Arama Sonuçları Security Measures. - Daraltılmış: Computer security.
SirsiDynix Enterprise
https://katalog.hacettepe.edu.tr/client/tr_TR/default_tr/default_tr/qu$003dSecurity$002bMeasures.$0026qf$003dSUBJECT$002509Subject$002509Computer$002bsecurity.$002509Computer$002bsecurity.$0026ic$003dtrue$0026te$003dILS$0026ps$003d300?
2026-02-22T22:14:53Z
Digital forensics in next generation internet for medical things : balancing security and sustainability
ent://SD_ILS/0/SD_ILS:575627
2026-02-22T22:14:53Z
2026-02-22T22:14:53Z
Yazar Saini, Hemant Kumar, editor Rani, Sita, editor Ouaissa, Mariya, editor Ouaissa, Mariyam, editor Abou El Houda, Zakaria, editor<br/>Yer Numarası R859.7 .I59 D54 2026 EB<br/>Elektronik Erişim Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003640325">https://www.taylorfrancis.com/books/9781003640325</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Intelligent networks and systems : advanced technologies and applications
ent://SD_ILS/0/SD_ILS:553413
2026-02-22T22:14:53Z
2026-02-22T22:14:53Z
Yazar Siddique, N. H., editor. Arefin, Mohammad Shamsul, editor. Noori, Sheak Rashed Haider, editor. Kaiser, M. Shamim, editor.<br/>Yer Numarası QA76.76 .E95<br/>Elektronik Erişim Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781032659770">https://www.taylorfrancis.com/books/9781032659770</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Behavioral insights in cybersecurity : a guide to digital human factors
ent://SD_ILS/0/SD_ILS:567885
2026-02-22T22:14:53Z
2026-02-22T22:14:53Z
Yazar Sachs, Dustin S., author.<br/>Yer Numarası ZA3086.5 .C93<br/>Elektronik Erişim Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003606345">https://www.taylorfrancis.com/books/9781003606345</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Zero-trust learning : applications in modern network security
ent://SD_ILS/0/SD_ILS:580582
2026-02-22T22:14:53Z
2026-02-22T22:14:53Z
Yazar Kaushal, Chetna, editor.<br/>Yer Numarası TK5105.59<br/>Elektronik Erişim Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781779643575">https://www.taylorfrancis.com/books/9781779643575</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
ATTACKS ON ARTIFICIAL INTELLIGENCE the new facets of cyber.
ent://SD_ILS/0/SD_ILS:552313
2026-02-22T22:14:53Z
2026-02-22T22:14:53Z
Yer Numarası QA76.9 .A25<br/>Elektronik Erişim Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003498827">https://www.taylorfrancis.com/books/9781003498827</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Secure detection and control in cyber-physical systems : working in the presence of malicious data
ent://SD_ILS/0/SD_ILS:574476
2026-02-22T22:14:53Z
2026-02-22T22:14:53Z
Yazar Yan, Jiaqi, author. Mo, Yilin, author. Wen, Changyun, 1963- author.<br/>Yer Numarası QA76.9 .A25<br/>Elektronik Erişim Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003409199">https://www.taylorfrancis.com/books/9781003409199</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Generative AI for cybersecurity : fundamentals, applications, risks, and opportunities
ent://SD_ILS/0/SD_ILS:584274
2026-02-22T22:14:53Z
2026-02-22T22:14:53Z
Yazar Nguyen, Diep N., author. Vu, Ly T., author Nguyen, Quang Uy, author Hoang, Dinh Thai, 1986- author.<br/>Yer Numarası QA76.9 .A25<br/>Elektronik Erişim Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003502531">https://www.taylorfrancis.com/books/9781003502531</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Quantum algorithms for enhancing cybersecurity in computational intelligence in healthcare
ent://SD_ILS/0/SD_ILS:589137
2026-02-22T22:14:53Z
2026-02-22T22:14:53Z
Yazar Singhal, Prateek, editor. Mishra, Pramod Kumar, editor. Hasan, Mokhtar Mohammed, editor.<br/>Yer Numarası R858<br/>Elektronik Erişim Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003597414">https://www.taylorfrancis.com/books/9781003597414</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
CYBER SECURITY MANAGEMENT AND STRATEGIC INTELLIGENCE
ent://SD_ILS/0/SD_ILS:553331
2026-02-22T22:14:53Z
2026-02-22T22:14:53Z
Yazar Trim, Peter R. J., author. Lee, Yang-Im, author.<br/>Yer Numarası HF5548.37<br/>Elektronik Erişim Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003570905">https://www.taylorfrancis.com/books/9781003570905</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Agile security in the digital era : challenges and cybersecurity trends
ent://SD_ILS/0/SD_ILS:563898
2026-02-22T22:14:53Z
2026-02-22T22:14:53Z
Yazar Zaydi, Mounia, editor.<br/>Yer Numarası QA76.9 .A25 A414 2025<br/>Elektronik Erişim Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003478676">https://www.taylorfrancis.com/books/9781003478676</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
CYBERSECURITY IN HEALTHCARE APPLICATIONS
ent://SD_ILS/0/SD_ILS:568919
2026-02-22T22:14:53Z
2026-02-22T22:14:53Z
Yazar Poonkuntran, S., editor. Dhanaraj, Rajesh Kumar, editor. Aanjankumar, S., editor. Sathyamoorthy, Malathy, editor.<br/>Yer Numarası R859.7 .S43<br/>Elektronik Erişim Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781032711379">https://www.taylorfrancis.com/books/9781032711379</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Blockchain technology for cyber defense, cybersecurity, and countermeasures : techniques, solutions, and applications
ent://SD_ILS/0/SD_ILS:570600
2026-02-22T22:14:53Z
2026-02-22T22:14:53Z
Yazar Kshetri, Naresh, editor. Pandey, Purnendu Shekhar, editor. Ahmed, Mohiuddin (Computer scientist), editor.<br/>Yer Numarası QA76.9 .A25 B5845 2025<br/>Elektronik Erişim Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003449515">https://www.taylorfrancis.com/books/9781003449515</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Optimal spending on cybersecurity measures : digital privacy and data protection
ent://SD_ILS/0/SD_ILS:572623
2026-02-22T22:14:53Z
2026-02-22T22:14:53Z
Yazar Kissoon, Tara, author.<br/>Yer Numarası HF5548.37<br/>Elektronik Erişim Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003507109">https://www.taylorfrancis.com/books/9781003507109</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
CYBERSECURITY OF INDUSTRIAL INTERNET OF THINGS (IIOT)
ent://SD_ILS/0/SD_ILS:560917
2026-02-22T22:14:53Z
2026-02-22T22:14:53Z
Yazar BUJA, ATDHE.<br/>Yer Numarası QA76.9 .A25<br/>Elektronik Erişim Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003383253">https://www.taylorfrancis.com/books/9781003383253</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Optimum spending on cybersecurity measures : digital privacy and data protection
ent://SD_ILS/0/SD_ILS:574605
2026-02-22T22:14:53Z
2026-02-22T22:14:53Z
Yazar Kissoon, Tara, author.<br/>Yer Numarası HF5548.37<br/>Elektronik Erişim Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003497523">https://www.taylorfrancis.com/books/9781003497523</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Optimal spending on cybersecurity measures : AI and governance
ent://SD_ILS/0/SD_ILS:584311
2026-02-22T22:14:53Z
2026-02-22T22:14:53Z
Yazar Kissoon, Tara, author.<br/>Yer Numarası HF5548.37 .K57 2025 EB<br/>Elektronik Erişim Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003587569">https://www.taylorfrancis.com/books/9781003587569</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Optimal spending on cybersecurity measures : third party risk management
ent://SD_ILS/0/SD_ILS:584312
2026-02-22T22:14:53Z
2026-02-22T22:14:53Z
Yazar Kissoon, Tara, author.<br/>Yer Numarası HF5548.37 .K57 2025 EB<br/>Elektronik Erişim Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003587576">https://www.taylorfrancis.com/books/9781003587576</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
The techno-legal dynamics of cyber crimes in Industry 5.0
ent://SD_ILS/0/SD_ILS:599801
2026-02-22T22:14:53Z
2026-02-22T22:14:53Z
Yazar Kaur, Gagandeep, editor Choudhury, Tanupriya editor Balamurugan, S. editor<br/>Yer Numarası QA76.9 .A25<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394242177">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394242177</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
ADVANCEMENTS IN CYBERSECURITY next-generation systems and.
ent://SD_ILS/0/SD_ILS:589110
2026-02-22T22:14:53Z
2026-02-22T22:14:53Z
Yer Numarası TK5105.59<br/>Elektronik Erişim Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003546153">https://www.taylorfrancis.com/books/9781003546153</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Security technologies for law enforcement agencies
ent://SD_ILS/0/SD_ILS:589138
2026-02-22T22:14:53Z
2026-02-22T22:14:53Z
Yazar Duraklar, Kazım author.<br/>Yer Numarası QA76.9 .A25<br/>Elektronik Erişim Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003597445">https://www.taylorfrancis.com/books/9781003597445</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Open-source security operations center (SOC) : a complete guide to establishing, managing, and maintaining a modern SOC
ent://SD_ILS/0/SD_ILS:599434
2026-02-22T22:14:53Z
2026-02-22T22:14:53Z
Yazar Basta, Alfred, author. Basta, Nadine, author. Anwar, Waqar, author. Essar, Mohammad Ilyas, author. John Wiley & Sons, publisher.<br/>Yer Numarası QA76.9 .A25<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394201631">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394201631</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Securing cyber-physical systems : fundamentals, applications and challenges
ent://SD_ILS/0/SD_ILS:600260
2026-02-22T22:14:53Z
2026-02-22T22:14:53Z
Yazar Ananthajothi, K., editor.<br/>Yer Numarası TK5105.59 .S43 2025<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394287765">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394287765</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Protection of electrical power distribution systems : smart grid, microgrid, AI, and cyber security
ent://SD_ILS/0/SD_ILS:600371
2026-02-22T22:14:53Z
2026-02-22T22:14:53Z
Yazar Masood, Tariq, author. Abdo, Jamil, author. Iqbal, Atif, author.<br/>Yer Numarası TK3001 .M37 2026<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394327676">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394327676</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Generative AI, cybersecurity, and ethics
ent://SD_ILS/0/SD_ILS:599597
2026-02-22T22:14:53Z
2026-02-22T22:14:53Z
Yazar Islam, Ray (Mohammad Rubyet), author.<br/>Yer Numarası QA76.9 .A25<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394279326">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394279326</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Digital twins and cybersecurity : safeguarding the future of connected systems
ent://SD_ILS/0/SD_ILS:599615
2026-02-22T22:14:53Z
2026-02-22T22:14:53Z
Yazar Naveen, Palanichamy, author. Maheswar, R., author. Ragupathy, U.S., author.<br/>Yer Numarası QA76.9 .C65 N38 2025<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394272501">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394272501</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Next-generation systems and secure computing
ent://SD_ILS/0/SD_ILS:599779
2026-02-22T22:14:53Z
2026-02-22T22:14:53Z
Yazar Barman, Subhabrata, editor. Koley, Santanu, editor. Joardar, Subhankar, editor.<br/>Yer Numarası QA76.9 .A25 N49 2025<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394228522">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394228522</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
The cybersecurity control playbook : from fundamentals to advanced strategies
ent://SD_ILS/0/SD_ILS:599789
2026-02-22T22:14:53Z
2026-02-22T22:14:53Z
Yazar Edwards, Jason (Cybersecurity expert), author. John Wiley & Sons, publisher.<br/>Yer Numarası QA76.9 .A25 E3884 2025<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394331888">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394331888</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Rise of the machines : when AI and zero trust collide : a Project Zero Trust story
ent://SD_ILS/0/SD_ILS:599932
2026-02-22T22:14:53Z
2026-02-22T22:14:53Z
Yazar Finney, George, author. Vinduska, Zach, author.<br/>Yer Numarası QA76.9 .A25 F56 2025<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394352517">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394352517</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Securing the digital frontier : threats and advanced techniques in security and forensics
ent://SD_ILS/0/SD_ILS:599732
2026-02-22T22:14:53Z
2026-02-22T22:14:53Z
Yazar Sharma, Kavita, 1985- editor.<br/>Yer Numarası QA76.9 .A25 S43 2025<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394268917">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394268917</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Optimal spending on cybersecurity measures : risk management
ent://SD_ILS/0/SD_ILS:586024
2026-02-22T22:14:53Z
2026-02-22T22:14:53Z
Yazar Kissoon, Tara, author.<br/>Yer Numarası HF5548.37<br/>Elektronik Erişim Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003404354">https://www.taylorfrancis.com/books/9781003404354</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Secure and smart cyber-physical systems
ent://SD_ILS/0/SD_ILS:554165
2026-02-22T22:14:53Z
2026-02-22T22:14:53Z
Yazar Ghosh, Uttam, editor.<br/>Yer Numarası QA76.9 .A25<br/>Elektronik Erişim Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003376712">https://www.taylorfrancis.com/books/9781003376712</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Intelligent approaches to cyber security
ent://SD_ILS/0/SD_ILS:556106
2026-02-22T22:14:53Z
2026-02-22T22:14:53Z
Yazar Shekokar, Narendra M., editor. Vasudevan, Hari, 1969- editor. Durbha, Surya Srinivas, editor. Michalas, Antonis, editor. Nagarhalli, Tatwadarshi P., editor.<br/>Yer Numarası QA76.9 .A25<br/>Elektronik Erişim Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003408307">https://www.taylorfrancis.com/books/9781003408307</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Cyber security and business intelligence : innovations and machine learning for cyber risk management
ent://SD_ILS/0/SD_ILS:553989
2026-02-22T22:14:53Z
2026-02-22T22:14:53Z
Yazar Abedin, Mohammad Zoynul, editor. Hájek, Petr, editor.<br/>Yer Numarası HD38.7<br/>Elektronik Erişim Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003285854">https://www.taylorfrancis.com/books/9781003285854</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
ZERO TRUST FRAMEWORK AND PRIVILEGED ACCESS MANAGEMENT (PAM)
ent://SD_ILS/0/SD_ILS:555252
2026-02-22T22:14:53Z
2026-02-22T22:14:53Z
Yazar Das, Ravindra.<br/>Yer Numarası TK5105.59<br/>Elektronik Erişim Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003470021">https://www.taylorfrancis.com/books/9781003470021</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Information technology security and risk management : inductive cases for information security
ent://SD_ILS/0/SD_ILS:562664
2026-02-22T22:14:53Z
2026-02-22T22:14:53Z
Yazar Wingreen, Stephen C., editor. Samandari, Amelia, editor.<br/>Yer Numarası QA76.9 .A25<br/>Elektronik Erişim Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003264415">https://www.taylorfrancis.com/books/9781003264415</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Why CISOs fail
ent://SD_ILS/0/SD_ILS:577207
2026-02-22T22:14:53Z
2026-02-22T22:14:53Z
Yazar Engel, Barak, author.<br/>Yer Numarası HD30.2<br/>Elektronik Erişim Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003302759">https://www.taylorfrancis.com/books/9781003302759</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Introduction to cybersecurity in the Internet of Things
ent://SD_ILS/0/SD_ILS:561174
2026-02-22T22:14:53Z
2026-02-22T22:14:53Z
Yazar Gai, Keke, author. Yu, Jing, 1989- author. Zhu, Liehuang, author.<br/>Yer Numarası TK5105.8857<br/>Elektronik Erişim Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781032694818">https://www.taylorfrancis.com/books/9781032694818</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Artificial intelligence technology in healthcare : security and privacy issues
ent://SD_ILS/0/SD_ILS:574411
2026-02-22T22:14:53Z
2026-02-22T22:14:53Z
Yazar Sharma, Neha (Computer scientist), editor. Srivastava, Durgesh (Computer scientist), editor. Sinwar, Deepak, editor.<br/>Yer Numarası R859.7 .A78<br/>Elektronik Erişim Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003377818">https://www.taylorfrancis.com/books/9781003377818</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
CLOUD SECURITY concepts, applications and practices.
