Arama Sonu&ccedil;lar&#305; Protection. - Daralt&#305;lm&#305;&#351;: Computer security. SirsiDynix Enterprise https://katalog.hacettepe.edu.tr/client/tr_TR/default_tr/default_tr/qu$003dProtection.$0026qf$003dSUBJECT$002509Konu$002509Computer$002bsecurity.$002509Computer$002bsecurity.$0026ps$003d300$0026isd$003dtrue? 2026-02-20T22:22:55Z Information protection playbook ent://SD_ILS/0/SD_ILS:306649 2026-02-20T22:22:55Z 2026-02-20T22:22:55Z Yazar&#160;Kane, Greg, editor of compilation.&#160;Koppel, Lorna, editor of compilation.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780124172326">http://www.sciencedirect.com/science/book/9780124172326</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Internet of Things Security and Data Protection ent://SD_ILS/0/SD_ILS:485847 2026-02-20T22:22:55Z 2026-02-20T22:22:55Z Yazar&#160;Ziegler, S&eacute;bastien. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-3-030-04984-3">https://doi.org/10.1007/978-3-030-04984-3</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Data protection : governance, risk management, and compliance ent://SD_ILS/0/SD_ILS:543918 2026-02-20T22:22:55Z 2026-02-20T22:22:55Z Yazar&#160;Hill, David G. (David Gary), 1943, author.<br/>Yer Numaras&#305;&#160;QA76.9 .A25 H52 2009<br/>Elektronik Eri&#351;im&#160;<a href="https://www.taylorfrancis.com/books/9781439806937">Click here to view.</a><br/>Format:&#160;Kitap<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Optimum spending on cybersecurity measures : digital privacy and data protection ent://SD_ILS/0/SD_ILS:574605 2026-02-20T22:22:55Z 2026-02-20T22:22:55Z Yazar&#160;Kissoon, Tara, author.<br/>Yer Numaras&#305;&#160;HF5548.37<br/>Elektronik Eri&#351;im&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003497523">https://www.taylorfrancis.com/books/9781003497523</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> GUARDIANS OF DATA a comprehensive guide to digital data protection. ent://SD_ILS/0/SD_ILS:554346 2026-02-20T22:22:55Z 2026-02-20T22:22:55Z Yazar&#160;Khidzir, Nik Zulkarnaen.&#160;Ahmed, Shekh Abdullah-Al-Musa.<br/>Yer Numaras&#305;&#160;QA76.9 .A25<br/>Elektronik Eri&#351;im&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003604679">https://www.taylorfrancis.com/books/9781003604679</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Optimal spending on cybersecurity measures : digital privacy and data protection ent://SD_ILS/0/SD_ILS:572623 2026-02-20T22:22:55Z 2026-02-20T22:22:55Z Yazar&#160;Kissoon, Tara, author.<br/>Yer Numaras&#305;&#160;HF5548.37<br/>Elektronik Eri&#351;im&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003507109">https://www.taylorfrancis.com/books/9781003507109</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Protection of electrical power distribution systems : smart grid, microgrid, AI, and cyber security ent://SD_ILS/0/SD_ILS:600371 2026-02-20T22:22:55Z 2026-02-20T22:22:55Z Yazar&#160;Masood, Tariq, author.&#160;Abdo, Jamil, author.&#160;Iqbal, Atif, author.<br/>Yer Numaras&#305;&#160;TK3001 .M37 2026<br/>Elektronik Eri&#351;im&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394327676">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394327676</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> A practitioner's guide to cybersecurity and data protection : how to ensure client confidentiality ent://SD_ILS/0/SD_ILS:550244 2026-02-20T22:22:55Z 2026-02-20T22:22:55Z Yazar&#160;Knibbs, Catherine, editor.&#160;Hibberd, Gary, editor.<br/>Yer Numaras&#305;&#160;QA76.9 .A25<br/>Elektronik Eri&#351;im&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003364184">https://www.taylorfrancis.com/books/9781003364184</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Women Securing the Future with TIPPSS for IoT Trust, Identity, Privacy, Protection, Safety, Security for the Internet of Things ent://SD_ILS/0/SD_ILS:484904 2026-02-20T22:22:55Z 2026-02-20T22:22:55Z Yazar&#160;Hudson, Florence D. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-3-030-15705-0">https://doi.org/10.1007/978-3-030-15705-0</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> ICT Systems Security and Privacy Protection 34th IFIP TC 11 International Conference, SEC 2019, Lisbon, Portugal, June 25-27, 2019, Proceedings ent://SD_ILS/0/SD_ILS:485997 2026-02-20T22:22:55Z 2026-02-20T22:22:55Z Yazar&#160;Dhillon, Gurpreet. editor.&#160;Karlsson, Fredrik. editor.&#160;Hedstr&ouml;m, Karin. editor.&#160;Z&uacute;quete, Andr&eacute;. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-3-030-22312-0">https://doi.org/10.1007/978-3-030-22312-0</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Critical Infrastructure Protection XIII 13th IFIP WG 11.10 International Conference, ICCIP 2019, Arlington, VA, USA, March 11&ndash;12, 2019, Revised Selected Papers ent://SD_ILS/0/SD_ILS:486939 2026-02-20T22:22:55Z 2026-02-20T22:22:55Z Yazar&#160;Staggs, Jason. editor.&#160;Shenoi, Sujeet. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-3-030-34647-8">https://doi.org/10.1007/978-3-030-34647-8</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> ICT Systems Security and Privacy Protection 33rd IFIP TC 11 International Conference, SEC 2018, Held at the 24th IFIP World Computer Congress, WCC 2018, Poznan, Poland, September 18-20, 2018, Proceedings ent://SD_ILS/0/SD_ILS:400045 2026-02-20T22:22:55Z 2026-02-20T22:22:55Z Yazar&#160;Janczewski, Lech Jan. editor. (orcid)0000-0003-3319-924X&#160;Kuty&#322;owski, Miros&#322;aw. editor. (orcid)0000-0003-3192-2430&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-3-319-99828-2">https://doi.org/10.1007/978-3-319-99828-2</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Critical Infrastructure Protection XII 12th IFIP WG 11.10 International Conference, ICCIP 2018, Arlington, VA, USA, March 12-14, 2018, Revised Selected Papers ent://SD_ILS/0/SD_ILS:400126 2026-02-20T22:22:55Z 2026-02-20T22:22:55Z Yazar&#160;Staggs, Jason. editor.&#160;Shenoi, Sujeet. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-3-030-04537-1">https://doi.org/10.1007/978-3-030-04537-1</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Advanced persistent security : a cyberwarfare approach to implementing adaptive enterprise protection, detection, and reaction strategies ent://SD_ILS/0/SD_ILS:459204 2026-02-20T22:22:55Z 2026-02-20T22:22:55Z Yazar&#160;Winkler, Ira, author.&#160;Gomes, Araceli Treu, author.&#160;Shackleford, Dave, editor.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="https://www.sciencedirect.com/science/book/9780128093160">https://www.sciencedirect.com/science/book/9780128093160</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Cyber and electromagnetic threats in modern relay protection ent://SD_ILS/0/SD_ILS:543446 2026-02-20T22:22:55Z 2026-02-20T22:22:55Z Yazar&#160;Gurevich, Vladimir, 1956, author.<br/>Yer Numaras&#305;&#160;TK2861 .G87 2015<br/>Elektronik Eri&#351;im&#160;<a href="https://www.taylorfrancis.com/books/9781482264326">Click here to view.</a><br/>Format:&#160;Kitap<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> ICT Systems Security and Privacy Protection 29th IFIP TC 11 International Conference, SEC 2014, Marrakech, Morocco, June 2-4, 2014, Proceedings ent://SD_ILS/0/SD_ILS:489201 2026-02-20T22:22:55Z 2026-02-20T22:22:55Z Yazar&#160;Cuppens-Boulahia, Nora. editor.&#160;Cuppens, Frederic. editor.&#160;Jajodia, Sushil. editor.&#160;Abou El Kalam, Anas. editor.&#160;Sans, Thierry. editor.