Arama Sonu&ccedil;lar&#305; Computer networks--Security measures. - Daralt&#305;lm&#305;&#351;: Computer security SirsiDynix Enterprise https://katalog.hacettepe.edu.tr/client/tr_TR/default_tr/default_tr/qu$003dComputer$002bnetworks--Security$002bmeasures.$0026qf$003dSUBJECT$002509Konu$002509Computer$002bsecurity$002509Computer$002bsecurity$0026ps$003d300?dt=list 2026-03-14T03:34:44Z Hacking Interface ent://SD_ILS/0/SD_ILS:524308 2026-03-14T03:34:44Z 2026-03-14T03:34:44Z Yazar&#160;Elbahad&#305;r, Hamza.<br/>Yer Numaras&#305;&#160;QA76.9.A25 E43 2024<br/>Format:&#160;Kitap<br/>Durum&#160;Beytepe K&uuml;t&uuml;phanesi~1<br/> Blockchain security from the bottom up : securing and preventing attacks on cryptocurrencies, decentralized applications, nfts, and smart contracts ent://SD_ILS/0/SD_ILS:597703 2026-03-14T03:34:44Z 2026-03-14T03:34:44Z Yazar&#160;Poston, Howard E., III, author.<br/>Yer Numaras&#305;&#160;QA76.9 .B56 P67 2022<br/>Elektronik Eri&#351;im&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394320691">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394320691</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Executive's guide to cyber risk : securing the future today ent://SD_ILS/0/SD_ILS:597567 2026-03-14T03:34:44Z 2026-03-14T03:34:44Z Yazar&#160;Moyo, Siegfried, author.<br/>Yer Numaras&#305;&#160;HF5548.37 .M68 2022<br/>Elektronik Eri&#351;im&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394320578">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394320578</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Tribe of hackers : cybersecurity advice from the best hackers in the world ent://SD_ILS/0/SD_ILS:595418 2026-03-14T03:34:44Z 2026-03-14T03:34:44Z Yazar&#160;Carey, Marcus J. (Cybersecurity professional), author.&#160;Jin, Jennifer, author.<br/>Yer Numaras&#305;&#160;QA76.9 .A25 C37 2019 EB<br/>Elektronik Eri&#351;im&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119643395">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119643395</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Insider threats ent://SD_ILS/0/SD_ILS:594407 2026-03-14T03:34:44Z 2026-03-14T03:34:44Z Yazar&#160;Arduin, Pierre-Emmanuel, author.<br/>Yer Numaras&#305;&#160;QA76.9 .A25<br/>Elektronik Eri&#351;im&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119419785">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119419785</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Cybersecurity essentials ent://SD_ILS/0/SD_ILS:594756 2026-03-14T03:34:44Z 2026-03-14T03:34:44Z Yazar&#160;Brooks, Charles J., author.&#160;Grow, Christopher, author.&#160;Craig, Philip, author.&#160;Short, Donald, author.<br/>Yer Numaras&#305;&#160;TK5105.59<br/>Elektronik Eri&#351;im&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119369141">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119369141</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Hacking Interface ent://SD_ILS/0/SD_ILS:513452 2026-03-14T03:34:44Z 2026-03-14T03:34:44Z Yazar&#160;Elbahad&#305;r, Hamza.<br/>Yer Numaras&#305;&#160;QA76.9.A25 E43 2016<br/>Format:&#160;Kitap<br/>Durum&#160;Beytepe K&uuml;t&uuml;phanesi~1<br/> Hacking Interface ent://SD_ILS/0/SD_ILS:317847 2026-03-14T03:34:44Z 2026-03-14T03:34:44Z Yazar&#160;Elbahad&#305;r, Hamza.<br/>Yer Numaras&#305;&#160;QA 76.9 A25 E43 2014<br/>Format:&#160;Kitap<br/>Durum&#160;Beytepe K&uuml;t&uuml;phanesi~2<br/>