Giriş
|
Hesabım
|
Listelerim
|
|
Remember to clear the cache and close the browser window.
English
Search Limit
Bütün Kütüphaneler
Elektronik Kaynaklar
Hepsi
Başkent Üniversitesi Kütüphanesi
Anadolu OSB Meslek Yüksekokulu
Atasev Özel Koleksiyon
Erdoğan Tercan Koleksiyonu
Güzel Sanatlar ve Tasarım Arşivi
Kazan Meslek Yüksekokulu
Hukuk Koleksiyonu
Ord.Prof.Dr. Enver Ziya Karal Tarih Uygulama Ars.Mrk.
Özel Koleksiyon Serdar Özersin
Tez Koleksiyonu
Tüm Alanlar
Başlık
Yazar
Konu
ISBN
ISSN
8
Search Field
Tüm Alanlar
Arama:
Gelişmiş Arama
Search Results
Elektronik Kaynaklar
Arama Sonuçlarını Sınırlandır
Daraltılmış:
+
Lokasyon: Ebook Central
+
Konu: Computer security.
Yazar
Dahil
Hariç
ProQuest (Firm)
(196)
Fourastier, Yannick, editor.
(11)
Piètre-Cambacédès, Ludovic, editor.
(11)
International Business Machines Corporation. International Technical Support Organization.
(10)
Calder, Alan, author.
(5)
Foster, James C.
(5)
Limbert, Matthew, designer.
(4)
Rayns, Chris.
(4)
Shinder, Thomas W.
(4)
Buchanan, Cameron, author.
(3)
Carvey, Harlan A.
(3)
Katsaropoulos, Chris, editor.
(3)
Long, Johnny.
(3)
Rogers, Mark, designer.
(3)
Shinder, Debra Littlejohn.
(3)
Boulanger, Jean-Louis.
(2)
Chandramouli, Ramaswamy.
(2)
Cherry, Denny.
(2)
Cole, Eric.
(2)
Dalziel, Henry, author.
(2)
Dalziel, Henry, editor.
(2)
Erickson, Jon, 1977-
(2)
Ferraiolo, David.
(2)
Fourastier, Yannick, author.
(2)
Goodman, Seymour E.
(2)
Grasdal, Martin.
(2)
Hunter, Laura E.
(2)
Hurley, Chris.
(2)
Hutchens, Justin, author.
(2)
Koh.
(2)
Krutz, Ronald L.
(2)
Kuhn, D. Richard.
(2)
Moskowitz, Jeremy.
(2)
Oppliger, Rolf.
(2)
Pietre-Cambacedes, Ludovic, author.
(2)
Piltzecker, Tony, 1975-
(2)
Ramachandran, Vivek, author.
(2)
Ramirez, Gilbert.
(2)
Ring, Sandra.
(2)
Ticher, Paul, author.
(2)
Vacca, John R.
(2)
Wheeler, Evan.
(2)
Wiles, Jack.
(2)
Wyler, Neil R.
(2)
Young, Carl S., author.
(2)
Zalewski, Michal.
(2)
AXELOS Limited, author.
(1)
Abbadi, Imad M., author.
(1)
Ablon, Lillian, author.
(1)
Agre, Philip.
(1)
Alam, Shahnawaz, author.
(1)
Alcover, Jorge Blanco.
(1)
Alexander, Philip, 1963-
(1)
American Evaluation Association.
(1)
Amini, Rob.
(1)
Andress, Jason, author.
(1)
Andrés, Steven.
(1)
Antón, Philip S.
(1)
Anzaldua, Reynaldo.
(1)
Aquilina, James M.
(1)
Aquilina, James, author.
(1)
Archibald, Neil.
(1)
Arnold, Michael (Michael Konrad), 1964-
(1)
Arvanitis, Nicholas, editor.
(1)
Ashenden, Debi.
(1)
Assam, Tarek.
(1)
Axelrod, C. Warren.
(1)
Baker, Paul R., 1958-
(1)
Barnett, Ryan C.
(1)
Basagiannis, Stylianos, contributor.
(1)
Baskerville, Richard.
(1)
Baskin, Brian, author.
(1)
Baskin, Brian.
(1)
Bayles, Aaron W.
(1)
Bayuk, Jennifer L.
(1)
Beale, Jay.
(1)
Beaver, Kevin.
(1)
Belapurkar, Abhijit.
