Giriş
|
Hesabım
|
Listelerim
|
|
Remember to clear the cache and close the browser window.
English
Search Limit
Bütün Kütüphaneler
Elektronik Kaynaklar
Hepsi
Başkent Üniversitesi Kütüphanesi
Anadolu OSB Meslek Yüksekokulu
Atasev Özel Koleksiyon
Erdoğan Tercan Koleksiyonu
Güzel Sanatlar ve Tasarım Arşivi
Kazan Meslek Yüksekokulu
Hukuk Koleksiyonu
Ord.Prof.Dr. Enver Ziya Karal Tarih Uygulama Ars.Mrk.
Özel Koleksiyon Serdar Özersin
Tez Koleksiyonu
Tüm Alanlar
Başlık
Yazar
Konu
ISBN
ISSN
8
Search Field
Tüm Alanlar
Arama:
Gelişmiş Arama
Search Results
Elektronik Kaynaklar
Arama Sonuçlarını Sınırlandır
Daraltılmış:
+
Language: English
+
Kütüphane: Başkent Kütüphanesi
+
Lokasyon: Elsevier E-Kitap Koleksiyonu
+
Konu: COMPUTERS -- Networking -- Security.
Yazar
Dahil
Hariç
Cross, Michael, 1965-
(5)
Foster, James C.
(3)
Hurley, Chris.
(3)
Khan, Umer.
(3)
Rittinghouse, John W.
(3)
Shinder, Thomas W.
(3)
Baskin, Brian.
(2)
Beale, Jay.
(2)
Behrens, Thorsten.
(2)
Bradley, Tony, 1969-
(2)
Cameron, Rob.
(2)
Contos, Brian T.
(2)
Cox, I. J. (Ingemar J.)
(2)
Cunningham, Bryan, JD.
(2)
Dubrawsky, Ido.
(2)
Henmi, Anne.
(2)
Kraus, Rob.
(2)
Liu, Dale.
(2)
Long, Johnny.
(2)
Maynor, David.
(2)
Orebaugh, Angela.
(2)
Piltzecker, Tony, 1975-
(2)
Posluns, Jeffrey.
(2)
Ransome, James F.
(2)
Rathaus, Noam.
(2)
Riley, Charles.
(2)
Rogers, Russ.
(2)
Russell, Ryan, 1969-
(2)
Shinder, Debra Littlejohn.
(2)
Syngress Media, Inc.
(2)
Vacca, John R.
(2)
Zelkowitz, Marvin V., 1945-
(2)
Ahmad, David R. Mirza.
(1)
Alder, Raven.
(1)
Alpern, Naomi J.
(1)
Alvarado, Ellen.
(1)
Anderson, Brian (Brian James)
(1)
Andress, Jason.
(1)
Andrés, Steven.
(1)
Archibald, Neil.
(1)
Babbin, Jacob.
(1)
Baccas, Paul.
(1)
Baker, Andrew R.
(1)
Barnes, Christian.
(1)
Baumrucker, C. Tate.
(1)
Ben-Natan, Ron.
(1)
Benton, K. David.
(1)
Bidwell, Teri.
(1)
Birkholz, Erik Pace.
(1)
Bloom, Jeffrey A. (Jeffrey Adam), 1964-
(1)
Bonnell, Ralph.
(1)
Borkin, Mike.
(1)
Bray, Rory.
(1)
Burnett, Mark.
(1)
Burton, James D.
(1)
Burton, James.
(1)
Cantrell, Chris.
(1)
Carasik, Anne H.
(1)
Carrington, Charles (Charles Dudley)
(1)
Carvey, Harlan A.
(1)
Casco, Steven.
(1)
Caswell, Brian.
(1)
Chaffin, Larry.
(1)
Chandra, Praphul.
(1)
Cherry, Denny.
(1)
Cid, Daniel.
(1)
Clark, Champ, III.
(1)
Clercq, Jan de, 1968-
(1)
Cole, Eric.
(1)
Conrad, Eric, 1967-
(1)
Cook, Randy (Randy R.)
(1)
Danielyan, Edgar.
