Skip to:
Search Results
|
Bottom
|
Search Facets
|
Content
Giriş
|
Hesabım
|
Listelerim
|
|
Remember to clear the cache and close the browser window.
English
Search Limit
Bütün Kütüphaneler
Elektronik Kaynaklar
Hepsi
Başkent Üniversitesi Kütüphanesi
Anadolu OSB Meslek Yüksekokulu
Atasev Özel Koleksiyon
Erdoğan Tercan Koleksiyonu
Güzel Sanatlar ve Tasarım Arşivi
Kazan Meslek Yüksekokulu
Hukuk Koleksiyonu
Ord.Prof.Dr. Enver Ziya Karal Tarih Uygulama Ars.Mrk.
Özel Koleksiyon Serdar Özersin
Tez Koleksiyonu
Tüm Alanlar
Başlık
Yazar
Konu
ISBN
ISSN
13
Search Field
Tüm Alanlar
Arama:
Gelişmiş Arama
Search Results
Elektronik Kaynaklar
Arama Sonuçlarını Sınırlandır
Daraltılmış:
+
Lokasyon: Ebook Central
+
Konu: Computer security.
Yazar
Dahil
Hariç
ProQuest (Firm)
(196)
International Business Machines Corporation. International Technical Support Organization.
(10)
Foster, James C.
(5)
Calder, Alan, author.
(4)
Limbert, Matthew, designer.
(4)
Rayns, Chris.
(4)
Shinder, Thomas W.
(4)
Buchanan, Cameron, author.
(3)
Carvey, Harlan A.
(3)
Katsaropoulos, Chris, editor.
(3)
Long, Johnny.
(3)
Rogers, Mark, designer.
(3)
Shinder, Debra Littlejohn.
(3)
Boulanger, Jean-Louis.
(2)
Chandramouli, Ramaswamy.
(2)
Cherry, Denny.
(2)
Cole, Eric.
(2)
Dalziel, Henry, author.
(2)
Dalziel, Henry, editor.
(2)
Erickson, Jon, 1977-
(2)
Ferraiolo, David.
(2)
Goodman, Seymour E.
(2)
Grasdal, Martin.
(2)
Hunter, Laura E.
(2)
Hurley, Chris.
(2)
Hutchens, Justin, author.
(2)
Koh.
(2)
Krutz, Ronald L.
(2)
Kuhn, D. Richard.
(2)
Moskowitz, Jeremy.
(2)
Oppliger, Rolf.
(2)
Piltzecker, Tony, 1975-
(2)
Ramachandran, Vivek, author.
(2)
Ramirez, Gilbert.
(2)
Ring, Sandra.
(2)
Vacca, John R.
(2)
Wheeler, Evan.
(2)
Wiles, Jack.
(2)
Wyler, Neil R.
(2)
Young, Carl S., author.
(2)
Zalewski, Michal.
(2)
AXELOS Limited, author.
(1)
Abbadi, Imad M., author.
(1)
Ablon, Lillian, author.
(1)
Agre, Philip.
(1)
Alam, Shahnawaz, author.
(1)
Alcover, Jorge Blanco.
(1)
Alexander, Philip, 1963-
(1)
American Evaluation Association.
(1)
Amini, Rob.
(1)
Andress, Jason, author.
(1)
Andrés, Steven.
(1)
Antón, Philip S.
(1)
Anzaldua, Reynaldo.
(1)
Aquilina, James M.
(1)
Aquilina, James, author.
(1)
Archibald, Neil.
(1)
Arnold, Michael (Michael Konrad), 1964-
(1)
Arvanitis, Nicholas, editor.
(1)
Ashenden, Debi.
(1)
Assam, Tarek.
(1)
Axelrod, C. Warren.
(1)
Baker, Paul R., 1958-
(1)
Barnett, Ryan C.
(1)
Basagiannis, Stylianos, contributor.
(1)
Baskerville, Richard.
(1)
Baskin, Brian, author.
(1)
Baskin, Brian.
(1)
Bayles, Aaron W.
(1)
Bayuk, Jennifer L.
(1)
Beale, Jay.
(1)
Beaver, Kevin.
(1)
Belapurkar, Abhijit.
(1)
Ben-Ari, Erez.
(1)
Ben-Natan, Ron.
(1)
Bennett, Eleanor Leonne, cover designer.
(1)
Benny, Daniel J.
(1)
Berghe, Thierry van den, author.
