Giriş
|
Hesabım
|
Listelerim
|
|
Remember to clear the cache and close the browser window.
English
Search Limit
Bütün Kütüphaneler
Elektronik Kaynaklar
Hepsi
Başkent Üniversitesi Kütüphanesi
Anadolu OSB Meslek Yüksekokulu
Atasev Özel Koleksiyon
Erdoğan Tercan Koleksiyonu
Güzel Sanatlar ve Tasarım Arşivi
Kazan Meslek Yüksekokulu
Hukuk Koleksiyonu
Ord.Prof.Dr. Enver Ziya Karal Tarih Uygulama Ars.Mrk.
Özel Koleksiyon Serdar Özersin
Tez Koleksiyonu
Tüm Alanlar
Başlık
Yazar
Konu
ISBN
ISSN
8
Search Field
Tüm Alanlar
Arama:
Gelişmiş Arama
Search Results
Elektronik Kaynaklar
Arama Sonuçlarını Sınırlandır
Daraltılmış:
+
Language: English
+
Yayın Yılı: 2004
+
Konu: Computer security.
Yazar
Dahil
Hariç
ProQuest (Firm)
(21)
International Business Machines Corporation. International Technical Support Organization.
(4)
Foster, James C.
(3)
Foster, Stephen C.
(2)
Hurley, Chris.
(2)
Parker, Tom.
(2)
131ah.
(1)
Alder, Raven.
(1)
Alvarado, Ellen.
(1)
Andrés, Steven.
(1)
Beale, Jay.
(1)
Bott, Ed.
(1)
Burnett, Mark (Mark M.)
(1)
Caloyannides, Michael A.
(1)
Caloyannides, Michael A. Computer forensics and privacy.
(1)
Clercq, Jan de, 1968-
(1)
Cook, Jim, 1944-
(1)
Erbschloe, Michael.
(1)
Foster, James.
(1)
Gehrmann, Christian.
(1)
Geiselhart, Gregory.
(1)
Hill, Terri.
(1)
Huang, Hsiang-Cheh.
(1)
Huseby, Sverre H.
(1)
Hänninen, Pekka.
(1)
Jain, L. C.
(1)
Kahn, Miriam (Miriam B.)
(1)
Kappeler, Patrick.
(1)
Kenyon, Brian.
(1)
Khnaser, Elias N.
(1)
Koh.
(1)
McClure, Stuart.
(1)
Morris, Greg.
(1)
Nazario, Jose.
(1)
Orebaugh, Angela.
(1)
Pamukçu, Adnan, çeviren
(1)
Pan, Jeng-Shyang.
(1)
Persson, Joakim.
(1)
Price, Mike (Mike Morgan)
(1)
Ramirez, Gilbert.
(1)
Ransome, James F.
(1)
Rayns, Chris.
(1)
Rittinghouse, John W.
(1)
Rogers, Russ.
(1)
Russell, Ryan, 1969-
(1)
Sachs, Marcus H.
(1)
Schulz, Jeremy.
(1)
Shein, Rob.
(1)
Shinder, Dr. Thomas W.
(1)
Siechert, Carl, ortak yazar
(1)
Smeets, Ben.
(1)
Strebe, Matthew.
(1)
Tosun, M. Selim, editör
(1)
Warnicke, Ed.
(1)
XYPRO Technology Corporation.
(1)
Daha fazla
Tümünü genişlet
Daha az
Hepsini Daralt
Materyal Türü
Dahil
Hariç
E-Kitap
Kitap
Dil
Dahil
Hariç
Turkish
(1)
Konu
Dahil
Hariç
Electronic books.
(32)
Computer networks -- Security measures.
(14)
COMPUTERS -- Internet -- Security.
(6)
COMPUTERS -- Networking -- Security.
(6)
COMPUTERS -- Security -- General.
(6)
Computer security -- Fiction.
(3)
Cryptography.
(3)
Data protection.
(3)
Operating systems (Computers)
(3)
Computer security -- Handbooks, manuals, etc.
(2)
Cyberterrorism.
(2)
FICTION -- General.
(2)
Fiction.
(2)
Hackers -- Fiction.
(2)
Hackers.
(2)
Handbooks and manuals.
(2)
Wireless communication systems -- Security measures.
(2)
Andre fag (naturvidenskab og teknik) Andre fag
(1)
Archives -- Safety measures.
(1)
Bilgisayar güvenliği.
(1)
Bluetooth technology -- Security measures.
(1)
COMPUTERS -- Security -- Cryptography.
(1)
Client/server computing -- Security measures.
(1)
Computer hackers -- Fiction.
(1)
Computer hackers.
(1)
Computer network protocols.
(1)
Computer networks -- Security measures -- Fiction.
(1)
Computer programming.
(1)
Computer viruses.
(1)
Computerbeveiliging.
(1)
Computercriminaliteit.
(1)
Cyberterrorism -- Fiction.
(1)
Digital watermarking.
(1)
Electronic data processing -- Backup processing alternatives.
(1)
Electronic records -- Conservation and restoration.
(1)
Embedded computer systems.
(1)
Emergency management -- Planning.
(1)
Forensic sciences.
(1)
Hewlett-Packard computers -- Security measures.
