Arama Sonu&ccedil;lar&#305; Computer security. - Daralt&#305;lm&#305;&#351;: Security systems. SirsiDynix Enterprise https://katalog.hacettepe.edu.tr/client/tr_TR/default_tr/default_tr/qu$003dComputer$002bsecurity.$0026qf$003dSUBJECT$002509Konu$002509Security$002bsystems.$002509Security$002bsystems.$0026ic$003dtrue$0026ps$003d300?dt=list 2026-03-15T05:37:40Z Cyberspace, Cyberterrorism and the International Security in the Fourth Industrial Revolution Threats, Assessment and Responses ent://SD_ILS/0/SD_ILS:602378 2026-03-15T05:37:40Z 2026-03-15T05:37:40Z Yazar&#160;Montasari, Reza. author.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-3-031-50454-9">https://doi.org/10.1007/978-3-031-50454-9</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Communication Technologies and Security Challenges in IoT Present and Future ent://SD_ILS/0/SD_ILS:603032 2026-03-15T05:37:40Z 2026-03-15T05:37:40Z Yazar&#160;Prasad, Ajay. editor.&#160;Singh, Thipendra P. editor. (orcid)0000-0002-9991-6494&#160;Dwivedi Sharma, Samidha. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-981-97-0052-3">https://doi.org/10.1007/978-981-97-0052-3</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> We have root : even more advice from Schneier on security ent://SD_ILS/0/SD_ILS:595432 2026-03-15T05:37:40Z 2026-03-15T05:37:40Z Yazar&#160;Schneier, Bruce, 1963- author.<br/>Yer Numaras&#305;&#160;QA76.9 .A25 S36 2019<br/>Elektronik Eri&#351;im&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119653554">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119653554</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Proceedings of International Conference on Communication and Networks ComNet 2016 ent://SD_ILS/0/SD_ILS:617248 2026-03-15T05:37:40Z 2026-03-15T05:37:40Z Yazar&#160;Modi, Nilesh. editor.&#160;Verma, Pramode. editor.&#160;Trivedi, Bhushan. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-981-10-2750-5">https://doi.org/10.1007/978-981-10-2750-5</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Strategic Engineering for Cloud Computing and Big Data Analytics ent://SD_ILS/0/SD_ILS:618221 2026-03-15T05:37:40Z 2026-03-15T05:37:40Z Yazar&#160;Hosseinian-Far, Amin. editor.&#160;Ramachandran, Muthu. editor.&#160;Sarwar, Dilshad. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-3-319-52491-7">https://doi.org/10.1007/978-3-319-52491-7</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Cryptography Made Simple ent://SD_ILS/0/SD_ILS:617695 2026-03-15T05:37:40Z 2026-03-15T05:37:40Z Yazar&#160;Smart, Nigel. author.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-3-319-21936-3">https://doi.org/10.1007/978-3-319-21936-3</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Cybercrime, Digital Forensics and Jurisdiction ent://SD_ILS/0/SD_ILS:529976 2026-03-15T05:37:40Z 2026-03-15T05:37:40Z Yazar&#160;Chawki, Mohamed. author.&#160;Darwish, Ashraf. author.&#160;Khan, Mohammad Ayoub. author.&#160;Tyagi, Sapna. author.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-3-319-15150-2">https://doi.org/10.1007/978-3-319-15150-2</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> The complete guide to physical security ent://SD_ILS/0/SD_ILS:545960 2026-03-15T05:37:40Z 2026-03-15T05:37:40Z Yazar&#160;Baker, Paul, 1958, author.&#160;Benny, Daniel J.<br/>Yer Numaras&#305;&#160;HV8290 .B34 2013<br/>Elektronik Eri&#351;im&#160;<a href="https://www.taylorfrancis.com/books/9781420099645">Click here to view.</a><br/>Format:&#160;Kitap<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Windows Registry Forensics Advanced Digital Forensic Analysis of the Windows Registry. ent://SD_ILS/0/SD_ILS:145659 2026-03-15T05:37:40Z 2026-03-15T05:37:40Z Yazar&#160;Carvey, Harlan.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495806">http://www.sciencedirect.com/science/book/9781597495806</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Risk analysis and security countermeasure selection ent://SD_ILS/0/SD_ILS:539402 2026-03-15T05:37:40Z 2026-03-15T05:37:40Z Yazar&#160;Norman, Thomas L., author.<br/>Yer Numaras&#305;&#160;HV8290 .N67 2010<br/>Elektronik Eri&#351;im&#160;<a href="https://www.taylorfrancis.com/books/9781420078718">Click here to view.</a><br/>Format:&#160;Kitap<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/>