Giriş
|
Hesabım
|
Listelerim
|
|
Remember to clear the cache and close the browser window.
English
Search Limit
Bütün Kütüphaneler
Elektronik Kaynaklar
Hepsi
Başkent Üniversitesi Kütüphanesi
Anadolu OSB Meslek Yüksekokulu
Atasev Özel Koleksiyon
Erdoğan Tercan Koleksiyonu
Güzel Sanatlar ve Tasarım Arşivi
Kazan Meslek Yüksekokulu
Hukuk Koleksiyonu
Ord.Prof.Dr. Enver Ziya Karal Tarih Uygulama Ars.Mrk.
Özel Koleksiyon Serdar Özersin
Tez Koleksiyonu
Tüm Alanlar
Başlık
Yazar
Konu
ISBN
ISSN
8
Search Field
Tüm Alanlar
Arama:
Gelişmiş Arama
Search Results
Elektronik Kaynaklar
Arama Sonuçlarını Sınırlandır
Daraltılmış:
+
Language: English
+
Konu: Internet -- Security measures.
Yazar
Dahil
Hariç
ProQuest (Firm)
(31)
Carvey, Harlan A.
(5)
Long, Johnny.
(2)
Shinder, Debra Littlejohn.
(2)
Shinder, Thomas W.
(2)
Wyler, Neil R.
(2)
Ab Rahman, Nurul Hidayah, reviewer.
(1)
Agrawal, Vivek, contributor.
(1)
Andress, Jason.
(1)
Belapurkar, Abhijit.
(1)
Bishop, Allison, editor.
(1)
Blue, Violet, author.
(1)
Bolt, Steven.
(1)
Bradley, Tony, 1969-
(1)
Bradley, Tony.
(1)
Bus, Jacques.
(1)
Buterin, Vitalik, writer of foreword.
(1)
Cantrell, Christopher.
(1)
Carvey, Harlan A., author.
(1)
Choo, Kim-Kwang Raymond, editor.
(1)
Cole, Eric.
(1)
Cruz, Maria Ines, designer.
(1)
Dalziel, Henry, author.
(1)
Devost, Matthew G.
(1)
Dhillon, Gurpreet.
(1)
Dixit, V. S., author.
(1)
Ellis, Juanita.
(1)
Engel, Mary, author.
(1)
Erbschloe, Michael.
(1)
Fernandez-Medina, Eduardo.
(1)
Fichera, Joe, 1966-
(1)
Flynn, Hal.
(1)
Gevers, Rickey, author.
(1)
Gilchrist, Alasdair, author.
(1)
Gonzalez, Deborah, author.
(1)
Gorman, G. E.
(1)
Gritzalis, Stefanos.
(1)
Haaster, Jelle van, author.
(1)
Hexmoor, Henry, author.
(1)
Hildebrandt, M.
(1)
Hsu, D. Frank (Derbiau Frank), 1948- editor.
(1)
Huon, Jean-Paul, author.
(1)
Hutchinson, William.
(1)
Jakobsson, Markus.
(1)
Katsaropoulos, Chris, editor.
(1)
Kendrick, Rupert.
(1)
Killion, Dave.
(1)
Ko, Ryan, editor.
(1)
Kolde, Jennifer.
(1)
Krutz, Ronald L.
(1)
Li, Shancang, author.
(1)
Lin, Herbert.
(1)
Marinucci, Dorothy, editor.
(1)
Mehan, Julie E.
(1)
Messier, Ric, author.
(1)
Mougayar, William, author.
(1)
Mowbray, Thomas J.
(1)
Nahari, Hadi.
(1)
National Academies (U.S.). Policy and Global Affairs Division.
(1)
National Research Council (U.S.). Committee on Deterring Cyberattacks: Informing Strategies and Developing Options for U.S. Policy.
(1)
National Research Council (U.S.). Committee on Information Systems Trustworthiness.
(1)
National Research Council (U.S.). Computer Science and Telecommunications Board.
(1)
National Research Council (U.S.). Division on Engineering and Physical Sciences.
(1)
O'Hara, Kieron.
(1)
Oppliger, Rolf.
(1)
Paret, Dominique, author.
(1)
Penttinen, Jyrki T. J., author.
(1)
Pinto, Marcus.
(1)
Raymond, Mark, editor.
(1)
Rearick, Benjamin, project director.
(1)
Rogers, Russ.
(1)
Russell, Kevin.
(1)
Russell, Ryan, 1969-
(1)
Russell, Ryan.
(1)
Samayan, Malathi, project director.
(1)
Schneider, Fred B.
(1)
Schreider, Tari, author.
(1)
Shimonski, Robert, author.
(1)
Singh, V. B., author.
(1)
Smith, Gordon, editor.
