Now showing items 1-6 of 6

    • Fuzzy integrated vulnerability assessment model for critical facilities in combating the terrorism 

      Akgün, İlker; Kandakoğlu, Ahmet; Özok, Ahmet Fahri (Pergamon-Elsevier Science Ltd, The Boulevard, Langford Lane, Kidlington, Oxford Ox5 1Gb, England, 2010-05)
      Critical facility vulnerability assessment is a highly complex strategic activity in combating the terrorism and necessitates a structured quantified methodology to support the decision-making process in defense planning. ...
    • İsrail Ordusu ve İstihbarat Örgütleri 

      Yesevi, Çağla Gül (Ankara: Kripto Yayınevi, 2018)
      Kitabın ilk bölümünde, İsrail’in jeopolitik konumunun, siyasal, sosyal ve ekonomik yapısının genel değerlendirmesi yapılmıştır. İsrail’in güvenliğini etkileyen coğrafi, siyasal, sosyal ve ekonomik koşullar incelenmiştir.İkinci ...
    • İstanbul Emniyet Müdürü, Necdet Menzir ile söyleşi; "Güvenlik ve Eğitim" 

      Fındıkçı, İlhami (İstanbul Kültür Üniversitesi / Eğitim Fakültesi, 1993-11-07)
    • Survey on Access Control Mechanisms in Cloud Computing 

      Karataş, Gözde; Akbulut, Akhan (River Publishers, 2018-05-26)
      The benefits that Internet-based applications and services have given to the end user with today’s cloud computing technology are very remarkable. The distributed services instantly scaled over the Internet provided by ...
    • The Analysis On Position Of Security In Architecture 

      Moosavi, Seyed Mohammad Reza (The Turkish Online Journal of Design Art and Communication, 2016-08)
      The physical comfort is possible through appropriate access to energy and lack of pollution caused by it and living under favorable climatic conditions at suitable temperature and adequate humidity but in many cases ...
    • VinJect: Toolkit for Penetration Testing and Vulnerability Scanning 

      Akbulut, Akhan (2018)
      Penetration testing plays an important role in the development of secure software products and electronic systems. Sustainability of commercial systems is ensured through the regular scans of vulnerability. In this era ...