Arama Sonuçları Threats. - Daraltılmış: Computer security.SirsiDynix Enterprisehttps://katalog.hacettepe.edu.tr/client/tr_TR/default_tr/default_tr/qu$003dThreats.$0026qf$003dSUBJECT$002509Konu$002509Computer$002bsecurity.$002509Computer$002bsecurity.$0026ps$003d300?2024-11-13T18:04:30ZMobile data loss : threats and countermeasuresent://SD_ILS/0/SD_ILS:4587292024-11-13T18:04:30Z2024-11-13T18:04:30ZYazar Raggo, Michael T.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="https://www.sciencedirect.com/science/book/9780128028643">https://www.sciencedirect.com/science/book/9780128028643</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Hardware security : design, threats, and safeguardsent://SD_ILS/0/SD_ILS:3564032024-11-13T18:04:30Z2024-11-13T18:04:30ZYazar Mukhopadhyay, Debdeep, author. Subhra, Rajat, author.<br/>Yer Numarası ONLINE(356403.1)<br/>Elektronik Erişim <a href="http://marc.crcnetbase.com/isbn/9781439895849">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Cyber and electromagnetic threats in modern relay protectionent://SD_ILS/0/SD_ILS:3565352024-11-13T18:04:30Z2024-11-13T18:04:30ZYazar Gurevich, Vladimir, 1956- author.<br/>Yer Numarası ONLINE(356535.1)<br/>Elektronik Erişim <a href="http://marc.crcnetbase.com/isbn/9781482264326">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Enemy at the water cooler real-life stories of insider threats and Enterprise Security Management countermeasuresent://SD_ILS/0/SD_ILS:1464752024-11-13T18:04:30Z2024-11-13T18:04:30ZYazar Contos, Brian T.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491297">http://www.sciencedirect.com/science/book/9781597491297</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Computer security literacy staying safe in a digital worldent://SD_ILS/0/SD_ILS:2908392024-11-13T18:04:30Z2024-11-13T18:04:30ZYazar Jacobson, Douglas. Idziorek, Joseph.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://marc.crcnetbase.com/isbn/9781439856192">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Cybersecurity for industrial control systems SCADA, DCS, PLC, HMI, and SISent://SD_ILS/0/SD_ILS:2861402024-11-13T18:04:30Z2024-11-13T18:04:30ZYazar Macaulay, Tyson. Singer, Bryan.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://marc.crcnetbase.com/isbn/9781439801987">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Cyber security essentialsent://SD_ILS/0/SD_ILS:2879802024-11-13T18:04:30Z2024-11-13T18:04:30ZYazar Graham, James (James J.) Howard, Richard, 1959- Olson, Ryan, 1981-<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://marc.crcnetbase.com/isbn/9781439851265">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Security software development assessing and managing security risksent://SD_ILS/0/SD_ILS:2860162024-11-13T18:04:30Z2024-11-13T18:04:30ZYazar Ashbaugh, Douglas A.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://marc.crcnetbase.com/isbn/9781420063813">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>