Giriş
|
Hesabım
|
Listelerim
|
|
Remember to clear the cache and close the browser window.
English
Search Limit
Bütün Kütüphaneler
Elektronik Kaynaklar
Hepsi
Başkent Üniversitesi Kütüphanesi
Anadolu OSB Meslek Yüksekokulu
Atasev Özel Koleksiyon
Erdoğan Tercan Koleksiyonu
Güzel Sanatlar ve Tasarım Arşivi
Kazan Meslek Yüksekokulu
Hukuk Koleksiyonu
Ord.Prof.Dr. Enver Ziya Karal Tarih Uygulama Ars.Mrk.
Özel Koleksiyon Serdar Özersin
Tez Koleksiyonu
Tüm Alanlar
Başlık
Yazar
Konu
ISBN
ISSN
101
Search Field
Tüm Alanlar
Arama:
Gelişmiş Arama
Search Results
Elektronik Kaynaklar
Arama Sonuçlarını Sınırlandır
Daraltılmış:
+
Language: English
+
Lokasyon: Elsevier E-Kitap Koleksiyonu
+
Konu: COMPUTERS -- Internet -- Security.
Yazar
Dahil
Hariç
Cross, Michael, 1965-
(5)
Foster, James C.
(3)
Hurley, Chris.
(3)
Khan, Umer.
(3)
Rittinghouse, John W.
(3)
Shinder, Thomas W.
(3)
Baskin, Brian.
(2)
Beale, Jay.
(2)
Behrens, Thorsten.
(2)
Bradley, Tony, 1969-
(2)
Cameron, Rob.
(2)
Contos, Brian T.
(2)
Cox, I. J. (Ingemar J.)
(2)
Cunningham, Bryan, JD.
(2)
Dubrawsky, Ido.
(2)
Henmi, Anne.
(2)
Kraus, Rob.
(2)
Liu, Dale.
(2)
Long, Johnny.
(2)
Maynor, David.
(2)
Orebaugh, Angela.
(2)
Piltzecker, Tony, 1975-
(2)
Posluns, Jeffrey.
(2)
Ransome, James F.
(2)
Rathaus, Noam.
(2)
Riley, Charles.
(2)
Rogers, Russ.
(2)
Russell, Ryan, 1969-
(2)
Shinder, Debra Littlejohn.
(2)
Syngress Media, Inc.
(2)
Vacca, John R.
(2)
Zelkowitz, Marvin V., 1945-
(2)
Ahmad, David R. Mirza.
(1)
Alder, Raven.
(1)
Alpern, Naomi J.
(1)
Alvarado, Ellen.
(1)
Anderson, Brian (Brian James)
(1)
Andress, Jason.
(1)
Andrés, Steven.
(1)
Archibald, Neil.
(1)
Babbin, Jacob.
(1)
Baccas, Paul.
(1)
Baker, Andrew R.
(1)
Barnes, Christian.
(1)
Baumrucker, C. Tate.
(1)
Ben-Natan, Ron.
(1)
Benton, K. David.
(1)
Bidwell, Teri.
(1)
Birkholz, Erik Pace.
(1)
Bloom, Jeffrey A. (Jeffrey Adam), 1964-
(1)
Bonnell, Ralph.
(1)
Borkin, Mike.
(1)
Bray, Rory.
(1)
Burnett, Mark.
(1)
Burton, James D.
(1)
Burton, James.
(1)
Cantrell, Chris.
(1)
Carasik, Anne H.
(1)
Carrington, Charles (Charles Dudley)
(1)
Carvey, Harlan A.
(1)
Casco, Steven.
(1)
Caswell, Brian.
(1)
Chaffin, Larry.
(1)
Chandra, Praphul.
(1)
Cherry, Denny.
(1)
Cid, Daniel.
(1)
Clark, Champ, III.
(1)
Clercq, Jan de, 1968-
(1)
Cole, Eric.
(1)
Conrad, Eric, 1967-
(1)
Cook, Randy (Randy R.)
(1)
Danielyan, Edgar.
(1)
Dunham, Ken.
(1)
Ellis, Juanita.