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-3-642-55415-5">https://doi.org/10.1007/978-3-642-55415-5</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Critical Infrastructure Protection VIII 8th IFIP WG 11.10 International Conference, ICCIP 2014, Arlington, VA, USA, March 17-19, 2014, Revised Selected Papers ent://SD_ILS/0/SD_ILS:489496 2026-02-20T22:22:55Z 2026-02-20T22:22:55Z Yazar&#160;Butts, Jonathan. editor.&#160;Shenoi, Sujeet. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-3-662-45355-1">https://doi.org/10.1007/978-3-662-45355-1</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Building effective privacy programs : cybersecurity from principles to practice ent://SD_ILS/0/SD_ILS:600111 2026-02-20T22:22:55Z 2026-02-20T22:22:55Z Yazar&#160;Edwards, Jason (Cybersecurity expert), author.&#160;Weaver, Griffin, author.&#160;John Wiley &amp; Sons, publisher.<br/>Yer Numaras&#305;&#160;QA76.9 .P735 E34 2026<br/>Elektronik Eri&#351;im&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394342662">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394342662</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Optimal spending on cybersecurity measures : AI and governance ent://SD_ILS/0/SD_ILS:584311 2026-02-20T22:22:55Z 2026-02-20T22:22:55Z Yazar&#160;Kissoon, Tara, author.<br/>Yer Numaras&#305;&#160;HF5548.37 .K57 2025 EB<br/>Elektronik Eri&#351;im&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003587569">https://www.taylorfrancis.com/books/9781003587569</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Optimal spending on cybersecurity measures : third party risk management ent://SD_ILS/0/SD_ILS:584312 2026-02-20T22:22:55Z 2026-02-20T22:22:55Z Yazar&#160;Kissoon, Tara, author.<br/>Yer Numaras&#305;&#160;HF5548.37 .K57 2025 EB<br/>Elektronik Eri&#351;im&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003587576">https://www.taylorfrancis.com/books/9781003587576</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> The cybersecurity control playbook : from fundamentals to advanced strategies ent://SD_ILS/0/SD_ILS:599789 2026-02-20T22:22:55Z 2026-02-20T22:22:55Z Yazar&#160;Edwards, Jason (Cybersecurity expert), author.&#160;John Wiley &amp; Sons, publisher.<br/>Yer Numaras&#305;&#160;QA76.9 .A25 E3884 2025<br/>Elektronik Eri&#351;im&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394331888">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394331888</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> The techno-legal dynamics of cyber crimes in Industry 5.0 ent://SD_ILS/0/SD_ILS:599801 2026-02-20T22:22:55Z 2026-02-20T22:22:55Z Yazar&#160;Kaur, Gagandeep, editor&#160;Choudhury, Tanupriya editor&#160;Balamurugan, S. editor<br/>Yer Numaras&#305;&#160;QA76.9 .A25<br/>Elektronik Eri&#351;im&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394242177">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394242177</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Information security and privacy quick reference the essential handbook for every CISO, CSO, and Chief Privacy Officer ent://SD_ILS/0/SD_ILS:599946 2026-02-20T22:22:55Z 2026-02-20T22:22:55Z Yazar&#160;Chapple, Mike, author.&#160;Shelley, Joe.&#160;Stewart, James Michael.<br/>Yer Numaras&#305;&#160;QA76.9 .A25 C43 2025<br/>Elektronik Eri&#351;im&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394353347">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394353347</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Open-source security operations center (SOC) : a complete guide to establishing, managing, and maintaining a modern SOC ent://SD_ILS/0/SD_ILS:599434 2026-02-20T22:22:55Z 2026-02-20T22:22:55Z Yazar&#160;Basta, Alfred, author.&#160;Basta, Nadine, author.&#160;Anwar, Waqar, author.&#160;Essar, Mohammad Ilyas, author.&#160;John Wiley &amp; Sons, publisher.<br/>Yer Numaras&#305;&#160;QA76.9 .A25<br/>Elektronik Eri&#351;im&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394201631">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394201631</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Digital twins and cybersecurity : safeguarding the future of connected systems ent://SD_ILS/0/SD_ILS:599615 2026-02-20T22:22:55Z 2026-02-20T22:22:55Z Yazar&#160;Naveen, Palanichamy, author.&#160;Maheswar, R., author.&#160;Ragupathy, U.S., author.<br/>Yer Numaras&#305;&#160;QA76.9 .C65 N38 2025<br/>Elektronik Eri&#351;im&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394272501">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394272501</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Next-generation systems and secure computing ent://SD_ILS/0/SD_ILS:599779 2026-02-20T22:22:55Z 2026-02-20T22:22:55Z Yazar&#160;Barman, Subhabrata, editor.&#160;Koley, Santanu, editor.&#160;Joardar, Subhankar, editor.<br/>Yer Numaras&#305;&#160;QA76.9 .A25 N49 2025<br/>Elektronik Eri&#351;im&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394228522">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394228522</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Cyber defense : best practices for digital safety ent://SD_ILS/0/SD_ILS:600003 2026-02-20T22:22:55Z 2026-02-20T22:22:55Z Yazar&#160;Edwards, Jason, author.<br/>Yer Numaras&#305;&#160;QA76.9 .A25 E39 2025<br/>Elektronik Eri&#351;im&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394337040">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394337040</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Why CISOs fail ent://SD_ILS/0/SD_ILS:577207 2026-02-20T22:22:55Z 2026-02-20T22:22:55Z Yazar&#160;Engel, Barak, author.<br/>Yer Numaras&#305;&#160;HD30.2<br/>Elektronik Eri&#351;im&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003302759">https://www.taylorfrancis.com/books/9781003302759</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Cryptography : algorithms, protocols, and standards for computer security ent://SD_ILS/0/SD_ILS:598914 2026-02-20T22:22:55Z 2026-02-20T22:22:55Z Yazar&#160;Mammeri, Zoubir, author.<br/>Yer Numaras&#305;&#160;QA268 .M34 2024<br/>Elektronik Eri&#351;im&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394207510">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394207510</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Artificial intelligence technology in healthcare : security and privacy issues ent://SD_ILS/0/SD_ILS:574411 2026-02-20T22:22:55Z 2026-02-20T22:22:55Z Yazar&#160;Sharma, Neha (Computer scientist), editor.&#160;Srivastava, Durgesh (Computer scientist), editor.&#160;Sinwar, Deepak, editor.<br/>Yer Numaras&#305;&#160;R859.7 .A78<br/>Elektronik Eri&#351;im&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003377818">https://www.taylorfrancis.com/books/9781003377818</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Optimal spending on cybersecurity measures : risk management ent://SD_ILS/0/SD_ILS:586024 2026-02-20T22:22:55Z 2026-02-20T22:22:55Z Yazar&#160;Kissoon, Tara, author.<br/>Yer Numaras&#305;&#160;HF5548.37<br/>Elektronik Eri&#351;im&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003404354">https://www.taylorfrancis.com/books/9781003404354</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Privacy in practice : establish and operationalize a holistic data privacy program ent://SD_ILS/0/SD_ILS:560699 2026-02-20T22:22:55Z 2026-02-20T22:22:55Z Yazar&#160;Tang, Alan, (Information Security), author.