Skip to:
Search Results
|
Bottom
|
Search Facets
|
Content
Giriş
|
Hesabım
|
Listelerim
|
|
Remember to clear the cache and close the browser window.
English
Search Limit
Bütün Kütüphaneler
Elektronik Kaynaklar
Hepsi
Başkent Üniversitesi Kütüphanesi
Anadolu OSB Meslek Yüksekokulu
Atasev Özel Koleksiyon
Erdoğan Tercan Koleksiyonu
Güzel Sanatlar ve Tasarım Arşivi
Kazan Meslek Yüksekokulu
Hukuk Koleksiyonu
Ord.Prof.Dr. Enver Ziya Karal Tarih Uygulama Ars.Mrk.
Özel Koleksiyon Serdar Özersin
Tez Koleksiyonu
Tüm Alanlar
Başlık
Yazar
Konu
ISBN
ISSN
13
Search Field
Tüm Alanlar
Arama:
Gelişmiş Arama
Search Results
Elektronik Kaynaklar
Arama Sonuçlarını Sınırlandır
Daraltılmış:
+
Konu: Computer security.
Yazar
Dahil
Hariç
ProQuest (Firm)
(196)
SpringerLink (Online service)
(22)
Foster, James C.
(11)
Fourastier, Yannick, editor.
(11)
Piètre-Cambacédès, Ludovic, editor.
(11)
International Business Machines Corporation. International Technical Support Organization.
(10)
Long, Johnny.
(9)
Russell, Ryan, 1969-
(6)
Calder, Alan, author.
(5)
Carvey, Harlan A.
(5)
Cross, Michael, 1965-
(5)
Hurley, Chris.
(5)
Wiles, Jack.
(5)
Beale, Jay.
(4)
Bhateja, Vikrant. editor.
(4)
Cherry, Denny.
(4)
Cole, Eric.
(4)
Hunter, Laura E.
(4)
Limbert, Matthew, designer.
(4)
Piltzecker, Tony, 1975-
(4)
Rayns, Chris.
(4)
Ring, Sandra.
(4)
Rittinghouse, John W.
(4)
Satapathy, Suresh Chandra. editor.
(4)
Shinder, Thomas W.
(4)
Buchanan, Cameron, author.
(3)
Clercq, Jan de, 1968-
(3)
Contos, Brian T.
(3)
Cox, I. J. (Ingemar J.)
(3)
Katsaropoulos, Chris, editor.
(3)
Mullen, Timothy M.
(3)
Rogers, Mark, designer.
(3)
Sachs, Marcus H.
(3)
Shinder, Debra Littlejohn.
(3)
Winkler, J. R. (Joachim R.)
(3)
Wyler, Neil R.
(3)
XYPRO Technology Corporation.
(3)
Alder, Raven.
(2)
Amini, Rob.
(2)
Andress, Jason.
(2)
Aquilina, James M.
(2)
Baskin, Brian.
(2)
Bayles, Aaron W.
(2)
Ben-Natan, Ron.
(2)
Boulanger, Jean-Louis.
(2)
Brindley, Ed.
(2)
Burnett, Mark (Mark M.)
(2)
Casey, Eoghan.
(2)
Caswell, Brian.
(2)
Chaffin, Larry.
(2)
Chaki, Nabendu. editor.
(2)
Chaki, Rituparna. editor.
(2)
Chandramouli, Ramaswamy.
(2)
Clarke, Justin.
(2)
Cortesi, Agostino. editor.
(2)
Dalziel, Henry, author.
(2)
Dalziel, Henry, editor.
(2)
Engebretson, Pat (Patrick Henry), 1974-
(2)
Erickson, Jon, 1977-
(2)
Fair, Ted.
(2)
Ferraiolo, David.
(2)
Foster, Stephen C.
(2)
Fourastier, Yannick, author.
(2)
Goodman, Seymour E.
(2)
Grasdal, Martin.
(2)
Grillenmeier, Guido.
(2)
Hancock, Bill, 1957-
(2)
Henmi, Anne.
(2)
Honick, Ron.
(2)
Hutchens, Justin, author.
(2)
Joshi, Amit. editor.
(2)
Kinney, Steven.
(2)
Kleidermacher, David.
