Search Results for - Narrowed by: On Shelf - Computer security. SirsiDynix Enterprise https://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dLOCATION$002509Shelf$002bLocation$0025091$00253ARAFTA$002509On$002bShelf$0026qf$003dSUBJECT$002509Subject$002509Computer$002bsecurity.$002509Computer$002bsecurity.$0026ps$003d300$0026isd$003dtrue? 2024-06-25T16:55:22Z Uygulamalı siber g&uuml;venlik ve hacking ent://SD_ILS/0/SD_ILS:2343031 2024-06-25T16:55:22Z 2024-06-25T16:55:22Z by&#160;Altınkaynak, Mustafa, author<br/>Format:&#160;Books<br/> The complete book of data anonymization : from planning to implementation ent://SD_ILS/0/SD_ILS:409830 2024-06-25T16:55:22Z 2024-06-25T16:55:22Z by&#160;Raghunathan, Balaji, author.<br/>Format:&#160;Books<br/> Hacking Interface ent://SD_ILS/0/SD_ILS:468252 2024-06-25T16:55:22Z 2024-06-25T16:55:22Z by&#160;Elbahadır, Hamza, author.<br/>Format:&#160;Books<br/> Afet durumunda kamuda veri g&uuml;venliği ent://SD_ILS/0/SD_ILS:430493 2024-06-25T16:55:22Z 2024-06-25T16:55:22Z by&#160;İstanbul İl &Ouml;zel İdaresi<br/>Format:&#160;Books<br/> The tangled Web: a guide to securing modern Web applications ent://SD_ILS/0/SD_ILS:256341 2024-06-25T16:55:22Z 2024-06-25T16:55:22Z by&#160;Zalewski, Michal.<br/>Format:&#160;Books<br/> 10 adımda bilgisayar g&uuml;venliği ent://SD_ILS/0/SD_ILS:468253 2024-06-25T16:55:22Z 2024-06-25T16:55:22Z by&#160;Gelişken, Uğur, author.<br/>Format:&#160;Books<br/> Privacy-preserving data mining : models and algorithms ent://SD_ILS/0/SD_ILS:81396 2024-06-25T16:55:22Z 2024-06-25T16:55:22Z by&#160;Aggarwal, Charu C.<br/>Format:&#160;Books<br/> Panoptikon g&ouml;z&uuml;n iktidarı =b Panoptikon : vart gjennomsiktige samfunn ent://SD_ILS/0/SD_ILS:85741 2024-06-25T16:55:22Z 2024-06-25T16:55:22Z by&#160;Apenes, Georg.<br/>Format:&#160;Books<br/> Nmap network scanning : official Nmap project guide to network discovery and security scanning ent://SD_ILS/0/SD_ILS:129103 2024-06-25T16:55:22Z 2024-06-25T16:55:22Z by&#160;Lyon, Gordon Fyodor.<br/>Format:&#160;Books<br/> Teori ve uygulamalar ile TCP/IP ağ g&uuml;venliği / Can Okan Dirican. ent://SD_ILS/0/SD_ILS:79009 2024-06-25T16:55:22Z 2024-06-25T16:55:22Z by&#160;Dirican, Can Okan.<br/>Format:&#160;Books<br/> Core security patterns : best practices and strategies for J2EE, Web services, and identity management ent://SD_ILS/0/SD_ILS:48024 2024-06-25T16:55:22Z 2024-06-25T16:55:22Z by&#160;Steel, Christopher, 1968-<br/>Table of contents <a href="http://www.loc.gov/catdir/toc/ecip0516/2005020502.html">http://www.loc.gov/catdir/toc/ecip0516/2005020502.html</a><br/>Format:&#160;Books<br/> Aldatma sanatı: g&uuml;venliğin insan boyutunun kullanılması ent://SD_ILS/0/SD_ILS:256402 2024-06-25T16:55:22Z 2024-06-25T16:55:22Z by&#160;Mitnick, Kevin D. (Kevin David), 1963- author<br/>Format:&#160;Books<br/> Windows, Linux, BSD i&ccedil;in ağ g&uuml;venliği ipu&ccedil;ları : 100 etkin g&uuml;venlik tekniği ent://SD_ILS/0/SD_ILS:18875 2024-06-25T16:55:22Z 2024-06-25T16:55:22Z by&#160;Lockhart, Andrew.