Arama Sonu&ccedil;lar&#305; Security Measures - Daralt&#305;lm&#305;&#351;: 2008 SirsiDynix Enterprise https://katalog.hacettepe.edu.tr/client/tr_TR/default_tr/default_tr/qu$003dSecurity$002bMeasures$0026qf$003dPUBDATE$002509Yay$0025C4$0025B1n$002bY$0025C4$0025B1l$0025C4$0025B1$0025092008$0025092008$0026te$003dILS$0026ps$003d300?dt=list 2024-12-26T15:52:58Z Security and Quality of Service in Ad Hoc Wireless Networks ent://SD_ILS/0/SD_ILS:237801 2024-12-26T15:52:58Z 2024-12-26T15:52:58Z Yazar&#160;Mishra, Amitabh.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1017/CBO9780511619755">Access by subscription</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Wireless Internet Security Architecture and Protocols ent://SD_ILS/0/SD_ILS:236205 2024-12-26T15:52:58Z 2024-12-26T15:52:58Z Yazar&#160;Kempf, James.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1017/CBO9780511754739">Access by subscription</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Introduction to Broadband Communication Systems ent://SD_ILS/0/SD_ILS:248059 2024-12-26T15:52:58Z 2024-12-26T15:52:58Z Yazar&#160;Akujuobi, Cajetan M.&#160;Sadiku, Matthew N.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1049/SBTE501E">http://dx.doi.org/10.1049/SBTE501E</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Lloyd's MIU handbook of maritime security ent://SD_ILS/0/SD_ILS:285007 2024-12-26T15:52:58Z 2024-12-26T15:52:58Z Yazar&#160;Herbert-Burns, Rupert.&#160;Bateman, W. S. G. (Walter Samuel Grono)&#160;Lehr, Peter.&#160;Lloyd's (Firm)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://marc.crcnetbase.com/isbn/9781420054811">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Introduction to executive protection ent://SD_ILS/0/SD_ILS:285011 2024-12-26T15:52:58Z 2024-12-26T15:52:58Z Yazar&#160;June, Dale L.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://marc.crcnetbase.com/isbn/9781420043464">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Transportation infrastructure security utilizing intelligent transportation systems ent://SD_ILS/0/SD_ILS:297684 2024-12-26T15:52:58Z 2024-12-26T15:52:58Z Yazar&#160;Fries, Ryan Nicholas.&#160;Chowdhury, Mashrur A.&#160;Brummond, Jeffrey.&#160;Wiley InterScience (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;John Wiley <a href="http://dx.doi.org/10.1002/9780470432853">http://dx.doi.org/10.1002/9780470432853</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Security in wireless ad hoc and sensor networks ent://SD_ILS/0/SD_ILS:297789 2024-12-26T15:52:58Z 2024-12-26T15:52:58Z Yazar&#160;&Ccedil;ayirci, E. (Erdal)&#160;Levi, Albert, 1969-&#160;Wiley InterScience (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;John Wiley <a href="http://dx.doi.org/10.1002/9780470516782">http://dx.doi.org/10.1002/9780470516782</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Distributed systems security issues, processes and solutions ent://SD_ILS/0/SD_ILS:298422 2024-12-26T15:52:58Z 2024-12-26T15:52:58Z Yazar&#160;Belapurkar, Abhijit.&#160;Wiley InterScience (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;John Wiley <a href="http://dx.doi.org/10.1002/9780470751787">http://dx.doi.org/10.1002/9780470751787</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Building an effective information security policy architecture ent://SD_ILS/0/SD_ILS:290577 2024-12-26T15:52:58Z 2024-12-26T15:52:58Z Yazar&#160;Bacik, Sandy.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://marc.crcnetbase.com/isbn/9781420059069">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Secure computer and network systems modeling, analysis and design ent://SD_ILS/0/SD_ILS:296665 2024-12-26T15:52:58Z 2024-12-26T15:52:58Z Yazar&#160;Ye, Nong.&#160;Wiley InterScience (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;Contributor biographical information <a href="http://catdir.loc.gov/catdir/enhancements/fy0833/2007037133-b.html">http://catdir.loc.gov/catdir/enhancements/fy0833/2007037133-b.html</a> John Wiley <a href="http://dx.doi.org/10.1002/9780470023273">http://dx.doi.org/10.1002/9780470023273</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> ICT futures delivering pervasive, real-time and secure services ent://SD_ILS/0/SD_ILS:302768 2024-12-26T15:52:58Z 2024-12-26T15:52:58Z Yazar&#160;Warren, Paul (Paul W.)