Giriş
|
Hesabım
|
Listelerim
|
|
Remember to clear the cache and close the browser window.
English
Search Limit
Bütün Kütüphaneler
Elektronik Kaynaklar
Hepsi
Başkent Üniversitesi Kütüphanesi
Anadolu OSB Meslek Yüksekokulu
Atasev Özel Koleksiyon
Erdoğan Tercan Koleksiyonu
Güzel Sanatlar ve Tasarım Arşivi
Kazan Meslek Yüksekokulu
Hukuk Koleksiyonu
Ord.Prof.Dr. Enver Ziya Karal Tarih Uygulama Ars.Mrk.
Özel Koleksiyon Serdar Özersin
Tez Koleksiyonu
Tüm Alanlar
Başlık
Yazar
Konu
ISBN
ISSN
8
Search Field
Tüm Alanlar
Arama:
Gelişmiş Arama
Search Results
Elektronik Kaynaklar
Arama Sonuçlarını Sınırlandır
Daraltılmış:
+
Yayın Yılı: 2013
+
Konu: Computer networks -- Security measures.
Yazar
Dahil
Hariç
ProQuest (Firm)
(20)
Rountree, Derrick.
(2)
American Evaluation Association.
(1)
Andress, Jason.
(1)
Assam, Tarek.
(1)
Assing, Dominique.
(1)
Barnett, Ryan C.
(1)
Beaver, Kevin.
(1)
Bejtlich, Richard.
(1)
Bolt, Steven.
(1)
Brant, Justin M.
(1)
Calé, Stéphane.
(1)
Canlı, Mustafa
(1)
Capurro, Rafael.
(1)
Cole, Eric.
(1)
Dattani, Dinesh D.
(1)
Delfanti, Alessandro.
(1)
Eko, Lyombe.
(1)
Eldred, Michael.
(1)
Engel, Mary, author.
(1)
Evergreen, Stephanie.
(1)
Fernandez, Eduardo B., 1936- author.
(1)
Fichera, Joe, 1966-
(1)
Hicks, Richard.
(1)
Hsu, D. Frank (Derbiau Frank), 1948- editor.
(1)
Jagielski, Piotr.
(1)
Kane, Greg.
(1)
Khoury, Franjieh El.
(1)
Knapp, Eric D.
(1)
Koppel, Lorna.
(1)
Kotwica, Kathleen.
(1)
Krause, Jordan.
(1)
Lakhani, Aamir.
(1)
Langill, Joel.
(1)
Loshin, Peter.
(1)
Mankale, Anjana.
(1)
Marinucci, Dorothy, editor.
(1)
Mohammed, Mohssen, 1982- author.
(1)
Muniz, Joseph.
(1)
Nabrdalik, Jakub.
(1)
Nagel, Daniel.
(1)
Neely, Matthew.
(1)
Oxley, Alan.
(1)
Pathan, Al-Sakib Khan, author.
(1)
Pauli, Joshua J.
(1)
Samani, Raj.
(1)
Tam, Kenneth.
(1)
Vacca, John R.
(1)
White, Scott.
(1)
Wilhelm, Thomas.
(1)
Winterfeld, Steve.
(1)
Daha fazla
Tümünü genişlet
Daha az
Hepsini Daralt
Materyal Türü
Dahil
Hariç
E-Kitap
Kitap
Dil
Dahil
Hariç
English
(33)
Turkish
(1)
Konu
Dahil
Hariç
Electronic books.
(33)
Computer security.
(9)
Computer hackers.
(5)
Internet -- Security measures.
(5)
Computers -- Access control.
(3)
Penetration testing (Computer security)
(3)
Computer crimes -- Prevention.
(2)
Computer networks -- Access control.
(2)
Application software -- Development.
(1)
Application software -- Security measures.
(1)
Bilgisayar ağları -- Güvenlik önlemleri.
(1)
Bilgisayar güvenliği.
(1)
Biometric identification.
(1)
Business planning.
(1)
Computer algorithms.
(1)
Computer architecture.
(1)
Computer crimes -- Investigation -- United States.
(1)
Computer network protocols.
(1)
Computer networks -- Remote access.
(1)
Computer networks -- Social aspects.
(1)
Computer networks -- Testing.
(1)
Computer science.
(1)
Computer software -- Development.
(1)
Computer viruses.
(1)
Confidential business information.
(1)
Cyberspace -- Security measures.
(1)
Data protection.
(1)
Electronic commerce -- Security measures.
(1)
Electronic countermeasures.
(1)
Freedom of speech -- France -- History.
(1)
Freedom of speech -- United States -- History.
(1)
Identity (Philosophical concept)
(1)
Information storage and retrieval systems -- Business -- Security measures.
(1)
Information visualization.
(1)
Information warfare.
(1)
Internet -- Law and legislation -- France.
(1)
Internet -- Law and legislation -- United States.