ent://SD_ILS/0/SD_ILS:582260
2026-02-22T22:14:53Z
2026-02-22T22:14:53Z
Yazar Murthy, Jamuna S. Siddesh, G. M., 1981- Srinivasa, K. G.<br/>Yer Numarası QA76.9 .A25<br/>Elektronik Erişim Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003455448">https://www.taylorfrancis.com/books/9781003455448</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
The cybersecurity guide to governance, risk, and compliance
ent://SD_ILS/0/SD_ILS:598945
2026-02-22T22:14:53Z
2026-02-22T22:14:53Z
Yazar Edwards, Jason (Cybersecurity expert), author. Weaver, Griffin, author.<br/>Yer Numarası HD30.38 .E34 2024<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394250226">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394250226</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
CYBERSECURITY IN THE TRANSPORTATION INDUSTRY.
ent://SD_ILS/0/SD_ILS:599238
2026-02-22T22:14:53Z
2026-02-22T22:14:53Z
Yer Numarası HE194 .C93 2024<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394204472">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394204472</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
The zero trust framework : threat hunting & quantum mechanics
ent://SD_ILS/0/SD_ILS:592723
2026-02-22T22:14:53Z
2026-02-22T22:14:53Z
Yazar Das, Ravindra, author.<br/>Yer Numarası TK5105.59<br/>Elektronik Erişim Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003392965">https://www.taylorfrancis.com/books/9781003392965</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
x86 software reverse-engineering, cracking, and counter-measures
ent://SD_ILS/0/SD_ILS:598920
2026-02-22T22:14:53Z
2026-02-22T22:14:53Z
Yazar Domas, Stephanie, author. Domas, Christopher, author.<br/>Yer Numarası QA76.9 .A25 D66 2024<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394277131">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394277131</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Effective vulnerability management : managing risk in the vulnerable digital ecosystem
ent://SD_ILS/0/SD_ILS:599047
2026-02-22T22:14:53Z
2026-02-22T22:14:53Z
Yazar Hughes, Chris (Christopher Matthew), author. Robinson, Nikki, author.<br/>Yer Numarası QA76.9 .A25 H84 2024<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394277155">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394277155</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Stepping through cybersecurity risk management : a systems thinking approach
ent://SD_ILS/0/SD_ILS:599021
2026-02-22T22:14:53Z
2026-02-22T22:14:53Z
Yazar Bayuk, Jennifer L., author.<br/>Yer Numarası QA76.9 .A25 B39 2024<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394213986">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394213986</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Software security : concepts & practices
ent://SD_ILS/0/SD_ILS:570473
2026-02-22T22:14:53Z
2026-02-22T22:14:53Z
Yazar Khan, Suhel Ahmad, author. Kumar, Rajeev, author. Khan, R. A. (Raees Ahmad), author.<br/>Yer Numarası QA76.76 .D47<br/>Elektronik Erişim Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003330516">https://www.taylorfrancis.com/books/9781003330516</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
What every engineer should know about cyber security and digital forensics
ent://SD_ILS/0/SD_ILS:573236
2026-02-22T22:14:53Z
2026-02-22T22:14:53Z
Yazar DeFranco, Joanna F., author. Maley, Bob (Chief Security Officer), author.<br/>Yer Numarası TK5105.59 .D44 2023 EB<br/>Elektronik Erişim Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003245223">https://www.taylorfrancis.com/books/9781003245223</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
A comprehensive guide to information security management and audit
ent://SD_ILS/0/SD_ILS:581175
2026-02-22T22:14:53Z
2026-02-22T22:14:53Z
Yazar Banoth, Rajkumar, author. Gugulothu, Narsimha, author. Godishala, Aruna Kranthi, author.<br/>Yer Numarası HD38.7<br/>Elektronik Erişim Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003322191">https://www.taylorfrancis.com/books/9781003322191</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Privacy in practice : establish and operationalize a holistic data privacy program
ent://SD_ILS/0/SD_ILS:560699
2026-02-22T22:14:53Z
2026-02-22T22:14:53Z
Yazar Tang, Alan, (Information Security), author.<br/>Yer Numarası HF5548.37<br/>Elektronik Erişim Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003225089">https://www.taylorfrancis.com/books/9781003225089</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
The security risk handbook : assess, survey, audit
ent://SD_ILS/0/SD_ILS:574120
2026-02-22T22:14:53Z
2026-02-22T22:14:53Z
Yazar Swanson, Charles (Chartered Security Professional), author.<br/>Yer Numarası HD61.5<br/>Elektronik Erişim Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003186335">https://www.taylorfrancis.com/books/9781003186335</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
A’dan Z’ye siber güvenlik
ent://SD_ILS/0/SD_ILS:524303
2026-02-22T22:14:53Z
2026-02-22T22:14:53Z
Yazar Polat, A. Can. Karakaş, Burak.<br/>Yer Numarası QA76.9 P65 2023<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>
Strategic cyber security management
ent://SD_ILS/0/SD_ILS:550021
2026-02-22T22:14:53Z
2026-02-22T22:14:53Z
Yazar Trim, Peter R. J., author. Lee, Yang-Im, author.<br/>Yer Numarası HF5548.37<br/>Elektronik Erişim Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003244295">https://www.taylorfrancis.com/books/9781003244295</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Losing the cybersecurity war : and what we can do to stop it
ent://SD_ILS/0/SD_ILS:590788
2026-02-22T22:14:53Z
2026-02-22T22:14:53Z
Yazar King, Steve (Cybersecurity expert), author. Chaudry, Kiren, editor.<br/>Yer Numarası TK5105.59<br/>Elektronik Erişim Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003331773">https://www.taylorfrancis.com/books/9781003331773</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Cyber security threats and challenges facing human life
ent://SD_ILS/0/SD_ILS:589706
2026-02-22T22:14:53Z
2026-02-22T22:14:53Z
Yazar Shekokar, Narendra M., editor. Vasudevan, Hari (Engineer), editor. Durbha, Surya Srinivas, editor. Michalas, Antonis, editor. Nagarhalli, Tatwadarshi P., editor.<br/>Yer Numarası QA76.9 .A25<br/>Elektronik Erişim Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003218555">https://www.taylorfrancis.com/books/9781003218555</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Creating an information security program from scratch
ent://SD_ILS/0/SD_ILS:576963
2026-02-22T22:14:53Z
2026-02-22T22:14:53Z
Yazar Williams, Walter (Telecommunications engineer), author.<br/>Yer Numarası QA76.9 .A25 W55 2022<br/>Elektronik Erişim Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003093688">https://www.taylorfrancis.com/books/9781003093688</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Evidence-based cybersecurity : foundations, research, and practice
ent://SD_ILS/0/SD_ILS:580097
2026-02-22T22:14:53Z
2026-02-22T22:14:53Z
Yazar Pomerleau, Pierre-Luc, author. Maimon, David, 1978- author.<br/>Yer Numarası QA76.9 .A25<br/>Elektronik Erişim Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003201519">https://www.taylorfrancis.com/books/9781003201519</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Security awareness design in the new normal age
ent://SD_ILS/0/SD_ILS:585813
2026-02-22T22:14:53Z
2026-02-22T22:14:53Z
Yazar Goucher, Wendy, author.<br/>Yer Numarası QA76.9 .A25<br/>Elektronik Erişim Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003194583">https://www.taylorfrancis.com/books/9781003194583</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
SECURITY AND PRIVACY TRENDS IN CLOUD COMPUTING AND BIG DATA
ent://SD_ILS/0/SD_ILS:564281
2026-02-22T22:14:53Z
2026-02-22T22:14:53Z
Yazar Imran Tariq, Muhammad. Balas, Valentina Emilia. Tayyaba, Shahzadi.<br/>Yer Numarası QA76.9 .A25<br/>Elektronik Erişim Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003107286">https://www.taylorfrancis.com/books/9781003107286</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Cybercrime and Internet technology : theory and practice--the computer network infostructure and computer security, cybersecurity laws, internet of things (IoT), and mobile devices
ent://SD_ILS/0/SD_ILS:553601
2026-02-22T22:14:53Z
2026-02-22T22:14:53Z
Yazar Alexandrou, Alex (Professor of information technology security), author.<br/>Yer Numarası HV6773<br/>Elektronik Erişim Taylor & Francis <a href="https://www.taylorfrancis.com/books/9780429318726">https://www.taylorfrancis.com/books/9780429318726</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Optimal spending on cybersecurity measures : risk management
ent://SD_ILS/0/SD_ILS:553885
2026-02-22T22:14:53Z
2026-02-22T22:14:53Z
Yazar Kissoon, Tara, author.<br/>Yer Numarası HF5548.37 .K57 2022<br/>Elektronik Erişim Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003200895">https://www.taylorfrancis.com/books/9781003200895</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Advanced cybersecurity technologies
ent://SD_ILS/0/SD_ILS:559536
2026-02-22T22:14:53Z
2026-02-22T22:14:53Z
Yazar Moseley, Ralph, author.<br/>Yer Numarası QA76.9 .A25<br/>Elektronik Erişim Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003096894">https://www.taylorfrancis.com/books/9781003096894</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Understanding cybersecurity technologies : a guide to selecting the right cybersecurity tools
ent://SD_ILS/0/SD_ILS:568141
2026-02-22T22:14:53Z
2026-02-22T22:14:53Z
Yazar Moallem, Abbas, author.<br/>Yer Numarası TK5105.59<br/>Elektronik Erişim Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003038429">https://www.taylorfrancis.com/books/9781003038429</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Cybersecurity for ehealth : a simplified guide to practical cybersecurity for non-technical healthcare stakeholders & practitioners
ent://SD_ILS/0/SD_ILS:566470
2026-02-22T22:14:53Z
2026-02-22T22:14:53Z
Yazar Ogu, Emmanuel C., author.<br/>Yer Numarası R859.7 .S43<br/>Elektronik Erişim Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003254416">https://www.taylorfrancis.com/books/9781003254416</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
The Security Hippie.
