Arama Sonu&ccedil;lar&#305; Computer security. - Daralt&#305;lm&#305;&#351;: 2010 SirsiDynix Enterprise https://katalog.hacettepe.edu.tr/client/tr_TR/default_tr/default_tr/qu$003dComputer$002bsecurity.$0026qf$003dPUBDATE$002509Yay$0025C4$0025B1n$002bY$0025C4$0025B1l$0025C4$0025B1$0025092010$0025092010$0026ic$003dtrue$0026ps$003d300$0026isd$003dtrue? 2024-11-02T12:13:54Z Elements of Computer Security ent://SD_ILS/0/SD_ILS:168393 2024-11-02T12:13:54Z 2024-11-02T12:13:54Z Yazar&#160;Salomon, David. author.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-0-85729-006-9">http://dx.doi.org/10.1007/978-0-85729-006-9</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Sequrity for computer networks : an introduction to data security in teleprocessing and electronic funds transfer ent://SD_ILS/0/SD_ILS:62188 2024-11-02T12:13:54Z 2024-11-02T12:13:54Z Yazar&#160;Davies, Donald Watts, 1924-&#160;Price, W. L., ort.yaz.<br/>Yer Numaras&#305;&#160;TK 5105 D43 1989<br/>Format:&#160;Kitap<br/>Durum&#160;Beytepe K&uuml;t&uuml;phanesi~1<br/> Computer Network Security 5th International Conference on Mathematical Methods, Models and Architectures for Computer Network Security, MMM-ACNS 2010, St. Petersburg, Russia, September 8-10, 2010. Proceedings ent://SD_ILS/0/SD_ILS:192743 2024-11-02T12:13:54Z 2024-11-02T12:13:54Z Yazar&#160;Kotenko, Igor. editor.&#160;Skormin, Victor. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-3-642-14706-7">http://dx.doi.org/10.1007/978-3-642-14706-7</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Computer Security &ndash; ESORICS 2010 15th European Symposium on Research in Computer Security, Athens, Greece, September 20-22, 2010. Proceedings ent://SD_ILS/0/SD_ILS:192988 2024-11-02T12:13:54Z 2024-11-02T12:13:54Z Yazar&#160;Gritzalis, Dimitris. editor.&#160;Preneel, Bart. editor.&#160;Theoharidou, Marianthi. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-3-642-15497-3">http://dx.doi.org/10.1007/978-3-642-15497-3</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Computer Safety, Reliability, and Security 29th International Conference, SAFECOMP 2010, Vienna, Austria, September 14-17, 2010. Proceedings ent://SD_ILS/0/SD_ILS:193040 2024-11-02T12:13:54Z 2024-11-02T12:13:54Z Yazar&#160;Schoitsch, Erwin. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-3-642-15651-9">http://dx.doi.org/10.1007/978-3-642-15651-9</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Advances in Information and Computer Security 5th International Workshop on Security, IWSEC 2010, Kobe, Japan, November 22-24, 2010. Proceedings ent://SD_ILS/0/SD_ILS:193422 2024-11-02T12:13:54Z 2024-11-02T12:13:54Z Yazar&#160;Echizen, Isao. editor.&#160;Kunihiro, Noboru. editor.&#160;Sasaki, Ryoichi. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-3-642-16825-3">http://dx.doi.org/10.1007/978-3-642-16825-3</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Information security management handbook ent://SD_ILS/0/SD_ILS:290320 2024-11-02T12:13:54Z 2024-11-02T12:13:54Z Yazar&#160;Tipton, Harold F.&#160;Krause, Micki.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://marc.crcnetbase.com/isbn/9781420003406">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Information security management handbook ent://SD_ILS/0/SD_ILS:287123 2024-11-02T12:13:54Z 2024-11-02T12:13:54Z Yazar&#160;Tipton, Harold F.&#160;Nozaki, Micki Krause.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://marc.crcnetbase.com/isbn/9781439893159">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Information security management handbook ent://SD_ILS/0/SD_ILS:289151 2024-11-02T12:13:54Z 2024-11-02T12:13:54Z Yazar&#160;Tipton, Harold F.&#160;Krause, Micki.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://marc.crcnetbase.com/isbn/9780203325438">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Information security management handbook ent://SD_ILS/0/SD_ILS:290763 2024-11-02T12:13:54Z 2024-11-02T12:13:54Z Yazar&#160;Tipton, Harold F.&#160;Nozaki, Micki Krause.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://marc.crcnetbase.com/isbn/9781439853467">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Handbook of financial cryptography and security ent://SD_ILS/0/SD_ILS:287829 2024-11-02T12:13:54Z 2024-11-02T12:13:54Z Yazar&#160;Rosenberg, Burton.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://marc.crcnetbase.com/isbn/9781420059823">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Vulnerability management ent://SD_ILS/0/SD_ILS:287895 2024-11-02T12:13:54Z 2024-11-02T12:13:54Z Yazar&#160;Foreman, Park.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://marc.crcnetbase.com/isbn/9781439801512">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Information security risk analysis ent://SD_ILS/0/SD_ILS:288856 2024-11-02T12:13:54Z 2024-11-02T12:13:54Z Yazar&#160;Peltier, Thomas R.