Arama Sonuçları Computer security. - Daraltılmış: Computer viruses.SirsiDynix Enterprisehttps://katalog.hacettepe.edu.tr/client/tr_TR/default_tr/default_tr/qu$003dComputer$002bsecurity.$0026qf$003dSUBJECT$002509Konu$002509Computer$002bviruses.$002509Computer$002bviruses.$0026ic$003dtrue$0026ps$003d300$0026isd$003dtrue?dt=list2024-11-22T11:13:52ZAutomatic defense against zero-day polymorphic worms in communication networksent://SD_ILS/0/SD_ILS:2863072024-11-22T11:13:52Z2024-11-22T11:13:52ZYazar Mohammed, Mohssen, 1982- Pathan, Al-Sakib Khan.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://marc.crcnetbase.com/isbn/9781466557284">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Malware forensics field guide for Windows dystems digital forensics field guidesent://SD_ILS/0/SD_ILS:1478982024-11-22T11:13:52Z2024-11-22T11:13:52ZYazar Malin, Cameron H. Casey, Eoghan. Aquilina, James M.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597494724">http://www.sciencedirect.com/science/book/9781597494724</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Seven deadliest Microsoft attacksent://SD_ILS/0/SD_ILS:1490182024-11-22T11:13:52Z2024-11-22T11:13:52ZYazar Kraus, Rob.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495516">http://www.sciencedirect.com/science/book/9781597495516</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>AVIEN malware defense guide for the Enterpriseent://SD_ILS/0/SD_ILS:1451832024-11-22T11:13:52Z2024-11-22T11:13:52ZYazar Harley, David.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491648">http://www.sciencedirect.com/science/book/9781597491648</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Disruptive security technologies with mobile code and peer-to-peer networksent://SD_ILS/0/SD_ILS:2913052024-11-22T11:13:52Z2024-11-22T11:13:52ZYazar Brooks, R. R. (Richard R.)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://marc.crcnetbase.com/isbn/9781420038880">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Buffer overflow attacks detect, exploit, preventent://SD_ILS/0/SD_ILS:2540232024-11-22T11:13:52Z2024-11-22T11:13:52ZYazar Foster, James C.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781932266672">http://www.sciencedirect.com/science/book/9781932266672</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Configuring Symantec AntiVirus corporate editionent://SD_ILS/0/SD_ILS:2540072024-11-22T11:13:52Z2024-11-22T11:13:52ZYazar Hunter, Laura E. Shimonski, Robert.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836814">http://www.sciencedirect.com/science/book/9781931836814</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>