Arama Sonuçları Computer security. - Daraltılmış: 2004SirsiDynix Enterprisehttps://katalog.hacettepe.edu.tr/client/tr_TR/default_tr/default_tr/qu$003dComputer$002bsecurity.$0026qf$003dPUBDATE$002509Yay$0025C4$0025B1n$002bY$0025C4$0025B1l$0025C4$0025B1$0025092004$0025092004$0026ps$003d300?2024-11-02T13:36:17ZSequrity for computer networks : an introduction to data security in teleprocessing and electronic funds transferent://SD_ILS/0/SD_ILS:621882024-11-02T13:36:17Z2024-11-02T13:36:17ZYazar Davies, Donald Watts, 1924- Price, W. L., ort.yaz.<br/>Yer Numarası TK 5105 D43 1989<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>Information security management handbookent://SD_ILS/0/SD_ILS:2903202024-11-02T13:36:17Z2024-11-02T13:36:17ZYazar Tipton, Harold F. Krause, Micki.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://marc.crcnetbase.com/isbn/9781420003406">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Information security management handbookent://SD_ILS/0/SD_ILS:2891512024-11-02T13:36:17Z2024-11-02T13:36:17ZYazar Tipton, Harold F. Krause, Micki.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://marc.crcnetbase.com/isbn/9780203325438">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Digital fortressent://SD_ILS/0/SD_ILS:3541672024-11-02T13:36:17Z2024-11-02T13:36:17ZYazar Brown, Dan, 1964- .<br/>Yer Numarası PS3552.R685434 D53 2009<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>Sockets, shellcode, porting & coding reverse engineering exploits and tool coding for security professionalsent://SD_ILS/0/SD_ILS:2539382024-11-02T13:36:17Z2024-11-02T13:36:17ZYazar Foster, James C. Price, Mike (Mike Morgan) McClure, Stuart.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490054">http://www.sciencedirect.com/science/book/9781597490054</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Disruptive security technologies with mobile code and peer-to-peer networksent://SD_ILS/0/SD_ILS:2913052024-11-02T13:36:17Z2024-11-02T13:36:17ZYazar Brooks, R. R. (Richard R.)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://marc.crcnetbase.com/isbn/9781420038880">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Security for Mobilityent://SD_ILS/0/SD_ILS:2479902024-11-02T13:36:17Z2024-11-02T13:36:17ZYazar Mitchell, Chris J., ed.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1049/PBTE051E">http://dx.doi.org/10.1049/PBTE051E</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Hacking the code ASP.NET web application securityent://SD_ILS/0/SD_ILS:2540222024-11-02T13:36:17Z2024-11-02T13:36:17ZYazar Burnett, Mark M. Foster, James C.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781932266658">http://www.sciencedirect.com/science/book/9781932266658</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Ethereal packet sniffingent://SD_ILS/0/SD_ILS:2540262024-11-02T13:36:17Z2024-11-02T13:36:17ZYazar Orebaugh, Angela. Morris, Greg. Warnicke, Ed. Ramirez, Gilbert. Syngress Media, Inc.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781932266825">http://www.sciencedirect.com/science/book/9781932266825</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Check Point Next Generation with application intelligence security administrationent://SD_ILS/0/SD_ILS:2540292024-11-02T13:36:17Z2024-11-02T13:36:17ZYazar Tobkin, Chris. Kligerman, Daniel.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781932266894">http://www.sciencedirect.com/science/book/9781932266894</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Security assessment case studies for implementing the NSA IAMent://SD_ILS/0/SD_ILS:2540302024-11-02T13:36:17Z2024-11-02T13:36:17ZYazar Rogers, Russ.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781932266962">http://www.sciencedirect.com/science/book/9781932266962</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Wireless operational securityent://SD_ILS/0/SD_ILS:2540592024-11-02T13:36:17Z2024-11-02T13:36:17ZYazar Rittinghouse, John W. Ransome, James F.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781555583170">http://www.sciencedirect.com/science/book/9781555583170</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Malware : fighting malicious codeent://SD_ILS/0/SD_ILS:2677372024-11-02T13:36:17Z2024-11-02T13:36:17ZYazar Skoudis, Ed. Zeltser, Lenny.