Skip to:
Search Results
|
Bottom
|
Search Facets
|
Content
Giriş
|
Hesabım
|
Listelerim
|
|
Remember to clear the cache and close the browser window.
English
Search Limit
Bütün Kütüphaneler
Elektronik Kaynaklar
Hepsi
Başkent Üniversitesi Kütüphanesi
Anadolu OSB Meslek Yüksekokulu
Atasev Özel Koleksiyon
Erdoğan Tercan Koleksiyonu
Güzel Sanatlar ve Tasarım Arşivi
Kazan Meslek Yüksekokulu
Hukuk Koleksiyonu
Ord.Prof.Dr. Enver Ziya Karal Tarih Uygulama Ars.Mrk.
Özel Koleksiyon Serdar Özersin
Tez Koleksiyonu
Tüm Alanlar
Başlık
Yazar
Konu
ISBN
ISSN
13
Search Field
Tüm Alanlar
Arama:
Gelişmiş Arama
Search Results
Elektronik Kaynaklar
Arama Sonuçlarını Sınırlandır
Daraltılmış:
+
Language: English
+
Konu: Computer security.
Yazar
Dahil
Hariç
ProQuest (Firm)
(196)
SpringerLink (Online service)
(22)
Foster, James C.
(11)
International Business Machines Corporation. International Technical Support Organization.
(10)
Long, Johnny.
(9)
Russell, Ryan, 1969-
(6)
Calder, Alan, author.
(5)
Carvey, Harlan A.
(5)
Cross, Michael, 1965-
(5)
Hurley, Chris.
(5)
Wiles, Jack.
(5)
Beale, Jay.
(4)
Bhateja, Vikrant. editor.
(4)
Cherry, Denny.
(4)
Cole, Eric.
(4)
Hunter, Laura E.
(4)
Limbert, Matthew, designer.
(4)
Piltzecker, Tony, 1975-
(4)
Rayns, Chris.
(4)
Ring, Sandra.
(4)
Rittinghouse, John W.
(4)
Satapathy, Suresh Chandra. editor.
(4)
Shinder, Thomas W.
(4)
Buchanan, Cameron, author.
(3)
Clercq, Jan de, 1968-
(3)
Contos, Brian T.
(3)
Cox, I. J. (Ingemar J.)
(3)
Katsaropoulos, Chris, editor.
(3)
Mullen, Timothy M.
(3)
Rogers, Mark, designer.
(3)
Sachs, Marcus H.
(3)
Shinder, Debra Littlejohn.
(3)
Winkler, J. R. (Joachim R.)
(3)
Wyler, Neil R.
(3)
XYPRO Technology Corporation.
(3)
Alder, Raven.
(2)
Amini, Rob.
(2)
Andress, Jason.
(2)
Aquilina, James M.
(2)
Baskin, Brian.
(2)
Bayles, Aaron W.
(2)
Ben-Natan, Ron.
(2)
Boulanger, Jean-Louis.
(2)
Brindley, Ed.
(2)
Burnett, Mark (Mark M.)
(2)
Casey, Eoghan.
(2)
Caswell, Brian.
(2)
Chaffin, Larry.
(2)
Chaki, Nabendu. editor.
(2)
Chaki, Rituparna. editor.
(2)
Chandramouli, Ramaswamy.
(2)
Clarke, Justin.
(2)
Cortesi, Agostino. editor.
(2)
Dalziel, Henry, author.
(2)
Dalziel, Henry, editor.
(2)
Engebretson, Pat (Patrick Henry), 1974-
(2)
Erickson, Jon, 1977-
(2)
Fair, Ted.
(2)
Ferraiolo, David.
(2)
Foster, Stephen C.
(2)
Goodman, Seymour E.
(2)
Grasdal, Martin.
(2)
Grillenmeier, Guido.
(2)
Hancock, Bill, 1957-
(2)
Henmi, Anne.
(2)
Honick, Ron.
(2)
Hutchens, Justin, author.
(2)
Joshi, Amit. editor.
(2)
Kinney, Steven.
(2)
Kleidermacher, David.
(2)
Kleidermacher, Mike.
(2)
Knapp, Eric.
(2)
Koh.
(2)
Krutz, Ronald L.
(2)
Kuhn, D. Richard.
(2)
Lin, Ching-Yung.
(2)
Malin, Cameron H.
(2)
Mao, Wenji.
(2)
Maynor, David.
(2)
Meyer, Greg.
(2)
Moskowitz, Jeremy.
(2)
Nordfelt, Michael.
(2)
Oppliger, Rolf.
(2)
Parker, Tom.
