Arama Sonu&ccedil;lar&#305; Security Measures SirsiDynix Enterprise https://katalog.hacettepe.edu.tr/client/tr_TR/default_tr/default_tr/qu$003dSecurity$002bMeasures$0026te$003dILS$0026ps$003d300$0026isd$003dtrue?dt=list 2024-12-26T14:33:20Z Measures and metrics in corporate security ent://SD_ILS/0/SD_ILS:355952 2024-12-26T14:33:20Z 2024-12-26T14:33:20Z Yazar&#160;Campbell, George, 1942- author.<br/>Yer Numaras&#305;&#160;ONLINE(355952.1)<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128006887">http://www.sciencedirect.com/science/book/9780128006887</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Building a security measures and metrics program proven practices ent://SD_ILS/0/SD_ILS:306643 2024-12-26T14:33:20Z 2024-12-26T14:33:20Z Yazar&#160;Campbell, George.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780124170070">http://www.sciencedirect.com/science/book/9780124170070</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Hacking Interface ent://SD_ILS/0/SD_ILS:524308 2024-12-26T14:33:20Z 2024-12-26T14:33:20Z Yazar&#160;Elbahad&#305;r, Hamza.<br/>Yer Numaras&#305;&#160;QA76.9.A25 E43 2024<br/>Format:&#160;Kitap<br/>Durum&#160;Beytepe K&uuml;t&uuml;phanesi~1<br/> Artificial Intelligence and Cyber Security in Industry 4.0 ent://SD_ILS/0/SD_ILS:520462 2024-12-26T14:33:20Z 2024-12-26T14:33:20Z Yazar&#160;Sarveshwaran, Velliangiri. editor.&#160;Chen, Joy Iong-Zong. editor.&#160;Pelusi, Danilo. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;XX(520462.1)<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-981-99-2115-7">https://doi.org/10.1007/978-981-99-2115-7</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Computational Data and Social Networks 11th International Conference, CSoNet 2022, Virtual Event, December 5-7, 2022, Proceedings ent://SD_ILS/0/SD_ILS:520813 2024-12-26T14:33:20Z 2024-12-26T14:33:20Z Yazar&#160;Dinh, Thang N. editor.&#160;Li, Minming. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;XX(520813.1)<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-3-031-26303-3">https://doi.org/10.1007/978-3-031-26303-3</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> A&#287; ve yaz&#305;l&#305;m g&uuml;venli&#287;i ent://SD_ILS/0/SD_ILS:524301 2024-12-26T14:33:20Z 2024-12-26T14:33:20Z Yazar&#160;&Ccedil;ontar, Furkan.<br/>Yer Numaras&#305;&#160;TK5105.59 C66 2023<br/>Format:&#160;Kitap<br/>Durum&#160;Beytepe K&uuml;t&uuml;phanesi~1<br/> A&rsquo;dan Z&rsquo;ye siber g&uuml;venlik ent://SD_ILS/0/SD_ILS:524303 2024-12-26T14:33:20Z 2024-12-26T14:33:20Z Yazar&#160;Polat, A. Can.&#160;Karaka&#351;, Burak.<br/>Yer Numaras&#305;&#160;QA76.9 P65 2023<br/>Format:&#160;Kitap<br/>Durum&#160;Beytepe K&uuml;t&uuml;phanesi~1<br/> Dijital g&uuml;venlik : dijital ortamlarda g&uuml;venle var olmak ent://SD_ILS/0/SD_ILS:517179 2024-12-26T14:33:20Z 2024-12-26T14:33:20Z Yazar&#160;&Ouml;zer, Fatih.&#160;&#350;ahin, Yusuf Levent, edit&ouml;r<br/>Yer Numaras&#305;&#160;QA76.9.E74 O94 2022<br/>Format:&#160;Kitap<br/>Durum&#160;Beytepe K&uuml;t&uuml;phanesi~1<br/> Kendi siteni kendin koru ent://SD_ILS/0/SD_ILS:524306 2024-12-26T14:33:20Z 2024-12-26T14:33:20Z Yazar&#160;B&uuml;y&uuml;kg&ouml;ze, Selma.&#160;El, &Ccedil;a&#287;r&#305;.<br/>Yer Numaras&#305;&#160;TK5105.59 B898 2022<br/>Format:&#160;Kitap<br/>Durum&#160;Beytepe K&uuml;t&uuml;phanesi~1<br/> A&#287; y&ouml;netimi ve bilgi g&uuml;venli&#287;i ent://SD_ILS/0/SD_ILS:516275 2024-12-26T14:33:20Z 2024-12-26T14:33:20Z Yazar&#160;Bilge, Alper.&#160;Ka&ccedil;maz, Emre.<br/>Yer Numaras&#305;&#160;TK5105.59 A98 2021<br/>Format:&#160;Kitap<br/>Durum&#160;Beytepe K&uuml;t&uuml;phanesi~1<br/> Elektronik harp ent://SD_ILS/0/SD_ILS:514348 2024-12-26T14:33:20Z 2024-12-26T14:33:20Z Yazar&#160;Pakfiliz, Ahmet G&uuml;ng&ouml;r.<br/>Yer Numaras&#305;&#160;UG485 P35 2021<br/>Format:&#160;Kitap<br/>Durum&#160;Beytepe K&uuml;t&uuml;phanesi~1<br/> Web s&#305;zma testleri el kitab&#305; ent://SD_ILS/0/SD_ILS:479521 2024-12-26T14:33:20Z 2024-12-26T14:33:20Z Yazar&#160;Aky&#305;ld&#305;z, M. Alparslan.&#160;Saner, Do&#287;ukan.<br/>Yer Numaras&#305;&#160;QA76.9 A39 2020<br/>Format:&#160;Kitap<br/>Durum&#160;Beytepe K&uuml;t&uuml;phanesi~1<br/> T&uuml;rkiye&rsquo;de ve d&uuml;nyada siber g&uuml;venlik ent://SD_ILS/0/SD_ILS:514958 2024-12-26T14:33:20Z 2024-12-26T14:33:20Z Yazar&#160;&Ccedil;elikta&#351;, Bar&#305;&#351; .<br/>Yer Numaras&#305;&#160;UG485 C45 2020<br/>Format:&#160;Kitap<br/>Durum&#160;Beytepe K&uuml;t&uuml;phanesi~1<br/> Uygulamalarla siber g&uuml;venli&#287;e giri&#351; ent://SD_ILS/0/SD_ILS:510151 2024-12-26T14:33:20Z 2024-12-26T14:33:20Z Yazar&#160;Aky&#305;ld&#305;z, M. Alparslan.<br/>Yer Numaras&#305;&#160;TK5105.59.A39 U94 2020<br/>Format:&#160;Kitap<br/>Durum&#160;Beytepe K&uuml;t&uuml;phanesi~2<br/> Yeni medyada g&ouml;zetim ve mahremiyetin d&ouml;n&uuml;&#351;&uuml;m&uuml; : g&ouml;zetimin yeniden &uuml;retildi&#287;i bir alan olarak yeni medya ve mahremiyet alg&#305;s&#305;ndaki de&#287;i&#351;im ent://SD_ILS/0/SD_ILS:511780 2024-12-26T14:33:20Z 2024-12-26T14:33:20Z Yazar&#160;Rizanaj, Flora Hajdarmataj.<br/>Yer Numaras&#305;&#160;HM742 R59 2020<br/>Format:&#160;Kitap<br/>Durum&#160;Beytepe K&uuml;t&uuml;phanesi~1<br/> Global cyber security labor shortage and international business risk ent://SD_ILS/0/SD_ILS:481810 2024-12-26T14:33:20Z 2024-12-26T14:33:20Z Yazar&#160;Christiansen, Bryan, 1960- editor.&#160;Piekarz, Agnieszka, 1990- editor.&#160;IGI Global, publisher.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-5927-6">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-5927-6</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Artificial intelligence and security challenges in emerging networks ent://SD_ILS/0/SD_ILS:481975 2024-12-26T14:33:20Z 2024-12-26T14:33:20Z Yazar&#160;Abassi, Ryma, 1980- editor.&#160;IGI Global, publisher.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-7353-1">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-7353-1</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Cloud security : concepts, methodologies, tools, and applications ent://SD_ILS/0/SD_ILS:482163 2024-12-26T14:33:20Z 2024-12-26T14:33:20Z Yazar&#160;IGI Global, publisher.&#160;Information Resources Management Association.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-8176-5">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-8176-5</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Detection and mitigation of insider attacks in a cloud infrastructure : emerging research and opportunities ent://SD_ILS/0/SD_ILS:482113 2024-12-26T14:33:20Z 2024-12-26T14:33:20Z Yazar&#160;Gunasekhar, T., 1990- author.&#160;Rao, K. Thirupathi, author.&#160;Kiran, P. Sai, author.&#160;Krishna Reddy, V., author.&#160;Rao, B. Thirumala, author.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-7924-3">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-7924-3</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Cybersecurity in Nigeria A Case Study of Surveillance and Prevention of Digital Crime ent://SD_ILS/0/SD_ILS:483013 2024-12-26T14:33:20Z 2024-12-26T14:33:20Z Yazar&#160;Iorliam, Aamo. author.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-3-030-15210-9">https://doi.org/10.1007/978-3-030-15210-9</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Ethical hacking : (hacking kursu) ent://SD_ILS/0/SD_ILS:423950 2024-12-26T14:33:20Z 2024-12-26T14:33:20Z Yazar&#160;Usta, G&ouml;khan.<br/>Yer Numaras&#305;&#160;QA76.9.A25 U88 2019<br/>Format:&#160;Kitap<br/>Durum&#160;Beytepe K&uuml;t&uuml;phanesi~1<br/> Siber g&uuml;venlik ve savunma : standartlar ve uygulamalar ent://SD_ILS/0/SD_ILS:462283 2024-12-26T14:33:20Z 2024-12-26T14:33:20Z Yazar&#160;Sa&#287;&#305;ro&#287;lu, &#350;eref.<br/>Yer Numaras&#305;&#160;TK5105.59 S53 2019<br/>Format:&#160;Kitap<br/>Durum&#160;Beytepe K&uuml;t&uuml;phanesi~2<br/> Cryptographic security solutions for the internet of things ent://SD_ILS/0/SD_ILS:481771 2024-12-26T14:33:20Z 2024-12-26T14:33:20Z Yazar&#160;Banday, Mohammad Tariq, 1969- editor.&#160;IGI Global, publisher.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-5742-5">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-5742-5</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Exploring security in software architecture and design ent://SD_ILS/0/SD_ILS:481871 2024-12-26T14:33:20Z 2024-12-26T14:33:20Z Yazar&#160;Felderer, Michael, editor.&#160;Scandariato, Riccardo, editor.&#160;IGI Global, publisher.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-6313-6">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-6313-6</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Advanced methodologies and technologies in system security, information privacy, and forensics ent://SD_ILS/0/SD_ILS:482009 2024-12-26T14:33:20Z 2024-12-26T14:33:20Z Yazar&#160;Khosrow-Pour, Mehdi, 1951- editor.&#160;IGI Global, publisher.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-7492-7">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-7492-7</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Machine learning and cognitive science applications in cyber security ent://SD_ILS/0/SD_ILS:482151 2024-12-26T14:33:20Z 2024-12-26T14:33:20Z Yazar&#160;Khan, Muhammad Salman, author.&#160;IGI Global, publisher.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-8100-0">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-8100-0</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Cybersecurity education for awareness and compliance ent://SD_ILS/0/SD_ILS:482092 2024-12-26T14:33:20Z 2024-12-26T14:33:20Z Yazar&#160;Vasileiou, Ismini, 1980- editor.&#160;Furnell, Steven, 1970- editor.&#160;IGI Global, publisher.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-7847-5">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-7847-5</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> National security : breakthroughs in research and practice ent://SD_ILS/0/SD_ILS:482109 2024-12-26T14:33:20Z 2024-12-26T14:33:20Z Yazar&#160;IGI Global, publisher.&#160;Information Resources Management Association, editor.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-7912-0">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-7912-0</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Security and Privacy Second ISEA International Conference, ISEA-ISAP 2018, Jaipur, India, January, 9&ndash;11, 2019, Revised Selected Papers ent://SD_ILS/0/SD_ILS:483112 2024-12-26T14:33:20Z 2024-12-26T14:33:20Z Yazar&#160;Nandi, Sukumar. editor.&#160;Jinwala, Devesh. editor.&#160;Singh, Virendra. editor.&#160;Laxmi, Vijay. editor.&#160;Gaur, Manoj Singh. editor.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-981-13-7561-3">https://doi.org/10.1007/978-981-13-7561-3</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Information Security Theory and Practice 12th IFIP WG 11.2 International Conference, WISTP 2018, Brussels, Belgium, December 10&ndash;11, 2018, Revised Selected Papers ent://SD_ILS/0/SD_ILS:484518 2024-12-26T14:33:20Z 2024-12-26T14:33:20Z Yazar&#160;Blazy, Olivier. editor. (orcid)0000-0001-6205-8249&#160;Yeun, Chan Yeob. editor. (orcid)0000-0002-1398-952X&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-3-030-20074-9">https://doi.org/10.1007/978-3-030-20074-9</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Cyberdanger Understanding and Guarding Against Cybercrime ent://SD_ILS/0/SD_ILS:485936 2024-12-26T14:33:20Z 2024-12-26T14:33:20Z Yazar&#160;Willems, Eddy. author.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-3-030-04531-9">https://doi.org/10.1007/978-3-030-04531-9</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Countering cyber attacks and preserving the integrity and availability of critical systems ent://SD_ILS/0/SD_ILS:482177 2024-12-26T14:33:20Z 2024-12-26T14:33:20Z Yazar&#160;Geetha, S., 1979- editor.&#160;Phamila, Asnath Victy, 1978- editor.&#160;IGI Global, publisher.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-8241-0">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-8241-0</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Network security and its impact on business strategy ent://SD_ILS/0/SD_ILS:482213 2024-12-26T14:33:20Z 2024-12-26T14:33:20Z Yazar&#160;Oncioiu, Ionica, 1972- editor.&#160;IGI Global, publisher.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-8455-1">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-8455-1</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Cyber Security Cryptography and Machine Learning Third International Symposium, CSCML 2019, Beer-Sheva, Israel, June 27&ndash;28, 2019, Proceedings ent://SD_ILS/0/SD_ILS:484186 2024-12-26T14:33:20Z 2024-12-26T14:33:20Z Yazar&#160;Dolev, Shlomi. editor.&#160;Hendler, Danny. editor.&#160;Lodha, Sachin. editor.&#160;Yung, Moti. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-3-030-20951-3">https://doi.org/10.1007/978-3-030-20951-3</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Innovations and Interdisciplinary Solutions for Underserved Areas Third EAI International Conference, InterSol 2019, Cairo, Egypt, February 14&ndash;15, 2019, Proceedings ent://SD_ILS/0/SD_ILS:484846 2024-12-26T14:33:20Z 2024-12-26T14:33:20Z Yazar&#160;Bassioni, Ghada. editor.&#160;Kebe, Cheikh M.F. editor.&#160;Gueye, Assane. editor. (orcid)0000-0001-6469-4716&#160;Ndiaye, Ababacar. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-3-030-34863-2">https://doi.org/10.1007/978-3-030-34863-2</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Secure IT Systems 24th Nordic Conference, NordSec 2019, Aalborg, Denmark, November 18&ndash;20, 2019, Proceedings ent://SD_ILS/0/SD_ILS:484847 2024-12-26T14:33:20Z 2024-12-26T14:33:20Z Yazar&#160;Askarov, Aslan. editor.&#160;Hansen, Ren&eacute; Rydhof. editor.&#160;Rafnsson, Willard. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-3-030-35055-0">https://doi.org/10.1007/978-3-030-35055-0</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Information Security 22nd International Conference, ISC 2019, New York City, NY, USA, September 16&ndash;18, 2019, Proceedings ent://SD_ILS/0/SD_ILS:484908 2024-12-26T14:33:20Z 2024-12-26T14:33:20Z Yazar&#160;Lin, Zhiqiang. editor.&#160;Papamanthou, Charalampos. editor.&#160;Polychronakis, Michalis. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-3-030-30215-3">https://doi.org/10.1007/978-3-030-30215-3</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Information and Operational Technology Security Systems First International Workshop, IOSec 2018, CIPSEC Project, Heraklion, Crete, Greece, September 13, 2018, Revised Selected Papers ent://SD_ILS/0/SD_ILS:486944 2024-12-26T14:33:20Z 2024-12-26T14:33:20Z Yazar&#160;Fournaris, Apostolos P. editor. (orcid)0000-0002-4758-2349&#160;Lampropoulos, Konstantinos. editor.