Arama Sonu&ccedil;lar&#305; systems analysis. - Daralt&#305;lm&#305;&#351;: Computer security. SirsiDynix Enterprise https://katalog.hacettepe.edu.tr/client/tr_TR/default_tr/default_tr/qu$003dsystems$002banalysis.$0026qf$003dSUBJECT$002509Konu$002509Computer$002bsecurity.$002509Computer$002bsecurity.$0026ps$003d300$0026isd$003dtrue? 2026-01-21T03:28:22Z ATTACK-AND-DEFENSE GAMES FOR CONTROL SYSTEMS analysis and synthesis. ent://SD_ILS/0/SD_ILS:576456 2026-01-21T03:28:22Z 2026-01-21T03:28:22Z Yazar&#160;Yuan, Huanhuan.<br/>Yer Numaras&#305;&#160;QA76.9 .A25<br/>Elektronik Eri&#351;im&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003483250">https://www.taylorfrancis.com/books/9781003483250</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Guide to Vulnerability Analysis for Computer Networks and Systems An Artificial Intelligence Approach ent://SD_ILS/0/SD_ILS:400393 2026-01-21T03:28:22Z 2026-01-21T03:28:22Z Yazar&#160;Parkinson, Simon. editor. (orcid)0000-0002-1747-9914&#160;Crampton, Andrew. editor. (orcid)0000-0002-4635-9102&#160;Hill, Richard. editor. (orcid)0000-0003-0105-7730&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-3-319-92624-7">https://doi.org/10.1007/978-3-319-92624-7</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Handbook of system safety and security : cyber risk and risk management, cyber security, threat analysis, functional safety, software systems, and cyber physical systems ent://SD_ILS/0/SD_ILS:459145 2026-01-21T03:28:22Z 2026-01-21T03:28:22Z Yazar&#160;Griffor, Edward R., editor.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128037737">http://www.sciencedirect.com/science/book/9780128037737</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Secure computer and network systems modeling, analysis and design ent://SD_ILS/0/SD_ILS:296665 2026-01-21T03:28:22Z 2026-01-21T03:28:22Z Yazar&#160;Ye, Nong.&#160;Wiley InterScience (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;Contributor biographical information <a href="http://catdir.loc.gov/catdir/enhancements/fy0833/2007037133-b.html">http://catdir.loc.gov/catdir/enhancements/fy0833/2007037133-b.html</a> John Wiley <a href="http://dx.doi.org/10.1002/9780470023273">http://dx.doi.org/10.1002/9780470023273</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Generative AI, cybersecurity, and ethics ent://SD_ILS/0/SD_ILS:599597 2026-01-21T03:28:22Z 2026-01-21T03:28:22Z Yazar&#160;Islam, Ray (Mohammad Rubyet), author.<br/>Yer Numaras&#305;&#160;QA76.9 .A25<br/>Elektronik Eri&#351;im&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394279326">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394279326</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Emerging threats and countermeasures in cybersecurity ent://SD_ILS/0/SD_ILS:599561 2026-01-21T03:28:22Z 2026-01-21T03:28:22Z Yer Numaras&#305;&#160;QA76.9 .A25 E44 2025<br/>Elektronik Eri&#351;im&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394230600">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394230600</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Open-source security operations center (SOC) : a complete guide to establishing, managing, and maintaining a modern SOC ent://SD_ILS/0/SD_ILS:599434 2026-01-21T03:28:22Z 2026-01-21T03:28:22Z Yazar&#160;Basta, Alfred, author.&#160;Basta, Nadine, author.&#160;Anwar, Waqar, author.&#160;Essar, Mohammad Ilyas, author.&#160;John Wiley &amp; Sons, publisher.<br/>Yer Numaras&#305;&#160;QA76.9 .A25<br/>Elektronik Eri&#351;im&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394201631">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394201631</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> BLOCKCHAIN AND DIGITAL TWIN ENABLED IOT NETWORKS privacy and security. ent://SD_ILS/0/SD_ILS:569607 2026-01-21T03:28:22Z 2026-01-21T03:28:22Z Yazar&#160;Kumar, Randhir.&#160;Kumar, Prabhat.&#160;C C, Sobin.