Giriş
|
Hesabım
|
Listelerim
|
|
Remember to clear the cache and close the browser window.
English
Search Limit
Bütün Kütüphaneler
Elektronik Kaynaklar
Hepsi
Başkent Üniversitesi Kütüphanesi
Anadolu OSB Meslek Yüksekokulu
Atasev Özel Koleksiyon
Erdoğan Tercan Koleksiyonu
Güzel Sanatlar ve Tasarım Arşivi
Kazan Meslek Yüksekokulu
Hukuk Koleksiyonu
Ord.Prof.Dr. Enver Ziya Karal Tarih Uygulama Ars.Mrk.
Özel Koleksiyon Serdar Özersin
Tez Koleksiyonu
Tüm Alanlar
Başlık
Yazar
Konu
ISBN
ISSN
8
Search Field
Tüm Alanlar
Arama:
Gelişmiş Arama
Search Results
Elektronik Kaynaklar
Arama Sonuçlarını Sınırlandır
Daraltılmış:
+
Publication Date: 2014
+
Konu: Computer security.
Yazar
Dahil
Hariç
Katsaropoulos, Chris, editor.
(2)
Abbadi, Imad M., author.
(1)
Andress, Jason, author.
(1)
Bennett, Eleanor Leonne, cover designer.
(1)
Bianco, David J., 1971-
(1)
Buchanan, Cameron, author.
(1)
Calder, Alan, author.
(1)
Carbone, Fernando, author.
(1)
Carvey, Harlan A., author.
(1)
Cherry, Denny.
(1)
Cruz, Maria Ines, designer.
(1)
Cyborski, Shannon, author.
(1)
Dhali, Maruf Ahmed, cover designer.
(1)
Fahy, Bob, editor.
(1)
Gantz, Stephen D.
(1)
Gavrilenko, K., author.
(1)
Ginodman, Veniamin, editor.
(1)
Gomzin, Slava.
(1)
Gore, Bruce, cover designer.
(1)
Hathaway, Melissa E., editor of compilation.
(1)
Herkanaidu, Ram, editor.
(1)
Hutchens, Justin, author.
(1)
Jacobs, Jay.
(1)
LaRock, Thomas.
(1)
Ligh, Michael Hale, author.
(1)
Limbert, Matthew, designer.
(1)
Maske, Steve.
(1)
Messier, Ric, author.
(1)
Michajlowski, A., author.
(1)
Misra, Anmol.
(1)
Moos, Flemming, editor.
(1)
Obelets, Natalya, editor.
(1)
Pandey, Abhishek, cover designer.
(1)
Ransome, James.
(1)
Rearick, Benjamin, project director.
(1)
Rudis, Bob.
(1)
Russell, Alison Lawlor, author.
(1)
Samayan, Malathi, project director.
(1)
Sandbu, Marius, author.
(1)
Sanders, Chris, 1986-
(1)
Schoenfield, Brook.
(1)
Shostack, Adam.
(1)
Smith, Jason (Adjunct associate professor)
(1)
Ulsch, N. MacDonnell, 1951- author.
(1)
Vacca, John R.
(1)
Ventre, Daniel, editor.
(1)
Vladimirov, A., author.
(1)
Voeller, John G.
(1)
Winterfeld, Steven, editor.
(1)
Daha fazla
Tümünü genişlet
Daha az
Hepsini Daralt
Materyal Türü
Dahil
Hariç
E-Kitap
Dil
Dahil
Hariç
English
(27)
German
(1)
Konu
Dahil
Hariç
Electronic books.
(28)
Computer networks -- Security measures.
(15)
Cyberterrorism -- Prevention.
(3)
Internet -- Security measures.
(3)
Cloud computing.
(2)
Computer crimes -- Prevention.
(2)
Computers -- Access control.
(2)
Business enterprises -- Computer networks -- Security measures.
(1)
Computer crimes -- Investigation -- United States -- Methodology.
(1)
Computer hackers.
(1)
Corporations -- Security measures.
(1)
Cyberinfrastructure -- Security measures.
(1)
Cyberspace -- Security measures.
(1)
Cyberterrorism.
(1)
Data mining.
(1)
Data protection.
(1)
Forensic sciences.
(1)
Information resources management.
(1)
Information technology -- Auditing.
(1)
Information technology -- Management.
(1)
Information technology -- Security measures.
(1)
Internet -- Law and legislation.
(1)
Malware (Computer software)
(1)
Microsoft Windows (Computer file) -- Security measures.
(1)
Open source intelligence.
