Arama Sonu&ccedil;lar&#305; Computer viruses. SirsiDynix Enterprise https://katalog.hacettepe.edu.tr/client/tr_TR/default_tr/default_tr/qu$003dComputer$002bviruses.$0026ic$003dtrue$0026ps$003d300? 2025-12-10T01:44:41Z Computer Viruses and Malware ent://SD_ILS/0/SD_ILS:166010 2025-12-10T01:44:41Z 2025-12-10T01:44:41Z Yazar&#160;Aycock, John. author.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/0-387-34188-9">http://dx.doi.org/10.1007/0-387-34188-9</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Computer viruses: from theory to applications ent://SD_ILS/0/SD_ILS:176342 2025-12-10T01:44:41Z 2025-12-10T01:44:41Z Yazar&#160;Filiol, Eric. author.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/2-287-28099-5">http://dx.doi.org/10.1007/2-287-28099-5</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Recent Trends in Image Processing and Pattern Recognition 5th International Conference, RTIP2R 2022, Kingsville, TX, USA, December 1-2, 2022, Revised Selected Papers ent://SD_ILS/0/SD_ILS:520263 2025-12-10T01:44:41Z 2025-12-10T01:44:41Z Yazar&#160;Santosh, KC. editor.&#160;Goyal, Ayush. editor.&#160;Aouada, Djamila. editor.&#160;Makkar, Aaisha. editor.&#160;Chiang, Yao-Yi. editor.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-3-031-23599-3">https://doi.org/10.1007/978-3-031-23599-3</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Viruses in all Dimensions How an Information Code Controls Viruses, Software and Microorganisms ent://SD_ILS/0/SD_ILS:520393 2025-12-10T01:44:41Z 2025-12-10T01:44:41Z Yazar&#160;Ball, Rafael. author.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-3-658-38826-3">https://doi.org/10.1007/978-3-658-38826-3</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> How i discovered World War II's greatest spy and other stories of intelligence and code ent://SD_ILS/0/SD_ILS:540734 2025-12-10T01:44:41Z 2025-12-10T01:44:41Z Yazar&#160;Kahn, David, eauthor.&#160;Taylor and Francis.<br/>Yer Numaras&#305;&#160;D810 .S7<br/>Elektronik Eri&#351;im&#160;<a href="https://www.taylorfrancis.com/books/9781466562042">Click here to view.</a><br/>Format:&#160;Kitap<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Automatic defense against zero-day polymorphic worms in communication networks ent://SD_ILS/0/SD_ILS:539715 2025-12-10T01:44:41Z 2025-12-10T01:44:41Z Yazar&#160;Mohammed, Mohssen, 1982, author.&#160;Pathan, Al-Sakib Khan.<br/>Yer Numaras&#305;&#160;QA76.76 .C68 M64 2013<br/>Elektronik Eri&#351;im&#160;<a href="https://www.taylorfrancis.com/books/9781466557284">Click here to view.</a><br/>Format:&#160;Kitap<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Malware forensics field guide for Windows dystems digital forensics field guides ent://SD_ILS/0/SD_ILS:147898 2025-12-10T01:44:41Z 2025-12-10T01:44:41Z Yazar&#160;Malin, Cameron H.&#160;Casey, Eoghan.&#160;Aquilina, James M.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597494724">http://www.sciencedirect.com/science/book/9781597494724</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Cybercrime and the law challenges, issues, and outcomes ent://SD_ILS/0/SD_ILS:241821 2025-12-10T01:44:41Z 2025-12-10T01:44:41Z Yazar&#160;Brenner, Susan W., 1947-&#160;Project Muse.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://muse.jhu.edu/books/9781555538002/">Full text available: </a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Seven deadliest Microsoft attacks ent://SD_ILS/0/SD_ILS:149018 2025-12-10T01:44:41Z 2025-12-10T01:44:41Z Yazar&#160;Kraus, Rob.