&#160;Mar&iacute;n Tordera, Eva. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-3-030-12085-6">https://doi.org/10.1007/978-3-030-12085-6</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Selected Areas in Cryptography &ndash; SAC 2018 25th International Conference, Calgary, AB, Canada, August 15&ndash;17, 2018, Revised Selected Papers ent://SD_ILS/0/SD_ILS:483366 2024-12-26T14:33:20Z 2024-12-26T14:33:20Z Yazar&#160;Cid, Carlos. editor. (orcid)0000-0001-5761-8694&#160;Jacobson Jr., Michael J. editor. (orcid)0000-0002-4906-0544&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-3-030-10970-7">https://doi.org/10.1007/978-3-030-10970-7</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Security and Privacy in Social Networks and Big Data 5th International Symposium, SocialSec 2019, Copenhagen, Denmark, July 14-17, 2019, Revised Selected Papers ent://SD_ILS/0/SD_ILS:483889 2024-12-26T14:33:20Z 2024-12-26T14:33:20Z Yazar&#160;Meng, Weizhi. editor. (orcid)0000-0003-4384-5786&#160;Furnell, Steven. editor. (orcid)0000-0003-0984-7542&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-981-15-0758-8">https://doi.org/10.1007/978-981-15-0758-8</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Applied Cryptography and Network Security Workshops ACNS 2019 Satellite Workshops, SiMLA, Cloud S&amp;P, AIBlock, and AIoTS, Bogota, Colombia, June 5&ndash;7, 2019, Proceedings ent://SD_ILS/0/SD_ILS:484047 2024-12-26T14:33:20Z 2024-12-26T14:33:20Z Yazar&#160;Zhou, Jianying. editor. (orcid)0000-0003-0594-0432&#160;Deng, Robert. editor. (orcid)0000-0003-3491-8146&#160;Li, Zhou. editor.&#160;Majumdar, Suryadipta. editor. (orcid)0000-0002-6501-4214&#160;Meng, Weizhi. editor. (orcid)0000-0003-4384-5786<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-3-030-29729-9">https://doi.org/10.1007/978-3-030-29729-9</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Arithmetic of Finite Fields 7th International Workshop, WAIFI 2018, Bergen, Norway, June 14-16, 2018, Revised Selected Papers ent://SD_ILS/0/SD_ILS:400306 2024-12-26T14:33:20Z 2024-12-26T14:33:20Z Yazar&#160;Budaghyan, Lilya. editor.&#160;Rodr&iacute;guez-Henr&iacute;quez, Francisco. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-3-030-05153-2">https://doi.org/10.1007/978-3-030-05153-2</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Dijital mahremiyet : Yeni medya ve g&ouml;zetim toplumu ent://SD_ILS/0/SD_ILS:462621 2024-12-26T14:33:20Z 2024-12-26T14:33:20Z Yazar&#160;Ar&#305;k, Emel.<br/>Yer Numaras&#305;&#160;HM742 A75 2018<br/>Format:&#160;Kitap<br/>Durum&#160;Beytepe K&uuml;t&uuml;phanesi~1<br/> Exploit geli&#351;tirme 101 ent://SD_ILS/0/SD_ILS:389077 2024-12-26T14:33:20Z 2024-12-26T14:33:20Z Yazar&#160;Aky&#305;ld&#305;z, M. Alparslan.<br/>Yer Numaras&#305;&#160;QA76.9.A25 A59 2018<br/>Format:&#160;Kitap<br/>Durum&#160;Beytepe K&uuml;t&uuml;phanesi~2<br/> Smart Computing and Communication Third International Conference, SmartCom 2018, Tokyo, Japan, December 10&ndash;12, 2018, Proceedings ent://SD_ILS/0/SD_ILS:400107 2024-12-26T14:33:20Z 2024-12-26T14:33:20Z Yazar&#160;Qiu, Meikang. editor. (orcid)0000-0002-1004-0140&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-3-030-05755-8">https://doi.org/10.1007/978-3-030-05755-8</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Wired/Wireless Internet Communications 16th IFIP WG 6.2 International Conference, WWIC 2018, Boston, MA, USA, June 18&ndash;20, 2018, Proceedings ent://SD_ILS/0/SD_ILS:400186 2024-12-26T14:33:20Z 2024-12-26T14:33:20Z Yazar&#160;Chowdhury, Kaushik Roy. editor.&#160;Di Felice, Marco. editor.&#160;Matta, Ibrahim. editor.&#160;Sheng, Bo. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-3-030-02931-9">https://doi.org/10.1007/978-3-030-02931-9</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> The Wiley handbook on violence in education : forms, factors, and preventions ent://SD_ILS/0/SD_ILS:424150 2024-12-26T14:33:20Z 2024-12-26T14:33:20Z Yazar&#160;Shapiro, Harvey, 1952- editor.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1002/9781118966709">Wiley Online Library</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Tourism oriented policing and protective services ent://SD_ILS/0/SD_ILS:482030 2024-12-26T14:33:20Z 2024-12-26T14:33:20Z Yazar&#160;Tarlow, Peter E., author.&#160;IGI Global, publisher.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-7579-5">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-7579-5</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Safe mobility : challenges, methodology and solutions ent://SD_ILS/0/SD_ILS:422084 2024-12-26T14:33:20Z 2024-12-26T14:33:20Z Yazar&#160;Lord, Dominique, 1969- editor.&#160;Washington, Simon, editor.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://www.emerald.com/insight/publication/doi/10.1108/S2044-9941201811">https://www.emerald.com/insight/publication/doi/10.1108/S2044-9941201811</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> The basics of cyber safety : computer and mobile device safety made easy ent://SD_ILS/0/SD_ILS:459044 2024-12-26T14:33:20Z 2024-12-26T14:33:20Z Yazar&#160;Sammons, John, author.&#160;Cross, Michael, 1965- author.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780124166509">http://www.sciencedirect.com/science/book/9780124166509</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> RIoT control : understanding and managing risks and the internet of things ent://SD_ILS/0/SD_ILS:459100 2024-12-26T14:33:20Z 2024-12-26T14:33:20Z Yazar&#160;Macaulay, Tyson, author.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780124199712">http://www.sciencedirect.com/science/book/9780124199712</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Penetration tester's open source toolkit ent://SD_ILS/0/SD_ILS:459114 2024-12-26T14:33:20Z 2024-12-26T14:33:20Z Yazar&#160;Faircloth, Jeremy, author.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128021491">http://www.sciencedirect.com/science/book/9780128021491</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Mobile security and privacy : advances, challenges and future research directions ent://SD_ILS/0/SD_ILS:459122 2024-12-26T14:33:20Z 2024-12-26T14:33:20Z Yazar&#160;Au, Man-Ho, editor.&#160;Choo, Raymond Kim-Kwang, editor.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="https://www.sciencedirect.com/science/book/9780128046296">https://www.sciencedirect.com/science/book/9780128046296</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Handbook of system safety and security : cyber risk and risk management, cyber security, threat analysis, functional safety, software systems, and cyber physical systems ent://SD_ILS/0/SD_ILS:459145 2024-12-26T14:33:20Z 2024-12-26T14:33:20Z Yazar&#160;Griffor, Edward R., editor.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128037737">http://www.sciencedirect.com/science/book/9780128037737</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Building a practical information security program ent://SD_ILS/0/SD_ILS:459146 2024-12-26T14:33:20Z 2024-12-26T14:33:20Z Yazar&#160;Andress, Jason, author.&#160;Leary, Mark, author.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128020425">http://www.sciencedirect.com/science/book/9780128020425</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Advanced persistent security : a cyberwarfare approach to implementing adaptive enterprise protection, detection, and reaction strategies ent://SD_ILS/0/SD_ILS:459204 2024-12-26T14:33:20Z 2024-12-26T14:33:20Z Yazar&#160;Winkler, Ira, author.&#160;Gomes, Araceli Treu, author.&#160;Shackleford, Dave, editor.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="https://www.sciencedirect.com/science/book/9780128093160">https://www.sciencedirect.com/science/book/9780128093160</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Hacking wireless access points : cracking, tracking, and signal jacking ent://SD_ILS/0/SD_ILS:459299 2024-12-26T14:33:20Z 2024-12-26T14:33:20Z Yazar&#160;Kurtz, Jennifer Ann, author.&#160;Kaczmarek, Richard.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128053157">http://www.sciencedirect.com/science/book/9780128053157</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Securing the internet of things ent://SD_ILS/0/SD_ILS:459335 2024-12-26T14:33:20Z 2024-12-26T14:33:20Z Yazar&#160;Li, Shancang, author.&#160;Xu, Li D., author.&#160;Romdhani, Imed, contributor.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="https://www.sciencedirect.com/science/book/9780128044582">https://www.sciencedirect.com/science/book/9780128044582</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Federal cloud computing : the definitive guide for cloud service providers ent://SD_ILS/0/SD_ILS:459338 2024-12-26T14:33:20Z 2024-12-26T14:33:20Z Yazar&#160;Metheny, Matthew, author.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128097106">http://www.sciencedirect.com/science/book/9780128097106</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Safety of web applications : risks, encryption and handling vulnerabilities with PHP ent://SD_ILS/0/SD_ILS:459467 2024-12-26T14:33:20Z 2024-12-26T14:33:20Z Yazar&#160;Quinton, &Eacute;ric, author.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781785482281">http://www.sciencedirect.com/science/book/9781785482281</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Computer and information security handbook ent://SD_ILS/0/SD_ILS:459518 2024-12-26T14:33:20Z 2024-12-26T14:33:20Z Yazar&#160;Vacca, John R., editor.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="https://www.sciencedirect.com/science/book/9780128038437">https://www.sciencedirect.com/science/book/9780128038437</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Security in network functions virtualization ent://SD_ILS/0/SD_ILS:459901 2024-12-26T14:33:20Z 2024-12-26T14:33:20Z Yazar&#160;Zhang, Zonghua, author.&#160;Meddahi, Ahmed, author.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781785482571">https://www.sciencedirect.com/science/book/9781785482571</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Windows registry forensics : advanced digital forensic analysis of the Windows registry ent://SD_ILS/0/SD_ILS:458777 2024-12-26T14:33:20Z 2024-12-26T14:33:20Z Yazar&#160;Carvey, Harlan A., author.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128032916">http://www.sciencedirect.com/science/book/9780128032916</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Data breach preparation and response : breaches are certain, impact is not ent://SD_ILS/0/SD_ILS:458926 2024-12-26T14:33:20Z 2024-12-26T14:33:20Z Yazar&#160;Fowler, Kevvie, author.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="https://www.sciencedirect.com/science/book/9780128034514">https://www.sciencedirect.com/science/book/9780128034514</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> DNS security : defending the domain name system ent://SD_ILS/0/SD_ILS:458935 2024-12-26T14:33:20Z 2024-12-26T14:33:20Z Yazar&#160;Liska, Allan, author.&#160;Stowe, Geoffrey, author.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128033067">http://www.sciencedirect.com/science/book/9780128033067</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Cyber guerilla ent://SD_ILS/0/SD_ILS:458953 2024-12-26T14:33:20Z 2024-12-26T14:33:20Z Yazar&#160;Haaster, Jelle van, author.&#160;Gevers, Rickey, author.&#160;Sprengers, Martijn, author.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128051979">http://www.sciencedirect.com/science/book/9780128051979</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Information security science : measuring the vulnerability to data compromises ent://SD_ILS/0/SD_ILS:458968 2024-12-26T14:33:20Z 2024-12-26T14:33:20Z Yazar&#160;Young, Carl S., author.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128096437">http://www.sciencedirect.com/science/book/9780128096437</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Eleventh Hour CISSP&reg; ent://SD_ILS/0/SD_ILS:459073 2024-12-26T14:33:20Z 2024-12-26T14:33:20Z Yazar&#160;Conrad, Eric, author.&#160;Seth Misenar, author.&#160;Joshua Feldman, author.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128112489">http://www.sciencedirect.com/science/book/9780128112489</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Coding for penetration testers : building better tools ent://SD_ILS/0/SD_ILS:459217 2024-12-26T14:33:20Z 2024-12-26T14:33:20Z Yazar&#160;Andress, Jason, author.&#160;Linn, Ryan, author.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128054727">http://www.sciencedirect.com/science/book/9780128054727</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Guidelines for asset integrity management ent://SD_ILS/0/SD_ILS:424271 2024-12-26T14:33:20Z 2024-12-26T14:33:20Z Yazar&#160;American Institute of Chemical Engineers. Center for Chemical Process Safety, author.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1002/9781119364276">Wiley Online Library</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Mobile data loss : threats and countermeasures ent://SD_ILS/0/SD_ILS:458729 2024-12-26T14:33:20Z 2024-12-26T14:33:20Z Yazar&#160;Raggo, Michael T.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="https://www.sciencedirect.com/science/book/9780128028643">https://www.sciencedirect.com/science/book/9780128028643</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Cyber security awareness for CEOs and management ent://SD_ILS/0/SD_ILS:458665 2024-12-26T14:33:20Z 2024-12-26T14:33:20Z Yazar&#160;Willson, David (Lawyer), author.&#160;Dalziel, Henry, editor.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128047545">http://www.sciencedirect.com/science/book/9780128047545</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Automated security analysis of Android and iOS applications with mobile security framework ent://SD_ILS/0/SD_ILS:458694 2024-12-26T14:33:20Z 2024-12-26T14:33:20Z Yazar&#160;Abraham, Ajin, author.&#160;Dalziel, Henry, editor.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="https://www.sciencedirect.com/science/book/9780128047187">https://www.sciencedirect.com/science/book/9780128047187</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Network performance and security : testing and analyzing using open source and low-cost tools ent://SD_ILS/0/SD_ILS:458789 2024-12-26T14:33:20Z 2024-12-26T14:33:20Z Yazar&#160;Chapman, Chris, author.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128035849">http://www.sciencedirect.com/science/book/9780128035849</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Hacking Interface ent://SD_ILS/0/SD_ILS:513452 2024-12-26T14:33:20Z 2024-12-26T14:33:20Z Yazar&#160;Elbahad&#305;r, Hamza.