(2)
Kleidermacher, Mike.
(2)
Knapp, Eric.
(2)
Koh.
(2)
Krutz, Ronald L.
(2)
Kuhn, D. Richard.
(2)
Lin, Ching-Yung.
(2)
Malin, Cameron H.
(2)
Mao, Wenji.
(2)
Maynor, David.
(2)
Meyer, Greg.
(2)
Mitnick, Kevin D.
(2)
Moskowitz, Jeremy.
(2)
Nordfelt, Michael.
(2)
Oppliger, Rolf.
(2)
Parker, Tom.
(2)
Piccard, Paul L.
(2)
Pietre-Cambacedes, Ludovic, author.
(2)
Potter, Bruce.
(2)
Qian, Yi, 1962-
(2)
Ramachandran, Vivek, author.
(2)
Ramirez, Gilbert.
(2)
Ransome, James F.
(2)
Rash, Michael.
(2)
Rathaus, Noam.
(2)
Rogers, Russ.
(2)
Saeed, Khalid. editor.
(2)
ScienceDirect (Online service)
(2)
Shein, Rob.
(2)
Shimonski, Robert.
(2)
Stanger, James.
(2)
Stapko, Timothy John.
(2)
Ticher, Paul, author.
(2)
Todd, Chad.
(2)
Tyson, Dave.
(2)
Vacca, John R.
(2)
Wang, Fei-Yue.
(2)
Wheeler, Evan.
(2)
Winkler, Ira.
(2)
Wotring, Brian.
(2)
Young, Carl S., author.
(2)
Yu, Hong Heather, 1967-
(2)
Zalewski, Michal.
(2)
Zeng, Wenjun, 1967-
(2)
'Ken'@ftu.
(1)
131ah.
(1)
AXELOS Limited, author.
(1)
Abbadi, Imad M., author.
(1)
Ablon, Lillian, author.
(1)
Agre, Philip.
(1)
Ahmad, David R. Mirza.
(1)
Ahmad, Rabiah. editor.
(1)
Akashe, Shyam. editor.
(1)
Akleylek, Sedat, Doç. Dr., editör
(1)
Al-maadeed, Somaya. editor.
(1)
Alam, Shahnawaz, author.
(1)
Alcover, Jorge Blanco.
(1)
Aleroud, Ahmed. editor.
(1)
Alexander, Philip, 1963-
(1)
Alkan, Mustafa, Doç. Dr., yazar
(1)
Alsmadi, Izzat M. editor.
(1)
Alvarado, Ellen.
(1)
American Evaluation Association.
(1)
Amini, M. Hadi. author.
(1)
Amoroso, Edward G.
(1)
Anderson, Brian (Brian James)
(1)
Andress, Jason, author.
(1)
Andrés, Steven.
(1)
Antón, Philip S.
(1)
Anzaldua, Reynaldo.
(1)
Aquilina, James, author.
(1)
Archibald, Neil.
(1)
Arnold, Michael (Michael Konrad), 1964-
(1)
Arvanitis, Nicholas, editor.
(1)
Ashenden, Debi.
(1)
Assam, Tarek.
(1)
Awad, Ahmed. editor.
(1)
Axelrod, C. Warren.
(1)
Aydın, Ömer, Dr. Öğr. Üyesi, editör
(1)
Baccas, Paul.
(1)
Bajracharya, Chandra. author.
(1)
Baker, Andrew R.
(1)
Baker, Paul R., 1958-
(1)
Barnett, Ryan C.
(1)
Barrett, Diane.
(1)
Basagiannis, Stylianos, contributor.
(1)
Baskerville, Richard.
(1)
Baskin, Brian, author.
(1)
Bayuk, Jennifer L.
(1)
Beaver, Kevin.
(1)
Bednarczyk, Michael.
(1)
Beghdadi, Azeddine. editor.
(1)
Belapurkar, Abhijit.
(1)
Ben-Ari, Erez.
(1)
Bennett, Eleanor Leonne, cover designer.
(1)
Benny, Daniel J.
(1)
Berber, Leyla Keser
(1)
Berghe, Thierry van den, author.
(1)
Bergstra, J. A.
(1)
Bertino, Elisa.
