Arama Sonuçları Security Measures - Daraltılmış: Beytepe KütüphanesiSirsiDynix Enterprisehttps://katalog.hacettepe.edu.tr/client/tr_TR/default_tr/default_tr/qu$003dSecurity$002bMeasures$0026qf$003dLIBRARY$002509K$0025C3$0025BCt$0025C3$0025BCphane$0025091$00253ABEYTEPE$002509Beytepe$002bK$0025C3$0025BCt$0025C3$0025BCphanesi$0026ic$003dtrue$0026te$003dILS$0026ps$003d300?dt=list2024-12-27T04:23:09ZHacking Interfaceent://SD_ILS/0/SD_ILS:5243082024-12-27T04:23:09Z2024-12-27T04:23:09ZYazar Elbahadır, Hamza.<br/>Yer Numarası QA76.9.A25 E43 2024<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>Ağ ve yazılım güvenliğient://SD_ILS/0/SD_ILS:5243012024-12-27T04:23:09Z2024-12-27T04:23:09ZYazar Çontar, Furkan.<br/>Yer Numarası TK5105.59 C66 2023<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>A’dan Z’ye siber güvenlikent://SD_ILS/0/SD_ILS:5243032024-12-27T04:23:09Z2024-12-27T04:23:09ZYazar Polat, A. Can. Karakaş, Burak.<br/>Yer Numarası QA76.9 P65 2023<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>Dijital güvenlik : dijital ortamlarda güvenle var olmakent://SD_ILS/0/SD_ILS:5171792024-12-27T04:23:09Z2024-12-27T04:23:09ZYazar Özer, Fatih. Şahin, Yusuf Levent, editör<br/>Yer Numarası QA76.9.E74 O94 2022<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>Kendi siteni kendin koruent://SD_ILS/0/SD_ILS:5243062024-12-27T04:23:09Z2024-12-27T04:23:09ZYazar Büyükgöze, Selma. El, Çağrı.<br/>Yer Numarası TK5105.59 B898 2022<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>Elektronik harpent://SD_ILS/0/SD_ILS:5143482024-12-27T04:23:09Z2024-12-27T04:23:09ZYazar Pakfiliz, Ahmet Güngör.<br/>Yer Numarası UG485 P35 2021<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>Ağ yönetimi ve bilgi güvenliğient://SD_ILS/0/SD_ILS:5162752024-12-27T04:23:09Z2024-12-27T04:23:09ZYazar Bilge, Alper. Kaçmaz, Emre.<br/>Yer Numarası TK5105.59 A98 2021<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>Web sızma testleri el kitabıent://SD_ILS/0/SD_ILS:4795212024-12-27T04:23:09Z2024-12-27T04:23:09ZYazar Akyıldız, M. Alparslan. Saner, Doğukan.<br/>Yer Numarası QA76.9 A39 2020<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>Uygulamalarla siber güvenliğe girişent://SD_ILS/0/SD_ILS:5101512024-12-27T04:23:09Z2024-12-27T04:23:09ZYazar Akyıldız, M. Alparslan.<br/>Yer Numarası TK5105.59.A39 U94 2020<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~2<br/>Yeni medyada gözetim ve mahremiyetin dönüşümü : gözetimin yeniden üretildiği bir alan olarak yeni medya ve mahremiyet algısındaki değişiment://SD_ILS/0/SD_ILS:5117802024-12-27T04:23:09Z2024-12-27T04:23:09ZYazar Rizanaj, Flora Hajdarmataj.<br/>Yer Numarası HM742 R59 2020<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>Türkiye’de ve dünyada siber güvenlikent://SD_ILS/0/SD_ILS:5149582024-12-27T04:23:09Z2024-12-27T04:23:09ZYazar Çeliktaş, Barış .<br/>Yer Numarası UG485 C45 2020<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>Ethical hacking : (hacking kursu)ent://SD_ILS/0/SD_ILS:4239502024-12-27T04:23:09Z2024-12-27T04:23:09ZYazar Usta, Gökhan.<br/>Yer Numarası QA76.9.A25 U88 2019<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>Siber güvenlik ve savunma : standartlar ve uygulamalarent://SD_ILS/0/SD_ILS:4622832024-12-27T04:23:09Z2024-12-27T04:23:09ZYazar Sağıroğlu, Şeref.<br/>Yer Numarası TK5105.59 S53 2019<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~2<br/>Exploit geliştirme 101ent://SD_ILS/0/SD_ILS:3890772024-12-27T04:23:09Z2024-12-27T04:23:09ZYazar Akyıldız, M. Alparslan.<br/>Yer Numarası QA76.9.A25 A59 2018<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~2<br/>Dijital mahremiyet : Yeni medya ve gözetim toplumuent://SD_ILS/0/SD_ILS:4626212024-12-27T04:23:09Z2024-12-27T04:23:09ZYazar Arık, Emel.<br/>Yer Numarası HM742 A75 2018<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>Hacking Interfaceent://SD_ILS/0/SD_ILS:5134522024-12-27T04:23:09Z2024-12-27T04:23:09ZYazar Elbahadır, Hamza.