<br/>Yer Numaras&#305;&#160;QA76.9.A25 E43 2016<br/>Format:&#160;Kitap<br/>Durum&#160;Beytepe K&uuml;t&uuml;phanesi~1<br/> Dissecting the hack : the v3rb0ten network ent://SD_ILS/0/SD_ILS:458624 2024-12-26T14:33:20Z 2024-12-26T14:33:20Z Yazar&#160;Street, Jayson E., author.&#160;Sims, Kristin, author.&#160;Baskin, Brian, author.&#160;Martin, Brian, editor.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="https://www.sciencedirect.com/science/book/9780128042786">https://www.sciencedirect.com/science/book/9780128042786</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Tam kapsaml&#305; sanal test laboratuvar&#305; kurulumu ve uygulamal&#305; s&#305;zma testleri ent://SD_ILS/0/SD_ILS:513467 2024-12-26T14:33:20Z 2024-12-26T14:33:20Z Yazar&#160;Yal&ccedil;&#305;nkaya, Mehmet Ali, yazar.&#160;K&uuml;&ccedil;&uuml;ksille, Ecir U&#287;ur, yazar.<br/>Yer Numaras&#305;&#160;TK5105.59 Y35 2015<br/>Format:&#160;Gri Yay&#305;nlar<br/>Durum&#160;Beytepe K&uuml;t&uuml;phanesi~1<br/> Innovating for Healthy Urbanization ent://SD_ILS/0/SD_ILS:520014 2024-12-26T14:33:20Z 2024-12-26T14:33:20Z Yazar&#160;Ahn, Roy. editor.&#160;Burke, Thomas F. editor.&#160;McGahan, Anita M. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;XX(520014.1)<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-1-4899-7597-3">https://doi.org/10.1007/978-1-4899-7597-3</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Securing VoIP : keeping your VoIP network safe ent://SD_ILS/0/SD_ILS:355417 2024-12-26T14:33:20Z 2024-12-26T14:33:20Z Yazar&#160;Bates, Regis J. author.<br/>Yer Numaras&#305;&#160;ONLINE(355417.1)<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780124170391">http://www.sciencedirect.com/science/book/9780124170391</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> CSA guide to cloud computing implementing cloud privacy and security ent://SD_ILS/0/SD_ILS:355449 2024-12-26T14:33:20Z 2024-12-26T14:33:20Z Yazar&#160;Samani, Raj, author.&#160;Honan, Brian, author.&#160;Reavis, Jim, author.&#160;Jirasek, Vladimir, editor.&#160;CSA (Organization), issuing body.<br/>Yer Numaras&#305;&#160;ONLINE(355449.1)<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780124201255">http://www.sciencedirect.com/science/book/9780124201255</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Managing online risk : apps, mobile, and social media security ent://SD_ILS/0/SD_ILS:355514 2024-12-26T14:33:20Z 2024-12-26T14:33:20Z Yazar&#160;Gonzalez, Deborah, author.<br/>Yer Numaras&#305;&#160;ONLINE(355514.1)<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780124200555">http://www.sciencedirect.com/science/book/9780124200555</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> The practical guide to HIPAA privacy and security compliance ent://SD_ILS/0/SD_ILS:356412 2024-12-26T14:33:20Z 2024-12-26T14:33:20Z Yazar&#160;Herold, Rebecca, author.&#160;Beaver, Kevin, author.<br/>Yer Numaras&#305;&#160;ONLINE(356412.1)<br/>Elektronik Eri&#351;im&#160;<a href="http://marc.crcnetbase.com/isbn/9781439855591">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Cybervetting : Internet searches for vetting, investigations, and open-source intelligence ent://SD_ILS/0/SD_ILS:356418 2024-12-26T14:33:20Z 2024-12-26T14:33:20Z Yazar&#160;Appel, Edward J., author.<br/>Yer Numaras&#305;&#160;ONLINE(356418.1)<br/>Elektronik Eri&#351;im&#160;<a href="http://marc.crcnetbase.com/isbn/9781482238860">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Port security management ent://SD_ILS/0/SD_ILS:356427 2024-12-26T14:33:20Z 2024-12-26T14:33:20Z Yazar&#160;Christopher, Kenneth, 1954- author.<br/>Yer Numaras&#305;&#160;ONLINE(356427.1)<br/>Elektronik Eri&#351;im&#160;<a href="http://marc.crcnetbase.com/isbn/9781466591646">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Case studies in secure computing : achievements and trends ent://SD_ILS/0/SD_ILS:356504 2024-12-26T14:33:20Z 2024-12-26T14:33:20Z Yazar&#160;Issac, Biju, editor.&#160;Israr, Nauman, editor.<br/>Yer Numaras&#305;&#160;ONLINE(356504.1)<br/>Elektronik Eri&#351;im&#160;<a href="http://marc.crcnetbase.com/isbn/9781482207071">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Preventing medical device recalls ent://SD_ILS/0/SD_ILS:356928 2024-12-26T14:33:20Z 2024-12-26T14:33:20Z Yazar&#160;Raheja, Dev, author.<br/>Yer Numaras&#305;&#160;ONLINE(356928.1)<br/>Elektronik Eri&#351;im&#160;<a href="http://marc.crcnetbase.com/isbn/9781466568235">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> A&#287; ve yaz&#305;l&#305;m g&uuml;venli&#287;i ent://SD_ILS/0/SD_ILS:379758 2024-12-26T14:33:20Z 2024-12-26T14:33:20Z Yazar&#160;&Ccedil;ontar, Furkan.<br/>Yer Numaras&#305;&#160;TK5105.59 C66 2015<br/>Format:&#160;Kitap<br/>Durum&#160;Beytepe K&uuml;t&uuml;phanesi~1<br/> Siber istihbarat ent://SD_ILS/0/SD_ILS:384051 2024-12-26T14:33:20Z 2024-12-26T14:33:20Z Yazar&#160;Kele&#351;temur, Atalay<br/>Yer Numaras&#305;&#160;QA76.9.A25 K45 2015<br/>Format:&#160;Kitap<br/>Durum&#160;Beytepe K&uuml;t&uuml;phanesi~1<br/> Siber g&uuml;venlik ve elektronik bile&#351;enleri ent://SD_ILS/0/SD_ILS:380281 2024-12-26T14:33:20Z 2024-12-26T14:33:20Z Yazar&#160;&Uuml;nal, Ahmet Naci<br/>Yer Numaras&#305;&#160;UG485 U53 2015<br/>Format:&#160;Kitap<br/>Durum&#160;Beytepe K&uuml;t&uuml;phanesi~1<br/> Practical deployment of Cisco Identity Services Engine (ISE) : real-world examples of AAA deployments ent://SD_ILS/0/SD_ILS:458699 2024-12-26T14:33:20Z 2024-12-26T14:33:20Z Yazar&#160;Richter, Andy, author.&#160;Wood, Jeremy, author.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="https://www.sciencedirect.com/science/book/9780128044575">https://www.sciencedirect.com/science/book/9780128044575</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Physical security and safety : a field guide for the practitioner ent://SD_ILS/0/SD_ILS:356787 2024-12-26T14:33:20Z 2024-12-26T14:33:20Z Yazar&#160;Ricks, Truett A., editor.&#160;Ricks, Bobby E., editor.&#160;Dingle, Jeffrey, editor.<br/>Yer Numaras&#305;&#160;ONLINE(356787.1)<br/>Elektronik Eri&#351;im&#160;<a href="http://marc.crcnetbase.com/isbn/9781482227031">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Data center handbook ent://SD_ILS/0/SD_ILS:342066 2024-12-26T14:33:20Z 2024-12-26T14:33:20Z Yazar&#160;Geng, Hwaiyu, editor.<br/>Yer Numaras&#305;&#160;ONLINE(342066.1)<br/>Elektronik Eri&#351;im&#160;ebrary <a href="http://alltitles.ebrary.com/Doc?id=10992793">An electronic book accessible through the World Wide Web; click to view</a> John Wiley <a href="http://dx.doi.org/10.1002/9781118937563">http://dx.doi.org/10.1002/9781118937563</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Disaster planning for libraries : process and guidelines ent://SD_ILS/0/SD_ILS:355356 2024-12-26T14:33:20Z 2024-12-26T14:33:20Z Yazar&#160;Robertson, Guy, author.<br/>Yer Numaras&#305;&#160;ONLINE(355356.1)<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781843347309">http://www.sciencedirect.com/science/book/9781843347309</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> PCI compliance : understand and implement effective PCI data security standard compliance ent://SD_ILS/0/SD_ILS:355363 2024-12-26T14:33:20Z 2024-12-26T14:33:20Z Yazar&#160;Williams, Branden R., author.&#160;Chuvakin, Anton A., author.&#160;Milroy, Derek, editor<br/>Yer Numaras&#305;&#160;ONLINE(355363.1)<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128015797">http://www.sciencedirect.com/science/book/9780128015797</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Information security analytics finding security insights, patterns, and anomalies in big data ent://SD_ILS/0/SD_ILS:355388 2024-12-26T14:33:20Z 2024-12-26T14:33:20Z Yazar&#160;Talabis, Mark, author.&#160;McPherson, Robert, author.&#160;Miyamoto, I, author.&#160;Martin, Jason L., author.<br/>Yer Numaras&#305;&#160;ONLINE(355388.1)<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128002070">http://www.sciencedirect.com/science/book/9780128002070</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Smart security : practices that increase business profits, proven practices ent://SD_ILS/0/SD_ILS:355715 2024-12-26T14:33:20Z 2024-12-26T14:33:20Z Yazar&#160;Quilter, J. David, author.<br/>Yer Numaras&#305;&#160;ONLINE(355715.1)<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128009277">http://www.sciencedirect.com/science/book/9780128009277</a> ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128009222">http://www.sciencedirect.com/science/book/9780128009222</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Secure development for mobile apps : how to design and code secure mobile applications with PHP and JavaScript ent://SD_ILS/0/SD_ILS:356367 2024-12-26T14:33:20Z 2024-12-26T14:33:20Z Yazar&#160;Glaser, J. D., author.<br/>Yer Numaras&#305;&#160;ONLINE(356367.1)<br/>Elektronik Eri&#351;im&#160;<a href="http://marc.crcnetbase.com/isbn/9781482209044">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Android malware and analysis ent://SD_ILS/0/SD_ILS:356400 2024-12-26T14:33:20Z 2024-12-26T14:33:20Z Yazar&#160;Dunham, Ken, author.&#160;Hartman, Shane, author.&#160;Morales, Jose Andre, author.&#160;Quintans, Manu, author.&#160;Strazzere, Tim, author.<br/>Yer Numaras&#305;&#160;ONLINE(356400.1)<br/>Elektronik Eri&#351;im&#160;<a href="http://marc.crcnetbase.com/isbn/9781482252200">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> The Wiley handbook of psychology, technology and society ent://SD_ILS/0/SD_ILS:387129 2024-12-26T14:33:20Z 2024-12-26T14:33:20Z Yazar&#160;Cheever, Nancy A., editor.&#160;Rosen, Larry D., editor.&#160;Carrier, L. Mark, editor.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1002/9781118771952">Wiley Online Library</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Encyclopedia of Biometrics ent://SD_ILS/0/SD_ILS:518417 2024-12-26T14:33:20Z 2024-12-26T14:33:20Z Yazar&#160;Li, Stan Z. editor.&#160;Jain, Anil K. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;XX(518417.1)<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-1-4899-7488-4">https://doi.org/10.1007/978-1-4899-7488-4</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Networked Systems Third International Conference, NETYS 2015, Agadir, Morocco, May 13-15, 2015, Revised Selected Papers ent://SD_ILS/0/SD_ILS:519167 2024-12-26T14:33:20Z 2024-12-26T14:33:20Z Yazar&#160;Bouajjani, Ahmed. editor.&#160;Fauconnier, Hugues. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;XX(519167.1)<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-3-319-26850-7">https://doi.org/10.1007/978-3-319-26850-7</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Network and system security ent://SD_ILS/0/SD_ILS:306690 2024-12-26T14:33:20Z 2024-12-26T14:33:20Z Yazar&#160;Vacca, John R.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780124166899">http://www.sciencedirect.com/science/book/9780124166899</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Managing information security ent://SD_ILS/0/SD_ILS:306692 2024-12-26T14:33:20Z 2024-12-26T14:33:20Z Yazar&#160;Vacca, John R.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780124166882">http://www.sciencedirect.com/science/book/9780124166882</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Total information risk management maximizing the value of data and information assets ent://SD_ILS/0/SD_ILS:306693 2024-12-26T14:33:20Z 2024-12-26T14:33:20Z Yazar&#160;Borek, Alexander.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780124055476">http://www.sciencedirect.com/science/book/9780124055476</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Business continuity and disaster recovery planning for IT professionals ent://SD_ILS/0/SD_ILS:306695 2024-12-26T14:33:20Z 2024-12-26T14:33:20Z Yazar&#160;Snedaker, Susan.&#160;Rima, Chris.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780124105263">http://www.sciencedirect.com/science/book/9780124105263</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Hacking Interface ent://SD_ILS/0/SD_ILS:317847 2024-12-26T14:33:20Z 2024-12-26T14:33:20Z Yazar&#160;Elbahad&#305;r, Hamza.<br/>Yer Numaras&#305;&#160;QA 76.9 A25 E43 2014<br/>Format:&#160;Kitap<br/>Durum&#160;Beytepe K&uuml;t&uuml;phanesi~2<br/> The deadly life of logistics mapping the violence of global trade ent://SD_ILS/0/SD_ILS:323619 2024-12-26T14:33:20Z 2024-12-26T14:33:20Z Yazar&#160;Cowen, Deborah.&#160;Project Muse.<br/>Yer Numaras&#305;&#160;ONLINE(323619.1)<br/>Elektronik Eri&#351;im&#160;<a href="http://muse.jhu.edu/books/9781452943183/">Full text available: </a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Distributed networks : intelligence, security, and applications ent://SD_ILS/0/SD_ILS:285408 2024-12-26T14:33:20Z 2024-12-26T14:33:20Z Yazar&#160;Memon, Qurban Ali, editor.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://marc.crcnetbase.com/isbn/9781466559585">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Network anomaly detection : a machine learning perspective ent://SD_ILS/0/SD_ILS:285413 2024-12-26T14:33:20Z 2024-12-26T14:33:20Z Yazar&#160;Bhattacharyya, Dhruba K., author.&#160;Kalita, Jugal Kumar, author.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://marc.crcnetbase.com/isbn/9781466582095">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Unmaking the bomb a fissile material approach to nuclear disarmament and nonproliferation ent://SD_ILS/0/SD_ILS:323735 2024-12-26T14:33:20Z 2024-12-26T14:33:20Z Yazar&#160;Feiveson, Harold A.&#160;Von Hippel, Frank.&#160;Mian, Zia.&#160;Glaser, Alexander, 1969-&#160;Project Muse.<br/>Yer Numaras&#305;&#160;ONLINE(323735.1)<br/>Elektronik Eri&#351;im&#160;<a href="http://muse.jhu.edu/books/9780262319188/">Full text available: </a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Conflict and cooperation in cyberspace : the challenge to national security ent://SD_ILS/0/SD_ILS:286332 2024-12-26T14:33:20Z 2024-12-26T14:33:20Z Yazar&#160;Yannakogeorgos, Panayotis A., editor.&#160;Lowther, Adam, editor.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://marc.crcnetbase.com/isbn/9781466592025">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Security and privacy in smart grids ent://SD_ILS/0/SD_ILS:286317 2024-12-26T14:33:20Z 2024-12-26T14:33:20Z Yazar&#160;Xiao, Yang, 1966-<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://marc.crcnetbase.com/isbn/9781439877845">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Chinese cybersecurity and cyberdefense ent://SD_ILS/0/SD_ILS:342155 2024-12-26T14:33:20Z 2024-12-26T14:33:20Z Yazar&#160;Ventre, Daniel.