Arama Sonuçları Computer security -- United States.SirsiDynix Enterprisehttps://katalog.hacettepe.edu.tr/client/tr_TR/default_tr/default_tr/qu$003dComputer$002bsecurity$002b--$002bUnited$002bStates.$0026ps$003d300?dt=list2024-11-28T20:09:25ZInformation privacy fundamentals for librarians and information professionalsent://SD_ILS/0/SD_ILS:3645052024-11-28T20:09:25Z2024-11-28T20:09:25ZYazar Givens, Cherie L., 1969- author.<br/>Yer Numarası KF1263.C65 G58 2015<br/>Format: Kitap<br/>Durum Hukuk Kütüphanesi~1<br/>FISMA and the risk management framework the new practice of federal cyber securityent://SD_ILS/0/SD_ILS:1459362024-11-28T20:09:25Z2024-11-28T20:09:25ZYazar Gantz, Stephen D. Philpott, Daniel R.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597496414">http://www.sciencedirect.com/science/book/9781597496414</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Gray hat hacking the ethical hacker's handbookent://SD_ILS/0/SD_ILS:2932552024-11-28T20:09:25Z2024-11-28T20:09:25ZYazar Harris, Shon. Harper, Allen. Eagle, Chris. Ness, Jonathan. Lenkey, Gideon.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://mhebooklibrary.com/reader/gray-hat-hacking-ethical-hackers-handbook-3rd-edition">Subscription required</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>FISMA principles and best practices beyond complianceent://SD_ILS/0/SD_ILS:2906542024-11-28T20:09:25Z2024-11-28T20:09:25ZYazar Howard, Patrick D.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://marc.crcnetbase.com/isbn/9781420078305">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Cyber attacks protecting national infrastructureent://SD_ILS/0/SD_ILS:1475062024-11-28T20:09:25Z2024-11-28T20:09:25ZYazar Amoroso, Edward G.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780123849175">http://www.sciencedirect.com/science/book/9780123849175</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>China's cyberwarfare capabilityent://SD_ILS/0/SD_ILS:2814812024-11-28T20:09:25Z2024-11-28T20:09:25ZYazar Marvel, Elisabette M.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim EBSCOhost <a href="http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=581824">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=581824</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Critical infrastructure protection in homeland security defending a networked nationent://SD_ILS/0/SD_ILS:3030652024-11-28T20:09:25Z2024-11-28T20:09:25ZYazar Lewis, T. G. (Theodore Gyle), 1941-<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://www.contentreserve.com/TitleInfo.asp?ID={B7674963-A0F9-4349-AB2D-7F1D59FE8883}&Format=50">Click for information</a>
John Wiley <a href="http://dx.doi.org/10.1002/0471789542">http://dx.doi.org/10.1002/0471789542</a>
<a href="http://www3.interscience.wiley.com/cgi-bin/bookhome/112100959">http://www3.interscience.wiley.com/cgi-bin/bookhome/112100959</a>
MyiLibrary, Table of contents <a href="http://www.myilibrary.com?id=41147&ref=toc">http://www.myilibrary.com?id=41147&ref=toc</a>
HathiTrust Digital Library, Limited view (search only) <a href="http://catalog.hathitrust.org/api/volumes/oclc/61651657.html">http://catalog.hathitrust.org/api/volumes/oclc/61651657.html</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>