Arama Sonu&ccedil;lar&#305; Electronic. - Daralt&#305;lm&#305;&#351;: Computer security. SirsiDynix Enterprise https://katalog.hacettepe.edu.tr/client/tr_TR/default_tr/default_tr/qu$003dElectronic.$0026qf$003dSUBJECT$002509Konu$002509Computer$002bsecurity.$002509Computer$002bsecurity.$0026ps$003d300$0026isd$003dtrue? 2026-02-20T18:31:16Z Electronic Identity ent://SD_ILS/0/SD_ILS:484375 2026-02-20T18:31:16Z 2026-02-20T18:31:16Z Yazar&#160;de Andrade, Norberto Nuno Gomes. author.&#160;Chen-Wilson, Lisha. author.&#160;Argles, David. author.&#160;Wills, Gary. author.&#160;Schiano di Zenise, Michele. author.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-1-4471-6449-4">https://doi.org/10.1007/978-1-4471-6449-4</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Security frameworks in contemporary electronic government ent://SD_ILS/0/SD_ILS:481820 2026-02-20T18:31:16Z 2026-02-20T18:31:16Z Yazar&#160;Abassi, Ryma, 1980- editor.&#160;Ben Chehida Douss, Aida, 1986- editor.&#160;IGI Global, publisher.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-5984-9">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-5984-9</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> The Huawei and Snowden Questions Can Electronic Equipment from Untrusted Vendors be Verified? Can an Untrusted Vendor Build Trust into Electronic Equipment? ent://SD_ILS/0/SD_ILS:402451 2026-02-20T18:31:16Z 2026-02-20T18:31:16Z Yazar&#160;Lysne, Olav. author.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-3-319-74950-1">https://doi.org/10.1007/978-3-319-74950-1</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> ISSE 2014 Securing Electronic Business Processes Highlights of the Information Security Solutions Europe 2014 Conference ent://SD_ILS/0/SD_ILS:487216 2026-02-20T18:31:16Z 2026-02-20T18:31:16Z Yazar&#160;Reimer, Helmut. editor.&#160;Pohlmann, Norbert. editor.&#160;Schneider, Wolfgang. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-3-658-06708-3">https://doi.org/10.1007/978-3-658-06708-3</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Phishing and countermeasures understanding the increasing problem of electronic identity theft ent://SD_ILS/0/SD_ILS:296875 2026-02-20T18:31:16Z 2026-02-20T18:31:16Z Yazar&#160;Jakobsson, Markus.&#160;Myers, Steven, 1975-<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;Books24x7 <a href="http://www.books24x7.com/marc.asp?bookid=18418">http://www.books24x7.com/marc.asp?bookid=18418</a> John Wiley <a href="http://dx.doi.org/10.1002/0470086106">http://dx.doi.org/10.1002/0470086106</a> MyiLibrary, Table of contents <a href="http://www.myilibrary.com?id=82196&ref=toc">http://www.myilibrary.com?id=82196&ref=toc</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Cyber Investigations of Smart Devices ent://SD_ILS/0/SD_ILS:551443 2026-02-20T18:31:16Z 2026-02-20T18:31:16Z Yazar&#160;Bhardwaj, Akashdeep, 1971-, author.<br/>Yer Numaras&#305;&#160;QA76.9 .A25<br/>Elektronik Eri&#351;im&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003570387">https://www.taylorfrancis.com/books/9781003570387</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> The cybersecurity control playbook : from fundamentals to advanced strategies ent://SD_ILS/0/SD_ILS:599789 2026-02-20T18:31:16Z 2026-02-20T18:31:16Z Yazar&#160;Edwards, Jason (Cybersecurity expert), author.&#160;John Wiley &amp; Sons, publisher.<br/>Yer Numaras&#305;&#160;QA76.9 .A25 E3884 2025<br/>Elektronik Eri&#351;im&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394331888">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394331888</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> The techno-legal dynamics of cyber crimes in Industry 5.0 ent://SD_ILS/0/SD_ILS:599801 2026-02-20T18:31:16Z 2026-02-20T18:31:16Z Yazar&#160;Kaur, Gagandeep, editor&#160;Choudhury, Tanupriya editor&#160;Balamurugan, S. editor<br/>Yer Numaras&#305;&#160;QA76.9 .A25<br/>Elektronik Eri&#351;im&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394242177">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394242177</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Information security and privacy quick reference the essential handbook for every CISO, CSO, and Chief Privacy Officer ent://SD_ILS/0/SD_ILS:599946 2026-02-20T18:31:16Z 2026-02-20T18:31:16Z Yazar&#160;Chapple, Mike, author.&#160;Shelley, Joe.&#160;Stewart, James Michael.<br/>Yer Numaras&#305;&#160;QA76.9 .A25 C43 2025<br/>Elektronik Eri&#351;im&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394353347">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394353347</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Digital twins and cybersecurity : safeguarding the future of connected systems ent://SD_ILS/0/SD_ILS:599615 2026-02-20T18:31:16Z 2026-02-20T18:31:16Z Yazar&#160;Naveen, Palanichamy, author.&#160;Maheswar, R., author.&#160;Ragupathy, U.S., author.<br/>Yer Numaras&#305;&#160;QA76.9 .C65 N38 2025<br/>Elektronik Eri&#351;im&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394272501">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394272501</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Alice and Bob learn secure coding ent://SD_ILS/0/SD_ILS:599664 2026-02-20T18:31:16Z 2026-02-20T18:31:16Z Yazar&#160;Janca, Tanya. author.<br/>Yer Numaras&#305;&#160;QA76.76 .D47<br/>Elektronik Eri&#351;im&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394277179">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394277179</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Quantum computing models for cybersecurity and wireless communications ent://SD_ILS/0/SD_ILS:599707 2026-02-20T18:31:16Z 2026-02-20T18:31:16Z Yazar&#160;Kumar, Budati Anil, edited.&#160;Kumar, Singamaneni Kranthi, edited.&#160;Li, Xingwang (Computer scientist), edited.<br/>Yer Numaras&#305;&#160;QA76.9 .A25 Q36 2025<br/>Elektronik Eri&#351;im&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394271429">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394271429</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Next-generation systems and secure computing ent://SD_ILS/0/SD_ILS:599779 2026-02-20T18:31:16Z 2026-02-20T18:31:16Z Yazar&#160;Barman, Subhabrata, editor.&#160;Koley, Santanu, editor.&#160;Joardar, Subhankar, editor.<br/>Yer Numaras&#305;&#160;QA76.9 .A25 N49 2025<br/>Elektronik Eri&#351;im&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394228522">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394228522</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Protecting and mitigating against cyber threats : deploying artificial intelligence and machine learning ent://SD_ILS/0/SD_ILS:599999 2026-02-20T18:31:16Z 2026-02-20T18:31:16Z Yazar&#160;Mohanty, Sachi Nandan, editor.<br/>Yer Numaras&#305;&#160;QA76.9 .A25 P76 2025<br/>Elektronik Eri&#351;im&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394305216">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394305216</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Cyber defense : best practices for digital safety ent://SD_ILS/0/SD_ILS:600003 2026-02-20T18:31:16Z 2026-02-20T18:31:16Z Yazar&#160;Edwards, Jason, author.<br/>Yer Numaras&#305;&#160;QA76.9 .A25 E39 2025<br/>Elektronik Eri&#351;im&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394337040">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394337040</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Protection of electrical power distribution systems : smart grid, microgrid, AI, and cyber security ent://SD_ILS/0/SD_ILS:600371 2026-02-20T18:31:16Z 2026-02-20T18:31:16Z Yazar&#160;Masood, Tariq, author.&#160;Abdo, Jamil, author.&#160;Iqbal, Atif, author.<br/>Yer Numaras&#305;&#160;TK3001 .M37 2026<br/>Elektronik Eri&#351;im&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394327676">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394327676</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> LEADERSHIP FUNDAMENTALS FOR CYBERSECURITY IN PUBLIC POLICY AND ADMINISTRATION lessons for the global south. ent://SD_ILS/0/SD_ILS:552304 2026-02-20T18:31:16Z 2026-02-20T18:31:16Z Yazar&#160;Johnson, Donavon.