Arama Sonuçları Computer security. - Daraltılmış: 2007SirsiDynix Enterprisehttps://katalog.hacettepe.edu.tr/client/tr_TR/default_tr/default_tr/qu$003dComputer$002bsecurity.$0026qf$003dPUBDATE$002509Yay$0025C4$0025B1n$002bY$0025C4$0025B1l$0025C4$0025B1$0025092007$0025092007$0026ps$003d300?dt=list2024-11-22T00:33:15ZComputer security and cryptographyent://SD_ILS/0/SD_ILS:2968652024-11-22T00:33:15Z2024-11-22T00:33:15ZYazar Konheim, Alan G., 1934-<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://www.contentreserve.com/TitleInfo.asp?ID={24307C36-99BB-4A76-9317-7D1A7CC786FB}&Format=50">Click for information</a>
<a href="http://proquest.safaribooksonline.com/?fpi=9780471947837">Available by subscription from Safari Books Online</a>
Ebook Library <a href="http://public.eblib.com/EBLPublic/PublicView.do?ptiID=288170">http://public.eblib.com/EBLPublic/PublicView.do?ptiID=288170</a>
John Wiley <a href="http://dx.doi.org/10.1002/0470083980">http://dx.doi.org/10.1002/0470083980</a>
Volltext <a href="http://proquest.tech.safaribooksonline.de/9780471947837">http://proquest.tech.safaribooksonline.de/9780471947837</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Security of e-Systems and Computer Networksent://SD_ILS/0/SD_ILS:2360232024-11-22T00:33:15Z2024-11-22T00:33:15ZYazar Obaidat, Mohammad. Boudriga, Noureddine.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1017/CBO9780511536700">Access by subscription</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Sequrity for computer networks : an introduction to data security in teleprocessing and electronic funds transferent://SD_ILS/0/SD_ILS:621882024-11-22T00:33:15Z2024-11-22T00:33:15ZYazar Davies, Donald Watts, 1924- Price, W. L., ort.yaz.<br/>Yer Numarası TK 5105 D43 1989<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>Computer Network Security Fourth International Conference on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2007 St. Petersburg, Russia, September 13–15, 2007 Proceedingsent://SD_ILS/0/SD_ILS:1870232024-11-22T00:33:15Z2024-11-22T00:33:15ZYazar Gorodetsky, Vladimir. editor. Kotenko, Igor. editor. Skormin, Victor A. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-540-73986-9">http://dx.doi.org/10.1007/978-3-540-73986-9</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Computer Safety, Reliability, and Security 26th International Conference, SAFECOMP 2007, Nuremberg, Germany, September 18-21, 2007. Proceedingsent://SD_ILS/0/SD_ILS:1873352024-11-22T00:33:15Z2024-11-22T00:33:15ZYazar Saglietti, Francesca. editor. Oster, Norbert. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-540-75101-4">http://dx.doi.org/10.1007/978-3-540-75101-4</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Advances in Information and Computer Security Second International Workshop on Security, IWSEC 2007, Nara, Japan, October 29-31, 2007. Proceedingsent://SD_ILS/0/SD_ILS:1874672024-11-22T00:33:15Z2024-11-22T00:33:15ZYazar Miyaji, Atsuko. editor. Kikuchi, Hiroaki. editor. Rannenberg, Kai. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-540-75651-4">http://dx.doi.org/10.1007/978-3-540-75651-4</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Advances in Computer Science – ASIAN 2007. Computer and Network Security 12th Asian Computing Science Conference, Doha, Qatar, December 9-11, 2007. Proceedingsent://SD_ILS/0/SD_ILS:1877272024-11-22T00:33:15Z2024-11-22T00:33:15ZYazar Cervesato, Iliano. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-540-76929-3">http://dx.doi.org/10.1007/978-3-540-76929-3</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Computer Security – ESORICS 2007 12th European Symposium On Research In Computer Security, Dresden, Germany, September 24 — 26, 2007. Proceedingsent://SD_ILS/0/SD_ILS:1872832024-11-22T00:33:15Z2024-11-22T00:33:15ZYazar Biskup, Joachim. editor. López, Javier. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-540-74835-9">http://dx.doi.org/10.1007/978-3-540-74835-9</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Information security management handbookent://SD_ILS/0/SD_ILS:2871232024-11-22T00:33:15Z2024-11-22T00:33:15ZYazar Tipton, Harold F. Nozaki, Micki Krause.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://marc.crcnetbase.com/isbn/9781439893159">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Information security management handbookent://SD_ILS/0/SD_ILS:2891512024-11-22T00:33:15Z2024-11-22T00:33:15ZYazar Tipton, Harold F. Krause, Micki.