Arama Sonuçları Internet -- Security measures.SirsiDynix Enterprisehttps://katalog.hacettepe.edu.tr/client/tr_TR/default_tr/default_tr/qu$003dInternet$002b--$002bSecurity$002bmeasures.$0026ps$003d300?dt=list2024-11-24T10:39:07ZCryptographic security solutions for the internet of thingsent://SD_ILS/0/SD_ILS:4817712024-11-24T10:39:07Z2024-11-24T10:39:07ZYazar Banday, Mohammad Tariq, 1969- editor. IGI Global, publisher.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-5742-5">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-5742-5</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Artificial intelligence and security challenges in emerging networksent://SD_ILS/0/SD_ILS:4819752024-11-24T10:39:07Z2024-11-24T10:39:07ZYazar Abassi, Ryma, 1980- editor. IGI Global, publisher.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-7353-1">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-7353-1</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Machine learning and cognitive science applications in cyber securityent://SD_ILS/0/SD_ILS:4821512024-11-24T10:39:07Z2024-11-24T10:39:07ZYazar Khan, Muhammad Salman, author. IGI Global, publisher.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-8100-0">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-8100-0</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>RIoT control : understanding and managing risks and the internet of thingsent://SD_ILS/0/SD_ILS:4591002024-11-24T10:39:07Z2024-11-24T10:39:07ZYazar Macaulay, Tyson, author.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780124199712">http://www.sciencedirect.com/science/book/9780124199712</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>The basics of cyber safety : computer and mobile device safety made easyent://SD_ILS/0/SD_ILS:4590442024-11-24T10:39:07Z2024-11-24T10:39:07ZYazar Sammons, John, author. Cross, Michael, 1965- author.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780124166509">http://www.sciencedirect.com/science/book/9780124166509</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Cyber guerillaent://SD_ILS/0/SD_ILS:4589532024-11-24T10:39:07Z2024-11-24T10:39:07ZYazar Haaster, Jelle van, author. Gevers, Rickey, author. Sprengers, Martijn, author.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128051979">http://www.sciencedirect.com/science/book/9780128051979</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>The Wiley handbook of psychology, technology and societyent://SD_ILS/0/SD_ILS:3871292024-11-24T10:39:07Z2024-11-24T10:39:07ZYazar Cheever, Nancy A., editor. Rosen, Larry D., editor. Carrier, L. Mark, editor.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1002/9781118771952">Wiley Online Library</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Securing VoIP : keeping your VoIP network safeent://SD_ILS/0/SD_ILS:3554172024-11-24T10:39:07Z2024-11-24T10:39:07ZYazar Bates, Regis J. author.<br/>Yer Numarası ONLINE(355417.1)<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780124170391">http://www.sciencedirect.com/science/book/9780124170391</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Managing online risk : apps, mobile, and social media securityent://SD_ILS/0/SD_ILS:3555142024-11-24T10:39:07Z2024-11-24T10:39:07ZYazar Gonzalez, Deborah, author.<br/>Yer Numarası ONLINE(355514.1)<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780124200555">http://www.sciencedirect.com/science/book/9780124200555</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Cyber reconnaissance, surveillance, and defenseent://SD_ILS/0/SD_ILS:3554502024-11-24T10:39:07Z2024-11-24T10:39:07ZYazar Shimonski, Robert.<br/>Yer Numarası ONLINE(355450.1)<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128013083">http://www.sciencedirect.com/science/book/9780128013083</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Chinese cybersecurity and cyberdefenseent://SD_ILS/0/SD_ILS:3421552024-11-24T10:39:07Z2024-11-24T10:39:07ZYazar Ventre, Daniel.<br/>Yer Numarası ONLINE(342155.1)<br/>Elektronik Erişim Ebook Library <a href="http://public.eblib.com/choice/publicfullrecord.aspx?p=1765106">http://public.eblib.com/choice/publicfullrecord.aspx?p=1765106</a>
John Wiley <a href="http://dx.doi.org/10.1002/9781119009009">http://dx.doi.org/10.1002/9781119009009</a>
