Arama Sonuçları Computer security. - Daraltılmış: 2006SirsiDynix Enterprisehttps://katalog.hacettepe.edu.tr/client/tr_TR/default_tr/default_tr/qu$003dComputer$002bsecurity.$0026qf$003dPUBDATE$002509Yay$0025C4$0025B1n$002bY$0025C4$0025B1l$0025C4$0025B1$0025092006$0025092006$0026ic$003dtrue$0026ps$003d300$0026isd$003dtrue?2024-11-02T12:20:25ZComputer security fundamentalsent://SD_ILS/0/SD_ILS:1086202024-11-02T12:20:25Z2024-11-02T12:20:25ZYazar Easttom, Chuck.<br/>Yer Numarası QA76.9.A25 E325 2006<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>Foundations of Computer Securityent://SD_ILS/0/SD_ILS:1753902024-11-02T12:20:25Z2024-11-02T12:20:25ZYazar Salomon, David. author. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/1-84628-341-8">http://dx.doi.org/10.1007/1-84628-341-8</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Enhancing computer security with smart technologyent://SD_ILS/0/SD_ILS:2847932024-11-02T12:20:25Z2024-11-02T12:20:25ZYazar Vemuri, V. Rao.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://marc.crcnetbase.com/isbn/9781420031225">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Sequrity for computer networks : an introduction to data security in teleprocessing and electronic funds transferent://SD_ILS/0/SD_ILS:621882024-11-02T12:20:25Z2024-11-02T12:20:25ZYazar Davies, Donald Watts, 1924- Price, W. L., ort.yaz.<br/>Yer Numarası TK 5105 D43 1989<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>Computer Safety, Reliability, and Security 25th International Conference, SAFECOMP 2006, Gdansk, Poland, September 27-29, 2006. Proceedingsent://SD_ILS/0/SD_ILS:1848592024-11-02T12:20:25Z2024-11-02T12:20:25ZYazar Górski, Janusz. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/11875567">http://dx.doi.org/10.1007/11875567</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Advances in Information and Computer Security First International Workshop on Security, IWSEC 2006, Kyoto, Japan, October 23-24, 2006. Proceedingsent://SD_ILS/0/SD_ILS:1850342024-11-02T12:20:25Z2024-11-02T12:20:25ZYazar Yoshiura, Hiroshi. editor. Sakurai, Kouichi. editor. Rannenberg, Kai. editor. Murayama, Yuko. editor. Kawamura, Shinichi. editor.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/11908739">http://dx.doi.org/10.1007/11908739</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Network Control and Engineering for Qos, Security and Mobility, V IFIP 19th World Computer Congress, TC-6, 5th IFIP International Conference on Network Control and Engineering for QoS, Security and Mobility, August 20–25, 2006, Santiago, Chileent://SD_ILS/0/SD_ILS:1660802024-11-02T12:20:25Z2024-11-02T12:20:25ZYazar Gaïti, Dominique. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-0-387-34827-8">http://dx.doi.org/10.1007/978-0-387-34827-8</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Biometrics, Computer Security Systems and Artificial Intelligence Applicationsent://SD_ILS/0/SD_ILS:1661542024-11-02T12:20:25Z2024-11-02T12:20:25ZYazar Saeed, Khalid. editor. Pejaś, Jerzy. editor. Mosdorf, Romuald. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-0-387-36503-9">http://dx.doi.org/10.1007/978-0-387-36503-9</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Machine Learning and Data Mining for Computer Security Methods and Applicationsent://SD_ILS/0/SD_ILS:1753442024-11-02T12:20:25Z2024-11-02T12:20:25ZYazar Maloof, Marcus A. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/1-84628-253-5">http://dx.doi.org/10.1007/1-84628-253-5</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Computer Security – ESORICS 2006 11th European Symposium on Research in Computer Security, Hamburg, Germany, September 18-20, 2006. Proceedingsent://SD_ILS/0/SD_ILS:1847832024-11-02T12:20:25Z2024-11-02T12:20:25ZYazar Gollmann, Dieter. editor. Meier, Jan. editor. Sabelfeld, Andrei. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/11863908">http://dx.doi.org/10.1007/11863908</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Essential computer security everyone's guide to e-mail, Internet, and wireless securityent://SD_ILS/0/SD_ILS:1458402024-11-02T12:20:25Z2024-11-02T12:20:25ZYazar Bradley, Tony, 1969- Carvey, Harlan A.