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://marc.crcnetbase.com/isbn/9780203325438">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Information security management handbookent://SD_ILS/0/SD_ILS:2903202024-11-22T00:33:15Z2024-11-22T00:33:15ZYazar Tipton, Harold F. Krause, Micki.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://marc.crcnetbase.com/isbn/9781420003406">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Information security management handbookent://SD_ILS/0/SD_ILS:2907632024-11-22T00:33:15Z2024-11-22T00:33:15ZYazar Tipton, Harold F. Nozaki, Micki Krause.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://marc.crcnetbase.com/isbn/9781439853467">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Information security management handbookent://SD_ILS/0/SD_ILS:2897342024-11-22T00:33:15Z2024-11-22T00:33:15ZYazar Tipton, Harold F. Krause, Micki.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://marc.crcnetbase.com/isbn/9781420090956">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Information security management handbookent://SD_ILS/0/SD_ILS:2851612024-11-22T00:33:15Z2024-11-22T00:33:15ZYazar Tipton, Harold F. Krause, Micki.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://marc.crcnetbase.com/isbn/9781439833032">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Information security cost managementent://SD_ILS/0/SD_ILS:2865452024-11-22T00:33:15Z2024-11-22T00:33:15ZYazar Bazavan, Ioana V. Lim, Ian.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://marc.crcnetbase.com/isbn/9781420013832">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Security in distributed, grid, mobile, and pervasive computingent://SD_ILS/0/SD_ILS:2874922024-11-22T00:33:15Z2024-11-22T00:33:15ZYazar Xiao, Yang, 1966-<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://marc.crcnetbase.com/isbn/9780849379253">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Software deployment, updating, and patchingent://SD_ILS/0/SD_ILS:2894092024-11-22T00:33:15Z2024-11-22T00:33:15ZYazar Stackpole, Bill. Hanrion, Patrick.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://marc.crcnetbase.com/isbn/9781420013290">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>802.1X port-based authenticationent://SD_ILS/0/SD_ILS:2913222024-11-22T00:33:15Z2024-11-22T00:33:15ZYazar Brown, Edwin Lyle.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://marc.crcnetbase.com/isbn/9781420044652">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Physical and logical security convergence powered by enterprise security managementent://SD_ILS/0/SD_ILS:1481922024-11-22T00:33:15Z2024-11-22T00:33:15ZYazar Contos, Brian T.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491228">http://www.sciencedirect.com/science/book/9781597491228</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>PCI compliance implementing effective PCI data security standardsent://SD_ILS/0/SD_ILS:1481952024-11-22T00:33:15Z2024-11-22T00:33:15ZYazar Bradley, Tony, 1969-<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491655">http://www.sciencedirect.com/science/book/9781597491655</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Stealing the network how to own a shadow: the chase for Knuthent://SD_ILS/0/SD_ILS:1485512024-11-22T00:33:15Z2024-11-22T00:33:15ZYazar Long, Johnny. Russell, Ryan, 1969- Mullen, Timothy M. Pinzon, D. Scott. Black Hat Press (Goodhue, Minn.)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490818">http://www.sciencedirect.com/science/book/9781597490818</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Techno security's guide to e-discovery and digital forensicsent://SD_ILS/0/SD_ILS:1485642024-11-22T00:33:15Z2024-11-22T00:33:15ZYazar Wiles, Jack.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492232">http://www.sciencedirect.com/science/book/9781597492232</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>AVIEN malware defense guide for the Enterpriseent://SD_ILS/0/SD_ILS:1451832024-11-22T00:33:15Z2024-11-22T00:33:15ZYazar Harley, David.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491648">http://www.sciencedirect.com/science/book/9781597491648</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Best damn firewall book periodent://SD_ILS/0/SD_ILS:1453772024-11-22T00:33:15Z2024-11-22T00:33:15ZYazar Behrens, Thorsten.