ent://SD_ILS/0/SD_ILS:587563
2026-02-22T22:14:53Z
2026-02-22T22:14:53Z
Yazar Engel, Barak.<br/>Yer Numarası HD30.2<br/>Elektronik Erişim Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003133308">https://www.taylorfrancis.com/books/9781003133308</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Network forensics : privacy and security
ent://SD_ILS/0/SD_ILS:555626
2026-02-22T22:14:53Z
2026-02-22T22:14:53Z
Yazar Bijalwan, Anchit, author.<br/>Yer Numarası HV8079 .C65<br/>Elektronik Erişim Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003045908">https://www.taylorfrancis.com/books/9781003045908</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Cybersecurity : a practical engineering approach
ent://SD_ILS/0/SD_ILS:558400
2026-02-22T22:14:53Z
2026-02-22T22:14:53Z
Yazar Santos, Henrique, 1960- author.<br/>Yer Numarası TK5105.59<br/>Elektronik Erişim Taylor & Francis <a href="https://www.taylorfrancis.com/books/e/9780429286742">https://www.taylorfrancis.com/books/e/9780429286742</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Zero trust journey across the digital estate
ent://SD_ILS/0/SD_ILS:560700
2026-02-22T22:14:53Z
2026-02-22T22:14:53Z
Yazar Pillai, Binil, author. Kudrati, Abbas, author.<br/>Yer Numarası TK5105.59<br/>Elektronik Erişim Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003225096">https://www.taylorfrancis.com/books/9781003225096</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Cyber security and network security
ent://SD_ILS/0/SD_ILS:597484
2026-02-22T22:14:53Z
2026-02-22T22:14:53Z
Yazar Pramanik, Sabyasachi, editor. Samanta, Debabrata, 1987- editor. Vinay, M., editor. Guha, Abhijit, editor.<br/>Yer Numarası QA76.9 .A25<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119812555">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119812555</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Blockchain security from the bottom up : securing and preventing attacks on cryptocurrencies, decentralized applications, nfts, and smart contracts
ent://SD_ILS/0/SD_ILS:597703
2026-02-22T22:14:53Z
2026-02-22T22:14:53Z
Yazar Poston, Howard E., III, author.<br/>Yer Numarası QA76.9 .B56 P67 2022<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394320691">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394320691</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Trust-based communication systems for internet of things applications
ent://SD_ILS/0/SD_ILS:597744
2026-02-22T22:14:53Z
2026-02-22T22:14:53Z
Yazar Madaan, Vishu, editor. Agrawal, Prateek, editor. Sharma, Anand, editor. Sharma, Dilip Kumar, editor. Agrawal, Akshat, 1986- editor.<br/>Yer Numarası TK5105.8857<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119896746">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119896746</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Trust in computer systems and the cloud
ent://SD_ILS/0/SD_ILS:597142
2026-02-22T22:14:53Z
2026-02-22T22:14:53Z
Yazar Bursell, Mike, author.<br/>Yer Numarası QA76.9 .A25<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119695158">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119695158</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Cyber security and digital forensics
ent://SD_ILS/0/SD_ILS:597326
2026-02-22T22:14:53Z
2026-02-22T22:14:53Z
Yazar Ghonge, Mangesh, 1984- editor.<br/>Yer Numarası QA76.9 .A25<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119795667">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119795667</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Managing cybersecurity in the process industries
ent://SD_ILS/0/SD_ILS:597508
2026-02-22T22:14:53Z
2026-02-22T22:14:53Z
Yazar American Institute of Chemical Engineers. Center for Chemical Process Safety.<br/>Yer Numarası TP155.7<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119861812">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119861812</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Executive's guide to cyber risk : securing the future today
ent://SD_ILS/0/SD_ILS:597567
2026-02-22T22:14:53Z
2026-02-22T22:14:53Z
Yazar Moyo, Siegfried, author.<br/>Yer Numarası HF5548.37 .M68 2022<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394320578">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394320578</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Cybersecurity in smart homes : architectures, solutions and technologies
ent://SD_ILS/0/SD_ILS:597626
2026-02-22T22:14:53Z
2026-02-22T22:14:53Z
Yazar Khatoun, Rida, author.<br/>Yer Numarası QA76.9 .A25<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119987451">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119987451</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
The CISO evolution : business knowledge for cybersecurity executives
ent://SD_ILS/0/SD_ILS:597056
2026-02-22T22:14:53Z
2026-02-22T22:14:53Z
Yazar Sharp, Matthew K., author. Lambros, Kyriakos P., author.<br/>Yer Numarası HD30.2 .S5325 2022<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119782513">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119782513</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Testing and securing web applications
ent://SD_ILS/0/SD_ILS:579877
2026-02-22T22:14:53Z
2026-02-22T22:14:53Z
Yazar Das, Ravindra, author. Johnson, Greg, author.<br/>Yer Numarası TK5105.59<br/>Elektronik Erişim Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003081210">https://www.taylorfrancis.com/books/9781003081210</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Security architecture : how & why
ent://SD_ILS/0/SD_ILS:551177
2026-02-22T22:14:53Z
2026-02-22T22:14:53Z
Yazar Madsen, Tom, author.<br/>Yer Numarası QA76.9 .A25<br/>Elektronik Erişim Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003339380">https://www.taylorfrancis.com/books/9781003339380</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
The security risk assessment handbook : a complete guide for performing security risk assessments
ent://SD_ILS/0/SD_ILS:549829
2026-02-22T22:14:53Z
2026-02-22T22:14:53Z
Yazar Landoll, Douglas J., author.<br/>Yer Numarası HF5548.37 .L358 2021 EB<br/>Elektronik Erişim Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003090441">https://www.taylorfrancis.com/books/9781003090441</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Information security and optimization
ent://SD_ILS/0/SD_ILS:556640
2026-02-22T22:14:53Z
2026-02-22T22:14:53Z
Yazar Tanwar, Rohit, editor. Choudhury, Tanupriya, editor. Zamani, Mazdak, editor. Gupta, Sunil, 1979- editor.<br/>Yer Numarası QA76.9 .A25 I63 2021<br/>Elektronik Erişim Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003045854">https://www.taylorfrancis.com/books/9781003045854</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
CYBERSECURITY ISSUES IN EMERGING TECHNOLOGIES
ent://SD_ILS/0/SD_ILS:564291
2026-02-22T22:14:53Z
2026-02-22T22:14:53Z
Yazar Maglaras, Leandros, editor. Kantzavelou, Ioanna, editor.<br/>Yer Numarası QA76.9 .A25<br/>Elektronik Erişim Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003109952">https://www.taylorfrancis.com/books/9781003109952</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Online social networks security : principles, algorithm, applications, and perspectives
ent://SD_ILS/0/SD_ILS:563361
2026-02-22T22:14:53Z
2026-02-22T22:14:53Z
Yazar Gupta, Brij, 1982- author. Sahoo, Somya Ranjan, author.<br/>Yer Numarası TK5105.59 .G86 2021<br/>Elektronik Erişim Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003107378">https://www.taylorfrancis.com/books/9781003107378</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
SECURING SOCIAL NETWORKS IN CYBERSPACE
ent://SD_ILS/0/SD_ILS:566336
2026-02-22T22:14:53Z
2026-02-22T22:14:53Z
Yazar Pathan, Al-Sakib Khan.<br/>Yer Numarası QA76.9 .A25<br/>Elektronik Erişim Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003134527">https://www.taylorfrancis.com/books/9781003134527</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Cloud computing security foundations and challenges
ent://SD_ILS/0/SD_ILS:580601
2026-02-22T22:14:53Z
2026-02-22T22:14:53Z
Yazar Vacca, John R., editor.<br/>Yer Numarası QA76.585<br/>Elektronik Erişim Taylor & Francis <a href="https://www.taylorfrancis.com/books/9780429055126">https://www.taylorfrancis.com/books/9780429055126</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Cyber defense mechanisms security, privacy, and challenges
ent://SD_ILS/0/SD_ILS:571884
2026-02-22T22:14:53Z
2026-02-22T22:14:53Z
Yazar Kumar, Gautam, 1990- Saini, Dinesh Kumar, 1974- Cuong, Nguyen Ha Huy.<br/>Yer Numarası QA76.9 .A25<br/>Elektronik Erişim Taylor & Francis <a href="https://www.taylorfrancis.com/books/9780367816438">https://www.taylorfrancis.com/books/9780367816438</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Hacking multifactor authentication
ent://SD_ILS/0/SD_ILS:596326
2026-02-22T22:14:53Z
2026-02-22T22:14:53Z
Yazar Grimes, Roger A., author.<br/>Yer Numarası QA76.9 .A25 G75 2021<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119672357">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119672357</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Privacy, regulations, and cybersecurity : the essential business guide
ent://SD_ILS/0/SD_ILS:596472
2026-02-22T22:14:53Z
2026-02-22T22:14:53Z
Yazar Moschovitis, Christos J. P., author.<br/>Yer Numarası HD61.5 .M675 2021 EB<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119660156">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119660156</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
You can stop stupid : stopping losses from accidental and malicious actions
ent://SD_ILS/0/SD_ILS:596502
2026-02-22T22:14:53Z
2026-02-22T22:14:53Z
Yazar Winkler, Ira, author. Brown, Tracy Celaya, author.<br/>Yer Numarası HD61.5 .W55 2021<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119623946">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119623946</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Attribute-Based Encryption and Access Control
ent://SD_ILS/0/SD_ILS:569930
2026-02-22T22:14:53Z
2026-02-22T22:14:53Z
Yazar Huang, Dijiang. Dong, Qiuxiang. Zhu, Yan (Professor of computer security)<br/>Yer Numarası TK5105.59<br/>Elektronik Erişim Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781351210607">https://www.taylorfrancis.com/books/9781351210607</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Cyber arms : security in cyberspace
ent://SD_ILS/0/SD_ILS:579643
2026-02-22T22:14:53Z
2026-02-22T22:14:53Z
Yazar Abaimov, Stanislav, 1989- author. Martellini, M. (Maurizio), author.<br/>Yer Numarası TK5105.59<br/>Elektronik Erişim Taylor & Francis <a href="https://www.taylorfrancis.com/books/9780367853860">https://www.taylorfrancis.com/books/9780367853860</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Security analytics for the internet of everything
ent://SD_ILS/0/SD_ILS:560404
2026-02-22T22:14:53Z
2026-02-22T22:14:53Z
Yazar Ahmed, Mohiuddin (Computer scientist) Abu Barkat, Abu. Pathan, Al-Sakib Khan.<br/>Yer Numarası TK5105.8857<br/>Elektronik Erişim Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003010463">https://www.taylorfrancis.com/books/9781003010463</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Uygulamalarla siber güvenliğe giriş
ent://SD_ILS/0/SD_ILS:510151
2026-02-22T22:14:53Z
2026-02-22T22:14:53Z
Yazar Akyıldız, M. Alparslan.<br/>Yer Numarası TK5105.59.A39 U94 2020<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~2<br/>
Türkiye’de ve dünyada siber güvenlik
ent://SD_ILS/0/SD_ILS:514958
2026-02-22T22:14:53Z
2026-02-22T22:14:53Z
Yazar Çeliktaş, Barış .<br/>Yer Numarası UG485 C45 2020<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>
Cyber strategy : risk-driven security and resiliency
ent://SD_ILS/0/SD_ILS:585453
2026-02-22T22:14:53Z
2026-02-22T22:14:53Z
Yazar Siegel, Carol A., author. Sweeney, Mark, author.<br/>Yer Numarası QA76.9 .A25<br/>Elektronik Erişim Taylor & Francis <a href="https://www.taylorfrancis.com/books/9780429323003">https://www.taylorfrancis.com/books/9780429323003</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Artificial intelligence, cybersecurity and cyber defense
ent://SD_ILS/0/SD_ILS:596423
2026-02-22T22:14:53Z
2026-02-22T22:14:53Z
Yazar Ventre, Daniel, author.<br/>Yer Numarası Q335 .V46 2020 EB<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119788195">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119788195</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Hands on hacking
ent://SD_ILS/0/SD_ILS:596316
2026-02-22T22:14:53Z
2026-02-22T22:14:53Z
Yazar Hickey, Matthew (Computer security expert), author. Arcuri, Jennifer, author.<br/>Yer Numarası QA76.9 .A25 H53 2020 EB<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119561507">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119561507</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Applied incident response
ent://SD_ILS/0/SD_ILS:595744
2026-02-22T22:14:53Z
2026-02-22T22:14:53Z
Yazar Anson, Steve.<br/>Yer Numarası QA76.9 .A25<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119560302">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119560302</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Cybersecurity and decision makers : data security and digital trust
ent://SD_ILS/0/SD_ILS:595943
2026-02-22T22:14:53Z
2026-02-22T22:14:53Z
Yazar Fréminville, Marie de, author.<br/>Yer Numarası HF5548.37 .F74 2020<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119720362">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119720362</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Tribe of hackers security leaders : tribal knowledge from the best in cybersecurity leadership
ent://SD_ILS/0/SD_ILS:595887
2026-02-22T22:14:53Z
2026-02-22T22:14:53Z
Yazar Carey, Marcus J. (Cybersecurity professional), author. Jin, Jennifer.<br/>Yer Numarası QA76.9 .A25 C37 2020<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119643784">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119643784</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Advanced methodologies and technologies in system security, information privacy, and forensics
ent://SD_ILS/0/SD_ILS:482009
2026-02-22T22:14:53Z
2026-02-22T22:14:53Z
Yazar Khosrow-Pour, Mehdi, 1951- editor. IGI Global, publisher.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-7492-7">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-7492-7</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Selected Areas in Cryptography – SAC 2018 25th International Conference, Calgary, AB, Canada, August 15–17, 2018, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:483366
2026-02-22T22:14:53Z
2026-02-22T22:14:53Z
Yazar Cid, Carlos. editor. (orcid)0000-0001-5761-8694 Jacobson Jr., Michael J. editor. (orcid)0000-0002-4906-0544 SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-030-10970-7">https://doi.org/10.1007/978-3-030-10970-7</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Applied Cryptography and Network Security Workshops ACNS 2019 Satellite Workshops, SiMLA, Cloud S&P, AIBlock, and AIoTS, Bogota, Colombia, June 5–7, 2019, Proceedings
ent://SD_ILS/0/SD_ILS:484047
2026-02-22T22:14:53Z
2026-02-22T22:14:53Z
Yazar Zhou, Jianying. editor. (orcid)0000-0003-0594-0432 Deng, Robert. editor. (orcid)0000-0003-3491-8146 Li, Zhou. editor. Majumdar, Suryadipta. editor. (orcid)0000-0002-6501-4214 Meng, Weizhi. editor. (orcid)0000-0003-4384-5786<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-030-29729-9">https://doi.org/10.1007/978-3-030-29729-9</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Cyber Security Cryptography and Machine Learning Third International Symposium, CSCML 2019, Beer-Sheva, Israel, June 27–28, 2019, Proceedings
