Arama Sonu&ccedil;lar&#305; Computers -- Access control. SirsiDynix Enterprise https://katalog.hacettepe.edu.tr/client/tr_TR/default_tr/default_tr/qu$003dComputers$002b--$002bAccess$002bcontrol.$0026ic$003dtrue$0026ps$003d300?dt=list 2024-11-22T11:01:51Z Penetration tester's open source toolkit ent://SD_ILS/0/SD_ILS:459114 2024-11-22T11:01:51Z 2024-11-22T11:01:51Z Yazar&#160;Faircloth, Jeremy, author.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128021491">http://www.sciencedirect.com/science/book/9780128021491</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Practical deployment of Cisco Identity Services Engine (ISE) : real-world examples of AAA deployments ent://SD_ILS/0/SD_ILS:458699 2024-11-22T11:01:51Z 2024-11-22T11:01:51Z Yazar&#160;Richter, Andy, author.&#160;Wood, Jeremy, author.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="https://www.sciencedirect.com/science/book/9780128044575">https://www.sciencedirect.com/science/book/9780128044575</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> The state of the art in intrusion prevention and detection ent://SD_ILS/0/SD_ILS:356396 2024-11-22T11:01:51Z 2024-11-22T11:01:51Z Yazar&#160;Pathan, Al-Sakib Khan, editor.<br/>Yer Numaras&#305;&#160;ONLINE(356396.1)<br/>Elektronik Eri&#351;im&#160;<a href="http://marc.crcnetbase.com/isbn/9781482203523">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> The basics of digital privacy simple tools to protect your personal information and your identity online ent://SD_ILS/0/SD_ILS:356123 2024-11-22T11:01:51Z 2024-11-22T11:01:51Z Yazar&#160;Cherry, Denny.&#160;LaRock, Thomas.<br/>Yer Numaras&#305;&#160;ONLINE(356123.1)<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128000113">http://www.sciencedirect.com/science/book/9780128000113</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Instant penetration testing setting up a test lab how-to : set up your own penetration testing lab using practical and precise recipes ent://SD_ILS/0/SD_ILS:313044 2024-11-22T11:01:51Z 2024-11-22T11:01:51Z Yazar&#160;Fadyushin, Vyacheslav.<br/>Yer Numaras&#305;&#160;ONLINE(313044.1)<br/>Elektronik Eri&#351;im&#160;Knovel <a href="http://app.knovel.com/web/toc.v/cid:kpIPTSUTL3">http://app.knovel.com/web/toc.v/cid:kpIPTSUTL3</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Federated identity primer ent://SD_ILS/0/SD_ILS:306461 2024-11-22T11:01:51Z 2024-11-22T11:01:51Z Yazar&#160;Rountree, Derrick.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780124071896">http://www.sciencedirect.com/science/book/9780124071896</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Official (ISC)[superscript 2] guide to the CAP CBK ent://SD_ILS/0/SD_ILS:288056 2024-11-22T11:01:51Z 2024-11-22T11:01:51Z Yazar&#160;Howard, Patrick D.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://marc.crcnetbase.com/isbn/9781439820766">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Access contested security, identity, and resistance in Asian cyberspace information revolution and global politics ent://SD_ILS/0/SD_ILS:247542 2024-11-22T11:01:51Z 2024-11-22T11:01:51Z Yazar&#160;Deibert, Ronald.&#160;Project Muse.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://muse.jhu.edu/books/9780262298919/">Full text available: </a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Penetration tester's open source toolkit ent://SD_ILS/0/SD_ILS:148225 2024-11-22T11:01:51Z 2024-11-22T11:01:51Z Yazar&#160;Faircloth, Jeremy.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597496278">http://www.sciencedirect.com/science/book/9781597496278</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Readings and cases in information security : law and ethics ent://SD_ILS/0/SD_ILS:267743 2024-11-22T11:01:51Z 2024-11-22T11:01:51Z Yazar&#160;Whitman, Michael E.&#160;Mattord, Herbert J.<br/>Yer Numaras&#305;&#160;TK5105.878 W54 2011<br/>Format:&#160;Kitap<br/>Durum&#160;Beytepe K&uuml;t&uuml;phanesi~1<br/> Access control, authentication, and public key infrastructure ent://SD_ILS/0/SD_ILS:271243 2024-11-22T11:01:51Z 2024-11-22T11:01:51Z Yazar&#160;Ballad, Bill.&#160;Ballad, Tricia.&#160;Banks, Erin K.<br/>Yer Numaras&#305;&#160;TK5105.59 B353 2011<br/>Format:&#160;Kitap<br/>Durum&#160;Beytepe K&uuml;t&uuml;phanesi~1<br/> Security information and event management (SIEM) implementation ent://SD_ILS/0/SD_ILS:293279 2024-11-22T11:01:51Z 2024-11-22T11:01:51Z Yazar&#160;Miller, David, 1959 Nov. 5-&#160;Harris, Shon.&#160;Harper, Allen.&#160;VanDyke, Stephen.&#160;Blask, Chris.