<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0">
	<channel>
		<title><![CDATA[YTÜ BM Haberleri (Doç.Dr. Ali Gökhan Yavuz >> Bilişim Sistemleri Güvenliği / 2014)]]></title>
		<link><![CDATA[http://ytuce.maliayas.com]]></link>
		<description><![CDATA[Bölüm sayfasında yayınlanan yazılara buradan erişebilirsiniz. (Doç.Dr. Ali Gökhan Yavuz >> Bilişim Sistemleri Güvenliği / 2014)]]></description>
		<language>tr-tr</language>
		<pubDate>Thu, 30 Apr 2026 13:20:07 +0300</pubDate>
		<lastBuildDate>Tue, 28 Apr 2026 10:43:46 +0300</lastBuildDate>
		<docs><![CDATA[http://cyber.law.harvard.edu/rss/rss.html]]></docs>
		<generator><![CDATA[MyFeedMachine v0.9.2]]></generator>
		<ttl>10</ttl>
		
		
		<item>
			<title><![CDATA[Doç.Dr. Ali Gökhan Yavuz >> Bilişim Sistemleri Güvenliği / 2014 >> 01-intro.pptx]]></title>
			<link><![CDATA[https://www.ce.yildiz.edu.tr/personal/gokhan/file/10561/01-intro.pptx]]></link>
			<pubDate><![CDATA[Thu, 14 Apr 2016 03:57:46 +0300]]></pubDate>
			<description><![CDATA[Course overview

<table class="file-info" border="1">
                        <tr>
                            <td style="background-color: #fff799;"><strong>DOSYA</strong></td>
                            <td>Format: pptx</td>
                            <td><a href="https://www.ce.yildiz.edu.tr/personal/gokhan/file/10561/01-intro.pptx" download>Kaynak link</a></td>
                            <td><span class="disabled">Arşiv kopyası</span></td>
                            <td><a target="_blank" href="https://docs.google.com/viewer?url=https%3A%2F%2Fwww.ce.yildiz.edu.tr%2Fpersonal%2Fgokhan%2Ffile%2F10561%2F01-intro.pptx">Tarayıcıda aç</a></td>
                        </tr>
                    </table>]]></description>
			<author><![CDATA[Doç.Dr. Ali Gökhan Yavuz >> Bilişim Sistemleri Güvenliği / 2014]]></author>
			<guid>13fea7cf7eb4502d8ad69671d0dc17a4</guid>
		</item>
		
		<item>
			<title><![CDATA[Doç.Dr. Ali Gökhan Yavuz >> Bilişim Sistemleri Güvenliği / 2014 >> 02-ctrl-hijacking.pptx]]></title>
			<link><![CDATA[https://www.ce.yildiz.edu.tr/personal/gokhan/file/10571/02-ctrl-hijacking.pptx]]></link>
			<pubDate><![CDATA[Thu, 14 Apr 2016 03:57:46 +0300]]></pubDate>
			<description><![CDATA[Control hijacking attacks: exploits and defenses

<table class="file-info" border="1">
                        <tr>
                            <td style="background-color: #fff799;"><strong>DOSYA</strong></td>
                            <td>Format: pptx</td>
                            <td><a href="https://www.ce.yildiz.edu.tr/personal/gokhan/file/10571/02-ctrl-hijacking.pptx" download>Kaynak link</a></td>
                            <td><span class="disabled">Arşiv kopyası</span></td>
                            <td><a target="_blank" href="https://docs.google.com/viewer?url=https%3A%2F%2Fwww.ce.yildiz.edu.tr%2Fpersonal%2Fgokhan%2Ffile%2F10571%2F02-ctrl-hijacking.pptx">Tarayıcıda aç</a></td>
                        </tr>
                    </table>]]></description>
			<author><![CDATA[Doç.Dr. Ali Gökhan Yavuz >> Bilişim Sistemleri Güvenliği / 2014]]></author>
			<guid>ea13b5bb7e2ef7fd8a80ea4aafbaf8c2</guid>
		</item>
		
		<item>
			<title><![CDATA[Doç.Dr. Ali Gökhan Yavuz >> Bilişim Sistemleri Güvenliği / 2014 >> 03-isolation.pptx]]></title>
			<link><![CDATA[https://www.ce.yildiz.edu.tr/personal/gokhan/file/10581/03-isolation.pptx]]></link>
			<pubDate><![CDATA[Thu, 14 Apr 2016 03:57:46 +0300]]></pubDate>
			<description><![CDATA[Dealing with legacy code: sandboxing and isolation

