Skip to:
Search Results
|
Bottom
|
Search Facets
|
Content
Giriş
|
Hesabım
|
Listelerim
|
|
Remember to clear the cache and close the browser window.
English
Search Limit
Bütün Kütüphaneler
Elektronik Kaynaklar
Hepsi
Başkent Üniversitesi Kütüphanesi
Anadolu OSB Meslek Yüksekokulu
Atasev Özel Koleksiyon
Erdoğan Tercan Koleksiyonu
Güzel Sanatlar ve Tasarım Arşivi
Kazan Meslek Yüksekokulu
Hukuk Koleksiyonu
Ord.Prof.Dr. Enver Ziya Karal Tarih Uygulama Ars.Mrk.
Özel Koleksiyon Serdar Özersin
Tez Koleksiyonu
Tüm Alanlar
Başlık
Yazar
Konu
ISBN
ISSN
13
Search Field
Tüm Alanlar
Arama:
Gelişmiş Arama
Search Results
Elektronik Kaynaklar
Arama Sonuçlarını Sınırlandır
Daraltılmış:
+
Language: English
+
Konu: Computer networks -- Security measures.
Yazar
Dahil
Hariç
ProQuest (Firm)
(147)
Shimonski, Robert.
(6)
Vacca, John R.
(6)
Beale, Jay.
(5)
Foster, James C.
(5)
Shinder, Debra Littlejohn.
(5)
Shinder, Thomas W.
(5)
Andress, Jason.
(4)
Henmi, Anne.
(4)
Hunter, Laura E.
(4)
International Business Machines Corporation. International Technical Support Organization.
(4)
Rittinghouse, John W.
(4)
Behrens, Thorsten.
(3)
Cardwell, Kevin, author.
(3)
Carvey, Harlan A.
(3)
Cole, Eric.
(3)
Cross, Michael, 1965-
(3)
Grasdal, Martin.
(3)
Limbert, Matthew, designer.
(3)
Long, Johnny.
(3)
Ramirez, Gilbert.
(3)
Rogers, Russ.
(3)
Wiles, Jack.
(3)
Winkler, J. R. (Joachim R.)
(3)
Ahmad, David R. Mirza.
(2)
Alder, Raven.
(2)
Amini, Rob.
(2)
Andrés, Steven.
(2)
Archibald, Neil.
(2)
Babbin, Jacob.
(2)
Birkholz, Erik Pace.
(2)
Burnett, Mark (Mark M.)
(2)
Cameron, Rob.
(2)
Canavan, Tom.
(2)
Cantrell, Chris.
(2)
Caswell, Brian.
(2)
Chuvakin, Anton.
(2)
Contos, Brian T.
(2)
Danielyan, Edgar.
(2)
Dubrawsky, Ido.
(2)
Erickson, Jon, 1977-
(2)
Gatford, Chris.
(2)
Gold, André.
(2)
Gonzalez, Deborah, author.
(2)
Haines, Brad.
(2)
Hancock, Bill, 1957-
(2)
Katsaropoulos, Chris, editor.
(2)
Khan, Umer.
(2)
Knipp, Eric.
(2)
Liska, Allan, author.
(2)
Liu, Dale.
(2)
Lucas, Mark.
(2)
Manzuik, Steve.
(2)
Meyer, Greg.
(2)
Morris, Greg.
(2)
Norman, Thomas L.
(2)
Orebaugh, Angela.
(2)
Osipov, Vitaly.
(2)
Ozkaya, Erdal, author.
(2)
Pan, Yi, 1960-
(2)
Parker, Tom.
(2)
Potter, Bruce.
(2)
Qian, Yi, 1962-
(2)
Ransome, James F.
(2)
Rash, Michael.
(2)
Rathaus, Noam.
(2)
Rayns, Chris.
(2)
Riley, Charles.
(2)
Ring, Sandra.
(2)
Rountree, Derrick.
(2)
Russell, Ryan, 1969-
(2)
Sachs, Marcus H.
(2)
Shema, Mike.
(2)
Singh, Abhishek.
(2)
Snedaker, Susan.
(2)
Stapko, Timothy John.
(2)
Strebe, Matthew.
(2)
Syngress Media, Inc.
(2)
Tam, Kenneth.
(2)
Thuraisingham, Bhavani M.
(2)
Todd, Chad.
(2)
Voeller, John G.
(2)
Warnicke, Ed.
(2)
Watkins, Stephen (Information security professional)
(2)
Wayner, Peter, 1964-
(2)
Wilhelm, Thomas.
(2)
Williams, Branden R.
(2)
Winterfeld, Steve.
