Arama Sonu&ccedil;lar&#305; Computer security - Daralt&#305;lm&#305;&#351;: CRC Ekitaplar&#305; SirsiDynix Enterprise https://katalog.hacettepe.edu.tr/client/tr_TR/default_tr/default_tr/qu$003dComputer$002bsecurity$0026qf$003dLOCATION$002509Shelf$002bLocation$0025091$00253ACRCEBOOKS$002509CRC$002bEkitaplar$0025C4$0025B1$0026ic$003dtrue$0026ps$003d300?dt=list 2025-12-05T21:12:47Z Enhancing computer security with smart technology ent://SD_ILS/0/SD_ILS:544823 2025-12-05T21:12:47Z 2025-12-05T21:12:47Z Yazar&#160;Vemuri, V. Rao.<br/>Yer Numaras&#305;&#160;TK5105.59 .E62 2005<br/>Elektronik Eri&#351;im&#160;<a href="https://www.taylorfrancis.com/books/9781420031225">Click here to view.</a><br/>Format:&#160;Kitap<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Statistical methods in computer security ent://SD_ILS/0/SD_ILS:546938 2025-12-05T21:12:47Z 2025-12-05T21:12:47Z Yazar&#160;Chen, William W. S.<br/>Yer Numaras&#305;&#160;QA76.9 .A25 S737 2005<br/>Elektronik Eri&#351;im&#160;<a href="https://www.taylorfrancis.com/books/9781420030884">Click here to view.</a><br/>Format:&#160;Kitap<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> COMPUTER SECURITY LITERACY : staying safe in a digital world. ent://SD_ILS/0/SD_ILS:540788 2025-12-05T21:12:47Z 2025-12-05T21:12:47Z Yazar&#160;JACOBSON, DOUGLAS.<br/>Yer Numaras&#305;&#160;QA76.9 .A25<br/>Elektronik Eri&#351;im&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9780429108129">https://www.taylorfrancis.com/books/9780429108129</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Information security management handbook ent://SD_ILS/0/SD_ILS:539793 2025-12-05T21:12:47Z 2025-12-05T21:12:47Z Yazar&#160;Tipton, Harold F.&#160;Nozaki, Micki Krause.<br/>Yer Numaras&#305;&#160;QA76.9 .A25 I54165 2007<br/>Elektronik Eri&#351;im&#160;<a href="https://www.taylorfrancis.com/books/9781439893159">Click here to view.</a><br/>Format:&#160;Kitap<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Information security management handbook ent://SD_ILS/0/SD_ILS:542831 2025-12-05T21:12:47Z 2025-12-05T21:12:47Z Yazar&#160;Tipton, Harold F.&#160;Krause, Micki.<br/>Yer Numaras&#305;&#160;QA76.9 .A25 I54165 2003<br/>Elektronik Eri&#351;im&#160;<a href="https://www.taylorfrancis.com/books/9781420003406">Click here to view.</a><br/>Format:&#160;Kitap<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> The Electrical Engineering Handbook - Six Volume Set ent://SD_ILS/0/SD_ILS:542484 2025-12-05T21:12:47Z 2025-12-05T21:12:47Z Yazar&#160;Dorf, Richard C., editor.&#160;Taylor and Francis.<br/>Yer Numaras&#305;&#160;R857 .B54<br/>Elektronik Eri&#351;im&#160;<a href="https://www.taylorfrancis.com/books/9781420049756">Click here to view.</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Software Test Attacks to Break Mobile and Embedded Devices. ent://SD_ILS/0/SD_ILS:539635 2025-12-05T21:12:47Z 2025-12-05T21:12:47Z Yazar&#160;Hagar, Jon Duncan, author.&#160;CRC Press LLC.<br/>Yer Numaras&#305;&#160;QA76.9 .A25 H343 2017<br/>Elektronik Eri&#351;im&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9780429071911">https://www.taylorfrancis.com/books/9780429071911</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Security for Service Oriented Architectures. ent://SD_ILS/0/SD_ILS:542633 2025-12-05T21:12:47Z 2025-12-05T21:12:47Z Yazar&#160;Williams, Walter, author.&#160;CRC Press LLC.<br/>Yer Numaras&#305;&#160;TK5105.5828 .W55 2017<br/>Elektronik Eri&#351;im&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9780429072185">https://www.taylorfrancis.com/books/9780429072185</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Unauthorized Access : The Crisis in Online Privacy and Security. ent://SD_ILS/0/SD_ILS:543688 2025-12-05T21:12:47Z 2025-12-05T21:12:47Z Yazar&#160;Sloan, Robert, author.&#160;CRC Press LLC.<br/>Yer Numaras&#305;&#160;TK5105.878 .S59 2017<br/>Elektronik Eri&#351;im&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9780429093791">https://www.taylorfrancis.com/books/9780429093791</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> ORACLE IDENTITY MANAGEMENT : governance, risk, and compliance architecture, third edition. ent://SD_ILS/0/SD_ILS:544833 2025-12-05T21:12:47Z 2025-12-05T21:12:47Z Yazar&#160;POHLMAN, MARLIN B.<br/>Yer Numaras&#305;&#160;QA76.9 .A25<br/>Elektronik Eri&#351;im&#160;<a href="https://www.taylorfrancis.com/books/9780429117688">Taylor & Francis eBooks</a> Taylor & Francis <a href="https://www.taylorfrancis.com/books/9780429117688">https://www.taylorfrancis.com/books/9780429117688</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> SECURITY STRATEGY : from requirements to reality. ent://SD_ILS/0/SD_ILS:545098 2025-12-05T21:12:47Z 2025-12-05T21:12:47Z Yazar&#160;STACKPOLE, BILL.<br/>Yer Numaras&#305;&#160;QA76.9 .A25<br/>Elektronik Eri&#351;im&#160;<a href="https://www.taylorfrancis.com/books/9780429152160">Taylor & Francis eBooks</a> Taylor & Francis <a href="https://www.taylorfrancis.com/books/9780429152160">https://www.taylorfrancis.com/books/9780429152160</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Information security fundamentals ent://SD_ILS/0/SD_ILS:539922 2025-12-05T21:12:47Z 2025-12-05T21:12:47Z Yazar&#160;Peltier, Thomas R.<br/>Yer Numaras&#305;&#160;QA76.9 .A25<br/>Elektronik Eri&#351;im&#160;<a href="https://www.taylorfrancis.com/books/9780429130281">Taylor & Francis eBooks</a> Taylor & Francis <a href="https://www.taylorfrancis.com/books/9780429130281">https://www.taylorfrancis.com/books/9780429130281</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> CYBER SECURITY ESSENTIALS ent://SD_ILS/0/SD_ILS:540775 2025-12-05T21:12:47Z 2025-12-05T21:12:47Z Yer Numaras&#305;&#160;QA76.9 .A25<br/>Elektronik Eri&#351;im&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9780429106637">https://www.taylorfrancis.com/books/9780429106637</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> DEFENSE AGAINST THE BLACK ARTS : how hackers do what they do and how to protect against it. ent://SD_ILS/0/SD_ILS:542757 2025-12-05T21:12:47Z 2025-12-05T21:12:47Z Yazar&#160;VARSALONE, JESSE.<br/>Yer Numaras&#305;&#160;TK5105.59<br/>Elektronik Eri&#351;im&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9780429103766">https://www.taylorfrancis.com/books/9780429103766</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Managing a network vulnerability assessment ent://SD_ILS/0/SD_ILS:543286 2025-12-05T21:12:47Z 2025-12-05T21:12:47Z Yazar&#160;PELTIER, THOMAS R.<br/>Yer Numaras&#305;&#160;TK5105.59<br/>Elektronik Eri&#351;im&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9780429210747">https://www.taylorfrancis.com/books/9780429210747</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Case studies in secure computing : achievements and trends ent://SD_ILS/0/SD_ILS:541687 2025-12-05T21:12:47Z 2025-12-05T21:12:47Z Yazar&#160;Issac, Biju, editor.&#160;Israr, Nauman, editor.<br/>Yer Numaras&#305;&#160;QA76.9 .A25 C426 2015<br/>Elektronik Eri&#351;im&#160;<a href="https://www.taylorfrancis.com/books/9781482207071">Click here to view.</a><br/>Format:&#160;Kitap<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Practical cryptography : algorithms and implementations using C++ ent://SD_ILS/0/SD_ILS:540133 2025-12-05T21:12:47Z 2025-12-05T21:12:47Z Yazar&#160;Azad, Saiful, editor.&#160;Pathan, Al-Sakib Khan, editor.<br/>Yer Numaras&#305;&#160;QA76.9 .A25 P725 2015<br/>Elektronik Eri&#351;im&#160;<a href="https://www.taylorfrancis.com/books/9781482228908">Click here to view.</a><br/>Format:&#160;Kitap<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Ethical hacking and penetration testing guide ent://SD_ILS/0/SD_ILS:540444 2025-12-05T21:12:47Z 2025-12-05T21:12:47Z Yazar&#160;Baloch, Rafay, author.<br/>Yer Numaras&#305;&#160;QA76.9 .A25 B356 2014<br/>Elektronik Eri&#351;im&#160;<a href="https://www.taylorfrancis.com/books/9781482231625">Click here to view.</a><br/>Format:&#160;Kitap<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Biometric technology : authentication, biocryptography, and cloud-based architecture ent://SD_ILS/0/SD_ILS:540423 2025-12-05T21:12:47Z 2025-12-05T21:12:47Z Yazar&#160;Das, Ravindra, author.<br/>Yer Numaras&#305;&#160;TK7882 .B56 D37 2014<br/>Elektronik Eri&#351;im&#160;<a href="https://www.taylorfrancis.com/books/9781466592469">Click here to view.</a><br/>Format:&#160;Kitap<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Control engineering and information systems ent://SD_ILS/0/SD_ILS:541380 2025-12-05T21:12:47Z 2025-12-05T21:12:47Z Yazar&#160;Liu, Zhijing, editor.&#160;International Conference on Control Engineering and Information System (2014 : Yueyang, Hunan, China)<br/>Yer Numaras&#305;&#160;TJ213 .C66 2015<br/>Elektronik Eri&#351;im&#160;<a href="https://www.taylorfrancis.com/books/9781315724386">Click here to view.</a><br/>Format:&#160;Kitap<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Cyber and electromagnetic threats in modern relay protection ent://SD_ILS/0/SD_ILS:543446 2025-12-05T21:12:47Z 2025-12-05T21:12:47Z Yazar&#160;Gurevich, Vladimir, 1956, author.<br/>Yer Numaras&#305;&#160;TK2861 .G87 2015<br/>Elektronik Eri&#351;im&#160;<a href="https://www.taylorfrancis.com/books/9781482264326">Click here to view.