Arama Sonu&ccedil;lar&#305; Computer security. - Daralt&#305;lm&#305;&#351;: 2008 SirsiDynix Enterprise https://katalog.hacettepe.edu.tr/client/tr_TR/default_tr/default_tr/qu$003dComputer$002bsecurity.$0026qf$003dPUBDATE$002509Yay$0025C4$0025B1n$002bY$0025C4$0025B1l$0025C4$0025B1$0025092008$0025092008$0026ps$003d300$0026isd$003dtrue?dt=list 2024-11-25T06:08:25Z Sequrity for computer networks : an introduction to data security in teleprocessing and electronic funds transfer ent://SD_ILS/0/SD_ILS:62188 2024-11-25T06:08:25Z 2024-11-25T06:08:25Z Yazar&#160;Davies, Donald Watts, 1924-&#160;Price, W. L., ort.yaz.<br/>Yer Numaras&#305;&#160;TK 5105 D43 1989<br/>Format:&#160;Kitap<br/>Durum&#160;Beytepe K&uuml;t&uuml;phanesi~1<br/> Visualization for Computer Security 5th International Workshop, VizSec 2008, Cambridge, MA, USA, September 15, 2008. Proceedings ent://SD_ILS/0/SD_ILS:188815 2024-11-25T06:08:25Z 2024-11-25T06:08:25Z Yazar&#160;Goodall, John R. editor.&#160;Conti, Gregory. editor.&#160;Ma, Kwan-Liu. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-3-540-85933-8">http://dx.doi.org/10.1007/978-3-540-85933-8</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Computer Safety, Reliability, and Security 27th International Conference, SAFECOMP 2008 Newcastle upon Tyne, UK, September 22-25, 2008 Proceedings ent://SD_ILS/0/SD_ILS:188894 2024-11-25T06:08:25Z 2024-11-25T06:08:25Z Yazar&#160;Harrison, Michael D. editor.&#160;Sujan, Mark-Alexander. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-3-540-87698-4">http://dx.doi.org/10.1007/978-3-540-87698-4</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Computer Security - ESORICS 2008 13th European Symposium on Research in Computer Security, M&aacute;laga, Spain, October 6-8, 2008. Proceedings ent://SD_ILS/0/SD_ILS:189031 2024-11-25T06:08:25Z 2024-11-25T06:08:25Z Yazar&#160;Jajodia, Sushil. editor.&#160;Lopez, Javier. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-3-540-88313-5">http://dx.doi.org/10.1007/978-3-540-88313-5</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Hardware-based computer security techniques to defeat hackers from biometrics to quantum cryptography ent://SD_ILS/0/SD_ILS:297432 2024-11-25T06:08:25Z 2024-11-25T06:08:25Z Yazar&#160;Dube, Roger.&#160;Wiley InterScience (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://proquest.safaribooksonline.com/?fpi=9780470193396">Available by subscription from Safari Books Online</a> John Wiley <a href="http://dx.doi.org/10.1002/9780470425497">http://dx.doi.org/10.1002/9780470425497</a> MyiLibrary, Table of contents <a href="http://www.myilibrary.com?id=183706&ref=toc">http://www.myilibrary.com?id=183706&ref=toc</a> Volltext <a href="http://proquest.tech.safaribooksonline.de/9780470193396">http://proquest.tech.safaribooksonline.de/9780470193396</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Advances in Information and Computer Security Third International Workshop on Security, IWSEC 2008, Kagawa, Japan, November 25-27, 2008. Proceedings ent://SD_ILS/0/SD_ILS:189294 2024-11-25T06:08:25Z 2024-11-25T06:08:25Z Yazar&#160;Matsuura, Kanta. editor.&#160;Fujisaki, Eiichiro. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-3-540-89598-5">http://dx.doi.org/10.1007/978-3-540-89598-5</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> VizSEC 2007 Proceedings of the Workshop on Visualization for Computer Security ent://SD_ILS/0/SD_ILS:188061 2024-11-25T06:08:25Z 2024-11-25T06:08:25Z Yazar&#160;Goodall, John R. editor.&#160;Conti, Gregory. editor.&#160;Ma, Kwan-Liu. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-3-540-78243-8">http://dx.doi.org/10.1007/978-3-540-78243-8</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Proceedings of The Ifip Tc 11 23rd International Information Security Conference IFIP 20th World Computer Congress, IFIP SEC&rsquo;08, September 7-10, 2008, Milano, Italy ent://SD_ILS/0/SD_ILS:164757 2024-11-25T06:08:25Z 2024-11-25T06:08:25Z Yazar&#160;Jajodia, Sushil. editor.&#160;Samarati, Pierangela. editor.&#160;Cimato, Stelvio. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-0-387-09699-5">http://dx.doi.org/10.1007/978-0-387-09699-5</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Information assurance dependability and security in networked systems ent://SD_ILS/0/SD_ILS:145553 2024-11-25T06:08:25Z 2024-11-25T06:08:25Z Yazar&#160;Qian, Yi, 1962-<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780123735669">http://www.sciencedirect.com/science/book/9780123735669</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Digital watermarking and steganography ent://SD_ILS/0/SD_ILS:146474 2024-11-25T06:08:25Z 2024-11-25T06:08:25Z Yazar&#160;Cox, I. J. (Ingemar J.)