(1)
Bhalla, Nish.
(1)
Bhardwaj, Pawan K.
(1)
Bhunia, Swarup, author.
(1)
Bhunia, Swarup. editor.
(1)
Bianco, David J., 1971-
(1)
Bidwell, Teri.
(1)
Bin Azad, Tariq.
(1)
Binnie, Christopher, author.
(1)
Bishop, Matt (Matthew A.)
(1)
Black Hat Press (Goodhue, Minn.)
(1)
Blair, John, author.
(1)
Blobel, Bernd.
(1)
Bloom, Jeffrey A. (Jeffrey Adam), 1964-
(1)
Bodur, Hüseyin, yazar.
(1)
Bolt, Steven.
(1)
Bonertz, Tina.
(1)
Bonnell, Ralph.
(1)
Borges de Oliveira, Fábio. author.
(1)
Boroojeni, Kianoosh G. author.
(1)
Bott, Ed.
(1)
Bouridane, Ahmed. editor.
(1)
Bradley, Jaron, author.
(1)
Bradley, Tony, 1969-
(1)
Bradley, Tony.
(1)
Brathwaite, Shimon, author.
(1)
Bray, Rory.
(1)
Breimeier, Johannes.
(1)
Brennen, Jerod, editor.
(1)
Daha fazla
Tümünü genişlet
Daha az
Hepsini Daralt
Materyal Türü
Dahil
Hariç
E-Kitap
Kitap
Dil
Dahil
Hariç
English
(467)
Turkish
(15)
French
(14)
German
(3)
Yayın Yılı
Dahil
Hariç
-
2015
(40)
2005
(39)
2013
(37)
2004
(35)
2007
(35)
2017
(35)
2006
(31)
2014
(28)
2010
(27)
2011
(27)
2008
(25)
2012
(25)
2016
(22)
2003
(21)
2002
(20)
2019
(14)
2001
(10)
2018
(10)
2009
(9)
2022
(3)
1979
(2)
1987
(2)
1990
(2)
1991
(2)
1997
(2)
2000
(2)
1300
(1)
1301
(1)
1302
(1)
1303
(1)
1304
(1)
1305
(1)
1306
(1)
1307
(1)
1308
(1)
1309
(1)
1310
(1)
1311
(1)
1312
(1)
1313
(1)
1314
(1)
1900
(1)
1901
(1)
1902
(1)
1903
(1)
1904
(1)
1905
(1)
1906
(1)
1907
(1)
1908
(1)
1909
(1)
1910
(1)
1911
(1)
1912
(1)
1913
(1)
1914
(1)
1915
(1)
1916
(1)
1917
(1)
1918
(1)
1919
(1)
1920
(1)
1921
(1)
1922
(1)
1923
(1)
1924
(1)
1925
(1)
1926
(1)
1927
(1)
1928
(1)
1929
(1)
1930
(1)
1931
(1)
1932
(1)
1933
(1)
1934
(1)
1935
(1)
1936
(1)
1937
(1)
1938
(1)
1939
(1)
1940
(1)
1941
(1)
1942
(1)
1943
(1)
1944
(1)
1945
(1)
1946
(1)
1947
(1)
1948
(1)
1949
(1)
1950
(1)
1951
(1)
1952
(1)
1953
(1)
1954
(1)
1955
(1)
1956
(1)
1957
(1)
1958
(1)
1959
(1)
1960
(1)
1961
(1)
1962
(1)
1963
(1)
1964
(1)
1965
(1)
1966
(1)
1967
(1)
1968
(1)
1969
(1)
1970
(1)
1971
(1)
1972
(1)
1973
(1)
1974
(1)
1975
(1)
1976
(1)
1977
(1)
1978
(1)
1980
(1)
1981
(1)
1982
(1)
1983
(1)
1984
(1)
1985
(1)
1986
(1)
1988
(1)
1989
(1)
1992
(1)
1993
(1)
1994
(1)
1995
(1)
1996
(1)
1998
(1)
1999
(1)
2020
(1)
2025
(1)
Daha fazla
Tümünü genişlet
Daha az
Hepsini Daralt
Konu
Dahil
Hariç
Electronic books.
(459)
Computer networks -- Security measures.
