Skip to:
Search Results
|
Bottom
|
Search Facets
|
Content
Giriş
|
Hesabım
|
Listelerim
|
|
Remember to clear the cache and close the browser window.
English
Search Limit
Bütün Kütüphaneler
Elektronik Kaynaklar
Hepsi
Başkent Üniversitesi Kütüphanesi
Anadolu OSB Meslek Yüksekokulu
Atasev Özel Koleksiyon
Erdoğan Tercan Koleksiyonu
Güzel Sanatlar ve Tasarım Arşivi
Kazan Meslek Yüksekokulu
Hukuk Koleksiyonu
Ord.Prof.Dr. Enver Ziya Karal Tarih Uygulama Ars.Mrk.
Özel Koleksiyon Serdar Özersin
Tez Koleksiyonu
Tüm Alanlar
Başlık
Yazar
Konu
ISBN
ISSN
13
Search Field
Tüm Alanlar
Arama:
Gelişmiş Arama
Search Results
Elektronik Kaynaklar
Arama Sonuçlarını Sınırlandır
Daraltılmış:
+
Language: English
+
Kütüphane: Başkent Kütüphanesi
+
Konu: Computer security.
+
Konu: Computers -- Access control.
Yazar
Dahil
Hariç
ProQuest (Firm)
(4)
Buchanan, Cameron, author.
(3)
Chandramouli, Ramaswamy.
(2)
Ferraiolo, David.
(2)
Kuhn, D. Richard.
(2)
Ramachandran, Vivek, author.
(2)
Baker, Andrew R.
(1)
Beale, Jay.
(1)
Cherry, Denny.
(1)
Clark, Champ, III.
(1)
Esler, Joel.
(1)
Hixon, Michael, author.
(1)
Hutchens, Justin, author.
(1)
Kane, Greg.
(1)
Kaufman, Charlie.
(1)
Koppel, Lorna.
(1)
Kumar, Atul.
(1)
LaRock, Thomas.
(1)
Long, Johnny.
(1)
Metula, Erez.
(1)
Mjølsnes, Stig F., author.
(1)
Perlman, Radia, joint author
(1)
Simonis, Drew.
(1)
Spasovski, Martin.
(1)
Speciner, Mike, joint author
(1)
Zhang, Rui.
(1)
Daha fazla
Tümünü genişlet
Daha az
Hepsini Daralt
Materyal Türü
Dahil
Hariç
E-Kitap
Kitap
Yayın Yılı
Dahil
Hariç
-
2002
(2)
2007
(2)
2010
(2)
2013
(2)
2014
(2)
2017
(2)
2003
(1)
2006
(1)
2008
(1)
2011
(1)
2012
(1)
2015
(1)
Daha fazla
Tümünü genişlet
Daha az
Hepsini Daralt
Konu
Dahil
Hariç
Electronic books.
(17)
Computer networks -- Security measures.
(7)
Database security.
(4)
COMPUTERS -- Internet -- Security.
(3)
COMPUTERS -- Networking -- Security.
(3)
COMPUTERS -- Security -- General.
(3)
Computer networks -- Access control.
(2)
Data protection.
(2)
Bilgisayar güvenliği.
(1)
Bilgisayarlar -- Erişim kontrolü.
(1)
Business planning.
(1)
Common Language Runtime.
(1)
Confidential business information.
(1)
Data encryption (Computer science)
(1)
Electronic information resources -- Access control.
(1)
Information storage and retrieval systems -- Business -- Security measures.
(1)
Multidisciplinary design optimization.
(1)
Open source software.
(1)
Oracle (Computer file)
(1)
Risk management.
(1)
Rootkits (Computer software)
(1)
Snort (Computer file)
(1)
Telecommunication -- Security measures.
(1)
Virtual computer systems -- Security measures.
(1)
Web servers -- Security measures.
