Arama Sonu&ccedil;lar&#305; Computer viruses. SirsiDynix Enterprise https://katalog.hacettepe.edu.tr/client/tr_TR/default_tr/default_tr/qu$003dComputer$002bviruses.$0026pe$003dd$00253A$0026ic$003dtrue$0026ps$003d300?dt=list 2024-10-19T10:26:13Z Computer Viruses and Malware ent://SD_ILS/0/SD_ILS:166010 2024-10-19T10:26:13Z 2024-10-19T10:26:13Z Yazar&#160;Aycock, John. author.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/0-387-34188-9">http://dx.doi.org/10.1007/0-387-34188-9</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Computer viruses: from theory to applications ent://SD_ILS/0/SD_ILS:176342 2024-10-19T10:26:13Z 2024-10-19T10:26:13Z Yazar&#160;Filiol, Eric. author.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/2-287-28099-5">http://dx.doi.org/10.1007/2-287-28099-5</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Recent Trends in Image Processing and Pattern Recognition 5th International Conference, RTIP2R 2022, Kingsville, TX, USA, December 1-2, 2022, Revised Selected Papers ent://SD_ILS/0/SD_ILS:520263 2024-10-19T10:26:13Z 2024-10-19T10:26:13Z Yazar&#160;Santosh, KC. editor.&#160;Goyal, Ayush. editor.&#160;Aouada, Djamila. editor.&#160;Makkar, Aaisha. editor.&#160;Chiang, Yao-Yi. editor.<br/>Yer Numaras&#305;&#160;XX(520263.1)<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-3-031-23599-3">https://doi.org/10.1007/978-3-031-23599-3</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Viruses in all Dimensions How an Information Code Controls Viruses, Software and Microorganisms ent://SD_ILS/0/SD_ILS:520393 2024-10-19T10:26:13Z 2024-10-19T10:26:13Z Yazar&#160;Ball, Rafael. author.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;XX(520393.1)<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-3-658-38826-3">https://doi.org/10.1007/978-3-658-38826-3</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Automatic defense against zero-day polymorphic worms in communication networks ent://SD_ILS/0/SD_ILS:286307 2024-10-19T10:26:13Z 2024-10-19T10:26:13Z Yazar&#160;Mohammed, Mohssen, 1982-&#160;Pathan, Al-Sakib Khan.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://marc.crcnetbase.com/isbn/9781466557284">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Cybercrime and the law challenges, issues, and outcomes ent://SD_ILS/0/SD_ILS:241821 2024-10-19T10:26:13Z 2024-10-19T10:26:13Z Yazar&#160;Brenner, Susan W., 1947-&#160;Project Muse.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://muse.jhu.edu/books/9781555538002/">Full text available: </a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Malware forensics field guide for Windows dystems digital forensics field guides ent://SD_ILS/0/SD_ILS:147898 2024-10-19T10:26:13Z 2024-10-19T10:26:13Z Yazar&#160;Malin, Cameron H.&#160;Casey, Eoghan.&#160;Aquilina, James M.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597494724">http://www.sciencedirect.com/science/book/9781597494724</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Seven deadliest Microsoft attacks ent://SD_ILS/0/SD_ILS:149018 2024-10-19T10:26:13Z 2024-10-19T10:26:13Z Yazar&#160;Kraus, Rob.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495516">http://www.sciencedirect.com/science/book/9781597495516</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Malware forensics investigating and analyzing malicious code ent://SD_ILS/0/SD_ILS:147914 2024-10-19T10:26:13Z 2024-10-19T10:26:13Z Yazar&#160;Aquilina, James M.&#160;Casey, Eoghan.&#160;Malin, Cameron H.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492683">http://www.sciencedirect.com/science/book/9781597492683</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> AVIEN malware defense guide for the Enterprise ent://SD_ILS/0/SD_ILS:145183 2024-10-19T10:26:13Z 2024-10-19T10:26:13Z Yazar&#160;Harley, David.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491648">http://www.sciencedirect.com/science/book/9781597491648</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Buffer overflow attacks detect, exploit, prevent ent://SD_ILS/0/SD_ILS:254023 2024-10-19T10:26:13Z 2024-10-19T10:26:13Z Yazar&#160;Foster, James C.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781932266672">http://www.sciencedirect.com/science/book/9781932266672</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Golgota'dan canl&#305; yay&#305;n ent://SD_ILS/0/SD_ILS:103672 2024-10-19T10:26:13Z 2024-10-19T10:26:13Z Yazar&#160;Vidal, Gore.&#160;Do&#287;an, Mehmet h., &ccedil;ev.<br/>Yer Numaras&#305;&#160;PS3543.I26 G65 2005<br/>Format:&#160;Kitap<br/>Durum&#160;Beytepe K&uuml;t&uuml;phanesi~2<br/> Disruptive security technologies with mobile code and peer-to-peer networks ent://SD_ILS/0/SD_ILS:291305 2024-10-19T10:26:13Z 2024-10-19T10:26:13Z Yazar&#160;Brooks, R. R. (Richard R.)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://marc.crcnetbase.com/isbn/9781420038880">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Configuring Symantec AntiVirus corporate edition ent://SD_ILS/0/SD_ILS:254007 2024-10-19T10:26:13Z 2024-10-19T10:26:13Z Yazar&#160;Hunter, Laura E.&#160;Shimonski, Robert.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836814">http://www.sciencedirect.com/science/book/9781931836814</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> E-mail virus protection handbook ent://SD_ILS/0/SD_ILS:253965 2024-10-19T10:26:13Z 2024-10-19T10:26:13Z Yazar&#160;Syngress Media, Inc.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781928994237">http://www.sciencedirect.com/science/book/9781928994237</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/>