Giriş
|
Hesabım
|
Listelerim
|
|
Remember to clear the cache and close the browser window.
English
Search Limit
Bütün Kütüphaneler
Elektronik Kaynaklar
Hepsi
Başkent Üniversitesi Kütüphanesi
Anadolu OSB Meslek Yüksekokulu
Atasev Özel Koleksiyon
Erdoğan Tercan Koleksiyonu
Güzel Sanatlar ve Tasarım Arşivi
Kazan Meslek Yüksekokulu
Hukuk Koleksiyonu
Ord.Prof.Dr. Enver Ziya Karal Tarih Uygulama Ars.Mrk.
Özel Koleksiyon Serdar Özersin
Tez Koleksiyonu
Tüm Alanlar
Başlık
Yazar
Konu
ISBN
ISSN
8
Search Field
Tüm Alanlar
Arama:
Gelişmiş Arama
Search Results
Elektronik Kaynaklar
Arama Sonuçlarını Sınırlandır
Daraltılmış:
+
Language: English
+
Kütüphane: Başkent Kütüphanesi
+
Konu: Computer networks -- Security measures.
+
Konu: Computer security.
Yazar
Dahil
Hariç
ProQuest (Firm)
(65)
Beale, Jay.
(4)
Foster, James C.
(4)
Hunter, Laura E.
(4)
Carvey, Harlan A.
(3)
Limbert, Matthew, designer.
(3)
Long, Johnny.
(3)
Rittinghouse, John W.
(3)
Wiles, Jack.
(3)
Winkler, J. R. (Joachim R.)
(3)
Amini, Rob.
(2)
Andress, Jason.
(2)
Caswell, Brian.
(2)
Cole, Eric.
(2)
Contos, Brian T.
(2)
Cross, Michael, 1965-
(2)
Erickson, Jon, 1977-
(2)
Grasdal, Martin.
(2)
Hancock, Bill, 1957-
(2)
Henmi, Anne.
(2)
Katsaropoulos, Chris, editor.
(2)
Meyer, Greg.
(2)
Parker, Tom.
(2)
Potter, Bruce.
(2)
Qian, Yi, 1962-
(2)
Ramirez, Gilbert.
(2)
Rash, Michael.
(2)
Ring, Sandra.
(2)
Sachs, Marcus H.
(2)
Shimonski, Robert.
(2)
Shinder, Debra Littlejohn.
(2)
Shinder, Thomas W.
(2)
Stapko, Timothy John.
(2)
Todd, Chad.
(2)
Vacca, John R.
(2)
Wotring, Brian.
(2)
Zalewski, Michal.
(2)
Ablon, Lillian, author.
(1)
Ahmad, David R. Mirza.
(1)
Alcover, Jorge Blanco.
(1)
Alder, Raven.
(1)
American Evaluation Association.
(1)
Anderson, Brian (Brian James)
(1)
Andress, Jason, author.
(1)
Andrés, Steven.
(1)
Archibald, Neil.
(1)
Assam, Tarek.
(1)
Baker, Andrew R.
(1)
Barnett, Ryan C.
(1)
Baskin, Brian, author.
(1)
Beaver, Kevin.
(1)
Ben-Ari, Erez.
(1)
Bennett, Eleanor Leonne, cover designer.
(1)
Bertino, Elisa.
(1)
Bhalla, Nish.
(1)
Bhardwaj, Pawan K.
(1)
Bianco, David J., 1971-
(1)
Blair, John, author.
(1)
Bolt, Steven.
(1)
Bray, Rory.
(1)
Buchanan, Cameron, author.
(1)
Burke, Josh.
(1)
Burnett, Mark (Mark M.)
(1)
Burton, James.
(1)
Carbone, Fernando, author.
(1)
Cardwell, Kevin, author.
(1)
Carvey, Harlan A., author.
(1)
Carvey, Harlan, author.
(1)
Carvey, Harlan.
(1)
Casco, Steven.
(1)
Chapman, Chris, author.
(1)
Cherry, Denny.
(1)
Cid, Daniel.
(1)
Clark, Gregory, author.
(1)
Clarke, Justin.
