Arama Sonuçları R. - Daraltılmış: Computer security.SirsiDynix Enterprisehttps://katalog.hacettepe.edu.tr/client/tr_TR/default_tr/default_tr/qu$003dR.$0026qf$003dSUBJECT$002509Konu$002509Computer$002bsecurity.$002509Computer$002bsecurity.$0026ic$003dtrue$0026ps$003d300?2025-12-11T04:05:32ZRecent Trends in Image Processing and Pattern Recognition Second International Conference, RTIP2R 2018, Solapur, India, December 21–22, 2018, Revised Selected Papers, Part IIIent://SD_ILS/0/SD_ILS:4832852025-12-11T04:05:32Z2025-12-11T04:05:32ZYazar Santosh, K. C. editor. Hegadi, Ravindra S. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-981-13-9187-3">https://doi.org/10.1007/978-981-13-9187-3</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Cloud Computing Challenges, Limitations and R&D Solutionsent://SD_ILS/0/SD_ILS:4877472025-12-11T04:05:32Z2025-12-11T04:05:32ZYazar Mahmood, Zaigham. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-319-10530-7">https://doi.org/10.1007/978-3-319-10530-7</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Information security fundamentalsent://SD_ILS/0/SD_ILS:5399222025-12-11T04:05:32Z2025-12-11T04:05:32ZYazar Peltier, Thomas R.<br/>Yer Numarası QA76.9 .A25<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9780429130281">Taylor & Francis eBooks</a>
Taylor & Francis <a href="https://www.taylorfrancis.com/books/9780429130281">https://www.taylorfrancis.com/books/9780429130281</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Aggressive network self-defenseent://SD_ILS/0/SD_ILS:2536722025-12-11T04:05:32Z2025-12-11T04:05:32ZYazar Wyler, Neil R.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836203">http://www.sciencedirect.com/science/book/9781931836203</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>IT audit, control, and securityent://SD_ILS/0/SD_ILS:3040082025-12-11T04:05:32Z2025-12-11T04:05:32ZYazar Moeller, Robert R.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim Wiley InterScience <a href="http://dx.doi.org/10.1002/9781118269138">An electronic book accessible through the World Wide Web; click for information</a>
Ebook Library <a href="http://public.eblib.com/EBLPublic/PublicView.do?ptiID=624573">http://public.eblib.com/EBLPublic/PublicView.do?ptiID=624573</a>
Books24x7 <a href="http://www.books24x7.com/marc.asp?bookid=40717">http://www.books24x7.com/marc.asp?bookid=40717</a>
<a href="http://site.ebrary.com/lib/alltitles/Doc?id=10469768">http://site.ebrary.com/lib/alltitles/Doc?id=10469768</a>
<a href="http://swb.eblib.com/patron/FullRecord.aspx?p=624573">http://swb.eblib.com/patron/FullRecord.aspx?p=624573</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Public key infrastructure : building trusted applications and Web servicesent://SD_ILS/0/SD_ILS:5432812025-12-11T04:05:32Z2025-12-11T04:05:32ZYazar Vacca, John R.<br/>Yer Numarası QA76.9 .A25 P85 2004<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9780203498156">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>Information security fundamentalsent://SD_ILS/0/SD_ILS:5452262025-12-11T04:05:32Z2025-12-11T04:05:32ZYazar Peltier, Thomas R., author. Peltier, Justin. Blackley, John A.<br/>Yer Numarası QA76.9 .A25 P427 2005<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9781135493738">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>Speech Enhancement Techniques for Digital Hearing Aidsent://SD_ILS/0/SD_ILS:4828022025-12-11T04:05:32Z2025-12-11T04:05:32ZYazar Borisagar, Komal R. author. Thanki, Rohit M. author. (orcid)0000-0002-0645-6266 Sedani, Bhavin S. author. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-319-96821-6">https://doi.org/10.1007/978-3-319-96821-6</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Handbook of system safety and security : cyber risk and risk management, cyber security, threat analysis, functional safety, software systems, and cyber physical systemsent://SD_ILS/0/SD_ILS:4591452025-12-11T04:05:32Z2025-12-11T04:05:32ZYazar Griffor, Edward R., editor.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128037737">http://www.sciencedirect.com/science/book/9780128037737</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Honeypot : a new paradigm to information securityent://SD_ILS/0/SD_ILS:5455902025-12-11T04:05:32Z2025-12-11T04:05:32ZYazar Joshi, R. C., author. Sardana, Anjali.<br/>Yer Numarası QA76.9 .A25 J66 2011<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9781439869994">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>Information security risk analysisent://SD_ILS/0/SD_ILS:5387132025-12-11T04:05:32Z2025-12-11T04:05:32ZYazar Peltier, Thomas R., author.<br/>Yer Numarası QA76.9 .A25 P429 2010<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9781439839577">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>Information security risk analysisent://SD_ILS/0/SD_ILS:5448212025-12-11T04:05:32Z2025-12-11T04:05:32ZYazar Peltier, Thomas R., author.