<br/>Yer Numarası QA76.9.A25 E43 2016<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>Siber güvenlik ve elektronik bileşenlerient://SD_ILS/0/SD_ILS:3802812024-12-27T04:23:09Z2024-12-27T04:23:09ZYazar Ünal, Ahmet Naci<br/>Yer Numarası UG485 U53 2015<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>Siber istihbaratent://SD_ILS/0/SD_ILS:3840512024-12-27T04:23:09Z2024-12-27T04:23:09ZYazar Keleştemur, Atalay<br/>Yer Numarası QA76.9.A25 K45 2015<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>Ağ ve yazılım güvenliğient://SD_ILS/0/SD_ILS:3797582024-12-27T04:23:09Z2024-12-27T04:23:09ZYazar Çontar, Furkan.<br/>Yer Numarası TK5105.59 C66 2015<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>Tam kapsamlı sanal test laboratuvarı kurulumu ve uygulamalı sızma testlerient://SD_ILS/0/SD_ILS:5134672024-12-27T04:23:09Z2024-12-27T04:23:09ZYazar Yalçınkaya, Mehmet Ali, yazar. Küçüksille, Ecir Uğur, yazar.<br/>Yer Numarası TK5105.59 Y35 2015<br/>Format: Gri Yayınlar<br/>Durum Beytepe Kütüphanesi~1<br/>Network security essentials : applications and standardsent://SD_ILS/0/SD_ILS:3542322024-12-27T04:23:09Z2024-12-27T04:23:09ZYazar Stallings, William.<br/>Yer Numarası TK5105.59 S725 2014<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>Data analysis for network cyber-securityent://SD_ILS/0/SD_ILS:3547572024-12-27T04:23:09Z2024-12-27T04:23:09ZYazar Adams, Niall M., 1968- Heard, Nicholas.<br/>Yer Numarası TK5105.59 D375 2014<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>Secure Messaging on the Internetent://SD_ILS/0/SD_ILS:3549372024-12-27T04:23:09Z2024-12-27T04:23:09ZYazar Oppliger, Rolf.<br/>Yer Numarası TK5105.73 O67 2014<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>Data protection for photographers : a guide to storing and protecting your valuable digital assetsent://SD_ILS/0/SD_ILS:3642422024-12-27T04:23:09Z2024-12-27T04:23:09ZYazar Corrigan, Patrick H.<br/>Yer Numarası TK7895.M4 C67 2014<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>Cryptography and network security : principles and practiceent://SD_ILS/0/SD_ILS:3712882024-12-27T04:23:09Z2024-12-27T04:23:09ZYazar Stallings, William.<br/>Yer Numarası TK5105.59 S713 2014<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>Hacking Interfaceent://SD_ILS/0/SD_ILS:3178472024-12-27T04:23:09Z2024-12-27T04:23:09ZYazar Elbahadır, Hamza.<br/>Yer Numarası QA 76.9 A25 E43 2014<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~2<br/>Introduction to securityent://SD_ILS/0/SD_ILS:2701302024-12-27T04:23:09Z2024-12-27T04:23:09ZYazar Fischer, Robert J. Halibozek, Edward P. Walters, David, 1963-<br/>Yer Numarası HV8290 G74 2013<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>Strategic intelligence management : national security imperatives and information and communications technologiesent://SD_ILS/0/SD_ILS:2703632024-12-27T04:23:09Z2024-12-27T04:23:09ZYazar Akhgar, Babak. Yates, Simeon.<br/>Yer Numarası TK5102.85 A44 2013<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>Information security for managersent://SD_ILS/0/SD_ILS:5165702024-12-27T04:23:09Z2024-12-27T04:23:09ZYazar Workman, Michael D., 1957-. Phelps, Daniel C. Gathegi, John N.<br/>Yer Numarası HF5548.37 W67 2013<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>Hacking exposed 7 : network security secrets & solutionsent://SD_ILS/0/SD_ILS:2700332024-12-27T04:23:09Z2024-12-27T04:23:09ZYazar McClure, Stuart. Scambray, Joel. Kurtz, George.<br/>Yer Numarası TK5105.59 M48 2012<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>Handbook of loss prevention and crime preventionent://SD_ILS/0/SD_ILS:2700432024-12-27T04:23:09Z2024-12-27T04:23:09ZYazar Fennelly, Lawrence J., 1940-<br/>Yer Numarası HV8290 H345 2012<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>The death of the Internetent://SD_ILS/0/SD_ILS:2704362024-12-27T04:23:09Z2024-12-27T04:23:09ZYazar Jakobsson, Markus.<br/>Yer Numarası TK5105.875.I57 D43 2012<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>Auditing IT infrastructures for complianceent://SD_ILS/0/SD_ILS:2711512024-12-27T04:23:09Z2024-12-27T04:23:09ZYazar Weiss, Martin M. Solomon, Michael G.