Arama Sonu&ccedil;lar&#305; Computer security - Daralt&#305;lm&#305;&#351;: 2009 SirsiDynix Enterprise https://katalog.hacettepe.edu.tr/client/tr_TR/default_tr/default_tr/qu$003dComputer$002bsecurity$0026qf$003dPUBDATE$002509Yay$0025C4$0025B1n$002bY$0025C4$0025B1l$0025C4$0025B1$0025092009$0025092009$0026ps$003d300$0026isd$003dtrue?dt=list 2024-11-27T09:24:07Z Computer and information security handbook ent://SD_ILS/0/SD_ILS:148884 2024-11-27T09:24:07Z 2024-11-27T09:24:07Z Yazar&#160;Vacca, John R.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780123743541">http://www.sciencedirect.com/science/book/9780123743541</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> A Guide to Computer Network Security ent://SD_ILS/0/SD_ILS:175855 2024-11-27T09:24:07Z 2024-11-27T09:24:07Z Yazar&#160;Kizza, Joseph Migga. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-1-84800-917-2">http://dx.doi.org/10.1007/978-1-84800-917-2</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Sequrity for computer networks : an introduction to data security in teleprocessing and electronic funds transfer ent://SD_ILS/0/SD_ILS:62188 2024-11-27T09:24:07Z 2024-11-27T09:24:07Z Yazar&#160;Davies, Donald Watts, 1924-&#160;Price, W. L., ort.yaz.<br/>Yer Numaras&#305;&#160;TK 5105 D43 1989<br/>Format:&#160;Kitap<br/>Durum&#160;Beytepe K&uuml;t&uuml;phanesi~1<br/> Computer Security &ndash; ESORICS 2009 14th European Symposium on Research in Computer Security, Saint-Malo, France, September 21-23, 2009. Proceedings ent://SD_ILS/0/SD_ILS:190950 2024-11-27T09:24:07Z 2024-11-27T09:24:07Z Yazar&#160;Backes, Michael. editor.&#160;Ning, Peng. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-3-642-04444-1">http://dx.doi.org/10.1007/978-3-642-04444-1</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Advances in Information and Computer Security 4th International Workshop on Security, IWSEC 2009 Toyama, Japan, October 28-30, 2009 Proceedings ent://SD_ILS/0/SD_ILS:191078 2024-11-27T09:24:07Z 2024-11-27T09:24:07Z Yazar&#160;Takagi, Tsuyoshi. editor.&#160;Mambo, Masahiro. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-3-642-04846-3">http://dx.doi.org/10.1007/978-3-642-04846-3</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Advances in Computer Science - ASIAN 2009. Information Security and Privacy 13th Asian Computing Science Conference, Seoul, Korea, December 14-16, 2009. Proceedings ent://SD_ILS/0/SD_ILS:191425 2024-11-27T09:24:07Z 2024-11-27T09:24:07Z Yazar&#160;Datta, Anupam. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-3-642-10622-4">http://dx.doi.org/10.1007/978-3-642-10622-4</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Computer Safety, Reliability, and Security 28th International Conference, SAFECOMP 2009, Hamburg, Germany, September 15-18, 2009. Proceedings ent://SD_ILS/0/SD_ILS:190960 2024-11-27T09:24:07Z 2024-11-27T09:24:07Z Yazar&#160;Buth, Bettina. editor.&#160;Rabe, Gerd. editor.&#160;Seyfarth, Till. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-3-642-04468-7">http://dx.doi.org/10.1007/978-3-642-04468-7</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Information security management handbook ent://SD_ILS/0/SD_ILS:289151 2024-11-27T09:24:07Z 2024-11-27T09:24:07Z Yazar&#160;Tipton, Harold F.&#160;Krause, Micki.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://marc.crcnetbase.com/isbn/9780203325438">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Information security management handbook ent://SD_ILS/0/SD_ILS:290320 2024-11-27T09:24:07Z 2024-11-27T09:24:07Z Yazar&#160;Tipton, Harold F.&#160;Krause, Micki.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://marc.crcnetbase.com/isbn/9781420003406">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Information security management handbook ent://SD_ILS/0/SD_ILS:287123 2024-11-27T09:24:07Z 2024-11-27T09:24:07Z Yazar&#160;Tipton, Harold F.&#160;Nozaki, Micki Krause.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://marc.crcnetbase.com/isbn/9781439893159">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Information security management handbook ent://SD_ILS/0/SD_ILS:290763 2024-11-27T09:24:07Z 2024-11-27T09:24:07Z Yazar&#160;Tipton, Harold F.&#160;Nozaki, Micki Krause.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://marc.crcnetbase.com/isbn/9781439853467">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Computer forensics and cyber crime : an introduction ent://SD_ILS/0/SD_ILS:134036 2024-11-27T09:24:07Z 2024-11-27T09:24:07Z Yazar&#160;Britz, Marjie.<br/>Yer Numaras&#305;&#160;QA76.9.A25 B77 2009<br/>Format:&#160;Kitap<br/>Durum&#160;Beytepe K&uuml;t&uuml;phanesi~1<br/> Next generation SSH2 implementation securing data in motion ent://SD_ILS/0/SD_ILS:146275 2024-11-27T09:24:07Z 2024-11-27T09:24:07Z Yazar&#160;Liu, Dale.