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491143">http://www.sciencedirect.com/science/book/9781597491143</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Information security management handbookent://SD_ILS/0/SD_ILS:2903202024-11-02T12:20:25Z2024-11-02T12:20:25ZYazar Tipton, Harold F. Krause, Micki.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://marc.crcnetbase.com/isbn/9781420003406">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Information security management handbookent://SD_ILS/0/SD_ILS:2891512024-11-02T12:20:25Z2024-11-02T12:20:25ZYazar Tipton, Harold F. Krause, Micki.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://marc.crcnetbase.com/isbn/9780203325438">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Securing HP NonStop servers in an open systems world TCP/IP, OSS & SQLent://SD_ILS/0/SD_ILS:2538632024-11-02T12:20:25Z2024-11-02T12:20:25ZYazar XYPRO Technology Corporation.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781555583446">http://www.sciencedirect.com/science/book/9781555583446</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>How to cheat at managing information securityent://SD_ILS/0/SD_ILS:2536772024-11-02T12:20:25Z2024-11-02T12:20:25ZYazar Osborne, Mark. Summitt, Paul M.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491105">http://www.sciencedirect.com/science/book/9781597491105</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Combating spyware in the enterpriseent://SD_ILS/0/SD_ILS:2540752024-11-02T12:20:25Z2024-11-02T12:20:25ZYazar Baskin, Brian. Piltzecker, Tony, 1975-<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490641">http://www.sciencedirect.com/science/book/9781597490641</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Firewall policies and VPN configurationsent://SD_ILS/0/SD_ILS:2540762024-11-02T12:20:25Z2024-11-02T12:20:25ZYazar Henmi, Anne. Lucas, Mark. Singh, Abhishek. Cantrell, Chris.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490887">http://www.sciencedirect.com/science/book/9781597490887</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Official (ISC)[superscript]2 guide to the CISSP-ISSEP CBKent://SD_ILS/0/SD_ILS:2864852024-11-02T12:20:25Z2024-11-02T12:20:25ZYazar Hansche, Susan.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://marc.crcnetbase.com/isbn/9780203888933">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Practical VoIP securityent://SD_ILS/0/SD_ILS:2536692024-11-02T12:20:25Z2024-11-02T12:20:25ZYazar Porter, Thomas.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490603">http://www.sciencedirect.com/science/book/9781597490603</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Audit and trace log management consolidation and analysisent://SD_ILS/0/SD_ILS:2845902024-11-02T12:20:25Z2024-11-02T12:20:25ZYazar Maier, Phillip Q.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://marc.crcnetbase.com/isbn/9780203491768">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Enemy at the water cooler real-life stories of insider threats and Enterprise Security Management countermeasuresent://SD_ILS/0/SD_ILS:1464752024-11-02T12:20:25Z2024-11-02T12:20:25ZYazar Contos, Brian T.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491297">http://www.sciencedirect.com/science/book/9781597491297</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Designing and building enterprise DMZsent://SD_ILS/0/SD_ILS:1474642024-11-02T12:20:25Z2024-11-02T12:20:25ZYazar Dubrawsky, Ido. Baumrucker, C. Tate.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491006">http://www.sciencedirect.com/science/book/9781597491006</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Hack the stack using snort and ethereal to master the 8 layers of an insecure networkent://SD_ILS/0/SD_ILS:1479542024-11-02T12:20:25Z2024-11-02T12:20:25ZYazar Gregg, Michael (Michael C.) Watkins, Stephen.