<br/>Yer Numarası QA76.9.A25 W428 2011<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>Hacker techniques, tools, and incident handlingent://SD_ILS/0/SD_ILS:2714382024-12-27T04:23:09Z2024-12-27T04:23:09ZYazar Oriyano, Sean-Philip. Gregg, Michael (Michael C.)<br/>Yer Numarası TK5105.59 O786 2011<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>Network security essentials : applications and standardsent://SD_ILS/0/SD_ILS:2714462024-12-27T04:23:09Z2024-12-27T04:23:09ZYazar Stallings, William.<br/>Yer Numarası TK5105.59 S782 2011<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>Network security firewalls and VPNsent://SD_ILS/0/SD_ILS:2714522024-12-27T04:23:09Z2024-12-27T04:23:09ZYazar Stewart, James Michael.<br/>Yer Numarası TK5105.59 S758 2011<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>Security strategies in Web applications and social networkingent://SD_ILS/0/SD_ILS:2715382024-12-27T04:23:09Z2024-12-27T04:23:09ZYazar Harwood, Mike.<br/>Yer Numarası HM742 H38 2011<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>Readings and cases in information security : law and ethicsent://SD_ILS/0/SD_ILS:2677432024-12-27T04:23:09Z2024-12-27T04:23:09ZYazar Whitman, Michael E. Mattord, Herbert J.<br/>Yer Numarası TK5105.878 W54 2011<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>Effective security managementent://SD_ILS/0/SD_ILS:2699682024-12-27T04:23:09Z2024-12-27T04:23:09ZYazar Sennewald, Charles A.<br/>Yer Numarası HV8290 S46 2011<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>Cryptography and network securityent://SD_ILS/0/SD_ILS:3862412024-12-27T04:23:09Z2024-12-27T04:23:09ZYazar Kahate, Atul.<br/>Yer Numarası TK5105.59 K12 2011<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>Remote sensing of global croplands for food securityent://SD_ILS/0/SD_ILS:2685732024-12-27T04:23:09Z2024-12-27T04:23:09ZYazar Thenkabail, Prasad Srinivasa, 1958-<br/>Yer Numarası S494.5.R4 R454 2009<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>İnternet kullanımı ve aileent://SD_ILS/0/SD_ILS:1399012024-12-27T04:23:09Z2024-12-27T04:23:09ZYer Numarası TK5105.888 .I58 2008<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>The library security and safety guide to prevention, planning, and responseent://SD_ILS/0/SD_ILS:3165372024-12-27T04:23:09Z2024-12-27T04:23:09ZYazar Kahn, Miriam (Miriam B.)<br/>Yer Numarası Z679.6 K34 2008<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>The future of the internet and how to stop itent://SD_ILS/0/SD_ILS:1349462024-12-27T04:23:09Z2024-12-27T04:23:09ZYazar Zittrain, Jonathan L.<br/>Yer Numarası TK5105.875.I57 Z53 2008<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>ISA server 2006ent://SD_ILS/0/SD_ILS:1150802024-12-27T04:23:09Z2024-12-27T04:23:09ZYazar İnan, Yüksel. Demirli, Nihat.<br/>Yer Numarası TK5105.59 .I536 2008<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~2<br/>Assessment of the fate and effects of toxic agents on water resources : [proceedings of the NATO Advanced Study Institute on Advanced Modeling Techniques for Rapid Diagnosis and Assessment of CBRN Agents Effects on Water Resources, Istanbul, Turkey, 4-16 December 2005]ent://SD_ILS/0/SD_ILS:4240092024-12-27T04:23:09Z2024-12-27T04:23:09ZYazar Gönenç, I. Ethem. NATO Advanced Study Institute on Advanced Modeling Techniques for Rapid Diagnosis and Assessment of CBRN Agents Effects on Water Resources (2005 : Istanbul, Turkey)<br/>Yer Numarası TD353 A88 2007<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>Power analysis attacks : revealing the secrets of smart cardsent://SD_ILS/0/SD_ILS:1106872024-12-27T04:23:09Z2024-12-27T04:23:09ZYazar Mangard, Stefan. Oswald, Elisabeth. Popp, Thomas.<br/>Yer Numarası TK7895.S62 M36 2007<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>Information security : contemporary casesent://SD_ILS/0/SD_ILS:1110212024-12-27T04:23:09Z2024-12-27T04:23:09ZYazar Wright, Marie A. Kakalik, John S.