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495516">http://www.sciencedirect.com/science/book/9781597495516</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Malware forensics investigating and analyzing malicious code ent://SD_ILS/0/SD_ILS:147914 2025-12-10T01:44:41Z 2025-12-10T01:44:41Z Yazar&#160;Aquilina, James M.&#160;Casey, Eoghan.&#160;Malin, Cameron H.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492683">http://www.sciencedirect.com/science/book/9781597492683</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> AVIEN malware defense guide for the Enterprise ent://SD_ILS/0/SD_ILS:145183 2025-12-10T01:44:41Z 2025-12-10T01:44:41Z Yazar&#160;Harley, David.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491648">http://www.sciencedirect.com/science/book/9781597491648</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Buffer overflow attacks detect, exploit, prevent ent://SD_ILS/0/SD_ILS:254023 2025-12-10T01:44:41Z 2025-12-10T01:44:41Z Yazar&#160;Foster, James C.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781932266672">http://www.sciencedirect.com/science/book/9781932266672</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Golgota'dan canl&#305; yay&#305;n ent://SD_ILS/0/SD_ILS:103672 2025-12-10T01:44:41Z 2025-12-10T01:44:41Z Yazar&#160;Vidal, Gore.&#160;Do&#287;an, Mehmet h., &ccedil;ev.<br/>Yer Numaras&#305;&#160;PS3543.I26 G65 2005<br/>Format:&#160;Kitap<br/>Durum&#160;Beytepe K&uuml;t&uuml;phanesi~2<br/> Disruptive security technologies with mobile code and peer-to-peer networks ent://SD_ILS/0/SD_ILS:545651 2025-12-10T01:44:41Z 2025-12-10T01:44:41Z Yazar&#160;Brooks, R. R. (Richard R.), author.<br/>Yer Numaras&#305;&#160;TK5105.525 .B76 2004<br/>Elektronik Eri&#351;im&#160;<a href="https://www.taylorfrancis.com/books/9781420038880">Click here to view.</a><br/>Format:&#160;Kitap<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Statistical methods in computer security ent://SD_ILS/0/SD_ILS:546938 2025-12-10T01:44:41Z 2025-12-10T01:44:41Z Yazar&#160;Chen, William W. S.<br/>Yer Numaras&#305;&#160;QA76.9 .A25 S737 2005<br/>Elektronik Eri&#351;im&#160;<a href="https://www.taylorfrancis.com/books/9781420030884">Click here to view.</a><br/>Format:&#160;Kitap<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Configuring Symantec AntiVirus corporate edition ent://SD_ILS/0/SD_ILS:254007 2025-12-10T01:44:41Z 2025-12-10T01:44:41Z Yazar&#160;Hunter, Laura E.&#160;Shimonski, Robert.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836814">http://www.sciencedirect.com/science/book/9781931836814</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Information security management handbook ent://SD_ILS/0/SD_ILS:539327 2025-12-10T01:44:41Z 2025-12-10T01:44:41Z Yazar&#160;Krause, Micki.&#160;Tipton, Harold F.<br/>Yer Numaras&#305;&#160;QA76.9 .A25 I54165 2003<br/>Elektronik Eri&#351;im&#160;<a href="https://www.taylorfrancis.com/books/9781135492335">Click here to view.</a><br/>Format:&#160;Kitap<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> E-mail virus protection handbook ent://SD_ILS/0/SD_ILS:253965 2025-12-10T01:44:41Z 2025-12-10T01:44:41Z Yazar&#160;Syngress Media, Inc.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781928994237">http://www.sciencedirect.com/science/book/9781928994237</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Designing a total data solution : technology, implementation and deployment ent://SD_ILS/0/SD_ILS:539358 2025-12-10T01:44:41Z 2025-12-10T01:44:41Z Yazar&#160;Breakfield, Charles V.&#160;Burkey, Roxanne E.<br/>Yer Numaras&#305;&#160;QA76.9 .D26 D48 2000<br/>Elektronik Eri&#351;im&#160;<a href="https://www.taylorfrancis.com/books/9780203997512">Click here to view.</a><br/>Format:&#160;Kitap<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/>