(2)
Piccard, Paul L.
(2)
Potter, Bruce.
(2)
Qian, Yi, 1962-
(2)
Ramachandran, Vivek, author.
(2)
Ramirez, Gilbert.
(2)
Ransome, James F.
(2)
Rash, Michael.
(2)
Rathaus, Noam.
(2)
Rogers, Russ.
(2)
Saeed, Khalid. editor.
(2)
ScienceDirect (Online service)
(2)
Shein, Rob.
(2)
Shimonski, Robert.
(2)
Stanger, James.
(2)
Stapko, Timothy John.
(2)
Ticher, Paul, author.
(2)
Todd, Chad.
(2)
Tyson, Dave.
(2)
Vacca, John R.
(2)
Wang, Fei-Yue.
(2)
Wheeler, Evan.
(2)
Winkler, Ira.
(2)
Wotring, Brian.
(2)
Young, Carl S., author.
(2)
Yu, Hong Heather, 1967-
(2)
Zalewski, Michal.
(2)
Zeng, Wenjun, 1967-
(2)
'Ken'@ftu.
(1)
131ah.
(1)
AXELOS Limited, author.
(1)
Abbadi, Imad M., author.
(1)
Ablon, Lillian, author.
(1)
Agre, Philip.
(1)
Ahmad, David R. Mirza.
(1)
Ahmad, Rabiah. editor.
(1)
Akashe, Shyam. editor.
(1)
Al-maadeed, Somaya. editor.
(1)
Alam, Shahnawaz, author.
(1)
Alcover, Jorge Blanco.
(1)
Aleroud, Ahmed. editor.
(1)
Alexander, Philip, 1963-
(1)
Alsmadi, Izzat M. editor.
(1)
Alvarado, Ellen.
(1)
American Evaluation Association.
(1)
Amini, M. Hadi. author.
(1)
Amoroso, Edward G.
(1)
Anderson, Brian (Brian James)
(1)
Andress, Jason, author.
(1)
Andrés, Steven.
(1)
Antón, Philip S.
(1)
Anzaldua, Reynaldo.
(1)
Aquilina, James, author.
(1)
Archibald, Neil.
(1)
Arnold, Michael (Michael Konrad), 1964-
(1)
Arvanitis, Nicholas, editor.
(1)
Ashenden, Debi.
(1)
Assam, Tarek.
(1)
Awad, Ahmed. editor.
(1)
Axelrod, C. Warren.
(1)
Baccas, Paul.
(1)
Bajracharya, Chandra. author.
(1)
Baker, Andrew R.
(1)
Baker, Paul R., 1958-
(1)
Barnett, Ryan C.
(1)
Barrett, Diane.
(1)
Basagiannis, Stylianos, contributor.
(1)
Baskerville, Richard.
(1)
Baskin, Brian, author.
(1)
Bayuk, Jennifer L.
(1)
Beaver, Kevin.
(1)
Bednarczyk, Michael.
(1)
Beghdadi, Azeddine. editor.
(1)
Belapurkar, Abhijit.
(1)
Ben-Ari, Erez.
(1)
Bennett, Eleanor Leonne, cover designer.
(1)
Benny, Daniel J.
(1)
Bergstra, J. A.
(1)
Bertino, Elisa.
(1)
Bhalla, Nish.
(1)
Bhardwaj, Pawan K.
(1)
Bhunia, Swarup, author.
(1)
Bhunia, Swarup. editor.
(1)
Bianco, David J., 1971-
(1)
Bidwell, Teri.
(1)
Bin Azad, Tariq.
(1)
Binnie, Christopher, author.
(1)
Black Hat Press (Goodhue, Minn.)
(1)
Blair, John, author.
(1)
Blobel, Bernd.
(1)
Bloom, Jeffrey A. (Jeffrey Adam), 1964-
(1)
Bolt, Steven.
(1)
Bonnell, Ralph.
(1)
Borges de Oliveira, Fábio. author.
(1)
Boroojeni, Kianoosh G. author.
(1)
Bott, Ed.
(1)
Bouridane, Ahmed. editor.
(1)
Bradley, Jaron, author.
(1)
Bradley, Tony, 1969-
(1)
Bradley, Tony.
(1)
Brathwaite, Shimon, author.
(1)
Bray, Rory.
(1)
Brennen, Jerod, editor.
(1)
Brewer, Jacqueline, editor.
(1)
Brooks, Hugh.
(1)
Brotby, W. Krag.
(1)
Bruchez, Rudi.
(1)
Bullock, Jessey, author.
(1)
Burke, Josh.
(1)
Burnett, Mark.
(1)
Burton, James.
