Skip to:
Search Results
|
Bottom
|
Search Facets
|
Content
Giriş
|
Hesabım
|
Listelerim
|
|
Remember to clear the cache and close the browser window.
English
Search Limit
Bütün Kütüphaneler
Elektronik Kaynaklar
Hepsi
Başkent Üniversitesi Kütüphanesi
Anadolu OSB Meslek Yüksekokulu
Atasev Özel Koleksiyon
Erdoğan Tercan Koleksiyonu
Güzel Sanatlar ve Tasarım Arşivi
Kazan Meslek Yüksekokulu
Hukuk Koleksiyonu
Ord.Prof.Dr. Enver Ziya Karal Tarih Uygulama Ars.Mrk.
Özel Koleksiyon Serdar Özersin
Tez Koleksiyonu
Tüm Alanlar
Başlık
Yazar
Konu
ISBN
ISSN
13
Search Field
Tüm Alanlar
Arama:
Gelişmiş Arama
Search Results
Elektronik Kaynaklar
Arama Sonuçlarını Sınırlandır
Daraltılmış:
+
Yazar: ProQuest (Firm)
+
Konu: Computer security.
Yazar
Dahil
Hariç
International Business Machines Corporation. International Technical Support Organization.
(10)
Foster, James C.
(5)
Rayns, Chris.
(4)
Shinder, Thomas W.
(4)
Carvey, Harlan A.
(3)
Long, Johnny.
(3)
Shinder, Debra Littlejohn.
(3)
Boulanger, Jean-Louis.
(2)
Chandramouli, Ramaswamy.
(2)
Cole, Eric.
(2)
Erickson, Jon, 1977-
(2)
Ferraiolo, David.
(2)
Goodman, Seymour E.
(2)
Grasdal, Martin.
(2)
Hunter, Laura E.
(2)
Hurley, Chris.
(2)
Koh.
(2)
Krutz, Ronald L.
(2)
Kuhn, D. Richard.
(2)
Moskowitz, Jeremy.
(2)
Oppliger, Rolf.
(2)
Piltzecker, Tony, 1975-
(2)
Ramirez, Gilbert.
(2)
Ring, Sandra.
(2)
Wheeler, Evan.
(2)
Wiles, Jack.
(2)
Wyler, Neil R.
(2)
Zalewski, Michal.
(2)
Agre, Philip.
(1)
Alcover, Jorge Blanco.
(1)
Alexander, Philip, 1963-
(1)
Amini, Rob.
(1)
Andrés, Steven.
(1)
Antón, Philip S.
(1)
Anzaldua, Reynaldo.
(1)
Aquilina, James M.
(1)
Archibald, Neil.
(1)
Arnold, Michael (Michael Konrad), 1964-
(1)
Ashenden, Debi.
(1)
Axelrod, C. Warren.
(1)
Baker, Paul R., 1958-
(1)
Barnett, Ryan C.
(1)
Baskerville, Richard.
(1)
Baskin, Brian.
(1)
Bayles, Aaron W.
(1)
Bayuk, Jennifer L.
(1)
Beale, Jay.
(1)
Beaver, Kevin.
(1)
Belapurkar, Abhijit.
(1)
Ben-Ari, Erez.
(1)
Ben-Natan, Ron.
(1)
Benny, Daniel J.
(1)
Bertino, Elisa.
(1)
Bhalla, Nish.
(1)
Blobel, Bernd.
(1)
Bolt, Steven.
(1)
Bradley, Tony.
(1)
Brindley, Ed.
(1)
Brooks, Hugh.
(1)
Brotby, W. Krag.
(1)
Bruchez, Rudi.
(1)
Burke, Josh.
(1)
Burnett, Mark (Mark M.)
(1)
Burnett, Mark.
(1)
Bücker, Axel.
(1)
Calderon Pale, Paulino.
(1)
Caloyannides, Michael A.
(1)
Caloyannides, Michael A. Computer forensics and privacy.
(1)
Cantrell, Christopher.
(1)
Casey, Eoghan.
(1)
Caswell, Brian.
(1)
Cesario, Cristiano.
(1)
Chaffin, Larry.
(1)
Cherry, Denny.
(1)
Chikofsky, Elliot J.