(1)
Ellis, Scott (Scott Raymond), 1968-
(1)
Engebretson, Pat (Patrick Henry), 1974-
(1)
Erbschloe, Michael.
(1)
Esler, Joel.
(1)
Feldman, Joshua.
(1)
Finisterre, Kevin.
(1)
Foster, Stephen C.
(1)
Gatford, Chris.
(1)
Gold, André.
(1)
Grand, Joe.
(1)
Grasdal, Martin.
(1)
Gregg, Michael (Michael C.)
(1)
Grillenmeier, Guido.
(1)
Grossman, Jeremiah.
(1)
Haines, Brad.
(1)
Hancock, Bill, 1957-
(1)
Harley, David.
(1)
Harrington, Jan L.
(1)
Hay, Andrew.
(1)
Hill, Terri.
(1)
Hirao, Joey.
(1)
Hoopes, John.
(1)
Jacobs, Josh.
(1)
Johnson, Norris L.
(1)
Kanclirz, Jan.
(1)
Kleiman, Dave.
(1)
Kligerman, Daniel.
(1)
Knipp, Eric.
(1)
Krishnamurthy Madwachar, Mohan.
(1)
Lin, Ching-Yung.
(1)
Liu, Vincent.
(1)
Lucas, Mark.
(1)
Lynch, F. William.
(1)
Manzuik, Steve.
(1)
Massimiliano, Oldani.
(1)
McClure, Stuart.
(1)
Meyer, Greg.
(1)
Miles, Wyman.
(1)
Miller, Matthew L.
(1)
Misenar, Seth.
(1)
Mitchell, Ed, 1945-
(1)
Mitnick, Kevin D. (Kevin David), 1963-
(1)
Mookhey, K. K.
(1)
Morris, Greg.
(1)
Mullen, Timothy M.
(1)
Noble, Jim.
(1)
Norman, Thomas L.
(1)
O'Farrell, Neal.
(1)
Osborne, Mark.
(1)
Osipav, Vitaly.
(1)
Parker, Tom.
(1)
Perla, Enrico.
(1)
Peterson, Cathleen P.
(1)
Piccard, Paul L.
(1)
Pinkard, Becky.
(1)
Porter, Thomas.
(1)
Posey, Brien.
(1)
Prowell, Stacy J.
(1)
Qian, Yi, 1962-
(1)
Ramirez, Gilbert, 1972-
(1)
Ramirez, Gilbert.
(1)
Rash, Michael.
(1)
Riley, Charles E.
(1)
Ring, Sandra.
(1)
Sachs, Marcus H.
(1)
Santry, Patrick.
(1)
Schiller, Craig A.
(1)
Schuler, Karen.
(1)
Shepherd, Matthew.
(1)
Shimonski, Robert.
(1)
Shinder, Debra Littlejohn. Scene of the cybercrime.
(1)
Singh, Abhishek.
(1)
Snedaker, Susan.
(1)
Speed, Tim.
(1)
Strachan, Fergus.
(1)
Summitt, Paul M.
(1)
Susan Snedaker.
(1)
Sweeney, Mike.
(1)
Taylor, Laura.
(1)
Thompson, Troy.
(1)
Tobkin, Chris.
(1)
Todd, Chad.
(1)
Varsalone, Jesse.
(1)
Vincze, Éva.
(1)
Wall, David.
(1)
Walther, Henrik.
(1)
Warnicke, Ed.
(1)
Watkins, Stephen (Information security professional)
(1)
Weaver, Woody.
(1)
Wilhelm, Thomas.
(1)
Winkler, Ira.
(1)
Winkler, J. R. (Joachim R.)
(1)
Wun-Young, Leslie.
(1)
Wyler, Neil R.
(1)
XYPRO Technology Corporation.
(1)
Yu, Hong Heather, 1967-
(1)
Zeng, Wenjun, 1967-
(1)
Daha fazla
Tümünü genişlet
Daha az
Hepsini Daralt
Materyal Türü
Dahil
Hariç
E-Kitap
Yayın Yılı
Dahil
Hariç
-
2007
(23)
2006
(20)
2008
(14)
2004
(12)
2005
(12)
2002
(9)
2003
(8)
2009
(8)
2010
(8)
2011
(6)
2001
(2)
Daha fazla
Tümünü genişlet
Daha az
Hepsini Daralt
Konu
Dahil
Hariç
COMPUTERS -- Networking -- Security.