<table class="file-info" border="1">
                        <tr>
                            <td style="background-color: #fff799;"><strong>DOSYA</strong></td>
                            <td>Format: pptx</td>
                            <td><a href="https://www.ce.yildiz.edu.tr/personal/gokhan/file/10581/03-isolation.pptx" download>Kaynak link</a></td>
                            <td><span class="disabled">Arşiv kopyası</span></td>
                            <td><a target="_blank" href="https://docs.google.com/viewer?url=https%3A%2F%2Fwww.ce.yildiz.edu.tr%2Fpersonal%2Fgokhan%2Ffile%2F10581%2F03-isolation.pptx">Tarayıcıda aç</a></td>
                        </tr>
                    </table>]]></description>
			<author><![CDATA[Doç.Dr. Ali Gökhan Yavuz >> Bilişim Sistemleri Güvenliği / 2014]]></author>
			<guid>d3e22b002bc36a4698d96da7c12711fa</guid>
		</item>
		
		<item>
			<title><![CDATA[Doç.Dr. Ali Gökhan Yavuz >> Bilişim Sistemleri Güvenliği / 2014 >> 05-secure-architecture.pptx]]></title>
			<link><![CDATA[https://www.ce.yildiz.edu.tr/personal/gokhan/file/10591/05-secure-architecture.pptx]]></link>
			<pubDate><![CDATA[Thu, 14 Apr 2016 03:57:46 +0300]]></pubDate>
			<description><![CDATA[Principle of least privilege, access control, and operating systems security

<table class="file-info" border="1">
                        <tr>
                            <td style="background-color: #fff799;"><strong>DOSYA</strong></td>
                            <td>Format: pptx</td>
                            <td><a href="https://www.ce.yildiz.edu.tr/personal/gokhan/file/10591/05-secure-architecture.pptx" download>Kaynak link</a></td>
                            <td><span class="disabled">Arşiv kopyası</span></td>
                            <td><a target="_blank" href="https://docs.google.com/viewer?url=https%3A%2F%2Fwww.ce.yildiz.edu.tr%2Fpersonal%2Fgokhan%2Ffile%2F10591%2F05-secure-architecture.pptx">Tarayıcıda aç</a></td>
                        </tr>
                    </table>]]></description>
			<author><![CDATA[Doç.Dr. Ali Gökhan Yavuz >> Bilişim Sistemleri Güvenliği / 2014]]></author>
			<guid>2787b2ab888ed39a87190a79d74ba989</guid>
		</item>
		
		<item>
			<title><![CDATA[Doç.Dr. Ali Gökhan Yavuz >> Bilişim Sistemleri Güvenliği / 2014 >> 07-crypto.pptx]]></title>
			<link><![CDATA[https://www.ce.yildiz.edu.tr/personal/gokhan/file/10601/07-crypto.pptx]]></link>
			<pubDate><![CDATA[Thu, 14 Apr 2016 03:57:46 +0300]]></pubDate>
			<description><![CDATA[Overview of cryptography

<table class="file-info" border="1">
                        <tr>
                            <td style="background-color: #fff799;"><strong>DOSYA</strong></td>
                            <td>Format: pptx</td>
                            <td><a href="https://www.ce.yildiz.edu.tr/personal/gokhan/file/10601/07-crypto.pptx" download>Kaynak link</a></td>
                            <td><span class="disabled">Arşiv kopyası</span></td>
                            <td><a target="_blank" href="https://docs.google.com/viewer?url=https%3A%2F%2Fwww.ce.yildiz.edu.tr%2Fpersonal%2Fgokhan%2Ffile%2F10601%2F07-crypto.pptx">Tarayıcıda aç</a></td>
                        </tr>
                    </table>]]></description>
			<author><![CDATA[Doç.Dr. Ali Gökhan Yavuz >> Bilişim Sistemleri Güvenliği / 2014]]></author>
			<guid>c0678fe57bd197b0a7ac5c0287f09273</guid>
		</item>
		
		<item>
			<title><![CDATA[Doç.Dr. Ali Gökhan Yavuz >> Bilişim Sistemleri Güvenliği / 2014 >> 08-browser-sec-model.pptx]]></title>
			<link><![CDATA[https://www.ce.yildiz.edu.tr/personal/gokhan/file/10611/08-browser-sec-model.pptx]]></link>
			<pubDate><![CDATA[Thu, 14 Apr 2016 03:57:46 +0300]]></pubDate>
			<description><![CDATA[Basic web security model

<table class="file-info" border="1">
                        <tr>
                            <td style="background-color: #fff799;"><strong>DOSYA</strong></td>
                            <td>Format: pptx</td>
                            <td><a href="https://www.ce.yildiz.edu.tr/personal/gokhan/file/10611/08-browser-sec-model.pptx" download>Kaynak link</a></td>
                            <td><span class="disabled">Arşiv kopyası</span></td>
                            <td><a target="_blank" href="https://docs.google.com/viewer?url=https%3A%2F%2Fwww.ce.yildiz.edu.tr%2Fpersonal%2Fgokhan%2Ffile%2F10611%2F08-browser-sec-model.pptx">Tarayıcıda aç</a></td>
                        </tr>
                    </table>]]></description>
			<author><![CDATA[Doç.Dr. Ali Gökhan Yavuz >> Bilişim Sistemleri Güvenliği / 2014]]></author>
			<guid>bf38b926c059e0e9e92c4bea6b6a2f1c</guid>
		</item>
		
