Giriş
|
Hesabım
|
Listelerim
|
|
Remember to clear the cache and close the browser window.
English
Search Limit
Bütün Kütüphaneler
Elektronik Kaynaklar
Hepsi
Başkent Üniversitesi Kütüphanesi
Anadolu OSB Meslek Yüksekokulu
Atasev Özel Koleksiyon
Erdoğan Tercan Koleksiyonu
Güzel Sanatlar ve Tasarım Arşivi
Kazan Meslek Yüksekokulu
Hukuk Koleksiyonu
Ord.Prof.Dr. Enver Ziya Karal Tarih Uygulama Ars.Mrk.
Özel Koleksiyon Serdar Özersin
Tez Koleksiyonu
Tüm Alanlar
Başlık
Yazar
Konu
ISBN
ISSN
8
Search Field
Tüm Alanlar
Arama:
Gelişmiş Arama
Search Results
Elektronik Kaynaklar
Arama Sonuçlarını Sınırlandır
Daraltılmış:
+
Publication Date: 2006
+
Konu: Computer security.
Yazar
Dahil
Hariç
ProQuest (Firm)
(16)
Amini, Rob.
(2)
Baskin, Brian.
(2)
Carvey, Harlan A.
(2)
Cole, Eric.
(2)
Contos, Brian T.
(2)
Hunter, Laura E.
(2)
Kinney, Steven.
(2)
Lin, Ching-Yung.
(2)
Long, Johnny.
(2)
Piccard, Paul L.
(2)
Piltzecker, Tony, 1975-
(2)
Ring, Sandra.
(2)
Sachs, Marcus H.
(2)
XYPRO Technology Corporation.
(2)
Yu, Hong Heather, 1967-
(2)
Zeng, Wenjun, 1967-
(2)
Bhardwaj, Pawan K.
(1)
Bradley, Tony, 1969-
(1)
Bradley, Tony.
(1)
Burnett, Mark.
(1)
Essaaidi, Mohamed.
(1)
Fernandez-Medina, Eduardo.
(1)
Foster, James C.
(1)
Gregg, Michael (Michael C.)
(1)
Gritzalis, Stefanos.
(1)
Katsikas, Sokratis.
(1)
Kleiman, Dave.
(1)
Koh.
(1)
Liu, Vincent.
(1)
Maynor, David.
(1)
NATO Advanced Research Workshop on Information Assurance and Computer Security (2005 : T?etouan, Morocco)
(1)
Rose, Greg.
(1)
Sert, Selin
(1)
St. Denis, Tom.
(1)
Thomas, Johnson P.
(1)
Watkins, Stephen (Information security professional)
(1)
Yague, Mariemma.
(1)
Daha fazla
Tümünü genişlet
Daha az
Hepsini Daralt
Materyal Türü
Dahil
Hariç
E-Kitap
Dil
Dahil
Hariç
English
(30)
Turkish
(1)
Konu
Dahil
Hariç
Electronic books.
(30)
Computer networks -- Security measures.
(12)
COMPUTERS -- Internet -- Security.
(10)
COMPUTERS -- Networking -- Security.
(10)
COMPUTERS -- Security -- General.
(10)
Computer hackers.
(4)
Spyware (Computer software)
(4)
Computers -- Access control -- Passwords.
(3)
Data protection.
(3)
Database security.
(3)
Firewalls (Computer security)
(3)
Intellectual property.
(3)
Internet -- Security measures.
(3)
Client/server computing -- Security measures.
(2)
Electronic mail systems -- Security measures.
(2)
Embedded computer systems.
(2)
Hackers.
(2)
Hewlett-Packard computers -- Security measures.
(2)
Microsoft Windows server.
(2)
Multimedia systems -- Security measures.
(2)
Peer-to-peer architecture (Computer networks)
(2)
Spam filtering (Electronic mail)
(2)
Bilgisayar güvenliği.
(1)
COMPUTERS -- Hardware -- Personal Computers -- Macintosh.
(1)
COMPUTERS -- Hardware -- Personal Computers -- PCs.
(1)
COMPUTERS -- Operating Systems -- DOS.
(1)
COMPUTERS -- Operating Systems -- Macintosh.
(1)
COMPUTERS -- Operating Systems -- Windows Server & NT.
(1)
COMPUTERS -- Operating Systems -- Windows Workstation.
(1)
COMPUTERS -- System Administration -- Windows Administration.
(1)
Commercial crimes.
(1)
Computer crimes -- Prevention.
(1)
Computer security -- Handbooks, manuals, etc.
(1)
Computers -- Access control.
(1)
Copyrights.
(1)
Data encryption (Computer science)
(1)
Digital Watermaking (dijital işaretleme).