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491099">http://www.sciencedirect.com/science/book/9781597491099</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Syngress force emerging threat analysis from mischief to maliciousent://SD_ILS/0/SD_ILS:1484882024-11-02T12:20:25Z2024-11-02T12:20:25ZYazar Maynor, David.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490566">http://www.sciencedirect.com/science/book/9781597490566</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Information security a strategic approachent://SD_ILS/0/SD_ILS:2498312024-11-02T12:20:25Z2024-11-02T12:20:25ZYazar LeVeque, Vincent.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim IEEE Xplore <a href="http://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=5989138">http://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=5989138</a>
IEEE Xplore <a href="http://ieeexplore.ieee.org/servlet/opac?bknumber=5989138">http://ieeexplore.ieee.org/servlet/opac?bknumber=5989138</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Insider threat protecting the enterprise from sabotage, spying, and theftent://SD_ILS/0/SD_ILS:2536612024-11-02T12:20:25Z2024-11-02T12:20:25ZYazar Cole, Eric. Ring, Sandra.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim Volltext <a href="http://www.sciencedirect.com/science/book/9781597490481">http://www.sciencedirect.com/science/book/9781597490481</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>How to cheat at designing security for a Windows Server 2003 networkent://SD_ILS/0/SD_ILS:2536702024-11-02T12:20:25Z2024-11-02T12:20:25ZYazar Amini, Rob. Hunter, Laura E.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492430">http://www.sciencedirect.com/science/book/9781597492430</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Penetration tester's open source toolkitent://SD_ILS/0/SD_ILS:2536762024-11-02T12:20:25Z2024-11-02T12:20:25ZYazar Long, Johnny.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490214">http://www.sciencedirect.com/science/book/9781597490214</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Securing IM and P2P applications for the enterpriseent://SD_ILS/0/SD_ILS:2539392024-11-02T12:20:25Z2024-11-02T12:20:25ZYazar Piccard, Paul L. Sachs, Marcus H.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490177">http://www.sciencedirect.com/science/book/9781597490177</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Security log management identifying patterns in the chaosent://SD_ILS/0/SD_ILS:2539472024-11-02T12:20:25Z2024-11-02T12:20:25ZYazar Babbin, Jacob.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490429">http://www.sciencedirect.com/science/book/9781597490429</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>How to cheat at configuring ISA server 2004ent://SD_ILS/0/SD_ILS:2539482024-11-02T12:20:25Z2024-11-02T12:20:25ZYazar Shinder, Thomas W. Shinder, Debra Littlejohn.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490573">http://www.sciencedirect.com/science/book/9781597490573</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Syngress IT security project management handbookent://SD_ILS/0/SD_ILS:2539492024-11-02T12:20:25Z2024-11-02T12:20:25ZYazar Snedaker, Susan. Rogers, Russ.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490764">http://www.sciencedirect.com/science/book/9781597490764</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Configuring SonicWALL firewallsent://SD_ILS/0/SD_ILS:2539522024-11-02T12:20:25Z2024-11-02T12:20:25ZYazar Bendell, Dan.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492508">http://www.sciencedirect.com/science/book/9781597492508</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Writing security tools and exploitsent://SD_ILS/0/SD_ILS:2539542024-11-02T12:20:25Z2024-11-02T12:20:25ZYazar Foster, James C. Liu, Vincent.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597499972">http://www.sciencedirect.com/science/book/9781597499972</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Trusted platform module basics using TPM in embedded systemsent://SD_ILS/0/SD_ILS:2544212024-11-02T12:20:25Z2024-11-02T12:20:25ZYazar Kinney, Steven.