<br/>Yer Numaras&#305;&#160;ONLINE(342155.1)<br/>Elektronik Eri&#351;im&#160;Ebook Library <a href="http://public.eblib.com/choice/publicfullrecord.aspx?p=1765106">http://public.eblib.com/choice/publicfullrecord.aspx?p=1765106</a> John Wiley <a href="http://dx.doi.org/10.1002/9781119009009">http://dx.doi.org/10.1002/9781119009009</a> MyiLibrary <a href="http://www.myilibrary.com?id=637332">http://www.myilibrary.com?id=637332</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Network Security ent://SD_ILS/0/SD_ILS:342168 2024-12-26T14:33:20Z 2024-12-26T14:33:20Z Yazar&#160;Perez, Andre.<br/>Yer Numaras&#305;&#160;ONLINE(342168.1)<br/>Elektronik Eri&#351;im&#160;ebrary <a href="http://site.ebrary.com/lib/alltitles/docDetail.action?docID=10945002">http://site.ebrary.com/lib/alltitles/docDetail.action?docID=10945002</a> John Wiley <a href="http://dx.doi.org/10.1002/9781119043942">http://dx.doi.org/10.1002/9781119043942</a> MyiLibrary <a href="http://www.myilibrary.com?id=647917">http://www.myilibrary.com?id=647917</a> Image <a href="http://images.contentreserve.com/ImageType-100/0128-1/{D8CDF404-6689-4759-9C8F-A065220E7032}Img100.jpg">http://images.contentreserve.com/ImageType-100/0128-1/{D8CDF404-6689-4759-9C8F-A065220E7032}Img100.jpg</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Developing and securing the cloud ent://SD_ILS/0/SD_ILS:342631 2024-12-26T14:33:20Z 2024-12-26T14:33:20Z Yazar&#160;Thuraisingham, Bhavani M., author.<br/>Yer Numaras&#305;&#160;ONLINE(342631.1)<br/>Elektronik Eri&#351;im&#160;<a href="http://marc.crcnetbase.com/isbn/9781439862926">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Software test attacks to break mobile and embedded devices ent://SD_ILS/0/SD_ILS:342868 2024-12-26T14:33:20Z 2024-12-26T14:33:20Z Yazar&#160;Hagar, Jon Duncan, author.<br/>Yer Numaras&#305;&#160;ONLINE(342868.1)<br/>Elektronik Eri&#351;im&#160;<a href="http://marc.crcnetbase.com/isbn/9781466575318">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> What every engineer should know about cyber security and digital forensics ent://SD_ILS/0/SD_ILS:342886 2024-12-26T14:33:20Z 2024-12-26T14:33:20Z Yazar&#160;DeFranco, Joanna F., author.<br/>Yer Numaras&#305;&#160;ONLINE(342886.1)<br/>Elektronik Eri&#351;im&#160;<a href="http://marc.crcnetbase.com/isbn/9781466564541">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Physical layer security in wireless communications ent://SD_ILS/0/SD_ILS:342887 2024-12-26T14:33:20Z 2024-12-26T14:33:20Z Yazar&#160;Zhou, Xiangyun Sean, editor.&#160;Song, Lingyang, editor.&#160;Zhang, Yan, 1977- editor.<br/>Yer Numaras&#305;&#160;ONLINE(342887.1)<br/>Elektronik Eri&#351;im&#160;<a href="http://marc.crcnetbase.com/isbn/9781466567016">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Cyber reconnaissance, surveillance, and defense ent://SD_ILS/0/SD_ILS:355450 2024-12-26T14:33:20Z 2024-12-26T14:33:20Z Yazar&#160;Shimonski, Robert.<br/>Yer Numaras&#305;&#160;ONLINE(355450.1)<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128013083">http://www.sciencedirect.com/science/book/9780128013083</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Online security for the business traveler ent://SD_ILS/0/SD_ILS:355575 2024-12-26T14:33:20Z 2024-12-26T14:33:20Z Yazar&#160;Gonzalez, Deborah, author.<br/>Yer Numaras&#305;&#160;ONLINE(355575.1)<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128000694">http://www.sciencedirect.com/science/book/9780128000694</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> The basics of information security : understanding the fundamentals of InfoSec in theory and practice ent://SD_ILS/0/SD_ILS:355770 2024-12-26T14:33:20Z 2024-12-26T14:33:20Z Yazar&#160;Andress, Jason, author.<br/>Yer Numaras&#305;&#160;ONLINE(355770.1)<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128007440">http://www.sciencedirect.com/science/book/9780128007440</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Collaboration with cloud computing : security, social media, and unified communications ent://SD_ILS/0/SD_ILS:355829 2024-12-26T14:33:20Z 2024-12-26T14:33:20Z Yazar&#160;Messier, Ric, author.<br/>Yer Numaras&#305;&#160;ONLINE(355829.1)<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780124170407">http://www.sciencedirect.com/science/book/9780124170407</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Targeted cyber attacks : multi-staged attacks driven by exploits and malware ent://SD_ILS/0/SD_ILS:355853 2024-12-26T14:33:20Z 2024-12-26T14:33:20Z Yazar&#160;Sood, Aditya K., author.&#160;Enbody, Richard J., author.<br/>Yer Numaras&#305;&#160;ONLINE(355853.1)<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128006047">http://www.sciencedirect.com/science/book/9780128006047</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Safeguarding cultural properties : security for museums, libraries, parks, and zoos ent://SD_ILS/0/SD_ILS:355864 2024-12-26T14:33:20Z 2024-12-26T14:33:20Z Yazar&#160;Layne, Stevan P., author.<br/>Yer Numaras&#305;&#160;ONLINE(355864.1)<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780124201125">http://www.sciencedirect.com/science/book/9780124201125</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Security careers skills, compensation, and career paths ent://SD_ILS/0/SD_ILS:356043 2024-12-26T14:33:20Z 2024-12-26T14:33:20Z Yazar&#160;Walker, Stephen W.&#160;Foushee, James E.<br/>Yer Numaras&#305;&#160;ONLINE(356043.1)<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128001042">http://www.sciencedirect.com/science/book/9780128001042</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> PCI compliance : the definitive guide ent://SD_ILS/0/SD_ILS:356423 2024-12-26T14:33:20Z 2024-12-26T14:33:20Z Yazar&#160;Bhargav, Abhay, author.<br/>Yer Numaras&#305;&#160;ONLINE(356423.1)<br/>Elektronik Eri&#351;im&#160;<a href="http://marc.crcnetbase.com/isbn/9781439887417">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Conducting network penetration and espionage in a global environment ent://SD_ILS/0/SD_ILS:356516 2024-12-26T14:33:20Z 2024-12-26T14:33:20Z Yazar&#160;Middleton, Bruce, 1953- author.<br/>Yer Numaras&#305;&#160;ONLINE(356516.1)<br/>Elektronik Eri&#351;im&#160;<a href="http://marc.crcnetbase.com/isbn/9781482206487">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Intrusion detection in wireless ad-hoc networks ent://SD_ILS/0/SD_ILS:356477 2024-12-26T14:33:20Z 2024-12-26T14:33:20Z Yazar&#160;Chaki, Nabendu, editor.&#160;Chaki, Rituparna, editor.<br/>Yer Numaras&#305;&#160;ONLINE(356477.1)<br/>Elektronik Eri&#351;im&#160;<a href="http://marc.crcnetbase.com/isbn/9781466515673">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Security for multihop wireless networks ent://SD_ILS/0/SD_ILS:356916 2024-12-26T14:33:20Z 2024-12-26T14:33:20Z Yazar&#160;Khan, Shafiullah, editor.&#160;Lloret Mauri, Jaime, editor.<br/>Yer Numaras&#305;&#160;ONLINE(356916.1)<br/>Elektronik Eri&#351;im&#160;<a href="http://marc.crcnetbase.com/isbn/9781466578043">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Data protection for photographers : a guide to storing and protecting your valuable digital assets ent://SD_ILS/0/SD_ILS:364242 2024-12-26T14:33:20Z 2024-12-26T14:33:20Z Yazar&#160;Corrigan, Patrick H.<br/>Yer Numaras&#305;&#160;TK7895.M4 C67 2014<br/>Format:&#160;Kitap<br/>Durum&#160;Beytepe K&uuml;t&uuml;phanesi~1<br/> Cryptography and network security : principles and practice ent://SD_ILS/0/SD_ILS:371288 2024-12-26T14:33:20Z 2024-12-26T14:33:20Z Yazar&#160;Stallings, William.<br/>Yer Numaras&#305;&#160;TK5105.59 S713 2014<br/>Format:&#160;Kitap<br/>Durum&#160;Beytepe K&uuml;t&uuml;phanesi~1<br/> Security management a critical thinking approach ent://SD_ILS/0/SD_ILS:342845 2024-12-26T14:33:20Z 2024-12-26T14:33:20Z Yazar&#160;Land, Michael (Industrial engineer), author.&#160;Ricks, Truett A., author.&#160;Ricks, Bob, author.<br/>Yer Numaras&#305;&#160;ONLINE(342845.1)<br/>Elektronik Eri&#351;im&#160;<a href="http://marc.crcnetbase.com/isbn/9781466561786">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> The state of the art in intrusion prevention and detection ent://SD_ILS/0/SD_ILS:356396 2024-12-26T14:33:20Z 2024-12-26T14:33:20Z Yazar&#160;Pathan, Al-Sakib Khan, editor.<br/>Yer Numaras&#305;&#160;ONLINE(356396.1)<br/>Elektronik Eri&#351;im&#160;<a href="http://marc.crcnetbase.com/isbn/9781482203523">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> The frugal CISO : using innovation and smart approaches to maximize your security posture ent://SD_ILS/0/SD_ILS:356624 2024-12-26T14:33:20Z 2024-12-26T14:33:20Z Yazar&#160;Anderson, Kerry Ann, author.<br/>Yer Numaras&#305;&#160;ONLINE(356624.1)<br/>Elektronik Eri&#351;im&#160;<a href="http://marc.crcnetbase.com/isbn/9781482220087">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Anonymous communication networks : protecting privacy on the web ent://SD_ILS/0/SD_ILS:356657 2024-12-26T14:33:20Z 2024-12-26T14:33:20Z Yazar&#160;Peng, Kun, author.<br/>Yer Numaras&#305;&#160;ONLINE(356657.1)<br/>Elektronik Eri&#351;im&#160;<a href="http://marc.crcnetbase.com/isbn/9781439881606">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Security without obscurity : a guide to confidentiality, authentication, and integrity ent://SD_ILS/0/SD_ILS:356681 2024-12-26T14:33:20Z 2024-12-26T14:33:20Z Yazar&#160;Stapleton, Jeffrey James, author.<br/>Yer Numaras&#305;&#160;ONLINE(356681.1)<br/>Elektronik Eri&#351;im&#160;<a href="http://marc.crcnetbase.com/isbn/9781466592155">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Bank fraud : using technology to combat losses ent://SD_ILS/0/SD_ILS:341942 2024-12-26T14:33:20Z 2024-12-26T14:33:20Z Yazar&#160;Subramanian, Revathi, author.<br/>Yer Numaras&#305;&#160;ONLINE(341942.1)<br/>Elektronik Eri&#351;im&#160;Bloomberg Law <a href="https://www.bloomberglaw.com/browser/105.491080">https://www.bloomberglaw.com/browser/105.491080</a> Books24x7 <a href="http://www.books24x7.com/marc.asp?bookid=63460">http://www.books24x7.com/marc.asp?bookid=63460</a> Cover image <a href="http://catalogimages.wiley.com/images/db/jimages/9780470494394.jpg">http://catalogimages.wiley.com/images/db/jimages/9780470494394.jpg</a> Cover <a href="http://swbplus.bsz-bw.de/bsz405667086cov.htm">http://swbplus.bsz-bw.de/bsz405667086cov.htm</a> Ebook Library <a href="http://public.eblib.com/choice/publicfullrecord.aspx?p=836562">http://public.eblib.com/choice/publicfullrecord.aspx?p=836562</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Resource optimization and security for cloud services ent://SD_ILS/0/SD_ILS:341979 2024-12-26T14:33:20Z 2024-12-26T14:33:20Z Yazar&#160;Xiong, Kaiqi, author.<br/>Yer Numaras&#305;&#160;ONLINE(341979.1)<br/>Elektronik Eri&#351;im&#160;MyiLibrary <a href="http://www.myilibrary.com?id=578586">http://www.myilibrary.com?id=578586</a> John Wiley <a href="http://dx.doi.org/10.1002/9781118898598">http://dx.doi.org/10.1002/9781118898598</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Cybercrime and cyberwarfare ent://SD_ILS/0/SD_ILS:341980 2024-12-26T14:33:20Z 2024-12-26T14:33:20Z Yazar&#160;Bernik, Igor, author.<br/>Yer Numaras&#305;&#160;ONLINE(341980.1)<br/>Elektronik Eri&#351;im&#160;John Wiley <a href="http://dx.doi.org/10.1002/9781118898604">http://dx.doi.org/10.1002/9781118898604</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Cybersecurity for executives : a practical guide ent://SD_ILS/0/SD_ILS:341997 2024-12-26T14:33:20Z 2024-12-26T14:33:20Z Yazar&#160;Touhill, Gregory J., author.&#160;Touhill, C. J., 1938- author.<br/>Yer Numaras&#305;&#160;ONLINE(341997.1)<br/>Elektronik Eri&#351;im&#160;Ebook Library <a href="http://public.eblib.com/choice/publicfullrecord.aspx?p=1707094">http://public.eblib.com/choice/publicfullrecord.aspx?p=1707094</a> ebrary <a href="http://site.ebrary.com/id/10879737">http://site.ebrary.com/id/10879737</a> John Wiley <a href="http://dx.doi.org/10.1002/9781118908785">http://dx.doi.org/10.1002/9781118908785</a> MyiLibrary <a href="http://www.myilibrary.com?id=621896">http://www.myilibrary.com?id=621896</a> Safari Books Online <a href="http://proquest.safaribooksonline.com/?fpi=9781118908808">http://proquest.safaribooksonline.com/?fpi=9781118908808</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Cyber threat! : how to manage the growing risk of cyber attacks ent://SD_ILS/0/SD_ILS:342020 2024-12-26T14:33:20Z 2024-12-26T14:33:20Z Yazar&#160;Ulsch, N. MacDonnell, 1951-<br/>Yer Numaras&#305;&#160;ONLINE(342020.1)<br/>Elektronik Eri&#351;im&#160;ebrary <a href="http://alltitles.ebrary.com/Doc?id=10895757">An electronic book accessible through the World Wide Web; click to view</a> Ebook Library <a href="http://public.eblib.com/choice/publicfullrecord.aspx?p=1742833">http://public.eblib.com/choice/publicfullrecord.aspx?p=1742833</a> John Wiley <a href="http://dx.doi.org/10.1002/9781118915028">http://dx.doi.org/10.1002/9781118915028</a> MyiLibrary <a href="http://www.myilibrary.com?id=629214">http://www.myilibrary.com?id=629214</a> Cover <a href="http://swbplus.bsz-bw.de/bsz410564842cov.htm">http://swbplus.bsz-bw.de/bsz410564842cov.htm</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Industrial espionage : developing a counterespionage program ent://SD_ILS/0/SD_ILS:342588 2024-12-26T14:33:20Z 2024-12-26T14:33:20Z Yazar&#160;Benny, Daniel J., author.<br/>Yer Numaras&#305;&#160;ONLINE(342588.1)<br/>Elektronik Eri&#351;im&#160;<a href="http://marc.crcnetbase.com/isbn/9781466568150">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Network security essentials : applications and standards ent://SD_ILS/0/SD_ILS:354232 2024-12-26T14:33:20Z 2024-12-26T14:33:20Z Yazar&#160;Stallings, William.<br/>Yer Numaras&#305;&#160;TK5105.59 S725 2014<br/>Format:&#160;Kitap<br/>Durum&#160;Beytepe K&uuml;t&uuml;phanesi~1<br/> Data analysis for network cyber-security ent://SD_ILS/0/SD_ILS:354757 2024-12-26T14:33:20Z 2024-12-26T14:33:20Z Yazar&#160;Adams, Niall M., 1968-&#160;Heard, Nicholas.<br/>Yer Numaras&#305;&#160;TK5105.59 D375 2014<br/>Format:&#160;Kitap<br/>Durum&#160;Beytepe K&uuml;t&uuml;phanesi~1<br/> Secure Messaging on the Internet ent://SD_ILS/0/SD_ILS:354937 2024-12-26T14:33:20Z 2024-12-26T14:33:20Z Yazar&#160;Oppliger, Rolf.<br/>Yer Numaras&#305;&#160;TK5105.73 O67 2014<br/>Format:&#160;Kitap<br/>Durum&#160;Beytepe K&uuml;t&uuml;phanesi~1<br/> Industrial network security : securing critical infrastructure networks for Smart Grid, SCADA , and other industrial control systems ent://SD_ILS/0/SD_ILS:355352 2024-12-26T14:33:20Z 2024-12-26T14:33:20Z Yazar&#160;Knapp, Eric D.&#160;Langill, Joel Thomas.