(1)
Speed, Tim.
(1)
Sprengers, Martijn, author.
(1)
Studholme, Alan, designer.
(1)
Stuttard, Dafydd.
(1)
Syngress Media, Inc.
(1)
Tam, Kenneth.
(1)
Thornburgh, Dick.
(1)
Traxler, Julie.
(1)
Tselentis, Georgios.
(1)
Ventre, Daniel, editor.
(1)
Ventre, Daniel.
(1)
Waidner, Michael.
(1)
Warren, Matt.
(1)
Winterfeld, Steve.
(1)
Wunderlich, Holger.
(1)
Xu, Li D., author.
(1)
Yague, Mariemma.
(1)
Zelkowitz, Marvin V., 1945-
(1)
Zenir, John, contributor.
(1)
Zittrain, Jonathan (Jonathan L.), 1969-
(1)
Daha fazla
Tümünü genişlet
Daha az
Hepsini Daralt
Materyal Türü
Dahil
Hariç
E-Kitap
Yayın Yılı
Dahil
Hariç
-
2013
(7)
2006
(6)
2015
(6)
2005
(5)
2014
(5)
2017
(5)
2012
(4)
2001
(3)
2003
(3)
2004
(3)
2007
(3)
2008
(3)
2010
(3)
2002
(2)
2009
(2)
2011
(2)
2016
(2)
1999
(1)
2020
(1)
Daha fazla
Tümünü genişlet
Daha az
Hepsini Daralt
Konu
Dahil
Hariç
Electronic books.
(66)
Computer networks -- Security measures.
(31)
Computer security.
(25)
COMPUTERS -- Internet -- Security.
(6)
COMPUTERS -- Networking -- Security.
(6)
COMPUTERS -- Security -- General.
(6)
Internet -- Social aspects.
(5)
Computer crimes -- Investigation -- United States -- Methodology.
(4)
Microsoft Windows (Computer file) -- Security measures.
(4)
Computer crimes -- Prevention.
(3)
Computer crimes.
(3)
Electronic commerce -- Security measures.
(3)
Firewalls (Computer security)
(3)
Internet -- Safety measures.
(3)
Andre fag (naturvidenskab og teknik) Andre fag
(2)
Computer networks -- Security measures -- Quality control.
(2)
Computer networks -- Security measures -- Standards.
(2)
Computers -- Access control -- Passwords.
(2)
Cryptography.
(2)
Cyberspace -- Security measures.
(2)
Cyberterrorism -- Prevention.
(2)
Cyberterrorism.
(2)
Electronic data processing -- Distributed processing.
(2)
Electronic mail systems -- Security measures.
(2)
Internet -- Security measures -- Software.
(2)
Internet.
(2)
Privacy, Right of.
(2)
Software.
(2)
Spam filtering (Electronic mail)
(2)
Spyware (Computer software)
(2)
BUSINESS & ECONOMICS -- Corporate Governance.
(1)
BUSINESS & ECONOMICS -- Leadership.
(1)
BUSINESS & ECONOMICS -- Organizational Development.
(1)
BUSINESS & ECONOMICS -- Workplace Culture.
(1)
Business enterprises -- Computer networks -- Security measures.
(1)
COMPUTERS -- Online Services.
(1)
COMPUTERS -- System Administration -- Storage & Retrieval.
(1)
COMPUTERS -- Web -- Browsers.
(1)
Client/server computing.
(1)
Computer crimes -- Investigation -- United States.
(1)
Computer network protocols.
(1)
Computer networks -- Access control.
(1)
Computer networks -- Textbooks.
(1)
Cyber intelligence (Computer security)
(1)
Cyberspace.
(1)
Cyberterrorism -- United States -- Prevention.
(1)
Data encryption (Computer science)
(1)
Data protection.
(1)
Electrical & Computer Engineering.
(1)
Electronic data processing departments -- Security measures.
(1)
Electronic intelligence.
(1)
Engineering & Applied Sciences.
(1)
Google.
(1)
Information technology -- Security measures.
(1)
Information warfare.
(1)
Internet -- Technological innovations.
(1)
Internet and children.
(1)
Internet and teenagers.
(1)
Internet and women.
(1)
Internet in espionage.
(1)
Internet of things -- Security measures.
(1)
Internet pornography.
(1)
Internet programming.
(1)
Intrusion detection systems (Computer security)
(1)
Java (Computer program language)
(1)
LAW -- Forensic Science.
(1)
Microsoft ISA server.
(1)
Microsoft Windows (Computer file)
(1)
Networking -- Security measures.
(1)
Parenting.
(1)
Penetration testing (Computer security)
(1)
Security systems.
(1)
Technology -- Research -- United States.
(1)
Telecommunication policy -- United States.
(1)
Telecommunications.
