Arama Sonu&ccedil;lar&#305; Computer security. - Daralt&#305;lm&#305;&#351;: Computer viruses. SirsiDynix Enterprise https://katalog.hacettepe.edu.tr/client/tr_TR/default_tr/default_tr/qu$003dComputer$002bsecurity.$0026qf$003dSUBJECT$002509Konu$002509Computer$002bviruses.$002509Computer$002bviruses.$0026ic$003dtrue$0026ps$003d300$0026isd$003dtrue?dt=list 2024-11-22T11:13:52Z Automatic defense against zero-day polymorphic worms in communication networks ent://SD_ILS/0/SD_ILS:286307 2024-11-22T11:13:52Z 2024-11-22T11:13:52Z Yazar&#160;Mohammed, Mohssen, 1982-&#160;Pathan, Al-Sakib Khan.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://marc.crcnetbase.com/isbn/9781466557284">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Malware forensics field guide for Windows dystems digital forensics field guides ent://SD_ILS/0/SD_ILS:147898 2024-11-22T11:13:52Z 2024-11-22T11:13:52Z Yazar&#160;Malin, Cameron H.&#160;Casey, Eoghan.&#160;Aquilina, James M.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597494724">http://www.sciencedirect.com/science/book/9781597494724</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Seven deadliest Microsoft attacks ent://SD_ILS/0/SD_ILS:149018 2024-11-22T11:13:52Z 2024-11-22T11:13:52Z Yazar&#160;Kraus, Rob.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495516">http://www.sciencedirect.com/science/book/9781597495516</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> AVIEN malware defense guide for the Enterprise ent://SD_ILS/0/SD_ILS:145183 2024-11-22T11:13:52Z 2024-11-22T11:13:52Z Yazar&#160;Harley, David.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491648">http://www.sciencedirect.com/science/book/9781597491648</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Disruptive security technologies with mobile code and peer-to-peer networks ent://SD_ILS/0/SD_ILS:291305 2024-11-22T11:13:52Z 2024-11-22T11:13:52Z Yazar&#160;Brooks, R. R. (Richard R.)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://marc.crcnetbase.com/isbn/9781420038880">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Buffer overflow attacks detect, exploit, prevent ent://SD_ILS/0/SD_ILS:254023 2024-11-22T11:13:52Z 2024-11-22T11:13:52Z Yazar&#160;Foster, James C.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781932266672">http://www.sciencedirect.com/science/book/9781932266672</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Configuring Symantec AntiVirus corporate edition ent://SD_ILS/0/SD_ILS:254007 2024-11-22T11:13:52Z 2024-11-22T11:13:52Z Yazar&#160;Hunter, Laura E.&#160;Shimonski, Robert.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836814">http://www.sciencedirect.com/science/book/9781931836814</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/>