<br/>Yer Numaras&#305;&#160;ZA5070<br/>Elektronik Eri&#351;im&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003496250">https://www.taylorfrancis.com/books/9781003496250</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> The DevSecOps playbook : deliver continuous security at speed ent://SD_ILS/0/SD_ILS:598634 2026-02-20T18:31:16Z 2026-02-20T18:31:16Z Yazar&#160;Mack, Sean D., author.<br/>Yer Numaras&#305;&#160;QA76.9 .A25 M33 2024<br/>Elektronik Eri&#351;im&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394189281">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394189281</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Cryptography : algorithms, protocols, and standards for computer security ent://SD_ILS/0/SD_ILS:598914 2026-02-20T18:31:16Z 2026-02-20T18:31:16Z Yazar&#160;Mammeri, Zoubir, author.<br/>Yer Numaras&#305;&#160;QA268 .M34 2024<br/>Elektronik Eri&#351;im&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394207510">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394207510</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> x86 software reverse-engineering, cracking, and counter-measures ent://SD_ILS/0/SD_ILS:598920 2026-02-20T18:31:16Z 2026-02-20T18:31:16Z Yazar&#160;Domas, Stephanie, author.&#160;Domas, Christopher, author.<br/>Yer Numaras&#305;&#160;QA76.9 .A25 D66 2024<br/>Elektronik Eri&#351;im&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394277131">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394277131</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Cyber Operations : A Case Study Approach ent://SD_ILS/0/SD_ILS:599117 2026-02-20T18:31:16Z 2026-02-20T18:31:16Z Yazar&#160;Couretas, Jerry M., 1966- author.<br/>Yer Numaras&#305;&#160;QA76.9 .A25<br/>Elektronik Eri&#351;im&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119712121">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119712121</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Stepping through cybersecurity risk management : a systems thinking approach ent://SD_ILS/0/SD_ILS:599021 2026-02-20T18:31:16Z 2026-02-20T18:31:16Z Yazar&#160;Bayuk, Jennifer L., author.<br/>Yer Numaras&#305;&#160;QA76.9 .A25 B39 2024<br/>Elektronik Eri&#351;im&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394213986">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394213986</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> CYBERSECURITY IN THE TRANSPORTATION INDUSTRY. ent://SD_ILS/0/SD_ILS:599238 2026-02-20T18:31:16Z 2026-02-20T18:31:16Z Yer Numaras&#305;&#160;HE194 .C93 2024<br/>Elektronik Eri&#351;im&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394204472">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394204472</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> The cybersecurity guide to governance, risk, and compliance ent://SD_ILS/0/SD_ILS:598945 2026-02-20T18:31:16Z 2026-02-20T18:31:16Z Yazar&#160;Edwards, Jason (Cybersecurity expert), author.&#160;Weaver, Griffin, author.<br/>Yer Numaras&#305;&#160;HD30.38 .E34 2024<br/>Elektronik Eri&#351;im&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394250226">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394250226</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Effective vulnerability management : managing risk in the vulnerable digital ecosystem ent://SD_ILS/0/SD_ILS:599047 2026-02-20T18:31:16Z 2026-02-20T18:31:16Z Yazar&#160;Hughes, Chris (Christopher Matthew), author.&#160;Robinson, Nikki, author.<br/>Yer Numaras&#305;&#160;QA76.9 .A25 H84 2024<br/>Elektronik Eri&#351;im&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394277155">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394277155</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Realizing the Metaverse : a communications and networking perspective ent://SD_ILS/0/SD_ILS:599057 2026-02-20T18:31:16Z 2026-02-20T18:31:16Z Yazar&#160;Lim, Wei Yang Bryan, editor.&#160;Xiong, Zehui, editor.&#160;Niyato, Dusit, editor.&#160;Zhang, Junshan (Electrical engineer), editor.&#160;Shen, X. (Xuemin), 1958- editor.<br/>Yer Numaras&#305;&#160;TK5105.8864 .R43 2024<br/>Elektronik Eri&#351;im&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394188932">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394188932</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Cyber investigations : a research based textbook for advanced studies ent://SD_ILS/0/SD_ILS:597931 2026-02-20T18:31:16Z 2026-02-20T18:31:16Z Yazar&#160;&Aring;rnes, Andr&eacute;, 1976- editor.<br/>Yer Numaras&#305;&#160;HV8079 .C65 C933 2023<br/>Elektronik Eri&#351;im&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119582021">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119582021</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Quantum computing in cybersecurity ent://SD_ILS/0/SD_ILS:598685 2026-02-20T18:31:16Z 2026-02-20T18:31:16Z Yazar&#160;Rawat, Romil, editor.<br/>Yer Numaras&#305;&#160;QA76.9 .A25 Q83 2023<br/>Elektronik Eri&#351;im&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394167401">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394167401</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Wireless communication in cyber security ent://SD_ILS/0/SD_ILS:598705 2026-02-20T18:31:16Z 2026-02-20T18:31:16Z Yazar&#160;Sountharrajan, S. editor&#160;Maheswar, R. editor&#160;Rathee, Geetanjali, editor&#160;Akila, M. editor<br/>Yer Numaras&#305;&#160;QA76.9 .A25 W57 2023<br/>Elektronik Eri&#351;im&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119910619">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119910619</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Strategies for e-service, e-governance, and cyber security : challenges and solutions for efficiency and sustainability ent://SD_ILS/0/SD_ILS:584675 2026-02-20T18:31:16Z 2026-02-20T18:31:16Z Yazar&#160;Sahoo, Bhaswati, editor.&#160;Behera, Ranbindra Narayana, editor.&#160;Samanta, Sasmita Rani, editor.&#160;Pattnaik, Prasant Kumar, 1969- editor.<br/>Yer Numaras&#305;&#160;HF5548.32<br/>Elektronik Eri&#351;im&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003131175">https://www.taylorfrancis.com/books/9781003131175</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Cyber security and digital forensics ent://SD_ILS/0/SD_ILS:597326 2026-02-20T18:31:16Z 2026-02-20T18:31:16Z Yazar&#160;Ghonge, Mangesh, 1984- editor.<br/>Yer Numaras&#305;&#160;QA76.9 .A25<br/>Elektronik Eri&#351;im&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119795667">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119795667</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Cyber security and network security ent://SD_ILS/0/SD_ILS:597484 2026-02-20T18:31:16Z 2026-02-20T18:31:16Z Yazar&#160;Pramanik, Sabyasachi, editor.&#160;Samanta, Debabrata, 1987- editor.&#160;Vinay, M., editor.&#160;Guha, Abhijit, editor.<br/>Yer Numaras&#305;&#160;QA76.9 .A25<br/>Elektronik Eri&#351;im&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119812555">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119812555</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Executive's guide to cyber risk : securing the future today ent://SD_ILS/0/SD_ILS:597567 2026-02-20T18:31:16Z 2026-02-20T18:31:16Z Yazar&#160;Moyo, Siegfried, author.<br/>Yer Numaras&#305;&#160;HF5548.37 .M68 2022<br/>Elektronik Eri&#351;im&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394320578">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394320578</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> The CISO evolution : business knowledge for cybersecurity executives ent://SD_ILS/0/SD_ILS:597056 2026-02-20T18:31:16Z 2026-02-20T18:31:16Z Yazar&#160;Sharp, Matthew K., author.