Arama Sonu&ccedil;lar&#305; Wireless communication systems -- Security measures. SirsiDynix Enterprise https://katalog.hacettepe.edu.tr/client/tr_TR/default_tr/default_tr/qu$003dWireless$002bcommunication$002bsystems$002b--$002bSecurity$002bmeasures.$0026ps$003d300? 2026-02-20T16:18:27Z Security and privacy in 6G communication technology ent://SD_ILS/0/SD_ILS:600322 2026-02-20T16:18:27Z 2026-02-20T16:18:27Z Yazar&#160;Jain, Parita, editor.&#160;Aggarwal, Puneet Kumar.&#160;Singh, Mandeep.&#160;Singh, Sushil Kumar.&#160;Singhal, Amit.<br/>Yer Numaras&#305;&#160;TK5103.252 .S43 2026<br/>Elektronik Eri&#351;im&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394311057">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394311057</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Preventing bluetooth and wireless attacks in IoMT healthcare systems ent://SD_ILS/0/SD_ILS:600016 2026-02-20T16:18:27Z 2026-02-20T16:18:27Z Yazar&#160;Chirillo, John, 1970- author.<br/>Yer Numaras&#305;&#160;R859.7 .S43 C45 2025<br/>Elektronik Eri&#351;im&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394352401">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394352401</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Wireless communication security : mobile and network security protocols ent://SD_ILS/0/SD_ILS:598156 2026-02-20T16:18:27Z 2026-02-20T16:18:27Z Yazar&#160;Bharti, Manisha, editor.&#160;Niranjanamurthy, M., editor.&#160;Khari, Manju, editor.<br/>Yer Numaras&#305;&#160;TK5103.2 .W57 2023<br/>Elektronik Eri&#351;im&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119777465">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119777465</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> COMPUTATIONAL INTELLIGENT SECURITY IN WIRELESS COMMUNICATIONS ent://SD_ILS/0/SD_ILS:559838 2026-02-20T16:18:27Z 2026-02-20T16:18:27Z Yazar&#160;Khan, Suhel Ahmed, editor.&#160;Kumar, Rajeev, editor.&#160;Kaiwartya, Omprakash, 1981- editor.&#160;Khan, R. A. (Raees Ahmad), editor.&#160;Faisal, M. (Mohammad), editor.<br/>Yer Numaras&#305;&#160;TK5103.2<br/>Elektronik Eri&#351;im&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003323426">https://www.taylorfrancis.com/books/9781003323426</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Security in wireless communication networks ent://SD_ILS/0/SD_ILS:597208 2026-02-20T16:18:27Z 2026-02-20T16:18:27Z Yazar&#160;Qian, Yi, 1962- author.&#160;Ye, Feng, 1989- author.&#160;Chen, Hsiao-Hwa, author.<br/>Yer Numaras&#305;&#160;TK5103.2<br/>Elektronik Eri&#351;im&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119244400">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119244400</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Hybrid Encryption Algorithms over Wireless Communication Channels ent://SD_ILS/0/SD_ILS:568156 2026-02-20T16:18:27Z 2026-02-20T16:18:27Z Yazar&#160;Shaheen, Mai Helmy Ahmed, 1981- author.<br/>Yer Numaras&#305;&#160;TK5102.94<br/>Elektronik Eri&#351;im&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003051428">https://www.taylorfrancis.com/books/9781003051428</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Comprehensive guide to 5G security ent://SD_ILS/0/SD_ILS:594025 2026-02-20T16:18:27Z 2026-02-20T16:18:27Z Yazar&#160;Liyanage, Madhusanka, editor.&#160;Ahmad, Ijaz, 1985- editor.&#160;Abro, Ahmed Bux, editor.&#160;Gurtov, Andrei, editor.&#160;Ylianttila, Mika, editor.<br/>Yer Numaras&#305;&#160;TK5103.2<br/>Elektronik Eri&#351;im&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119293071">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119293071</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Physical layer security in wireless communications ent://SD_ILS/0/SD_ILS:540732 2026-02-20T16:18:27Z 2026-02-20T16:18:27Z Yazar&#160;Zhou, Xiangyun Sean, editor.