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780123725851">http://www.sciencedirect.com/science/book/9780123725851</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Information security management handbook ent://SD_ILS/0/SD_ILS:290320 2024-11-25T06:08:25Z 2024-11-25T06:08:25Z Yazar&#160;Tipton, Harold F.&#160;Krause, Micki.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://marc.crcnetbase.com/isbn/9781420003406">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Information security management handbook ent://SD_ILS/0/SD_ILS:287123 2024-11-25T06:08:25Z 2024-11-25T06:08:25Z Yazar&#160;Tipton, Harold F.&#160;Nozaki, Micki Krause.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://marc.crcnetbase.com/isbn/9781439893159">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Information security management handbook ent://SD_ILS/0/SD_ILS:289151 2024-11-25T06:08:25Z 2024-11-25T06:08:25Z Yazar&#160;Tipton, Harold F.&#160;Krause, Micki.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://marc.crcnetbase.com/isbn/9780203325438">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Information security management handbook ent://SD_ILS/0/SD_ILS:290763 2024-11-25T06:08:25Z 2024-11-25T06:08:25Z Yazar&#160;Tipton, Harold F.&#160;Nozaki, Micki Krause.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://marc.crcnetbase.com/isbn/9781439853467">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Information security management handbook ent://SD_ILS/0/SD_ILS:289734 2024-11-25T06:08:25Z 2024-11-25T06:08:25Z Yazar&#160;Tipton, Harold F.&#160;Krause, Micki.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://marc.crcnetbase.com/isbn/9781420090956">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Profiling hackers the science of criminal profiling as applied to the world of hacking ent://SD_ILS/0/SD_ILS:291412 2024-11-25T06:08:25Z 2024-11-25T06:08:25Z Yazar&#160;Chiesa, Raoul, 1973-&#160;Ducci, Stefania.&#160;Ciappi, Silvio, 1965-<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://marc.crcnetbase.com/isbn/9781420086942">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Integrating ISA Server 2006 with Microsoft Exchange 2007 ent://SD_ILS/0/SD_ILS:145628 2024-11-25T06:08:25Z 2024-11-25T06:08:25Z Yazar&#160;Strachan, Fergus.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492751">http://www.sciencedirect.com/science/book/9781597492751</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Netcat power tools ent://SD_ILS/0/SD_ILS:146277 2024-11-25T06:08:25Z 2024-11-25T06:08:25Z Yazar&#160;Kanclirz, Jan.&#160;Baskin, Brian.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492577">http://www.sciencedirect.com/science/book/9781597492577</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Microsoft forefront security administration guide ent://SD_ILS/0/SD_ILS:146369 2024-11-25T06:08:25Z 2024-11-25T06:08:25Z Yazar&#160;Varsalone, Jesse.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492447">http://www.sciencedirect.com/science/book/9781597492447</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Practical embedded security building secure resource-constrained systems ent://SD_ILS/0/SD_ILS:147416 2024-11-25T06:08:25Z 2024-11-25T06:08:25Z Yazar&#160;Stapko, Timothy John.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780750682152">http://www.sciencedirect.com/science/book/9780750682152</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> OS X exploits and defense ent://SD_ILS/0/SD_ILS:148242 2024-11-25T06:08:25Z 2024-11-25T06:08:25Z Yazar&#160;Baccas, Paul.&#160;Finisterre, Kevin.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492546">http://www.sciencedirect.com/science/book/9781597492546</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> ISA server 2006 ent://SD_ILS/0/SD_ILS:115080 2024-11-25T06:08:25Z 2024-11-25T06:08:25Z Yazar&#160;&#304;nan, Y&uuml;ksel.&#160;Demirli, Nihat.<br/>Yer Numaras&#305;&#160;TK5105.59 .I536 2008<br/>Format:&#160;Kitap<br/>Durum&#160;Beytepe K&uuml;t&uuml;phanesi~2<br/> How to cheat at securing Linux ent://SD_ILS/0/SD_ILS:145540 2024-11-25T06:08:25Z 2024-11-25T06:08:25Z Yazar&#160;Krishnamurthy Madwachar, Mohan.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492072">http://www.sciencedirect.com/science/book/9781597492072</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Infosecurity 2008 threat analysis ent://SD_ILS/0/SD_ILS:145541 2024-11-25T06:08:25Z 2024-11-25T06:08:25Z Yazar&#160;Clark, Champ, III.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492249">http://www.sciencedirect.com/science/book/9781597492249</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> No tech hacking a guide to social engineering, dumpster diving, and shoulder surfing ent://SD_ILS/0/SD_ILS:146362 2024-11-25T06:08:25Z 2024-11-25T06:08:25Z Yazar&#160;Long, Johnny.