(2)
Wotring, Brian.
(2)
Zalewski, Michal.
(2)
Ablon, Lillian, author.
(1)
Aggarwal, Manuj, author.
(1)
Aissi, Selim.
(1)
Alcover, Jorge Blanco.
(1)
Ali, Shakeel.
(1)
Allen, Lee, 1946- author.
(1)
Allison, Steve.
(1)
Allsopp, Wil, author.
(1)
Allsopp, Wil.
(1)
American Evaluation Association.
(1)
Amon, Cheri.
(1)
Anderson, Brian (Brian James)
(1)
Andress, Jason, author.
(1)
Anson, Steve.
(1)
Antonius, Jesper.
(1)
Assam, Tarek.
(1)
Assing, Dominique.
(1)
Atiya, Amir F.
(1)
Au, Man-Ho, editor.
(1)
Baker, Andrew R.
(1)
Banks, Allister, author.
(1)
Barnes, Christian.
(1)
Barnett, Ryan C.
(1)
Baskin, Brian, author.
(1)
Baskin, Brian.
(1)
Baumrucker, C. Tate.
(1)
Bautista, Wilson, author.
(1)
Bayer, Chad M.
(1)
Beaver, Kevin.
(1)
Bejtlich, Richard.
(1)
Ben-Ari, Erez.
(1)
Bendell, Dan.
(1)
Bendell, Daniel H.
(1)
Bennett, Eleanor Leonne, cover designer.
(1)
Bernard, Ray, author.
(1)
Bertino, Elisa.
(1)
Beyah, Raheem (Raheem A.), 1976-
(1)
Bhalla, Nish.
(1)
Bhardwaj, Pawan K.
(1)
Bhattacharjee, Sravani, author.
(1)
Bianco, David J., 1971-
(1)
Bindner, Andrew.
(1)
Blair, John, author.
(1)
Bolt, Steven.
(1)
Borkin, Mike.
(1)
Bradley, Tony, 1969-
(1)
Braman, Eric, editor.
(1)
Brant, Justin M.
(1)
Brashars, Joshua.
(1)
Bray, Rory.
(1)
Briggs, Jonathan.
(1)
Broad, James.
(1)
Buchanan, Cameron, author.
(1)
Burke, Josh.
(1)
Burton, James D.
(1)
Burton, James.
(1)
Bücker, Axel.
(1)
Calé, Stéphane.
(1)
Cantrell, Christopher.
(1)
Capurro, Rafael.
(1)
Carafano, James Jay, 1955-
(1)
Carbone, Fernando, author.
(1)
Carey, David.
(1)
Carvey, Harlan A., author.
(1)
Carvey, Harlan, author.
(1)
Carvey, Harlan.
(1)
Casco, Steven.
(1)
Chapman, Chris, author.
(1)
Charles S. Edge, author.
(1)
Chauhan, Sudhanshu, author.
(1)
Cheah, Chun Hai.
(1)
Cherry, Denny.
(1)
Choo, Kim-Kwang Raymond, editor.
(1)
Chuvakin, Anton A., author.
(1)
Cid, Daniel.
(1)
Clark, Gregory, author.
(1)
Clarke, Justin.
(1)
Collins, Jon, author.
(1)
Connelly, Olly.
(1)
Conti, Greg.
(1)
Cook, Randy (Randy R.)
(1)
Corbett, Cherita (Cherita L.)
(1)
Courcier, Scar de, author.
(1)
Cross, Michael.
(1)
Cruz, Maria Ines, designer.
(1)
D'Arcy, John P., 1975-
(1)
Dabbous, Nora.
(1)
Dai, Yuan-Shun.
(1)
Dalziel, Henry, author.
(1)
Dalziel, Max, author.
(1)
Dattani, Dinesh D.
(1)
Davies, Joshua Dennis.
(1)
Davies, Saida.
(1)
DeLuccia, James J., 1977-
(1)
DeMott, Jared.
(1)
Death, Darren, author.
(1)
Delfanti, Alessandro.
(1)
Demchak, Chris C.
(1)
Deraison, Renaud.
(1)
Desai, Hemal, editor.
(1)
Devost, Matthew G.
(1)
Dewald, Andreas, author.
(1)
Diogenes, Yuri, author.
(1)
Dolev, Ran.
(1)
Donaldson, Scott E., author.
(1)
Duman, Ekrem.
(1)
Dwivedi, Himanshu.
(1)
Edwards, Matthew, editor of compilation.
(1)
Eko, Lyombe.
(1)
Eldred, Michael.