&#160;Davies, J. (N. John)&#160;Brown, David, 1954-&#160;Wiley InterScience (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;John Wiley <a href="http://dx.doi.org/10.1002/9780470758656">http://dx.doi.org/10.1002/9780470758656</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Host Identity Protocol (HIP) towards the secure mobile Internet ent://SD_ILS/0/SD_ILS:302802 2024-12-26T15:52:58Z 2024-12-26T15:52:58Z Yazar&#160;Gurtov, Andrei.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;John Wiley <a href="http://dx.doi.org/10.1002/9780470772898">http://dx.doi.org/10.1002/9780470772898</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Multimedia content encryption techniques and applications ent://SD_ILS/0/SD_ILS:285952 2024-12-26T15:52:58Z 2024-12-26T15:52:58Z Yazar&#160;Lian, Shiguo.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://marc.crcnetbase.com/isbn/9781420065282">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Security software development assessing and managing security risks ent://SD_ILS/0/SD_ILS:286016 2024-12-26T15:52:58Z 2024-12-26T15:52:58Z Yazar&#160;Ashbaugh, Douglas A.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://marc.crcnetbase.com/isbn/9781420063813">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Digital privacy theory, technologies, and practices ent://SD_ILS/0/SD_ILS:286824 2024-12-26T15:52:58Z 2024-12-26T15:52:58Z Yazar&#160;Acquisti, Alessandro.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://marc.crcnetbase.com/isbn/9781420052183">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Transportation systems security ent://SD_ILS/0/SD_ILS:290598 2024-12-26T15:52:58Z 2024-12-26T15:52:58Z Yazar&#160;McDougall, Allan.&#160;Radvanovsky, Robert.&#160;Clavadetscher, Carl.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://marc.crcnetbase.com/isbn/9781420063790">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Architecting secure software systems ent://SD_ILS/0/SD_ILS:288749 2024-12-26T15:52:58Z 2024-12-26T15:52:58Z Yazar&#160;Talukder, Asoke K.&#160;Chaitanya, Manish.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://marc.crcnetbase.com/isbn/9781420087857">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Managing global supply chains compliance, security, and dealing with terrorism ent://SD_ILS/0/SD_ILS:291482 2024-12-26T15:52:58Z 2024-12-26T15:52:58Z Yazar&#160;Cook, Thomas A., 1953-<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://marc.crcnetbase.com/isbn/9781420064582">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Information assurance architecture ent://SD_ILS/0/SD_ILS:291123 2024-12-26T15:52:58Z 2024-12-26T15:52:58Z Yazar&#160;Willett, Keith D.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://marc.crcnetbase.com/isbn/9780849380686">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> &#304;nternet kullan&#305;m&#305; ve aile ent://SD_ILS/0/SD_ILS:139901 2024-12-26T15:52:58Z 2024-12-26T15:52:58Z Yer Numaras&#305;&#160;TK5105.888 .I58 2008<br/>Format:&#160;Kitap<br/>Durum&#160;Beytepe K&uuml;t&uuml;phanesi~1<br/> Kismet hacking ent://SD_ILS/0/SD_ILS:147861 2024-12-26T15:52:58Z 2024-12-26T15:52:58Z Yazar&#160;Haines, Brad.&#160;Schearer, Michael J.&#160;Thornton, Frank (Thorn)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491174">http://www.sciencedirect.com/science/book/9781597491174</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> OSSEC host-based intrusion detection guide ent://SD_ILS/0/SD_ILS:148333 2024-12-26T15:52:58Z 2024-12-26T15:52:58Z Yazar&#160;Hay, Andrew.&#160;Cid, Daniel.&#160;Bray, Rory.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492409">http://www.sciencedirect.com/science/book/9781597492409</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> SonicWALL secure wireless network integrated solutions guide ent://SD_ILS/0/SD_ILS:148562 2024-12-26T15:52:58Z 2024-12-26T15:52:58Z Yazar&#160;Levy, Joe.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491938">http://www.sciencedirect.com/science/book/9781597491938</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Scene of the cybercrime ent://SD_ILS/0/SD_ILS:148955 2024-12-26T15:52:58Z 2024-12-26T15:52:58Z Yazar&#160;Cross, Michael, 1965-&#160;Shinder, Debra Littlejohn. Scene of the cybercrime.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492768">http://www.sciencedirect.com/science/book/9781597492768</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Securing Citrix XenApp Server in the enterprise ent://SD_ILS/0/SD_ILS:149050 2024-12-26T15:52:58Z 2024-12-26T15:52:58Z Yazar&#160;Bin Azad, Tariq.&#160;Wilson, Connie.&#160;Wright., Michael.