Skip to:
Search Results
|
Bottom
|
Search Facets
|
Content
Giriş
|
Hesabım
|
Listelerim
|
|
Remember to clear the cache and close the browser window.
English
Search Limit
Bütün Kütüphaneler
Elektronik Kaynaklar
Hepsi
Başkent Üniversitesi Kütüphanesi
Anadolu OSB Meslek Yüksekokulu
Atasev Özel Koleksiyon
Erdoğan Tercan Koleksiyonu
Güzel Sanatlar ve Tasarım Arşivi
Kazan Meslek Yüksekokulu
Hukuk Koleksiyonu
Ord.Prof.Dr. Enver Ziya Karal Tarih Uygulama Ars.Mrk.
Özel Koleksiyon Serdar Özersin
Tez Koleksiyonu
Tüm Alanlar
Başlık
Yazar
Konu
ISBN
ISSN
13
Search Field
Tüm Alanlar
Arama:
Gelişmiş Arama
Search Results
Elektronik Kaynaklar
Arama Sonuçlarını Sınırlandır
Daraltılmış:
+
Library: Başkent Kütüphanesi
+
Konu: Computer networks -- Security measures.
+
Konu: Computer security.
Yazar
Dahil
Hariç
ProQuest (Firm)
(65)
Beale, Jay.
(4)
Foster, James C.
(4)
Hunter, Laura E.
(4)
Carvey, Harlan A.
(3)
Limbert, Matthew, designer.
(3)
Long, Johnny.
(3)
Rittinghouse, John W.
(3)
Wiles, Jack.
(3)
Winkler, J. R. (Joachim R.)
(3)
Amini, Rob.
(2)
Andress, Jason.
(2)
Caswell, Brian.
(2)
Cole, Eric.
(2)
Contos, Brian T.
(2)
Cross, Michael, 1965-
(2)
Erickson, Jon, 1977-
(2)
Grasdal, Martin.
(2)
Hancock, Bill, 1957-
(2)
Henmi, Anne.
(2)
Katsaropoulos, Chris, editor.
(2)
Meyer, Greg.
(2)
Parker, Tom.
(2)
Potter, Bruce.
(2)
Qian, Yi, 1962-
(2)
Ramirez, Gilbert.
(2)
Rash, Michael.
(2)
Ring, Sandra.
(2)
Sachs, Marcus H.
(2)
Shimonski, Robert.
(2)
Shinder, Debra Littlejohn.
(2)
Shinder, Thomas W.
(2)
Stapko, Timothy John.
(2)
Todd, Chad.
(2)
Vacca, John R.
(2)
Wotring, Brian.
(2)
Zalewski, Michal.
(2)
Ablon, Lillian, author.
(1)
Ahmad, David R. Mirza.
(1)
Alcover, Jorge Blanco.
(1)
Alder, Raven.
(1)
American Evaluation Association.
(1)
Anderson, Brian (Brian James)
(1)
Andress, Jason, author.
(1)
Andrés, Steven.
(1)
Archibald, Neil.
(1)
Assam, Tarek.
(1)
Baker, Andrew R.
(1)
Barnett, Ryan C.
(1)
Baskin, Brian, author.
(1)
Beaver, Kevin.
(1)
Ben-Ari, Erez.
(1)
Bennett, Eleanor Leonne, cover designer.
(1)
Bertino, Elisa.
(1)
Bhalla, Nish.
(1)
Bhardwaj, Pawan K.
(1)
Bianco, David J., 1971-
(1)
Blair, John, author.
(1)
Bolt, Steven.
(1)
Bray, Rory.
(1)
Buchanan, Cameron, author.
(1)
Burke, Josh.
(1)
Burnett, Mark (Mark M.)
(1)
Burton, James.
(1)
Canlı, Mustafa
(1)
Carbone, Fernando, author.
(1)
Cardwell, Kevin, author.
(1)
Carvey, Harlan A., author.
(1)
Carvey, Harlan, author.
(1)
Carvey, Harlan.
(1)
Casco, Steven.
(1)
Chapman, Chris, author.
(1)
Cherry, Denny.
(1)
Cid, Daniel.
(1)
Clark, Gregory, author.
(1)
Clarke, Justin.