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://marc.crcnetbase.com/isbn/9781439839577">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Secure and resilient software development ent://SD_ILS/0/SD_ILS:290714 2024-11-02T12:13:54Z 2024-11-02T12:13:54Z Yazar&#160;Merkow, Mark S.&#160;Raghavan, Lakshmikanth.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://marc.crcnetbase.com/isbn/9781439826973">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> The basics of hacking and penetration testing ethical hacking and penetration testing made easy ent://SD_ILS/0/SD_ILS:145199 2024-11-02T12:13:54Z 2024-11-02T12:13:54Z Yazar&#160;Engebretson, Pat (Patrick Henry), 1974-<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597496551">http://www.sciencedirect.com/science/book/9781597496551</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Dissecting the hack the forb1dd3n network ent://SD_ILS/0/SD_ILS:146585 2024-11-02T12:13:54Z 2024-11-02T12:13:54Z Yazar&#160;Street, Jayson E.&#160;Street, Jayson E. Dissecting the hack.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495684">http://www.sciencedirect.com/science/book/9781597495684</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Eleventh hour network+ exam N10-004 study guide ent://SD_ILS/0/SD_ILS:146455 2024-11-02T12:13:54Z 2024-11-02T12:13:54Z Yazar&#160;Alpern, Naomi J.&#160;Shimonski, Robert.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597494281">http://www.sciencedirect.com/science/book/9781597494281</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Digital forensics for network, Internet, and cloud computing a forensic evidence guide for moving targets and data ent://SD_ILS/0/SD_ILS:146482 2024-11-02T12:13:54Z 2024-11-02T12:13:54Z Yazar&#160;Lillard, Terrence.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495370">http://www.sciencedirect.com/science/book/9781597495370</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Managed code rootkits hooking into runtime environments ent://SD_ILS/0/SD_ILS:147836 2024-11-02T12:13:54Z 2024-11-02T12:13:54Z Yazar&#160;Metula, Erez.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495745">http://www.sciencedirect.com/science/book/9781597495745</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> System assurance beyond detecting vulnerabilities ent://SD_ILS/0/SD_ILS:148532 2024-11-02T12:13:54Z 2024-11-02T12:13:54Z Yazar&#160;Mansourov, Nikolai.&#160;Campara, Djenana.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780123814142">http://www.sciencedirect.com/science/book/9780123814142</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Seven deadliest Microsoft attacks ent://SD_ILS/0/SD_ILS:149018 2024-11-02T12:13:54Z 2024-11-02T12:13:54Z Yazar&#160;Kraus, Rob.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495516">http://www.sciencedirect.com/science/book/9781597495516</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Seven deadliest wireless technologies attacks ent://SD_ILS/0/SD_ILS:149033 2024-11-02T12:13:54Z 2024-11-02T12:13:54Z Yazar&#160;Haines, Brad.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495417">http://www.sciencedirect.com/science/book/9781597495417</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Seven deadliest web application attacks ent://SD_ILS/0/SD_ILS:149103 2024-11-02T12:13:54Z 2024-11-02T12:13:54Z Yazar&#160;Shema, Mike.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495431">http://www.sciencedirect.com/science/book/9781597495431</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Network Security A Decision and Game-Theoretic Approach ent://SD_ILS/0/SD_ILS:237887 2024-11-02T12:13:54Z 2024-11-02T12:13:54Z Yazar&#160;Alpcan, Tansu.&#160;Ba&#351;ar, Tamer.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1017/CBO9780511760778">Access by subscription</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Cognitive Radio Networking and Security A Game-Theoretic View ent://SD_ILS/0/SD_ILS:238948 2024-11-02T12:13:54Z 2024-11-02T12:13:54Z Yazar&#160;Liu, K. J. Ray.&#160;Wang, Beibei.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1017/CBO9780511778773">Access by subscription</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Virtualization and forensics a digital forensic investigator's guide to virtual environments ent://SD_ILS/0/SD_ILS:146715 2024-11-02T12:13:54Z 2024-11-02T12:13:54Z Yazar&#160;Barrett, Diane.&#160;Kipper, Gregory.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495578">http://www.sciencedirect.com/science/book/9781597495578</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Professional penetration testing creating and operating a formal hacking lab ent://SD_ILS/0/SD_ILS:147348 2024-11-02T12:13:54Z 2024-11-02T12:13:54Z Yazar&#160;Wilhelm, Thomas.