Giriş
|
Hesabım
|
Listelerim
|
|
Remember to clear the cache and close the browser window.
English
Search Limit
Bütün Kütüphaneler
Elektronik Kaynaklar
Hepsi
Başkent Üniversitesi Kütüphanesi
Anadolu OSB Meslek Yüksekokulu
Atasev Özel Koleksiyon
Erdoğan Tercan Koleksiyonu
Güzel Sanatlar ve Tasarım Arşivi
Kazan Meslek Yüksekokulu
Hukuk Koleksiyonu
Ord.Prof.Dr. Enver Ziya Karal Tarih Uygulama Ars.Mrk.
Özel Koleksiyon Serdar Özersin
Tez Koleksiyonu
Tüm Alanlar
Başlık
Yazar
Konu
ISBN
ISSN
8
Search Field
Tüm Alanlar
Arama:
Gelişmiş Arama
Search Results
Elektronik Kaynaklar
Arama Sonuçlarını Sınırlandır
Daraltılmış:
+
Yazar: ProQuest (Firm)
+
Konu: Computer networks -- Security measures.
Yazar
Dahil
Hariç
International Business Machines Corporation. International Technical Support Organization.
(4)
Shimonski, Robert.
(4)
Vacca, John R.
(4)
Foster, James C.
(3)
Shinder, Debra Littlejohn.
(3)
Shinder, Thomas W.
(3)
Beale, Jay.
(2)
Canavan, Tom.
(2)
Carvey, Harlan A.
(2)
Cole, Eric.
(2)
Erickson, Jon, 1977-
(2)
Grasdal, Martin.
(2)
Henmi, Anne.
(2)
Hunter, Laura E.
(2)
Osipov, Vitaly.
(2)
Pan, Yi, 1960-
(2)
Ramirez, Gilbert.
(2)
Rayns, Chris.
(2)
Rountree, Derrick.
(2)
Strebe, Matthew.
(2)
Tam, Kenneth.
(2)
Thuraisingham, Bhavani M.
(2)
Zalewski, Michal.
(2)
Ahmad, David R. Mirza.
(1)
Aissi, Selim.
(1)
Alcover, Jorge Blanco.
(1)
Ali, Shakeel.
(1)
Allison, Steve.
(1)
Allsopp, Wil.
(1)
Amini, Rob.
(1)
Amon, Cheri.
(1)
Andress, Jason.
(1)
Andrés, Steven.
(1)
Anson, Steve.
(1)
Antonius, Jesper.
(1)
Archibald, Neil.
(1)
Assing, Dominique.
(1)
Atiya, Amir F.
(1)
Babbin, Jacob.
(1)
Barnett, Ryan C.
(1)
Bayer, Chad M.
(1)
Beaver, Kevin.
(1)
Behrens, Thorsten.
(1)
Ben-Ari, Erez.
(1)
Bendell, Daniel H.
(1)
Bertino, Elisa.
(1)
Beyah, Raheem (Raheem A.), 1976-
(1)
Bhalla, Nish.
(1)
Birkholz, Erik Pace.
(1)
Bolt, Steven.
(1)
Briggs, Jonathan.
(1)
Burke, Josh.
(1)
Burnett, Mark (Mark M.)
(1)
Bücker, Axel.
(1)
Calé, Stéphane.
(1)
Cameron, Rob.
(1)
Cantrell, Chris.
(1)
Cantrell, Christopher.
(1)
Capurro, Rafael.
(1)
Carafano, James Jay, 1955-
(1)
Carey, David.
(1)
Caswell, Brian.
(1)
Chuvakin, Anton.
(1)
Clarke, Justin.
(1)
Connelly, Olly.
(1)
Conti, Greg.
(1)
Contos, Brian T.
(1)
Corbett, Cherita (Cherita L.)
(1)
Cross, Michael.
(1)
D'Arcy, John P., 1975-
(1)
Dabbous, Nora.
(1)
Dai, Yuan-Shun.
(1)
Danielyan, Edgar.
(1)
Davies, Joshua Dennis.
(1)
Davies, Saida.
