Arama Sonuçları Systems software. - Daraltılmış: Computer security.
SirsiDynix Enterprise
https://katalog.hacettepe.edu.tr/client/tr_TR/default_tr/default_tr/qu$003dSystems$002bsoftware.$0026qf$003dSUBJECT$002509Konu$002509Computer$002bsecurity.$002509Computer$002bsecurity.$0026ps$003d300$0026isd$003dtrue?
2026-01-24T19:01:33Z
Architecting secure software systems
ent://SD_ILS/0/SD_ILS:538962
2026-01-24T19:01:33Z
2026-01-24T19:01:33Z
Yazar Talukder, Asoke K., author. Chaitanya, Manish.<br/>Yer Numarası QA76.9 .A25 T34 2009<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9781420087857">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>
EMBEDDED SOFTWARE DEVELOPMENT FOR SAFETY-CRITICAL SYSTEMS
ent://SD_ILS/0/SD_ILS:563010
2026-01-24T19:01:33Z
2026-01-24T19:01:33Z
Yazar Hobbs, Chris (Christopher W.)<br/>Yer Numarası QA76.76 .D47<br/>Elektronik Erişim Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003598145">https://www.taylorfrancis.com/books/9781003598145</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Safety Assurance under Uncertainties : From Software to Cyber-Physical/Machine Learning Systems
ent://SD_ILS/0/SD_ILS:578912
2026-01-24T19:01:33Z
2026-01-24T19:01:33Z
Yazar Hasuo, Ichiro editor Ishikawa, Fuyuki editor<br/>Yer Numarası QA76.9 .A25<br/>Elektronik Erişim Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003093350">https://www.taylorfrancis.com/books/9781003093350</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Security and Safety Interplay of Intelligent Software Systems ESORICS 2018 International Workshops, ISSA 2018 and CSITS 2018, Barcelona, Spain, September 6–7, 2018, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:483024
2026-01-24T19:01:33Z
2026-01-24T19:01:33Z
Yazar Hamid, Brahim. editor. Gallina, Barbara. editor. (orcid)0000-0002-6952-1053 Shabtai, Asaf. editor. (orcid)0000-0003-0630-4059 Elovici, Yuval. editor. Garcia-Alfaro, Joaquin. editor. (orcid)0000-0002-7453-4393<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-030-16874-2">https://doi.org/10.1007/978-3-030-16874-2</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Handbook of system safety and security : cyber risk and risk management, cyber security, threat analysis, functional safety, software systems, and cyber physical systems
ent://SD_ILS/0/SD_ILS:459145
2026-01-24T19:01:33Z
2026-01-24T19:01:33Z
Yazar Griffor, Edward R., editor.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128037737">http://www.sciencedirect.com/science/book/9780128037737</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Embedded systems security practical methods for safe and secure software and systems development
ent://SD_ILS/0/SD_ILS:146451
2026-01-24T19:01:33Z
2026-01-24T19:01:33Z
Yazar Kleidermacher, David. Kleidermacher, Mike.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780123868862">http://www.sciencedirect.com/science/book/9780123868862</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Quantum computing models for cybersecurity and wireless communications
ent://SD_ILS/0/SD_ILS:599707
2026-01-24T19:01:33Z
2026-01-24T19:01:33Z
Yazar Kumar, Budati Anil, edited. Kumar, Singamaneni Kranthi, edited. Li, Xingwang (Computer scientist), edited.<br/>Yer Numarası QA76.9 .A25 Q36 2025<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394271429">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394271429</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Next-generation systems and secure computing
ent://SD_ILS/0/SD_ILS:599779
2026-01-24T19:01:33Z
2026-01-24T19:01:33Z
Yazar Barman, Subhabrata, editor. Koley, Santanu, editor. Joardar, Subhankar, editor.<br/>Yer Numarası QA76.9 .A25 N49 2025<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394228522">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394228522</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Effective vulnerability management : managing risk in the vulnerable digital ecosystem
ent://SD_ILS/0/SD_ILS:599047
2026-01-24T19:01:33Z
2026-01-24T19:01:33Z
Yazar Hughes, Chris (Christopher Matthew), author. Robinson, Nikki, author.<br/>Yer Numarası QA76.9 .A25 H84 2024<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394277155">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394277155</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