MyiLibrary <a href="http://www.myilibrary.com?id=637332">http://www.myilibrary.com?id=637332</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Network Securityent://SD_ILS/0/SD_ILS:3421682024-11-24T10:39:07Z2024-11-24T10:39:07ZYazar Perez, Andre.<br/>Yer Numarası ONLINE(342168.1)<br/>Elektronik Erişim ebrary <a href="http://site.ebrary.com/lib/alltitles/docDetail.action?docID=10945002">http://site.ebrary.com/lib/alltitles/docDetail.action?docID=10945002</a>
John Wiley <a href="http://dx.doi.org/10.1002/9781119043942">http://dx.doi.org/10.1002/9781119043942</a>
MyiLibrary <a href="http://www.myilibrary.com?id=647917">http://www.myilibrary.com?id=647917</a>
Image <a href="http://images.contentreserve.com/ImageType-100/0128-1/{D8CDF404-6689-4759-9C8F-A065220E7032}Img100.jpg">http://images.contentreserve.com/ImageType-100/0128-1/{D8CDF404-6689-4759-9C8F-A065220E7032}Img100.jpg</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Windows forensic analysis toolkit : advanced analysis techniques for Windows 8ent://SD_ILS/0/SD_ILS:3559092024-11-24T10:39:07Z2024-11-24T10:39:07ZYazar Carvey, Harlan A., author.<br/>Yer Numarası ONLINE(355909.1)<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780124171572">http://www.sciencedirect.com/science/book/9780124171572</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Anonymous communication networks : protecting privacy on the webent://SD_ILS/0/SD_ILS:3566572024-11-24T10:39:07Z2024-11-24T10:39:07ZYazar Peng, Kun, author.<br/>Yer Numarası ONLINE(356657.1)<br/>Elektronik Erişim <a href="http://marc.crcnetbase.com/isbn/9781439881606">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Advances in cyber security technology, operations, and experiencesent://SD_ILS/0/SD_ILS:2395912024-11-24T10:39:07Z2024-11-24T10:39:07ZYazar Hsu, D. Frank (Derbiau Frank), 1948- Project Muse.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://muse.jhu.edu/books/9780823250325/">Full text available: </a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Cyber security and IT infrastructure protectionent://SD_ILS/0/SD_ILS:3066912024-11-24T10:39:07Z2024-11-24T10:39:07ZYazar Vacca, John R.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780124166813">http://www.sciencedirect.com/science/book/9780124166813</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Advanced persistent threat understanding the danger and how to protect your organizationent://SD_ILS/0/SD_ILS:1460562024-11-24T10:39:07Z2024-11-24T10:39:07ZYazar Cole, Eric.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597499491">http://www.sciencedirect.com/science/book/9781597499491</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>The basics of cyber warfare understanding the fundamentals of cyber warfare in theory and practiceent://SD_ILS/0/SD_ILS:1452542024-11-24T10:39:07Z2024-11-24T10:39:07ZYazar Winterfeld, Steve. Andress, Jason.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780124047372">http://www.sciencedirect.com/science/book/9780124047372</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Windows forensic analysis toolkit advanced analysis techniques for Windows 7ent://SD_ILS/0/SD_ILS:1456892024-11-24T10:39:07Z2024-11-24T10:39:07ZYazar Carvey, Harlan A. Kolde, Jennifer.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597497275">http://www.sciencedirect.com/science/book/9781597497275</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>The healthy PC preventive care, home remedies, and green computingent://SD_ILS/0/SD_ILS:2934642024-11-24T10:39:07Z2024-11-24T10:39:07ZYazar Hart-Davis, Guy. Holzman, Carey. Healthy PC.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://mhebooklibrary.com/reader/healthy-pc-preventive-care-home-remedies-green-computing-2nd-edition">Subscription required</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Web application security a beginner's guideent://SD_ILS/0/SD_ILS:2932412024-11-24T10:39:07Z2024-11-24T10:39:07ZYazar Sullivan, Bryan, 1974- Liu, Vincent.