<br/>Yer Numaras&#305;&#160;HF5548.37<br/>Elektronik Eri&#351;im&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003225089">https://www.taylorfrancis.com/books/9781003225089</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Software security : concepts &amp; practices ent://SD_ILS/0/SD_ILS:570473 2026-02-20T22:22:55Z 2026-02-20T22:22:55Z Yazar&#160;Khan, Suhel Ahmad, author.&#160;Kumar, Rajeev, author.&#160;Khan, R. A. (Raees Ahmad), author.<br/>Yer Numaras&#305;&#160;QA76.76 .D47<br/>Elektronik Eri&#351;im&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003330516">https://www.taylorfrancis.com/books/9781003330516</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> A&rsquo;dan Z&rsquo;ye siber g&uuml;venlik ent://SD_ILS/0/SD_ILS:524303 2026-02-20T22:22:55Z 2026-02-20T22:22:55Z Yazar&#160;Polat, A. Can.&#160;Karaka&#351;, Burak.<br/>Yer Numaras&#305;&#160;QA76.9 P65 2023<br/>Format:&#160;Kitap<br/>Durum&#160;Beytepe K&uuml;t&uuml;phanesi~1<br/> Quantum computing in cybersecurity ent://SD_ILS/0/SD_ILS:598685 2026-02-20T22:22:55Z 2026-02-20T22:22:55Z Yazar&#160;Rawat, Romil, editor.<br/>Yer Numaras&#305;&#160;QA76.9 .A25 Q83 2023<br/>Elektronik Eri&#351;im&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394167401">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394167401</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> The Security Hippie. ent://SD_ILS/0/SD_ILS:587563 2026-02-20T22:22:55Z 2026-02-20T22:22:55Z Yazar&#160;Engel, Barak.<br/>Yer Numaras&#305;&#160;HD30.2<br/>Elektronik Eri&#351;im&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003133308">https://www.taylorfrancis.com/books/9781003133308</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Optimal spending on cybersecurity measures : risk management ent://SD_ILS/0/SD_ILS:553885 2026-02-20T22:22:55Z 2026-02-20T22:22:55Z Yazar&#160;Kissoon, Tara, author.<br/>Yer Numaras&#305;&#160;HF5548.37 .K57 2022<br/>Elektronik Eri&#351;im&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003200895">https://www.taylorfrancis.com/books/9781003200895</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Cybersecurity for coaches and therapists : a practical guide for protecting client data ent://SD_ILS/0/SD_ILS:588664 2026-02-20T22:22:55Z 2026-02-20T22:22:55Z Yazar&#160;Fouracres, Alexandra J. S., author.<br/>Yer Numaras&#305;&#160;RC455.2 .M38 F88 2022 EB<br/>Elektronik Eri&#351;im&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003184805">https://www.taylorfrancis.com/books/9781003184805</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Intelligent security systems : how artificial intelligence, machine learning and data science work for and against computer security ent://SD_ILS/0/SD_ILS:597085 2026-02-20T22:22:55Z 2026-02-20T22:22:55Z Yazar&#160;Reznik, Leonid, 1955- author.<br/>Yer Numaras&#305;&#160;QA76.9 .A25 R438 2022<br/>Elektronik Eri&#351;im&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119771579">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119771579</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Cyber security and digital forensics ent://SD_ILS/0/SD_ILS:597326 2026-02-20T22:22:55Z 2026-02-20T22:22:55Z Yazar&#160;Ghonge, Mangesh, 1984- editor.<br/>Yer Numaras&#305;&#160;QA76.9 .A25<br/>Elektronik Eri&#351;im&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119795667">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119795667</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Executive's guide to cyber risk : securing the future today ent://SD_ILS/0/SD_ILS:597567 2026-02-20T22:22:55Z 2026-02-20T22:22:55Z Yazar&#160;Moyo, Siegfried, author.<br/>Yer Numaras&#305;&#160;HF5548.37 .M68 2022<br/>Elektronik Eri&#351;im&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394320578">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394320578</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> The CISO evolution : business knowledge for cybersecurity executives ent://SD_ILS/0/SD_ILS:597056 2026-02-20T22:22:55Z 2026-02-20T22:22:55Z Yazar&#160;Sharp, Matthew K., author.&#160;Lambros, Kyriakos P., author.<br/>Yer Numaras&#305;&#160;HD30.2 .S5325 2022<br/>Elektronik Eri&#351;im&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119782513">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119782513</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Cybersecurity in smart homes : architectures, solutions and technologies ent://SD_ILS/0/SD_ILS:597626 2026-02-20T22:22:55Z 2026-02-20T22:22:55Z Yazar&#160;Khatoun, Rida, author.<br/>Yer Numaras&#305;&#160;QA76.9 .A25<br/>Elektronik Eri&#351;im&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119987451">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119987451</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Trust-based communication systems for internet of things applications ent://SD_ILS/0/SD_ILS:597744 2026-02-20T22:22:55Z 2026-02-20T22:22:55Z Yazar&#160;Madaan, Vishu, editor.&#160;Agrawal, Prateek, editor.&#160;Sharma, Anand, editor.&#160;Sharma, Dilip Kumar, editor.&#160;Agrawal, Akshat, 1986- editor.<br/>Yer Numaras&#305;&#160;TK5105.8857<br/>Elektronik Eri&#351;im&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119896746">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119896746</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> It's your digital life ent://SD_ILS/0/SD_ILS:565418 2026-02-20T22:22:55Z 2026-02-20T22:22:55Z Yazar&#160;Govindarajulu, Giri, author.&#160;Ramaswami, Shyam Sundar, author.&#160;Vasudevan, Shriram K., author.<br/>Yer Numaras&#305;&#160;QA76.9 .A25<br/>Elektronik Eri&#351;im&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003144199">https://www.taylorfrancis.com/books/9781003144199</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> IT GOVERNANCE AND INFORMATION SECURITY : guides, standards and frameworks. ent://SD_ILS/0/SD_ILS:549396 2026-02-20T22:22:55Z 2026-02-20T22:22:55Z Yazar&#160;Maleh, Yassine, 1987-&#160;Sahid, Abdelkebir, 1983-&#160;Alazab, Mamoun, 1980-&#160;Belaissaoui, Mustapha, 1968-<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003161998">https://www.taylorfrancis.com/books/9781003161998</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> The security risk assessment handbook : a complete guide for performing security risk assessments ent://SD_ILS/0/SD_ILS:549829 2026-02-20T22:22:55Z 2026-02-20T22:22:55Z Yazar&#160;Landoll, Douglas J., author.<br/>Yer Numaras&#305;&#160;HF5548.37 .L358 2021 EB<br/>Elektronik Eri&#351;im&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003090441">https://www.taylorfrancis.com/books/9781003090441</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Security issues and privacy concerns in Industry 4.0 applications ent://SD_ILS/0/SD_ILS:596945 2026-02-20T22:22:55Z 2026-02-20T22:22:55Z Yazar&#160;David, Shiblin, author.&#160;Anand, R. S., author.&#160;Jeyakrishnan, V., author.&#160;Niranjanamurthy, M., author.<br/>Yer Numaras&#305;&#160;QA76.9 .A25 D38 2021<br/>Elektronik Eri&#351;im&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119776529">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119776529</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Artificial intelligence and data mining approaches in security frameworks ent://SD_ILS/0/SD_ILS:596957 2026-02-20T22:22:55Z 2026-02-20T22:22:55Z Yazar&#160;Bhargava, Neeraj.&#160;Bhargava, Ritu.