Arama Sonuçları Computer security - Daraltılmış: Electronic books.
SirsiDynix Enterprise
https://katalog.hacettepe.edu.tr/client/tr_TR/default_tr/default_tr/qu$003dComputer$002bsecurity$0026qf$003dSUBJECT$002509Konu$002509Electronic$002bbooks.$002509Electronic$002bbooks.$0026ps$003d300$0026isd$003dtrue?
2024-11-15T02:10:28Z
Computer security and cryptography
ent://SD_ILS/0/SD_ILS:296865
2024-11-15T02:10:28Z
2024-11-15T02:10:28Z
Yazar Konheim, Alan G., 1934-<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://www.contentreserve.com/TitleInfo.asp?ID={24307C36-99BB-4A76-9317-7D1A7CC786FB}&Format=50">Click for information</a>
<a href="http://proquest.safaribooksonline.com/?fpi=9780471947837">Available by subscription from Safari Books Online</a>
Ebook Library <a href="http://public.eblib.com/EBLPublic/PublicView.do?ptiID=288170">http://public.eblib.com/EBLPublic/PublicView.do?ptiID=288170</a>
John Wiley <a href="http://dx.doi.org/10.1002/0470083980">http://dx.doi.org/10.1002/0470083980</a>
Volltext <a href="http://proquest.tech.safaribooksonline.de/9780471947837">http://proquest.tech.safaribooksonline.de/9780471947837</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Computer and information security handbook
ent://SD_ILS/0/SD_ILS:148884
2024-11-15T02:10:28Z
2024-11-15T02:10:28Z
Yazar Vacca, John R.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780123743541">http://www.sciencedirect.com/science/book/9780123743541</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Hardware-based computer security techniques to defeat hackers from biometrics to quantum cryptography
ent://SD_ILS/0/SD_ILS:297432
2024-11-15T02:10:28Z
2024-11-15T02:10:28Z
Yazar Dube, Roger. Wiley InterScience (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://proquest.safaribooksonline.com/?fpi=9780470193396">Available by subscription from Safari Books Online</a>
John Wiley <a href="http://dx.doi.org/10.1002/9780470425497">http://dx.doi.org/10.1002/9780470425497</a>
MyiLibrary, Table of contents <a href="http://www.myilibrary.com?id=183706&ref=toc">http://www.myilibrary.com?id=183706&ref=toc</a>
Volltext <a href="http://proquest.tech.safaribooksonline.de/9780470193396">http://proquest.tech.safaribooksonline.de/9780470193396</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Machine learning and cognitive science applications in cyber security
ent://SD_ILS/0/SD_ILS:482151
2024-11-15T02:10:28Z
2024-11-15T02:10:28Z
Yazar Khan, Muhammad Salman, author. IGI Global, publisher.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-8100-0">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-8100-0</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Business continuity and disaster recovery planning for IT professionals
ent://SD_ILS/0/SD_ILS:306695
2024-11-15T02:10:28Z
2024-11-15T02:10:28Z
Yazar Snedaker, Susan. Rima, Chris.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780124105263">http://www.sciencedirect.com/science/book/9780124105263</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Cybersecurity for executives : a practical guide
ent://SD_ILS/0/SD_ILS:341997
2024-11-15T02:10:28Z
2024-11-15T02:10:28Z
Yazar Touhill, Gregory J., author. Touhill, C. J., 1938- author.<br/>Yer Numarası ONLINE(341997.1)<br/>Elektronik Erişim Ebook Library <a href="http://public.eblib.com/choice/publicfullrecord.aspx?p=1707094">http://public.eblib.com/choice/publicfullrecord.aspx?p=1707094</a>
ebrary <a href="http://site.ebrary.com/id/10879737">http://site.ebrary.com/id/10879737</a>
John Wiley <a href="http://dx.doi.org/10.1002/9781118908785">http://dx.doi.org/10.1002/9781118908785</a>
MyiLibrary <a href="http://www.myilibrary.com?id=621896">http://www.myilibrary.com?id=621896</a>
Safari Books Online <a href="http://proquest.safaribooksonline.com/?fpi=9781118908808">http://proquest.safaribooksonline.com/?fpi=9781118908808</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Cyber threat! : how to manage the growing risk of cyber attacks
