Arama Sonuçları Security Measures. - Daraltılmış: Computer security.
SirsiDynix Enterprise
https://katalog.hacettepe.edu.tr/client/tr_TR/default_tr/default_tr/qu$003dSecurity$002bMeasures.$0026qf$003dSUBJECT$002509Konu$002509Computer$002bsecurity.$002509Computer$002bsecurity.$0026ps$003d300?
2025-12-24T20:27:06Z
A’dan Z’ye siber güvenlik
ent://SD_ILS/0/SD_ILS:524303
2025-12-24T20:27:06Z
2025-12-24T20:27:06Z
Yazar Polat, A. Can. Karakaş, Burak.<br/>Yer Numarası QA76.9 P65 2023<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>
Uygulamalarla siber güvenliğe giriş
ent://SD_ILS/0/SD_ILS:510151
2025-12-24T20:27:06Z
2025-12-24T20:27:06Z
Yazar Akyıldız, M. Alparslan.<br/>Yer Numarası TK5105.59.A39 U94 2020<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~2<br/>
Türkiye’de ve dünyada siber güvenlik
ent://SD_ILS/0/SD_ILS:514958
2025-12-24T20:27:06Z
2025-12-24T20:27:06Z
Yazar Çeliktaş, Barış .<br/>Yer Numarası UG485 C45 2020<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>
Cyber Security Cryptography and Machine Learning Third International Symposium, CSCML 2019, Beer-Sheva, Israel, June 27–28, 2019, Proceedings
ent://SD_ILS/0/SD_ILS:484186
2025-12-24T20:27:06Z
2025-12-24T20:27:06Z
Yazar Dolev, Shlomi. editor. Hendler, Danny. editor. Lodha, Sachin. editor. Yung, Moti. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-030-20951-3">https://doi.org/10.1007/978-3-030-20951-3</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Cyberdanger Understanding and Guarding Against Cybercrime
ent://SD_ILS/0/SD_ILS:485936
2025-12-24T20:27:06Z
2025-12-24T20:27:06Z
Yazar Willems, Eddy. author. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-030-04531-9">https://doi.org/10.1007/978-3-030-04531-9</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Global cyber security labor shortage and international business risk
ent://SD_ILS/0/SD_ILS:481810
2025-12-24T20:27:06Z
2025-12-24T20:27:06Z
Yazar Christiansen, Bryan, 1960- editor. Piekarz, Agnieszka, 1990- editor. IGI Global, publisher.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-5927-6">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-5927-6</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Applied Cryptography and Network Security Workshops ACNS 2019 Satellite Workshops, SiMLA, Cloud S&P, AIBlock, and AIoTS, Bogota, Colombia, June 5–7, 2019, Proceedings
ent://SD_ILS/0/SD_ILS:484047
2025-12-24T20:27:06Z
2025-12-24T20:27:06Z
Yazar Zhou, Jianying. editor. (orcid)0000-0003-0594-0432 Deng, Robert. editor. (orcid)0000-0003-3491-8146 Li, Zhou. editor. Majumdar, Suryadipta. editor. (orcid)0000-0002-6501-4214 Meng, Weizhi. editor. (orcid)0000-0003-4384-5786<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-030-29729-9">https://doi.org/10.1007/978-3-030-29729-9</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Information and Operational Technology Security Systems First International Workshop, IOSec 2018, CIPSEC Project, Heraklion, Crete, Greece, September 13, 2018, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:486944
2025-12-24T20:27:06Z
2025-12-24T20:27:06Z
Yazar Fournaris, Apostolos P. editor. (orcid)0000-0002-4758-2349 Lampropoulos, Konstantinos. editor. Marín Tordera, Eva. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-030-12085-6">https://doi.org/10.1007/978-3-030-12085-6</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Exploring security in software architecture and design
ent://SD_ILS/0/SD_ILS:481871
2025-12-24T20:27:06Z
2025-12-24T20:27:06Z
Yazar Felderer, Michael, editor. Scandariato, Riccardo, editor. IGI Global, publisher.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-6313-6">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-6313-6</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Advanced methodologies and technologies in system security, information privacy, and forensics
ent://SD_ILS/0/SD_ILS:482009
2025-12-24T20:27:06Z
2025-12-24T20:27:06Z
Yazar Khosrow-Pour, Mehdi, 1951- editor. IGI Global, publisher.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-7492-7">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-7492-7</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Countering cyber attacks and preserving the integrity and availability of critical systems
ent://SD_ILS/0/SD_ILS:482177
2025-12-24T20:27:06Z
2025-12-24T20:27:06Z
Yazar Geetha, S., 1979- editor. Phamila, Asnath Victy, 1978- editor. IGI Global, publisher.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-8241-0">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-8241-0</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Information Security Theory and Practice 12th IFIP WG 11.2 International Conference, WISTP 2018, Brussels, Belgium, December 10–11, 2018, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:484518
2025-12-24T20:27:06Z
2025-12-24T20:27:06Z
Yazar Blazy, Olivier. editor. (orcid)0000-0001-6205-8249 Yeun, Chan Yeob. editor. (orcid)0000-0002-1398-952X SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-030-20074-9">https://doi.org/10.1007/978-3-030-20074-9</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Secure IT Systems 24th Nordic Conference, NordSec 2019, Aalborg, Denmark, November 18–20, 2019, Proceedings
ent://SD_ILS/0/SD_ILS:484847
2025-12-24T20:27:06Z
2025-12-24T20:27:06Z
Yazar Askarov, Aslan. editor. Hansen, René Rydhof. editor. Rafnsson, Willard. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-030-35055-0">https://doi.org/10.1007/978-3-030-35055-0</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Information Security 22nd International Conference, ISC 2019, New York City, NY, USA, September 16–18, 2019, Proceedings
ent://SD_ILS/0/SD_ILS:484908
2025-12-24T20:27:06Z
2025-12-24T20:27:06Z
Yazar Lin, Zhiqiang. editor. Papamanthou, Charalampos. editor. Polychronakis, Michalis. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-030-30215-3">https://doi.org/10.1007/978-3-030-30215-3</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Ethical hacking : (hacking kursu)
ent://SD_ILS/0/SD_ILS:423950
2025-12-24T20:27:06Z
2025-12-24T20:27:06Z
Yazar Usta, Gökhan.<br/>Yer Numarası QA76.9.A25 U88 2019<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>
Network security and its impact on business strategy
ent://SD_ILS/0/SD_ILS:482213
2025-12-24T20:27:06Z
2025-12-24T20:27:06Z
Yazar Oncioiu, Ionica, 1972- editor. IGI Global, publisher.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-8455-1">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-8455-1</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Security and Privacy Second ISEA International Conference, ISEA-ISAP 2018, Jaipur, India, January, 9–11, 2019, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:483112
2025-12-24T20:27:06Z
2025-12-24T20:27:06Z
Yazar Nandi, Sukumar. editor. Jinwala, Devesh. editor. Singh, Virendra. editor. Laxmi, Vijay. editor. Gaur, Manoj Singh. editor.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-981-13-7561-3">https://doi.org/10.1007/978-981-13-7561-3</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Selected Areas in Cryptography – SAC 2018 25th International Conference, Calgary, AB, Canada, August 15–17, 2018, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:483366
2025-12-24T20:27:06Z
2025-12-24T20:27:06Z
Yazar Cid, Carlos. editor. (orcid)0000-0001-5761-8694 Jacobson Jr., Michael J. editor. (orcid)0000-0002-4906-0544 SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-030-10970-7">https://doi.org/10.1007/978-3-030-10970-7</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Exploit geliştirme 101
ent://SD_ILS/0/SD_ILS:389077
2025-12-24T20:27:06Z
2025-12-24T20:27:06Z
Yazar Akyıldız, M. Alparslan.<br/>Yer Numarası QA76.9.A25 A59 2018<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~2<br/>
Handbook of system safety and security : cyber risk and risk management, cyber security, threat analysis, functional safety, software systems, and cyber physical systems
ent://SD_ILS/0/SD_ILS:459145
2025-12-24T20:27:06Z
2025-12-24T20:27:06Z
Yazar Griffor, Edward R., editor.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128037737">http://www.sciencedirect.com/science/book/9780128037737</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Building a practical information security program
ent://SD_ILS/0/SD_ILS:459146
2025-12-24T20:27:06Z
2025-12-24T20:27:06Z
Yazar Andress, Jason, author. Leary, Mark, author.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128020425">http://www.sciencedirect.com/science/book/9780128020425</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Advanced persistent security : a cyberwarfare approach to implementing adaptive enterprise protection, detection, and reaction strategies
ent://SD_ILS/0/SD_ILS:459204
2025-12-24T20:27:06Z
2025-12-24T20:27:06Z
Yazar Winkler, Ira, author. Gomes, Araceli Treu, author. Shackleford, Dave, editor.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="https://www.sciencedirect.com/science/book/9780128093160">https://www.sciencedirect.com/science/book/9780128093160</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Securing the internet of things
ent://SD_ILS/0/SD_ILS:459335
2025-12-24T20:27:06Z
2025-12-24T20:27:06Z
Yazar Li, Shancang, author. Xu, Li D., author. Romdhani, Imed, contributor.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="https://www.sciencedirect.com/science/book/9780128044582">https://www.sciencedirect.com/science/book/9780128044582</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
The basics of cyber safety : computer and mobile device safety made easy
ent://SD_ILS/0/SD_ILS:459044
2025-12-24T20:27:06Z
2025-12-24T20:27:06Z
Yazar Sammons, John, author. Cross, Michael, 1965- author.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780124166509">http://www.sciencedirect.com/science/book/9780124166509</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Security for Service Oriented Architectures.
