Arama Sonu&ccedil;lar&#305; Computer security. - Daralt&#305;lm&#305;&#351;: 2006 SirsiDynix Enterprise https://katalog.hacettepe.edu.tr/client/tr_TR/default_tr/default_tr/qu$003dComputer$002bsecurity.$0026qf$003dPUBDATE$002509Yay$0025C4$0025B1n$002bY$0025C4$0025B1l$0025C4$0025B1$0025092006$0025092006$0026ic$003dtrue$0026ps$003d300? 2024-11-02T10:34:03Z Computer security fundamentals ent://SD_ILS/0/SD_ILS:108620 2024-11-02T10:34:03Z 2024-11-02T10:34:03Z Yazar&#160;Easttom, Chuck.<br/>Yer Numaras&#305;&#160;QA76.9.A25 E325 2006<br/>Format:&#160;Kitap<br/>Durum&#160;Beytepe K&uuml;t&uuml;phanesi~1<br/> Foundations of Computer Security ent://SD_ILS/0/SD_ILS:175390 2024-11-02T10:34:03Z 2024-11-02T10:34:03Z Yazar&#160;Salomon, David. author.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/1-84628-341-8">http://dx.doi.org/10.1007/1-84628-341-8</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Enhancing computer security with smart technology ent://SD_ILS/0/SD_ILS:284793 2024-11-02T10:34:03Z 2024-11-02T10:34:03Z Yazar&#160;Vemuri, V. Rao.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://marc.crcnetbase.com/isbn/9781420031225">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Sequrity for computer networks : an introduction to data security in teleprocessing and electronic funds transfer ent://SD_ILS/0/SD_ILS:62188 2024-11-02T10:34:03Z 2024-11-02T10:34:03Z Yazar&#160;Davies, Donald Watts, 1924-&#160;Price, W. L., ort.yaz.<br/>Yer Numaras&#305;&#160;TK 5105 D43 1989<br/>Format:&#160;Kitap<br/>Durum&#160;Beytepe K&uuml;t&uuml;phanesi~1<br/> Computer Safety, Reliability, and Security 25th International Conference, SAFECOMP 2006, Gdansk, Poland, September 27-29, 2006. Proceedings ent://SD_ILS/0/SD_ILS:184859 2024-11-02T10:34:03Z 2024-11-02T10:34:03Z Yazar&#160;G&oacute;rski, Janusz. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/11875567">http://dx.doi.org/10.1007/11875567</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Advances in Information and Computer Security First International Workshop on Security, IWSEC 2006, Kyoto, Japan, October 23-24, 2006. Proceedings ent://SD_ILS/0/SD_ILS:185034 2024-11-02T10:34:03Z 2024-11-02T10:34:03Z Yazar&#160;Yoshiura, Hiroshi. editor.&#160;Sakurai, Kouichi. editor.&#160;Rannenberg, Kai. editor.&#160;Murayama, Yuko. editor.&#160;Kawamura, Shinichi. editor.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/11908739">http://dx.doi.org/10.1007/11908739</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Network Control and Engineering for Qos, Security and Mobility, V IFIP 19th World Computer Congress, TC-6, 5th IFIP International Conference on Network Control and Engineering for QoS, Security and Mobility, August 20&ndash;25, 2006, Santiago, Chile ent://SD_ILS/0/SD_ILS:166080 2024-11-02T10:34:03Z 2024-11-02T10:34:03Z Yazar&#160;Ga&iuml;ti, Dominique. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-0-387-34827-8">http://dx.doi.org/10.1007/978-0-387-34827-8</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Biometrics, Computer Security Systems and Artificial Intelligence Applications ent://SD_ILS/0/SD_ILS:166154 2024-11-02T10:34:03Z 2024-11-02T10:34:03Z Yazar&#160;Saeed, Khalid. editor.&#160;Peja&#347;, Jerzy. editor.&#160;Mosdorf, Romuald. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-0-387-36503-9">http://dx.doi.org/10.1007/978-0-387-36503-9</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Machine Learning and Data Mining for Computer Security Methods and Applications ent://SD_ILS/0/SD_ILS:175344 2024-11-02T10:34:03Z 2024-11-02T10:34:03Z Yazar&#160;Maloof, Marcus A. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/1-84628-253-5">http://dx.doi.org/10.1007/1-84628-253-5</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Computer Security &ndash; ESORICS 2006 11th European Symposium on Research in Computer Security, Hamburg, Germany, September 18-20, 2006. Proceedings ent://SD_ILS/0/SD_ILS:184783 2024-11-02T10:34:03Z 2024-11-02T10:34:03Z Yazar&#160;Gollmann, Dieter. editor.&#160;Meier, Jan. editor.&#160;Sabelfeld, Andrei. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/11863908">http://dx.doi.org/10.1007/11863908</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Essential computer security everyone's guide to e-mail, Internet, and wireless security ent://SD_ILS/0/SD_ILS:145840 2024-11-02T10:34:03Z 2024-11-02T10:34:03Z Yazar&#160;Bradley, Tony, 1969-&#160;Carvey, Harlan A.