(1)
Choi, Kyung-shick, 1973-
(1)
Chuvakin, Anton A.
(1)
Clarke, Justin.
(1)
Clercq, Jan de, 1968-
(1)
Conti, Greg.
(1)
Contos, Brian T.
(1)
Cook, Jim, 1944-
(1)
Cox, I. J. (Ingemar J.)
(1)
Cross, Michael.
(1)
C̆ervĕn, Pavol.
(1)
D'Arcy, John P., 1975-
(1)
Dai, Yuan-Shun.
(1)
DeMott, Jared.
(1)
Delfanti, Alessandro.
(1)
Dent, Alexander W.
(1)
Deraison, Renaud.
(1)
Dhillon, Gurpreet.
(1)
Diogenes, Yuri.
(1)
Dolev, Ran.
(1)
Eilam, Eldad.
(1)
Esparza, Javier.
(1)
Essaaidi, Mohamed.
(1)
European Commission. Information Society DG.
(1)
Fair, Ted.
(1)
Fernandez-Medina, Eduardo.
(1)
Fichera, Joe, 1966-
(1)
Filip, Werner.
(1)
Fionov, Andrey.
(1)
Forristal, Jeff.
(1)
Foster, James.
(1)
Foster, Stephen C.
(1)
Fuller, Ed.
(1)
Furnell, Steven, 1970-
(1)
Galvan, Karla.
(1)
Gehrmann, Christian.
(1)
Geiselhart, Gregory.
(1)
Goldstein, Emmanuel J.
(1)
González, Belén.
(1)
Grillenmeier, Guido.
(1)
Gritzalis, Stefanos.
(1)
Grumberg, Orna.
(1)
Gupta, Ravi.
(1)
Hadnagy, Christopher.
(1)
Hancock, Bill, 1957-
(1)
Hawker, Andrew.
(1)
Heinen, Neils.
(1)
Henmi, Anne.
(1)
Hicks, Richard.
(1)
Hinson, Gary.
(1)
Hinton, Heather.
(1)
Hippensteil, Heinz Peter.
(1)
Hollin, Mark.
(1)
Honick, Ron.
(1)
Honig, Andrew.
(1)
Hosmer, Chet.
(1)
Howard, Doug.
(1)
Huang, Hsiang-Cheh.
(1)
Huseby, Sverre H.
(1)
Hutchinson, William.
(1)
Hänninen, Pekka.
(1)
I͡Ashchenko, V. V.
(1)
Jacobs, Josh.
(1)
Jain, L. C.
(1)
Jones, Andy, 1952-
(1)
Kabay, M. E.
(1)
Kahn, Miriam (Miriam B.)
(1)
Kalali, Masoud.
(1)
Kappeler, Patrick.
(1)
Katsikas, Sokratis.
(1)
Kenyon, Brian.
(1)
Khan, Latifur.
(1)
Khnaser, Elias N.
(1)
Killion, Dave.
(1)
Kinney, Steven.
(1)
Kissell, Joe.
(1)
Kleidermacher, David.
(1)
Kleidermacher, Mike.
(1)
Kleiman, Dave.
(1)
Klein, Tobias.
(1)
Knop, J. V. (Jan V.)
(1)
Kolde, Jennifer.
(1)
Konheim, Alan G., 1934-
(1)
Kroner, George.
(1)
Krush, Waylon.
(1)
Kumar, Atul.
(1)
Lane, Patrick T.
(1)
Lang, Ulrich.
(1)
Lascu, Octavian.
(1)
Laykin, Erik.
(1)
Lee, Graham J.
(1)
Leman-Langlois, Stéphane, 1965-
(1)
Lin, Ching-Yung.
(1)
Lin, Herbert.
(1)
Liotine, Matthew.
(1)
Loshin, Pete.
(1)
Loshin, Peter.
(1)
Macaulay, Tyson.
(1)
Malin, Cameron H.
(1)
Mallett, Andrew.
(1)
Mao, Wenji.
(1)
Martin, Jason L.
(1)
Martínez-Ballesté, Antoni.
(1)
Masini, Luca.
(1)
Masud, Mehedy.
(1)
Mehan, Julie E.
(1)
Meine, Bill.
