Giriş
|
Hesabım
|
Listelerim
|
|
Remember to clear the cache and close the browser window.
English
Search Limit
Bütün Kütüphaneler
Electronic Resources
All
Başkent University Library
Anadolu OSB Meslek Yüksekokulu
Atasev Özel Koleksiyon
Erdoğan Tercan Collection
Fine Arts And Design Archive
Kazan Meslek Yüksekokulu
Law Collection
Ord.Prof.Dr. Enver Ziya Karal Tarih Uygulama Ars.Mrk.
Özel Koleksiyon Serdar Özersin
Thesis Collection
Tüm Alanlar
Başlık
Yazar
Konu
ISBN
ISSN
8
Search Field
Tüm Alanlar
Arama:
Gelişmiş Arama
Search Results
Electronic Resources
Arama Sonuçlarını Sınırlandır
Daraltılmış:
+
Language: English
+
Lokasyon: Elsevier E-Kitap Koleksiyonu
+
Konu: Computer networks -- Security measures.
Yazar
Dahil
Hariç
Beale, Jay.
(3)
Cross, Michael, 1965-
(3)
Rittinghouse, John W.
(3)
Rogers, Russ.
(3)
Alder, Raven.
(2)
Andress, Jason.
(2)
Behrens, Thorsten.
(2)
Dubrawsky, Ido.
(2)
Foster, James C.
(2)
Haines, Brad.
(2)
Henmi, Anne.
(2)
Hunter, Laura E.
(2)
Khan, Umer.
(2)
Liu, Dale.
(2)
Long, Johnny.
(2)
Ransome, James F.
(2)
Riley, Charles.
(2)
Shimonski, Robert.
(2)
Shinder, Debra Littlejohn.
(2)
Shinder, Thomas W.
(2)
Syngress Media, Inc.
(2)
Watkins, Stephen (Information security professional)
(2)
Wayner, Peter, 1964-
(2)
Wiles, Jack.
(2)
Ahmad, David R. Mirza.
(1)
Amini, Rob.
(1)
Anderson, Brian (Brian James)
(1)
Andrés, Steven.
(1)
Archibald, Neil.
(1)
Babbin, Jacob.
(1)
Baker, Andrew R.
(1)
Barnes, Christian.
(1)
Baskin, Brian.
(1)
Baumrucker, C. Tate.
(1)
Bendell, Dan.
(1)
Bhardwaj, Pawan K.
(1)
Birkholz, Erik Pace.
(1)
Borkin, Mike.
(1)
Bradley, Tony, 1969-
(1)
Brashars, Joshua.
(1)
Bray, Rory.
(1)
Burnett, Mark (Mark M.)
(1)
Burton, James D.
(1)
Burton, James.
(1)
Cameron, Rob.
(1)
Cantrell, Chris.
(1)
Carvey, Harlan A.
(1)
Carvey, Harlan.
(1)
Casco, Steven.
(1)
Caswell, Brian.
(1)
Cheah, Chun Hai.
(1)
Chuvakin, Anton.
(1)
Cid, Daniel.
(1)
Cole, Eric.
(1)
Contos, Brian T.
(1)
Cook, Randy (Randy R.)
(1)
Danielyan, Edgar.
(1)
Devost, Matthew G.
(1)
Ellis, Juanita.
(1)
Ely, Adam.
(1)
Erbschloe, Michael, 1951-
(1)
Erbschloe, Michael.
(1)
Esler, Joel.
(1)
Gatford, Chris.
(1)
Gold, André.
(1)
Gough, Michael, 1963-
(1)
Grasdal, Martin.
(1)
Gregg, Michael (Michael C.)
(1)
Hancock, Bill, 1957-
(1)
Harley, David.
(1)
Harrington, Jan L.
(1)
Hay, Andrew.
(1)
Johnson, Norris L.
(1)
Joshi, James B. D.
(1)
Kanclirz, Jan.
(1)
Kenyon, Tony, 1960-
(1)
Knipp, Eric.
(1)
Kraus, Rob.
(1)
Krishnamurthy Madwachar, Mohan.
(1)
Lucas, Mark.
(1)
Lynch, F. William.