ent://SD_ILS/0/SD_ILS:342020
2024-11-15T02:10:28Z
2024-11-15T02:10:28Z
Yazar Ulsch, N. MacDonnell, 1951-<br/>Yer Numarası ONLINE(342020.1)<br/>Elektronik Erişim ebrary <a href="http://alltitles.ebrary.com/Doc?id=10895757">An electronic book accessible through the World Wide Web; click to view</a>
Ebook Library <a href="http://public.eblib.com/choice/publicfullrecord.aspx?p=1742833">http://public.eblib.com/choice/publicfullrecord.aspx?p=1742833</a>
John Wiley <a href="http://dx.doi.org/10.1002/9781118915028">http://dx.doi.org/10.1002/9781118915028</a>
MyiLibrary <a href="http://www.myilibrary.com?id=629214">http://www.myilibrary.com?id=629214</a>
Cover <a href="http://swbplus.bsz-bw.de/bsz410564842cov.htm">http://swbplus.bsz-bw.de/bsz410564842cov.htm</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Cloud management and security
ent://SD_ILS/0/SD_ILS:341816
2024-11-15T02:10:28Z
2024-11-15T02:10:28Z
Yazar Abbadi, Imad M., author.<br/>Yer Numarası ONLINE(341816.1)<br/>Elektronik Erişim ebrary <a href="http://alltitles.ebrary.com/Doc?id=10881234">An electronic book accessible through the World Wide Web; click to view</a>
<a href="http://www.lib.uts.edu.au/sso/goto.php?url=http://www.UTS.eblib.com.AU/EBLWeb/patron/?target=patron&extendedid=P_1701403_0">Electronic version</a>
Cover image <a href="http://catalogimages.wiley.com/images/db/jimages/9781118817094.jpg">http://catalogimages.wiley.com/images/db/jimages/9781118817094.jpg</a>
John Wiley <a href="http://dx.doi.org/10.1002/9781118817087">http://dx.doi.org/10.1002/9781118817087</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Federated identity primer
ent://SD_ILS/0/SD_ILS:306461
2024-11-15T02:10:28Z
2024-11-15T02:10:28Z
Yazar Rountree, Derrick.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780124071896">http://www.sciencedirect.com/science/book/9780124071896</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Reliability and availability of cloud computing
ent://SD_ILS/0/SD_ILS:249383
2024-11-15T02:10:28Z
2024-11-15T02:10:28Z
Yazar Bauer, Eric. Adams, Randee. Wiley InterScience (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim IEEE Xplore <a href="http://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=6266788">http://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=6266788</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
The basics of information security understanding the fundamentals of InfoSec in theory and practice
ent://SD_ILS/0/SD_ILS:145371
2024-11-15T02:10:28Z
2024-11-15T02:10:28Z
Yazar Andress, Jason.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597496537">http://www.sciencedirect.com/science/book/9781597496537</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Engineering information security the application of systems engineering concepts to achieve information assurance
ent://SD_ILS/0/SD_ILS:249916
2024-11-15T02:10:28Z
2024-11-15T02:10:28Z
Yazar Jacobs, Stuart.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim IEEE Xplore <a href="http://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=6047604">http://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=6047604</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Implementing SSL/TLS using cryptography and PKI
ent://SD_ILS/0/SD_ILS:303838
2024-11-15T02:10:28Z
2024-11-15T02:10:28Z
Yazar Davies, Joshua A. (Joshua Aaron)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim Wiley InterScience <a href="http://dx.doi.org/10.1002/9781118255797">An electronic book accessible through the World Wide Web; click for information</a>
<a href="http://proquest.safaribooksonline.com/?fpi=9780470920411">Available by subscription from Safari Books Online</a>
<a href="http://public.eblib.com/EBLPublic/PublicView.do?ptiID=706899">Click here to view book</a>
Books24x7 <a href="http://www.books24x7.com/marc.asp?bookid=40694">http://www.books24x7.com/marc.asp?bookid=40694</a>