(1)
Internet -- Safety measures.
(1)
Internet -- Social aspects.
(1)
Intrusion detection systems (Computer security)
(1)
Iris (Eye)
(1)
Java (Computer program language)
(1)
Machine theory.
(1)
Mass media -- Law and legislation.
(1)
Microsoft Windows (Computer file)
(1)
Microsoft Windows server.
(1)
Privacy, Right of -- France.
(1)
Privacy, Right of -- United States.
(1)
Risk management.
(1)
Smart power grids -- Security measures.
(1)
Web applications -- Security measures.
(1)
Web sites -- Evaluation.
(1)
Web sites -- Security measures.
(1)
Web sites -- Testing.
(1)
z/OS.
(1)
Daha fazla
Tümünü genişlet
Daha az
Hepsini Daralt
Kütüphane
Dahil
Hariç
Başkent Kütüphanesi
Lokasyon
Dahil
Hariç
Ebook Central
Merkez Kütüphane
false
{sortLabel}
{alphabetical}
{relevance}
{include}
{exclude}
{facetName}
{results}
{displayName}
{count}
{error}
Eylem Seç
Ayırt
Listelerime ekle
Eposta
Yazdır
34 sonuç bulundu
1
2
3
Sırala:
Konuyla İlgili Sırala
Yayın Yılı (eskiden yeniye)
Yayın Yılı (yeniden eskiye)
Başlık
Yazar
OK
Eposta Adresleri
:
Phone Number:
Mobile Carrier:
AT&T
Boost
Nextel (Sprint)
Sprint (PCS)
T Mobile
TracFone
US Cellular
Verizon
Virgin
Select An Item
Data usage warning: You will receive one text message for each title you selected.
Standard text messaging rates apply.
Text it to me
Text it to me, and go to next item
000000000000
DEFAULTTR
Liste seç
Geçici Liste
Bunu varsayılan liste yap.
Öğeler başarıyla eklendi
Öğeler eklenirken hata oldu. Lütfen tekrar deneyiniz.
Biohackers the politics of open science
1.
Biohackers the politics of open science
by
Delfanti, Alessandro.
Click to View
Format:
What should go on the internet? : privacy, freedom, and security online
2.
What should go on the internet? : privacy, freedom, and security online
by
Engel, Mary, author.
Click to View
Format:
Siber güvenlik
3.
Siber güvenlik
by
Canlı, Mustafa
Format:
SolarWinds Server & Application Monitor : deployment and administration : an intuitive guide to implementing and calibrating SolarWinds Server & Application Monitor with minimum hassle
4.
SolarWinds Server & Application Monitor : deployment and administration : an intuitive guide to implementing and calibrating SolarWinds Server & Application Monitor with minimum hassle
by
Brant, Justin M.
Click to View
Format:
Spring Security 3.x cookbook
5.
Spring Security 3.x cookbook
by
Mankale, Anjana.
Click to View
Format:
The practice of network security monitoring : understanding incident detection and response
6.
The practice of network security monitoring : understanding incident detection and response
by
Bejtlich, Richard.
Click to View
Format:
Security risks in social media technologies : safe practices in public service applications
7.
Security risks in social media technologies : safe practices in public service applications
by
Oxley, Alan.
Click to View
Format:
Data visualization. Part 2
8.
Data visualization. Part 2
by
Assam, Tarek.
Click to View
Format:
Microsoft DirectAccess best practices and troubleshooting
9.
Microsoft DirectAccess best practices and troubleshooting
by
Krause, Jordan.
Click to View
Format:
IBM mainframe security beyond the basics : a practical guide from a z/OS and RACF perspective
10.
IBM mainframe security beyond the basics : a practical guide from a z/OS and RACF perspective
by
Dattani, Dinesh D.
Click to View
Format:
Information protection playbook
11.
Information protection playbook
by
Kane, Greg.
Click to View
Format:
Web penetration testing with Kali Linux : a practical guide to implementing penetration testing strategies on websites, web applications, and standard web protocols with Kali Linux
12.
Web penetration testing with Kali Linux : a practical guide to implementing penetration testing strategies on websites, web applications, and standard web protocols with Kali Linux
by
Muniz, Joseph.
Click to View
Format:
Eylem Seç
Ayırt
Listelerime ekle
Eposta
Yazdır
1
2
3
Search Results
Elektronik Kaynaklar
Search Results
Elektronik Kaynaklar
OK
Eposta Adresleri
:
Phone Number:
Mobile Carrier:
AT&T
Boost
Nextel (Sprint)
Sprint (PCS)
T Mobile
TracFone
US Cellular
Verizon
Virgin
Select An Item
Data usage warning: You will receive one text message for each title you selected.
Standard text messaging rates apply.
Text it to me
Text it to me, and go to next item
Elektronik Kaynaklar
Sonuçlar alınıyor Elektronik Kaynaklar...
action