(1)
Dunham, Ken.
(1)
Ellis, Juanita.
(1)
Ellis, Scott (Scott Raymond), 1968-
(1)
Engebretson, Pat (Patrick Henry), 1974-
(1)
Erbschloe, Michael.
(1)
Esler, Joel.
(1)
Feldman, Joshua.
(1)
Finisterre, Kevin.
(1)
Foster, Stephen C.
(1)
Gatford, Chris.
(1)
Gold, André.
(1)
Grand, Joe.
(1)
Grasdal, Martin.
(1)
Gregg, Michael (Michael C.)
(1)
Grillenmeier, Guido.
(1)
Grossman, Jeremiah.
(1)
Haines, Brad.
(1)
Hancock, Bill, 1957-
(1)
Harley, David.
(1)
Harrington, Jan L.
(1)
Hay, Andrew.
(1)
Hill, Terri.
(1)
Hirao, Joey.
(1)
Hoopes, John.
(1)
Jacobs, Josh.
(1)
Johnson, Norris L.
(1)
Kanclirz, Jan.
(1)
Kleiman, Dave.
(1)
Kligerman, Daniel.
(1)
Knipp, Eric.
(1)
Krishnamurthy Madwachar, Mohan.
(1)
Lin, Ching-Yung.
(1)
Liu, Vincent.
(1)
Lucas, Mark.
(1)
Lynch, F. William.
(1)
Manzuik, Steve.
(1)
McClure, Stuart.
(1)
Meyer, Greg.
(1)
Miles, Wyman.
(1)
Miller, Matthew L.
(1)
Misenar, Seth.
(1)
Mitchell, Ed, 1945-
(1)
Mitnick, Kevin D. (Kevin David), 1963-
(1)
Mookhey, K. K.
(1)
Morris, Greg.
(1)
Mullen, Timothy M.
(1)
Noble, Jim.
(1)
Norman, Thomas L.
(1)
O'Farrell, Neal.
(1)
Osborne, Mark.
(1)
Osipav, Vitaly.
(1)
Parker, Tom.
(1)
Peterson, Cathleen P.
(1)
Piccard, Paul L.
(1)
Pinkard, Becky.
(1)
Porter, Thomas.
(1)
Posey, Brien.
(1)
Prowell, Stacy J.
(1)
Qian, Yi, 1962-
(1)
Ramirez, Gilbert, 1972-
(1)
Ramirez, Gilbert.
(1)
Rash, Michael.
(1)
Riley, Charles E.
(1)
Ring, Sandra.
(1)
Sachs, Marcus H.
(1)
Santry, Patrick.
(1)
Schiller, Craig A.
(1)
Schuler, Karen.
(1)
Shepherd, Matthew.
(1)
Shimonski, Robert.
(1)
Shinder, Debra Littlejohn. Scene of the cybercrime.
(1)
Singh, Abhishek.
(1)
Snedaker, Susan.
(1)
Speed, Tim.
(1)
Strachan, Fergus.
(1)
Summitt, Paul M.
(1)
Susan Snedaker.
(1)
Sweeney, Mike.
(1)
Taylor, Laura.
(1)
Thompson, Troy.
(1)
Tobkin, Chris.
(1)
Todd, Chad.
(1)
Varsalone, Jesse.
(1)
Vincze, Éva.
(1)
Wall, David.
(1)
Walther, Henrik.
(1)
Warnicke, Ed.
(1)
Watkins, Stephen (Information security professional)
(1)
Weaver, Woody.
(1)
Wilhelm, Thomas.
(1)
Winkler, Ira.
(1)
Winkler, J. R. (Joachim R.)
(1)
Wun-Young, Leslie.
(1)
Wyler, Neil R.
(1)
XYPRO Technology Corporation.
