Skip to:
Search Results
|
Bottom
|
Search Facets
|
Content
Giriş
|
Hesabım
|
Listelerim
|
|
Remember to clear the cache and close the browser window.
English
Search Limit
Bütün Kütüphaneler
Elektronik Kaynaklar
Hepsi
Başkent Üniversitesi Kütüphanesi
Anadolu OSB Meslek Yüksekokulu
Atasev Özel Koleksiyon
Erdoğan Tercan Koleksiyonu
Güzel Sanatlar ve Tasarım Arşivi
Kazan Meslek Yüksekokulu
Hukuk Koleksiyonu
Ord.Prof.Dr. Enver Ziya Karal Tarih Uygulama Ars.Mrk.
Özel Koleksiyon Serdar Özersin
Tez Koleksiyonu
Tüm Alanlar
Başlık
Yazar
Konu
ISBN
ISSN
13
Search Field
Tüm Alanlar
Arama:
Gelişmiş Arama
Search Results
Elektronik Kaynaklar
Arama Sonuçlarını Sınırlandır
Daraltılmış:
+
Yazar: ProQuest (Firm)
+
Konu: Computer security.
Yazar
Dahil
Hariç
International Business Machines Corporation. International Technical Support Organization.
(10)
Foster, James C.
(5)
Rayns, Chris.
(4)
Shinder, Thomas W.
(4)
Carvey, Harlan A.
(3)
Long, Johnny.
(3)
Shinder, Debra Littlejohn.
(3)
Boulanger, Jean-Louis.
(2)
Chandramouli, Ramaswamy.
(2)
Cole, Eric.
(2)
Erickson, Jon, 1977-
(2)
Ferraiolo, David.
(2)
Goodman, Seymour E.
(2)
Grasdal, Martin.
(2)
Hunter, Laura E.
(2)
Hurley, Chris.
(2)
Koh.
(2)
Krutz, Ronald L.
(2)
Kuhn, D. Richard.
(2)
Moskowitz, Jeremy.
(2)
Oppliger, Rolf.
(2)
Piltzecker, Tony, 1975-
(2)
Ramirez, Gilbert.
(2)
Ring, Sandra.
(2)
Wheeler, Evan.
(2)
Wiles, Jack.
(2)
Wyler, Neil R.
(2)
Zalewski, Michal.
(2)
Agre, Philip.
(1)
Alcover, Jorge Blanco.
(1)
Alexander, Philip, 1963-
(1)
Amini, Rob.
(1)
Andrés, Steven.
(1)
Antón, Philip S.
(1)
Anzaldua, Reynaldo.
(1)
Aquilina, James M.
(1)
Archibald, Neil.
(1)
Arnold, Michael (Michael Konrad), 1964-
(1)
Ashenden, Debi.
(1)
Axelrod, C. Warren.
(1)
Baker, Paul R., 1958-
(1)
Barnett, Ryan C.
(1)
Baskerville, Richard.
(1)
Baskin, Brian.
(1)
Bayles, Aaron W.
(1)
Bayuk, Jennifer L.
(1)
Beale, Jay.
(1)
Beaver, Kevin.
(1)
Belapurkar, Abhijit.
(1)
Ben-Ari, Erez.
(1)
Ben-Natan, Ron.
(1)
Benny, Daniel J.
(1)
Bertino, Elisa.
(1)
Bhalla, Nish.
(1)
Blobel, Bernd.
(1)
Bolt, Steven.
(1)
Bradley, Tony.
(1)
Brindley, Ed.
(1)
Brooks, Hugh.
(1)
Brotby, W. Krag.
(1)
Bruchez, Rudi.
(1)
Burke, Josh.
(1)
Burnett, Mark (Mark M.)
(1)
Burnett, Mark.
(1)
Bücker, Axel.
(1)
Calderon Pale, Paulino.
(1)
Caloyannides, Michael A.
(1)
Caloyannides, Michael A. Computer forensics and privacy.
(1)
Cantrell, Christopher.
(1)
Casey, Eoghan.
(1)
Caswell, Brian.
(1)
Cesario, Cristiano.
(1)
Chaffin, Larry.
(1)
Cherry, Denny.
