:34:38Z2024-12-27T05:34:38ZYazar Neely, Matthew. Hamerstone, Alex. Sanyk, Chris.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597497312">http://www.sciencedirect.com/science/book/9781597497312</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Federated identity primerent://SD_ILS/0/SD_ILS:3064612024-12-27T05:34:38Z2024-12-27T05:34:38ZYazar Rountree, Derrick.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780124071896">http://www.sciencedirect.com/science/book/9780124071896</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Information protection playbookent://SD_ILS/0/SD_ILS:3066492024-12-27T05:34:38Z2024-12-27T05:34:38ZYazar Kane, Greg, editor of compilation. Koppel, Lorna, editor of compilation.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780124172326">http://www.sciencedirect.com/science/book/9780124172326</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Linux Malware Incident Response an Excerpt from Malware Forensic Field Guide for Linux Systems.ent://SD_ILS/0/SD_ILS:3066972024-12-27T05:34:38Z2024-12-27T05:34:38ZYazar Malin, Cameron H. Casey, Eoghan. Aquilina, James M.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780124095076">http://www.sciencedirect.com/science/book/9780124095076</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>The basics of web hacking tools and techniques to attack the Webent://SD_ILS/0/SD_ILS:3066992024-12-27T05:34:38Z2024-12-27T05:34:38ZYazar Pauli, Joshua J.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780124166004">http://www.sciencedirect.com/science/book/9780124166004</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Applied network security monitoring collection, detection, and analysisent://SD_ILS/0/SD_ILS:3561222024-12-27T05:34:38Z2024-12-27T05:34:38ZYazar Sanders, Chris. Smith, Jason.<br/>Yer Numarası ONLINE(356122.1)<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780124172081">http://www.sciencedirect.com/science/book/9780124172081</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Secret history : the story of cryptologyent://SD_ILS/0/SD_ILS:3652582024-12-27T05:34:38Z2024-12-27T05:34:38ZYazar Bauer, Craig P.<br/>Yer Numarası QA76.9.A25 B384 2013<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>Instant penetration testing setting up a test lab how-to : set up your own penetration testing lab using practical and precise recipesent://SD_ILS/0/SD_ILS:3130442024-12-27T05:34:38Z2024-12-27T05:34:38ZYazar Fadyushin, Vyacheslav.<br/>Yer Numarası ONLINE(313044.1)<br/>Elektronik Erişim Knovel <a href="http://app.knovel.com/web/toc.v/cid:kpIPTSUTL3">http://app.knovel.com/web/toc.v/cid:kpIPTSUTL3</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Violent Python a cookbook for hackers, forensic analysts, penetration testers and security engineersent://SD_ILS/0/SD_ILS:1469172024-12-27T05:34:38Z2024-12-27T05:34:38ZYazar O'Connor, T. J.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597499576">http://www.sciencedirect.com/science/book/9781597499576</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>UTM security with Fortinet Mastering FortiOSent://SD_ILS/0/SD_ILS:1469342024-12-27T05:34:38Z2024-12-27T05:34:38ZYazar Tam, Kenneth.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597497473">http://www.sciencedirect.com/science/book/9781597497473</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Data hiding exposing concealed data in multimedia, operating systems, mobile devices and network protocolsent://SD_ILS/0/SD_ILS:1476022024-12-27T05:34:38Z2024-12-27T05:34:38ZYazar Raggo, Michael T. Hosmer, Chet.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597497435">http://www.sciencedirect.com/science/book/9781597497435</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Wireless reconnaissance in penetration testingent://SD_ILS/0/SD_ILS:1456902024-12-27T05:34:38Z2024-12-27T05:34:38ZYazar Neely, Matthew. Hamerstone, Alex. Sanyk, Chris.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597497312">http://www.sciencedirect.com/science/book/9781597497312</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Information security for managersent://SD_ILS/0/SD_ILS:5165702024-12-27T05:34:38Z2024-12-27T05:34:38ZYazar Workman, Michael D., 1957-. Phelps, Daniel C. Gathegi, John N.<br/>Yer Numarası HF5548.37 W67 2013<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>