(1)
Bücker, Axel.
(1)
Cabric, Marko, author.
(1)
Calder, Alan.
(1)
Calderon Pale, Paulino.
(1)
Caloyannides, Michael A.
(1)
Caloyannides, Michael A. Computer forensics and privacy.
(1)
Daha fazla
Tümünü genişlet
Daha az
Hepsini Daralt
Materyal Türü
Dahil
Hariç
E-Kitap
Kitap
Dil
Dahil
Hariç
Turkish
(1)
Yayın Yılı
Dahil
Hariç
-
2005
(36)
2007
(35)
2013
(34)
2017
(34)
2004
(33)
2006
(30)
2010
(27)
2011
(27)
2014
(27)
2015
(27)
2008
(25)
2012
(25)
2016
(22)
2003
(21)
2002
(18)
2019
(14)
2001
(10)
2018
(8)
2009
(7)
2000
(2)
1979
(1)
1987
(1)
1990
(1)
1991
(1)
1997
(1)
2020
(1)
Daha fazla
Tümünü genişlet
Daha az
Hepsini Daralt
Konu
Dahil
Hariç
Electronic books.
(442)
Computer networks -- Security measures.
(160)
COMPUTERS -- Internet -- Security.
(68)
COMPUTERS -- Networking -- Security.
(68)
COMPUTERS -- Security -- General.
(68)
Data protection.
(41)
Internet -- Security measures.
(25)
Systems and Data Security.
(22)
Engineering.
(21)
Computer hackers.
(18)
Computers -- Access control.
(18)
Microsoft Windows (Computer file)
(17)
Computer crimes.
(15)
Communications Engineering, Networks.
(14)
Electrical engineering.
(14)
Computer crimes -- Prevention.
(12)
Database security.
(12)
Hackers.
(12)
Operating systems (Computers)
(12)
Computer crimes -- Investigation.
(11)
Data encryption (Computer science)
(11)
Computational intelligence.
(10)
Cryptography.
(10)
Business enterprises -- Computer networks -- Security measures.
(9)
Information technology -- Security measures.
(9)
Computer viruses.
(8)
Firewalls (Computer security)
(7)
Security systems.
(7)
Client/server computing.
(6)
Cloud computing.
(6)
Computer science.
(6)
Computer security -- Fiction.
(6)
Cyberterrorism -- Prevention.
(6)
Microsoft Windows server.
(6)
Signal, Image and Speech Processing.
(6)
Artificial intelligence.
(5)
Client/server computing -- Security measures.
(5)
Computer networks -- Access control.
(5)
Computer security -- Handbooks, manuals, etc.
(5)
Cyberterrorism.
(5)
Digital watermarking.
(5)
Embedded computer systems.
(5)
Fiction.
(5)
Forensic sciences.
(5)
Hackers -- Fiction.
(5)
Handbooks and manuals.
(5)
Malware (Computer software)
(5)
SQL server.
(5)
Wireless communication systems -- Security measures.
(5)
Artificial Intelligence (incl. Robotics).
(4)
Cloud computing -- Security measures.
(4)
Computer crimes -- Investigation -- United States -- Methodology.
(4)
Computer software -- Development.
(4)
Computers -- Access control -- Passwords.
(4)
Cyberspace -- Security measures.
(4)
FICTION -- General.
(4)
Linux.
(4)
Microsoft Windows (Computer file) -- Security measures.
(4)
National security.
(4)
Open source software.
(4)
Process control -- Security measures.
(4)
Risk management.
(4)
Spyware (Computer software)
(4)
World Wide Web -- Security measures.
(4)
Andre fag (naturvidenskab og teknik) Andre fag
(3)
Application software -- Security measures.
(3)
Bilgisayar güvenliği.
(3)
Business enterprises -- Security measures.
(3)
Circuits and Systems.
(3)
Citrix MetaFrame.
(3)
Computer networks.
(3)
Corporations -- Security measures.
(3)
Data Encryption.
(3)
Data encryption (Computer science).
(3)
Data mining.
(3)
Directory services (Computer network technology)
(3)
Electronic circuits.
(3)
Electronic data processing departments -- Security measures.
(3)
Electronic information resources -- Access control.
(3)
Hewlett-Packard computers -- Security measures.
(3)
Information Systems Applications (incl. Internet).
(3)
Information resources management.
(3)
Internet programming.
(3)
Intrusion detection systems (Computer security)
(3)
LAW -- Forensic Science.
(3)
Mac OS.
(3)
Python (Computer program language)
(3)
Security Science and Technology.
(3)
Short stories.
(3)
Software configuration management.