(1)
Conti, Greg.
(1)
Cook, Randy (Randy R.)
(1)
Cross, Michael.
(1)
Cruz, Maria Ines, designer.
(1)
D'Arcy, John P., 1975-
(1)
Dai, Yuan-Shun.
(1)
Dattani, Dinesh D.
(1)
DeMott, Jared.
(1)
Delfanti, Alessandro.
(1)
Deraison, Renaud.
(1)
Devost, Matthew G.
(1)
Dolev, Ran.
(1)
Donaldson, Scott E., author.
(1)
Dubrawsky, Ido.
(1)
Ellis, Juanita.
(1)
Ely, Adam.
(1)
Erbschloe, Michael.
(1)
Esler, Joel.
(1)
Evergreen, Stephanie.
(1)
Ficco, Massimo, editor.
(1)
Fichera, Joe, 1966-
(1)
Fowler, Kevvie, author.
(1)
Franco, Pedro, author.
(1)
Fuller, Ed.
(1)
Furnell, Steve, editor.
(1)
Furnell, Steven, 1970-
(1)
Gallo, Timonthy, editor.
(1)
Gantz, Stephen D.
(1)
Gavrilenko, K., author.
(1)
Ginodman, Veniamin, editor.
(1)
Gomzin, Slava.
(1)
Goodman, Seymour E.
(1)
Gregg, Michael (Michael C.)
(1)
Guerrier, Claudine, author.
(1)
Haines, Brad.
(1)
Hathaway, Melissa E., editor of compilation.
(1)
Hay, Andrew.
(1)
Heinen, Neils.
(1)
Herkanaidu, Ram, editor.
(1)
Hexmoor, Henry, author.
(1)
Huseby, Sverre H.
(1)
Hutchens, Justin, author.
(1)
Jaatun, Martin Gilje, editor.
(1)
Johnson, Norris L.
(1)
Jordan, Brittney, contributor.
(1)
Kane, Greg.
(1)
Kenyon, Brian.
(1)
Khan, Latifur.
(1)
Khnaser, Elias N.
(1)
Kissell, Joe.
(1)
Kolde, Jennifer.
(1)
Koppel, Lorna.
(1)
Krutz, Ronald L.
(1)
Kumar, Atul.
(1)
LaRock, Thomas.
(1)
Lee, Stefano Kewan, author.
(1)
Leibrock, Larry, editor.
(1)
Li, Qing, author.
(1)
Libicki, Martin C., author.
(1)
Lin, Herbert.
(1)
Liska, Allan, author.
(1)
Liu, Dale.
(1)
Loshin, Peter.
(1)
Lynch, F. William.
(1)
Martin, Brian, editor.
(1)
Maske, Steve.
(1)
Masud, Mehedy.
(1)
Maynor, David.
(1)
Meine, Bill.
(1)
Michajlowski, A., author.
(1)
Miles, Wyman.
(1)
Miller, Charles Alfred.
(1)
Mitchell, Ed, 1945-
(1)
Mjølsnes, Stig F., author.
(1)
Moeller, Robert R.
(1)
Morris, Greg.
(1)
Moskowitz, Sanford, author.
(1)
Nahari, Hadi.
(1)
National Research Council (U.S.). Committee on Improving Cybersecurity Research in the United States.
(1)
Nazario, Jose.
(1)
Obelets, Natalya, editor.
(1)
Orebaugh, Angela.
(1)
Osipov, Vitaly.
(1)
Palmieri, Francesco, editor.
(1)
Pan, Yi, 1960-
(1)
Pandey, Abhishek, cover designer.
(1)
Perez, Richard, 1969 October 17-
(1)
Piccard, Paul L.
(1)
Poole, Owen.
(1)
Posluns, Jeffrey.
(1)
Ransome, James F.
(1)
Rathaus, Noam.
(1)
Rearick, Benjamin, project director.
(1)
Rispoli, Mike, editor.
(1)
Rogers, Russ.
(1)
Rose, Curtis, editor.
(1)
Rossberg, Michael, author.
(1)
Russell, Ryan, 1969-
(1)
Samayan, Malathi, project director.
(1)
Sanders, Chris, 1986-
(1)
Schiller, Craig A.