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://mhebooklibrary.com/reader/security-information-event-management-siem-implementation">Subscription required</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Applied Oracle security developing secure database and middleware environments ent://SD_ILS/0/SD_ILS:293376 2024-11-22T11:01:51Z 2024-11-22T11:01:51Z Yazar&#160;Knox, David (David C.)&#160;Gaetjen, Scott.&#160;Jahangir, Hamza.&#160;Muth, Tyler.&#160;Sack, Patrick.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://mhebooklibrary.com/reader/applied-oracle-security-developing-secure-database-middleware-environments">Subscription required</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Adaptive security management architecture ent://SD_ILS/0/SD_ILS:288451 2024-11-22T11:01:51Z 2024-11-22T11:01:51Z Yazar&#160;Tiller, James S.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://marc.crcnetbase.com/isbn/9781420013375">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Designing an IAM framework with Oracle identity and access management suite ent://SD_ILS/0/SD_ILS:293289 2024-11-22T11:01:51Z 2024-11-22T11:01:51Z Yazar&#160;Scheidel, Jeff.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://mhebooklibrary.com/reader/designing-iam-framework-oracle-identity-access-management-suite">Subscription required</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> 24 deadly sins of software security programming flaws and how to fix them ent://SD_ILS/0/SD_ILS:293319 2024-11-22T11:01:51Z 2024-11-22T11:01:51Z Yazar&#160;Howard, Michael, 1965-&#160;LeBlanc, David, 1960-&#160;Viega, John.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://mhebooklibrary.com/reader/24-deadly-sins-software-security-programming-flaws-how-to-fix-them">Subscription required</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Hacking exposed Linux Linux security secrets and solutions. ent://SD_ILS/0/SD_ILS:293324 2024-11-22T11:01:51Z 2024-11-22T11:01:51Z Yazar&#160;Hatch, Brian. Hacking Linux exposed.&#160;ISECOM (Organization)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://mhebooklibrary.com/reader/hacking-exposed-linux">Subscription required</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Hacking exposed malware &amp; rootkits malware &amp; rootkits security secrets &amp; solutions ent://SD_ILS/0/SD_ILS:293397 2024-11-22T11:01:51Z 2024-11-22T11:01:51Z Yazar&#160;Davis, Michael A.&#160;Bodmer, Sean.&#160;LeMasters, Aaron.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://mhebooklibrary.com/reader/hacking-exposed-malware-rootkits">Subscription required</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Hacking exposed Windows Windows security secrets &amp; solutions ent://SD_ILS/0/SD_ILS:293341 2024-11-22T11:01:51Z 2024-11-22T11:01:51Z Yazar&#160;Scambray, Joel.&#160;McClure, Stuart.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://mhebooklibrary.com/reader/hacking-exposed-windows-microsoft-security-secrets-solutions-third-edition">Subscription required</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> MySQL database usage &amp; administration ent://SD_ILS/0/SD_ILS:293361 2024-11-22T11:01:51Z 2024-11-22T11:01:51Z Yazar&#160;Vaswani, Vikram.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://mhebooklibrary.com/reader/mysql-database-usage-administration">Subscription required</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Managed code rootkits hooking into runtime environments ent://SD_ILS/0/SD_ILS:147836 2024-11-22T11:01:51Z 2024-11-22T11:01:51Z Yazar&#160;Metula, Erez.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495745">http://www.sciencedirect.com/science/book/9781597495745</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Infosecurity 2008 threat analysis ent://SD_ILS/0/SD_ILS:145541 2024-11-22T11:01:51Z 2024-11-22T11:01:51Z Yazar&#160;Clark, Champ, III.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492249">http://www.sciencedirect.com/science/book/9781597492249</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Access denied the practice and policy of global Internet filtering ent://SD_ILS/0/SD_ILS:220020 2024-11-22T11:01:51Z 2024-11-22T11:01:51Z Yazar&#160;Deibert, Ronald.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;IEEE Xplore <a href="http://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=6267246">http://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=6267246</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Oracle identity management governance, risk, and compliance architecture ent://SD_ILS/0/SD_ILS:287794 2024-11-22T11:01:51Z 2024-11-22T11:01:51Z Yazar&#160;Pohlman, Marlin B.