Skip to:
Search Results
|
Bottom
|
Search Facets
|
Content
Giriş
|
Hesabım
|
Listelerim
|
|
Remember to clear the cache and close the browser window.
English
Search Limit
Bütün Kütüphaneler
Elektronik Kaynaklar
Hepsi
Başkent Üniversitesi Kütüphanesi
Anadolu OSB Meslek Yüksekokulu
Atasev Özel Koleksiyon
Erdoğan Tercan Koleksiyonu
Güzel Sanatlar ve Tasarım Arşivi
Kazan Meslek Yüksekokulu
Hukuk Koleksiyonu
Ord.Prof.Dr. Enver Ziya Karal Tarih Uygulama Ars.Mrk.
Özel Koleksiyon Serdar Özersin
Tez Koleksiyonu
Tüm Alanlar
Başlık
Yazar
Konu
ISBN
ISSN
13
Search Field
Tüm Alanlar
Arama:
Gelişmiş Arama
Search Results
Elektronik Kaynaklar
Arama Sonuçlarını Sınırlandır
Daraltılmış:
+
Yazar: ProQuest (Firm)
+
Konu: Computer security.
Yazar
Dahil
Hariç
International Business Machines Corporation. International Technical Support Organization.
(10)
Foster, James C.
(5)
Rayns, Chris.
(4)
Shinder, Thomas W.
(4)
Carvey, Harlan A.
(3)
Long, Johnny.
(3)
Shinder, Debra Littlejohn.
(3)
Boulanger, Jean-Louis.
(2)
Chandramouli, Ramaswamy.
(2)
Cole, Eric.
(2)
Erickson, Jon, 1977-
(2)
Ferraiolo, David.
(2)
Goodman, Seymour E.
(2)
Grasdal, Martin.
(2)
Hunter, Laura E.
(2)
Hurley, Chris.
(2)
Koh.
(2)
Krutz, Ronald L.
(2)
Kuhn, D. Richard.
(2)
Moskowitz, Jeremy.
(2)
Oppliger, Rolf.
(2)
Piltzecker, Tony, 1975-
(2)
Ramirez, Gilbert.
(2)
Ring, Sandra.
(2)
Wheeler, Evan.
(2)
Wiles, Jack.
(2)
Wyler, Neil R.
(2)
Zalewski, Michal.
(2)
Agre, Philip.
(1)
Alcover, Jorge Blanco.
(1)
Alexander, Philip, 1963-
(1)
Amini, Rob.
(1)
Andrés, Steven.
(1)
Antón, Philip S.
(1)
Anzaldua, Reynaldo.
(1)
Aquilina, James M.
(1)
Archibald, Neil.
(1)
Arnold, Michael (Michael Konrad), 1964-
(1)
Ashenden, Debi.
(1)
Axelrod, C. Warren.
(1)
Baker, Paul R., 1958-
(1)
Barnett, Ryan C.
(1)
Baskerville, Richard.
(1)
Baskin, Brian.
(1)
Bayles, Aaron W.
(1)
Bayuk, Jennifer L.
(1)
Beale, Jay.
(1)
Beaver, Kevin.
(1)
Belapurkar, Abhijit.
(1)
Ben-Ari, Erez.
(1)
Ben-Natan, Ron.
(1)
Benny, Daniel J.
(1)
Bertino, Elisa.
(1)
Bhalla, Nish.
(1)
Blobel, Bernd.
(1)
Bolt, Steven.
(1)
Bradley, Tony.
(1)
Brindley, Ed.
(1)
Brooks, Hugh.
(1)
Brotby, W. Krag.
(1)
Bruchez, Rudi.
(1)
Burke, Josh.
(1)
Burnett, Mark (Mark M.)
(1)
Burnett, Mark.
(1)
Bücker, Axel.
(1)
Calderon Pale, Paulino.
(1)
Caloyannides, Michael A.
(1)
Caloyannides, Michael A. Computer forensics and privacy.
(1)
Cantrell, Christopher.
(1)
Casey, Eoghan.
(1)
Caswell, Brian.
(1)
Cesario, Cristiano.
(1)
Chaffin, Larry.
(1)
Cherry, Denny.
