Giriş
|
Hesabım
|
Listelerim
|
|
Remember to clear the cache and close the browser window.
English
Search Limit
Bütün Kütüphaneler
Elektronik Kaynaklar
Hepsi
Başkent Üniversitesi Kütüphanesi
Anadolu OSB Meslek Yüksekokulu
Atasev Özel Koleksiyon
Erdoğan Tercan Koleksiyonu
Güzel Sanatlar ve Tasarım Arşivi
Kazan Meslek Yüksekokulu
Hukuk Koleksiyonu
Ord.Prof.Dr. Enver Ziya Karal Tarih Uygulama Ars.Mrk.
Özel Koleksiyon Serdar Özersin
Tez Koleksiyonu
Tüm Alanlar
Başlık
Yazar
Konu
ISBN
ISSN
99
Search Field
Tüm Alanlar
Arama:
Gelişmiş Arama
Search Results
Elektronik Kaynaklar
Arama Sonuçlarını Sınırlandır
Daraltılmış:
+
Language: English
+
Yayın Yılı: 2007
+
Konu: Computer security.
Yazar
Dahil
Hariç
ProQuest (Firm)
(15)
Wiles, Jack.
(3)
Carvey, Harlan A.
(2)
Chaffin, Larry.
(2)
Clercq, Jan de, 1968-
(2)
Cross, Michael, 1965-
(2)
Grillenmeier, Guido.
(2)
Piltzecker, Tony, 1975-
(2)
Tyson, Dave.
(2)
Winkler, Ira.
(2)
Baker, Andrew R.
(1)
Beale, Jay.
(1)
Bergstra, J. A.
(1)
Black Hat Press (Goodhue, Minn.)
(1)
Chandramouli, Ramaswamy.
(1)
Conti, Greg.
(1)
Contos, Brian T.
(1)
Cross, Michael.
(1)
D'Arcy, John P., 1975-
(1)
Dubrawsky, Ido.
(1)
Esler, Joel.
(1)
Ferraiolo, David.
(1)
Goodman, Seymour E.
(1)
Hurley, Chris.
(1)
I͡Ashchenko, V. V.
(1)
Knop, J. V. (Jan V.)
(1)
Kuhn, D. Richard.
(1)
Leeuw, Karl de.
(1)
Lin, Herbert.
(1)
Long, Johnny.
(1)
Maynor, David.
(1)
Mookhey, K. K.
(1)
Mullen, Timothy M.
(1)
NATO Advanced Research Workshop on a Process for Developing a Common Vocabulary in the Information Security Area (2006 : Moscow, Russia)
(1)
National Research Council (U.S.). Committee on Improving Cybersecurity Research in the United States.
(1)
Pinzon, D. Scott.
(1)
Rathaus, Noam.
(1)
Russell, Ryan, 1969-
(1)
Salʹnikov, Alexey A.
(1)
Schiller, Craig A.
(1)
Shepherd, Matthew.
(1)
Shinder, Thomas W.
(1)
Taylor, Laura.
(1)
Yagüe, Mariemma.
(1)
Daha fazla
Tümünü genişlet
Daha az
Hepsini Daralt
Materyal Türü
Dahil
Hariç
E-Kitap
Konu
Dahil
Hariç
Electronic books.
(35)
COMPUTERS -- Internet -- Security.
(13)
COMPUTERS -- Networking -- Security.
(13)
COMPUTERS -- Security -- General.
(13)
Computer networks -- Security measures.
(13)
Microsoft Windows (Computer file)
(5)
Data protection.
(3)
Web sites -- Security measures.
(3)
BUSINESS & ECONOMICS -- Corporate Governance.
(2)
BUSINESS & ECONOMICS -- Leadership.
(2)
BUSINESS & ECONOMICS -- Organizational Development.
(2)
BUSINESS & ECONOMICS -- Workplace Culture.
(2)
Business enterprises -- Security measures.
(2)
Computer crimes -- Investigation -- United States -- Methodology.
(2)
Computer crimes -- Investigation.
(2)
Computer crimes -- Prevention.
(2)
Computers -- Access control.
(2)
Internet -- Security measures.
(2)
LAW -- Forensic Science.
(2)
Microsoft Windows (Computer file) -- Security measures.
(2)
Risk management.
(2)
Réseaux d'ordinateurs -- Sécurité -- Mesures.
(2)
Agents intelligents (Logiciels)
(1)
Application software -- Security measures.
(1)
BUSINESS & ECONOMICS -- Business Writing.
(1)
Client/server computing.
(1)
Computer networks -- Access control.
(1)
Computer security -- Fiction.
(1)
Computer security -- History.
(1)
Copyright -- History.
(1)
Copyright.
(1)
Cryptography -- History.
(1)
Cryptography.
(1)
Cyberterrorism -- Fiction.
(1)
Cyberterrorism -- Prevention.
(1)
Cyberterrorism.
(1)
Databescherming.
(1)
Fiction.
(1)
Firewalls (Computer security)
(1)
Hackers -- Fiction.