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492812">http://www.sciencedirect.com/science/book/9781597492812</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Integrating ISA Server 2006 with Microsoft Exchange 2007 ent://SD_ILS/0/SD_ILS:145628 2024-12-26T15:52:58Z 2024-12-26T15:52:58Z Yazar&#160;Strachan, Fergus.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492751">http://www.sciencedirect.com/science/book/9781597492751</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Netcat power tools ent://SD_ILS/0/SD_ILS:146277 2024-12-26T15:52:58Z 2024-12-26T15:52:58Z Yazar&#160;Kanclirz, Jan.&#160;Baskin, Brian.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492577">http://www.sciencedirect.com/science/book/9781597492577</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Microsoft forefront security administration guide ent://SD_ILS/0/SD_ILS:146369 2024-12-26T15:52:58Z 2024-12-26T15:52:58Z Yazar&#160;Varsalone, Jesse.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492447">http://www.sciencedirect.com/science/book/9781597492447</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Network security know it all ent://SD_ILS/0/SD_ILS:146401 2024-12-26T15:52:58Z 2024-12-26T15:52:58Z Yazar&#160;Joshi, James B. D.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780123744630">http://www.sciencedirect.com/science/book/9780123744630</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Nmap in the enterprise your guide to network scanning ent://SD_ILS/0/SD_ILS:146442 2024-12-26T15:52:58Z 2024-12-26T15:52:58Z Yazar&#160;Orebaugh, Angela.&#160;Pinkard, Becky.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492416">http://www.sciencedirect.com/science/book/9781597492416</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Practical embedded security building secure resource-constrained systems ent://SD_ILS/0/SD_ILS:147416 2024-12-26T15:52:58Z 2024-12-26T15:52:58Z Yazar&#160;Stapko, Timothy John.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780750682152">http://www.sciencedirect.com/science/book/9780750682152</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Google hacking for penetration testers. Volume 2 ent://SD_ILS/0/SD_ILS:148029 2024-12-26T15:52:58Z 2024-12-26T15:52:58Z Yazar&#160;Long, Johnny.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491761">http://www.sciencedirect.com/science/book/9781597491761</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> ISA server 2006 ent://SD_ILS/0/SD_ILS:115080 2024-12-26T15:52:58Z 2024-12-26T15:52:58Z Yazar&#160;&#304;nan, Y&uuml;ksel.&#160;Demirli, Nihat.<br/>Yer Numaras&#305;&#160;TK5105.59 .I536 2008<br/>Format:&#160;Kitap<br/>Durum&#160;Beytepe K&uuml;t&uuml;phanesi~2<br/> The future of the internet and how to stop it ent://SD_ILS/0/SD_ILS:134946 2024-12-26T15:52:58Z 2024-12-26T15:52:58Z Yazar&#160;Zittrain, Jonathan L.<br/>Yer Numaras&#305;&#160;TK5105.875.I57 Z53 2008<br/>Format:&#160;Kitap<br/>Durum&#160;Beytepe K&uuml;t&uuml;phanesi~1<br/> How to cheat at securing Linux ent://SD_ILS/0/SD_ILS:145540 2024-12-26T15:52:58Z 2024-12-26T15:52:58Z Yazar&#160;Krishnamurthy Madwachar, Mohan.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492072">http://www.sciencedirect.com/science/book/9781597492072</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Infosecurity 2008 threat analysis ent://SD_ILS/0/SD_ILS:145541 2024-12-26T15:52:58Z 2024-12-26T15:52:58Z Yazar&#160;Clark, Champ, III.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492249">http://www.sciencedirect.com/science/book/9781597492249</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Information assurance dependability and security in networked systems ent://SD_ILS/0/SD_ILS:145553 2024-12-26T15:52:58Z 2024-12-26T15:52:58Z Yazar&#160;Qian, Yi, 1962-<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780123735669">http://www.sciencedirect.com/science/book/9780123735669</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Transportation systems security ent://SD_ILS/0/SD_ILS:342827 2024-12-26T15:52:58Z 2024-12-26T15:52:58Z Yazar&#160;McDougall, Allan.&#160;Radvanovsky, Robert.<br/>Yer Numaras&#305;&#160;ONLINE(342827.1)<br/>Elektronik Eri&#351;im&#160;<a href="http://marc.crcnetbase.com/isbn/9781466528055">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> The library security and safety guide to prevention, planning, and response ent://SD_ILS/0/SD_ILS:316537 2024-12-26T15:52:58Z 2024-12-26T15:52:58Z Yazar&#160;Kahn, Miriam (Miriam B.)<br/>Yer Numaras&#305;&#160;Z679.6 K34 2008<br/>Format:&#160;Kitap<br/>Durum&#160;Beytepe K&uuml;t&uuml;phanesi~1<br/>