(1)
Bertino, Elisa.
(1)
Bhalla, Nish.
(1)
Bianco, David J., 1971-
(1)
Binnie, Christopher, author.
(1)
Blair, John, author.
(1)
Blobel, Bernd.
(1)
Bolt, Steven.
(1)
Bonertz, Tina.
(1)
Bradley, Jaron, author.
(1)
Bradley, Tony.
(1)
Breimeier, Johannes.
(1)
Brennen, Jerod, editor.
(1)
Brewer, Jacqueline, editor.
(1)
Brindley, Ed.
(1)
Brooks, Hugh.
(1)
Brotby, W. Krag.
(1)
Bruchez, Rudi.
(1)
Bullock, Jessey, author.
(1)
Burke, Josh.
(1)
Burnett, Mark (Mark M.)
(1)
Burnett, Mark.
(1)
Bücker, Axel.
(1)
Cabric, Marko, author.
(1)
Calder, Alan.
(1)
Calderon Pale, Paulino.
(1)
Caloyannides, Michael A.
(1)
Caloyannides, Michael A. Computer forensics and privacy.
(1)
Cantrell, Christopher.
(1)
Carbone, Fernando, author.
(1)
Cardwell, Kevin, author.
(1)
Carvey, Harlan A., author.
(1)
Carvey, Harlan, author.
(1)
Casey, Eoghan, author.
(1)
Casey, Eoghan.
(1)
Caswell, Brian.
(1)
Cesario, Cristiano.
(1)
Chaffin, Larry.
(1)
Chapman, Chris, author.
(1)
Chikofsky, Elliot J.
(1)
Choi, Kyung-shick, 1973-
(1)
Chuvakin, Anton A.
(1)
Clark, Gregory, author.
(1)
Clarke, Justin.
(1)
Clercq, Jan de, 1968-
(1)
Cole, Eric, author.
(1)
Conti, Greg.
(1)
Contos, Brian T.
(1)
Cook, Jim, 1944-
(1)
Couretas, Jerry M., 1966- author.
(1)
Cox, I. J. (Ingemar J.)
(1)
Cross, Michael, 1965-
(1)
Cross, Michael.
(1)
Cruz, Maria Ines, cover designer.
(1)
Cruz, Maria Ines, designer.
(1)
Cyborski, Shannon, author.
(1)
C̆ervĕn, Pavol.
(1)
D'Arcy, John P., 1975-
(1)
Dai, Yuan-Shun.
(1)
Dattani, Dinesh D.
(1)
Day, Graham, 1945- author.
(1)
DeMott, Jared.
(1)
Delfanti, Alessandro.
(1)
Dent, Alexander W.
(1)
Deraison, Renaud.
(1)
Dhali, Maruf Ahmed, cover designer.
(1)
Dhillon, Gurpreet.
(1)
Diogenes, Yuri.
(1)
Dolev, Ran.
(1)
Donaldson, Scott E., author.
(1)
Eilam, Eldad.
(1)
Ejzyn, Alain, author.
(1)
Esparza, Javier.
(1)
Essaaidi, Mohamed.
(1)
European Commission. Information Society DG.
(1)
Evergreen, Stephanie.
(1)
Fabbri, Rosato.
(1)
Fahy, Bob, editor.
(1)
Fair, Ted.
(1)
Fernandez-Medina, Eduardo.
(1)
Ficco, Massimo, editor.
(1)
Fichera, Joe, 1966-
(1)
Filip, Werner.
(1)
Fionov, Andrey.
(1)
Forristal, Jeff.
(1)
Foster, James.
(1)
Foster, Stephen C.
(1)
Fowler, Kevvie, author.
(1)
Franco, Pedro, author.
(1)
Friedman, Beth, editor.
(1)
Fuller, Ed.
(1)
Furnell, Steve, editor.
(1)
Furnell, Steven, 1970-
(1)
Gallo, Timonthy, editor.
(1)
Galvan, Karla.
(1)
Gantz, Stephen D.
(1)
Gavrilenko, K., author.
(1)
Gehrmann, Christian.
(1)
Geiselhart, Gregory.
(1)
Ginodman, Veniamin, editor.
(1)
Goldstein, Emmanuel J.
(1)
Gomzin, Slava.
(1)
González, Belén.
(1)
Gore, Bruce, cover designer.
(1)
Govindaradjane, Punithavathy, contributor.
(1)
Grillenmeier, Guido.
