<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0">
	<channel>
		<title><![CDATA[YTÜ BM Haberleri (Doç.Dr. Ali Gökhan Yavuz >> Bilgisayar Sistemleri ve Ağ Güvenliği / John Mitchell / 2014)]]></title>
		<link><![CDATA[http://ytuce.maliayas.com]]></link>
		<description><![CDATA[Bölüm sayfasında yayınlanan yazılara buradan erişebilirsiniz. (Doç.Dr. Ali Gökhan Yavuz >> Bilgisayar Sistemleri ve Ağ Güvenliği / John Mitchell / 2014)]]></description>
		<language>tr-tr</language>
		<pubDate>Thu, 30 Apr 2026 14:36:07 +0300</pubDate>
		<lastBuildDate>Tue, 28 Apr 2026 10:43:46 +0300</lastBuildDate>
		<docs><![CDATA[http://cyber.law.harvard.edu/rss/rss.html]]></docs>
		<generator><![CDATA[MyFeedMachine v0.9.2]]></generator>
		<ttl>10</ttl>
		
		
		<item>
			<title><![CDATA[Doç.Dr. Ali Gökhan Yavuz >> Bilgisayar Sistemleri ve Ağ Güvenliği / John Mitchell / 2014 >> 01-intro.pptx]]></title>
			<link><![CDATA[https://www.ce.yildiz.edu.tr/personal/gokhan/file/10391/01-intro.pptx]]></link>
			<pubDate><![CDATA[Thu, 14 Apr 2016 03:56:39 +0300]]></pubDate>
			<description><![CDATA[Course overview

<table class="file-info" border="1">
                        <tr>
                            <td style="background-color: #fff799;"><strong>DOSYA</strong></td>
                            <td>Format: pptx</td>
                            <td><a href="https://www.ce.yildiz.edu.tr/personal/gokhan/file/10391/01-intro.pptx" download>Kaynak link</a></td>
                            <td><span class="disabled">Arşiv kopyası</span></td>
                            <td><a target="_blank" href="https://docs.google.com/viewer?url=https%3A%2F%2Fwww.ce.yildiz.edu.tr%2Fpersonal%2Fgokhan%2Ffile%2F10391%2F01-intro.pptx">Tarayıcıda aç</a></td>
                        </tr>
                    </table>]]></description>
			<author><![CDATA[Doç.Dr. Ali Gökhan Yavuz >> Bilgisayar Sistemleri ve Ağ Güvenliği / John Mitchell / 2014]]></author>
			<guid>7ac3e71277dfcb4838502140679bdc65</guid>
		</item>
		
		<item>
			<title><![CDATA[Doç.Dr. Ali Gökhan Yavuz >> Bilgisayar Sistemleri ve Ağ Güvenliği / John Mitchell / 2014 >> 02-ctrl-hijacking.pptx]]></title>
			<link><![CDATA[https://www.ce.yildiz.edu.tr/personal/gokhan/file/10401/02-ctrl-hijacking.pptx]]></link>
			<pubDate><![CDATA[Thu, 14 Apr 2016 03:56:39 +0300]]></pubDate>
			<description><![CDATA[Control hijacking attacks: exploits and defenses

<table class="file-info" border="1">
                        <tr>
                            <td style="background-color: #fff799;"><strong>DOSYA</strong></td>
                            <td>Format: pptx</td>
                            <td><a href="https://www.ce.yildiz.edu.tr/personal/gokhan/file/10401/02-ctrl-hijacking.pptx" download>Kaynak link</a></td>
                            <td><span class="disabled">Arşiv kopyası</span></td>
                            <td><a target="_blank" href="https://docs.google.com/viewer?url=https%3A%2F%2Fwww.ce.yildiz.edu.tr%2Fpersonal%2Fgokhan%2Ffile%2F10401%2F02-ctrl-hijacking.pptx">Tarayıcıda aç</a></td>
                        </tr>
                    </table>]]></description>
			<author><![CDATA[Doç.Dr. Ali Gökhan Yavuz >> Bilgisayar Sistemleri ve Ağ Güvenliği / John Mitchell / 2014]]></author>
			<guid>c07c534cd528ed3057250e9c4828ea9e</guid>
		</item>
		