Volltext <a href="http://proquest.safaribooksonline.com/9780470920411">http://proquest.safaribooksonline.com/9780470920411</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Information security principles and practice
ent://SD_ILS/0/SD_ILS:298878
2024-11-15T02:10:28Z
2024-11-15T02:10:28Z
Yazar Stamp, Mark.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim Wiley InterScience <a href="http://dx.doi.org/10.1002/9781118027974">An electronic book accessible through the World Wide Web; click for information</a>
Ebook Library <a href="http://public.eblib.com/EBLPublic/PublicView.do?ptiID=738753">http://public.eblib.com/EBLPublic/PublicView.do?ptiID=738753</a>
<a href="http://site.ebrary.com/lib/alltitles/Doc?id=10478419">http://site.ebrary.com/lib/alltitles/Doc?id=10478419</a>
<a href="http://swb.eblib.com/patron/FullRecord.aspx?p=738753">http://swb.eblib.com/patron/FullRecord.aspx?p=738753</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Hashing in computer science fifty years of slicing and dicing
ent://SD_ILS/0/SD_ILS:298025
2024-11-15T02:10:28Z
2024-11-15T02:10:28Z
Yazar Konheim, Alan G., 1934-<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://proquest.safaribooksonline.com/?fpi=9781118031834">Available by subscription from Safari Books Online</a>
John Wiley <a href="http://dx.doi.org/10.1002/9780470630617">http://dx.doi.org/10.1002/9780470630617</a>
Contributor biographical information <a href="http://catdir.loc.gov/catdir/enhancements/fy1106/2009052123-b.html">http://catdir.loc.gov/catdir/enhancements/fy1106/2009052123-b.html</a>
Volltext <a href="http://proquest.tech.safaribooksonline.de/9781118031834">http://proquest.tech.safaribooksonline.de/9781118031834</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Mac security bible
ent://SD_ILS/0/SD_ILS:303881
2024-11-15T02:10:28Z
2024-11-15T02:10:28Z
Yazar Kissell, Joe.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim Wiley InterScience <a href="http://dx.doi.org/10.1002/9781118257739">An electronic book accessible through the World Wide Web; click for information</a>
Safari Books Online <a href="http://proquest.safaribooksonline.com/640">http://proquest.safaribooksonline.com/640</a> <a href="http://proquest.safaribooksonline.com/?fpi=9780470474198">http://proquest.safaribooksonline.com/?fpi=9780470474198</a>
Safari Books Online <a href="http://proquest.safaribooksonline.com/9780470474198">http://proquest.safaribooksonline.com/9780470474198</a>
Books24x7 <a href="http://www.books24x7.com/marc.asp?bookid=40737">http://www.books24x7.com/marc.asp?bookid=40737</a>
<a href="http://site.ebrary.com/lib/alltitles/Doc?id=10358774">http://site.ebrary.com/lib/alltitles/Doc?id=10358774</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
IT audit, control, and security
ent://SD_ILS/0/SD_ILS:304008
2024-11-15T02:10:28Z
2024-11-15T02:10:28Z
Yazar Moeller, Robert R.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim Wiley InterScience <a href="http://dx.doi.org/10.1002/9781118269138">An electronic book accessible through the World Wide Web; click for information</a>
Ebook Library <a href="http://public.eblib.com/EBLPublic/PublicView.do?ptiID=624573">http://public.eblib.com/EBLPublic/PublicView.do?ptiID=624573</a>
Books24x7 <a href="http://www.books24x7.com/marc.asp?bookid=40717">http://www.books24x7.com/marc.asp?bookid=40717</a>
<a href="http://site.ebrary.com/lib/alltitles/Doc?id=10469768">http://site.ebrary.com/lib/alltitles/Doc?id=10469768</a>
<a href="http://swb.eblib.com/patron/FullRecord.aspx?p=624573">http://swb.eblib.com/patron/FullRecord.aspx?p=624573</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Information security governance a practical development and implementation approach
ent://SD_ILS/0/SD_ILS:297743
2024-11-15T02:10:28Z
2024-11-15T02:10:28Z
Yazar Brotby, W. Krag.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim Ebook Library <a href="http://public.eblib.com/EBLPublic/PublicView.do?ptiID=433807">http://public.eblib.com/EBLPublic/PublicView.do?ptiID=433807</a>