(1)
DeLuccia, James J., 1977-
(1)
DeMott, Jared.
(1)
Delfanti, Alessandro.
(1)
Demchak, Chris C.
(1)
Deraison, Renaud.
(1)
Dolev, Ran.
(1)
Duman, Ekrem.
(1)
Dwivedi, Himanshu.
(1)
Eko, Lyombe.
(1)
Eldred, Michael.
(1)
Fadel, José.
(1)
Fichera, Joe, 1966-
(1)
Flynn, Hal.
(1)
Fortenberry, Benjamin W.
(1)
Fuller, Ed.
(1)
Furnell, Steven, 1970-
(1)
Ganci, John.
(1)
Gatford, Chris.
(1)
Geier, James T.
(1)
Gold, André.
(1)
Goodman, Seymour E.
(1)
Gutiérrez, Esteban.
(1)
Hancock, Bill, 1957-
(1)
Haroutunian , Evgueni.
(1)
Heinen, Neils.
(1)
Held, Gilbert, 1943-
(1)
Heriyanto, Tedi.
(1)
Hicks, Richard.
(1)
Hoffman, Daniel (Daniel V.), 1972-
(1)
Huseby, Sverre H.
(1)
Hänninen, Pekka.
(1)
Jagielski, Piotr.
(1)
Kappeler, Patrick.
(1)
Kenyon, Brian.
(1)
Khan, Latifur.
(1)
Khnaser, Elias N.
(1)
Khoury, Franjieh El.
(1)
Killion, Dave.
(1)
Kissell, Joe.
(1)
Knapp, Eric D.
(1)
Knipp, Eric.
(1)
Kolde, Jennifer.
(1)
Kotwica, Kathleen.
(1)
Kranakis, Evangelos.
(1)
Kritchever, Yury.
(1)
Krutz, Ronald L.
(1)
Kumar, Atul.
(1)
LaBelle, Peggy.
(1)
Langill, Joel.
(1)
Lathem, Chris.
(1)
Lin, Herbert.
(1)
Long, Johnny.
(1)
Loshin, Peter.
(1)
Lucas, Mark.
(1)
Lynn, Kevin.
(1)
Manzuik, Steve.
(1)
Masud, Mehedy.
(1)
Maxwell, Douglas D.
(1)
McNair, Janise (Janise Yvette), 1968-
(1)
Meine, Bill.
(1)
Meyer, Greg.
(1)
Miletić, Darko.
(1)
Miller, Charles Alfred.
(1)
Milroy, Derek.
(1)
Moeller, Robert R.
(1)
Morris, Greg.
(1)
NATO Advanced Study Institute on Network Security and Intrusion Detection (2005 : Yerevan, Armenia)
(1)
NATO Science for Peace and Security Programme.
(1)
Nabrdalik, Jakub.
(1)
Nagel, Daniel.
(1)
Nahari, Hadi.
(1)
National Research Council (U.S.). Committee on Improving Cybersecurity Research in the United States.
(1)
National Research Council (U.S.). Committee on Information Systems Trustworthiness.
(1)
Nazario, Jose.
(1)
Neely, Matthew.
(1)
Norman, Thomas L.
(1)
North Atlantic Treaty Organization. Public Diplomacy Division.
(1)
Ogden, Bill.
(1)
Oppliger, Rolf.
(1)
Orebaugh, Angela.
(1)
Oriyano, Sean-Philip.
(1)
Osborne, Mark.
(1)
Owens, Les.
(1)
Parker, Tom.
(1)
Pauli, Joshua J.
(1)
Piccard, Paul L.
(1)
Poisel, Richard.
(1)
Poole, Owen.
(1)
Potter, Bruce.
(1)
Prasad, Anand.
(1)
Putte, Geert van de.
(1)
Qian, Yi, 1962-
(1)
Rash, Michael.
(1)
Rathaus, Noam.
(1)
Reed, Joshua.
(1)
Riexinger, Dieter.
(1)
Ring, Sandra.
(1)
Rittinghouse, John W.
(1)
Rogers, Paul.
(1)
Russell, Kevin.