		<item>
			<title><![CDATA[Doç.Dr. Ali Gökhan Yavuz >> Bilgisayar Sistemleri ve Ağ Güvenliği / John Mitchell / 2014 >> 03-isolation.pptx]]></title>
			<link><![CDATA[https://www.ce.yildiz.edu.tr/personal/gokhan/file/10411/03-isolation.pptx]]></link>
			<pubDate><![CDATA[Thu, 14 Apr 2016 03:56:39 +0300]]></pubDate>
			<description><![CDATA[Dealing with legacy code: sandboxing and isolation

<table class="file-info" border="1">
                        <tr>
                            <td style="background-color: #fff799;"><strong>DOSYA</strong></td>
                            <td>Format: pptx</td>
                            <td><a href="https://www.ce.yildiz.edu.tr/personal/gokhan/file/10411/03-isolation.pptx" download>Kaynak link</a></td>
                            <td><span class="disabled">Arşiv kopyası</span></td>
                            <td><a target="_blank" href="https://docs.google.com/viewer?url=https%3A%2F%2Fwww.ce.yildiz.edu.tr%2Fpersonal%2Fgokhan%2Ffile%2F10411%2F03-isolation.pptx">Tarayıcıda aç</a></td>
                        </tr>
                    </table>]]></description>
			<author><![CDATA[Doç.Dr. Ali Gökhan Yavuz >> Bilgisayar Sistemleri ve Ağ Güvenliği / John Mitchell / 2014]]></author>
			<guid>cb1f48e4a0f01860ef9e585f79d06509</guid>
		</item>
		
		<item>
			<title><![CDATA[Doç.Dr. Ali Gökhan Yavuz >> Bilgisayar Sistemleri ve Ağ Güvenliği / John Mitchell / 2014 >> 04-program-tools.pptx]]></title>
			<link><![CDATA[https://www.ce.yildiz.edu.tr/personal/gokhan/file/10421/04-program-tools.pptx]]></link>
			<pubDate><![CDATA[Thu, 14 Apr 2016 03:56:39 +0300]]></pubDate>
			<description><![CDATA[Tools for writing robust application code

<table class="file-info" border="1">
                        <tr>
                            <td style="background-color: #fff799;"><strong>DOSYA</strong></td>
                            <td>Format: pptx</td>
                            <td><a href="https://www.ce.yildiz.edu.tr/personal/gokhan/file/10421/04-program-tools.pptx" download>Kaynak link</a></td>
                            <td><span class="disabled">Arşiv kopyası</span></td>
                            <td><a target="_blank" href="https://docs.google.com/viewer?url=https%3A%2F%2Fwww.ce.yildiz.edu.tr%2Fpersonal%2Fgokhan%2Ffile%2F10421%2F04-program-tools.pptx">Tarayıcıda aç</a></td>
                        </tr>
                    </table>]]></description>
			<author><![CDATA[Doç.Dr. Ali Gökhan Yavuz >> Bilgisayar Sistemleri ve Ağ Güvenliği / John Mitchell / 2014]]></author>
			<guid>dcbe6866c3a563e406d7ab0d416b35d9</guid>
		</item>
		
		<item>
			<title><![CDATA[Doç.Dr. Ali Gökhan Yavuz >> Bilgisayar Sistemleri ve Ağ Güvenliği / John Mitchell / 2014 >> 05-secure-architecture.pptx]]></title>
			<link><![CDATA[https://www.ce.yildiz.edu.tr/personal/gokhan/file/10431/05-secure-architecture.pptx]]></link>
			<pubDate><![CDATA[Thu, 14 Apr 2016 03:56:39 +0300]]></pubDate>
			<description><![CDATA[Principle of least privilege, access control, and operating systems security

