Arama Sonuçları Identification. - Daraltılmış: Computer security.SirsiDynix Enterprisehttps://katalog.hacettepe.edu.tr/client/tr_TR/default_tr/default_tr/qu$003dIdentification.$0026qf$003dSUBJECT$002509Konu$002509Computer$002bsecurity.$002509Computer$002bsecurity.$0026ic$003dtrue$0026ps$003d300?dt=list2024-11-28T10:45:45ZRadio Frequency Identification: Security and Privacy Issues 10th International Workshop, RFIDSec 2014, Oxford, UK, July 21-23, 2014, Revised Selected Papersent://SD_ILS/0/SD_ILS:4866712024-11-28T10:45:45Z2024-11-28T10:45:45ZYazar Saxena, Nitesh. editor. Sadeghi, Ahmad-Reza. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-319-13066-8">https://doi.org/10.1007/978-3-319-13066-8</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Mechanics of user identification and authentication fundamentals of identity managementent://SD_ILS/0/SD_ILS:2868302024-11-28T10:45:45Z2024-11-28T10:45:45ZYazar Todorov, Dobromir.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://marc.crcnetbase.com/isbn/9781420052206">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Hacking exposed Linux Linux security secrets and solutions.ent://SD_ILS/0/SD_ILS:2933242024-11-28T10:45:45Z2024-11-28T10:45:45ZYazar Hatch, Brian. Hacking Linux exposed. ISECOM (Organization)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://mhebooklibrary.com/reader/hacking-exposed-linux">Subscription required</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Malware forensics investigating and analyzing malicious codeent://SD_ILS/0/SD_ILS:1479142024-11-28T10:45:45Z2024-11-28T10:45:45ZYazar Aquilina, James M. Casey, Eoghan. Malin, Cameron H.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492683">http://www.sciencedirect.com/science/book/9781597492683</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Enhanced methods in computer security, biometric and artificial intelligence systemsent://SD_ILS/0/SD_ILS:1098642024-11-28T10:45:45Z2024-11-28T10:45:45ZYazar Pejas, Jerzy, 1954-, ed. Piegat, Andrzej, 1947-, ed.<br/>Yer Numarası QA76.9.A25 E545 2005<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>Hack proofing your identity in the information age protect your family on the internet!ent://SD_ILS/0/SD_ILS:2536172024-11-28T10:45:45Z2024-11-28T10:45:45ZYazar Bidwell, Teri. Cross, Michael, 1965- Russell, Ryan, 1969-<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836517">http://www.sciencedirect.com/science/book/9781931836517</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>