ent://SD_ILS/0/SD_ILS:542633
2025-12-24T20:27:06Z
2025-12-24T20:27:06Z
Yazar Williams, Walter, author. CRC Press LLC.<br/>Yer Numarası TK5105.5828 .W55 2017<br/>Elektronik Erişim Taylor & Francis <a href="https://www.taylorfrancis.com/books/9780429072185">https://www.taylorfrancis.com/books/9780429072185</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
DEFENSE AGAINST THE BLACK ARTS : how hackers do what they do and how to protect against it.
ent://SD_ILS/0/SD_ILS:542757
2025-12-24T20:27:06Z
2025-12-24T20:27:06Z
Yazar VARSALONE, JESSE.<br/>Yer Numarası TK5105.59<br/>Elektronik Erişim Taylor & Francis <a href="https://www.taylorfrancis.com/books/9780429103766">https://www.taylorfrancis.com/books/9780429103766</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
SECURITY STRATEGY : from requirements to reality.
ent://SD_ILS/0/SD_ILS:545098
2025-12-24T20:27:06Z
2025-12-24T20:27:06Z
Yazar STACKPOLE, BILL.<br/>Yer Numarası QA76.9 .A25<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9780429152160">Taylor & Francis eBooks</a>
Taylor & Francis <a href="https://www.taylorfrancis.com/books/9780429152160">https://www.taylorfrancis.com/books/9780429152160</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Cyber security awareness for CEOs and management
ent://SD_ILS/0/SD_ILS:458665
2025-12-24T20:27:06Z
2025-12-24T20:27:06Z
Yazar Willson, David (Lawyer), author. Dalziel, Henry, editor.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128047545">http://www.sciencedirect.com/science/book/9780128047545</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Data breach preparation and response : breaches are certain, impact is not
ent://SD_ILS/0/SD_ILS:458926
2025-12-24T20:27:06Z
2025-12-24T20:27:06Z
Yazar Fowler, Kevvie, author.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="https://www.sciencedirect.com/science/book/9780128034514">https://www.sciencedirect.com/science/book/9780128034514</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
DNS security : defending the domain name system
ent://SD_ILS/0/SD_ILS:458935
2025-12-24T20:27:06Z
2025-12-24T20:27:06Z
Yazar Liska, Allan, author. Stowe, Geoffrey, author.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128033067">http://www.sciencedirect.com/science/book/9780128033067</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Mobile data loss : threats and countermeasures
ent://SD_ILS/0/SD_ILS:458729
2025-12-24T20:27:06Z
2025-12-24T20:27:06Z
Yazar Raggo, Michael T.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="https://www.sciencedirect.com/science/book/9780128028643">https://www.sciencedirect.com/science/book/9780128028643</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Windows registry forensics : advanced digital forensic analysis of the Windows registry
ent://SD_ILS/0/SD_ILS:458777
2025-12-24T20:27:06Z
2025-12-24T20:27:06Z
Yazar Carvey, Harlan A., author.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128032916">http://www.sciencedirect.com/science/book/9780128032916</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Information security science : measuring the vulnerability to data compromises
ent://SD_ILS/0/SD_ILS:458968
2025-12-24T20:27:06Z
2025-12-24T20:27:06Z
Yazar Young, Carl S., author.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128096437">http://www.sciencedirect.com/science/book/9780128096437</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
CSA guide to cloud computing implementing cloud privacy and security
ent://SD_ILS/0/SD_ILS:355449
2025-12-24T20:27:06Z
2025-12-24T20:27:06Z
Yazar Samani, Raj, author. Honan, Brian, author. Reavis, Jim, author. Jirasek, Vladimir, editor. CSA (Organization), issuing body.<br/>Yer Numarası ONLINE(355449.1)<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780124201255">http://www.sciencedirect.com/science/book/9780124201255</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Information security analytics finding security insights, patterns, and anomalies in big data
ent://SD_ILS/0/SD_ILS:355388
2025-12-24T20:27:06Z
2025-12-24T20:27:06Z
Yazar Talabis, Mark, author. McPherson, Robert, author. Miyamoto, I, author. Martin, Jason L., author.<br/>Yer Numarası ONLINE(355388.1)<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128002070">http://www.sciencedirect.com/science/book/9780128002070</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Dissecting the hack : the v3rb0ten network
ent://SD_ILS/0/SD_ILS:458624
2025-12-24T20:27:06Z
2025-12-24T20:27:06Z
Yazar Street, Jayson E., author. Sims, Kristin, author. Baskin, Brian, author. Martin, Brian, editor.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="https://www.sciencedirect.com/science/book/9780128042786">https://www.sciencedirect.com/science/book/9780128042786</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Industrial network security : securing critical infrastructure networks for Smart Grid, SCADA , and other industrial control systems
ent://SD_ILS/0/SD_ILS:355352
2025-12-24T20:27:06Z
2025-12-24T20:27:06Z
Yazar Knapp, Eric D. Langill, Joel Thomas.<br/>Yer Numarası ONLINE(355352.1)<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780124201149">http://www.sciencedirect.com/science/book/9780124201149</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Collaboration with cloud computing : security, social media, and unified communications
ent://SD_ILS/0/SD_ILS:355829
2025-12-24T20:27:06Z
2025-12-24T20:27:06Z
Yazar Messier, Ric, author.<br/>Yer Numarası ONLINE(355829.1)<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780124170407">http://www.sciencedirect.com/science/book/9780124170407</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Online security for the business traveler
ent://SD_ILS/0/SD_ILS:355575
2025-12-24T20:27:06Z
2025-12-24T20:27:06Z
Yazar Gonzalez, Deborah, author.<br/>Yer Numarası ONLINE(355575.1)<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128000694">http://www.sciencedirect.com/science/book/9780128000694</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Cyber threat! : how to manage the growing risk of cyber attacks
ent://SD_ILS/0/SD_ILS:342020
2025-12-24T20:27:06Z
2025-12-24T20:27:06Z
Yazar Ulsch, N. MacDonnell, 1951-<br/>Yer Numarası ONLINE(342020.1)<br/>Elektronik Erişim ebrary <a href="http://alltitles.ebrary.com/Doc?id=10895757">An electronic book accessible through the World Wide Web; click to view</a>
Ebook Library <a href="http://public.eblib.com/choice/publicfullrecord.aspx?p=1742833">http://public.eblib.com/choice/publicfullrecord.aspx?p=1742833</a>
John Wiley <a href="http://dx.doi.org/10.1002/9781118915028">http://dx.doi.org/10.1002/9781118915028</a>
MyiLibrary <a href="http://www.myilibrary.com?id=629214">http://www.myilibrary.com?id=629214</a>
Cover <a href="http://swbplus.bsz-bw.de/bsz410564842cov.htm">http://swbplus.bsz-bw.de/bsz410564842cov.htm</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Network security essentials : applications and standards
ent://SD_ILS/0/SD_ILS:354232
2025-12-24T20:27:06Z
2025-12-24T20:27:06Z
Yazar Stallings, William.<br/>Yer Numarası TK5105.59 S725 2014<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>
Cryptography and network security : principles and practice
ent://SD_ILS/0/SD_ILS:371288
2025-12-24T20:27:06Z
2025-12-24T20:27:06Z
Yazar Stallings, William.<br/>Yer Numarası TK5105.59 S713 2014<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>
Windows forensic analysis toolkit : advanced analysis techniques for Windows 8
ent://SD_ILS/0/SD_ILS:355909
2025-12-24T20:27:06Z
2025-12-24T20:27:06Z
Yazar Carvey, Harlan A., author.<br/>Yer Numarası ONLINE(355909.1)<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780124171572">http://www.sciencedirect.com/science/book/9780124171572</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Security management : a critical thinking approach
ent://SD_ILS/0/SD_ILS:539725
2025-12-24T20:27:06Z
2025-12-24T20:27:06Z
Yazar Land, Michael (Industrial engineer), author. Ricks, Truett A., author. Ricks, Bob, author.<br/>Yer Numarası HD61.5 .L36 2014<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9781466561786">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>