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492188">http://www.sciencedirect.com/science/book/9781597492188</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>How to cheat at Voip securityent://SD_ILS/0/SD_ILS:1454862024-11-22T00:33:15Z2024-11-22T00:33:15ZYazar Porter, Thomas, PhD. Gough, Michael, 1963-<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491693">http://www.sciencedirect.com/science/book/9781597491693</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>The history of information security a comprehensive handbookent://SD_ILS/0/SD_ILS:1455322024-11-22T00:33:15Z2024-11-22T00:33:15ZYazar Leeuw, Karl de. Bergstra, J. A.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780444516084">http://www.sciencedirect.com/science/book/9780444516084</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Integrated security systems design concepts, specifications, and implementationent://SD_ILS/0/SD_ILS:1455522024-11-22T00:33:15Z2024-11-22T00:33:15ZYazar Norman, Thomas L.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780750679091">http://www.sciencedirect.com/science/book/9780750679091</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>How to cheat at configuring Open Source security toolsent://SD_ILS/0/SD_ILS:1455782024-11-22T00:33:15Z2024-11-22T00:33:15ZYazar Alder, Raven.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491709">http://www.sciencedirect.com/science/book/9781597491709</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>How to cheat at securing your networkent://SD_ILS/0/SD_ILS:1456542024-11-22T00:33:15Z2024-11-22T00:33:15ZYazar Dubrawsky, Ido.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492317">http://www.sciencedirect.com/science/book/9781597492317</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>How to cheat at securing SQL server 2005ent://SD_ILS/0/SD_ILS:1456552024-11-22T00:33:15Z2024-11-22T00:33:15ZYer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491969">http://www.sciencedirect.com/science/book/9781597491969</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Windows forensic analysis DVD toolkitent://SD_ILS/0/SD_ILS:1456782024-11-22T00:33:15Z2024-11-22T00:33:15ZYazar Carvey, Harlan A.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491563">http://www.sciencedirect.com/science/book/9781597491563</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Zen and the art of information securityent://SD_ILS/0/SD_ILS:1456802024-11-22T00:33:15Z2024-11-22T00:33:15ZYazar Winkler, Ira.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491686">http://www.sciencedirect.com/science/book/9781597491686</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>FISMA certification & accreditation handbookent://SD_ILS/0/SD_ILS:1458762024-11-22T00:33:15Z2024-11-22T00:33:15ZYazar Taylor, Laura. Shepherd, Matthew.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491167">http://www.sciencedirect.com/science/book/9781597491167</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Microsoft Vista for IT security professionalsent://SD_ILS/0/SD_ILS:1462422024-11-22T00:33:15Z2024-11-22T00:33:15ZYazar Piltzecker, Tony, 1975- Chaffin, Larry.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491396">http://www.sciencedirect.com/science/book/9781597491396</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Metasploit Toolkit for Penetration Testing, Exploit Development, And Vulnerabiity Researchent://SD_ILS/0/SD_ILS:1470512024-11-22T00:33:15Z2024-11-22T00:33:15ZYer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490740">http://www.sciencedirect.com/science/book/9781597490740</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Developer's guide to web application securityent://SD_ILS/0/SD_ILS:1476642024-11-22T00:33:15Z2024-11-22T00:33:15ZYazar Cross, Michael, 1965-<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490610">http://www.sciencedirect.com/science/book/9781597490610</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Security in computingent://SD_ILS/0/SD_ILS:1106822024-11-22T00:33:15Z2024-11-22T00:33:15ZYazar Pfleeger, Charles P., 1948-<br/>Yer Numarası QA76.9.A25 P45 2007<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>How to cheat at configuring Open Source security toolsent://SD_ILS/0/SD_ILS:1121022024-11-22T00:33:15Z2024-11-22T00:33:15ZYazar Alder, Raven.