<br/>Yer Numaras&#305;&#160;QA76.9 .A25<br/>Elektronik Eri&#351;im&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003403791">https://www.taylorfrancis.com/books/9781003403791</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> The DevSecOps playbook : deliver continuous security at speed ent://SD_ILS/0/SD_ILS:598634 2026-01-21T03:28:22Z 2026-01-21T03:28:22Z Yazar&#160;Mack, Sean D., author.<br/>Yer Numaras&#305;&#160;QA76.9 .A25 M33 2024<br/>Elektronik Eri&#351;im&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394189281">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394189281</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Automated secure computing for next-generation systems ent://SD_ILS/0/SD_ILS:598752 2026-01-21T03:28:22Z 2026-01-21T03:28:22Z Yazar&#160;Tyagi, Amit Kumar, editor.<br/>Yer Numaras&#305;&#160;QA76.9 .A25 A98 2024<br/>Elektronik Eri&#351;im&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394213948">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394213948</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> System Reliability and Security Techniques and Methodologies. ent://SD_ILS/0/SD_ILS:576623 2026-01-21T03:28:22Z 2026-01-21T03:28:22Z Yazar&#160;Iqbal, Javaid.&#160;Masoodi, Faheem Syeed.&#160;Ahmad Malik, Ishfaq.&#160;Khurshid, Shozab.&#160;Saraf, Iqra.<br/>Yer Numaras&#305;&#160;QA76.9 .A25<br/>Elektronik Eri&#351;im&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781032624983">https://www.taylorfrancis.com/books/9781032624983</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Quantum computing in cybersecurity ent://SD_ILS/0/SD_ILS:598685 2026-01-21T03:28:22Z 2026-01-21T03:28:22Z Yazar&#160;Rawat, Romil, editor.<br/>Yer Numaras&#305;&#160;QA76.9 .A25 Q83 2023<br/>Elektronik Eri&#351;im&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394167401">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394167401</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Cyber security and network security ent://SD_ILS/0/SD_ILS:597484 2026-01-21T03:28:22Z 2026-01-21T03:28:22Z Yazar&#160;Pramanik, Sabyasachi, editor.&#160;Samanta, Debabrata, 1987- editor.&#160;Vinay, M., editor.&#160;Guha, Abhijit, editor.<br/>Yer Numaras&#305;&#160;QA76.9 .A25<br/>Elektronik Eri&#351;im&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119812555">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119812555</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Secure data science : integrating cyber security and data science ent://SD_ILS/0/SD_ILS:574976 2026-01-21T03:28:22Z 2026-01-21T03:28:22Z Yazar&#160;Thuraisingham, Bhavani M., author.&#160;Kantarcioglu, Murat, author.&#160;Khan, Latifur, author.<br/>Yer Numaras&#305;&#160;QA76.9 .A25<br/>Elektronik Eri&#351;im&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003081845">https://www.taylorfrancis.com/books/9781003081845</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Designing secure systems. ent://SD_ILS/0/SD_ILS:565417 2026-01-21T03:28:22Z 2026-01-21T03:28:22Z Yazar&#160;Melone, Michael, author.<br/>Yer Numaras&#305;&#160;QA76.9 .A25 M45 2022<br/>Elektronik Eri&#351;im&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003144182">https://www.taylorfrancis.com/books/9781003144182</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Trust-based communication systems for internet of things applications ent://SD_ILS/0/SD_ILS:597744 2026-01-21T03:28:22Z 2026-01-21T03:28:22Z Yazar&#160;Madaan, Vishu, editor.&#160;Agrawal, Prateek, editor.&#160;Sharma, Anand, editor.&#160;Sharma, Dilip Kumar, editor.&#160;Agrawal, Akshat, 1986- editor.<br/>Yer Numaras&#305;&#160;TK5105.8857<br/>Elektronik Eri&#351;im&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119896746">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119896746</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Practical AI for Cybersecurity ent://SD_ILS/0/SD_ILS:574909 2026-01-21T03:28:22Z 2026-01-21T03:28:22Z Yazar&#160;Das, Ravindra.<br/>Yer Numaras&#305;&#160;QA76.9 .A25<br/>Elektronik Eri&#351;im&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003005230">https://www.taylorfrancis.com/books/9781003005230</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Applied incident response ent://SD_ILS/0/SD_ILS:595744 2026-01-21T03:28:22Z 2026-01-21T03:28:22Z Yazar&#160;Anson, Steve.