(122)
COMPUTERS -- Security -- General.
(122)
Electronic books.
(122)
Computer networks -- Security measures.
(63)
Computer security.
(63)
Firewalls (Computer security)
(15)
Data protection.
(7)
Hackers.
(7)
Database security.
(6)
Handbooks and manuals.
(6)
Internet -- Security measures.
(6)
Andre fag (naturvidenskab og teknik) Andre fag
(5)
Wireless communication systems -- Security measures.
(5)
Computer crimes -- Prevention.
(4)
Computer security -- Management.
(4)
Computers -- Access control.
(4)
Open source software.
(4)
Study guides.
(4)
Wireless LANs -- Security measures.
(4)
Client/server computing.
(3)
Computer networks -- Security measures -- Computer programs.
(3)
Computer networks -- Security measures -- Examinations -- Study guides.
(3)
Computer networks -- Security measures -- Examinations.
(3)
Computer security -- Examinations -- Study guides.
(3)
Computer security -- Examinations.
(3)
Computer security -- Handbooks, manuals, etc.
(3)
Electronic data processing personnel -- Certification.
(3)
Information technology -- Security measures.
(3)
Microsoft ISA server.
(3)
Microsoft Windows (Computer file)
(3)
Réseaux d'ordinateurs -- Sécurité -- Mesures.
(3)
Web sites -- Security measures.
(3)
Computer crimes -- Investigation.
(2)
Computer crimes.
(2)
Computer hackers.
(2)
Computer networks -- Access control.
(2)
Computer networks -- Security measures -- Handbooks, manuals, etc.
(2)
Computer science.
(2)
Computer security -- Computer programs.
(2)
Computer viruses.
(2)
Computerbeveiliging.
(2)
Computernetwerken.
(2)
Computers -- Access control -- Passwords.
(2)
Digital watermarking.
(2)
Electronic mail systems -- Security measures.
(2)
Engineering & Applied Sciences.
(2)
Internet telephony -- Security measures.
(2)
Microsoft Exchange server.
(2)
Protection de l'information (Informatique)
(2)
Rechnernetz
(2)
Réseaux d'ordinateurs.
(2)
Spyware (Computer software)
(2)
Systèmes informatiques -- Sécurité -- Mesures.
(2)
World Wide Web -- Security measures.
(2)
Agents intelligents (Logiciels)
(1)
Application software -- Security measures.
(1)
Aufsatzsammlung.
(1)
Bases de données -- Sécurité -- Mesures.
(1)
Business enterprises -- Computer networks -- Security measures.
(1)
Business enterprises -- Computer networks.
(1)
Business information services -- Security measures.
(1)
Case studies.
(1)
Cell phone systems -- Security measures.
(1)
Cisco Systems, Inc.
(1)
Client/server computing -- Security measures.
(1)
Cloud computing.
(1)
ColdFusion.
(1)
Computer Science.
(1)
Computer crimes -- Case studies.
(1)
Computer games -- Programming.
(1)
Computer network architectures.
(1)
Computer network protocols.
(1)
Computer networks -- Management.
(1)
Computer networks -- Monitoring -- Computer programs.
(1)
Computer networks -- Reliability.
(1)
Computer networks -- Security measures -- Evaluation.
(1)
Computer networks -- Security measures -- Examinations, questions, etc.
(1)
Computer networks -- Testing.
(1)
Computer networks Security measures
(1)
Computer networks.
(1)
Computer security -- Evaluation -- Methodology.
(1)
Computer security -- Evaluation.
(1)
Computer security -- Examinations -- Practice.
(1)
Computer security -- Management -- Handbooks, manuals, etc.
(1)
Computer security equipment industry -- Directories.
(1)
Computer security equipment industry.
(1)
Computer software -- Testing.
(1)
Computercriminaliteit.
(1)
Computersicherheit
(1)
Credit cards -- Security measures -- Standards -- Handbooks, manuals, etc.
(1)
Credit cards.
(1)
Cyberterrorism.