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780750679602">http://www.sciencedirect.com/science/book/9780750679602</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Multimedia security technologies for digital rights managementent://SD_ILS/0/SD_ILS:2545542024-11-02T12:20:25Z2024-11-02T12:20:25ZYazar Zeng, Wenjun, 1967- Yu, Hong Heather, 1967- Lin, Ching-Yung.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780123694768">http://www.sciencedirect.com/science/book/9780123694768</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>How to cheat at Windows System Administration using command line scriptsent://SD_ILS/0/SD_ILS:1456232024-11-02T12:20:25Z2024-11-02T12:20:25ZYazar Bhardwaj, Pawan K. Andreou, Kimon. Barber, Brian. Kleiman, Dave. Satyanarayana, Mahesh.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491051">http://www.sciencedirect.com/science/book/9781597491051</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Secure your network for free using NMAP, wireshark, snort, nessus, and MRTGent://SD_ILS/0/SD_ILS:1489692024-11-02T12:20:25Z2024-11-02T12:20:25ZYazar Seagren, Eric.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491235">http://www.sciencedirect.com/science/book/9781597491235</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>How to cheat at Windows System Administration using command line scriptsent://SD_ILS/0/SD_ILS:1121072024-11-02T12:20:25Z2024-11-02T12:20:25ZYazar Bhardwaj, Pawan K. Andreou, Kimon. Barber, Brian. Kleiman, Dave. Satyanarayana, Mahesh.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491051">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Information security : principles and practiceent://SD_ILS/0/SD_ILS:1094772024-11-02T12:20:25Z2024-11-02T12:20:25ZYazar Stamp, Mark.<br/>Yer Numarası QA76.9.A25 S69 2006<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>Designing and building enterprise DMZsent://SD_ILS/0/SD_ILS:1121592024-11-02T12:20:25Z2024-11-02T12:20:25ZYazar Dubrawsky, Ido. Baumrucker, C. Tate. ScienceDirect (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491006">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Secure your network for free using NMAP, wireshark, snort, nessus, and MRTGent://SD_ILS/0/SD_ILS:1121972024-11-02T12:20:25Z2024-11-02T12:20:25ZYazar Seagren, Eric. ScienceDirect (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491235">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Syngress force emerging threat analysis from mischief to maliciousent://SD_ILS/0/SD_ILS:1122022024-11-02T12:20:25Z2024-11-02T12:20:25ZYazar Maynor, David. ScienceDirect (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490566">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Linux Patch Management : keeping Linux systems up to dateent://SD_ILS/0/SD_ILS:1195502024-11-02T12:20:25Z2024-11-02T12:20:25ZYazar Jang, Michael H.<br/>Yer Numarası QA76.76.O63 J368 2006<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>Handbook of information securityent://SD_ILS/0/SD_ILS:1089092024-11-02T12:20:25Z2024-11-02T12:20:25ZYazar Bidgoli, Hossein, ed.<br/>Yer Numarası TK5105.59 H35 2006 V.1<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~3<br/>Information security architecture : an integrated approach to security in the organizationent://SD_ILS/0/SD_ILS:1108652024-11-02T12:20:25Z2024-11-02T12:20:25ZYazar Tudor, Jan Killmeyer.<br/>Yer Numarası QA76.9.A25 T83 2006<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>Intelligence and security informatics for international security : information sharing and data miningent://SD_ILS/0/SD_ILS:1197862024-11-02T12:20:25Z2024-11-02T12:20:25ZYazar Chen, Hsinchun.<br/>Yer Numarası QA76.76.E95 C44 2006<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>Critical infrastructure protection in homeland security defending a networked nationent://SD_ILS/0/SD_ILS:3030652024-11-02T12:20:25Z2024-11-02T12:20:25ZYazar Lewis, T. G. (Theodore Gyle), 1941-<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://www.contentreserve.com/TitleInfo.asp?ID={B7674963-A0F9-4349-AB2D-7F1D59FE8883}&Format=50">Click for information</a>
