Arama Sonu&ccedil;lar&#305; Press. - Daralt&#305;lm&#305;&#351;: Computer security. SirsiDynix Enterprise https://katalog.hacettepe.edu.tr/client/tr_TR/default_tr/default_tr/qu$003dPress.$0026qf$003dSUBJECT$002509Subject$002509Computer$002bsecurity.$002509Computer$002bsecurity.$0026te$003dILS$0026ps$003d300? 2025-12-27T15:29:13Z System assurance beyond detecting vulnerabilities ent://SD_ILS/0/SD_ILS:148532 2025-12-27T15:29:13Z 2025-12-27T15:29:13Z Yazar&#160;Mansourov, Nikolai.&#160;Campara, Djenana.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780123814142">http://www.sciencedirect.com/science/book/9780123814142</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> The complete book of data anonymization : from planning to implementation ent://SD_ILS/0/SD_ILS:540169 2025-12-27T15:29:13Z 2025-12-27T15:29:13Z Yazar&#160;Raghunathan, Balaji., author.<br/>Yer Numaras&#305;&#160;QA76.9 .A25 R338 2013<br/>Elektronik Eri&#351;im&#160;<a href="https://www.taylorfrancis.com/books/9781439877319">Click here to view.</a><br/>Format:&#160;Kitap<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Engineering information security the application of systems engineering concepts to achieve information assurance ent://SD_ILS/0/SD_ILS:249916 2025-12-27T15:29:13Z 2025-12-27T15:29:13Z Yazar&#160;Jacobs, Stuart.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;IEEE Xplore <a href="http://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=6047604">http://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=6047604</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Official (ISC)2 guide to the CSSLP ent://SD_ILS/0/SD_ILS:541754 2025-12-27T15:29:13Z 2025-12-27T15:29:13Z Yazar&#160;Paul, Mano., author.<br/>Yer Numaras&#305;&#160;QA76.76 .D47 P3775 2011<br/>Elektronik Eri&#351;im&#160;<a href="https://www.taylorfrancis.com/books/9781439826065">Click here to view.</a><br/>Format:&#160;Kitap<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Official (ISC)2 guide to the ISSMP CBK ent://SD_ILS/0/SD_ILS:544375 2025-12-27T15:29:13Z 2025-12-27T15:29:13Z Yazar&#160;Tipton, Harold F.<br/>Yer Numaras&#305;&#160;QA76.9 .A25 O34 2011<br/>Elektronik Eri&#351;im&#160;<a href="https://www.taylorfrancis.com/books/9781420094442">Click here to view.</a><br/>Format:&#160;Kitap<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Security for Service Oriented Architectures. ent://SD_ILS/0/SD_ILS:542633 2025-12-27T15:29:13Z 2025-12-27T15:29:13Z Yazar&#160;Williams, Walter, author.&#160;CRC Press LLC.<br/>Yer Numaras&#305;&#160;TK5105.5828 .W55 2017<br/>Elektronik Eri&#351;im&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9780429072185">https://www.taylorfrancis.com/books/9780429072185</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Unauthorized Access : The Crisis in Online Privacy and Security. ent://SD_ILS/0/SD_ILS:543688 2025-12-27T15:29:13Z 2025-12-27T15:29:13Z Yazar&#160;Sloan, Robert, author.&#160;CRC Press LLC.<br/>Yer Numaras&#305;&#160;TK5105.878 .S59 2017<br/>Elektronik Eri&#351;im&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9780429093791">https://www.taylorfrancis.com/books/9780429093791</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Information security fundamentals ent://SD_ILS/0/SD_ILS:539922 2025-12-27T15:29:13Z 2025-12-27T15:29:13Z Yazar&#160;Peltier, Thomas R.<br/>Yer Numaras&#305;&#160;QA76.9 .A25<br/>Elektronik Eri&#351;im&#160;<a href="https://www.taylorfrancis.com/books/9780429130281">Taylor & Francis eBooks</a> Taylor & Francis <a href="https://www.taylorfrancis.com/books/9780429130281">https://www.taylorfrancis.com/books/9780429130281</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> ORACLE IDENTITY MANAGEMENT : governance, risk, and compliance architecture, third edition. ent://SD_ILS/0/SD_ILS:544833 2025-12-27T15:29:13Z 2025-12-27T15:29:13Z Yazar&#160;POHLMAN, MARLIN B.<br/>Yer Numaras&#305;&#160;QA76.9 .A25<br/>Elektronik Eri&#351;im&#160;<a href="https://www.taylorfrancis.com/books/9780429117688">Taylor & Francis eBooks</a> Taylor & Francis <a href="https://www.taylorfrancis.com/books/9780429117688">https://www.taylorfrancis.com/books/9780429117688</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> CYBER SECURITY ESSENTIALS ent://SD_ILS/0/SD_ILS:540775 2025-12-27T15:29:13Z 2025-12-27T15:29:13Z Yer Numaras&#305;&#160;QA76.9 .A25<br/>Elektronik Eri&#351;im&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9780429106637">https://www.taylorfrancis.com/books/9780429106637</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> COMPUTER SECURITY LITERACY : staying safe in a digital world. ent://SD_ILS/0/SD_ILS:540788 2025-12-27T15:29:13Z 2025-12-27T15:29:13Z Yazar&#160;JACOBSON, DOUGLAS.