<table class="file-info" border="1">
                        <tr>
                            <td style="background-color: #fff799;"><strong>DOSYA</strong></td>
                            <td>Format: pptx</td>
                            <td><a href="https://www.ce.yildiz.edu.tr/personal/gokhan/file/10431/05-secure-architecture.pptx" download>Kaynak link</a></td>
                            <td><span class="disabled">Arşiv kopyası</span></td>
                            <td><a target="_blank" href="https://docs.google.com/viewer?url=https%3A%2F%2Fwww.ce.yildiz.edu.tr%2Fpersonal%2Fgokhan%2Ffile%2F10431%2F05-secure-architecture.pptx">Tarayıcıda aç</a></td>
                        </tr>
                    </table>]]></description>
			<author><![CDATA[Doç.Dr. Ali Gökhan Yavuz >> Bilgisayar Sistemleri ve Ağ Güvenliği / John Mitchell / 2014]]></author>
			<guid>d19f8379e0b30cc3cae50360e8f7983a</guid>
		</item>
		
		<item>
			<title><![CDATA[Doç.Dr. Ali Gökhan Yavuz >> Bilgisayar Sistemleri ve Ağ Güvenliği / John Mitchell / 2014 >> 06-fuzzing.pptx]]></title>
			<link><![CDATA[https://www.ce.yildiz.edu.tr/personal/gokhan/file/10441/06-fuzzing.pptx]]></link>
			<pubDate><![CDATA[Thu, 14 Apr 2016 03:56:39 +0300]]></pubDate>
			<description><![CDATA[Exploitation techniques and fuzzing

<table class="file-info" border="1">
                        <tr>
                            <td style="background-color: #fff799;"><strong>DOSYA</strong></td>
                            <td>Format: pptx</td>
                            <td><a href="https://www.ce.yildiz.edu.tr/personal/gokhan/file/10441/06-fuzzing.pptx" download>Kaynak link</a></td>
                            <td><span class="disabled">Arşiv kopyası</span></td>
                            <td><a target="_blank" href="https://docs.google.com/viewer?url=https%3A%2F%2Fwww.ce.yildiz.edu.tr%2Fpersonal%2Fgokhan%2Ffile%2F10441%2F06-fuzzing.pptx">Tarayıcıda aç</a></td>
                        </tr>
                    </table>]]></description>
			<author><![CDATA[Doç.Dr. Ali Gökhan Yavuz >> Bilgisayar Sistemleri ve Ağ Güvenliği / John Mitchell / 2014]]></author>
			<guid>700ebc612a4ad420a14ca7fde0a39a18</guid>
		</item>
		
		<item>
			<title><![CDATA[Doç.Dr. Ali Gökhan Yavuz >> Bilgisayar Sistemleri ve Ağ Güvenliği / John Mitchell / 2014 >> 07-crypto.pptx]]></title>
			<link><![CDATA[https://www.ce.yildiz.edu.tr/personal/gokhan/file/10451/07-crypto.pptx]]></link>
			<pubDate><![CDATA[Thu, 14 Apr 2016 03:56:39 +0300]]></pubDate>
			<description><![CDATA[Overview of cryptography

<table class="file-info" border="1">
                        <tr>
                            <td style="background-color: #fff799;"><strong>DOSYA</strong></td>
                            <td>Format: pptx</td>
                            <td><a href="https://www.ce.yildiz.edu.tr/personal/gokhan/file/10451/07-crypto.pptx" download>Kaynak link</a></td>
                            <td><span class="disabled">Arşiv kopyası</span></td>
                            <td><a target="_blank" href="https://docs.google.com/viewer?url=https%3A%2F%2Fwww.ce.yildiz.edu.tr%2Fpersonal%2Fgokhan%2Ffile%2F10451%2F07-crypto.pptx">Tarayıcıda aç</a></td>
                        </tr>
                    </table>]]></description>
			<author><![CDATA[Doç.Dr. Ali Gökhan Yavuz >> Bilgisayar Sistemleri ve Ağ Güvenliği / John Mitchell / 2014]]></author>
			<guid>753260f5f5349de0def086f3021c17fd</guid>
		</item>
		