(1)
Chikofsky, Elliot J.
(1)
Choi, Kyung-shick, 1973-
(1)
Chuvakin, Anton A.
(1)
Clarke, Justin.
(1)
Clercq, Jan de, 1968-
(1)
Conti, Greg.
(1)
Contos, Brian T.
(1)
Cook, Jim, 1944-
(1)
Cox, I. J. (Ingemar J.)
(1)
Cross, Michael.
(1)
C̆ervĕn, Pavol.
(1)
D'Arcy, John P., 1975-
(1)
Dai, Yuan-Shun.
(1)
DeMott, Jared.
(1)
Delfanti, Alessandro.
(1)
Dent, Alexander W.
(1)
Deraison, Renaud.
(1)
Dhillon, Gurpreet.
(1)
Diogenes, Yuri.
(1)
Dolev, Ran.
(1)
Eilam, Eldad.
(1)
Esparza, Javier.
(1)
Essaaidi, Mohamed.
(1)
European Commission. Information Society DG.
(1)
Fair, Ted.
(1)
Fernandez-Medina, Eduardo.
(1)
Fichera, Joe, 1966-
(1)
Filip, Werner.
(1)
Fionov, Andrey.
(1)
Forristal, Jeff.
(1)
Foster, James.
(1)
Foster, Stephen C.
(1)
Fuller, Ed.
(1)
Furnell, Steven, 1970-
(1)
Galvan, Karla.
(1)
Gehrmann, Christian.
(1)
Geiselhart, Gregory.
(1)
Goldstein, Emmanuel J.
(1)
González, Belén.
(1)
Grillenmeier, Guido.
(1)
Gritzalis, Stefanos.
(1)
Grumberg, Orna.
(1)
Gupta, Ravi.
(1)
Hadnagy, Christopher.
(1)
Hancock, Bill, 1957-
(1)
Hawker, Andrew.
(1)
Heinen, Neils.
(1)
Henmi, Anne.
(1)
Hicks, Richard.
(1)
Hinson, Gary.
(1)
Hinton, Heather.
(1)
Hippensteil, Heinz Peter.
(1)
Hollin, Mark.
(1)
Honick, Ron.
(1)
Honig, Andrew.
(1)
Hosmer, Chet.
(1)
Howard, Doug.
(1)
Huang, Hsiang-Cheh.
(1)
Huseby, Sverre H.
(1)
Hutchinson, William.
(1)
Hänninen, Pekka.
(1)
I͡Ashchenko, V. V.
(1)
Jacobs, Josh.
(1)
Jain, L. C.
(1)
Jones, Andy, 1952-
(1)
Kabay, M. E.
(1)
Kahn, Miriam (Miriam B.)
(1)
Kalali, Masoud.
(1)
Kappeler, Patrick.
(1)
Katsikas, Sokratis.
(1)
Kenyon, Brian.
(1)
Khan, Latifur.
(1)
Khnaser, Elias N.
(1)
Killion, Dave.
(1)
Kinney, Steven.
(1)
Kissell, Joe.
(1)
Kleidermacher, David.
(1)
Kleidermacher, Mike.
(1)
Kleiman, Dave.
(1)
Klein, Tobias.
(1)
Knop, J. V. (Jan V.)
(1)
Kolde, Jennifer.
(1)
Konheim, Alan G., 1934-
(1)
Kroner, George.
(1)
Krush, Waylon.
(1)
Kumar, Atul.
(1)
Lane, Patrick T.
(1)
Lang, Ulrich.
(1)
Lascu, Octavian.
(1)
Laykin, Erik.
(1)
Lee, Graham J.
(1)
Leman-Langlois, Stéphane, 1965-
(1)
Lin, Ching-Yung.
(1)
Lin, Herbert.
(1)
Liotine, Matthew.
(1)
Loshin, Pete.
(1)
Loshin, Peter.
(1)
Macaulay, Tyson.
(1)
Malin, Cameron H.
(1)
Mallett, Andrew.
(1)
Mao, Wenji.
(1)
Martin, Jason L.
(1)
Martínez-Ballesté, Antoni.
(1)
Masini, Luca.
(1)
Masud, Mehedy.