&#160;Lambros, Kyriakos P., author.<br/>Yer Numaras&#305;&#160;HD30.2 .S5325 2022<br/>Elektronik Eri&#351;im&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119782513">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119782513</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Cybersecurity in smart homes : architectures, solutions and technologies ent://SD_ILS/0/SD_ILS:597626 2026-02-20T18:31:16Z 2026-02-20T18:31:16Z Yazar&#160;Khatoun, Rida, author.<br/>Yer Numaras&#305;&#160;QA76.9 .A25<br/>Elektronik Eri&#351;im&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119987451">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119987451</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Blockchain security from the bottom up : securing and preventing attacks on cryptocurrencies, decentralized applications, nfts, and smart contracts ent://SD_ILS/0/SD_ILS:597703 2026-02-20T18:31:16Z 2026-02-20T18:31:16Z Yazar&#160;Poston, Howard E., III, author.<br/>Yer Numaras&#305;&#160;QA76.9 .B56 P67 2022<br/>Elektronik Eri&#351;im&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394320691">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394320691</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Computer science security : concepts and tools ent://SD_ILS/0/SD_ILS:597739 2026-02-20T18:31:16Z 2026-02-20T18:31:16Z Yazar&#160;Zaidoun, Ameur Salem, author.<br/>Yer Numaras&#305;&#160;QA76.9 .A25 Z35 2022<br/>Elektronik Eri&#351;im&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394163847">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394163847</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Trust-based communication systems for internet of things applications ent://SD_ILS/0/SD_ILS:597744 2026-02-20T18:31:16Z 2026-02-20T18:31:16Z Yazar&#160;Madaan, Vishu, editor.&#160;Agrawal, Prateek, editor.&#160;Sharma, Anand, editor.&#160;Sharma, Dilip Kumar, editor.&#160;Agrawal, Akshat, 1986- editor.<br/>Yer Numaras&#305;&#160;TK5105.8857<br/>Elektronik Eri&#351;im&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119896746">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119896746</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> VMware&reg; Certified Professional Data Center Virtualization on vSphere 6.7 Exam 2V0-21.19 : study guide ent://SD_ILS/0/SD_ILS:596289 2026-02-20T18:31:16Z 2026-02-20T18:31:16Z Yazar&#160;Hall, Jon, 1963- author.&#160;Andrews, Joshua, author.<br/>Yer Numaras&#305;&#160;QA76.9 .V5<br/>Elektronik Eri&#351;im&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119539698">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119539698</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Security issues and privacy concerns in Industry 4.0 applications ent://SD_ILS/0/SD_ILS:596945 2026-02-20T18:31:16Z 2026-02-20T18:31:16Z Yazar&#160;David, Shiblin, author.&#160;Anand, R. S., author.&#160;Jeyakrishnan, V., author.&#160;Niranjanamurthy, M., author.<br/>Yer Numaras&#305;&#160;QA76.9 .A25 D38 2021<br/>Elektronik Eri&#351;im&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119776529">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119776529</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Artificial intelligence and data mining approaches in security frameworks ent://SD_ILS/0/SD_ILS:596957 2026-02-20T18:31:16Z 2026-02-20T18:31:16Z Yazar&#160;Bhargava, Neeraj.&#160;Bhargava, Ritu.&#160;Rathore, Pramod Singh, 1988-&#160;Agrawal, Rashmi, 1978-<br/>Yer Numaras&#305;&#160;Q335<br/>Elektronik Eri&#351;im&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119760429">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119760429</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Privacy, regulations, and cybersecurity : the essential business guide ent://SD_ILS/0/SD_ILS:596472 2026-02-20T18:31:16Z 2026-02-20T18:31:16Z Yazar&#160;Moschovitis, Christos J. P., author.<br/>Yer Numaras&#305;&#160;HD61.5 .M675 2021 EB<br/>Elektronik Eri&#351;im&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119660156">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119660156</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Cyber arms : security in cyberspace ent://SD_ILS/0/SD_ILS:579643 2026-02-20T18:31:16Z 2026-02-20T18:31:16Z Yazar&#160;Abaimov, Stanislav, 1989- author.&#160;Martellini, M. (Maurizio), author.<br/>Yer Numaras&#305;&#160;TK5105.59<br/>Elektronik Eri&#351;im&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9780367853860">https://www.taylorfrancis.com/books/9780367853860</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Blockchain technology and applications ent://SD_ILS/0/SD_ILS:556030 2026-02-20T18:31:16Z 2026-02-20T18:31:16Z Yazar&#160;Banafa, Ahmed, author.<br/>Yer Numaras&#305;&#160;QA76.9 .B56 B36 2020<br/>Elektronik Eri&#351;im&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003337393">https://www.taylorfrancis.com/books/9781003337393</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Cybersecurity and decision makers : data security and digital trust ent://SD_ILS/0/SD_ILS:595943 2026-02-20T18:31:16Z 2026-02-20T18:31:16Z Yazar&#160;Fr&eacute;minville, Marie de, author.<br/>Yer Numaras&#305;&#160;HF5548.37 .F74 2020<br/>Elektronik Eri&#351;im&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119720362">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119720362</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Tribe of hackers blue team : tribal knowledge from the best in defensive cybersecurity ent://SD_ILS/0/SD_ILS:596276 2026-02-20T18:31:16Z 2026-02-20T18:31:16Z Yazar&#160;Carey, Marcus J. (Cybersecurity professional)&#160;Jin, Jennifer.<br/>Yer Numaras&#305;&#160;QA76.9 .A25 C3673 2020<br/>Elektronik Eri&#351;im&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119643432">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119643432</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Applied incident response ent://SD_ILS/0/SD_ILS:595744 2026-02-20T18:31:16Z 2026-02-20T18:31:16Z Yazar&#160;Anson, Steve.<br/>Yer Numaras&#305;&#160;QA76.9 .A25<br/>Elektronik Eri&#351;im&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119560302">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119560302</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Tribe of hackers security leaders : tribal knowledge from the best in cybersecurity leadership ent://SD_ILS/0/SD_ILS:595887 2026-02-20T18:31:16Z 2026-02-20T18:31:16Z Yazar&#160;Carey, Marcus J. (Cybersecurity professional), author.&#160;Jin, Jennifer.<br/>Yer Numaras&#305;&#160;QA76.9 .A25 C37 2020<br/>Elektronik Eri&#351;im&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119643784">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119643784</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Hands on hacking ent://SD_ILS/0/SD_ILS:596316 2026-02-20T18:31:16Z 2026-02-20T18:31:16Z Yazar&#160;Hickey, Matthew (Computer security expert), author.&#160;Arcuri, Jennifer, author.<br/>Yer Numaras&#305;&#160;QA76.9 .A25 H53 2020 EB<br/>Elektronik Eri&#351;im&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119561507">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119561507</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Security engineering : a guide to building dependable distributed systems ent://SD_ILS/0/SD_ILS:596480 2026-02-20T18:31:16Z 2026-02-20T18:31:16Z Yazar&#160;Anderson, Ross. http://viaf.org/viaf/sourceID/LC%7cnb2004300232<br/>Yer Numaras&#305;&#160;QA76.9 .A25<br/>Elektronik Eri&#351;im&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119644682">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119644682</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Cyber-vigilance and digital trust : cyber security in the era of cloud computing and IoT ent://SD_ILS/0/SD_ILS:595279 2026-02-20T18:31:16Z 2026-02-20T18:31:16Z Yazar&#160;Tounsi, Wiem, editor.