Arama Sonu&ccedil;lar&#305; Data protection - Daralt&#305;lm&#305;&#351;: System safety. SirsiDynix Enterprise https://katalog.hacettepe.edu.tr/client/tr_TR/default_tr/default_tr/qu$003dData$002bprotection$0026qf$003dSUBJECT$002509Konu$002509System$002bsafety.$002509System$002bsafety.$0026ps$003d300?dt=list 2024-11-28T08:04:42Z Critical Infrastructure Security and Resilience Theories, Methods, Tools and Technologies ent://SD_ILS/0/SD_ILS:484275 2024-11-28T08:04:42Z 2024-11-28T08:04:42Z Yazar&#160;Gritzalis, Dimitris. editor.&#160;Theocharidou, Marianthi. editor. (orcid)0000-0002-8870-1746&#160;Stergiopoulos, George. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-3-030-00024-0">https://doi.org/10.1007/978-3-030-00024-0</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> The Art of War for Computer Security ent://SD_ILS/0/SD_ILS:483808 2024-11-28T08:04:42Z 2024-11-28T08:04:42Z Yazar&#160;Madsen, Tom. author.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-3-030-28569-2">https://doi.org/10.1007/978-3-030-28569-2</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Model-Driven Risk Analysis The CORAS Approach ent://SD_ILS/0/SD_ILS:191958 2024-11-28T08:04:42Z 2024-11-28T08:04:42Z Yazar&#160;Lund, Mass Soldal. author.&#160;Solhaug, Bj&oslash;rnar. author.&#160;St&oslash;len, Ketil. author.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-3-642-12323-8">http://dx.doi.org/10.1007/978-3-642-12323-8</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/>