(1)
IBM computers.
(1)
Internet -- Safety measures.
(1)
Internet -- Security measures.
(1)
Internet and children.
(1)
Langages de programmation -- Guides, manuels, etc.
(1)
Libraries -- Safety measures.
(1)
Library information networks -- Security measures.
(1)
Linux.
(1)
Microsoft Windows (Bilgisayar dosyası).
(1)
Microsoft Windows (Computer file)
(1)
Microsoft Windows (Computer file) -- Examinations -- Study guides.
(1)
Microsoft Windows (Computer file).
(1)
Microsoft Windows server.
(1)
Programming languages (Electronic computers)
(1)
Programming languages (Electronic computers) -- Handbooks, manuals, etc.
(1)
Protection de l'information (Informatique) -- Guides, manuels, etc.
(1)
Short stories.
(1)
Suspense fiction.
(1)
Systèmes informatiques -- Sécurité -- Mesures -- Guides, manuels, etc.
(1)
Watermarks -- Data processing.
(1)
World Wide Web -- Security measures.
(1)
Daha fazla
Tümünü genişlet
Daha az
Hepsini Daralt
Kütüphane
Dahil
Hariç
Başkent Kütüphanesi
Lokasyon
Dahil
Hariç
Ebook Central
Elsevier E-Kitap Koleksiyonu
Merkez Kütüphane
false
{sortLabel}
{alphabetical}
{relevance}
{include}
{exclude}
{facetName}
{results}
{displayName}
{count}
{error}
Eylem Seç
Ayırt
Listelerime ekle
Eposta
Yazdır
33 sonuç bulundu
1
2
3
Sırala:
Konuyla İlgili Sırala
Yayın Yılı (eskiden yeniye)
Yayın Yılı (yeniden eskiye)
Başlık
Yazar
OK
Eposta Adresleri
:
Phone Number:
Mobile Carrier:
AT&T
Boost
Nextel (Sprint)
Sprint (PCS)
T Mobile
TracFone
US Cellular
Verizon
Virgin
Select An Item
Data usage warning: You will receive one text message for each title you selected.
Standard text messaging rates apply.
Text it to me
Text it to me, and go to next item
000000000000
DEFAULTTR
Liste seç
Geçici Liste
Bunu varsayılan liste yap.
Öğeler başarıyla eklendi
Öğeler eklenirken hata oldu. Lütfen tekrar deneyiniz.
Sockets, shellcode, porting & coding : reverse engineering exploits and tool coding for security professionals
1.
Sockets, shellcode, porting & coding : reverse engineering exploits and tool coding for security professionals
by
Foster, James C.
ScienceDirect
http://www.sciencedirect.com/science/book/9781597490054
Format:
zSeries Trusted Key Entry (TKE) version 4.2 update
2.
zSeries Trusted Key Entry (TKE) version 4.2 update
by
Kappeler, Patrick.
Click to View
Format:
iSeries Access for Windows V5R2 hot topics tailored images, application administration, SSL, and Kerberos
3.
iSeries Access for Windows V5R2 hot topics tailored images, application administration, SSL, and Kerberos
by
Schulz, Jeremy.
Click to View
Format:
IBM eserver zSeries 990 (z990) cryptography implementation
4.
IBM eserver zSeries 990 (z990) cryptography implementation
by
Rayns, Chris.
Click to View
Format:
Linux on IBM e-server zSeries and S/390 best security practices
5.
Linux on IBM e-server zSeries and S/390 best security practices
by
Geiselhart, Gregory.
Click to View
Format:
Innocent code a security wake-up call for Web programmers
6.
Innocent code a security wake-up call for Web programmers
by
Huseby, Sverre H.
Click to View
Format:
Protecting your library's digital sources the essential guide to planning and preservation
7.
Protecting your library's digital sources the essential guide to planning and preservation
by
Kahn, Miriam (Miriam B.)
Click to View
Format:
Bluetooth security
8.
Bluetooth security
by
Gehrmann, Christian.
Click to View
Format:
Defense and detection strategies against Internet worms
9.
Defense and detection strategies against Internet worms
by
Nazario, Jose.
Click to View
Format:
Privacy protection and computer forensics
10.
Privacy protection and computer forensics
by
Caloyannides, Michael A.
Click to View
Format:
Intelligent watermarking techniques
11.
Intelligent watermarking techniques
by
Pan, Jeng-Shyang.
Click to View
Format:
How to cheat at Configuring ISA Server 2004
12.
How to cheat at Configuring ISA Server 2004
by
Shinder, Dr. Thomas W.
Click to View
Format:
Eylem Seç
Ayırt
Listelerime ekle
Eposta
Yazdır
1
2
3
Search Results
Elektronik Kaynaklar
Search Results
Elektronik Kaynaklar
OK
Eposta Adresleri
:
Phone Number:
Mobile Carrier:
AT&T
Boost
Nextel (Sprint)
Sprint (PCS)
T Mobile
TracFone
US Cellular
Verizon
Virgin
Select An Item
Data usage warning: You will receive one text message for each title you selected.
Standard text messaging rates apply.
Text it to me
Text it to me, and go to next item
Elektronik Kaynaklar
Sonuçlar alınıyor Elektronik Kaynaklar...
action