(162)
COMPUTERS -- Internet -- Security.
(68)
COMPUTERS -- Networking -- Security.
(68)
COMPUTERS -- Security -- General.
(68)
Data protection.
(43)
Internet -- Security measures.
(27)
Systems and Data Security.
(22)
Engineering.
(21)
Bilgisayar güvenliği.
(19)
Computer hackers.
(19)
Computers -- Access control.
(19)
Microsoft Windows (Computer file)
(17)
Computer crimes.
(15)
Communications Engineering, Networks.
(14)
Electrical engineering.
(14)
Database security.
(13)
Computer crimes -- Prevention.
(12)
Cryptography.
(12)
Hackers.
(12)
Operating systems (Computers)
(12)
Computer crimes -- Investigation.
(11)
Data encryption (Computer science)
(11)
Business enterprises -- Computer networks -- Security measures.
(10)
Computational intelligence.
(10)
Information technology -- Security measures.
(9)
Computer viruses.
(8)
Firewalls (Computer security)
(7)
Security systems.
(7)
Client/server computing.
(6)
Cloud computing.
(6)
Computer science.
(6)
Computer security -- Fiction.
(6)
Cyberterrorism -- Prevention.
(6)
Microsoft Windows server.
(6)
Signal, Image and Speech Processing.
(6)
Artificial intelligence.
(5)
Client/server computing -- Security measures.
(5)
Computer networks -- Access control.
(5)
Computer security -- Handbooks, manuals, etc.
(5)
Cyberterrorism.
(5)
Digital watermarking.
(5)
Embedded computer systems.
(5)
Fiction.
(5)
Forensic sciences.
(5)
Hackers -- Fiction.
(5)
Handbooks and manuals.
(5)
Malware (Computer software)
(5)
SQL server.
(5)
Wireless communication systems -- Security measures.
(5)
Artificial Intelligence (incl. Robotics).
(4)
Cloud computing -- Security measures.
(4)
Computer crimes -- Investigation -- United States -- Methodology.
(4)
Computer software -- Development.
(4)
Computers -- Access control -- Passwords.
(4)
Cyberspace -- Security measures.
(4)
Data encryption (Computer science).
(4)
FICTION -- General.
(4)
Linux.
(4)
Microsoft Windows (Computer file) -- Security measures.
(4)
National security.
(4)
Open source software.
(4)
Process control -- Security measures.
(4)
Risk management.
(4)
Spyware (Computer software)
(4)
World Wide Web -- Security measures.
(4)
Andre fag (naturvidenskab og teknik) Andre fag
(3)
Application software -- Security measures.
(3)
Business enterprises -- Security measures.
(3)
Circuits and Systems.
(3)
Citrix MetaFrame.
(3)
Computer networks.
(3)
Corporations -- Security measures.
(3)
Data Encryption.
(3)
Data mining.
(3)
Directory services (Computer network technology)
(3)
Electronic circuits.
(3)
Electronic data processing departments -- Security measures.
(3)
Electronic information resources -- Access control.
(3)
Hewlett-Packard computers -- Security measures.
(3)
Information Systems Applications (incl. Internet).
(3)
Information resources management.
(3)
Intellectual property.
(3)
Internet programming.
(3)
Intrusion detection systems (Computer security)
(3)
LAW -- Forensic Science.
(3)
Mac OS.
(3)
Privacy, Right of.
(3)
Python (Computer program language)
(3)
Security Science and Technology.
(3)
Short stories.
(3)
Software configuration management.
(3)
System safety.
(3)
Web servers -- Security measures.
(3)
Web sites -- Security measures.
(3)
z/OS.
(3)
Acquisition of computer software.
(2)
Application software.
(2)
BUSINESS & ECONOMICS -- Corporate Governance.
(2)
BUSINESS & ECONOMICS -- Leadership.
(2)
BUSINESS & ECONOMICS -- Organizational Development.
(2)
BUSINESS & ECONOMICS -- Workplace Culture.
(2)
Big Data/Analytics.
(2)
Big data.
(2)
Bilgisayarlar -- Erişim kontrolü.
(2)
Bilişim teknolojisi -- Sosyal yönler.
(2)
Biometrics (Biology).
(2)
Biometrics.