&#160;Rathore, Pramod Singh, 1988-&#160;Agrawal, Rashmi, 1978-<br/>Yer Numaras&#305;&#160;Q335<br/>Elektronik Eri&#351;im&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119760429">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119760429</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> IT GOVERNANCE AND INFORMATION SECURITY : guides, standards and frameworks. ent://SD_ILS/0/SD_ILS:567328 2026-02-20T22:22:55Z 2026-02-20T22:22:55Z Yazar&#160;Maleh, Yassine, 1987-&#160;Sahid, Abdelkebir, 1983-&#160;Alazab, Mamoun, 1980-&#160;Belaissaoui, Mustapha, 1968-<br/>Yer Numaras&#305;&#160;QA76.9 .A25<br/>Elektronik Eri&#351;im&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003161998">https://www.taylorfrancis.com/books/9781003161998</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Cloud computing security foundations and challenges ent://SD_ILS/0/SD_ILS:580601 2026-02-20T22:22:55Z 2026-02-20T22:22:55Z Yazar&#160;Vacca, John R., editor.<br/>Yer Numaras&#305;&#160;QA76.585<br/>Elektronik Eri&#351;im&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9780429055126">https://www.taylorfrancis.com/books/9780429055126</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Privacy, regulations, and cybersecurity : the essential business guide ent://SD_ILS/0/SD_ILS:596472 2026-02-20T22:22:55Z 2026-02-20T22:22:55Z Yazar&#160;Moschovitis, Christos J. P., author.<br/>Yer Numaras&#305;&#160;HD61.5 .M675 2021 EB<br/>Elektronik Eri&#351;im&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119660156">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119660156</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Cybersecurity and decision makers : data security and digital trust ent://SD_ILS/0/SD_ILS:595943 2026-02-20T22:22:55Z 2026-02-20T22:22:55Z Yazar&#160;Fr&eacute;minville, Marie de, author.<br/>Yer Numaras&#305;&#160;HF5548.37 .F74 2020<br/>Elektronik Eri&#351;im&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119720362">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119720362</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Cybersecurity in humanities and social sciences : a research methods approach ent://SD_ILS/0/SD_ILS:596373 2026-02-20T22:22:55Z 2026-02-20T22:22:55Z Yazar&#160;Loiseau, Hugo, editor.&#160;Ventre, Daniel, editor.&#160;Aden, Hartmut, editor.<br/>Yer Numaras&#305;&#160;QA76.9 .A25<br/>Elektronik Eri&#351;im&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119777588">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119777588</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Tribe of hackers : cybersecurity advice from the best hackers in the world ent://SD_ILS/0/SD_ILS:595418 2026-02-20T22:22:55Z 2026-02-20T22:22:55Z Yazar&#160;Carey, Marcus J. (Cybersecurity professional), author.&#160;Jin, Jennifer, author.<br/>Yer Numaras&#305;&#160;QA76.9 .A25 C37 2019 EB<br/>Elektronik Eri&#351;im&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119643395">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119643395</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Resilience of Cyber-Physical Systems From Risk Modelling to Threat Counteraction ent://SD_ILS/0/SD_ILS:483593 2026-02-20T22:22:55Z 2026-02-20T22:22:55Z Yazar&#160;Flammini, Francesco. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-3-319-95597-1">https://doi.org/10.1007/978-3-319-95597-1</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Frontiers in Cyber Security Second International Conference, FCS 2019, Xi'an, China, November 15&ndash;17, 2019, Proceedings ent://SD_ILS/0/SD_ILS:486019 2026-02-20T22:22:55Z 2026-02-20T22:22:55Z Yazar&#160;Shen, Bazhong. editor.&#160;Wang, Baocang. editor. (orcid)0000-0002-2554-4464&#160;Han, Jinguang. editor. (orcid)0000-0002-4993-9452&#160;Yu, Yong. editor. (orcid)0000-0003-0667-077X&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-981-15-0818-9">https://doi.org/10.1007/978-981-15-0818-9</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Global cyber security labor shortage and international business risk ent://SD_ILS/0/SD_ILS:481810 2026-02-20T22:22:55Z 2026-02-20T22:22:55Z Yazar&#160;Christiansen, Bryan, 1960- editor.&#160;Piekarz, Agnieszka, 1990- editor.&#160;IGI Global, publisher.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-5927-6">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-5927-6</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Advanced methodologies and technologies in system security, information privacy, and forensics ent://SD_ILS/0/SD_ILS:482009 2026-02-20T22:22:55Z 2026-02-20T22:22:55Z Yazar&#160;Khosrow-Pour, Mehdi, 1951- editor.&#160;IGI Global, publisher.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-7492-7">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-7492-7</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Cyber law, privacy, and security : concepts, methodologies, tools, and applications ent://SD_ILS/0/SD_ILS:482239 2026-02-20T22:22:55Z 2026-02-20T22:22:55Z Yazar&#160;IGI Global, publisher.&#160;Information Resources Management Association, editor.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-8897-9">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-8897-9</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Applications and Techniques in Information Security 10th International Conference, ATIS 2019, Thanjavur, India, November 22&ndash;24, 2019, Proceedings ent://SD_ILS/0/SD_ILS:483576 2026-02-20T22:22:55Z 2026-02-20T22:22:55Z Yazar&#160;Shankar Sriram, V. S. editor. (orcid)0000-0001-7870-7944&#160;Subramaniyaswamy, V. editor.&#160;Sasikaladevi, N. editor. (orcid)0000-0002-0841-502X&#160;Zhang, Leo. editor.&#160;Batten, Lynn. editor. (orcid)0000-0003-4525-2423<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-981-15-0871-4">https://doi.org/10.1007/978-981-15-0871-4</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Network security and its impact on business strategy ent://SD_ILS/0/SD_ILS:482213 2026-02-20T22:22:55Z 2026-02-20T22:22:55Z Yazar&#160;Oncioiu, Ionica, 1972- editor.&#160;IGI Global, publisher.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-8455-1">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-8455-1</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Information Security Practice and Experience 15th International Conference, ISPEC 2019, Kuala Lumpur, Malaysia, November 26&ndash;28, 2019, Proceedings ent://SD_ILS/0/SD_ILS:483099 2026-02-20T22:22:55Z 2026-02-20T22:22:55Z Yazar&#160;Heng, Swee-Huay. editor. (orcid)0000-0003-3627-2131&#160;Lopez, Javier. editor. (orcid)0000-0001-8066-9991&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-3-030-34339-2">https://doi.org/10.1007/978-3-030-34339-2</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Critical Infrastructure Security and Resilience Theories, Methods, Tools and Technologies ent://SD_ILS/0/SD_ILS:484275 2026-02-20T22:22:55Z 2026-02-20T22:22:55Z Yazar&#160;Gritzalis, Dimitris. editor.&#160;Theocharidou, Marianthi. editor. (orcid)0000-0002-8870-1746&#160;Stergiopoulos, George. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-3-030-00024-0">https://doi.org/10.1007/978-3-030-00024-0</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Cyber security in parallel and distributed computing : concepts, techniques, applications and case studies ent://SD_ILS/0/SD_ILS:595099 2026-02-20T22:22:55Z 2026-02-20T22:22:55Z Yazar&#160;Le, Dac-Nhuong, 1983- editor.&#160;Kumar, Raghvendra, 1987- editor.&#160;Mishra, Brojo Kishore, 1979- editor.&#160;Khari, Manju, editor.&#160;Chatterjee, Jyotir Moy, editor.