(1)
Daha fazla
Tümünü genişlet
Daha az
Hepsini Daralt
Materyal Türü
Dahil
Hariç
E-Kitap
Yayın Yılı
Dahil
Hariç
-
2014
(35)
2013
(33)
2004
(27)
2005
(26)
2006
(26)
2007
(25)
2011
(25)
2008
(23)
2003
(22)
2017
(21)
2015
(20)
2002
(18)
2018
(17)
2016
(15)
2010
(13)
2012
(12)
2009
(8)
2001
(6)
1999
(1)
2019
(1)
Daha fazla
Tümünü genişlet
Daha az
Hepsini Daralt
Konu
Dahil
Hariç
Electronic books.
(374)
Computer security.
(155)
COMPUTERS -- Internet -- Security.
(65)
COMPUTERS -- Networking -- Security.
(65)
COMPUTERS -- Security -- General.
(65)
Internet -- Security measures.
(31)
Firewalls (Computer security)
(18)
Computers -- Access control.
(15)
Computer networks -- Access control.
(14)
Computer hackers.
(13)
Penetration testing (Computer security)
(12)
Data protection.
(10)
Microsoft Windows (Computer file)
(10)
Wireless communication systems -- Security measures.
(10)
Computer crimes -- Investigation.
(9)
Computer crimes -- Prevention.
(8)
Web sites -- Security measures.
(8)
Computer network protocols.
(7)
Computer security -- Management.
(7)
Operating systems (Computers)
(7)
Cyberspace -- Security measures.
(6)
Data encryption (Computer science)
(6)
Computer viruses.
(5)
Cyberterrorism -- Prevention.
(5)
Data protection -- Standards.
(5)
Hackers.
(5)
Microsoft ISA server.
(5)
Open source software.
(5)
WebSphere.
(5)
World Wide Web -- Security measures.
(5)
Andre fag (naturvidenskab og teknik) Andre fag
(4)
Application software -- Security measures.
(4)
Cloud computing.
(4)
Computer crimes -- Investigation -- United States -- Methodology.
(4)
Computer crimes.
(4)
Computer networks -- Management.
(4)
Computer networks -- Security measures -- Handbooks, manuals, etc.
(4)
Credit cards.
(4)
Database security.
(4)
Forensic sciences.
(4)
Handbooks and manuals.
(4)
Information resources management.
(4)
Information technology -- Security measures.
(4)
Information warfare.
(4)
Internet.
(4)
Liability for credit information.
(4)
Microsoft Windows (Computer file) -- Security measures.
(4)
Microsoft Windows server.
(4)
Security systems.
(4)
Web servers -- Security measures.
(4)
z/OS.
(4)
Business enterprises -- Computer networks -- Security measures.
(3)
COMPUTERS -- Computer Literacy.
(3)
COMPUTERS -- Computer Science.
(3)
COMPUTERS -- Data Processing.
(3)
COMPUTERS -- Hardware -- General.
(3)
COMPUTERS -- Information Technology.
(3)
COMPUTERS -- Machine Theory.
(3)
COMPUTERS -- Reference.
(3)
COMPUTERS -- Security -- Cryptography.
(3)
Client/server computing.
(3)
Cloud computing -- Security measures.
(3)
Computer network architectures.
(3)
Computer networks.
(3)
Computer science.
(3)
Cryptography.
(3)
Cyberterrorism.
(3)
Electronic book.
(3)
Electronic data processing departments -- Security measures.
(3)
Engineering & Applied Sciences.
(3)
Information storage and retrieval systems -- Security measures.
(3)
Information technology -- Management.
(3)
Internet telephony -- Security measures.
(3)
Java (Computer program language)
(3)
Kali Linux.
(3)
Malware (Computer software) -- Prevention.
(3)
Routers (Computer networks)
(3)
Réseaux d'ordinateurs -- Sécurité -- Mesures.
(3)
Réseaux d'ordinateurs.
(3)
Application software -- Development.
(2)
Business -- Data processing -- Security measures.
(2)
Business enterprises -- Security measures.
(2)
COMPUTERS -- Data Transmission Systems -- General.
(2)
COMPUTERS -- Networking -- Vendor Specific.
(2)
Cisco Systems, Inc.
(2)
ColdFusion.
(2)
Computer networks -- Reliability.
(2)
Computer networks -- Testing.
(2)
Computer security -- Evaluation -- Methodology.
(2)
Computer security -- Evaluation.
(2)
Computer software -- Development.
(2)
Computerbeveiliging.
(2)
Computercriminaliteit.
(2)
Computernetwerken.
(2)
Computersicherheit
(2)
Crisis management.
(2)
Digital watermarking.
(2)
Electrical & Computer Engineering.