&#160;Song, Lingyang, editor.&#160;Zhang, Yan, 1977- editor.<br/>Yer Numaras&#305;&#160;TK5103.2 .P515 2014<br/>Elektronik Eri&#351;im&#160;<a href="https://www.taylorfrancis.com/books/9781466567016">Click here to view.</a><br/>Format:&#160;Kitap<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Intrusion detection in wireless ad-hoc networks ent://SD_ILS/0/SD_ILS:546164 2026-02-20T16:18:27Z 2026-02-20T16:18:27Z Yazar&#160;Chaki, Nabendu, editor.&#160;Chaki, Rituparna, editor.<br/>Yer Numaras&#305;&#160;TK5102.85 .I57 2014<br/>Elektronik Eri&#351;im&#160;<a href="https://www.taylorfrancis.com/books/9781466515673">Click here to view.</a><br/>Format:&#160;Kitap<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Violent Python a cookbook for hackers, forensic analysts, penetration testers and security engineers ent://SD_ILS/0/SD_ILS:146917 2026-02-20T16:18:27Z 2026-02-20T16:18:27Z Yazar&#160;O'Connor, T. J.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597499576">http://www.sciencedirect.com/science/book/9781597499576</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Wireless reconnaissance in penetration testing ent://SD_ILS/0/SD_ILS:145690 2026-02-20T16:18:27Z 2026-02-20T16:18:27Z Yazar&#160;Neely, Matthew.&#160;Hamerstone, Alex.&#160;Sanyk, Chris.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597497312">http://www.sciencedirect.com/science/book/9781597497312</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Wireless reconnaissance in penetration testing ent://SD_ILS/0/SD_ILS:306460 2026-02-20T16:18:27Z 2026-02-20T16:18:27Z Yazar&#160;Neely, Matthew.&#160;Hamerstone, Alex.&#160;Sanyk, Chris.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597497312">http://www.sciencedirect.com/science/book/9781597497312</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Wireless network security a beginner's guide ent://SD_ILS/0/SD_ILS:293230 2026-02-20T16:18:27Z 2026-02-20T16:18:27Z Yazar&#160;Wrightson, Tyler.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://mhebooklibrary.com/reader/wireless-network-security-beginners-guide">Subscription required</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Hacking exposed wireless wireless security secrets &amp; solutions ent://SD_ILS/0/SD_ILS:293300 2026-02-20T16:18:27Z 2026-02-20T16:18:27Z Yazar&#160;Cache, Johnny.&#160;Wright, Joshua.&#160;Liu, Vincent.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://mhebooklibrary.com/reader/hacking-exposed-wireless-second-edition">Subscription required</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Wireless network administration a beginner's guide ent://SD_ILS/0/SD_ILS:293305 2026-02-20T16:18:27Z 2026-02-20T16:18:27Z Yazar&#160;Soyinka, Wale.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://mhebooklibrary.com/reader/wireless-network-administration-beginners-guide">Subscription required</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Mobile application security ent://SD_ILS/0/SD_ILS:293312 2026-02-20T16:18:27Z 2026-02-20T16:18:27Z Yazar&#160;Dwivedi, Himanshu.&#160;Clark, Chris, 1980-&#160;Thiel, David V.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://mhebooklibrary.com/reader/mobile-application-security">Subscription required</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Honeypot : a new paradigm to information security ent://SD_ILS/0/SD_ILS:545590 2026-02-20T16:18:27Z 2026-02-20T16:18:27Z Yazar&#160;Joshi, R. C., author.&#160;Sardana, Anjali.<br/>Yer Numaras&#305;&#160;QA76.9 .A25 J66 2011<br/>Elektronik Eri&#351;im&#160;<a href="https://www.taylorfrancis.com/books/9781439869994">Click here to view.</a><br/>Format:&#160;Kitap<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Wireless security ent://SD_ILS/0/SD_ILS:546620 2026-02-20T16:18:27Z 2026-02-20T16:18:27Z Yazar&#160;Osterhage, Wolfgang., author.