(1)
Ben-Ari, Erez.
(1)
Ben-Natan, Ron.
(1)
Bennett, Eleanor Leonne, cover designer.
(1)
Benny, Daniel J.
(1)
Berghe, Thierry van den, author.
(1)
Bertino, Elisa.
(1)
Bhalla, Nish.
(1)
Bhunia, Swarup, author.
(1)
Bianco, David J., 1971-
(1)
Binnie, Christopher, author.
(1)
Blair, John, author.
(1)
Blobel, Bernd.
(1)
Bolt, Steven.
(1)
Bonertz, Tina.
(1)
Bradley, Jaron, author.
(1)
Bradley, Tony.
(1)
Brathwaite, Shimon, author.
(1)
Breimeier, Johannes.
(1)
Brennen, Jerod, editor.
(1)
Brewer, Jacqueline, editor.
(1)
Brindley, Ed.
(1)
Brooks, Hugh.
(1)
Brotby, W. Krag.
(1)
Bruchez, Rudi.
(1)
Bullock, Jessey, author.
(1)
Burke, Josh.
(1)
Burnett, Mark (Mark M.)
(1)
Burnett, Mark.
(1)
Bücker, Axel.
(1)
Cabric, Marko, author.
(1)
Calder, Alan.
(1)
Calderon Pale, Paulino.
(1)
Caloyannides, Michael A.
(1)
Caloyannides, Michael A. Computer forensics and privacy.
(1)
Cantrell, Christopher.
(1)
Carbone, Fernando, author.
(1)
Cardwell, Kevin, author.
(1)
Carpenter, Perry, author.
(1)
Carvey, Harlan A., author.
(1)
Carvey, Harlan, author.
(1)
Casey, Eoghan, author.
(1)
Casey, Eoghan.
(1)
Caswell, Brian.
(1)
Cesario, Cristiano.
(1)
Chaffin, Larry.
(1)
Chapman, Chris, author.
(1)
Chikofsky, Elliot J.
(1)
Choi, Kyung-shick, 1973-
(1)
Chuvakin, Anton A.
(1)
Clark, Gregory, author.
(1)
Clarke, Justin.
(1)
Clercq, Jan de, 1968-
(1)
Coburn, Andrew (Andrew W.), author.
(1)
Cole, Eric, author.
(1)
Conti, Greg.
(1)
Contos, Brian T.
(1)
Cook, Jim, 1944-
(1)
Couretas, Jerry M., 1966- author.
(1)
Cox, I. J. (Ingemar J.)
(1)
Cross, Michael, 1965-
(1)
Cross, Michael.
(1)
Cruz, Maria Ines, cover designer.
(1)
Cruz, Maria Ines, designer.
(1)
Cyborski, Shannon, author.
(1)
C̆ervĕn, Pavol.
(1)
D'Arcy, John P., 1975-
(1)
Dai, Yuan-Shun.
(1)
Dattani, Dinesh D.
(1)
Day, Graham, 1945- author.
(1)
DeMott, Jared.
(1)
Delfanti, Alessandro.
(1)
Dent, Alexander W.
(1)
Deraison, Renaud.
(1)
Dhali, Maruf Ahmed, cover designer.
(1)
Dhillon, Gurpreet.
(1)
Diogenes, Yuri.
(1)
Dolev, Ran.
(1)
Donaldson, Scott E., author.
(1)
Eilam, Eldad.
(1)
Ejzyn, Alain, author.
(1)
Esparza, Javier.
(1)
Essaaidi, Mohamed.
(1)
European Commission. Information Society DG.
(1)
Evergreen, Stephanie.
(1)
Fabbri, Rosato.
(1)
Fahy, Bob, editor.
(1)
Fair, Ted.
(1)
Fernandez-Medina, Eduardo.
(1)
Ficco, Massimo, editor.
(1)
Fichera, Joe, 1966-
(1)
Filip, Werner.
(1)
Fionov, Andrey.
(1)
Forristal, Jeff.
(1)
Foster, James.
(1)
Foster, Stephen C.
(1)
Fowler, Kevvie, author.
(1)
Franco, Pedro, author.
(1)
Friedman, Beth, editor.
(1)
Fuller, Ed.
(1)
Furnell, Steve, editor.
(1)
Furnell, Steven, 1970-
(1)
Gallo, Timonthy, editor.
(1)
Galvan, Karla.