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://mhebooklibrary.com/reader/web-application-security-beginners-guide">Subscription required</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>RC4 stream cipher and its variantsent://SD_ILS/0/SD_ILS:2852492024-11-24T10:39:07Z2024-11-24T10:39:07ZYazar Paul, Goutam. Maitra, Subhamoy, 1970-<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://marc.crcnetbase.com/isbn/9781439831373">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>The death of the Internetent://SD_ILS/0/SD_ILS:2704362024-11-24T10:39:07Z2024-11-24T10:39:07ZYazar Jakobsson, Markus.<br/>Yer Numarası TK5105.875.I57 D43 2012<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>Security strategies in Web applications and social networkingent://SD_ILS/0/SD_ILS:2715382024-11-24T10:39:07Z2024-11-24T10:39:07ZYazar Harwood, Mike.<br/>Yer Numarası HM742 H38 2011<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>Secure Java for web application developmentent://SD_ILS/0/SD_ILS:2851662024-11-24T10:39:07Z2024-11-24T10:39:07ZYazar Bhargav, Abhay. Kumar, B. V. (Balepur Venkatanna), 1959-<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://marc.crcnetbase.com/isbn/9781439823569">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Oracle Fusion middleware 11g architecture and managementent://SD_ILS/0/SD_ILS:2932522024-11-24T10:39:07Z2024-11-24T10:39:07ZYazar Shafii, Reza. Lee, Stephen, 1975 June 8- Konduri, Gangadhar.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://mhebooklibrary.com/reader/oracle-fusion-middleware-11g-architecture-management">Subscription required</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Handbook of financial cryptography and securityent://SD_ILS/0/SD_ILS:2878292024-11-24T10:39:07Z2024-11-24T10:39:07ZYazar Rosenberg, Burton.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://marc.crcnetbase.com/isbn/9781420059823">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Mobile malware attacks and defenseent://SD_ILS/0/SD_ILS:1464132024-11-24T10:39:07Z2024-11-24T10:39:07ZYazar Dunham, Ken.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492980">http://www.sciencedirect.com/science/book/9781597492980</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>The future of the internet and how to stop itent://SD_ILS/0/SD_ILS:1349462024-11-24T10:39:07Z2024-11-24T10:39:07ZYazar Zittrain, Jonathan L.<br/>Yer Numarası TK5105.875.I57 Z53 2008<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>Google hacking for penetration testers. Volume 2ent://SD_ILS/0/SD_ILS:1480292024-11-24T10:39:07Z2024-11-24T10:39:07ZYazar Long, Johnny.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491761">http://www.sciencedirect.com/science/book/9781597491761</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>İnternet kullanımı ve aileent://SD_ILS/0/SD_ILS:1399012024-11-24T10:39:07Z2024-11-24T10:39:07ZYer Numarası TK5105.888 .I58 2008<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>ISA server 2006ent://SD_ILS/0/SD_ILS:1150802024-11-24T10:39:07Z2024-11-24T10:39:07ZYazar İnan, Yüksel. Demirli, Nihat.<br/>Yer Numarası TK5105.59 .I536 2008<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~2<br/>Wireless Internet Security Architecture and Protocolsent://SD_ILS/0/SD_ILS:2362052024-11-24T10:39:07Z2024-11-24T10:39:07ZYazar Kempf, James.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1017/CBO9780511754739">Access by subscription</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Host Identity Protocol (HIP) towards the secure mobile Internetent://SD_ILS/0/SD_ILS:3028022024-11-24T10:39:07Z2024-11-24T10:39:07ZYazar Gurtov, Andrei.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim John Wiley <a href="http://dx.doi.org/10.1002/9780470772898">http://dx.doi.org/10.1002/9780470772898</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Asterisk hackingent://SD_ILS/0/SD_ILS:1453552024-11-24T10:39:07Z2024-11-24T10:39:07ZYazar Brashars, Joshua.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491518">http://www.sciencedirect.com/science/book/9781597491518</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>How to cheat at Voip securityent://SD_ILS/0/SD_ILS:1121062024-11-24T10:39:07Z2024-11-24T10:39:07ZYazar Porter, Thomas, PhD. Gough, Michael. ScienceDirect (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491693">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>How to cheat at Voip securityent://SD_ILS/0/SD_ILS:1454862024-11-24T10:39:07Z2024-11-24T10:39:07ZYazar Porter, Thomas, PhD. Gough, Michael, 1963-<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491693">http://www.sciencedirect.com/science/book/9781597491693</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Essential computer security everyone's guide to e-mail, Internet, and wireless securityent://SD_ILS/0/SD_ILS:1458402024-11-24T10:39:07Z2024-11-24T10:39:07ZYazar Bradley, Tony, 1969- Carvey, Harlan A.