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492836">http://www.sciencedirect.com/science/book/9781597492836</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Cloud security and privacy ent://SD_ILS/0/SD_ILS:144722 2024-11-27T09:24:07Z 2024-11-27T09:24:07Z Yazar&#160;Mather, Tim.&#160;Kumaraswamy, Subra.&#160;Latif, Shahed.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;EBSCOhost <a href="http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=414816">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=414816</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Nokia firewall, VPN, and IPSO configuration guide ent://SD_ILS/0/SD_ILS:146197 2024-11-27T09:24:07Z 2024-11-27T09:24:07Z Yazar&#160;Hay, Andrew, 1973-&#160;Giannoulis, Peter.&#160;Hay, Keli.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492867">http://www.sciencedirect.com/science/book/9781597492867</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> GFI network security and PCI compliance power tools ent://SD_ILS/0/SD_ILS:148143 2024-11-27T09:24:07Z 2024-11-27T09:24:07Z Yazar&#160;Posey, Brien.&#160;Thompson, Troy.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492850">http://www.sciencedirect.com/science/book/9781597492850</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Cisco router and switch forensics investigating and analyzing malicious network activity ent://SD_ILS/0/SD_ILS:148703 2024-11-27T09:24:07Z 2024-11-27T09:24:07Z Yazar&#160;Liu, Dale.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597494182">http://www.sciencedirect.com/science/book/9781597494182</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> SAP security configuration and deployment the IT administrator's guide to best practices ent://SD_ILS/0/SD_ILS:148994 2024-11-27T09:24:07Z 2024-11-27T09:24:07Z Yazar&#160;Wun-Young, Leslie.&#160;Hirao, Joey.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492843">http://www.sciencedirect.com/science/book/9781597492843</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Information security management handbook ent://SD_ILS/0/SD_ILS:289734 2024-11-27T09:24:07Z 2024-11-27T09:24:07Z Yazar&#160;Tipton, Harold F.&#160;Krause, Micki.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://marc.crcnetbase.com/isbn/9781420090956">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Information security governance a practical development and implementation approach ent://SD_ILS/0/SD_ILS:297743 2024-11-27T09:24:07Z 2024-11-27T09:24:07Z Yazar&#160;Brotby, W. Krag.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;Ebook Library <a href="http://public.eblib.com/EBLPublic/PublicView.do?ptiID=433807">http://public.eblib.com/EBLPublic/PublicView.do?ptiID=433807</a> John Wiley <a href="http://dx.doi.org/10.1002/9780470476017">http://dx.doi.org/10.1002/9780470476017</a> <a href="http://site.ebrary.com/lib/alltitles/Doc?id=10313652">http://site.ebrary.com/lib/alltitles/Doc?id=10313652</a> <a href="http://swb.eblib.com/patron/FullRecord.aspx?p=433807">http://swb.eblib.com/patron/FullRecord.aspx?p=433807</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Applied algebra : codes, ciphers, and discrete algorithms ent://SD_ILS/0/SD_ILS:312768 2024-11-27T09:24:07Z 2024-11-27T09:24:07Z Yazar&#160;Hardy, Darel W.&#160;Walker, Carol L., 1935-&#160;Richman, Fred, 1938-<br/>Yer Numaras&#305;&#160;QA268 H37 2009<br/>Format:&#160;Kitap<br/>Durum&#160;Beytepe K&uuml;t&uuml;phanesi~1<br/> Data protection governance, risk management, and compliance ent://SD_ILS/0/SD_ILS:289700 2024-11-27T09:24:07Z 2024-11-27T09:24:07Z Yazar&#160;Hill, David G. (David Gary), 1943-<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://marc.crcnetbase.com/isbn/9781439806937">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Profiling hackers the science of criminal profiling as applied to the world of hacking ent://SD_ILS/0/SD_ILS:291412 2024-11-27T09:24:07Z 2024-11-27T09:24:07Z Yazar&#160;Chiesa, Raoul, 1973-&#160;Ducci, Stefania.&#160;Ciappi, Silvio, 1965-<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://marc.crcnetbase.com/isbn/9781420086942">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Cyber fraud tactics, techniques, and procedures ent://SD_ILS/0/SD_ILS:291467 2024-11-27T09:24:07Z 2024-11-27T09:24:07Z Yazar&#160;Graham, James.&#160;Howard, Rick.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://marc.crcnetbase.com/isbn/9781420091281">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Information security management metrics a definitive guide to effective security monitoring and measurement ent://SD_ILS/0/SD_ILS:291373 2024-11-27T09:24:07Z 2024-11-27T09:24:07Z Yazar&#160;Brotby, W. Krag.