(2)
Electronic data processing personnel -- Certification -- Study guides.
(2)
Electronic information resources -- Access control.
(2)
Electronic mail systems -- Security measures.
(2)
Embedded computer systems.
(2)
Hacking.
(2)
Information technology -- Auditing.
(2)
Information visualization.
(2)
Intrusion detection systems (Computer security)
(2)
LAW -- Forensic Science.
(2)
Malware (Computer software)
(2)
Microsoft Exchange server.
(2)
Microsoft Windows.
(2)
Open source intelligence.
(2)
Oracle (Computer file)
(2)
Peer-to-peer architecture (Computer networks)
(2)
Protection de l'information (Informatique)
(2)
Rechnernetz
(2)
Software.
(2)
TCP/IP (Computer network protocol)
(2)
Technology -- Research -- United States.
(2)
Telecommunications.
(2)
UNIX Shells.
(2)
Web portals -- Security measures.
(2)
Wide area networks (Computer networks) -- Access.
(2)
Wireless LANs.
(2)
Active server pages -- Security measures.
(1)
Active server pages.
(1)
Agents intelligents (Logiciels)
(1)
Android (Electronic resource)
(1)
Application logging (Computer science)
(1)
Application software -- Design.
(1)
Application software.
(1)
Aufsatzsammlung.
(1)
BUSINESS & ECONOMICS -- Corporate Governance.
(1)
BUSINESS & ECONOMICS -- Leadership.
(1)
BUSINESS & ECONOMICS -- Organizational Development.
(1)
BUSINESS & ECONOMICS -- Workplace Culture.
(1)
Biometric identification.
(1)
Brain-computer interfaces.
(1)
Browsers (Computer programs)
(1)
Business enterprises -- Computer networks.
(1)
Business enterprises -- Computer programs.
(1)
Business planning.
(1)
Business travel -- Safety measures.
(1)
COMPUTERS -- Digital Media -- General.
(1)
COMPUTERS -- Hardware -- Handheld Devices.
(1)
COMPUTERS -- Hardware -- Personal Computers -- General.
(1)
COMPUTERS -- Interactive & Multimedia.
(1)
COMPUTERS -- Microprocessors.
(1)
COMPUTERS -- Online Services.
(1)
COMPUTERS -- Operating Systems -- DOS.
(1)
COMPUTERS -- Operating Systems -- Macintosh.
(1)
COMPUTERS -- Operating Systems -- Windows Server & NT.
(1)
COMPUTERS -- Operating Systems -- Windows Workstation.
(1)
COMPUTERS -- Security -- Networking.
(1)
COMPUTERS -- System Administration -- Email Administration.
(1)
COMPUTERS -- System Administration -- Storage & Retrieval.
(1)
COMPUTERS -- System Administration -- Windows Administration.
(1)
COMPUTERS -- Web -- Site Design.
(1)
COMPUTERS -- Web -- User Generated Content.
(1)
Cartes de crédit.
(1)
Commercial crimes.
(1)
Component software.
(1)
Computational grids (Computer systems)
(1)
Computer Science.
(1)
Computer algorithms.
(1)
Computer architecture.
(1)
Computer crimes -- Case studies.
(1)
Computer crimes -- Investigation -- Handbooks, manuals, etc.
(1)
Computer crimes -- Investigation -- Methodology.
(1)
Computer crimes -- Investigation -- United States.
(1)
Computer crimes -- Investments.
(1)
Computer industry.
(1)
Computer networks -- Auditing.
(1)
Computer networks -- Design and construction.
(1)
Computer networks -- Remote access.
(1)
Computer networks -- Security measures -- Examinations, questions, etc.
(1)
Computer networks -- Security measures -- Fiction.
(1)
Computer networks -- Security measures -- Software.
(1)
Computer networks -- Security measures -- United States.
(1)
Computer networks -- Social aspects.
(1)
Computer networks -- Standards.
(1)
Computer networks Security measures
(1)
Computer programming.
(1)
Computer security -- Examinations -- Practice.
(1)
Computer security -- Fiction.
(1)
Computer security -- Handbooks, manuals, etc.
(1)
Computer security -- Management -- Handbooks, manuals, etc.
(1)
Computer security -- Testing.
(1)
Computer security -- United States.
(1)
Computer-assisted instruction -- Security measures.
(1)
Computers -- Security.
(1)
Computers.
(1)
Confidential business information.
(1)
Corporate culture.
(1)
Corporations -- Security measures.
(1)
Credit cards -- Security measures -- Standards -- Handbooks, manuals, etc.
(1)
Criminalistiek.
