Search Results for - Narrowed by: On Shelf - Computer security.SirsiDynix Enterprisehttps://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dLOCATION$002509Shelf$002bLocation$0025091$00253ARAFTA$002509On$002bShelf$0026qf$003dSUBJECT$002509Subject$002509Computer$002bsecurity.$002509Computer$002bsecurity.$0026ps$003d300$0026isd$003dtrue?2024-06-25T16:55:22ZUygulamalı siber güvenlik ve hackingent://SD_ILS/0/SD_ILS:23430312024-06-25T16:55:22Z2024-06-25T16:55:22Zby Altınkaynak, Mustafa, author<br/>Format: Books<br/>The complete book of data anonymization : from planning to implementationent://SD_ILS/0/SD_ILS:4098302024-06-25T16:55:22Z2024-06-25T16:55:22Zby Raghunathan, Balaji, author.<br/>Format: Books<br/>Hacking Interfaceent://SD_ILS/0/SD_ILS:4682522024-06-25T16:55:22Z2024-06-25T16:55:22Zby Elbahadır, Hamza, author.<br/>Format: Books<br/>Afet durumunda kamuda veri güvenliğient://SD_ILS/0/SD_ILS:4304932024-06-25T16:55:22Z2024-06-25T16:55:22Zby İstanbul İl Özel İdaresi<br/>Format: Books<br/>The tangled Web: a guide to securing modern Web applicationsent://SD_ILS/0/SD_ILS:2563412024-06-25T16:55:22Z2024-06-25T16:55:22Zby Zalewski, Michal.<br/>Format: Books<br/>10 adımda bilgisayar güvenliğient://SD_ILS/0/SD_ILS:4682532024-06-25T16:55:22Z2024-06-25T16:55:22Zby Gelişken, Uğur, author.<br/>Format: Books<br/>Privacy-preserving data mining : models and algorithmsent://SD_ILS/0/SD_ILS:813962024-06-25T16:55:22Z2024-06-25T16:55:22Zby Aggarwal, Charu C.<br/>Format: Books<br/>Panoptikon gözün iktidarı =b Panoptikon : vart gjennomsiktige samfunnent://SD_ILS/0/SD_ILS:857412024-06-25T16:55:22Z2024-06-25T16:55:22Zby Apenes, Georg.<br/>Format: Books<br/>Nmap network scanning : official Nmap project guide to network discovery and security scanningent://SD_ILS/0/SD_ILS:1291032024-06-25T16:55:22Z2024-06-25T16:55:22Zby Lyon, Gordon Fyodor.<br/>Format: Books<br/>Teori ve uygulamalar ile TCP/IP ağ güvenliği / Can Okan Dirican.ent://SD_ILS/0/SD_ILS:790092024-06-25T16:55:22Z2024-06-25T16:55:22Zby Dirican, Can Okan.<br/>Format: Books<br/>Core security patterns : best practices and strategies for J2EE, Web services, and identity managementent://SD_ILS/0/SD_ILS:480242024-06-25T16:55:22Z2024-06-25T16:55:22Zby Steel, Christopher, 1968-<br/>Table of contents <a href="http://www.loc.gov/catdir/toc/ecip0516/2005020502.html">http://www.loc.gov/catdir/toc/ecip0516/2005020502.html</a><br/>Format: Books<br/>Aldatma sanatı: güvenliğin insan boyutunun kullanılmasıent://SD_ILS/0/SD_ILS:2564022024-06-25T16:55:22Z2024-06-25T16:55:22Zby Mitnick, Kevin D. (Kevin David), 1963- author<br/>Format: Books<br/>Windows, Linux, BSD için ağ güvenliği ipuçları : 100 etkin güvenlik tekniğient://SD_ILS/0/SD_ILS:188752024-06-25T16:55:22Z2024-06-25T16:55:22Zby Lockhart, Andrew.<br/>Format: Books<br/>19 deadly sins of software security : programming flaws and how to fix thement://SD_ILS/0/SD_ILS:806342024-06-25T16:55:22Z2024-06-25T16:55:22Zby Howard, Michael, 1965-<br/>Contributor biographical information <a href="http://www.loc.gov/catdir/enhancements/fy0645/2006274475-b.html">http://www.loc.gov/catdir/enhancements/fy0645/2006274475-b.html</a>