(1)
Yu, Hong Heather, 1967-
(1)
Zeng, Wenjun, 1967-
(1)
Daha fazla
Tümünü genişlet
Daha az
Hepsini Daralt
Materyal Türü
Dahil
Hariç
E-Kitap
Yayın Yılı
Dahil
Hariç
-
2007
(23)
2006
(20)
2008
(14)
2004
(12)
2005
(12)
2002
(9)
2003
(8)
2009
(8)
2010
(7)
2011
(6)
2001
(2)
Daha fazla
Tümünü genişlet
Daha az
Hepsini Daralt
Konu
Dahil
Hariç
COMPUTERS -- Internet -- Security.
(121)
COMPUTERS -- Security -- General.
(121)
Electronic books.
(121)
Computer networks -- Security measures.
(63)
Computer security.
(62)
Firewalls (Computer security)
(15)
Data protection.
(7)
Hackers.
(7)
Database security.
(6)
Handbooks and manuals.
(6)
Internet -- Security measures.
(6)
Andre fag (naturvidenskab og teknik) Andre fag
(5)
Wireless communication systems -- Security measures.
(5)
Computer crimes -- Prevention.
(4)
Computer security -- Management.
(4)
Computers -- Access control.
(4)
Open source software.
(4)
Study guides.
(4)
Wireless LANs -- Security measures.
(4)
Client/server computing.
(3)
Computer networks -- Security measures -- Computer programs.
(3)
Computer networks -- Security measures -- Examinations -- Study guides.
(3)
Computer networks -- Security measures -- Examinations.
(3)
Computer security -- Examinations -- Study guides.
(3)
Computer security -- Examinations.
(3)
Computer security -- Handbooks, manuals, etc.
(3)
Electronic data processing personnel -- Certification.
(3)
Information technology -- Security measures.
(3)
Microsoft ISA server.
(3)
Microsoft Windows (Computer file)
(3)
Réseaux d'ordinateurs -- Sécurité -- Mesures.
(3)
Web sites -- Security measures.
(3)
Computer crimes -- Investigation.
(2)
Computer crimes.
(2)
Computer hackers.
(2)
Computer networks -- Access control.
(2)
Computer networks -- Security measures -- Handbooks, manuals, etc.
(2)
Computer science.
(2)
Computer security -- Computer programs.
(2)
Computer viruses.
(2)
Computerbeveiliging.
(2)
Computernetwerken.
(2)
Computers -- Access control -- Passwords.
(2)
Digital watermarking.
(2)
Electronic mail systems -- Security measures.
(2)
Engineering & Applied Sciences.
(2)
Internet telephony -- Security measures.
(2)
Microsoft Exchange server.
(2)
Protection de l'information (Informatique)
(2)
Rechnernetz
(2)
Réseaux d'ordinateurs.
(2)
Spyware (Computer software)
(2)
Systèmes informatiques -- Sécurité -- Mesures.
(2)
World Wide Web -- Security measures.
(2)
Agents intelligents (Logiciels)
(1)
Application software -- Security measures.
(1)
Aufsatzsammlung.
(1)
Bases de données -- Sécurité -- Mesures.
(1)
Business enterprises -- Computer networks -- Security measures.
(1)
Business enterprises -- Computer networks.
(1)
Business information services -- Security measures.
(1)
Case studies.
(1)
Cell phone systems -- Security measures.
(1)
Cisco Systems, Inc.
(1)
Client/server computing -- Security measures.
(1)
Cloud computing.
(1)
ColdFusion.
(1)
Computer Science.
(1)
Computer crimes -- Case studies.
(1)
Computer games -- Programming.
(1)
Computer network architectures.
(1)
Computer network protocols.
(1)
Computer networks -- Management.
(1)
Computer networks -- Monitoring -- Computer programs.
(1)
Computer networks -- Reliability.
(1)
Computer networks -- Security measures -- Evaluation.
(1)
Computer networks -- Security measures -- Examinations, questions, etc.
(1)
Computer networks -- Testing.
(1)
Computer networks Security measures
(1)
Computer networks.
(1)
Computer security -- Evaluation -- Methodology.
(1)
Computer security -- Evaluation.
(1)
Computer security -- Examinations -- Practice.
(1)
Computer security -- Management -- Handbooks, manuals, etc.
(1)
Computer security equipment industry -- Directories.
(1)
Computer security equipment industry.