(1)
Manzuik, Steve.
(1)
Maxwell, Doug.
(1)
Maynor, David.
(1)
McClure, Stuart.
(1)
Meyer, Greg.
(1)
Miles, Wyman.
(1)
Mitchell, Ed, 1945-
(1)
Morris, Greg.
(1)
Norman, Thomas L.
(1)
O'Farrell, Neal.
(1)
Orebaugh, Angela.
(1)
Parker, Tom.
(1)
Peiris, Chris.
(1)
Perez, Richard, 1969 October 17-
(1)
Porter, Thomas, PhD.
(1)
Porter, Thomas.
(1)
Posey, Brien.
(1)
Posluns, Jeffrey.
(1)
Potter, Bruce.
(1)
Prowell, Stacy J.
(1)
Qian, Yi, 1962-
(1)
Ramirez, Gilbert, 1972-
(1)
Ramirez, Gilbert.
(1)
Rash, Michael.
(1)
Rathaus, Noam.
(1)
Ring, Sandra.
(1)
Russell, Ryan, 1969-
(1)
Sachs, Marcus H.
(1)
Santry, Patrick.
(1)
Schaefer, Ken.
(1)
Schearer, Michael J.
(1)
Schiller, Craig A.
(1)
Seagren, Eric.
(1)
Shein, Rob.
(1)
Shema, Mike.
(1)
Shinder, Debra Littlejohn, author.
(1)
Shinder, Debra Littlejohn. Scene of the cybercrime.
(1)
Singh, Abhishek.
(1)
Snedaker, Susan.
(1)
Spangenberg, Ward.
(1)
Speed, Tim.
(1)
Stapko, Timothy John.
(1)
Stefanek, George L.
(1)
Stephens, Robert.
(1)
Stiefel, Barry J.
(1)
Strachan, Fergus.
(1)
Strassner, John.
(1)
Street, Jayson E.
(1)
Street, Jayson E. Dissecting the hack.
(1)
Thompson, Troy.
(1)
Thornton, Frank (Thorn)
(1)
Timm, Carl.
(1)
Tittel, Ed, author.
(1)
Todd, Chad.
(1)
Traxler, Julie.
(1)
Vacca, John R.
(1)
Varsalone, Jesse.
(1)
Wall, David.
(1)
Walther, Henrik.
(1)
Warnicke, Ed.
(1)
Wilhelm, Thomas.
(1)
Williams, Branden R.
(1)
Winkler, J. R. (Joachim R.)
(1)
Winterfeld, Steve.
(1)
Wotring, Brian.
(1)
Zelkowitz, Marvin V., 1945-
(1)
Daha fazla
Tümünü genişlet
Daha az
Hepsini Daralt
Materyal Türü
Dahil
Hariç
E-Kitap
Yayın Yılı
Dahil
Hariç
-
2007
(16)
2006
(15)
2004
(12)
2008
(11)
2002
(10)
2005
(10)
2010
(9)
2003
(7)
2009
(5)
2011
(4)
2001
(3)
Daha fazla
Tümünü genişlet
Daha az
Hepsini Daralt
Konu
Dahil
Hariç
Electronic books.
(102)
COMPUTERS -- Internet -- Security.
(63)
COMPUTERS -- Networking -- Security.
(63)
COMPUTERS -- Security -- General.
(63)
Computer security.
(48)
Firewalls (Computer security)
(10)
Internet -- Security measures.
(7)
Computer crimes -- Investigation.
(5)
Hackers.
(5)
Andre fag (naturvidenskab og teknik) Andre fag
(4)
Computer networks -- Security measures -- Handbooks, manuals, etc.
(4)
Handbooks and manuals.
(4)
Microsoft Windows (Computer file)
(4)
Wireless communication systems -- Security measures.
(4)
COMPUTERS -- Computer Literacy.
(3)
COMPUTERS -- Computer Science.
(3)
COMPUTERS -- Data Processing.
(3)
COMPUTERS -- Hardware -- General.
(3)
COMPUTERS -- Information Technology.
(3)
COMPUTERS -- Machine Theory.
(3)
COMPUTERS -- Reference.
(3)
COMPUTERS -- Security -- Cryptography.