<br/>Yer Numaras&#305;&#160;QA76.9 .A25<br/>Elektronik Eri&#351;im&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119560302">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119560302</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Cybersecurity blue team toolkit ent://SD_ILS/0/SD_ILS:595209 2026-01-21T03:28:22Z 2026-01-21T03:28:22Z Yazar&#160;Tanner, Nadean H., author.<br/>Yer Numaras&#305;&#160;QA76.9 .A25 T36 2019 EB<br/>Elektronik Eri&#351;im&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119552963">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119552963</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Cyber-vigilance and digital trust : cyber security in the era of cloud computing and IoT ent://SD_ILS/0/SD_ILS:595279 2026-01-21T03:28:22Z 2026-01-21T03:28:22Z Yazar&#160;Tounsi, Wiem, editor.<br/>Yer Numaras&#305;&#160;QA76.9 .A25 C93 2019 EB<br/>Elektronik Eri&#351;im&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119618393">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119618393</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Digital forensics ent://SD_ILS/0/SD_ILS:593346 2026-01-21T03:28:22Z 2026-01-21T03:28:22Z Yazar&#160;&Aring;rnes, Andr&eacute;, 1976- editor.<br/>Yer Numaras&#305;&#160;HV8079 .C65<br/>Elektronik Eri&#351;im&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119262442">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119262442</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Wireshark for security professionals : using Wireshark and the Metasploit Framework ent://SD_ILS/0/SD_ILS:593472 2026-01-21T03:28:22Z 2026-01-21T03:28:22Z Yazar&#160;Bullock, Jessey, author.&#160;Gordon, Adam, author.<br/>Yer Numaras&#305;&#160;QA76.9 .A25<br/>Elektronik Eri&#351;im&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119183457">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119183457</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Cybersecurity essentials ent://SD_ILS/0/SD_ILS:594756 2026-01-21T03:28:22Z 2026-01-21T03:28:22Z Yazar&#160;Brooks, Charles J., author.&#160;Grow, Christopher, author.&#160;Craig, Philip, author.&#160;Short, Donald, author.<br/>Yer Numaras&#305;&#160;TK5105.59<br/>Elektronik Eri&#351;im&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119369141">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119369141</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> The state of the art in intrusion prevention and detection ent://SD_ILS/0/SD_ILS:543676 2026-01-21T03:28:22Z 2026-01-21T03:28:22Z Yazar&#160;Pathan, Al-Sakib Khan, editor.<br/>Yer Numaras&#305;&#160;QA76.9 .A25 S7354 2014<br/>Elektronik Eri&#351;im&#160;<a href="https://www.taylorfrancis.com/books/9781482203523">Click here to view.</a><br/>Format:&#160;Kitap<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Digital privacy : theory, technologies, and practices ent://SD_ILS/0/SD_ILS:547774 2026-01-21T03:28:22Z 2026-01-21T03:28:22Z Yazar&#160;Acquisti, Alessandro.<br/>Yer Numaras&#305;&#160;QA76.9 .A25 D528 2008<br/>Elektronik Eri&#351;im&#160;<a href="https://www.taylorfrancis.com/books/9781420052183">Click here to view.</a><br/>Format:&#160;Kitap<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Information security : design, implementation, measurement, and compliance ent://SD_ILS/0/SD_ILS:545839 2026-01-21T03:28:22Z 2026-01-21T03:28:22Z Yazar&#160;Layton, Timothy P., author.<br/>Yer Numaras&#305;&#160;HF5548.37 .L393 2007<br/>Elektronik Eri&#351;im&#160;<a href="https://www.taylorfrancis.com/books/9781420013412">Click here to view.</a><br/>Format:&#160;Kitap<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Enhancing computer security with smart technology ent://SD_ILS/0/SD_ILS:544823 2026-01-21T03:28:22Z 2026-01-21T03:28:22Z Yazar&#160;Vemuri, V. Rao.<br/>Yer Numaras&#305;&#160;TK5105.59 .E62 2005<br/>Elektronik Eri&#351;im&#160;<a href="https://www.taylorfrancis.com/books/9781420031225">Click here to view.</a><br/>Format:&#160;Kitap<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/>