Arama Sonuçları System security. - Daraltılmış: Computer security.SirsiDynix Enterprisehttps://katalog.hacettepe.edu.tr/client/tr_TR/default_tr/default_tr/qu$003dSystem$002bsecurity.$0026qf$003dSUBJECT$002509Konu$002509Computer$002bsecurity.$002509Computer$002bsecurity.$0026ps$003d300?2025-12-11T01:23:47ZDNS security : defending the domain name systement://SD_ILS/0/SD_ILS:4589352025-12-11T01:23:47Z2025-12-11T01:23:47ZYazar Liska, Allan, author. Stowe, Geoffrey, author.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128033067">http://www.sciencedirect.com/science/book/9780128033067</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Advanced methodologies and technologies in system security, information privacy, and forensicsent://SD_ILS/0/SD_ILS:4820092025-12-11T01:23:47Z2025-12-11T01:23:47ZYazar Khosrow-Pour, Mehdi, 1951- editor. IGI Global, publisher.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-7492-7">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-7492-7</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Network and System Security 13th International Conference, NSS 2019, Sapporo, Japan, December 15–18, 2019, Proceedingsent://SD_ILS/0/SD_ILS:4867062025-12-11T01:23:47Z2025-12-11T01:23:47ZYazar Liu, Joseph K. editor. (orcid)0000-0001-6656-6240 Huang, Xinyi. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-030-36938-5">https://doi.org/10.1007/978-3-030-36938-5</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Network and System Security 12th International Conference, NSS 2018, Hong Kong, China, August 27-29, 2018, Proceedingsent://SD_ILS/0/SD_ILS:4001352025-12-11T01:23:47Z2025-12-11T01:23:47ZYazar Au, Man Ho. editor. (orcid)0000-0003-2068-9530 Yiu, Siu Ming. editor. Li, Jin. editor. Luo, Xiapu. editor. Wang, Cong. editor.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-030-02744-5">https://doi.org/10.1007/978-3-030-02744-5</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Handbook of system safety and security : cyber risk and risk management, cyber security, threat analysis, functional safety, software systems, and cyber physical systemsent://SD_ILS/0/SD_ILS:4591452025-12-11T01:23:47Z2025-12-11T01:23:47ZYazar Griffor, Edward R., editor.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128037737">http://www.sciencedirect.com/science/book/9780128037737</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Network and System Security 8th International Conference, NSS 2014, Xi'an, China, October 15-17, 2014. Proceedingsent://SD_ILS/0/SD_ILS:4890912025-12-11T01:23:47Z2025-12-11T01:23:47ZYazar Au, Man Ho. editor. Carminati, Barbara. editor. Kuo, C.-C. Jay. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-319-11698-3">https://doi.org/10.1007/978-3-319-11698-3</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Security management : a critical thinking approachent://SD_ILS/0/SD_ILS:5397252025-12-11T01:23:47Z2025-12-11T01:23:47ZYazar Land, Michael (Industrial engineer), author. Ricks, Truett A., author. Ricks, Bob, author.<br/>Yer Numarası HD61.5 .L36 2014<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9781466561786">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>What every engineer should know about cyber security and digital forensicsent://SD_ILS/0/SD_ILS:5397262025-12-11T01:23:47Z2025-12-11T01:23:47ZYazar DeFranco, Joanna F., author.<br/>Yer Numarası TK5105.59 .D44 2014<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9781466564541">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>PRAGMATIC security metrics : applying metametrics to information securityent://SD_ILS/0/SD_ILS:5417972025-12-11T01:23:47Z2025-12-11T01:23:47ZYazar Brotby, W. Krag., author. Hinson, Gary. Kabay, Michel E.<br/>Yer Numarası HD30.38 .B76 2013<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9781439881538">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>The complete guide to physical securityent://SD_ILS/0/SD_ILS:5459602025-12-11T01:23:47Z2025-12-11T01:23:47ZYazar Baker, Paul, 1958, author. Benny, Daniel J.<br/>Yer Numarası HV8290 .B34 2013<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9781420099645">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>Insider computer fraud : an in-depth framework for detecting and defending against insider IT attacksent://SD_ILS/0/SD_ILS:5443962025-12-11T01:23:47Z2025-12-11T01:23:47ZYazar Brancik, Kenneth C., author.<br/>Yer Numarası QA76.9 .A25 B725 2008<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9781420046601">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>Public key infrastructure : building trusted applications and Web servicesent://SD_ILS/0/SD_ILS:5432812025-12-11T01:23:47Z2025-12-11T01:23:47ZYazar Vacca, John R.<br/>Yer Numarası QA76.9 .A25 P85 2004<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9780203498156">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>UMTS securityent://SD_ILS/0/SD_ILS:2958612025-12-11T01:23:47Z2025-12-11T01:23:47ZYazar Niemi, Valtteri. Nyberg, Kaisa, 1948-<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://www.contentreserve.com/TitleInfo.asp?ID={465C10B2-1465-4D2B-AAAD-DED651D62D3D}&Format=50">Click for information</a>
Wiley InterScience - Full text online <a href="http://onlinelibrary.wiley.com/book/10.1002/0470091584">http://onlinelibrary.wiley.com/book/10.1002/0470091584</a>
John Wiley <a href="http://dx.doi.org/10.1002/0470091584">http://dx.doi.org/10.1002/0470091584</a>
HathiTrust Digital Library, Limited view (search only) <a href="http://catalog.hathitrust.org/api/volumes/oclc/53183293.html">http://catalog.hathitrust.org/api/volumes/oclc/53183293.html</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>A practical guide to security engineering and information assuranceent://SD_ILS/0/SD_ILS:5449732025-12-11T01:23:47Z2025-12-11T01:23:47ZYazar Herrmann, Debra S., author.<br/>Yer Numarası QA76.9 .A25 H47 2002<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9781420031492">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>Secure computers and networks : analysis, design, and implementationent://SD_ILS/0/SD_ILS:5405682025-12-11T01:23:47Z2025-12-11T01:23:47ZYazar Fisch, Eric A. White, Gregory B.<br/>Yer Numarası QA76.9 .A25 F5334 2000<br/>Elektronik Erişim Taylor & Francis <a href="https://www.taylorfrancis.com/books/9780367802127">https://www.taylorfrancis.com/books/9780367802127</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>