<br/>Yer Numaras&#305;&#160;QA76.9 .A25 C93 2019 EB<br/>Elektronik Eri&#351;im&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119618393">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119618393</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Tribe of hackers red team : tribal knowledge from the best in offensive cybersecurity ent://SD_ILS/0/SD_ILS:595415 2026-02-20T18:31:16Z 2026-02-20T18:31:16Z Yazar&#160;Carey, Marcus J. (Cybersecurity professional), author.&#160;Jin, Jennifer, author.<br/>Yer Numaras&#305;&#160;QA76.9 .A25 C368 2019<br/>Elektronik Eri&#351;im&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119643357">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119643357</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Tribe of hackers : cybersecurity advice from the best hackers in the world ent://SD_ILS/0/SD_ILS:595418 2026-02-20T18:31:16Z 2026-02-20T18:31:16Z Yazar&#160;Carey, Marcus J. (Cybersecurity professional), author.&#160;Jin, Jennifer, author.<br/>Yer Numaras&#305;&#160;QA76.9 .A25 C37 2019 EB<br/>Elektronik Eri&#351;im&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119643395">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119643395</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> VLSI Design and Test for Systems Dependability ent://SD_ILS/0/SD_ILS:483711 2026-02-20T18:31:16Z 2026-02-20T18:31:16Z Yazar&#160;Asai, Shojiro. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-4-431-56594-9">https://doi.org/10.1007/978-4-431-56594-9</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Graphical Models for Security 5th International Workshop, GraMSec 2018, Oxford, UK, July 8, 2018, Revised Selected Papers ent://SD_ILS/0/SD_ILS:485944 2026-02-20T18:31:16Z 2026-02-20T18:31:16Z Yazar&#160;Cybenko, George. editor. (orcid)0000-0001-7734-2912&#160;Pym, David. editor. (orcid)0000-0002-6504-5838&#160;Fila, Barbara. editor. (orcid)0000-0002-1824-7621&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-3-030-15465-3">https://doi.org/10.1007/978-3-030-15465-3</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Geographical Information Systems Theory, Applications and Management 4th International Conference, GISTAM 2018, Funchal, Madeira, Portugal, March 17&ndash;19, 2018, Revised Selected Papers ent://SD_ILS/0/SD_ILS:486645 2026-02-20T18:31:16Z 2026-02-20T18:31:16Z Yazar&#160;Ragia, Lemonia. editor.&#160;Grueau, C&eacute;dric. editor.&#160;Laurini, Robert. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-3-030-29948-4">https://doi.org/10.1007/978-3-030-29948-4</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> The Ecosystem of e-Business: Technologies, Stakeholders, and Connections 17th Workshop on e-Business, WeB 2018, Santa Clara, CA, USA, December 12, 2018, Revised Selected Papers ent://SD_ILS/0/SD_ILS:485089 2026-02-20T18:31:16Z 2026-02-20T18:31:16Z Yazar&#160;Xu, Jennifer J. editor. (orcid)0000-0001-5615-9967&#160;Zhu, Bin. editor.&#160;Liu, Xiao. editor.&#160;Shaw, Michael J. editor.&#160;Zhang, Han. editor. (orcid)0000-0002-6258-2486<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-3-030-22784-5">https://doi.org/10.1007/978-3-030-22784-5</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Fully Homomorphic Encryption in Real World Applications ent://SD_ILS/0/SD_ILS:484546 2026-02-20T18:31:16Z 2026-02-20T18:31:16Z Yazar&#160;Chatterjee, Ayantika. author.&#160;Aung, Khin Mi Mi. author.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-981-13-6393-1">https://doi.org/10.1007/978-981-13-6393-1</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Cyber security in parallel and distributed computing : concepts, techniques, applications and case studies ent://SD_ILS/0/SD_ILS:595099 2026-02-20T18:31:16Z 2026-02-20T18:31:16Z Yazar&#160;Le, Dac-Nhuong, 1983- editor.&#160;Kumar, Raghvendra, 1987- editor.&#160;Mishra, Brojo Kishore, 1979- editor.&#160;Khari, Manju, editor.&#160;Chatterjee, Jyotir Moy, editor.<br/>Yer Numaras&#305;&#160;QA76.9 .A25<br/>Elektronik Eri&#351;im&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119488330">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119488330</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Transformational security awareness : what neuroscientists, storytellers, and marketers can teach us about driving secure behaviors ent://SD_ILS/0/SD_ILS:595304 2026-02-20T18:31:16Z 2026-02-20T18:31:16Z Yazar&#160;Carpenter, Perry, author.<br/>Yer Numaras&#305;&#160;QA76.9 .A25 C37 2019 EB<br/>Elektronik Eri&#351;im&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119566380">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119566380</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> We have root : even more advice from Schneier on security ent://SD_ILS/0/SD_ILS:595432 2026-02-20T18:31:16Z 2026-02-20T18:31:16Z Yazar&#160;Schneier, Bruce, 1963- author.<br/>Yer Numaras&#305;&#160;QA76.9 .A25 S36 2019<br/>Elektronik Eri&#351;im&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119653554">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119653554</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> The Digital Big Bang : the Hard Stuff, the Soft Stuff, and the Future of Cybersecurity ent://SD_ILS/0/SD_ILS:595435 2026-02-20T18:31:16Z 2026-02-20T18:31:16Z Yazar&#160;Quade, Phil.<br/>Yer Numaras&#305;&#160;QA76.9 .A25<br/>Elektronik Eri&#351;im&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119617396">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119617396</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Cybersecurity blue team toolkit ent://SD_ILS/0/SD_ILS:595209 2026-02-20T18:31:16Z 2026-02-20T18:31:16Z Yazar&#160;Tanner, Nadean H., author.<br/>Yer Numaras&#305;&#160;QA76.9 .A25 T36 2019 EB<br/>Elektronik Eri&#351;im&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119552963">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119552963</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Digital forensics ent://SD_ILS/0/SD_ILS:593346 2026-02-20T18:31:16Z 2026-02-20T18:31:16Z Yazar&#160;&Aring;rnes, Andr&eacute;, 1976- editor.<br/>Yer Numaras&#305;&#160;HV8079 .C65<br/>Elektronik Eri&#351;im&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119262442">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119262442</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Windows security monitoring : scenarios and patterns ent://SD_ILS/0/SD_ILS:594404 2026-02-20T18:31:16Z 2026-02-20T18:31:16Z Yazar&#160;Miroshnikov, Andrei, author.<br/>Yer Numaras&#305;&#160;QA76.9 .A25<br/>Elektronik Eri&#351;im&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119390909">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119390909</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> An introduction to cyber modeling and simulation ent://SD_ILS/0/SD_ILS:594699 2026-02-20T18:31:16Z 2026-02-20T18:31:16Z Yazar&#160;Couretas, Jerry M., 1966- author.<br/>Yer Numaras&#305;&#160;QA76.9 .C65<br/>Elektronik Eri&#351;im&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119420842">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119420842</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Combinatorial Algorithms 28th International Workshop, IWOCA 2017, Newcastle, NSW, Australia, July 17-21, 2017, Revised Selected Papers ent://SD_ILS/0/SD_ILS:400703 2026-02-20T18:31:16Z 2026-02-20T18:31:16Z Yazar&#160;Brankovic, Ljiljana. editor. (orcid)0000-0002-5056-4627&#160;Ryan, Joe. editor. (orcid)0000-0002-7781-0306&#160;Smyth, William F. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-3-319-78825-8">https://doi.org/10.1007/978-3-319-78825-8</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Wireshark for security professionals : using Wireshark and the Metasploit Framework ent://SD_ILS/0/SD_ILS:593472 2026-02-20T18:31:16Z 2026-02-20T18:31:16Z Yazar&#160;Bullock, Jessey, author.&#160;Gordon, Adam, author.