ent://SD_ILS/0/SD_ILS:484186
2026-02-22T22:14:53Z
2026-02-22T22:14:53Z
Yazar Dolev, Shlomi. editor. Hendler, Danny. editor. Lodha, Sachin. editor. Yung, Moti. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-030-20951-3">https://doi.org/10.1007/978-3-030-20951-3</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Global cyber security labor shortage and international business risk
ent://SD_ILS/0/SD_ILS:481810
2026-02-22T22:14:53Z
2026-02-22T22:14:53Z
Yazar Christiansen, Bryan, 1960- editor. Piekarz, Agnieszka, 1990- editor. IGI Global, publisher.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-5927-6">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-5927-6</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Information Security 22nd International Conference, ISC 2019, New York City, NY, USA, September 16–18, 2019, Proceedings
ent://SD_ILS/0/SD_ILS:484908
2026-02-22T22:14:53Z
2026-02-22T22:14:53Z
Yazar Lin, Zhiqiang. editor. Papamanthou, Charalampos. editor. Polychronakis, Michalis. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-030-30215-3">https://doi.org/10.1007/978-3-030-30215-3</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Ethical hacking : (hacking kursu)
ent://SD_ILS/0/SD_ILS:423950
2026-02-22T22:14:53Z
2026-02-22T22:14:53Z
Yazar Usta, Gökhan.<br/>Yer Numarası QA76.9.A25 U88 2019<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>
Exploring security in software architecture and design
ent://SD_ILS/0/SD_ILS:481871
2026-02-22T22:14:53Z
2026-02-22T22:14:53Z
Yazar Felderer, Michael, editor. Scandariato, Riccardo, editor. IGI Global, publisher.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-6313-6">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-6313-6</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Countering cyber attacks and preserving the integrity and availability of critical systems
ent://SD_ILS/0/SD_ILS:482177
2026-02-22T22:14:53Z
2026-02-22T22:14:53Z
Yazar Geetha, S., 1979- editor. Phamila, Asnath Victy, 1978- editor. IGI Global, publisher.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-8241-0">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-8241-0</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Network security and its impact on business strategy
ent://SD_ILS/0/SD_ILS:482213
2026-02-22T22:14:53Z
2026-02-22T22:14:53Z
Yazar Oncioiu, Ionica, 1972- editor. IGI Global, publisher.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-8455-1">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-8455-1</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Security and Privacy Second ISEA International Conference, ISEA-ISAP 2018, Jaipur, India, January, 9–11, 2019, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:483112
2026-02-22T22:14:53Z
2026-02-22T22:14:53Z
Yazar Nandi, Sukumar. editor. Jinwala, Devesh. editor. Singh, Virendra. editor. Laxmi, Vijay. editor. Gaur, Manoj Singh. editor.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-981-13-7561-3">https://doi.org/10.1007/978-981-13-7561-3</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Secure IT Systems 24th Nordic Conference, NordSec 2019, Aalborg, Denmark, November 18–20, 2019, Proceedings
ent://SD_ILS/0/SD_ILS:484847
2026-02-22T22:14:53Z
2026-02-22T22:14:53Z
Yazar Askarov, Aslan. editor. Hansen, René Rydhof. editor. Rafnsson, Willard. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-030-35055-0">https://doi.org/10.1007/978-3-030-35055-0</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Cyberdanger Understanding and Guarding Against Cybercrime
ent://SD_ILS/0/SD_ILS:485936
2026-02-22T22:14:53Z
2026-02-22T22:14:53Z
Yazar Willems, Eddy. author. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-030-04531-9">https://doi.org/10.1007/978-3-030-04531-9</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Information Security Theory and Practice 12th IFIP WG 11.2 International Conference, WISTP 2018, Brussels, Belgium, December 10–11, 2018, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:484518
2026-02-22T22:14:53Z
2026-02-22T22:14:53Z
Yazar Blazy, Olivier. editor. (orcid)0000-0001-6205-8249 Yeun, Chan Yeob. editor. (orcid)0000-0002-1398-952X SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-030-20074-9">https://doi.org/10.1007/978-3-030-20074-9</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Information and Operational Technology Security Systems First International Workshop, IOSec 2018, CIPSEC Project, Heraklion, Crete, Greece, September 13, 2018, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:486944
2026-02-22T22:14:53Z
2026-02-22T22:14:53Z
Yazar Fournaris, Apostolos P. editor. (orcid)0000-0002-4758-2349 Lampropoulos, Konstantinos. editor. Marín Tordera, Eva. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-030-12085-6">https://doi.org/10.1007/978-3-030-12085-6</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Transformational security awareness : what neuroscientists, storytellers, and marketers can teach us about driving secure behaviors
ent://SD_ILS/0/SD_ILS:595304
2026-02-22T22:14:53Z
2026-02-22T22:14:53Z
Yazar Carpenter, Perry, author.<br/>Yer Numarası QA76.9 .A25 C37 2019 EB<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119566380">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119566380</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Cybersecurity blue team toolkit
ent://SD_ILS/0/SD_ILS:595209
2026-02-22T22:14:53Z
2026-02-22T22:14:53Z
Yazar Tanner, Nadean H., author.<br/>Yer Numarası QA76.9 .A25 T36 2019 EB<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119552963">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119552963</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Tribe of hackers : cybersecurity advice from the best hackers in the world
ent://SD_ILS/0/SD_ILS:595418
2026-02-22T22:14:53Z
2026-02-22T22:14:53Z
Yazar Carey, Marcus J. (Cybersecurity professional), author. Jin, Jennifer, author.<br/>Yer Numarası QA76.9 .A25 C37 2019 EB<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119643395">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119643395</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Cyber smart : five habits to protect your family, money, and identity from cyber criminals
ent://SD_ILS/0/SD_ILS:594967
2026-02-22T22:14:53Z
2026-02-22T22:14:53Z
Yazar McDonough, Bart R., author.<br/>Yer Numarası TK5105.59<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119559658">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119559658</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Cyber security in parallel and distributed computing : concepts, techniques, applications and case studies
ent://SD_ILS/0/SD_ILS:595099
2026-02-22T22:14:53Z
2026-02-22T22:14:53Z
Yazar Le, Dac-Nhuong, 1983- editor. Kumar, Raghvendra, 1987- editor. Mishra, Brojo Kishore, 1979- editor. Khari, Manju, editor. Chatterjee, Jyotir Moy, editor.<br/>Yer Numarası QA76.9 .A25<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119488330">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119488330</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Cyber-vigilance and digital trust : cyber security in the era of cloud computing and IoT
ent://SD_ILS/0/SD_ILS:595279
2026-02-22T22:14:53Z
2026-02-22T22:14:53Z
Yazar Tounsi, Wiem, editor.<br/>Yer Numarası QA76.9 .A25 C93 2019 EB<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119618393">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119618393</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Exploit geliştirme 101
ent://SD_ILS/0/SD_ILS:389077
2026-02-22T22:14:53Z
2026-02-22T22:14:53Z
Yazar Akyıldız, M. Alparslan.<br/>Yer Numarası QA76.9.A25 A59 2018<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~2<br/>
Digital forensics
ent://SD_ILS/0/SD_ILS:593346
2026-02-22T22:14:53Z
2026-02-22T22:14:53Z
Yazar Årnes, André, 1976- editor.<br/>Yer Numarası HV8079 .C65<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119262442">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119262442</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Insider threats
ent://SD_ILS/0/SD_ILS:594407
2026-02-22T22:14:53Z
2026-02-22T22:14:53Z
Yazar Arduin, Pierre-Emmanuel, author.<br/>Yer Numarası QA76.9 .A25<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119419785">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119419785</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
DEFENSE AGAINST THE BLACK ARTS : how hackers do what they do and how to protect against it.
ent://SD_ILS/0/SD_ILS:542757
2026-02-22T22:14:53Z
2026-02-22T22:14:53Z
Yazar VARSALONE, JESSE.<br/>Yer Numarası TK5105.59<br/>Elektronik Erişim Taylor & Francis <a href="https://www.taylorfrancis.com/books/9780429103766">https://www.taylorfrancis.com/books/9780429103766</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
SECURITY STRATEGY : from requirements to reality.
ent://SD_ILS/0/SD_ILS:545098
2026-02-22T22:14:53Z
2026-02-22T22:14:53Z
Yazar STACKPOLE, BILL.<br/>Yer Numarası QA76.9 .A25<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9780429152160">Taylor & Francis eBooks</a>
Taylor & Francis <a href="https://www.taylorfrancis.com/books/9780429152160">https://www.taylorfrancis.com/books/9780429152160</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Security for Service Oriented Architectures.
ent://SD_ILS/0/SD_ILS:542633
2026-02-22T22:14:53Z
2026-02-22T22:14:53Z
Yazar Williams, Walter, author. CRC Press LLC.<br/>Yer Numarası TK5105.5828 .W55 2017<br/>Elektronik Erişim Taylor & Francis <a href="https://www.taylorfrancis.com/books/9780429072185">https://www.taylorfrancis.com/books/9780429072185</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
The basics of cyber safety : computer and mobile device safety made easy
ent://SD_ILS/0/SD_ILS:459044
2026-02-22T22:14:53Z
2026-02-22T22:14:53Z
Yazar Sammons, John, author. Cross, Michael, 1965- author.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780124166509">http://www.sciencedirect.com/science/book/9780124166509</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Advanced persistent security : a cyberwarfare approach to implementing adaptive enterprise protection, detection, and reaction strategies
ent://SD_ILS/0/SD_ILS:459204
2026-02-22T22:14:53Z
2026-02-22T22:14:53Z
Yazar Winkler, Ira, author. Gomes, Araceli Treu, author. Shackleford, Dave, editor.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="https://www.sciencedirect.com/science/book/9780128093160">https://www.sciencedirect.com/science/book/9780128093160</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Securing the internet of things
ent://SD_ILS/0/SD_ILS:459335
2026-02-22T22:14:53Z
2026-02-22T22:14:53Z
Yazar Li, Shancang, author. Xu, Li D., author. Romdhani, Imed, contributor.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="https://www.sciencedirect.com/science/book/9780128044582">https://www.sciencedirect.com/science/book/9780128044582</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Handbook of system safety and security : cyber risk and risk management, cyber security, threat analysis, functional safety, software systems, and cyber physical systems
ent://SD_ILS/0/SD_ILS:459145
2026-02-22T22:14:53Z
2026-02-22T22:14:53Z
Yazar Griffor, Edward R., editor.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128037737">http://www.sciencedirect.com/science/book/9780128037737</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Building a practical information security program
ent://SD_ILS/0/SD_ILS:459146
2026-02-22T22:14:53Z
2026-02-22T22:14:53Z
Yazar Andress, Jason, author. Leary, Mark, author.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128020425">http://www.sciencedirect.com/science/book/9780128020425</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
DNS security management
ent://SD_ILS/0/SD_ILS:593802
2026-02-22T22:14:53Z
2026-02-22T22:14:53Z
Yazar Dooley, Michael, 1962- author. Rooney, Timothy, 1962- author.<br/>Yer Numarası QA76.9 .A25<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119328292">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119328292</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Cybersecurity essentials
ent://SD_ILS/0/SD_ILS:594756
2026-02-22T22:14:53Z
2026-02-22T22:14:53Z
Yazar Brooks, Charles J., author. Grow, Christopher, author. Craig, Philip, author. Short, Donald, author.<br/>Yer Numarası TK5105.59<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119369141">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119369141</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Cyber security awareness for CEOs and management
ent://SD_ILS/0/SD_ILS:458665
2026-02-22T22:14:53Z
2026-02-22T22:14:53Z
Yazar Willson, David (Lawyer), author. Dalziel, Henry, editor.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128047545">http://www.sciencedirect.com/science/book/9780128047545</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Mobile data loss : threats and countermeasures
ent://SD_ILS/0/SD_ILS:458729
2026-02-22T22:14:53Z
2026-02-22T22:14:53Z
Yazar Raggo, Michael T.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="https://www.sciencedirect.com/science/book/9780128028643">https://www.sciencedirect.com/science/book/9780128028643</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Windows registry forensics : advanced digital forensic analysis of the Windows registry
ent://SD_ILS/0/SD_ILS:458777
2026-02-22T22:14:53Z
2026-02-22T22:14:53Z
Yazar Carvey, Harlan A., author.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128032916">http://www.sciencedirect.com/science/book/9780128032916</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Data breach preparation and response : breaches are certain, impact is not
ent://SD_ILS/0/SD_ILS:458926
2026-02-22T22:14:53Z
2026-02-22T22:14:53Z
Yazar Fowler, Kevvie, author.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="https://www.sciencedirect.com/science/book/9780128034514">https://www.sciencedirect.com/science/book/9780128034514</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
DNS security : defending the domain name system
ent://SD_ILS/0/SD_ILS:458935
2026-02-22T22:14:53Z
2026-02-22T22:14:53Z
Yazar Liska, Allan, author. Stowe, Geoffrey, author.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128033067">http://www.sciencedirect.com/science/book/9780128033067</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Information security science : measuring the vulnerability to data compromises
ent://SD_ILS/0/SD_ILS:458968
2026-02-22T22:14:53Z
2026-02-22T22:14:53Z
Yazar Young, Carl S., author.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128096437">http://www.sciencedirect.com/science/book/9780128096437</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Dissecting the hack : the v3rb0ten network
ent://SD_ILS/0/SD_ILS:458624
2026-02-22T22:14:53Z
2026-02-22T22:14:53Z
Yazar Street, Jayson E., author. Sims, Kristin, author. Baskin, Brian, author. Martin, Brian, editor.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="https://www.sciencedirect.com/science/book/9780128042786">https://www.sciencedirect.com/science/book/9780128042786</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Information security analytics finding security insights, patterns, and anomalies in big data
ent://SD_ILS/0/SD_ILS:355388
2026-02-22T22:14:53Z
2026-02-22T22:14:53Z
Yazar Talabis, Mark, author. McPherson, Robert, author. Miyamoto, I, author. Martin, Jason L., author.<br/>Yer Numarası ONLINE(355388.1)<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128002070">http://www.sciencedirect.com/science/book/9780128002070</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