(1)
Hackers.
(1)
History.
(1)
Industries -- Security measures.
(1)
Information technology -- Management.
(1)
Information technology.
(1)
Information visualization.
(1)
Management information systems.
(1)
Metasploit (Electronic resource)
(1)
Open source software.
(1)
SQL server.
(1)
Security systems.
(1)
Sites Web -- Sécurité -- Mesures.
(1)
Snort (Computer file)
(1)
Systèmes informatiques -- Sécurité -- Mesures.
(1)
United States.
(1)
Visual perception.
(1)
Wireless LANs -- Security measures.
(1)
Wireless communication systems -- Security measures.
(1)
Daha fazla
Tümünü genişlet
Daha az
Hepsini Daralt
Kütüphane
Dahil
Hariç
Başkent Kütüphanesi
Lokasyon
Dahil
Hariç
Ebook Central
Elsevier E-Kitap Koleksiyonu
false
{sortLabel}
{alphabetical}
{relevance}
{include}
{exclude}
{facetName}
{results}
{displayName}
{count}
{error}
Eylem Seç
Ayırt
Listelerime ekle
Eposta
Yazdır
35 sonuç bulundu
1
2
3
Sırala:
Konuyla İlgili Sırala
Yayın Yılı (eskiden yeniye)
Yayın Yılı (yeniden eskiye)
Başlık
Yazar
OK
Eposta Adresleri
:
Phone Number:
Mobile Carrier:
AT&T
Boost
Nextel (Sprint)
Sprint (PCS)
T Mobile
TracFone
US Cellular
Verizon
Virgin
Select An Item
Data usage warning: You will receive one text message for each title you selected.
Standard text messaging rates apply.
Text it to me
Text it to me, and go to next item
000000000000
DEFAULTTR
Liste seç
Geçici Liste
Bunu varsayılan liste yap.
Öğeler başarıyla eklendi
Öğeler eklenirken hata oldu. Lütfen tekrar deneyiniz.
Best damn firewall book period
13.
Best damn firewall book period
by
Shinder, Thomas W.
Click to View
Format:
Role-based access control
14.
Role-based access control
by
Ferraiolo, David.
Click to View
Format:
Techno security's guide to e-discovery and digital forensics
15.
Techno security's guide to e-discovery and digital forensics
by
Wiles, Jack.
Click to View
Format:
Physical and logical security convergence powered by enterprise security management
16.
Physical and logical security convergence powered by enterprise security management
by
Contos, Brian T.
ScienceDirect
https://www.sciencedirect.com/science/book/9781597491228
Format:
Web application vulnerabilities : detect, exploit, prevent
17.
Web application vulnerabilities : detect, exploit, prevent
by
Cross, Michael, 1965-
ScienceDirect
http://www.sciencedirect.com/science/book/9781597492096
Format:
Techno security's guide to e-discovery and digital forensics
18.
Techno security's guide to e-discovery and digital forensics
by
Wiles, Jack.
ScienceDirect
http://www.sciencedirect.com/science/book/9781597492232
Format:
How to cheat at securing your network
19.
How to cheat at securing your network
by
Dubrawsky, Ido.
ScienceDirect
https://www.sciencedirect.com/science/book/9781597492317
Format:
Stealing the network : how to own a shadow: the chase for Knuth
20.
Stealing the network : how to own a shadow: the chase for Knuth
by
Long, Johnny.
ScienceDirect
http://www.sciencedirect.com/science/book/9781597490818
Format:
Snort : IDS and IPS toolkit
21.
Snort : IDS and IPS toolkit
by
Beale, Jay.
ScienceDirect
https://www.sciencedirect.com/science/book/9781597490993
Format:
WarDriving & wireless penetration testing
22.
WarDriving & wireless penetration testing
by
Hurley, Chris.
ScienceDirect
http://www.sciencedirect.com/science/book/9781597491112
Format:
FISMA certification & accreditation handbook
23.
FISMA certification & accreditation handbook
by
Taylor, Laura.
ScienceDirect
http://www.sciencedirect.com/science/book/9781597491167
Format:
Techno Security's guide to managing risks : for IT managers, auditors, and investigators
24.
Techno Security's guide to managing risks : for IT managers, auditors, and investigators
by
Wiles, Jack.
ScienceDirect
http://www.sciencedirect.com/science/book/9781597491389
Format:
Eylem Seç
Ayırt
Listelerime ekle
Eposta
Yazdır
1
2
3
Search Results
Elektronik Kaynaklar
Search Results
Elektronik Kaynaklar
OK
Eposta Adresleri
:
Phone Number:
Mobile Carrier:
AT&T
Boost
Nextel (Sprint)
Sprint (PCS)
T Mobile
TracFone
US Cellular
Verizon
Virgin
Select An Item
Data usage warning: You will receive one text message for each title you selected.
Standard text messaging rates apply.
Text it to me
Text it to me, and go to next item
Elektronik Kaynaklar
Sonuçlar alınıyor Elektronik Kaynaklar...
action