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597494250">http://www.sciencedirect.com/science/book/9781597494250</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> A guide to kernel exploitation attacking the core ent://SD_ILS/0/SD_ILS:148059 2024-11-02T12:13:54Z 2024-11-02T12:13:54Z Yazar&#160;Perla, Enrico.&#160;Massimiliano, Oldani.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597494861">http://www.sciencedirect.com/science/book/9781597494861</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> PCI compliance understand and implement effective PCI data security standard compliance. ent://SD_ILS/0/SD_ILS:148342 2024-11-02T12:13:54Z 2024-11-02T12:13:54Z Yazar&#160;Chuvakin, Anton.&#160;Williams, Branden R.&#160;Spangenberg, Ward.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597494991">http://www.sciencedirect.com/science/book/9781597494991</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Seven deadliest USB attacks ent://SD_ILS/0/SD_ILS:148953 2024-11-02T12:13:54Z 2024-11-02T12:13:54Z Yazar&#160;Anderson, Brian (Brian James)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495530">http://www.sciencedirect.com/science/book/9781597495530</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Security for Microsoft Windows System Administrators introduction to key information security concepts ent://SD_ILS/0/SD_ILS:149122 2024-11-02T12:13:54Z 2024-11-02T12:13:54Z Yazar&#160;Rountree, Derrick.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495943">http://www.sciencedirect.com/science/book/9781597495943</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Seven deadliest social network attacks ent://SD_ILS/0/SD_ILS:149145 2024-11-02T12:13:54Z 2024-11-02T12:13:54Z Yazar&#160;Timm, Carl.&#160;Perez, Richard, 1969 Oct. 17-&#160;Ely, Adam.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495455">http://www.sciencedirect.com/science/book/9781597495455</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Seven deadliest network attacks ent://SD_ILS/0/SD_ILS:149185 2024-11-02T12:13:54Z 2024-11-02T12:13:54Z Yazar&#160;Prowell, Stacy J.&#160;Kraus, Rob.&#160;Borkin, Mike.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495493">http://www.sciencedirect.com/science/book/9781597495493</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Dijital kale ent://SD_ILS/0/SD_ILS:126135 2024-11-02T12:13:54Z 2024-11-02T12:13:54Z Yazar&#160;Brown, Dan, 1964-&#160;Soner, Sezer.<br/>Yer Numaras&#305;&#160;PS 3552.R685434 D542 2010<br/>Format:&#160;Kitap<br/>Durum&#160;Beytepe K&uuml;t&uuml;phanesi~1<br/> Seven deadliest USB attacks ent://SD_ILS/0/SD_ILS:306328 2024-11-02T12:13:54Z 2024-11-02T12:13:54Z Yazar&#160;Anderson, Brian (Brian James)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495530">http://www.sciencedirect.com/science/book/9781597495530</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> China's cyberwarfare capability ent://SD_ILS/0/SD_ILS:281481 2024-11-02T12:13:54Z 2024-11-02T12:13:54Z Yazar&#160;Marvel, Elisabette M.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;EBSCOhost <a href="http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=581824">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=581824</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> The executive MBA in information security ent://SD_ILS/0/SD_ILS:286931 2024-11-02T12:13:54Z 2024-11-02T12:13:54Z Yazar&#160;Trinckes, John J.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://marc.crcnetbase.com/isbn/9781439810088">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Managing an information security and privacy awareness and training program ent://SD_ILS/0/SD_ILS:287018 2024-11-02T12:13:54Z 2024-11-02T12:13:54Z Yazar&#160;Herold, Rebecca.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://marc.crcnetbase.com/isbn/9781439815465">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Official (ISC)2 guide to the CISSP CBK ent://SD_ILS/0/SD_ILS:286898 2024-11-02T12:13:54Z 2024-11-02T12:13:54Z Yazar&#160;Tipton, Harold F.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://marc.crcnetbase.com/isbn/9781439809600">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Information security management handbook. Volume 4 ent://SD_ILS/0/SD_ILS:289735 2024-11-02T12:13:54Z 2024-11-02T12:13:54Z Yazar&#160;Tipton, Harold F.&#160;Krause, Micki.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://marc.crcnetbase.com/isbn/9781439819036">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Information technology risk management in enterprise environments a review of industry practices and a practical guide to risk management teams ent://SD_ILS/0/SD_ILS:297862 2024-11-02T12:13:54Z 2024-11-02T12:13:54Z Yazar&#160;Kouns, Jake.