(1)
Grimes, Roger A., author.
(1)
Gritzalis, Stefanos.
(1)
Grumberg, Orna.
(1)
Gruschka, Nils.
(1)
Guerrier, Claudine, author.
(1)
Gupta, Aditya, author.
(1)
Gupta, Ravi.
(1)
Guzman, Aaron, author.
(1)
Hadnagy, Christopher.
(1)
Hancock, Bill, 1957-
(1)
Hassan, Nihad Ahmad, author.
(1)
Hathaway, Melissa E., editor of compilation.
(1)
Hawker, Andrew.
(1)
Healey, Justin, editor.
(1)
Heinen, Neils.
(1)
Henmi, Anne.
(1)
Herkanaidu, Ram, editor.
(1)
Daha fazla
Tümünü genişlet
Daha az
Hepsini Daralt
Materyal Türü
Dahil
Hariç
E-Kitap
Dil
Dahil
Hariç
English
(312)
German
(3)
French
(1)
Yayın Yılı
Dahil
Hariç
-
2013
(35)
2014
(28)
2015
(27)
2005
(23)
2012
(22)
2016
(22)
2004
(21)
2006
(16)
2010
(16)
2003
(15)
2007
(15)
2011
(14)
2017
(13)
2008
(11)
2002
(10)
2018
(7)
2001
(6)
2009
(5)
2019
(5)
2000
(2)
1991
(1)
1997
(1)
2020
(1)
Daha fazla
Tümünü genişlet
Daha az
Hepsini Daralt
Konu
Dahil
Hariç
Electronic books.
(316)
Computer networks -- Security measures.
(107)
Data protection.
(33)
Internet -- Security measures.
(18)
Computer hackers.
(14)
Computers -- Access control.
(13)
Microsoft Windows (Computer file)
(11)
Data encryption (Computer science)
(10)
Business enterprises -- Computer networks -- Security measures.
(9)
Operating systems (Computers)
(9)
Computer crimes.
(8)
Cryptography.
(8)
Computer crimes -- Prevention.
(7)
Information technology -- Security measures.
(7)
Database security.
(6)
Computer crimes -- Investigation.
(5)
Cyberterrorism -- Prevention.
(5)
Malware (Computer software)
(5)
Security systems.
(5)
Cloud computing -- Security measures.
(4)
Cloud computing.
(4)
Computer networks -- Access control.
(4)
Computer viruses.
(4)
Cyberspace -- Security measures.
(4)
Firewalls (Computer security)
(4)
Client/server computing.
(3)
Computer crimes -- Investigation -- United States -- Methodology.
(3)
Computer software -- Development.
(3)
Computers -- Access control -- Passwords.
(3)
Corporations -- Security measures.
(3)
Data mining.
(3)
Digital watermarking.
(3)
Directory services (Computer network technology)
(3)
Electronic information resources -- Access control.
(3)
Embedded computer systems.
(3)
Forensic sciences.
(3)
Linux.
(3)
Microsoft Windows (Computer file) -- Security measures.
(3)
Microsoft Windows server.
(3)
Privacy, Right of.
(3)
Python (Computer program language)
(3)
Risk management.
(3)
Software configuration management.
(3)
World Wide Web -- Security measures.
(3)
z/OS.
(3)
Application software -- Security measures.
(2)
Business enterprises -- Security measures.
(2)
Citrix MetaFrame.
(2)
Client/server computing -- Security measures.
(2)
Computer science.
(2)
Computer software -- Reliability.
(2)
Debugging in computer science.
(2)
Electronic commerce -- Security measures.
(2)
Electronic data processing departments -- Auditing.
(2)
Hacking.
(2)
IBM software.
(2)
Information technology -- Auditing.
(2)
Information technology -- Management.
(2)
Information visualization.
(2)
Internet -- Safety measures.
(2)
Internet and children.
(2)
Internet searching.
(2)
Intrusion detection systems (Computer security)
(2)
Mac OS.
(2)
Microsoft ISA server.
(2)
National security.
(2)
Open source software.
(2)
Penetration testing (Computer security)
(2)
Process control -- Security measures.
(2)
Reverse engineering.
(2)
Risk assessment.
(2)
SQL server.
(2)
Social media.
(2)
Spyware (Computer software)
(2)
Terrorism -- Prevention.
(2)
Wireless communication systems -- Security measures.
(2)
AIX (Computer file)
(1)
Acquisition of computer software.