(3)
Client/server computing.
(3)
Computer hackers.
(3)
Computer networks -- Access control.
(3)
Computers -- Access control.
(3)
Electronic book.
(3)
Engineering & Applied Sciences.
(3)
Internet telephony -- Security measures.
(3)
Microsoft ISA server.
(3)
Open source software.
(3)
Réseaux d'ordinateurs -- Sécurité -- Mesures.
(3)
Réseaux d'ordinateurs.
(3)
Security systems.
(3)
COMPUTERS -- Data Transmission Systems -- General.
(2)
COMPUTERS -- Networking -- Vendor Specific.
(2)
Computer crimes -- Prevention.
(2)
Computer crimes.
(2)
Computer networks -- Management.
(2)
Computer security -- Management.
(2)
Computer viruses.
(2)
Computerbeveiliging.
(2)
Computercriminaliteit.
(2)
Computernetwerken.
(2)
Computersicherheit
(2)
Credit cards.
(2)
Cryptography.
(2)
Cyberterrorism.
(2)
Data protection -- Standards.
(2)
Data protection.
(2)
Database security.
(2)
Electrical & Computer Engineering.
(2)
Electronic mail systems -- Security measures.
(2)
Forensic sciences.
(2)
Information resources management.
(2)
Internet.
(2)
LAW -- Forensic Science.
(2)
Liability for credit information.
(2)
Malware (Computer software) -- Prevention.
(2)
Microsoft Exchange server.
(2)
Microsoft Windows.
(2)
Operating systems (Computers)
(2)
Protection de l'information (Informatique)
(2)
Rechnernetz
(2)
Routers (Computer networks)
(2)
Software.
(2)
Telecommunications.
(2)
Web servers -- Security measures.
(2)
Web sites -- Security measures.
(2)
Active server pages -- Security measures.
(1)
Active server pages.
(1)
Agents intelligents (Logiciels)
(1)
Application software -- Security measures.
(1)
Application software.
(1)
Aufsatzsammlung.
(1)
BUSINESS & ECONOMICS -- Corporate Governance.
(1)
BUSINESS & ECONOMICS -- Leadership.
(1)
BUSINESS & ECONOMICS -- Organizational Development.
(1)
BUSINESS & ECONOMICS -- Workplace Culture.
(1)
Brain-computer interfaces.
(1)
Business -- Data processing -- Security measures.
(1)
Business enterprises -- Computer networks.
(1)
COMPUTERS -- Digital Media -- General.
(1)
COMPUTERS -- Hardware -- Handheld Devices.
(1)
COMPUTERS -- Hardware -- Personal Computers -- General.
(1)
COMPUTERS -- Interactive & Multimedia.
(1)
COMPUTERS -- Microprocessors.
(1)
COMPUTERS -- Online Services.
(1)
COMPUTERS -- Operating Systems -- DOS.
(1)
COMPUTERS -- Operating Systems -- Macintosh.
(1)
COMPUTERS -- Operating Systems -- Windows Server & NT.
(1)
COMPUTERS -- Operating Systems -- Windows Workstation.
(1)
COMPUTERS -- Security -- Networking.
(1)
COMPUTERS -- System Administration -- Email Administration.
(1)
COMPUTERS -- System Administration -- Storage & Retrieval.
(1)
COMPUTERS -- System Administration -- Windows Administration.
(1)
COMPUTERS -- Web -- Site Design.
(1)
COMPUTERS -- Web -- User Generated Content.
(1)
Cartes de crédit.
(1)
Case studies.
(1)
Cisco Systems, Inc.
(1)
Cloud computing.
(1)
ColdFusion.
(1)
Component software.
(1)
Computer Science.
(1)
Computer crimes -- Case studies.
(1)
Computer crimes -- Investigation -- Handbooks, manuals, etc.
(1)
Computer crimes -- Investigation -- Methodology.
(1)
Computer crimes -- Investigation -- United States -- Methodology.
(1)
Computer network architectures.
(1)
Computer network protocols.
(1)
Computer networks -- Reliability.
(1)
Computer networks -- Security measures -- Examinations, questions, etc.