(1)
Gantz, Stephen D.
(1)
Gavrilenko, K., author.
(1)
Gehrmann, Christian.
(1)
Geiselhart, Gregory.
(1)
Ginodman, Veniamin, editor.
(1)
Goldstein, Emmanuel J.
(1)
Gomzin, Slava.
(1)
González, Belén.
(1)
Gore, Bruce, cover designer.
(1)
Govindaradjane, Punithavathy, contributor.
(1)
Grillenmeier, Guido.
(1)
Grimes, Roger A., author.
(1)
Gritzalis, Stefanos.
(1)
Grumberg, Orna.
(1)
Gruschka, Nils.
(1)
Guerrier, Claudine, author.
(1)
Gupta, Aditya, author.
(1)
Gupta, Ravi.
(1)
Guzman, Aaron, author.
(1)
Daha fazla
Tümünü genişlet
Daha az
Hepsini Daralt
Materyal Türü
Dahil
Hariç
E-Kitap
Dil
Dahil
Hariç
English
(323)
French
(14)
German
(3)
Yayın Yılı
Dahil
Hariç
-
2015
(40)
2013
(35)
2014
(28)
2005
(23)
2012
(22)
2016
(22)
2004
(21)
2006
(16)
2010
(16)
2003
(15)
2007
(15)
2011
(14)
2019
(14)
2017
(13)
2008
(11)
2002
(10)
2018
(9)
2001
(6)
2009
(5)
2000
(2)
1991
(1)
1997
(1)
2020
(1)
Daha fazla
Tümünü genişlet
Daha az
Hepsini Daralt
Konu
Dahil
Hariç
Electronic books.
(340)
Computer networks -- Security measures.
(111)
Data protection.
(35)
Internet -- Security measures.
(18)
Computer hackers.
(14)
Computers -- Access control.
(13)
Microsoft Windows (Computer file)
(11)
Data encryption (Computer science)
(10)
Business enterprises -- Computer networks -- Security measures.
(9)
Operating systems (Computers)
(9)
Computer crimes.
(8)
Cryptography.
(8)
Computer crimes -- Prevention.
(7)
Information technology -- Security measures.
(7)
Database security.
(6)
Computer crimes -- Investigation.
(5)
Cyberterrorism -- Prevention.
(5)
Malware (Computer software)
(5)
Security systems.
(5)
Cloud computing -- Security measures.
(4)
Cloud computing.
(4)
Computer networks -- Access control.
(4)
Computer viruses.
(4)
Cyberspace -- Security measures.
(4)
Firewalls (Computer security)
(4)
Client/server computing.
(3)
Computer crimes -- Investigation -- United States -- Methodology.
(3)
Computer software -- Development.
(3)
Computers -- Access control -- Passwords.
(3)
Corporations -- Security measures.
(3)
Data mining.
(3)
Digital watermarking.
(3)
Directory services (Computer network technology)
(3)
Electronic information resources -- Access control.
(3)
Embedded computer systems.
(3)
Forensic sciences.
(3)
Linux.
(3)
Microsoft Windows (Computer file) -- Security measures.
(3)
Microsoft Windows server.
(3)
Privacy, Right of.
(3)
Python (Computer program language)
(3)
Risk management.
(3)
Software configuration management.
(3)
World Wide Web -- Security measures.
(3)
z/OS.
(3)
Application software -- Security measures.
(2)
Business enterprises -- Security measures.
(2)
Citrix MetaFrame.
(2)
Client/server computing -- Security measures.
(2)
Computer science.
(2)
Computer software -- Reliability.
(2)
Debugging in computer science.
(2)
Electronic commerce -- Security measures.
(2)
Electronic data processing departments -- Auditing.
(2)
Hacking.
(2)
IBM software.
(2)
Information technology -- Auditing.
(2)
Information technology -- Management.
(2)
Information visualization.
(2)
Internet -- Safety measures.
(2)
Internet and children.
(2)
Internet searching.
(2)
Intrusion detection systems (Computer security)
(2)
Mac OS.
(2)
Microsoft ISA server.
(2)
National security.
(2)
Open source software.
(2)
Penetration testing (Computer security)
(2)
Process control -- Security measures.
(2)
Reverse engineering.
(2)
Risk assessment.
(2)
SQL server.
(2)
Social media.
(2)
Spyware (Computer software)
(2)
Terrorism -- Prevention.