(1)
Russell, Ryan, 1969-
(1)
Sachs, Marcus H.
(1)
Samani, Raj.
(1)
Schneider, Fred B.
(1)
Shahbazian, E. (Elisa)
(1)
Shema, Mike.
(1)
Shinder, Dr. Thomas W.
(1)
Siliceo, Omar.
(1)
Singh, Abhishek.
(1)
Solomon, Michael R.
(1)
Sommer, Frank.
(1)
Speed, Tyler Justin.
(1)
Stapko, Timothy John.
(1)
Sumida, Atsushi.
(1)
Takahashi, Kenji.
(1)
Takanen, Ari.
(1)
Tiller, James S.
(1)
Todd, Chad.
(1)
Tsai, Jeffrey J.-P.
(1)
Ventre, Daniel.
(1)
Warnicke, Ed.
(1)
Wheeler, Evan.
(1)
White, Bill.
(1)
White, Scott.
(1)
Wiles, Jack.
(1)
Daha fazla
Tümünü genişlet
Daha az
Hepsini Daralt
Materyal Türü
Dahil
Hariç
E-Kitap
Dil
Dahil
Hariç
English
(147)
Yayın Yılı
Dahil
Hariç
-
2013
(20)
2011
(17)
2005
(16)
2003
(15)
2004
(15)
2008
(12)
2006
(11)
2012
(11)
2007
(9)
2002
(8)
2010
(5)
2001
(3)
2009
(3)
1999
(1)
2014
(1)
Daha fazla
Tümünü genişlet
Daha az
Hepsini Daralt
Konu
Dahil
Hariç
Electronic books.
(147)
Computer security.
(65)
Internet -- Security measures.
(13)
Computer hackers.
(10)
Firewalls (Computer security)
(7)
Computer networks -- Access control.
(6)
Computers -- Access control.
(5)
Web sites -- Security measures.
(5)
WebSphere.
(5)
Computer network protocols.
(4)
World Wide Web -- Security measures.
(4)
Computer crimes -- Prevention.
(3)
Data encryption (Computer science)
(3)
Data protection.
(3)
Information warfare.
(3)
Java (Computer program language)
(3)
Microsoft Windows (Computer file)
(3)
Microsoft Windows server.
(3)
Operating systems (Computers)
(3)
Penetration testing (Computer security)
(3)
Wireless communication systems -- Security measures.
(3)
z/OS.
(3)
Application software -- Security measures.
(2)
Computer crimes -- Investigation -- United States -- Methodology.
(2)
Computer crimes -- Investigation.
(2)
Computer network architectures.
(2)
Computer networks -- Management.
(2)
Computer security -- Management.
(2)
Computer viruses.
(2)
Cyberspace -- Security measures.
(2)
Cyberterrorism -- Prevention.
(2)
Database security.
(2)
Internet.
(2)
Microsoft ISA server.
(2)
Microsoft Windows (Computer file) -- Security measures.
(2)
Open source software.
(2)
Oracle (Computer file)
(2)
Technology -- Research -- United States.
(2)
Web portals -- Security measures.
(2)
Web servers -- Security measures.
(2)
Application logging (Computer science)
(1)
Biometric identification.
(1)
Browsers (Computer programs)
(1)
Business enterprises -- Computer networks -- Security measures.
(1)
Business enterprises -- Security measures.
(1)
Cisco Systems, Inc.
(1)
Cloud computing.
(1)
ColdFusion.
(1)
Commercial crimes.
(1)
Computational grids (Computer systems)
(1)
Computer crimes -- Investigation -- United States.
(1)
Computer crimes -- Investments.
(1)
Computer crimes.
(1)
Computer networks -- Auditing.
(1)
Computer networks -- Design and construction.
(1)
Computer networks -- Reliability.
(1)
Computer networks -- Remote access.
(1)
Computer networks -- Security measures -- United States.
(1)
Computer networks -- Social aspects.
(1)
Computer networks -- Standards.
(1)
Computer networks -- Testing.
(1)
Computer science.
(1)
Computer security -- Evaluation -- Methodology.
