Giriş
|
Hesabım
|
Listelerim
|
|
Remember to clear the cache and close the browser window.
English
Search Limit
Bütün Kütüphaneler
Elektronik Kaynaklar
Hepsi
Başkent Üniversitesi Kütüphanesi
Anadolu OSB Meslek Yüksekokulu
Atasev Özel Koleksiyon
Erdoğan Tercan Koleksiyonu
Güzel Sanatlar ve Tasarım Arşivi
Kazan Meslek Yüksekokulu
Hukuk Koleksiyonu
Ord.Prof.Dr. Enver Ziya Karal Tarih Uygulama Ars.Mrk.
Özel Koleksiyon Serdar Özersin
Tez Koleksiyonu
Tüm Alanlar
Başlık
Yazar
Konu
ISBN
ISSN
47
Search Field
Tüm Alanlar
Arama:
Gelişmiş Arama
Search Results
Elektronik Kaynaklar
Arama Sonuçlarını Sınırlandır
Daraltılmış:
+
Konu: Computer security.
+
Yayın Yılı: 2013
Yazar
Dahil
Hariç
ProQuest (Firm)
(22)
American Evaluation Association.
(1)
Aquilina, James, author.
(1)
Assam, Tarek.
(1)
Baker, Paul R., 1958-
(1)
Barnett, Ryan C.
(1)
Beaver, Kevin.
(1)
Benny, Daniel J.
(1)
Bolt, Steven.
(1)
Bonertz, Tina.
(1)
Boulanger, Jean-Louis.
(1)
Breimeier, Johannes.
(1)
Brewer, Jacqueline, editor.
(1)
Brooks, Hugh.
(1)
Brotby, W. Krag.
(1)
Calder, Alan.
(1)
Canlı, Mustafa
(1)
Casey, Eoghan, author.
(1)
Chuvakin, Anton A.
(1)
Cross, Michael, 1965-
(1)
Dalıcı, Rahmi, edited
(1)
Dattani, Dinesh D.
(1)
Delfanti, Alessandro.
(1)
Demir, Bünyamin
(1)
Diogenes, Yuri.
(1)
Evergreen, Stephanie.
(1)
Fabbri, Rosato.
(1)
Fichera, Joe, 1966-
(1)
Gruschka, Nils.
(1)
Gupta, Ravi.
(1)
Hicks, Richard.
(1)
Hinson, Gary.
(1)
Hosmer, Chet.
(1)
Iacono, Luigi Lo.
(1)
Kabay, M. E.
(1)
Kane, Greg.
(1)
Koppel, Lorna.
(1)
Kostopoulos, George K., 1939- author.
(1)
Laykin, Erik.
(1)
Leman-Langlois, Stéphane, 1965-
(1)
Loshin, Pete.
(1)
Loshin, Peter.
(1)
Malin, Cameron, author.
(1)
Mallett, Andrew.
(1)
Martin, Jason L.
(1)
Mayoral, Fernando.
(1)
Miklaucic, Michael, editor.
(1)
Moskowitz, Jeremy.
(1)
Moulder, Patricia.
(1)
National Defense University Press, publisher.
(1)
National Defense University. Center for Technology and National Security Policy. Center for Complex Operations, contributor.
(1)
National Defense University. Institute for National Strategic Studies, contributor.
(1)
O'Connor, T. J.
(1)
Phillips, Christopher.
(1)
Phillips, Richard, 1958-
(1)
Raggo, Michael T.
(1)
Schmidt, Kevin J.
(1)
Shinder, Debra Littlejohn.
(1)
Shinder, Thomas W.
(1)
Sianjina, Rayton R.
(1)
Sorge, Christoph.
(1)
Spasovski, Martin.
(1)
Stavridis, James, contributor.
(1)
Talabis, Mark Ryan N.
(1)
Volpe, Fabrizio.
(1)
Watkins, Steve G.
(1)
Wheeler, Evan.
(1)
Woody, Aaron.
(1)
Yang, Christopher.
(1)
Daha fazla
Tümünü genişlet
Daha az
Hepsini Daralt
Materyal Türü
Dahil
Hariç
E-Kitap
Kitap
Dil
Dahil
Hariç
English
(34)
Turkish
(2)
German
(1)
Konu
Dahil
Hariç
Electronic books.
(35)
Computer networks -- Security measures.
(9)
Data protection.
(6)
Business enterprises -- Computer networks -- Security measures.
(3)
Computer hackers.
(3)
Bilgisayar güvenliği.
(2)
Computers -- Access control.
(2)
Cyberspace -- Security measures.
(2)
Operating systems (Computers)
(2)
Bilgisayar ağları -- Güvenlik önlemleri.
(1)
Bilgisayar güvenliği -- Yazılım.
(1)
Business enterprises -- Security measures.
(1)
Business planning.
(1)
Citrix MetaFrame.
(1)
Client/server computing.
(1)
Computer crimes -- Investigation -- United States.
(1)
Computer crimes -- Investigation.
(1)
Computer crimes -- Prevention.
(1)
Computer crimes.
(1)
Computer networks -- Examinations -- Study guides.
(1)
Computer science.
(1)
Computer security -- Software.
(1)
Computers -- Access control -- Passwords.
(1)
Confidential business information.
(1)
Corporations -- Corrupt practices.
(1)
Data encryption (Computer science)
(1)
Data encryption (Computer science).
(1)
Data mining.