<br/>Yer Numarası QA76.9.A25 W75 2007<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>Computer security fundamentalsent://SD_ILS/0/SD_ILS:1086202024-12-27T04:23:09Z2024-12-27T04:23:09ZYazar Easttom, Chuck.<br/>Yer Numarası QA76.9.A25 E325 2006<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>Handbook of information securityent://SD_ILS/0/SD_ILS:1089092024-12-27T04:23:09Z2024-12-27T04:23:09ZYazar Bidgoli, Hossein, ed.<br/>Yer Numarası TK5105.59 H35 2006 V.1<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~3<br/>Acing the security+ certification exament://SD_ILS/0/SD_ILS:3134922024-12-27T04:23:09Z2024-12-27T04:23:09ZYazar Regan, Patrick E.<br/>Yer Numarası QA76.3 R455 2005<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>TCP / IP ve ağ güvenliği : teori ve uygulamalar ileent://SD_ILS/0/SD_ILS:1128132024-12-27T04:23:09Z2024-12-27T04:23:09ZYazar Dirican, Can Okan.<br/>Yer Numarası TK 5105.55 D5753 2005<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~2<br/>Malware : fighting malicious codeent://SD_ILS/0/SD_ILS:2677372024-12-27T04:23:09Z2024-12-27T04:23:09ZYazar Skoudis, Ed. Zeltser, Lenny.<br/>Yer Numarası QA76.9.A25 S58 2004<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>Real 802.11 security : Wi-Fi protected access and 802.11ient://SD_ILS/0/SD_ILS:3126982024-12-27T04:23:09Z2024-12-27T04:23:09ZYazar Edney, Jon. Arbaugh, William A.<br/>Yer Numarası TK5105.59 E36 2004<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>Building firewalls with OpenBSD and PFent://SD_ILS/0/SD_ILS:1132202024-12-27T04:23:09Z2024-12-27T04:23:09ZYazar Artymiak, Jacek.<br/>Yer Numarası TK5105.59 .A77 2003<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>Computer security sourcebookent://SD_ILS/0/SD_ILS:946152024-12-27T04:23:09Z2024-12-27T04:23:09ZYazar Caldwell, Wilma, ed.<br/>Yer Numarası QA 76.9.A25 C658 2003<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>Introduction to communication electronic warfare systemsent://SD_ILS/0/SD_ILS:765592024-12-27T04:23:09Z2024-12-27T04:23:09ZYazar Poisel, Richard.<br/>Yer Numarası UG 590 P65 2002<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>Nokia network security solutions handbookent://SD_ILS/0/SD_ILS:811492024-12-27T04:23:09Z2024-12-27T04:23:09ZYazar Maxwell, Doug. Amon, Cherie, ort. yaz.<br/>Yer Numarası TK 5105.59 M451 2002<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>New Security Paradigms Workshop : proceedings, September 10 -13, 2001, Cloudcroft, NM, USAent://SD_ILS/0/SD_ILS:1180092024-12-27T04:23:09Z2024-12-27T04:23:09ZYazar ACM SIGSAC New Security Paradigms Workshop (2001 : Cloudcroft, NM, USA) Raskin, V. Hempelmann, C.F. Association for Computing Machinery. Special Interest Group on Security, Audit, and Control.<br/>Yer Numarası QA76.9.A25 A34 2001<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>Multilingual dictionary of IT security : English, German, French, Spanish, Italianent://SD_ILS/0/SD_ILS:787962024-12-27T04:23:09Z2024-12-27T04:23:09ZYazar Vollnhals, Otto.<br/>Yer Numarası REF/QA 76.9.A25 V887 1999<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>Applied cryptography : protocols, algorithms, and source code in Cent://SD_ILS/0/SD_ILS:1080142024-12-27T04:23:09Z2024-12-27T04:23:09ZYazar Schneier, Bruce.<br/>Yer Numarası QA76.9.A25 S35 1996<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>Principles of secure communication systemsent://SD_ILS/0/SD_ILS:862722024-12-27T04:23:09Z2024-12-27T04:23:09ZYazar Torrieri, Don J.<br/>Yer Numarası TK 5102.5 T625 1992<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>IAEA safeguards : Implementation at nuclear fuel cycle facilitiesent://SD_ILS/0/SD_ILS:904362024-12-27T04:23:09Z2024-12-27T04:23:09ZYazar International Atomic Energy Agency.<br/>Yer Numarası TK 9152 I8 1985<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>Auditing IT infrastructures for complianceent://SD_ILS/0/SD_ILS:2701642024-12-27T04:23:09Z2024-12-27T04:23:09ZYazar Weiss, Martin M. Solomon, Michael G.<br/>Yer Numarası QA76.9.A25 W428<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>