(1)
Computer networks -- Security measures -- Fiction.
(1)
Computer networks -- Security measures -- Software.
(1)
Computer networks -- Testing.
(1)
Computer networks Security measures
(1)
Computer networks.
(1)
Computer programming.
(1)
Computer science.
(1)
Computer security -- Evaluation -- Methodology.
(1)
Computer security -- Examinations -- Practice.
(1)
Computer security -- Fiction.
(1)
Computer security -- Handbooks, manuals, etc.
(1)
Computer security -- Management -- Handbooks, manuals, etc.
(1)
Computers.
(1)
Credit cards -- Security measures -- Standards -- Handbooks, manuals, etc.
(1)
Criminalistiek.
(1)
Crisis management.
(1)
Data encryption (Computer science)
(1)
Databescherming.
(1)
Datensicherung
(1)
Digital watermarking.
(1)
Electronic data processing departments -- Security measures.
(1)
Electronic data processing personnel -- Certification -- Study guides.
(1)
Electronic data processing personnel -- Certification.
(1)
Electronic data processing.
(1)
Embedded computer systems.
(1)
Examinations.
(1)
FICTION -- General.
(1)
Fiction.
(1)
Forensic sciences -- Handbooks, manuals, etc.
(1)
GFI Software (Firm)
(1)
GFI Software (Firm) -- Handbooks, manuals, etc.
(1)
Google.
(1)
HISTORY -- Military -- Biological & Chemical Warfare.
(1)
Hackers -- Fiction.
(1)
High performance computing.
(1)
Industries -- Security measures.
(1)
Information storage and retrieval systems -- Security measures.
(1)
Information technology -- Security measures.
(1)
Information warfare -- Handbooks, manuals, etc.
(1)
Information warfare.
(1)
Informationssystem
(1)
Informatique.
(1)
Internet -- Security measures -- Software.
(1)
Internet programming.
(1)
Internettelefonie.
(1)
Intrusion detection systems (Computer security)
(1)
Juniper Networks, Inc.
(1)
Kismet (Electronic resource)
(1)
Linux.
(1)
Manuels.
(1)
Microsoft Internet information server.
(1)
Microsoft Outlook.
(1)
Microsoft Windows (Computer file) -- Security measures.
(1)
Microsoft Windows server.
(1)
Netcat.
(1)
Netzwerkanalyse
(1)
OSSEC (Computer file)
(1)
Online social networks -- Security measures.
(1)
Operations systems (Computer)
(1)
Oracle.
(1)
Paketvermittlung
(1)
REFERENCE -- General.
(1)
Responsabilité pour renseignements sur la solvabilité
(1)
Reverse engineering.
(1)
Sites Web -- Sécurité -- Mesures.
(1)
Snort (Computer file)
(1)
Snort (Software)
(1)
Snort 2.0
(1)
Software engineering.
(1)
Solaris (Computer file)
(1)
Study guides.
(1)
Systèmes informatiques -- Sécurité -- Mesures.
(1)
Sécurité informatique.
(1)
TCP/IP (Computer network protocol)
(1)
TCP/IP (Protocole de réseaux d'ordinateurs)
(1)
TECHNOLOGY & ENGINEERING -- Mobile & Wireless Communications.
(1)
TECHNOLOGY & ENGINEERING -- Radio.
(1)
TRUE CRIME -- White Collar Crime.
(1)
Transmission sans fil.
(1)
UNIX Shells.
(1)
UNIX.
(1)
United States.
(1)
Web 2.0 -- Security measures.
(1)
Web search engines.
(1)
Web services -- Security measures.
(1)
Web sites -- Design.
(1)
Wide area networks (Computer networks) -- Access.
(1)
Daha fazla
Tümünü genişlet
Daha az
Hepsini Daralt
Kütüphane
Dahil
Hariç
Başkent Kütüphanesi
false
{sortLabel}
{alphabetical}
{relevance}
{include}
{exclude}
{facetName}
{results}
{displayName}
{count}
{error}
Eylem Seç
Ayırt
Listelerime ekle
Eposta
Yazdır
102 sonuç bulundu
1
..
3
4
5
6
7
..
