Arama Sonuçları Monitoring. - Daraltılmış: Computer security.SirsiDynix Enterprisehttps://katalog.hacettepe.edu.tr/client/tr_TR/default_tr/default_tr/qu$003dMonitoring.$0026qf$003dSUBJECT$002509Konu$002509Computer$002bsecurity.$002509Computer$002bsecurity.$0026ic$003dtrue$0026ps$003d300?2025-12-22T06:49:34ZAdvanced Monitoring in P2P Botnets A Dual Perspectiveent://SD_ILS/0/SD_ILS:4007672025-12-22T06:49:34Z2025-12-22T06:49:34ZYazar Karuppayah, Shankar. author. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-981-10-9050-9">https://doi.org/10.1007/978-981-10-9050-9</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Big Data Technologies for Monitoring of Computer Security: A Case Study of the Russian Federationent://SD_ILS/0/SD_ILS:4019072025-12-22T06:49:34Z2025-12-22T06:49:34ZYazar Petrenko, Sergei. author. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-319-79036-7">https://doi.org/10.1007/978-3-319-79036-7</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Monitoring and Securing Virtualized Networks and Services 8th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security, AIMS 2014, Brno, Czech Republic, June 30 -- July 3, 2014. Proceedingsent://SD_ILS/0/SD_ILS:4889602025-12-22T06:49:34Z2025-12-22T06:49:34ZYazar Sperotto, Anna. editor. Doyen, Guillaume. editor. Latré, Steven. editor. Charalambides, Marinos. editor. Stiller, Burkhard. editor.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-662-43862-6">https://doi.org/10.1007/978-3-662-43862-6</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Information security management metrics : a definitive guide to effective security monitoring and measurementent://SD_ILS/0/SD_ILS:5469522025-12-22T06:49:34Z2025-12-22T06:49:34ZYazar Brotby, W. Krag., author.<br/>Yer Numarası HD30.2 .B78 2009<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9781420052862">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>Information security policy development for compliance : ISO/IEC 27001, NIST SP 800-53, HIPAA standard, PCI DSS V2.0, and AUP V5.0ent://SD_ILS/0/SD_ILS:5451282025-12-22T06:49:34Z2025-12-22T06:49:34ZYazar Williams, Barry L., author.<br/>Yer Numarası QA76.9 .A25 .W5495 2013<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9781466580596">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>Building an effective information security policy architectureent://SD_ILS/0/SD_ILS:5409852025-12-22T06:49:34Z2025-12-22T06:49:34ZYazar Bacik, Sandy., author.<br/>Yer Numarası QA76.9 .A25 B335 2008<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9781420059069">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>