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://marc.crcnetbase.com/isbn/9781420072488">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> 802.1X port-based authentication ent://SD_ILS/0/SD_ILS:291322 2024-11-22T11:01:51Z 2024-11-22T11:01:51Z Yazar&#160;Brown, Edwin Lyle.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://marc.crcnetbase.com/isbn/9781420044652">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Integrated security systems design concepts, specifications, and implementation ent://SD_ILS/0/SD_ILS:145552 2024-11-22T11:01:51Z 2024-11-22T11:01:51Z Yazar&#160;Norman, Thomas L.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780750679091">http://www.sciencedirect.com/science/book/9780750679091</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Integrated security systems design concepts, specifications, and implementation ent://SD_ILS/0/SD_ILS:112175 2024-11-22T11:01:51Z 2024-11-22T11:01:51Z Yazar&#160;Norman, Thomas, CSC.&#160;ScienceDirect (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780750679091">An electronic book accessible through the World Wide Web; click for information</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Mechanics of user identification and authentication fundamentals of identity management ent://SD_ILS/0/SD_ILS:286830 2024-11-22T11:01:51Z 2024-11-22T11:01:51Z Yazar&#160;Todorov, Dobromir.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://marc.crcnetbase.com/isbn/9781420052206">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Essential computer security everyone's guide to e-mail, Internet, and wireless security ent://SD_ILS/0/SD_ILS:145840 2024-11-22T11:01:51Z 2024-11-22T11:01:51Z Yazar&#160;Bradley, Tony, 1969-&#160;Carvey, Harlan A.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491143">http://www.sciencedirect.com/science/book/9781597491143</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Perfect passwords selection, protection, authentication ent://SD_ILS/0/SD_ILS:253660 2024-11-22T11:01:51Z 2024-11-22T11:01:51Z Yazar&#160;Burnett, Mark.&#160;Kleiman, Dave.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490412">http://www.sciencedirect.com/science/book/9781597490412</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Penetration tester's open source toolkit ent://SD_ILS/0/SD_ILS:253676 2024-11-22T11:01:51Z 2024-11-22T11:01:51Z Yazar&#160;Long, Johnny.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490214">http://www.sciencedirect.com/science/book/9781597490214</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Intrusion prevention and active response deploying network and host IPS ent://SD_ILS/0/SD_ILS:254017 2024-11-22T11:01:51Z 2024-11-22T11:01:51Z Yazar&#160;Rash, Michael (Michael Brandon)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781932266474">http://www.sciencedirect.com/science/book/9781932266474</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Security assessment case studies for implementing the NSA IAM ent://SD_ILS/0/SD_ILS:254030 2024-11-22T11:01:51Z 2024-11-22T11:01:51Z Yazar&#160;Rogers, Russ.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781932266962">http://www.sciencedirect.com/science/book/9781932266962</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Proceedings of Sixth ACM Symposium on Access Control Models and Technologies : SACMAT 2001 : Litton-TASC, Westfields II Conference Facility, May 3-4, 2001, Chantilly, Virginia, USA ent://SD_ILS/0/SD_ILS:72452 2024-11-22T11:01:51Z 2024-11-22T11:01:51Z Yazar&#160;ACM Symposium on Access Control Models and Technologies (6th : 2001 : Chantilly, V.A.)&#160;Association for Computing Machinery. Special Interest Group on Security, Audit, and Control.<br/>Yer Numaras&#305;&#160;QA 76.9.A25 A292 2001<br/>Format:&#160;Kitap<br/>Durum&#160;Beytepe K&uuml;t&uuml;phanesi~1<br/> Handbook of applied cryptography ent://SD_ILS/0/SD_ILS:287889 2024-11-22T11:01:51Z 2024-11-22T11:01:51Z Yazar&#160;Menezes, A. J. (Alfred J.), 1965-&#160;Van Oorschot, Paul C.&#160;Vanstone, Scott A.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://marc.crcnetbase.com/ISBN/9781439821916">book distributed by CRC Press. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Handbook of applied cryptography ent://SD_ILS/0/SD_ILS:109547 2024-11-22T11:01:51Z 2024-11-22T11:01:51Z Yazar&#160;Menezes, Alfred J.&#160;Van Oorschot, Paul C., ort. yaz.&#160;Vanstone, Scott A., ort. yaz.<br/>Yer Numaras&#305;&#160;QA76.9.A25 M46 1997<br/>Format:&#160;Kitap<br/>Durum&#160;Beytepe K&uuml;t&uuml;phanesi~1<br/>