<br/>Yer Numaras&#305;&#160;QA76.9 .A25<br/>Elektronik Eri&#351;im&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119488330">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119488330</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Cybersecurity blue team toolkit ent://SD_ILS/0/SD_ILS:595209 2026-02-20T22:22:55Z 2026-02-20T22:22:55Z Yazar&#160;Tanner, Nadean H., author.<br/>Yer Numaras&#305;&#160;QA76.9 .A25 T36 2019 EB<br/>Elektronik Eri&#351;im&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119552963">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119552963</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Versatile Cybersecurity ent://SD_ILS/0/SD_ILS:399974 2026-02-20T22:22:55Z 2026-02-20T22:22:55Z Yazar&#160;Conti, Mauro. editor. (orcid)0000-0002-3612-1934&#160;Somani, Gaurav. editor.&#160;Poovendran, Radha. editor. (orcid)0000-0003-0269-8097&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-3-319-97643-3">https://doi.org/10.1007/978-3-319-97643-3</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Introductory Computer Forensics A Hands-on Practical Approach ent://SD_ILS/0/SD_ILS:398966 2026-02-20T22:22:55Z 2026-02-20T22:22:55Z Yazar&#160;Lin, Xiaodong. author.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-3-030-00581-8">https://doi.org/10.1007/978-3-030-00581-8</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Introduction to Security Reduction ent://SD_ILS/0/SD_ILS:399211 2026-02-20T22:22:55Z 2026-02-20T22:22:55Z Yazar&#160;Guo, Fuchun. author.&#160;Susilo, Willy. author. (orcid)0000-0002-1562-5105&#160;Mu, Yi. author.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-3-319-93049-7">https://doi.org/10.1007/978-3-319-93049-7</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Honeypot Frameworks and Their Applications: A New Framework ent://SD_ILS/0/SD_ILS:399250 2026-02-20T22:22:55Z 2026-02-20T22:22:55Z Yazar&#160;NG, Chee Keong. author.&#160;Pan, Lei. author.&#160;Xiang, Yang. author.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-981-10-7739-5">https://doi.org/10.1007/978-981-10-7739-5</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Research and Practical Issues of Enterprise Information Systems 12th IFIP WG 8.9 Working Conference, CONFENIS 2018, Held at the 24th IFIP World Computer Congress, WCC 2018, Poznan, Poland, September 18&ndash;19, 2018, Proceedings ent://SD_ILS/0/SD_ILS:399694 2026-02-20T22:22:55Z 2026-02-20T22:22:55Z Yazar&#160;Tjoa, A Min. editor. (orcid)0000-0002-8295-9252&#160;Raffai, Maria. editor. (orcid)0000-0001-6934-6366&#160;Doucek, Petr. editor. (orcid)0000-0002-5647-661X&#160;Novak, Niina Maarit. editor. (orcid)0000-0003-4352-7534&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-3-319-99040-8">https://doi.org/10.1007/978-3-319-99040-8</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Security and Privacy in Communication Networks SecureComm 2017 International Workshops, ATCS and SePrIoT, Niagara Falls, ON, Canada, October 22&ndash;25, 2017, Proceedings ent://SD_ILS/0/SD_ILS:400846 2026-02-20T22:22:55Z 2026-02-20T22:22:55Z Yazar&#160;Lin, Xiaodong. editor.&#160;Ghorbani, Ali. editor.&#160;Ren, Kui. editor.&#160;Zhu, Sencun. editor.&#160;Zhang, Aiqing. editor.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-3-319-78816-6">https://doi.org/10.1007/978-3-319-78816-6</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Security and Privacy in Communication Networks 13th International Conference, SecureComm 2017, Niagara Falls, ON, Canada, October 22&ndash;25, 2017, Proceedings ent://SD_ILS/0/SD_ILS:400949 2026-02-20T22:22:55Z 2026-02-20T22:22:55Z Yazar&#160;Lin, Xiaodong. editor.&#160;Ghorbani, Ali. editor.&#160;Ren, Kui. editor.&#160;Zhu, Sencun. editor.&#160;Zhang, Aiqing. editor.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-3-319-78813-5">https://doi.org/10.1007/978-3-319-78813-5</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Trust Management XII 12th IFIP WG 11.11 International Conference, IFIPTM 2018, Toronto, ON, Canada, July 10&ndash;13, 2018, Proceedings ent://SD_ILS/0/SD_ILS:402007 2026-02-20T22:22:55Z 2026-02-20T22:22:55Z Yazar&#160;Gal-Oz, Nurit. editor.&#160;Lewis, Peter R. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-3-319-95276-5">https://doi.org/10.1007/978-3-319-95276-5</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Foundations and Practice of Security 10th International Symposium, FPS 2017, Nancy, France, October 23-25, 2017, Revised Selected Papers ent://SD_ILS/0/SD_ILS:402017 2026-02-20T22:22:55Z 2026-02-20T22:22:55Z Yazar&#160;Imine, Abdessamad. editor.&#160;Fernandez, Jos&eacute; M. editor. (orcid)0000-0001-9836-3595&#160;Marion, Jean-Yves. editor.&#160;Logrippo, Luigi. editor. (orcid)0000-0001-8804-0450&#160;Garcia-Alfaro, Joaquin. editor. (orcid)0000-0002-7453-4393<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-3-319-75650-9">https://doi.org/10.1007/978-3-319-75650-9</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Advanced Hybrid Information Processing First International Conference, ADHIP 2017, Harbin, China, July 17&ndash;18, 2017, Proceedings ent://SD_ILS/0/SD_ILS:402205 2026-02-20T22:22:55Z 2026-02-20T22:22:55Z Yazar&#160;Sun, Guanglu. editor.&#160;Liu, Shuai. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-3-319-73317-3">https://doi.org/10.1007/978-3-319-73317-3</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Cloud Computing, Security, Privacy in New Computing Environments 7th International Conference, CloudComp 2016, and First International Conference, SPNCE 2016, Guangzhou, China, November 25&ndash;26, and December 15&ndash;16, 2016, Proceedings ent://SD_ILS/0/SD_ILS:400508 2026-02-20T22:22:55Z 2026-02-20T22:22:55Z Yazar&#160;Wan, Jiafu. editor.&#160;Lin, Kai. editor.&#160;Zeng, Delu. editor.&#160;Li, Jin. editor.&#160;Xiang, Yang. editor.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-3-319-69605-8">https://doi.org/10.1007/978-3-319-69605-8</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Advanced Monitoring in P2P Botnets A Dual Perspective ent://SD_ILS/0/SD_ILS:400767 2026-02-20T22:22:55Z 2026-02-20T22:22:55Z Yazar&#160;Karuppayah, Shankar. author.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-981-10-9050-9">https://doi.org/10.1007/978-981-10-9050-9</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Mobile Internet Security First International Symposium, MobiSec 2016, Taichung, Taiwan, July 14-15, 2016, Revised Selected Papers ent://SD_ILS/0/SD_ILS:401000 2026-02-20T22:22:55Z 2026-02-20T22:22:55Z Yazar&#160;You, Ilsun. editor.&#160;Leu, Fang-Yie. editor.&#160;Chen, Hsing-Chung. editor.&#160;Kotenko, Igor. editor. (orcid)0000-0001-6859-7120&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-981-10-7850-7">https://doi.org/10.1007/978-981-10-7850-7</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Privacy and Identity Management. The Smart Revolution 12th IFIP WG 9.2, 9.5, 9.6/11.7, 11.6/SIG 9.2.2 International Summer School, Ispra, Italy, September 4-8, 2017, Revised Selected Papers ent://SD_ILS/0/SD_ILS:401491 2026-02-20T22:22:55Z 2026-02-20T22:22:55Z Yazar&#160;Hansen, Marit. editor.&#160;Kosta, Eleni. editor.&#160;Nai-Fovino, Igor. editor.&#160;Fischer-H&uuml;bner, Simone. editor. (orcid)0000-0002-6938-4466&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-3-319-92925-5">https://doi.org/10.1007/978-3-319-92925-5</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Future Network Systems and Security 4th International Conference, FNSS 2018, Paris, France, July 9&ndash;11, 2018, Proceedings ent://SD_ILS/0/SD_ILS:401734 2026-02-20T22:22:55Z 2026-02-20T22:22:55Z Yazar&#160;Doss, Robin. editor. (orcid)0000-0001-6143-6850&#160;Piramuthu, Selwyn. editor.