What every engineer should know about cyber security and digital forensics
ent://SD_ILS/0/SD_ILS:539726
2025-12-24T20:27:06Z
2025-12-24T20:27:06Z
Yazar DeFranco, Joanna F., author.<br/>Yer Numarası TK5105.59 .D44 2014<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9781466564541">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>
The state of the art in intrusion prevention and detection
ent://SD_ILS/0/SD_ILS:543676
2025-12-24T20:27:06Z
2025-12-24T20:27:06Z
Yazar Pathan, Al-Sakib Khan, editor.<br/>Yer Numarası QA76.9 .A25 S7354 2014<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9781482203523">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>
Security without obscurity : a guide to confidentiality, authentication, and integrity
ent://SD_ILS/0/SD_ILS:544118
2025-12-24T20:27:06Z
2025-12-24T20:27:06Z
Yazar Stapleton, Jeffrey James, author.<br/>Yer Numarası QA76.9 .A25 S734 2014<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9781466592155">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>
Violent Python a cookbook for hackers, forensic analysts, penetration testers and security engineers
ent://SD_ILS/0/SD_ILS:146917
2025-12-24T20:27:06Z
2025-12-24T20:27:06Z
Yazar O'Connor, T. J.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597499576">http://www.sciencedirect.com/science/book/9781597499576</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Information protection playbook
ent://SD_ILS/0/SD_ILS:306649
2025-12-24T20:27:06Z
2025-12-24T20:27:06Z
Yazar Kane, Greg, editor of compilation. Koppel, Lorna, editor of compilation.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780124172326">http://www.sciencedirect.com/science/book/9780124172326</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Information security policy development for compliance : ISO/IEC 27001, NIST SP 800-53, HIPAA standard, PCI DSS V2.0, and AUP V5.0
ent://SD_ILS/0/SD_ILS:545128
2025-12-24T20:27:06Z
2025-12-24T20:27:06Z
Yazar Williams, Barry L., author.<br/>Yer Numarası QA76.9 .A25 .W5495 2013<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9781466580596">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>
Handbook of SCADA/control systems security
ent://SD_ILS/0/SD_ILS:547855
2025-12-24T20:27:06Z
2025-12-24T20:27:06Z
Yazar Radvanovsky, Robert. Brodsky, Jacob.<br/>Yer Numarası TK5105.59 .H3532 2013<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9781466502277">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>
PRAGMATIC security metrics : applying metametrics to information security
ent://SD_ILS/0/SD_ILS:541797
2025-12-24T20:27:06Z
2025-12-24T20:27:06Z
Yazar Brotby, W. Krag., author. Hinson, Gary. Kabay, Michel E.<br/>Yer Numarası HD30.38 .B76 2013<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9781439881538">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>
The complete guide to physical security
ent://SD_ILS/0/SD_ILS:545960
2025-12-24T20:27:06Z
2025-12-24T20:27:06Z
Yazar Baker, Paul, 1958, author. Benny, Daniel J.<br/>Yer Numarası HV8290 .B34 2013<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9781420099645">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>
The hacker's guide to OS X exploiting OS X from the root up
ent://SD_ILS/0/SD_ILS:148006
2025-12-24T20:27:06Z
2025-12-24T20:27:06Z
Yazar Bathurst, Robert. Rogers, Russ. Ghassemlouei, Alijohn.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597499507">http://www.sciencedirect.com/science/book/9781597499507</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Windows forensic analysis toolkit advanced analysis techniques for Windows 7
ent://SD_ILS/0/SD_ILS:145689
2025-12-24T20:27:06Z
2025-12-24T20:27:06Z
Yazar Carvey, Harlan A. Kolde, Jennifer.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597497275">http://www.sciencedirect.com/science/book/9781597497275</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Hacking web apps detecting and preventing web application security problems
ent://SD_ILS/0/SD_ILS:148161
2025-12-24T20:27:06Z
2025-12-24T20:27:06Z
Yazar Shema, Mike.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597499514">http://www.sciencedirect.com/science/book/9781597499514</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
SQL injection attacks and defense
ent://SD_ILS/0/SD_ILS:148516
2025-12-24T20:27:06Z
2025-12-24T20:27:06Z
Yazar Clarke, Justin.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597499637">http://www.sciencedirect.com/science/book/9781597499637</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
The healthy PC preventive care, home remedies, and green computing
ent://SD_ILS/0/SD_ILS:293464
2025-12-24T20:27:06Z
2025-12-24T20:27:06Z
Yazar Hart-Davis, Guy. Holzman, Carey. Healthy PC.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://mhebooklibrary.com/reader/healthy-pc-preventive-care-home-remedies-green-computing-2nd-edition">Subscription required</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Hacking exposed 7 : network security secrets & solutions
ent://SD_ILS/0/SD_ILS:270033
2025-12-24T20:27:06Z
2025-12-24T20:27:06Z
Yazar McClure, Stuart. Scambray, Joel. Kurtz, George.<br/>Yer Numarası TK5105.59 M48 2012<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>
Operating systems demystified
ent://SD_ILS/0/SD_ILS:294101
2025-12-24T20:27:06Z
2025-12-24T20:27:06Z
Yazar McHoes, Ann McIver, 1950- Ballew, Joli.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://mhebooklibrary.com/reader/operating-systems-demystified">Subscription required</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Data mining tools for malware detection
ent://SD_ILS/0/SD_ILS:545796
2025-12-24T20:27:06Z
2025-12-24T20:27:06Z
Yazar Masud, Mehedy., author. Khan, Latifur. Thuraisingham, Bhavani M.<br/>Yer Numarası QA76.9 .D343 M385 2012<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9781439854556">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>
Web application security a beginner's guide
ent://SD_ILS/0/SD_ILS:293241
2025-12-24T20:27:06Z
2025-12-24T20:27:06Z
Yazar Sullivan, Bryan, 1974- Liu, Vincent.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://mhebooklibrary.com/reader/web-application-security-beginners-guide">Subscription required</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
RC4 stream cipher and its variants
ent://SD_ILS/0/SD_ILS:538754
2025-12-24T20:27:06Z
2025-12-24T20:27:06Z
Yazar Paul, Goutam., author. Maitra, Subhamoy, 1970-<br/>Yer Numarası QA76.9 .A25 P385 2012<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9781439831373">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>
Network and application security fundamentals and practices
ent://SD_ILS/0/SD_ILS:541627
2025-12-24T20:27:06Z
2025-12-24T20:27:06Z
Yazar Ganguly, Debashis., author. Lahiri, Shibamouli.<br/>Yer Numarası TK5105.59 .G36 2012<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9781466502451">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>
Cybersecurity for industrial control systems : SCADA, DCS, PLC, HMI, and SIS
ent://SD_ILS/0/SD_ILS:543119
2025-12-24T20:27:06Z
2025-12-24T20:27:06Z
Yazar Macaulay, Tyson., author. Singer, Bryan.<br/>Yer Numarası TS156.8 .M328 2012<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9781439801987">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>
The basics of information security understanding the fundamentals of InfoSec in theory and practice
ent://SD_ILS/0/SD_ILS:145371
2025-12-24T20:27:06Z
2025-12-24T20:27:06Z
Yazar Andress, Jason.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597496537">http://www.sciencedirect.com/science/book/9781597496537</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Industrial network security securing critical infrastructure networks for Smart Grid, SCADA, and other industrial control systems
ent://SD_ILS/0/SD_ILS:145457
2025-12-24T20:27:06Z
2025-12-24T20:27:06Z
Yazar Knapp, Eric.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597496452">http://www.sciencedirect.com/science/book/9781597496452</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Windows Registry Forensics Advanced Digital Forensic Analysis of the Windows Registry.
