Arama Sonuçları Computer security - Daraltılmış: 2016
SirsiDynix Enterprise
https://katalog.hacettepe.edu.tr/client/tr_TR/default_tr/default_tr/qu$003dComputer$002bsecurity$0026qf$003dPUBDATE$002509Yay$0025C4$0025B1n$002bY$0025C4$0025B1l$0025C4$0025B1$0025092016$0025092016$0026ps$003d300$0026isd$003dtrue?dt=list
2024-11-23T10:32:26Z
Sequrity for computer networks : an introduction to data security in teleprocessing and electronic funds transfer
ent://SD_ILS/0/SD_ILS:62188
2024-11-23T10:32:26Z
2024-11-23T10:32:26Z
Yazar Davies, Donald Watts, 1924- Price, W. L., ort.yaz.<br/>Yer Numarası TK 5105 D43 1989<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>
Information security management handbook
ent://SD_ILS/0/SD_ILS:287123
2024-11-23T10:32:26Z
2024-11-23T10:32:26Z
Yazar Tipton, Harold F. Nozaki, Micki Krause.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://marc.crcnetbase.com/isbn/9781439893159">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Information security management handbook
ent://SD_ILS/0/SD_ILS:290320
2024-11-23T10:32:26Z
2024-11-23T10:32:26Z
Yazar Tipton, Harold F. Krause, Micki.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://marc.crcnetbase.com/isbn/9781420003406">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Information security management handbook
ent://SD_ILS/0/SD_ILS:289151
2024-11-23T10:32:26Z
2024-11-23T10:32:26Z
Yazar Tipton, Harold F. Krause, Micki.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://marc.crcnetbase.com/isbn/9780203325438">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Java programlama diliyle kriptoloji uygulamaları
ent://SD_ILS/0/SD_ILS:380319
2024-11-23T10:32:26Z
2024-11-23T10:32:26Z
Yazar Bodur, Hüseyin<br/>Yer Numarası QA76.9.A25 B63 2016<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>
Cyber security awareness for CEOs and management
ent://SD_ILS/0/SD_ILS:458665
2024-11-23T10:32:26Z
2024-11-23T10:32:26Z
Yazar Willson, David (Lawyer), author. Dalziel, Henry, editor.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128047545">http://www.sciencedirect.com/science/book/9780128047545</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Cybersecurity and applied mathematics
ent://SD_ILS/0/SD_ILS:458966
2024-11-23T10:32:26Z
2024-11-23T10:32:26Z
Yazar Metcalf, Leigh, author. Casey, William, author.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128044520">http://www.sciencedirect.com/science/book/9780128044520</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Eleventh Hour CISSP®
ent://SD_ILS/0/SD_ILS:459073
2024-11-23T10:32:26Z
2024-11-23T10:32:26Z
Yazar Conrad, Eric, author. Seth Misenar, author. Joshua Feldman, author.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128112489">http://www.sciencedirect.com/science/book/9780128112489</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Mobile data loss : threats and countermeasures
ent://SD_ILS/0/SD_ILS:458729
2024-11-23T10:32:26Z
2024-11-23T10:32:26Z
Yazar Raggo, Michael T.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="https://www.sciencedirect.com/science/book/9780128028643">https://www.sciencedirect.com/science/book/9780128028643</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Protecting patient information : a decision-maker's guide to risk, prevention, and damage control
ent://SD_ILS/0/SD_ILS:458833
2024-11-23T10:32:26Z
2024-11-23T10:32:26Z
Yazar Cerrato, Paul, author. Andress, Jason, editor.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="https://www.sciencedirect.com/science/book/9780128043929">https://www.sciencedirect.com/science/book/9780128043929</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
OS X incident response : scripting and analysis
ent://SD_ILS/0/SD_ILS:458869
2024-11-23T10:32:26Z
2024-11-23T10:32:26Z
Yazar Bradley, Jaron, author.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128044568">http://www.sciencedirect.com/science/book/9780128044568</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Threat forecasting : leveraging big data for predictive analysis
ent://SD_ILS/0/SD_ILS:458886
2024-11-23T10:32:26Z
2024-11-23T10:32:26Z
Yazar Pirc, John, author. DeSanto, David, author. Davison, Iain, author. Gragido, Will, author.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="https://www.sciencedirect.com/science/book/9780128000069">https://www.sciencedirect.com/science/book/9780128000069</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Windows registry forensics : advanced digital forensic analysis of the Windows registry
ent://SD_ILS/0/SD_ILS:458777
2024-11-23T10:32:26Z
2024-11-23T10:32:26Z
Yazar Carvey, Harlan A., author.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128032916">http://www.sciencedirect.com/science/book/9780128032916</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Network performance and security : testing and analyzing using open source and low-cost tools
ent://SD_ILS/0/SD_ILS:458789
2024-11-23T10:32:26Z
2024-11-23T10:32:26Z
Yazar Chapman, Chris, author.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128035849">http://www.sciencedirect.com/science/book/9780128035849</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Data breach preparation and response : breaches are certain, impact is not
ent://SD_ILS/0/SD_ILS:458926
2024-11-23T10:32:26Z
2024-11-23T10:32:26Z
Yazar Fowler, Kevvie, author.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="https://www.sciencedirect.com/science/book/9780128034514">https://www.sciencedirect.com/science/book/9780128034514</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
DNS security : defending the domain name system
ent://SD_ILS/0/SD_ILS:458935
2024-11-23T10:32:26Z
2024-11-23T10:32:26Z
Yazar Liska, Allan, author. Stowe, Geoffrey, author.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128033067">http://www.sciencedirect.com/science/book/9780128033067</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Cyber guerilla
ent://SD_ILS/0/SD_ILS:458953
2024-11-23T10:32:26Z
2024-11-23T10:32:26Z
Yazar Haaster, Jelle van, author. Gevers, Rickey, author. Sprengers, Martijn, author.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128051979">http://www.sciencedirect.com/science/book/9780128051979</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Information security science : measuring the vulnerability to data compromises
ent://SD_ILS/0/SD_ILS:458968
2024-11-23T10:32:26Z
2024-11-23T10:32:26Z
Yazar Young, Carl S., author.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128096437">http://www.sciencedirect.com/science/book/9780128096437</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Coding for penetration testers : building better tools
ent://SD_ILS/0/SD_ILS:459217
2024-11-23T10:32:26Z
2024-11-23T10:32:26Z
Yazar Andress, Jason, author. Linn, Ryan, author.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128054727">http://www.sciencedirect.com/science/book/9780128054727</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Ethical hacking : offensive & defensive
ent://SD_ILS/0/SD_ILS:513450
2024-11-23T10:32:26Z
2024-11-23T10:32:26Z
Yazar Çıtak, Ömer.<br/>Yer Numarası QA76.9.A25 C58 2016<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>
Hacking Interface
ent://SD_ILS/0/SD_ILS:513452
2024-11-23T10:32:26Z
2024-11-23T10:32:26Z
Yazar Elbahadır, Hamza.<br/>Yer Numarası QA76.9.A25 E43 2016<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>