&#160;Zhou, Wei. editor. (orcid)0000-0002-9965-9870&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-3-319-94421-0">https://doi.org/10.1007/978-3-319-94421-0</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Big Data Technologies for Monitoring of Computer Security: A Case Study of the Russian Federation ent://SD_ILS/0/SD_ILS:401907 2026-02-20T22:22:55Z 2026-02-20T22:22:55Z Yazar&#160;Petrenko, Sergei. author.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-3-319-79036-7">https://doi.org/10.1007/978-3-319-79036-7</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Digital Forensics and Cyber Crime 9th International Conference, ICDF2C 2017, Prague, Czech Republic, October 9-11, 2017, Proceedings ent://SD_ILS/0/SD_ILS:401948 2026-02-20T22:22:55Z 2026-02-20T22:22:55Z Yazar&#160;Matou&scaron;ek, Petr. editor.&#160;Schmiedecker, Martin. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-3-319-73697-6">https://doi.org/10.1007/978-3-319-73697-6</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Network Intrusion Detection using Deep Learning A Feature Learning Approach ent://SD_ILS/0/SD_ILS:399859 2026-02-20T22:22:55Z 2026-02-20T22:22:55Z Yazar&#160;Kim, Kwangjo. author.&#160;Aminanto, Muhamad Erza. author.&#160;Tanuwidjaja, Harry Chandra. author.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-981-13-1444-5">https://doi.org/10.1007/978-981-13-1444-5</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Information security fundamentals ent://SD_ILS/0/SD_ILS:539922 2026-02-20T22:22:55Z 2026-02-20T22:22:55Z Yazar&#160;Peltier, Thomas R.<br/>Yer Numaras&#305;&#160;QA76.9 .A25<br/>Elektronik Eri&#351;im&#160;<a href="https://www.taylorfrancis.com/books/9780429130281">Taylor & Francis eBooks</a> Taylor & Francis <a href="https://www.taylorfrancis.com/books/9780429130281">https://www.taylorfrancis.com/books/9780429130281</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Unauthorized Access : The Crisis in Online Privacy and Security. ent://SD_ILS/0/SD_ILS:543688 2026-02-20T22:22:55Z 2026-02-20T22:22:55Z Yazar&#160;Sloan, Robert, author.&#160;CRC Press LLC.<br/>Yer Numaras&#305;&#160;TK5105.878 .S59 2017<br/>Elektronik Eri&#351;im&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9780429093791">https://www.taylorfrancis.com/books/9780429093791</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> SECURITY STRATEGY : from requirements to reality. ent://SD_ILS/0/SD_ILS:545098 2026-02-20T22:22:55Z 2026-02-20T22:22:55Z Yazar&#160;STACKPOLE, BILL.<br/>Yer Numaras&#305;&#160;QA76.9 .A25<br/>Elektronik Eri&#351;im&#160;<a href="https://www.taylorfrancis.com/books/9780429152160">Taylor & Francis eBooks</a> Taylor & Francis <a href="https://www.taylorfrancis.com/books/9780429152160">https://www.taylorfrancis.com/books/9780429152160</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> DNS security management ent://SD_ILS/0/SD_ILS:593802 2026-02-20T22:22:55Z 2026-02-20T22:22:55Z Yazar&#160;Dooley, Michael, 1962- author.&#160;Rooney, Timothy, 1962- author.<br/>Yer Numaras&#305;&#160;QA76.9 .A25<br/>Elektronik Eri&#351;im&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119328292">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119328292</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Mobile data loss : threats and countermeasures ent://SD_ILS/0/SD_ILS:458729 2026-02-20T22:22:55Z 2026-02-20T22:22:55Z Yazar&#160;Raggo, Michael T.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="https://www.sciencedirect.com/science/book/9780128028643">https://www.sciencedirect.com/science/book/9780128028643</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Hardware security : design, threats, and safeguards ent://SD_ILS/0/SD_ILS:543620 2026-02-20T22:22:55Z 2026-02-20T22:22:55Z Yazar&#160;Mukhopadhyay, Debdeep, author.&#160;Subhra, Rajat, author.<br/>Yer Numaras&#305;&#160;QA76.9 .A25 M85 2015<br/>Elektronik Eri&#351;im&#160;<a href="https://www.taylorfrancis.com/books/9781439895849">Click here to view.</a><br/>Format:&#160;Kitap<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Measuring and managing information risk : a FAIR approach ent://SD_ILS/0/SD_ILS:355576 2026-02-20T22:22:55Z 2026-02-20T22:22:55Z Yazar&#160;Freund, Jack, author.&#160;Jones, Jack, author.<br/>Yer Numaras&#305;&#160;ONLINE(355576.1)<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780124202313">http://www.sciencedirect.com/science/book/9780124202313</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Security without obscurity : a guide to confidentiality, authentication, and integrity ent://SD_ILS/0/SD_ILS:544118 2026-02-20T22:22:55Z 2026-02-20T22:22:55Z Yazar&#160;Stapleton, Jeffrey James, author.<br/>Yer Numaras&#305;&#160;QA76.9 .A25 S734 2014<br/>Elektronik Eri&#351;im&#160;<a href="https://www.taylorfrancis.com/books/9781466592155">Click here to view.</a><br/>Format:&#160;Kitap<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> PRAGMATIC security metrics : applying metametrics to information security ent://SD_ILS/0/SD_ILS:541797 2026-02-20T22:22:55Z 2026-02-20T22:22:55Z Yazar&#160;Brotby, W. Krag., author.&#160;Hinson, Gary.&#160;Kabay, Michel E.<br/>Yer Numaras&#305;&#160;HD30.38 .B76 2013<br/>Elektronik Eri&#351;im&#160;<a href="https://www.taylorfrancis.com/books/9781439881538">Click here to view.</a><br/>Format:&#160;Kitap<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Information security policy development for compliance : ISO/IEC 27001, NIST SP 800-53, HIPAA standard, PCI DSS V2.0, and AUP V5.0 ent://SD_ILS/0/SD_ILS:545128 2026-02-20T22:22:55Z 2026-02-20T22:22:55Z Yazar&#160;Williams, Barry L., author.<br/>Yer Numaras&#305;&#160;QA76.9 .A25 .W5495 2013<br/>Elektronik Eri&#351;im&#160;<a href="https://www.taylorfrancis.com/books/9781466580596">Click here to view.</a><br/>Format:&#160;Kitap<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> The complete guide to physical security ent://SD_ILS/0/SD_ILS:545960 2026-02-20T22:22:55Z 2026-02-20T22:22:55Z Yazar&#160;Baker, Paul, 1958, author.&#160;Benny, Daniel J.<br/>Yer Numaras&#305;&#160;HV8290 .B34 2013<br/>Elektronik Eri&#351;im&#160;<a href="https://www.taylorfrancis.com/books/9781420099645">Click here to view.</a><br/>Format:&#160;Kitap<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> The complete book of data anonymization : from planning to implementation ent://SD_ILS/0/SD_ILS:540169 2026-02-20T22:22:55Z 2026-02-20T22:22:55Z Yazar&#160;Raghunathan, Balaji., author.<br/>Yer Numaras&#305;&#160;QA76.9 .A25 R338 2013<br/>Elektronik Eri&#351;im&#160;<a href="https://www.taylorfrancis.com/books/9781439877319">Click here to view.</a><br/>Format:&#160;Kitap<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Data hiding exposing concealed data in multimedia, operating systems, mobile devices and network protocols ent://SD_ILS/0/SD_ILS:147602 2026-02-20T22:22:55Z 2026-02-20T22:22:55Z Yazar&#160;Raggo, Michael T.&#160;Hosmer, Chet.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597497435">http://www.sciencedirect.com/science/book/9781597497435</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Security de-engineering : solving the problems in information risk management ent://SD_ILS/0/SD_ILS:545608 2026-02-20T22:22:55Z 2026-02-20T22:22:55Z Yazar&#160;Tibble, Ian., author.