ent://SD_ILS/0/SD_ILS:145659
2025-12-24T20:27:06Z
2025-12-24T20:27:06Z
Yazar Carvey, Harlan.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495806">http://www.sciencedirect.com/science/book/9781597495806</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Securing the cloud cloud computer security techniques and tactics
ent://SD_ILS/0/SD_ILS:148980
2025-12-24T20:27:06Z
2025-12-24T20:27:06Z
Yazar Winkler, J. R. (Joachim R.)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495929">http://www.sciencedirect.com/science/book/9781597495929</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Auditing IT infrastructures for compliance
ent://SD_ILS/0/SD_ILS:271151
2025-12-24T20:27:06Z
2025-12-24T20:27:06Z
Yazar Weiss, Martin M. Solomon, Michael G.<br/>Yer Numarası QA76.9.A25 W428 2011<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>
IT auditing using controls to protect information assets
ent://SD_ILS/0/SD_ILS:293262
2025-12-24T20:27:06Z
2025-12-24T20:27:06Z
Yazar Davis, Chris (Christopher Michael) Schiller, Mike. Wheeler, Kevin.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://mhebooklibrary.com/reader/auditing-using-controls-to-protect-information-assets-2nd-edition">Subscription required</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Hacking exposed wireless wireless security secrets & solutions
ent://SD_ILS/0/SD_ILS:293300
2025-12-24T20:27:06Z
2025-12-24T20:27:06Z
Yazar Cache, Johnny. Wright, Joshua. Liu, Vincent.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://mhebooklibrary.com/reader/hacking-exposed-wireless-second-edition">Subscription required</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
24 deadly sins of software security programming flaws and how to fix them
ent://SD_ILS/0/SD_ILS:293319
2025-12-24T20:27:06Z
2025-12-24T20:27:06Z
Yazar Howard, Michael, 1965- LeBlanc, David, 1960- Viega, John.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://mhebooklibrary.com/reader/24-deadly-sins-software-security-programming-flaws-how-to-fix-them">Subscription required</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Hacking exposed Linux Linux security secrets and solutions.
ent://SD_ILS/0/SD_ILS:293324
2025-12-24T20:27:06Z
2025-12-24T20:27:06Z
Yazar Hatch, Brian. Hacking Linux exposed. ISECOM (Organization)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://mhebooklibrary.com/reader/hacking-exposed-linux">Subscription required</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Engineering information security the application of systems engineering concepts to achieve information assurance
ent://SD_ILS/0/SD_ILS:249916
2025-12-24T20:27:06Z
2025-12-24T20:27:06Z
Yazar Jacobs, Stuart.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim IEEE Xplore <a href="http://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=6047604">http://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=6047604</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Hacker techniques, tools, and incident handling
ent://SD_ILS/0/SD_ILS:271438
2025-12-24T20:27:06Z
2025-12-24T20:27:06Z
Yazar Oriyano, Sean-Philip. Gregg, Michael (Michael C.)<br/>Yer Numarası TK5105.59 O786 2011<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>
Oracle Fusion middleware 11g architecture and management
ent://SD_ILS/0/SD_ILS:293252
2025-12-24T20:27:06Z
2025-12-24T20:27:06Z
Yazar Shafii, Reza. Lee, Stephen, 1975 June 8- Konduri, Gangadhar.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://mhebooklibrary.com/reader/oracle-fusion-middleware-11g-architecture-management">Subscription required</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Gray hat hacking the ethical hacker's handbook
ent://SD_ILS/0/SD_ILS:293255
2025-12-24T20:27:06Z
2025-12-24T20:27:06Z
Yazar Harris, Shon. Harper, Allen. Eagle, Chris. Ness, Jonathan. Lenkey, Gideon.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://mhebooklibrary.com/reader/gray-hat-hacking-ethical-hackers-handbook-3rd-edition">Subscription required</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Hacking exposed Web 2.0 Web 2.0 security secrets and solutions
ent://SD_ILS/0/SD_ILS:293352
2025-12-24T20:27:06Z
2025-12-24T20:27:06Z
Yazar Cannings, Rich. Dwivedi, Himanshu. Lackey, Zane.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://mhebooklibrary.com/reader/hacking-exposed-web-20-security-secrets-solutions">Subscription required</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Hacking exposed web applications web application security secrets and solutions
ent://SD_ILS/0/SD_ILS:293277
2025-12-24T20:27:06Z
2025-12-24T20:27:06Z
Yazar Scambray, Joel. Liu, Vincent. Sima, Caleb.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://mhebooklibrary.com/reader/hacking-exposed-web-applications-3e">Subscription required</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Security information and event management (SIEM) implementation
ent://SD_ILS/0/SD_ILS:293279
2025-12-24T20:27:06Z
2025-12-24T20:27:06Z
Yazar Miller, David, 1959 Nov. 5- Harris, Shon. Harper, Allen. VanDyke, Stephen. Blask, Chris.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://mhebooklibrary.com/reader/security-information-event-management-siem-implementation">Subscription required</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Hacking exposed malware & rootkits malware & rootkits security secrets & solutions
ent://SD_ILS/0/SD_ILS:293397
2025-12-24T20:27:06Z
2025-12-24T20:27:06Z
Yazar Davis, Michael A. Bodmer, Sean. LeMasters, Aaron.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://mhebooklibrary.com/reader/hacking-exposed-malware-rootkits">Subscription required</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
The security risk assessment handbook : a complete guide for performing security risk assessments
ent://SD_ILS/0/SD_ILS:539743
2025-12-24T20:27:06Z
2025-12-24T20:27:06Z
Yazar Landoll, Douglas J., author.<br/>Yer Numarası HF5548.37 .L358 2011<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9781439821497">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>
Security and policy driven computing
ent://SD_ILS/0/SD_ILS:539761
2025-12-24T20:27:06Z
2025-12-24T20:27:06Z
Yazar Liu, Lei, 1968, author.<br/>Yer Numarası QA76.9 .A25 L587 2011<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9781439825808">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>
Honeypot : a new paradigm to information security
ent://SD_ILS/0/SD_ILS:545590
2025-12-24T20:27:06Z
2025-12-24T20:27:06Z
Yazar Joshi, R. C., author. Sardana, Anjali.<br/>Yer Numarası QA76.9 .A25 J66 2011<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9781439869994">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>
Security de-engineering : solving the problems in information risk management
ent://SD_ILS/0/SD_ILS:545608
2025-12-24T20:27:06Z
2025-12-24T20:27:06Z
Yazar Tibble, Ian., author.<br/>Yer Numarası HF5548.37 .T53 2011<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9781439868355">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>
Adaptive security management architecture
ent://SD_ILS/0/SD_ILS:541852
2025-12-24T20:27:06Z
2025-12-24T20:27:06Z
Yazar Tiller, James S., author.<br/>Yer Numarası QA76.9 .A25 T55 2011<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9781420013375">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>
A guide to kernel exploitation attacking the core
ent://SD_ILS/0/SD_ILS:148059
2025-12-24T20:27:06Z
2025-12-24T20:27:06Z
Yazar Perla, Enrico. Massimiliano, Oldani.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597494861">http://www.sciencedirect.com/science/book/9781597494861</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Digital forensics for network, Internet, and cloud computing a forensic evidence guide for moving targets and data
ent://SD_ILS/0/SD_ILS:146482
2025-12-24T20:27:06Z
2025-12-24T20:27:06Z
Yazar Lillard, Terrence.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495370">http://www.sciencedirect.com/science/book/9781597495370</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Dissecting the hack the forb1dd3n network
ent://SD_ILS/0/SD_ILS:146585
2025-12-24T20:27:06Z
2025-12-24T20:27:06Z
Yazar Street, Jayson E. Street, Jayson E. Dissecting the hack.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495684">http://www.sciencedirect.com/science/book/9781597495684</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Virtualization and forensics a digital forensic investigator's guide to virtual environments
ent://SD_ILS/0/SD_ILS:146715
2025-12-24T20:27:06Z
2025-12-24T20:27:06Z
Yazar Barrett, Diane. Kipper, Gregory.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495578">http://www.sciencedirect.com/science/book/9781597495578</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Managed code rootkits hooking into runtime environments
ent://SD_ILS/0/SD_ILS:147836
2025-12-24T20:27:06Z
2025-12-24T20:27:06Z
