Arama Sonuçları Computer security - Daraltılmış: 2002SirsiDynix Enterprisehttps://katalog.hacettepe.edu.tr/client/tr_TR/default_tr/default_tr/qu$003dComputer$002bsecurity$0026qf$003dPUBDATE$002509Yay$0025C4$0025B1n$002bY$0025C4$0025B1l$0025C4$0025B1$0025092002$0025092002$0026ps$003d300?dt=list2024-11-23T11:10:45ZSequrity for computer networks : an introduction to data security in teleprocessing and electronic funds transferent://SD_ILS/0/SD_ILS:621882024-11-23T11:10:45Z2024-11-23T11:10:45ZYazar Davies, Donald Watts, 1924- Price, W. L., ort.yaz.<br/>Yer Numarası TK 5105 D43 1989<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>Building a global information assurance programent://SD_ILS/0/SD_ILS:2874732024-11-23T11:10:45Z2024-11-23T11:10:45ZYazar Curts, Raymond J. Campbell, Douglas E., 1954-<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://marc.crcnetbase.com/isbn/9780203997550">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Introduction to communication electronic warfare systemsent://SD_ILS/0/SD_ILS:765592024-11-23T11:10:45Z2024-11-23T11:10:45ZYazar Poisel, Richard.<br/>Yer Numarası UG 590 P65 2002<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>Internet and Wireless Securityent://SD_ILS/0/SD_ILS:2476822024-11-23T11:10:45Z2024-11-23T11:10:45ZYazar Temple, Robert, ed. Regnault, John, ed.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1049/PBBT004E">http://dx.doi.org/10.1049/PBBT004E</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Enterprise directory and security implementation guide designing and implementing directories in your organizationent://SD_ILS/0/SD_ILS:2536892024-11-23T11:10:45Z2024-11-23T11:10:45ZYazar Carrington, Charles (Charles Dudley)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780121604523">http://www.sciencedirect.com/science/book/9780121604523</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Hack proofing ColdFusionent://SD_ILS/0/SD_ILS:2539822024-11-23T11:10:45Z2024-11-23T11:10:45ZYazar Meyer, Greg. Casco, Steven.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781928994770">http://www.sciencedirect.com/science/book/9781928994770</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Hack proofing XMLent://SD_ILS/0/SD_ILS:2540002024-11-23T11:10:45Z2024-11-23T11:10:45ZYazar 'Ken'@ftu.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836500">http://www.sciencedirect.com/science/book/9781931836500</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Cisco security specialist's guide to PIX firewallsent://SD_ILS/0/SD_ILS:2540022024-11-23T11:10:45Z2024-11-23T11:10:45ZYazar Osipav, Vitaly. Sweeney, Mike. Weaver, Woody.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836630">http://www.sciencedirect.com/science/book/9781931836630</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Nokia network security solutions handbookent://SD_ILS/0/SD_ILS:2540042024-11-23T11:10:45Z2024-11-23T11:10:45ZYazar Maxwell, Doug.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836708">http://www.sciencedirect.com/science/book/9781931836708</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Hack proofing your wireless networkent://SD_ILS/0/SD_ILS:2540492024-11-23T11:10:45Z2024-11-23T11:10:45ZYazar Barnes, Christian. O'Farrell, Neal.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781928994596">http://www.sciencedirect.com/science/book/9781928994596</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>ISA server and beyond real world security solutions for Microsoft enterprise networksent://SD_ILS/0/SD_ILS:2540532024-11-23T11:10:45Z2024-11-23T11:10:45ZYazar Shinder, Thomas W. Grasdal, Martin. Shinder, Debra Littlejohn.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836661">http://www.sciencedirect.com/science/book/9781931836661</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Nokia network security solutions handbookent://SD_ILS/0/SD_ILS:811492024-11-23T11:10:45Z2024-11-23T11:10:45ZYazar Maxwell, Doug. Amon, Cherie, ort. yaz.<br/>Yer Numarası TK 5105.59 M451 2002<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>Scene of the cybercrime computer forensics handbookent://SD_ILS/0/SD_ILS:2536152024-11-23T11:10:45Z2024-11-23T11:10:45ZYazar Shinder, Debra Littlejohn. Tittel, Ed.