<br/>Yer Numaras&#305;&#160;QA76.9 .A25<br/>Elektronik Eri&#351;im&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9780429108129">https://www.taylorfrancis.com/books/9780429108129</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> DEFENSE AGAINST THE BLACK ARTS : how hackers do what they do and how to protect against it. ent://SD_ILS/0/SD_ILS:542757 2025-12-27T15:29:13Z 2025-12-27T15:29:13Z Yazar&#160;VARSALONE, JESSE.<br/>Yer Numaras&#305;&#160;TK5105.59<br/>Elektronik Eri&#351;im&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9780429103766">https://www.taylorfrancis.com/books/9780429103766</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> SECURITY STRATEGY : from requirements to reality. ent://SD_ILS/0/SD_ILS:545098 2025-12-27T15:29:13Z 2025-12-27T15:29:13Z Yazar&#160;STACKPOLE, BILL.<br/>Yer Numaras&#305;&#160;QA76.9 .A25<br/>Elektronik Eri&#351;im&#160;<a href="https://www.taylorfrancis.com/books/9780429152160">Taylor & Francis eBooks</a> Taylor & Francis <a href="https://www.taylorfrancis.com/books/9780429152160">https://www.taylorfrancis.com/books/9780429152160</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Introduction to modern cryptography ent://SD_ILS/0/SD_ILS:364315 2025-12-27T15:29:13Z 2025-12-27T15:29:13Z Yazar&#160;Katz, Jonathan, 1974-&#160;Lindell, Yehuda.<br/>Yer Numaras&#305;&#160;QA76.9.A25 K36 2015<br/>Format:&#160;Kitap<br/>Durum&#160;Beytepe K&uuml;t&uuml;phanesi~2<br/> Secret history : the story of cryptology ent://SD_ILS/0/SD_ILS:365258 2025-12-27T15:29:13Z 2025-12-27T15:29:13Z Yazar&#160;Bauer, Craig P.<br/>Yer Numaras&#305;&#160;QA76.9.A25 B384 2013<br/>Format:&#160;Kitap<br/>Durum&#160;Beytepe K&uuml;t&uuml;phanesi~1<br/> Reliability and availability of cloud computing ent://SD_ILS/0/SD_ILS:249383 2025-12-27T15:29:13Z 2025-12-27T15:29:13Z Yazar&#160;Bauer, Eric.&#160;Adams, Randee.&#160;Wiley InterScience (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;IEEE Xplore <a href="http://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=6266788">http://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=6266788</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Advances in intelligence and security informatics ent://SD_ILS/0/SD_ILS:146055 2025-12-27T15:29:13Z 2025-12-27T15:29:13Z Yazar&#160;Mao, Wenji.&#160;Wang, Fei-Yue.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780123972002">http://www.sciencedirect.com/science/book/9780123972002</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Microsoft windows security fundamentals ent://SD_ILS/0/SD_ILS:146346 2025-12-27T15:29:13Z 2025-12-27T15:29:13Z Yazar&#160;Clercq, Jan de, 1968-&#160;Grillenmeier, Guido.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781555583408">http://www.sciencedirect.com/science/book/9781555583408</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Microsoft windows security fundamentals ent://SD_ILS/0/SD_ILS:112183 2025-12-27T15:29:13Z 2025-12-27T15:29:13Z Yazar&#160;Clercq, Jan de, 1968-&#160;Grillenmeier, Guido.&#160;ScienceDirect (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781555583408">An electronic book accessible through the World Wide Web; click for information</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Security in Distributed, Grid, Mobile, and Pervasive Computing. ent://SD_ILS/0/SD_ILS:544847 2025-12-27T15:29:13Z 2025-12-27T15:29:13Z Yer Numaras&#305;&#160;QA76.9<br/>Elektronik Eri&#351;im&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9780429119347">https://www.taylorfrancis.com/books/9780429119347</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Securing HP NonStop servers in an open systems world TCP/IP, OSS &amp; SQL ent://SD_ILS/0/SD_ILS:253863 2025-12-27T15:29:13Z 2025-12-27T15:29:13Z Yazar&#160;XYPRO Technology Corporation.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781555583446">http://www.sciencedirect.com/science/book/9781555583446</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Multimedia security technologies for digital rights management ent://SD_ILS/0/SD_ILS:254554 2025-12-27T15:29:13Z 2025-12-27T15:29:13Z Yazar&#160;Zeng, Wenjun, 1967-&#160;Yu, Hong Heather, 1967-&#160;Lin, Ching-Yung.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780123694768">http://www.sciencedirect.com/science/book/9780123694768</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Implementing database security and auditing a guide for DBAs, information security administrators and auditors ent://SD_ILS/0/SD_ILS:253860 2025-12-27T15:29:13Z 2025-12-27T15:29:13Z Yazar&#160;Ben-Natan, Ron.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781555583347">http://www.sciencedirect.com/science/book/9781555583347</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> IM, instant messaging, security ent://SD_ILS/0/SD_ILS:253725 2025-12-27T15:29:13Z 2025-12-27T15:29:13Z Yazar&#160;Rittinghouse, John W.&#160;Ransome, James F.