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491709">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>How to cheat at Voip securityent://SD_ILS/0/SD_ILS:1121062024-11-22T00:33:15Z2024-11-22T00:33:15ZYazar Porter, Thomas, PhD. Gough, Michael. ScienceDirect (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491693">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Snort IDS and IPS toolkitent://SD_ILS/0/SD_ILS:1121122024-11-22T00:33:15Z2024-11-22T00:33:15ZYazar Beale, Jay Baker, Andrew R. Esler, Joel. Northcutt, Stephen. Kohlenberg, Toby.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490993">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>WarDriving & wireless penetration testingent://SD_ILS/0/SD_ILS:1122102024-11-22T00:33:15Z2024-11-22T00:33:15ZYazar Hurley, Chris. ScienceDirect (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491112">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Windows forensic analysis DVD toolkitent://SD_ILS/0/SD_ILS:1122112024-11-22T00:33:15Z2024-11-22T00:33:15ZYazar Carvey, Harlan A. ScienceDirect (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491563">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Zen and the art of information securityent://SD_ILS/0/SD_ILS:1122142024-11-22T00:33:15Z2024-11-22T00:33:15ZYazar Winkler, Ira. ScienceDirect (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491686">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Network security assessment from vulnerability to patchent://SD_ILS/0/SD_ILS:1463342024-11-22T00:33:15Z2024-11-22T00:33:15ZYazar Manzuik, Steve. Gold, André. Gatford, Chris.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491013">http://www.sciencedirect.com/science/book/9781597491013</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Microsoft windows security fundamentalsent://SD_ILS/0/SD_ILS:1463462024-11-22T00:33:15Z2024-11-22T00:33:15ZYazar Clercq, Jan de, 1968- Grillenmeier, Guido.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781555583408">http://www.sciencedirect.com/science/book/9781555583408</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Open source fuzzing toolsent://SD_ILS/0/SD_ILS:1484122024-11-22T00:33:15Z2024-11-22T00:33:15ZYazar Rathaus, Noam.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491952">http://www.sciencedirect.com/science/book/9781597491952</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Snort IDS and IPS toolkitent://SD_ILS/0/SD_ILS:1484442024-11-22T00:33:15Z2024-11-22T00:33:15ZYazar Beale, Jay. Baker, Andrew R. Esler, Joel. Northcutt, Stephen. Kohlenberg, Toby.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490993">http://www.sciencedirect.com/science/book/9781597490993</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Security+ study guide & DVD training systement://SD_ILS/0/SD_ILS:1121402024-11-22T00:33:15Z2024-11-22T00:33:15ZYazar Cross, Michael, 1965- ScienceDirect (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491532">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Configuring Juniper Networks NetScreen & SSG firewallsent://SD_ILS/0/SD_ILS:1121542024-11-22T00:33:15Z2024-11-22T00:33:15ZYazar Cameron, Rob. ScienceDirect (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491181">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>FISMA certification & accreditation handbookent://SD_ILS/0/SD_ILS:1121692024-11-22T00:33:15Z2024-11-22T00:33:15ZYazar Taylor, Laura. Shepherd, Matthew. ScienceDirect (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491167">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>How to cheat at securing sql server 2005ent://SD_ILS/0/SD_ILS:1121742024-11-22T00:33:15Z2024-11-22T00:33:15ZYazar ScienceDirect (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491969">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Integrated security systems design concepts, specifications, and implementationent://SD_ILS/0/SD_ILS:1121752024-11-22T00:33:15Z2024-11-22T00:33:15ZYazar Norman, Thomas, CSC. ScienceDirect (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780750679091">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Metasploit Toolkit for Penetration Testing, Exploit Development, And Vulnerabiity Researchent://SD_ILS/0/SD_ILS:1121792024-11-22T00:33:15Z2024-11-22T00:33:15ZYazar ScienceDirect (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490740">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Microsoft