(1)
Chikofsky, Elliot J.
(1)
Choi, Kyung-shick, 1973-
(1)
Chuvakin, Anton A.
(1)
Clarke, Justin.
(1)
Clercq, Jan de, 1968-
(1)
Conti, Greg.
(1)
Contos, Brian T.
(1)
Cook, Jim, 1944-
(1)
Cox, I. J. (Ingemar J.)
(1)
Cross, Michael.
(1)
C̆ervĕn, Pavol.
(1)
D'Arcy, John P., 1975-
(1)
Dai, Yuan-Shun.
(1)
DeMott, Jared.
(1)
Delfanti, Alessandro.
(1)
Dent, Alexander W.
(1)
Deraison, Renaud.
(1)
Dhillon, Gurpreet.
(1)
Diogenes, Yuri.
(1)
Dolev, Ran.
(1)
Eilam, Eldad.
(1)
Esparza, Javier.
(1)
Essaaidi, Mohamed.
(1)
European Commission. Information Society DG.
(1)
Fair, Ted.
(1)
Fernandez-Medina, Eduardo.
(1)
Fichera, Joe, 1966-
(1)
Filip, Werner.
(1)
Fionov, Andrey.
(1)
Forristal, Jeff.
(1)
Foster, James.
(1)
Foster, Stephen C.
(1)
Fuller, Ed.
(1)
Furnell, Steven, 1970-
(1)
Galvan, Karla.
(1)
Gehrmann, Christian.
(1)
Geiselhart, Gregory.
(1)
Goldstein, Emmanuel J.
(1)
González, Belén.
(1)
Grillenmeier, Guido.
(1)
Gritzalis, Stefanos.
(1)
Grumberg, Orna.
(1)
Gupta, Ravi.
(1)
Hadnagy, Christopher.
(1)
Hancock, Bill, 1957-
(1)
Hawker, Andrew.
(1)
Heinen, Neils.
(1)
Henmi, Anne.
(1)
Hicks, Richard.
(1)
Hinson, Gary.
(1)
Hinton, Heather.
(1)
Hippensteil, Heinz Peter.
(1)
Hollin, Mark.
(1)
Honick, Ron.
(1)
Honig, Andrew.
(1)
Hosmer, Chet.
(1)
Howard, Doug.
(1)
Huang, Hsiang-Cheh.
(1)
Huseby, Sverre H.
(1)
Hutchinson, William.
(1)
Hänninen, Pekka.
(1)
I͡Ashchenko, V. V.
(1)
Jacobs, Josh.
(1)
Jain, L. C.
(1)
Jones, Andy, 1952-
(1)
Kabay, M. E.
(1)
Kahn, Miriam (Miriam B.)
(1)
Kalali, Masoud.
(1)
Kappeler, Patrick.
(1)
Katsikas, Sokratis.
(1)
Kenyon, Brian.
(1)
Khan, Latifur.
(1)
Khnaser, Elias N.
(1)
Killion, Dave.
(1)
Kinney, Steven.
(1)
Kissell, Joe.
(1)
Kleidermacher, David.
(1)
Kleidermacher, Mike.
(1)
Kleiman, Dave.
(1)
Klein, Tobias.
(1)
Knop, J. V. (Jan V.)
(1)
Kolde, Jennifer.
(1)
Konheim, Alan G., 1934-
(1)
Kroner, George.
(1)
Krush, Waylon.
(1)
Kumar, Atul.
(1)
Lane, Patrick T.
(1)
Lang, Ulrich.
(1)
Lascu, Octavian.
(1)
Laykin, Erik.
(1)
Lee, Graham J.
(1)
Leman-Langlois, Stéphane, 1965-
(1)
Lin, Ching-Yung.
(1)
Lin, Herbert.
(1)
Liotine, Matthew.
(1)
Loshin, Pete.
(1)
Loshin, Peter.
(1)
Macaulay, Tyson.
(1)
Malin, Cameron H.
(1)
Mallett, Andrew.
(1)
Mao, Wenji.
(1)
Martin, Jason L.
(1)
Martínez-Ballesté, Antoni.
(1)
Masini, Luca.
(1)
Masud, Mehedy.