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491143">http://www.sciencedirect.com/science/book/9781597491143</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Information security management handbook ent://SD_ILS/0/SD_ILS:290320 2024-11-02T10:34:03Z 2024-11-02T10:34:03Z Yazar&#160;Tipton, Harold F.&#160;Krause, Micki.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://marc.crcnetbase.com/isbn/9781420003406">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Information security management handbook ent://SD_ILS/0/SD_ILS:289151 2024-11-02T10:34:03Z 2024-11-02T10:34:03Z Yazar&#160;Tipton, Harold F.&#160;Krause, Micki.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://marc.crcnetbase.com/isbn/9780203325438">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Securing HP NonStop servers in an open systems world TCP/IP, OSS &amp; SQL ent://SD_ILS/0/SD_ILS:253863 2024-11-02T10:34:03Z 2024-11-02T10:34:03Z Yazar&#160;XYPRO Technology Corporation.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781555583446">http://www.sciencedirect.com/science/book/9781555583446</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> How to cheat at managing information security ent://SD_ILS/0/SD_ILS:253677 2024-11-02T10:34:03Z 2024-11-02T10:34:03Z Yazar&#160;Osborne, Mark.&#160;Summitt, Paul M.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491105">http://www.sciencedirect.com/science/book/9781597491105</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Combating spyware in the enterprise ent://SD_ILS/0/SD_ILS:254075 2024-11-02T10:34:03Z 2024-11-02T10:34:03Z Yazar&#160;Baskin, Brian.&#160;Piltzecker, Tony, 1975-<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490641">http://www.sciencedirect.com/science/book/9781597490641</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Firewall policies and VPN configurations ent://SD_ILS/0/SD_ILS:254076 2024-11-02T10:34:03Z 2024-11-02T10:34:03Z Yazar&#160;Henmi, Anne.&#160;Lucas, Mark.&#160;Singh, Abhishek.&#160;Cantrell, Chris.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490887">http://www.sciencedirect.com/science/book/9781597490887</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Official (ISC)[superscript]2 guide to the CISSP-ISSEP CBK ent://SD_ILS/0/SD_ILS:286485 2024-11-02T10:34:03Z 2024-11-02T10:34:03Z Yazar&#160;Hansche, Susan.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://marc.crcnetbase.com/isbn/9780203888933">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Practical VoIP security ent://SD_ILS/0/SD_ILS:253669 2024-11-02T10:34:03Z 2024-11-02T10:34:03Z Yazar&#160;Porter, Thomas.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490603">http://www.sciencedirect.com/science/book/9781597490603</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Audit and trace log management consolidation and analysis ent://SD_ILS/0/SD_ILS:284590 2024-11-02T10:34:03Z 2024-11-02T10:34:03Z Yazar&#160;Maier, Phillip Q.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://marc.crcnetbase.com/isbn/9780203491768">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Enemy at the water cooler real-life stories of insider threats and Enterprise Security Management countermeasures ent://SD_ILS/0/SD_ILS:146475 2024-11-02T10:34:03Z 2024-11-02T10:34:03Z Yazar&#160;Contos, Brian T.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491297">http://www.sciencedirect.com/science/book/9781597491297</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Designing and building enterprise DMZs ent://SD_ILS/0/SD_ILS:147464 2024-11-02T10:34:03Z 2024-11-02T10:34:03Z Yazar&#160;Dubrawsky, Ido.&#160;Baumrucker, C. Tate.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491006">http://www.sciencedirect.com/science/book/9781597491006</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Hack the stack using snort and ethereal to master the 8 layers of an insecure network ent://SD_ILS/0/SD_ILS:147954 2024-11-02T10:34:03Z 2024-11-02T10:34:03Z Yazar&#160;Gregg, Michael (Michael C.)&#160;Watkins, Stephen.