(1)
Directory services (Computer network technology)
(1)
Educational technology -- Security measures.
(1)
Electronic commerce -- Security measures.
(1)
Electronic surveillance.
(1)
Fraud investigation.
(1)
Information storage and retrieval systems -- Business -- Security measures.
(1)
Information visualization.
(1)
Internet -- Security measures.
(1)
Intrusion detection systems (Computer security)
(1)
Linux -- Examinations -- Study guides.
(1)
Microsoft Windows (Computer file)
(1)
Microsoft Windows server.
(1)
National security.
(1)
Network performance (Telecommunication)
(1)
Online social networks -- Security measures.
(1)
Online social networks.
(1)
Private security services.
(1)
Python (Computer program language)
(1)
Risk assessment.
(1)
Risk management -- Social aspects.
(1)
Risk management.
(1)
Security systems.
(1)
Social media -- Security measures.
(1)
Social media.
(1)
Software configuration management.
(1)
Software security.
(1)
Sovereignty -- Social networks.
(1)
Telecommunication systems -- Security measures.
(1)
Transnational crime -- Social networks.
(1)
Veri şifreleme (Bilgisayar bilimi).
(1)
Yazılım güvenliği.
(1)
z/OS.
(1)
Daha fazla
Tümünü genişlet
Daha az
Hepsini Daralt
Kütüphane
Dahil
Hariç
Başkent Kütüphanesi
Lokasyon
Dahil
Hariç
Ebook Central
Merkez Kütüphane
false
{sortLabel}
{alphabetical}
{relevance}
{include}
{exclude}
{facetName}
{results}
{displayName}
{count}
{error}
Eylem Seç
Ayırt
Listelerime ekle
Eposta
Yazdır
37 sonuç bulundu
1
2
3
4
Sırala:
Konuyla İlgili Sırala
Yayın Yılı (eskiden yeniye)
Yayın Yılı (yeniden eskiye)
Başlık
Yazar
OK
Eposta Adresleri
:
Phone Number:
Mobile Carrier:
AT&T
Boost
Nextel (Sprint)
Sprint (PCS)
T Mobile
TracFone
US Cellular
Verizon
Virgin
Select An Item
Data usage warning: You will receive one text message for each title you selected.
Standard text messaging rates apply.
Text it to me
Text it to me, and go to next item
000000000000
DEFAULTTR
Liste seç
Geçici Liste
Bunu varsayılan liste yap.
Öğeler başarıyla eklendi
Öğeler eklenirken hata oldu. Lütfen tekrar deneyiniz.
Yazılım güvenliği saldırı ve savunma
1.
Yazılım güvenliği saldırı ve savunma
by
Demir, Bünyamin
Format:
Siber güvenlik
2.
Siber güvenlik
by
Canlı, Mustafa
Format:
Investigative computer forensics the practical guide for lawyers, accountants, investigators, and business executives
3.
Investigative computer forensics the practical guide for lawyers, accountants, investigators, and business executives
by
Laykin, Erik.
Click to View
Format:
Biohackers the politics of open science
4.
Biohackers the politics of open science
by
Delfanti, Alessandro.
Click to View
Format:
Data hiding exposing concealed data in multimedia, operating systems, mobile devices, and network protocols
5.
Data hiding exposing concealed data in multimedia, operating systems, mobile devices, and network protocols
by
Raggo, Michael T.
Click to View
Format:
Violent Python a cookbook for hackers, forensic analysts, penetration testers and security engineers
6.
Violent Python a cookbook for hackers, forensic analysts, penetration testers and security engineers
by
O'Connor, T. J.
Click to View
Format:
Logging and log management the authoritative guide to understanding the concepts surrounding logging and log management
7.
Logging and log management the authoritative guide to understanding the concepts surrounding logging and log management
by
Chuvakin, Anton A.
Click to View
Format:
Enterprise security a data-centric approach to securing the enterprise : a guide to applying data-centric security concepts for securing enterprise data to enable an agile enterprise
8.
Enterprise security a data-centric approach to securing the enterprise : a guide to applying data-centric security concepts for securing enterprise data to enable an agile enterprise
by
Woody, Aaron.
Click to View
Format:
Group policy fundamentals, security, and the managed desktop
9.
Group policy fundamentals, security, and the managed desktop
by
Moskowitz, Jeremy.
Click to View
Format:
Hacking for dummies
10.
Hacking for dummies
by
Beaver, Kevin.
Click to View
Format:
Web application defender's cookbook battling hackers and protecting users
11.
Web application defender's cookbook battling hackers and protecting users
by
Barnett, Ryan C.
Click to View
Format:
Technocrime, policing and surveillance
12.
Technocrime, policing and surveillance
by
Leman-Langlois, Stéphane, 1965-
Click to View
Format:
Eylem Seç
Ayırt
Listelerime ekle
Eposta
Yazdır
1
2
3
4
Search Results
Elektronik Kaynaklar
Search Results
Elektronik Kaynaklar
OK
Eposta Adresleri
:
Phone Number:
Mobile Carrier:
AT&T
Boost
Nextel (Sprint)
Sprint (PCS)
T Mobile
TracFone
US Cellular
Verizon
Virgin
Select An Item
Data usage warning: You will receive one text message for each title you selected.
Standard text messaging rates apply.
Text it to me
Text it to me, and go to next item
Elektronik Kaynaklar
Sonuçlar alınıyor Elektronik Kaynaklar...
action