		<item>
			<title><![CDATA[Doç.Dr. Ali Gökhan Yavuz >> Bilgisayar Sistemleri ve Ağ Güvenliği / John Mitchell / 2014 >> 08-browser-sec-model.pptx]]></title>
			<link><![CDATA[https://www.ce.yildiz.edu.tr/personal/gokhan/file/10461/08-browser-sec-model.pptx]]></link>
			<pubDate><![CDATA[Thu, 14 Apr 2016 03:56:39 +0300]]></pubDate>
			<description><![CDATA[Basic web security model

<table class="file-info" border="1">
                        <tr>
                            <td style="background-color: #fff799;"><strong>DOSYA</strong></td>
                            <td>Format: pptx</td>
                            <td><a href="https://www.ce.yildiz.edu.tr/personal/gokhan/file/10461/08-browser-sec-model.pptx" download>Kaynak link</a></td>
                            <td><span class="disabled">Arşiv kopyası</span></td>
                            <td><a target="_blank" href="https://docs.google.com/viewer?url=https%3A%2F%2Fwww.ce.yildiz.edu.tr%2Fpersonal%2Fgokhan%2Ffile%2F10461%2F08-browser-sec-model.pptx">Tarayıcıda aç</a></td>
                        </tr>
                    </table>]]></description>
			<author><![CDATA[Doç.Dr. Ali Gökhan Yavuz >> Bilgisayar Sistemleri ve Ağ Güvenliği / John Mitchell / 2014]]></author>
			<guid>322160a96be9ef5d014fba77c9b459e8</guid>
		</item>
		
		<item>
			<title><![CDATA[Doç.Dr. Ali Gökhan Yavuz >> Bilgisayar Sistemleri ve Ağ Güvenliği / John Mitchell / 2014 >> 09-web-site-sec.pptx]]></title>
			<link><![CDATA[https://www.ce.yildiz.edu.tr/personal/gokhan/file/10471/09-web-site-sec.pptx]]></link>
			<pubDate><![CDATA[Thu, 14 Apr 2016 03:56:39 +0300]]></pubDate>
			<description><![CDATA[Web application security

<table class="file-info" border="1">
                        <tr>
                            <td style="background-color: #fff799;"><strong>DOSYA</strong></td>
                            <td>Format: pptx</td>
                            <td><a href="https://www.ce.yildiz.edu.tr/personal/gokhan/file/10471/09-web-site-sec.pptx" download>Kaynak link</a></td>
                            <td><span class="disabled">Arşiv kopyası</span></td>
                            <td><a target="_blank" href="https://docs.google.com/viewer?url=https%3A%2F%2Fwww.ce.yildiz.edu.tr%2Fpersonal%2Fgokhan%2Ffile%2F10471%2F09-web-site-sec.pptx">Tarayıcıda aç</a></td>
                        </tr>
                    </table>]]></description>
			<author><![CDATA[Doç.Dr. Ali Gökhan Yavuz >> Bilgisayar Sistemleri ve Ağ Güvenliği / John Mitchell / 2014]]></author>
			<guid>ae462da6cbe794c50994c15afecc1e7c</guid>
		</item>
		
		<item>
			<title><![CDATA[Doç.Dr. Ali Gökhan Yavuz >> Bilgisayar Sistemleri ve Ağ Güvenliği / John Mitchell / 2014 >> 10-session-management.pptx]]></title>
			<link><![CDATA[https://www.ce.yildiz.edu.tr/personal/gokhan/file/10481/10-session-management.pptx]]></link>
			<pubDate><![CDATA[Thu, 14 Apr 2016 03:56:39 +0300]]></pubDate>
			<description><![CDATA[Session management and user authentication