(1)
Computer security -- Evaluation.
(1)
Computer security -- United States.
(1)
Computer software -- Development.
(1)
Computer-assisted instruction -- Security measures.
(1)
Credit cards.
(1)
Cryptography.
(1)
Data encryption (Computer science) -- Examinations -- Study guides.
(1)
Data mining.
(1)
Data protection -- Standards.
(1)
Database design.
(1)
Distributed operating systems (Computers) -- Security measures.
(1)
Electronic commerce -- Security measures.
(1)
Electronic data processing -- Distributed processing.
(1)
Electronic data processing departments -- Auditing.
(1)
Electronic data processing personnel -- Certification -- Study guides.
(1)
Electronic information resources -- Access control.
(1)
Electronics in military engineering.
(1)
Embedded computer systems.
(1)
Extranets (Computer networks)
(1)
Forensic sciences.
(1)
Freedom of speech -- France -- History.
(1)
Freedom of speech -- United States -- History.
(1)
Groupware (Computer software)
(1)
Hacktivism.
(1)
IBM Tivoli identity manager.
(1)
IBM computers.
(1)
IEEE 802.11 (Standard)
(1)
IEEE 802.16 (Standard)
(1)
Identity (Philosophical concept)
(1)
Industrial marketing -- Planning.
(1)
Industrial marketing -- Security measures.
(1)
Information networks -- Security measures.
(1)
Information society -- Political aspects.
(1)
Information storage and retrieval systems -- Security measures.
(1)
Information technology -- Auditing.
(1)
Information technology -- Management.
(1)
Information technology -- Security measures.
(1)
Information technology -- Social aspects.
(1)
Information visualization.
(1)
Information warfare -- Political aspects.
(1)
Instant messaging.
(1)
Internet -- Law and legislation -- France.
(1)
Internet -- Law and legislation -- United States.
(1)
Internet and terrorism.
(1)
Internetworking (Telecommunication)
(1)
Intrusion detection systems (Computer security)
(1)
Iris (Eye)
(1)
Joomla! (Computer file)
(1)
Liability for credit information.
(1)
Local area networks (Computer networks) -- Security measures.
(1)
Mac OS.
(1)
Macintosh (Computer) -- Programming.
(1)
Mass media -- Law and legislation.
(1)
Microsoft Windows (Computer file) -- Examinations -- Study guides.
(1)
Military telecommunication.
(1)
Moodle -- Handbooks, manuals, etc.
(1)
National security -- Risk assessment.
(1)
National security -- Technological innovations.
(1)
Peer-to-peer architecture (Computer networks)
(1)
Privacy, Right of -- France.
(1)
Privacy, Right of -- United States.
(1)
Public key infrastructure (Computer security)
(1)
SQL (Computer program language)
(1)
Semantic Web.
(1)
Sensor networks -- Security measures.
(1)
September 11 Terrorist Attacks, 2001.
(1)
Service-oriented architecture (Computer science)
(1)
Smart power grids -- Security measures.
(1)
Social media.
(1)
Social networks.
(1)
TCP/IP (Computer network protocol)
(1)
Telecommunication policy -- United States.
(1)
UNIX (Computer file)
(1)
UNIX Shells.
(1)
Visual perception.
(1)
War and society.
(1)
Web applications -- Security measures.
(1)
Web site development -- Security measures.
(1)
Web site development.
(1)
Web sites -- Authoring programs.
(1)
Wide area networks (Computer networks) -- Access.
(1)
Wireless LANs.
(1)
WordPress (Electronic resource)
(1)
Daha fazla
Tümünü genişlet
Daha az
Hepsini Daralt
Kütüphane
Dahil
Hariç
Başkent Kütüphanesi
Lokasyon
Dahil
Hariç
Ebook Central
false
{sortLabel}
{alphabetical}
{relevance}
{include}
{exclude}
{facetName}
{results}
{displayName}
{count}
{error}
Eylem Seç
Ayırt
Listelerime ekle
Eposta
Yazdır
147 sonuç bulundu
1
2
3
4
5
6
..
