Basit öğe kaydını göster

dc.contributor.authorGul, Murat
dc.contributor.authorAydin, Muhammed Ali
dc.date.accessioned2021-03-03T18:54:15Z
dc.date.available2021-03-03T18:54:15Z
dc.identifier.citationGul M., Aydin M. A. , "Exploits in Information Security", 24th Signal Processing and Communication Application Conference (SIU), Zonguldak, Türkiye, 16 - 19 Mayıs 2016, ss.1729-1732
dc.identifier.othervv_1032021
dc.identifier.otherav_519eeca4-431e-4738-aab8-2b4107814f67
dc.identifier.urihttp://hdl.handle.net/20.500.12627/58012
dc.identifier.urihttps://doi.org/10.1109/siu.2016.7496093
dc.description.abstractAlmost the whole information that belongs to Goverment or private sector, Corporate or individual has been digitized currently. The computers which keep digitized information provides to use those information properly via applications such as database and web services. If necessary precautions hadn't been taken at individual or corporate level in both configuring network and applications, 'your information is not your own any more' can be said. In order to take necessary precautions, it will provide a great advantage to know the types of attacks and exploits and how they are made. In this perspective this paper is a survey about current attacks and exploits in which the types and how they exploit is explained with some basic examples.
dc.language.isoeng
dc.subjectSinyal İşleme
dc.subjectMühendislik ve Teknoloji
dc.subjectBilgi Sistemleri, Haberleşme ve Kontrol Mühendisliği
dc.subjectMühendislik, Bilişim ve Teknoloji (ENG)
dc.subjectMühendislik
dc.subjectMÜHENDİSLİK, ELEKTRİK VE ELEKTRONİK
dc.titleExploits in Information Security
dc.typeBildiri
dc.contributor.departmentHavaci & Uzay Teknol Enstitusu , ,
dc.contributor.firstauthorID148337


Bu öğenin dosyaları:

DosyalarBoyutBiçimGöster

Bu öğe ile ilişkili dosya yok.

Bu öğe aşağıdaki koleksiyon(lar)da görünmektedir.

Basit öğe kaydını göster