Yazar Metula, Erez.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495745">http://www.sciencedirect.com/science/book/9781597495745</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Seven deadliest USB attacks
ent://SD_ILS/0/SD_ILS:148953
2025-12-24T20:27:06Z
2025-12-24T20:27:06Z
Yazar Anderson, Brian (Brian James)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495530">http://www.sciencedirect.com/science/book/9781597495530</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Seven deadliest wireless technologies attacks
ent://SD_ILS/0/SD_ILS:149033
2025-12-24T20:27:06Z
2025-12-24T20:27:06Z
Yazar Haines, Brad.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495417">http://www.sciencedirect.com/science/book/9781597495417</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Seven deadliest social network attacks
ent://SD_ILS/0/SD_ILS:149145
2025-12-24T20:27:06Z
2025-12-24T20:27:06Z
Yazar Timm, Carl. Perez, Richard, 1969 Oct. 17- Ely, Adam.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495455">http://www.sciencedirect.com/science/book/9781597495455</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Security 2020 reduce security risks this decade
ent://SD_ILS/0/SD_ILS:303839
2025-12-24T20:27:06Z
2025-12-24T20:27:06Z
Yazar Howard, Doug. Prince, Kevin. Wiley InterScience (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim Wiley InterScience <a href="http://dx.doi.org/10.1002/9781118255803">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Mac security bible
ent://SD_ILS/0/SD_ILS:303881
2025-12-24T20:27:06Z
2025-12-24T20:27:06Z
Yazar Kissell, Joe.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim Wiley InterScience <a href="http://dx.doi.org/10.1002/9781118257739">An electronic book accessible through the World Wide Web; click for information</a>
Safari Books Online <a href="http://proquest.safaribooksonline.com/640">http://proquest.safaribooksonline.com/640</a> <a href="http://proquest.safaribooksonline.com/?fpi=9780470474198">http://proquest.safaribooksonline.com/?fpi=9780470474198</a>
Safari Books Online <a href="http://proquest.safaribooksonline.com/9780470474198">http://proquest.safaribooksonline.com/9780470474198</a>
Books24x7 <a href="http://www.books24x7.com/marc.asp?bookid=40737">http://www.books24x7.com/marc.asp?bookid=40737</a>
<a href="http://site.ebrary.com/lib/alltitles/Doc?id=10358774">http://site.ebrary.com/lib/alltitles/Doc?id=10358774</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Information technology risk management in enterprise environments a review of industry practices and a practical guide to risk management teams
ent://SD_ILS/0/SD_ILS:297862
2025-12-24T20:27:06Z
2025-12-24T20:27:06Z
Yazar Kouns, Jake. Minoli, Daniel, 1952- Wiley InterScience (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim John Wiley <a href="http://dx.doi.org/10.1002/9780470558133">http://dx.doi.org/10.1002/9780470558133</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
IT audit, control, and security
ent://SD_ILS/0/SD_ILS:304008
2025-12-24T20:27:06Z
2025-12-24T20:27:06Z
Yazar Moeller, Robert R.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim Wiley InterScience <a href="http://dx.doi.org/10.1002/9781118269138">An electronic book accessible through the World Wide Web; click for information</a>
Ebook Library <a href="http://public.eblib.com/EBLPublic/PublicView.do?ptiID=624573">http://public.eblib.com/EBLPublic/PublicView.do?ptiID=624573</a>
Books24x7 <a href="http://www.books24x7.com/marc.asp?bookid=40717">http://www.books24x7.com/marc.asp?bookid=40717</a>
<a href="http://site.ebrary.com/lib/alltitles/Doc?id=10469768">http://site.ebrary.com/lib/alltitles/Doc?id=10469768</a>
<a href="http://swb.eblib.com/patron/FullRecord.aspx?p=624573">http://swb.eblib.com/patron/FullRecord.aspx?p=624573</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Seven deadliest USB attacks
ent://SD_ILS/0/SD_ILS:306328
2025-12-24T20:27:06Z
2025-12-24T20:27:06Z
Yazar Anderson, Brian (Brian James)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495530">http://www.sciencedirect.com/science/book/9781597495530</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Virtualization and forensics a digital forensic investigator's guide to virtual environments
ent://SD_ILS/0/SD_ILS:306330
2025-12-24T20:27:06Z
2025-12-24T20:27:06Z
Yazar Barrett, Diane. Kipper, Gregory.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495578">http://www.sciencedirect.com/science/book/9781597495578</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
The executive MBA in information security
ent://SD_ILS/0/SD_ILS:539948
2025-12-24T20:27:06Z
2025-12-24T20:27:06Z
Yazar Trinckes, John J., author.<br/>Yer Numarası HF5548.37 .T75 2010<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9781439810088">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>
Information security risk analysis
ent://SD_ILS/0/SD_ILS:538713
2025-12-24T20:27:06Z
2025-12-24T20:27:06Z
Yazar Peltier, Thomas R., author.<br/>Yer Numarası QA76.9 .A25 P429 2010<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9781439839577">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>
Risk analysis and security countermeasure selection
ent://SD_ILS/0/SD_ILS:539402
2025-12-24T20:27:06Z
2025-12-24T20:27:06Z
Yazar Norman, Thomas L., author.<br/>Yer Numarası HV8290 .N67 2010<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9781420078718">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>
Cryptanalysis of RSA and its variants
ent://SD_ILS/0/SD_ILS:542078
2025-12-24T20:27:06Z
2025-12-24T20:27:06Z
Yazar Hinek, M. Jason., author.<br/>Yer Numarası TK5102.94 .H56 2010<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9781420075199">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>
Vulnerability management
ent://SD_ILS/0/SD_ILS:545698
2025-12-24T20:27:06Z
2025-12-24T20:27:06Z
Yazar Foreman, Park., author.<br/>Yer Numarası QA76.9 .A25 F656 2010<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9781439801512">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>
Next generation SSH2 implementation securing data in motion
ent://SD_ILS/0/SD_ILS:146275
2025-12-24T20:27:06Z
2025-12-24T20:27:06Z
Yazar Liu, Dale.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492836">http://www.sciencedirect.com/science/book/9781597492836</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Architecting secure software systems
ent://SD_ILS/0/SD_ILS:538962
2025-12-24T20:27:06Z
2025-12-24T20:27:06Z
Yazar Talukder, Asoke K., author. Chaitanya, Manish.<br/>Yer Numarası QA76.9 .A25 T34 2009<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9781420087857">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>
Security software development : assessing and managing security risks
ent://SD_ILS/0/SD_ILS:543836
2025-12-24T20:27:06Z
2025-12-24T20:27:06Z
Yazar Ashbaugh, Douglas A., author.<br/>Yer Numarası QA76.9 .A25 A8246 2009<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9781420063813">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>
CISO soft skills : securing organizations impaired by employee politics, apathy, and intolerant perspectives
ent://SD_ILS/0/SD_ILS:544153
2025-12-24T20:27:06Z
2025-12-24T20:27:06Z
Yazar Collette, Ronald D., author. Gentile, Michael. Gentile, Skye.<br/>Yer Numarası HF5548.37 .G462 2009<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9781420089110">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>
Data protection : governance, risk management, and compliance
ent://SD_ILS/0/SD_ILS:543918
2025-12-24T20:27:06Z
2025-12-24T20:27:06Z
Yazar Hill, David G. (David Gary), 1943, author.<br/>Yer Numarası QA76.9 .A25 H52 2009<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9781439806937">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>
Information security management metrics : a definitive guide to effective security monitoring and measurement
ent://SD_ILS/0/SD_ILS:546952
2025-12-24T20:27:06Z
2025-12-24T20:27:06Z
Yazar Brotby, W. Krag., author.<br/>Yer Numarası HD30.2 .B78 2009<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9781420052862">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>
Infosecurity 2008 threat analysis
ent://SD_ILS/0/SD_ILS:145541
2025-12-24T20:27:06Z
2025-12-24T20:27:06Z
Yazar Clark, Champ, III.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492249">http://www.sciencedirect.com/science/book/9781597492249</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Practical embedded security building secure resource-constrained systems
ent://SD_ILS/0/SD_ILS:147416
2025-12-24T20:27:06Z
2025-12-24T20:27:06Z
Yazar Stapko, Timothy John.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780750682152">http://www.sciencedirect.com/science/book/9780750682152</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
OSSEC host-based intrusion detection guide
ent://SD_ILS/0/SD_ILS:148333