(1)
Conti, Greg.
(1)
Cook, Randy (Randy R.)
(1)
Cross, Michael.
(1)
Cruz, Maria Ines, designer.
(1)
D'Arcy, John P., 1975-
(1)
Dai, Yuan-Shun.
(1)
Dattani, Dinesh D.
(1)
DeMott, Jared.
(1)
Delfanti, Alessandro.
(1)
Deraison, Renaud.
(1)
Devost, Matthew G.
(1)
Dolev, Ran.
(1)
Donaldson, Scott E., author.
(1)
Dubrawsky, Ido.
(1)
Ellis, Juanita.
(1)
Ely, Adam.
(1)
Erbschloe, Michael.
(1)
Esler, Joel.
(1)
Evergreen, Stephanie.
(1)
Ficco, Massimo, editor.
(1)
Fichera, Joe, 1966-
(1)
Fowler, Kevvie, author.
(1)
Franco, Pedro, author.
(1)
Fuller, Ed.
(1)
Furnell, Steve, editor.
(1)
Furnell, Steven, 1970-
(1)
Gallo, Timonthy, editor.
(1)
Gantz, Stephen D.
(1)
Gavrilenko, K., author.
(1)
Ginodman, Veniamin, editor.
(1)
Gomzin, Slava.
(1)
Goodman, Seymour E.
(1)
Gregg, Michael (Michael C.)
(1)
Guerrier, Claudine, author.
(1)
Haines, Brad.
(1)
Hathaway, Melissa E., editor of compilation.
(1)
Hay, Andrew.
(1)
Heinen, Neils.
(1)
Herkanaidu, Ram, editor.
(1)
Hexmoor, Henry, author.
(1)
Huseby, Sverre H.
(1)
Hutchens, Justin, author.
(1)
Jaatun, Martin Gilje, editor.
(1)
Johnson, Norris L.
(1)
Jordan, Brittney, contributor.
(1)
Kane, Greg.
(1)
Kenyon, Brian.
(1)
Khan, Latifur.
(1)
Khnaser, Elias N.
(1)
Kissell, Joe.
(1)
Kolde, Jennifer.
(1)
Koppel, Lorna.
(1)
Krutz, Ronald L.
(1)
Kumar, Atul.
(1)
LaRock, Thomas.
(1)
Lee, Stefano Kewan, author.
(1)
Leibrock, Larry, editor.
(1)
Li, Qing, author.
(1)
Libicki, Martin C., author.
(1)
Lin, Herbert.
(1)
Liska, Allan, author.
(1)
Liu, Dale.
(1)
Loshin, Peter.
(1)
Lynch, F. William.
(1)
Martin, Brian, editor.
(1)
Maske, Steve.
(1)
Masud, Mehedy.
(1)
Maynor, David.
(1)
Meine, Bill.
(1)
Michajlowski, A., author.
(1)
Miles, Wyman.
(1)
Miller, Charles Alfred.
(1)
Mitchell, Ed, 1945-
(1)
Mjølsnes, Stig F., author.
(1)
Moeller, Robert R.
(1)
Morris, Greg.
(1)
Moskowitz, Sanford, author.
(1)
Nahari, Hadi.
(1)
National Research Council (U.S.). Committee on Improving Cybersecurity Research in the United States.
(1)
Nazario, Jose.
(1)
Obelets, Natalya, editor.
(1)
Orebaugh, Angela.
(1)
Osipov, Vitaly.
(1)
Palmieri, Francesco, editor.
(1)
Pan, Yi, 1960-
(1)
Pandey, Abhishek, cover designer.
(1)
Perez, Richard, 1969 October 17-
(1)
Piccard, Paul L.
(1)
Poole, Owen.
(1)
Posluns, Jeffrey.
(1)
Ransome, James F.
(1)
Rathaus, Noam.
(1)
Rearick, Benjamin, project director.
(1)
Rispoli, Mike, editor.
(1)
Rogers, Russ.
(1)
Rose, Curtis, editor.
(1)
Rossberg, Michael, author.
(1)
Russell, Ryan, 1969-
(1)
Samayan, Malathi, project director.
