Giriş
|
Hesabım
|
Listelerim
|
|
Remember to clear the cache and close the browser window.
English
Search Limit
Bütün Kütüphaneler
Elektronik Kaynaklar
Hepsi
Başkent Üniversitesi Kütüphanesi
Anadolu OSB Meslek Yüksekokulu
Atasev Özel Koleksiyon
Erdoğan Tercan Koleksiyonu
Güzel Sanatlar ve Tasarım Arşivi
Kazan Meslek Yüksekokulu
Hukuk Koleksiyonu
Ord.Prof.Dr. Enver Ziya Karal Tarih Uygulama Ars.Mrk.
Özel Koleksiyon Serdar Özersin
Tez Koleksiyonu
Tüm Alanlar
Başlık
Yazar
Konu
ISBN
ISSN
8
Search Field
Tüm Alanlar
Arama:
Gelişmiş Arama
Search Results
Elektronik Kaynaklar
Arama Sonuçlarını Sınırlandır
Daraltılmış:
+
Yayın Yılı: 2005
+
Konu: Computer security.
Yazar
Dahil
Hariç
ProQuest (Firm)
(23)
Foster, James C.
(6)
Long, Johnny.
(4)
International Business Machines Corporation. International Technical Support Organization.
(3)
Bayles, Aaron W.
(2)
Ben-Natan, Ron.
(2)
Brindley, Ed.
(2)
Cole, Eric.
(2)
Fair, Ted.
(2)
Henmi, Anne.
(2)
Honick, Ron.
(2)
Hurley, Chris.
(2)
Nordfelt, Michael.
(2)
Potter, Bruce.
(2)
Rash, Michael.
(2)
Ring, Sandra.
(2)
Wotring, Brian.
(2)
Wyler, Neil R.
(2)
Alder, Raven.
(1)
Alkan, Mustafa, Doç. Dr., yazar
(1)
Archibald, Neil.
(1)
Ashenden, Debi.
(1)
Bednarczyk, Michael.
(1)
Bhalla, Nish.
(1)
Burke, Josh.
(1)
Burnett, Mark (Mark M.)
(1)
Bücker, Axel.
(1)
Cantrell, Christopher.
(1)
Caswell, Brian.
(1)
Cesario, Cristiano.
(1)
Chikofsky, Elliot J.
(1)
Craig, Paul.
(1)
Dent, Alexander W.
(1)
Deraison, Renaud.
(1)
Devost, Matthew G.
(1)
Eilam, Eldad.
(1)
Filip, Werner.
(1)
Fionov, Andrey.
(1)
Fuller, Ed.
(1)
Galvan, Karla.
(1)
González, Belén.
(1)
Grasdal, Martin.
(1)
Heinen, Neils.
(1)
Hinton, Heather.
(1)
Hippensteil, Heinz Peter.
(1)
Hollin, Mark.
(1)
Jones, Andy, 1952-
(1)
Killion, Dave.
(1)
Kroner, George.
(1)
McClure, Stuart.
(1)
Miller, Drew, 1978-
(1)
Miller, Drew.
(1)
Mitchell, Chris.
(1)
Mitnick, Kevin D.
(1)
Mullen, Timothy M.
(1)
Neucom, Ray.
(1)
Oppliger, Rolf.
(1)
Osipov, Vitaly.
(1)
Price, Mike (Mike Morgan)
(1)
Price, Mike.
(1)
Ramirez, Gilbert.
(1)
Ransome, James F.
(1)
Rathaus, Noam.
(1)
Rayns, Chris.
(1)
Rittinghouse, John W.
(1)
Rodriguez, Juan R.
(1)
Rogers, Russ.
(1)
Russell, Kevin.
(1)
Rutigliano, Gianfranco.
(1)
Ryabko, Boris.
(1)
Sağıroğlu, Şeref, Doç. Dr., yazar.
(1)
Sert, Selin
(1)
Shein, Rob.
(1)
Shinder, Debra Littlejohn.
(1)
Shinder, Thomas W.
(1)
Simon, William L., joint author
(1)
Tam, Kenneth.
(1)
Tezcan, Nejat Eralp, translated
(1)
Weeden, Shane.
(1)
Westman, Johan.