<br/>Yer Numaras&#305;&#160;ONLINE(355352.1)<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780124201149">http://www.sciencedirect.com/science/book/9780124201149</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Security for business professionals how to plan, implement, and manage your company's security program ent://SD_ILS/0/SD_ILS:355603 2024-12-26T14:33:20Z 2024-12-26T14:33:20Z Yazar&#160;Wayland, Bradley A., author.<br/>Yer Numaras&#305;&#160;ONLINE(355603.1)<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128005651">http://www.sciencedirect.com/science/book/9780128005651</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Building an information security awareness program defending against social engineering and technical threats ent://SD_ILS/0/SD_ILS:355618 2024-12-26T14:33:20Z 2024-12-26T14:33:20Z Yazar&#160;Gardner, Bill (Bill G.)&#160;Thomas, Valerie (Information security consultant)<br/>Yer Numaras&#305;&#160;ONLINE(355618.1)<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780124199675">http://www.sciencedirect.com/science/book/9780124199675</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> The handbook for school safety and security : best practices and procedures ent://SD_ILS/0/SD_ILS:355580 2024-12-26T14:33:20Z 2024-12-26T14:33:20Z Yazar&#160;Fennelly, Lawrence J., 1940- editor.&#160;Perry, Marianna A., editor.<br/>Yer Numaras&#305;&#160;ONLINE(355580.1)<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128005682">http://www.sciencedirect.com/science/book/9780128005682</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Personnel protection : residential security, proven practices ent://SD_ILS/0/SD_ILS:355716 2024-12-26T14:33:20Z 2024-12-26T14:33:20Z Yazar&#160;Miller, Jerome, author.&#160;Jones, Radford, author.<br/>Yer Numaras&#305;&#160;ONLINE(355716.1)<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128009284">http://www.sciencedirect.com/science/book/9780128009284</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Tourism security strategies for effectively managing travel risk and safety ent://SD_ILS/0/SD_ILS:355736 2024-12-26T14:33:20Z 2024-12-26T14:33:20Z Yazar&#160;Tarlow, Peter E.<br/>Yer Numaras&#305;&#160;ONLINE(355736.1)<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780124115705">http://www.sciencedirect.com/science/book/9780124115705</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Workplace security essentials a guide for helping organizations create safe work environments ent://SD_ILS/0/SD_ILS:355897 2024-12-26T14:33:20Z 2024-12-26T14:33:20Z Yazar&#160;Smith, Eric N. (Eric Newell), 1967-<br/>Yer Numaras&#305;&#160;ONLINE(355897.1)<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780124165571">http://www.sciencedirect.com/science/book/9780124165571</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> The manager's handbook for business security ent://SD_ILS/0/SD_ILS:355908 2024-12-26T14:33:20Z 2024-12-26T14:33:20Z Yazar&#160;Campbell, George, 1942-<br/>Yer Numaras&#305;&#160;ONLINE(355908.1)<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128000625">http://www.sciencedirect.com/science/book/9780128000625</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Windows forensic analysis toolkit : advanced analysis techniques for Windows 8 ent://SD_ILS/0/SD_ILS:355909 2024-12-26T14:33:20Z 2024-12-26T14:33:20Z Yazar&#160;Carvey, Harlan A., author.<br/>Yer Numaras&#305;&#160;ONLINE(355909.1)<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780124171572">http://www.sciencedirect.com/science/book/9780124171572</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> The basics of digital privacy simple tools to protect your personal information and your identity online ent://SD_ILS/0/SD_ILS:356123 2024-12-26T14:33:20Z 2024-12-26T14:33:20Z Yazar&#160;Cherry, Denny.&#160;LaRock, Thomas.<br/>Yer Numaras&#305;&#160;ONLINE(356123.1)<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128000113">http://www.sciencedirect.com/science/book/9780128000113</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Security for service oriented architectures ent://SD_ILS/0/SD_ILS:356556 2024-12-26T14:33:20Z 2024-12-26T14:33:20Z Yazar&#160;Williams, Walter (Telecommunications engineer), author.<br/>Yer Numaras&#305;&#160;ONLINE(356556.1)<br/>Elektronik Eri&#351;im&#160;<a href="http://marc.crcnetbase.com/isbn/9781466584044">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Advances in cyber security technology, operations, and experiences ent://SD_ILS/0/SD_ILS:239591 2024-12-26T14:33:20Z 2024-12-26T14:33:20Z Yazar&#160;Hsu, D. Frank (Derbiau Frank), 1948-&#160;Project Muse.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://muse.jhu.edu/books/9780823250325/">Full text available: </a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Maritime security in Southeast Asia ent://SD_ILS/0/SD_ILS:239577 2024-12-26T14:33:20Z 2024-12-26T14:33:20Z Yazar&#160;Bradford, John F.&#160;National Bureau of Asian Research (U.S.)&#160;Project Muse.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://muse.jhu.edu/books/9781939131133/">Full text available: </a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> CBRN and hazmat incidents at major public events : planning and response ent://SD_ILS/0/SD_ILS:267962 2024-12-26T14:33:20Z 2024-12-26T14:33:20Z Yazar&#160;Kaszeta, Dan.<br/>Yer Numaras&#305;&#160;WA 295 K1911 2013<br/>Format:&#160;Kitap<br/>Durum&#160;Sa&#287;l&#305;k Bilimleri K&uuml;t&uuml;phanesi~1<br/> Introduction to security ent://SD_ILS/0/SD_ILS:270130 2024-12-26T14:33:20Z 2024-12-26T14:33:20Z Yazar&#160;Fischer, Robert J.&#160;Halibozek, Edward P.&#160;Walters, David, 1963-<br/>Yer Numaras&#305;&#160;HV8290 G74 2013<br/>Format:&#160;Kitap<br/>Durum&#160;Beytepe K&uuml;t&uuml;phanesi~1<br/> Structure preserving energy functions in power systems theory and applications ent://SD_ILS/0/SD_ILS:289067 2024-12-26T14:33:20Z 2024-12-26T14:33:20Z Yazar&#160;Padiyar, K. R.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://marc.crcnetbase.com/isbn/9781439879382">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> General aviation security aircraft, hangars, fixed-base operations, flight schools, and airports ent://SD_ILS/0/SD_ILS:289958 2024-12-26T14:33:20Z 2024-12-26T14:33:20Z Yazar&#160;Benny, Daniel J.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://marc.crcnetbase.com/isbn/9781466510883">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> PRAGMATIC security metrics applying metametrics to information security ent://SD_ILS/0/SD_ILS:289974 2024-12-26T14:33:20Z 2024-12-26T14:33:20Z Yazar&#160;Brotby, W. Krag.&#160;Hinson, Gary.&#160;Kabay, Michel E.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://marc.crcnetbase.com/isbn/9781439881538">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Securing cloud and mobility a practitioner's guide ent://SD_ILS/0/SD_ILS:290001 2024-12-26T14:33:20Z 2024-12-26T14:33:20Z Yazar&#160;Lim, Ian.&#160;Hourani, Paul.&#160;Coolidge, E. Coleen.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://marc.crcnetbase.com/isbn/9781439850572">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> The complete guide to physical security ent://SD_ILS/0/SD_ILS:290667 2024-12-26T14:33:20Z 2024-12-26T14:33:20Z Yazar&#160;Baker, Paul, 1958-&#160;Benny, Daniel J.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://marc.crcnetbase.com/isbn/9781420099645">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Network attacks and defenses a hands-on approach ent://SD_ILS/0/SD_ILS:290924 2024-12-26T14:33:20Z 2024-12-26T14:33:20Z Yazar&#160;Trabelsi, Zouheir.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://marc.crcnetbase.com/isbn/9781466517974">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Wireless reconnaissance in penetration testing ent://SD_ILS/0/SD_ILS:306460 2024-12-26T14:33:20Z 2024-12-26T14:33:20Z Yazar&#160;Neely, Matthew.&#160;Hamerstone, Alex.&#160;Sanyk, Chris.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597497312">http://www.sciencedirect.com/science/book/9781597497312</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> The benefits and security risks of web-based applications for business trend report ent://SD_ILS/0/SD_ILS:306640 2024-12-26T14:33:20Z 2024-12-26T14:33:20Z Yazar&#160;Kotwica, Kathleen.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780124170018">http://www.sciencedirect.com/science/book/9780124170018</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Aligning security services with business objectives proven practices ent://SD_ILS/0/SD_ILS:306642 2024-12-26T14:33:20Z 2024-12-26T14:33:20Z Yazar&#160;Lefler, Richard.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780124170087">http://www.sciencedirect.com/science/book/9780124170087</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Corporate security organizational structure, cost of services and staffing benchmark research report / Bob Hayes, Greg Kane, Kathleen Kotwica. ent://SD_ILS/0/SD_ILS:306647 2024-12-26T14:33:20Z 2024-12-26T14:33:20Z Yazar&#160;Hayes, Bob E., 1963-&#160;Kane, Greg.&#160;Kotwica, Kathleen.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780124170025">http://www.sciencedirect.com/science/book/9780124170025</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Information protection playbook ent://SD_ILS/0/SD_ILS:306649 2024-12-26T14:33:20Z 2024-12-26T14:33:20Z Yazar&#160;Kane, Greg, editor of compilation.&#160;Koppel, Lorna, editor of compilation.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780124172326">http://www.sciencedirect.com/science/book/9780124172326</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Cyber security and IT infrastructure protection ent://SD_ILS/0/SD_ILS:306691 2024-12-26T14:33:20Z 2024-12-26T14:33:20Z Yazar&#160;Vacca, John R.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780124166813">http://www.sciencedirect.com/science/book/9780124166813</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> The basics of web hacking tools and techniques to attack the Web ent://SD_ILS/0/SD_ILS:306699 2024-12-26T14:33:20Z 2024-12-26T14:33:20Z Yazar&#160;Pauli, Joshua J.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780124166004">http://www.sciencedirect.com/science/book/9780124166004</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Instant penetration testing setting up a test lab how-to : set up your own penetration testing lab using practical and precise recipes ent://SD_ILS/0/SD_ILS:313044 2024-12-26T14:33:20Z 2024-12-26T14:33:20Z Yazar&#160;Fadyushin, Vyacheslav.<br/>Yer Numaras&#305;&#160;ONLINE(313044.1)<br/>Elektronik Eri&#351;im&#160;Knovel <a href="http://app.knovel.com/web/toc.v/cid:kpIPTSUTL3">http://app.knovel.com/web/toc.v/cid:kpIPTSUTL3</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Iris biometric model for secured network access ent://SD_ILS/0/SD_ILS:288160 2024-12-26T14:33:20Z 2024-12-26T14:33:20Z Yazar&#160;Khoury, Franjieh El.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://marc.crcnetbase.com/isbn/9781466502147">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Information security policy development for compliance ISO/IEC 27001, NIST SP 800-53, HIPAA standard, PCI DSS V2.0, and AUP V5.0 ent://SD_ILS/0/SD_ILS:288173 2024-12-26T14:33:20Z 2024-12-26T14:33:20Z Yazar&#160;Williams, Barry L.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://marc.crcnetbase.com/isbn/9781466580596">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Multimedia security watermarking, steganography, and forensics ent://SD_ILS/0/SD_ILS:287151 2024-12-26T14:33:20Z 2024-12-26T14:33:20Z Yazar&#160;Shih, Frank Y.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://marc.crcnetbase.com/isbn/9781439873328">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Android security attacks and defenses ent://SD_ILS/0/SD_ILS:287193 2024-12-26T14:33:20Z 2024-12-26T14:33:20Z Yazar&#160;Misra, Anmol.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://marc.crcnetbase.com/isbn/9781439896471">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Official (ISC)[superscript 2] guide to the CAP CBK ent://SD_ILS/0/SD_ILS:288056 2024-12-26T14:33:20Z 2024-12-26T14:33:20Z Yazar&#160;Howard, Patrick D.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://marc.crcnetbase.com/isbn/9781439820766">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Handbook of SCADA/control systems security ent://SD_ILS/0/SD_ILS:288155 2024-12-26T14:33:20Z 2024-12-26T14:33:20Z Yazar&#160;Radvanovsky, Robert.&#160;Brodsky, Jacob.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://marc.crcnetbase.com/isbn/9781466502277">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Supply chain security a comprehensive approach ent://SD_ILS/0/SD_ILS:288156 2024-12-26T14:33:20Z 2024-12-26T14:33:20Z Yazar&#160;Arway, Arthur G.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://marc.crcnetbase.com/isbn/9781466511903">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Critical infrastructure homeland security and emergency preparedness ent://SD_ILS/0/SD_ILS:288161 2024-12-26T14:33:20Z 2024-12-26T14:33:20Z Yazar&#160;Radvanovsky, Robert.&#160;McDougall, Allan.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://marc.crcnetbase.com/isbn/9781466503465">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Antiterrorism and threat response planning and implementation ent://SD_ILS/0/SD_ILS:290946 2024-12-26T14:33:20Z 2024-12-26T14:33:20Z Yazar&#160;Johnson, Ross.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://marc.crcnetbase.com/isbn/9781466512917">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Critical infrastructure system security and resiliency ent://SD_ILS/0/SD_ILS:291727 2024-12-26T14:33:20Z 2024-12-26T14:33:20Z Yazar&#160;Biringer, Betty E., 1952-&#160;Vugrin, Eric D.&#160;Warren, Drake E.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://marc.crcnetbase.com/isbn/9781466557512">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Strategic intelligence management : national security imperatives and information and communications technologies ent://SD_ILS/0/SD_ILS:270363 2024-12-26T14:33:20Z 2024-12-26T14:33:20Z Yazar&#160;Akhgar, Babak.&#160;Yates, Simeon.<br/>Yer Numaras&#305;&#160;TK5102.85 A44 2013<br/>Format:&#160;Kitap<br/>Durum&#160;Beytepe K&uuml;t&uuml;phanesi~1<br/> Combating climate change an agricultural perspective ent://SD_ILS/0/SD_ILS:285387 2024-12-26T14:33:20Z 2024-12-26T14:33:20Z Yazar&#160;Kang, Manjit S., editor of compilation.&#160;Banga, S. S. (Surinder S.), editor of compilation.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://marc.crcnetbase.com/isbn/9781466566712">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Automatic defense against zero-day polymorphic worms in communication networks ent://SD_ILS/0/SD_ILS:286307 2024-12-26T14:33:20Z 2024-12-26T14:33:20Z Yazar&#160;Mohammed, Mohssen, 1982-&#160;Pathan, Al-Sakib Khan.