Skip to:
Search Results
|
Bottom
|
Search Facets
|
Content
Giriş
|
Hesabım
|
Listelerim
|
|
Remember to clear the cache and close the browser window.
English
Search Limit
Bütün Kütüphaneler
Elektronik Kaynaklar
Hepsi
Başkent Üniversitesi Kütüphanesi
Anadolu OSB Meslek Yüksekokulu
Atasev Özel Koleksiyon
Erdoğan Tercan Koleksiyonu
Güzel Sanatlar ve Tasarım Arşivi
Kazan Meslek Yüksekokulu
Hukuk Koleksiyonu
Ord.Prof.Dr. Enver Ziya Karal Tarih Uygulama Ars.Mrk.
Özel Koleksiyon Serdar Özersin
Tez Koleksiyonu
Tüm Alanlar
Başlık
Yazar
Konu
ISBN
ISSN
13
Search Field
Tüm Alanlar
Arama:
Gelişmiş Arama
Search Results
Elektronik Kaynaklar
Arama Sonuçlarını Sınırlandır
Daraltılmış:
+
Language: English
+
Yayın Yılı: 2008
+
Konu: Computer security.
+
Konu: Electronic books.
Yazar
Dahil
Hariç
ProQuest (Firm)
(11)
Cox, I. J. (Ingemar J.)
(2)
Long, Johnny.
(2)
Qian, Yi, 1962-
(2)
Stapko, Timothy John.
(2)
Alexander, Philip, 1963-
(1)
Anzaldua, Reynaldo.
(1)
Aquilina, James M.
(1)
Baccas, Paul.
(1)
Baskerville, Richard.
(1)
Bin Azad, Tariq.
(1)
Bonnell, Ralph.
(1)
Bray, Rory.
(1)
Casey, Eoghan.
(1)
Cid, Daniel.
(1)
Clark, Champ, III.
(1)
Cross, Michael, 1965-
(1)
Dai, Yuan-Shun.
(1)
DeMott, Jared.
(1)
Erickson, Jon, 1977-
(1)
Finisterre, Kevin.
(1)
Furnell, Steven, 1970-
(1)
Goodman, Seymour E.
(1)
Hay, Andrew.
(1)
Malin, Cameron H.
(1)
Miller, Charles Alfred.
(1)
Mitnick, Kevin D. (Kevin David), 1963-
(1)
Pan, Yi, 1960-
(1)
Shinder, Debra Littlejohn. Scene of the cybercrime.
(1)
Straub, Detmar W.
(1)
Takanen, Ari.
(1)
Varsalone, Jesse.
(1)
Volonino, Linda.
(1)
Wilson, Connie.
(1)
Wright., Michael.
(1)
Ye, Nong.
(1)
Zou, Xukai, 1963-
(1)
Daha fazla
Tümünü genişlet
Daha az
Hepsini Daralt
Materyal Türü
Dahil
Hariç
E-Kitap
Konu
Dahil
Hariç
Computer networks -- Security measures.
(13)
COMPUTERS -- Internet -- Security.
(10)
COMPUTERS -- Networking -- Security.
(10)
COMPUTERS -- Security -- General.
(10)
Data protection.
(5)
Computer crimes -- Investigation.
(2)
Computer networks -- Reliability.
(2)
Digital watermarking.
(2)
Embedded computer systems.
(2)
Business enterprises -- Computer networks -- Security measures.
(1)
COMPUTERS -- Hardware -- Handheld Devices.
(1)
COMPUTERS -- Hardware -- Personal Computers -- General.
(1)
COMPUTERS -- Microprocessors.
(1)
COMPUTERS -- Online Services.
(1)
COMPUTERS -- Operating Systems -- General.
(1)
COMPUTERS -- Security -- Viruses.
(1)
COMPUTERS -- System Administration -- Storage & Retrieval.
(1)
Citrix MetaFrame.
(1)
Client/server computing -- Security measures.
(1)
Computer crimes.
(1)
Computer hackers.
(1)
Computer networks -- Design and construction.
(1)
Computer networks.
(1)
Computer software -- Development.
(1)
Computer viruses -- Identification.
(1)
Computer viruses.
(1)
Computers -- Access control.
(1)
Data encryption (Computer science)
(1)
Database security.
(1)
Electronic book.
(1)
Field guides.
(1)
Firewalls (Computer security)
(1)
Forensic sciences.