(1)
Computer software -- Testing.
(1)
Computercriminaliteit.
(1)
Computersicherheit
(1)
Credit cards -- Security measures -- Standards -- Handbooks, manuals, etc.
(1)
Credit cards.
(1)
Cyberterrorism.
(1)
Data encryption (Computer science)
(1)
Data protection -- Standards.
(1)
Databescherming.
(1)
Datensicherung
(1)
Directories.
(1)
Electrical & Computer Engineering.
(1)
Electrical engineering.
(1)
Electronic book.
(1)
Electronic commerce -- Directories.
(1)
Electronic commerce.
(1)
Electronic data processing personnel -- Certification -- Study guides.
(1)
Electronic discovery (Law)
(1)
Electronic discovery (Law) -- United States.
(1)
Electronic mail messages -- Security measures.
(1)
Examinations.
(1)
Forensic sciences.
(1)
GFI Software (Firm)
(1)
GFI Software (Firm) -- Handbooks, manuals, etc.
(1)
Global system for mobile communications -- Security measures.
(1)
Hewlett-Packard computers -- Security measures.
(1)
IEEE 802. 11 (Standard)
(1)
IEEE 802.11 (Standard)
(1)
Identification cards -- Forgeries.
(1)
Impostors and imposture.
(1)
Information resources management -- Evaluation.
(1)
Information resources management.
(1)
Information storage and retrieval systems -- Security measures.
(1)
Information technology.
(1)
Informationssystem
(1)
Informatique.
(1)
Instant messaging -- Security measures.
(1)
Intellectual property.
(1)
Internet -- Security measures -- Software.
(1)
Internet fraud.
(1)
Internettelefonie.
(1)
Intrusion detection systems (Computer security)
(1)
Juniper Networks, Inc.
(1)
Liability for credit information.
(1)
Linux.
(1)
Mac OS.
(1)
Manuels.
(1)
Metasploit (Electronic resource)
(1)
Microsoft Outlook.
(1)
Microsoft Windows server.
(1)
Microsoft Windows.
(1)
Microsoft software -- Security measures -- Handbooks, manuals, etc.
(1)
Mobile communication systems -- Security measures.
(1)
Mobile computing -- Security measures.
(1)
Multimedia systems -- Security measures.
(1)
Netcat.
(1)
Netzwerkanalyse
(1)
OSSEC (Computer file)
(1)
Oracle (Computer file)
(1)
Oracle.
(1)
Paketvermittlung
(1)
Peer-to-peer architecture (Computer networks)
(1)
Records -- Management -- Data processing.
(1)
Records retention.
(1)
Routers (Computer networks)
(1)
SAP ERP.
(1)
SQL server.
(1)
Sites Web -- Sécurité -- Mesures.
(1)
Snort (Computer file)
(1)
Snort (Software)
(1)
Snort 2.0
(1)
Software.
(1)
Solaris (Computer file)
(1)
Spam filtering (Electronic mail)
(1)
Sécurité informatique.
(1)
TCP/IP (Computer network protocol)
(1)
TCP/IP (Protocole de réseaux d'ordinateurs)
(1)
Telecommunication -- Security measures.
(1)
Telecommunications engineers -- Certification.
(1)
Telecommunications.
(1)
Transmission sans fil.
(1)
UNIX Shells.
(1)
UNIX.
(1)
United States.
(1)
Universal Mobile Telecommunications System -- Security measures.
(1)
Video games -- Design.
(1)
Virtual computer systems.
(1)
Virtual storage (Computer science) -- Security measures.
(1)
Virus informatiques.
(1)
Web servers -- Security measures.
(1)
Wireless Internet -- Security measures.
(1)
Wireless LANs.
(1)
Wireless communication systems.
(1)
Daha fazla
Tümünü genişlet
Daha az
Hepsini Daralt
false
{sortLabel}
{alphabetical}
{relevance}
{include}
{exclude}
{facetName}
{results}
{displayName}
{count}
{error}
Eylem Seç
Ayırt
Listelerime ekle
Eposta
Yazdır
121 sonuç bulundu
1
..
