Arama Sonu&ccedil;lar&#305; Programming Language. - Daralt&#305;lm&#305;&#351;: Cryptography. SirsiDynix Enterprise https://katalog.hacettepe.edu.tr/client/tr_TR/default_tr/default_tr/qu$003dProgramming$002bLanguage.$0026qf$003dSUBJECT$002509Konu$002509Cryptography.$002509Cryptography.$0026ps$003d300?dt=list 2026-03-13T22:46:01Z Attacks and Defenses for the Internet-of-Things 7th International Conference, ADIoT 2024, Hangzhou, China, December 13-14, 2024, Proceedings ent://SD_ILS/0/SD_ILS:607638 2026-03-13T22:46:01Z 2026-03-13T22:46:01Z Yazar&#160;Meng, Weizhi. editor. (orcid)0000-0003-4384-5786&#160;Yung, Moti. editor. (orcid)0000-0003-0848-0873&#160;Shao, Jun. editor. (orcid)0000-0001-8352-0973&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-3-031-85593-1">https://doi.org/10.1007/978-3-031-85593-1</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Wireshark for security professionals : using Wireshark and the Metasploit Framework ent://SD_ILS/0/SD_ILS:593472 2026-03-13T22:46:01Z 2026-03-13T22:46:01Z Yazar&#160;Bullock, Jessey, author.&#160;Gordon, Adam, author.<br/>Yer Numaras&#305;&#160;QA76.9 .A25<br/>Elektronik Eri&#351;im&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119183457">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119183457</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> The Manager's Guide to Web Application Security A Concise Guide to the Weaker Side of the Web ent://SD_ILS/0/SD_ILS:618640 2026-03-13T22:46:01Z 2026-03-13T22:46:01Z Yazar&#160;Lepofsky, Ron. author.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-1-4842-0148-0">https://doi.org/10.1007/978-1-4842-0148-0</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/>