		<item>
			<title><![CDATA[Doç.Dr. Ali Gökhan Yavuz >> Bilişim Sistemleri Güvenliği / 2014 >> 09-web-site-sec.pptx]]></title>
			<link><![CDATA[https://www.ce.yildiz.edu.tr/personal/gokhan/file/10621/09-web-site-sec.pptx]]></link>
			<pubDate><![CDATA[Thu, 14 Apr 2016 03:57:46 +0300]]></pubDate>
			<description><![CDATA[Web application security

<table class="file-info" border="1">
                        <tr>
                            <td style="background-color: #fff799;"><strong>DOSYA</strong></td>
                            <td>Format: pptx</td>
                            <td><a href="https://www.ce.yildiz.edu.tr/personal/gokhan/file/10621/09-web-site-sec.pptx" download>Kaynak link</a></td>
                            <td><span class="disabled">Arşiv kopyası</span></td>
                            <td><a target="_blank" href="https://docs.google.com/viewer?url=https%3A%2F%2Fwww.ce.yildiz.edu.tr%2Fpersonal%2Fgokhan%2Ffile%2F10621%2F09-web-site-sec.pptx">Tarayıcıda aç</a></td>
                        </tr>
                    </table>]]></description>
			<author><![CDATA[Doç.Dr. Ali Gökhan Yavuz >> Bilişim Sistemleri Güvenliği / 2014]]></author>
			<guid>ac4e8456095b3a4c7e4f78d9aec09137</guid>
		</item>
		
		<item>
			<title><![CDATA[Doç.Dr. Ali Gökhan Yavuz >> Bilişim Sistemleri Güvenliği / 2014 >> 10-session-management.pptx]]></title>
			<link><![CDATA[https://www.ce.yildiz.edu.tr/personal/gokhan/file/10631/10-session-management.pptx]]></link>
			<pubDate><![CDATA[Thu, 14 Apr 2016 03:57:46 +0300]]></pubDate>
			<description><![CDATA[Session management and user authentication

<table class="file-info" border="1">
                        <tr>
                            <td style="background-color: #fff799;"><strong>DOSYA</strong></td>
                            <td>Format: pptx</td>
                            <td><a href="https://www.ce.yildiz.edu.tr/personal/gokhan/file/10631/10-session-management.pptx" download>Kaynak link</a></td>
                            <td><span class="disabled">Arşiv kopyası</span></td>
                            <td><a target="_blank" href="https://docs.google.com/viewer?url=https%3A%2F%2Fwww.ce.yildiz.edu.tr%2Fpersonal%2Fgokhan%2Ffile%2F10631%2F10-session-management.pptx">Tarayıcıda aç</a></td>
                        </tr>
                    </table>]]></description>
			<author><![CDATA[Doç.Dr. Ali Gökhan Yavuz >> Bilişim Sistemleri Güvenliği / 2014]]></author>
			<guid>8f8ba78ad15e4fa9e0a9f8e67189c4d3</guid>
		</item>
		
		<item>
			<title><![CDATA[Doç.Dr. Ali Gökhan Yavuz >> Bilişim Sistemleri Güvenliği / 2014 >> 13-tcp-dns.pptx]]></title>
			<link><![CDATA[https://www.ce.yildiz.edu.tr/personal/gokhan/file/10641/13-tcp-dns.pptx]]></link>
			<pubDate><![CDATA[Thu, 14 Apr 2016 03:57:46 +0300]]></pubDate>
			<description><![CDATA[Security issues in Internet protocols: TCP, DNS, and routing

<table class="file-info" border="1">
                        <tr>
                            <td style="background-color: #fff799;"><strong>DOSYA</strong></td>
                            <td>Format: pptx</td>
                            <td><a href="https://www.ce.yildiz.edu.tr/personal/gokhan/file/10641/13-tcp-dns.pptx" download>Kaynak link</a></td>
                            <td><span class="disabled">Arşiv kopyası</span></td>
                            <td><a target="_blank" href="https://docs.google.com/viewer?url=https%3A%2F%2Fwww.ce.yildiz.edu.tr%2Fpersonal%2Fgokhan%2Ffile%2F10641%2F13-tcp-dns.pptx">Tarayıcıda aç</a></td>
                        </tr>
                    </table>]]></description>
			<author><![CDATA[Doç.Dr. Ali Gökhan Yavuz >> Bilişim Sistemleri Güvenliği / 2014]]></author>
			<guid>a2546b82161a0eb2a46f70772b28383f</guid>
		</item>
		
