Arama Sonuçları Electronic data processing. - Daraltılmış: Computer security.SirsiDynix Enterprisehttps://katalog.hacettepe.edu.tr/client/tr_TR/default_tr/default_tr/qu$003dElectronic$002bdata$002bprocessing.$0026qf$003dSUBJECT$002509Konu$002509Computer$002bsecurity.$002509Computer$002bsecurity.$0026ic$003dtrue$0026ps$003d300?dt=list2025-12-05T19:35:18ZCombinatorial Algorithms 28th International Workshop, IWOCA 2017, Newcastle, NSW, Australia, July 17-21, 2017, Revised Selected Papersent://SD_ILS/0/SD_ILS:4007032025-12-05T19:35:18Z2025-12-05T19:35:18ZYazar Brankovic, Ljiljana. editor. (orcid)0000-0002-5056-4627 Ryan, Joe. editor. (orcid)0000-0002-7781-0306 Smyth, William F. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-319-78825-8">https://doi.org/10.1007/978-3-319-78825-8</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>The healthy PC preventive care, home remedies, and green computingent://SD_ILS/0/SD_ILS:2934642025-12-05T19:35:18Z2025-12-05T19:35:18ZYazar Hart-Davis, Guy. Holzman, Carey. Healthy PC.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://mhebooklibrary.com/reader/healthy-pc-preventive-care-home-remedies-green-computing-2nd-edition">Subscription required</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>IT auditing using controls to protect information assetsent://SD_ILS/0/SD_ILS:2932622025-12-05T19:35:18Z2025-12-05T19:35:18ZYazar Davis, Chris (Christopher Michael) Schiller, Mike. Wheeler, Kevin.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://mhebooklibrary.com/reader/auditing-using-controls-to-protect-information-assets-2nd-edition">Subscription required</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>IT audit, control, and securityent://SD_ILS/0/SD_ILS:3040082025-12-05T19:35:18Z2025-12-05T19:35:18ZYazar Moeller, Robert R.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim Wiley InterScience <a href="http://dx.doi.org/10.1002/9781118269138">An electronic book accessible through the World Wide Web; click for information</a>
Ebook Library <a href="http://public.eblib.com/EBLPublic/PublicView.do?ptiID=624573">http://public.eblib.com/EBLPublic/PublicView.do?ptiID=624573</a>
Books24x7 <a href="http://www.books24x7.com/marc.asp?bookid=40717">http://www.books24x7.com/marc.asp?bookid=40717</a>
<a href="http://site.ebrary.com/lib/alltitles/Doc?id=10469768">http://site.ebrary.com/lib/alltitles/Doc?id=10469768</a>
<a href="http://swb.eblib.com/patron/FullRecord.aspx?p=624573">http://swb.eblib.com/patron/FullRecord.aspx?p=624573</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>The CISO handbook : a practical guide to securing your companyent://SD_ILS/0/SD_ILS:5392042025-12-05T19:35:18Z2025-12-05T19:35:18ZYazar Gentile, Michael., author. Collette, Ronald D. August, Thomas D.<br/>Yer Numarası HF5548.37 .G46 2006<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9781420031379">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>A practical guide to security assessmentsent://SD_ILS/0/SD_ILS:5452772025-12-05T19:35:18Z2025-12-05T19:35:18ZYazar Kairab, Sudhanshu., author.<br/>Yer Numarası HF5548.32 .K345 2005<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9781135500313">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>