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491099">http://www.sciencedirect.com/science/book/9781597491099</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Syngress force emerging threat analysis from mischief to malicious ent://SD_ILS/0/SD_ILS:148488 2024-11-02T10:34:03Z 2024-11-02T10:34:03Z Yazar&#160;Maynor, David.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490566">http://www.sciencedirect.com/science/book/9781597490566</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Information security a strategic approach ent://SD_ILS/0/SD_ILS:249831 2024-11-02T10:34:03Z 2024-11-02T10:34:03Z Yazar&#160;LeVeque, Vincent.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;IEEE Xplore <a href="http://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=5989138">http://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=5989138</a> IEEE Xplore <a href="http://ieeexplore.ieee.org/servlet/opac?bknumber=5989138">http://ieeexplore.ieee.org/servlet/opac?bknumber=5989138</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Insider threat protecting the enterprise from sabotage, spying, and theft ent://SD_ILS/0/SD_ILS:253661 2024-11-02T10:34:03Z 2024-11-02T10:34:03Z Yazar&#160;Cole, Eric.&#160;Ring, Sandra.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;Volltext <a href="http://www.sciencedirect.com/science/book/9781597490481">http://www.sciencedirect.com/science/book/9781597490481</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> How to cheat at designing security for a Windows Server 2003 network ent://SD_ILS/0/SD_ILS:253670 2024-11-02T10:34:03Z 2024-11-02T10:34:03Z Yazar&#160;Amini, Rob.&#160;Hunter, Laura E.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492430">http://www.sciencedirect.com/science/book/9781597492430</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Penetration tester's open source toolkit ent://SD_ILS/0/SD_ILS:253676 2024-11-02T10:34:03Z 2024-11-02T10:34:03Z Yazar&#160;Long, Johnny.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490214">http://www.sciencedirect.com/science/book/9781597490214</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Securing IM and P2P applications for the enterprise ent://SD_ILS/0/SD_ILS:253939 2024-11-02T10:34:03Z 2024-11-02T10:34:03Z Yazar&#160;Piccard, Paul L.&#160;Sachs, Marcus H.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490177">http://www.sciencedirect.com/science/book/9781597490177</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Security log management identifying patterns in the chaos ent://SD_ILS/0/SD_ILS:253947 2024-11-02T10:34:03Z 2024-11-02T10:34:03Z Yazar&#160;Babbin, Jacob.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490429">http://www.sciencedirect.com/science/book/9781597490429</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> How to cheat at configuring ISA server 2004 ent://SD_ILS/0/SD_ILS:253948 2024-11-02T10:34:03Z 2024-11-02T10:34:03Z Yazar&#160;Shinder, Thomas W.&#160;Shinder, Debra Littlejohn.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490573">http://www.sciencedirect.com/science/book/9781597490573</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Syngress IT security project management handbook ent://SD_ILS/0/SD_ILS:253949 2024-11-02T10:34:03Z 2024-11-02T10:34:03Z Yazar&#160;Snedaker, Susan.&#160;Rogers, Russ.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490764">http://www.sciencedirect.com/science/book/9781597490764</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Configuring SonicWALL firewalls ent://SD_ILS/0/SD_ILS:253952 2024-11-02T10:34:03Z 2024-11-02T10:34:03Z Yazar&#160;Bendell, Dan.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492508">http://www.sciencedirect.com/science/book/9781597492508</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Writing security tools and exploits ent://SD_ILS/0/SD_ILS:253954 2024-11-02T10:34:03Z 2024-11-02T10:34:03Z Yazar&#160;Foster, James C.&#160;Liu, Vincent.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597499972">http://www.sciencedirect.com/science/book/9781597499972</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Trusted platform module basics using TPM in embedded systems ent://SD_ILS/0/SD_ILS:254421 2024-11-02T10:34:03Z 2024-11-02T10:34:03Z Yazar&#160;Kinney, Steven.