Arama Sonu&ccedil;lar&#305; Testing. - Daralt&#305;lm&#305;&#351;: Cryptography. SirsiDynix Enterprise https://katalog.hacettepe.edu.tr/client/tr_TR/default_tr/default_tr/qu$003dTesting.$0026qf$003dSUBJECT$002509Konu$002509Cryptography.$002509Cryptography.$0026ps$003d300?dt=list 2026-03-29T21:48:16Z The cybersecurity control playbook : from fundamentals to advanced strategies ent://SD_ILS/0/SD_ILS:599789 2026-03-29T21:48:16Z 2026-03-29T21:48:16Z Yazar&#160;Edwards, Jason (Cybersecurity expert), author.&#160;John Wiley &amp; Sons, publisher.<br/>Yer Numaras&#305;&#160;QA76.9 .A25 E3884 2025<br/>Elektronik Eri&#351;im&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394331888">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394331888</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Building secure cars : assuring the automotive software development lifecycle ent://SD_ILS/0/SD_ILS:596310 2026-03-29T21:48:16Z 2026-03-29T21:48:16Z Yazar&#160;Oka, Dennis Kengo, author.<br/>Yer Numaras&#305;&#160;TL272.53 .O42 2021<br/>Elektronik Eri&#351;im&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119710783">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119710783</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Hacking multifactor authentication ent://SD_ILS/0/SD_ILS:596326 2026-03-29T21:48:16Z 2026-03-29T21:48:16Z Yazar&#160;Grimes, Roger A., author.<br/>Yer Numaras&#305;&#160;QA76.9 .A25 G75 2021<br/>Elektronik Eri&#351;im&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119672357">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119672357</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Hacking connected cars : tactics, techniques, and procedures ent://SD_ILS/0/SD_ILS:595843 2026-03-29T21:48:16Z 2026-03-29T21:48:16Z Yazar&#160;Knight, Alissa, author.<br/>Yer Numaras&#305;&#160;TL152.8 .K65 2020<br/>Elektronik Eri&#351;im&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119491774">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119491774</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Tribe of hackers security leaders : tribal knowledge from the best in cybersecurity leadership ent://SD_ILS/0/SD_ILS:595887 2026-03-29T21:48:16Z 2026-03-29T21:48:16Z Yazar&#160;Carey, Marcus J. (Cybersecurity professional), author.&#160;Jin, Jennifer.<br/>Yer Numaras&#305;&#160;QA76.9 .A25 C37 2020<br/>Elektronik Eri&#351;im&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119643784">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119643784</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Implementing cryptography using Python ent://SD_ILS/0/SD_ILS:596198 2026-03-29T21:48:16Z 2026-03-29T21:48:16Z Yazar&#160;Bray, Shannon, 1972-<br/>Yer Numaras&#305;&#160;QA76.9 .A25<br/>Elektronik Eri&#351;im&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119612216">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119612216</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Tribe of hackers blue team : tribal knowledge from the best in defensive cybersecurity ent://SD_ILS/0/SD_ILS:596276 2026-03-29T21:48:16Z 2026-03-29T21:48:16Z Yazar&#160;Carey, Marcus J. (Cybersecurity professional)&#160;Jin, Jennifer.<br/>Yer Numaras&#305;&#160;QA76.9 .A25 C3673 2020<br/>Elektronik Eri&#351;im&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119643432">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119643432</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Tribe of hackers red team : tribal knowledge from the best in offensive cybersecurity ent://SD_ILS/0/SD_ILS:595415 2026-03-29T21:48:16Z 2026-03-29T21:48:16Z Yazar&#160;Carey, Marcus J. (Cybersecurity professional), author.&#160;Jin, Jennifer, author.<br/>Yer Numaras&#305;&#160;QA76.9 .A25 C368 2019<br/>Elektronik Eri&#351;im&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119643357">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119643357</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Wireshark for security professionals : using Wireshark and the Metasploit Framework ent://SD_ILS/0/SD_ILS:593472 2026-03-29T21:48:16Z 2026-03-29T21:48:16Z Yazar&#160;Bullock, Jessey, author.&#160;Gordon, Adam, author.<br/>Yer Numaras&#305;&#160;QA76.9 .A25<br/>Elektronik Eri&#351;im&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119183457">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119183457</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Hacking the hacker : learn from the experts who take down hackers ent://SD_ILS/0/SD_ILS:593636 2026-03-29T21:48:16Z 2026-03-29T21:48:16Z Yazar&#160;Grimes, Roger A., author.<br/>Yer Numaras&#305;&#160;QA76.9 .A25<br/>Elektronik Eri&#351;im&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119396260">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119396260</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Risk Assessment and Risk-Driven Quality Assurance 4th International Workshop, RISK 2016, Held in Conjunction with ICTSS 2016, Graz, Austria, October 18, 2016, Revised Selected Papers ent://SD_ILS/0/SD_ILS:613620 2026-03-29T21:48:16Z 2026-03-29T21:48:16Z Yazar&#160;Gro&szlig;mann, J&uuml;rgen. editor.&#160;Felderer, Michael. editor.&#160;Seehusen, Fredrik. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-3-319-57858-3">https://doi.org/10.1007/978-3-319-57858-3</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Cyber-security of SCADA and Other Industrial Control Systems ent://SD_ILS/0/SD_ILS:610788 2026-03-29T21:48:16Z 2026-03-29T21:48:16Z Yazar&#160;Colbert, Edward J. M. editor.&#160;Kott, Alexander. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-3-319-32125-7">https://doi.org/10.1007/978-3-319-32125-7</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Digital Watermarking Techniques in Curvelet and Ridgelet Domain ent://SD_ILS/0/SD_ILS:617663 2026-03-29T21:48:16Z 2026-03-29T21:48:16Z Yazar&#160;Rao, Channapragada Rama Seshagiri. author.&#160;Prasad, Munaga V.N.K. author.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-3-319-32951-2">https://doi.org/10.1007/978-3-319-32951-2</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/>