<br/>Format:&#160;Books<br/> 19 deadly sins of software security : programming flaws and how to fix them ent://SD_ILS/0/SD_ILS:80634 2024-06-25T16:55:22Z 2024-06-25T16:55:22Z by&#160;Howard, Michael, 1965-<br/>Contributor biographical information <a href="http://www.loc.gov/catdir/enhancements/fy0645/2006274475-b.html">http://www.loc.gov/catdir/enhancements/fy0645/2006274475-b.html</a> Publisher description <a href="http://www.loc.gov/catdir/enhancements/fy0645/2006274475-d.html">http://www.loc.gov/catdir/enhancements/fy0645/2006274475-d.html</a><br/>Format:&#160;Books<br/> Security awareness : applying practical security in your world ent://SD_ILS/0/SD_ILS:2335737 2024-06-25T16:55:22Z 2024-06-25T16:55:22Z by&#160;Ciampa, Mark D., author<br/>Format:&#160;Books<br/> Network intrusion detection ent://SD_ILS/0/SD_ILS:12188 2024-06-25T16:55:22Z 2024-06-25T16:55:22Z by&#160;Northcutt, Stephen.<br/>Format:&#160;Books<br/> Hacking Linux exposed ent://SD_ILS/0/SD_ILS:15945 2024-06-25T16:55:22Z 2024-06-25T16:55:22Z by&#160;Hatch, Brian.<br/>Format:&#160;Books<br/> Hacking Linux exposed ent://SD_ILS/0/SD_ILS:47680 2024-06-25T16:55:22Z 2024-06-25T16:55:22Z by&#160;Hatch, Brian.<br/>Contributor biographical information <a href="http://www.loc.gov/catdir/bios/mh042/2003269974.html">http://www.loc.gov/catdir/bios/mh042/2003269974.html</a> Publisher description <a href="http://www.loc.gov/catdir/description/mh031/2003269974.html">http://www.loc.gov/catdir/description/mh031/2003269974.html</a> Table of contents <a href="http://www.loc.gov/catdir/toc/mh031/2003269974.html">http://www.loc.gov/catdir/toc/mh031/2003269974.html</a><br/>Format:&#160;Books<br/> Snort 2.0 intrusion detection. ent://SD_ILS/0/SD_ILS:14618 2024-06-25T16:55:22Z 2024-06-25T16:55:22Z by&#160;Beale, Jay.<br/>Format:&#160;Books<br/> Computer security: art and science ent://SD_ILS/0/SD_ILS:11398 2024-06-25T16:55:22Z 2024-06-25T16:55:22Z by&#160;Bishop, Matt.<br/>Format:&#160;Books<br/> Cryptanalysis of number theretic ciphers ent://SD_ILS/0/SD_ILS:11983 2024-06-25T16:55:22Z 2024-06-25T16:55:22Z by&#160;Wagstaff, Samuel S.<br/>Format:&#160;Books<br/> The CERT guide to system and network security practices ent://SD_ILS/0/SD_ILS:11798 2024-06-25T16:55:22Z 2024-06-25T16:55:22Z by&#160;Allen, Julia H.<br/>Format:&#160;Books<br/> Intrusion signatures and analysis ent://SD_ILS/0/SD_ILS:11497 2024-06-25T16:55:22Z 2024-06-25T16:55:22Z by&#160;Northcutt, Stephen.<br/>Format:&#160;Books<br/> Computer security ent://SD_ILS/0/SD_ILS:11439 2024-06-25T16:55:22Z 2024-06-25T16:55:22Z by&#160;Gollmann, Dieter<br/>Format:&#160;Books<br/> E-policy: how to develop computer, E-mail, and internet guidelines to protect your company and its assets ent://SD_ILS/0/SD_ILS:11740 2024-06-25T16:55:22Z 2024-06-25T16:55:22Z by&#160;Overly, Michael R.<br/>Format:&#160;Books<br/> Fighting computer crime : a new framework for protecting information ent://SD_ILS/0/SD_ILS:7245 2024-06-25T16:55:22Z 2024-06-25T16:55:22Z by&#160;Parker, Donn B.<br/>Format:&#160;Books<br/> Security in distributed computing : did you lock the door? ent://SD_ILS/0/SD_ILS:255763 2024-06-25T16:55:22Z 2024-06-25T16:55:22Z by&#160;Bruce, Glen.<br/>Format:&#160;Books<br/> LAN Times guide to security and data integrity= Guide to security and data integrity ent://SD_ILS/0/SD_ILS:1316 2024-06-25T16:55:22Z 2024-06-25T16:55:22Z by&#160;Farley, Marc.<br/>Format:&#160;Books<br/> Computer communications security :principles, standard protocols and techniques ent://SD_ILS/0/SD_ILS:4883 2024-06-25T16:55:22Z 2024-06-25T16:55:22Z by&#160;Ford, Warwick.<br/>Format:&#160;Books<br/>