(1)
Algebra, Boolean.
(1)
Altre visioni. Solaris.
(1)
Application software.
(1)
Archives -- Safety measures.
(1)
Artificial intelligence.
(1)
Automatic machinery -- Security measures.
(1)
Avionics -- Safety measures.
(1)
BEA WebLogic server.
(1)
Big data -- Security measures.
(1)
Bluetooth technology -- Security measures.
(1)
Bluetooth technology.
(1)
Browsers (Computer programs)
(1)
Business enterpri -- Computer networks -- Security measures.
(1)
Business planning.
(1)
CORBA (Computer architecture)
(1)
Cocoa (Application development environment)
(1)
ColdFusion.
(1)
Commercial crimes.
(1)
Computer Security
(1)
Computer architecture.
(1)
Computer crimes -- Case studies.
(1)
Computer crimes -- Investigation -- United States.
(1)
Computer crimes -- Investments.
(1)
Computer hackers -- Fiction.
(1)
Computer network protocols.
(1)
Computer networks -- Certification.
(1)
Computer networks -- Design and construction.
(1)
Computer networks -- Examinations -- Study guides.
(1)
Computer networks -- Planning.
(1)
Computer networks -- Reliability.
(1)
Computer networks -- Security measures -- Standards.
(1)
Computer networks -- Security measures -- United States.
(1)
Computer networks.
(1)
Computer programming.
(1)
Computer security -- Fiction.
(1)
Computer security -- Forecasting.
(1)
Computer security -- United States.
(1)
Computer security -- Vocational guidance.
(1)
Computer simulation.
(1)
Computer software -- Evaluation.
(1)
Computer systems -- Reliability.
(1)
Computers -- Access control -- Standards.
(1)
Computers -- Reliability.
(1)
Confidential business information.
(1)
Corporate culture.
(1)
Corporations -- Corrupt practices.
(1)
Cryptography -- Mathematics.
(1)
Cryptography -- Standards.
(1)
Cyberinfrastructure -- Security measures.
(1)
Cyberinfrastructure.
(1)
Cyberterrorism.
(1)
Data protection -- Security measures.
(1)
Data protection -- Standards.
(1)
Database design.
(1)
Distributed operating systems (Computers)
(1)
Educational technology -- Security measures.
(1)
Electronic data processing -- Backup processing alternatives.
(1)
Electronic data processing -- Distributed processing.
(1)
Electronic data processing departments -- Contracting out.
(1)
Electronic data processing departments -- Security measures.
(1)
Electronic mail systems -- Security measures.
(1)
Electronic records -- Conservation and restoration.
(1)
Electronic records.
(1)
Electronic surveillance.
(1)
Emergency management -- Planning.
(1)
Encryption
(1)
Fraud investigation.
(1)
Future of Privacy
(1)
Groupware (Computer software)
(1)
Hackers.
(1)
Hashing (Computer science)
(1)
Hewlett-Packard computers -- Security measures.
(1)
Human-computer interaction.
(1)
IBM Cluster systems management.
(1)
IBM Database 2.
(1)
IBM computers -- Programming.
(1)
IBM computers.
(1)
IEEE 802.11 (Standard)
(1)
Industrial safety -- Management.
(1)
Information Assurance
(1)
Information Exchange
(1)
Information policy -- European Union countries.
(1)
Information resources management -- Security measures.
(1)
Information resources management.
(1)
Information storage and retrieval systems -- Business -- Security measures.
(1)
Information technology -- Certification.
(1)
Information technology -- Standards.
(1)
Information technology.
(1)
Information warfare.
(1)
Instant messaging.
(1)
Intellectual property.
(1)
Internet -- Access control.
(1)
Internet -- Law and legislation.
(1)
Internet domain names.
(1)
Internet of things -- Security measures.
(1)
Internet of things.
(1)
Internet programming.
(1)
Internet.
(1)
Java (Computer program language)
(1)
Kali Linux.
(1)
Languages, Artificial.
(1)
Libraries -- Safety measures.
(1)
Library information networks -- Security measures.
(1)
Linux -- Examinations -- Study guides.
(1)
Macintosh (Computer) -- Programming.
(1)
Management information systems.
(1)
Medical informatics.
(1)
Medical records -- Access control.
(1)
Medical records -- Data processing.
(1)
Microsoft Forefront.
(1)
Microsoft Windows (Computer file) -- Examinations -- Study guides.
(1)
Multidisciplinary design optimization.