John Wiley <a href="http://dx.doi.org/10.1002/9780470476017">http://dx.doi.org/10.1002/9780470476017</a>
<a href="http://site.ebrary.com/lib/alltitles/Doc?id=10313652">http://site.ebrary.com/lib/alltitles/Doc?id=10313652</a>
<a href="http://swb.eblib.com/patron/FullRecord.aspx?p=433807">http://swb.eblib.com/patron/FullRecord.aspx?p=433807</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
SIP security
ent://SD_ILS/0/SD_ILS:297791
2024-11-15T02:10:28Z
2024-11-15T02:10:28Z
Yazar Sisalem, Dorgham. Wiley InterScience (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://onlinelibrary.wiley.com/book/10.1002/9780470516997">http://onlinelibrary.wiley.com/book/10.1002/9780470516997</a>
John Wiley <a href="http://dx.doi.org/10.1002/9780470516997">http://dx.doi.org/10.1002/9780470516997</a>
<a href="http://site.ebrary.com/lib/alltitles/Doc?id=10298102">http://site.ebrary.com/lib/alltitles/Doc?id=10298102</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Network security current status and future directions
ent://SD_ILS/0/SD_ILS:249506
2024-11-15T02:10:28Z
2024-11-15T02:10:28Z
Yazar Douligeris, C. (Christos)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim IEEE Xplore <a href="http://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=5237765">http://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=5237765</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Applied cryptanalysis breaking ciphers in the real world
ent://SD_ILS/0/SD_ILS:249508
2024-11-15T02:10:28Z
2024-11-15T02:10:28Z
Yazar Stamp, Mark. Low, Richard M., 1967-<br/>Yer Numarası ONLINE<br/>Elektronik Erişim IEEE Xplore <a href="http://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=5201512">http://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=5201512</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Developer's guide to web application security
ent://SD_ILS/0/SD_ILS:306464
2024-11-15T02:10:28Z
2024-11-15T02:10:28Z
Yazar Cross, Michael, 1965-<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490610">http://www.sciencedirect.com/science/book/9781597490610</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Metasploit toolkit for penetration testing, exploit development, and vulnerability research
ent://SD_ILS/0/SD_ILS:306469
2024-11-15T02:10:28Z
2024-11-15T02:10:28Z
Yazar Maynor, David. Mookhey, K. K.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490740">http://www.sciencedirect.com/science/book/9781597490740</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
How to cheat at securing your network
ent://SD_ILS/0/SD_ILS:306503
2024-11-15T02:10:28Z
2024-11-15T02:10:28Z
Yazar Dubrawsky, Ido.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492317">http://www.sciencedirect.com/science/book/9781597492317</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Insider threat protecting the enterprise from sabotage, spying, and theft
ent://SD_ILS/0/SD_ILS:253661
2024-11-15T02:10:28Z
2024-11-15T02:10:28Z
Yazar Cole, Eric. Ring, Sandra.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim Volltext <a href="http://www.sciencedirect.com/science/book/9781597490481">http://www.sciencedirect.com/science/book/9781597490481</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Practical VoIP security
ent://SD_ILS/0/SD_ILS:253669
2024-11-15T02:10:28Z
2024-11-15T02:10:28Z
Yazar Porter, Thomas.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490603">http://www.sciencedirect.com/science/book/9781597490603</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
How to cheat at designing security for a Windows Server 2003 network
ent://SD_ILS/0/SD_ILS:253670
2024-11-15T02:10:28Z
2024-11-15T02:10:28Z
Yazar Amini, Rob. Hunter, Laura E.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492430">http://www.sciencedirect.com/science/book/9781597492430</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Combating spyware in the enterprise