<br/>Yer Numarası QA76.9.A25 S58 2004<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>Investigator's guide to steganographyent://SD_ILS/0/SD_ILS:2864022024-11-02T13:36:17Z2024-11-02T13:36:17ZYazar Kipper, Gregory.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://marc.crcnetbase.com/isbn/9780203504765">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Windows Server 2003 security infrastructuresent://SD_ILS/0/SD_ILS:2538372024-11-02T13:36:17Z2024-11-02T13:36:17ZYazar Clercq, Jan de, 1968-<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781555582838">http://www.sciencedirect.com/science/book/9781555582838</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Strategic information securityent://SD_ILS/0/SD_ILS:2845782024-11-02T13:36:17Z2024-11-02T13:36:17ZYazar Wylder, John.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://marc.crcnetbase.com/isbn/9780203497081">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Security sage's guide to hardening the network infrastructureent://SD_ILS/0/SD_ILS:2536362024-11-02T13:36:17Z2024-11-02T13:36:17ZYazar Andrés, Steven.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836012">http://www.sciencedirect.com/science/book/9781931836012</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Managing and securing a Cisco structured wireless-aware networkent://SD_ILS/0/SD_ILS:2536372024-11-02T13:36:17Z2024-11-02T13:36:17ZYazar Wall, David.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781932266917">http://www.sciencedirect.com/science/book/9781932266917</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Zero day exploit countdown to darknessent://SD_ILS/0/SD_ILS:2536432024-11-02T13:36:17Z2024-11-02T13:36:17ZYazar Shein, Rob. Sachs, Marcus H.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim Volltext <a href="http://www.sciencedirect.com/science/book/9781931836098">http://www.sciencedirect.com/science/book/9781931836098</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Programmer's ultimate security deskrefent://SD_ILS/0/SD_ILS:2536462024-11-02T13:36:17Z2024-11-02T13:36:17ZYazar Foster, James C. Foster, Stephen C.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781932266726">http://www.sciencedirect.com/science/book/9781932266726</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Implementing homeland security for enterprise ITent://SD_ILS/0/SD_ILS:2536562024-11-02T13:36:17Z2024-11-02T13:36:17ZYazar Erbschloe, Michael.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781555583125">http://www.sciencedirect.com/science/book/9781555583125</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>HP Nonstop server security a practical handbookent://SD_ILS/0/SD_ILS:2538492024-11-02T13:36:17Z2024-11-02T13:36:17ZYazar Hill, Terri. Alvarado, Ellen. XYPRO Technology Corporation.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781555583149">http://www.sciencedirect.com/science/book/9781555583149</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Policy-based network management solutions for the next generationent://SD_ILS/0/SD_ILS:2539182024-11-02T13:36:17Z2024-11-02T13:36:17ZYazar Strassner, John C.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781558608597">http://www.sciencedirect.com/science/book/9781558608597</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>WarDriving drive, detect, defend : a guide to wireless securityent://SD_ILS/0/SD_ILS:2539882024-11-02T13:36:17Z2024-11-02T13:36:17ZYazar Hurley, Chris.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836036">http://www.sciencedirect.com/science/book/9781931836036</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Snort 2.1 intrusion detectionent://SD_ILS/0/SD_ILS:2539892024-11-02T13:36:17Z2024-11-02T13:36:17ZYazar Beale, Jay. Alder, Raven.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836043">http://www.sciencedirect.com/science/book/9781931836043</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Stealing the network how to own a continentent://SD_ILS/0/SD_ILS:2539902024-11-02T13:36:17Z2024-11-02T13:36:17ZYazar 131ah. Russell, Ryan, 1969- Moss, Jeff.