Arama Sonuçları Computer viruses.SirsiDynix Enterprisehttps://katalog.hacettepe.edu.tr/client/tr_TR/default_tr/default_tr/qu$003dComputer$002bviruses.$0026ic$003dtrue$0026ps$003d300?2025-12-10T01:44:41ZComputer Viruses and Malwareent://SD_ILS/0/SD_ILS:1660102025-12-10T01:44:41Z2025-12-10T01:44:41ZYazar Aycock, John. author. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/0-387-34188-9">http://dx.doi.org/10.1007/0-387-34188-9</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Computer viruses: from theory to applicationsent://SD_ILS/0/SD_ILS:1763422025-12-10T01:44:41Z2025-12-10T01:44:41ZYazar Filiol, Eric. author. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/2-287-28099-5">http://dx.doi.org/10.1007/2-287-28099-5</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Recent Trends in Image Processing and Pattern Recognition 5th International Conference, RTIP2R 2022, Kingsville, TX, USA, December 1-2, 2022, Revised Selected Papersent://SD_ILS/0/SD_ILS:5202632025-12-10T01:44:41Z2025-12-10T01:44:41ZYazar Santosh, KC. editor. Goyal, Ayush. editor. Aouada, Djamila. editor. Makkar, Aaisha. editor. Chiang, Yao-Yi. editor.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-031-23599-3">https://doi.org/10.1007/978-3-031-23599-3</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Viruses in all Dimensions How an Information Code Controls Viruses, Software and Microorganismsent://SD_ILS/0/SD_ILS:5203932025-12-10T01:44:41Z2025-12-10T01:44:41ZYazar Ball, Rafael. author. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-658-38826-3">https://doi.org/10.1007/978-3-658-38826-3</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>How i discovered World War II's greatest spy and other stories of intelligence and codeent://SD_ILS/0/SD_ILS:5407342025-12-10T01:44:41Z2025-12-10T01:44:41ZYazar Kahn, David, eauthor. Taylor and Francis.<br/>Yer Numarası D810 .S7<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9781466562042">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>Automatic defense against zero-day polymorphic worms in communication networksent://SD_ILS/0/SD_ILS:5397152025-12-10T01:44:41Z2025-12-10T01:44:41ZYazar Mohammed, Mohssen, 1982, author. Pathan, Al-Sakib Khan.<br/>Yer Numarası QA76.76 .C68 M64 2013<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9781466557284">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>Malware forensics field guide for Windows dystems digital forensics field guidesent://SD_ILS/0/SD_ILS:1478982025-12-10T01:44:41Z2025-12-10T01:44:41ZYazar Malin, Cameron H. Casey, Eoghan. Aquilina, James M.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597494724">http://www.sciencedirect.com/science/book/9781597494724</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Cybercrime and the law challenges, issues, and outcomesent://SD_ILS/0/SD_ILS:2418212025-12-10T01:44:41Z2025-12-10T01:44:41ZYazar Brenner, Susan W., 1947- Project Muse.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://muse.jhu.edu/books/9781555538002/">Full text available: </a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Seven deadliest Microsoft attacksent://SD_ILS/0/SD_ILS:1490182025-12-10T01:44:41Z2025-12-10T01:44:41ZYazar Kraus, Rob.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495516">http://www.sciencedirect.com/science/book/9781597495516</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Malware forensics investigating and analyzing malicious codeent://SD_ILS/0/SD_ILS:1479142025-12-10T01:44:41Z2025-12-10T01:44:41ZYazar Aquilina, James M. Casey, Eoghan. Malin, Cameron H.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492683">http://www.sciencedirect.com/science/book/9781597492683</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>AVIEN malware defense guide for the Enterpriseent://SD_ILS/0/SD_ILS:1451832025-12-10T01:44:41Z2025-12-10T01:44:41ZYazar Harley, David.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491648">http://www.sciencedirect.com/science/book/9781597491648</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Buffer overflow attacks detect, exploit, preventent://SD_ILS/0/SD_ILS:2540232025-12-10T01:44:41Z2025-12-10T01:44:41ZYazar Foster, James C.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781932266672">http://www.sciencedirect.com/science/book/9781932266672</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Golgota'dan canlı yayınent://SD_ILS/0/SD_ILS:1036722025-12-10T01:44:41Z2025-12-10T01:44:41ZYazar Vidal, Gore. Doğan, Mehmet h., çev.<br/>Yer Numarası PS3543.I26 G65 2005<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~2<br/>Disruptive security technologies with mobile code and peer-to-peer networksent://SD_ILS/0/SD_ILS:5456512025-12-10T01:44:41Z2025-12-10T01:44:41ZYazar Brooks, R. R. (Richard R.), author.<br/>Yer Numarası TK5105.525 .B76 2004<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9781420038880">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>Statistical methods in computer securityent://SD_ILS/0/SD_ILS:5469382025-12-10T01:44:41Z2025-12-10T01:44:41ZYazar Chen, William W. S.<br/>Yer Numarası QA76.9 .A25 S737 2005<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9781420030884">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>Configuring Symantec AntiVirus corporate editionent://SD_ILS/0/SD_ILS:2540072025-12-10T01:44:41Z2025-12-10T01:44:41ZYazar Hunter, Laura E. Shimonski, Robert.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836814">http://www.sciencedirect.com/science/book/9781931836814</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Information security management handbookent://SD_ILS/0/SD_ILS:5393272025-12-10T01:44:41Z2025-12-10T01:44:41ZYazar Krause, Micki. Tipton, Harold F.<br/>Yer Numarası QA76.9 .A25 I54165 2003<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9781135492335">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>E-mail virus protection handbookent://SD_ILS/0/SD_ILS:2539652025-12-10T01:44:41Z2025-12-10T01:44:41ZYazar Syngress Media, Inc.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781928994237">http://www.sciencedirect.com/science/book/9781928994237</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Designing a total data solution : technology, implementation and deploymentent://SD_ILS/0/SD_ILS:5393582025-12-10T01:44:41Z2025-12-10T01:44:41ZYazar Breakfield, Charles V. Burkey, Roxanne E.<br/>Yer Numarası QA76.9 .D26 D48 2000<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9780203997512">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>