</a><br/>Format:&#160;Kitap<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Hardware security : design, threats, and safeguards ent://SD_ILS/0/SD_ILS:543620 2025-12-05T21:12:47Z 2025-12-05T21:12:47Z Yazar&#160;Mukhopadhyay, Debdeep, author.&#160;Subhra, Rajat, author.<br/>Yer Numaras&#305;&#160;QA76.9 .A25 M85 2015<br/>Elektronik Eri&#351;im&#160;<a href="https://www.taylorfrancis.com/books/9781439895849">Click here to view.</a><br/>Format:&#160;Kitap<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Cybercrime : investigating high-technology computer crime ent://SD_ILS/0/SD_ILS:544523 2025-12-05T21:12:47Z 2025-12-05T21:12:47Z Yazar&#160;Moore, Robert, 1976-, author.<br/>Yer Numaras&#305;&#160;HV8079 .C65 M66 2015<br/>Elektronik Eri&#351;im&#160;<a href="https://www.taylorfrancis.com/books/9781315721767">Click here to view.</a><br/>Format:&#160;Kitap<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Security for multihop wireless networks ent://SD_ILS/0/SD_ILS:538652 2025-12-05T21:12:47Z 2025-12-05T21:12:47Z Yazar&#160;Khan, Shafiullah, editor.&#160;Lloret Mauri, Jaime, editor.<br/>Yer Numaras&#305;&#160;TK5105.59 .S43 2014<br/>Elektronik Eri&#351;im&#160;<a href="https://www.taylorfrancis.com/books/9781466578043">Click here to view.</a><br/>Format:&#160;Kitap<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Security management : a critical thinking approach ent://SD_ILS/0/SD_ILS:539725 2025-12-05T21:12:47Z 2025-12-05T21:12:47Z Yazar&#160;Land, Michael (Industrial engineer), author.&#160;Ricks, Truett A., author.&#160;Ricks, Bob, author.<br/>Yer Numaras&#305;&#160;HD61.5 .L36 2014<br/>Elektronik Eri&#351;im&#160;<a href="https://www.taylorfrancis.com/books/9781466561786">Click here to view.</a><br/>Format:&#160;Kitap<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> What every engineer should know about cyber security and digital forensics ent://SD_ILS/0/SD_ILS:539726 2025-12-05T21:12:47Z 2025-12-05T21:12:47Z Yazar&#160;DeFranco, Joanna F., author.<br/>Yer Numaras&#305;&#160;TK5105.59 .D44 2014<br/>Elektronik Eri&#351;im&#160;<a href="https://www.taylorfrancis.com/books/9781466564541">Click here to view.</a><br/>Format:&#160;Kitap<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> The state of the art in intrusion prevention and detection ent://SD_ILS/0/SD_ILS:543676 2025-12-05T21:12:47Z 2025-12-05T21:12:47Z Yazar&#160;Pathan, Al-Sakib Khan, editor.<br/>Yer Numaras&#305;&#160;QA76.9 .A25 S7354 2014<br/>Elektronik Eri&#351;im&#160;<a href="https://www.taylorfrancis.com/books/9781482203523">Click here to view.</a><br/>Format:&#160;Kitap<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Network anomaly detection : a machine learning perspective ent://SD_ILS/0/SD_ILS:547748 2025-12-05T21:12:47Z 2025-12-05T21:12:47Z Yazar&#160;Bhattacharyya, Dhruba K., author.&#160;Kalita, Jugal Kumar, author.<br/>Yer Numaras&#305;&#160;TK5105.59 .B474 2014<br/>Elektronik Eri&#351;im&#160;<a href="https://www.taylorfrancis.com/books/9781466582095">Click here to view.</a><br/>Format:&#160;Kitap<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Distributed networks : intelligence, security, and applications ent://SD_ILS/0/SD_ILS:540452 2025-12-05T21:12:47Z 2025-12-05T21:12:47Z Yazar&#160;Memon, Qurban Ali, editor.<br/>Yer Numaras&#305;&#160;QA76.9 .D5 D55626 2014<br/>Elektronik Eri&#351;im&#160;<a href="https://www.taylorfrancis.com/books/9781315216218">Click here to view.</a><br/>Format:&#160;Kitap<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> How i discovered World War II's greatest spy and other stories of intelligence and code ent://SD_ILS/0/SD_ILS:540734 2025-12-05T21:12:47Z 2025-12-05T21:12:47Z Yazar&#160;Kahn, David, eauthor.&#160;Taylor and Francis.<br/>Yer Numaras&#305;&#160;D810 .S7<br/>Elektronik Eri&#351;im&#160;<a href="https://www.taylorfrancis.com/books/9781466562042">Click here to view.</a><br/>Format:&#160;Kitap<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Conducting network penetration and espionage in a global environment ent://SD_ILS/0/SD_ILS:541163 2025-12-05T21:12:47Z 2025-12-05T21:12:47Z Yazar&#160;Middleton, Bruce, 1953, author.<br/>Yer Numaras&#305;&#160;TK5105.59 .M53 2014<br/>Elektronik Eri&#351;im&#160;<a href="https://www.taylorfrancis.com/books/9781482206487">Click here to view.</a><br/>Format:&#160;Kitap<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> The frugal CISO : using innovation and smart approaches to maximize your security posture ent://SD_ILS/0/SD_ILS:542652 2025-12-05T21:12:47Z 2025-12-05T21:12:47Z Yazar&#160;Anderson, Kerry Ann, author.<br/>Yer Numaras&#305;&#160;HD30.2 .A532 2014<br/>Elektronik Eri&#351;im&#160;<a href="https://www.taylorfrancis.com/books/9781482220087">Click here to view.</a><br/>Format:&#160;Kitap<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Anonymous communication networks : protecting privacy on the web ent://SD_ILS/0/SD_ILS:543619 2025-12-05T21:12:47Z 2025-12-05T21:12:47Z Yazar&#160;Peng, Kun, author.<br/>Yer Numaras&#305;&#160;TK5105.59 .P463 2014<br/>Elektronik Eri&#351;im&#160;<a href="https://www.taylorfrancis.com/books/9781439881606">Click here to view.</a><br/>Format:&#160;Kitap<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Security without obscurity : a guide to confidentiality, authentication, and integrity ent://SD_ILS/0/SD_ILS:544118 2025-12-05T21:12:47Z 2025-12-05T21:12:47Z Yazar&#160;Stapleton, Jeffrey James, author.<br/>Yer Numaras&#305;&#160;QA76.9 .A25 S734 2014<br/>Elektronik Eri&#351;im&#160;<a href="https://www.taylorfrancis.com/books/9781466592155">Click here to view.</a><br/>Format:&#160;Kitap<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Official (ISC)2 guide to the ISSAP CBK ent://SD_ILS/0/SD_ILS:543523 2025-12-05T21:12:47Z 2025-12-05T21:12:47Z Yazar&#160;Gordon, Adam.<br/>Yer Numaras&#305;&#160;QA76.3 .H364 2014<br/>Elektronik Eri&#351;im&#160;<a href="https://www.taylorfrancis.com/books/9781466579019">Click here to view.</a><br/>Format:&#160;Kitap<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Official (ISC)2 guide to the CISSP CBK ent://SD_ILS/0/SD_ILS:538649 2025-12-05T21:12:47Z 2025-12-05T21:12:47Z Yazar&#160;Tipton, Harold F., editor. of compilation.&#160;Hernandez, Steven, editor. of compilation.<br/>Yer Numaras&#305;&#160;QA76.3 .T565 2013<br/>Elektronik Eri&#351;im&#160;<a href="https://www.taylorfrancis.com/books/9781466569782">Click here to view.</a><br/>Format:&#160;Kitap<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Cyber power : crime, conflict and security in cyberspace ent://SD_ILS/0/SD_ILS:538747 2025-12-05T21:12:47Z 2025-12-05T21:12:47Z Yazar&#160;Ghernaouti-Helie, Solange, 1958, author.<br/>Yer Numaras&#305;&#160;HV6773 .G44 2013<br/>Elektronik Eri&#351;im&#160;<a href="https://www.taylorfrancis.com/books/9781466573055">Click here to view.</a><br/>Format:&#160;Kitap<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Automatic defense against zero-day polymorphic worms in communication networks ent://SD_ILS/0/SD_ILS:539715 2025-12-05T21:12:47Z 2025-12-05T21:12:47Z Yazar&#160;Mohammed, Mohssen, 1982, author.&#160;Pathan, Al-Sakib Khan.<br/>Yer Numaras&#305;&#160;QA76.76 .C68 M64 2013<br/>Elektronik Eri&#351;im&#160;<a href="https://www.taylorfrancis.com/books/9781466557284">Click here to view.</a><br/>Format:&#160;Kitap<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> PRAGMATIC security metrics : applying metametrics to information security ent://SD_ILS/0/SD_ILS:541797 2025-12-05T21:12:47Z 2025-12-05T21:12:47Z Yazar&#160;Brotby, W. Krag., author.&#160;Hinson, Gary.&#160;Kabay, Michel E.<br/>Yer Numaras&#305;&#160;HD30.38 .B76 2013<br/>Elektronik Eri&#351;im&#160;<a href="https://www.taylorfrancis.com/books/9781439881538">Click here to view.</a><br/>Format:&#160;Kitap<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Advances in usability evaluation ent://SD_ILS/0/SD_ILS:544721 2025-12-05T21:12:47Z 2025-12-05T21:12:47Z Yazar&#160;Rebelo, Francesco.&#160;Soares, Marcelo Marcio.<br/>Yer Numaras&#305;&#160;TA167 .A375 2013<br/>Elektronik Eri&#351;im&#160;<a href="https://www.taylorfrancis.com/books/9781466560550">Click here to view.</a><br/>Format:&#160;Kitap<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Distributed sensor networks ent://SD_ILS/0/SD_ILS:545126 2025-12-05T21:12:47Z 2025-12-05T21:12:47Z Yazar&#160;Iyengar, S. S. (Sundararaja S.)&#160;Brooks, R. R. (Richard R.)<br/>Yer Numaras&#305;&#160;TK7872 .D48 D5734 2013<br/>Elektronik Eri&#351;im&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9780429165818">https://www.taylorfrancis.com/books/9780429165818</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Information security policy development for compliance : ISO/IEC 27001, NIST SP 800-53, HIPAA standard, PCI DSS V2.0, and AUP V5.0 ent://SD_ILS/0/SD_ILS:545128 2025-12-05T21:12:47Z 2025-12-05T21:12:47Z Yazar&#160;Williams, Barry L., author.<br/>Yer Numaras&#305;&#160;QA76.9 .A25 .W5495 2013<br/>Elektronik Eri&#351;im&#160;<a href="https://www.taylorfrancis.com/books/9781466580596">Click here to view.</a><br/>Format:&#160;Kitap<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Iris biometric model for secured network access ent://SD_ILS/0/SD_ILS:546623 2025-12-05T21:12:47Z 2025-12-05T21:12:47Z Yazar&#160;Khoury, Franjieh El., author.<br/>Yer Numaras&#305;&#160;TK7882 .B56 K46 2013<br/>Elektronik Eri&#351;im&#160;<a href="https://www.taylorfrancis.com/books/9781466502147">Click here to view.