(1)
Data encryption (Computer science)
(1)
Data protection -- Standards.
(1)
Databescherming.
(1)
Datensicherung
(1)
Directories.
(1)
Electrical & Computer Engineering.
(1)
Electrical engineering.
(1)
Electronic book.
(1)
Electronic commerce -- Directories.
(1)
Electronic commerce.
(1)
Electronic data processing personnel -- Certification -- Study guides.
(1)
Electronic discovery (Law)
(1)
Electronic discovery (Law) -- United States.
(1)
Electronic mail messages -- Security measures.
(1)
Examinations.
(1)
Forensic sciences.
(1)
GFI Software (Firm)
(1)
GFI Software (Firm) -- Handbooks, manuals, etc.
(1)
Global system for mobile communications -- Security measures.
(1)
Hewlett-Packard computers -- Security measures.
(1)
IEEE 802. 11 (Standard)
(1)
IEEE 802.11 (Standard)
(1)
Identification cards -- Forgeries.
(1)
Impostors and imposture.
(1)
Information resources management -- Evaluation.
(1)
Information resources management.
(1)
Information storage and retrieval systems -- Security measures.
(1)
Information technology.
(1)
Informationssystem
(1)
Informatique.
(1)
Instant messaging -- Security measures.
(1)
Intellectual property.
(1)
Internet -- Security measures -- Software.
(1)
Internet fraud.
(1)
Internettelefonie.
(1)
Intrusion detection systems (Computer security)
(1)
Juniper Networks, Inc.
(1)
Liability for credit information.
(1)
Linux.
(1)
Mac OS.
(1)
Manuels.
(1)
Metasploit (Electronic resource)
(1)
Microsoft Outlook.
(1)
Microsoft Windows server.
(1)
Microsoft Windows.
(1)
Microsoft software -- Security measures -- Handbooks, manuals, etc.
(1)
Mobile communication systems -- Security measures.
(1)
Mobile computing -- Security measures.
(1)
Multimedia systems -- Security measures.
(1)
Netcat.
(1)
Netzwerkanalyse
(1)
OSSEC (Computer file)
(1)
Operating systems (Computers) -- Security measures.
(1)
Oracle (Computer file)
(1)
Oracle.
(1)
Paketvermittlung
(1)
Peer-to-peer architecture (Computer networks)
(1)
Records -- Management -- Data processing.
(1)
Records retention.
(1)
Routers (Computer networks)
(1)
SAP ERP.
(1)
SQL server.
(1)
Sites Web -- Sécurité -- Mesures.
(1)
Snort (Computer file)
(1)
Snort (Software)
(1)
Snort 2.0
(1)
Software.
(1)
Solaris (Computer file)
(1)
Spam filtering (Electronic mail)
(1)
Sécurité informatique.
(1)
TCP/IP (Computer network protocol)
(1)
TCP/IP (Protocole de réseaux d'ordinateurs)
(1)
Telecommunication -- Security measures.
(1)
Telecommunications engineers -- Certification.
(1)
Telecommunications.
(1)
Transmission sans fil.
(1)
UNIX Shells.
(1)
UNIX.
(1)
United States.
(1)
Universal Mobile Telecommunications System -- Security measures.
(1)
Video games -- Design.
(1)
Virtual computer systems.
(1)
Virtual storage (Computer science) -- Security measures.
(1)
Virus informatiques.
(1)
Web servers -- Security measures.
(1)
Wireless Internet -- Security measures.
(1)
Wireless LANs.
(1)
Wireless communication systems.
(1)
Daha fazla
Tümünü genişlet
Daha az
Hepsini Daralt
Kütüphane
Dahil
Hariç
Başkent Kütüphanesi
false
{sortLabel}
{alphabetical}
{relevance}
{include}
{exclude}
{facetName}
{results}
{displayName}
{count}
{error}
Eylem Seç
Ayırt
Listelerime ekle
Eposta
Yazdır
122 sonuç bulundu
1
2
3
4
5
..