(1)
United States.
(1)
Web search engines.
(1)
Web servers -- Security measures.
(1)
Web sites -- Design.
(1)
Wireless communication systems -- Security measures.
(1)
World Wide Web -- Security measures.
(1)
z/OS.
(1)
Daha fazla
Tümünü genişlet
Daha az
Hepsini Daralt
Kütüphane
Dahil
Hariç
Başkent Kütüphanesi
Lokasyon
Dahil
Hariç
Ebook Central
Elsevier E-Kitap Koleksiyonu
false
{sortLabel}
{alphabetical}
{relevance}
{include}
{exclude}
{facetName}
{results}
{displayName}
{count}
{error}
Eylem Seç
Ayırt
Listelerime ekle
Eposta
Yazdır
66 sonuç bulundu
1
..
2
3
4
5
6
Sırala:
Konuyla İlgili Sırala
Yayın Yılı (eskiden yeniye)
Yayın Yılı (yeniden eskiye)
Başlık
Yazar
OK
Eposta Adresleri
:
Phone Number:
Mobile Carrier:
AT&T
Boost
Nextel (Sprint)
Sprint (PCS)
T Mobile
TracFone
US Cellular
Verizon
Virgin
Select An Item
Data usage warning: You will receive one text message for each title you selected.
Standard text messaging rates apply.
Text it to me
Text it to me, and go to next item
000000000000
DEFAULTTR
Liste seç
Geçici Liste
Bunu varsayılan liste yap.
Öğeler başarıyla eklendi
Öğeler eklenirken hata oldu. Lütfen tekrar deneyiniz.
Essential computer security : everyone's guide to e-mail, internet, and wireless security
49.
Essential computer security : everyone's guide to e-mail, internet, and wireless security
by
Bradley, Tony, 1969-
ScienceDirect
https://www.sciencedirect.com/science/book/9781597491143
Format:
Aggressive network self-defense
50.
Aggressive network self-defense
by
Wyler, Neil R.
Click to View
Format:
Google Hacking for Penetration Testers
51.
Google Hacking for Penetration Testers
by
Long, Johnny.
Click to View
Format:
Hacking a terror network : the silent threat of covert channels
52.
Hacking a terror network : the silent threat of covert channels
by
Rogers, Russ.
ScienceDirect
https://www.sciencedirect.com/science/book/9781928994985
Format:
Dr. Tom Shinder's configuring ISA Server 2004
53.
Dr. Tom Shinder's configuring ISA Server 2004
by
Shinder, Thomas W.
ScienceDirect
http://www.sciencedirect.com/science/book/9781931836197
Format:
Aggressive network self-defense
54.
Aggressive network self-defense
by
Wyler, Neil R.
ScienceDirect
http://www.sciencedirect.com/science/book/9781931836203
Format:
Network and security issues for internet mobile entertainment
55.
Network and security issues for internet mobile entertainment
by
ProQuest (Firm)
Click to View
Format:
Implementing homeland security for enterprise IT
56.
Implementing homeland security for enterprise IT
by
Erbschloe, Michael.
ScienceDirect
http://www.sciencedirect.com/science/book/9781555583125
Format:
Information security
57.
Information security
by
Zelkowitz, Marvin V., 1945-
ScienceDirect
https://www.sciencedirect.com/science/book/9780120121601
ScienceDirect
https://www.sciencedirect.com/science/bookseries/00652458/60
ScienceDirect
https://www.sciencedirect.com/science/publication?issn=00652458&volume=60
Format:
Z/OS WebSphere and J2EE security handbook
58.
Z/OS WebSphere and J2EE security handbook
by
Wunderlich, Holger.
Click to View
Format:
Security secrets, intruders and ID tags.
59.
Security secrets, intruders and ID tags.
by
ProQuest (Firm)
Click to View
Format:
Internet security : a jumpstart for systems administrators and IT managers
60.
Internet security : a jumpstart for systems administrators and IT managers
by
Speed, Tim.
ScienceDirect
http://www.sciencedirect.com/science/book/9781555582982
Format:
Eylem Seç
Ayırt
Listelerime ekle
Eposta
Yazdır
1
..
2
3
4
5
6
Search Results
Elektronik Kaynaklar
Search Results
Elektronik Kaynaklar
OK
Eposta Adresleri
:
Phone Number:
Mobile Carrier:
AT&T
Boost
Nextel (Sprint)
Sprint (PCS)
T Mobile
TracFone
US Cellular
Verizon
Virgin
Select An Item
Data usage warning: You will receive one text message for each title you selected.
Standard text messaging rates apply.
Text it to me
Text it to me, and go to next item
Elektronik Kaynaklar
Sonuçlar alınıyor Elektronik Kaynaklar...
action