Giriş
|
Hesabım
|
Listelerim
|
|
Remember to clear the cache and close the browser window.
English
Search Limit
Bütün Kütüphaneler
Elektronik Kaynaklar
Hepsi
Başkent Üniversitesi Kütüphanesi
Anadolu OSB Meslek Yüksekokulu
Atasev Özel Koleksiyon
Erdoğan Tercan Koleksiyonu
Güzel Sanatlar ve Tasarım Arşivi
Kazan Meslek Yüksekokulu
Hukuk Koleksiyonu
Ord.Prof.Dr. Enver Ziya Karal Tarih Uygulama Ars.Mrk.
Özel Koleksiyon Serdar Özersin
Tez Koleksiyonu
Tüm Alanlar
Başlık
Yazar
Konu
ISBN
ISSN
8
Search Field
Tüm Alanlar
Arama:
Gelişmiş Arama
Search Results
Elektronik Kaynaklar
Arama Sonuçlarını Sınırlandır
Daraltılmış:
+
Publication Date: 2007
+
Konu: Computer networks -- Security measures.
Yazar
Dahil
Hariç
ProQuest (Firm)
(9)
Wiles, Jack.
(3)
Carvey, Harlan A.
(2)
Cross, Michael, 1965-
(2)
Gatford, Chris.
(2)
Gold, André.
(2)
Manzuik, Steve.
(2)
Norman, Thomas L.
(2)
Alder, Raven.
(1)
Baker, Andrew R.
(1)
Beale, Jay.
(1)
Bradley, Tony, 1969-
(1)
Brashars, Joshua.
(1)
Burton, James D.
(1)
Cameron, Rob.
(1)
Conti, Greg.
(1)
Cross, Michael.
(1)
D'Arcy, John P., 1975-
(1)
Dubrawsky, Ido.
(1)
Esler, Joel.
(1)
Goodman, Seymour E.
(1)
Gough, Michael, 1963-
(1)
Harley, David.
(1)
Lin, Herbert.
(1)
National Research Council (U.S.). Committee on Improving Cybersecurity Research in the United States.
(1)
Pan, Yi, 1960-
(1)
Porter, Thomas, PhD.
(1)
Schiller, Craig A.
(1)
Xiao, Yang, 1966-
(1)
Daha fazla
Tümünü genişlet
Daha az
Hepsini Daralt
Materyal Türü
Dahil
Hariç
E-Kitap
Dil
Dahil
Hariç
English
(25)
Konu
Dahil
Hariç
Electronic books.
(25)
Computer security.
(13)
COMPUTERS -- Internet -- Security.
(11)
COMPUTERS -- Networking -- Security.
(11)
COMPUTERS -- Security -- General.
(11)
Computers -- Access control.
(3)
Web sites -- Security measures.
(3)
Computer crimes -- Investigation -- United States -- Methodology.
(2)
Computer crimes -- Investigation.
(2)
Computer security -- Evaluation -- Methodology.
(2)
Information storage and retrieval systems -- Security measures.
(2)
Internet -- Security measures.
(2)
Internet telephony -- Security measures.
(2)
LAW -- Forensic Science.
(2)
Microsoft Windows (Computer file) -- Security measures.
(2)
Réseaux d'ordinateurs -- Sécurité -- Mesures.
(2)
Agents intelligents (Logiciels)
(1)
BUSINESS & ECONOMICS -- Corporate Governance.
(1)
BUSINESS & ECONOMICS -- Leadership.
(1)
BUSINESS & ECONOMICS -- Organizational Development.
(1)
BUSINESS & ECONOMICS -- Workplace Culture.
(1)
COMPUTERS -- System Administration -- Email Administration.
(1)
Computer networks -- Security measures -- Examinations, questions, etc.
(1)
Computer security -- Management.
(1)
Computer viruses.
(1)
Credit cards.
(1)
Cyberterrorism -- Prevention.
(1)
Data protection -- Standards.
(1)
Distributed operating systems (Computers) -- Security measures.
(1)
Electronic data processing -- Distributed processing.
(1)
Electronic data processing personnel -- Certification -- Study guides.
(1)
Electronic data processing personnel -- Certification.
(1)
Examinations.
(1)
Firewalls (Computer security)
(1)
Industries -- Security measures.
(1)
Information visualization.
(1)
Juniper Networks, Inc.
(1)
Liability for credit information.
(1)
Microsoft Windows (Computer file)
(1)
Open source software.