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780750679602">http://www.sciencedirect.com/science/book/9780750679602</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Multimedia security technologies for digital rights management ent://SD_ILS/0/SD_ILS:254554 2024-11-02T10:34:03Z 2024-11-02T10:34:03Z Yazar&#160;Zeng, Wenjun, 1967-&#160;Yu, Hong Heather, 1967-&#160;Lin, Ching-Yung.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780123694768">http://www.sciencedirect.com/science/book/9780123694768</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> How to cheat at Windows System Administration using command line scripts ent://SD_ILS/0/SD_ILS:145623 2024-11-02T10:34:03Z 2024-11-02T10:34:03Z Yazar&#160;Bhardwaj, Pawan K.&#160;Andreou, Kimon.&#160;Barber, Brian.&#160;Kleiman, Dave.&#160;Satyanarayana, Mahesh.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491051">http://www.sciencedirect.com/science/book/9781597491051</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Secure your network for free using NMAP, wireshark, snort, nessus, and MRTG ent://SD_ILS/0/SD_ILS:148969 2024-11-02T10:34:03Z 2024-11-02T10:34:03Z Yazar&#160;Seagren, Eric.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491235">http://www.sciencedirect.com/science/book/9781597491235</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> How to cheat at Windows System Administration using command line scripts ent://SD_ILS/0/SD_ILS:112107 2024-11-02T10:34:03Z 2024-11-02T10:34:03Z Yazar&#160;Bhardwaj, Pawan K.&#160;Andreou, Kimon.&#160;Barber, Brian.&#160;Kleiman, Dave.&#160;Satyanarayana, Mahesh.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491051">An electronic book accessible through the World Wide Web; click for information</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Information security : principles and practice ent://SD_ILS/0/SD_ILS:109477 2024-11-02T10:34:03Z 2024-11-02T10:34:03Z Yazar&#160;Stamp, Mark.<br/>Yer Numaras&#305;&#160;QA76.9.A25 S69 2006<br/>Format:&#160;Kitap<br/>Durum&#160;Beytepe K&uuml;t&uuml;phanesi~1<br/> Designing and building enterprise DMZs ent://SD_ILS/0/SD_ILS:112159 2024-11-02T10:34:03Z 2024-11-02T10:34:03Z Yazar&#160;Dubrawsky, Ido.&#160;Baumrucker, C. Tate.&#160;ScienceDirect (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491006">An electronic book accessible through the World Wide Web; click for information</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Secure your network for free using NMAP, wireshark, snort, nessus, and MRTG ent://SD_ILS/0/SD_ILS:112197 2024-11-02T10:34:03Z 2024-11-02T10:34:03Z Yazar&#160;Seagren, Eric.&#160;ScienceDirect (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491235">An electronic book accessible through the World Wide Web; click for information</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Syngress force emerging threat analysis from mischief to malicious ent://SD_ILS/0/SD_ILS:112202 2024-11-02T10:34:03Z 2024-11-02T10:34:03Z Yazar&#160;Maynor, David.&#160;ScienceDirect (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490566">An electronic book accessible through the World Wide Web; click for information</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Linux Patch Management : keeping Linux systems up to date ent://SD_ILS/0/SD_ILS:119550 2024-11-02T10:34:03Z 2024-11-02T10:34:03Z Yazar&#160;Jang, Michael H.<br/>Yer Numaras&#305;&#160;QA76.76.O63 J368 2006<br/>Format:&#160;Kitap<br/>Durum&#160;Beytepe K&uuml;t&uuml;phanesi~1<br/> Handbook of information security ent://SD_ILS/0/SD_ILS:108909 2024-11-02T10:34:03Z 2024-11-02T10:34:03Z Yazar&#160;Bidgoli, Hossein, ed.<br/>Yer Numaras&#305;&#160;TK5105.59 H35 2006 V.1<br/>Format:&#160;Kitap<br/>Durum&#160;Beytepe K&uuml;t&uuml;phanesi~3<br/> Information security architecture : an integrated approach to security in the organization ent://SD_ILS/0/SD_ILS:110865 2024-11-02T10:34:03Z 2024-11-02T10:34:03Z Yazar&#160;Tudor, Jan Killmeyer.<br/>Yer Numaras&#305;&#160;QA76.9.A25 T83 2006<br/>Format:&#160;Kitap<br/>Durum&#160;Beytepe K&uuml;t&uuml;phanesi~1<br/> Intelligence and security informatics for international security : information sharing and data mining ent://SD_ILS/0/SD_ILS:119786 2024-11-02T10:34:03Z 2024-11-02T10:34:03Z Yazar&#160;Chen, Hsinchun.