<br/>Yer Numaras&#305;&#160;TK5103.2 .O82 2011<br/>Elektronik Eri&#351;im&#160;<a href="https://www.taylorfrancis.com/books/9781439896266">Click here to view.</a><br/>Format:&#160;Kitap<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Seven deadliest wireless technologies attacks ent://SD_ILS/0/SD_ILS:149033 2026-02-20T16:18:27Z 2026-02-20T16:18:27Z Yazar&#160;Haines, Brad.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495417">http://www.sciencedirect.com/science/book/9781597495417</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Security of mobile communications ent://SD_ILS/0/SD_ILS:544848 2026-02-20T16:18:27Z 2026-02-20T16:18:27Z Yazar&#160;Boudriga, Noureddine, author.<br/>Yer Numaras&#305;&#160;TK5102.85 .B68 2010<br/>Elektronik Eri&#351;im&#160;<a href="https://www.taylorfrancis.com/books/9780849379420">Click here to view.</a><br/>Format:&#160;Kitap<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Wireless and mobile network security security basics, security in On-the-shelf and emergeing technologies ent://SD_ILS/0/SD_ILS:297992 2026-02-20T16:18:27Z 2026-02-20T16:18:27Z Yazar&#160;Chaouchi, Hakima.&#160;Laurent-Maknavicius, Maryline.&#160;Wiley InterScience (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;John Wiley <a href="http://dx.doi.org/10.1002/9780470611883">http://dx.doi.org/10.1002/9780470611883</a> <a href="http://site.ebrary.com/lib/alltitles/Doc?id=10361067">http://site.ebrary.com/lib/alltitles/Doc?id=10361067</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Security in an IPv6 environment ent://SD_ILS/0/SD_ILS:546853 2026-02-20T16:18:27Z 2026-02-20T16:18:27Z Yazar&#160;Minoli, Daniel, 1952, author.&#160;Kouns, Jake.<br/>Yer Numaras&#305;&#160;TK5105.59 .M56 2009<br/>Elektronik Eri&#351;im&#160;<a href="https://www.taylorfrancis.com/books/9781420092301">Click here to view.</a><br/>Format:&#160;Kitap<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Security in wireless ad hoc and sensor networks ent://SD_ILS/0/SD_ILS:297789 2026-02-20T16:18:27Z 2026-02-20T16:18:27Z Yazar&#160;&Ccedil;ayirci, E. (Erdal)&#160;Levi, Albert, 1969-&#160;Wiley InterScience (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;John Wiley <a href="http://dx.doi.org/10.1002/9780470516782">http://dx.doi.org/10.1002/9780470516782</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Kismet hacking ent://SD_ILS/0/SD_ILS:147861 2026-02-20T16:18:27Z 2026-02-20T16:18:27Z Yazar&#160;Haines, Brad.&#160;Schearer, Michael J.&#160;Thornton, Frank (Thorn)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491174">http://www.sciencedirect.com/science/book/9781597491174</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> WarDriving &amp; wireless penetration testing ent://SD_ILS/0/SD_ILS:146805 2026-02-20T16:18:27Z 2026-02-20T16:18:27Z Yazar&#160;Hurley, Chris.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491112">http://www.sciencedirect.com/science/book/9781597491112</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> WarDriving &amp; wireless penetration testing ent://SD_ILS/0/SD_ILS:112210 2026-02-20T16:18:27Z 2026-02-20T16:18:27Z Yazar&#160;Hurley, Chris.&#160;ScienceDirect (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491112">An electronic book accessible through the World Wide Web; click for information</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Resource, mobility, and security management in wireless networks and mobile communications ent://SD_ILS/0/SD_ILS:545838 2026-02-20T16:18:27Z 2026-02-20T16:18:27Z Yazar&#160;Zhang, Yan, 1977-&#160;Hu, Honglin, 1975-&#160;Fujise, Masayuki, 1950-<br/>Yer Numaras&#305;&#160;TK5103.2 .R395 2007<br/>Elektronik Eri&#351;im&#160;<a href="https://www.taylorfrancis.com/books/9781420013610">Click here to view.