</a><br/>Format:&#160;Kitap<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> The complete book of data anonymization : from planning to implementation ent://SD_ILS/0/SD_ILS:540169 2025-12-05T21:12:47Z 2025-12-05T21:12:47Z Yazar&#160;Raghunathan, Balaji., author.<br/>Yer Numaras&#305;&#160;QA76.9 .A25 R338 2013<br/>Elektronik Eri&#351;im&#160;<a href="https://www.taylorfrancis.com/books/9781439877319">Click here to view.</a><br/>Format:&#160;Kitap<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Official (ISC)[superscript 2] guide to the CAP CBK ent://SD_ILS/0/SD_ILS:540750 2025-12-05T21:12:47Z 2025-12-05T21:12:47Z Yazar&#160;Howard, Patrick D., author.<br/>Yer Numaras&#305;&#160;TK5105.59 .H673 2013<br/>Elektronik Eri&#351;im&#160;<a href="https://www.taylorfrancis.com/books/9781439820766">Click here to view.</a><br/>Format:&#160;Kitap<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Digital forensics for handheld devices ent://SD_ILS/0/SD_ILS:541429 2025-12-05T21:12:47Z 2025-12-05T21:12:47Z Yazar&#160;Doherty, Eamon P., author.<br/>Yer Numaras&#305;&#160;HV8079 .C65 D64 2013<br/>Elektronik Eri&#351;im&#160;<a href="https://www.taylorfrancis.com/books/9781439898789">Click here to view.</a><br/>Format:&#160;Kitap<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Responsive Security ent://SD_ILS/0/SD_ILS:542438 2025-12-05T21:12:47Z 2025-12-05T21:12:47Z Yazar&#160;Kang, Meng-Chow, author.<br/>Yer Numaras&#305;&#160;HF5548.37<br/>Elektronik Eri&#351;im&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781315145907">https://www.taylorfrancis.com/books/9781315145907</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Handbook on mobile and ubiquitous computing : status and perspective ent://SD_ILS/0/SD_ILS:543591 2025-12-05T21:12:47Z 2025-12-05T21:12:47Z Yazar&#160;Yang, Laurence Tianruo.&#160;Syukur, Evi.&#160;Loke, Seng.<br/>Yer Numaras&#305;&#160;QA76.59 .H364 2013<br/>Elektronik Eri&#351;im&#160;<a href="https://www.taylorfrancis.com/books/9781439848128">Click here to view.</a><br/>Format:&#160;Kitap<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Network attacks and defenses : a hands-on approach ent://SD_ILS/0/SD_ILS:544150 2025-12-05T21:12:47Z 2025-12-05T21:12:47Z Yazar&#160;Trabelsi, Zouheir.<br/>Yer Numaras&#305;&#160;TK5105.59 .N3365 2013<br/>Elektronik Eri&#351;im&#160;<a href="https://www.taylorfrancis.com/books/9781466517974">Click here to view.</a><br/>Format:&#160;Kitap<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Security for wireless sensor networks using identity-based cryptography ent://SD_ILS/0/SD_ILS:544612 2025-12-05T21:12:47Z 2025-12-05T21:12:47Z Yazar&#160;Patil, Harsh Kupwade., author.&#160;Szygenda, Stephen A.<br/>Yer Numaras&#305;&#160;QA76.9 .A25 P38 2013<br/>Elektronik Eri&#351;im&#160;<a href="https://www.taylorfrancis.com/books/9781439869024">Click here to view.</a><br/>Format:&#160;Kitap<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Handbook of SCADA/control systems security ent://SD_ILS/0/SD_ILS:547855 2025-12-05T21:12:47Z 2025-12-05T21:12:47Z Yazar&#160;Radvanovsky, Robert.&#160;Brodsky, Jacob.<br/>Yer Numaras&#305;&#160;TK5105.59 .H3532 2013<br/>Elektronik Eri&#351;im&#160;<a href="https://www.taylorfrancis.com/books/9781466502277">Click here to view.</a><br/>Format:&#160;Kitap<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Femtocells : secure communication and networking ent://SD_ILS/0/SD_ILS:547864 2025-12-05T21:12:47Z 2025-12-05T21:12:47Z Yazar&#160;Wong, Marcus, author.<br/>Yer Numaras&#305;&#160;TK5105.75 .W664 2013 EB<br/>Elektronik Eri&#351;im&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003338178">https://www.taylorfrancis.com/books/9781003338178</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Discrete dynamical systems and chaotic machines : theory and applications ent://SD_ILS/0/SD_ILS:545715 2025-12-05T21:12:47Z 2025-12-05T21:12:47Z Yazar&#160;Bahi, Jacques Mohcine., author.&#160;Guyeux, Christophe.<br/>Yer Numaras&#305;&#160;QA76.9 .A25 B344 2013<br/>Elektronik Eri&#351;im&#160;<a href="https://www.taylorfrancis.com/books/9781466554511">Click here to view.</a><br/>Format:&#160;Kitap<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> The complete guide to physical security ent://SD_ILS/0/SD_ILS:545960 2025-12-05T21:12:47Z 2025-12-05T21:12:47Z Yazar&#160;Baker, Paul, 1958, author.&#160;Benny, Daniel J.<br/>Yer Numaras&#305;&#160;HV8290 .B34 2013<br/>Elektronik Eri&#351;im&#160;<a href="https://www.taylorfrancis.com/books/9781420099645">Click here to view.</a><br/>Format:&#160;Kitap<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> RC4 stream cipher and its variants ent://SD_ILS/0/SD_ILS:538754 2025-12-05T21:12:47Z 2025-12-05T21:12:47Z Yazar&#160;Paul, Goutam., author.&#160;Maitra, Subhamoy, 1970-<br/>Yer Numaras&#305;&#160;QA76.9 .A25 P385 2012<br/>Elektronik Eri&#351;im&#160;<a href="https://www.taylorfrancis.com/books/9781439831373">Click here to view.</a><br/>Format:&#160;Kitap<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Information security management handbook ent://SD_ILS/0/SD_ILS:538782 2025-12-05T21:12:47Z 2025-12-05T21:12:47Z Yazar&#160;Tipton, Harold F.&#160;Nozaki, Micki Krause.<br/>Yer Numaras&#305;&#160;QA76.9 .A25 I54165<br/>Elektronik Eri&#351;im&#160;<a href="https://www.taylorfrancis.com/books/9781439853467">Click here to view.</a><br/>Format:&#160;Kitap<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Cybersecurity for industrial control systems : SCADA, DCS, PLC, HMI, and SIS ent://SD_ILS/0/SD_ILS:543119 2025-12-05T21:12:47Z 2025-12-05T21:12:47Z Yazar&#160;Macaulay, Tyson., author.&#160;Singer, Bryan.<br/>Yer Numaras&#305;&#160;TS156.8 .M328 2012<br/>Elektronik Eri&#351;im&#160;<a href="https://www.taylorfrancis.com/books/9781439801987">Click here to view.</a><br/>Format:&#160;Kitap<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> The 7 qualities of highly secure software ent://SD_ILS/0/SD_ILS:544951 2025-12-05T21:12:47Z 2025-12-05T21:12:47Z Yazar&#160;Paul, Mano., author.<br/>Yer Numaras&#305;&#160;QA76.9 .A25 P38 2012<br/>Elektronik Eri&#351;im&#160;<a href="https://www.taylorfrancis.com/books/9781439814475">Click here to view.</a><br/>Format:&#160;Kitap<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Cybersecurity : public sector threats and responses ent://SD_ILS/0/SD_ILS:545406 2025-12-05T21:12:47Z 2025-12-05T21:12:47Z Yazar&#160;Andreasson, Kim J.<br/>Yer Numaras&#305;&#160;TK5105.59 .C927 2012<br/>Elektronik Eri&#351;im&#160;<a href="https://www.taylorfrancis.com/books/9781439846643">Click here to view.</a><br/>Format:&#160;Kitap<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Secure and resilient software : requirements, test cases, and testing methods ent://SD_ILS/0/SD_ILS:540156 2025-12-05T21:12:47Z 2025-12-05T21:12:47Z Yazar&#160;Merkow, Mark S., author.&#160;Raghavan, Lakshmikanth.<br/>Yer Numaras&#305;&#160;QA76.76 .T48 M47 2012<br/>Elektronik Eri&#351;im&#160;<a href="https://www.taylorfrancis.com/books/9781439866221">Click here to view.</a><br/>Format:&#160;Kitap<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Network and application security fundamentals and practices ent://SD_ILS/0/SD_ILS:541627 2025-12-05T21:12:47Z 2025-12-05T21:12:47Z Yazar&#160;Ganguly, Debashis., author.&#160;Lahiri, Shibamouli.<br/>Yer Numaras&#305;&#160;TK5105.59 .G36 2012<br/>Elektronik Eri&#351;im&#160;<a href="https://www.taylorfrancis.com/books/9781466502451">Click here to view.</a><br/>Format:&#160;Kitap<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Visual cryptography and secret image sharing ent://SD_ILS/0/SD_ILS:539468 2025-12-05T21:12:47Z 2025-12-05T21:12:47Z Yazar&#160;Cimato, Stelvio.&#160;Yang, Ching-Nung.<br/>Yer Numaras&#305;&#160;TA1637 .V544 2012<br/>Elektronik Eri&#351;im&#160;<a href="https://www.taylorfrancis.com/books/9781315217659">Click here to view.</a><br/>Format:&#160;Kitap<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Handbook on soft computing for video surveillance ent://SD_ILS/0/SD_ILS:539764 2025-12-05T21:12:47Z 2025-12-05T21:12:47Z Yazar&#160;Pal, Sankar K.&#160;Petrosino, Alfredo.&#160;Maddalena, Lucia.<br/>Yer Numaras&#305;&#160;QA76.9 .S63 H36 2012<br/>Elektronik Eri&#351;im&#160;<a href="https://www.taylorfrancis.com/books/9781439856857">Click here to view.</a><br/>Format:&#160;Kitap<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Data mining tools for malware detection ent://SD_ILS/0/SD_ILS:545796 2025-12-05T21:12:47Z 2025-12-05T21:12:47Z Yazar&#160;Masud, Mehedy., author.&#160;Khan, Latifur.&#160;Thuraisingham, Bhavani M.<br/>Yer Numaras&#305;&#160;QA76.9 .D343 M385 2012<br/>Elektronik Eri&#351;im&#160;<a href="https://www.taylorfrancis.com/books/9781439854556">Click here to view.</a><br/>Format:&#160;Kitap<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> CISO's guide to penetration testing : a framework to plan, manage, and maximize benefits ent://SD_ILS/0/SD_ILS:545161 2025-12-05T21:12:47Z 2025-12-05T21:12:47Z Yazar&#160;Tiller, James S., author.<br/>Yer Numaras&#305;&#160;QA76.9 .A25 T56 2012<br/>Elektronik Eri&#351;im&#160;<a href="https://www.taylorfrancis.com/books/9781439880289">Click here to view.