2025-12-24T20:27:06Z
2025-12-24T20:27:06Z
Yazar Hay, Andrew. Cid, Daniel. Bray, Rory.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492409">http://www.sciencedirect.com/science/book/9781597492409</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Information assurance dependability and security in networked systems
ent://SD_ILS/0/SD_ILS:145553
2025-12-24T20:27:06Z
2025-12-24T20:27:06Z
Yazar Qian, Yi, 1962-<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780123735669">http://www.sciencedirect.com/science/book/9780123735669</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Microsoft forefront security administration guide
ent://SD_ILS/0/SD_ILS:146369
2025-12-24T20:27:06Z
2025-12-24T20:27:06Z
Yazar Varsalone, Jesse.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492447">http://www.sciencedirect.com/science/book/9781597492447</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Google hacking for penetration testers. Volume 2
ent://SD_ILS/0/SD_ILS:148029
2025-12-24T20:27:06Z
2025-12-24T20:27:06Z
Yazar Long, Johnny.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491761">http://www.sciencedirect.com/science/book/9781597491761</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Scene of the cybercrime
ent://SD_ILS/0/SD_ILS:148955
2025-12-24T20:27:06Z
2025-12-24T20:27:06Z
Yazar Cross, Michael, 1965- Shinder, Debra Littlejohn. Scene of the cybercrime.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492768">http://www.sciencedirect.com/science/book/9781597492768</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Securing Citrix XenApp Server in the enterprise
ent://SD_ILS/0/SD_ILS:149050
2025-12-24T20:27:06Z
2025-12-24T20:27:06Z
Yazar Bin Azad, Tariq. Wilson, Connie. Wright., Michael.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492812">http://www.sciencedirect.com/science/book/9781597492812</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Security in wireless ad hoc and sensor networks
ent://SD_ILS/0/SD_ILS:297789
2025-12-24T20:27:06Z
2025-12-24T20:27:06Z
Yazar Çayirci, E. (Erdal) Levi, Albert, 1969- Wiley InterScience (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim John Wiley <a href="http://dx.doi.org/10.1002/9780470516782">http://dx.doi.org/10.1002/9780470516782</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Secure computer and network systems modeling, analysis and design
ent://SD_ILS/0/SD_ILS:296665
2025-12-24T20:27:06Z
2025-12-24T20:27:06Z
Yazar Ye, Nong. Wiley InterScience (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim Contributor biographical information <a href="http://catdir.loc.gov/catdir/enhancements/fy0833/2007037133-b.html">http://catdir.loc.gov/catdir/enhancements/fy0833/2007037133-b.html</a>
John Wiley <a href="http://dx.doi.org/10.1002/9780470023273">http://dx.doi.org/10.1002/9780470023273</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Information assurance architecture
ent://SD_ILS/0/SD_ILS:539830
2025-12-24T20:27:06Z
2025-12-24T20:27:06Z
Yazar Willett, Keith D., author.<br/>Yer Numarası QA76.9 .A25 W5487 2008<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9780849380686">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>
Building an effective information security policy architecture
ent://SD_ILS/0/SD_ILS:540985
2025-12-24T20:27:06Z
2025-12-24T20:27:06Z
Yazar Bacik, Sandy., author.<br/>Yer Numarası QA76.9 .A25 B335 2008<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9781420059069">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>
Digital privacy : theory, technologies, and practices
ent://SD_ILS/0/SD_ILS:547774
2025-12-24T20:27:06Z
2025-12-24T20:27:06Z
Yazar Acquisti, Alessandro.<br/>Yer Numarası QA76.9 .A25 D528 2008<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9781420052183">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>
Techno Security's guide to managing risks for IT managers, auditors, and investigators
ent://SD_ILS/0/SD_ILS:148641
2025-12-24T20:27:06Z
2025-12-24T20:27:06Z
Yazar Wiles, Jack.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491389">http://www.sciencedirect.com/science/book/9781597491389</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
How to cheat at securing your network
ent://SD_ILS/0/SD_ILS:145654
2025-12-24T20:27:06Z
2025-12-24T20:27:06Z
Yazar Dubrawsky, Ido.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492317">http://www.sciencedirect.com/science/book/9781597492317</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Techno security's guide to e-discovery and digital forensics
ent://SD_ILS/0/SD_ILS:148564
2025-12-24T20:27:06Z
2025-12-24T20:27:06Z
Yazar Wiles, Jack.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492232">http://www.sciencedirect.com/science/book/9781597492232</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Botnets the killer web app
ent://SD_ILS/0/SD_ILS:145283
2025-12-24T20:27:06Z
2025-12-24T20:27:06Z
Yazar Schiller, Craig A.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491358">http://www.sciencedirect.com/science/book/9781597491358</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
WarDriving & wireless penetration testing
ent://SD_ILS/0/SD_ILS:146805
2025-12-24T20:27:06Z
2025-12-24T20:27:06Z
Yazar Hurley, Chris.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491112">http://www.sciencedirect.com/science/book/9781597491112</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Web application vulnerabilities detect, exploit, prevent
ent://SD_ILS/0/SD_ILS:146908
2025-12-24T20:27:06Z
2025-12-24T20:27:06Z
Yazar Cross, Michael, 1965-<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492096">http://www.sciencedirect.com/science/book/9781597492096</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Developer's guide to web application security
ent://SD_ILS/0/SD_ILS:147664
2025-12-24T20:27:06Z
2025-12-24T20:27:06Z
Yazar Cross, Michael, 1965-<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490610">http://www.sciencedirect.com/science/book/9781597490610</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Security convergence managing enterprise security risk
ent://SD_ILS/0/SD_ILS:149080
2025-12-24T20:27:06Z
2025-12-24T20:27:06Z
Yazar Tyson, Dave.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim Volltext <a href="http://www.sciencedirect.com/science/book/9780750684255">http://www.sciencedirect.com/science/book/9780750684255</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Security convergence managing enterprise security risk
ent://SD_ILS/0/SD_ILS:112198
2025-12-24T20:27:06Z
2025-12-24T20:27:06Z
Yazar Tyson, Dave. ScienceDirect (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780750684255">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Techno Security's guide to managing risks for IT managers, auditors, and investigators
ent://SD_ILS/0/SD_ILS:112203
2025-12-24T20:27:06Z
2025-12-24T20:27:06Z
Yazar Wiles, Jack. ScienceDirect (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491389">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
WarDriving & wireless penetration testing
ent://SD_ILS/0/SD_ILS:112210
2025-12-24T20:27:06Z
2025-12-24T20:27:06Z
Yazar Hurley, Chris. ScienceDirect (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491112">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Developer's guide to web application security
ent://SD_ILS/0/SD_ILS:306464
2025-12-24T20:27:06Z
2025-12-24T20:27:06Z
Yazar Cross, Michael, 1965-<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490610">http://www.sciencedirect.com/science/book/9781597490610</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
How to cheat at securing your network
ent://SD_ILS/0/SD_ILS:306503
2025-12-24T20:27:06Z
2025-12-24T20:27:06Z
Yazar Dubrawsky, Ido.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492317">http://www.sciencedirect.com/science/book/9781597492317</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Mechanics of user identification and authentication : fundamentals of identity management
ent://SD_ILS/0/SD_ILS:539940
2025-12-24T20:27:06Z
2025-12-24T20:27:06Z
Yazar Todorov, Dobromir., author.<br/>Yer Numarası TK5105.59 .T575 2007<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9781420052206">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>
Information security : design, implementation, measurement, and compliance
ent://SD_ILS/0/SD_ILS:545839
2025-12-24T20:27:06Z
2025-12-24T20:27:06Z
Yazar Layton, Timothy P., author.<br/>Yer Numarası HF5548.37 .L393 2007<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9781420013412">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>
How to cheat at Windows System Administration using command line scripts
ent://SD_ILS/0/SD_ILS:145623
2025-12-24T20:27:06Z
2025-12-24T20:27:06Z
