Giriş
|
Hesabım
|
Listelerim
|
|
Remember to clear the cache and close the browser window.
English
Search Limit
Bütün Kütüphaneler
Elektronik Kaynaklar
Hepsi
Başkent Üniversitesi Kütüphanesi
Anadolu OSB Meslek Yüksekokulu
Atasev Özel Koleksiyon
Erdoğan Tercan Koleksiyonu
Güzel Sanatlar ve Tasarım Arşivi
Kazan Meslek Yüksekokulu
Hukuk Koleksiyonu
Ord.Prof.Dr. Enver Ziya Karal Tarih Uygulama Ars.Mrk.
Özel Koleksiyon Serdar Özersin
Tez Koleksiyonu
Tüm Alanlar
Başlık
Yazar
Konu
ISBN
ISSN
8
Search Field
Tüm Alanlar
Arama:
Gelişmiş Arama
Search Results
Elektronik Kaynaklar
Arama Sonuçlarını Sınırlandır
Daraltılmış:
+
Publication Date: 2010
+
Konu: Computer security.
Yazar
Dahil
Hariç
ProQuest (Firm)
(14)
Engebretson, Pat (Patrick Henry), 1974-
(2)
Anderson, Brian (Brian James)
(1)
Barrett, Diane.
(1)
Boulanger, Jean-Louis.
(1)
Campara, Djenana.
(1)
Choi, Kyung-shick, 1973-
(1)
Ely, Adam.
(1)
Esparza, Javier.
(1)
Goldstein, Emmanuel J.
(1)
Grumberg, Orna.
(1)
Haines, Brad.
(1)
Kalali, Masoud.
(1)
Kipper, Gregory.
(1)
Kissell, Joe.
(1)
Konheim, Alan G., 1934-
(1)
Kraus, Rob.
(1)
Krutz, Ronald L.
(1)
Lee, Graham J.
(1)
Mansourov, Nikolai.
(1)
Martínez-Ballesté, Antoni.
(1)
Massimiliano, Oldani.
(1)
Merkow, Mark S., author.
(1)
Metula, Erez.
(1)
Moeller, Robert R.
(1)
Moskowitz, Jeremy.
(1)
Perez, Richard, 1969 October 17-
(1)
Perla, Enrico.
(1)
Raghavan, Lakshmikanth, author.
(1)
Smith, Russell.
(1)
Solanas, Agusti.
(1)
Spanfelner, Bernd.
(1)
Street, Jayson E.
(1)
Street, Jayson E. Dissecting the hack.
(1)
TECHNION. Israel Institute of Technology (Israel)
(1)
Technische Universität München (Germany)
(1)
Tiller, James S.
(1)
Timm, Carl.
(1)
Vines, Russell Dean.
(1)
Zhang, Rui.
(1)
Daha fazla
Tümünü genişlet
Daha az
Hepsini Daralt
Materyal Türü
Dahil
Hariç
E-Kitap
Dil
Dahil
Hariç
English
(27)
Konu
Dahil
Hariç
Electronic books.
(27)
Computer networks -- Security measures.
(7)
COMPUTERS -- Internet -- Security.
(6)
COMPUTERS -- Networking -- Security.
(6)
COMPUTERS -- Security -- General.
(6)
Computer crimes -- Prevention.
(3)
Computer hackers.
(3)
Computer crimes -- Investigation.
(2)
Computer crimes.
(2)
Computer software -- Testing.
(2)
Computers -- Access control.
(2)
Data encryption (Computer science)
(2)
Hackers.
(2)
Operating systems (Computers)
(2)
Virtual computer systems -- Security measures.
(2)
Artificial intelligence.
(1)
Avionics -- Safety measures.
(1)
COMPUTERS -- Digital Media -- General.
(1)
COMPUTERS -- Interactive & Multimedia.
(1)
COMPUTERS -- Web -- Site Design.
(1)
COMPUTERS -- Web -- User Generated Content.
(1)
Case studies.
(1)
Cloud computing -- Security measures.
(1)
Cocoa (Application development environment)
(1)
Common Language Runtime.
(1)
Computer architecture.
(1)
Computer crimes -- Case studies.
(1)
Computer software -- Development.
(1)
Computer software -- Reliability.
(1)
Computer systems -- Reliability.
(1)
Computer viruses.
(1)
Computers -- Reliability.
(1)
Cryptography.
(1)
Data protection.
(1)
Directory services (Computer network technology)
(1)
Electronic book.
(1)
Electronic data processing departments -- Auditing.
(1)
Electronic information resources -- Access control.
(1)
Hashing (Computer science)
(1)
Information technology -- Auditing.
(1)
Information technology -- Security measures.
(1)
Internet programming.
(1)
Java (Computer program language)
(1)
LAW -- Forensic Science.
(1)
Languages, Artificial.
(1)
Mac OS.
(1)
Macintosh (Computer) -- Programming.
(1)
Malware (Computer software) -- Prevention.
