Arama Sonu&ccedil;lar&#305; National security - Daralt&#305;lm&#305;&#351;: COMPUTERS. SirsiDynix Enterprise https://katalog.hacettepe.edu.tr/client/tr_TR/default_tr/default_tr/qu$003dNational$002bsecurity$0026qf$003dSUBJECT$002509Konu$002509COMPUTERS.$002509COMPUTERS.$0026ps$003d300? 2026-01-20T23:27:21Z Information security and privacy quick reference the essential handbook for every CISO, CSO, and Chief Privacy Officer ent://SD_ILS/0/SD_ILS:599946 2026-01-20T23:27:21Z 2026-01-20T23:27:21Z Yazar&#160;Chapple, Mike, author.&#160;Shelley, Joe.&#160;Stewart, James Michael.<br/>Yer Numaras&#305;&#160;QA76.9 .A25 C43 2025<br/>Elektronik Eri&#351;im&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394353347">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394353347</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Quantum computing in cybersecurity ent://SD_ILS/0/SD_ILS:598685 2026-01-20T23:27:21Z 2026-01-20T23:27:21Z Yazar&#160;Rawat, Romil, editor.<br/>Yer Numaras&#305;&#160;QA76.9 .A25 Q83 2023<br/>Elektronik Eri&#351;im&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394167401">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394167401</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Understanding infrastructure edge computing : concepts, technologies and considerations ent://SD_ILS/0/SD_ILS:596448 2026-01-20T23:27:21Z 2026-01-20T23:27:21Z Yazar&#160;Marcham, Alex, author.<br/>Yer Numaras&#305;&#160;QA76.583 .M37 2021<br/>Elektronik Eri&#351;im&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119763260">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119763260</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Conflicts, crimes and regulations in cyberspace ent://SD_ILS/0/SD_ILS:597281 2026-01-20T23:27:21Z 2026-01-20T23:27:21Z Yazar&#160;Laurent, S&eacute;bastien, editor.<br/>Yer Numaras&#305;&#160;QA76.9 .A25<br/>Elektronik Eri&#351;im&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119885092">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119885092</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Cybersecurity and decision makers : data security and digital trust ent://SD_ILS/0/SD_ILS:595943 2026-01-20T23:27:21Z 2026-01-20T23:27:21Z Yazar&#160;Fr&eacute;minville, Marie de, author.<br/>Yer Numaras&#305;&#160;HF5548.37 .F74 2020<br/>Elektronik Eri&#351;im&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119720362">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119720362</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> We have root : even more advice from Schneier on security ent://SD_ILS/0/SD_ILS:595432 2026-01-20T23:27:21Z 2026-01-20T23:27:21Z Yazar&#160;Schneier, Bruce, 1963- author.<br/>Yer Numaras&#305;&#160;QA76.9 .A25 S36 2019<br/>Elektronik Eri&#351;im&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119653554">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119653554</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Hacking the hacker : learn from the experts who take down hackers ent://SD_ILS/0/SD_ILS:593636 2026-01-20T23:27:21Z 2026-01-20T23:27:21Z Yazar&#160;Grimes, Roger A., author.<br/>Yer Numaras&#305;&#160;QA76.9 .A25<br/>Elektronik Eri&#351;im&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119396260">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119396260</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/>