(3)
System safety.
(3)
Web servers -- Security measures.
(3)
Web sites -- Security measures.
(3)
z/OS.
(3)
Acquisition of computer software.
(2)
Application software.
(2)
BUSINESS & ECONOMICS -- Corporate Governance.
(2)
BUSINESS & ECONOMICS -- Leadership.
(2)
BUSINESS & ECONOMICS -- Organizational Development.
(2)
BUSINESS & ECONOMICS -- Workplace Culture.
(2)
Big Data/Analytics.
(2)
Big data.
(2)
Biometrics (Biology).
(2)
Biometrics.
(2)
COMPUTERS -- Security -- Cryptography.
(2)
COMPUTERS -- Security -- Viruses.
(2)
ColdFusion.
(2)
Computer Communication Networks.
(2)
Computer communication systems.
(2)
Computer crimes -- Case studies.
(2)
Computer networks -- Reliability.
(2)
Computer security -- United States.
(2)
Computer software -- Reliability.
(2)
Computer software -- Testing.
(2)
Computerbeveiliging.
(2)
Computercriminaliteit.
(2)
Computersicherheit
(2)
Cyberterrorism -- Fiction.
(2)
Debugging in computer science.
(2)
Electronic book.
(2)
Electronic commerce -- Security measures.
(2)
Electronic data processing departments -- Auditing.
(2)
Electronic mail messages -- Security measures.
(2)
Electronic mail systems -- Security measures.
(2)
Electronics and Microelectronics, Instrumentation.
(2)
Electronics.
(2)
Engineering & Applied Sciences.
(2)
Hacking.
(2)
IBM software.
(2)
Information technology -- Auditing.
(2)
Information technology -- Management.
(2)
Information technology.
(2)
Information visualization.
(2)
Instant messaging -- Security measures.
(2)
Intellectual property.
(2)
Internet -- Safety measures.
(2)
Internet and children.
(2)
Internet searching.
(2)
Internet.
(2)
Microelectronics.
(2)
Microsoft ISA server.
(2)
Multimedia systems -- Security measures.
(2)
Online social networks -- Security measures.
(2)
Peer-to-peer architecture (Computer networks)
(2)
Penetration testing (Computer security)
(2)
Privacy, Right of.
(2)
Programming languages (Electronic computers)
(2)
Reverse engineering.
(2)
Risk assessment.
(2)
Réseaux d'ordinateurs -- Sécurité -- Mesures.
(2)
SQL (Computer program language)
(2)
Social media.
(2)
Spam filtering (Electronic mail)
(2)
Systèmes informatiques -- Sécurité -- Mesures.
(2)
TECHNOLOGY & ENGINEERING -- Industrial Engineering.
(2)
TRUE CRIME -- White Collar Crime.
(2)
Terrorism -- Prevention.
(2)
United States.
(2)
Virtual computer systems -- Security measures.
(2)
Web sites -- Design.
(2)
XML (Document markup language)
(2)
AIX (Computer file)
(1)
Agents intelligents (Logiciels)
(1)
Algebra, Boolean.
(1)
Algorithms.
(1)
Altre visioni. Solaris.
(1)
Application software -- Development.
(1)
Archives -- Safety measures.
(1)
Automatic machinery -- Security measures.
(1)
Avionics -- Safety measures.
(1)
BEA WebLogic server.
(1)
BUSINESS & ECONOMICS -- Business Writing.
(1)
BUSINESS & ECONOMICS -- Industrial Management.
(1)
BUSINESS & ECONOMICS -- Management Science.
(1)
BUSINESS & ECONOMICS -- Management.
(1)
BUSINESS & ECONOMICS -- Organizational Behavior.
(1)
Bases de données -- Sécurité -- Mesures.
(1)
Big data -- Security measures.
(1)
Bilgisayarlar -- Erişim kontrolü.
(1)
Bluetooth technology -- Security measures.
(1)
Bluetooth technology.
(1)
Browsers (Computer programs)
(1)
Business enterpri -- Computer networks -- Security measures.
(1)
Business planning.
(1)
COMPUTER INFORMATION SECURITY.
(1)
COMPUTERS -- Digital Media -- General.
(1)
COMPUTERS -- Hardware -- Handheld Devices.
(1)
COMPUTERS -- Hardware -- Personal Computers -- General.
(1)
COMPUTERS -- Hardware -- Personal Computers -- Macintosh.
(1)
COMPUTERS -- Hardware -- Personal Computers -- PCs.
(1)
COMPUTERS -- Interactive & Multimedia.
(1)
COMPUTERS -- Microprocessors.
