Skip to:
Search Results
|
Bottom
|
Search Facets
|
Content
Giriş
|
Hesabım
|
Listelerim
|
|
Remember to clear the cache and close the browser window.
English
Search Limit
Bütün Kütüphaneler
Elektronik Kaynaklar
Hepsi
Başkent Üniversitesi Kütüphanesi
Anadolu OSB Meslek Yüksekokulu
Atasev Özel Koleksiyon
Erdoğan Tercan Koleksiyonu
Güzel Sanatlar ve Tasarım Arşivi
Kazan Meslek Yüksekokulu
Hukuk Koleksiyonu
Ord.Prof.Dr. Enver Ziya Karal Tarih Uygulama Ars.Mrk.
Özel Koleksiyon Serdar Özersin
Tez Koleksiyonu
Tüm Alanlar
Başlık
Yazar
Konu
ISBN
ISSN
13
Search Field
Tüm Alanlar
Arama:
Gelişmiş Arama
Search Results
Elektronik Kaynaklar
Arama Sonuçlarını Sınırlandır
Daraltılmış:
+
Language: English
+
Konu: Computer networks -- Security measures.
+
Konu: Internet -- Security measures.
Yazar
Dahil
Hariç
ProQuest (Firm)
(13)
Carvey, Harlan A.
(3)
Andress, Jason.
(1)
Bolt, Steven.
(1)
Carvey, Harlan A., author.
(1)
Cole, Eric.
(1)
Cruz, Maria Ines, designer.
(1)
Devost, Matthew G.
(1)
Ellis, Juanita.
(1)
Engel, Mary, author.
(1)
Erbschloe, Michael.
(1)
Fichera, Joe, 1966-
(1)
Flynn, Hal.
(1)
Gevers, Rickey, author.
(1)
Gilchrist, Alasdair, author.
(1)
Gonzalez, Deborah, author.
(1)
Haaster, Jelle van, author.
(1)
Hexmoor, Henry, author.
(1)
Hsu, D. Frank (Derbiau Frank), 1948- editor.
(1)
Katsaropoulos, Chris, editor.
(1)
Kolde, Jennifer.
(1)
Krutz, Ronald L.
(1)
Long, Johnny.
(1)
Marinucci, Dorothy, editor.
(1)
Messier, Ric, author.
(1)
Mowbray, Thomas J.
(1)
Nahari, Hadi.
(1)
National Research Council (U.S.). Committee on Information Systems Trustworthiness.
(1)
Oppliger, Rolf.
(1)
Penttinen, Jyrki T. J., author.
(1)
Rearick, Benjamin, project director.
(1)
Rogers, Russ.
(1)
Samayan, Malathi, project director.
(1)
Schneider, Fred B.
(1)
Shinder, Debra Littlejohn.
(1)
Shinder, Thomas W.
(1)
Speed, Tim.
(1)
Sprengers, Martijn, author.
(1)
Studholme, Alan, designer.
(1)
Traxler, Julie.
(1)
Ventre, Daniel.
(1)
Winterfeld, Steve.
(1)
Wunderlich, Holger.
(1)
Daha fazla
Tümünü genişlet
Daha az
Hepsini Daralt
Materyal Türü
Dahil
Hariç
E-Kitap
Yayın Yılı
Dahil
Hariç
-
2013
(5)
2003
(3)
2014
(3)
2017
(3)
2004
(2)
2006
(2)
2007
(2)
2012
(2)
2015
(2)
1999
(1)
2001
(1)
2005
(1)
2008
(1)
2009
(1)
2011
(1)
2016
(1)
Daha fazla
Tümünü genişlet
Daha az
Hepsini Daralt
Konu
Dahil
Hariç
Electronic books.
(31)
Computer security.
(13)
Computer crimes -- Investigation -- United States -- Methodology.
(4)
Microsoft Windows (Computer file) -- Security measures.
(4)
COMPUTERS -- Internet -- Security.
(3)
COMPUTERS -- Networking -- Security.
(3)
COMPUTERS -- Security -- General.
(3)
Cyberspace -- Security measures.
(2)
Cyberterrorism.
(2)
COMPUTERS -- Online Services.
(1)
COMPUTERS -- System Administration -- Storage & Retrieval.
(1)
Computer crimes -- Investigation -- United States.
(1)
Computer network protocols.
(1)
Computer networks -- Access control.
(1)
Cryptography.
(1)
Data encryption (Computer science)
(1)
Electrical & Computer Engineering.
(1)
Engineering & Applied Sciences.
(1)
Firewalls (Computer security)
(1)
Google.
(1)
Information warfare.
(1)
Internet -- Safety measures.
(1)
Internet -- Security measures -- Software.
