Skip to:
Search Results
|
Bottom
|
Search Facets
|
Content
Giriş
|
Hesabım
|
Listelerim
|
|
Remember to clear the cache and close the browser window.
English
Search Limit
Bütün Kütüphaneler
Elektronik Kaynaklar
Hepsi
Başkent Üniversitesi Kütüphanesi
Anadolu OSB Meslek Yüksekokulu
Atasev Özel Koleksiyon
Erdoğan Tercan Koleksiyonu
Güzel Sanatlar ve Tasarım Arşivi
Kazan Meslek Yüksekokulu
Hukuk Koleksiyonu
Ord.Prof.Dr. Enver Ziya Karal Tarih Uygulama Ars.Mrk.
Özel Koleksiyon Serdar Özersin
Tez Koleksiyonu
Tüm Alanlar
Başlık
Yazar
Konu
ISBN
ISSN
33
Search Field
Tüm Alanlar
Arama:
Gelişmiş Arama
Search Results
Elektronik Kaynaklar
Arama Sonuçlarını Sınırlandır
Daraltılmış:
+
Yazar: ProQuest (Firm)
+
Language: English
+
Yayın Yılı: 2011
+
Konu: Computer security.
Yazar
Dahil
Hariç
Ben-Ari, Erez.
(1)
Bertino, Elisa.
(1)
Dolev, Ran.
(1)
European Commission. Information Society DG.
(1)
Hadnagy, Christopher.
(1)
Howard, Doug.
(1)
Klein, Tobias.
(1)
Krutz, Ronald L.
(1)
Kumar, Atul.
(1)
Meine, Bill.
(1)
Nahari, Hadi.
(1)
Pinto, Marcus.
(1)
Prince, Kevin.
(1)
Rand Corporation.
(1)
Robinson, Neil, 1964-
(1)
Solomon, Michael R.
(1)
Stuttard, Dafydd.
(1)
Takahashi, Kenji.
(1)
Wheeler, Evan.
(1)
Winkler, J. R. (Joachim R.)
(1)
Daha fazla
Tümünü genişlet
Daha az
Hepsini Daralt
Materyal Türü
Dahil
Hariç
E-Kitap
Konu
Dahil
Hariç
Electronic books.
(13)
Computer networks -- Security measures.
(7)
Internet -- Security measures.
(2)
Business enterprises -- Computer networks -- Security measures.
(1)
Cloud computing -- Security measures.
(1)
Cloud computing.
(1)
Computer crimes -- Investments.
(1)
Computer hackers.
(1)
Computer security -- Forecasting.
(1)
Computers -- Access control.
(1)
Database security.
(1)
Debugging in computer science.
(1)
Forensic sciences.
(1)
Human-computer interaction.
(1)
Information policy -- European Union countries.
(1)
Malware (Computer software)
(1)
Microsoft Windows (Computer file)
(1)
Oracle (Computer file)
(1)
Privacy, Right of.
(1)
Social engineering.
(1)
Daha fazla
Tümünü genişlet
Daha az
Hepsini Daralt
Kütüphane
Dahil
Hariç
Başkent Kütüphanesi
Lokasyon
Dahil
Hariç
Ebook Central
false
{sortLabel}
{alphabetical}
{relevance}
{include}
{exclude}
{facetName}
{results}
{displayName}
{count}
{error}
Eylem Seç
Ayırt
Listelerime ekle
Eposta
Yazdır
13 sonuç bulundu
1
2
Sırala:
Konuyla İlgili Sırala
Yayın Yılı (eskiden yeniye)
Yayın Yılı (yeniden eskiye)
Başlık
Yazar
OK
Eposta Adresleri
:
Phone Number:
Mobile Carrier:
AT&T
Boost
Nextel (Sprint)
Sprint (PCS)
T Mobile
TracFone
US Cellular
Verizon
Virgin
Select An Item
Data usage warning: You will receive one text message for each title you selected.
Standard text messaging rates apply.
Text it to me
Text it to me, and go to next item
000000000000
DEFAULTTR
Liste seç
Geçici Liste
Bunu varsayılan liste yap.
Öğeler başarıyla eklendi
Öğeler eklenirken hata oldu. Lütfen tekrar deneyiniz.
Oracle Identity and Access Manager 11g for administrators administer Oracle Identity and Access Management: installation, configuration, and day-to-day tasks
1.
Oracle Identity and Access Manager 11g for administrators administer Oracle Identity and Access Management: installation, configuration, and day-to-day tasks
by
Kumar, Atul.
Click to View
Format:
Microsoft Forefront UAG 2010 administrator's handbook take full command of Microsoft Forefront Unified Access Gateway to secure your business applications and provide dynamic remote access with DirectAccess
2.
Microsoft Forefront UAG 2010 administrator's handbook take full command of Microsoft Forefront Unified Access Gateway to secure your business applications and provide dynamic remote access with DirectAccess
by
Ben-Ari, Erez.
Click to View
Format:
Security risk management building an information security risk management program from the ground up
3.
Security risk management building an information security risk management program from the ground up
by
Wheeler, Evan.
Click to View
Format:
Securing the cloud cloud computer security techniques and tactics
4.
Securing the cloud cloud computer security techniques and tactics
by
Winkler, J. R. (Joachim R.)
Click to View
Format:
Security 2020 reduce security risks this decade
5.
Security 2020 reduce security risks this decade
by
Howard, Doug.
Click to View
Format:
Web commerce security design and development
6.
Web commerce security design and development
by
Nahari, Hadi.
Click to View
Format:
Social engineering the art of human hacking
7.
Social engineering the art of human hacking
by
Hadnagy, Christopher.
Click to View
Format:
A bug hunter's diary a guided tour through the wilds of software security
8.
A bug hunter's diary a guided tour through the wilds of software security
by
Klein, Tobias.
Click to View
Format:
Formal models and techniques for analyzing security protocols
9.
Formal models and techniques for analyzing security protocols
by
ProQuest (Firm)
Click to View
Format:
The web application hacker's handbook finding and exploiting security flaws
10.
The web application hacker's handbook finding and exploiting security flaws
by
Stuttard, Dafydd.
Click to View
Format:
The Cloud understanding the security, privacy and trust challenges
11.
The Cloud understanding the security, privacy and trust challenges
by
Robinson, Neil, 1964-
Click to View
Format:
Identity management concepts, technologies, and systems
12.
Identity management concepts, technologies, and systems
by
Bertino, Elisa.
Click to View
Format:
Eylem Seç
Ayırt
Listelerime ekle
Eposta
Yazdır
1
2
Search Results
Elektronik Kaynaklar
Search Results
Elektronik Kaynaklar
OK
Eposta Adresleri
:
Phone Number:
Mobile Carrier:
AT&T
Boost
Nextel (Sprint)
Sprint (PCS)
T Mobile
TracFone
US Cellular
Verizon
Virgin
Select An Item
Data usage warning: You will receive one text message for each title you selected.
Standard text messaging rates apply.
Text it to me
Text it to me, and go to next item
Elektronik Kaynaklar
Sonuçlar alınıyor Elektronik Kaynaklar...
action
Go to:
Search Results
|
Search Facets
|
Top of Page