(1)
Sanders, Chris, 1986-
(1)
Schiller, Craig A.
(1)
Schäfer, Günter, author.
(1)
Shavers, Brett, author.
(1)
Shein, Rob.
(1)
Shema, Mike.
(1)
Shinder, Debra Littlejohn, author.
(1)
Shinder, Debra Littlejohn. Scene of the cybercrime.
(1)
Shinder, Dr. Thomas W.
(1)
Shostack, Adam.
(1)
Siegel, Stanley G., author.
(1)
Sims, Kristin, author.
(1)
Smith, Jason (Adjunct associate professor)
(1)
Solomon, Michael R.
(1)
Speed, Tim.
(1)
Stefanek, George L.
(1)
Stowe, Geoffrey, author.
(1)
Strebe, Matthew.
(1)
Street, Jayson E., author.
(1)
Sullivant, John, author.
(1)
Sumner, Stuart, author.
(1)
Takahashi, Kenji.
(1)
Takanen, Ari.
(1)
Thuraisingham, Bhavani M.
(1)
Tiller, James S.
(1)
Timm, Carl.
(1)
Daha fazla
Tümünü genişlet
Daha az
Hepsini Daralt
Materyal Türü
Dahil
Hariç
E-Kitap
Yayın Yılı
Dahil
Hariç
-
2014
(15)
2004
(14)
2007
(13)
2008
(13)
2006
(12)
2011
(12)
2003
(11)
2005
(10)
2016
(10)
2013
(8)
2015
(7)
2002
(6)
2010
(6)
2012
(6)
2001
(5)
2018
(3)
2009
(2)
2017
(1)
2019
(1)
Daha fazla
Tümünü genişlet
Daha az
Hepsini Daralt
Konu
Dahil
Hariç
Electronic books.
(155)
COMPUTERS -- Internet -- Security.
(32)
COMPUTERS -- Networking -- Security.
(32)
COMPUTERS -- Security -- General.
(32)
Internet -- Security measures.
(13)
Computer hackers.
(10)
Computers -- Access control.
(7)
Microsoft Windows (Computer file)
(7)
Computer crimes -- Prevention.
(6)
Computer crimes -- Investigation.
(5)
Operating systems (Computers)
(5)
Computer crimes -- Investigation -- United States -- Methodology.
(4)
Cyberterrorism -- Prevention.
(4)
Data encryption (Computer science)
(4)
Database security.
(4)
Forensic sciences.
(4)
Hackers.
(4)
Microsoft Windows (Computer file) -- Security measures.
(4)
Cloud computing.
(3)
Computer crimes.
(3)
Computer networks -- Access control.
(3)
Computer science.
(3)
Computer viruses.
(3)
Data protection.
(3)
Firewalls (Computer security)
(3)
Information resources management.
(3)
Microsoft Windows server.
(3)
Security systems.
(3)
Web servers -- Security measures.
(3)
Web sites -- Security measures.
(3)
Andre fag (naturvidenskab og teknik) Andre fag
(2)
Application software -- Security measures.
(2)
Business enterprises -- Computer networks -- Security measures.
(2)
ColdFusion.
(2)
Computer networks -- Reliability.
(2)
Computer networks.
(2)
Computercriminaliteit.
(2)
Cyberterrorism.
(2)
Electronic information resources -- Access control.
(2)
Embedded computer systems.
(2)
Engineering & Applied Sciences.
(2)
Information technology -- Auditing.
(2)
Information technology -- Security measures.
(2)
Information visualization.
(2)
Intrusion detection systems (Computer security)
(2)
LAW -- Forensic Science.
(2)
Microsoft ISA server.
(2)
Open source software.
(2)
Réseaux d'ordinateurs -- Sécurité -- Mesures.
(2)
Wireless communication systems -- Security measures.
(2)
World Wide Web -- Security measures.
(2)
Agents intelligents (Logiciels)
(1)
BUSINESS & ECONOMICS -- Corporate Governance.
(1)
BUSINESS & ECONOMICS -- Leadership.
(1)
BUSINESS & ECONOMICS -- Organizational Development.
