Arama Sonuçları Computers -- Access control.SirsiDynix Enterprisehttps://katalog.hacettepe.edu.tr/client/tr_TR/default_tr/default_tr/qu$003dComputers$002b--$002bAccess$002bcontrol.$0026ps$003d300?dt=list2026-01-13T17:05:11ZIntegrated assurance : unified risk strategyent://SD_ILS/0/SD_ILS:5629982026-01-13T17:05:11Z2026-01-13T17:05:11ZYazar Hayes, Patrick author.<br/>Yer Numarası QA76.9 .A25<br/>Elektronik Erişim Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003562153">https://www.taylorfrancis.com/books/9781003562153</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Public Key Cryptosystemsent://SD_ILS/0/SD_ILS:5600552026-01-13T17:05:11Z2026-01-13T17:05:11ZYazar Baş, Esra, author.<br/>Yer Numarası QA76.9 .A25<br/>Elektronik Erişim Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003514190">https://www.taylorfrancis.com/books/9781003514190</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Attribute-Based Encryption and Access Controlent://SD_ILS/0/SD_ILS:5699302026-01-13T17:05:11Z2026-01-13T17:05:11ZYazar Huang, Dijiang. Dong, Qiuxiang. Zhu, Yan (Professor of computer security)<br/>Yer Numarası TK5105.59<br/>Elektronik Erişim Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781351210607">https://www.taylorfrancis.com/books/9781351210607</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Handbook of Applied Cryptographyent://SD_ILS/0/SD_ILS:5464352026-01-13T17:05:11Z2026-01-13T17:05:11ZYazar Menezes, Alfred J., author. Katz, Jonathan, author. van Oorschot, Paul C., author. Vanstone, Scott A., author. Taylor and Francis.<br/>Yer Numarası QA76.9 .A25<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9780429466335">Click here to view</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Penetration tester's open source toolkitent://SD_ILS/0/SD_ILS:4591142026-01-13T17:05:11Z2026-01-13T17:05:11ZYazar Faircloth, Jeremy, author.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128021491">http://www.sciencedirect.com/science/book/9780128021491</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>ORACLE IDENTITY MANAGEMENT : governance, risk, and compliance architecture, third edition.ent://SD_ILS/0/SD_ILS:5448332026-01-13T17:05:11Z2026-01-13T17:05:11ZYazar POHLMAN, MARLIN B.<br/>Yer Numarası QA76.9 .A25<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9780429117688">Taylor & Francis eBooks</a>
Taylor & Francis <a href="https://www.taylorfrancis.com/books/9780429117688">https://www.taylorfrancis.com/books/9780429117688</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Practical deployment of Cisco Identity Services Engine (ISE) : real-world examples of AAA deploymentsent://SD_ILS/0/SD_ILS:4586992026-01-13T17:05:11Z2026-01-13T17:05:11ZYazar Richter, Andy, author. Wood, Jeremy, author.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="https://www.sciencedirect.com/science/book/9780128044575">https://www.sciencedirect.com/science/book/9780128044575</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>The basics of digital privacy simple tools to protect your personal information and your identity onlineent://SD_ILS/0/SD_ILS:3561232026-01-13T17:05:11Z2026-01-13T17:05:11ZYazar Cherry, Denny. LaRock, Thomas.<br/>Yer Numarası ONLINE(356123.1)<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128000113">http://www.sciencedirect.com/science/book/9780128000113</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>The state of the art in intrusion prevention and detectionent://SD_ILS/0/SD_ILS:5436762026-01-13T17:05:11Z2026-01-13T17:05:11ZYazar Pathan, Al-Sakib Khan, editor.<br/>Yer Numarası QA76.9 .A25 S7354 2014<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9781482203523">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>Instant penetration testing setting up a test lab how-to : set up your own penetration testing lab using practical and precise recipesent://SD_ILS/0/SD_ILS:3130442026-01-13T17:05:11Z2026-01-13T17:05:11ZYazar Fadyushin, Vyacheslav.<br/>Yer Numarası ONLINE(313044.1)<br/>Elektronik Erişim Knovel <a href="http://app.knovel.com/web/toc.v/cid:kpIPTSUTL3">http://app.knovel.com/web/toc.v/cid:kpIPTSUTL3</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Official (ISC)[superscript 2] guide to the CAP CBKent://SD_ILS/0/SD_ILS:5407502026-01-13T17:05:11Z2026-01-13T17:05:11ZYazar Howard, Patrick D., author.<br/>Yer Numarası TK5105.59 .H673 2013<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9781439820766">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>Federated identity primerent://SD_ILS/0/SD_ILS:3064612026-01-13T17:05:11Z2026-01-13T17:05:11ZYazar Rountree, Derrick.