</a><br/>Format:&#160;Kitap<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Wireless crime and forensic investigation ent://SD_ILS/0/SD_ILS:542840 2026-02-20T16:18:27Z 2026-02-20T16:18:27Z Yazar&#160;Kipper, Gregory., author.<br/>Yer Numaras&#305;&#160;TK5103.2 .K565 2007<br/>Elektronik Eri&#351;im&#160;<a href="https://www.taylorfrancis.com/books/9781420013016">Click here to view.</a><br/>Format:&#160;Kitap<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Wireless security and cryptography : specifications and implementations ent://SD_ILS/0/SD_ILS:543513 2026-02-20T16:18:27Z 2026-02-20T16:18:27Z Yazar&#160;Sklavos, Nicolas.&#160;Zhang, Xinmiao.<br/>Yer Numaras&#305;&#160;TK5103.2 .W57415 2007<br/>Elektronik Eri&#351;im&#160;<a href="https://www.taylorfrancis.com/books/9781315222202">Click here to view.</a><br/>Format:&#160;Kitap<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Wireless security handbook ent://SD_ILS/0/SD_ILS:542848 2026-02-20T16:18:27Z 2026-02-20T16:18:27Z Yazar&#160;Earle, Aaron E., author.<br/>Yer Numaras&#305;&#160;TK5105.78 .E23 2006<br/>Elektronik Eri&#351;im&#160;<a href="https://www.taylorfrancis.com/books/9781420031188">Click here to view.</a><br/>Format:&#160;Kitap<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Bulletproof wireless security GSM, UMTS, 802.11 and ad hoc security ent://SD_ILS/0/SD_ILS:254722 2026-02-20T16:18:27Z 2026-02-20T16:18:27Z Yazar&#160;Chandra, Praphul.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780750677462">http://www.sciencedirect.com/science/book/9780750677462</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> WarDriving drive, detect, defend : a guide to wireless security ent://SD_ILS/0/SD_ILS:253988 2026-02-20T16:18:27Z 2026-02-20T16:18:27Z Yazar&#160;Hurley, Chris.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836036">http://www.sciencedirect.com/science/book/9781931836036</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> UMTS security ent://SD_ILS/0/SD_ILS:295861 2026-02-20T16:18:27Z 2026-02-20T16:18:27Z Yazar&#160;Niemi, Valtteri.&#160;Nyberg, Kaisa, 1948-<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://www.contentreserve.com/TitleInfo.asp?ID={465C10B2-1465-4D2B-AAAD-DED651D62D3D}&Format=50">Click for information</a> Wiley InterScience - Full text online <a href="http://onlinelibrary.wiley.com/book/10.1002/0470091584">http://onlinelibrary.wiley.com/book/10.1002/0470091584</a> John Wiley <a href="http://dx.doi.org/10.1002/0470091584">http://dx.doi.org/10.1002/0470091584</a> HathiTrust Digital Library, Limited view (search only) <a href="http://catalog.hathitrust.org/api/volumes/oclc/53183293.html">http://catalog.hathitrust.org/api/volumes/oclc/53183293.html</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Security in fixed and wireless networks an introduction to securing data communications ent://SD_ILS/0/SD_ILS:301122 2026-02-20T16:18:27Z 2026-02-20T16:18:27Z Yazar&#160;Sch&auml;fer, G&uuml;nter, Dr.-Ing.&#160;John Wiley &amp; Sons.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;John Wiley <a href="http://dx.doi.org/10.1002/0470863722">http://dx.doi.org/10.1002/0470863722</a> <a href="http://www3.interscience.wiley.com/cgi-bin/bookhome/112477198">http://www3.interscience.wiley.com/cgi-bin/bookhome/112477198</a> Contributor biographical information <a href="http://catdir.loc.gov/catdir/bios/wiley047/2004299184.html">http://catdir.loc.gov/catdir/bios/wiley047/2004299184.html</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Hack proofing your wireless network ent://SD_ILS/0/SD_ILS:254049 2026-02-20T16:18:27Z 2026-02-20T16:18:27Z Yazar&#160;Barnes, Christian.&#160;O'Farrell, Neal.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781928994596">http://www.sciencedirect.com/science/book/9781928994596</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/>