<br/>Yer Numaras&#305;&#160;QA76.76.E95 C44 2006<br/>Format:&#160;Kitap<br/>Durum&#160;Beytepe K&uuml;t&uuml;phanesi~1<br/> Critical infrastructure protection in homeland security defending a networked nation ent://SD_ILS/0/SD_ILS:303065 2024-11-02T10:34:03Z 2024-11-02T10:34:03Z Yazar&#160;Lewis, T. G. (Theodore Gyle), 1941-<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://www.contentreserve.com/TitleInfo.asp?ID={B7674963-A0F9-4349-AB2D-7F1D59FE8883}&Format=50">Click for information</a> John Wiley <a href="http://dx.doi.org/10.1002/0471789542">http://dx.doi.org/10.1002/0471789542</a> <a href="http://www3.interscience.wiley.com/cgi-bin/bookhome/112100959">http://www3.interscience.wiley.com/cgi-bin/bookhome/112100959</a> MyiLibrary, Table of contents <a href="http://www.myilibrary.com?id=41147&ref=toc">http://www.myilibrary.com?id=41147&ref=toc</a> HathiTrust Digital Library, Limited view (search only) <a href="http://catalog.hathitrust.org/api/volumes/oclc/61651657.html">http://catalog.hathitrust.org/api/volumes/oclc/61651657.html</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> The security risk assessment handbook a complete guide for performing security risk assessments ent://SD_ILS/0/SD_ILS:284790 2024-11-02T10:34:03Z 2024-11-02T10:34:03Z Yazar&#160;Landoll, Douglas J.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://marc.crcnetbase.com/isbn/9781420031232">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Building and implementing a security certification and accreditation program official (ISC) guide to the CAP CBK ent://SD_ILS/0/SD_ILS:290106 2024-11-02T10:34:03Z 2024-11-02T10:34:03Z Yazar&#160;Howard, Patrick D.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://marc.crcnetbase.com/isbn/9780203492482">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Information security architecture an integrated approach to security in the organization ent://SD_ILS/0/SD_ILS:290176 2024-11-02T10:34:03Z 2024-11-02T10:34:03Z Yazar&#160;Tudor, Jan Killmeyer.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://marc.crcnetbase.com/isbn/9780203488751">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> The CISO handbook a practical guide to securing your company ent://SD_ILS/0/SD_ILS:290416 2024-11-02T10:34:03Z 2024-11-02T10:34:03Z Yazar&#160;Gentile, Michael.&#160;Collette, Ronald D.&#160;August, Thomas D.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://marc.crcnetbase.com/isbn/9781420031379">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Trust and reputation for service-oriented environments technologies for building business intelligence and consumer confidence ent://SD_ILS/0/SD_ILS:296679 2024-11-02T10:34:03Z 2024-11-02T10:34:03Z Yazar&#160;Chang, Elizabeth.&#160;Dillon, Tharam S., 1943-&#160;Hussain, Farookh K.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://www3.interscience.wiley.com/cgi-bin/homepage/?isbn=9780470028261">Find on the Web</a> John Wiley <a href="http://dx.doi.org/10.1002/9780470028261">http://dx.doi.org/10.1002/9780470028261</a> <a href="http://www3.interscience.wiley.com/cgi-bin/bookhome/113488845">http://www3.interscience.wiley.com/cgi-bin/bookhome/113488845</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Information security principles and practice ent://SD_ILS/0/SD_ILS:301803 2024-11-02T10:34:03Z 2024-11-02T10:34:03Z Yazar&#160;Stamp, Mark.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://www.contentreserve.com/TitleInfo.asp?ID={310C0D18-7395-435E-BA71-41A0448F3D13}&Format=50">Click for information</a> Ebook Library <a href="http://public.eblib.com/EBLPublic/PublicView.do?ptiID=240929">http://public.eblib.com/EBLPublic/PublicView.do?ptiID=240929</a> John Wiley <a href="http://dx.doi.org/10.1002/0471744190">http://dx.doi.org/10.1002/0471744190</a> <a href="http://www3.interscience.wiley.com/cgi-bin/bookhome/109933408">http://www3.interscience.wiley.com/cgi-bin/bookhome/109933408</a> HathiTrust Digital Library, Limited view (search only) <a href="http://catalog.hathitrust.org/api/volumes/oclc/57754240.html">http://catalog.hathitrust.org/api/volumes/oclc/57754240.html</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Bilgi ve bilgisayar g&uuml;venli&#287;i : casus yaz&#305;l&#305;mlar ve korunma y&ouml;ntemleri ent://SD_ILS/0/SD_ILS:515469 2024-11-02T10:34:03Z 2024-11-02T10:34:03Z Yazar&#160;Canbek, G&uuml;rol.&#160;Sa&#287;&#305;ro&#287;lu, &#350;eref.<br/>Yer Numaras&#305;&#160;QA76.9.A25 C36 2006<br/>Format:&#160;Kitap<br/>Durum&#160;Beytepe K&uuml;t&uuml;phanesi~1<br/>