Arama Sonuçları Malware analysis. - Daraltılmış: COMPUTERS.
SirsiDynix Enterprise
https://katalog.hacettepe.edu.tr/client/tr_TR/default_tr/default_tr/qu$003dMalware$002banalysis.$0026qf$003dSUBJECT$002509Konu$002509COMPUTERS.$002509COMPUTERS.$0026ic$003dtrue$0026ps$003d300?
2026-02-26T21:14:16Z
Practical cyber intelligence : a hands-on guide to digital forensics
ent://SD_ILS/0/SD_ILS:599262
2026-02-26T21:14:16Z
2026-02-26T21:14:16Z
Yazar Jakobsen, Adam Tilmar, author.<br/>Yer Numarası HV8079 .C65 J633 2024<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394256129">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394256129</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Modeling and optimization of signals using machine learning techniques
ent://SD_ILS/0/SD_ILS:599379
2026-02-26T21:14:16Z
2026-02-26T21:14:16Z
Yer Numarası TK5102.9 .M63 2024<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119847717">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119847717</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Cyber security and network security
ent://SD_ILS/0/SD_ILS:597484
2026-02-26T21:14:16Z
2026-02-26T21:14:16Z
Yazar Pramanik, Sabyasachi, editor. Samanta, Debabrata, 1987- editor. Vinay, M., editor. Guha, Abhijit, editor.<br/>Yer Numarası QA76.9 .A25<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119812555">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119812555</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Design and development of efficient energy systems
ent://SD_ILS/0/SD_ILS:596610
2026-02-26T21:14:16Z
2026-02-26T21:14:16Z
Yazar Tripathi, Suman Lata, editor.<br/>Yer Numarası TK7881.15 .D47 2021<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119761785">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119761785</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Applied incident response
ent://SD_ILS/0/SD_ILS:595744
2026-02-26T21:14:16Z
2026-02-26T21:14:16Z
Yazar Anson, Steve.<br/>Yer Numarası QA76.9 .A25<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119560302">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119560302</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Wireshark for security professionals : using Wireshark and the Metasploit Framework
ent://SD_ILS/0/SD_ILS:593472
2026-02-26T21:14:16Z
2026-02-26T21:14:16Z
Yazar Bullock, Jessey, author. Gordon, Adam, author.<br/>Yer Numarası QA76.9 .A25<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119183457">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119183457</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>