Arama Sonuçları S. - Daraltılmış: Computer security.SirsiDynix Enterprisehttps://katalog.hacettepe.edu.tr/client/tr_TR/default_tr/default_tr/qu$003dS.$0026qf$003dSUBJECT$002509Konu$002509Computer$002bsecurity.$002509Computer$002bsecurity.$0026ps$003d300$0026isd$003dtrue?2024-12-01T20:58:42ZPenetration tester's open source toolkitent://SD_ILS/0/SD_ILS:2536762024-12-01T20:58:42Z2024-12-01T20:58:42ZYazar Long, Johnny.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490214">http://www.sciencedirect.com/science/book/9781597490214</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Investigator's guide to steganographyent://SD_ILS/0/SD_ILS:2864022024-12-01T20:58:42Z2024-12-01T20:58:42ZYazar Kipper, Gregory.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://marc.crcnetbase.com/isbn/9780203504765">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Web application security a beginner's guideent://SD_ILS/0/SD_ILS:2932412024-12-01T20:58:42Z2024-12-01T20:58:42ZYazar Sullivan, Bryan, 1974- Liu, Vincent.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://mhebooklibrary.com/reader/web-application-security-beginners-guide">Subscription required</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Developer's guide to web application securityent://SD_ILS/0/SD_ILS:3064642024-12-01T20:58:42Z2024-12-01T20:58:42ZYazar Cross, Michael, 1965-<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490610">http://www.sciencedirect.com/science/book/9781597490610</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Developer's guide to web application securityent://SD_ILS/0/SD_ILS:1476642024-12-01T20:58:42Z2024-12-01T20:58:42ZYazar Cross, Michael, 1965-<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490610">http://www.sciencedirect.com/science/book/9781597490610</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Applied Cryptography and Network Security Workshops ACNS 2019 Satellite Workshops, SiMLA, Cloud S&P, AIBlock, and AIoTS, Bogota, Colombia, June 5–7, 2019, Proceedingsent://SD_ILS/0/SD_ILS:4840472024-12-01T20:58:42Z2024-12-01T20:58:42ZYazar Zhou, Jianying. editor. (orcid)0000-0003-0594-0432 Deng, Robert. editor. (orcid)0000-0003-3491-8146 Li, Zhou. editor. Majumdar, Suryadipta. editor. (orcid)0000-0002-6501-4214 Meng, Weizhi. editor. (orcid)0000-0003-4384-5786<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-030-29729-9">https://doi.org/10.1007/978-3-030-29729-9</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Topics in Cryptology -- CT-RSA 2014 The Cryptographer's Track at the RSA Conference 2014, San Francisco, CA, USA, February 25-28, 2014, Proceedingsent://SD_ILS/0/SD_ILS:4890052024-12-01T20:58:42Z2024-12-01T20:58:42ZYazar Benaloh, Josh. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-319-04852-9">https://doi.org/10.1007/978-3-319-04852-9</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>The hacker's guide to OS X exploiting OS X from the root upent://SD_ILS/0/SD_ILS:1480062024-12-01T20:58:42Z2024-12-01T20:58:42ZYazar Bathurst, Robert. Rogers, Russ. Ghassemlouei, Alijohn.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597499507">http://www.sciencedirect.com/science/book/9781597499507</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Gray hat hacking the ethical hacker's handbookent://SD_ILS/0/SD_ILS:2932552024-12-01T20:58:42Z2024-12-01T20:58:42ZYazar Harris, Shon. Harper, Allen. Eagle, Chris. Ness, Jonathan. Lenkey, Gideon.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://mhebooklibrary.com/reader/gray-hat-hacking-ethical-hackers-handbook-3rd-edition">Subscription required</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Virtualization and forensics a digital forensic investigator's guide to virtual environmentsent://SD_ILS/0/SD_ILS:3063302024-12-01T20:58:42Z2024-12-01T20:58:42ZYazar Barrett, Diane. Kipper, Gregory.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495578">http://www.sciencedirect.com/science/book/9781597495578</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Virtualization and forensics a digital forensic investigator's guide to virtual environmentsent://SD_ILS/0/SD_ILS:1467152024-12-01T20:58:42Z2024-12-01T20:58:42ZYazar Barrett, Diane. Kipper, Gregory.