Yazar Bhardwaj, Pawan K. Andreou, Kimon. Barber, Brian. Kleiman, Dave. Satyanarayana, Mahesh.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491051">http://www.sciencedirect.com/science/book/9781597491051</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Hack the stack using snort and ethereal to master the 8 layers of an insecure network
ent://SD_ILS/0/SD_ILS:147954
2025-12-24T20:27:06Z
2025-12-24T20:27:06Z
Yazar Gregg, Michael (Michael C.) Watkins, Stephen.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491099">http://www.sciencedirect.com/science/book/9781597491099</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Essential computer security everyone's guide to e-mail, Internet, and wireless security
ent://SD_ILS/0/SD_ILS:145840
2025-12-24T20:27:06Z
2025-12-24T20:27:06Z
Yazar Bradley, Tony, 1969- Carvey, Harlan A.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491143">http://www.sciencedirect.com/science/book/9781597491143</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Enemy at the water cooler real-life stories of insider threats and Enterprise Security Management countermeasures
ent://SD_ILS/0/SD_ILS:146475
2025-12-24T20:27:06Z
2025-12-24T20:27:06Z
Yazar Contos, Brian T.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491297">http://www.sciencedirect.com/science/book/9781597491297</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Syngress force emerging threat analysis from mischief to malicious
ent://SD_ILS/0/SD_ILS:148488
2025-12-24T20:27:06Z
2025-12-24T20:27:06Z
Yazar Maynor, David.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490566">http://www.sciencedirect.com/science/book/9781597490566</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Syngress force emerging threat analysis from mischief to malicious
ent://SD_ILS/0/SD_ILS:112202
2025-12-24T20:27:06Z
2025-12-24T20:27:06Z
Yazar Maynor, David. ScienceDirect (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490566">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
How to cheat at Windows System Administration using command line scripts
ent://SD_ILS/0/SD_ILS:112107
2025-12-24T20:27:06Z
2025-12-24T20:27:06Z
Yazar Bhardwaj, Pawan K. Andreou, Kimon. Barber, Brian. Kleiman, Dave. Satyanarayana, Mahesh.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491051">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
How to cheat at designing security for a Windows Server 2003 network
ent://SD_ILS/0/SD_ILS:253670
2025-12-24T20:27:06Z
2025-12-24T20:27:06Z
Yazar Amini, Rob. Hunter, Laura E.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492430">http://www.sciencedirect.com/science/book/9781597492430</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Penetration tester's open source toolkit
ent://SD_ILS/0/SD_ILS:253676
2025-12-24T20:27:06Z
2025-12-24T20:27:06Z
Yazar Long, Johnny.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490214">http://www.sciencedirect.com/science/book/9781597490214</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Securing HP NonStop servers in an open systems world TCP/IP, OSS & SQL
ent://SD_ILS/0/SD_ILS:253863
2025-12-24T20:27:06Z
2025-12-24T20:27:06Z
Yazar XYPRO Technology Corporation.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781555583446">http://www.sciencedirect.com/science/book/9781555583446</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Information security a strategic approach
ent://SD_ILS/0/SD_ILS:249831
2025-12-24T20:27:06Z
2025-12-24T20:27:06Z
Yazar LeVeque, Vincent.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim IEEE Xplore <a href="http://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=5989138">http://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=5989138</a>
IEEE Xplore <a href="http://ieeexplore.ieee.org/servlet/opac?bknumber=5989138">http://ieeexplore.ieee.org/servlet/opac?bknumber=5989138</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Insider threat protecting the enterprise from sabotage, spying, and theft
ent://SD_ILS/0/SD_ILS:253661
2025-12-24T20:27:06Z
2025-12-24T20:27:06Z
Yazar Cole, Eric. Ring, Sandra.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim Volltext <a href="http://www.sciencedirect.com/science/book/9781597490481">http://www.sciencedirect.com/science/book/9781597490481</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Securing IM and P2P applications for the enterprise
ent://SD_ILS/0/SD_ILS:253939
2025-12-24T20:27:06Z
2025-12-24T20:27:06Z
Yazar Piccard, Paul L. Sachs, Marcus H.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490177">http://www.sciencedirect.com/science/book/9781597490177</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Multimedia security technologies for digital rights management
ent://SD_ILS/0/SD_ILS:254554
2025-12-24T20:27:06Z
2025-12-24T20:27:06Z
Yazar Zeng, Wenjun, 1967- Yu, Hong Heather, 1967- Lin, Ching-Yung.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780123694768">http://www.sciencedirect.com/science/book/9780123694768</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Enhancing computer security with smart technology
ent://SD_ILS/0/SD_ILS:544823
2025-12-24T20:27:06Z
2025-12-24T20:27:06Z
Yazar Vemuri, V. Rao.<br/>Yer Numarası TK5105.59 .E62 2005<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9781420031225">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>
Computer security fundamentals
ent://SD_ILS/0/SD_ILS:108620
2025-12-24T20:27:06Z
2025-12-24T20:27:06Z
Yazar Easttom, Chuck.<br/>Yer Numarası QA76.9.A25 E325 2006<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>
The CISO handbook : a practical guide to securing your company
ent://SD_ILS/0/SD_ILS:539204
2025-12-24T20:27:06Z
2025-12-24T20:27:06Z
Yazar Gentile, Michael., author. Collette, Ronald D. August, Thomas D.<br/>Yer Numarası HF5548.37 .G46 2006<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9781420031379">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>
The security risk assessment handbook : a complete guide for performing security risk assessments
ent://SD_ILS/0/SD_ILS:545167
2025-12-24T20:27:06Z
2025-12-24T20:27:06Z
Yazar Landoll, Douglas J., author.<br/>Yer Numarası HF5548.37 .L358 2006<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9781420031232">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>
Aggressive network self-defense
ent://SD_ILS/0/SD_ILS:253672
2025-12-24T20:27:06Z
2025-12-24T20:27:06Z
Yazar Wyler, Neil R.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836203">http://www.sciencedirect.com/science/book/9781931836203</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Cryptography, information theory, and error-correction a handbook for the 21st century
ent://SD_ILS/0/SD_ILS:301860
2025-12-24T20:27:06Z
2025-12-24T20:27:06Z
Yazar Bruen, Aiden A., 1941- Forcinito, Mario, 1962- Wiley InterScience (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim Wiley InterScience <a href="http://dx.doi.org/10.1002/9781118033296">An electronic book accessible through the World Wide Web; click for information</a>
Contributor biographical information <a href="http://catdir.loc.gov/catdir/enhancements/fy0618/2004058044-b.html">http://catdir.loc.gov/catdir/enhancements/fy0618/2004058044-b.html</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Information security risk analysis
ent://SD_ILS/0/SD_ILS:544821
2025-12-24T20:27:06Z
2025-12-24T20:27:06Z
Yazar Peltier, Thomas R., author.<br/>Yer Numarası QA76.9 .A25 P429 2005<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9781420031195">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>
A practical guide to security assessments
ent://SD_ILS/0/SD_ILS:545277
2025-12-24T20:27:06Z
2025-12-24T20:27:06Z
Yazar Kairab, Sudhanshu., author.<br/>Yer Numarası HF5548.32 .K345 2005<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9781135500313">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>
IM, instant messaging, security
ent://SD_ILS/0/SD_ILS:253725
2025-12-24T20:27:06Z
2025-12-24T20:27:06Z
Yazar Rittinghouse, John W. Ransome, James F.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781555583385">http://www.sciencedirect.com/science/book/9781555583385</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Implementing homeland security for enterprise IT
ent://SD_ILS/0/SD_ILS:253656
2025-12-24T20:27:06Z
2025-12-24T20:27:06Z
Yazar Erbschloe, Michael.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781555583125">http://www.sciencedirect.com/science/book/9781555583125</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
HP Nonstop server security a practical handbook
ent://SD_ILS/0/SD_ILS:253849
2025-12-24T20:27:06Z
2025-12-24T20:27:06Z
Yazar Hill, Terri. Alvarado, Ellen. XYPRO Technology Corporation.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781555583149">http://www.sciencedirect.com/science/book/9781555583149</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Security assessment case studies for implementing the NSA IAM
ent://SD_ILS/0/SD_ILS:254030
2025-12-24T20:27:06Z
2025-12-24T20:27:06Z