<br/>Yer Numarası QA76.9 .A25 P429 2005<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9781420031195">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>Information security policies and procedures : a practitioner's referenceent://SD_ILS/0/SD_ILS:5472282025-12-11T04:05:32Z2025-12-11T04:05:32ZYazar Peltier, Thomas R., author.<br/>Yer Numarası QA76.9 .A25 P428 2004<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9780203488737">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>Hack proofing your networkent://SD_ILS/0/SD_ILS:2536182025-12-11T04:05:32Z2025-12-11T04:05:32ZYazar Ahmad, David R. Mirza. Russell, Ryan, 1969-<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781928994701">http://www.sciencedirect.com/science/book/9781928994701</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Information security policies, procedures, and standards : guidelines for effective information security managementent://SD_ILS/0/SD_ILS:5468172025-12-11T04:05:32Z2025-12-11T04:05:32ZYazar Peltier, Thomas R., author.<br/>Yer Numarası QA76.9 .A25 P46 2002<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9780849390326">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>Securing the cloud cloud computer security techniques and tacticsent://SD_ILS/0/SD_ILS:1489802025-12-11T04:05:32Z2025-12-11T04:05:32ZYazar Winkler, J. R. (Joachim R.)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495929">http://www.sciencedirect.com/science/book/9781597495929</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Securing e-business applications and communicationsent://SD_ILS/0/SD_ILS:5458212025-12-11T04:05:32Z2025-12-11T04:05:32ZYazar Held, Jonathan S., author. Bowers, John R.<br/>Yer Numarası QA76.9 .A25 H435 2001<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9781420031553">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>Trust Management XII 12th IFIP WG 11.11 International Conference, IFIPTM 2018, Toronto, ON, Canada, July 10–13, 2018, Proceedingsent://SD_ILS/0/SD_ILS:4020072025-12-11T04:05:32Z2025-12-11T04:05:32ZYazar Gal-Oz, Nurit. editor. Lewis, Peter R. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-319-95276-5">https://doi.org/10.1007/978-3-319-95276-5</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Trust, Privacy and Security in Digital Business 16th International Conference, TrustBus 2019, Linz, Austria, August 26–29, 2019, Proceedingsent://SD_ILS/0/SD_ILS:4863182025-12-11T04:05:32Z2025-12-11T04:05:32ZYazar Gritzalis, Stefanos. editor. Weippl, Edgar R. editor. Katsikas, Sokratis K. editor. (orcid)0000-0003-2966-9683 Anderst-Kotsis, Gabriele. editor. Tjoa, A Min. editor. (orcid)0000-0002-8295-9252<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-030-27813-7">https://doi.org/10.1007/978-3-030-27813-7</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Deep Learning in Medical Image Analysis and Multimodal Learning for Clinical Decision Support 4th International Workshop, DLMIA 2018, and 8th International Workshop, ML-CDS 2018, Held in Conjunction with MICCAI 2018, Granada, Spain, September 20, 2018, Proceedingsent://SD_ILS/0/SD_ILS:4005752025-12-11T04:05:32Z2025-12-11T04:05:32ZYazar Stoyanov, Danail. editor. Taylor, Zeike. editor. Carneiro, Gustavo. editor. (orcid)0000-0002-5571-6220 Syeda-Mahmood, Tanveer. editor. Martel, Anne. editor.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-030-00889-5">https://doi.org/10.1007/978-3-030-00889-5</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Proceedings of International Symposium on Sensor Networks, Systems and Security Advances in Computing and Networking with Applicationsent://SD_ILS/0/SD_ILS:4000162025-12-11T04:05:32Z2025-12-11T04:05:32ZYazar Rao, Nageswara S.V. editor. Brooks, Richard R. editor. Wu, Chase Q. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-319-75683-7">https://doi.org/10.1007/978-3-319-75683-7</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Computational Intelligence, Cyber Security and Computational Models Proceedings of ICC3, 2013ent://SD_ILS/0/SD_ILS:4888842025-12-11T04:05:32Z2025-12-11T04:05:32ZYazar Krishnan, G. Sai Sundara. editor. Anitha, R. editor. Lekshmi, R. S. editor. Kumar, M. Senthil. editor. Bonato, Anthony. editor.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-81-322-1680-3">https://doi.org/10.1007/978-81-322-1680-3</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Hack proofing Sun Solaris 8ent://SD_ILS/0/SD_ILS:2540472025-12-11T04:05:32Z2025-12-11T04:05:32ZYazar Miles, Wyman. Mitchell, Ed, 1945- Lynch, F. William. Cook, Randy (Randy R.)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781928994442">http://www.sciencedirect.com/science/book/9781928994442</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>The complete book of data anonymization : from planning to implementationent://SD_ILS/0/SD_ILS:5401692025-12-11T04:05:32Z2025-12-11T04:05:32ZYazar Raghunathan, Balaji., author.<br/>Yer Numarası QA76.9 .A25 R338 2013<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9781439877319">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>