<br/>Yer Numaras&#305;&#160;HF5548.37 .T53 2011<br/>Elektronik Eri&#351;im&#160;<a href="https://www.taylorfrancis.com/books/9781439868355">Click here to view.</a><br/>Format:&#160;Kitap<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Security information and event management (SIEM) implementation ent://SD_ILS/0/SD_ILS:293279 2026-02-20T22:22:55Z 2026-02-20T22:22:55Z Yazar&#160;Miller, David, 1959 Nov. 5-&#160;Harris, Shon.&#160;Harper, Allen.&#160;VanDyke, Stephen.&#160;Blask, Chris.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://mhebooklibrary.com/reader/security-information-event-management-siem-implementation">Subscription required</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> The security risk assessment handbook : a complete guide for performing security risk assessments ent://SD_ILS/0/SD_ILS:539743 2026-02-20T22:22:55Z 2026-02-20T22:22:55Z Yazar&#160;Landoll, Douglas J., author.<br/>Yer Numaras&#305;&#160;HF5548.37 .L358 2011<br/>Elektronik Eri&#351;im&#160;<a href="https://www.taylorfrancis.com/books/9781439821497">Click here to view.</a><br/>Format:&#160;Kitap<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Security and policy driven computing ent://SD_ILS/0/SD_ILS:539761 2026-02-20T22:22:55Z 2026-02-20T22:22:55Z Yazar&#160;Liu, Lei, 1968, author.<br/>Yer Numaras&#305;&#160;QA76.9 .A25 L587 2011<br/>Elektronik Eri&#351;im&#160;<a href="https://www.taylorfrancis.com/books/9781439825808">Click here to view.</a><br/>Format:&#160;Kitap<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Engineering information security the application of systems engineering concepts to achieve information assurance ent://SD_ILS/0/SD_ILS:249916 2026-02-20T22:22:55Z 2026-02-20T22:22:55Z Yazar&#160;Jacobs, Stuart.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;IEEE Xplore <a href="http://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=6047604">http://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=6047604</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Security in computing ent://SD_ILS/0/SD_ILS:313297 2026-02-20T22:22:55Z 2026-02-20T22:22:55Z Yazar&#160;Pfleeger, Charles P., 1948-<br/>Yer Numaras&#305;&#160;QA76.9 A25 P45 2011<br/>Format:&#160;Kitap<br/>Durum&#160;Beytepe K&uuml;t&uuml;phanesi~1<br/> Oracle Fusion middleware 11g architecture and management ent://SD_ILS/0/SD_ILS:293252 2026-02-20T22:22:55Z 2026-02-20T22:22:55Z Yazar&#160;Shafii, Reza.&#160;Lee, Stephen, 1975 June 8-&#160;Konduri, Gangadhar.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://mhebooklibrary.com/reader/oracle-fusion-middleware-11g-architecture-management">Subscription required</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> IT auditing using controls to protect information assets ent://SD_ILS/0/SD_ILS:293262 2026-02-20T22:22:55Z 2026-02-20T22:22:55Z Yazar&#160;Davis, Chris (Christopher Michael)&#160;Schiller, Mike.&#160;Wheeler, Kevin.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://mhebooklibrary.com/reader/auditing-using-controls-to-protect-information-assets-2nd-edition">Subscription required</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Information technology risk management in enterprise environments a review of industry practices and a practical guide to risk management teams ent://SD_ILS/0/SD_ILS:297862 2026-02-20T22:22:55Z 2026-02-20T22:22:55Z Yazar&#160;Kouns, Jake.&#160;Minoli, Daniel, 1952-&#160;Wiley InterScience (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;John Wiley <a href="http://dx.doi.org/10.1002/9780470558133">http://dx.doi.org/10.1002/9780470558133</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> The executive MBA in information security ent://SD_ILS/0/SD_ILS:539948 2026-02-20T22:22:55Z 2026-02-20T22:22:55Z Yazar&#160;Trinckes, John J., author.<br/>Yer Numaras&#305;&#160;HF5548.37 .T75 2010<br/>Elektronik Eri&#351;im&#160;<a href="https://www.taylorfrancis.com/books/9781439810088">Click here to view.</a><br/>Format:&#160;Kitap<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> CISO soft skills : securing organizations impaired by employee politics, apathy, and intolerant perspectives ent://SD_ILS/0/SD_ILS:544153 2026-02-20T22:22:55Z 2026-02-20T22:22:55Z Yazar&#160;Collette, Ronald D., author.&#160;Gentile, Michael.&#160;Gentile, Skye.<br/>Yer Numaras&#305;&#160;HF5548.37 .G462 2009<br/>Elektronik Eri&#351;im&#160;<a href="https://www.taylorfrancis.com/books/9781420089110">Click here to view.</a><br/>Format:&#160;Kitap<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Information security management metrics : a definitive guide to effective security monitoring and measurement ent://SD_ILS/0/SD_ILS:546952 2026-02-20T22:22:55Z 2026-02-20T22:22:55Z Yazar&#160;Brotby, W. Krag., author.<br/>Yer Numaras&#305;&#160;HD30.2 .B78 2009<br/>Elektronik Eri&#351;im&#160;<a href="https://www.taylorfrancis.com/books/9781420052862">Click here to view.</a><br/>Format:&#160;Kitap<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Information assurance architecture ent://SD_ILS/0/SD_ILS:539830 2026-02-20T22:22:55Z 2026-02-20T22:22:55Z Yazar&#160;Willett, Keith D., author.<br/>Yer Numaras&#305;&#160;QA76.9 .A25 W5487 2008<br/>Elektronik Eri&#351;im&#160;<a href="https://www.taylorfrancis.com/books/9780849380686">Click here to view.</a><br/>Format:&#160;Kitap<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Insider computer fraud : an in-depth framework for detecting and defending against insider IT attacks ent://SD_ILS/0/SD_ILS:544396 2026-02-20T22:22:55Z 2026-02-20T22:22:55Z Yazar&#160;Brancik, Kenneth C., author.<br/>Yer Numaras&#305;&#160;QA76.9 .A25 B725 2008<br/>Elektronik Eri&#351;im&#160;<a href="https://www.taylorfrancis.com/books/9781420046601">Click here to view.</a><br/>Format:&#160;Kitap<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Digital privacy : theory, technologies, and practices ent://SD_ILS/0/SD_ILS:547774 2026-02-20T22:22:55Z 2026-02-20T22:22:55Z Yazar&#160;Acquisti, Alessandro.<br/>Yer Numaras&#305;&#160;QA76.9 .A25 D528 2008<br/>Elektronik Eri&#351;im&#160;<a href="https://www.taylorfrancis.com/books/9781420052183">Click here to view.</a><br/>Format:&#160;Kitap<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Infosecurity 2008 threat analysis ent://SD_ILS/0/SD_ILS:145541 2026-02-20T22:22:55Z 2026-02-20T22:22:55Z Yazar&#160;Clark, Champ, III.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492249">http://www.sciencedirect.com/science/book/9781597492249</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Digital watermarking and steganography ent://SD_ILS/0/SD_ILS:146474 2026-02-20T22:22:55Z 2026-02-20T22:22:55Z Yazar&#160;Cox, I. J. (Ingemar J.)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780123725851">http://www.sciencedirect.com/science/book/9780123725851</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Information security : design, implementation, measurement, and compliance ent://SD_ILS/0/SD_ILS:545839 2026-02-20T22:22:55Z 2026-02-20T22:22:55Z Yazar&#160;Layton, Timothy P., author.<br/>Yer Numaras&#305;&#160;HF5548.37 .L393 2007<br/>Elektronik Eri&#351;im&#160;<a href="https://www.taylorfrancis.com/books/9781420013412">Click here to view.