(2)
COMPUTERS -- Security -- Cryptography.
(2)
COMPUTERS -- Security -- Viruses.
(2)
ColdFusion.
(2)
Computer Communication Networks.
(2)
Computer communication systems.
(2)
Computer crimes -- Case studies.
(2)
Computer networks -- Reliability.
(2)
Computer security -- United States.
(2)
Computer software -- Reliability.
(2)
Computer software -- Testing.
(2)
Computerbeveiliging.
(2)
Computercriminaliteit.
(2)
Computersicherheit
(2)
Cyberterrorism -- Fiction.
(2)
Debugging in computer science.
(2)
Electronic book.
(2)
Electronic commerce -- Security measures.
(2)
Electronic data processing departments -- Auditing.
(2)
Electronic mail messages -- Security measures.
(2)
Electronic mail systems -- Security measures.
(2)
Electronics and Microelectronics, Instrumentation.
(2)
Electronics.
(2)
Engineering & Applied Sciences.
(2)
Hacking.
(2)
IBM software.
(2)
Information technology -- Auditing.
(2)
Information technology -- Management.
(2)
Information technology -- Social aspects.
(2)
Information technology.
(2)
Information visualization.
(2)
Instant messaging -- Security measures.
(2)
Internal security.
(2)
Internet -- Safety measures.
(2)
Internet and children.
(2)
Internet searching.
(2)
Internet.
(2)
Kriptografi.
(2)
Microelectronics.
(2)
Microsoft ISA server.
(2)
Multimedia systems -- Security measures.
(2)
Online social networks -- Security measures.
(2)
Peer-to-peer architecture (Computer networks)
(2)
Penetration testing (Computer security)
(2)
Programming languages (Electronic computers)
(2)
Reverse engineering.
(2)
Risk assessment.
(2)
Réseaux d'ordinateurs -- Sécurité -- Mesures.
(2)
SQL (Computer program language)
(2)
Social engineering.
(2)
Social media.
(2)
Spam filtering (Electronic mail)
(2)
Systèmes informatiques -- Sécurité -- Mesures.
(2)
TECHNOLOGY & ENGINEERING -- Industrial Engineering.
(2)
TRUE CRIME -- White Collar Crime.
(2)
Terrorism -- Prevention.
(2)
United States.
(2)
Veri koruma.
(2)
Virtual computer systems -- Security measures.
(2)
Web sites -- Design.
(2)
XML (Document markup language)
(2)
İç güvenlik.
(2)
AIX (Computer file)
(1)
Agents intelligents (Logiciels)
(1)
Algebra, Boolean.
(1)
Algorithms.
(1)
Altre visioni. Solaris.
(1)
Application software -- Development.
(1)
Archives -- Safety measures.
(1)
Automatic machinery -- Security measures.
(1)
Avionics -- Safety measures.
(1)
BEA WebLogic server.
(1)
BUSINESS & ECONOMICS -- Business Writing.
(1)
BUSINESS & ECONOMICS -- Industrial Management.
(1)
BUSINESS & ECONOMICS -- Management Science.
(1)
BUSINESS & ECONOMICS -- Management.
(1)
BUSINESS & ECONOMICS -- Organizational Behavior.
(1)
Bases de données -- Sécurité -- Mesures.
(1)
Big data -- Security measures.
(1)
Big data -- Social aspects.
(1)
Bilgisayar ağları -- Güvenlik önlemleri.
(1)
Bilgisayar ağları -- Hukuk ve yasama.
(1)
Bilgisayar güvenliği -- Yazılım.
(1)
Bluetooth technology -- Security measures.
(1)
Bluetooth technology.
(1)
Browsers (Computer programs)
(1)
Business enterpri -- Computer networks -- Security measures.
(1)
Business planning.
(1)
Büyük veri -- Sosyal yönler.
(1)
COMPUTER INFORMATION SECURITY.
(1)
COMPUTERS -- Digital Media -- General.
(1)
COMPUTERS -- Hardware -- Handheld Devices.
(1)
COMPUTERS -- Hardware -- Personal Computers -- General.