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://marc.crcnetbase.com/isbn/9781466557284">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Violent Python a cookbook for hackers, forensic analysts, penetration testers and security engineers ent://SD_ILS/0/SD_ILS:146917 2024-12-26T14:33:20Z 2024-12-26T14:33:20Z Yazar&#160;O'Connor, T. J.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597499576">http://www.sciencedirect.com/science/book/9781597499576</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> UTM security with Fortinet Mastering FortiOS ent://SD_ILS/0/SD_ILS:146934 2024-12-26T14:33:20Z 2024-12-26T14:33:20Z Yazar&#160;Tam, Kenneth.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597497473">http://www.sciencedirect.com/science/book/9781597497473</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Wireless reconnaissance in penetration testing ent://SD_ILS/0/SD_ILS:145690 2024-12-26T14:33:20Z 2024-12-26T14:33:20Z Yazar&#160;Neely, Matthew.&#160;Hamerstone, Alex.&#160;Sanyk, Chris.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597497312">http://www.sciencedirect.com/science/book/9781597497312</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> FISMA and the risk management framework the new practice of federal cyber security ent://SD_ILS/0/SD_ILS:145936 2024-12-26T14:33:20Z 2024-12-26T14:33:20Z Yazar&#160;Gantz, Stephen D.&#160;Philpott, Daniel R.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597496414">http://www.sciencedirect.com/science/book/9781597496414</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> New directions of modern cryptography ent://SD_ILS/0/SD_ILS:344263 2024-12-26T14:33:20Z 2024-12-26T14:33:20Z Yazar&#160;Cao, Zhenfu.<br/>Yer Numaras&#305;&#160;ONLINE(344263.1)<br/>Elektronik Eri&#351;im&#160;<a href="http://marc.crcnetbase.com/isbn/9781466501409">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Securing cloud and mobility a practitioner's guide ent://SD_ILS/0/SD_ILS:342839 2024-12-26T14:33:20Z 2024-12-26T14:33:20Z Yazar&#160;Lim, Ian.&#160;Hourani, Paul.&#160;Coolidge, E. Coleen.<br/>Yer Numaras&#305;&#160;ONLINE(342839.1)<br/>Elektronik Eri&#351;im&#160;<a href="http://marc.crcnetbase.com/isbn/9781466550827">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Applied network security monitoring collection, detection, and analysis ent://SD_ILS/0/SD_ILS:356122 2024-12-26T14:33:20Z 2024-12-26T14:33:20Z Yazar&#160;Sanders, Chris.&#160;Smith, Jason.<br/>Yer Numaras&#305;&#160;ONLINE(356122.1)<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780124172081">http://www.sciencedirect.com/science/book/9780124172081</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Information security for managers ent://SD_ILS/0/SD_ILS:516570 2024-12-26T14:33:20Z 2024-12-26T14:33:20Z Yazar&#160;Workman, Michael D., 1957-.&#160;Phelps, Daniel C.&#160;Gathegi, John N.<br/>Yer Numaras&#305;&#160;HF5548.37 W67 2013<br/>Format:&#160;Kitap<br/>Durum&#160;Beytepe K&uuml;t&uuml;phanesi~1<br/> Ending campus violence new approaches to prevention ent://SD_ILS/0/SD_ILS:259955 2024-12-26T14:33:20Z 2024-12-26T14:33:20Z Yazar&#160;Van Brunt, Brian.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://www.tandfebooks.com/isbn/9780203149560">Click here to view</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Maritime private security market responses to piracy, terrorism and waterborne security risks in the 21st century ent://SD_ILS/0/SD_ILS:260719 2024-12-26T14:33:20Z 2024-12-26T14:33:20Z Yazar&#160;Berube, Claude G., 1966-&#160;Cullen, Patrick, 1974-<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://www.tandfebooks.com/isbn/9780203126608">Click here to view</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Competition and efficiency in international food supply chains improving food security ent://SD_ILS/0/SD_ILS:260810 2024-12-26T14:33:20Z 2024-12-26T14:33:20Z Yazar&#160;Williams, John, 1949-<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://www.tandfebooks.com/isbn/9780203122365">Click here to view</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> The early years health and safety handbook ent://SD_ILS/0/SD_ILS:262276 2024-12-26T14:33:20Z 2024-12-26T14:33:20Z Yazar&#160;Parker, Lynn.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://www.tandfebooks.com/isbn/9780203809662">Click here to view</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Justice and security in the 21st century risks, rights and the rule of law ent://SD_ILS/0/SD_ILS:259735 2024-12-26T14:33:20Z 2024-12-26T14:33:20Z Yazar&#160;Ugelvik, Synn&oslash;ve, 1978-&#160;Hudson, Barbara, 1945-<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://www.tandfebooks.com/isbn/9780203125588">Click here to view</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Wiki at war conflict in a socially networked world ent://SD_ILS/0/SD_ILS:241837 2024-12-26T14:33:20Z 2024-12-26T14:33:20Z Yazar&#160;Carafano, James Jay, 1955-&#160;Project Muse.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://muse.jhu.edu/books/9781603446570/">Full text available: </a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Wiki at war conflict in a socially networked world ent://SD_ILS/0/SD_ILS:276700 2024-12-26T14:33:20Z 2024-12-26T14:33:20Z Yazar&#160;Carafano, James Jay, 1955-&#160;Project Muse.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://muse.jhu.edu/books/9781603446587/">Full text available: </a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Managing the insider threat no dark corners ent://SD_ILS/0/SD_ILS:290813 2024-12-26T14:33:20Z 2024-12-26T14:33:20Z Yazar&#160;Catrantzos, Nick.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://marc.crcnetbase.com/isbn/9781439872932">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Operating systems demystified ent://SD_ILS/0/SD_ILS:294101 2024-12-26T14:33:20Z 2024-12-26T14:33:20Z Yazar&#160;McHoes, Ann McIver, 1950-&#160;Ballew, Joli.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://mhebooklibrary.com/reader/operating-systems-demystified">Subscription required</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Security aspects of uni-and multimodal hazmat transportation systems ent://SD_ILS/0/SD_ILS:306265 2024-12-26T14:33:20Z 2024-12-26T14:33:20Z Yazar&#160;Reniers, Genserik L. L.&#160;Zamparini, Luca.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;Wiley Online Library <a href="http://onlinelibrary.wiley.com/book/10.1002/9783527664818">http://onlinelibrary.wiley.com/book/10.1002/9783527664818</a> Wiley InterScience <a href="http://dx.doi.org/10.1002/9783527664818">http://dx.doi.org/10.1002/9783527664818</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Maritime piracy ent://SD_ILS/0/SD_ILS:260902 2024-12-26T14:33:20Z 2024-12-26T14:33:20Z Yazar&#160;Haywood, Robert.&#160;Spivak, Roberta.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://www.tandfebooks.com/isbn/9780203144817">Click here to view</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Multilaterally secure pervasive cooperation privacy protection, accountability and secure communication for the age of pervasive computing ent://SD_ILS/0/SD_ILS:279514 2024-12-26T14:33:20Z 2024-12-26T14:33:20Z Yazar&#160;Weber, Stefan G.&#160;IOS Press.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;EBSCOhost <a href="http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=529563">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=529563</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Robust control system networks how to achieve reliable control after Stuxnet ent://SD_ILS/0/SD_ILS:280181 2024-12-26T14:33:20Z 2024-12-26T14:33:20Z Yazar&#160;Langner, Ralph.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;EBSCOhost <a href="http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=501116">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=501116</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> RFID in libraries a step toward interoperability ent://SD_ILS/0/SD_ILS:281069 2024-12-26T14:33:20Z 2024-12-26T14:33:20Z Yazar&#160;Ayre, Lori Bowen.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;EBSCOhost <a href="http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=563865">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=563865</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> RC4 stream cipher and its variants ent://SD_ILS/0/SD_ILS:285249 2024-12-26T14:33:20Z 2024-12-26T14:33:20Z Yazar&#160;Paul, Goutam.&#160;Maitra, Subhamoy, 1970-<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://marc.crcnetbase.com/isbn/9781439831373">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Photonic sensing principles and applications for safety and security monitoring ent://SD_ILS/0/SD_ILS:299365 2024-12-26T14:33:20Z 2024-12-26T14:33:20Z Yazar&#160;Xiao, George.&#160;Bock, Wojtek J.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://proquest.safaribooksonline.com/?fpi=9781118310205">Available by subscription from Safari Books Online</a> John Wiley <a href="http://dx.doi.org/10.1002/9781118310212">http://dx.doi.org/10.1002/9781118310212</a> ebrary <a href="http://site.ebrary.com/id/10602117">http://site.ebrary.com/id/10602117</a> Ebook Library <a href="http://public.eblib.com/EBLPublic/PublicView.do?ptiID=848527">http://public.eblib.com/EBLPublic/PublicView.do?ptiID=848527</a> Volltext <a href="http://proquest.tech.safaribooksonline.de/9781118310205">http://proquest.tech.safaribooksonline.de/9781118310205</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Asset protection through security awareness ent://SD_ILS/0/SD_ILS:286136 2024-12-26T14:33:20Z 2024-12-26T14:33:20Z Yazar&#160;Speed, Tyler Justin.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://marc.crcnetbase.com/isbn/9781439809839">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Cybersecurity for industrial control systems SCADA, DCS, PLC, HMI, and SIS ent://SD_ILS/0/SD_ILS:286140 2024-12-26T14:33:20Z 2024-12-26T14:33:20Z Yazar&#160;Macaulay, Tyson.&#160;Singer, Bryan.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://marc.crcnetbase.com/isbn/9781439801987">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Data mining tools for malware detection ent://SD_ILS/0/SD_ILS:287102 2024-12-26T14:33:20Z 2024-12-26T14:33:20Z Yazar&#160;Masud, Mehedy.&#160;Khan, Latifur.&#160;Thuraisingham, Bhavani M.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://marc.crcnetbase.com/isbn/9781439854556">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> CISO's guide to penetration testing a framework to plan, manage, and maximize benefits ent://SD_ILS/0/SD_ILS:287105 2024-12-26T14:33:20Z 2024-12-26T14:33:20Z Yazar&#160;Tiller, James S.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://marc.crcnetbase.com/isbn/9781439880289">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Smart grid security an end-to-end view of security in the new electrical grid ent://SD_ILS/0/SD_ILS:288030 2024-12-26T14:33:20Z 2024-12-26T14:33:20Z Yazar&#160;Sorebo, Gilbert.&#160;Echols, Michael.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://marc.crcnetbase.com/isbn/9781439855898">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Network and application security fundamentals and practices ent://SD_ILS/0/SD_ILS:288993 2024-12-26T14:33:20Z 2024-12-26T14:33:20Z Yazar&#160;Ganguly, Debashis.&#160;Lahiri, Shibamouli.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://marc.crcnetbase.com/isbn/9781466502451">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Motor fleet safety and security management ent://SD_ILS/0/SD_ILS:290022 2024-12-26T14:33:20Z 2024-12-26T14:33:20Z Yazar&#160;Della-Giustina, Daniel.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://marc.crcnetbase.com/isbn/9781439895085">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Information security governance simplified from the boardroom to the keyboard ent://SD_ILS/0/SD_ILS:290662 2024-12-26T14:33:20Z 2024-12-26T14:33:20Z Yazar&#160;Fitzgerald, Todd.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://marc.crcnetbase.com/isbn/9781439811658">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Defense against the black arts how hackers do what they do and how to protect against it ent://SD_ILS/0/SD_ILS:291581 2024-12-26T14:33:20Z 2024-12-26T14:33:20Z Yazar&#160;Varsalone, Jesse.&#160;McFadden, Matthew.&#160;Morrissey, Sean.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://marc.crcnetbase.com/isbn/9781439821220">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Visual cryptography and secret image sharing ent://SD_ILS/0/SD_ILS:291582 2024-12-26T14:33:20Z 2024-12-26T14:33:20Z Yazar&#160;Cimato, Stelvio.&#160;Yang, Ching-Nung.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://marc.crcnetbase.com/isbn/9781439837221">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> iPhone geekery 50 insanely cool hacks and mods for your iPhone 4S ent://SD_ILS/0/SD_ILS:293446 2024-12-26T14:33:20Z 2024-12-26T14:33:20Z Yazar&#160;Hart-Davis, Guy.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://mhebooklibrary.com/reader/iphone-geekery-50-insanely-cool-hacks-mods-for-your-4s">Subscription required</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> The healthy PC preventive care, home remedies, and green computing ent://SD_ILS/0/SD_ILS:293464 2024-12-26T14:33:20Z 2024-12-26T14:33:20Z Yazar&#160;Hart-Davis, Guy.&#160;Holzman, Carey. Healthy PC.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://mhebooklibrary.com/reader/healthy-pc-preventive-care-home-remedies-green-computing-2nd-edition">Subscription required</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Hacking exposed 7 : network security secrets &amp; solutions ent://SD_ILS/0/SD_ILS:270033 2024-12-26T14:33:20Z 2024-12-26T14:33:20Z Yazar&#160;McClure, Stuart.&#160;Scambray, Joel.&#160;Kurtz, George.<br/>Yer Numaras&#305;&#160;TK5105.59 M48 2012<br/>Format:&#160;Kitap<br/>Durum&#160;Beytepe K&uuml;t&uuml;phanesi~1<br/> Handbook of loss prevention and crime prevention ent://SD_ILS/0/SD_ILS:270043 2024-12-26T14:33:20Z 2024-12-26T14:33:20Z Yazar&#160;Fennelly, Lawrence J., 1940-<br/>Yer Numaras&#305;&#160;HV8290 H345 2012<br/>Format:&#160;Kitap<br/>Durum&#160;Beytepe K&uuml;t&uuml;phanesi~1<br/> The death of the Internet ent://SD_ILS/0/SD_ILS:270436 2024-12-26T14:33:20Z 2024-12-26T14:33:20Z Yazar&#160;Jakobsson, Markus.<br/>Yer Numaras&#305;&#160;TK5105.875.I57 D43 2012<br/>Format:&#160;Kitap<br/>Durum&#160;Beytepe K&uuml;t&uuml;phanesi~1<br/> Cybersecurity public sector threats and responses ent://SD_ILS/0/SD_ILS:286202 2024-12-26T14:33:20Z 2024-12-26T14:33:20Z Yazar&#160;Andreasson, Kim J.