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836050">http://www.sciencedirect.com/science/book/9781931836050</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Nessus network auditingent://SD_ILS/0/SD_ILS:2539912024-11-02T13:36:17Z2024-11-02T13:36:17ZYazar Deraison, Renaud. Syngress Media, Inc.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836081">http://www.sciencedirect.com/science/book/9781931836081</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Cyber adversary characterization auditing the hacker mindent://SD_ILS/0/SD_ILS:2539922024-11-02T13:36:17Z2024-11-02T13:36:17ZYazar Parker, Tom, 1982-<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836111">http://www.sciencedirect.com/science/book/9781931836111</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>CYA securing Exchange Server 2003 and Outlook Web Access : cover your a** by getting it right the first timeent://SD_ILS/0/SD_ILS:2539942024-11-02T13:36:17Z2024-11-02T13:36:17ZYazar Walther, Henrik. Santry, Patrick.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836241">http://www.sciencedirect.com/science/book/9781931836241</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>CYA securing IIS 6.0 : cover your a** by getting it right the first timeent://SD_ILS/0/SD_ILS:2539952024-11-02T13:36:17Z2024-11-02T13:36:17ZYazar Cheah, Chun Hai. Schaefer, Ken. Peiris, Chris.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836258">http://www.sciencedirect.com/science/book/9781931836258</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Hacking : Bilişim korsanlığı ve korunma yöntemlerient://SD_ILS/0/SD_ILS:885782024-11-02T13:36:17Z2024-11-02T13:36:17ZYazar Yılmaz, Davut.<br/>Yer Numarası TK 5105.59 Y56 2004<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>Exploiting software : how to break codeent://SD_ILS/0/SD_ILS:965562024-11-02T13:36:17Z2024-11-02T13:36:17ZYazar Hoglund, Greg. McGraw, Gary, 1966- ort. yaz.<br/>Yer Numarası QA 76.9.A25 H635 2004<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>İnternette güvenlik ve Hacker Cracker meselesi : el kitabıent://SD_ILS/0/SD_ILS:1041302024-11-02T13:36:17Z2024-11-02T13:36:17ZYazar Güven, Mehmet.<br/>Yer Numarası QA 76.9.A25 G88 2004<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~2<br/>Dijital kaleent://SD_ILS/0/SD_ILS:963222024-11-02T13:36:17Z2024-11-02T13:36:17ZYazar Brown, Dan, 1964- Soner, Sezer, çev. Huvaj, Muharrem Nesij, haz.<br/>Yer Numarası PS3552.R685434 D542 2004<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~7<br/>How to break software security : effective technigues for security testingent://SD_ILS/0/SD_ILS:1055842024-11-02T13:36:17Z2024-11-02T13:36:17ZYazar Whittaker, James A., 1965- Thomson, Herbert H., ort. yaz.<br/>Yer Numarası QA 76.9.A25 W48 2004<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~2<br/>Secure architectures with OpenBSDent://SD_ILS/0/SD_ILS:1095062024-11-02T13:36:17Z2024-11-02T13:36:17ZYazar Palmer, Brandon. Nazario, Jose, ort. yaz.<br/>Yer Numarası QA76.76.O63 P335 2004<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>Information security policies and procedures a practitioner's referenceent://SD_ILS/0/SD_ILS:2901372024-11-02T13:36:17Z2024-11-02T13:36:17ZYazar Peltier, Thomas R.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://marc.crcnetbase.com/isbn/9780203488737">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Protocols for secure electronic commerceent://SD_ILS/0/SD_ILS:2894952024-11-02T13:36:17Z2024-11-02T13:36:17ZYazar Sherif, Mostafa Hashem.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://marc.crcnetbase.com/isbn/9781420040012">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Public key infrastructure building trusted applications and Web servicesent://SD_ILS/0/SD_ILS:2901082024-11-02T13:36:17Z2024-11-02T13:36:17ZYazar Vacca, John R.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://marc.crcnetbase.com/isbn/9780203498156">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Network perimeter security building defense in-depthent://SD_ILS/0/SD_ILS:2910682024-11-02T13:36:17Z2024-11-02T13:36:17ZYazar Riggs, Cliff.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://marc.crcnetbase.com/isbn/9780203508046">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>