<table class="file-info" border="1">
                        <tr>
                            <td style="background-color: #fff799;"><strong>DOSYA</strong></td>
                            <td>Format: pptx</td>
                            <td><a href="https://www.ce.yildiz.edu.tr/personal/gokhan/file/10481/10-session-management.pptx" download>Kaynak link</a></td>
                            <td><span class="disabled">Arşiv kopyası</span></td>
                            <td><a target="_blank" href="https://docs.google.com/viewer?url=https%3A%2F%2Fwww.ce.yildiz.edu.tr%2Fpersonal%2Fgokhan%2Ffile%2F10481%2F10-session-management.pptx">Tarayıcıda aç</a></td>
                        </tr>
                    </table>]]></description>
			<author><![CDATA[Doç.Dr. Ali Gökhan Yavuz >> Bilgisayar Sistemleri ve Ağ Güvenliği / John Mitchell / 2014]]></author>
			<guid>95a07bd227515cd38f022c75ed997289</guid>
		</item>
		
		<item>
			<title><![CDATA[Doç.Dr. Ali Gökhan Yavuz >> Bilgisayar Sistemleri ve Ağ Güvenliği / John Mitchell / 2014 >> 11-workers-sandbox-csp.pdf]]></title>
			<link><![CDATA[https://www.ce.yildiz.edu.tr/personal/gokhan/file/10491/11-workers-sandbox-csp.pdf]]></link>
			<pubDate><![CDATA[Thu, 14 Apr 2016 03:56:39 +0300]]></pubDate>
			<description><![CDATA[Content Security Policies (CSP), Web workers, and extensions

<table class="file-info" border="1">
                        <tr>
                            <td style="background-color: #fff799;"><strong>DOSYA</strong></td>
                            <td>Format: pdf</td>
                            <td><a href="https://www.ce.yildiz.edu.tr/personal/gokhan/file/10491/11-workers-sandbox-csp.pdf" download>Kaynak link</a></td>
                            <td><span class="disabled">Arşiv kopyası</span></td>
                            <td><a target="_blank" href="https://docs.google.com/viewer?url=https%3A%2F%2Fwww.ce.yildiz.edu.tr%2Fpersonal%2Fgokhan%2Ffile%2F10491%2F11-workers-sandbox-csp.pdf">Tarayıcıda aç</a></td>
                        </tr>
                    </table>]]></description>
			<author><![CDATA[Doç.Dr. Ali Gökhan Yavuz >> Bilgisayar Sistemleri ve Ağ Güvenliği / John Mitchell / 2014]]></author>
			<guid>f9df2d70711a4a1d7685c7b1e789f13a</guid>
		</item>
		
		<item>
			<title><![CDATA[Doç.Dr. Ali Gökhan Yavuz >> Bilgisayar Sistemleri ve Ağ Güvenliği / John Mitchell / 2014 >> 12-https.pptx]]></title>
			<link><![CDATA[https://www.ce.yildiz.edu.tr/personal/gokhan/file/10501/12-https.pptx]]></link>
			<pubDate><![CDATA[Thu, 14 Apr 2016 03:56:39 +0300]]></pubDate>
			<description><![CDATA[HTTPS: goals and pitfalls

<table class="file-info" border="1">
                        <tr>
                            <td style="background-color: #fff799;"><strong>DOSYA</strong></td>
                            <td>Format: pptx</td>
                            <td><a href="https://www.ce.yildiz.edu.tr/personal/gokhan/file/10501/12-https.pptx" download>Kaynak link</a></td>
                            <td><span class="disabled">Arşiv kopyası</span></td>
                            <td><a target="_blank" href="https://docs.google.com/viewer?url=https%3A%2F%2Fwww.ce.yildiz.edu.tr%2Fpersonal%2Fgokhan%2Ffile%2F10501%2F12-https.pptx">Tarayıcıda aç</a></td>
                        </tr>
                    </table>]]></description>
			<author><![CDATA[Doç.Dr. Ali Gökhan Yavuz >> Bilgisayar Sistemleri ve Ağ Güvenliği / John Mitchell / 2014]]></author>
			<guid>fe1598d5208b9933b26cf29374c27bc6</guid>
		</item>
		