<br/>Yer Numaras&#305;&#160;QA76.9 .A25<br/>Elektronik Eri&#351;im&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119183457">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119183457</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Hacking the hacker : learn from the experts who take down hackers ent://SD_ILS/0/SD_ILS:593636 2026-02-20T18:31:16Z 2026-02-20T18:31:16Z Yazar&#160;Grimes, Roger A., author.<br/>Yer Numaras&#305;&#160;QA76.9 .A25<br/>Elektronik Eri&#351;im&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119396260">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119396260</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> DNS security management ent://SD_ILS/0/SD_ILS:593802 2026-02-20T18:31:16Z 2026-02-20T18:31:16Z Yazar&#160;Dooley, Michael, 1962- author.&#160;Rooney, Timothy, 1962- author.<br/>Yer Numaras&#305;&#160;QA76.9 .A25<br/>Elektronik Eri&#351;im&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119328292">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119328292</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Cloud management and security ent://SD_ILS/0/SD_ILS:341816 2026-02-20T18:31:16Z 2026-02-20T18:31:16Z Yazar&#160;Abbadi, Imad M., author.<br/>Yer Numaras&#305;&#160;ONLINE(341816.1)<br/>Elektronik Eri&#351;im&#160;ebrary <a href="http://alltitles.ebrary.com/Doc?id=10881234">An electronic book accessible through the World Wide Web; click to view</a> <a href="http://www.lib.uts.edu.au/sso/goto.php?url=http://www.UTS.eblib.com.AU/EBLWeb/patron/?target=patron&extendedid=P_1701403_0">Electronic version</a> Cover image <a href="http://catalogimages.wiley.com/images/db/jimages/9781118817094.jpg">http://catalogimages.wiley.com/images/db/jimages/9781118817094.jpg</a> John Wiley <a href="http://dx.doi.org/10.1002/9781118817087">http://dx.doi.org/10.1002/9781118817087</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Cyber threat! : how to manage the growing risk of cyber attacks ent://SD_ILS/0/SD_ILS:342020 2026-02-20T18:31:16Z 2026-02-20T18:31:16Z Yazar&#160;Ulsch, N. MacDonnell, 1951-<br/>Yer Numaras&#305;&#160;ONLINE(342020.1)<br/>Elektronik Eri&#351;im&#160;ebrary <a href="http://alltitles.ebrary.com/Doc?id=10895757">An electronic book accessible through the World Wide Web; click to view</a> Ebook Library <a href="http://public.eblib.com/choice/publicfullrecord.aspx?p=1742833">http://public.eblib.com/choice/publicfullrecord.aspx?p=1742833</a> John Wiley <a href="http://dx.doi.org/10.1002/9781118915028">http://dx.doi.org/10.1002/9781118915028</a> MyiLibrary <a href="http://www.myilibrary.com?id=629214">http://www.myilibrary.com?id=629214</a> Cover <a href="http://swbplus.bsz-bw.de/bsz410564842cov.htm">http://swbplus.bsz-bw.de/bsz410564842cov.htm</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Windows 8 kickstart ent://SD_ILS/0/SD_ILS:293408 2026-02-20T18:31:16Z 2026-02-20T18:31:16Z Yazar&#160;Russell, James Howard.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://mhebooklibrary.com/reader/windows-8-kickstart">Subscription required</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Technocrime, policing and surveillance ent://SD_ILS/0/SD_ILS:260674 2026-02-20T18:31:16Z 2026-02-20T18:31:16Z Yazar&#160;Leman-Langlois, St&eacute;phane, 1965-<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://www.tandfebooks.com/isbn/9780203105245">Click here to view</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Federated identity primer ent://SD_ILS/0/SD_ILS:306461 2026-02-20T18:31:16Z 2026-02-20T18:31:16Z Yazar&#160;Rountree, Derrick.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780124071896">http://www.sciencedirect.com/science/book/9780124071896</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Reliability and availability of cloud computing ent://SD_ILS/0/SD_ILS:249383 2026-02-20T18:31:16Z 2026-02-20T18:31:16Z Yazar&#160;Bauer, Eric.&#160;Adams, Randee.&#160;Wiley InterScience (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;IEEE Xplore <a href="http://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=6266788">http://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=6266788</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Windows 7 SP1 ent://SD_ILS/0/SD_ILS:293421 2026-02-20T18:31:16Z 2026-02-20T18:31:16Z Yazar&#160;Matthews, Martin S.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://mhebooklibrary.com/reader/windows-7-sp1-quicksteps">Subscription required</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Windows 7 for seniors ent://SD_ILS/0/SD_ILS:293424 2026-02-20T18:31:16Z 2026-02-20T18:31:16Z Yazar&#160;Matthews, Martin S.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://mhebooklibrary.com/reader/windows-7-for-seniors-quicksteps">Subscription required</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> The healthy PC preventive care, home remedies, and green computing ent://SD_ILS/0/SD_ILS:293464 2026-02-20T18:31:16Z 2026-02-20T18:31:16Z Yazar&#160;Hart-Davis, Guy.&#160;Holzman, Carey. Healthy PC.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://mhebooklibrary.com/reader/healthy-pc-preventive-care-home-remedies-green-computing-2nd-edition">Subscription required</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Windows 7 ent://SD_ILS/0/SD_ILS:293477 2026-02-20T18:31:16Z 2026-02-20T18:31:16Z Yazar&#160;Matthews, Martin S.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://mhebooklibrary.com/reader/windows-7-quicksteps">Subscription required</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Machine learning forensics for law enforcement, security, and intelligence ent://SD_ILS/0/SD_ILS:544765 2026-02-20T18:31:16Z 2026-02-20T18:31:16Z Yazar&#160;Mena, Jesus., author.<br/>Yer Numaras&#305;&#160;HV8073 .M395 2011<br/>Elektronik Eri&#351;im&#160;<a href="https://www.taylorfrancis.com/books/9781439860700">Click here to view.</a><br/>Format:&#160;Kitap<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Managing risk in information systems ent://SD_ILS/0/SD_ILS:271251 2026-02-20T18:31:16Z 2026-02-20T18:31:16Z Yazar&#160;Gibson, Darril.<br/>Yer Numaras&#305;&#160;QA76.9.A25 G5 2011<br/>Format:&#160;Kitap<br/>Durum&#160;Beytepe K&uuml;t&uuml;phanesi~1<br/> Engineering information security the application of systems engineering concepts to achieve information assurance ent://SD_ILS/0/SD_ILS:249916 2026-02-20T18:31:16Z 2026-02-20T18:31:16Z Yazar&#160;Jacobs, Stuart.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;IEEE Xplore <a href="http://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=6047604">http://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=6047604</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Security 2020 reduce security risks this decade ent://SD_ILS/0/SD_ILS:318966 2026-02-20T18:31:16Z 2026-02-20T18:31:16Z Yazar&#160;Howard, Doug.&#160;Prince, Kevin.<br/>Yer Numaras&#305;&#160;ONLINE(318966.1)<br/>Elektronik Eri&#351;im&#160;Wiley InterScience <a href="http://dx.doi.org/10.1002/9781118255803">An electronic book accessible through the World Wide Web; click for information</a> Books24x7 <a href="http://www.books24x7.com/marc.asp?bookid=40805">http://www.books24x7.com/marc.asp?bookid=40805</a> Ebook Library <a href="http://public.eblib.com/choice/publicfullrecord.aspx?p=694289">http://public.eblib.com/choice/publicfullrecord.aspx?p=694289</a> ebrary <a href="http://site.ebrary.com/id/10469690">http://site.ebrary.com/id/10469690</a> MyiLibrary <a href="http://www.myilibrary.com?id=294413">http://www.myilibrary.com?id=294413</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Information security principles and practice ent://SD_ILS/0/SD_ILS:298878 2026-02-20T18:31:16Z 2026-02-20T18:31:16Z Yazar&#160;Stamp, Mark.