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836654">http://www.sciencedirect.com/science/book/9781931836654</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Managing Cisco network securityent://SD_ILS/0/SD_ILS:2536162024-11-23T11:10:45Z2024-11-23T11:10:45ZYazar Knipp, Eric. Danielyan, Edgar.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836562">http://www.sciencedirect.com/science/book/9781931836562</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Hack proofing your identity in the information age protect your family on the internet!ent://SD_ILS/0/SD_ILS:2536172024-11-23T11:10:45Z2024-11-23T11:10:45ZYazar Bidwell, Teri. Cross, Michael, 1965- Russell, Ryan, 1969-<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836517">http://www.sciencedirect.com/science/book/9781931836517</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Hack proofing your networkent://SD_ILS/0/SD_ILS:2536182024-11-23T11:10:45Z2024-11-23T11:10:45ZYazar Ahmad, David R. Mirza. Russell, Ryan, 1969-<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781928994701">http://www.sciencedirect.com/science/book/9781928994701</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Data networks routing, security, and performance optimizationent://SD_ILS/0/SD_ILS:2538292024-11-23T11:10:45Z2024-11-23T11:10:45ZYazar Kenyon, Tony, 1960-<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781555582715">http://www.sciencedirect.com/science/book/9781555582715</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Disappearing cryptography information hiding : steganography & watermarkingent://SD_ILS/0/SD_ILS:2539002024-11-23T11:10:45Z2024-11-23T11:10:45ZYazar Wayner, Peter, 1964-<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781558607699">http://www.sciencedirect.com/science/book/9781558607699</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Information security best practices 205 basic rulesent://SD_ILS/0/SD_ILS:2547792024-11-23T11:10:45Z2024-11-23T11:10:45ZYazar Stefanek, George L.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781878707963">http://www.sciencedirect.com/science/book/9781878707963</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Security for ubiquitous computingent://SD_ILS/0/SD_ILS:3010392024-11-23T11:10:45Z2024-11-23T11:10:45ZYazar Stajano, Frank. Wiley InterScience (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim John Wiley <a href="http://dx.doi.org/10.1002/0470848693">http://dx.doi.org/10.1002/0470848693</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Information security policies, procedures, and standards guidelines for effective information security managementent://SD_ILS/0/SD_ILS:2902092024-11-23T11:10:45Z2024-11-23T11:10:45ZYazar Peltier, Thomas R.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://marc.crcnetbase.com/isbn/9780849390326">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>The total CISSP exam prep book practice questions, answers, and test taking tips and techniquesent://SD_ILS/0/SD_ILS:2904152024-11-23T11:10:45Z2024-11-23T11:10:45ZYazar Peltier, Thomas R. Howard, Patrick D.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://marc.crcnetbase.com/isbn/9781420031447">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Secure Internet practices best practices for securing systems in the Internet and e-Business ageent://SD_ILS/0/SD_ILS:2904272024-11-23T11:10:45Z2024-11-23T11:10:45ZYazar McBride, Patrick.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://marc.crcnetbase.com/isbn/9781420031478">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Securing and controlling Cisco routersent://SD_ILS/0/SD_ILS:2904322024-11-23T11:10:45Z2024-11-23T11:10:45ZYazar Davis, Peter T.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://marc.crcnetbase.com/isbn/9781420031454">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>A practical guide to security engineering and information assuranceent://SD_ILS/0/SD_ILS:2904612024-11-23T11:10:45Z2024-11-23T11:10:45ZYazar Herrmann, Debra S.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://marc.crcnetbase.com/isbn/9781420031492">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>