(1)
Multimedia systems -- Security measures.
(1)
Narraciones solaris.
(1)
Network Security
(1)
Network performance (Telecommunication)
(1)
Online social networks -- Safety measures.
(1)
Online social networks -- Security measures.
(1)
Online social networks.
(1)
Open source intelligence.
(1)
Oracle (Computer file)
(1)
Oracle (Computer file) -- Handbooks, manuals, etc.
(1)
Daha fazla
Tümünü genişlet
Daha az
Hepsini Daralt
Kütüphane
Dahil
Hariç
Başkent Kütüphanesi
false
{sortLabel}
{alphabetical}
{relevance}
{include}
{exclude}
{facetName}
{results}
{displayName}
{count}
{error}
Eylem Seç
Ayırt
Listelerime ekle
Eposta
Yazdır
316 sonuç bulundu
1
..
3
4
5
6
7
..
27
Sırala:
Konuyla İlgili Sırala
Yayın Yılı (eskiden yeniye)
Yayın Yılı (yeniden eskiye)
Başlık
Yazar
OK
Eposta Adresleri
:
Phone Number:
Mobile Carrier:
AT&T
Boost
Nextel (Sprint)
Sprint (PCS)
T Mobile
TracFone
US Cellular
Verizon
Virgin
Select An Item
Data usage warning: You will receive one text message for each title you selected.
Standard text messaging rates apply.
Text it to me
Text it to me, and go to next item
000000000000
DEFAULTTR
Liste seç
Geçici Liste
Bunu varsayılan liste yap.
Öğeler başarıyla eklendi
Öğeler eklenirken hata oldu. Lütfen tekrar deneyiniz.
Application security in the ISO 27001:2013 environment
49.
Application security in the ISO 27001:2013 environment
by
Vasudevan, Vinod, author.
Click to View
Format:
Network attacks & exploitation : a framework
50.
Network attacks & exploitation : a framework
by
Monte, Matthew, author.
Click to View
Format:
Group policy : fundamentals, security, and the managed desktop
51.
Group policy : fundamentals, security, and the managed desktop
by
Moskowitz, Jeremy, author.
Click to View
Format:
Cyber resilience best practices
52.
Cyber resilience best practices
by
AXELOS Limited, author.
Click to View
Format:
Industrial network security : securing critical infrastructure networks for smart grid, SCADA, and other industrial control systems
53.
Industrial network security : securing critical infrastructure networks for smart grid, SCADA, and other industrial control systems
by
Knapp, Eric D., author.
Click to View
Format:
Security intelligence : a practitioner's guide to solving enterprise security challenges
54.
Security intelligence : a practitioner's guide to solving enterprise security challenges
by
Li, Qing, author.
Click to View
Format:
Online safety
55.
Online safety
by
Healey, Justin, editor.
Click to View
Format:
Digital privacy in the marketplace : perspectives on the information exchange
56.
Digital privacy in the marketplace : perspectives on the information exchange
by
Milne, George R., author.
Click to View
Format:
Black hat Python : Python programming for hackers and pentesters
57.
Black hat Python : Python programming for hackers and pentesters
by
Seitz, Justin, author.
Click to View
Format:
Understanding bitcoin : cryptography, engineering and economics.
58.
Understanding bitcoin : cryptography, engineering and economics.
by
Franco, Pedro, author.
Click to View
Format:
Designing and building a security operations center
59.
Designing and building a security operations center
by
Nathans, David, author.
Click to View
Format:
Information security analytics : finding security insights, patterns and anomalies in big data
60.
Information security analytics : finding security insights, patterns and anomalies in big data
by
Mark, Talabis, author.
Click to View
Format:
Eylem Seç
Ayırt
Listelerime ekle
Eposta
Yazdır
1
..
3
4
5
6
7
..
27
Search Results
Elektronik Kaynaklar
Search Results
Elektronik Kaynaklar
OK
Eposta Adresleri
:
Phone Number:
Mobile Carrier:
AT&T
Boost
Nextel (Sprint)
Sprint (PCS)
T Mobile
TracFone
US Cellular
Verizon
Virgin
Select An Item
Data usage warning: You will receive one text message for each title you selected.
Standard text messaging rates apply.
Text it to me
Text it to me, and go to next item
Elektronik Kaynaklar
Sonuçlar alınıyor Elektronik Kaynaklar...
action
Go to:
Search Results
|
Search Facets
|
Top of Page