Giriş
|
Hesabım
|
Listelerim
|
|
Remember to clear the cache and close the browser window.
English
Search Limit
Bütün Kütüphaneler
Elektronik Kaynaklar
Hepsi
Başkent Üniversitesi Kütüphanesi
Anadolu OSB Meslek Yüksekokulu
Atasev Özel Koleksiyon
Erdoğan Tercan Koleksiyonu
Güzel Sanatlar ve Tasarım Arşivi
Kazan Meslek Yüksekokulu
Hukuk Koleksiyonu
Ord.Prof.Dr. Enver Ziya Karal Tarih Uygulama Ars.Mrk.
Özel Koleksiyon Serdar Özersin
Tez Koleksiyonu
Tüm Alanlar
Başlık
Yazar
Konu
ISBN
ISSN
8
Search Field
Tüm Alanlar
Arama:
Gelişmiş Arama
Search Results
Elektronik Kaynaklar
Arama Sonuçlarını Sınırlandır
Daraltılmış:
+
Language: English
+
Yayın Yılı: 2011
+
Konu: Computer networks -- Security measures.
Yazar
Dahil
Hariç
ProQuest (Firm)
(17)
Andress, Jason.
(3)
Winkler, J. R. (Joachim R.)
(3)
Ali, Shakeel.
(1)
Atiya, Amir F.
(1)
Ben-Ari, Erez.
(1)
Bertino, Elisa.
(1)
Canavan, Tom.
(1)
Carvey, Harlan.
(1)
Connelly, Olly.
(1)
Davies, Joshua Dennis.
(1)
Demchak, Chris C.
(1)
Dewald, Andreas, author.
(1)
Dolev, Ran.
(1)
Duman, Ekrem.
(1)
Freiling, Felix, author of introduction, etc.
(1)
Göbel, Jan Gerrit, author.
(1)
Heriyanto, Tedi.
(1)
Krutz, Ronald L.
(1)
Kumar, Atul.
(1)
Meine, Bill.
(1)
Miletić, Darko.
(1)
Mönch, Kathrin, editor.
(1)
Nahari, Hadi.
(1)
Rogers, Russ.
(1)
Siliceo, Omar.
(1)
Solomon, Michael R.
(1)
Takahashi, Kenji.
(1)
Thuraisingham, Bhavani M.
(1)
Tsai, Jeffrey J.-P.
(1)
Wheeler, Evan.
(1)
Winterfeld, Steve.
(1)
Wright, Steve.
(1)
Yu, Zhenwei.
(1)
Daha fazla
Tümünü genişlet
Daha az
Hepsini Daralt
Materyal Türü
Dahil
Hariç
E-Kitap
Konu
Dahil
Hariç
Electronic books.
(25)
Computer security.
(12)
COMPUTERS -- Internet -- Security.
(4)
COMPUTERS -- Networking -- Security.
(4)
COMPUTERS -- Security -- General.
(4)
Cloud computing.
(3)
Data protection.
(3)
Computer science.
(2)
Information resources management.
(2)
Information technology -- Security measures.
(2)
Information warfare.
(2)
Microsoft Windows (Computer file)
(2)
Web sites -- Security measures.
(2)
World Wide Web -- Security measures.
(2)
Business enterprises -- Computer networks -- Security measures.
(1)
Component software.
(1)
Computer crimes -- Investigation -- Methodology.
(1)
Computer crimes -- Investments.
(1)
Computer crimes.
(1)
Computer network protocols.
(1)
Computer networks -- Security measures -- Handbooks, manuals, etc.
(1)
Computer networks.
(1)
Computer security -- Evaluation.
(1)
Computer-assisted instruction -- Security measures.
(1)
Computers -- Access control.
(1)
Credit cards.
(1)
Cyberspace -- Security measures.
(1)
Cyberterrorism -- Prevention.
(1)
Data protection -- Standards.
(1)
Database security.
(1)
Electronic book.
(1)
Forensic sciences.
(1)
HISTORY -- Military -- Biological & Chemical Warfare.
(1)
Handbooks and manuals.
(1)
Information warfare -- Handbooks, manuals, etc.
(1)
Internet -- Security measures.
(1)
Liability for credit information.
(1)
Moodle -- Handbooks, manuals, etc.
(1)
National security -- Risk assessment.
(1)
National security -- Technological innovations.
(1)
Open source software.
(1)
Operating systems (Computers)
(1)
Oracle (Computer file)
(1)
Security systems.