ent://SD_ILS/0/SD_ILS:254075
2024-11-15T02:10:28Z
2024-11-15T02:10:28Z
Yazar Baskin, Brian. Piltzecker, Tony, 1975-<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490641">http://www.sciencedirect.com/science/book/9781597490641</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Information security principles and practice
ent://SD_ILS/0/SD_ILS:301803
2024-11-15T02:10:28Z
2024-11-15T02:10:28Z
Yazar Stamp, Mark.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://www.contentreserve.com/TitleInfo.asp?ID={310C0D18-7395-435E-BA71-41A0448F3D13}&Format=50">Click for information</a>
Ebook Library <a href="http://public.eblib.com/EBLPublic/PublicView.do?ptiID=240929">http://public.eblib.com/EBLPublic/PublicView.do?ptiID=240929</a>
John Wiley <a href="http://dx.doi.org/10.1002/0471744190">http://dx.doi.org/10.1002/0471744190</a>
<a href="http://www3.interscience.wiley.com/cgi-bin/bookhome/109933408">http://www3.interscience.wiley.com/cgi-bin/bookhome/109933408</a>
HathiTrust Digital Library, Limited view (search only) <a href="http://catalog.hathitrust.org/api/volumes/oclc/57754240.html">http://catalog.hathitrust.org/api/volumes/oclc/57754240.html</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Critical infrastructure protection in homeland security defending a networked nation
ent://SD_ILS/0/SD_ILS:303065
2024-11-15T02:10:28Z
2024-11-15T02:10:28Z
Yazar Lewis, T. G. (Theodore Gyle), 1941-<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://www.contentreserve.com/TitleInfo.asp?ID={B7674963-A0F9-4349-AB2D-7F1D59FE8883}&Format=50">Click for information</a>
John Wiley <a href="http://dx.doi.org/10.1002/0471789542">http://dx.doi.org/10.1002/0471789542</a>
<a href="http://www3.interscience.wiley.com/cgi-bin/bookhome/112100959">http://www3.interscience.wiley.com/cgi-bin/bookhome/112100959</a>
MyiLibrary, Table of contents <a href="http://www.myilibrary.com?id=41147&ref=toc">http://www.myilibrary.com?id=41147&ref=toc</a>
HathiTrust Digital Library, Limited view (search only) <a href="http://catalog.hathitrust.org/api/volumes/oclc/61651657.html">http://catalog.hathitrust.org/api/volumes/oclc/61651657.html</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Securing HP NonStop servers in an open systems world TCP/IP, OSS & SQL
ent://SD_ILS/0/SD_ILS:253863
2024-11-15T02:10:28Z
2024-11-15T02:10:28Z
Yazar XYPRO Technology Corporation.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781555583446">http://www.sciencedirect.com/science/book/9781555583446</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Information security and ethics social and organizational issues
ent://SD_ILS/0/SD_ILS:152966
2024-11-15T02:10:28Z
2024-11-15T02:10:28Z
Yazar Quigley, Marian.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim EBSCOhost <a href="http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=108396">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=108396</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Stealing the network how to own an identity
ent://SD_ILS/0/SD_ILS:253663
2024-11-15T02:10:28Z
2024-11-15T02:10:28Z
Yazar Alder, Raven. Mullen, Timothy M. Long, Johnny.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490061">http://www.sciencedirect.com/science/book/9781597490061</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Software piracy exposed
ent://SD_ILS/0/SD_ILS:253664
2024-11-15T02:10:28Z
2024-11-15T02:10:28Z
Yazar Craig, Paul. Honick, Ron. Burnett, Mark (Mark M.)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781932266986">http://www.sciencedirect.com/science/book/9781932266986</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Aggressive network self-defense
ent://SD_ILS/0/SD_ILS:253672
2024-11-15T02:10:28Z
2024-11-15T02:10:28Z
Yazar Wyler, Neil R.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836203">http://www.sciencedirect.com/science/book/9781931836203</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Cyber spying tracking your family's (sometimes) secret online lives