</a><br/>Format:&#160;Kitap<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Asset protection through security awareness ent://SD_ILS/0/SD_ILS:546687 2025-12-05T21:12:47Z 2025-12-05T21:12:47Z Yazar&#160;Speed, Tyler Justin., author.<br/>Yer Numaras&#305;&#160;TK5105.59 .S643 2012<br/>Elektronik Eri&#351;im&#160;<a href="https://www.taylorfrancis.com/books/9781439809839">Click here to view.</a><br/>Format:&#160;Kitap<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Official (ISC)2 guide to the CSSLP ent://SD_ILS/0/SD_ILS:541754 2025-12-05T21:12:47Z 2025-12-05T21:12:47Z Yazar&#160;Paul, Mano., author.<br/>Yer Numaras&#305;&#160;QA76.76 .D47 P3775 2011<br/>Elektronik Eri&#351;im&#160;<a href="https://www.taylorfrancis.com/books/9781439826065">Click here to view.</a><br/>Format:&#160;Kitap<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Official (ISC)2 guide to the SSCP CBK ent://SD_ILS/0/SD_ILS:543369 2025-12-05T21:12:47Z 2025-12-05T21:12:47Z Yazar&#160;Tipton, Harold F.&#160;International Information Systems Security Certification Consortium.<br/>Yer Numaras&#305;&#160;QA76.3 .O3845 2011<br/>Elektronik Eri&#351;im&#160;<a href="https://www.taylorfrancis.com/books/9781439804841">Click here to view.</a><br/>Format:&#160;Kitap<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Security of self-organizing networks : MANET, WSN, WMN, VANET ent://SD_ILS/0/SD_ILS:544711 2025-12-05T21:12:47Z 2025-12-05T21:12:47Z Yazar&#160;Pathan, Al-Sakib Khan.<br/>Yer Numaras&#305;&#160;TK5105.77 .S43 2011<br/>Elektronik Eri&#351;im&#160;<a href="https://www.taylorfrancis.com/books/9781439819203">Click here to view.</a><br/>Format:&#160;Kitap<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Secure semantic service-oriented systems ent://SD_ILS/0/SD_ILS:540399 2025-12-05T21:12:47Z 2025-12-05T21:12:47Z Yazar&#160;Thuraisingham, Bhavani M., author.<br/>Yer Numaras&#305;&#160;TK5105.5828 .T48 2011<br/>Elektronik Eri&#351;im&#160;<a href="https://www.taylorfrancis.com/books/9781420073324">Click here to view.</a><br/>Format:&#160;Kitap<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Data mining and machine learning in cybersecurity ent://SD_ILS/0/SD_ILS:540614 2025-12-05T21:12:47Z 2025-12-05T21:12:47Z Yazar&#160;Dua, Sumeet., author.&#160;Du, Xian.<br/>Yer Numaras&#305;&#160;QA76.9 .D343 D825 2011<br/>Elektronik Eri&#351;im&#160;<a href="https://www.taylorfrancis.com/books/9781439839430">Click here to view.</a><br/>Format:&#160;Kitap<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Practical risk management for the CIO ent://SD_ILS/0/SD_ILS:541595 2025-12-05T21:12:47Z 2025-12-05T21:12:47Z Yazar&#160;Scherling, Mark., author.<br/>Yer Numaras&#305;&#160;HF5548.37 .S34 2011<br/>Elektronik Eri&#351;im&#160;<a href="https://www.taylorfrancis.com/books/9781439856543">Click here to view.</a><br/>Format:&#160;Kitap<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> The security risk assessment handbook : a complete guide for performing security risk assessments ent://SD_ILS/0/SD_ILS:539743 2025-12-05T21:12:47Z 2025-12-05T21:12:47Z Yazar&#160;Landoll, Douglas J., author.<br/>Yer Numaras&#305;&#160;HF5548.37 .L358 2011<br/>Elektronik Eri&#351;im&#160;<a href="https://www.taylorfrancis.com/books/9781439821497">Click here to view.</a><br/>Format:&#160;Kitap<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Security and policy driven computing ent://SD_ILS/0/SD_ILS:539761 2025-12-05T21:12:47Z 2025-12-05T21:12:47Z Yazar&#160;Liu, Lei, 1968, author.<br/>Yer Numaras&#305;&#160;QA76.9 .A25 L587 2011<br/>Elektronik Eri&#351;im&#160;<a href="https://www.taylorfrancis.com/books/9781439825808">Click here to view.</a><br/>Format:&#160;Kitap<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> FISMA principles and best practices : beyond compliance ent://SD_ILS/0/SD_ILS:539841 2025-12-05T21:12:47Z 2025-12-05T21:12:47Z Yazar&#160;Howard, Patrick D., author.<br/>Yer Numaras&#305;&#160;QA76.9 .A25 H69 2011<br/>Elektronik Eri&#351;im&#160;<a href="https://www.taylorfrancis.com/books/9781420078305">Click here to view.</a><br/>Format:&#160;Kitap<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Security patch management ent://SD_ILS/0/SD_ILS:542763 2025-12-05T21:12:47Z 2025-12-05T21:12:47Z Yazar&#160;Nicastro, Felicia M., author.<br/>Yer Numaras&#305;&#160;QA76.9 .A25 N53 2011<br/>Elektronik Eri&#351;im&#160;<a href="https://www.taylorfrancis.com/books/9781439825006">Click here to view.</a><br/>Format:&#160;Kitap<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Honeypot : a new paradigm to information security ent://SD_ILS/0/SD_ILS:545590 2025-12-05T21:12:47Z 2025-12-05T21:12:47Z Yazar&#160;Joshi, R. C., author.&#160;Sardana, Anjali.<br/>Yer Numaras&#305;&#160;QA76.9 .A25 J66 2011<br/>Elektronik Eri&#351;im&#160;<a href="https://www.taylorfrancis.com/books/9781439869994">Click here to view.</a><br/>Format:&#160;Kitap<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Security de-engineering : solving the problems in information risk management ent://SD_ILS/0/SD_ILS:545608 2025-12-05T21:12:47Z 2025-12-05T21:12:47Z Yazar&#160;Tibble, Ian., author.<br/>Yer Numaras&#305;&#160;HF5548.37 .T53 2011<br/>Elektronik Eri&#351;im&#160;<a href="https://www.taylorfrancis.com/books/9781439868355">Click here to view.</a><br/>Format:&#160;Kitap<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Adaptive security management architecture ent://SD_ILS/0/SD_ILS:541852 2025-12-05T21:12:47Z 2025-12-05T21:12:47Z Yazar&#160;Tiller, James S., author.<br/>Yer Numaras&#305;&#160;QA76.9 .A25 T55 2011<br/>Elektronik Eri&#351;im&#160;<a href="https://www.taylorfrancis.com/books/9781420013375">Click here to view.</a><br/>Format:&#160;Kitap<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Official (ISC)2 guide to the ISSMP CBK ent://SD_ILS/0/SD_ILS:544375 2025-12-05T21:12:47Z 2025-12-05T21:12:47Z Yazar&#160;Tipton, Harold F.<br/>Yer Numaras&#305;&#160;QA76.9 .A25 O34 2011<br/>Elektronik Eri&#351;im&#160;<a href="https://www.taylorfrancis.com/books/9781420094442">Click here to view.</a><br/>Format:&#160;Kitap<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Official (ISC)[superscript 2] guide to the ISSAP CBK ent://SD_ILS/0/SD_ILS:544376 2025-12-05T21:12:47Z 2025-12-05T21:12:47Z Yazar&#160;Tipton, Harold F.&#160;International Information Systems Security Certification Consortium.<br/>Yer Numaras&#305;&#160;QA76.3 .O384 2011<br/>Elektronik Eri&#351;im&#160;<a href="https://www.taylorfrancis.com/books/9781439800980">Click here to view.</a><br/>Format:&#160;Kitap<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Machine learning forensics for law enforcement, security, and intelligence ent://SD_ILS/0/SD_ILS:544765 2025-12-05T21:12:47Z 2025-12-05T21:12:47Z Yazar&#160;Mena, Jesus., author.<br/>Yer Numaras&#305;&#160;HV8073 .M395 2011<br/>Elektronik Eri&#351;im&#160;<a href="https://www.taylorfrancis.com/books/9781439860700">Click here to view.</a><br/>Format:&#160;Kitap<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Information security risk analysis ent://SD_ILS/0/SD_ILS:538713 2025-12-05T21:12:47Z 2025-12-05T21:12:47Z Yazar&#160;Peltier, Thomas R., author.<br/>Yer Numaras&#305;&#160;QA76.9 .A25 P429 2010<br/>Elektronik Eri&#351;im&#160;<a href="https://www.taylorfrancis.com/books/9781439839577">Click here to view.</a><br/>Format:&#160;Kitap<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Cryptanalysis of RSA and its variants ent://SD_ILS/0/SD_ILS:542078 2025-12-05T21:12:47Z 2025-12-05T21:12:47Z Yazar&#160;Hinek, M. Jason., author.<br/>Yer Numaras&#305;&#160;TK5102.94 .H56 2010<br/>Elektronik Eri&#351;im&#160;<a href="https://www.taylorfrancis.com/books/9781420075199">Click here to view.</a><br/>Format:&#160;Kitap<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Handbook of financial cryptography and security ent://SD_ILS/0/SD_ILS:542098 2025-12-05T21:12:47Z 2025-12-05T21:12:47Z Yazar&#160;Rosenberg, Burton.<br/>Yer Numaras&#305;&#160;HG1710 .H34 2010<br/>Elektronik Eri&#351;im&#160;<a href="https://www.taylorfrancis.com/books/9781420059823">Click here to view.</a><br/>Format:&#160;Kitap<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Secure and resilient software development ent://SD_ILS/0/SD_ILS:545097 2025-12-05T21:12:47Z 2025-12-05T21:12:47Z Yazar&#160;Merkow, Mark S., author.&#160;Raghavan, Lakshmikanth.<br/>Yer Numaras&#305;&#160;QA76.76 .D47 M466 2010<br/>Elektronik Eri&#351;im&#160;<a href="https://www.taylorfrancis.com/books/9781439826973">Click here to view.</a><br/>Format:&#160;Kitap<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Risk analysis and security countermeasure selection ent://SD_ILS/0/SD_ILS:539402 2025-12-05T21:12:47Z 2025-12-05T21:12:47Z Yazar&#160;Norman, Thomas L., author.<br/>Yer Numaras&#305;&#160;HV8290 .N67 2010<br/>Elektronik Eri&#351;im&#160;<a href="https://www.taylorfrancis.com/books/9781420078718">Click here to view.</a><br/>Format:&#160;Kitap<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Managing an information security and privacy awareness and training program ent://SD_ILS/0/SD_ILS:538947 2025-12-05T21:12:47Z 2025-12-05T21:12:47Z Yazar&#160;Herold, Rebecca., author.<br/>Yer Numaras&#305;&#160;QA76.9 .A25 H46 2010<br/>Elektronik Eri&#351;im&#160;<a href="https://www.taylorfrancis.com/books/9781439815465">Click here to view.