Arama Sonu&ccedil;lar&#305; Software Testing. - Daralt&#305;lm&#305;&#351;: Computer security. SirsiDynix Enterprise https://katalog.hacettepe.edu.tr/client/tr_TR/default_tr/default_tr/qu$003dSoftware$002bTesting.$0026qf$003dSUBJECT$002509Konu$002509Computer$002bsecurity.$002509Computer$002bsecurity.$0026ps$003d300?dt=list 2026-03-22T07:02:59Z Secure and resilient software : requirements, test cases, and testing methods ent://SD_ILS/0/SD_ILS:540156 2026-03-22T07:02:59Z 2026-03-22T07:02:59Z Yazar&#160;Merkow, Mark S., author.&#160;Raghavan, Lakshmikanth.<br/>Yer Numaras&#305;&#160;QA76.76 .T48 M47 2012<br/>Elektronik Eri&#351;im&#160;<a href="https://www.taylorfrancis.com/books/9781439866221">Click here to view.</a><br/>Format:&#160;Kitap<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> How to break software security : effective technigues for security testing ent://SD_ILS/0/SD_ILS:105584 2026-03-22T07:02:59Z 2026-03-22T07:02:59Z Yazar&#160;Whittaker, James A., 1965-&#160;Thomson, Herbert H., ort. yaz.<br/>Yer Numaras&#305;&#160;QA 76.9.A25 W48 2004<br/>Format:&#160;Kitap<br/>Durum&#160;Beytepe K&uuml;t&uuml;phanesi~2<br/> Quantum computing models for cybersecurity and wireless communications ent://SD_ILS/0/SD_ILS:599707 2026-03-22T07:02:59Z 2026-03-22T07:02:59Z Yazar&#160;Kumar, Budati Anil, edited.&#160;Kumar, Singamaneni Kranthi, edited.&#160;Li, Xingwang (Computer scientist), edited.<br/>Yer Numaras&#305;&#160;QA76.9 .A25 Q36 2025<br/>Elektronik Eri&#351;im&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394271429">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394271429</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Alice and Bob learn secure coding ent://SD_ILS/0/SD_ILS:599664 2026-03-22T07:02:59Z 2026-03-22T07:02:59Z Yazar&#160;Janca, Tanya. author.<br/>Yer Numaras&#305;&#160;QA76.76 .D47<br/>Elektronik Eri&#351;im&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394277179">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394277179</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Hands on hacking ent://SD_ILS/0/SD_ILS:596316 2026-03-22T07:02:59Z 2026-03-22T07:02:59Z Yazar&#160;Hickey, Matthew (Computer security expert), author.&#160;Arcuri, Jennifer, author.<br/>Yer Numaras&#305;&#160;QA76.9 .A25 H53 2020 EB<br/>Elektronik Eri&#351;im&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119561507">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119561507</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Hacking the hacker : learn from the experts who take down hackers ent://SD_ILS/0/SD_ILS:593636 2026-03-22T07:02:59Z 2026-03-22T07:02:59Z Yazar&#160;Grimes, Roger A., author.<br/>Yer Numaras&#305;&#160;QA76.9 .A25<br/>Elektronik Eri&#351;im&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119396260">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119396260</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Official (ISC)2 guide to the CSSLP ent://SD_ILS/0/SD_ILS:541754 2026-03-22T07:02:59Z 2026-03-22T07:02:59Z Yazar&#160;Paul, Mano., author.<br/>Yer Numaras&#305;&#160;QA76.76 .D47 P3775 2011<br/>Elektronik Eri&#351;im&#160;<a href="https://www.taylorfrancis.com/books/9781439826065">Click here to view.</a><br/>Format:&#160;Kitap<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> The basics of hacking and penetration testing ethical hacking and penetration testing made easy ent://SD_ILS/0/SD_ILS:145199 2026-03-22T07:02:59Z 2026-03-22T07:02:59Z Yazar&#160;Engebretson, Pat (Patrick Henry), 1974-<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597496551">http://www.sciencedirect.com/science/book/9781597496551</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Secure and resilient software development ent://SD_ILS/0/SD_ILS:545097 2026-03-22T07:02:59Z 2026-03-22T07:02:59Z Yazar&#160;Merkow, Mark S., author.&#160;Raghavan, Lakshmikanth.<br/>Yer Numaras&#305;&#160;QA76.76 .D47 M466 2010<br/>Elektronik Eri&#351;im&#160;<a href="https://www.taylorfrancis.com/books/9781439826973">Click here to view.</a><br/>Format:&#160;Kitap<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Testing code security ent://SD_ILS/0/SD_ILS:546167 2026-03-22T07:02:59Z 2026-03-22T07:02:59Z Yazar&#160;Van der Linden, Maura A., author.<br/>Yer Numaras&#305;&#160;QA76.9 .A25 V359 2007<br/>Elektronik Eri&#351;im&#160;<a href="https://www.taylorfrancis.com/books/9781420013795">Click here to view.</a><br/>Format:&#160;Kitap<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Exploiting software : how to break code ent://SD_ILS/0/SD_ILS:96556 2026-03-22T07:02:59Z 2026-03-22T07:02:59Z Yazar&#160;Hoglund, Greg.&#160;McGraw, Gary, 1966- ort. yaz.<br/>Yer Numaras&#305;&#160;QA 76.9.A25 H635 2004<br/>Format:&#160;Kitap<br/>Durum&#160;Beytepe K&uuml;t&uuml;phanesi~1<br/>