Arama Sonuçları systems analysis. - Daraltılmış: Security.
SirsiDynix Enterprise
https://katalog.hacettepe.edu.tr/client/tr_TR/default_tr/default_tr/qu$003dsystems$002banalysis.$0026qf$003dSUBJECT$002509Konu$002509Security.$002509Security.$0026ic$003dtrue$0026ps$003d300?
2026-01-21T18:24:22Z
The DevSecOps playbook : deliver continuous security at speed
ent://SD_ILS/0/SD_ILS:598634
2026-01-21T18:24:22Z
2026-01-21T18:24:22Z
Yazar Mack, Sean D., author.<br/>Yer Numarası QA76.9 .A25 M33 2024<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394189281">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394189281</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Practical cyber intelligence : a hands-on guide to digital forensics
ent://SD_ILS/0/SD_ILS:599262
2026-01-21T18:24:22Z
2026-01-21T18:24:22Z
Yazar Jakobsen, Adam Tilmar, author.<br/>Yer Numarası HV8079 .C65 J633 2024<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394256129">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394256129</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Cyber security and network security
ent://SD_ILS/0/SD_ILS:597484
2026-01-21T18:24:22Z
2026-01-21T18:24:22Z
Yazar Pramanik, Sabyasachi, editor. Samanta, Debabrata, 1987- editor. Vinay, M., editor. Guha, Abhijit, editor.<br/>Yer Numarası QA76.9 .A25<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119812555">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119812555</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Building secure cars : assuring the automotive software development lifecycle
ent://SD_ILS/0/SD_ILS:596310
2026-01-21T18:24:22Z
2026-01-21T18:24:22Z
Yazar Oka, Dennis Kengo, author.<br/>Yer Numarası TL272.53 .O42 2021<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119710783">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119710783</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Applied incident response
ent://SD_ILS/0/SD_ILS:595744
2026-01-21T18:24:22Z
2026-01-21T18:24:22Z
Yazar Anson, Steve.<br/>Yer Numarası QA76.9 .A25<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119560302">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119560302</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Hacking connected cars : tactics, techniques, and procedures
ent://SD_ILS/0/SD_ILS:595843
2026-01-21T18:24:22Z
2026-01-21T18:24:22Z
Yazar Knight, Alissa, author.<br/>Yer Numarası TL152.8 .K65 2020<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119491774">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119491774</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Cybersecurity blue team toolkit
ent://SD_ILS/0/SD_ILS:595209
2026-01-21T18:24:22Z
2026-01-21T18:24:22Z
Yazar Tanner, Nadean H., author.<br/>Yer Numarası QA76.9 .A25 T36 2019 EB<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119552963">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119552963</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Cyber-vigilance and digital trust : cyber security in the era of cloud computing and IoT
ent://SD_ILS/0/SD_ILS:595279
2026-01-21T18:24:22Z
2026-01-21T18:24:22Z
Yazar Tounsi, Wiem, editor.<br/>Yer Numarası QA76.9 .A25 C93 2019 EB<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119618393">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119618393</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Blockchain for distributed systems security
ent://SD_ILS/0/SD_ILS:595146
2026-01-21T18:24:22Z
2026-01-21T18:24:22Z
Yazar Shetty, Sachin, editor. Kamhoua, Charles A., edtior. Njilla, Laurent L., editor.<br/>Yer Numarası QA76.9 .B56 B56 2019 EB<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119519621">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119519621</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Wireshark for security professionals : using Wireshark and the Metasploit Framework
ent://SD_ILS/0/SD_ILS:593472
2026-01-21T18:24:22Z
2026-01-21T18:24:22Z
Yazar Bullock, Jessey, author. Gordon, Adam, author.<br/>Yer Numarası QA76.9 .A25<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119183457">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119183457</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Network forensics
ent://SD_ILS/0/SD_ILS:593814
2026-01-21T18:24:22Z
2026-01-21T18:24:22Z
Yazar Messier, Ric, author.<br/>Yer Numarası TK5105.59<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119329190">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119329190</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>