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;Wiley InterScience <a href="http://dx.doi.org/10.1002/9781118027974">An electronic book accessible through the World Wide Web; click for information</a> Ebook Library <a href="http://public.eblib.com/EBLPublic/PublicView.do?ptiID=738753">http://public.eblib.com/EBLPublic/PublicView.do?ptiID=738753</a> <a href="http://site.ebrary.com/lib/alltitles/Doc?id=10478419">http://site.ebrary.com/lib/alltitles/Doc?id=10478419</a> <a href="http://swb.eblib.com/patron/FullRecord.aspx?p=738753">http://swb.eblib.com/patron/FullRecord.aspx?p=738753</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> IT auditing using controls to protect information assets ent://SD_ILS/0/SD_ILS:293262 2026-02-20T18:31:16Z 2026-02-20T18:31:16Z Yazar&#160;Davis, Chris (Christopher Michael)&#160;Schiller, Mike.&#160;Wheeler, Kevin.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://mhebooklibrary.com/reader/auditing-using-controls-to-protect-information-assets-2nd-edition">Subscription required</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> The basics of information security understanding the fundamentals of InfoSec in theory and practice ent://SD_ILS/0/SD_ILS:145371 2026-02-20T18:31:16Z 2026-02-20T18:31:16Z Yazar&#160;Andress, Jason.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597496537">http://www.sciencedirect.com/science/book/9781597496537</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Hashing in computer science fifty years of slicing and dicing ent://SD_ILS/0/SD_ILS:298025 2026-02-20T18:31:16Z 2026-02-20T18:31:16Z Yazar&#160;Konheim, Alan G., 1934-<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://proquest.safaribooksonline.com/?fpi=9781118031834">Available by subscription from Safari Books Online</a> John Wiley <a href="http://dx.doi.org/10.1002/9780470630617">http://dx.doi.org/10.1002/9780470630617</a> Contributor biographical information <a href="http://catdir.loc.gov/catdir/enhancements/fy1106/2009052123-b.html">http://catdir.loc.gov/catdir/enhancements/fy1106/2009052123-b.html</a> Volltext <a href="http://proquest.tech.safaribooksonline.de/9781118031834">http://proquest.tech.safaribooksonline.de/9781118031834</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Mac security bible ent://SD_ILS/0/SD_ILS:303881 2026-02-20T18:31:16Z 2026-02-20T18:31:16Z Yazar&#160;Kissell, Joe.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;Wiley InterScience <a href="http://dx.doi.org/10.1002/9781118257739">An electronic book accessible through the World Wide Web; click for information</a> Safari Books Online <a href="http://proquest.safaribooksonline.com/640">http://proquest.safaribooksonline.com/640</a> <a href="http://proquest.safaribooksonline.com/?fpi=9780470474198">http://proquest.safaribooksonline.com/?fpi=9780470474198</a> Safari Books Online <a href="http://proquest.safaribooksonline.com/9780470474198">http://proquest.safaribooksonline.com/9780470474198</a> Books24x7 <a href="http://www.books24x7.com/marc.asp?bookid=40737">http://www.books24x7.com/marc.asp?bookid=40737</a> <a href="http://site.ebrary.com/lib/alltitles/Doc?id=10358774">http://site.ebrary.com/lib/alltitles/Doc?id=10358774</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> IT audit, control, and security ent://SD_ILS/0/SD_ILS:304008 2026-02-20T18:31:16Z 2026-02-20T18:31:16Z Yazar&#160;Moeller, Robert R.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;Wiley InterScience <a href="http://dx.doi.org/10.1002/9781118269138">An electronic book accessible through the World Wide Web; click for information</a> Ebook Library <a href="http://public.eblib.com/EBLPublic/PublicView.do?ptiID=624573">http://public.eblib.com/EBLPublic/PublicView.do?ptiID=624573</a> Books24x7 <a href="http://www.books24x7.com/marc.asp?bookid=40717">http://www.books24x7.com/marc.asp?bookid=40717</a> <a href="http://site.ebrary.com/lib/alltitles/Doc?id=10469768">http://site.ebrary.com/lib/alltitles/Doc?id=10469768</a> <a href="http://swb.eblib.com/patron/FullRecord.aspx?p=624573">http://swb.eblib.com/patron/FullRecord.aspx?p=624573</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Security 2020 reduce security risks this decade ent://SD_ILS/0/SD_ILS:303839 2026-02-20T18:31:16Z 2026-02-20T18:31:16Z Yazar&#160;Howard, Doug.&#160;Prince, Kevin.&#160;Wiley InterScience (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;Wiley InterScience <a href="http://dx.doi.org/10.1002/9781118255803">An electronic book accessible through the World Wide Web; click for information</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Data protection : governance, risk management, and compliance ent://SD_ILS/0/SD_ILS:543918 2026-02-20T18:31:16Z 2026-02-20T18:31:16Z Yazar&#160;Hill, David G. (David Gary), 1943, author.<br/>Yer Numaras&#305;&#160;QA76.9 .A25 H52 2009<br/>Elektronik Eri&#351;im&#160;<a href="https://www.taylorfrancis.com/books/9781439806937">Click here to view.</a><br/>Format:&#160;Kitap<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Applied cryptanalysis breaking ciphers in the real world ent://SD_ILS/0/SD_ILS:249508 2026-02-20T18:31:16Z 2026-02-20T18:31:16Z Yazar&#160;Stamp, Mark.&#160;Low, Richard M., 1967-<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;IEEE Xplore <a href="http://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=5201512">http://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=5201512</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Metasploit Toolkit for Penetration Testing, Exploit Development, And Vulnerabiity Research ent://SD_ILS/0/SD_ILS:112179 2026-02-20T18:31:16Z 2026-02-20T18:31:16Z Yazar&#160;ScienceDirect (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490740">An electronic book accessible through the World Wide Web; click for information</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Microsoft windows security fundamentals ent://SD_ILS/0/SD_ILS:112183 2026-02-20T18:31:16Z 2026-02-20T18:31:16Z Yazar&#160;Clercq, Jan de, 1968-&#160;Grillenmeier, Guido.&#160;ScienceDirect (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781555583408">An electronic book accessible through the World Wide Web; click for information</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Open source fuzzing tools ent://SD_ILS/0/SD_ILS:112187 2026-02-20T18:31:16Z 2026-02-20T18:31:16Z Yazar&#160;Rathaus, Noam&#160;ScienceDirect (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491952">An electronic book accessible through the World Wide Web; click for information</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Security convergence managing enterprise security risk ent://SD_ILS/0/SD_ILS:112198 2026-02-20T18:31:16Z 2026-02-20T18:31:16Z Yazar&#160;Tyson, Dave.&#160;ScienceDirect (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780750684255">An electronic book accessible through the World Wide Web; click for information</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Techno Security's guide to managing risks for IT managers, auditors, and investigators ent://SD_ILS/0/SD_ILS:112203 2026-02-20T18:31:16Z 2026-02-20T18:31:16Z Yazar&#160;Wiles, Jack.&#160;ScienceDirect (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491389">An electronic book accessible through the World Wide Web; click for information</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> The official CHFI study guide (Exam 312-49) for computer hacking forensic investigator. ent://SD_ILS/0/SD_ILS:112206 2026-02-20T18:31:16Z 2026-02-20T18:31:16Z Yazar&#160;Kleiman, Dave.&#160;ScienceDirect (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491976">An electronic book accessible through the World Wide Web; click for information</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> WarDriving &amp; wireless penetration testing ent://SD_ILS/0/SD_ILS:112210 2026-02-20T18:31:16Z 2026-02-20T18:31:16Z Yazar&#160;Hurley, Chris.