(1)
Schäfer, Günter, author.
(1)
Shavers, Brett, author.
(1)
Shein, Rob.
(1)
Shema, Mike.
(1)
Shinder, Debra Littlejohn, author.
(1)
Shinder, Debra Littlejohn. Scene of the cybercrime.
(1)
Shinder, Dr. Thomas W.
(1)
Shostack, Adam.
(1)
Siegel, Stanley G., author.
(1)
Simić, Daniela, author.
(1)
Sims, Kristin, author.
(1)
Smith, Jason (Adjunct associate professor)
(1)
Solomon, Michael R.
(1)
Speed, Tim.
(1)
Stefanek, George L.
(1)
Stowe, Geoffrey, author.
(1)
Strebe, Matthew.
(1)
Street, Jayson E., author.
(1)
Sullivant, John, author.
(1)
Sumner, Stuart, author.
(1)
Takahashi, Kenji.
(1)
Takanen, Ari.
(1)
Thuraisingham, Bhavani M.
(1)
Daha fazla
Tümünü genişlet
Daha az
Hepsini Daralt
Materyal Türü
Dahil
Hariç
E-Kitap
Kitap
Dil
Dahil
Hariç
English
(155)
German
(1)
Turkish
(1)
Yayın Yılı
Dahil
Hariç
-
2014
(15)
2004
(14)
2007
(13)
2008
(13)
2006
(12)
2011
(12)
2003
(11)
2005
(10)
2016
(10)
2013
(9)
2015
(7)
2002
(6)
2010
(6)
2012
(6)
2001
(5)
2018
(3)
2009
(2)
2017
(2)
2019
(1)
Daha fazla
Tümünü genişlet
Daha az
Hepsini Daralt
Konu
Dahil
Hariç
Electronic books.
(156)
COMPUTERS -- Internet -- Security.
(32)
COMPUTERS -- Networking -- Security.
(32)
COMPUTERS -- Security -- General.
(32)
Internet -- Security measures.
(13)
Computer hackers.
(10)
Computers -- Access control.
(7)
Microsoft Windows (Computer file)
(7)
Computer crimes -- Prevention.
(6)
Computer crimes -- Investigation.
(5)
Operating systems (Computers)
(5)
Computer crimes -- Investigation -- United States -- Methodology.
(4)
Cyberterrorism -- Prevention.
(4)
Data encryption (Computer science)
(4)
Database security.
(4)
Forensic sciences.
(4)
Hackers.
(4)
Microsoft Windows (Computer file) -- Security measures.
(4)
Cloud computing.
(3)
Computer crimes.
(3)
Computer networks -- Access control.
(3)
Computer science.
(3)
Computer viruses.
(3)
Data protection.
(3)
Firewalls (Computer security)
(3)
Information resources management.
(3)
Microsoft Windows server.
(3)
Security systems.
(3)
Web servers -- Security measures.
(3)
Web sites -- Security measures.
(3)
Andre fag (naturvidenskab og teknik) Andre fag
(2)
Application software -- Security measures.
(2)
Business enterprises -- Computer networks -- Security measures.
(2)
ColdFusion.
(2)
Computer networks -- Reliability.
(2)
Computer networks.
(2)
Computercriminaliteit.
(2)
Cyberterrorism.
(2)
Electronic information resources -- Access control.
(2)
Embedded computer systems.
(2)
Engineering & Applied Sciences.
(2)
Information technology -- Auditing.
(2)
Information technology -- Security measures.
(2)
Information visualization.
(2)
Intrusion detection systems (Computer security)
(2)
LAW -- Forensic Science.
(2)
Microsoft ISA server.
(2)
Open source software.
(2)
Réseaux d'ordinateurs -- Sécurité -- Mesures.
(2)
Wireless communication systems -- Security measures.
(2)
World Wide Web -- Security measures.
(2)
Agents intelligents (Logiciels)
(1)
BUSINESS & ECONOMICS -- Corporate Governance.
(1)
BUSINESS & ECONOMICS -- Leadership.
(1)
BUSINESS & ECONOMICS -- Organizational Development.
(1)
BUSINESS & ECONOMICS -- Workplace Culture.
(1)
Bilgisayar ağları -- Güvenlik önlemleri.