&#160;Minoli, Daniel, 1952-&#160;Wiley InterScience (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;John Wiley <a href="http://dx.doi.org/10.1002/9780470558133">http://dx.doi.org/10.1002/9780470558133</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Security 2020 reduce security risks this decade ent://SD_ILS/0/SD_ILS:303839 2024-11-02T12:13:54Z 2024-11-02T12:13:54Z Yazar&#160;Howard, Doug.&#160;Prince, Kevin.&#160;Wiley InterScience (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;Wiley InterScience <a href="http://dx.doi.org/10.1002/9781118255803">An electronic book accessible through the World Wide Web; click for information</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Mac security bible ent://SD_ILS/0/SD_ILS:303881 2024-11-02T12:13:54Z 2024-11-02T12:13:54Z Yazar&#160;Kissell, Joe.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;Wiley InterScience <a href="http://dx.doi.org/10.1002/9781118257739">An electronic book accessible through the World Wide Web; click for information</a> Safari Books Online <a href="http://proquest.safaribooksonline.com/640">http://proquest.safaribooksonline.com/640</a> <a href="http://proquest.safaribooksonline.com/?fpi=9780470474198">http://proquest.safaribooksonline.com/?fpi=9780470474198</a> Safari Books Online <a href="http://proquest.safaribooksonline.com/9780470474198">http://proquest.safaribooksonline.com/9780470474198</a> Books24x7 <a href="http://www.books24x7.com/marc.asp?bookid=40737">http://www.books24x7.com/marc.asp?bookid=40737</a> <a href="http://site.ebrary.com/lib/alltitles/Doc?id=10358774">http://site.ebrary.com/lib/alltitles/Doc?id=10358774</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Risk analysis and security countermeasure selection ent://SD_ILS/0/SD_ILS:288785 2024-11-02T12:13:54Z 2024-11-02T12:13:54Z Yazar&#160;Norman, Thomas L.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://marc.crcnetbase.com/isbn/9781420078718">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Cryptanalysis of RSA and its variants ent://SD_ILS/0/SD_ILS:291418 2024-11-02T12:13:54Z 2024-11-02T12:13:54Z Yazar&#160;Hinek, M. Jason.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://marc.crcnetbase.com/isbn/9781420075199">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Hashing in computer science fifty years of slicing and dicing ent://SD_ILS/0/SD_ILS:298025 2024-11-02T12:13:54Z 2024-11-02T12:13:54Z Yazar&#160;Konheim, Alan G., 1934-<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://proquest.safaribooksonline.com/?fpi=9781118031834">Available by subscription from Safari Books Online</a> John Wiley <a href="http://dx.doi.org/10.1002/9780470630617">http://dx.doi.org/10.1002/9780470630617</a> Contributor biographical information <a href="http://catdir.loc.gov/catdir/enhancements/fy1106/2009052123-b.html">http://catdir.loc.gov/catdir/enhancements/fy1106/2009052123-b.html</a> Volltext <a href="http://proquest.tech.safaribooksonline.de/9781118031834">http://proquest.tech.safaribooksonline.de/9781118031834</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> IT audit, control, and security ent://SD_ILS/0/SD_ILS:304008 2024-11-02T12:13:54Z 2024-11-02T12:13:54Z Yazar&#160;Moeller, Robert R.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;Wiley InterScience <a href="http://dx.doi.org/10.1002/9781118269138">An electronic book accessible through the World Wide Web; click for information</a> Ebook Library <a href="http://public.eblib.com/EBLPublic/PublicView.do?ptiID=624573">http://public.eblib.com/EBLPublic/PublicView.do?ptiID=624573</a> Books24x7 <a href="http://www.books24x7.com/marc.asp?bookid=40717">http://www.books24x7.com/marc.asp?bookid=40717</a> <a href="http://site.ebrary.com/lib/alltitles/Doc?id=10469768">http://site.ebrary.com/lib/alltitles/Doc?id=10469768</a> <a href="http://swb.eblib.com/patron/FullRecord.aspx?p=624573">http://swb.eblib.com/patron/FullRecord.aspx?p=624573</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Safety of computer architectures ent://SD_ILS/0/SD_ILS:304132 2024-11-02T12:13:54Z 2024-11-02T12:13:54Z Yazar&#160;Boulanger, Jean-Louis.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://lib.myilibrary.com?id=450000">Connect to MyiLibrary resource.</a> Wiley <a href="http://onlinelibrary.wiley.com/book/10.1002/9781118600696">http://onlinelibrary.wiley.com/book/10.1002/9781118600696</a> John Wiley <a href="http://dx.doi.org/10.1002/9781118600696">http://dx.doi.org/10.1002/9781118600696</a> ebrary <a href="http://site.ebrary.com/id/10657623">http://site.ebrary.com/id/10657623</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Virtualization and forensics a digital forensic investigator's guide to virtual environments ent://SD_ILS/0/SD_ILS:306330 2024-11-02T12:13:54Z 2024-11-02T12:13:54Z Yazar&#160;Barrett, Diane.&#160;Kipper, Gregory.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495578">http://www.sciencedirect.com/science/book/9781597495578</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/>