(1)
Meyer, Greg.
(1)
Miller, Charles Alfred.
(1)
Miller, Drew.
(1)
Mitchell, Chris.
(1)
Moeller, Robert R.
(1)
Morris, Greg.
(1)
Moulder, Patricia.
(1)
Mularien, Peter.
(1)
Musumeci, Guillermo.
(1)
NATO Advanced Research Workshop on Information Assurance and Computer Security (2005 : T?etouan, Morocco)
(1)
NATO Advanced Research Workshop on a Process for Developing a Common Vocabulary in the Information Security Area (2006 : Moscow, Russia)
(1)
Nahari, Hadi.
(1)
National Research Council (U.S.). Committee on Improving Cybersecurity Research in the United States.
(1)
National Research Council (U.S.). Computer Science and Telecommunications Board.
(1)
Nazario, Jose.
(1)
Neagu, Adrian.
(1)
Neucom, Ray.
(1)
Nordfelt, Michael.
(1)
Nordström, Kent.
(1)
Daha fazla
Tümünü genişlet
Daha az
Hepsini Daralt
Materyal Türü
Dahil
Hariç
E-Kitap
Dil
Dahil
Hariç
English
(196)
Yayın Yılı
Dahil
Hariç
-
2005
(23)
2013
(22)
2004
(21)
2012
(21)
2006
(16)
2003
(15)
2007
(15)
2010
(14)
2011
(13)
2008
(11)
2002
(10)
2001
(6)
2009
(5)
2000
(2)
1991
(1)
1997
(1)
Daha fazla
Tümünü genişlet
Daha az
Hepsini Daralt
Konu
Dahil
Hariç
Electronic books.
(196)
Computer networks -- Security measures.
(65)
Data protection.
(20)
Computer hackers.
(13)
Internet -- Security measures.
(13)
Cryptography.
(8)
Microsoft Windows (Computer file)
(7)
Database security.
(6)
Operating systems (Computers)
(6)
Computer crimes.
(5)
Data encryption (Computer science)
(5)
Information technology -- Security measures.
(5)
Business enterprises -- Computer networks -- Security measures.
(4)
Computer viruses.
(4)
Computers -- Access control.
(4)
Firewalls (Computer security)
(4)
Computer crimes -- Investigation.
(3)
Computer crimes -- Prevention.
(3)
Computer networks -- Access control.
(3)
Digital watermarking.
(3)
Embedded computer systems.
(3)
Malware (Computer software)
(3)
Microsoft Windows server.
(3)
World Wide Web -- Security measures.
(3)
Application software -- Security measures.
(2)
Business enterprises -- Security measures.
(2)
Citrix MetaFrame.
(2)
Client/server computing -- Security measures.
(2)
Client/server computing.
(2)
Cloud computing -- Security measures.
(2)
Computer crimes -- Investigation -- United States -- Methodology.
(2)
Computer science.
(2)
Computer software -- Development.
(2)
Computers -- Access control -- Passwords.
(2)
Cyberspace -- Security measures.
(2)
Data mining.
(2)
Debugging in computer science.
(2)
Directory services (Computer network technology)
(2)
Electronic commerce -- Security measures.
(2)
Electronic data processing departments -- Auditing.
(2)
Forensic sciences.
(2)
IBM software.
(2)
Internet -- Safety measures.
(2)
Internet and children.
(2)
Internet searching.
(2)
Linux.
(2)
Microsoft ISA server.
(2)
Microsoft Windows (Computer file) -- Security measures.
(2)
National security.
(2)
Privacy, Right of.
(2)
Python (Computer program language)
(2)
Reverse engineering.
(2)
Risk assessment.
(2)
SQL server.
(2)
Software configuration management.
(2)
Spyware (Computer software)
(2)
z/OS.
(2)
AIX (Computer file)
(1)
Acquisition of computer software.
(1)
Altre visioni. Solaris.
(1)
Application software.
(1)
Archives -- Safety measures.
(1)
Artificial intelligence.
(1)
Automatic machinery -- Security measures.
(1)
Avionics -- Safety measures.
(1)
BEA WebLogic server.
(1)
Bluetooth technology -- Security measures.