(1)
Mehan, Julie E.
(1)
Meine, Bill.
(1)
Meyer, Greg.
(1)
Miller, Charles Alfred.
(1)
Miller, Drew.
(1)
Mitchell, Chris.
(1)
Moeller, Robert R.
(1)
Morris, Greg.
(1)
Moulder, Patricia.
(1)
Mularien, Peter.
(1)
Musumeci, Guillermo.
(1)
NATO Advanced Research Workshop on Information Assurance and Computer Security (2005 : T?etouan, Morocco)
(1)
NATO Advanced Research Workshop on a Process for Developing a Common Vocabulary in the Information Security Area (2006 : Moscow, Russia)
(1)
Nahari, Hadi.
(1)
National Research Council (U.S.). Committee on Improving Cybersecurity Research in the United States.
(1)
National Research Council (U.S.). Computer Science and Telecommunications Board.
(1)
Nazario, Jose.
(1)
Neagu, Adrian.
(1)
Neucom, Ray.
(1)
Nordfelt, Michael.
(1)
Nordström, Kent.
(1)
Daha fazla
Tümünü genişlet
Daha az
Hepsini Daralt
Materyal Türü
Dahil
Hariç
E-Kitap
Dil
Dahil
Hariç
English
(196)
Yayın Yılı
Dahil
Hariç
-
2005
(23)
2013
(22)
2004
(21)
2012
(21)
2006
(16)
2003
(15)
2007
(15)
2010
(14)
2011
(13)
2008
(11)
2002
(10)
2001
(6)
2009
(5)
2000
(2)
1991
(1)
1997
(1)
Daha fazla
Tümünü genişlet
Daha az
Hepsini Daralt
Konu
Dahil
Hariç
Electronic books.
(196)
Computer networks -- Security measures.
(65)
Data protection.
(20)
Computer hackers.
(13)
Internet -- Security measures.
(13)
Cryptography.
(8)
Microsoft Windows (Computer file)
(7)
Database security.
(6)
Operating systems (Computers)
(6)
Computer crimes.
(5)
Data encryption (Computer science)
(5)
Information technology -- Security measures.
(5)
Business enterprises -- Computer networks -- Security measures.
(4)
Computer viruses.
(4)
Computers -- Access control.
(4)
Firewalls (Computer security)
(4)
Computer crimes -- Investigation.
(3)
Computer crimes -- Prevention.
(3)
Computer networks -- Access control.
(3)
Digital watermarking.
(3)
Embedded computer systems.
(3)
Malware (Computer software)
(3)
Microsoft Windows server.
(3)
World Wide Web -- Security measures.
(3)
Application software -- Security measures.
(2)
Business enterprises -- Security measures.
(2)
Citrix MetaFrame.
(2)
Client/server computing -- Security measures.
(2)
Client/server computing.
(2)
Cloud computing -- Security measures.
(2)
Computer crimes -- Investigation -- United States -- Methodology.
(2)
Computer science.
(2)
Computer software -- Development.
(2)
Computers -- Access control -- Passwords.
(2)
Cyberspace -- Security measures.
(2)
Data mining.
(2)
Debugging in computer science.
(2)
Directory services (Computer network technology)
(2)
Electronic commerce -- Security measures.
(2)
Electronic data processing departments -- Auditing.
(2)
Forensic sciences.
(2)
IBM software.
(2)
Internet -- Safety measures.
(2)
Internet and children.
(2)
Internet searching.
(2)
Linux.
(2)
Microsoft ISA server.
(2)
Microsoft Windows (Computer file) -- Security measures.
(2)
National security.
(2)
Privacy, Right of.
(2)
Python (Computer program language)
(2)
Reverse engineering.
(2)
Risk assessment.
(2)
SQL server.
(2)
Software configuration management.
(2)
Spyware (Computer software)
(2)
z/OS.
(2)
AIX (Computer file)
(1)
Acquisition of computer software.
(1)
Altre visioni. Solaris.
(1)
Application software.
(1)
Archives -- Safety measures.
(1)
Artificial intelligence.
(1)
Automatic machinery -- Security measures.
(1)
Avionics -- Safety measures.
(1)
BEA WebLogic server.