(1)
Penetration testing (Computer security)
(1)
Privacy, Right of.
(1)
Situational awareness.
(1)
Web services.
(1)
Daha fazla
Tümünü genişlet
Daha az
Hepsini Daralt
Kütüphane
Dahil
Hariç
Başkent Kütüphanesi
Lokasyon
Dahil
Hariç
Ebook Central
false
{sortLabel}
{alphabetical}
{relevance}
{include}
{exclude}
{facetName}
{results}
{displayName}
{count}
{error}
Eylem Seç
Ayırt
Listelerime ekle
Eposta
Yazdır
28 sonuç bulundu
1
2
3
Sırala:
Konuyla İlgili Sırala
Yayın Yılı (eskiden yeniye)
Yayın Yılı (yeniden eskiye)
Başlık
Yazar
OK
Eposta Adresleri
:
Phone Number:
Mobile Carrier:
AT&T
Boost
Nextel (Sprint)
Sprint (PCS)
T Mobile
TracFone
US Cellular
Verizon
Virgin
Select An Item
Data usage warning: You will receive one text message for each title you selected.
Standard text messaging rates apply.
Text it to me
Text it to me, and go to next item
000000000000
DEFAULTTR
Liste seç
Geçici Liste
Bunu varsayılan liste yap.
Öğeler başarıyla eklendi
Öğeler eklenirken hata oldu. Lütfen tekrar deneyiniz.
Cyber security and IT infrastructure protection
1.
Cyber security and IT infrastructure protection
by
Vacca, John R.
Click to View
Format:
Kali Linux network scanning cookbook : over 90 hands-on recipes explaining how to leverage custom scripts and integrated tools in Kali Linux to effectively master network scanning
2.
Kali Linux network scanning cookbook : over 90 hands-on recipes explaining how to leverage custom scripts and integrated tools in Kali Linux to effectively master network scanning
by
Hutchens, Justin, author.
Click to View
Format:
Cyber essentials : a pocket guide
3.
Cyber essentials : a pocket guide
by
Calder, Alan, author.
Click to View
Format:
Cyber blockades
4.
Cyber blockades
by
Russell, Alison Lawlor, author.
Click to View
Format:
Implementing NetScaler VPX : leverage the features of NetScaler VPX to optimize and deploy responsive web services and applications on multiple virtualization platforms
5.
Implementing NetScaler VPX : leverage the features of NetScaler VPX to optimize and deploy responsive web services and applications on multiple virtualization platforms
by
Sandbu, Marius, author.
Click to View
Format:
Collaboration with cloud computing : security, social media, and unified communications
6.
Collaboration with cloud computing : security, social media, and unified communications
by
Messier, Ric, author.
Click to View
Format:
Kali Linux CTF Blueprints : build, test, and customize your own Capture the Flag challenges across multiple platforms designed to be attacked with Kali Linux
7.
Kali Linux CTF Blueprints : build, test, and customize your own Capture the Flag challenges across multiple platforms designed to be attacked with Kali Linux
by
Buchanan, Cameron, author.
Click to View
Format:
Security leader insights for information protection : lessons and strategies from leading security professionals
8.
Security leader insights for information protection : lessons and strategies from leading security professionals
by
Fahy, Bob, editor.
Click to View
Format:
The basics of information security : understanding the fundamentals of InfoSec in theory and practice
9.
The basics of information security : understanding the fundamentals of InfoSec in theory and practice
by
Andress, Jason, author.
Click to View
Format:
Cloud management and security
10.
Cloud management and security
by
Abbadi, Imad M., author.
Click to View
Format:
Hacking point of sale : payment application secrets, threats, and solutions
11.
Hacking point of sale : payment application secrets, threats, and solutions
by
Gomzin, Slava.
Click to View
Format:
Threat modeling : designing for security
12.
Threat modeling : designing for security
by
Shostack, Adam.
Click to View
Format:
Eylem Seç
Ayırt
Listelerime ekle
Eposta
Yazdır
1
2
3
Search Results
Elektronik Kaynaklar
Search Results
Elektronik Kaynaklar
OK
Eposta Adresleri
:
Phone Number:
Mobile Carrier:
AT&T
Boost
Nextel (Sprint)
Sprint (PCS)
T Mobile
TracFone
US Cellular
Verizon
Virgin
Select An Item
Data usage warning: You will receive one text message for each title you selected.
Standard text messaging rates apply.
Text it to me
Text it to me, and go to next item
Elektronik Kaynaklar
Sonuçlar alınıyor Elektronik Kaynaklar...
action