(1)
COMPUTERS -- Online Services.
(1)
COMPUTERS -- Operating Systems -- DOS.
(1)
COMPUTERS -- Operating Systems -- General.
(1)
COMPUTERS -- Operating Systems -- Macintosh.
(1)
COMPUTERS -- Operating Systems -- Windows Server & NT.
(1)
COMPUTERS -- Operating Systems -- Windows Workstation.
(1)
COMPUTERS -- Security -- Networking.
(1)
COMPUTERS -- Software Development & Engineering -- Project Management.
(1)
Daha fazla
Tümünü genişlet
Daha az
Hepsini Daralt
Kütüphane
Dahil
Hariç
Başkent Kütüphanesi
Lokasyon
Dahil
Hariç
Atasev Özel Koleksiyonu
E-Kütüphane
Ebook Central
Elsevier E-Kitap Koleksiyonu
Merkez Kütüphane
SPRINGER
Daha fazla
Tümünü genişlet
Daha az
Hepsini Daralt
false
{sortLabel}
{alphabetical}
{relevance}
{include}
{exclude}
{facetName}
{results}
{displayName}
{count}
{error}
Eylem Seç
Ayırt
Listelerime ekle
Eposta
Yazdır
467 sonuç bulundu
1
..
35
36
37
38
39
Sırala:
Konuyla İlgili Sırala
Yayın Yılı (eskiden yeniye)
Yayın Yılı (yeniden eskiye)
Başlık
Yazar
OK
Eposta Adresleri
:
Phone Number:
Mobile Carrier:
AT&T
Boost
Nextel (Sprint)
Sprint (PCS)
T Mobile
TracFone
US Cellular
Verizon
Virgin
Select An Item
Data usage warning: You will receive one text message for each title you selected.
Standard text messaging rates apply.
Text it to me
Text it to me, and go to next item
000000000000
DEFAULTTR
Liste seç
Geçici Liste
Bunu varsayılan liste yap.
Öğeler başarıyla eklendi
Öğeler eklenirken hata oldu. Lütfen tekrar deneyiniz.
Cybersecurity today and tomorrow pay now or pay later
433.
Cybersecurity today and tomorrow pay now or pay later
by
ProQuest (Firm)
Click to View
Format:
Putting the latest z/OS security features to work
434.
Putting the latest z/OS security features to work
by
Rayns, Chris.
Click to View
Format:
An introduction to security in a CSM 1.3 for AIX 5L environment
435.
An introduction to security in a CSM 1.3 for AIX 5L environment
by
Lascu, Octavian.
Click to View
Format:
Developing secure distributed systems with CORBA
436.
Developing secure distributed systems with CORBA
by
Lang, Ulrich.
Click to View
Format:
Special issue on internet security
437.
Special issue on internet security
by
Dhillon, Gurpreet.
Click to View
Format:
Crackproof your software the best ways to protect your software against crackers
438.
Crackproof your software the best ways to protect your software against crackers
by
C̆ervĕn, Pavol.
Click to View
Format:
Analysis, design, and implementation of secure and interoperable distributed health information systems
439.
Analysis, design, and implementation of secure and interoperable distributed health information systems
by
Blobel, Bernd.
Click to View
Format:
Hack proofing ColdFusion
440.
Hack proofing ColdFusion
by
Meyer, Greg.
Click to View
Format:
Hack proofing XML
441.
Hack proofing XML
by
O'Farrell, Neal.
Click to View
Format:
Check Point NG next generation security administration
442.
Check Point NG next generation security administration
by
Simonis, Drew.
Click to View
Format:
Network security : private communication in a public world
443.
Network security : private communication in a public world
by
Kaufman, Charlie.
Format:
Hack proofing your network
444.
Hack proofing your network
by
Ahmad, David R. Mirza.
ScienceDirect
https://www.sciencedirect.com/science/book/9781928994701
Format:
Eylem Seç
Ayırt
Listelerime ekle
Eposta
Yazdır
1
..
35
36
37
38
39
Search Results
Elektronik Kaynaklar
Search Results
Elektronik Kaynaklar
OK
Eposta Adresleri
:
Phone Number:
Mobile Carrier:
AT&T
Boost
Nextel (Sprint)
Sprint (PCS)
T Mobile
TracFone
US Cellular
Verizon
Virgin
Select An Item
Data usage warning: You will receive one text message for each title you selected.
Standard text messaging rates apply.
Text it to me
Text it to me, and go to next item
Elektronik Kaynaklar
Sonuçlar alınıyor Elektronik Kaynaklar...
action
Go to:
Search Results
|
Search Facets
|
Top of Page