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://marc.crcnetbase.com/isbn/9781439846643">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Wireless network security a beginner's guide ent://SD_ILS/0/SD_ILS:293230 2024-12-26T14:33:20Z 2024-12-26T14:33:20Z Yazar&#160;Wrightson, Tyler.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://mhebooklibrary.com/reader/wireless-network-security-beginners-guide">Subscription required</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Security metrics a beginner's guide ent://SD_ILS/0/SD_ILS:293238 2024-12-26T14:33:20Z 2024-12-26T14:33:20Z Yazar&#160;Wong, Caroline.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://mhebooklibrary.com/reader/security-metrics-beginners-guide">Subscription required</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Securing the clicks network security in the age of social media ent://SD_ILS/0/SD_ILS:293240 2024-12-26T14:33:20Z 2024-12-26T14:33:20Z Yazar&#160;Bahadur, Gary.&#160;Inasi, Jason.&#160;Carvalho, Alex de.&#160;Powell, Juliette, 1976-&#160;Valencia, Connie.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://mhebooklibrary.com/reader/securing-clicks-network-security-in-age-social-media">Subscription required</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Web application security a beginner's guide ent://SD_ILS/0/SD_ILS:293241 2024-12-26T14:33:20Z 2024-12-26T14:33:20Z Yazar&#160;Sullivan, Bryan, 1974-&#160;Liu, Vincent.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://mhebooklibrary.com/reader/web-application-security-beginners-guide">Subscription required</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Oracle WebLogic server 11g administration handbook ent://SD_ILS/0/SD_ILS:293243 2024-12-26T14:33:20Z 2024-12-26T14:33:20Z Yazar&#160;Alapati, Sam R.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://mhebooklibrary.com/reader/oracle-weblogic-server-11g-administration-handbook">Subscription required</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> The basics of cyber warfare understanding the fundamentals of cyber warfare in theory and practice ent://SD_ILS/0/SD_ILS:145254 2024-12-26T14:33:20Z 2024-12-26T14:33:20Z Yazar&#160;Winterfeld, Steve.&#160;Andress, Jason.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780124047372">http://www.sciencedirect.com/science/book/9780124047372</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Information security risk assessment toolkit practical assessments through data collection and data analysis ent://SD_ILS/0/SD_ILS:145470 2024-12-26T14:33:20Z 2024-12-26T14:33:20Z Yazar&#160;Talabis, Mark.&#160;Martin, Jason.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597497350">http://www.sciencedirect.com/science/book/9781597497350</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Advanced persistent threat understanding the danger and how to protect your organization ent://SD_ILS/0/SD_ILS:146056 2024-12-26T14:33:20Z 2024-12-26T14:33:20Z Yazar&#160;Cole, Eric.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597499491">http://www.sciencedirect.com/science/book/9781597499491</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Handbook of loss prevention and crime prevention ent://SD_ILS/0/SD_ILS:148175 2024-12-26T14:33:20Z 2024-12-26T14:33:20Z Yazar&#160;Fennelly, Lawrence J., 1940-<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780123852465">http://www.sciencedirect.com/science/book/9780123852465</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> PCI compliance understand and implement effective PCI data security standard compliance ent://SD_ILS/0/SD_ILS:148429 2024-12-26T14:33:20Z 2024-12-26T14:33:20Z Yazar&#160;Chuvakin, Anton.&#160;Williams, Branden R.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597499484">http://www.sciencedirect.com/science/book/9781597499484</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> SQL injection attacks and defense ent://SD_ILS/0/SD_ILS:148516 2024-12-26T14:33:20Z 2024-12-26T14:33:20Z Yazar&#160;Clarke, Justin.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597499637">http://www.sciencedirect.com/science/book/9781597499637</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Client-side attacks and defense ent://SD_ILS/0/SD_ILS:148731 2024-12-26T14:33:20Z 2024-12-26T14:33:20Z Yazar&#160;Oriyano, Sean-Philip.&#160;Shimonski, Robert.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495905">http://www.sciencedirect.com/science/book/9781597495905</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> CISSP study guide ent://SD_ILS/0/SD_ILS:148769 2024-12-26T14:33:20Z 2024-12-26T14:33:20Z Yazar&#160;Conrad, Eric, 1967-&#160;Misenar, Seth.&#160;Feldman, Joshua.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597499613">http://www.sciencedirect.com/science/book/9781597499613</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Risk analysis and the security survey ent://SD_ILS/0/SD_ILS:149062 2024-12-26T14:33:20Z 2024-12-26T14:33:20Z Yazar&#160;Broder, James F.&#160;Tucker, Eugene.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780123822338">http://www.sciencedirect.com/science/book/9780123822338</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Network intrusion analysis methodologies, tools, and techniques for incident analysis and response ent://SD_ILS/0/SD_ILS:146274 2024-12-26T14:33:20Z 2024-12-26T14:33:20Z Yazar&#160;Fichera, Joe, 1966-&#160;Bolt, Steven.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597499620">http://www.sciencedirect.com/science/book/9781597499620</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> The hacker's guide to OS X exploiting OS X from the root up ent://SD_ILS/0/SD_ILS:148006 2024-12-26T14:33:20Z 2024-12-26T14:33:20Z Yazar&#160;Bathurst, Robert.&#160;Rogers, Russ.&#160;Ghassemlouei, Alijohn.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597499507">http://www.sciencedirect.com/science/book/9781597499507</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Hacking web apps detecting and preventing web application security problems ent://SD_ILS/0/SD_ILS:148161 2024-12-26T14:33:20Z 2024-12-26T14:33:20Z Yazar&#160;Shema, Mike.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597499514">http://www.sciencedirect.com/science/book/9781597499514</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Windows forensic analysis toolkit advanced analysis techniques for Windows 7 ent://SD_ILS/0/SD_ILS:145689 2024-12-26T14:33:20Z 2024-12-26T14:33:20Z Yazar&#160;Carvey, Harlan A.&#160;Kolde, Jennifer.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597497275">http://www.sciencedirect.com/science/book/9781597497275</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Handbook on securing cyber-physical critical infrastructure ent://SD_ILS/0/SD_ILS:145579 2024-12-26T14:33:20Z 2024-12-26T14:33:20Z Yazar&#160;Das, Sajal K.&#160;Kant, Krishna.&#160;Zhang, Nan, 1982-<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780124158153">http://www.sciencedirect.com/science/book/9780124158153</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Ports in a storm : public management in a turbulent world ent://SD_ILS/0/SD_ILS:376401 2024-12-26T14:33:20Z 2024-12-26T14:33:20Z Yazar&#160;Donahue, John D.&#160;Moore, Mark H., 1947-<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://www.jstor.org/stable/10.7864/j.ctt12636r">http://www.jstor.org/stable/10.7864/j.ctt12636r</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> How Ottawa spends, 2012-2013 : the Harper majority, budget cuts, and the new opposition ent://SD_ILS/0/SD_ILS:376963 2024-12-26T14:33:20Z 2024-12-26T14:33:20Z Yazar&#160;Doern, G. Bruce.&#160;Stoney, Christopher.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://www.jstor.org/stable/10.2307/j.ctt1pq1f8">http://www.jstor.org/stable/10.2307/j.ctt1pq1f8</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Against security : how we go wrong at airports, subways, and other sites of ambiguous danger ent://SD_ILS/0/SD_ILS:376713 2024-12-26T14:33:20Z 2024-12-26T14:33:20Z Yazar&#160;Molotch, Harvey Luskin, author.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://www.jstor.org/stable/10.2307/j.cttq94nr">http://www.jstor.org/stable/10.2307/j.cttq94nr</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Maritime security and the law of the sea ent://SD_ILS/0/SD_ILS:231006 2024-12-26T14:33:20Z 2024-12-26T14:33:20Z Yazar&#160;Klein, Natalie (Natalie S.)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;Oxford scholarship online <a href="http://dx.doi.org/10.1093/acprof:oso/9780199566532.001.0001">http://dx.doi.org/10.1093/acprof:oso/9780199566532.001.0001</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Wars of disruption and resilience cybered conflict, power, and national security ent://SD_ILS/0/SD_ILS:244312 2024-12-26T14:33:20Z 2024-12-26T14:33:20Z Yazar&#160;Demchak, Chris C.&#160;Project Muse.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://muse.jhu.edu/books/9780820341378/">Full text available: </a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Our biometric future facial recognition technology and the culture of surveillance ent://SD_ILS/0/SD_ILS:243822 2024-12-26T14:33:20Z 2024-12-26T14:33:20Z Yazar&#160;Gates, Kelly.&#160;Project Muse.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://muse.jhu.edu/books/9780814732793/">Full text available: </a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Engineering information security the application of systems engineering concepts to achieve information assurance ent://SD_ILS/0/SD_ILS:249916 2024-12-26T14:33:20Z 2024-12-26T14:33:20Z Yazar&#160;Jacobs, Stuart.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;IEEE Xplore <a href="http://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=6047604">http://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=6047604</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Readings and cases in information security : law and ethics ent://SD_ILS/0/SD_ILS:267743 2024-12-26T14:33:20Z 2024-12-26T14:33:20Z Yazar&#160;Whitman, Michael E.&#160;Mattord, Herbert J.<br/>Yer Numaras&#305;&#160;TK5105.878 W54 2011<br/>Format:&#160;Kitap<br/>Durum&#160;Beytepe K&uuml;t&uuml;phanesi~1<br/> Guidelines for the physical security of water utilities, ANSI/ASCE/EWRI 56-10 Guidelines for the physical security of wastewater/stormwater utilities, ANSI/ASCE/EWRI 57-10 ent://SD_ILS/0/SD_ILS:279319 2024-12-26T14:33:20Z 2024-12-26T14:33:20Z Yazar&#160;American Society of Civil Engineers.&#160;Environmental and Water Resources Institute (U.S.)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;EBSCOhost <a href="http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=442510">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=442510</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Secure semantic service-oriented systems ent://SD_ILS/0/SD_ILS:285105 2024-12-26T14:33:20Z 2024-12-26T14:33:20Z Yazar&#160;Thuraisingham, Bhavani M.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://marc.crcnetbase.com/isbn/9781420073324">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Risk and Safety Analysis of Nuclear Systems ent://SD_ILS/0/SD_ILS:298891 2024-12-26T14:33:20Z 2024-12-26T14:33:20Z Yazar&#160;Lee, John C., 1941- author.&#160;McCormick, Norman J., 1938- author.&#160;Wiley InterScience (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;Wiley InterScience <a href="http://dx.doi.org/10.1002/9781118043462">An electronic book accessible through the World Wide Web; click for information</a> MyiLibrary, Table of contents <a href="http://www.myilibrary.com?id=325614&ref=toc">http://www.myilibrary.com?id=325614&ref=toc</a> Books24x7 <a href="http://www.books24x7.com/marc.asp?bookid=43276">http://www.books24x7.com/marc.asp?bookid=43276</a> <a href="http://site.ebrary.com/lib/alltitles/Doc?id=10494682">http://site.ebrary.com/lib/alltitles/Doc?id=10494682</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Home networking demystified a self-teaching guide ent://SD_ILS/0/SD_ILS:294143 2024-12-26T14:33:20Z 2024-12-26T14:33:20Z Yazar&#160;Long, Larry E.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://mhebooklibrary.com/reader/home-networking-demystified">Subscription required</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Implementing SSL/TLS using cryptography and PKI ent://SD_ILS/0/SD_ILS:303838 2024-12-26T14:33:20Z 2024-12-26T14:33:20Z Yazar&#160;Davies, Joshua A. (Joshua Aaron)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;Wiley InterScience <a href="http://dx.doi.org/10.1002/9781118255797">An electronic book accessible through the World Wide Web; click for information</a> <a href="http://proquest.safaribooksonline.com/?fpi=9780470920411">Available by subscription from Safari Books Online</a> <a href="http://public.eblib.com/EBLPublic/PublicView.do?ptiID=706899">Click here to view book</a> Books24x7 <a href="http://www.books24x7.com/marc.asp?bookid=40694">http://www.books24x7.com/marc.asp?bookid=40694</a> Volltext <a href="http://proquest.safaribooksonline.com/9780470920411">http://proquest.safaribooksonline.com/9780470920411</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Essentials of online payment security and fraud prevention ent://SD_ILS/0/SD_ILS:304086 2024-12-26T14:33:20Z 2024-12-26T14:33:20Z Yazar&#160;Montague, David A., 1967-<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;Wiley InterScience <a href="http://dx.doi.org/10.1002/9781118386750">An electronic book accessible through the World Wide Web; click for information</a> Ebook Library <a href="http://public.eblib.com/EBLPublic/PublicView.do?ptiID=624574">http://public.eblib.com/EBLPublic/PublicView.do?ptiID=624574</a> <a href="http://swb.eblib.com/patron/FullRecord.aspx?p=624574">http://swb.eblib.com/patron/FullRecord.aspx?p=624574</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Nuclear energy and global governance ensuring safety, security, and non-proliferation ent://SD_ILS/0/SD_ILS:262536 2024-12-26T14:33:20Z 2024-12-26T14:33:20Z Yazar&#160;Findlay, Trevor, 1951-<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://www.tandfebooks.com/isbn/9780203834503">Click here to view</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Blast protection of buildings ent://SD_ILS/0/SD_ILS:279920 2024-12-26T14:33:20Z 2024-12-26T14:33:20Z Yazar&#160;American Society of Civil Engineers.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;EBSCOhost <a href="http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=466935">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=466935</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Guide to security considerations and practices for rare book, manuscript, and special collection libraries ent://SD_ILS/0/SD_ILS:280094 2024-12-26T14:33:20Z 2024-12-26T14:33:20Z Yazar&#160;Wilkie, Everett C.