(1)
Microsoft Windows (Computer file)
(1)
Online social networks -- Security measures.
(1)
Operating systems (Computers) -- Security measures.
(1)
Programming languages (Electronic computers)
(1)
Rootkits (Computer software)
(1)
Réseaux d'ordinateurs.
(1)
Software configuration management.
(1)
TRUE CRIME -- White Collar Crime.
(1)
Transmission sans fil.
(1)
Virus informatiques.
(1)
Web 2.0 -- Security measures.
(1)
Wireless communication systems -- Security measures.
(1)
Daha fazla
Tümünü genişlet
Daha az
Hepsini Daralt
Kütüphane
Dahil
Hariç
Başkent Kütüphanesi
Lokasyon
Dahil
Hariç
E-Kütüphane
Ebook Central
Elsevier E-Kitap Koleksiyonu
false
{sortLabel}
{alphabetical}
{relevance}
{include}
{exclude}
{facetName}
{results}
{displayName}
{count}
{error}
Eylem Seç
Ayırt
Listelerime ekle
Eposta
Yazdır
27 sonuç bulundu
1
2
3
Sırala:
Konuyla İlgili Sırala
Yayın Yılı (eskiden yeniye)
Yayın Yılı (yeniden eskiye)
Başlık
Yazar
OK
Eposta Adresleri
:
Phone Number:
Mobile Carrier:
AT&T
Boost
Nextel (Sprint)
Sprint (PCS)
T Mobile
TracFone
US Cellular
Verizon
Virgin
Select An Item
Data usage warning: You will receive one text message for each title you selected.
Standard text messaging rates apply.
Text it to me
Text it to me, and go to next item
000000000000
DEFAULTTR
Liste seç
Geçici Liste
Bunu varsayılan liste yap.
Öğeler başarıyla eklendi
Öğeler eklenirken hata oldu. Lütfen tekrar deneyiniz.
Advances in artificial intelligence for privacy protection and security
13.
Advances in artificial intelligence for privacy protection and security
by
Solanas, Agusti.
Click to View
Format:
Relation based access control
14.
Relation based access control
by
Zhang, Rui.
Click to View
Format:
Least privilege security for Windows 7, Vista, And XP secure desktops for regulatory compliance and business agility
15.
Least privilege security for Windows 7, Vista, And XP secure desktops for regulatory compliance and business agility
by
Smith, Russell.
Click to View
Format:
GlassFish security secure your GlassFish installation, web applications, EJB applications, application client module, and web services using Java EE and GlassFish security measures
16.
GlassFish security secure your GlassFish installation, web applications, EJB applications, application client module, and web services using Java EE and GlassFish security measures
by
Kalali, Masoud.
Click to View
Format:
Secure and resilient software development
17.
Secure and resilient software development
by
Merkow, Mark S., author.
Click to View
Format:
Dissecting the hack : the forb1dd3n network
18.
Dissecting the hack : the forb1dd3n network
by
Street, Jayson E.
ScienceDirect
https://www.sciencedirect.com/science/book/9781597495684
Format:
A guide to kernel exploitation : attacking the core
19.
A guide to kernel exploitation : attacking the core
by
Perla, Enrico.
ScienceDirect
https://www.sciencedirect.com/science/book/9781597494861
Format:
Managed code rootkits : hooking into runtime environments
20.
Managed code rootkits : hooking into runtime environments
by
Metula, Erez.
ScienceDirect
http://www.sciencedirect.com/science/book/9781597495745
Format:
Seven deadliest wireless technologies attacks
21.
Seven deadliest wireless technologies attacks
by
Haines, Brad.
ScienceDirect
https://www.sciencedirect.com/science/book/9781597495417
Format:
Seven deadliest USB attacks
22.
Seven deadliest USB attacks
by
Anderson, Brian (Brian James)
ScienceDirect
https://www.sciencedirect.com/science/book/9781597495530
Format:
Seven deadliest social network attacks
23.
Seven deadliest social network attacks
by
Timm, Carl.
ScienceDirect
https://www.sciencedirect.com/science/book/9781597495455
Format:
Virtualization and forensics : a digital forensic investigator's guide to virtual environments
24.
Virtualization and forensics : a digital forensic investigator's guide to virtual environments
by
Barrett, Diane.
ScienceDirect
http://www.sciencedirect.com/science/book/9781597495578
Format:
Eylem Seç
Ayırt
Listelerime ekle
Eposta
Yazdır
1
2
3
Search Results
Elektronik Kaynaklar
Search Results
Elektronik Kaynaklar
OK
Eposta Adresleri
:
Phone Number:
Mobile Carrier:
AT&T
Boost
Nextel (Sprint)
Sprint (PCS)
T Mobile
TracFone
US Cellular
Verizon
Virgin
Select An Item
Data usage warning: You will receive one text message for each title you selected.
Standard text messaging rates apply.
Text it to me
Text it to me, and go to next item
Elektronik Kaynaklar
Sonuçlar alınıyor Elektronik Kaynaklar...
action