CSA guide to cloud computing implementing cloud privacy and security
ent://SD_ILS/0/SD_ILS:355449
2026-02-22T22:14:53Z
2026-02-22T22:14:53Z
Yazar Samani, Raj, author. Honan, Brian, author. Reavis, Jim, author. Jirasek, Vladimir, editor. CSA (Organization), issuing body.<br/>Yer Numarası ONLINE(355449.1)<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780124201255">http://www.sciencedirect.com/science/book/9780124201255</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Cyber threat! : how to manage the growing risk of cyber attacks
ent://SD_ILS/0/SD_ILS:342020
2026-02-22T22:14:53Z
2026-02-22T22:14:53Z
Yazar Ulsch, N. MacDonnell, 1951-<br/>Yer Numarası ONLINE(342020.1)<br/>Elektronik Erişim ebrary <a href="http://alltitles.ebrary.com/Doc?id=10895757">An electronic book accessible through the World Wide Web; click to view</a>
Ebook Library <a href="http://public.eblib.com/choice/publicfullrecord.aspx?p=1742833">http://public.eblib.com/choice/publicfullrecord.aspx?p=1742833</a>
John Wiley <a href="http://dx.doi.org/10.1002/9781118915028">http://dx.doi.org/10.1002/9781118915028</a>
MyiLibrary <a href="http://www.myilibrary.com?id=629214">http://www.myilibrary.com?id=629214</a>
Cover <a href="http://swbplus.bsz-bw.de/bsz410564842cov.htm">http://swbplus.bsz-bw.de/bsz410564842cov.htm</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Network security essentials : applications and standards
ent://SD_ILS/0/SD_ILS:354232
2026-02-22T22:14:53Z
2026-02-22T22:14:53Z
Yazar Stallings, William.<br/>Yer Numarası TK5105.59 S725 2014<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>
Industrial network security : securing critical infrastructure networks for Smart Grid, SCADA , and other industrial control systems
ent://SD_ILS/0/SD_ILS:355352
2026-02-22T22:14:53Z
2026-02-22T22:14:53Z
Yazar Knapp, Eric D. Langill, Joel Thomas.<br/>Yer Numarası ONLINE(355352.1)<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780124201149">http://www.sciencedirect.com/science/book/9780124201149</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Collaboration with cloud computing : security, social media, and unified communications
ent://SD_ILS/0/SD_ILS:355829
2026-02-22T22:14:53Z
2026-02-22T22:14:53Z
Yazar Messier, Ric, author.<br/>Yer Numarası ONLINE(355829.1)<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780124170407">http://www.sciencedirect.com/science/book/9780124170407</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Online security for the business traveler
ent://SD_ILS/0/SD_ILS:355575
2026-02-22T22:14:53Z
2026-02-22T22:14:53Z
Yazar Gonzalez, Deborah, author.<br/>Yer Numarası ONLINE(355575.1)<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128000694">http://www.sciencedirect.com/science/book/9780128000694</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Windows forensic analysis toolkit : advanced analysis techniques for Windows 8
ent://SD_ILS/0/SD_ILS:355909
2026-02-22T22:14:53Z
2026-02-22T22:14:53Z
Yazar Carvey, Harlan A., author.<br/>Yer Numarası ONLINE(355909.1)<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780124171572">http://www.sciencedirect.com/science/book/9780124171572</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Security without obscurity : a guide to confidentiality, authentication, and integrity
ent://SD_ILS/0/SD_ILS:544118
2026-02-22T22:14:53Z
2026-02-22T22:14:53Z
Yazar Stapleton, Jeffrey James, author.<br/>Yer Numarası QA76.9 .A25 S734 2014<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9781466592155">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>
Cryptography and network security : principles and practice
ent://SD_ILS/0/SD_ILS:371288
2026-02-22T22:14:53Z
2026-02-22T22:14:53Z
Yazar Stallings, William.<br/>Yer Numarası TK5105.59 S713 2014<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>
Security management : a critical thinking approach
ent://SD_ILS/0/SD_ILS:539725
2026-02-22T22:14:53Z
2026-02-22T22:14:53Z
Yazar Land, Michael (Industrial engineer), author. Ricks, Truett A., author. Ricks, Bob, author.<br/>Yer Numarası HD61.5 .L36 2014<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9781466561786">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>
What every engineer should know about cyber security and digital forensics
ent://SD_ILS/0/SD_ILS:539726
2026-02-22T22:14:53Z
2026-02-22T22:14:53Z
Yazar DeFranco, Joanna F., author.<br/>Yer Numarası TK5105.59 .D44 2014<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9781466564541">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>
The state of the art in intrusion prevention and detection
ent://SD_ILS/0/SD_ILS:543676
2026-02-22T22:14:53Z
2026-02-22T22:14:53Z
Yazar Pathan, Al-Sakib Khan, editor.<br/>Yer Numarası QA76.9 .A25 S7354 2014<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9781482203523">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>
Information protection playbook
ent://SD_ILS/0/SD_ILS:306649
2026-02-22T22:14:53Z
2026-02-22T22:14:53Z
Yazar Kane, Greg, editor of compilation. Koppel, Lorna, editor of compilation.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780124172326">http://www.sciencedirect.com/science/book/9780124172326</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Information security policy development for compliance : ISO/IEC 27001, NIST SP 800-53, HIPAA standard, PCI DSS V2.0, and AUP V5.0
ent://SD_ILS/0/SD_ILS:545128
2026-02-22T22:14:53Z
2026-02-22T22:14:53Z
Yazar Williams, Barry L., author.<br/>Yer Numarası QA76.9 .A25 .W5495 2013<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9781466580596">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>
The complete guide to physical security
ent://SD_ILS/0/SD_ILS:545960
2026-02-22T22:14:53Z
2026-02-22T22:14:53Z
Yazar Baker, Paul, 1958, author. Benny, Daniel J.<br/>Yer Numarası HV8290 .B34 2013<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9781420099645">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>
PRAGMATIC security metrics : applying metametrics to information security
ent://SD_ILS/0/SD_ILS:541797
2026-02-22T22:14:53Z
2026-02-22T22:14:53Z
Yazar Brotby, W. Krag., author. Hinson, Gary. Kabay, Michel E.<br/>Yer Numarası HD30.38 .B76 2013<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9781439881538">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>
Violent Python a cookbook for hackers, forensic analysts, penetration testers and security engineers
ent://SD_ILS/0/SD_ILS:146917
2026-02-22T22:14:53Z
2026-02-22T22:14:53Z
Yazar O'Connor, T. J.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597499576">http://www.sciencedirect.com/science/book/9781597499576</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Handbook of SCADA/control systems security
ent://SD_ILS/0/SD_ILS:547855
2026-02-22T22:14:53Z
2026-02-22T22:14:53Z
Yazar Radvanovsky, Robert. Brodsky, Jacob.<br/>Yer Numarası TK5105.59 .H3532 2013<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9781466502277">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>
Hacking exposed 7 : network security secrets & solutions
ent://SD_ILS/0/SD_ILS:270033
2026-02-22T22:14:53Z
2026-02-22T22:14:53Z
Yazar McClure, Stuart. Scambray, Joel. Kurtz, George.<br/>Yer Numarası TK5105.59 M48 2012<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>
Web application security a beginner's guide
ent://SD_ILS/0/SD_ILS:293241
2026-02-22T22:14:53Z
2026-02-22T22:14:53Z
Yazar Sullivan, Bryan, 1974- Liu, Vincent.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://mhebooklibrary.com/reader/web-application-security-beginners-guide">Subscription required</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
The healthy PC preventive care, home remedies, and green computing
ent://SD_ILS/0/SD_ILS:293464
2026-02-22T22:14:53Z
2026-02-22T22:14:53Z
Yazar Hart-Davis, Guy. Holzman, Carey. Healthy PC.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://mhebooklibrary.com/reader/healthy-pc-preventive-care-home-remedies-green-computing-2nd-edition">Subscription required</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Operating systems demystified
ent://SD_ILS/0/SD_ILS:294101
2026-02-22T22:14:53Z
2026-02-22T22:14:53Z
Yazar McHoes, Ann McIver, 1950- Ballew, Joli.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://mhebooklibrary.com/reader/operating-systems-demystified">Subscription required</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Cybersecurity for industrial control systems : SCADA, DCS, PLC, HMI, and SIS
ent://SD_ILS/0/SD_ILS:543119
2026-02-22T22:14:53Z
2026-02-22T22:14:53Z
Yazar Macaulay, Tyson., author. Singer, Bryan.<br/>Yer Numarası TS156.8 .M328 2012<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9781439801987">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>
Network and application security fundamentals and practices
ent://SD_ILS/0/SD_ILS:541627
2026-02-22T22:14:53Z
2026-02-22T22:14:53Z
Yazar Ganguly, Debashis., author. Lahiri, Shibamouli.<br/>Yer Numarası TK5105.59 .G36 2012<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9781466502451">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>
Data mining tools for malware detection
ent://SD_ILS/0/SD_ILS:545796
2026-02-22T22:14:53Z
2026-02-22T22:14:53Z
Yazar Masud, Mehedy., author. Khan, Latifur. Thuraisingham, Bhavani M.<br/>Yer Numarası QA76.9 .D343 M385 2012<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9781439854556">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>
RC4 stream cipher and its variants
ent://SD_ILS/0/SD_ILS:538754
2026-02-22T22:14:53Z
2026-02-22T22:14:53Z
Yazar Paul, Goutam., author. Maitra, Subhamoy, 1970-<br/>Yer Numarası QA76.9 .A25 P385 2012<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9781439831373">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>
SQL injection attacks and defense
ent://SD_ILS/0/SD_ILS:148516
2026-02-22T22:14:53Z
2026-02-22T22:14:53Z
Yazar Clarke, Justin.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597499637">http://www.sciencedirect.com/science/book/9781597499637</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
The hacker's guide to OS X exploiting OS X from the root up
ent://SD_ILS/0/SD_ILS:148006
2026-02-22T22:14:53Z
2026-02-22T22:14:53Z
Yazar Bathurst, Robert. Rogers, Russ. Ghassemlouei, Alijohn.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597499507">http://www.sciencedirect.com/science/book/9781597499507</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Hacking web apps detecting and preventing web application security problems
ent://SD_ILS/0/SD_ILS:148161
2026-02-22T22:14:53Z
2026-02-22T22:14:53Z
Yazar Shema, Mike.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597499514">http://www.sciencedirect.com/science/book/9781597499514</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Windows forensic analysis toolkit advanced analysis techniques for Windows 7
ent://SD_ILS/0/SD_ILS:145689
2026-02-22T22:14:53Z
2026-02-22T22:14:53Z
Yazar Carvey, Harlan A. Kolde, Jennifer.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597497275">http://www.sciencedirect.com/science/book/9781597497275</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Engineering information security the application of systems engineering concepts to achieve information assurance
ent://SD_ILS/0/SD_ILS:249916
2026-02-22T22:14:53Z
2026-02-22T22:14:53Z
Yazar Jacobs, Stuart.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim IEEE Xplore <a href="http://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=6047604">http://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=6047604</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Hacker techniques, tools, and incident handling
ent://SD_ILS/0/SD_ILS:271438
2026-02-22T22:14:53Z
2026-02-22T22:14:53Z
Yazar Oriyano, Sean-Philip. Gregg, Michael (Michael C.)<br/>Yer Numarası TK5105.59 O786 2011<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>
Oracle Fusion middleware 11g architecture and management
ent://SD_ILS/0/SD_ILS:293252
2026-02-22T22:14:53Z
2026-02-22T22:14:53Z
Yazar Shafii, Reza. Lee, Stephen, 1975 June 8- Konduri, Gangadhar.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://mhebooklibrary.com/reader/oracle-fusion-middleware-11g-architecture-management">Subscription required</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Gray hat hacking the ethical hacker's handbook
ent://SD_ILS/0/SD_ILS:293255
2026-02-22T22:14:53Z
2026-02-22T22:14:53Z
Yazar Harris, Shon. Harper, Allen. Eagle, Chris. Ness, Jonathan. Lenkey, Gideon.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://mhebooklibrary.com/reader/gray-hat-hacking-ethical-hackers-handbook-3rd-edition">Subscription required</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
IT auditing using controls to protect information assets
ent://SD_ILS/0/SD_ILS:293262
2026-02-22T22:14:53Z
2026-02-22T22:14:53Z
Yazar Davis, Chris (Christopher Michael) Schiller, Mike. Wheeler, Kevin.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://mhebooklibrary.com/reader/auditing-using-controls-to-protect-information-assets-2nd-edition">Subscription required</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Hacking exposed web applications web application security secrets and solutions
ent://SD_ILS/0/SD_ILS:293277
2026-02-22T22:14:53Z
2026-02-22T22:14:53Z
Yazar Scambray, Joel. Liu, Vincent. Sima, Caleb.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://mhebooklibrary.com/reader/hacking-exposed-web-applications-3e">Subscription required</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Auditing IT infrastructures for compliance
ent://SD_ILS/0/SD_ILS:271151
2026-02-22T22:14:53Z
2026-02-22T22:14:53Z
Yazar Weiss, Martin M. Solomon, Michael G.<br/>Yer Numarası QA76.9.A25 W428 2011<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>
Security information and event management (SIEM) implementation
ent://SD_ILS/0/SD_ILS:293279
2026-02-22T22:14:53Z
2026-02-22T22:14:53Z
Yazar Miller, David, 1959 Nov. 5- Harris, Shon. Harper, Allen. VanDyke, Stephen. Blask, Chris.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://mhebooklibrary.com/reader/security-information-event-management-siem-implementation">Subscription required</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Hacking exposed wireless wireless security secrets & solutions
ent://SD_ILS/0/SD_ILS:293300
2026-02-22T22:14:53Z
2026-02-22T22:14:53Z
Yazar Cache, Johnny. Wright, Joshua. Liu, Vincent.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://mhebooklibrary.com/reader/hacking-exposed-wireless-second-edition">Subscription required</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Hacking exposed Web 2.0 Web 2.0 security secrets and solutions
ent://SD_ILS/0/SD_ILS:293352
2026-02-22T22:14:53Z
2026-02-22T22:14:53Z
Yazar Cannings, Rich. Dwivedi, Himanshu. Lackey, Zane.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://mhebooklibrary.com/reader/hacking-exposed-web-20-security-secrets-solutions">Subscription required</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
24 deadly sins of software security programming flaws and how to fix them
ent://SD_ILS/0/SD_ILS:293319
2026-02-22T22:14:53Z
2026-02-22T22:14:53Z
Yazar Howard, Michael, 1965- LeBlanc, David, 1960- Viega, John.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://mhebooklibrary.com/reader/24-deadly-sins-software-security-programming-flaws-how-to-fix-them">Subscription required</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Hacking exposed Linux Linux security secrets and solutions.