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495578">http://www.sciencedirect.com/science/book/9781597495578</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Techno security's guide to e-discovery and digital forensicsent://SD_ILS/0/SD_ILS:1485642024-12-01T20:58:42Z2024-12-01T20:58:42ZYazar Wiles, Jack.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492232">http://www.sciencedirect.com/science/book/9781597492232</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Techno Security's guide to managing risks for IT managers, auditors, and investigatorsent://SD_ILS/0/SD_ILS:1486412024-12-01T20:58:42Z2024-12-01T20:58:42ZYazar Wiles, Jack.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491389">http://www.sciencedirect.com/science/book/9781597491389</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Techno Security's guide to managing risks for IT managers, auditors, and investigatorsent://SD_ILS/0/SD_ILS:1122032024-12-01T20:58:42Z2024-12-01T20:58:42ZYazar Wiles, Jack. ScienceDirect (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491389">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Essential computer security everyone's guide to e-mail, Internet, and wireless securityent://SD_ILS/0/SD_ILS:1458402024-12-01T20:58:42Z2024-12-01T20:58:42ZYazar Bradley, Tony, 1969- Carvey, Harlan A.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491143">http://www.sciencedirect.com/science/book/9781597491143</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Cyber spying tracking your family's (sometimes) secret online livesent://SD_ILS/0/SD_ILS:2536732024-12-01T20:58:42Z2024-12-01T20:58:42ZYazar Fair, Ted. Nordfelt, Michael. Ring, Sandra. Cole, Eric.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836418">http://www.sciencedirect.com/science/book/9781931836418</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Information security policies and procedures a practitioner's referenceent://SD_ILS/0/SD_ILS:2901372024-12-01T20:58:42Z2024-12-01T20:58:42ZYazar Peltier, Thomas R.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://marc.crcnetbase.com/isbn/9780203488737">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Cisco security professional's guide to secure intrusion detection systemsent://SD_ILS/0/SD_ILS:2540242024-12-01T20:58:42Z2024-12-01T20:58:42ZYazar Burton, James. Dubrawsky, Ida. Osipov, Vitaly. Baumrucker, C. Tate. Sweeney, Michael<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781932266696">http://www.sciencedirect.com/science/book/9781932266696</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Windows 7ent://SD_ILS/0/SD_ILS:2934772024-12-01T20:58:42Z2024-12-01T20:58:42ZYazar Matthews, Martin S.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://mhebooklibrary.com/reader/windows-7-quicksteps">Subscription required</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Windows 7 SP1ent://SD_ILS/0/SD_ILS:2934212024-12-01T20:58:42Z2024-12-01T20:58:42ZYazar Matthews, Martin S.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://mhebooklibrary.com/reader/windows-7-sp1-quicksteps">Subscription required</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Windows 7 for seniorsent://SD_ILS/0/SD_ILS:2934242024-12-01T20:58:42Z2024-12-01T20:58:42ZYazar Matthews, Martin S.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://mhebooklibrary.com/reader/windows-7-for-seniors-quicksteps">Subscription required</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Adaptive security management architectureent://SD_ILS/0/SD_ILS:2884512024-12-01T20:58:42Z2024-12-01T20:58:42ZYazar Tiller, James S.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://marc.crcnetbase.com/isbn/9781420013375">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>International Conference on Computer Networks and Communication Technologies ICCNCT 2018ent://SD_ILS/0/SD_ILS:4868132024-12-01T20:58:42Z2024-12-01T20:58:42ZYazar Smys, S. editor. Bestak, Robert. editor. Chen, Joy Iong-Zong. editor. Kotuliak, Ivan. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-981-10-8681-6">https://doi.org/10.1007/978-981-10-8681-6</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Secure and resilient software requirements, test cases, and testing methodsent://SD_ILS/0/SD_ILS:2907992024-12-01T20:58:42Z2024-12-01T20:58:42ZYazar Merkow, Mark S. Raghavan, Lakshmikanth.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://marc.crcnetbase.com/isbn/9781439866221">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Secure and resilient software developmentent://SD_ILS/0/SD_ILS:2907142024-12-01T20:58:42Z2024-12-01T20:58:42ZYazar Merkow, Mark S. Raghavan, Lakshmikanth.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://marc.crcnetbase.com/isbn/9781439826973">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>A practical guide to security engineering and information assuranceent://SD_ILS/0/SD_ILS:2904612024-12-01T20:58:42Z2024-12-01T20:58:42ZYazar Herrmann, Debra S.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://marc.crcnetbase.com/isbn/9781420031492">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Securing e-business applications and communicationsent://SD_ILS/0/SD_ILS:2904362024-12-01T20:58:42Z2024-12-01T20:58:42ZYazar Held, Jonathan S. Bowers, John R.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://marc.crcnetbase.com/isbn/9781420031553">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Wireless Algorithms, Systems, and Applications 14th International Conference, WASA 2019, Honolulu, HI, USA, June 24–26, 2019, Proceedingsent://SD_ILS/0/SD_ILS:4836672024-12-01T20:58:42Z2024-12-01T20:58:42ZYazar Biagioni, Edoardo S. editor. Zheng, Yao. editor. Cheng, Siyao. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-030-23597-0">https://doi.org/10.1007/978-3-030-23597-0</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Security and Data Storage Aspect in Cloud Computingent://SD_ILS/0/SD_ILS:4845762024-12-01T20:58:42Z2024-12-01T20:58:42ZYazar Deshpande, Prachi S. author. Sharma, Subhash C. author. Peddoju, Sateesh K. author. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-981-13-6089-3">https://doi.org/10.1007/978-981-13-6089-3</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>The Art of Modelling Computational Systems: A Journey from Logic and Concurrency to Security and Privacy Essays Dedicated to Catuscia Palamidessi on the Occasion of Her 60th Birthdayent://SD_ILS/0/SD_ILS:4868592024-12-01T20:58:42Z2024-12-01T20:58:42ZYazar Alvim, Mário S. editor. Chatzikokolakis, Kostas. editor. Olarte, Carlos. editor. Valencia, Frank. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-030-31175-9">https://doi.org/10.1007/978-3-030-31175-9</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>E-Business and Telecommunications 15th International Joint Conference, ICETE 2018, Porto, Portugal, July 26–28, 2018, Revised Selected Papersent://SD_ILS/0/SD_ILS:4835272024-12-01T20:58:42Z2024-12-01T20:58:42ZYazar Obaidat, Mohammad S. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-030-34866-3">https://doi.org/10.1007/978-3-030-34866-3</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Biometric-Based Physical and Cybersecurity Systemsent://SD_ILS/0/SD_ILS:4842462024-12-01T20:58:42Z2024-12-01T20:58:42ZYazar Obaidat, Mohammad S. editor. Traore, Issa. editor. (orcid)0000-0003-2987-8047 Woungang, Isaac. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-319-98734-7">https://doi.org/10.1007/978-3-319-98734-7</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Innovations in Computer Science and Engineering Proceedings of the Fifth ICICSE 2017ent://SD_ILS/0/SD_ILS:4872992024-12-01T20:58:42Z2024-12-01T20:58:42ZYazar Saini, H. S. editor. Sayal, Rishi. editor. Govardhan, A. editor. Buyya, Rajkumar. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-981-10-8201-6">https://doi.org/10.1007/978-981-10-8201-6</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Countering cyber attacks and preserving the integrity and availability of critical systemsent://SD_ILS/0/SD_ILS:4821772024-12-01T20:58:42Z2024-12-01T20:58:42ZYazar Geetha, S., 1979- editor. Phamila, Asnath Victy, 1978- editor. IGI Global, publisher.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-8241-0">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-8241-0</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>E-Business and Telecommunications 14th International Joint Conference, ICETE 2017, Madrid, Spain, July 24-26, 2017, Revised Selected Paperent://SD_ILS/0/SD_ILS:4845052024-12-01T20:58:42Z2024-12-01T20:58:42ZYazar Obaidat, Mohammad S. editor. Cabello, Enrique. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-030-11039-0">https://doi.org/10.1007/978-3-030-11039-0</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Innovations in Computer Science and Engineering Proceedings of the Sixth ICICSE 2018ent://SD_ILS/0/SD_ILS:4867682024-12-01T20:58:42Z2024-12-01T20:58:42ZYazar Saini, H. S. editor. Sayal, Rishi. editor. Govardhan, Aliseri. editor. Buyya, Rajkumar. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-981-13-7082-3">https://doi.org/10.1007/978-981-13-7082-3</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Information security science : measuring the vulnerability to data compromisesent://SD_ILS/0/SD_ILS:4589682024-12-01T20:58:42Z2024-12-01T20:58:42ZYazar Young, Carl S., author.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128096437">http://www.sciencedirect.com/science/book/9780128096437</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>E-Business and Telecommunications International Joint Conference, ICETE 2012, Rome, Italy, July 24--27, 2012, Revised Selected Papersent://SD_ILS/0/SD_ILS:4827102024-12-01T20:58:42Z2024-12-01T20:58:42ZYazar Obaidat, Mohammad S. editor. Filipe, Joaquim. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-662-44791-8">https://doi.org/10.1007/978-3-662-44791-8</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Fundamentals of Sketch-Based Passwords A General Frameworkent://SD_ILS/0/SD_ILS:4873932024-12-01T20:58:42Z2024-12-01T20:58:42ZYazar Riggan, Benjamin S. author. Snyder, Wesley E. author. Wang, Cliff. author. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-319-13629-5">https://doi.org/10.1007/978-3-319-13629-5</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>E-Business and Telecommunications International Joint Conference, ICETE 2013, Reykjavik, Iceland, July 29-31, 2013, Revised Selected Papersent://SD_ILS/0/SD_ILS:4886472024-12-01T20:58:42Z2024-12-01T20:58:42ZYazar Obaidat, Mohammad S. editor. Filipe, Joaquim. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-662-44788-8">https://doi.org/10.1007/978-3-662-44788-8</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Zen and the art of information securityent://SD_ILS/0/SD_ILS:1456802024-12-01T20:58:42Z2024-12-01T20:58:42ZYazar Winkler, Ira.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491686">http://www.sciencedirect.com/science/book/9781597491686</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Snort 2.1 intrusion detectionent://SD_ILS/0/SD_ILS:2539892024-12-01T20:58:42Z2024-12-01T20:58:42ZYazar Beale, Jay. Alder, Raven.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836043">http://www.sciencedirect.com/science/book/9781931836043</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Nessus network auditingent://SD_ILS/0/SD_ILS:2539912024-12-01T20:58:42Z2024-12-01T20:58:42ZYazar Deraison, Renaud. Syngress Media, Inc.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836081">http://www.sciencedirect.com/science/book/9781931836081</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Proceedings of International Symposium on Sensor Networks, Systems and Security Advances in Computing and Networking with Applicationsent://SD_ILS/0/SD_ILS:4000162024-12-01T20:58:42Z2024-12-01T20:58:42ZYazar Rao, Nageswara S.V. editor. Brooks, Richard R. editor. Wu, Chase Q. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-319-75683-7">https://doi.org/10.1007/978-3-319-75683-7</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Information Security 17th International Conference, ISC 2014, Hong Kong, China, October 12-14, 2014, Proceedingsent://SD_ILS/0/SD_ILS:4857932024-12-01T20:58:42Z2024-12-01T20:58:42ZYazar Chow, Sherman S.M. editor. Camenisch, Jan. editor. Hui, Lucas C.K. editor. Yiu, Siu Ming. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-319-13257-0">https://doi.org/10.1007/978-3-319-13257-0</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Provable Security 8th International Conference, ProvSec 2014, Hong Kong, China, October 9-10, 2014. Proceedingsent://SD_ILS/0/SD_ILS:4889182024-12-01T20:58:42Z2024-12-01T20:58:42ZYazar Chow, Sherman S.M. editor. Liu, Joseph K. editor. Hui, Lucas C.K. editor. Yiu, Siu Ming. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-319-12475-9">https://doi.org/10.1007/978-3-319-12475-9</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Applications and Techniques in Information Security 10th International Conference, ATIS 2019, Thanjavur, India, November 22–24, 2019, Proceedingsent://SD_ILS/0/SD_ILS:4835762024-12-01T20:58:42Z2024-12-01T20:58:42ZYazar Shankar Sriram, V. S. editor. (orcid)0000-0001-7870-7944 Subramaniyaswamy, V. editor. Sasikaladevi, N. editor. (orcid)0000-0002-0841-502X Zhang, Leo. editor. Batten, Lynn. editor. (orcid)0000-0003-4525-2423<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-981-15-0871-4">https://doi.org/10.1007/978-981-15-0871-4</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Internet Science 5th International Conference, INSCI 2018, St. Petersburg, Russia, October 24–26, 2018, Proceedingsent://SD_ILS/0/SD_ILS:4002542024-12-01T20:58:42Z2024-12-01T20:58:42ZYazar Bodrunova, Svetlana S. editor. (orcid)0000-0003-0740-561X SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-030-01437-7">https://doi.org/10.1007/978-3-030-01437-7</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Security policies and implementation issuesent://SD_ILS/0/SD_ILS:2715342024-12-01T20:58:42Z2024-12-01T20:58:42ZYazar Johnson, Rob (Robert) Merkow, Mark S.<br/>Yer Numarası QA76.9.A25 J64 2011<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>Recent Trends in Image Processing and Pattern Recognition Second International Conference, RTIP2R 2018, Solapur, India, December 21–22, 2018, Revised Selected Papers, Part IIIent://SD_ILS/0/SD_ILS:4832852024-12-01T20:58:42Z2024-12-01T20:58:42ZYazar Santosh, K. C. editor. Hegadi, Ravindra S. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-981-13-9187-3">https://doi.org/10.1007/978-981-13-9187-3</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Sustainable Interdependent Networks II From Smart Power Grids to Intelligent Transportation Networksent://SD_ILS/0/SD_ILS:4847472024-12-01T20:58:42Z2024-12-01T20:58:42ZYazar Amini, M. Hadi. editor. Boroojeni, Kianoosh G. editor. Iyengar, S. S. editor. Pardalos, Panos M. editor. (orcid)0000-0003-2824-101X Blaabjerg, Frede. editor.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-319-98923-5">https://doi.org/10.1007/978-3-319-98923-5</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Speech Enhancement Techniques for Digital Hearing Aidsent://SD_ILS/0/SD_ILS:4828022024-12-01T20:58:42Z2024-12-01T20:58:42ZYazar Borisagar, Komal R. author. Thanki, Rohit M. author. (orcid)0000-0002-0645-6266 Sedani, Bhavin S. author. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-319-96821-6">https://doi.org/10.1007/978-3-319-96821-6</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Decision and Game Theory for Security 10th International Conference, GameSec 2019, Stockholm, Sweden, October 30 – November 1, 2019, Proceedingsent://SD_ILS/0/SD_ILS:4870692024-12-01T20:58:42Z2024-12-01T20:58:42ZYazar Alpcan, Tansu. editor. (orcid)0000-0002-7434-3239 Vorobeychik, Yevgeniy. editor. (orcid)0000-0003-2471-5345 Baras, John S. editor. (orcid)0000-0002-4955-8561 Dán, György. editor. (orcid)0000-0002-4876-0223 SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-030-32430-8">https://doi.org/10.1007/978-3-030-32430-8</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>International Conference on Advanced Computing Networking and Informatics ICANI-2018ent://SD_ILS/0/SD_ILS:4862022024-12-01T20:58:42Z2024-12-01T20:58:42ZYazar Kamal, Raj. editor. Henshaw, Michael. editor. Nair, Pramod S. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-981-13-2673-8">https://doi.org/10.1007/978-981-13-2673-8</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Advances in Knowledge Discovery and Data Mining 22nd Pacific-Asia Conference, PAKDD 2018, Melbourne, VIC, Australia, June 3-6, 2018, Proceedings, Part IIIent://SD_ILS/0/SD_ILS:4002492024-12-01T20:58:42Z2024-12-01T20:58:42ZYazar Phung, Dinh. editor. Tseng, Vincent S. editor. Webb, Geoffrey I. editor. (orcid)0000-0001-9963-5169 Ho, Bao. editor. Ganji, Mohadeseh. editor.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-319-93040-4">https://doi.org/10.1007/978-3-319-93040-4</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Advances in Knowledge Discovery and Data Mining 22nd Pacific-Asia Conference, PAKDD 2018, Melbourne, VIC, Australia, June 3-6, 2018, Proceedings, Part Ient://SD_ILS/0/SD_ILS:3996092024-12-01T20:58:42Z2024-12-01T20:58:42ZYazar Phung, Dinh. editor. Tseng, Vincent S. editor. Webb, Geoffrey I. editor. (orcid)0000-0001-9963-5169 Ho, Bao. editor. Ganji, Mohadeseh. editor.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-319-93034-3">https://doi.org/10.1007/978-3-319-93034-3</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Deep Learning in Medical Image Analysis and Multimodal Learning for Clinical Decision Support 4th International Workshop, DLMIA 2018, and 8th International Workshop, ML-CDS 2018, Held in Conjunction with MICCAI 2018, Granada, Spain, September 20, 2018, Proceedingsent://SD_ILS/0/SD_ILS:4005752024-12-01T20:58:42Z2024-12-01T20:58:42ZYazar Stoyanov, Danail. editor. Taylor, Zeike. editor. Carneiro, Gustavo. editor. (orcid)0000-0002-5571-6220 Syeda-Mahmood, Tanveer. editor. Martel, Anne. editor.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-030-00889-5">https://doi.org/10.1007/978-3-030-00889-5</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Advances in Knowledge Discovery and Data Mining 22nd Pacific-Asia Conference, PAKDD 2018, Melbourne, VIC, Australia, June 3-6, 2018, Proceedings, Part IIent://SD_ILS/0/SD_ILS:4022142024-12-01T20:58:42Z2024-12-01T20:58:42ZYazar Phung, Dinh. editor. Tseng, Vincent S. editor. Webb, Geoffrey I. editor. (orcid)0000-0001-9963-5169 Ho, Bao. editor. Ganji, Mohadeseh. editor.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-319-93037-4">https://doi.org/10.1007/978-3-319-93037-4</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Sustainable Interdependent Networks From Theory to Applicationent://SD_ILS/0/SD_ILS:4024932024-12-01T20:58:42Z2024-12-01T20:58:42ZYazar Amini, M. Hadi. editor. Boroojeni, Kianoosh G. editor. Iyengar, S.S. editor. Pardalos, Panos M. editor. Blaabjerg, Frede. editor.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-319-74412-4">https://doi.org/10.1007/978-3-319-74412-4</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Computational Intelligence, Cyber Security and Computational Models Proceedings of ICC3, 2013ent://SD_ILS/0/SD_ILS:4888842024-12-01T20:58:42Z2024-12-01T20:58:42ZYazar Krishnan, G. Sai Sundara. editor. Anitha, R. editor. Lekshmi, R. S. editor. Kumar, M. Senthil. editor. Bonato, Anthony. editor.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-81-322-1680-3">https://doi.org/10.1007/978-81-322-1680-3</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Cyber threat! : how to manage the growing risk of cyber attacksent://SD_ILS/0/SD_ILS:3420202024-12-01T20:58:42Z2024-12-01T20:58:42ZYazar Ulsch, N. MacDonnell, 1951-<br/>Yer Numarası ONLINE(342020.1)<br/>Elektronik Erişim ebrary <a href="http://alltitles.ebrary.com/Doc?id=10895757">An electronic book accessible through the World Wide Web; click to view</a>