Yazar Rogers, Russ.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781932266962">http://www.sciencedirect.com/science/book/9781932266962</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Wireless operational security
ent://SD_ILS/0/SD_ILS:254059
2025-12-24T20:27:06Z
2025-12-24T20:27:06Z
Yazar Rittinghouse, John W. Ransome, James F.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781555583170">http://www.sciencedirect.com/science/book/9781555583170</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
WarDriving drive, detect, defend : a guide to wireless security
ent://SD_ILS/0/SD_ILS:253988
2025-12-24T20:27:06Z
2025-12-24T20:27:06Z
Yazar Hurley, Chris.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836036">http://www.sciencedirect.com/science/book/9781931836036</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Snort 2.1 intrusion detection
ent://SD_ILS/0/SD_ILS:253989
2025-12-24T20:27:06Z
2025-12-24T20:27:06Z
Yazar Beale, Jay. Alder, Raven.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836043">http://www.sciencedirect.com/science/book/9781931836043</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Nessus network auditing
ent://SD_ILS/0/SD_ILS:253991
2025-12-24T20:27:06Z
2025-12-24T20:27:06Z
Yazar Deraison, Renaud. Syngress Media, Inc.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836081">http://www.sciencedirect.com/science/book/9781931836081</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Cyber adversary characterization auditing the hacker mind
ent://SD_ILS/0/SD_ILS:253992
2025-12-24T20:27:06Z
2025-12-24T20:27:06Z
Yazar Parker, Tom, 1982-<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836111">http://www.sciencedirect.com/science/book/9781931836111</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Malware : fighting malicious code
ent://SD_ILS/0/SD_ILS:267737
2025-12-24T20:27:06Z
2025-12-24T20:27:06Z
Yazar Skoudis, Ed. Zeltser, Lenny.<br/>Yer Numarası QA76.9.A25 S58 2004<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>
Public key infrastructure : building trusted applications and Web services
ent://SD_ILS/0/SD_ILS:543281
2025-12-24T20:27:06Z
2025-12-24T20:27:06Z
Yazar Vacca, John R.<br/>Yer Numarası QA76.9 .A25 P85 2004<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9780203498156">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>
Computer security sourcebook
ent://SD_ILS/0/SD_ILS:94615
2025-12-24T20:27:06Z
2025-12-24T20:27:06Z
Yazar Caldwell, Wilma, ed.<br/>Yer Numarası QA 76.9.A25 C658 2003<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>
Internet security a jumpstart for systems administrators and IT managers
ent://SD_ILS/0/SD_ILS:253843
2025-12-24T20:27:06Z
2025-12-24T20:27:06Z
Yazar Speed, Tim. Ellis, Juanita.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781555582982">http://www.sciencedirect.com/science/book/9781555582982</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Cybersecurity operations handbook
ent://SD_ILS/0/SD_ILS:253847
2025-12-24T20:27:06Z
2025-12-24T20:27:06Z
Yazar Rittinghouse, John W. Hancock, Bill, 1957-<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781555583064">http://www.sciencedirect.com/science/book/9781555583064</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Cisco security professional's guide to secure intrusion detection systems
ent://SD_ILS/0/SD_ILS:254024
2025-12-24T20:27:06Z
2025-12-24T20:27:06Z
Yazar Burton, James. Dubrawsky, Ida. Osipov, Vitaly. Baumrucker, C. Tate. Sweeney, Michael<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781932266696">http://www.sciencedirect.com/science/book/9781932266696</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Security in fixed and wireless networks an introduction to securing data communications
ent://SD_ILS/0/SD_ILS:301122
2025-12-24T20:27:06Z
2025-12-24T20:27:06Z
Yazar Schäfer, Günter, Dr.-Ing. John Wiley & Sons.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim John Wiley <a href="http://dx.doi.org/10.1002/0470863722">http://dx.doi.org/10.1002/0470863722</a>
<a href="http://www3.interscience.wiley.com/cgi-bin/bookhome/112477198">http://www3.interscience.wiley.com/cgi-bin/bookhome/112477198</a>
Contributor biographical information <a href="http://catdir.loc.gov/catdir/bios/wiley047/2004299184.html">http://catdir.loc.gov/catdir/bios/wiley047/2004299184.html</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
UMTS security
ent://SD_ILS/0/SD_ILS:295861
2025-12-24T20:27:06Z
2025-12-24T20:27:06Z
Yazar Niemi, Valtteri. Nyberg, Kaisa, 1948-<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://www.contentreserve.com/TitleInfo.asp?ID={465C10B2-1465-4D2B-AAAD-DED651D62D3D}&Format=50">Click for information</a>
Wiley InterScience - Full text online <a href="http://onlinelibrary.wiley.com/book/10.1002/0470091584">http://onlinelibrary.wiley.com/book/10.1002/0470091584</a>
John Wiley <a href="http://dx.doi.org/10.1002/0470091584">http://dx.doi.org/10.1002/0470091584</a>
HathiTrust Digital Library, Limited view (search only) <a href="http://catalog.hathitrust.org/api/volumes/oclc/53183293.html">http://catalog.hathitrust.org/api/volumes/oclc/53183293.html</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Hack proofing your network
ent://SD_ILS/0/SD_ILS:253618
2025-12-24T20:27:06Z
2025-12-24T20:27:06Z
Yazar Ahmad, David R. Mirza. Russell, Ryan, 1969-<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781928994701">http://www.sciencedirect.com/science/book/9781928994701</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Information security best practices 205 basic rules
ent://SD_ILS/0/SD_ILS:254779
2025-12-24T20:27:06Z
2025-12-24T20:27:06Z
Yazar Stefanek, George L.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781878707963">http://www.sciencedirect.com/science/book/9781878707963</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
A practical guide to security engineering and information assurance
ent://SD_ILS/0/SD_ILS:544973
2025-12-24T20:27:06Z
2025-12-24T20:27:06Z
Yazar Herrmann, Debra S., author.<br/>Yer Numarası QA76.9 .A25 H47 2002<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9781420031492">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>
Hack proofing Sun Solaris 8
ent://SD_ILS/0/SD_ILS:254047
2025-12-24T20:27:06Z
2025-12-24T20:27:06Z
Yazar Miles, Wyman. Mitchell, Ed, 1945- Lynch, F. William. Cook, Randy (Randy R.)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781928994442">http://www.sciencedirect.com/science/book/9781928994442</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Hack proofing your Web applications
ent://SD_ILS/0/SD_ILS:253969
2025-12-24T20:27:06Z
2025-12-24T20:27:06Z
Yazar Traxler, Julie.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781928994312">http://www.sciencedirect.com/science/book/9781928994312</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Hack proofing Windows 2000 Server
ent://SD_ILS/0/SD_ILS:253999
2025-12-24T20:27:06Z
2025-12-24T20:27:06Z
Yazar Todd, Chad. Johnson, Norris L.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836494">http://www.sciencedirect.com/science/book/9781931836494</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Securing e-business applications and communications
ent://SD_ILS/0/SD_ILS:545821
2025-12-24T20:27:06Z
2025-12-24T20:27:06Z
Yazar Held, Jonathan S., author. Bowers, John R.<br/>Yer Numarası QA76.9 .A25 H435 2001<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9781420031553">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>
Secure computers and networks : analysis, design, and implementation
ent://SD_ILS/0/SD_ILS:540568
2025-12-24T20:27:06Z
2025-12-24T20:27:06Z
Yazar Fisch, Eric A. White, Gregory B.<br/>Yer Numarası QA76.9 .A25 F5334 2000<br/>Elektronik Erişim Taylor & Francis <a href="https://www.taylorfrancis.com/books/9780367802127">https://www.taylorfrancis.com/books/9780367802127</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Applied cryptography : protocols, algorithms, and source code in C
ent://SD_ILS/0/SD_ILS:108014
2025-12-24T20:27:06Z
2025-12-24T20:27:06Z
Yazar Schneier, Bruce.<br/>Yer Numarası QA76.9.A25 S35 1996<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>
Contemporary cryptology the science of information integrity
ent://SD_ILS/0/SD_ILS:249661
2025-12-24T20:27:06Z
2025-12-24T20:27:06Z
Yazar Simmons, Gustavus J. Institute of Electrical and Electronics Engineers.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim IEEE Xplore <a href="http://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=5265879">http://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=5265879</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Auditing IT infrastructures for compliance
ent://SD_ILS/0/SD_ILS:270164
2025-12-24T20:27:06Z
2025-12-24T20:27:06Z
Yazar Weiss, Martin M. Solomon, Michael G.<br/>Yer Numarası QA76.9.A25 W428<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>