(1)
Wilson, Ryan.
(1)
Zalewski, Michal.
(1)
Daha fazla
Tümünü genişlet
Daha az
Hepsini Daralt
Materyal Türü
Dahil
Hariç
E-Kitap
Kitap
Dil
Dahil
Hariç
English
(36)
Turkish
(3)
Konu
Dahil
Hariç
Electronic books.
(36)
Computer networks -- Security measures.
(10)
Data protection.
(4)
Internet -- Security measures.
(4)
Bilgisayar güvenliği.
(3)
COMPUTERS -- Internet -- Security.
(3)
COMPUTERS -- Networking -- Security.
(3)
COMPUTERS -- Security -- General.
(3)
Computer crimes.
(3)
Acquisition of computer software.
(2)
Computer networks -- Access control.
(2)
Cryptography.
(2)
Database security.
(2)
Hackers.
(2)
IBM software.
(2)
Internet.
(2)
Reverse engineering.
(2)
Web servers -- Security measures.
(2)
Andre fag (naturvidenskab og teknik) Andre fag
(1)
Bases de données -- Sécurité -- Mesures.
(1)
Bilişim teknolojisi -- Sosyal yönler.
(1)
COMPUTERS -- Security -- Networking.
(1)
COMPUTERS -- Security -- Viruses.
(1)
Computer crimes -- Fiction.
(1)
Computer hackers.
(1)
Computer security -- Fiction.
(1)
Computer security -- Handbooks, manuals, etc.
(1)
Computer viruses.
(1)
Computers -- Access control -- Standards.
(1)
Computersicherheit
(1)
Copyrights.
(1)
Cryptography -- Standards.
(1)
Cyberterrorism.
(1)
Digital Watermaking (dijital işaretleme).
(1)
Digital signatures -- Law and legislation -- Turkey.
(1)
Dijital imzalar -- Hukuk ve mevzuat -- Türkiye.
(1)
Electronic mail messages -- Security measures.
(1)
FICTION -- General.
(1)
Fiction.
(1)
Fikir ve Sanat Eserleri Kanunu.
(1)
Fikri haklar.
(1)
Firewalls (Computer security)
(1)
Hackers -- Fiction.
(1)
Hackers -- Psychology -- Fiction.
(1)
Hackers -- Psychology.
(1)
Handbooks and manuals.
(1)
IBM Database 2.
(1)
Identity theft -- Fiction.
(1)
Identity theft.
(1)
Industrial safety -- Management.
(1)
Information technology -- Social aspects.
(1)
Instant messaging -- Security measures.
(1)
Intellectual property.
(1)
Internal security.
(1)
Langages de programmation -- Guides, manuels, etc.
(1)
Microsoft ISA server.
(1)
Open source software.
(1)
Programming languages (Electronic computers)
(1)
Programming languages (Electronic computers) -- Handbooks, manuals, etc.
(1)
Protection de l'information (Informatique)
(1)
Protection de l'information (Informatique) -- Guides, manuels, etc.
(1)
Short stories.
(1)
Software engineering.
(1)
Steganografi.
(1)
Systèmes informatiques -- Sécurité -- Mesures -- Guides, manuels, etc.
(1)
Systèmes informatiques -- Sécurité -- Mesures.
(1)
TRUE CRIME -- White Collar Crime.
(1)
Telif hakları.
(1)
Veri koruma.
(1)
Überwachung
(1)
İç güvenlik.
(1)
Daha fazla
Tümünü genişlet
Daha az
Hepsini Daralt
Kütüphane
Dahil
Hariç
Başkent Kütüphanesi
Lokasyon
Dahil
Hariç
Atasev Özel Koleksiyonu
Ebook Central
Elsevier E-Kitap Koleksiyonu
Merkez Kütüphane
Özel Koleksiyon Sercan-İlhan Gülsün (2.Kat)
false
{sortLabel}
{alphabetical}
{relevance}
{include}
{exclude}
{facetName}
{results}
{displayName}
{count}
{error}
Eylem Seç
Ayırt
Listelerime ekle
Eposta
Yazdır
39 sonuç bulundu
1
2
3
4
Sırala:
Konuyla İlgili Sırala
Yayın Yılı (eskiden yeniye)
Yayın Yılı (yeniden eskiye)
Başlık
Yazar
OK
Eposta Adresleri
:
Phone Number:
Mobile Carrier:
AT&T
Boost
Nextel (Sprint)
Sprint (PCS)
T Mobile
TracFone
US Cellular
Verizon
Virgin
Select An Item
Data usage warning: You will receive one text message for each title you selected.
