Arama Sonuçları detection. - Daraltılmış: Computer security.
SirsiDynix Enterprise
https://katalog.hacettepe.edu.tr/client/tr_TR/default_tr/default_tr/qu$003ddetection.$0026qf$003dSUBJECT$002509Konu$002509Computer$002bsecurity.$002509Computer$002bsecurity.$0026ps$003d300?
2025-12-11T18:00:12Z
Data mining tools for malware detection
ent://SD_ILS/0/SD_ILS:545796
2025-12-11T18:00:12Z
2025-12-11T18:00:12Z
Yazar Masud, Mehedy., author. Khan, Latifur. Thuraisingham, Bhavani M.<br/>Yer Numarası QA76.9 .D343 M385 2012<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9781439854556">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>
OSSEC host-based intrusion detection guide
ent://SD_ILS/0/SD_ILS:148333
2025-12-11T18:00:12Z
2025-12-11T18:00:12Z
Yazar Hay, Andrew. Cid, Daniel. Bray, Rory.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492409">http://www.sciencedirect.com/science/book/9781597492409</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Snort 2.1 intrusion detection
ent://SD_ILS/0/SD_ILS:253989
2025-12-11T18:00:12Z
2025-12-11T18:00:12Z
Yazar Beale, Jay. Alder, Raven.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836043">http://www.sciencedirect.com/science/book/9781931836043</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Snort 2.0 intrusion detection
ent://SD_ILS/0/SD_ILS:254005
2025-12-11T18:00:12Z
2025-12-11T18:00:12Z
Yazar Beale, Jay. Foster, James C.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836746">http://www.sciencedirect.com/science/book/9781931836746</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Cisco security professional's guide to secure intrusion detection systems
ent://SD_ILS/0/SD_ILS:254024
2025-12-11T18:00:12Z
2025-12-11T18:00:12Z
Yazar Burton, James. Dubrawsky, Ida. Osipov, Vitaly. Baumrucker, C. Tate. Sweeney, Michael<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781932266696">http://www.sciencedirect.com/science/book/9781932266696</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Detection of Intrusions and Malware, and Vulnerability Assessment 16th International Conference, DIMVA 2019, Gothenburg, Sweden, June 19–20, 2019, Proceedings
ent://SD_ILS/0/SD_ILS:485414
2025-12-11T18:00:12Z
2025-12-11T18:00:12Z
Yazar Perdisci, Roberto. editor. Maurice, Clémentine. editor. (orcid)0000-0002-8896-9494 Giacinto, Giorgio. editor. (orcid)0000-0002-5759-3017 Almgren, Magnus. editor. (orcid)0000-0002-3383-9617 SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-030-22038-9">https://doi.org/10.1007/978-3-030-22038-9</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Network Intrusion Detection using Deep Learning A Feature Learning Approach
ent://SD_ILS/0/SD_ILS:399859
2025-12-11T18:00:12Z
2025-12-11T18:00:12Z
Yazar Kim, Kwangjo. author. Aminanto, Muhamad Erza. author. Tanuwidjaja, Harry Chandra. author. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-981-13-1444-5">https://doi.org/10.1007/978-981-13-1444-5</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Detection of Intrusions and Malware, and Vulnerability Assessment 15th International Conference, DIMVA 2018, Saclay, France, June 28–29, 2018, Proceedings
ent://SD_ILS/0/SD_ILS:401646
2025-12-11T18:00:12Z
2025-12-11T18:00:12Z
Yazar Giuffrida, Cristiano. editor. Bardin, Sébastien. editor. Blanc, Gregory. editor. (orcid)0000-0001-8150-6617 SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-319-93411-2">https://doi.org/10.1007/978-3-319-93411-2</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Trusted Digital Circuits Hardware Trojan Vulnerabilities, Prevention and Detection
ent://SD_ILS/0/SD_ILS:400715
2025-12-11T18:00:12Z
2025-12-11T18:00:12Z
Yazar Salmani, Hassan. author. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-319-79081-7">https://doi.org/10.1007/978-3-319-79081-7</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Advanced persistent security : a cyberwarfare approach to implementing adaptive enterprise protection, detection, and reaction strategies
ent://SD_ILS/0/SD_ILS:459204
2025-12-11T18:00:12Z
2025-12-11T18:00:12Z
Yazar Winkler, Ira, author. Gomes, Araceli Treu, author. Shackleford, Dave, editor.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="https://www.sciencedirect.com/science/book/9780128093160">https://www.sciencedirect.com/science/book/9780128093160</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
The state of the art in intrusion prevention and detection
ent://SD_ILS/0/SD_ILS:543676
2025-12-11T18:00:12Z
2025-12-11T18:00:12Z
Yazar Pathan, Al-Sakib Khan, editor.<br/>Yer Numarası QA76.9 .A25 S7354 2014<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9781482203523">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>
Detection of Intrusions and Malware, and Vulnerability Assessment 11th International Conference, DIMVA 2014, Egham, UK, July 10-11, 2014, Proceedings
ent://SD_ILS/0/SD_ILS:489080
2025-12-11T18:00:12Z
2025-12-11T18:00:12Z
Yazar Dietrich, Sven. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-319-08509-8">https://doi.org/10.1007/978-3-319-08509-8</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
OS X incident response : scripting and analysis
ent://SD_ILS/0/SD_ILS:458869
2025-12-11T18:00:12Z
2025-12-11T18:00:12Z
Yazar Bradley, Jaron, author.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128044568">http://www.sciencedirect.com/science/book/9780128044568</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Machine learning forensics for law enforcement, security, and intelligence
ent://SD_ILS/0/SD_ILS:544765
2025-12-11T18:00:12Z
2025-12-11T18:00:12Z
Yazar Mena, Jesus., author.<br/>Yer Numarası HV8073 .M395 2011<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9781439860700">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>
Data mining and machine learning in cybersecurity
ent://SD_ILS/0/SD_ILS:540614
2025-12-11T18:00:12Z
2025-12-11T18:00:12Z
Yazar Dua, Sumeet., author. Du, Xian.<br/>Yer Numarası QA76.9 .D343 D825 2011<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9781439839430">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>
Enhancing computer security with smart technology
ent://SD_ILS/0/SD_ILS:544823
2025-12-11T18:00:12Z
2025-12-11T18:00:12Z
Yazar Vemuri, V. Rao.<br/>Yer Numarası TK5105.59 .E62 2005<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9781420031225">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>
Secure computers and networks : analysis, design, and implementation
ent://SD_ILS/0/SD_ILS:540568
2025-12-11T18:00:12Z
2025-12-11T18:00:12Z
Yazar Fisch, Eric A. White, Gregory B.<br/>Yer Numarası QA76.9 .A25 F5334 2000<br/>Elektronik Erişim Taylor & Francis <a href="https://www.taylorfrancis.com/books/9780367802127">https://www.taylorfrancis.com/books/9780367802127</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>