(1)
Electronic data processing departments -- Contracting out.
(1)
Electronic information resources -- Access control.
(1)
Electronic mail messages -- Security measures.
(1)
Fikir ve Sanat Eserleri Kanunu.
(1)
Fikri haklar.
(1)
Handbooks and manuals.
(1)
Instant messaging -- Security measures.
(1)
Instant messaging.
(1)
Internet -- Safety measures.
(1)
Internet and children.
(1)
Microsoft Windows (Computer file)
(1)
Microsoft Windows.
(1)
Open source software.
(1)
Operating systems (Computers)
(1)
Operations systems (Computer)
(1)
Programming (Mathematics)
(1)
Steganografi.
(1)
Telif hakları.
(1)
Veri koruma.
(1)
Web servers -- Security measures.
(1)
Daha fazla
Tümünü genişlet
Daha az
Hepsini Daralt
Kütüphane
Dahil
Hariç
Başkent Kütüphanesi
Lokasyon
Dahil
Hariç
Ebook Central
Elsevier E-Kitap Koleksiyonu
false
{sortLabel}
{alphabetical}
{relevance}
{include}
{exclude}
{facetName}
{results}
{displayName}
{count}
{error}
Eylem Seç
Ayırt
Listelerime ekle
Eposta
Yazdır
31 sonuç bulundu
1
2
3
Sırala:
Konuyla İlgili Sırala
Yayın Yılı (eskiden yeniye)
Yayın Yılı (yeniden eskiye)
Başlık
Yazar
OK
Eposta Adresleri
:
Phone Number:
Mobile Carrier:
AT&T
Boost
Nextel (Sprint)
Sprint (PCS)
T Mobile
TracFone
US Cellular
Verizon
Virgin
Select An Item
Data usage warning: You will receive one text message for each title you selected.
Standard text messaging rates apply.
Text it to me
Text it to me, and go to next item
000000000000
DEFAULTTR
Liste seç
Geçici Liste
Bunu varsayılan liste yap.
Öğeler başarıyla eklendi
Öğeler eklenirken hata oldu. Lütfen tekrar deneyiniz.
Fikir ve sanat eserlerinin korunması : (protection of intellectual property rights)
1.
Fikir ve sanat eserlerinin korunması : (protection of intellectual property rights)
by
Sert, Selin
Format:
How to cheat at designing security for a Windows Server 2003 network
2.
How to cheat at designing security for a Windows Server 2003 network
by
Amini, Rob.
Click to View
Format:
Penetration tester's open source toolkit
3.
Penetration tester's open source toolkit
by
Long, Johnny.
Click to View
Format:
Securing IM and P2P applications for the enterprise
4.
Securing IM and P2P applications for the enterprise
by
Piccard, Paul L.
Click to View
Format:
Insider threat protecting the enterprise from sabotage, spying, and theft
5.
Insider threat protecting the enterprise from sabotage, spying, and theft
by
Cole, Eric.
Click to View
Format:
Perfect passwords selection, protection, authentication
6.
Perfect passwords selection, protection, authentication
by
Burnett, Mark.
Click to View
Format:
BigNum math implementing cryptographic multiple precision arithmetic
7.
BigNum math implementing cryptographic multiple precision arithmetic
by
St. Denis, Tom.
Click to View
Format:
Multimedia security technologies for digital rights management
8.
Multimedia security technologies for digital rights management
by
Zeng, Wenjun, 1967-
Click to View
Format:
Combating spyware in the enterprise
9.
Combating spyware in the enterprise
by
Baskin, Brian.
Click to View
Format:
Trusted platform module basics using TPM in embedded systems
10.
Trusted platform module basics using TPM in embedded systems
by
Kinney, Steven.
Click to View
Format:
Part-themed issue on internet security
11.
Part-themed issue on internet security
by
Yague, Mariemma.
Click to View
Format:
Security issues of IT outsourcing
12.
Security issues of IT outsourcing
by
Gritzalis, Stefanos.
Click to View
Format:
Eylem Seç
Ayırt
Listelerime ekle
Eposta
Yazdır
1
2
3
Search Results
Elektronik Kaynaklar
Search Results
Elektronik Kaynaklar
OK
Eposta Adresleri
:
Phone Number:
Mobile Carrier:
AT&T
Boost
Nextel (Sprint)
Sprint (PCS)
T Mobile
TracFone
US Cellular
Verizon
Virgin
Select An Item
Data usage warning: You will receive one text message for each title you selected.
Standard text messaging rates apply.
Text it to me
Text it to me, and go to next item
Elektronik Kaynaklar
Sonuçlar alınıyor Elektronik Kaynaklar...
action