John Wiley <a href="http://dx.doi.org/10.1002/0471789542">http://dx.doi.org/10.1002/0471789542</a>
<a href="http://www3.interscience.wiley.com/cgi-bin/bookhome/112100959">http://www3.interscience.wiley.com/cgi-bin/bookhome/112100959</a>
MyiLibrary, Table of contents <a href="http://www.myilibrary.com?id=41147&ref=toc">http://www.myilibrary.com?id=41147&ref=toc</a>
HathiTrust Digital Library, Limited view (search only) <a href="http://catalog.hathitrust.org/api/volumes/oclc/61651657.html">http://catalog.hathitrust.org/api/volumes/oclc/61651657.html</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>The security risk assessment handbook a complete guide for performing security risk assessmentsent://SD_ILS/0/SD_ILS:2847902024-11-02T12:20:25Z2024-11-02T12:20:25ZYazar Landoll, Douglas J.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://marc.crcnetbase.com/isbn/9781420031232">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Building and implementing a security certification and accreditation program official (ISC) guide to the CAP CBKent://SD_ILS/0/SD_ILS:2901062024-11-02T12:20:25Z2024-11-02T12:20:25ZYazar Howard, Patrick D.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://marc.crcnetbase.com/isbn/9780203492482">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Information security architecture an integrated approach to security in the organizationent://SD_ILS/0/SD_ILS:2901762024-11-02T12:20:25Z2024-11-02T12:20:25ZYazar Tudor, Jan Killmeyer.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://marc.crcnetbase.com/isbn/9780203488751">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>The CISO handbook a practical guide to securing your companyent://SD_ILS/0/SD_ILS:2904162024-11-02T12:20:25Z2024-11-02T12:20:25ZYazar Gentile, Michael. Collette, Ronald D. August, Thomas D.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://marc.crcnetbase.com/isbn/9781420031379">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Trust and reputation for service-oriented environments technologies for building business intelligence and consumer confidenceent://SD_ILS/0/SD_ILS:2966792024-11-02T12:20:25Z2024-11-02T12:20:25ZYazar Chang, Elizabeth. Dillon, Tharam S., 1943- Hussain, Farookh K.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://www3.interscience.wiley.com/cgi-bin/homepage/?isbn=9780470028261">Find on the Web</a>
John Wiley <a href="http://dx.doi.org/10.1002/9780470028261">http://dx.doi.org/10.1002/9780470028261</a>
<a href="http://www3.interscience.wiley.com/cgi-bin/bookhome/113488845">http://www3.interscience.wiley.com/cgi-bin/bookhome/113488845</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Information security principles and practiceent://SD_ILS/0/SD_ILS:3018032024-11-02T12:20:25Z2024-11-02T12:20:25ZYazar Stamp, Mark.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://www.contentreserve.com/TitleInfo.asp?ID={310C0D18-7395-435E-BA71-41A0448F3D13}&Format=50">Click for information</a>
Ebook Library <a href="http://public.eblib.com/EBLPublic/PublicView.do?ptiID=240929">http://public.eblib.com/EBLPublic/PublicView.do?ptiID=240929</a>
John Wiley <a href="http://dx.doi.org/10.1002/0471744190">http://dx.doi.org/10.1002/0471744190</a>
<a href="http://www3.interscience.wiley.com/cgi-bin/bookhome/109933408">http://www3.interscience.wiley.com/cgi-bin/bookhome/109933408</a>
HathiTrust Digital Library, Limited view (search only) <a href="http://catalog.hathitrust.org/api/volumes/oclc/57754240.html">http://catalog.hathitrust.org/api/volumes/oclc/57754240.html</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Bilgi ve bilgisayar güvenliği : casus yazılımlar ve korunma yöntemlerient://SD_ILS/0/SD_ILS:5154692024-11-02T12:20:25Z2024-11-02T12:20:25ZYazar Canbek, Gürol. Sağıroğlu, Şeref.<br/>Yer Numarası QA76.9.A25 C36 2006<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>