The CISO evolution : business knowledge for cybersecurity executives
ent://SD_ILS/0/SD_ILS:597056
2026-01-24T19:01:33Z
2026-01-24T19:01:33Z
Yazar Sharp, Matthew K., author. Lambros, Kyriakos P., author.<br/>Yer Numarası HD30.2 .S5325 2022<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119782513">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119782513</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Trust in computer systems and the cloud
ent://SD_ILS/0/SD_ILS:597142
2026-01-24T19:01:33Z
2026-01-24T19:01:33Z
Yazar Bursell, Mike, author.<br/>Yer Numarası QA76.9 .A25<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119695158">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119695158</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Security engineering : a guide to building dependable distributed systems
ent://SD_ILS/0/SD_ILS:596480
2026-01-24T19:01:33Z
2026-01-24T19:01:33Z
Yazar Anderson, Ross. http://viaf.org/viaf/sourceID/LC%7cnb2004300232<br/>Yer Numarası QA76.9 .A25<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119644682">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119644682</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Hands on hacking
ent://SD_ILS/0/SD_ILS:596316
2026-01-24T19:01:33Z
2026-01-24T19:01:33Z
Yazar Hickey, Matthew (Computer security expert), author. Arcuri, Jennifer, author.<br/>Yer Numarası QA76.9 .A25 H53 2020 EB<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119561507">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119561507</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Critical Infrastructure Protection XIII 13th IFIP WG 11.10 International Conference, ICCIP 2019, Arlington, VA, USA, March 11–12, 2019, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:486939
2026-01-24T19:01:33Z
2026-01-24T19:01:33Z
Yazar Staggs, Jason. editor. Shenoi, Sujeet. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-030-34647-8">https://doi.org/10.1007/978-3-030-34647-8</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Artificial Intelligence and Security 5th International Conference, ICAIS 2019, New York, NY, USA, July 26–28, 2019, Proceedings, Part IV
ent://SD_ILS/0/SD_ILS:486379
2026-01-24T19:01:33Z
2026-01-24T19:01:33Z
Yazar Sun, Xingming. editor. (orcid)0000-0003-1390-399X Pan, Zhaoqing. editor. (orcid)0000-0003-1390-399X Bertino, Elisa. editor. (orcid)0000-0002-4029-7051 SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-030-24268-8">https://doi.org/10.1007/978-3-030-24268-8</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
High-Performance Computing Applications in Numerical Simulation and Edge Computing ACM ICS 2018 International Workshops, HPCMS and HiDEC, Beijing, China, June 12, 2018, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:483956
2026-01-24T19:01:33Z
2026-01-24T19:01:33Z
Yazar Hu, Changjun. editor. Yang, Wen. editor. Jiang, Congfeng. editor. Dai, Dong. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-981-32-9987-0">https://doi.org/10.1007/978-981-32-9987-0</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Social engineering : the science of human hacking
ent://SD_ILS/0/SD_ILS:594635
2026-01-24T19:01:33Z
2026-01-24T19:01:33Z
Yazar Hadnagy, Christopher, author.<br/>Yer Numarası HM668 .H33 2018<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119433729">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119433729</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Stabilization, Safety, and Security of Distributed Systems 16th International Symposium, SSS 2014, Paderborn, Germany, September 28 -- October 1, 2014. Proceedings
ent://SD_ILS/0/SD_ILS:485732
2026-01-24T19:01:33Z
2026-01-24T19:01:33Z
Yazar Felber, Pascal. editor. Garg, Vijay. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-319-11764-5">https://doi.org/10.1007/978-3-319-11764-5</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Secure and resilient software development
ent://SD_ILS/0/SD_ILS:545097
2026-01-24T19:01:33Z
2026-01-24T19:01:33Z
Yazar Merkow, Mark S., author. Raghavan, Lakshmikanth.<br/>Yer Numarası QA76.76 .D47 M466 2010<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9781439826973">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>