ent://SD_ILS/0/SD_ILS:253673
2024-11-15T02:10:28Z
2024-11-15T02:10:28Z
Yazar Fair, Ted. Nordfelt, Michael. Ring, Sandra. Cole, Eric.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836418">http://www.sciencedirect.com/science/book/9781931836418</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
InfoSec career hacking sell your skillz, not your soul
ent://SD_ILS/0/SD_ILS:253681
2024-11-15T02:10:28Z
2024-11-15T02:10:28Z
Yazar Bayles, Aaron W. Brindley, Ed. Foster, James C. Hurley, Chris. Long, Johnny.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490115">http://www.sciencedirect.com/science/book/9781597490115</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Security sage's guide to hardening the network infrastructure
ent://SD_ILS/0/SD_ILS:253636
2024-11-15T02:10:28Z
2024-11-15T02:10:28Z
Yazar Andrés, Steven.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836012">http://www.sciencedirect.com/science/book/9781931836012</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Managing and securing a Cisco structured wireless-aware network
ent://SD_ILS/0/SD_ILS:253637
2024-11-15T02:10:28Z
2024-11-15T02:10:28Z
Yazar Wall, David.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781932266917">http://www.sciencedirect.com/science/book/9781932266917</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Snort 2.1 intrusion detection
ent://SD_ILS/0/SD_ILS:253989
2024-11-15T02:10:28Z
2024-11-15T02:10:28Z
Yazar Beale, Jay. Alder, Raven.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836043">http://www.sciencedirect.com/science/book/9781931836043</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Cybersecurity operations handbook
ent://SD_ILS/0/SD_ILS:253847
2024-11-15T02:10:28Z
2024-11-15T02:10:28Z
Yazar Rittinghouse, John W. Hancock, Bill, 1957-<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781555583064">http://www.sciencedirect.com/science/book/9781555583064</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Scene of the cybercrime computer forensics handbook
ent://SD_ILS/0/SD_ILS:253615
2024-11-15T02:10:28Z
2024-11-15T02:10:28Z
Yazar Shinder, Debra Littlejohn. Tittel, Ed.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836654">http://www.sciencedirect.com/science/book/9781931836654</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Managing Cisco network security
ent://SD_ILS/0/SD_ILS:253616
2024-11-15T02:10:28Z
2024-11-15T02:10:28Z
Yazar Knipp, Eric. Danielyan, Edgar.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836562">http://www.sciencedirect.com/science/book/9781931836562</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Hack proofing your network
ent://SD_ILS/0/SD_ILS:253618
2024-11-15T02:10:28Z
2024-11-15T02:10:28Z
Yazar Ahmad, David R. Mirza. Russell, Ryan, 1969-<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781928994701">http://www.sciencedirect.com/science/book/9781928994701</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Security for telecommunications network management
ent://SD_ILS/0/SD_ILS:249697
2024-11-15T02:10:28Z
2024-11-15T02:10:28Z
Yazar Rozenblit, Moshe, 1944-<br/>Yer Numarası ONLINE<br/>Elektronik Erişim IEEE Xplore <a href="http://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=5263947">http://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=5263947</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Contemporary cryptology the science of information integrity
ent://SD_ILS/0/SD_ILS:249661
2024-11-15T02:10:28Z
2024-11-15T02:10:28Z
Yazar Simmons, Gustavus J. Institute of Electrical and Electronics Engineers.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim IEEE Xplore <a href="http://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=5265879">http://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=5265879</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>