(1)
Browsers (Computer programs)
(1)
CORBA (Computer architecture)
(1)
Cloud computing.
(1)
Cocoa (Application development environment)
(1)
ColdFusion.
(1)
Commercial crimes.
(1)
Computer architecture.
(1)
Computer crimes -- Investigation -- United States.
(1)
Computer crimes -- Investments.
(1)
Computer hackers -- Fiction.
(1)
Computer network protocols.
(1)
Computer networks -- Certification.
(1)
Computer networks -- Design and construction.
(1)
Computer networks -- Planning.
(1)
Computer networks -- Reliability.
(1)
Computer networks -- Security measures -- United States.
(1)
Computer programming.
(1)
Computer security -- Fiction.
(1)
Computer security -- Forecasting.
(1)
Computer security -- United States.
(1)
Computer systems -- Reliability.
(1)
Computers -- Access control -- Standards.
(1)
Computers -- Reliability.
(1)
Corporations -- Corrupt practices.
(1)
Cryptography -- Standards.
(1)
Cyberterrorism -- Prevention.
(1)
Database design.
(1)
Distributed operating systems (Computers)
(1)
Educational technology -- Security measures.
(1)
Electronic data processing -- Backup processing alternatives.
(1)
Electronic data processing -- Distributed processing.
(1)
Electronic data processing departments -- Contracting out.
(1)
Electronic information resources -- Access control.
(1)
Electronic mail systems -- Security measures.
(1)
Electronic records -- Conservation and restoration.
(1)
Electronic records.
(1)
Electronic surveillance.
(1)
Emergency management -- Planning.
(1)
Fraud investigation.
(1)
Groupware (Computer software)
(1)
Hashing (Computer science)
(1)
Hewlett-Packard computers -- Security measures.
(1)
Human-computer interaction.
(1)
IBM Cluster systems management.
(1)
IBM Database 2.
(1)
IBM computers -- Programming.
(1)
IBM computers.
(1)
Industrial safety -- Management.
(1)
Information policy -- European Union countries.
(1)
Information technology -- Auditing.
(1)
Information technology -- Certification.
(1)
Information technology -- Management.
(1)
Information technology.
(1)
Information visualization.
(1)
Information warfare.
(1)
Instant messaging.
(1)
Intellectual property.
(1)
Internet programming.
(1)
Internet.
(1)
Intrusion detection systems (Computer security)
(1)
Java (Computer program language)
(1)
Languages, Artificial.
(1)
Libraries -- Safety measures.
(1)
Library information networks -- Security measures.
(1)
Mac OS.
(1)
Macintosh (Computer) -- Programming.
(1)
Management information systems.
(1)
Medical informatics.
(1)
Medical records -- Access control.
(1)
Medical records -- Data processing.
(1)
Microsoft Forefront.
(1)
Microsoft Windows (Computer file) -- Examinations -- Study guides.
(1)
Multimedia systems -- Security measures.
(1)
Narraciones solaris.
(1)
Online social networks.
(1)
Open source software.
(1)
Oracle (Computer file)
(1)
Oracle (Computer file) -- Handbooks, manuals, etc.
(1)
Peer-to-peer architecture (Computer networks)
(1)
Private security services.
(1)
Process control -- Security measures.
(1)
Programming (Mathematics)
(1)
Programming languages (Electronic computers)
(1)
Risk management.
(1)
SQL (Computer program language)
(1)
Scripting languages (Computer science)
(1)
Security systems.
(1)
Social engineering.
(1)
Social media.
(1)
Software engineering.
(1)
Software protection.
(1)
Spam filtering (Electronic mail)
(1)
Technology -- Research -- United States.
(1)
Visual perception.
(1)
Watermarks -- Data processing.
(1)
Web servers -- Security measures.
(1)
Web site development -- Security measures.
(1)
Web sites -- Design.
(1)
Web sites -- Security measures.
(1)
Wireless communication systems -- Security measures.
(1)
XML (Document markup language)
(1)
i5/OS.