ent://SD_ILS/0/SD_ILS:293324
2026-02-22T22:14:53Z
2026-02-22T22:14:53Z
Yazar Hatch, Brian. Hacking Linux exposed. ISECOM (Organization)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://mhebooklibrary.com/reader/hacking-exposed-linux">Subscription required</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Hacking exposed malware & rootkits malware & rootkits security secrets & solutions
ent://SD_ILS/0/SD_ILS:293397
2026-02-22T22:14:53Z
2026-02-22T22:14:53Z
Yazar Davis, Michael A. Bodmer, Sean. LeMasters, Aaron.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://mhebooklibrary.com/reader/hacking-exposed-malware-rootkits">Subscription required</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Honeypot : a new paradigm to information security
ent://SD_ILS/0/SD_ILS:545590
2026-02-22T22:14:53Z
2026-02-22T22:14:53Z
Yazar Joshi, R. C., author. Sardana, Anjali.<br/>Yer Numarası QA76.9 .A25 J66 2011<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9781439869994">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>
Security de-engineering : solving the problems in information risk management
ent://SD_ILS/0/SD_ILS:545608
2026-02-22T22:14:53Z
2026-02-22T22:14:53Z
Yazar Tibble, Ian., author.<br/>Yer Numarası HF5548.37 .T53 2011<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9781439868355">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>
The basics of information security understanding the fundamentals of InfoSec in theory and practice
ent://SD_ILS/0/SD_ILS:145371
2026-02-22T22:14:53Z
2026-02-22T22:14:53Z
Yazar Andress, Jason.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597496537">http://www.sciencedirect.com/science/book/9781597496537</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Securing the cloud cloud computer security techniques and tactics
ent://SD_ILS/0/SD_ILS:148980
2026-02-22T22:14:53Z
2026-02-22T22:14:53Z
Yazar Winkler, J. R. (Joachim R.)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495929">http://www.sciencedirect.com/science/book/9781597495929</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Industrial network security securing critical infrastructure networks for Smart Grid, SCADA, and other industrial control systems
ent://SD_ILS/0/SD_ILS:145457
2026-02-22T22:14:53Z
2026-02-22T22:14:53Z
Yazar Knapp, Eric.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597496452">http://www.sciencedirect.com/science/book/9781597496452</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Windows Registry Forensics Advanced Digital Forensic Analysis of the Windows Registry.
ent://SD_ILS/0/SD_ILS:145659
2026-02-22T22:14:53Z
2026-02-22T22:14:53Z
Yazar Carvey, Harlan.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495806">http://www.sciencedirect.com/science/book/9781597495806</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
The security risk assessment handbook : a complete guide for performing security risk assessments
ent://SD_ILS/0/SD_ILS:539743
2026-02-22T22:14:53Z
2026-02-22T22:14:53Z
Yazar Landoll, Douglas J., author.<br/>Yer Numarası HF5548.37 .L358 2011<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9781439821497">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>
Security and policy driven computing
ent://SD_ILS/0/SD_ILS:539761
2026-02-22T22:14:53Z
2026-02-22T22:14:53Z
Yazar Liu, Lei, 1968, author.<br/>Yer Numarası QA76.9 .A25 L587 2011<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9781439825808">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>
Adaptive security management architecture
ent://SD_ILS/0/SD_ILS:541852
2026-02-22T22:14:53Z
2026-02-22T22:14:53Z
Yazar Tiller, James S., author.<br/>Yer Numarası QA76.9 .A25 T55 2011<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9781420013375">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>
Information technology risk management in enterprise environments a review of industry practices and a practical guide to risk management teams
ent://SD_ILS/0/SD_ILS:297862
2026-02-22T22:14:53Z
2026-02-22T22:14:53Z
Yazar Kouns, Jake. Minoli, Daniel, 1952- Wiley InterScience (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim John Wiley <a href="http://dx.doi.org/10.1002/9780470558133">http://dx.doi.org/10.1002/9780470558133</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
IT audit, control, and security
ent://SD_ILS/0/SD_ILS:304008
2026-02-22T22:14:53Z
2026-02-22T22:14:53Z
Yazar Moeller, Robert R.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim Wiley InterScience <a href="http://dx.doi.org/10.1002/9781118269138">An electronic book accessible through the World Wide Web; click for information</a>
Ebook Library <a href="http://public.eblib.com/EBLPublic/PublicView.do?ptiID=624573">http://public.eblib.com/EBLPublic/PublicView.do?ptiID=624573</a>
Books24x7 <a href="http://www.books24x7.com/marc.asp?bookid=40717">http://www.books24x7.com/marc.asp?bookid=40717</a>
<a href="http://site.ebrary.com/lib/alltitles/Doc?id=10469768">http://site.ebrary.com/lib/alltitles/Doc?id=10469768</a>
<a href="http://swb.eblib.com/patron/FullRecord.aspx?p=624573">http://swb.eblib.com/patron/FullRecord.aspx?p=624573</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Mac security bible
ent://SD_ILS/0/SD_ILS:303881
2026-02-22T22:14:53Z
2026-02-22T22:14:53Z
Yazar Kissell, Joe.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim Wiley InterScience <a href="http://dx.doi.org/10.1002/9781118257739">An electronic book accessible through the World Wide Web; click for information</a>
Safari Books Online <a href="http://proquest.safaribooksonline.com/640">http://proquest.safaribooksonline.com/640</a> <a href="http://proquest.safaribooksonline.com/?fpi=9780470474198">http://proquest.safaribooksonline.com/?fpi=9780470474198</a>
Safari Books Online <a href="http://proquest.safaribooksonline.com/9780470474198">http://proquest.safaribooksonline.com/9780470474198</a>
Books24x7 <a href="http://www.books24x7.com/marc.asp?bookid=40737">http://www.books24x7.com/marc.asp?bookid=40737</a>
<a href="http://site.ebrary.com/lib/alltitles/Doc?id=10358774">http://site.ebrary.com/lib/alltitles/Doc?id=10358774</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Seven deadliest USB attacks
ent://SD_ILS/0/SD_ILS:306328
2026-02-22T22:14:53Z
2026-02-22T22:14:53Z
Yazar Anderson, Brian (Brian James)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495530">http://www.sciencedirect.com/science/book/9781597495530</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Virtualization and forensics a digital forensic investigator's guide to virtual environments
ent://SD_ILS/0/SD_ILS:306330
2026-02-22T22:14:53Z
2026-02-22T22:14:53Z
Yazar Barrett, Diane. Kipper, Gregory.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495578">http://www.sciencedirect.com/science/book/9781597495578</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Security 2020 reduce security risks this decade
ent://SD_ILS/0/SD_ILS:303839
2026-02-22T22:14:53Z
2026-02-22T22:14:53Z
Yazar Howard, Doug. Prince, Kevin. Wiley InterScience (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim Wiley InterScience <a href="http://dx.doi.org/10.1002/9781118255803">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Vulnerability management
ent://SD_ILS/0/SD_ILS:545698
2026-02-22T22:14:53Z
2026-02-22T22:14:53Z
Yazar Foreman, Park., author.<br/>Yer Numarası QA76.9 .A25 F656 2010<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9781439801512">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>
Risk analysis and security countermeasure selection
ent://SD_ILS/0/SD_ILS:539402
2026-02-22T22:14:53Z
2026-02-22T22:14:53Z
Yazar Norman, Thomas L., author.<br/>Yer Numarası HV8290 .N67 2010<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9781420078718">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>
Cryptanalysis of RSA and its variants
ent://SD_ILS/0/SD_ILS:542078
2026-02-22T22:14:53Z
2026-02-22T22:14:53Z
Yazar Hinek, M. Jason., author.<br/>Yer Numarası TK5102.94 .H56 2010<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9781420075199">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>
Information security risk analysis
ent://SD_ILS/0/SD_ILS:538713
2026-02-22T22:14:53Z
2026-02-22T22:14:53Z
Yazar Peltier, Thomas R., author.<br/>Yer Numarası QA76.9 .A25 P429 2010<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9781439839577">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>
The executive MBA in information security
ent://SD_ILS/0/SD_ILS:539948
2026-02-22T22:14:53Z
2026-02-22T22:14:53Z
Yazar Trinckes, John J., author.<br/>Yer Numarası HF5548.37 .T75 2010<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9781439810088">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>
Virtualization and forensics a digital forensic investigator's guide to virtual environments
ent://SD_ILS/0/SD_ILS:146715
2026-02-22T22:14:53Z
2026-02-22T22:14:53Z
Yazar Barrett, Diane. Kipper, Gregory.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495578">http://www.sciencedirect.com/science/book/9781597495578</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
A guide to kernel exploitation attacking the core
ent://SD_ILS/0/SD_ILS:148059
2026-02-22T22:14:53Z
2026-02-22T22:14:53Z
Yazar Perla, Enrico. Massimiliano, Oldani.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597494861">http://www.sciencedirect.com/science/book/9781597494861</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Seven deadliest social network attacks
ent://SD_ILS/0/SD_ILS:149145
2026-02-22T22:14:53Z
2026-02-22T22:14:53Z
Yazar Timm, Carl. Perez, Richard, 1969 Oct. 17- Ely, Adam.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495455">http://www.sciencedirect.com/science/book/9781597495455</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Dissecting the hack the forb1dd3n network
ent://SD_ILS/0/SD_ILS:146585
2026-02-22T22:14:53Z
2026-02-22T22:14:53Z
Yazar Street, Jayson E. Street, Jayson E. Dissecting the hack.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495684">http://www.sciencedirect.com/science/book/9781597495684</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Managed code rootkits hooking into runtime environments
ent://SD_ILS/0/SD_ILS:147836
2026-02-22T22:14:53Z
2026-02-22T22:14:53Z
Yazar Metula, Erez.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495745">http://www.sciencedirect.com/science/book/9781597495745</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Seven deadliest USB attacks
ent://SD_ILS/0/SD_ILS:148953
2026-02-22T22:14:53Z
2026-02-22T22:14:53Z
Yazar Anderson, Brian (Brian James)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495530">http://www.sciencedirect.com/science/book/9781597495530</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Digital forensics for network, Internet, and cloud computing a forensic evidence guide for moving targets and data
ent://SD_ILS/0/SD_ILS:146482
2026-02-22T22:14:53Z
2026-02-22T22:14:53Z
Yazar Lillard, Terrence.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495370">http://www.sciencedirect.com/science/book/9781597495370</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Seven deadliest wireless technologies attacks
ent://SD_ILS/0/SD_ILS:149033
2026-02-22T22:14:53Z
2026-02-22T22:14:53Z
Yazar Haines, Brad.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495417">http://www.sciencedirect.com/science/book/9781597495417</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Security software development : assessing and managing security risks
ent://SD_ILS/0/SD_ILS:543836
2026-02-22T22:14:53Z
2026-02-22T22:14:53Z
Yazar Ashbaugh, Douglas A., author.<br/>Yer Numarası QA76.9 .A25 A8246 2009<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9781420063813">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>
Data protection : governance, risk management, and compliance
ent://SD_ILS/0/SD_ILS:543918
2026-02-22T22:14:53Z
2026-02-22T22:14:53Z
Yazar Hill, David G. (David Gary), 1943, author.<br/>Yer Numarası QA76.9 .A25 H52 2009<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9781439806937">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>
CISO soft skills : securing organizations impaired by employee politics, apathy, and intolerant perspectives
ent://SD_ILS/0/SD_ILS:544153
2026-02-22T22:14:53Z
2026-02-22T22:14:53Z
Yazar Collette, Ronald D., author. Gentile, Michael. Gentile, Skye.<br/>Yer Numarası HF5548.37 .G462 2009<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9781420089110">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>
Architecting secure software systems
ent://SD_ILS/0/SD_ILS:538962
2026-02-22T22:14:53Z
2026-02-22T22:14:53Z
Yazar Talukder, Asoke K., author. Chaitanya, Manish.<br/>Yer Numarası QA76.9 .A25 T34 2009<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9781420087857">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>
Information security management metrics : a definitive guide to effective security monitoring and measurement
ent://SD_ILS/0/SD_ILS:546952
2026-02-22T22:14:53Z
2026-02-22T22:14:53Z
Yazar Brotby, W. Krag., author.<br/>Yer Numarası HD30.2 .B78 2009<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9781420052862">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>
Next generation SSH2 implementation securing data in motion
ent://SD_ILS/0/SD_ILS:146275
2026-02-22T22:14:53Z
2026-02-22T22:14:53Z
Yazar Liu, Dale.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492836">http://www.sciencedirect.com/science/book/9781597492836</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Security in wireless ad hoc and sensor networks
ent://SD_ILS/0/SD_ILS:297789
2026-02-22T22:14:53Z
2026-02-22T22:14:53Z