&#160;Association of College and Research Libraries.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;EBSCOhost <a href="http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=480845">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=480845</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Secure Java for web application development ent://SD_ILS/0/SD_ILS:285166 2024-12-26T14:33:20Z 2024-12-26T14:33:20Z Yazar&#160;Bhargav, Abhay.&#160;Kumar, B. V. (Balepur Venkatanna), 1959-<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://marc.crcnetbase.com/isbn/9781439823569">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Wireless security ent://SD_ILS/0/SD_ILS:288110 2024-12-26T14:33:20Z 2024-12-26T14:33:20Z Yazar&#160;Osterhage, Wolfgang.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://marc.crcnetbase.com/isbn/9781439896266">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Adaptive security management architecture ent://SD_ILS/0/SD_ILS:288451 2024-12-26T14:33:20Z 2024-12-26T14:33:20Z Yazar&#160;Tiller, James S.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://marc.crcnetbase.com/isbn/9781420013375">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Working positively with personality disorder in secure settings a practitioner's perspective ent://SD_ILS/0/SD_ILS:298579 2024-12-26T14:33:20Z 2024-12-26T14:33:20Z Yazar&#160;Willmot, Phil.&#160;Gordon, Neil, 1959-&#160;Wiley InterScience (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;Wiley InterScience <a href="http://dx.doi.org/10.1002/9780470973110">An electronic book accessible through the World Wide Web; click for information</a> Wiley InterScience - Full Text Online <a href="http://www.library.uiuc.edu/proxy/go.php?url=http://onlinelibrary.wiley.com/book/10.1002/9780470973110">http://www.library.uiuc.edu/proxy/go.php?url=http://onlinelibrary.wiley.com/book/10.1002/9780470973110</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Auditing cloud computing a security and privacy guide ent://SD_ILS/0/SD_ILS:299263 2024-12-26T14:33:20Z 2024-12-26T14:33:20Z Yazar&#160;Halpert, Ben, 1986-<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;Image <a href="http://images.contentreserve.com/ImageType-100/0128-1/{F889EE2A-CF12-4647-85E0-03258F227FC1}Img100.jpg">http://images.contentreserve.com/ImageType-100/0128-1/{F889EE2A-CF12-4647-85E0-03258F227FC1}Img100.jpg</a> Books24x7 <a href="http://www.books24x7.com/marc.asp?bookid=44303">http://www.books24x7.com/marc.asp?bookid=44303</a> John Wiley <a href="http://dx.doi.org/10.1002/9781118269091">http://dx.doi.org/10.1002/9781118269091</a> OverDrive (PDF) <a href="http://www.contentreserve.com/TitleInfo.asp?ID={F889EE2A-CF12-4647-85E0-03258F227FC1}&Format=50">http://www.contentreserve.com/TitleInfo.asp?ID={F889EE2A-CF12-4647-85E0-03258F227FC1}&Format=50</a> OverDrive (EPUB) <a href="http://www.contentreserve.com/TitleInfo.asp?ID={F889EE2A-CF12-4647-85E0-03258F227FC1}&Format=410">http://www.contentreserve.com/TitleInfo.asp?ID={F889EE2A-CF12-4647-85E0-03258F227FC1}&Format=410</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Guide to physical security planning &amp; response for hospitals, medical, long term care facilities ent://SD_ILS/0/SD_ILS:278636 2024-12-26T14:33:20Z 2024-12-26T14:33:20Z Yazar&#160;Russell, Mary, 1953-&#160;Kendig, Jim.&#160;Philpott, Don, 1946-<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;EBSCOhost <a href="http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=398780">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=398780</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Retail security and loss prevention solutions ent://SD_ILS/0/SD_ILS:286096 2024-12-26T14:33:20Z 2024-12-26T14:33:20Z Yazar&#160;Greggo, Alan.&#160;Kresevich, Millie.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://marc.crcnetbase.com/isbn/9781420090086">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Security de-engineering solving the problems in information risk management ent://SD_ILS/0/SD_ILS:286209 2024-12-26T14:33:20Z 2024-12-26T14:33:20Z Yazar&#160;Tibble, Ian.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://marc.crcnetbase.com/isbn/9781439868355">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Official (ISC)2 guide to the SSCP CBK ent://SD_ILS/0/SD_ILS:286975 2024-12-26T14:33:20Z 2024-12-26T14:33:20Z Yazar&#160;Tipton, Harold F.&#160;International Information Systems Security Certification Consortium.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://marc.crcnetbase.com/isbn/9781439804841">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Staying safe at school ent://SD_ILS/0/SD_ILS:287084 2024-12-26T14:33:20Z 2024-12-26T14:33:20Z Yazar&#160;Quarles, Chester L.&#160;Quarles, Tammy.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://marc.crcnetbase.com/isbn/9781439858295">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Security strategy from requirements to reality ent://SD_ILS/0/SD_ILS:288851 2024-12-26T14:33:20Z 2024-12-26T14:33:20Z Yazar&#160;Stackpole, Bill.&#160;Oksendahl, Eric.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://marc.crcnetbase.com/isbn/9781439827345">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Security and policy driven computing ent://SD_ILS/0/SD_ILS:288879 2024-12-26T14:33:20Z 2024-12-26T14:33:20Z Yazar&#160;Liu, Lei, 1968-<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://marc.crcnetbase.com/isbn/9781439825808">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> The security risk assessment handbook a complete guide for performing security risk assessments ent://SD_ILS/0/SD_ILS:288890 2024-12-26T14:33:20Z 2024-12-26T14:33:20Z Yazar&#160;Landoll, Douglas J.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://marc.crcnetbase.com/isbn/9781439821497">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Casino security and gaming surveillance ent://SD_ILS/0/SD_ILS:288895 2024-12-26T14:33:20Z 2024-12-26T14:33:20Z Yazar&#160;Boss, Derk J.&#160;Zajic, Alan W.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://marc.crcnetbase.com/isbn/9781420087833">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Honeypot a new paradigm to information security ent://SD_ILS/0/SD_ILS:288961 2024-12-26T14:33:20Z 2024-12-26T14:33:20Z Yazar&#160;Joshi, R. C.&#160;Sardana, Anjali.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://marc.crcnetbase.com/isbn/9781439869994">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Security of self-organizing networks MANET, WSN, WMN, VANET ent://SD_ILS/0/SD_ILS:290708 2024-12-26T14:33:20Z 2024-12-26T14:33:20Z Yazar&#160;Pathan, Al-Sakib Khan.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://marc.crcnetbase.com/isbn/9781439819203">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Practical risk management for the CIO ent://SD_ILS/0/SD_ILS:291571 2024-12-26T14:33:20Z 2024-12-26T14:33:20Z Yazar&#160;Scherling, Mark.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://marc.crcnetbase.com/isbn/9781439856543">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Management strategies for the cloud revolution how cloud computing is transforming business and why you can't afford to be left behind ent://SD_ILS/0/SD_ILS:292969 2024-12-26T14:33:20Z 2024-12-26T14:33:20Z Yazar&#160;Babcock, Charles.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://mhebooklibrary.com/reader/management-strategies-for-cloud-revolution-how-computing-transforming-business-you-cant-afford-to-be-left-behind">Subscription required</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Designing an IAM framework with Oracle identity and access management suite ent://SD_ILS/0/SD_ILS:293289 2024-12-26T14:33:20Z 2024-12-26T14:33:20Z Yazar&#160;Scheidel, Jeff.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://mhebooklibrary.com/reader/designing-iam-framework-oracle-identity-access-management-suite">Subscription required</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> IT security metrics a practical framework for measuring security &amp; protecting data ent://SD_ILS/0/SD_ILS:293294 2024-12-26T14:33:20Z 2024-12-26T14:33:20Z Yazar&#160;Hayden, Lance.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://mhebooklibrary.com/reader/security-metrics-practical-framework-for-measuring-protecting-data">Subscription required</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Mac OS X system administration ent://SD_ILS/0/SD_ILS:293298 2024-12-26T14:33:20Z 2024-12-26T14:33:20Z Yazar&#160;Hart-Davis, Guy.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://mhebooklibrary.com/reader/mac-os-x-system-administration">Subscription required</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Hacking exposed wireless wireless security secrets &amp; solutions ent://SD_ILS/0/SD_ILS:293300 2024-12-26T14:33:20Z 2024-12-26T14:33:20Z Yazar&#160;Cache, Johnny.&#160;Wright, Joshua.&#160;Liu, Vincent.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://mhebooklibrary.com/reader/hacking-exposed-wireless-second-edition">Subscription required</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Wireless network administration a beginner's guide ent://SD_ILS/0/SD_ILS:293305 2024-12-26T14:33:20Z 2024-12-26T14:33:20Z Yazar&#160;Soyinka, Wale.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://mhebooklibrary.com/reader/wireless-network-administration-beginners-guide">Subscription required</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Mobile application security ent://SD_ILS/0/SD_ILS:293312 2024-12-26T14:33:20Z 2024-12-26T14:33:20Z Yazar&#160;Dwivedi, Himanshu.&#160;Clark, Chris, 1980-&#160;Thiel, David V.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://mhebooklibrary.com/reader/mobile-application-security">Subscription required</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Networking a beginner's guide ent://SD_ILS/0/SD_ILS:293314 2024-12-26T14:33:20Z 2024-12-26T14:33:20Z Yazar&#160;Hallberg, Bruce A., 1964-<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://mhebooklibrary.com/reader/networking-beginners-guide-fifth-edition">Subscription required</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Oracle WebCenter 11g handbook build rich, customizable enterprise 2.0 applications ent://SD_ILS/0/SD_ILS:293316 2024-12-26T14:33:20Z 2024-12-26T14:33:20Z Yazar&#160;Desbiens, Fr&#65533;ed&#65533;eric.&#160;Moskovits, Peter.&#160;Weckerle, Philipp.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://mhebooklibrary.com/reader/oracle-webcenter-11g-handbook">Subscription required</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> 24 deadly sins of software security programming flaws and how to fix them ent://SD_ILS/0/SD_ILS:293319 2024-12-26T14:33:20Z 2024-12-26T14:33:20Z Yazar&#160;Howard, Michael, 1965-&#160;LeBlanc, David, 1960-&#160;Viega, John.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://mhebooklibrary.com/reader/24-deadly-sins-software-security-programming-flaws-how-to-fix-them">Subscription required</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Cisco ASA configuration ent://SD_ILS/0/SD_ILS:293322 2024-12-26T14:33:20Z 2024-12-26T14:33:20Z Yazar&#160;Deal, Richard A.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://mhebooklibrary.com/reader/cisco-asa-configuration">Subscription required</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Hacking exposed Linux Linux security secrets and solutions. ent://SD_ILS/0/SD_ILS:293324 2024-12-26T14:33:20Z 2024-12-26T14:33:20Z Yazar&#160;Hatch, Brian. Hacking Linux exposed.&#160;ISECOM (Organization)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://mhebooklibrary.com/reader/hacking-exposed-linux">Subscription required</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Fedora 7 &amp; Red Hat Enterprise Linux the complete reference ent://SD_ILS/0/SD_ILS:293328 2024-12-26T14:33:20Z 2024-12-26T14:33:20Z Yazar&#160;Petersen, Richard, 1949-<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://mhebooklibrary.com/reader/fedora-core-7-red-hat-enterprise-linux-complete-reference">Subscription required</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Ajax the complete reference ent://SD_ILS/0/SD_ILS:293344 2024-12-26T14:33:20Z 2024-12-26T14:33:20Z Yazar&#160;Powell, Thomas A., 1968-<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://mhebooklibrary.com/reader/ajax-complete-reference">Subscription required</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Hacking exposed malware &amp; rootkits malware &amp; rootkits security secrets &amp; solutions ent://SD_ILS/0/SD_ILS:293397 2024-12-26T14:33:20Z 2024-12-26T14:33:20Z Yazar&#160;Davis, Michael A.&#160;Bodmer, Sean.&#160;LeMasters, Aaron.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://mhebooklibrary.com/reader/hacking-exposed-malware-rootkits">Subscription required</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> CNET do-it-yourself home networking projects 24 cool things you didn't know you could do! ent://SD_ILS/0/SD_ILS:293687 2024-12-26T14:33:20Z 2024-12-26T14:33:20Z Yazar&#160;Aspinwall, Jim.&#160;CNET (Firm)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://mhebooklibrary.com/reader/cnet-doityourself-home-networking-projects">Subscription required</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> The securitization of migration a study of movement and order ent://SD_ILS/0/SD_ILS:265336 2024-12-26T14:33:20Z 2024-12-26T14:33:20Z Yazar&#160;Bourbeau, Philippe, 1972 Nov. 3-<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://www.tandfebooks.com/isbn/9780203829349">Click here to view</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Terrorism and the Olympics major event security and lessons for the future ent://SD_ILS/0/SD_ILS:265369 2024-12-26T14:33:20Z 2024-12-26T14:33:20Z Yazar&#160;Richards, Anthony.&#160;Fussey, Peter.&#160;Silke, Andrew.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://www.tandfebooks.com/isbn/9780203835227">Click here to view</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Effective security management ent://SD_ILS/0/SD_ILS:269968 2024-12-26T14:33:20Z 2024-12-26T14:33:20Z Yazar&#160;Sennewald, Charles A.<br/>Yer Numaras&#305;&#160;HV8290 S46 2011<br/>Format:&#160;Kitap<br/>Durum&#160;Beytepe K&uuml;t&uuml;phanesi~1<br/> Auditing IT infrastructures for compliance ent://SD_ILS/0/SD_ILS:271151 2024-12-26T14:33:20Z 2024-12-26T14:33:20Z Yazar&#160;Weiss, Martin M.&#160;Solomon, Michael G.<br/>Yer Numaras&#305;&#160;QA76.9.A25 W428 2011<br/>Format:&#160;Kitap<br/>Durum&#160;Beytepe K&uuml;t&uuml;phanesi~1<br/>