		<item>
			<title><![CDATA[Doç.Dr. Ali Gökhan Yavuz >> Bilgisayar Sistemleri ve Ağ Güvenliği / John Mitchell / 2014 >> 13-tcp-dns.pptx]]></title>
			<link><![CDATA[https://www.ce.yildiz.edu.tr/personal/gokhan/file/10511/13-tcp-dns.pptx]]></link>
			<pubDate><![CDATA[Thu, 14 Apr 2016 03:56:39 +0300]]></pubDate>
			<description><![CDATA[Security issues in Internet protocols: TCP, DNS, and routing

<table class="file-info" border="1">
                        <tr>
                            <td style="background-color: #fff799;"><strong>DOSYA</strong></td>
                            <td>Format: pptx</td>
                            <td><a href="https://www.ce.yildiz.edu.tr/personal/gokhan/file/10511/13-tcp-dns.pptx" download>Kaynak link</a></td>
                            <td><span class="disabled">Arşiv kopyası</span></td>
                            <td><a target="_blank" href="https://docs.google.com/viewer?url=https%3A%2F%2Fwww.ce.yildiz.edu.tr%2Fpersonal%2Fgokhan%2Ffile%2F10511%2F13-tcp-dns.pptx">Tarayıcıda aç</a></td>
                        </tr>
                    </table>]]></description>
			<author><![CDATA[Doç.Dr. Ali Gökhan Yavuz >> Bilgisayar Sistemleri ve Ağ Güvenliği / John Mitchell / 2014]]></author>
			<guid>0a03226c4de7c6a6f8968f1e0ec39074</guid>
		</item>
		
		<item>
			<title><![CDATA[Doç.Dr. Ali Gökhan Yavuz >> Bilgisayar Sistemleri ve Ağ Güvenliği / John Mitchell / 2014 >> 14-network-defense.pptx]]></title>
			<link><![CDATA[https://www.ce.yildiz.edu.tr/personal/gokhan/file/10521/14-network-defense.pptx]]></link>
			<pubDate><![CDATA[Thu, 14 Apr 2016 03:56:39 +0300]]></pubDate>
			<description><![CDATA[Network defense tools: Firewalls, VPNs, Intrusion Detection, and filters

<table class="file-info" border="1">
                        <tr>
                            <td style="background-color: #fff799;"><strong>DOSYA</strong></td>
                            <td>Format: pptx</td>
                            <td><a href="https://www.ce.yildiz.edu.tr/personal/gokhan/file/10521/14-network-defense.pptx" download>Kaynak link</a></td>
                            <td><span class="disabled">Arşiv kopyası</span></td>
                            <td><a target="_blank" href="https://docs.google.com/viewer?url=https%3A%2F%2Fwww.ce.yildiz.edu.tr%2Fpersonal%2Fgokhan%2Ffile%2F10521%2F14-network-defense.pptx">Tarayıcıda aç</a></td>
                        </tr>
                    </table>]]></description>
			<author><![CDATA[Doç.Dr. Ali Gökhan Yavuz >> Bilgisayar Sistemleri ve Ağ Güvenliği / John Mitchell / 2014]]></author>
			<guid>3e502278616aea2cca6514eaf8c89886</guid>
		</item>
		
		<item>
			<title><![CDATA[Doç.Dr. Ali Gökhan Yavuz >> Bilgisayar Sistemleri ve Ağ Güvenliği / John Mitchell / 2014 >> 15-DDoS.pptx]]></title>
			<link><![CDATA[https://www.ce.yildiz.edu.tr/personal/gokhan/file/10531/15-DDoS.pptx]]></link>
			<pubDate><![CDATA[Thu, 14 Apr 2016 03:56:39 +0300]]></pubDate>
			<description><![CDATA[Unwanted traffic: denial of service attacks