(1)
Mehan, Julie E.
(1)
Meine, Bill.
(1)
Meyer, Greg.
(1)
Miller, Charles Alfred.
(1)
Miller, Drew.
(1)
Mitchell, Chris.
(1)
Moeller, Robert R.
(1)
Morris, Greg.
(1)
Moulder, Patricia.
(1)
Mularien, Peter.
(1)
Musumeci, Guillermo.
(1)
NATO Advanced Research Workshop on Information Assurance and Computer Security (2005 : T?etouan, Morocco)
(1)
NATO Advanced Research Workshop on a Process for Developing a Common Vocabulary in the Information Security Area (2006 : Moscow, Russia)
(1)
Nahari, Hadi.
(1)
National Research Council (U.S.). Committee on Improving Cybersecurity Research in the United States.
(1)
National Research Council (U.S.). Computer Science and Telecommunications Board.
(1)
Nazario, Jose.
(1)
Neagu, Adrian.
(1)
Neucom, Ray.
(1)
Nordfelt, Michael.
(1)
Nordström, Kent.
(1)
Daha fazla
Tümünü genişlet
Daha az
Hepsini Daralt
Materyal Türü
Dahil
Hariç
E-Kitap
Dil
Dahil
Hariç
English
(196)
Yayın Yılı
Dahil
Hariç
-
2005
(23)
2013
(22)
2004
(21)
2012
(21)
2006
(16)
2003
(15)
2007
(15)
2010
(14)
2011
(13)
2008
(11)
2002
(10)
2001
(6)
2009
(5)
2000
(2)
1991
(1)
1997
(1)
Daha fazla
Tümünü genişlet
Daha az
Hepsini Daralt
Konu
Dahil
Hariç
Electronic books.
(196)
Computer networks -- Security measures.
(65)
Data protection.
(20)
Computer hackers.
(13)
Internet -- Security measures.
(13)
Cryptography.
(8)
Microsoft Windows (Computer file)
(7)
Database security.
(6)
Operating systems (Computers)
(6)
Computer crimes.
(5)
Data encryption (Computer science)
(5)
Information technology -- Security measures.
(5)
Business enterprises -- Computer networks -- Security measures.
(4)
Computer viruses.
(4)
Computers -- Access control.
(4)
Firewalls (Computer security)
(4)
Computer crimes -- Investigation.
(3)
Computer crimes -- Prevention.
(3)
Computer networks -- Access control.
(3)
Digital watermarking.
(3)
Embedded computer systems.
(3)
Malware (Computer software)
(3)
Microsoft Windows server.
(3)
World Wide Web -- Security measures.
(3)
Application software -- Security measures.
(2)
Business enterprises -- Security measures.
(2)
Citrix MetaFrame.
(2)
Client/server computing -- Security measures.
(2)
Client/server computing.
(2)
Cloud computing -- Security measures.
(2)
Computer crimes -- Investigation -- United States -- Methodology.
(2)
Computer science.
(2)
Computer software -- Development.
(2)
Computers -- Access control -- Passwords.
(2)
Cyberspace -- Security measures.
(2)
Data mining.
(2)
Debugging in computer science.
(2)
Directory services (Computer network technology)
(2)
Electronic commerce -- Security measures.
(2)
Electronic data processing departments -- Auditing.
(2)
Forensic sciences.
(2)
IBM software.
(2)
Internet -- Safety measures.
(2)
Internet and children.
(2)
Internet searching.
(2)
Linux.
(2)
Microsoft ISA server.
(2)
Microsoft Windows (Computer file) -- Security measures.
(2)
National security.
(2)
Privacy, Right of.
(2)
Python (Computer program language)
(2)
Reverse engineering.
(2)
Risk assessment.
(2)
SQL server.
(2)
Software configuration management.
(2)
Spyware (Computer software)
(2)
z/OS.
(2)
AIX (Computer file)
(1)
Acquisition of computer software.
(1)
Altre visioni. Solaris.
(1)
Application software.
(1)
Archives -- Safety measures.
(1)
Artificial intelligence.
(1)
Automatic machinery -- Security measures.
(1)
Avionics -- Safety measures.
(1)
BEA WebLogic server.