&#160;ScienceDirect (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491112">An electronic book accessible through the World Wide Web; click for information</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Windows forensic analysis DVD toolkit ent://SD_ILS/0/SD_ILS:112211 2026-02-20T18:31:16Z 2026-02-20T18:31:16Z Yazar&#160;Carvey, Harlan A.&#160;ScienceDirect (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491563">An electronic book accessible through the World Wide Web; click for information</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Zen and the art of information security ent://SD_ILS/0/SD_ILS:112214 2026-02-20T18:31:16Z 2026-02-20T18:31:16Z Yazar&#160;Winkler, Ira.&#160;ScienceDirect (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491686">An electronic book accessible through the World Wide Web; click for information</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> FISMA certification &amp; accreditation handbook ent://SD_ILS/0/SD_ILS:112169 2026-02-20T18:31:16Z 2026-02-20T18:31:16Z Yazar&#160;Taylor, Laura.&#160;Shepherd, Matthew.&#160;ScienceDirect (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491167">An electronic book accessible through the World Wide Web; click for information</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> How to cheat at securing sql server 2005 ent://SD_ILS/0/SD_ILS:112174 2026-02-20T18:31:16Z 2026-02-20T18:31:16Z Yazar&#160;ScienceDirect (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491969">An electronic book accessible through the World Wide Web; click for information</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Microsoft Vista for IT security professionals ent://SD_ILS/0/SD_ILS:112182 2026-02-20T18:31:16Z 2026-02-20T18:31:16Z Yazar&#160;Piltzecker, Tony, 1975-&#160;Chaffin, Larry.&#160;ScienceDirect (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491396">An electronic book accessible through the World Wide Web; click for information</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Computer security and cryptography ent://SD_ILS/0/SD_ILS:296865 2026-02-20T18:31:16Z 2026-02-20T18:31:16Z Yazar&#160;Konheim, Alan G., 1934-<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://www.contentreserve.com/TitleInfo.asp?ID={24307C36-99BB-4A76-9317-7D1A7CC786FB}&Format=50">Click for information</a> <a href="http://proquest.safaribooksonline.com/?fpi=9780471947837">Available by subscription from Safari Books Online</a> Ebook Library <a href="http://public.eblib.com/EBLPublic/PublicView.do?ptiID=288170">http://public.eblib.com/EBLPublic/PublicView.do?ptiID=288170</a> John Wiley <a href="http://dx.doi.org/10.1002/0470083980">http://dx.doi.org/10.1002/0470083980</a> Volltext <a href="http://proquest.tech.safaribooksonline.de/9780471947837">http://proquest.tech.safaribooksonline.de/9780471947837</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Developer's guide to web application security ent://SD_ILS/0/SD_ILS:306464 2026-02-20T18:31:16Z 2026-02-20T18:31:16Z Yazar&#160;Cross, Michael, 1965-<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490610">http://www.sciencedirect.com/science/book/9781597490610</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Metasploit toolkit for penetration testing, exploit development, and vulnerability research ent://SD_ILS/0/SD_ILS:306469 2026-02-20T18:31:16Z 2026-02-20T18:31:16Z Yazar&#160;Maynor, David.&#160;Mookhey, K. K.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490740">http://www.sciencedirect.com/science/book/9781597490740</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> How to cheat at securing your network ent://SD_ILS/0/SD_ILS:306503 2026-02-20T18:31:16Z 2026-02-20T18:31:16Z Yazar&#160;Dubrawsky, Ido.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492317">http://www.sciencedirect.com/science/book/9781597492317</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> The CISO handbook : a practical guide to securing your company ent://SD_ILS/0/SD_ILS:539204 2026-02-20T18:31:16Z 2026-02-20T18:31:16Z Yazar&#160;Gentile, Michael., author.&#160;Collette, Ronald D.&#160;August, Thomas D.<br/>Yer Numaras&#305;&#160;HF5548.37 .G46 2006<br/>Elektronik Eri&#351;im&#160;<a href="https://www.taylorfrancis.com/books/9781420031379">Click here to view.</a><br/>Format:&#160;Kitap<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Insider threat protecting the enterprise from sabotage, spying, and theft ent://SD_ILS/0/SD_ILS:253661 2026-02-20T18:31:16Z 2026-02-20T18:31:16Z Yazar&#160;Cole, Eric.&#160;Ring, Sandra.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;Volltext <a href="http://www.sciencedirect.com/science/book/9781597490481">http://www.sciencedirect.com/science/book/9781597490481</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> How to cheat at designing security for a Windows Server 2003 network ent://SD_ILS/0/SD_ILS:253670 2026-02-20T18:31:16Z 2026-02-20T18:31:16Z Yazar&#160;Amini, Rob.&#160;Hunter, Laura E.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492430">http://www.sciencedirect.com/science/book/9781597492430</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Penetration tester's open source toolkit ent://SD_ILS/0/SD_ILS:253676 2026-02-20T18:31:16Z 2026-02-20T18:31:16Z Yazar&#160;Long, Johnny.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490214">http://www.sciencedirect.com/science/book/9781597490214</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Syngress force emerging threat analysis from mischief to malicious ent://SD_ILS/0/SD_ILS:112202 2026-02-20T18:31:16Z 2026-02-20T18:31:16Z Yazar&#160;Maynor, David.&#160;ScienceDirect (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490566">An electronic book accessible through the World Wide Web; click for information</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> How to cheat at Windows System Administration using command line scripts ent://SD_ILS/0/SD_ILS:112107 2026-02-20T18:31:16Z 2026-02-20T18:31:16Z Yazar&#160;Bhardwaj, Pawan K.&#160;Andreou, Kimon.&#160;Barber, Brian.&#160;Kleiman, Dave.&#160;Satyanarayana, Mahesh.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491051">An electronic book accessible through the World Wide Web; click for information</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Information security principles and practice ent://SD_ILS/0/SD_ILS:301803 2026-02-20T18:31:16Z 2026-02-20T18:31:16Z Yazar&#160;Stamp, Mark.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://www.contentreserve.com/TitleInfo.asp?ID={310C0D18-7395-435E-BA71-41A0448F3D13}&Format=50">Click for information</a> Ebook Library <a href="http://public.eblib.com/EBLPublic/PublicView.do?ptiID=240929">http://public.eblib.com/EBLPublic/PublicView.do?ptiID=240929</a> John Wiley <a href="http://dx.doi.org/10.1002/0471744190">http://dx.doi.org/10.1002/0471744190</a> <a href="http://www3.interscience.wiley.com/cgi-bin/bookhome/109933408">http://www3.interscience.wiley.com/cgi-bin/bookhome/109933408</a> HathiTrust Digital Library, Limited view (search only) <a href="http://catalog.hathitrust.org/api/volumes/oclc/57754240.html">http://catalog.hathitrust.org/api/volumes/oclc/57754240.html</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Securing HP NonStop servers in an open systems world TCP/IP, OSS &amp; SQL ent://SD_ILS/0/SD_ILS:253863 2026-02-20T18:31:16Z 2026-02-20T18:31:16Z Yazar&#160;XYPRO Technology Corporation.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781555583446">http://www.sciencedirect.com/science/book/9781555583446</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Securing IM and P2P applications for the enterprise ent://SD_ILS/0/SD_ILS:253939 2026-02-20T18:31:16Z 2026-02-20T18:31:16Z Yazar&#160;Piccard, Paul L.&#160;Sachs, Marcus H.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490177">http://www.sciencedirect.com/science/book/9781597490177</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Combating spyware in the enterprise ent://SD_ILS/0/SD_ILS:254075 2026-02-20T18:31:16Z 2026-02-20T18:31:16Z Yazar&#160;Baskin, Brian.