&#160;Mitnick, Kevin D. (Kevin David), 1963-<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492157">http://www.sciencedirect.com/science/book/9781597492157</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> SonicWALL secure wireless network integrated solutions guide ent://SD_ILS/0/SD_ILS:148562 2024-11-25T06:08:25Z 2024-11-25T06:08:25Z Yazar&#160;Levy, Joe.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491938">http://www.sciencedirect.com/science/book/9781597491938</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Scene of the cybercrime ent://SD_ILS/0/SD_ILS:148955 2024-11-25T06:08:25Z 2024-11-25T06:08:25Z Yazar&#160;Cross, Michael, 1965-&#160;Shinder, Debra Littlejohn. Scene of the cybercrime.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492768">http://www.sciencedirect.com/science/book/9781597492768</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Securing Windows server 2008 prevent attacks from outside and inside your organization. ent://SD_ILS/0/SD_ILS:148982 2024-11-25T06:08:25Z 2024-11-25T06:08:25Z Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492805">http://www.sciencedirect.com/science/book/9781597492805</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Reverse engineering code with IDA Pro ent://SD_ILS/0/SD_ILS:149020 2024-11-25T06:08:25Z 2024-11-25T06:08:25Z Yazar&#160;Ferguson, Justin.&#160;Kaminsky, Dan.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492379">http://www.sciencedirect.com/science/book/9781597492379</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Securing Citrix XenApp Server in the enterprise ent://SD_ILS/0/SD_ILS:149050 2024-11-25T06:08:25Z 2024-11-25T06:08:25Z Yazar&#160;Bin Azad, Tariq.&#160;Wilson, Connie.&#160;Wright., Michael.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492812">http://www.sciencedirect.com/science/book/9781597492812</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Network security know it all ent://SD_ILS/0/SD_ILS:146401 2024-11-25T06:08:25Z 2024-11-25T06:08:25Z Yazar&#160;Joshi, James B. D.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780123744630">http://www.sciencedirect.com/science/book/9780123744630</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Nmap in the enterprise your guide to network scanning ent://SD_ILS/0/SD_ILS:146442 2024-11-25T06:08:25Z 2024-11-25T06:08:25Z Yazar&#160;Orebaugh, Angela.&#160;Pinkard, Becky.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492416">http://www.sciencedirect.com/science/book/9781597492416</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Insider computer fraud an in-depth framework for detecting and defending against insider IT attacks ent://SD_ILS/0/SD_ILS:291349 2024-11-25T06:08:25Z 2024-11-25T06:08:25Z Yazar&#160;Brancik, Kenneth C.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://marc.crcnetbase.com/isbn/9781420046601">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Security software development assessing and managing security risks ent://SD_ILS/0/SD_ILS:286016 2024-11-25T06:08:25Z 2024-11-25T06:08:25Z Yazar&#160;Ashbaugh, Douglas A.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://marc.crcnetbase.com/isbn/9781420063813">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Building an effective information security policy architecture ent://SD_ILS/0/SD_ILS:290577 2024-11-25T06:08:25Z 2024-11-25T06:08:25Z Yazar&#160;Bacik, Sandy.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://marc.crcnetbase.com/isbn/9781420059069">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Security in wireless ad hoc and sensor networks ent://SD_ILS/0/SD_ILS:297789 2024-11-25T06:08:25Z 2024-11-25T06:08:25Z Yazar&#160;&Ccedil;ayirci, E. (Erdal)&#160;Levi, Albert, 1969-&#160;Wiley InterScience (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;John Wiley <a href="http://dx.doi.org/10.1002/9780470516782">http://dx.doi.org/10.1002/9780470516782</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> IPTV security protecting high-value digital contents ent://SD_ILS/0/SD_ILS:302654 2024-11-25T06:08:25Z 2024-11-25T06:08:25Z Yazar&#160;Ramirez, David.&#160;Wiley InterScience (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;John Wiley <a href="http://dx.doi.org/10.1002/9780470727201">http://dx.doi.org/10.1002/9780470727201</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Effective leadership skills for the CISO ent://SD_ILS/0/SD_ILS:286555 2024-11-25T06:08:25Z 2024-11-25T06:08:25Z Yazar&#160;Fitzgerald, Todd.&#160;Krause, Micki.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://marc.crcnetbase.com/isbn/9780849379444">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Oracle identity management governance, risk, and compliance architecture ent://SD_ILS/0/SD_ILS:287794 2024-11-25T06:08:25Z 2024-11-25T06:08:25Z Yazar&#160;Pohlman, Marlin B.