Vista for IT security professionalsent://SD_ILS/0/SD_ILS:1121822024-11-22T00:33:15Z2024-11-22T00:33:15ZYazar Piltzecker, Tony, 1975- Chaffin, Larry. ScienceDirect (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491396">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Microsoft windows security fundamentalsent://SD_ILS/0/SD_ILS:1121832024-11-22T00:33:15Z2024-11-22T00:33:15ZYazar Clercq, Jan de, 1968- Grillenmeier, Guido. ScienceDirect (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781555583408">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Network security assessment from vulnerability to patchent://SD_ILS/0/SD_ILS:1121862024-11-22T00:33:15Z2024-11-22T00:33:15ZYazar Manzuik, Steve. Gold, André. Gatford, Chris. ScienceDirect (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491013">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Open source fuzzing toolsent://SD_ILS/0/SD_ILS:1121872024-11-22T00:33:15Z2024-11-22T00:33:15ZYazar Rathaus, Noam ScienceDirect (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491952">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>PCI compliance implementing effective PCI data security standardsent://SD_ILS/0/SD_ILS:1121892024-11-22T00:33:15Z2024-11-22T00:33:15ZYazar Bradley, Tony, 1969- ScienceDirect (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491655">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Security convergence managing enterprise security riskent://SD_ILS/0/SD_ILS:1121982024-11-22T00:33:15Z2024-11-22T00:33:15ZYazar Tyson, Dave. ScienceDirect (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780750684255">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Stealing the network how to own a shadow: the chase for Knuthent://SD_ILS/0/SD_ILS:1122002024-11-22T00:33:15Z2024-11-22T00:33:15ZYazar Long, Johnny. Russell, Ryan, 1969- Mullen, Timothy M. Pinzon, D. Scott. ScienceDirect (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490818">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Techno Security's guide to managing risks for IT managers, auditors, and investigatorsent://SD_ILS/0/SD_ILS:1122032024-11-22T00:33:15Z2024-11-22T00:33:15ZYazar Wiles, Jack. ScienceDirect (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491389">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>The history of information security a comprehensive handbookent://SD_ILS/0/SD_ILS:1122052024-11-22T00:33:15Z2024-11-22T00:33:15ZYazar Leeuw, Karl de. Bergstra, J. A. ScienceDirect (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780444516084">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>The official CHFI study guide (Exam 312-49) for computer hacking forensic investigator.ent://SD_ILS/0/SD_ILS:1122062024-11-22T00:33:15Z2024-11-22T00:33:15ZYazar Kleiman, Dave. ScienceDirect (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491976">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Techno Security's guide to managing risks for IT managers, auditors, and investigatorsent://SD_ILS/0/SD_ILS:1486412024-11-22T00:33:15Z2024-11-22T00:33:15ZYazar Wiles, Jack.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491389">http://www.sciencedirect.com/science/book/9781597491389</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Configuring Juniper Networks NetScreen & SSG firewallsent://SD_ILS/0/SD_ILS:1488032024-11-22T00:33:15Z2024-11-22T00:33:15ZYazar Cameron, Rob. Juniper Networks, Inc.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491181">http://www.sciencedirect.com/science/book/9781597491181</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Security convergence managing enterprise security riskent://SD_ILS/0/SD_ILS:1490802024-11-22T00:33:15Z2024-11-22T00:33:15ZYazar Tyson, Dave.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim Volltext <a href="http://www.sciencedirect.com/science/book/9780750684255">http://www.sciencedirect.com/science/book/9780750684255</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Security+ study guide & DVD training systement://SD_ILS/0/SD_ILS:1490892024-11-22T00:33:15Z2024-11-22T00:33:15ZYazar Cross, Michael, 1965-<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491532">http://www.sciencedirect.com/science/book/9781597491532</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Data warehousing and data mining techniques for cyber securityent://SD_ILS/0/SD_ILS:1104342024-11-22T00:33:15Z2024-11-22T00:33:15ZYazar Singhal, Anoop, 1958-<br/>Yer Numarası QA76.9.A25 S563 2007<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>Information security : contemporary casesent://SD_ILS/0/SD_ILS:1110212024-11-22T00:33:15Z2024-11-22T00:33:15ZYazar Wright, Marie A. Kakalik, John S.