Arama Sonu&ccedil;lar&#305; System design - Daralt&#305;lm&#305;&#351;: Computer security. SirsiDynix Enterprise https://katalog.hacettepe.edu.tr/client/tr_TR/default_tr/default_tr/qu$003dSystem$002bdesign$0026qf$003dSUBJECT$002509Konu$002509Computer$002bsecurity.$002509Computer$002bsecurity.$0026ps$003d300$0026isd$003dtrue? 2026-01-22T10:55:58Z Quantum computing models for cybersecurity and wireless communications ent://SD_ILS/0/SD_ILS:599707 2026-01-22T10:55:58Z 2026-01-22T10:55:58Z Yazar&#160;Kumar, Budati Anil, edited.&#160;Kumar, Singamaneni Kranthi, edited.&#160;Li, Xingwang (Computer scientist), edited.<br/>Yer Numaras&#305;&#160;QA76.9 .A25 Q36 2025<br/>Elektronik Eri&#351;im&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394271429">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394271429</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Alice and Bob learn secure coding ent://SD_ILS/0/SD_ILS:599664 2026-01-22T10:55:58Z 2026-01-22T10:55:58Z Yazar&#160;Janca, Tanya. author.<br/>Yer Numaras&#305;&#160;QA76.76 .D47<br/>Elektronik Eri&#351;im&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394277179">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394277179</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Automated secure computing for next-generation systems ent://SD_ILS/0/SD_ILS:598752 2026-01-22T10:55:58Z 2026-01-22T10:55:58Z Yazar&#160;Tyagi, Amit Kumar, editor.<br/>Yer Numaras&#305;&#160;QA76.9 .A25 A98 2024<br/>Elektronik Eri&#351;im&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394213948">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394213948</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Intelligent security systems : how artificial intelligence, machine learning and data science work for and against computer security ent://SD_ILS/0/SD_ILS:597085 2026-01-22T10:55:58Z 2026-01-22T10:55:58Z Yazar&#160;Reznik, Leonid, 1955- author.<br/>Yer Numaras&#305;&#160;QA76.9 .A25 R438 2022<br/>Elektronik Eri&#351;im&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119771579">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119771579</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Trust-based communication systems for internet of things applications ent://SD_ILS/0/SD_ILS:597744 2026-01-22T10:55:58Z 2026-01-22T10:55:58Z Yazar&#160;Madaan, Vishu, editor.&#160;Agrawal, Prateek, editor.&#160;Sharma, Anand, editor.&#160;Sharma, Dilip Kumar, editor.&#160;Agrawal, Akshat, 1986- editor.<br/>Yer Numaras&#305;&#160;TK5105.8857<br/>Elektronik Eri&#351;im&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119896746">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119896746</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Artificial intelligence and data mining approaches in security frameworks ent://SD_ILS/0/SD_ILS:596957 2026-01-22T10:55:58Z 2026-01-22T10:55:58Z Yazar&#160;Bhargava, Neeraj.&#160;Bhargava, Ritu.&#160;Rathore, Pramod Singh, 1988-&#160;Agrawal, Rashmi, 1978-<br/>Yer Numaras&#305;&#160;Q335<br/>Elektronik Eri&#351;im&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119760429">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119760429</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> The complete guide to physical security ent://SD_ILS/0/SD_ILS:545960 2026-01-22T10:55:58Z 2026-01-22T10:55:58Z Yazar&#160;Baker, Paul, 1958, author.&#160;Benny, Daniel J.<br/>Yer Numaras&#305;&#160;HV8290 .B34 2013<br/>Elektronik Eri&#351;im&#160;<a href="https://www.taylorfrancis.com/books/9781420099645">Click here to view.</a><br/>Format:&#160;Kitap<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Computer architecture and security : fundamentals of designing secure computer systems ent://SD_ILS/0/SD_ILS:248865 2026-01-22T10:55:58Z 2026-01-22T10:55:58Z Yazar&#160;Wang, Shuangbao Paul.&#160;Ledley, Robert Steven.<br/>Yer Numaras&#305;&#160;QA76.9.A73 W36 2012<br/>Format:&#160;Kitap<br/>Durum&#160;Beytepe K&uuml;t&uuml;phanesi~1<br/> Public key infrastructure : building trusted applications and Web services ent://SD_ILS/0/SD_ILS:543281 2026-01-22T10:55:58Z 2026-01-22T10:55:58Z Yazar&#160;Vacca, John R.<br/>Yer Numaras&#305;&#160;QA76.9 .A25 P85 2004<br/>Elektronik Eri&#351;im&#160;<a href="https://www.taylorfrancis.com/books/9780203498156">Click here to view.</a><br/>Format:&#160;Kitap<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/>