{"id":4508,"date":"2018-05-25T16:26:48","date_gmt":"2018-05-25T14:26:48","guid":{"rendered":"https:\/\/xn--adal-oza.net\/?page_id=4508"},"modified":"2022-10-31T23:21:01","modified_gmt":"2022-10-31T21:21:01","slug":"computer-data-security","status":"publish","type":"page","link":"https:\/\/xn--adal-oza.net\/?page_id=4508&lang=en","title":{"rendered":"Computer &#038; Data Security"},"content":{"rendered":"<p>0 &#8211; <a href=\"https:\/\/xn--adal-oza.net\/wp-content\/uploads\/2022\/10\/0-History-of-Computer.pdf\">History of Computer<\/a><\/p>\n<p>1 &#8211; <a href=\"https:\/\/xn--adal-oza.net\/wp-content\/uploads\/2022\/10\/1-Security.pdf\">Security<\/a><\/p>\n<p>2 &#8211; <a href=\"https:\/\/xn--adal-oza.net\/wp-content\/uploads\/2022\/10\/2-Cyber-Attacks.pdf\">Cyber Attacks<\/a><\/p>\n<p>3 &#8211; <a href=\"https:\/\/xn--adal-oza.net\/wp-content\/uploads\/2022\/10\/3-Identification-and-Authorization.pdf\">Identification And Authorization<\/a><\/p>\n<p>4 &#8211;&nbsp;<a href=\"https:\/\/xn--adal-oza.net\/wp-content\/uploads\/2022\/10\/4-Access-Control.pdf\">Access Control<\/a><\/p>\n<p>5 &#8211; <a href=\"https:\/\/xn--adal-oza.net\/wp-content\/uploads\/2022\/10\/5-Organizational-Security.pdf\">Organizational Security<\/a><\/p>\n<p>6 &#8211; <a href=\"https:\/\/xn--adal-oza.net\/wp-content\/uploads\/2022\/10\/6-Infrastructure-Security.pdf\">Infrastructure Security<\/a><\/p>\n<p>7 &#8211; <a href=\"https:\/\/xn--adal-oza.net\/wp-content\/uploads\/2022\/10\/7-Evaluation-of-Security.pdf\">Evaluation of Security<\/a><\/p>\n<p>8 &#8211; <a href=\"https:\/\/xn--adal-oza.net\/wp-content\/uploads\/2022\/10\/8-Cryptograhy.pdf\">Cryptography<\/a><\/p>\n<p>9 &#8211; <a href=\"https:\/\/xn--adal-oza.net\/wp-content\/uploads\/2022\/10\/9-Authentication-in-Distributed-System.pdf\">Authentication in Distributed System<\/a><\/p>\n<p>10 &#8211; <a href=\"https:\/\/xn--adal-oza.net\/wp-content\/uploads\/2022\/10\/10-Security-of-Network-1.pdf\">Security of Network<\/a><\/p>\n<p>11 &#8211; <a href=\"https:\/\/xn--adal-oza.net\/wp-content\/uploads\/2022\/10\/11-Software-Security.pdf\">Software Security<\/a><\/p>\n<p>12 &#8211; <a href=\"https:\/\/xn--adal-oza.net\/wp-content\/uploads\/2022\/10\/12-Management-of-Computer-Security.pdf\">Management of Computer Security<\/a><\/p>\n<p>13 &#8211; <a href=\"https:\/\/xn--adal-oza.net\/wp-content\/uploads\/2022\/10\/13-Security-in-Mobile-System.pdf\">Security in Mobile System<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>0 &#8211; History of Computer 1 &#8211; Security 2 &#8211; Cyber Attacks 3 &#8211; Identification And Authorization 4 &#8211;&nbsp;Access Control 5 &#8211; Organizational Security 6 &#8211; Infrastructure Security 7 &#8211; Evaluation of Security 8 &#8211; Cryptography 9 &#8211; Authentication in Distributed System 10 &#8211; Security of Network 11 &#8211; Software Security 12 &#8211; Management of &hellip; <\/p>\n<p class=\"link-more\"><a href=\"https:\/\/xn--adal-oza.net\/?page_id=4508&#038;lang=en\" class=\"more-link\">Okumaya devam et<span class=\"screen-reader-text\"> &#8220;Computer &#038; Data Security&#8221;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"parent":4494,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-4508","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/xn--adal-oza.net\/index.php?rest_route=\/wp\/v2\/pages\/4508","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/xn--adal-oza.net\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/xn--adal-oza.net\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/xn--adal-oza.net\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/xn--adal-oza.net\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=4508"}],"version-history":[{"count":7,"href":"https:\/\/xn--adal-oza.net\/index.php?rest_route=\/wp\/v2\/pages\/4508\/revisions"}],"predecessor-version":[{"id":8947,"href":"https:\/\/xn--adal-oza.net\/index.php?rest_route=\/wp\/v2\/pages\/4508\/revisions\/8947"}],"up":[{"embeddable":true,"href":"https:\/\/xn--adal-oza.net\/index.php?rest_route=\/wp\/v2\/pages\/4494"}],"wp:attachment":[{"href":"https:\/\/xn--adal-oza.net\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=4508"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}