(1)
BUSINESS & ECONOMICS -- Workplace Culture.
(1)
Browsers (Computer programs)
(1)
Business planning.
(1)
COMPUTERS -- Digital Media -- General.
(1)
COMPUTERS -- Hardware -- Handheld Devices.
(1)
COMPUTERS -- Hardware -- Personal Computers -- General.
(1)
COMPUTERS -- Interactive & Multimedia.
(1)
COMPUTERS -- Microprocessors.
(1)
COMPUTERS -- Online Services.
(1)
COMPUTERS -- Operating Systems -- DOS.
(1)
COMPUTERS -- Operating Systems -- Macintosh.
(1)
COMPUTERS -- Operating Systems -- Windows Server & NT.
(1)
COMPUTERS -- Operating Systems -- Windows Workstation.
(1)
COMPUTERS -- Security -- Cryptography.
(1)
COMPUTERS -- Security -- Networking.
(1)
COMPUTERS -- System Administration -- Storage & Retrieval.
(1)
COMPUTERS -- System Administration -- Windows Administration.
(1)
COMPUTERS -- Web -- Site Design.
(1)
COMPUTERS -- Web -- User Generated Content.
(1)
Cloud computing -- Security measures.
(1)
Commercial crimes.
(1)
Component software.
(1)
Computer Science.
(1)
Computer crimes -- Case studies.
(1)
Computer crimes -- Investigation -- Handbooks, manuals, etc.
(1)
Computer crimes -- Investigation -- Methodology.
(1)
Computer crimes -- Investigation -- United States.
(1)
Computer crimes -- Investments.
(1)
Computer network protocols.
(1)
Computer networks -- Design and construction.
(1)
Computer networks -- Security measures -- Fiction.
(1)
Computer networks -- Security measures -- Handbooks, manuals, etc.
(1)
Computer networks -- Security measures -- United States.
(1)
Computer security -- Fiction.
(1)
Computer security -- Handbooks, manuals, etc.
(1)
Computer security -- United States.
(1)
Computer software -- Development.
(1)
Computerbeveiliging.
(1)
Computersicherheit
(1)
Confidential business information.
(1)
Corporate culture.
(1)
Corporations -- Security measures.
(1)
Criminalistiek.
(1)
Cryptography.
(1)
Cyberinfrastructure -- Security measures.
(1)
Data mining.
(1)
Database design.
(1)
Electrical & Computer Engineering.
(1)
Electronic book.
(1)
Electronic data processing departments -- Auditing.
(1)
FICTION -- General.
(1)
Fiction.
(1)
Forensic sciences -- Handbooks, manuals, etc.
(1)
Google.
(1)
Groupware (Computer software)
(1)
Hackers -- Fiction.
(1)
Hacking.
(1)
Handbooks and manuals.
(1)
Industries -- Security measures.
(1)
Information storage and retrieval systems -- Business -- Security measures.
(1)
Instant messaging.
(1)
Internet domain names.
(1)
Internet programming.
(1)
Mac OS.
(1)
Macintosh (Computer) -- Programming.
(1)
Malware (Computer software) -- Prevention.
(1)
Microsoft Windows (Computer file) -- Examinations -- Study guides.
(1)
Microsoft Windows.
(1)
Multidisciplinary design optimization.
(1)
OSSEC (Computer file)
(1)
Online social networks -- Security measures.
(1)
Open source intelligence.
(1)
Operations systems (Computer)
(1)
Oracle (Computer file)
(1)
Peer-to-peer architecture (Computer networks)
(1)
Penetration testing (Computer security)
(1)
Risk management.
(1)
Réseaux d'ordinateurs.
(1)
SQL (Computer program language)
(1)
Sites Web -- Sécurité -- Mesures.
(1)
Situational awareness.
(1)
Snort (Computer file)
(1)
Snort (Software)
(1)
Snort 2.0
(1)
Solaris (Computer file)
(1)
Systèmes informatiques -- Sécurité -- Mesures.
(1)
Technology -- Research -- United States.
(1)
Telecommunications.
(1)
Transmission sans fil.
(1)
UNIX Shells.