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://marc.crcnetbase.com/isbn/9781420052862">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Information warfare ent://SD_ILS/0/SD_ILS:304069 2024-11-27T09:24:07Z 2024-11-27T09:24:07Z Yazar&#160;Ventre, Daniel.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;John Wiley <a href="http://dx.doi.org/10.1002/9781118381533">http://dx.doi.org/10.1002/9781118381533</a> <a href="http://lib.myilibrary.com?id=477736">http://lib.myilibrary.com?id=477736</a> OverDrive (PDF) <a href="http://www.contentreserve.com/TitleInfo.asp?ID={02D73229-3728-4EE5-942B-28D4B82AED18}&Format=50">http://www.contentreserve.com/TitleInfo.asp?ID={02D73229-3728-4EE5-942B-28D4B82AED18}&Format=50</a> OverDrive (EPUB) <a href="http://www.contentreserve.com/TitleInfo.asp?ID={02D73229-3728-4EE5-942B-28D4B82AED18}&Format=410">http://www.contentreserve.com/TitleInfo.asp?ID={02D73229-3728-4EE5-942B-28D4B82AED18}&Format=410</a> OverDrive (READ) <a href="http://www.contentreserve.com/TitleInfo.asp?ID={02D73229-3728-4EE5-942B-28D4B82AED18}&Format=610">http://www.contentreserve.com/TitleInfo.asp?ID={02D73229-3728-4EE5-942B-28D4B82AED18}&Format=610</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Security risk management body of knowledge ent://SD_ILS/0/SD_ILS:297759 2024-11-27T09:24:07Z 2024-11-27T09:24:07Z Yazar&#160;Talbot, Julian.&#160;Jakeman, Miles Gareth.&#160;Wiley InterScience (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;John Wiley <a href="http://dx.doi.org/10.1002/9780470494974">http://dx.doi.org/10.1002/9780470494974</a> Books24x7 <a href="http://www.books24x7.com/marc.asp?bookid=43285">http://www.books24x7.com/marc.asp?bookid=43285</a> MyiLibrary, Table of contents <a href="http://www.myilibrary.com?id=230340&ref=toc">http://www.myilibrary.com?id=230340&ref=toc</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> SIP security ent://SD_ILS/0/SD_ILS:297791 2024-11-27T09:24:07Z 2024-11-27T09:24:07Z Yazar&#160;Sisalem, Dorgham.&#160;Wiley InterScience (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://onlinelibrary.wiley.com/book/10.1002/9780470516997">http://onlinelibrary.wiley.com/book/10.1002/9780470516997</a> John Wiley <a href="http://dx.doi.org/10.1002/9780470516997">http://dx.doi.org/10.1002/9780470516997</a> <a href="http://site.ebrary.com/lib/alltitles/Doc?id=10298102">http://site.ebrary.com/lib/alltitles/Doc?id=10298102</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Disappearing cryptography information hiding : steganography &amp; watermarking ent://SD_ILS/0/SD_ILS:146450 2024-11-27T09:24:07Z 2024-11-27T09:24:07Z Yazar&#160;Wayner, Peter, 1964-<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780123744791">http://www.sciencedirect.com/science/book/9780123744791</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Eleventh hour security+ exam SYO-201 study guide ent://SD_ILS/0/SD_ILS:146534 2024-11-27T09:24:07Z 2024-11-27T09:24:07Z Yazar&#160;Dubrawsky, Ido.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597494274">http://www.sciencedirect.com/science/book/9781597494274</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Virtualization for security including sandboxing, disaster recovery, high availability, forensic analysis, and honeypotting ent://SD_ILS/0/SD_ILS:146775 2024-11-27T09:24:07Z 2024-11-27T09:24:07Z Yazar&#160;Hoopes, John.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597493055">http://www.sciencedirect.com/science/book/9781597493055</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> SQL injection attacks and defense ent://SD_ILS/0/SD_ILS:148576 2024-11-27T09:24:07Z 2024-11-27T09:24:07Z Yazar&#160;Clarke, Justin.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597494243">http://www.sciencedirect.com/science/book/9781597494243</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> CISO soft skills securing organizations impaired by employee politics, apathy, and intolerant perspectives ent://SD_ILS/0/SD_ILS:288744 2024-11-27T09:24:07Z 2024-11-27T09:24:07Z Yazar&#160;Collette, Ronald D.&#160;Gentile, Michael.&#160;Gentile, Skye.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://marc.crcnetbase.com/isbn/9781420089110">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Security in an IPv6 environment ent://SD_ILS/0/SD_ILS:291504 2024-11-27T09:24:07Z 2024-11-27T09:24:07Z Yazar&#160;Minoli, Daniel, 1952-&#160;Kouns, Jake.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://marc.crcnetbase.com/isbn/9781420092301">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Digital fortress ent://SD_ILS/0/SD_ILS:354167 2024-11-27T09:24:07Z 2024-11-27T09:24:07Z Yazar&#160;Brown, Dan, 1964- .<br/>Yer Numaras&#305;&#160;PS3552.R685434 D53 2009<br/>Format:&#160;Kitap<br/>Durum&#160;Beytepe K&uuml;t&uuml;phanesi~1<br/>