Publisher description <a href="http://www.loc.gov/catdir/enhancements/fy0645/2006274475-d.html">http://www.loc.gov/catdir/enhancements/fy0645/2006274475-d.html</a><br/>Format: Books<br/>Security awareness : applying practical security in your worldent://SD_ILS/0/SD_ILS:23357372024-06-25T16:55:22Z2024-06-25T16:55:22Zby Ciampa, Mark D., author<br/>Format: Books<br/>Network intrusion detectionent://SD_ILS/0/SD_ILS:121882024-06-25T16:55:22Z2024-06-25T16:55:22Zby Northcutt, Stephen.<br/>Format: Books<br/>Hacking Linux exposedent://SD_ILS/0/SD_ILS:159452024-06-25T16:55:22Z2024-06-25T16:55:22Zby Hatch, Brian.<br/>Format: Books<br/>Hacking Linux exposedent://SD_ILS/0/SD_ILS:476802024-06-25T16:55:22Z2024-06-25T16:55:22Zby Hatch, Brian.<br/>Contributor biographical information <a href="http://www.loc.gov/catdir/bios/mh042/2003269974.html">http://www.loc.gov/catdir/bios/mh042/2003269974.html</a>
Publisher description <a href="http://www.loc.gov/catdir/description/mh031/2003269974.html">http://www.loc.gov/catdir/description/mh031/2003269974.html</a>
Table of contents <a href="http://www.loc.gov/catdir/toc/mh031/2003269974.html">http://www.loc.gov/catdir/toc/mh031/2003269974.html</a><br/>Format: Books<br/>Snort 2.0 intrusion detection.ent://SD_ILS/0/SD_ILS:146182024-06-25T16:55:22Z2024-06-25T16:55:22Zby Beale, Jay.<br/>Format: Books<br/>Computer security: art and scienceent://SD_ILS/0/SD_ILS:113982024-06-25T16:55:22Z2024-06-25T16:55:22Zby Bishop, Matt.<br/>Format: Books<br/>Cryptanalysis of number theretic ciphersent://SD_ILS/0/SD_ILS:119832024-06-25T16:55:22Z2024-06-25T16:55:22Zby Wagstaff, Samuel S.<br/>Format: Books<br/>The CERT guide to system and network security practicesent://SD_ILS/0/SD_ILS:117982024-06-25T16:55:22Z2024-06-25T16:55:22Zby Allen, Julia H.<br/>Format: Books<br/>Intrusion signatures and analysisent://SD_ILS/0/SD_ILS:114972024-06-25T16:55:22Z2024-06-25T16:55:22Zby Northcutt, Stephen.<br/>Format: Books<br/>Computer securityent://SD_ILS/0/SD_ILS:114392024-06-25T16:55:22Z2024-06-25T16:55:22Zby Gollmann, Dieter<br/>Format: Books<br/>E-policy: how to develop computer, E-mail, and internet guidelines to protect your company and its assetsent://SD_ILS/0/SD_ILS:117402024-06-25T16:55:22Z2024-06-25T16:55:22Zby Overly, Michael R.<br/>Format: Books<br/>Fighting computer crime : a new framework for protecting informationent://SD_ILS/0/SD_ILS:72452024-06-25T16:55:22Z2024-06-25T16:55:22Zby Parker, Donn B.<br/>Format: Books<br/>Security in distributed computing : did you lock the door?ent://SD_ILS/0/SD_ILS:2557632024-06-25T16:55:22Z2024-06-25T16:55:22Zby Bruce, Glen.<br/>Format: Books<br/>LAN Times guide to security and data integrity= Guide to security and data integrityent://SD_ILS/0/SD_ILS:13162024-06-25T16:55:22Z2024-06-25T16:55:22Zby Farley, Marc.<br/>Format: Books<br/>Computer communications security :principles, standard protocols and techniquesent://SD_ILS/0/SD_ILS:48832024-06-25T16:55:22Z2024-06-25T16:55:22Zby Ford, Warwick.<br/>Format: Books<br/>