(1)
Bluetooth technology -- Security measures.
(1)
Browsers (Computer programs)
(1)
CORBA (Computer architecture)
(1)
Cloud computing.
(1)
Cocoa (Application development environment)
(1)
ColdFusion.
(1)
Commercial crimes.
(1)
Computer architecture.
(1)
Computer crimes -- Investigation -- United States.
(1)
Computer crimes -- Investments.
(1)
Computer hackers -- Fiction.
(1)
Computer network protocols.
(1)
Computer networks -- Certification.
(1)
Computer networks -- Design and construction.
(1)
Computer networks -- Planning.
(1)
Computer networks -- Reliability.
(1)
Computer networks -- Security measures -- United States.
(1)
Computer programming.
(1)
Computer security -- Fiction.
(1)
Computer security -- Forecasting.
(1)
Computer security -- United States.
(1)
Computer systems -- Reliability.
(1)
Computers -- Access control -- Standards.
(1)
Computers -- Reliability.
(1)
Corporations -- Corrupt practices.
(1)
Cryptography -- Standards.
(1)
Cyberterrorism -- Prevention.
(1)
Database design.
(1)
Distributed operating systems (Computers)
(1)
Educational technology -- Security measures.
(1)
Electronic data processing -- Backup processing alternatives.
(1)
Electronic data processing -- Distributed processing.
(1)
Electronic data processing departments -- Contracting out.
(1)
Electronic information resources -- Access control.
(1)
Electronic mail systems -- Security measures.
(1)
Electronic records -- Conservation and restoration.
(1)
Electronic records.
(1)
Electronic surveillance.
(1)
Emergency management -- Planning.
(1)
Fraud investigation.
(1)
Groupware (Computer software)
(1)
Hashing (Computer science)
(1)
Hewlett-Packard computers -- Security measures.
(1)
Human-computer interaction.
(1)
IBM Cluster systems management.
(1)
IBM Database 2.
(1)
IBM computers -- Programming.
(1)
IBM computers.
(1)
Industrial safety -- Management.
(1)
Information policy -- European Union countries.
(1)
Information technology -- Auditing.
(1)
Information technology -- Certification.
(1)
Information technology -- Management.
(1)
Information technology.
(1)
Information visualization.
(1)
Information warfare.
(1)
Instant messaging.
(1)
Intellectual property.
(1)
Internet programming.
(1)
Internet.
(1)
Intrusion detection systems (Computer security)
(1)
Java (Computer program language)
(1)
Languages, Artificial.
(1)
Libraries -- Safety measures.
(1)
Library information networks -- Security measures.
(1)
Mac OS.
(1)
Macintosh (Computer) -- Programming.
(1)
Management information systems.
(1)
Medical informatics.
(1)
Medical records -- Access control.
(1)
Medical records -- Data processing.
(1)
Microsoft Forefront.
(1)
Microsoft Windows (Computer file) -- Examinations -- Study guides.
(1)
Multimedia systems -- Security measures.
(1)
Narraciones solaris.
(1)
Online social networks.
(1)
Open source software.
(1)
Oracle (Computer file)
(1)
Oracle (Computer file) -- Handbooks, manuals, etc.
(1)
Peer-to-peer architecture (Computer networks)
(1)
Private security services.
(1)
Process control -- Security measures.
(1)
Programming (Mathematics)
(1)
Programming languages (Electronic computers)
(1)
Risk management.
(1)
SQL (Computer program language)
(1)
Scripting languages (Computer science)
(1)
Security systems.
(1)
Social engineering.
(1)
Social media.
(1)
Software engineering.
(1)
Software protection.
(1)
Spam filtering (Electronic mail)
(1)
Technology -- Research -- United States.
(1)
Visual perception.
(1)
Watermarks -- Data processing.
(1)
Web servers -- Security measures.
(1)
Web site development -- Security measures.
(1)
Web sites -- Design.
(1)
Web sites -- Security measures.
(1)
Wireless communication systems -- Security measures.
(1)
XML (Document markup language)
(1)
i5/OS.