(1)
Security systems.
(1)
Sites Web -- Sécurité -- Mesures.
(1)
Snort (Computer file)
(1)
Study guides.
(1)
Systèmes informatiques -- Sécurité -- Mesures.
(1)
United States.
(1)
Visual perception.
(1)
Daha fazla
Tümünü genişlet
Daha az
Hepsini Daralt
Kütüphane
Dahil
Hariç
Başkent Kütüphanesi
Lokasyon
Dahil
Hariç
Ebook Central
Elsevier E-Kitap Koleksiyonu
false
{sortLabel}
{alphabetical}
{relevance}
{include}
{exclude}
{facetName}
{results}
{displayName}
{count}
{error}
Eylem Seç
Ayırt
Listelerime ekle
Eposta
Yazdır
25 sonuç bulundu
1
2
3
Sırala:
Konuyla İlgili Sırala
Yayın Yılı (eskiden yeniye)
Yayın Yılı (yeniden eskiye)
Başlık
Yazar
OK
Eposta Adresleri
:
Phone Number:
Mobile Carrier:
AT&T
Boost
Nextel (Sprint)
Sprint (PCS)
T Mobile
TracFone
US Cellular
Verizon
Virgin
Select An Item
Data usage warning: You will receive one text message for each title you selected.
Standard text messaging rates apply.
Text it to me
Text it to me, and go to next item
000000000000
DEFAULTTR
Liste seç
Geçici Liste
Bunu varsayılan liste yap.
Öğeler başarıyla eklendi
Öğeler eklenirken hata oldu. Lütfen tekrar deneyiniz.
The misuse of information systems the impact of security countermeasures
1.
The misuse of information systems the impact of security countermeasures
by
D'Arcy, John P., 1975-
Click to View
Format:
Security data visualization graphical techniques for network analysis
2.
Security data visualization graphical techniques for network analysis
by
Conti, Greg.
Click to View
Format:
Integrated security systems design concepts, specifications, and implementation
3.
Integrated security systems design concepts, specifications, and implementation
by
Norman, Thomas L.
Click to View
Format:
Network security assessment from vulnerability to patch
4.
Network security assessment from vulnerability to patch
by
Manzuik, Steve.
Click to View
Format:
Developer's guide to web application security
5.
Developer's guide to web application security
by
Cross, Michael.
Click to View
Format:
Techno security's guide to e-discovery and digital forensics
6.
Techno security's guide to e-discovery and digital forensics
by
Wiles, Jack.
Click to View
Format:
Windows forensic analysis DVD toolkit,
7.
Windows forensic analysis DVD toolkit,
by
Carvey, Harlan A.
Click to View
Format:
Integrated security systems design : concepts, specifications, and implementation
8.
Integrated security systems design : concepts, specifications, and implementation
by
Norman, Thomas L.
ScienceDirect
http://www.sciencedirect.com/science/book/9780750679091
Format:
Snort : IDS and IPS toolkit
9.
Snort : IDS and IPS toolkit
by
Beale, Jay.
ScienceDirect
https://www.sciencedirect.com/science/book/9781597490993
Format:
Network security assessment : from vulnerability to patch
10.
Network security assessment : from vulnerability to patch
by
Manzuik, Steve.
ScienceDirect
http://www.sciencedirect.com/science/book/9781597491013
Format:
Techno Security's guide to managing risks : for IT managers, auditors, and investigators
11.
Techno Security's guide to managing risks : for IT managers, auditors, and investigators
by
Wiles, Jack.
ScienceDirect
http://www.sciencedirect.com/science/book/9781597491389
Format:
Asterisk hacking.
12.
Asterisk hacking.
by
Brashars, Joshua.
ScienceDirect
http://www.sciencedirect.com/science/book/9781597491518
Format:
Eylem Seç
Ayırt
Listelerime ekle
Eposta
Yazdır
1
2
3
Search Results
Elektronik Kaynaklar
Search Results
Elektronik Kaynaklar
OK
Eposta Adresleri
:
Phone Number:
Mobile Carrier:
AT&T
Boost
Nextel (Sprint)
Sprint (PCS)
T Mobile
TracFone
US Cellular
Verizon
Virgin
Select An Item
Data usage warning: You will receive one text message for each title you selected.
Standard text messaging rates apply.
Text it to me
Text it to me, and go to next item
Elektronik Kaynaklar
Sonuçlar alınıyor Elektronik Kaynaklar...
action