Ebook Library <a href="http://public.eblib.com/choice/publicfullrecord.aspx?p=1742833">http://public.eblib.com/choice/publicfullrecord.aspx?p=1742833</a>
John Wiley <a href="http://dx.doi.org/10.1002/9781118915028">http://dx.doi.org/10.1002/9781118915028</a>
MyiLibrary <a href="http://www.myilibrary.com?id=629214">http://www.myilibrary.com?id=629214</a>
Cover <a href="http://swbplus.bsz-bw.de/bsz410564842cov.htm">http://swbplus.bsz-bw.de/bsz410564842cov.htm</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Network security essentials : applications and standardsent://SD_ILS/0/SD_ILS:3542322024-12-01T20:58:42Z2024-12-01T20:58:42ZYazar Stallings, William.<br/>Yer Numarası TK5105.59 S725 2014<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>Cryptography and network security : principles and practiceent://SD_ILS/0/SD_ILS:3712882024-12-01T20:58:42Z2024-12-01T20:58:42ZYazar Stallings, William.<br/>Yer Numarası TK5105.59 S713 2014<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>The complete book of data anonymization from planning to implementationent://SD_ILS/0/SD_ILS:2890652024-12-01T20:58:42Z2024-12-01T20:58:42ZYazar Raghunathan, Balaji.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://marc.crcnetbase.com/isbn/9781439877319">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>The complete guide to physical securityent://SD_ILS/0/SD_ILS:2906672024-12-01T20:58:42Z2024-12-01T20:58:42ZYazar Baker, Paul, 1958- Benny, Daniel J.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://marc.crcnetbase.com/isbn/9781420099645">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Elementary information securityent://SD_ILS/0/SD_ILS:2712722024-12-01T20:58:42Z2024-12-01T20:58:42ZYazar Smith, Richard E.<br/>Yer Numarası QA76.9.A25 S652 2013<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>Computer security : principles and practiceent://SD_ILS/0/SD_ILS:3134732024-12-01T20:58:42Z2024-12-01T20:58:42ZYazar Stallings, William. Brown, Lawrie<br/>Yer Numarası QA76.9 S73 2012<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>Security 2020 reduce security risks this decadeent://SD_ILS/0/SD_ILS:3189662024-12-01T20:58:42Z2024-12-01T20:58:42ZYazar Howard, Doug. Prince, Kevin.<br/>Yer Numarası ONLINE(318966.1)<br/>Elektronik Erişim Wiley InterScience <a href="http://dx.doi.org/10.1002/9781118255803">An electronic book accessible through the World Wide Web; click for information</a>
Books24x7 <a href="http://www.books24x7.com/marc.asp?bookid=40805">http://www.books24x7.com/marc.asp?bookid=40805</a>
Ebook Library <a href="http://public.eblib.com/choice/publicfullrecord.aspx?p=694289">http://public.eblib.com/choice/publicfullrecord.aspx?p=694289</a>
ebrary <a href="http://site.ebrary.com/id/10469690">http://site.ebrary.com/id/10469690</a>
MyiLibrary <a href="http://www.myilibrary.com?id=294413">http://www.myilibrary.com?id=294413</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Security strategies in Windows platforms and applicationsent://SD_ILS/0/SD_ILS:2715372024-12-01T20:58:42Z2024-12-01T20:58:42ZYazar Solomon, Michael.<br/>Yer Numarası QA76.76.O63 S64 2011<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>Data warehousing and data mining techniques for cyber securityent://SD_ILS/0/SD_ILS:1104342024-12-01T20:58:42Z2024-12-01T20:58:42ZYazar Singhal, Anoop, 1958-<br/>Yer Numarası QA76.9.A25 S563 2007<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>Information security : principles and practiceent://SD_ILS/0/SD_ILS:1094772024-12-01T20:58:42Z2024-12-01T20:58:42ZYazar Stamp, Mark.<br/>Yer Numarası QA76.9.A25 S69 2006<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>Malware : fighting malicious codeent://SD_ILS/0/SD_ILS:2677372024-12-01T20:58:42Z2024-12-01T20:58:42ZYazar Skoudis, Ed. Zeltser, Lenny.<br/>Yer Numarası QA76.9.A25 S58 2004<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>Applied cryptography : protocols, algorithms, and source code in Cent://SD_ILS/0/SD_ILS:1080142024-12-01T20:58:42Z2024-12-01T20:58:42ZYazar Schneier, Bruce.<br/>Yer Numarası QA76.9.A25 S35 1996<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>