9
Sırala:
Konuyla İlgili Sırala
Yayın Yılı (eskiden yeniye)
Yayın Yılı (yeniden eskiye)
Başlık
Yazar
OK
Eposta Adresleri
:
Phone Number:
Mobile Carrier:
AT&T
Boost
Nextel (Sprint)
Sprint (PCS)
T Mobile
TracFone
US Cellular
Verizon
Virgin
Select An Item
Data usage warning: You will receive one text message for each title you selected.
Standard text messaging rates apply.
Text it to me
Text it to me, and go to next item
000000000000
DEFAULTTR
Liste seç
Geçici Liste
Bunu varsayılan liste yap.
Öğeler başarıyla eklendi
Öğeler eklenirken hata oldu. Lütfen tekrar deneyiniz.
Penetration tester's open source toolkit
49.
Penetration tester's open source toolkit
by
Long, Johnny.
ScienceDirect
https://www.sciencedirect.com/science/book/9781597490214
Format:
Practical VoIP security
50.
Practical VoIP security
by
Porter, Thomas.
ScienceDirect
https://www.sciencedirect.com/science/book/9781597490603
Format:
Syngress IT security project management handbook
51.
Syngress IT security project management handbook
by
Snedaker, Susan.
ScienceDirect
http://www.sciencedirect.com/science/book/9781597490764
Format:
Firewall policies and VPN configurations
52.
Firewall policies and VPN configurations
by
Henmi, Anne.
ScienceDirect
https://www.sciencedirect.com/science/book/9781597490887
Format:
Designing and building enterprise DMZs
53.
Designing and building enterprise DMZs
by
Dubrawsky, Ido.
ScienceDirect
http://www.sciencedirect.com/science/book/9781597491006
Format:
Secure your network for free : using NMAP, wireshark, snort, nessus, and MRTG
54.
Secure your network for free : using NMAP, wireshark, snort, nessus, and MRTG
by
Seagren, Eric.
ScienceDirect
http://www.sciencedirect.com/science/book/9781597491235
Format:
How to cheat at designing security for a Windows Server 2003 network
55.
How to cheat at designing security for a Windows Server 2003 network
by
Amini, Rob.
ScienceDirect
https://www.sciencedirect.com/science/book/9781597492430
Format:
Configuring SonicWALL firewalls
56.
Configuring SonicWALL firewalls
by
Bendell, Dan.
ScienceDirect
http://www.sciencedirect.com/science/book/9781597492508
Format:
Syngress force emerging threat analysis : from mischief to malicious
57.
Syngress force emerging threat analysis : from mischief to malicious
by
Maynor, David.
ScienceDirect
http://www.sciencedirect.com/science/book/9781597490566
Format:
How to cheat at Windows system administration using command line scripts
58.
How to cheat at Windows system administration using command line scripts
by
Bhardwaj, Pawan K.
ScienceDirect
http://www.sciencedirect.com/science/book/9781597491051
Format:
Hack the stack : using snort and ethereal to master the 8 layers of an insecure network
59.
Hack the stack : using snort and ethereal to master the 8 layers of an insecure network
by
Gregg, Michael (Michael C.)
ScienceDirect
http://www.sciencedirect.com/science/book/9781597491099
Format:
Enemy at the water cooler : real-life stories of insider threats and Enterprise Security Management countermeasures
60.
Enemy at the water cooler : real-life stories of insider threats and Enterprise Security Management countermeasures
by
Contos, Brian T.
ScienceDirect
https://www.sciencedirect.com/science/book/9781597491297
Format:
Eylem Seç
Ayırt
Listelerime ekle
Eposta
Yazdır
1
..
3
4
5
6
7
..
9
Search Results
Electronic Resources
Search Results
Electronic Resources
OK
Eposta Adresleri
:
Phone Number:
Mobile Carrier:
AT&T
Boost
Nextel (Sprint)
Sprint (PCS)
T Mobile
TracFone
US Cellular
Verizon
Virgin
Select An Item
Data usage warning: You will receive one text message for each title you selected.
Standard text messaging rates apply.
Text it to me
Text it to me, and go to next item
Electronic Resources
Sonuçlar alınıyor Electronic Resources...
action