(1)
Daha fazla
Tümünü genişlet
Daha az
Hepsini Daralt
Kütüphane
Dahil
Hariç
Başkent Kütüphanesi
Lokasyon
Dahil
Hariç
Ebook Central
false
{sortLabel}
{alphabetical}
{relevance}
{include}
{exclude}
{facetName}
{results}
{displayName}
{count}
{error}
Eylem Seç
Ayırt
Listelerime ekle
Eposta
Yazdır
196 sonuç bulundu
1
2
3
4
5
6
..
17
Sırala:
Konuyla İlgili Sırala
Yayın Yılı (eskiden yeniye)
Yayın Yılı (yeniden eskiye)
Başlık
Yazar
OK
Eposta Adresleri
:
Phone Number:
Mobile Carrier:
AT&T
Boost
Nextel (Sprint)
Sprint (PCS)
T Mobile
TracFone
US Cellular
Verizon
Virgin
Select An Item
Data usage warning: You will receive one text message for each title you selected.
Standard text messaging rates apply.
Text it to me
Text it to me, and go to next item
000000000000
DEFAULTTR
Liste seç
Geçici Liste
Bunu varsayılan liste yap.
Öğeler başarıyla eklendi
Öğeler eklenirken hata oldu. Lütfen tekrar deneyiniz.
Cybersecurity for industrial control systems SCADA, DCS, PLC, HMI, and SIS
37.
Cybersecurity for industrial control systems SCADA, DCS, PLC, HMI, and SIS
by
Macaulay, Tyson.
Click to View
Format:
Data mining tools for malware detection
38.
Data mining tools for malware detection
by
Masud, Mehedy.
Click to View
Format:
Low tech hacking street smarts for security professionals
39.
Low tech hacking street smarts for security professionals
by
Wiles, Jack.
Click to View
Format:
Windows forensic analysis toolkit advanced analysis techniques for Windows 7
40.
Windows forensic analysis toolkit advanced analysis techniques for Windows 7
by
Carvey, Harlan A.
Click to View
Format:
Embedded systems security practical methods for safe and secure software and systems development
41.
Embedded systems security practical methods for safe and secure software and systems development
by
Kleidermacher, David.
Click to View
Format:
Advances in intelligence and security informatics
42.
Advances in intelligence and security informatics
by
Mao, Wenji.
Click to View
Format:
IBM i security administration and compliance
43.
IBM i security administration and compliance
by
Woodbury, Carol.
Click to View
Format:
Oracle Identity and Access Manager 11g for administrators administer Oracle Identity and Access Management: installation, configuration, and day-to-day tasks
44.
Oracle Identity and Access Manager 11g for administrators administer Oracle Identity and Access Management: installation, configuration, and day-to-day tasks
by
Kumar, Atul.
Click to View
Format:
Microsoft Forefront UAG 2010 administrator's handbook take full command of Microsoft Forefront Unified Access Gateway to secure your business applications and provide dynamic remote access with DirectAccess
45.
Microsoft Forefront UAG 2010 administrator's handbook take full command of Microsoft Forefront Unified Access Gateway to secure your business applications and provide dynamic remote access with DirectAccess
by
Ben-Ari, Erez.
Click to View
Format:
Security risk management building an information security risk management program from the ground up
46.
Security risk management building an information security risk management program from the ground up
by
Wheeler, Evan.
Click to View
Format:
Securing the cloud cloud computer security techniques and tactics
47.
Securing the cloud cloud computer security techniques and tactics
by
Winkler, J. R. (Joachim R.)
Click to View
Format:
Security 2020 reduce security risks this decade
48.
Security 2020 reduce security risks this decade
by
Howard, Doug.
Click to View
Format:
Eylem Seç
Ayırt
Listelerime ekle
Eposta
Yazdır
1
2
3
4
5
6
..
17
Search Results
Elektronik Kaynaklar
Search Results
Elektronik Kaynaklar
OK
Eposta Adresleri
:
Phone Number:
Mobile Carrier:
AT&T
Boost
Nextel (Sprint)
Sprint (PCS)
T Mobile
TracFone
US Cellular
Verizon
Virgin
Select An Item
Data usage warning: You will receive one text message for each title you selected.
Standard text messaging rates apply.
Text it to me
Text it to me, and go to next item
Elektronik Kaynaklar
Sonuçlar alınıyor Elektronik Kaynaklar...
action
Go to:
Search Results
|
Search Facets
|
Top of Page