(1)
Daha fazla
Tümünü genişlet
Daha az
Hepsini Daralt
Kütüphane
Dahil
Hariç
Başkent Kütüphanesi
Lokasyon
Dahil
Hariç
Ebook Central
false
{sortLabel}
{alphabetical}
{relevance}
{include}
{exclude}
{facetName}
{results}
{displayName}
{count}
{error}
Eylem Seç
Ayırt
Listelerime ekle
Eposta
Yazdır
196 sonuç bulundu
1
2
3
4
5
..
17
Sırala:
Konuyla İlgili Sırala
Yayın Yılı (eskiden yeniye)
Yayın Yılı (yeniden eskiye)
Başlık
Yazar
OK
Eposta Adresleri
:
Phone Number:
Mobile Carrier:
AT&T
Boost
Nextel (Sprint)
Sprint (PCS)
T Mobile
TracFone
US Cellular
Verizon
Virgin
Select An Item
Data usage warning: You will receive one text message for each title you selected.
Standard text messaging rates apply.
Text it to me
Text it to me, and go to next item
000000000000
DEFAULTTR
Liste seç
Geçici Liste
Bunu varsayılan liste yap.
Öğeler başarıyla eklendi
Öğeler eklenirken hata oldu. Lütfen tekrar deneyiniz.
Biohackers the politics of open science
1.
Biohackers the politics of open science
by
Delfanti, Alessandro.
Click to View
Format:
Investigative computer forensics the practical guide for lawyers, accountants, investigators, and business executives
2.
Investigative computer forensics the practical guide for lawyers, accountants, investigators, and business executives
by
Laykin, Erik.
Click to View
Format:
Technocrime, policing and surveillance
3.
Technocrime, policing and surveillance
by
Leman-Langlois, Stéphane, 1965-
Click to View
Format:
Information security risk assessment toolkit practical assessments through data collection and data analysis
4.
Information security risk assessment toolkit practical assessments through data collection and data analysis
by
Talabis, Mark Ryan N.
Click to View
Format:
Network intrusion analysis methodologies, tools, and techniques for incident analysis and response
5.
Network intrusion analysis methodologies, tools, and techniques for incident analysis and response
by
Fichera, Joe, 1966-
Click to View
Format:
Data hiding exposing concealed data in multimedia, operating systems, mobile devices, and network protocols
6.
Data hiding exposing concealed data in multimedia, operating systems, mobile devices, and network protocols
by
Raggo, Michael T.
Click to View
Format:
Violent Python a cookbook for hackers, forensic analysts, penetration testers and security engineers
7.
Violent Python a cookbook for hackers, forensic analysts, penetration testers and security engineers
by
O'Connor, T. J.
Click to View
Format:
Logging and log management the authoritative guide to understanding the concepts surrounding logging and log management
8.
Logging and log management the authoritative guide to understanding the concepts surrounding logging and log management
by
Chuvakin, Anton A.
Click to View
Format:
Intelligent systems for security informatics
9.
Intelligent systems for security informatics
by
Yang, Christopher.
Click to View
Format:
Cyber security for educational leaders a guide to understanding and implementing technology policies
10.
Cyber security for educational leaders a guide to understanding and implementing technology policies
by
Sianjina, Rayton R.
Click to View
Format:
Pragmatic security metrics applying metametrics to information security
11.
Pragmatic security metrics applying metametrics to information security
by
Brotby, W. Krag.
Click to View
Format:
Safety management for software-based equipment
12.
Safety management for software-based equipment
by
Boulanger, Jean-Louis.
Click to View
Format:
Eylem Seç
Ayırt
Listelerime ekle
Eposta
Yazdır
1
2
3
4
5
..
17
Search Results
Elektronik Kaynaklar
Search Results
Elektronik Kaynaklar
OK
Eposta Adresleri
:
Phone Number:
Mobile Carrier:
AT&T
Boost
Nextel (Sprint)
Sprint (PCS)
T Mobile
TracFone
US Cellular
Verizon
Virgin
Select An Item
Data usage warning: You will receive one text message for each title you selected.
Standard text messaging rates apply.
Text it to me
Text it to me, and go to next item
Elektronik Kaynaklar
Sonuçlar alınıyor Elektronik Kaynaklar...
action
Go to:
Search Results
|
Search Facets
|
Top of Page