Arama Sonu&ccedil;lar&#305; Computer networks -- Access control. SirsiDynix Enterprise https://katalog.hacettepe.edu.tr/client/tr_TR/default_tr/default_tr/qu$003dComputer$002bnetworks$002b--$002bAccess$002bcontrol.$0026ic$003dtrue$0026ps$003d300? 2024-11-11T07:55:00Z Mobile and Ubiquitous Systems: Computing, Networking and Services 19th EAI International Conference, MobiQuitous 2022, Pittsburgh, PA, USA, November 14-17, 2022, Proceedings ent://SD_ILS/0/SD_ILS:520473 2024-11-11T07:55:00Z 2024-11-11T07:55:00Z Yazar&#160;Longfei, Shangguan. editor.&#160;Bodhi, Priyantha. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;XX(520473.1)<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-3-031-34776-4">https://doi.org/10.1007/978-3-031-34776-4</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Biometrics from fiction to practice ent://SD_ILS/0/SD_ILS:285393 2024-11-11T07:55:00Z 2024-11-11T07:55:00Z Yazar&#160;Du, Yingzi, 1975-<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://marc.crcnetbase.com/isbn/9789814364133">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> The benefits and security risks of web-based applications for business trend report ent://SD_ILS/0/SD_ILS:306640 2024-11-11T07:55:00Z 2024-11-11T07:55:00Z Yazar&#160;Kotwica, Kathleen.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780124170018">http://www.sciencedirect.com/science/book/9780124170018</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Federated identity primer ent://SD_ILS/0/SD_ILS:306461 2024-11-11T07:55:00Z 2024-11-11T07:55:00Z Yazar&#160;Rountree, Derrick.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780124071896">http://www.sciencedirect.com/science/book/9780124071896</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> UTM security with Fortinet Mastering FortiOS ent://SD_ILS/0/SD_ILS:146934 2024-11-11T07:55:00Z 2024-11-11T07:55:00Z Yazar&#160;Tam, Kenneth.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597497473">http://www.sciencedirect.com/science/book/9781597497473</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Wiki at war conflict in a socially networked world ent://SD_ILS/0/SD_ILS:276700 2024-11-11T07:55:00Z 2024-11-11T07:55:00Z Yazar&#160;Carafano, James Jay, 1955-&#160;Project Muse.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://muse.jhu.edu/books/9781603446587/">Full text available: </a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Wiki at war conflict in a socially networked world ent://SD_ILS/0/SD_ILS:241837 2024-11-11T07:55:00Z 2024-11-11T07:55:00Z Yazar&#160;Carafano, James Jay, 1955-&#160;Project Muse.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://muse.jhu.edu/books/9781603446570/">Full text available: </a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Network intrusion analysis methodologies, tools, and techniques for incident analysis and response ent://SD_ILS/0/SD_ILS:146274 2024-11-11T07:55:00Z 2024-11-11T07:55:00Z Yazar&#160;Fichera, Joe, 1966-&#160;Bolt, Steven.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597499620">http://www.sciencedirect.com/science/book/9781597499620</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Client-side attacks and defense ent://SD_ILS/0/SD_ILS:148731 2024-11-11T07:55:00Z 2024-11-11T07:55:00Z Yazar&#160;Oriyano, Sean-Philip.&#160;Shimonski, Robert.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495905">http://www.sciencedirect.com/science/book/9781597495905</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Advanced persistent threat understanding the danger and how to protect your organization ent://SD_ILS/0/SD_ILS:146056 2024-11-11T07:55:00Z 2024-11-11T07:55:00Z Yazar&#160;Cole, Eric.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597499491">http://www.sciencedirect.com/science/book/9781597499491</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Citrix XenApp platinum edition for Windows the official guide ent://SD_ILS/0/SD_ILS:293394 2024-11-11T07:55:00Z 2024-11-11T07:55:00Z Yazar&#160;Casselman, Brian.&#160;Reeser, Tim.&#160;Kaplan, Steve, 1955-<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://mhebooklibrary.com/reader/citrix-xenapp-platinum-edition-for-windows-official-guide">Subscription required</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Cisco ASA configuration ent://SD_ILS/0/SD_ILS:293322 2024-11-11T07:55:00Z 2024-11-11T07:55:00Z Yazar&#160;Deal, Richard A.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://mhebooklibrary.com/reader/cisco-asa-configuration">Subscription required</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Seven deadliest network attacks ent://SD_ILS/0/SD_ILS:149185 2024-11-11T07:55:00Z 2024-11-11T07:55:00Z Yazar&#160;Prowell, Stacy J.&#160;Kraus, Rob.&#160;Borkin, Mike.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495493">http://www.sciencedirect.com/science/book/9781597495493</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Introduction to Broadband Communication Systems ent://SD_ILS/0/SD_ILS:248059 2024-11-11T07:55:00Z 2024-11-11T07:55:00Z Yazar&#160;Akujuobi, Cajetan M.&#160;Sadiku, Matthew N.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1049/SBTE501E">http://dx.doi.org/10.1049/SBTE501E</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Policy-driven mobile ad hoc network management ent://SD_ILS/0/SD_ILS:249504 2024-11-11T07:55:00Z 2024-11-11T07:55:00Z Yazar&#160;Chadha, Ritu, 1964-&#160;Kant, Lahta, 1962-<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;IEEE Xplore <a href="http://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=5236994">http://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=5236994</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Black Hat physical device security exploiting hardware and software ent://SD_ILS/0/SD_ILS:254025 2024-11-11T07:55:00Z 2024-11-11T07:55:00Z Yazar&#160;Miller, Drew, 1978-<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781932266818">http://www.sciencedirect.com/science/book/9781932266818</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Building DMZs for Enterprise networks ent://SD_ILS/0/SD_ILS:254009 2024-11-11T07:55:00Z 2024-11-11T07:55:00Z Yazar&#160;Shimonski, Robert.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836883">http://www.sciencedirect.com/science/book/9781931836883</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Internet and Wireless Security ent://SD_ILS/0/SD_ILS:247682 2024-11-11T07:55:00Z 2024-11-11T07:55:00Z Yazar&#160;Temple, Robert, ed.&#160;Regnault, John, ed.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1049/PBBT004E">http://dx.doi.org/10.1049/PBBT004E</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Proceedings of Sixth ACM Symposium on Access Control Models and Technologies : SACMAT 2001 : Litton-TASC, Westfields II Conference Facility, May 3-4, 2001, Chantilly, Virginia, USA ent://SD_ILS/0/SD_ILS:72452 2024-11-11T07:55:00Z 2024-11-11T07:55:00Z Yazar&#160;ACM Symposium on Access Control Models and Technologies (6th : 2001 : Chantilly, V.A.)&#160;Association for Computing Machinery. Special Interest Group on Security, Audit, and Control.<br/>Yer Numaras&#305;&#160;QA 76.9.A25 A292 2001<br/>Format:&#160;Kitap<br/>Durum&#160;Beytepe K&uuml;t&uuml;phanesi~1<br/>