(1)
United States.
(1)
Visual perception.
(1)
Web 2.0 -- Security measures.
(1)
Web search engines.
(1)
Web site development -- Security measures.
(1)
Web sites -- Design.
(1)
z/OS.
(1)
Überwachung
(1)
Daha fazla
Tümünü genişlet
Daha az
Hepsini Daralt
Lokasyon
Dahil
Hariç
E-Kütüphane
Ebook Central
Elsevier E-Kitap Koleksiyonu
false
{sortLabel}
{alphabetical}
{relevance}
{include}
{exclude}
{facetName}
{results}
{displayName}
{count}
{error}
Eylem Seç
Ayırt
Listelerime ekle
Eposta
Yazdır
155 sonuç bulundu
1
2
3
4
5
6
..
13
Sırala:
Konuyla İlgili Sırala
Yayın Yılı (eskiden yeniye)
Yayın Yılı (yeniden eskiye)
Başlık
Yazar
OK
Eposta Adresleri
:
Phone Number:
Mobile Carrier:
AT&T
Boost
Nextel (Sprint)
Sprint (PCS)
T Mobile
TracFone
US Cellular
Verizon
Virgin
Select An Item
Data usage warning: You will receive one text message for each title you selected.
Standard text messaging rates apply.
Text it to me
Text it to me, and go to next item
000000000000
DEFAULTTR
Liste seç
Geçici Liste
Bunu varsayılan liste yap.
Öğeler başarıyla eklendi
Öğeler eklenirken hata oldu. Lütfen tekrar deneyiniz.
Cyber security and IT infrastructure protection
37.
Cyber security and IT infrastructure protection
by
Vacca, John R.
Click to View
Format:
Biohackers the politics of open science
38.
Biohackers the politics of open science
by
Delfanti, Alessandro.
Click to View
Format:
Data visualization. Part 2
39.
Data visualization. Part 2
by
Assam, Tarek.
Click to View
Format:
Network intrusion analysis methodologies, tools, and techniques for incident analysis and response
40.
Network intrusion analysis methodologies, tools, and techniques for incident analysis and response
by
Fichera, Joe, 1966-
Click to View
Format:
Hacking for dummies
41.
Hacking for dummies
by
Beaver, Kevin.
Click to View
Format:
Web application defender's cookbook battling hackers and protecting users
42.
Web application defender's cookbook battling hackers and protecting users
by
Barnett, Ryan C.
Click to View
Format:
Practical anonymity hiding in plain sight online
43.
Practical anonymity hiding in plain sight online
by
Loshin, Peter.
Click to View
Format:
IBM mainframe security beyond the basics : a practical guide from a z/OS and RACF perspective
44.
IBM mainframe security beyond the basics : a practical guide from a z/OS and RACF perspective
by
Dattani, Dinesh D.
Click to View
Format:
Information protection playbook
45.
Information protection playbook
by
Kane, Greg.
Click to View
Format:
Data mining tools for malware detection
46.
Data mining tools for malware detection
by
Masud, Mehedy.
Click to View
Format:
Windows forensic analysis toolkit advanced analysis techniques for Windows 7
47.
Windows forensic analysis toolkit advanced analysis techniques for Windows 7
by
Carvey, Harlan A.
Click to View
Format:
Hacking web apps detecting and preventing web application security problems
48.
Hacking web apps detecting and preventing web application security problems
by
Shema, Mike.
Click to View
Format:
Eylem Seç
Ayırt
Listelerime ekle
Eposta
Yazdır
1
2
3
4
5
6
..
13
Search Results
Elektronik Kaynaklar
Search Results
Elektronik Kaynaklar
OK
Eposta Adresleri
:
Phone Number:
Mobile Carrier:
AT&T
Boost
Nextel (Sprint)
Sprint (PCS)
T Mobile
TracFone
US Cellular
Verizon
Virgin
Select An Item
Data usage warning: You will receive one text message for each title you selected.
Standard text messaging rates apply.
Text it to me
Text it to me, and go to next item
Elektronik Kaynaklar
Sonuçlar alınıyor Elektronik Kaynaklar...
action