3
4
5
6
7
..
11
Sırala:
Konuyla İlgili Sırala
Yayın Yılı (eskiden yeniye)
Yayın Yılı (yeniden eskiye)
Başlık
Yazar
OK
Eposta Adresleri
:
Phone Number:
Mobile Carrier:
AT&T
Boost
Nextel (Sprint)
Sprint (PCS)
T Mobile
TracFone
US Cellular
Verizon
Virgin
Select An Item
Data usage warning: You will receive one text message for each title you selected.
Standard text messaging rates apply.
Text it to me
Text it to me, and go to next item
000000000000
DEFAULTTR
Liste seç
Geçici Liste
Bunu varsayılan liste yap.
Öğeler başarıyla eklendi
Öğeler eklenirken hata oldu. Lütfen tekrar deneyiniz.
Physical and logical security convergence powered by enterprise security management
49.
Physical and logical security convergence powered by enterprise security management
by
Contos, Brian T.
ScienceDirect
https://www.sciencedirect.com/science/book/9781597491228
Format:
AVIEN malware defense guide for the Enterprise
50.
AVIEN malware defense guide for the Enterprise
by
Harley, David.
ScienceDirect
https://www.sciencedirect.com/science/book/9781597491648
Format:
Web application vulnerabilities : detect, exploit, prevent
51.
Web application vulnerabilities : detect, exploit, prevent
by
Cross, Michael, 1965-
ScienceDirect
http://www.sciencedirect.com/science/book/9781597492096
Format:
The best damn IT security management book period
52.
The best damn IT security management book period
by
Susan Snedaker.
ScienceDirect
http://www.sciencedirect.com/science/book/9781597492270
Format:
How to cheat at securing your network
53.
How to cheat at securing your network
by
Dubrawsky, Ido.
ScienceDirect
https://www.sciencedirect.com/science/book/9781597492317
Format:
Integrated security systems design : concepts, specifications, and implementation
54.
Integrated security systems design : concepts, specifications, and implementation
by
Norman, Thomas L.
ScienceDirect
http://www.sciencedirect.com/science/book/9780750679091
Format:
Snort : IDS and IPS toolkit
55.
Snort : IDS and IPS toolkit
by
Beale, Jay.
ScienceDirect
https://www.sciencedirect.com/science/book/9781597490993
Format:
Network security assessment : from vulnerability to patch
56.
Network security assessment : from vulnerability to patch
by
Manzuik, Steve.
ScienceDirect
http://www.sciencedirect.com/science/book/9781597491013
Format:
WarDriving & wireless penetration testing
57.
WarDriving & wireless penetration testing
by
Hurley, Chris.
ScienceDirect
http://www.sciencedirect.com/science/book/9781597491112
Format:
FISMA certification & accreditation handbook
58.
FISMA certification & accreditation handbook
by
Taylor, Laura.
ScienceDirect
http://www.sciencedirect.com/science/book/9781597491167
Format:
Combating spyware in the enterprise
59.
Combating spyware in the enterprise
by
Baskin, Brian.
ScienceDirect
https://www.sciencedirect.com/science/book/9781597490641
Format:
Syngress force emerging threat analysis : from mischief to malicious
60.
Syngress force emerging threat analysis : from mischief to malicious
by
Maynor, David.
ScienceDirect
http://www.sciencedirect.com/science/book/9781597490566
Format:
Eylem Seç
Ayırt
Listelerime ekle
Eposta
Yazdır
1
..
3
4
5
6
7
..
11
Search Results
Elektronik Kaynaklar
Search Results
Elektronik Kaynaklar
OK
Eposta Adresleri
:
Phone Number:
Mobile Carrier:
AT&T
Boost
Nextel (Sprint)
Sprint (PCS)
T Mobile
TracFone
US Cellular
Verizon
Virgin
Select An Item
Data usage warning: You will receive one text message for each title you selected.
Standard text messaging rates apply.
Text it to me
Text it to me, and go to next item
Elektronik Kaynaklar
Sonuçlar alınıyor Elektronik Kaynaklar...
action