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491143">http://www.sciencedirect.com/science/book/9781597491143</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Practical VoIP securityent://SD_ILS/0/SD_ILS:2536692024-11-24T10:39:07Z2024-11-24T10:39:07ZYazar Porter, Thomas.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490603">http://www.sciencedirect.com/science/book/9781597490603</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>How to cheat at configuring ISA server 2004ent://SD_ILS/0/SD_ILS:2539482024-11-24T10:39:07Z2024-11-24T10:39:07ZYazar Shinder, Thomas W. Shinder, Debra Littlejohn.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490573">http://www.sciencedirect.com/science/book/9781597490573</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>AAA and network security for mobile access radius, diameter, EAP, PKI, and IP mobilityent://SD_ILS/0/SD_ILS:2957292024-11-24T10:39:07Z2024-11-24T10:39:07ZYazar Nakhjiri, Madjid. Nakhjiri, Mahsa.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim John Wiley <a href="http://dx.doi.org/10.1002/0470017465">http://dx.doi.org/10.1002/0470017465</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Aggressive network self-defenseent://SD_ILS/0/SD_ILS:2536722024-11-24T10:39:07Z2024-11-24T10:39:07ZYazar Wyler, Neil R.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836203">http://www.sciencedirect.com/science/book/9781931836203</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>VoIP securityent://SD_ILS/0/SD_ILS:2537152024-11-24T10:39:07Z2024-11-24T10:39:07ZYazar Ransome, James F. Rittinghouse, John W.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781555583323">http://www.sciencedirect.com/science/book/9781555583323</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Hacking a terror network the silent threat of covert channelsent://SD_ILS/0/SD_ILS:2539872024-11-24T10:39:07Z2024-11-24T10:39:07ZYazar Rogers, Russ.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781928994985">http://www.sciencedirect.com/science/book/9781928994985</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Implementing homeland security for enterprise ITent://SD_ILS/0/SD_ILS:2536562024-11-24T10:39:07Z2024-11-24T10:39:07ZYazar Erbschloe, Michael.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781555583125">http://www.sciencedirect.com/science/book/9781555583125</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Internet security a jumpstart for systems administrators and IT managersent://SD_ILS/0/SD_ILS:2538432024-11-24T10:39:07Z2024-11-24T10:39:07ZYazar Speed, Tim. Ellis, Juanita.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781555582982">http://www.sciencedirect.com/science/book/9781555582982</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Secure Internet practices best practices for securing systems in the Internet and e-Business ageent://SD_ILS/0/SD_ILS:2904272024-11-24T10:39:07Z2024-11-24T10:39:07ZYazar McBride, Patrick.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://marc.crcnetbase.com/isbn/9781420031478">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Hack proofing your e-commerce site the only way to stop a hacker is to think like oneent://SD_ILS/0/SD_ILS:2539682024-11-24T10:39:07Z2024-11-24T10:39:07ZYazar Russell, Ryan. Syngress Media, Inc.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781928994275">http://www.sciencedirect.com/science/book/9781928994275</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Hack proofing your Web applicationsent://SD_ILS/0/SD_ILS:2539692024-11-24T10:39:07Z2024-11-24T10:39:07ZYazar Traxler, Julie.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781928994312">http://www.sciencedirect.com/science/book/9781928994312</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>