(1)
Bilgisayar güvenliği.
(1)
Browsers (Computer programs)
(1)
Business planning.
(1)
COMPUTERS -- Digital Media -- General.
(1)
COMPUTERS -- Hardware -- Handheld Devices.
(1)
COMPUTERS -- Hardware -- Personal Computers -- General.
(1)
COMPUTERS -- Interactive & Multimedia.
(1)
COMPUTERS -- Microprocessors.
(1)
COMPUTERS -- Online Services.
(1)
COMPUTERS -- Operating Systems -- DOS.
(1)
COMPUTERS -- Operating Systems -- Macintosh.
(1)
COMPUTERS -- Operating Systems -- Windows Server & NT.
(1)
COMPUTERS -- Operating Systems -- Windows Workstation.
(1)
COMPUTERS -- Security -- Cryptography.
(1)
COMPUTERS -- Security -- Networking.
(1)
COMPUTERS -- System Administration -- Storage & Retrieval.
(1)
COMPUTERS -- System Administration -- Windows Administration.
(1)
COMPUTERS -- Web -- Site Design.
(1)
COMPUTERS -- Web -- User Generated Content.
(1)
Cloud computing -- Security measures.
(1)
Commercial crimes.
(1)
Component software.
(1)
Computer Science.
(1)
Computer crimes -- Case studies.
(1)
Computer crimes -- Investigation -- Handbooks, manuals, etc.
(1)
Computer crimes -- Investigation -- Methodology.
(1)
Computer crimes -- Investigation -- United States.
(1)
Computer crimes -- Investments.
(1)
Computer network protocols.
(1)
Computer networks -- Design and construction.
(1)
Computer networks -- Security measures -- Fiction.
(1)
Computer networks -- Security measures -- Handbooks, manuals, etc.
(1)
Computer networks -- Security measures -- United States.
(1)
Computer security -- Fiction.
(1)
Computer security -- Handbooks, manuals, etc.
(1)
Computer security -- United States.
(1)
Computer software -- Development.
(1)
Computerbeveiliging.
(1)
Computersicherheit
(1)
Confidential business information.
(1)
Corporate culture.
(1)
Corporations -- Security measures.
(1)
Criminalistiek.
(1)
Cryptography.
(1)
Cyberinfrastructure -- Security measures.
(1)
Data mining.
(1)
Database design.
(1)
Electrical & Computer Engineering.
(1)
Electronic book.
(1)
Electronic data processing departments -- Auditing.
(1)
FICTION -- General.
(1)
Fiction.
(1)
Forensic sciences -- Handbooks, manuals, etc.
(1)
Google.
(1)
Groupware (Computer software)
(1)
Hackers -- Fiction.
(1)
Hacking.
(1)
Handbooks and manuals.
(1)
Industries -- Security measures.
(1)
Information storage and retrieval systems -- Business -- Security measures.
(1)
Instant messaging.
(1)
Internet domain names.
(1)
Internet programming.
(1)
Mac OS.
(1)
Macintosh (Computer) -- Programming.
(1)
Malware (Computer software) -- Prevention.
(1)
Microsoft Windows (Computer file) -- Examinations -- Study guides.
(1)
Microsoft Windows.
(1)
Multidisciplinary design optimization.
(1)
OSSEC (Computer file)
(1)
Online social networks -- Security measures.
(1)
Open source intelligence.
(1)
Operations systems (Computer)
(1)
Oracle (Computer file)
(1)
Peer-to-peer architecture (Computer networks)
(1)
Penetration testing (Computer security)
(1)
Risk management.
(1)
Réseaux d'ordinateurs.
(1)
SQL (Computer program language)
(1)
Sites Web -- Sécurité -- Mesures.
(1)
Situational awareness.
(1)
Snort (Computer file)
(1)
Snort (Software)
(1)
Snort 2.0
(1)
Solaris (Computer file)
(1)
Systèmes informatiques -- Sécurité -- Mesures.
(1)
Technology -- Research -- United States.
(1)
Telecommunications.
(1)
Transmission sans fil.
(1)
UNIX Shells.
(1)
United States.
(1)
Visual perception.
(1)
Web 2.0 -- Security measures.
(1)
Web search engines.