(2)
Wireless communication systems -- Security measures.
(2)
AIX (Computer file)
(1)
Acquisition of computer software.
(1)
Algebra, Boolean.
(1)
Altre visioni. Solaris.
(1)
Application software.
(1)
Archives -- Safety measures.
(1)
Artificial intelligence.
(1)
Automatic machinery -- Security measures.
(1)
Avionics -- Safety measures.
(1)
BEA WebLogic server.
(1)
Big data -- Security measures.
(1)
Bluetooth technology -- Security measures.
(1)
Bluetooth technology.
(1)
Browsers (Computer programs)
(1)
Business enterpri -- Computer networks -- Security measures.
(1)
Business planning.
(1)
CORBA (Computer architecture)
(1)
Cocoa (Application development environment)
(1)
ColdFusion.
(1)
Commercial crimes.
(1)
Computer Security
(1)
Computer architecture.
(1)
Computer crimes -- Case studies.
(1)
Computer crimes -- Investigation -- United States.
(1)
Computer crimes -- Investments.
(1)
Computer hackers -- Fiction.
(1)
Computer network protocols.
(1)
Computer networks -- Certification.
(1)
Computer networks -- Design and construction.
(1)
Computer networks -- Examinations -- Study guides.
(1)
Computer networks -- Planning.
(1)
Computer networks -- Reliability.
(1)
Computer networks -- Security measures -- Standards.
(1)
Computer networks -- Security measures -- United States.
(1)
Computer networks.
(1)
Computer programming.
(1)
Computer security -- Fiction.
(1)
Computer security -- Forecasting.
(1)
Computer security -- United States.
(1)
Computer security -- Vocational guidance.
(1)
Computer simulation.
(1)
Computer software -- Evaluation.
(1)
Computer systems -- Reliability.
(1)
Computers -- Access control -- Standards.
(1)
Computers -- Reliability.
(1)
Confidential business information.
(1)
Corporate culture.
(1)
Corporations -- Corrupt practices.
(1)
Cryptography -- Mathematics.
(1)
Cryptography -- Standards.
(1)
Cyberinfrastructure -- Security measures.
(1)
Cyberinfrastructure.
(1)
Cyberterroism -- Prevention.
(1)
Cyberterrorism.
(1)
Data protection -- Security measures.
(1)
Data protection -- Standards.
(1)
Database design.
(1)
Distributed operating systems (Computers)
(1)
Educational technology -- Security measures.
(1)
Electronic data processing -- Backup processing alternatives.
(1)
Electronic data processing -- Distributed processing -- Security measures.
(1)
Electronic data processing -- Distributed processing.
(1)
Electronic data processing departments -- Contracting out.
(1)
Electronic data processing departments -- Security measures.
(1)
Electronic mail systems -- Security measures.
(1)
Electronic records -- Conservation and restoration.
(1)
Electronic records.
(1)
Electronic surveillance.
(1)
Emergency management -- Planning.
(1)
Encryption
(1)
Fraud investigation.
(1)
Future of Privacy
(1)
Groupware (Computer software)
(1)
Hackers.
(1)
Hashing (Computer science)
(1)
Hewlett-Packard computers -- Security measures.
(1)
Human-computer interaction.
(1)
IBM Cluster systems management.
(1)
IBM Database 2.
(1)
IBM computers -- Programming.
(1)
IBM computers.
(1)
IEEE 802.11 (Standard)
(1)
Industrial safety -- Management.
(1)
Information Assurance
(1)
Information Exchange
(1)
Information policy -- European Union countries.
(1)
Information resources management -- Security measures.
(1)
Information resources management.
(1)
Information storage and retrieval systems -- Business -- Security measures.
(1)
Information technology -- Certification.
(1)
Information technology -- Standards.
(1)
Information technology.
(1)
Information warfare.
(1)
Instant messaging.
(1)
Intellectual property.
(1)
Internet -- Access control.
(1)
Internet -- Law and legislation.
(1)
Internet domain names.
(1)
Internet of things -- Security measures.
(1)
Internet of things.
(1)
Internet programming.
(1)
Internet.
(1)
Java (Computer program language)
(1)
Kali Linux.
(1)
Languages, Artificial.
(1)
Libraries -- Safety measures.
(1)
Library information networks -- Security measures.
(1)
Linux -- Examinations -- Study guides.
(1)
Macintosh (Computer) -- Programming.