Yazar Çayirci, E. (Erdal) Levi, Albert, 1969- Wiley InterScience (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim John Wiley <a href="http://dx.doi.org/10.1002/9780470516782">http://dx.doi.org/10.1002/9780470516782</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Secure computer and network systems modeling, analysis and design
ent://SD_ILS/0/SD_ILS:296665
2026-02-22T22:14:53Z
2026-02-22T22:14:53Z
Yazar Ye, Nong. Wiley InterScience (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim Contributor biographical information <a href="http://catdir.loc.gov/catdir/enhancements/fy0833/2007037133-b.html">http://catdir.loc.gov/catdir/enhancements/fy0833/2007037133-b.html</a>
John Wiley <a href="http://dx.doi.org/10.1002/9780470023273">http://dx.doi.org/10.1002/9780470023273</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Information assurance architecture
ent://SD_ILS/0/SD_ILS:539830
2026-02-22T22:14:53Z
2026-02-22T22:14:53Z
Yazar Willett, Keith D., author.<br/>Yer Numarası QA76.9 .A25 W5487 2008<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9780849380686">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>
Building an effective information security policy architecture
ent://SD_ILS/0/SD_ILS:540985
2026-02-22T22:14:53Z
2026-02-22T22:14:53Z
Yazar Bacik, Sandy., author.<br/>Yer Numarası QA76.9 .A25 B335 2008<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9781420059069">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>
Securing Citrix XenApp Server in the enterprise
ent://SD_ILS/0/SD_ILS:149050
2026-02-22T22:14:53Z
2026-02-22T22:14:53Z
Yazar Bin Azad, Tariq. Wilson, Connie. Wright., Michael.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492812">http://www.sciencedirect.com/science/book/9781597492812</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Practical embedded security building secure resource-constrained systems
ent://SD_ILS/0/SD_ILS:147416
2026-02-22T22:14:53Z
2026-02-22T22:14:53Z
Yazar Stapko, Timothy John.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780750682152">http://www.sciencedirect.com/science/book/9780750682152</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Google hacking for penetration testers. Volume 2
ent://SD_ILS/0/SD_ILS:148029
2026-02-22T22:14:53Z
2026-02-22T22:14:53Z
Yazar Long, Johnny.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491761">http://www.sciencedirect.com/science/book/9781597491761</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
OSSEC host-based intrusion detection guide
ent://SD_ILS/0/SD_ILS:148333
2026-02-22T22:14:53Z
2026-02-22T22:14:53Z
Yazar Hay, Andrew. Cid, Daniel. Bray, Rory.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492409">http://www.sciencedirect.com/science/book/9781597492409</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Scene of the cybercrime
ent://SD_ILS/0/SD_ILS:148955
2026-02-22T22:14:53Z
2026-02-22T22:14:53Z
Yazar Cross, Michael, 1965- Shinder, Debra Littlejohn. Scene of the cybercrime.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492768">http://www.sciencedirect.com/science/book/9781597492768</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Infosecurity 2008 threat analysis
ent://SD_ILS/0/SD_ILS:145541
2026-02-22T22:14:53Z
2026-02-22T22:14:53Z
Yazar Clark, Champ, III.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492249">http://www.sciencedirect.com/science/book/9781597492249</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Information assurance dependability and security in networked systems
ent://SD_ILS/0/SD_ILS:145553
2026-02-22T22:14:53Z
2026-02-22T22:14:53Z
Yazar Qian, Yi, 1962-<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780123735669">http://www.sciencedirect.com/science/book/9780123735669</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Microsoft forefront security administration guide
ent://SD_ILS/0/SD_ILS:146369
2026-02-22T22:14:53Z
2026-02-22T22:14:53Z
Yazar Varsalone, Jesse.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492447">http://www.sciencedirect.com/science/book/9781597492447</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Digital privacy : theory, technologies, and practices
ent://SD_ILS/0/SD_ILS:547774
2026-02-22T22:14:53Z
2026-02-22T22:14:53Z
Yazar Acquisti, Alessandro.<br/>Yer Numarası QA76.9 .A25 D528 2008<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9781420052183">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>
Security convergence managing enterprise security risk
ent://SD_ILS/0/SD_ILS:112198
2026-02-22T22:14:53Z
2026-02-22T22:14:53Z
Yazar Tyson, Dave. ScienceDirect (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780750684255">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Techno Security's guide to managing risks for IT managers, auditors, and investigators
ent://SD_ILS/0/SD_ILS:112203
2026-02-22T22:14:53Z
2026-02-22T22:14:53Z
Yazar Wiles, Jack. ScienceDirect (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491389">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
WarDriving & wireless penetration testing
ent://SD_ILS/0/SD_ILS:112210
2026-02-22T22:14:53Z
2026-02-22T22:14:53Z
Yazar Hurley, Chris. ScienceDirect (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491112">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Developer's guide to web application security
ent://SD_ILS/0/SD_ILS:306464
2026-02-22T22:14:53Z
2026-02-22T22:14:53Z
Yazar Cross, Michael, 1965-<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490610">http://www.sciencedirect.com/science/book/9781597490610</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
How to cheat at securing your network
ent://SD_ILS/0/SD_ILS:306503
2026-02-22T22:14:53Z
2026-02-22T22:14:53Z
Yazar Dubrawsky, Ido.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492317">http://www.sciencedirect.com/science/book/9781597492317</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Information security : design, implementation, measurement, and compliance
ent://SD_ILS/0/SD_ILS:545839
2026-02-22T22:14:53Z
2026-02-22T22:14:53Z
Yazar Layton, Timothy P., author.<br/>Yer Numarası HF5548.37 .L393 2007<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9781420013412">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>
Mechanics of user identification and authentication : fundamentals of identity management
ent://SD_ILS/0/SD_ILS:539940
2026-02-22T22:14:53Z
2026-02-22T22:14:53Z
Yazar Todorov, Dobromir., author.<br/>Yer Numarası TK5105.59 .T575 2007<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9781420052206">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>
Web application vulnerabilities detect, exploit, prevent
ent://SD_ILS/0/SD_ILS:146908
2026-02-22T22:14:53Z
2026-02-22T22:14:53Z
Yazar Cross, Michael, 1965-<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492096">http://www.sciencedirect.com/science/book/9781597492096</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Security convergence managing enterprise security risk
ent://SD_ILS/0/SD_ILS:149080
2026-02-22T22:14:53Z
2026-02-22T22:14:53Z
Yazar Tyson, Dave.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim Volltext <a href="http://www.sciencedirect.com/science/book/9780750684255">http://www.sciencedirect.com/science/book/9780750684255</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Botnets the killer web app
ent://SD_ILS/0/SD_ILS:145283
2026-02-22T22:14:53Z
2026-02-22T22:14:53Z
Yazar Schiller, Craig A.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491358">http://www.sciencedirect.com/science/book/9781597491358</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
WarDriving & wireless penetration testing
ent://SD_ILS/0/SD_ILS:146805
2026-02-22T22:14:53Z
2026-02-22T22:14:53Z
Yazar Hurley, Chris.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491112">http://www.sciencedirect.com/science/book/9781597491112</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Developer's guide to web application security
ent://SD_ILS/0/SD_ILS:147664
2026-02-22T22:14:53Z
2026-02-22T22:14:53Z
Yazar Cross, Michael, 1965-<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490610">http://www.sciencedirect.com/science/book/9781597490610</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
How to cheat at securing your network
ent://SD_ILS/0/SD_ILS:145654
2026-02-22T22:14:53Z
2026-02-22T22:14:53Z
Yazar Dubrawsky, Ido.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492317">http://www.sciencedirect.com/science/book/9781597492317</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Techno security's guide to e-discovery and digital forensics
ent://SD_ILS/0/SD_ILS:148564
2026-02-22T22:14:53Z
2026-02-22T22:14:53Z
Yazar Wiles, Jack.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492232">http://www.sciencedirect.com/science/book/9781597492232</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Techno Security's guide to managing risks for IT managers, auditors, and investigators
ent://SD_ILS/0/SD_ILS:148641
2026-02-22T22:14:53Z
2026-02-22T22:14:53Z
Yazar Wiles, Jack.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491389">http://www.sciencedirect.com/science/book/9781597491389</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Computer security fundamentals
ent://SD_ILS/0/SD_ILS:108620
2026-02-22T22:14:53Z
2026-02-22T22:14:53Z
Yazar Easttom, Chuck.<br/>Yer Numarası QA76.9.A25 E325 2006<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>
How to cheat at Windows System Administration using command line scripts
ent://SD_ILS/0/SD_ILS:112107
2026-02-22T22:14:53Z
2026-02-22T22:14:53Z
Yazar Bhardwaj, Pawan K. Andreou, Kimon. Barber, Brian. Kleiman, Dave. Satyanarayana, Mahesh.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491051">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Syngress force emerging threat analysis from mischief to malicious
ent://SD_ILS/0/SD_ILS:112202
2026-02-22T22:14:53Z
2026-02-22T22:14:53Z
Yazar Maynor, David. ScienceDirect (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490566">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Information security a strategic approach
ent://SD_ILS/0/SD_ILS:249831
2026-02-22T22:14:53Z
2026-02-22T22:14:53Z
Yazar LeVeque, Vincent.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim IEEE Xplore <a href="http://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=5989138">http://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=5989138</a>
IEEE Xplore <a href="http://ieeexplore.ieee.org/servlet/opac?bknumber=5989138">http://ieeexplore.ieee.org/servlet/opac?bknumber=5989138</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Multimedia security technologies for digital rights management
ent://SD_ILS/0/SD_ILS:254554
2026-02-22T22:14:53Z
2026-02-22T22:14:53Z
Yazar Zeng, Wenjun, 1967- Yu, Hong Heather, 1967- Lin, Ching-Yung.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780123694768">http://www.sciencedirect.com/science/book/9780123694768</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Penetration tester's open source toolkit
ent://SD_ILS/0/SD_ILS:253676
2026-02-22T22:14:53Z
2026-02-22T22:14:53Z
Yazar Long, Johnny.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490214">http://www.sciencedirect.com/science/book/9781597490214</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Securing IM and P2P applications for the enterprise
ent://SD_ILS/0/SD_ILS:253939
2026-02-22T22:14:53Z
2026-02-22T22:14:53Z
Yazar Piccard, Paul L. Sachs, Marcus H.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490177">http://www.sciencedirect.com/science/book/9781597490177</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Enhancing computer security with smart technology
ent://SD_ILS/0/SD_ILS:544823
2026-02-22T22:14:53Z
2026-02-22T22:14:53Z
Yazar Vemuri, V. Rao.<br/>Yer Numarası TK5105.59 .E62 2005<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9781420031225">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>
The security risk assessment handbook : a complete guide for performing security risk assessments
ent://SD_ILS/0/SD_ILS:545167
2026-02-22T22:14:53Z
2026-02-22T22:14:53Z
Yazar Landoll, Douglas J., author.<br/>Yer Numarası HF5548.37 .L358 2006<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9781420031232">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>
The CISO handbook : a practical guide to securing your company
ent://SD_ILS/0/SD_ILS:539204
2026-02-22T22:14:53Z
2026-02-22T22:14:53Z
Yazar Gentile, Michael., author. Collette, Ronald D. August, Thomas D.<br/>Yer Numarası HF5548.37 .G46 2006<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9781420031379">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>
Syngress force emerging threat analysis from mischief to malicious
ent://SD_ILS/0/SD_ILS:148488
2026-02-22T22:14:53Z
2026-02-22T22:14:53Z
Yazar Maynor, David.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490566">http://www.sciencedirect.com/science/book/9781597490566</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Hack the stack using snort and ethereal to master the 8 layers of an insecure network
ent://SD_ILS/0/SD_ILS:147954
2026-02-22T22:14:53Z
2026-02-22T22:14:53Z
Yazar Gregg, Michael (Michael C.) Watkins, Stephen.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491099">http://www.sciencedirect.com/science/book/9781597491099</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Essential computer security everyone's guide to e-mail, Internet, and wireless security
ent://SD_ILS/0/SD_ILS:145840
2026-02-22T22:14:53Z
2026-02-22T22:14:53Z
Yazar Bradley, Tony, 1969- Carvey, Harlan A.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491143">http://www.sciencedirect.com/science/book/9781597491143</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
How to cheat at Windows System Administration using command line scripts
ent://SD_ILS/0/SD_ILS:145623
2026-02-22T22:14:53Z
2026-02-22T22:14:53Z