(1)
Web site development -- Security measures.
(1)
Web sites -- Design.
(1)
z/OS.
(1)
Überwachung
(1)
Daha fazla
Tümünü genişlet
Daha az
Hepsini Daralt
Lokasyon
Dahil
Hariç
E-Kütüphane
Ebook Central
Elsevier E-Kitap Koleksiyonu
Merkez Kütüphane
false
{sortLabel}
{alphabetical}
{relevance}
{include}
{exclude}
{facetName}
{results}
{displayName}
{count}
{error}
Eylem Seç
Ayırt
Listelerime ekle
Eposta
Yazdır
157 sonuç bulundu
1
2
3
4
5
..
14
Sırala:
Konuyla İlgili Sırala
Yayın Yılı (eskiden yeniye)
Yayın Yılı (yeniden eskiye)
Başlık
Yazar
OK
Eposta Adresleri
:
Phone Number:
Mobile Carrier:
AT&T
Boost
Nextel (Sprint)
Sprint (PCS)
T Mobile
TracFone
US Cellular
Verizon
Virgin
Select An Item
Data usage warning: You will receive one text message for each title you selected.
Standard text messaging rates apply.
Text it to me
Text it to me, and go to next item
000000000000
DEFAULTTR
Liste seç
Geçici Liste
Bunu varsayılan liste yap.
Öğeler başarıyla eklendi
Öğeler eklenirken hata oldu. Lütfen tekrar deneyiniz.
Understanding security issues
1.
Understanding security issues
by
Donaldson, Scott E., author.
Click to View
Format:
Empirical research for software security : foundations and experience
2.
Empirical research for software security : foundations and experience
by
ben Othmane, Lotfi, editor.
Click to View
Format:
The five technological forces disrupting security : how social, mobile, cloud and iot are fundamentally changing the practice of physical security
3.
The five technological forces disrupting security : how social, mobile, cloud and iot are fundamentally changing the practice of physical security
by
Van Till, Steve, author.
Click to View
Format:
Security and resilience in intelligent data-centric systems and communication networks
4.
Security and resilience in intelligent data-centric systems and communication networks
by
Ficco, Massimo, editor.
Click to View
Format:
IT-Sicherheitsanalysen : Ein prozessorientiertes Vorgehensmodell
5.
IT-Sicherheitsanalysen : Ein prozessorientiertes Vorgehensmodell
by
Simić, Daniela, author.
Click to View
Format:
Cybercrime and business : strategies for global corporate security
6.
Cybercrime and business : strategies for global corporate security
by
Moskowitz, Sanford, author.
Click to View
Format:
Essential skills for hackers
7.
Essential skills for hackers
by
Cardwell, Kevin, author.
Click to View
Format:
You : for sale protecting your personal data and privacy online
8.
You : for sale protecting your personal data and privacy online
by
Sumner, Stuart, author.
Click to View
Format:
Security and privacy in the digital era. Volume 1
9.
Security and privacy in the digital era. Volume 1
by
Guerrier, Claudine, author.
Click to View
Format:
Security in fixed and wireless networks
10.
Security in fixed and wireless networks
by
Schäfer, Günter, author.
Click to View
Format:
Dns security : defending the domain name system
11.
Dns security : defending the domain name system
by
Liska, Allan, author.
Click to View
Format:
Data breach preparation and response : breaches are certain, impact is not
12.
Data breach preparation and response : breaches are certain, impact is not
by
Fowler, Kevvie, author.
Click to View
Format:
Eylem Seç
Ayırt
Listelerime ekle
Eposta
Yazdır
1
2
3
4
5
..
14
Search Results
Elektronik Kaynaklar
Search Results
Elektronik Kaynaklar
OK
Eposta Adresleri
:
Phone Number:
Mobile Carrier:
AT&T
Boost
Nextel (Sprint)
Sprint (PCS)
T Mobile
TracFone
US Cellular
Verizon
Virgin
Select An Item
Data usage warning: You will receive one text message for each title you selected.
Standard text messaging rates apply.
Text it to me
Text it to me, and go to next item
Elektronik Kaynaklar
Sonuçlar alınıyor Elektronik Kaynaklar...
action
Go to:
Search Results
|
Search Facets
|
Top of Page