(1)
Bluetooth technology -- Security measures.
(1)
Browsers (Computer programs)
(1)
CORBA (Computer architecture)
(1)
Cloud computing.
(1)
Cocoa (Application development environment)
(1)
ColdFusion.
(1)
Commercial crimes.
(1)
Computer architecture.
(1)
Computer crimes -- Investigation -- United States.
(1)
Computer crimes -- Investments.
(1)
Computer hackers -- Fiction.
(1)
Computer network protocols.
(1)
Computer networks -- Certification.
(1)
Computer networks -- Design and construction.
(1)
Computer networks -- Planning.
(1)
Computer networks -- Reliability.
(1)
Computer networks -- Security measures -- United States.
(1)
Computer programming.
(1)
Computer security -- Fiction.
(1)
Computer security -- Forecasting.
(1)
Computer security -- United States.
(1)
Computer systems -- Reliability.
(1)
Computers -- Access control -- Standards.
(1)
Computers -- Reliability.
(1)
Corporations -- Corrupt practices.
(1)
Cryptography -- Standards.
(1)
Cyberterrorism -- Prevention.
(1)
Database design.
(1)
Distributed operating systems (Computers)
(1)
Educational technology -- Security measures.
(1)
Electronic data processing -- Backup processing alternatives.
(1)
Electronic data processing -- Distributed processing.
(1)
Electronic data processing departments -- Contracting out.
(1)
Electronic information resources -- Access control.
(1)
Electronic mail systems -- Security measures.
(1)
Electronic records -- Conservation and restoration.
(1)
Electronic records.
(1)
Electronic surveillance.
(1)
Emergency management -- Planning.
(1)
Fraud investigation.
(1)
Groupware (Computer software)
(1)
Hashing (Computer science)
(1)
Hewlett-Packard computers -- Security measures.
(1)
Human-computer interaction.
(1)
IBM Cluster systems management.
(1)
IBM Database 2.
(1)
IBM computers -- Programming.
(1)
IBM computers.
(1)
Industrial safety -- Management.
(1)
Information policy -- European Union countries.
(1)
Information technology -- Auditing.
(1)
Information technology -- Certification.
(1)
Information technology -- Management.
(1)
Information technology.
(1)
Information visualization.
(1)
Information warfare.
(1)
Instant messaging.
(1)
Intellectual property.
(1)
Internet programming.
(1)
Internet.
(1)
Intrusion detection systems (Computer security)
(1)
Java (Computer program language)
(1)
Languages, Artificial.
(1)
Libraries -- Safety measures.
(1)
Library information networks -- Security measures.
(1)
Mac OS.
(1)
Macintosh (Computer) -- Programming.
(1)
Management information systems.
(1)
Medical informatics.
(1)
Medical records -- Access control.
(1)
Medical records -- Data processing.
(1)
Microsoft Forefront.
(1)
Microsoft Windows (Computer file) -- Examinations -- Study guides.
(1)
Multimedia systems -- Security measures.
(1)
Narraciones solaris.
(1)
Online social networks.
(1)
Open source software.
(1)
Oracle (Computer file)
(1)
Oracle (Computer file) -- Handbooks, manuals, etc.
(1)
Peer-to-peer architecture (Computer networks)
(1)
Private security services.
(1)
Process control -- Security measures.
(1)
Programming (Mathematics)
(1)
Programming languages (Electronic computers)
(1)
Risk management.
(1)
SQL (Computer program language)
(1)
Scripting languages (Computer science)
(1)
Security systems.
(1)
Social engineering.
(1)
Social media.
(1)
Software engineering.
(1)
Software protection.
(1)
Spam filtering (Electronic mail)
(1)
Technology -- Research -- United States.
(1)
Visual perception.
(1)
Watermarks -- Data processing.
(1)
Web servers -- Security measures.
(1)
Web site development -- Security measures.
(1)
Web sites -- Design.
(1)
Web sites -- Security measures.
(1)
Wireless communication systems -- Security measures.
(1)
XML (Document markup language)
(1)
i5/OS.