13
Sırala:
Konuyla İlgili Sırala
Yayın Yılı (eskiden yeniye)
Yayın Yılı (yeniden eskiye)
Başlık
Yazar
OK
Eposta Adresleri
:
Phone Number:
Mobile Carrier:
AT&T
Boost
Nextel (Sprint)
Sprint (PCS)
T Mobile
TracFone
US Cellular
Verizon
Virgin
Select An Item
Data usage warning: You will receive one text message for each title you selected.
Standard text messaging rates apply.
Text it to me
Text it to me, and go to next item
000000000000
DEFAULTTR
Liste seç
Geçici Liste
Bunu varsayılan liste yap.
Öğeler başarıyla eklendi
Öğeler eklenirken hata oldu. Lütfen tekrar deneyiniz.
CMS security handbook the comprehensive guide for WordPress, Joomla!, Drupal, and Plone
37.
CMS security handbook the comprehensive guide for WordPress, Joomla!, Drupal, and Plone
by
Canavan, Tom.
Click to View
Format:
Implementing SSL/TLS using cryptography and PKI
38.
Implementing SSL/TLS using cryptography and PKI
by
Davies, Joshua Dennis.
Click to View
Format:
Security risk management building an information security risk management program from the ground up
39.
Security risk management building an information security risk management program from the ground up
by
Wheeler, Evan.
Click to View
Format:
Web commerce security design and development
40.
Web commerce security design and development
by
Nahari, Hadi.
Click to View
Format:
Securing the cloud cloud computer security techniques and tactics
41.
Securing the cloud cloud computer security techniques and tactics
by
Winkler, J. R. (Joachim R.)
Click to View
Format:
IBM WebSphere application server V7.0 security secure your WebSphere applications with Java EE and JAAS security standards
42.
IBM WebSphere application server V7.0 security secure your WebSphere applications with Java EE and JAAS security standards
by
Siliceo, Omar.
Click to View
Format:
Moodle security learn how to install and configure Moodle in the most secure way possible
43.
Moodle security learn how to install and configure Moodle in the most secure way possible
by
Miletić, Darko.
Click to View
Format:
WordPress 3 ultimate security protect your WordPress site and its network
44.
WordPress 3 ultimate security protect your WordPress site and its network
by
Connelly, Olly.
Click to View
Format:
Oracle Identity and Access Manager 11g for administrators administer Oracle Identity and Access Management: installation, configuration, and day-to-day tasks
45.
Oracle Identity and Access Manager 11g for administrators administer Oracle Identity and Access Management: installation, configuration, and day-to-day tasks
by
Kumar, Atul.
Click to View
Format:
Microsoft Forefront UAG 2010 administrator's handbook take full command of Microsoft Forefront Unified Access Gateway to secure your business applications and provide dynamic remote access with DirectAccess
46.
Microsoft Forefront UAG 2010 administrator's handbook take full command of Microsoft Forefront Unified Access Gateway to secure your business applications and provide dynamic remote access with DirectAccess
by
Ben-Ari, Erez.
Click to View
Format:
BackTrack 4 assuring security by penetration testing : master the art of penetration testing with BackTrack
47.
BackTrack 4 assuring security by penetration testing : master the art of penetration testing with BackTrack
by
Ali, Shakeel.
Click to View
Format:
Use of risk analysis in computer-aided persuasion
48.
Use of risk analysis in computer-aided persuasion
by
Duman, Ekrem.
Click to View
Format:
Eylem Seç
Ayırt
Listelerime ekle
Eposta
Yazdır
1
2
3
4
5
6
..
13
Search Results
Elektronik Kaynaklar
Search Results
Elektronik Kaynaklar
OK
Eposta Adresleri
:
Phone Number:
Mobile Carrier:
AT&T
Boost
Nextel (Sprint)
Sprint (PCS)
T Mobile
TracFone
US Cellular
Verizon
Virgin
Select An Item
Data usage warning: You will receive one text message for each title you selected.
Standard text messaging rates apply.
Text it to me
Text it to me, and go to next item
Elektronik Kaynaklar
Sonuçlar alınıyor Elektronik Kaynaklar...
action