</a><br/>Format:&#160;Kitap<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Security in computing ent://SD_ILS/0/SD_ILS:110682 2026-02-20T22:22:55Z 2026-02-20T22:22:55Z Yazar&#160;Pfleeger, Charles P., 1948-<br/>Yer Numaras&#305;&#160;QA76.9.A25 P45 2007<br/>Format:&#160;Kitap<br/>Durum&#160;Beytepe K&uuml;t&uuml;phanesi~1<br/> FISMA certification &amp; accreditation handbook ent://SD_ILS/0/SD_ILS:112169 2026-02-20T22:22:55Z 2026-02-20T22:22:55Z Yazar&#160;Taylor, Laura.&#160;Shepherd, Matthew.&#160;ScienceDirect (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491167">An electronic book accessible through the World Wide Web; click for information</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> FISMA certification &amp; accreditation handbook ent://SD_ILS/0/SD_ILS:145876 2026-02-20T22:22:55Z 2026-02-20T22:22:55Z Yazar&#160;Taylor, Laura.&#160;Shepherd, Matthew.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491167">http://www.sciencedirect.com/science/book/9781597491167</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> The security risk assessment handbook : a complete guide for performing security risk assessments ent://SD_ILS/0/SD_ILS:545167 2026-02-20T22:22:55Z 2026-02-20T22:22:55Z Yazar&#160;Landoll, Douglas J., author.<br/>Yer Numaras&#305;&#160;HF5548.37 .L358 2006<br/>Elektronik Eri&#351;im&#160;<a href="https://www.taylorfrancis.com/books/9781420031232">Click here to view.</a><br/>Format:&#160;Kitap<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> The CISO handbook : a practical guide to securing your company ent://SD_ILS/0/SD_ILS:539204 2026-02-20T22:22:55Z 2026-02-20T22:22:55Z Yazar&#160;Gentile, Michael., author.&#160;Collette, Ronald D.&#160;August, Thomas D.<br/>Yer Numaras&#305;&#160;HF5548.37 .G46 2006<br/>Elektronik Eri&#351;im&#160;<a href="https://www.taylorfrancis.com/books/9781420031379">Click here to view.</a><br/>Format:&#160;Kitap<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Insider threat protecting the enterprise from sabotage, spying, and theft ent://SD_ILS/0/SD_ILS:253661 2026-02-20T22:22:55Z 2026-02-20T22:22:55Z Yazar&#160;Cole, Eric.&#160;Ring, Sandra.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;Volltext <a href="http://www.sciencedirect.com/science/book/9781597490481">http://www.sciencedirect.com/science/book/9781597490481</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Assessing and managing security risk in IT systems : a structured methodology ent://SD_ILS/0/SD_ILS:542250 2026-02-20T22:22:55Z 2026-02-20T22:22:55Z Yazar&#160;McCumber, John, 1956, author.<br/>Yer Numaras&#305;&#160;QA76.9 .A25 M4284 2005<br/>Elektronik Eri&#351;im&#160;<a href="https://www.taylorfrancis.com/books/9781135488970">Click here to view.</a><br/>Format:&#160;Kitap<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Information security fundamentals ent://SD_ILS/0/SD_ILS:545226 2026-02-20T22:22:55Z 2026-02-20T22:22:55Z Yazar&#160;Peltier, Thomas R., author.&#160;Peltier, Justin.&#160;Blackley, John A.<br/>Yer Numaras&#305;&#160;QA76.9 .A25 P427 2005<br/>Elektronik Eri&#351;im&#160;<a href="https://www.taylorfrancis.com/books/9781135493738">Click here to view.</a><br/>Format:&#160;Kitap<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> A practical guide to security assessments ent://SD_ILS/0/SD_ILS:545277 2026-02-20T22:22:55Z 2026-02-20T22:22:55Z Yazar&#160;Kairab, Sudhanshu., author.<br/>Yer Numaras&#305;&#160;HF5548.32 .K345 2005<br/>Elektronik Eri&#351;im&#160;<a href="https://www.taylorfrancis.com/books/9781135500313">Click here to view.</a><br/>Format:&#160;Kitap<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Cryptography, information theory, and error-correction : a handbook for the 21st century ent://SD_ILS/0/SD_ILS:593044 2026-02-20T22:22:55Z 2026-02-20T22:22:55Z Yazar&#160;Bruen, Aiden A., 1941-&#160;Forcinito, Mario, 1962-<br/>Yer Numaras&#305;&#160;QA76.9 .A25 B79 2005<br/>Elektronik Eri&#351;im&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781118033296">https://onlinelibrary.wiley.com/doi/book/10.1002/9781118033296</a> <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119582397">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119582397</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Building a global information assurance program ent://SD_ILS/0/SD_ILS:543357 2026-02-20T22:22:55Z 2026-02-20T22:22:55Z Yazar&#160;Curts, Raymond J., author.&#160;Campbell, Douglas E., 1954- author.<br/>Yer Numaras&#305;&#160;QA76.9 .A25<br/>Elektronik Eri&#351;im&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9780429225215">https://www.taylorfrancis.com/books/9780429225215</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Implementing database security and auditing a guide for DBAs, information security administrators and auditors ent://SD_ILS/0/SD_ILS:253860 2026-02-20T22:22:55Z 2026-02-20T22:22:55Z Yazar&#160;Ben-Natan, Ron.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781555583347">http://www.sciencedirect.com/science/book/9781555583347</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Investigator's guide to steganography ent://SD_ILS/0/SD_ILS:541281 2026-02-20T22:22:55Z 2026-02-20T22:22:55Z Yazar&#160;Kipper, Gregory., author.<br/>Yer Numaras&#305;&#160;QA76.9 .A25 K544 2004<br/>Elektronik Eri&#351;im&#160;<a href="https://www.taylorfrancis.com/books/9780203504765">Click here to view.</a><br/>Format:&#160;Kitap<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Information security policies and procedures : a practitioner's reference ent://SD_ILS/0/SD_ILS:547228 2026-02-20T22:22:55Z 2026-02-20T22:22:55Z Yazar&#160;Peltier, Thomas R., author.<br/>Yer Numaras&#305;&#160;QA76.9 .A25 P428 2004<br/>Elektronik Eri&#351;im&#160;<a href="https://www.taylorfrancis.com/books/9780203488737">Click here to view.</a><br/>Format:&#160;Kitap<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> A practical guide to security engineering and information assurance ent://SD_ILS/0/SD_ILS:544973 2026-02-20T22:22:55Z 2026-02-20T22:22:55Z Yazar&#160;Herrmann, Debra S., author.<br/>Yer Numaras&#305;&#160;QA76.9 .A25 H47 2002<br/>Elektronik Eri&#351;im&#160;<a href="https://www.taylorfrancis.com/books/9781420031492">Click here to view.</a><br/>Format:&#160;Kitap<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Information security policies, procedures, and standards : guidelines for effective information security management ent://SD_ILS/0/SD_ILS:546817 2026-02-20T22:22:55Z 2026-02-20T22:22:55Z Yazar&#160;Peltier, Thomas R., author.<br/>Yer Numaras&#305;&#160;QA76.9 .A25 P46 2002<br/>Elektronik Eri&#351;im&#160;<a href="https://www.taylorfrancis.com/books/9780849390326">Click here to view.</a><br/>Format:&#160;Kitap<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Technology and privacy : the new landscape ent://SD_ILS/0/SD_ILS:112999 2026-02-20T22:22:55Z 2026-02-20T22:22:55Z Yazar&#160;Agre, Philip.&#160;Rotenberg, Marc.<br/>Yer Numaras&#305;&#160;QA76.9.A25 T43 2001<br/>Format:&#160;Kitap<br/>Durum&#160;Beytepe K&uuml;t&uuml;phanesi~1<br/> Digital watermarking ent://SD_ILS/0/SD_ILS:253889 2026-02-20T22:22:55Z 2026-02-20T22:22:55Z Yazar&#160;Cox, I. J. (Ingemar J.)&#160;Miller, Matthew L.&#160;Bloom, Jeffrey A. (Jeffrey Adam), 1964-<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781558607149">http://www.sciencedirect.com/science/book/9781558607149</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Data privacy in the information age ent://SD_ILS/0/SD_ILS:135125 2026-02-20T22:22:55Z 2026-02-20T22:22:55Z Yazar&#160;Klosek, Jacqueline.<br/>Yer Numaras&#305;&#160;QA76.9.A25 K57 2000<br/>Format:&#160;Kitap<br/>Durum&#160;Beytepe K&uuml;t&uuml;phanesi~1<br/>