</a><br/>Format:&#160;Kitap<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> The executive MBA in information security ent://SD_ILS/0/SD_ILS:539948 2025-12-05T21:12:47Z 2025-12-05T21:12:47Z Yazar&#160;Trinckes, John J., author.<br/>Yer Numaras&#305;&#160;HF5548.37 .T75 2010<br/>Elektronik Eri&#351;im&#160;<a href="https://www.taylorfrancis.com/books/9781439810088">Click here to view.</a><br/>Format:&#160;Kitap<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Information security management handbook. Volume 4 ent://SD_ILS/0/SD_ILS:540034 2025-12-05T21:12:47Z 2025-12-05T21:12:47Z Yazar&#160;Tipton, Harold F.&#160;Krause, Micki.<br/>Yer Numaras&#305;&#160;QA76.9 .A25 I54 2010<br/>Elektronik Eri&#351;im&#160;<a href="https://www.taylorfrancis.com/books/9781439819036">Click here to view.</a><br/>Format:&#160;Kitap<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Official (ISC)2 guide to the CISSP CBK ent://SD_ILS/0/SD_ILS:540690 2025-12-05T21:12:47Z 2025-12-05T21:12:47Z Yazar&#160;Tipton, Harold F.<br/>Yer Numaras&#305;&#160;QA76.3 .T565 2010<br/>Elektronik Eri&#351;im&#160;<a href="https://www.taylorfrancis.com/books/9781439809600">Click here to view.</a><br/>Format:&#160;Kitap<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Vulnerability management ent://SD_ILS/0/SD_ILS:545698 2025-12-05T21:12:47Z 2025-12-05T21:12:47Z Yazar&#160;Foreman, Park., author.<br/>Yer Numaras&#305;&#160;QA76.9 .A25 F656 2010<br/>Elektronik Eri&#351;im&#160;<a href="https://www.taylorfrancis.com/books/9781439801512">Click here to view.</a><br/>Format:&#160;Kitap<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Security software development : assessing and managing security risks ent://SD_ILS/0/SD_ILS:543836 2025-12-05T21:12:47Z 2025-12-05T21:12:47Z Yazar&#160;Ashbaugh, Douglas A., author.<br/>Yer Numaras&#305;&#160;QA76.9 .A25 A8246 2009<br/>Elektronik Eri&#351;im&#160;<a href="https://www.taylorfrancis.com/books/9781420063813">Click here to view.</a><br/>Format:&#160;Kitap<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Data protection : governance, risk management, and compliance ent://SD_ILS/0/SD_ILS:543918 2025-12-05T21:12:47Z 2025-12-05T21:12:47Z Yazar&#160;Hill, David G. (David Gary), 1943, author.<br/>Yer Numaras&#305;&#160;QA76.9 .A25 H52 2009<br/>Elektronik Eri&#351;im&#160;<a href="https://www.taylorfrancis.com/books/9781439806937">Click here to view.</a><br/>Format:&#160;Kitap<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Information security management metrics : a definitive guide to effective security monitoring and measurement ent://SD_ILS/0/SD_ILS:546952 2025-12-05T21:12:47Z 2025-12-05T21:12:47Z Yazar&#160;Brotby, W. Krag., author.<br/>Yer Numaras&#305;&#160;HD30.2 .B78 2009<br/>Elektronik Eri&#351;im&#160;<a href="https://www.taylorfrancis.com/books/9781420052862">Click here to view.</a><br/>Format:&#160;Kitap<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Cyber fraud : tactics, techniques, and procedures ent://SD_ILS/0/SD_ILS:540157 2025-12-05T21:12:47Z 2025-12-05T21:12:47Z Yazar&#160;Graham, James.&#160;Howard, Rick.<br/>Yer Numaras&#305;&#160;HV6773 .H69 2009<br/>Elektronik Eri&#351;im&#160;<a href="https://www.taylorfrancis.com/books/9781420091281">Click here to view.</a><br/>Format:&#160;Kitap<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Human-computer interaction. Design issues, solutions, and applications ent://SD_ILS/0/SD_ILS:541058 2025-12-05T21:12:47Z 2025-12-05T21:12:47Z Yazar&#160;Sears, Andrew.&#160;Jacko, Julie A.<br/>Yer Numaras&#305;&#160;QA76.9 .H85 H8564 2009<br/>Elektronik Eri&#351;im&#160;<a href="https://www.taylorfrancis.com/books/9781420088861">Click here to view.</a><br/>Format:&#160;Kitap<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Architecting secure software systems ent://SD_ILS/0/SD_ILS:538962 2025-12-05T21:12:47Z 2025-12-05T21:12:47Z Yazar&#160;Talukder, Asoke K., author.&#160;Chaitanya, Manish.<br/>Yer Numaras&#305;&#160;QA76.9 .A25 T34 2009<br/>Elektronik Eri&#351;im&#160;<a href="https://www.taylorfrancis.com/books/9781420087857">Click here to view.</a><br/>Format:&#160;Kitap<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Contemporary ergonomics 2009 ent://SD_ILS/0/SD_ILS:542236 2025-12-05T21:12:47Z 2025-12-05T21:12:47Z Yazar&#160;Bust, Philip D.&#160;Ergonomics Society (Great Britain). Conference (60th : 2009 : London, UK)<br/>Yer Numaras&#305;&#160;TA166 .C66 2009<br/>Elektronik Eri&#351;im&#160;<a href="https://www.taylorfrancis.com/books/9781135212612">Click here to view.</a><br/>Format:&#160;Kitap<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Profiling hackers : the science of criminal profiling as applied to the world of hacking ent://SD_ILS/0/SD_ILS:545973 2025-12-05T21:12:47Z 2025-12-05T21:12:47Z Yazar&#160;Chiesa, Raoul, 1973, author.&#160;Ducci, Stefania.&#160;Ciappi, Silvio, 1965-<br/>Yer Numaras&#305;&#160;HV6773 .C477 2009<br/>Elektronik Eri&#351;im&#160;<a href="https://www.taylorfrancis.com/books/9781420086942">Click here to view.</a><br/>Format:&#160;Kitap<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Security in an IPv6 environment ent://SD_ILS/0/SD_ILS:546853 2025-12-05T21:12:47Z 2025-12-05T21:12:47Z Yazar&#160;Minoli, Daniel, 1952, author.&#160;Kouns, Jake.<br/>Yer Numaras&#305;&#160;TK5105.59 .M56 2009<br/>Elektronik Eri&#351;im&#160;<a href="https://www.taylorfrancis.com/books/9781420092301">Click here to view.</a><br/>Format:&#160;Kitap<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Information security management handbook ent://SD_ILS/0/SD_ILS:546827 2025-12-05T21:12:47Z 2025-12-05T21:12:47Z Yazar&#160;Tipton, Harold F.&#160;Krause, Micki.<br/>Yer Numaras&#305;&#160;QA76.9 .A25 I54165 2007<br/>Elektronik Eri&#351;im&#160;<a href="https://www.taylorfrancis.com/books/9781420090956">Click here to view.</a><br/>Format:&#160;Kitap<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> CISO soft skills : securing organizations impaired by employee politics, apathy, and intolerant perspectives ent://SD_ILS/0/SD_ILS:544153 2025-12-05T21:12:47Z 2025-12-05T21:12:47Z Yazar&#160;Collette, Ronald D., author.&#160;Gentile, Michael.&#160;Gentile, Skye.<br/>Yer Numaras&#305;&#160;HF5548.37 .G462 2009<br/>Elektronik Eri&#351;im&#160;<a href="https://www.taylorfrancis.com/books/9781420089110">Click here to view.</a><br/>Format:&#160;Kitap<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Building an effective information security policy architecture ent://SD_ILS/0/SD_ILS:540985 2025-12-05T21:12:47Z 2025-12-05T21:12:47Z Yazar&#160;Bacik, Sandy., author.<br/>Yer Numaras&#305;&#160;QA76.9 .A25 B335 2008<br/>Elektronik Eri&#351;im&#160;<a href="https://www.taylorfrancis.com/books/9781420059069">Click here to view.</a><br/>Format:&#160;Kitap<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Information security management handbook. Volume 2 ent://SD_ILS/0/SD_ILS:543942 2025-12-05T21:12:47Z 2025-12-05T21:12:47Z Yazar&#160;Tipton, Harold F.&#160;Krause, Micki.<br/>Yer Numaras&#305;&#160;QA76.9 .A25 I54 2008<br/>Elektronik Eri&#351;im&#160;<a href="https://www.taylorfrancis.com/books/9781420067101">Click here to view.</a><br/>Format:&#160;Kitap<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Information assurance architecture ent://SD_ILS/0/SD_ILS:539830 2025-12-05T21:12:47Z 2025-12-05T21:12:47Z Yazar&#160;Willett, Keith D., author.<br/>Yer Numaras&#305;&#160;QA76.9 .A25 W5487 2008<br/>Elektronik Eri&#351;im&#160;<a href="https://www.taylorfrancis.com/books/9780849380686">Click here to view.</a><br/>Format:&#160;Kitap<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Digital systems and applications ent://SD_ILS/0/SD_ILS:539508 2025-12-05T21:12:47Z 2025-12-05T21:12:47Z Yazar&#160;Oklobdzija, Vojin G.<br/>Yer Numaras&#305;&#160;TK7885 .D56 2008<br/>Elektronik Eri&#351;im&#160;<a href="https://www.taylorfrancis.com/books/9781315222219">Click here to view.</a><br/>Format:&#160;Kitap<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Effective leadership skills for the CISO ent://SD_ILS/0/SD_ILS:543829 2025-12-05T21:12:47Z 2025-12-05T21:12:47Z Yazar&#160;Fitzgerald, Todd.&#160;Krause, Micki.<br/>Yer Numaras&#305;&#160;QA76.9 .A25 E385 2008<br/>Elektronik Eri&#351;im&#160;<a href="https://www.taylorfrancis.com/books/9780849379444">Click here to view.</a><br/>Format:&#160;Kitap<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Insider computer fraud : an in-depth framework for detecting and defending against insider IT attacks ent://SD_ILS/0/SD_ILS:544396 2025-12-05T21:12:47Z 2025-12-05T21:12:47Z Yazar&#160;Brancik, Kenneth C., author.<br/>Yer Numaras&#305;&#160;QA76.9 .A25 B725 2008<br/>Elektronik Eri&#351;im&#160;<a href="https://www.taylorfrancis.com/books/9781420046601">Click here to view.</a><br/>Format:&#160;Kitap<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Digital privacy : theory, technologies, and practices ent://SD_ILS/0/SD_ILS:547774 2025-12-05T21:12:47Z 2025-12-05T21:12:47Z Yazar&#160;Acquisti, Alessandro.<br/>Yer Numaras&#305;&#160;QA76.9 .A25 D528 2008<br/>Elektronik Eri&#351;im&#160;<a href="https://www.taylorfrancis.com/books/9781420052183">Click here to view.</a><br/>Format:&#160;Kitap<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> How to achieve 27001 certification : an example of applied compliance management ent://SD_ILS/0/SD_ILS:545954 2025-12-05T21:12:47Z 2025-12-05T21:12:47Z Yazar&#160;Arnason, Sigurjon Thor., author.