(1)
Management information systems.
(1)
Medical informatics.
(1)
Medical records -- Access control.
(1)
Medical records -- Data processing.
(1)
Microsoft Forefront.
(1)
Microsoft Windows (Computer file) -- Examinations -- Study guides.
(1)
Multidisciplinary design optimization.
(1)
Multimedia systems -- Security measures.
(1)
Narraciones solaris.
(1)
National Institute of Standards and Technology (U.S.)
(1)
Network Security
(1)
Network performance (Telecommunication)
(1)
Online social networks -- Safety measures.
(1)
Online social networks -- Security measures.
(1)
Online social networks.
(1)
Daha fazla
Tümünü genişlet
Daha az
Hepsini Daralt
Kütüphane
Dahil
Hariç
Başkent Kütüphanesi
false
{sortLabel}
{alphabetical}
{relevance}
{include}
{exclude}
{facetName}
{results}
{displayName}
{count}
{error}
Eylem Seç
Ayırt
Listelerime ekle
Eposta
Yazdır
340 sonuç bulundu
1
..
25
26
27
28
29
Sırala:
Konuyla İlgili Sırala
Yayın Yılı (eskiden yeniye)
Yayın Yılı (yeniden eskiye)
Başlık
Yazar
OK
Eposta Adresleri
:
Phone Number:
Mobile Carrier:
AT&T
Boost
Nextel (Sprint)
Sprint (PCS)
T Mobile
TracFone
US Cellular
Verizon
Virgin
Select An Item
Data usage warning: You will receive one text message for each title you selected.
Standard text messaging rates apply.
Text it to me
Text it to me, and go to next item
000000000000
DEFAULTTR
Liste seç
Geçici Liste
Bunu varsayılan liste yap.
Öğeler başarıyla eklendi
Öğeler eklenirken hata oldu. Lütfen tekrar deneyiniz.
Mission-critical network planning
313.
Mission-critical network planning
by
Liotine, Matthew.
Click to View
Format:
Hacking the art of exploitation
314.
Hacking the art of exploitation
by
Erickson, Jon, 1977-
Click to View
Format:
Configuring Symantec Antivirus, Corporate Edition
315.
Configuring Symantec Antivirus, Corporate Edition
by
Hunter, Laura E.
Click to View
Format:
Snort 2.0 intrusion detection
316.
Snort 2.0 intrusion detection
by
Beale, Jay.
Click to View
Format:
SSCP study guide and & DVD training system
317.
SSCP study guide and & DVD training system
by
Jacobs, Josh.
Click to View
Format:
Network security a practical guide
318.
Network security a practical guide
by
Poole, Owen.
Click to View
Format:
Cybersecurity operations handbook
319.
Cybersecurity operations handbook
by
Rittinghouse, John W.
Click to View
Format:
Finding and fixing vulnerabilities in information systems the vulnerability assessment & mitigation methodology
320.
Finding and fixing vulnerabilities in information systems the vulnerability assessment & mitigation methodology
by
Antón, Philip S.
Click to View
Format:
Cybersecurity today and tomorrow pay now or pay later
321.
Cybersecurity today and tomorrow pay now or pay later
by
ProQuest (Firm)
Click to View
Format:
Putting the latest z/OS security features to work
322.
Putting the latest z/OS security features to work
by
Rayns, Chris.
Click to View
Format:
An introduction to security in a CSM 1.3 for AIX 5L environment
323.
An introduction to security in a CSM 1.3 for AIX 5L environment
by
Lascu, Octavian.
Click to View
Format:
Developing secure distributed systems with CORBA
324.
Developing secure distributed systems with CORBA
by
Lang, Ulrich.
Click to View
Format:
Eylem Seç
Ayırt
Listelerime ekle
Eposta
Yazdır
1
..
25
26
27
28
29
Search Results
Elektronik Kaynaklar
Search Results
Elektronik Kaynaklar
OK
Eposta Adresleri
:
Phone Number:
Mobile Carrier:
AT&T
Boost
Nextel (Sprint)
Sprint (PCS)
T Mobile
TracFone
US Cellular
Verizon
Virgin
Select An Item
Data usage warning: You will receive one text message for each title you selected.
Standard text messaging rates apply.
Text it to me
Text it to me, and go to next item
Elektronik Kaynaklar
Sonuçlar alınıyor Elektronik Kaynaklar...
action