Giriş
|
Hesabım
|
Listelerim
|
|
Remember to clear the cache and close the browser window.
English
Search Limit
Bütün Kütüphaneler
Elektronik Kaynaklar
Hepsi
Başkent Üniversitesi Kütüphanesi
Anadolu OSB Meslek Yüksekokulu
Atasev Özel Koleksiyon
Erdoğan Tercan Koleksiyonu
Güzel Sanatlar ve Tasarım Arşivi
Kazan Meslek Yüksekokulu
Hukuk Koleksiyonu
Ord.Prof.Dr. Enver Ziya Karal Tarih Uygulama Ars.Mrk.
Özel Koleksiyon Serdar Özersin
Tez Koleksiyonu
Tüm Alanlar
Başlık
Yazar
Konu
ISBN
ISSN
25
Search Field
Tüm Alanlar
Arama:
Gelişmiş Arama
Search Results
Elektronik Kaynaklar
Arama Sonuçlarını Sınırlandır
Daraltılmış:
+
Publication Date: 2010
+
Materyal Türü: E-Kitap
+
Konu: Computer networks -- Security measures.
Yazar
Dahil
Hariç
ProQuest (Firm)
(5)
Anderson, Brian (Brian James)
(1)
Beyah, Raheem (Raheem A.), 1976-
(1)
Borkin, Mike.
(1)
Chuvakin, Anton.
(1)
Corbett, Cherita (Cherita L.)
(1)
Ely, Adam.
(1)
Haines, Brad.
(1)
Kissell, Joe.
(1)
Kraus, Rob.
(1)
McNair, Janise (Janise Yvette), 1968-
(1)
Moeller, Robert R.
(1)
Perez, Richard, 1969 October 17-
(1)
Prowell, Stacy J.
(1)
Shema, Mike.
(1)
Spangenberg, Ward.
(1)
Street, Jayson E.
(1)
Street, Jayson E. Dissecting the hack.
(1)
Tiller, James S.
(1)
Timm, Carl.
(1)
Vacca, John R.
(1)
Wilhelm, Thomas.
(1)
Williams, Branden R.
(1)
Zelkowitz, Marvin V., 1945-
(1)
Daha fazla
Tümünü genişlet
Daha az
Hepsini Daralt
Dil
Dahil
Hariç
English
(14)
Konu
Dahil
Hariç
Electronic books.
(14)
Computer security.
(7)
COMPUTERS -- Internet -- Security.
(4)
COMPUTERS -- Networking -- Security.
(4)
COMPUTERS -- Security -- General.
(4)
Wireless communication systems -- Security measures.
(3)
Computer hackers.
(2)
Hackers.
(2)
Malware (Computer software) -- Prevention.
(2)
Réseaux d'ordinateurs.
(2)
Application software.
(1)
Brain-computer interfaces.
(1)
COMPUTERS -- Computer Literacy.
(1)
COMPUTERS -- Computer Science.
(1)
COMPUTERS -- Data Processing.
(1)
COMPUTERS -- Digital Media -- General.
(1)
COMPUTERS -- Hardware -- General.
(1)
COMPUTERS -- Information Technology.
(1)
COMPUTERS -- Interactive & Multimedia.
(1)
COMPUTERS -- Machine Theory.
(1)
COMPUTERS -- Reference.
(1)
COMPUTERS -- Web -- Site Design.
(1)
COMPUTERS -- Web -- User Generated Content.
(1)
Cartes de crédit.
(1)
Case studies.
(1)
Computer crimes -- Case studies.
(1)
Computer crimes -- Investigation.
(1)
Computer crimes -- Prevention.
(1)
Computer crimes.
(1)
Computer networks -- Access control.
(1)
Computer networks -- Testing.
(1)
Computer programming.
(1)
Computer security -- Examinations -- Practice.
(1)
Computer security -- Management.
(1)
Computers.
(1)
Credit cards.
(1)
Data protection -- Standards.
(1)
Electronic book.
(1)
Electronic data processing departments -- Auditing.
(1)
Electronic data processing.
(1)
Information technology -- Auditing.
(1)
Liability for credit information.
(1)
Mac OS.
(1)
Macintosh (Computer) -- Programming.
(1)
Online social networks -- Security measures.
(1)
Operating systems (Computers)
(1)
Protection de l'information (Informatique)
(1)
Responsabilité pour renseignements sur la solvabilité
(1)
Reverse engineering.
(1)
Sensor networks -- Security measures.
(1)
Software engineering.