<br/>Yer Numarası QA76.9.A25 W75 2007<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>The best damn IT security management book periodent://SD_ILS/0/SD_ILS:1452742024-11-22T00:33:15Z2024-11-22T00:33:15ZYazar Cunningham, Bryan, JD.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492270">http://www.sciencedirect.com/science/book/9781597492270</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Botnets the killer web appent://SD_ILS/0/SD_ILS:1452832024-11-22T00:33:15Z2024-11-22T00:33:15ZYazar Schiller, Craig A.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491358">http://www.sciencedirect.com/science/book/9781597491358</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Asterisk hackingent://SD_ILS/0/SD_ILS:1453552024-11-22T00:33:15Z2024-11-22T00:33:15ZYazar Brashars, Joshua.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491518">http://www.sciencedirect.com/science/book/9781597491518</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Web application vulnerabilities detect, exploit, preventent://SD_ILS/0/SD_ILS:1469082024-11-22T00:33:15Z2024-11-22T00:33:15ZYazar Cross, Michael, 1965-<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492096">http://www.sciencedirect.com/science/book/9781597492096</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>WarDriving & wireless penetration testingent://SD_ILS/0/SD_ILS:1468052024-11-22T00:33:15Z2024-11-22T00:33:15ZYazar Hurley, Chris.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491112">http://www.sciencedirect.com/science/book/9781597491112</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>The official CHFI study guide (Exam 312-49) for computer hacking forensic investigator.ent://SD_ILS/0/SD_ILS:1483882024-11-22T00:33:15Z2024-11-22T00:33:15ZYazar Kleiman, Dave.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491976">http://www.sciencedirect.com/science/book/9781597491976</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Optimizing and testing WLANs proven techniques for maximum performanceent://SD_ILS/0/SD_ILS:1482702024-11-22T00:33:15Z2024-11-22T00:33:15ZYazar Alexander, Tom.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780750679862">http://www.sciencedirect.com/science/book/9780750679862</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Network security current status and future directionsent://SD_ILS/0/SD_ILS:2495062024-11-22T00:33:15Z2024-11-22T00:33:15ZYazar Douligeris, C. (Christos)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim IEEE Xplore <a href="http://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=5237765">http://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=5237765</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Applied cryptanalysis breaking ciphers in the real worldent://SD_ILS/0/SD_ILS:2495082024-11-22T00:33:15Z2024-11-22T00:33:15ZYazar Stamp, Mark. Low, Richard M., 1967-<br/>Yer Numarası ONLINE<br/>Elektronik Erişim IEEE Xplore <a href="http://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=5201512">http://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=5201512</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Grid computing securityent://SD_ILS/0/SD_ILS:2487472024-11-22T00:33:15Z2024-11-22T00:33:15ZYazar Chakrabarti, Anirban.<br/>Yer Numarası QA76.9.C58 C53 2007<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>Data-driven block ciphers for fast telecommunication systemsent://SD_ILS/0/SD_ILS:2877632024-11-22T00:33:15Z2024-11-22T00:33:15ZYazar Moldovyan, Nick. Moldovyan, Alex.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://marc.crcnetbase.com/isbn/9781420054125">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Official (ISC)2 guide to the SSCP CBKent://SD_ILS/0/SD_ILS:2900782024-11-22T00:33:15Z2024-11-22T00:33:15ZYazar Contesti, Diana-Lynn.