(1)
Service-oriented architecture (Computer science)
(1)
WebSphere.
(1)
WordPress (Electronic resource)
(1)
Daha fazla
Tümünü genişlet
Daha az
Hepsini Daralt
Kütüphane
Dahil
Hariç
Başkent Kütüphanesi
Lokasyon
Dahil
Hariç
E-Kütüphane
Ebook Central
Elsevier E-Kitap Koleksiyonu
false
{sortLabel}
{alphabetical}
{relevance}
{include}
{exclude}
{facetName}
{results}
{displayName}
{count}
{error}
Eylem Seç
Ayırt
Listelerime ekle
Eposta
Yazdır
25 sonuç bulundu
1
2
3
Sırala:
Konuyla İlgili Sırala
Yayın Yılı (eskiden yeniye)
Yayın Yılı (yeniden eskiye)
Başlık
Yazar
OK
Eposta Adresleri
:
Phone Number:
Mobile Carrier:
AT&T
Boost
Nextel (Sprint)
Sprint (PCS)
T Mobile
TracFone
US Cellular
Verizon
Virgin
Select An Item
Data usage warning: You will receive one text message for each title you selected.
Standard text messaging rates apply.
Text it to me
Text it to me, and go to next item
000000000000
DEFAULTTR
Liste seç
Geçici Liste
Bunu varsayılan liste yap.
Öğeler başarıyla eklendi
Öğeler eklenirken hata oldu. Lütfen tekrar deneyiniz.
Web commerce security design and development
13.
Web commerce security design and development
by
Nahari, Hadi.
Click to View
Format:
Intrusion detection a machine learning approach
14.
Intrusion detection a machine learning approach
by
Tsai, Jeffrey J.-P.
Click to View
Format:
Use of risk analysis in computer-aided persuasion
15.
Use of risk analysis in computer-aided persuasion
by
Duman, Ekrem.
Click to View
Format:
Client-Honeypots : exploring malicious websites
16.
Client-Honeypots : exploring malicious websites
by
Göbel, Jan Gerrit, author.
Click to View
Format:
Securing the cloud cloud computer security techniques and tactics
17.
Securing the cloud cloud computer security techniques and tactics
by
Winkler, J. R. (Joachim R.)
ScienceDirect
http://www.sciencedirect.com/science/book/9781597495929
Format:
The basics of information security understanding the fundamentals of InfoSec in theory and practice
18.
The basics of information security understanding the fundamentals of InfoSec in theory and practice
by
Andress, Jason.
ScienceDirect
http://www.sciencedirect.com/science/book/9781597496537
Format:
Security for service oriented systems
19.
Security for service oriented systems
by
Thuraisingham, Bhavani M.
Click to View
Format:
Identity management concepts, technologies, and systems
20.
Identity management concepts, technologies, and systems
by
Bertino, Elisa.
Click to View
Format:
Computer Forensics jumpstart
21.
Computer Forensics jumpstart
by
Solomon, Michael R.
Click to View
Format:
The basics of information security : understanding the fundamentals of InfoSec in theory and practice
22.
The basics of information security : understanding the fundamentals of InfoSec in theory and practice
by
Andress, Jason.
ScienceDirect
https://www.sciencedirect.com/science/book/9781597496537
Format:
Cyber warfare : techniques, tactics and tools for security practitioners
23.
Cyber warfare : techniques, tactics and tools for security practitioners
by
Andress, Jason.
ScienceDirect
http://www.sciencedirect.com/science/book/9781597496377
Format:
Windows Registry Forensics : Advanced Digital Forensic Analysis of the Windows Registry.
24.
Windows Registry Forensics : Advanced Digital Forensic Analysis of the Windows Registry.
by
Carvey, Harlan.
ScienceDirect
https://www.sciencedirect.com/science/book/9781597495806
Format:
Eylem Seç
Ayırt
Listelerime ekle
Eposta
Yazdır
1
2
3
Search Results
Elektronik Kaynaklar
Search Results
Elektronik Kaynaklar
OK
Eposta Adresleri
:
Phone Number:
Mobile Carrier:
AT&T
Boost
Nextel (Sprint)
Sprint (PCS)
T Mobile
TracFone
US Cellular
Verizon
Virgin
Select An Item
Data usage warning: You will receive one text message for each title you selected.
Standard text messaging rates apply.
Text it to me
Text it to me, and go to next item
Elektronik Kaynaklar
Sonuçlar alınıyor Elektronik Kaynaklar...
action