(1)
Cyber intelligence (Computer security)
(1)
Cyberinfrastructure -- Security measures.
(1)
Data encryption (Computer science) -- Examinations -- Study guides.
(1)
Data mining.
(1)
Daha fazla
Tümünü genişlet
Daha az
Hepsini Daralt
Kütüphane
Dahil
Hariç
Başkent Kütüphanesi
Lokasyon
Dahil
Hariç
E-Kütüphane
Ebook Central
Elsevier E-Kitap Koleksiyonu
false
{sortLabel}
{alphabetical}
{relevance}
{include}
{exclude}
{facetName}
{results}
{displayName}
{count}
{error}
Eylem Seç
Ayırt
Listelerime ekle
Eposta
Yazdır
374 sonuç bulundu
1
2
3
4
5
..
32
Sırala:
Konuyla İlgili Sırala
Yayın Yılı (eskiden yeniye)
Yayın Yılı (yeniden eskiye)
Başlık
Yazar
OK
Eposta Adresleri
:
Phone Number:
Mobile Carrier:
AT&T
Boost
Nextel (Sprint)
Sprint (PCS)
T Mobile
TracFone
US Cellular
Verizon
Virgin
Select An Item
Data usage warning: You will receive one text message for each title you selected.
Standard text messaging rates apply.
Text it to me
Text it to me, and go to next item
000000000000
DEFAULTTR
Liste seç
Geçici Liste
Bunu varsayılan liste yap.
Öğeler başarıyla eklendi
Öğeler eklenirken hata oldu. Lütfen tekrar deneyiniz.
Advanced penetration testing : hacking the world's most secure networks
25.
Advanced penetration testing : hacking the world's most secure networks
by
Allsopp, Wil, author.
Click to View
Format:
Security in network functions virtualization
26.
Security in network functions virtualization
by
Zhang, Zonghua, author.
Click to View
Format:
Safety of web applications : risks, encryption and handling vulnerabilities with PHP
27.
Safety of web applications : risks, encryption and handling vulnerabilities with PHP
by
Quinton, Eric, author.
Click to View
Format:
Kali Linux intrusion and exploitation cookbook : over 70 recipes for system administrator or DevOps to master Kali Linux 2 and perform effective security assessment
28.
Kali Linux intrusion and exploitation cookbook : over 70 recipes for system administrator or DevOps to master Kali Linux 2 and perform effective security assessment
by
Shah, Dhruv, author.
Click to View
Format:
Applied network security : master the art of detecting and averting advanced network security attacks and techniques
29.
Applied network security : master the art of detecting and averting advanced network security attacks and techniques
by
Salmon, Arthur, author.
Click to View
Format:
Computer and information security handbook
30.
Computer and information security handbook
by
Vacca, John R., editor.
Click to View
Format:
Cybercrime and business : strategies for global corporate security
31.
Cybercrime and business : strategies for global corporate security
by
Moskowitz, Sanford, author.
Click to View
Format:
Security operations center guidebook : a practical guide for a successful SOC
32.
Security operations center guidebook : a practical guide for a successful SOC
by
Jarpey, Gregory , author.
Click to View
Format:
Mastering Kali Linux for web penetration testing : test and evaluate all aspects of the design and implentation
33.
Mastering Kali Linux for web penetration testing : test and evaluate all aspects of the design and implentation
by
McPhee, Michael, author.
Click to View
Format:
Network forensics
34.
Network forensics
by
Messier, Ric, author.
Click to View
Format:
Windows forensics cookbook : 61 recipes to help you analyze windows systems
35.
Windows forensics cookbook : 61 recipes to help you analyze windows systems
by
Skulkin, Oleg, author.
Click to View
Format:
Mobile security and privacy : advances, challenges and future research directions
36.
Mobile security and privacy : advances, challenges and future research directions
by
Au, Man-Ho, editor.
Click to View
Format:
Eylem Seç
Ayırt
Listelerime ekle
Eposta
Yazdır
1
2
3
4
5
..
32
Search Results
Elektronik Kaynaklar
Search Results
Elektronik Kaynaklar
OK
Eposta Adresleri
:
Phone Number:
Mobile Carrier:
AT&T
Boost
Nextel (Sprint)
Sprint (PCS)
T Mobile
TracFone
US Cellular
Verizon
Virgin
Select An Item
Data usage warning: You will receive one text message for each title you selected.
Standard text messaging rates apply.
Text it to me
Text it to me, and go to next item
Elektronik Kaynaklar
Sonuçlar alınıyor Elektronik Kaynaklar...
action
Go to:
Search Results
|
Search Facets
|
Top of Page