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://marc.crcnetbase.com/isbn/9780203331576">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Developer's guide to web application securityent://SD_ILS/0/SD_ILS:3064642024-11-22T00:33:15Z2024-11-22T00:33:15ZYazar Cross, Michael, 1965-<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490610">http://www.sciencedirect.com/science/book/9781597490610</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Metasploit toolkit for penetration testing, exploit development, and vulnerability researchent://SD_ILS/0/SD_ILS:3064692024-11-22T00:33:15Z2024-11-22T00:33:15ZYazar Maynor, David. Mookhey, K. K.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490740">http://www.sciencedirect.com/science/book/9781597490740</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>How to cheat at securing your networkent://SD_ILS/0/SD_ILS:3065032024-11-22T00:33:15Z2024-11-22T00:33:15ZYazar Dubrawsky, Ido.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492317">http://www.sciencedirect.com/science/book/9781597492317</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Mechanics of user identification and authentication fundamentals of identity managementent://SD_ILS/0/SD_ILS:2868302024-11-22T00:33:15Z2024-11-22T00:33:15ZYazar Todorov, Dobromir.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://marc.crcnetbase.com/isbn/9781420052206">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Complete guide to security and privacy metrics measuring regulatory compliance, operational resilience, and ROIent://SD_ILS/0/SD_ILS:2893602024-11-22T00:33:15Z2024-11-22T00:33:15ZYazar Herrmann, Debra S.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://marc.crcnetbase.com/isbn/9781420013283">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Complete guide to CISM certificationent://SD_ILS/0/SD_ILS:2893972024-11-22T00:33:15Z2024-11-22T00:33:15ZYazar Peltier, Thomas R. Peltier, Justin.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://marc.crcnetbase.com/isbn/9781420013252">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Testing code securityent://SD_ILS/0/SD_ILS:2865522024-11-22T00:33:15Z2024-11-22T00:33:15ZYazar Van der Linden, Maura A.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://marc.crcnetbase.com/isbn/9781420013795">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Information security design, implementation, measurement, and complianceent://SD_ILS/0/SD_ILS:2884902024-11-22T00:33:15Z2024-11-22T00:33:15ZYazar Layton, Timothy P.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://marc.crcnetbase.com/isbn/9781420013412">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Phishing and countermeasures understanding the increasing problem of electronic identity theftent://SD_ILS/0/SD_ILS:2968752024-11-22T00:33:15Z2024-11-22T00:33:15ZYazar Jakobsson, Markus. Myers, Steven, 1975-<br/>Yer Numarası ONLINE<br/>Elektronik Erişim Books24x7 <a href="http://www.books24x7.com/marc.asp?bookid=18418">http://www.books24x7.com/marc.asp?bookid=18418</a>
John Wiley <a href="http://dx.doi.org/10.1002/0470086106">http://dx.doi.org/10.1002/0470086106</a>
MyiLibrary, Table of contents <a href="http://www.myilibrary.com?id=82196&ref=toc">http://www.myilibrary.com?id=82196&ref=toc</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Trustworthy computing analytical and quantitative engineering evaluationent://SD_ILS/0/SD_ILS:2969572024-11-22T00:33:15Z2024-11-22T00:33:15ZYazar Sahinoglu, Mehmet, 1951- Wiley InterScience (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim Contributor biographical information <a href="http://catdir.loc.gov/catdir/enhancements/fy0739/2006033567-b.html">http://catdir.loc.gov/catdir/enhancements/fy0739/2006033567-b.html</a>
John Wiley <a href="http://dx.doi.org/10.1002/9780470127872">http://dx.doi.org/10.1002/9780470127872</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Trust, complexity and control confidence in a convergent worldent://SD_ILS/0/SD_ILS:2975212024-11-22T00:33:15Z2024-11-22T00:33:15ZYazar Cofta, Piotr.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim Contributor biographical information <a href="http://catdir.loc.gov/catdir/enhancements/fy0745/2007015560-b.html">http://catdir.loc.gov/catdir/enhancements/fy0745/2007015560-b.html</a>
John Wiley <a href="http://dx.doi.org/10.1002/9780470517857">http://dx.doi.org/10.1002/9780470517857</a>
HathiTrust Digital Library, Limited view (search only) <a href="http://catalog.hathitrust.org/api/volumes/oclc/123232368.html">http://catalog.hathitrust.org/api/volumes/oclc/123232368.html</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>