(1)
Daha fazla
Tümünü genişlet
Daha az
Hepsini Daralt
Kütüphane
Dahil
Hariç
Başkent Kütüphanesi
Lokasyon
Dahil
Hariç
Ebook Central
false
{sortLabel}
{alphabetical}
{relevance}
{include}
{exclude}
{facetName}
{results}
{displayName}
{count}
{error}
Eylem Seç
Ayırt
Listelerime ekle
Eposta
Yazdır
196 sonuç bulundu
1
2
3
4
5
..
17
Sırala:
Konuyla İlgili Sırala
Yayın Yılı (eskiden yeniye)
Yayın Yılı (yeniden eskiye)
Başlık
Yazar
OK
Eposta Adresleri
:
Phone Number:
Mobile Carrier:
AT&T
Boost
Nextel (Sprint)
Sprint (PCS)
T Mobile
TracFone
US Cellular
Verizon
Virgin
Select An Item
Data usage warning: You will receive one text message for each title you selected.
Standard text messaging rates apply.
Text it to me
Text it to me, and go to next item
000000000000
DEFAULTTR
Liste seç
Geçici Liste
Bunu varsayılan liste yap.
Öğeler başarıyla eklendi
Öğeler eklenirken hata oldu. Lütfen tekrar deneyiniz.
Hacking for dummies
13.
Hacking for dummies
by
Beaver, Kevin.
Click to View
Format:
Web application defender's cookbook battling hackers and protecting users
14.
Web application defender's cookbook battling hackers and protecting users
by
Barnett, Ryan C.
Click to View
Format:
The complete guide to physical security
15.
The complete guide to physical security
by
Baker, Paul R., 1958-
Click to View
Format:
Windows server 2012 security from end to edge and beyond architecting, designing, planning, and deploying Windows server 2012 security solutions
16.
Windows server 2012 security from end to edge and beyond architecting, designing, planning, and deploying Windows server 2012 security solutions
by
Shinder, Thomas W.
Click to View
Format:
Practical anonymity hiding in plain sight online
17.
Practical anonymity hiding in plain sight online
by
Loshin, Peter.
Click to View
Format:
Simple steps to data encryption a practical guide to secure computing
18.
Simple steps to data encryption a practical guide to secure computing
by
Loshin, Pete.
Click to View
Format:
Using social media for global security
19.
Using social media for global security
by
Gupta, Ravi.
Click to View
Format:
Citrix Access Gateway VPX 5.04 essentials a practical step-by-step guide to provide secure remote access using the Citrix Access Gateway VPX
20.
Citrix Access Gateway VPX 5.04 essentials a practical step-by-step guide to provide secure remote access using the Citrix Access Gateway VPX
by
Mallett, Andrew.
Click to View
Format:
Investigative computer forensics the practical guide for lawyers, accountants, investigators, and business executives
21.
Investigative computer forensics the practical guide for lawyers, accountants, investigators, and business executives
by
Laykin, Erik.
Click to View
Format:
Safety management for software-based equipment
22.
Safety management for software-based equipment
by
Boulanger, Jean-Louis.
Click to View
Format:
Securing SQL servers protecting your database from attackers
23.
Securing SQL servers protecting your database from attackers
by
Cherry, Denny.
Click to View
Format:
Getting started with Citrix XenApp 6.5 design and implement Citrix farms based on XenApp 6.5
24.
Getting started with Citrix XenApp 6.5 design and implement Citrix farms based on XenApp 6.5
by
Musumeci, Guillermo.
Click to View
Format:
Eylem Seç
Ayırt
Listelerime ekle
Eposta
Yazdır
1
2
3
4
5
..
17
Search Results
Elektronik Kaynaklar
Search Results
Elektronik Kaynaklar
OK
Eposta Adresleri
:
Phone Number:
Mobile Carrier:
AT&T
Boost
Nextel (Sprint)
Sprint (PCS)
T Mobile
TracFone
US Cellular
Verizon
Virgin
Select An Item
Data usage warning: You will receive one text message for each title you selected.
Standard text messaging rates apply.
Text it to me
Text it to me, and go to next item
Elektronik Kaynaklar
Sonuçlar alınıyor Elektronik Kaynaklar...
action
Go to:
Search Results
|
Search Facets
|
Top of Page