&#160;Willett, Keith D.<br/>Yer Numaras&#305;&#160;QA76.3 .A77 2008<br/>Elektronik Eri&#351;im&#160;<a href="https://www.taylorfrancis.com/books/9781420013139">Click here to view.</a><br/>Format:&#160;Kitap<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Security in Distributed, Grid, Mobile, and Pervasive Computing. ent://SD_ILS/0/SD_ILS:544847 2025-12-05T21:12:47Z 2025-12-05T21:12:47Z Yer Numaras&#305;&#160;QA76.9<br/>Elektronik Eri&#351;im&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9780429119347">https://www.taylorfrancis.com/books/9780429119347</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> 802.1X port-based authentication ent://SD_ILS/0/SD_ILS:544830 2025-12-05T21:12:47Z 2025-12-05T21:12:47Z Yazar&#160;Brown, Edwin Lyle., author.<br/>Yer Numaras&#305;&#160;TK5105.59 .B765 2007<br/>Elektronik Eri&#351;im&#160;<a href="https://www.taylorfrancis.com/books/9781420044652">Click here to view.</a><br/>Format:&#160;Kitap<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Software deployment, updating, and patching ent://SD_ILS/0/SD_ILS:544966 2025-12-05T21:12:47Z 2025-12-05T21:12:47Z Yazar&#160;Stackpole, Bill., author.&#160;Hanrion, Patrick.<br/>Yer Numaras&#305;&#160;QA76.76 .C69 S74 2007<br/>Elektronik Eri&#351;im&#160;<a href="https://www.taylorfrancis.com/books/9781420013290">Click here to view.</a><br/>Format:&#160;Kitap<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Data-driven block ciphers for fast telecommunication systems ent://SD_ILS/0/SD_ILS:546948 2025-12-05T21:12:47Z 2025-12-05T21:12:47Z Yazar&#160;Moldovyan, Nick., author.&#160;Moldovyan, Alex.<br/>Yer Numaras&#305;&#160;QA76.9 .A25 M664 2007<br/>Elektronik Eri&#351;im&#160;<a href="https://www.taylorfrancis.com/books/9781420054125">Click here to view.</a><br/>Format:&#160;Kitap<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Information security cost management ent://SD_ILS/0/SD_ILS:538817 2025-12-05T21:12:47Z 2025-12-05T21:12:47Z Yazar&#160;Bazavan, Ioana V., author.&#160;Lim, Ian.<br/>Yer Numaras&#305;&#160;QA76.9 .A25 B395 2007<br/>Elektronik Eri&#351;im&#160;<a href="https://www.taylorfrancis.com/books/9781420013832">Click here to view.</a><br/>Format:&#160;Kitap<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> The human-computer interaction handbook : fundamentals, evolving technologies, and emerging applications ent://SD_ILS/0/SD_ILS:539122 2025-12-05T21:12:47Z 2025-12-05T21:12:47Z Yazar&#160;Sears, Andrew.&#160;Jacko, Julie A.<br/>Yer Numaras&#305;&#160;QA76.9 .H85 H8568 2007<br/>Elektronik Eri&#351;im&#160;<a href="https://www.taylorfrancis.com/books/9781410615862">Click here to view.</a><br/>Format:&#160;Kitap<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Mechanics of user identification and authentication : fundamentals of identity management ent://SD_ILS/0/SD_ILS:539940 2025-12-05T21:12:47Z 2025-12-05T21:12:47Z Yazar&#160;Todorov, Dobromir., author.<br/>Yer Numaras&#305;&#160;TK5105.59 .T575 2007<br/>Elektronik Eri&#351;im&#160;<a href="https://www.taylorfrancis.com/books/9781420052206">Click here to view.</a><br/>Format:&#160;Kitap<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Information security management handbook ent://SD_ILS/0/SD_ILS:540065 2025-12-05T21:12:47Z 2025-12-05T21:12:47Z Yazar&#160;Krause, Micki.&#160;Tipton, Harold F.<br/>Yer Numaras&#305;&#160;QA76.9 .A25 I54165 2007<br/>Elektronik Eri&#351;im&#160;<a href="https://www.taylorfrancis.com/books/9781439833032">Click here to view.</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Official (ISC)2 guide to the SSCP CBK ent://SD_ILS/0/SD_ILS:540212 2025-12-05T21:12:47Z 2025-12-05T21:12:47Z Yazar&#160;Contesti, Diana-Lynn.<br/>Yer Numaras&#305;&#160;TK5105.59 .O44 2007<br/>Elektronik Eri&#351;im&#160;<a href="https://www.taylorfrancis.com/books/9780203331576">Click here to view.</a><br/>Format:&#160;Kitap<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Complete guide to CISM certification ent://SD_ILS/0/SD_ILS:542218 2025-12-05T21:12:47Z 2025-12-05T21:12:47Z Yazar&#160;Peltier, Thomas R., author.&#160;Peltier, Justin.<br/>Yer Numaras&#305;&#160;QA76.3 .P43 2007<br/>Elektronik Eri&#351;im&#160;<a href="https://www.taylorfrancis.com/books/9781420013252">Click here to view.</a><br/>Format:&#160;Kitap<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Information security : design, implementation, measurement, and compliance ent://SD_ILS/0/SD_ILS:545839 2025-12-05T21:12:47Z 2025-12-05T21:12:47Z Yazar&#160;Layton, Timothy P., author.<br/>Yer Numaras&#305;&#160;HF5548.37 .L393 2007<br/>Elektronik Eri&#351;im&#160;<a href="https://www.taylorfrancis.com/books/9781420013412">Click here to view.</a><br/>Format:&#160;Kitap<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Testing code security ent://SD_ILS/0/SD_ILS:546167 2025-12-05T21:12:47Z 2025-12-05T21:12:47Z Yazar&#160;Van der Linden, Maura A., author.<br/>Yer Numaras&#305;&#160;QA76.9 .A25 V359 2007<br/>Elektronik Eri&#351;im&#160;<a href="https://www.taylorfrancis.com/books/9781420013795">Click here to view.</a><br/>Format:&#160;Kitap<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Complete guide to security and privacy metrics : measuring regulatory compliance, operational resilience, and ROI ent://SD_ILS/0/SD_ILS:546961 2025-12-05T21:12:47Z 2025-12-05T21:12:47Z Yazar&#160;Herrmann, Debra S., author.<br/>Yer Numaras&#305;&#160;TK5102.85 .H4685 2007<br/>Elektronik Eri&#351;im&#160;<a href="https://www.taylorfrancis.com/books/9781420013283">Click here to view.</a><br/>Format:&#160;Kitap<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> The security risk assessment handbook : a complete guide for performing security risk assessments ent://SD_ILS/0/SD_ILS:545167 2025-12-05T21:12:47Z 2025-12-05T21:12:47Z Yazar&#160;Landoll, Douglas J., author.<br/>Yer Numaras&#305;&#160;HF5548.37 .L358 2006<br/>Elektronik Eri&#351;im&#160;<a href="https://www.taylorfrancis.com/books/9781420031232">Click here to view.</a><br/>Format:&#160;Kitap<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Information security architecture : an integrated approach to security in the organization ent://SD_ILS/0/SD_ILS:541238 2025-12-05T21:12:47Z 2025-12-05T21:12:47Z Yazar&#160;Tudor, Jan Killmeyer., author.<br/>Yer Numaras&#305;&#160;QA76.9 .A25 T83 2006<br/>Elektronik Eri&#351;im&#160;<a href="https://www.taylorfrancis.com/books/9780203488751">Click here to view.</a><br/>Format:&#160;Kitap<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> The CISO handbook : a practical guide to securing your company ent://SD_ILS/0/SD_ILS:539204 2025-12-05T21:12:47Z 2025-12-05T21:12:47Z Yazar&#160;Gentile, Michael., author.&#160;Collette, Ronald D.&#160;August, Thomas D.<br/>Yer Numaras&#305;&#160;HF5548.37 .G46 2006<br/>Elektronik Eri&#351;im&#160;<a href="https://www.taylorfrancis.com/books/9781420031379">Click here to view.</a><br/>Format:&#160;Kitap<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Official (ISC)[superscript]2 guide to the CISSP-ISSEP CBK ent://SD_ILS/0/SD_ILS:542243 2025-12-05T21:12:47Z 2025-12-05T21:12:47Z Yazar&#160;Hansche, Susan., author.<br/>Yer Numaras&#305;&#160;QA76.3 .H364 2006<br/>Elektronik Eri&#351;im&#160;<a href="https://www.taylorfrancis.com/books/9781135483098">Click here to view.</a><br/>Format:&#160;Kitap<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Audit and trace log management : consolidation and analysis ent://SD_ILS/0/SD_ILS:542713 2025-12-05T21:12:47Z 2025-12-05T21:12:47Z Yazar&#160;Maier, Phillip Q., author.<br/>Yer Numaras&#305;&#160;TK5105.59 .M34 2006<br/>Elektronik Eri&#351;im&#160;<a href="https://www.taylorfrancis.com/books/9780203491768">Click here to view.</a><br/>Format:&#160;Kitap<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Wireless security handbook ent://SD_ILS/0/SD_ILS:542848 2025-12-05T21:12:47Z 2025-12-05T21:12:47Z Yazar&#160;Earle, Aaron E., author.<br/>Yer Numaras&#305;&#160;TK5105.78 .E23 2006<br/>Elektronik Eri&#351;im&#160;<a href="https://www.taylorfrancis.com/books/9781420031188">Click here to view.</a><br/>Format:&#160;Kitap<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Building and implementing a security certification and accreditation program : official (ISC) guide to the CAP CBK ent://SD_ILS/0/SD_ILS:544245 2025-12-05T21:12:47Z 2025-12-05T21:12:47Z Yazar&#160;Howard, Patrick D., author.<br/>Yer Numaras&#305;&#160;QA76.3 .H693 2006<br/>Elektronik Eri&#351;im&#160;<a href="https://www.taylorfrancis.com/books/9781135491147">Click here to view.</a><br/>Format:&#160;Kitap<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Computers, Software Engineering, and Digital Devices ent://SD_ILS/0/SD_ILS:542493 2025-12-05T21:12:47Z 2025-12-05T21:12:47Z Yazar&#160;Dorf, Richard C., author.&#160;Taylor and Francis.<br/>Yer Numaras&#305;&#160;TK7885<br/>Elektronik Eri&#351;im&#160;<a href="https://www.taylorfrancis.com/books/9781420037050">Click here to view.</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Building a global information assurance program ent://SD_ILS/0/SD_ILS:543357 2025-12-05T21:12:47Z 2025-12-05T21:12:47Z Yazar&#160;Curts, Raymond J., author.&#160;Campbell, Douglas E., 1954- author.