(1)
Daha fazla
Tümünü genişlet
Daha az
Hepsini Daralt
Kütüphane
Dahil
Hariç
Başkent Kütüphanesi
Lokasyon
Dahil
Hariç
Atasev Özel Koleksiyonu
E-Kütüphane
Ebook Central
Elsevier E-Kitap Koleksiyonu
Kazan Meslek Yüksekokulu
Merkez Kütüphane
SPRINGER
Özel Koleksiyon Sercan-İlhan Gülsün (2.Kat)
Özel Koleksiyon Serdar Özersin
Daha fazla
Tümünü genişlet
Daha az
Hepsini Daralt
false
{sortLabel}
{alphabetical}
{relevance}
{include}
{exclude}
{facetName}
{results}
{displayName}
{count}
{error}
Eylem Seç
Ayırt
Listelerime ekle
Eposta
Yazdır
500 sonuç bulundu
1
..
5
6
7
8
9
..
42
Sırala:
Konuyla İlgili Sırala
Yayın Yılı (eskiden yeniye)
Yayın Yılı (yeniden eskiye)
Başlık
Yazar
OK
Eposta Adresleri
:
Phone Number:
Mobile Carrier:
AT&T
Boost
Nextel (Sprint)
Sprint (PCS)
T Mobile
TracFone
US Cellular
Verizon
Virgin
Select An Item
Data usage warning: You will receive one text message for each title you selected.
Standard text messaging rates apply.
Text it to me
Text it to me, and go to next item
000000000000
DEFAULTTR
Liste seç
Geçici Liste
Bunu varsayılan liste yap.
Öğeler başarıyla eklendi
Öğeler eklenirken hata oldu. Lütfen tekrar deneyiniz.
Linux server security : hack and defend
73.
Linux server security : hack and defend
by
Binnie, Christopher, author.
Click to View
Format:
Selling information security to the board : a primer
74.
Selling information security to the board : a primer
by
Calder, Alan, author.
Click to View
Format:
Nine steps to succes : an ISO 27001: 2013 implementation overview
75.
Nine steps to succes : an ISO 27001: 2013 implementation overview
by
Calder, Alan, author.
Click to View
Format:
OS X incident response : scripting and analysis
76.
OS X incident response : scripting and analysis
by
Bradley, Jaron, author.
Click to View
Format:
Dns security : defending the domain name system
77.
Dns security : defending the domain name system
by
Liska, Allan, author.
Click to View
Format:
Data breach preparation and response : breaches are certain, impact is not
78.
Data breach preparation and response : breaches are certain, impact is not
by
Fowler, Kevvie, author.
Click to View
Format:
Information security science : measuring the vulnerability to data compromises
79.
Information security science : measuring the vulnerability to data compromises
by
Young, Carl S., author.
Click to View
Format:
Breaking into information security : crafting a custom career path to get the job you really want
80.
Breaking into information security : crafting a custom career path to get the job you really want
by
More, Josh, author.
Click to View
Format:
Cyber security awareness for CEOs and management
81.
Cyber security awareness for CEOs and management
by
Willson, David, author.
Click to View
Format:
Meeting people via WiFi and Bluetooth
82.
Meeting people via WiFi and Bluetooth
by
Schroeder, Joshua, author.
Click to View
Format:
Essential skills for hackers
83.
Essential skills for hackers
by
Cardwell, Kevin, author.
Click to View
Format:
The information systems security officer's guide : establishing and managing a cyber security program
84.
The information systems security officer's guide : establishing and managing a cyber security program
by
Kovacich, Gerald L., author.
Click to View
Format:
Eylem Seç
Ayırt
Listelerime ekle
Eposta
Yazdır
1
..
5
6
7
8
9
..
42
Search Results
Elektronik Kaynaklar
Search Results
Elektronik Kaynaklar
OK
Eposta Adresleri
:
Phone Number:
Mobile Carrier:
AT&T
Boost
Nextel (Sprint)
Sprint (PCS)
T Mobile
TracFone
US Cellular
Verizon
Virgin
Select An Item
Data usage warning: You will receive one text message for each title you selected.
Standard text messaging rates apply.
Text it to me
Text it to me, and go to next item
Elektronik Kaynaklar
Sonuçlar alınıyor Elektronik Kaynaklar...
action
Go to:
Search Results
|
Search Facets
|
Top of Page