(1)
Internet -- Social aspects.
(1)
Internet programming.
(1)
Intrusion detection systems (Computer security)
(1)
Java (Computer program language)
(1)
LAW -- Forensic Science.
(1)
Microsoft ISA server.
(1)
Microsoft Windows (Computer file)
(1)
Penetration testing (Computer security)
(1)
Security systems.
(1)
Software.
(1)
Technology -- Research -- United States.
(1)
Telecommunication policy -- United States.
(1)
Telecommunications.
(1)
United States.
(1)
Web search engines.
(1)
Web sites -- Design.
(1)
Wireless communication systems -- Security measures.
(1)
z/OS.
(1)
Daha fazla
Tümünü genişlet
Daha az
Hepsini Daralt
Kütüphane
Dahil
Hariç
Başkent Kütüphanesi
Lokasyon
Dahil
Hariç
Ebook Central
Elsevier E-Kitap Koleksiyonu
false
{sortLabel}
{alphabetical}
{relevance}
{include}
{exclude}
{facetName}
{results}
{displayName}
{count}
{error}
Eylem Seç
Ayırt
Listelerime ekle
Eposta
Yazdır
31 sonuç bulundu
1
2
3
Sırala:
Konuyla İlgili Sırala
Yayın Yılı (eskiden yeniye)
Yayın Yılı (yeniden eskiye)
Başlık
Yazar
OK
Eposta Adresleri
:
Phone Number:
Mobile Carrier:
AT&T
Boost
Nextel (Sprint)
Sprint (PCS)
T Mobile
TracFone
US Cellular
Verizon
Virgin
Select An Item
Data usage warning: You will receive one text message for each title you selected.
Standard text messaging rates apply.
Text it to me
Text it to me, and go to next item
000000000000
DEFAULTTR
Liste seç
Geçici Liste
Bunu varsayılan liste yap.
Öğeler başarıyla eklendi
Öğeler eklenirken hata oldu. Lütfen tekrar deneyiniz.
Network forensics
1.
Network forensics
by
Messier, Ric, author.
Click to View
Format:
Wireless communications security : solutions for the internet of things
2.
Wireless communications security : solutions for the internet of things
by
Penttinen, Jyrki T. J., author.
Click to View
Format:
IoT security issues
3.
IoT security issues
by
Gilchrist, Alasdair, author.
Click to View
Format:
Cyber guerilla
4.
Cyber guerilla
by
Haaster, Jelle van, author.
Click to View
Format:
Computational network science : an algorithmic approach
5.
Computational network science : an algorithmic approach
by
Hexmoor, Henry, author.
Click to View
Format:
Managing online risk : apps, mobile, and social media security
6.
Managing online risk : apps, mobile, and social media security
by
Gonzalez, Deborah, author.
Click to View
Format:
Windows forensic analysis toolkit : advanced analysis techniques for Windows 8
7.
Windows forensic analysis toolkit : advanced analysis techniques for Windows 8
by
Carvey, Harlan A., author.
Click to View
Format:
Procuring penetration testing services.
8.
Procuring penetration testing services.
Click to View
Format:
Cybersecurity : managing systems, conducting testing, and investigating intrusions
9.
Cybersecurity : managing systems, conducting testing, and investigating intrusions
by
Mowbray, Thomas J.
Click to View
Format:
Network intrusion analysis methodologies, tools, and techniques for incident analysis and response
10.
Network intrusion analysis methodologies, tools, and techniques for incident analysis and response
by
Fichera, Joe, 1966-
Click to View
Format:
Advanced persistent threat understanding the danger and how to protect your organization
11.
Advanced persistent threat understanding the danger and how to protect your organization
by
Cole, Eric.
Click to View
Format:
The basics of cyber warfare understanding the fundamentals of cyber warfare in theory and practice
12.
The basics of cyber warfare understanding the fundamentals of cyber warfare in theory and practice
by
Winterfeld, Steve.
Click to View
Format:
Eylem Seç
Ayırt
Listelerime ekle
Eposta
Yazdır
1
2
3
Search Results
Elektronik Kaynaklar
Search Results
Elektronik Kaynaklar
OK
Eposta Adresleri
:
Phone Number:
Mobile Carrier:
AT&T
Boost
Nextel (Sprint)
Sprint (PCS)
T Mobile
TracFone
US Cellular
Verizon
Virgin
Select An Item
Data usage warning: You will receive one text message for each title you selected.
Standard text messaging rates apply.
Text it to me
Text it to me, and go to next item
Elektronik Kaynaklar
Sonuçlar alınıyor Elektronik Kaynaklar...
action
Go to:
Search Results
|
Search Facets
|
Top of Page