<br/>Yer Numaras&#305;&#160;QA76.9 .A25<br/>Elektronik Eri&#351;im&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9780429225215">https://www.taylorfrancis.com/books/9780429225215</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Scalable and secure internet services and architecture ent://SD_ILS/0/SD_ILS:545070 2025-12-05T21:12:47Z 2025-12-05T21:12:47Z Yazar&#160;Xu, Chengzhong., author.<br/>Yer Numaras&#305;&#160;TK5105.875 .I57 X8 2005<br/>Elektronik Eri&#351;im&#160;<a href="https://www.taylorfrancis.com/books/9781420035209">Click here to view.</a><br/>Format:&#160;Kitap<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Codes : the guide to secrecy from ancient to modern times ent://SD_ILS/0/SD_ILS:546062 2025-12-05T21:12:47Z 2025-12-05T21:12:47Z Yazar&#160;Mollin, Richard A., 1947, author.<br/>Yer Numaras&#305;&#160;QA76.9 .A25 M67 2005<br/>Elektronik Eri&#351;im&#160;<a href="https://www.taylorfrancis.com/books/9781420035087">Click here to view.</a><br/>Format:&#160;Kitap<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> The ethical hack : a framework for business value penetration testing ent://SD_ILS/0/SD_ILS:546262 2025-12-05T21:12:47Z 2025-12-05T21:12:47Z Yazar&#160;Tiller, James S., author.<br/>Yer Numaras&#305;&#160;TK5105.59 .T55 2005<br/>Elektronik Eri&#351;im&#160;<a href="https://www.taylorfrancis.com/books/9781135502485">Click here to view.</a><br/>Format:&#160;Kitap<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Information security management handbook. Volume 2 ent://SD_ILS/0/SD_ILS:546290 2025-12-05T21:12:47Z 2025-12-05T21:12:47Z Yazar&#160;Tipton, Harold F.&#160;Krause, Micki.<br/>Yer Numaras&#305;&#160;QA76.9 .A25 I54 2005<br/>Elektronik Eri&#351;im&#160;<a href="https://www.taylorfrancis.com/books/9781135484002">Click here to view.</a><br/>Format:&#160;Kitap<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Database and applications security : integrating information security and data management ent://SD_ILS/0/SD_ILS:540220 2025-12-05T21:12:47Z 2025-12-05T21:12:47Z Yazar&#160;Thuraisingham, Bhavani M., author.<br/>Yer Numaras&#305;&#160;QA76.9 .D314 T47 2005<br/>Elektronik Eri&#351;im&#160;<a href="https://www.taylorfrancis.com/books/9780203486061">Click here to view.</a><br/>Format:&#160;Kitap<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Assessing and managing security risk in IT systems : a structured methodology ent://SD_ILS/0/SD_ILS:542250 2025-12-05T21:12:47Z 2025-12-05T21:12:47Z Yazar&#160;McCumber, John, 1956, author.<br/>Yer Numaras&#305;&#160;QA76.9 .A25 M4284 2005<br/>Elektronik Eri&#351;im&#160;<a href="https://www.taylorfrancis.com/books/9781135488970">Click here to view.</a><br/>Format:&#160;Kitap<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Distributed sensor networks ent://SD_ILS/0/SD_ILS:542802 2025-12-05T21:12:47Z 2025-12-05T21:12:47Z Yazar&#160;Iyengar, S. S. (Sundararaja S.)&#160;Brooks, R. R. (Richard R.)<br/>Yer Numaras&#305;&#160;TK7872 .D48 D57 2005<br/>Elektronik Eri&#351;im&#160;<a href="https://www.taylorfrancis.com/books/9781439870785">Click here to view.</a><br/>Format:&#160;Kitap<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Curing the patch management headache ent://SD_ILS/0/SD_ILS:543815 2025-12-05T21:12:47Z 2025-12-05T21:12:47Z Yazar&#160;Nicastro, Felicia M., author.<br/>Yer Numaras&#305;&#160;QA76.9 .A25 N526 2005<br/>Elektronik Eri&#351;im&#160;<a href="https://www.taylorfrancis.com/books/9781420031294">Click here to view.</a><br/>Format:&#160;Kitap<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Information security risk analysis ent://SD_ILS/0/SD_ILS:544821 2025-12-05T21:12:47Z 2025-12-05T21:12:47Z Yazar&#160;Peltier, Thomas R., author.<br/>Yer Numaras&#305;&#160;QA76.9 .A25 P429 2005<br/>Elektronik Eri&#351;im&#160;<a href="https://www.taylorfrancis.com/books/9781420031195">Click here to view.</a><br/>Format:&#160;Kitap<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Information security fundamentals ent://SD_ILS/0/SD_ILS:545226 2025-12-05T21:12:47Z 2025-12-05T21:12:47Z Yazar&#160;Peltier, Thomas R., author.&#160;Peltier, Justin.&#160;Blackley, John A.<br/>Yer Numaras&#305;&#160;QA76.9 .A25 P427 2005<br/>Elektronik Eri&#351;im&#160;<a href="https://www.taylorfrancis.com/books/9781135493738">Click here to view.</a><br/>Format:&#160;Kitap<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> A practical guide to security assessments ent://SD_ILS/0/SD_ILS:545277 2025-12-05T21:12:47Z 2025-12-05T21:12:47Z Yazar&#160;Kairab, Sudhanshu., author.<br/>Yer Numaras&#305;&#160;HF5548.32 .K345 2005<br/>Elektronik Eri&#351;im&#160;<a href="https://www.taylorfrancis.com/books/9781135500313">Click here to view.</a><br/>Format:&#160;Kitap<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Disruptive security technologies with mobile code and peer-to-peer networks ent://SD_ILS/0/SD_ILS:545651 2025-12-05T21:12:47Z 2025-12-05T21:12:47Z Yazar&#160;Brooks, R. R. (Richard R.), author.<br/>Yer Numaras&#305;&#160;TK5105.525 .B76 2004<br/>Elektronik Eri&#351;im&#160;<a href="https://www.taylorfrancis.com/books/9781420038880">Click here to view.</a><br/>Format:&#160;Kitap<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Financial investigation and forensic accounting ent://SD_ILS/0/SD_ILS:547390 2025-12-05T21:12:47Z 2025-12-05T21:12:47Z Yazar&#160;Manning, George A., author.<br/>Yer Numaras&#305;&#160;HV8079 .W47 M35 2005<br/>Elektronik Eri&#351;im&#160;<a href="https://www.taylorfrancis.com/books/9781420039061">Click here to view.</a><br/>Format:&#160;Kitap<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Strategic information security ent://SD_ILS/0/SD_ILS:541272 2025-12-05T21:12:47Z 2025-12-05T21:12:47Z Yazar&#160;Wylder, John., author.<br/>Yer Numaras&#305;&#160;TK5105.59 .W95 2004<br/>Elektronik Eri&#351;im&#160;<a href="https://www.taylorfrancis.com/books/9780203497081">Click here to view.</a><br/>Format:&#160;Kitap<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Investigator's guide to steganography ent://SD_ILS/0/SD_ILS:541281 2025-12-05T21:12:47Z 2025-12-05T21:12:47Z Yazar&#160;Kipper, Gregory., author.<br/>Yer Numaras&#305;&#160;QA76.9 .A25 K544 2004<br/>Elektronik Eri&#351;im&#160;<a href="https://www.taylorfrancis.com/books/9780203504765">Click here to view.</a><br/>Format:&#160;Kitap<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Network perimeter security : building defense in-depth ent://SD_ILS/0/SD_ILS:541286 2025-12-05T21:12:47Z 2025-12-05T21:12:47Z Yazar&#160;Riggs, Cliff., author.<br/>Yer Numaras&#305;&#160;TK5105.59 .R54 2004<br/>Elektronik Eri&#351;im&#160;<a href="https://www.taylorfrancis.com/books/9780203508046">Click here to view.</a><br/>Format:&#160;Kitap<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Computer science handbook ent://SD_ILS/0/SD_ILS:542261 2025-12-05T21:12:47Z 2025-12-05T21:12:47Z Yazar&#160;Tucker, Allen B.<br/>Yer Numaras&#305;&#160;QA76 .C54755 2004<br/>Elektronik Eri&#351;im&#160;<a href="https://www.taylorfrancis.com/books/9780203494455">Click here to view.</a><br/>Format:&#160;Kitap<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Public key infrastructure : building trusted applications and Web services ent://SD_ILS/0/SD_ILS:543281 2025-12-05T21:12:47Z 2025-12-05T21:12:47Z Yazar&#160;Vacca, John R.<br/>Yer Numaras&#305;&#160;QA76.9 .A25 P85 2004<br/>Elektronik Eri&#351;im&#160;<a href="https://www.taylorfrancis.com/books/9780203498156">Click here to view.</a><br/>Format:&#160;Kitap<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Protocols for secure electronic commerce ent://SD_ILS/0/SD_ILS:541497 2025-12-05T21:12:47Z 2025-12-05T21:12:47Z Yazar&#160;Sherif, Mostafa Hashem., author.<br/>Yer Numaras&#305;&#160;HF5548.32 .S5213 2003<br/>Elektronik Eri&#351;im&#160;<a href="https://www.taylorfrancis.com/books/9781315220291">Click here to view.</a><br/>Format:&#160;Kitap<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> 21 CFR Part 11 : complete guide to international computer validation compliance for the pharmaceutical industry ent://SD_ILS/0/SD_ILS:544298 2025-12-05T21:12:47Z 2025-12-05T21:12:47Z Yazar&#160;L&oacute;pez, Orlando., author.<br/>Yer Numaras&#305;&#160;RS192 .L67 2004<br/>Elektronik Eri&#351;im&#160;<a href="https://www.taylorfrancis.com/books/9781135488765">Click here to view.</a><br/>Format:&#160;Kitap<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Electronic record keeping : achieving and maintaining compliance with 21 CFR part 11 and 45 CFR parts 160, 162, and 164 ent://SD_ILS/0/SD_ILS:544533 2025-12-05T21:12:47Z 2025-12-05T21:12:47Z Yazar&#160;Nettleton, David, 1963, author.&#160;Gough, Janet.<br/>Yer Numaras&#305;&#160;KF3827 .R4 N48 2004<br/>Elektronik Eri&#351;im&#160;<a href="https://www.taylorfrancis.com/books/9781135490164">Click here to view.</a><br/>Format:&#160;Kitap<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Network Security Technologies : A Structured and Comprehensive Guide. ent://SD_ILS/0/SD_ILS:545328 2025-12-05T21:12:47Z 2025-12-05T21:12:47Z Yazar&#160;Fung, Kwok T., author.<br/>Yer Numaras&#305;&#160;TK5105.59 .F86 2004<br/>Elektronik Eri&#351;im&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9780429220227">https://www.taylorfrancis.com/books/9780429220227</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Information security policies and procedures : a practitioner's reference ent://SD_ILS/0/SD_ILS:547228 2025-12-05T21:12:47Z 2025-12-05T21:12:47Z Yazar&#160;Peltier, Thomas R., author.