(1)
Daha fazla
Tümünü genişlet
Daha az
Hepsini Daralt
Lokasyon
Dahil
Hariç
Ebook Central
Elsevier E-Kitap Koleksiyonu
Merkez Kütüphane
false
{sortLabel}
{alphabetical}
{relevance}
{include}
{exclude}
{facetName}
{results}
{displayName}
{count}
{error}
Eylem Seç
Ayırt
Listelerime ekle
Eposta
Yazdır
18 sonuç bulundu
1
2
Sırala:
Konuyla İlgili Sırala
Yayın Yılı (eskiden yeniye)
Yayın Yılı (yeniden eskiye)
Başlık
Yazar
OK
Eposta Adresleri
:
Phone Number:
Mobile Carrier:
AT&T
Boost
Nextel (Sprint)
Sprint (PCS)
T Mobile
TracFone
US Cellular
Verizon
Virgin
Select An Item
Data usage warning: You will receive one text message for each title you selected.
Standard text messaging rates apply.
Text it to me
Text it to me, and go to next item
000000000000
DEFAULTTR
Liste seç
Geçici Liste
Bunu varsayılan liste yap.
Öğeler başarıyla eklendi
Öğeler eklenirken hata oldu. Lütfen tekrar deneyiniz.
Kali Linux wireless penetration testing : beginner's guide : master wireless testing techniques to survey and attack wireless networks with Kali Linux, including the KRACK attack
1.
Kali Linux wireless penetration testing : beginner's guide : master wireless testing techniques to survey and attack wireless networks with Kali Linux, including the KRACK attack
by
Buchanan, Cameron, author.
Click to View
Format:
Kali Linux network scanning cookbook : take your penetration-testing skills to the next level
2.
Kali Linux network scanning cookbook : take your penetration-testing skills to the next level
by
Hixon, Michael, author.
Click to View
Format:
Kali Linux wireless penetration testing beginner's guide : master wireless testing techniques to survey and attack wireless networks with Kali Linux
3.
Kali Linux wireless penetration testing beginner's guide : master wireless testing techniques to survey and attack wireless networks with Kali Linux
by
Ramachandran, Vivek, author.
Click to View
Format:
Kali Linux CTF Blueprints : build, test, and customize your own Capture the Flag challenges across multiple platforms designed to be attacked with Kali Linux
4.
Kali Linux CTF Blueprints : build, test, and customize your own Capture the Flag challenges across multiple platforms designed to be attacked with Kali Linux
by
Buchanan, Cameron, author.
Click to View
Format:
The basics of digital privacy : simple tools to protect your personal information and your identity online
5.
The basics of digital privacy : simple tools to protect your personal information and your identity online
by
Cherry, Denny.
Click to View
Format:
OAuth 2.0 identity and access management patterns
6.
OAuth 2.0 identity and access management patterns
by
Spasovski, Martin.
Click to View
Format:
Information protection playbook
7.
Information protection playbook
by
Kane, Greg.
Click to View
Format:
A multidisciplinary introduction to information security
8.
A multidisciplinary introduction to information security
by
Mjølsnes, Stig F., author.
Click to View
Format:
Oracle Identity and Access Manager 11g for administrators administer Oracle Identity and Access Management: installation, configuration, and day-to-day tasks
9.
Oracle Identity and Access Manager 11g for administrators administer Oracle Identity and Access Management: installation, configuration, and day-to-day tasks
by
Kumar, Atul.
Click to View
Format:
Relation based access control
10.
Relation based access control
by
Zhang, Rui.
Click to View
Format:
Managed code rootkits : hooking into runtime environments
11.
Managed code rootkits : hooking into runtime environments
by
Metula, Erez.
ScienceDirect
http://www.sciencedirect.com/science/book/9781597495745
Format:
Infosecurity 2008 threat analysis
12.
Infosecurity 2008 threat analysis
by
Clark, Champ, III.
ScienceDirect
https://www.sciencedirect.com/science/book/9781597492249
Format:
Eylem Seç
Ayırt
Listelerime ekle
Eposta
Yazdır
1
2
Search Results
Elektronik Kaynaklar
Search Results
Elektronik Kaynaklar
OK
Eposta Adresleri
:
Phone Number:
Mobile Carrier:
AT&T
Boost
Nextel (Sprint)
Sprint (PCS)
T Mobile
TracFone
US Cellular
Verizon
Virgin
Select An Item
Data usage warning: You will receive one text message for each title you selected.
Standard text messaging rates apply.
Text it to me
Text it to me, and go to next item
Elektronik Kaynaklar
Sonuçlar alınıyor Elektronik Kaynaklar...
action
Go to:
Search Results
|
Search Facets
|
Top of Page