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781555583385">http://www.sciencedirect.com/science/book/9781555583385</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Information security and ethics social and organizational issues ent://SD_ILS/0/SD_ILS:152966 2025-12-27T15:29:13Z 2025-12-27T15:29:13Z Yazar&#160;Quigley, Marian.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;EBSCOhost <a href="http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=108396">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=108396</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Advances in Elliptic Curve Cryptography ent://SD_ILS/0/SD_ILS:236058 2025-12-27T15:29:13Z 2025-12-27T15:29:13Z Yazar&#160;Blake, Ian F..&#160;Seroussi, Gadiel.&#160;Smart, Nigel P..<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1017/CBO9780511546570">Access by subscription</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Implementing homeland security for enterprise IT ent://SD_ILS/0/SD_ILS:253656 2025-12-27T15:29:13Z 2025-12-27T15:29:13Z Yazar&#160;Erbschloe, Michael.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781555583125">http://www.sciencedirect.com/science/book/9781555583125</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Windows Server 2003 security infrastructures ent://SD_ILS/0/SD_ILS:253837 2025-12-27T15:29:13Z 2025-12-27T15:29:13Z Yazar&#160;Clercq, Jan de, 1968-<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781555582838">http://www.sciencedirect.com/science/book/9781555582838</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> HP Nonstop server security a practical handbook ent://SD_ILS/0/SD_ILS:253849 2025-12-27T15:29:13Z 2025-12-27T15:29:13Z Yazar&#160;Hill, Terri.&#160;Alvarado, Ellen.&#160;XYPRO Technology Corporation.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781555583149">http://www.sciencedirect.com/science/book/9781555583149</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Wireless operational security ent://SD_ILS/0/SD_ILS:254059 2025-12-27T15:29:13Z 2025-12-27T15:29:13Z Yazar&#160;Rittinghouse, John W.&#160;Ransome, James F.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781555583170">http://www.sciencedirect.com/science/book/9781555583170</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Internet security a jumpstart for systems administrators and IT managers ent://SD_ILS/0/SD_ILS:253843 2025-12-27T15:29:13Z 2025-12-27T15:29:13Z Yazar&#160;Speed, Tim.&#160;Ellis, Juanita.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781555582982">http://www.sciencedirect.com/science/book/9781555582982</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Cybersecurity operations handbook ent://SD_ILS/0/SD_ILS:253847 2025-12-27T15:29:13Z 2025-12-27T15:29:13Z Yazar&#160;Rittinghouse, John W.&#160;Hancock, Bill, 1957-<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781555583064">http://www.sciencedirect.com/science/book/9781555583064</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Digital watermarking ent://SD_ILS/0/SD_ILS:253889 2025-12-27T15:29:13Z 2025-12-27T15:29:13Z Yazar&#160;Cox, I. J. (Ingemar J.)&#160;Miller, Matthew L.&#160;Bloom, Jeffrey A. (Jeffrey Adam), 1964-<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781558607149">http://www.sciencedirect.com/science/book/9781558607149</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Technology and privacy : the new landscape ent://SD_ILS/0/SD_ILS:112999 2025-12-27T15:29:13Z 2025-12-27T15:29:13Z Yazar&#160;Agre, Philip.&#160;Rotenberg, Marc.<br/>Yer Numaras&#305;&#160;QA76.9.A25 T43 2001<br/>Format:&#160;Kitap<br/>Durum&#160;Beytepe K&uuml;t&uuml;phanesi~1<br/> Information security architecture : an integrated approach to security in the organization ent://SD_ILS/0/SD_ILS:544953 2025-12-27T15:29:13Z 2025-12-27T15:29:13Z Yazar&#160;Tudor, Jan Killmeyer.<br/>Yer Numaras&#305;&#160;QA76.9 .A25<br/>Elektronik Eri&#351;im&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9780429131790">https://www.taylorfrancis.com/books/9780429131790</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Secure computers and networks : analysis, design, and implementation ent://SD_ILS/0/SD_ILS:540568 2025-12-27T15:29:13Z 2025-12-27T15:29:13Z Yazar&#160;Fisch, Eric A.&#160;White, Gregory B.<br/>Yer Numaras&#305;&#160;QA76.9 .A25 F5334 2000<br/>Elektronik Eri&#351;im&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9780367802127">https://www.taylorfrancis.com/books/9780367802127</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Contemporary cryptology the science of information integrity ent://SD_ILS/0/SD_ILS:249661 2025-12-27T15:29:13Z 2025-12-27T15:29:13Z Yazar&#160;Simmons, Gustavus J.&#160;Institute of Electrical and Electronics Engineers.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;IEEE Xplore <a href="http://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=5265879">http://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=5265879</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/>