&#160;Piltzecker, Tony, 1975-<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490641">http://www.sciencedirect.com/science/book/9781597490641</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Essential computer security everyone's guide to e-mail, Internet, and wireless security ent://SD_ILS/0/SD_ILS:145840 2026-02-20T18:31:16Z 2026-02-20T18:31:16Z Yazar&#160;Bradley, Tony, 1969-&#160;Carvey, Harlan A.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491143">http://www.sciencedirect.com/science/book/9781597491143</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> A practical guide to security assessments ent://SD_ILS/0/SD_ILS:545277 2026-02-20T18:31:16Z 2026-02-20T18:31:16Z Yazar&#160;Kairab, Sudhanshu., author.<br/>Yer Numaras&#305;&#160;HF5548.32 .K345 2005<br/>Elektronik Eri&#351;im&#160;<a href="https://www.taylorfrancis.com/books/9781135500313">Click here to view.</a><br/>Format:&#160;Kitap<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Codes : the guide to secrecy from ancient to modern times ent://SD_ILS/0/SD_ILS:546062 2026-02-20T18:31:16Z 2026-02-20T18:31:16Z Yazar&#160;Mollin, Richard A., 1947, author.<br/>Yer Numaras&#305;&#160;QA76.9 .A25 M67 2005<br/>Elektronik Eri&#351;im&#160;<a href="https://www.taylorfrancis.com/books/9781420035087">Click here to view.</a><br/>Format:&#160;Kitap<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Stealing the network how to own an identity ent://SD_ILS/0/SD_ILS:253663 2026-02-20T18:31:16Z 2026-02-20T18:31:16Z Yazar&#160;Alder, Raven.&#160;Mullen, Timothy M.&#160;Long, Johnny.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490061">http://www.sciencedirect.com/science/book/9781597490061</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Software piracy exposed ent://SD_ILS/0/SD_ILS:253664 2026-02-20T18:31:16Z 2026-02-20T18:31:16Z Yazar&#160;Craig, Paul.&#160;Honick, Ron.&#160;Burnett, Mark (Mark M.)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781932266986">http://www.sciencedirect.com/science/book/9781932266986</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Aggressive network self-defense ent://SD_ILS/0/SD_ILS:253672 2026-02-20T18:31:16Z 2026-02-20T18:31:16Z Yazar&#160;Wyler, Neil R.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836203">http://www.sciencedirect.com/science/book/9781931836203</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Cyber spying tracking your family's (sometimes) secret online lives ent://SD_ILS/0/SD_ILS:253673 2026-02-20T18:31:16Z 2026-02-20T18:31:16Z Yazar&#160;Fair, Ted.&#160;Nordfelt, Michael.&#160;Ring, Sandra.&#160;Cole, Eric.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836418">http://www.sciencedirect.com/science/book/9781931836418</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> InfoSec career hacking sell your skillz, not your soul ent://SD_ILS/0/SD_ILS:253681 2026-02-20T18:31:16Z 2026-02-20T18:31:16Z Yazar&#160;Bayles, Aaron W.&#160;Brindley, Ed.&#160;Foster, James C.&#160;Hurley, Chris.&#160;Long, Johnny.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490115">http://www.sciencedirect.com/science/book/9781597490115</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> IM, instant messaging, security ent://SD_ILS/0/SD_ILS:253725 2026-02-20T18:31:16Z 2026-02-20T18:31:16Z Yazar&#160;Rittinghouse, John W.&#160;Ransome, James F.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781555583385">http://www.sciencedirect.com/science/book/9781555583385</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Cryptography, information theory, and error-correction a handbook for the 21st century ent://SD_ILS/0/SD_ILS:301860 2026-02-20T18:31:16Z 2026-02-20T18:31:16Z Yazar&#160;Bruen, Aiden A., 1941-&#160;Forcinito, Mario, 1962-&#160;Wiley InterScience (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;Wiley InterScience <a href="http://dx.doi.org/10.1002/9781118033296">An electronic book accessible through the World Wide Web; click for information</a> Contributor biographical information <a href="http://catdir.loc.gov/catdir/enhancements/fy0618/2004058044-b.html">http://catdir.loc.gov/catdir/enhancements/fy0618/2004058044-b.html</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Information security and ethics social and organizational issues ent://SD_ILS/0/SD_ILS:152966 2026-02-20T18:31:16Z 2026-02-20T18:31:16Z Yazar&#160;Quigley, Marian.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;EBSCOhost <a href="http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=108396">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=108396</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Implementing homeland security for enterprise IT ent://SD_ILS/0/SD_ILS:253656 2026-02-20T18:31:16Z 2026-02-20T18:31:16Z Yazar&#160;Erbschloe, Michael.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781555583125">http://www.sciencedirect.com/science/book/9781555583125</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Secure architectures with OpenBSD ent://SD_ILS/0/SD_ILS:109506 2026-02-20T18:31:16Z 2026-02-20T18:31:16Z Yazar&#160;Palmer, Brandon.&#160;Nazario, Jose, ort. yaz.<br/>Yer Numaras&#305;&#160;QA76.76.O63 P335 2004<br/>Format:&#160;Kitap<br/>Durum&#160;Beytepe K&uuml;t&uuml;phanesi~1<br/> Snort 2.1 intrusion detection ent://SD_ILS/0/SD_ILS:253989 2026-02-20T18:31:16Z 2026-02-20T18:31:16Z Yazar&#160;Beale, Jay.&#160;Alder, Raven.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836043">http://www.sciencedirect.com/science/book/9781931836043</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Wireless operational security ent://SD_ILS/0/SD_ILS:254059 2026-02-20T18:31:16Z 2026-02-20T18:31:16Z Yazar&#160;Rittinghouse, John W.&#160;Ransome, James F.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781555583170">http://www.sciencedirect.com/science/book/9781555583170</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Cybersecurity operations handbook ent://SD_ILS/0/SD_ILS:253847 2026-02-20T18:31:16Z 2026-02-20T18:31:16Z Yazar&#160;Rittinghouse, John W.&#160;Hancock, Bill, 1957-<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781555583064">http://www.sciencedirect.com/science/book/9781555583064</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Hack proofing your network ent://SD_ILS/0/SD_ILS:253618 2026-02-20T18:31:16Z 2026-02-20T18:31:16Z Yazar&#160;Ahmad, David R. Mirza.&#160;Russell, Ryan, 1969-<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781928994701">http://www.sciencedirect.com/science/book/9781928994701</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Securing e-business applications and communications ent://SD_ILS/0/SD_ILS:545821 2026-02-20T18:31:16Z 2026-02-20T18:31:16Z Yazar&#160;Held, Jonathan S., author.&#160;Bowers, John R.<br/>Yer Numaras&#305;&#160;QA76.9 .A25 H435 2001<br/>Elektronik Eri&#351;im&#160;<a href="https://www.taylorfrancis.com/books/9781420031553">Click here to view.</a><br/>Format:&#160;Kitap<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Secure computers and networks : analysis, design, and implementation ent://SD_ILS/0/SD_ILS:540568 2026-02-20T18:31:16Z 2026-02-20T18:31:16Z Yazar&#160;Fisch, Eric A.&#160;White, Gregory B.<br/>Yer Numaras&#305;&#160;QA76.9 .A25 F5334 2000<br/>Elektronik Eri&#351;im&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9780367802127">https://www.taylorfrancis.com/books/9780367802127</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Contemporary cryptology the science of information integrity ent://SD_ILS/0/SD_ILS:249661 2026-02-20T18:31:16Z 2026-02-20T18:31:16Z Yazar&#160;Simmons, Gustavus J.&#160;Institute of Electrical and Electronics Engineers.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;IEEE Xplore <a href="http://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=5265879">http://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=5265879</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/>