<table class="file-info" border="1">
                        <tr>
                            <td style="background-color: #fff799;"><strong>DOSYA</strong></td>
                            <td>Format: pptx</td>
                            <td><a href="https://www.ce.yildiz.edu.tr/personal/gokhan/file/10531/15-DDoS.pptx" download>Kaynak link</a></td>
                            <td><span class="disabled">Arşiv kopyası</span></td>
                            <td><a target="_blank" href="https://docs.google.com/viewer?url=https%3A%2F%2Fwww.ce.yildiz.edu.tr%2Fpersonal%2Fgokhan%2Ffile%2F10531%2F15-DDoS.pptx">Tarayıcıda aç</a></td>
                        </tr>
                    </table>]]></description>
			<author><![CDATA[Doç.Dr. Ali Gökhan Yavuz >> Bilgisayar Sistemleri ve Ağ Güvenliği / John Mitchell / 2014]]></author>
			<guid>2777796d90ab0ddf49d9a459bb817e86</guid>
		</item>
		
		<item>
			<title><![CDATA[Doç.Dr. Ali Gökhan Yavuz >> Bilgisayar Sistemleri ve Ağ Güvenliği / John Mitchell / 2014 >> 17-mobile-platforms.pptx]]></title>
			<link><![CDATA[https://www.ce.yildiz.edu.tr/personal/gokhan/file/10541/17-mobile-platforms.pptx]]></link>
			<pubDate><![CDATA[Thu, 14 Apr 2016 03:56:39 +0300]]></pubDate>
			<description><![CDATA[Mobile platform security models: Android and iOS

<table class="file-info" border="1">
                        <tr>
                            <td style="background-color: #fff799;"><strong>DOSYA</strong></td>
                            <td>Format: pptx</td>
                            <td><a href="https://www.ce.yildiz.edu.tr/personal/gokhan/file/10541/17-mobile-platforms.pptx" download>Kaynak link</a></td>
                            <td><span class="disabled">Arşiv kopyası</span></td>
                            <td><a target="_blank" href="https://docs.google.com/viewer?url=https%3A%2F%2Fwww.ce.yildiz.edu.tr%2Fpersonal%2Fgokhan%2Ffile%2F10541%2F17-mobile-platforms.pptx">Tarayıcıda aç</a></td>
                        </tr>
                    </table>]]></description>
			<author><![CDATA[Doç.Dr. Ali Gökhan Yavuz >> Bilgisayar Sistemleri ve Ağ Güvenliği / John Mitchell / 2014]]></author>
			<guid>6a9967cc319ca68e71781a0b729b75b9</guid>
		</item>
		
		<item>
			<title><![CDATA[Doç.Dr. Ali Gökhan Yavuz >> Bilgisayar Sistemleri ve Ağ Güvenliği / John Mitchell / 2014 >> 18-mobile2.pdf]]></title>
			<link><![CDATA[https://www.ce.yildiz.edu.tr/personal/gokhan/file/10551/18-mobile2.pdf]]></link>
			<pubDate><![CDATA[Thu, 14 Apr 2016 03:56:39 +0300]]></pubDate>
			<description><![CDATA[Mobile threats and malware

<table class="file-info" border="1">
                        <tr>
                            <td style="background-color: #fff799;"><strong>DOSYA</strong></td>
                            <td>Format: pdf</td>
                            <td><a href="https://www.ce.yildiz.edu.tr/personal/gokhan/file/10551/18-mobile2.pdf" download>Kaynak link</a></td>
                            <td><span class="disabled">Arşiv kopyası</span></td>
                            <td><a target="_blank" href="https://docs.google.com/viewer?url=https%3A%2F%2Fwww.ce.yildiz.edu.tr%2Fpersonal%2Fgokhan%2Ffile%2F10551%2F18-mobile2.pdf">Tarayıcıda aç</a></td>
                        </tr>
                    </table>]]></description>
			<author><![CDATA[Doç.Dr. Ali Gökhan Yavuz >> Bilgisayar Sistemleri ve Ağ Güvenliği / John Mitchell / 2014]]></author>
			<guid>a432e3f7aefb10cd5a445bff6dfd9243</guid>
		</item>
		
	</channel>
</rss>