11
Sırala:
Konuyla İlgili Sırala
Yayın Yılı (eskiden yeniye)
Yayın Yılı (yeniden eskiye)
Başlık
Yazar
OK
Eposta Adresleri
:
Phone Number:
Mobile Carrier:
AT&T
Boost
Nextel (Sprint)
Sprint (PCS)
T Mobile
TracFone
US Cellular
Verizon
Virgin
Select An Item
Data usage warning: You will receive one text message for each title you selected.
Standard text messaging rates apply.
Text it to me
Text it to me, and go to next item
000000000000
DEFAULTTR
Liste seç
Geçici Liste
Bunu varsayılan liste yap.
Öğeler başarıyla eklendi
Öğeler eklenirken hata oldu. Lütfen tekrar deneyiniz.
Eleventh hour network+ : exam N10-004 study guide
13.
Eleventh hour network+ : exam N10-004 study guide
by
Alpern, Naomi J.
ScienceDirect
https://www.sciencedirect.com/science/book/9781597494281
Format:
Professional penetration testing : creating and operating a formal hacking lab
14.
Professional penetration testing : creating and operating a formal hacking lab
by
Wilhelm, Thomas.
ScienceDirect
https://www.sciencedirect.com/science/book/9781597494250
Format:
SAP security configuration and deployment : the IT administrator's guide to best practices
15.
SAP security configuration and deployment : the IT administrator's guide to best practices
by
Wun-Young, Leslie.
ScienceDirect
http://www.sciencedirect.com/science/book/9781597492843
Format:
Next generation SSH2 implementation : securing data in motion
16.
Next generation SSH2 implementation : securing data in motion
by
Liu, Dale.
ScienceDirect
https://www.sciencedirect.com/science/book/9781597492836
Format:
Mobile malware attacks and defense
17.
Mobile malware attacks and defense
by
Dunham, Ken.
ScienceDirect
https://www.sciencedirect.com/science/book/9781597492980
Format:
GFI network security and PCI compliance power tools
18.
GFI network security and PCI compliance power tools
by
Posey, Brien.
ScienceDirect
https://www.sciencedirect.com/science/book/9781597492850
Format:
E-discovery : creating and managing an enterprisewide program : a technical guide to digital investigation and litigation support
19.
E-discovery : creating and managing an enterprisewide program : a technical guide to digital investigation and litigation support
by
Schuler, Karen.
ScienceDirect
http://www.sciencedirect.com/science/book/9781597492966
Format:
Virtualization for security : including sandboxing, disaster recovery, high availability, forensic analysis, and honeypotting
20.
Virtualization for security : including sandboxing, disaster recovery, high availability, forensic analysis, and honeypotting
by
Hoopes, John.
ScienceDirect
https://www.sciencedirect.com/science/book/9781597493055
Format:
Computer and information security handbook
21.
Computer and information security handbook
by
Vacca, John R.
ScienceDirect
https://www.sciencedirect.com/science/book/9780123743541
Format:
Cisco router and switch forensics : investigating and analyzing malicious network activity
22.
Cisco router and switch forensics : investigating and analyzing malicious network activity
by
Liu, Dale.
ScienceDirect
https://www.sciencedirect.com/science/book/9781597494182
Format:
How to cheat at securing Linux
23.
How to cheat at securing Linux
by
Krishnamurthy Madwachar, Mohan.
ScienceDirect
https://www.sciencedirect.com/science/book/9781597492072
Format:
Microsoft forefront security administration guide
24.
Microsoft forefront security administration guide
by
Varsalone, Jesse.
ScienceDirect
https://www.sciencedirect.com/science/book/9781597492447
Format:
Eylem Seç
Ayırt
Listelerime ekle
Eposta
Yazdır
1
2
3
4
5
..
11
Search Results
Elektronik Kaynaklar
Search Results
Elektronik Kaynaklar
OK
Eposta Adresleri
:
Phone Number:
Mobile Carrier:
AT&T
Boost
Nextel (Sprint)
Sprint (PCS)
T Mobile
TracFone
US Cellular
Verizon
Virgin
Select An Item
Data usage warning: You will receive one text message for each title you selected.
Standard text messaging rates apply.
Text it to me
Text it to me, and go to next item
Elektronik Kaynaklar
Sonuçlar alınıyor Elektronik Kaynaklar...
action