Arama Sonu&ccedil;lar&#305; Hacking - Daralt&#305;lm&#305;&#351;: 2013 SirsiDynix Enterprise https://katalog.hacettepe.edu.tr/client/tr_TR/default_tr/default_tr/qu$003dHacking$0026qf$003dPUBDATE$002509Yay$0025C4$0025B1n$002bY$0025C4$0025B1l$0025C4$0025B1$0025092013$0025092013$0026pe$003dd$00253A$0026ps$003d300? 2024-11-16T01:50:46Z Hacking healthcare ent://SD_ILS/0/SD_ILS:280330 2024-11-16T01:50:46Z 2024-11-16T01:50:46Z Yazar&#160;Trotter, Fred.&#160;Uhlman, David.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;EBSCOhost <a href="http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=495835">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=495835</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Hacking the academy new approaches to scholarship and teaching from digital humanities ent://SD_ILS/0/SD_ILS:240706 2024-11-16T01:50:46Z 2024-11-16T01:50:46Z Yazar&#160;Scheinfeldt, Tom.&#160;Cohen, Daniel J. (Daniel Jared), 1968-&#160;Project Muse.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://muse.jhu.edu/books/9780472029471/">Full text available: </a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> The basics of web hacking tools and techniques to attack the Web ent://SD_ILS/0/SD_ILS:306699 2024-11-16T01:50:46Z 2024-11-16T01:50:46Z Yazar&#160;Pauli, Joshua J.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780124166004">http://www.sciencedirect.com/science/book/9780124166004</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Windows networking tools the complete guide to management, troubleshooting, and security ent://SD_ILS/0/SD_ILS:291657 2024-11-16T01:50:46Z 2024-11-16T01:50:46Z Yazar&#160;Held, Gilbert, 1943-<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://marc.crcnetbase.com/isbn/9781466511071">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> The definitive guide to complying with the HIPAA/HITECH privacy and security rules ent://SD_ILS/0/SD_ILS:287167 2024-11-16T01:50:46Z 2024-11-16T01:50:46Z Yazar&#160;Trinckes, John J.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://marc.crcnetbase.com/isbn/9781466507685">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Android security attacks and defenses ent://SD_ILS/0/SD_ILS:287193 2024-11-16T01:50:46Z 2024-11-16T01:50:46Z Yazar&#160;Misra, Anmol.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://marc.crcnetbase.com/isbn/9781439896471">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/>