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780124071896">http://www.sciencedirect.com/science/book/9780124071896</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Access contested security, identity, and resistance in Asian cyberspace information revolution and global politicsent://SD_ILS/0/SD_ILS:2475422026-01-13T17:05:11Z2026-01-13T17:05:11ZYazar Deibert, Ronald. Project Muse.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://muse.jhu.edu/books/9780262298919/">Full text available: </a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Adaptive security management architectureent://SD_ILS/0/SD_ILS:5418522026-01-13T17:05:11Z2026-01-13T17:05:11ZYazar Tiller, James S., author.<br/>Yer Numarası QA76.9 .A25 T55 2011<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9781420013375">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>Penetration tester's open source toolkitent://SD_ILS/0/SD_ILS:1482252026-01-13T17:05:11Z2026-01-13T17:05:11ZYazar Faircloth, Jeremy.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597496278">http://www.sciencedirect.com/science/book/9781597496278</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Access control, authentication, and public key infrastructureent://SD_ILS/0/SD_ILS:2712432026-01-13T17:05:11Z2026-01-13T17:05:11ZYazar Ballad, Bill. Ballad, Tricia. Banks, Erin K.<br/>Yer Numarası TK5105.59 B353 2011<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>Security information and event management (SIEM) implementationent://SD_ILS/0/SD_ILS:2932792026-01-13T17:05:11Z2026-01-13T17:05:11ZYazar Miller, David, 1959 Nov. 5- Harris, Shon. Harper, Allen. VanDyke, Stephen. Blask, Chris.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://mhebooklibrary.com/reader/security-information-event-management-siem-implementation">Subscription required</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Designing an IAM framework with Oracle identity and access management suiteent://SD_ILS/0/SD_ILS:2932892026-01-13T17:05:11Z2026-01-13T17:05:11ZYazar Scheidel, Jeff.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://mhebooklibrary.com/reader/designing-iam-framework-oracle-identity-access-management-suite">Subscription required</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>24 deadly sins of software security programming flaws and how to fix thement://SD_ILS/0/SD_ILS:2933192026-01-13T17:05:11Z2026-01-13T17:05:11ZYazar Howard, Michael, 1965- LeBlanc, David, 1960- Viega, John.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://mhebooklibrary.com/reader/24-deadly-sins-software-security-programming-flaws-how-to-fix-them">Subscription required</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Applied Oracle security developing secure database and middleware environmentsent://SD_ILS/0/SD_ILS:2933762026-01-13T17:05:11Z2026-01-13T17:05:11ZYazar Knox, David (David C.) Gaetjen, Scott. Jahangir, Hamza. Muth, Tyler. Sack, Patrick.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://mhebooklibrary.com/reader/applied-oracle-security-developing-secure-database-middleware-environments">Subscription required</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Hacking exposed malware & rootkits malware & rootkits security secrets & solutionsent://SD_ILS/0/SD_ILS:2933972026-01-13T17:05:11Z2026-01-13T17:05:11ZYazar Davis, Michael A. Bodmer, Sean. LeMasters, Aaron.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://mhebooklibrary.com/reader/hacking-exposed-malware-rootkits">Subscription required</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Hacking exposed Windows Windows security secrets & solutionsent://SD_ILS/0/SD_ILS:2933412026-01-13T17:05:11Z2026-01-13T17:05:11ZYazar Scambray, Joel. McClure, Stuart.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://mhebooklibrary.com/reader/hacking-exposed-windows-microsoft-security-secrets-solutions-third-edition">Subscription required</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>MySQL database usage & administrationent://SD_ILS/0/SD_ILS:2933612026-01-13T17:05:11Z2026-01-13T17:05:11ZYazar Vaswani, Vikram.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://mhebooklibrary.com/reader/mysql-database-usage-administration">Subscription required</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Hacking exposed Linux Linux security secrets and solutions.ent://SD_ILS/0/SD_ILS:2933242026-01-13T17:05:11Z2026-01-13T17:05:11ZYazar Hatch, Brian. Hacking Linux exposed. ISECOM (Organization)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://mhebooklibrary.com/reader/hacking-exposed-linux">Subscription required</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Readings and cases in information security : law and ethicsent://SD_ILS/0/SD_ILS:2677432026-01-13T17:05:11Z2026-01-13T17:05:11ZYazar Whitman, Michael E. Mattord, Herbert J.<br/>Yer Numarası TK5105.878 W54 2011<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>Managed code rootkits hooking into runtime environmentsent://SD_ILS/0/SD_ILS:1478362026-01-13T17:05:11Z2026-01-13T17:05:11ZYazar Metula, Erez.