Arama Sonuçları - Daraltılmış: Ebook Central - 2007 - Computer security.SirsiDynix Enterprisehttp://katalog.baskent.edu.tr/client/tr_TR/defaulttr/defaulttr/qf$003dLOCATION$002509Lokasyon$0025091$00253AEBOOKCENT$002509Ebook$002bCentral$0026qf$003dPUBDATE$002509Yay$0025C4$0025B1n$002bY$0025C4$0025B1l$0025C4$0025B1$0025092007$0025092007$0026qf$003dSUBJECT$002509Konu$002509Computer$002bsecurity.$002509Computer$002bsecurity.$0026ps$003d300?2024-06-22T09:29:07ZPapers from the first European workshop on technological & security issues in digital rights management (EuDiRights)ent://SD_ILS/0/SD_ILS:9391602024-06-22T09:29:07Z2024-06-22T09:29:07Zby Yagüe, Mariemma.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=291585">Click to View</a><br/>Format: Elektronik Kaynak<br/>Microsoft windows security fundamentalsent://SD_ILS/0/SD_ILS:9396472024-06-22T09:29:07Z2024-06-22T09:29:07Zby Clercq, Jan de, 1968-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=294637">Click to View</a><br/>Format: Elektronik Kaynak<br/>Security convergence managing enterprise security riskent://SD_ILS/0/SD_ILS:9404342024-06-22T09:29:07Z2024-06-22T09:29:07Zby Tyson, Dave.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=299507">Click to View</a><br/>Format: Elektronik Kaynak<br/>Techno security's guide to e-discovery and digital forensicsent://SD_ILS/0/SD_ILS:9480152024-06-22T09:29:07Z2024-06-22T09:29:07Zby Wiles, Jack.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=405426">Click to View</a><br/>Format: Elektronik Kaynak<br/>A process for developing a common vocabulary in the information security areaent://SD_ILS/0/SD_ILS:9434782024-06-22T09:29:07Z2024-06-22T09:29:07Zby NATO Advanced Research Workshop on a Process for Developing a Common Vocabulary in the Information Security Area (2006 : Moscow, Russia)<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=320313">Click to View</a><br/>Format: Elektronik Kaynak<br/>Information management & computer security. Volume 15, Number 5, Papers from the HAISA 2007 Symposiument://SD_ILS/0/SD_ILS:9441192024-06-22T09:29:07Z2024-06-22T09:29:07Zby ProQuest (Firm)<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=328737">Click to View</a><br/>Format: Elektronik Kaynak<br/>Microsoft Vista for IT security professionalsent://SD_ILS/0/SD_ILS:9440752024-06-22T09:29:07Z2024-06-22T09:29:07Zby Piltzecker, Tony, 1975-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=328623">Click to View</a><br/>Format: Elektronik Kaynak<br/>Windows forensic analysis DVD toolkit,ent://SD_ILS/0/SD_ILS:9440762024-06-22T09:29:07Z2024-06-22T09:29:07Zby Carvey, Harlan A.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=328624">Click to View</a><br/>Format: Elektronik Kaynak<br/>Zen and the art of information securityent://SD_ILS/0/SD_ILS:9442822024-06-22T09:29:07Z2024-06-22T09:29:07Zby Winkler, Ira.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=330200">Click to View</a><br/>Format: Elektronik Kaynak<br/>Best damn firewall book periodent://SD_ILS/0/SD_ILS:9442602024-06-22T09:29:07Z2024-06-22T09:29:07Zby Shinder, Thomas W.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=330100">Click to View</a><br/>Format: Elektronik Kaynak<br/>Role-based access controlent://SD_ILS/0/SD_ILS:9452212024-06-22T09:29:07Z2024-06-22T09:29:07Zby Ferraiolo, David.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=338751">Click to View</a><br/>Format: Elektronik Kaynak<br/>Developer's guide to web application securityent://SD_ILS/0/SD_ILS:9385212024-06-22T09:29:07Z2024-06-22T09:29:07Zby Cross, Michael.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=289735">Click to View</a><br/>Format: Elektronik Kaynak<br/>The misuse of information systems the impact of security countermeasuresent://SD_ILS/0/SD_ILS:10580442024-06-22T09:29:07Z2024-06-22T09:29:07Zby D'Arcy, John P., 1975-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3016826">Click to View</a><br/>Format: Elektronik Kaynak<br/>Security data visualization graphical techniques for network analysisent://SD_ILS/0/SD_ILS:10584542024-06-22T09:29:07Z2024-06-22T09:29:07Zby Conti, Greg.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3017625">Click to View</a><br/>Format: Elektronik Kaynak<br/>Toward a safer and more secure cyberspaceent://SD_ILS/0/SD_ILS:10854522024-06-22T09:29:07Z2024-06-22T09:29:07Zby Goodman, Seymour E.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3378311">Click to View</a><br/>Format: Elektronik Kaynak<br/>