Standard text messaging rates apply.
Text it to me
Text it to me, and go to next item
000000000000
DEFAULTTR
Liste seç
Geçici Liste
Bunu varsayılan liste yap.
Öğeler başarıyla eklendi
Öğeler eklenirken hata oldu. Lütfen tekrar deneyiniz.
IBM rational application developer V6 portlet application development and portal tools
25.
IBM rational application developer V6 portlet application development and portal tools
by
Rodriguez, Juan R.
Click to View
Format:
IM, instant messaging, security
26.
IM, instant messaging, security
by
Rittinghouse, John W.
ScienceDirect
http://www.sciencedirect.com/science/book/9781555583385
Format:
Implementing database security and auditing : a guide for DBAs, information security administrators and auditors
27.
Implementing database security and auditing : a guide for DBAs, information security administrators and auditors
by
Ben-Natan, Ron.
ScienceDirect
http://www.sciencedirect.com/science/book/9781555583347
Format:
Sockets, shellcode, porting & coding : reverse engineering exploits and tool coding for security professionals
28.
Sockets, shellcode, porting & coding : reverse engineering exploits and tool coding for security professionals
by
Foster, James C.
ScienceDirect
http://www.sciencedirect.com/science/book/9781597490054
Format:
Stealing the network : how to own an identity
29.
Stealing the network : how to own an identity
by
Alder, Raven.
ScienceDirect
https://www.sciencedirect.com/science/book/9781597490061
Format:
InfoSec career hacking : sell your skillz, not your soul
30.
InfoSec career hacking : sell your skillz, not your soul
by
Bayles, Aaron W.
ScienceDirect
https://www.sciencedirect.com/science/book/9781597490115
Format:
Host integrity monitoring : using Osiris and Samhain
31.
Host integrity monitoring : using Osiris and Samhain
by
Wotring, Brian.
ScienceDirect
http://www.sciencedirect.com/science/book/9781597490184
Format:
Hacking a terror network : the silent threat of covert channels
32.
Hacking a terror network : the silent threat of covert channels
by
Rogers, Russ.
ScienceDirect
https://www.sciencedirect.com/science/book/9781928994985
Format:
Cyber spying : tracking your family's (sometimes) secret online lives
33.
Cyber spying : tracking your family's (sometimes) secret online lives
by
Fair, Ted.
ScienceDirect
https://www.sciencedirect.com/science/book/9781931836418
Format:
Intrusion prevention and active response : deploying network and host IPS
34.
Intrusion prevention and active response : deploying network and host IPS
by
Rash, Michael.
ScienceDirect
http://www.sciencedirect.com/science/book/9781932266474
Format:
Buffer overflow attacks : detect, exploit, prevent
35.
Buffer overflow attacks : detect, exploit, prevent
by
Foster, James C.
ScienceDirect
http://www.sciencedirect.com/science/book/9781932266672
Format:
Black Hat physical device security : exploiting hardware and software
36.
Black Hat physical device security : exploiting hardware and software
by
Miller, Drew, 1978-
ScienceDirect
http://www.sciencedirect.com/science/book/9781932266818
Format:
Eylem Seç
Ayırt
Listelerime ekle
Eposta
Yazdır
1
2
3
4
Search Results
Elektronik Kaynaklar
Search Results
Elektronik Kaynaklar
OK
Eposta Adresleri
:
Phone Number:
Mobile Carrier:
AT&T
Boost
Nextel (Sprint)
Sprint (PCS)
T Mobile
TracFone
US Cellular
Verizon
Virgin
Select An Item
Data usage warning: You will receive one text message for each title you selected.
Standard text messaging rates apply.
Text it to me
Text it to me, and go to next item
Elektronik Kaynaklar
Sonuçlar alınıyor Elektronik Kaynaklar...
action