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495745">http://www.sciencedirect.com/science/book/9781597495745</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Access denied the practice and policy of global Internet filteringent://SD_ILS/0/SD_ILS:2200202026-01-13T17:05:11Z2026-01-13T17:05:11ZYazar Deibert, Ronald.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim IEEE Xplore <a href="http://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=6267246">http://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=6267246</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Infosecurity 2008 threat analysisent://SD_ILS/0/SD_ILS:1455412026-01-13T17:05:11Z2026-01-13T17:05:11ZYazar Clark, Champ, III.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492249">http://www.sciencedirect.com/science/book/9781597492249</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Integrated security systems design concepts, specifications, and implementationent://SD_ILS/0/SD_ILS:1121752026-01-13T17:05:11Z2026-01-13T17:05:11ZYazar Norman, Thomas, CSC. ScienceDirect (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780750679091">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Integrated security systems design concepts, specifications, and implementationent://SD_ILS/0/SD_ILS:1455522026-01-13T17:05:11Z2026-01-13T17:05:11ZYazar Norman, Thomas L.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780750679091">http://www.sciencedirect.com/science/book/9780750679091</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Mechanics of user identification and authentication : fundamentals of identity managementent://SD_ILS/0/SD_ILS:5399402026-01-13T17:05:11Z2026-01-13T17:05:11ZYazar Todorov, Dobromir., author.<br/>Yer Numarası TK5105.59 .T575 2007<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9781420052206">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>802.1X port-based authenticationent://SD_ILS/0/SD_ILS:5448302026-01-13T17:05:11Z2026-01-13T17:05:11ZYazar Brown, Edwin Lyle., author.<br/>Yer Numarası TK5105.59 .B765 2007<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9781420044652">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>Essential computer security everyone's guide to e-mail, Internet, and wireless securityent://SD_ILS/0/SD_ILS:1458402026-01-13T17:05:11Z2026-01-13T17:05:11ZYazar Bradley, Tony, 1969- Carvey, Harlan A.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491143">http://www.sciencedirect.com/science/book/9781597491143</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Perfect passwords selection, protection, authenticationent://SD_ILS/0/SD_ILS:2536602026-01-13T17:05:11Z2026-01-13T17:05:11ZYazar Burnett, Mark. Kleiman, Dave.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490412">http://www.sciencedirect.com/science/book/9781597490412</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Penetration tester's open source toolkitent://SD_ILS/0/SD_ILS:2536762026-01-13T17:05:11Z2026-01-13T17:05:11ZYazar Long, Johnny.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490214">http://www.sciencedirect.com/science/book/9781597490214</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Intrusion prevention and active response deploying network and host IPSent://SD_ILS/0/SD_ILS:2540172026-01-13T17:05:11Z2026-01-13T17:05:11ZYazar Rash, Michael (Michael Brandon)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781932266474">http://www.sciencedirect.com/science/book/9781932266474</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Security assessment case studies for implementing the NSA IAMent://SD_ILS/0/SD_ILS:2540302026-01-13T17:05:11Z2026-01-13T17:05:11ZYazar Rogers, Russ.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781932266962">http://www.sciencedirect.com/science/book/9781932266962</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Proceedings of Sixth ACM Symposium on Access Control Models and Technologies : SACMAT 2001 : Litton-TASC, Westfields II Conference Facility, May 3-4, 2001, Chantilly, Virginia, USAent://SD_ILS/0/SD_ILS:724522026-01-13T17:05:11Z2026-01-13T17:05:11ZYazar ACM Symposium on Access Control Models and Technologies (6th : 2001 : Chantilly, V.A.) Association for Computing Machinery. Special Interest Group on Security, Audit, and Control.<br/>Yer Numarası QA 76.9.A25 A292 2001<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>Handbook of applied cryptographyent://SD_ILS/0/SD_ILS:1095472026-01-13T17:05:11Z2026-01-13T17:05:11ZYazar Menezes, Alfred J. Van Oorschot, Paul C., ort. yaz. Vanstone, Scott A., ort. yaz.<br/>Yer Numarası QA76.9.A25 M46 1997<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>