<br/>Yer Numaras&#305;&#160;QA76.9 .A25 P428 2004<br/>Elektronik Eri&#351;im&#160;<a href="https://www.taylorfrancis.com/books/9780203488737">Click here to view.</a><br/>Format:&#160;Kitap<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Complete book of remote access : connectivity and security ent://SD_ILS/0/SD_ILS:540976 2025-12-05T21:12:47Z 2025-12-05T21:12:47Z Yazar&#160;Kasacavage, Victor.<br/>Yer Numaras&#305;&#160;TK5105.597 .C65 2003<br/>Elektronik Eri&#351;im&#160;<a href="https://www.taylorfrancis.com/books/9781420000429">Click here to view.</a><br/>Format:&#160;Kitap<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Official (ISC)2 guide to the CISSP exam ent://SD_ILS/0/SD_ILS:543698 2025-12-05T21:12:47Z 2025-12-05T21:12:47Z Yazar&#160;Hansche, Susan., author.&#160;Berti, John.&#160;Hare, Chris, 1962-<br/>Yer Numaras&#305;&#160;QA76.3 .H363 2003<br/>Elektronik Eri&#351;im&#160;<a href="https://www.taylorfrancis.com/books/9780203507872">Click here to view.</a><br/>Format:&#160;Kitap<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Using the common criteria for IT security evaluation ent://SD_ILS/0/SD_ILS:538965 2025-12-05T21:12:47Z 2025-12-05T21:12:47Z Yazar&#160;Herrmann, Debra S., author.<br/>Yer Numaras&#305;&#160;TK5102.85 .H47 2003<br/>Elektronik Eri&#351;im&#160;<a href="https://www.taylorfrancis.com/books/9781420031423">Click here to view.</a><br/>Format:&#160;Kitap<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Information security management handbook ent://SD_ILS/0/SD_ILS:539327 2025-12-05T21:12:47Z 2025-12-05T21:12:47Z Yazar&#160;Krause, Micki.&#160;Tipton, Harold F.<br/>Yer Numaras&#305;&#160;QA76.9 .A25 I54165 2003<br/>Elektronik Eri&#351;im&#160;<a href="https://www.taylorfrancis.com/books/9781135492335">Click here to view.</a><br/>Format:&#160;Kitap<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Surviving security : how to integrate people, process, and technology ent://SD_ILS/0/SD_ILS:547266 2025-12-05T21:12:47Z 2025-12-05T21:12:47Z Yazar&#160;Andress, Amanda., author.<br/>Yer Numaras&#305;&#160;QA76.9 .A25 A545 2003<br/>Elektronik Eri&#351;im&#160;<a href="https://www.taylorfrancis.com/books/9780203501405">Click here to view.</a><br/>Format:&#160;Kitap<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Securing and controlling Cisco routers ent://SD_ILS/0/SD_ILS:542978 2025-12-05T21:12:47Z 2025-12-05T21:12:47Z Yazar&#160;Davis, Peter T., author.<br/>Yer Numaras&#305;&#160;TK5105.543 .D38 2002<br/>Elektronik Eri&#351;im&#160;<a href="https://www.taylorfrancis.com/books/9781420031454">Click here to view.</a><br/>Format:&#160;Kitap<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> The Computer Engineering Handbook. ent://SD_ILS/0/SD_ILS:543838 2025-12-05T21:12:47Z 2025-12-05T21:12:47Z Yazar&#160;Oklobdzija, Vojin G., author.&#160;CRC Press LLC.<br/>Yer Numaras&#305;&#160;TK7885 .C645 2002<br/>Elektronik Eri&#351;im&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781420041545">https://www.taylorfrancis.com/books/9781420041545</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> A practical guide to security engineering and information assurance ent://SD_ILS/0/SD_ILS:544973 2025-12-05T21:12:47Z 2025-12-05T21:12:47Z Yazar&#160;Herrmann, Debra S., author.<br/>Yer Numaras&#305;&#160;QA76.9 .A25 H47 2002<br/>Elektronik Eri&#351;im&#160;<a href="https://www.taylorfrancis.com/books/9781420031492">Click here to view.</a><br/>Format:&#160;Kitap<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> The total CISSP exam prep book : practice questions, answers, and test taking tips and techniques ent://SD_ILS/0/SD_ILS:538964 2025-12-05T21:12:47Z 2025-12-05T21:12:47Z Yazar&#160;Peltier, Thomas R., author.&#160;Howard, Patrick D.<br/>Yer Numaras&#305;&#160;TK5105.59 .P454 2002<br/>Elektronik Eri&#351;im&#160;<a href="https://www.taylorfrancis.com/books/9781420031447">Click here to view.</a><br/>Format:&#160;Kitap<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> The privacy papers : managing technology, consumer, employee, and legislative action ent://SD_ILS/0/SD_ILS:539954 2025-12-05T21:12:47Z 2025-12-05T21:12:47Z Yazar&#160;Herold, Rebecca.<br/>Yer Numaras&#305;&#160;KF1262 .P754 2002<br/>Elektronik Eri&#351;im&#160;<a href="https://www.taylorfrancis.com/books/9781420000177">Click here to view.</a><br/>Format:&#160;Kitap<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Cyber forensics : a field manual for collecting, examining, and preserving evidence of computer crimes ent://SD_ILS/0/SD_ILS:545820 2025-12-05T21:12:47Z 2025-12-05T21:12:47Z Yazar&#160;Marcella, Albert J.&#160;Greenfield, Robert S., 1961-<br/>Yer Numaras&#305;&#160;HV8079 .C65 C93 2002<br/>Elektronik Eri&#351;im&#160;<a href="https://www.taylorfrancis.com/books/9781420000115">Click here to view.</a><br/>Format:&#160;Kitap<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Information Security Management Handbook. Vol. 4. ent://SD_ILS/0/SD_ILS:545829 2025-12-05T21:12:47Z 2025-12-05T21:12:47Z Yazar&#160;Tipton, Harold F., editor&#160;Krause, Micki, editor&#160;CRC Press LLC.<br/>Yer Numaras&#305;&#160;QA76.9 .A25<br/>Elektronik Eri&#351;im&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9780429117367">https://www.taylorfrancis.com/books/9780429117367</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Information security policies, procedures, and standards : guidelines for effective information security management ent://SD_ILS/0/SD_ILS:546817 2025-12-05T21:12:47Z 2025-12-05T21:12:47Z Yazar&#160;Peltier, Thomas R., author.<br/>Yer Numaras&#305;&#160;QA76.9 .A25 P46 2002<br/>Elektronik Eri&#351;im&#160;<a href="https://www.taylorfrancis.com/books/9780849390326">Click here to view.</a><br/>Format:&#160;Kitap<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Information security management handbook on CD-ROM ent://SD_ILS/0/SD_ILS:547768 2025-12-05T21:12:47Z 2025-12-05T21:12:47Z Yazar&#160;Nozaki, Micki Krause.&#160;Tipton, Harold F.<br/>Yer Numaras&#305;&#160;QA76.9 .A25 H36 2002<br/>Elektronik Eri&#351;im&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781466515611">https://www.taylorfrancis.com/books/9781466515611</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Information security architecture : an integrated approach to security in the organization ent://SD_ILS/0/SD_ILS:544953 2025-12-05T21:12:47Z 2025-12-05T21:12:47Z Yazar&#160;Tudor, Jan Killmeyer.<br/>Yer Numaras&#305;&#160;QA76.9 .A25<br/>Elektronik Eri&#351;im&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9780429131790">https://www.taylorfrancis.com/books/9780429131790</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Secure Internet Practices : Best Practices for Securing Systems in the Internet and E-Business Age. ent://SD_ILS/0/SD_ILS:541581 2025-12-05T21:12:47Z 2025-12-05T21:12:47Z Yazar&#160;McBride, Patricia.<br/>Yer Numaras&#305;&#160;TK5105.59 .S435 2002 EB<br/>Elektronik Eri&#351;im&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781420031478">https://www.taylorfrancis.com/books/9781420031478</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Securing e-business applications and communications ent://SD_ILS/0/SD_ILS:545821 2025-12-05T21:12:47Z 2025-12-05T21:12:47Z Yazar&#160;Held, Jonathan S., author.&#160;Bowers, John R.<br/>Yer Numaras&#305;&#160;QA76.9 .A25 H435 2001<br/>Elektronik Eri&#351;im&#160;<a href="https://www.taylorfrancis.com/books/9781420031553">Click here to view.</a><br/>Format:&#160;Kitap<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> A technical guide to IPSec virtual private networks ent://SD_ILS/0/SD_ILS:547355 2025-12-05T21:12:47Z 2025-12-05T21:12:47Z Yazar&#160;Tiller, James S., author.<br/>Yer Numaras&#305;&#160;TK5105.875 .E87 T55 2001<br/>Elektronik Eri&#351;im&#160;<a href="https://www.taylorfrancis.com/books/9781135516697">Click here to view.</a><br/>Format:&#160;Kitap<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Investigating computer-related crime ent://SD_ILS/0/SD_ILS:539395 2025-12-05T21:12:47Z 2025-12-05T21:12:47Z Yazar&#160;Stephenson, Peter., author.<br/>Yer Numaras&#305;&#160;HV6773.2 .S74 2000<br/>Elektronik Eri&#351;im&#160;<a href="https://www.taylorfrancis.com/books/9781420048872">Click here to view.</a><br/>Format:&#160;Kitap<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Secure computers and networks : analysis, design, and implementation ent://SD_ILS/0/SD_ILS:540568 2025-12-05T21:12:47Z 2025-12-05T21:12:47Z Yazar&#160;Fisch, Eric A.&#160;White, Gregory B.<br/>Yer Numaras&#305;&#160;QA76.9 .A25 F5334 2000<br/>Elektronik Eri&#351;im&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9780367802127">https://www.taylorfrancis.com/books/9780367802127</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Designing a total data solution : technology, implementation and deployment ent://SD_ILS/0/SD_ILS:539358 2025-12-05T21:12:47Z 2025-12-05T21:12:47Z Yazar&#160;Breakfield, Charles V.&#160;Burkey, Roxanne E.<br/>Yer Numaras&#305;&#160;QA76.9 .D26 D48 2000<br/>Elektronik Eri&#351;im&#160;<a href="https://www.taylorfrancis.com/books/9780203997512">Click here to view.</a><br/>Format:&#160;Kitap<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/>