Arama Sonuçları Experience.. - Daraltılmış: Computer security.
SirsiDynix Enterprise
https://katalog.hacettepe.edu.tr/client/tr_TR/default_tr/default_tr/qu$003dExperience..$0026qf$003dSUBJECT$002509Konu$002509Computer$002bsecurity.$002509Computer$002bsecurity.$0026ps$003d300$0026isd$003dtrue?
2025-12-13T05:57:25Z
Information Security Practice and Experience 15th International Conference, ISPEC 2019, Kuala Lumpur, Malaysia, November 26–28, 2019, Proceedings
ent://SD_ILS/0/SD_ILS:483099
2025-12-13T05:57:25Z
2025-12-13T05:57:25Z
Yazar Heng, Swee-Huay. editor. (orcid)0000-0003-3627-2131 Lopez, Javier. editor. (orcid)0000-0001-8066-9991 SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-030-34339-2">https://doi.org/10.1007/978-3-030-34339-2</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Information Security Practice and Experience 14th International Conference, ISPEC 2018, Tokyo, Japan, September 25-27, 2018, Proceedings
ent://SD_ILS/0/SD_ILS:399972
2025-12-13T05:57:25Z
2025-12-13T05:57:25Z
Yazar Su, Chunhua. editor. Kikuchi, Hiroaki. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-319-99807-7">https://doi.org/10.1007/978-3-319-99807-7</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Information Security Practice and Experience 10th International Conference, ISPEC 2014, Fuzhou, China, May 5-8, 2014, Proceedings
ent://SD_ILS/0/SD_ILS:485513
2025-12-13T05:57:25Z
2025-12-13T05:57:25Z
Yazar Huang, Xinyi. editor. Zhou, Jianying. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-319-06320-1">https://doi.org/10.1007/978-3-319-06320-1</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Security without obscurity : a guide to confidentiality, authentication, and integrity
ent://SD_ILS/0/SD_ILS:544118
2025-12-13T05:57:25Z
2025-12-13T05:57:25Z
Yazar Stapleton, Jeffrey James, author.<br/>Yer Numarası QA76.9 .A25 S734 2014<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9781466592155">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>
Vulnerability management
ent://SD_ILS/0/SD_ILS:545698
2025-12-13T05:57:25Z
2025-12-13T05:57:25Z
Yazar Foreman, Park., author.<br/>Yer Numarası QA76.9 .A25 F656 2010<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9781439801512">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>
Building an effective information security policy architecture
ent://SD_ILS/0/SD_ILS:540985
2025-12-13T05:57:25Z
2025-12-13T05:57:25Z
Yazar Bacik, Sandy., author.<br/>Yer Numarası QA76.9 .A25 B335 2008<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9781420059069">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>