(1)
Google.
(1)
Groupware (Computer software)
(1)
Hackers.
(1)
Information technology -- Security measures.
(1)
Internet -- Security measures.
(1)
Internet programming.
(1)
Mac OS.
(1)
Microsoft Windows (Computer file)
(1)
Microsoft Windows server.
(1)
OSSEC (Computer file)
(1)
Telecommunication -- Security measures.
(1)
Web search engines.
(1)
Daha fazla
Tümünü genişlet
Daha az
Hepsini Daralt
Kütüphane
Dahil
Hariç
Başkent Kütüphanesi
Lokasyon
Dahil
Hariç
Ebook Central
Elsevier E-Kitap Koleksiyonu
false
{sortLabel}
{alphabetical}
{relevance}
{include}
{exclude}
{facetName}
{results}
{displayName}
{count}
{error}
Eylem Seç
Ayırt
Listelerime ekle
Eposta
Yazdır
25 sonuç bulundu
1
2
3
Sırala:
Konuyla İlgili Sırala
Yayın Yılı (eskiden yeniye)
Yayın Yılı (yeniden eskiye)
Başlık
Yazar
OK
Eposta Adresleri
:
Phone Number:
Mobile Carrier:
AT&T
Boost
Nextel (Sprint)
Sprint (PCS)
T Mobile
TracFone
US Cellular
Verizon
Virgin
Select An Item
Data usage warning: You will receive one text message for each title you selected.
Standard text messaging rates apply.
Text it to me
Text it to me, and go to next item
000000000000
DEFAULTTR
Liste seç
Geçici Liste
Bunu varsayılan liste yap.
Öğeler başarıyla eklendi
Öğeler eklenirken hata oldu. Lütfen tekrar deneyiniz.
Hacking the art of exploitation
1.
Hacking the art of exploitation
by
Erickson, Jon, 1977-
Click to View
Format:
Digital watermarking and steganography
2.
Digital watermarking and steganography
by
Cox, I. J. (Ingemar J.)
Click to View
Format:
Information assurance dependability and security in networked systems
3.
Information assurance dependability and security in networked systems
by
Qian, Yi, 1962-
Click to View
Format:
Information security a manager's guide to thwarting data thieves and hackers
4.
Information security a manager's guide to thwarting data thieves and hackers
by
Alexander, Philip, 1963-
Click to View
Format:
Secure computer and network systems modeling, analysis and design
5.
Secure computer and network systems modeling, analysis and design
by
Ye, Nong.
Click to View
Format:
Practical embedded security building secure resource-constrained systems
6.
Practical embedded security building secure resource-constrained systems
by
Stapko, Timothy John.
Click to View
Format:
Trust and security in collaborative computing
7.
Trust and security in collaborative computing
by
Zou, Xukai, 1963-
Click to View
Format:
Securing information and communications systems principles, technologies, and applications
8.
Securing information and communications systems principles, technologies, and applications
by
Furnell, Steven, 1970-
Click to View
Format:
Fuzzing for software security testing and quality assurance
9.
Fuzzing for software security testing and quality assurance
by
Takanen, Ari.
Click to View
Format:
Information security policy, processes, and practices
10.
Information security policy, processes, and practices
by
Straub, Detmar W.
Click to View
Format:
Computer forensics for dummies
11.
Computer forensics for dummies
by
Volonino, Linda.
Click to View
Format:
Google hacking for penetration testers. Volume 2
12.
Google hacking for penetration testers. Volume 2
by
Long, Johnny.
ScienceDirect
https://www.sciencedirect.com/science/book/9781597491761
Format:
Eylem Seç
Ayırt
Listelerime ekle
Eposta
Yazdır
1
2
3
Search Results
Elektronik Kaynaklar
Search Results
Elektronik Kaynaklar
OK
Eposta Adresleri
:
Phone Number:
Mobile Carrier:
AT&T
Boost
Nextel (Sprint)
Sprint (PCS)
T Mobile
TracFone
US Cellular
Verizon
Virgin
Select An Item
Data usage warning: You will receive one text message for each title you selected.
Standard text messaging rates apply.
Text it to me
Text it to me, and go to next item
Elektronik Kaynaklar
Sonuçlar alınıyor Elektronik Kaynaklar...
action
Go to:
Search Results
|
Search Facets
|
Top of Page