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://marc.crcnetbase.com/isbn/9781420072488">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Architecting secure software systems ent://SD_ILS/0/SD_ILS:288749 2024-11-25T06:08:25Z 2024-11-25T06:08:25Z Yazar&#160;Talukder, Asoke K.&#160;Chaitanya, Manish.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://marc.crcnetbase.com/isbn/9781420087857">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Information security management handbook. Vol. 2 ent://SD_ILS/0/SD_ILS:286816 2024-11-25T06:08:25Z 2024-11-25T06:08:25Z Yazar&#160;Tipton, Harold F.&#160;Krause, Micki.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://marc.crcnetbase.com/isbn/9781420067101">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Digital privacy theory, technologies, and practices ent://SD_ILS/0/SD_ILS:286824 2024-11-25T06:08:25Z 2024-11-25T06:08:25Z Yazar&#160;Acquisti, Alessandro.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://marc.crcnetbase.com/isbn/9781420052183">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> How to achieve 27001 certification an example of applied compliance management ent://SD_ILS/0/SD_ILS:289396 2024-11-25T06:08:25Z 2024-11-25T06:08:25Z Yazar&#160;Arnason, Sigurjon Thor.&#160;Willett, Keith D.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://marc.crcnetbase.com/isbn/9781420013139">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Information assurance architecture ent://SD_ILS/0/SD_ILS:291123 2024-11-25T06:08:25Z 2024-11-25T06:08:25Z Yazar&#160;Willett, Keith D.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://marc.crcnetbase.com/isbn/9780849380686">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Kismet hacking ent://SD_ILS/0/SD_ILS:147861 2024-11-25T06:08:25Z 2024-11-25T06:08:25Z Yazar&#160;Haines, Brad.&#160;Schearer, Michael J.&#160;Thornton, Frank (Thorn)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491174">http://www.sciencedirect.com/science/book/9781597491174</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Malware forensics investigating and analyzing malicious code ent://SD_ILS/0/SD_ILS:147914 2024-11-25T06:08:25Z 2024-11-25T06:08:25Z Yazar&#160;Aquilina, James M.&#160;Casey, Eoghan.&#160;Malin, Cameron H.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492683">http://www.sciencedirect.com/science/book/9781597492683</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Google hacking for penetration testers. Volume 2 ent://SD_ILS/0/SD_ILS:148029 2024-11-25T06:08:25Z 2024-11-25T06:08:25Z Yazar&#160;Long, Johnny.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491761">http://www.sciencedirect.com/science/book/9781597491761</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> OSSEC host-based intrusion detection guide ent://SD_ILS/0/SD_ILS:148333 2024-11-25T06:08:25Z 2024-11-25T06:08:25Z Yazar&#160;Hay, Andrew.&#160;Cid, Daniel.&#160;Bray, Rory.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492409">http://www.sciencedirect.com/science/book/9781597492409</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Check Point NGX R65 security administration ent://SD_ILS/0/SD_ILS:148746 2024-11-25T06:08:25Z 2024-11-25T06:08:25Z Yazar&#160;Bonnell, Ralph.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492454">http://www.sciencedirect.com/science/book/9781597492454</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Security and Quality of Service in Ad Hoc Wireless Networks ent://SD_ILS/0/SD_ILS:237801 2024-11-25T06:08:25Z 2024-11-25T06:08:25Z Yazar&#160;Mishra, Amitabh.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1017/CBO9780511619755">Access by subscription</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Secure computer and network systems modeling, analysis and design ent://SD_ILS/0/SD_ILS:296665 2024-11-25T06:08:25Z 2024-11-25T06:08:25Z Yazar&#160;Ye, Nong.&#160;Wiley InterScience (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;Contributor biographical information <a href="http://catdir.loc.gov/catdir/enhancements/fy0833/2007037133-b.html">http://catdir.loc.gov/catdir/enhancements/fy0833/2007037133-b.html</a> John Wiley <a href="http://dx.doi.org/10.1002/9780470023273">http://dx.doi.org/10.1002/9780470023273</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> ICT futures delivering pervasive, real-time and secure services ent://SD_ILS/0/SD_ILS:302768 2024-11-25T06:08:25Z 2024-11-25T06:08:25Z Yazar&#160;Warren, Paul (Paul W.)&#160;Davies, J. (N. John)&#160;Brown, David, 1954-&#160;Wiley InterScience (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;John Wiley <a href="http://dx.doi.org/10.1002/9780470758656">http://dx.doi.org/10.1002/9780470758656</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/>