Yazar Bhardwaj, Pawan K. Andreou, Kimon. Barber, Brian. Kleiman, Dave. Satyanarayana, Mahesh.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491051">http://www.sciencedirect.com/science/book/9781597491051</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Enemy at the water cooler real-life stories of insider threats and Enterprise Security Management countermeasures
ent://SD_ILS/0/SD_ILS:146475
2026-02-22T22:14:53Z
2026-02-22T22:14:53Z
Yazar Contos, Brian T.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491297">http://www.sciencedirect.com/science/book/9781597491297</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Insider threat protecting the enterprise from sabotage, spying, and theft
ent://SD_ILS/0/SD_ILS:253661
2026-02-22T22:14:53Z
2026-02-22T22:14:53Z
Yazar Cole, Eric. Ring, Sandra.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim Volltext <a href="http://www.sciencedirect.com/science/book/9781597490481">http://www.sciencedirect.com/science/book/9781597490481</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
How to cheat at designing security for a Windows Server 2003 network
ent://SD_ILS/0/SD_ILS:253670
2026-02-22T22:14:53Z
2026-02-22T22:14:53Z
Yazar Amini, Rob. Hunter, Laura E.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492430">http://www.sciencedirect.com/science/book/9781597492430</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Securing HP NonStop servers in an open systems world TCP/IP, OSS & SQL
ent://SD_ILS/0/SD_ILS:253863
2026-02-22T22:14:53Z
2026-02-22T22:14:53Z
Yazar XYPRO Technology Corporation.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781555583446">http://www.sciencedirect.com/science/book/9781555583446</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
IM, instant messaging, security
ent://SD_ILS/0/SD_ILS:253725
2026-02-22T22:14:53Z
2026-02-22T22:14:53Z
Yazar Rittinghouse, John W. Ransome, James F.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781555583385">http://www.sciencedirect.com/science/book/9781555583385</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Cryptography, information theory, and error-correction a handbook for the 21st century
ent://SD_ILS/0/SD_ILS:301860
2026-02-22T22:14:53Z
2026-02-22T22:14:53Z
Yazar Bruen, Aiden A., 1941- Forcinito, Mario, 1962- Wiley InterScience (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim Wiley InterScience <a href="http://dx.doi.org/10.1002/9781118033296">An electronic book accessible through the World Wide Web; click for information</a>
Contributor biographical information <a href="http://catdir.loc.gov/catdir/enhancements/fy0618/2004058044-b.html">http://catdir.loc.gov/catdir/enhancements/fy0618/2004058044-b.html</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Information security risk analysis
ent://SD_ILS/0/SD_ILS:544821
2026-02-22T22:14:53Z
2026-02-22T22:14:53Z
Yazar Peltier, Thomas R., author.<br/>Yer Numarası QA76.9 .A25 P429 2005<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9781420031195">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>
A practical guide to security assessments
ent://SD_ILS/0/SD_ILS:545277
2026-02-22T22:14:53Z
2026-02-22T22:14:53Z
Yazar Kairab, Sudhanshu., author.<br/>Yer Numarası HF5548.32 .K345 2005<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9781135500313">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>
Aggressive network self-defense
ent://SD_ILS/0/SD_ILS:253672
2026-02-22T22:14:53Z
2026-02-22T22:14:53Z
Yazar Wyler, Neil R.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836203">http://www.sciencedirect.com/science/book/9781931836203</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Cryptography, information theory, and error-correction : a handbook for the 21st century
ent://SD_ILS/0/SD_ILS:593044
2026-02-22T22:14:53Z
2026-02-22T22:14:53Z
Yazar Bruen, Aiden A., 1941- Forcinito, Mario, 1962-<br/>Yer Numarası QA76.9 .A25 B79 2005<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781118033296">https://onlinelibrary.wiley.com/doi/book/10.1002/9781118033296</a>
<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119582397">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119582397</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
WarDriving drive, detect, defend : a guide to wireless security
ent://SD_ILS/0/SD_ILS:253988
2026-02-22T22:14:53Z
2026-02-22T22:14:53Z
Yazar Hurley, Chris.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836036">http://www.sciencedirect.com/science/book/9781931836036</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Snort 2.1 intrusion detection
ent://SD_ILS/0/SD_ILS:253989
2026-02-22T22:14:53Z
2026-02-22T22:14:53Z
Yazar Beale, Jay. Alder, Raven.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836043">http://www.sciencedirect.com/science/book/9781931836043</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Nessus network auditing
ent://SD_ILS/0/SD_ILS:253991
2026-02-22T22:14:53Z
2026-02-22T22:14:53Z
Yazar Deraison, Renaud. Syngress Media, Inc.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836081">http://www.sciencedirect.com/science/book/9781931836081</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Malware : fighting malicious code
ent://SD_ILS/0/SD_ILS:267737
2026-02-22T22:14:53Z
2026-02-22T22:14:53Z
Yazar Skoudis, Ed. Zeltser, Lenny.<br/>Yer Numarası QA76.9.A25 S58 2004<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>
Implementing homeland security for enterprise IT
ent://SD_ILS/0/SD_ILS:253656
2026-02-22T22:14:53Z
2026-02-22T22:14:53Z
Yazar Erbschloe, Michael.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781555583125">http://www.sciencedirect.com/science/book/9781555583125</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
HP Nonstop server security a practical handbook
ent://SD_ILS/0/SD_ILS:253849
2026-02-22T22:14:53Z
2026-02-22T22:14:53Z
Yazar Hill, Terri. Alvarado, Ellen. XYPRO Technology Corporation.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781555583149">http://www.sciencedirect.com/science/book/9781555583149</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Cyber adversary characterization auditing the hacker mind
ent://SD_ILS/0/SD_ILS:253992
2026-02-22T22:14:53Z
2026-02-22T22:14:53Z
Yazar Parker, Tom, 1982-<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836111">http://www.sciencedirect.com/science/book/9781931836111</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Security assessment case studies for implementing the NSA IAM
ent://SD_ILS/0/SD_ILS:254030
2026-02-22T22:14:53Z
2026-02-22T22:14:53Z
Yazar Rogers, Russ.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781932266962">http://www.sciencedirect.com/science/book/9781932266962</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Wireless operational security
ent://SD_ILS/0/SD_ILS:254059
2026-02-22T22:14:53Z
2026-02-22T22:14:53Z
Yazar Rittinghouse, John W. Ransome, James F.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781555583170">http://www.sciencedirect.com/science/book/9781555583170</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Public key infrastructure : building trusted applications and Web services
ent://SD_ILS/0/SD_ILS:543281
2026-02-22T22:14:53Z
2026-02-22T22:14:53Z
Yazar Vacca, John R.<br/>Yer Numarası QA76.9 .A25 P85 2004<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9780203498156">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>
Computer security sourcebook
ent://SD_ILS/0/SD_ILS:94615
2026-02-22T22:14:53Z
2026-02-22T22:14:53Z
Yazar Caldwell, Wilma, ed.<br/>Yer Numarası QA 76.9.A25 C658 2003<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>
Security in fixed and wireless networks an introduction to securing data communications
ent://SD_ILS/0/SD_ILS:301122
2026-02-22T22:14:53Z
2026-02-22T22:14:53Z
Yazar Schäfer, Günter, Dr.-Ing. John Wiley & Sons.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim John Wiley <a href="http://dx.doi.org/10.1002/0470863722">http://dx.doi.org/10.1002/0470863722</a>
<a href="http://www3.interscience.wiley.com/cgi-bin/bookhome/112477198">http://www3.interscience.wiley.com/cgi-bin/bookhome/112477198</a>
Contributor biographical information <a href="http://catdir.loc.gov/catdir/bios/wiley047/2004299184.html">http://catdir.loc.gov/catdir/bios/wiley047/2004299184.html</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
UMTS security
ent://SD_ILS/0/SD_ILS:295861
2026-02-22T22:14:53Z
2026-02-22T22:14:53Z
Yazar Niemi, Valtteri. Nyberg, Kaisa, 1948-<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://www.contentreserve.com/TitleInfo.asp?ID={465C10B2-1465-4D2B-AAAD-DED651D62D3D}&Format=50">Click for information</a>
Wiley InterScience - Full text online <a href="http://onlinelibrary.wiley.com/book/10.1002/0470091584">http://onlinelibrary.wiley.com/book/10.1002/0470091584</a>
John Wiley <a href="http://dx.doi.org/10.1002/0470091584">http://dx.doi.org/10.1002/0470091584</a>
HathiTrust Digital Library, Limited view (search only) <a href="http://catalog.hathitrust.org/api/volumes/oclc/53183293.html">http://catalog.hathitrust.org/api/volumes/oclc/53183293.html</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Internet security a jumpstart for systems administrators and IT managers
ent://SD_ILS/0/SD_ILS:253843
2026-02-22T22:14:53Z
2026-02-22T22:14:53Z
Yazar Speed, Tim. Ellis, Juanita.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781555582982">http://www.sciencedirect.com/science/book/9781555582982</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Cybersecurity operations handbook
ent://SD_ILS/0/SD_ILS:253847
2026-02-22T22:14:53Z
2026-02-22T22:14:53Z
Yazar Rittinghouse, John W. Hancock, Bill, 1957-<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781555583064">http://www.sciencedirect.com/science/book/9781555583064</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Cisco security professional's guide to secure intrusion detection systems
ent://SD_ILS/0/SD_ILS:254024
2026-02-22T22:14:53Z
2026-02-22T22:14:53Z
Yazar Burton, James. Dubrawsky, Ida. Osipov, Vitaly. Baumrucker, C. Tate. Sweeney, Michael<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781932266696">http://www.sciencedirect.com/science/book/9781932266696</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
A practical guide to security engineering and information assurance
ent://SD_ILS/0/SD_ILS:544973
2026-02-22T22:14:53Z
2026-02-22T22:14:53Z
Yazar Herrmann, Debra S., author.<br/>Yer Numarası QA76.9 .A25 H47 2002<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9781420031492">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>
Hack proofing your network
ent://SD_ILS/0/SD_ILS:253618
2026-02-22T22:14:53Z
2026-02-22T22:14:53Z
Yazar Ahmad, David R. Mirza. Russell, Ryan, 1969-<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781928994701">http://www.sciencedirect.com/science/book/9781928994701</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Information security best practices 205 basic rules
ent://SD_ILS/0/SD_ILS:254779
2026-02-22T22:14:53Z
2026-02-22T22:14:53Z
Yazar Stefanek, George L.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781878707963">http://www.sciencedirect.com/science/book/9781878707963</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Hack proofing your Web applications
ent://SD_ILS/0/SD_ILS:253969
2026-02-22T22:14:53Z
2026-02-22T22:14:53Z
Yazar Traxler, Julie.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781928994312">http://www.sciencedirect.com/science/book/9781928994312</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Hack proofing Windows 2000 Server
ent://SD_ILS/0/SD_ILS:253999
2026-02-22T22:14:53Z
2026-02-22T22:14:53Z
Yazar Todd, Chad. Johnson, Norris L.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836494">http://www.sciencedirect.com/science/book/9781931836494</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Securing e-business applications and communications
ent://SD_ILS/0/SD_ILS:545821
2026-02-22T22:14:53Z
2026-02-22T22:14:53Z
Yazar Held, Jonathan S., author. Bowers, John R.<br/>Yer Numarası QA76.9 .A25 H435 2001<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9781420031553">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>
Hack proofing Sun Solaris 8
ent://SD_ILS/0/SD_ILS:254047
2026-02-22T22:14:53Z
2026-02-22T22:14:53Z
Yazar Miles, Wyman. Mitchell, Ed, 1945- Lynch, F. William. Cook, Randy (Randy R.)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781928994442">http://www.sciencedirect.com/science/book/9781928994442</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Secure computers and networks : analysis, design, and implementation
ent://SD_ILS/0/SD_ILS:540568
2026-02-22T22:14:53Z
2026-02-22T22:14:53Z
Yazar Fisch, Eric A. White, Gregory B.<br/>Yer Numarası QA76.9 .A25 F5334 2000<br/>Elektronik Erişim Taylor & Francis <a href="https://www.taylorfrancis.com/books/9780367802127">https://www.taylorfrancis.com/books/9780367802127</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Applied cryptography : protocols, algorithms, and source code in C
ent://SD_ILS/0/SD_ILS:108014
2026-02-22T22:14:53Z
2026-02-22T22:14:53Z
Yazar Schneier, Bruce.<br/>Yer Numarası QA76.9.A25 S35 1996<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>
Contemporary cryptology the science of information integrity
ent://SD_ILS/0/SD_ILS:249661
2026-02-22T22:14:53Z
2026-02-22T22:14:53Z
Yazar Simmons, Gustavus J. Institute of Electrical and Electronics Engineers.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim IEEE Xplore <a href="http://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=5265879">http://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=5265879</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Auditing IT infrastructures for compliance
ent://SD_ILS/0/SD_ILS:270164
2026-02-22T22:14:53Z
2026-02-22T22:14:53Z
Yazar Weiss, Martin M. Solomon, Michael G.<br/>Yer Numarası QA76.9.A25 W428<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>