(1)
TRUE CRIME -- White Collar Crime.
(1)
Transmission sans fil.
(1)
Web 2.0 -- Security measures.
(1)
Web services -- Security measures.
(1)
Daha fazla
Tümünü genişlet
Daha az
Hepsini Daralt
Kütüphane
Dahil
Hariç
Başkent Kütüphanesi
Lokasyon
Dahil
Hariç
Ebook Central
Elsevier E-Kitap Koleksiyonu
false
{sortLabel}
{alphabetical}
{relevance}
{include}
{exclude}
{facetName}
{results}
{displayName}
{count}
{error}
Eylem Seç
Ayırt
Listelerime ekle
Eposta
Yazdır
14 sonuç bulundu
1
2
Sırala:
Konuyla İlgili Sırala
Yayın Yılı (eskiden yeniye)
Yayın Yılı (yeniden eskiye)
Başlık
Yazar
OK
Eposta Adresleri
:
Phone Number:
Mobile Carrier:
AT&T
Boost
Nextel (Sprint)
Sprint (PCS)
T Mobile
TracFone
US Cellular
Verizon
Virgin
Select An Item
Data usage warning: You will receive one text message for each title you selected.
Standard text messaging rates apply.
Text it to me
Text it to me, and go to next item
000000000000
DEFAULTTR
Liste seç
Geçici Liste
Bunu varsayılan liste yap.
Öğeler başarıyla eklendi
Öğeler eklenirken hata oldu. Lütfen tekrar deneyiniz.
IT audit, control, and security
1.
IT audit, control, and security
by
Moeller, Robert R.
Click to View
Format:
Adaptive security management architecture
2.
Adaptive security management architecture
by
Tiller, James S.
Click to View
Format:
Mac security bible
3.
Mac security bible
by
Kissell, Joe.
Click to View
Format:
Security in ad hoc and sensor networks
4.
Security in ad hoc and sensor networks
by
Beyah, Raheem (Raheem A.), 1976-
Click to View
Format:
Managing information security
5.
Managing information security
by
Vacca, John R.
Click to View
Format:
Dissecting the hack : the forb1dd3n network
6.
Dissecting the hack : the forb1dd3n network
by
Street, Jayson E.
ScienceDirect
https://www.sciencedirect.com/science/book/9781597495684
Format:
Advances in computers. Volume 79
7.
Advances in computers. Volume 79
by
Zelkowitz, Marvin V., 1945-
ScienceDirect
https://www.sciencedirect.com/science/book/9780123810274
ScienceDirect
https://www.sciencedirect.com/science/bookseries/00652458/79
ScienceDirect
https://www.sciencedirect.com/science/issue/25777-2010-999209999-1783761
Format:
Professional penetration testing : creating and operating a formal hacking lab
8.
Professional penetration testing : creating and operating a formal hacking lab
by
Wilhelm, Thomas.
ScienceDirect
https://www.sciencedirect.com/science/book/9781597494250
Format:
PCI compliance : understand and implement effective PCI data security standard compliance.
9.
PCI compliance : understand and implement effective PCI data security standard compliance.
by
Chuvakin, Anton.
ScienceDirect
http://www.sciencedirect.com/science/book/9781597494991
Format:
Seven deadliest web application attacks
10.
Seven deadliest web application attacks
by
Shema, Mike.
ScienceDirect
http://www.sciencedirect.com/science/book/9781597495431
Format:
Seven deadliest wireless technologies attacks
11.
Seven deadliest wireless technologies attacks
by
Haines, Brad.
ScienceDirect
https://www.sciencedirect.com/science/book/9781597495417
Format:
Seven deadliest USB attacks
12.
Seven deadliest USB attacks
by
Anderson, Brian (Brian James)
ScienceDirect
https://www.sciencedirect.com/science/book/9781597495530
Format:
Eylem Seç
Ayırt
Listelerime ekle
Eposta
Yazdır
1
2
Search Results
Elektronik Kaynaklar
Search Results
Elektronik Kaynaklar
OK
Eposta Adresleri
:
Phone Number:
Mobile Carrier:
AT&T
Boost
Nextel (Sprint)
Sprint (PCS)
T Mobile
TracFone
US Cellular
Verizon
Virgin
Select An Item
Data usage warning: You will receive one text message for each title you selected.
Standard text messaging rates apply.
Text it to me
Text it to me, and go to next item
Elektronik Kaynaklar
Sonuçlar alınıyor Elektronik Kaynaklar...
action