		<item>
			<title><![CDATA[Doç.Dr. Ali Gökhan Yavuz >> Bilişim Sistemleri Güvenliği / 2014 >> 14-network-defense.pptx]]></title>
			<link><![CDATA[https://www.ce.yildiz.edu.tr/personal/gokhan/file/10651/14-network-defense.pptx]]></link>
			<pubDate><![CDATA[Thu, 14 Apr 2016 03:57:46 +0300]]></pubDate>
			<description><![CDATA[Network defense tools: Firewalls, VPNs, Intrusion Detection, and filters

<table class="file-info" border="1">
                        <tr>
                            <td style="background-color: #fff799;"><strong>DOSYA</strong></td>
                            <td>Format: pptx</td>
                            <td><a href="https://www.ce.yildiz.edu.tr/personal/gokhan/file/10651/14-network-defense.pptx" download>Kaynak link</a></td>
                            <td><span class="disabled">Arşiv kopyası</span></td>
                            <td><a target="_blank" href="https://docs.google.com/viewer?url=https%3A%2F%2Fwww.ce.yildiz.edu.tr%2Fpersonal%2Fgokhan%2Ffile%2F10651%2F14-network-defense.pptx">Tarayıcıda aç</a></td>
                        </tr>
                    </table>]]></description>
			<author><![CDATA[Doç.Dr. Ali Gökhan Yavuz >> Bilişim Sistemleri Güvenliği / 2014]]></author>
			<guid>5a4a26b64a412a870b90cdfa5fb2ea82</guid>
		</item>
		
		<item>
			<title><![CDATA[Doç.Dr. Ali Gökhan Yavuz >> Bilişim Sistemleri Güvenliği / 2014 >> 15-DDoS.pptx]]></title>
			<link><![CDATA[https://www.ce.yildiz.edu.tr/personal/gokhan/file/10661/15-DDoS.pptx]]></link>
			<pubDate><![CDATA[Thu, 14 Apr 2016 03:57:46 +0300]]></pubDate>
			<description><![CDATA[Unwanted traffic: denial of service attacks

<table class="file-info" border="1">
                        <tr>
                            <td style="background-color: #fff799;"><strong>DOSYA</strong></td>
                            <td>Format: pptx</td>
                            <td><a href="https://www.ce.yildiz.edu.tr/personal/gokhan/file/10661/15-DDoS.pptx" download>Kaynak link</a></td>
                            <td><span class="disabled">Arşiv kopyası</span></td>
                            <td><a target="_blank" href="https://docs.google.com/viewer?url=https%3A%2F%2Fwww.ce.yildiz.edu.tr%2Fpersonal%2Fgokhan%2Ffile%2F10661%2F15-DDoS.pptx">Tarayıcıda aç</a></td>
                        </tr>
                    </table>]]></description>
			<author><![CDATA[Doç.Dr. Ali Gökhan Yavuz >> Bilişim Sistemleri Güvenliği / 2014]]></author>
			<guid>3db81f0b4a4474017bec7c00c3a9d4b1</guid>
		</item>
		
		<item>
			<title><![CDATA[Doç.Dr. Ali Gökhan Yavuz >> Bilişim Sistemleri Güvenliği / 2014 >> 18-mobile2.pdf]]></title>
			<link><![CDATA[https://www.ce.yildiz.edu.tr/personal/gokhan/file/10671/18-mobile2.pdf]]></link>
			<pubDate><![CDATA[Thu, 14 Apr 2016 03:57:46 +0300]]></pubDate>
			<description><![CDATA[Mobile threats and malware

<table class="file-info" border="1">
                        <tr>
                            <td style="background-color: #fff799;"><strong>DOSYA</strong></td>
                            <td>Format: pdf</td>
                            <td><a href="https://www.ce.yildiz.edu.tr/personal/gokhan/file/10671/18-mobile2.pdf" download>Kaynak link</a></td>
                            <td><span class="disabled">Arşiv kopyası</span></td>
                            <td><a target="_blank" href="https://docs.google.com/viewer?url=https%3A%2F%2Fwww.ce.yildiz.edu.tr%2Fpersonal%2Fgokhan%2Ffile%2F10671%2F18-mobile2.pdf">Tarayıcıda aç</a></td>
                        </tr>
                    </table>]]></description>
			<author><![CDATA[Doç.Dr. Ali Gökhan Yavuz >> Bilişim Sistemleri Güvenliği / 2014]]></author>
			<guid>9a8b1ee22f9525debbff67a5348d7d69</guid>
		</item>
		
	</channel>
</rss>
