Skip to:
Search Results
|
Bottom
|
Search Facets
|
Content
Giriş
|
Hesabım
|
Listelerim
|
|
Remember to clear the cache and close the browser window.
English
Search Limit
Bütün Kütüphaneler
Elektronik Kaynaklar
Hepsi
Başkent Üniversitesi Kütüphanesi
Anadolu OSB Meslek Yüksekokulu
Atasev Özel Koleksiyon
Erdoğan Tercan Koleksiyonu
Güzel Sanatlar ve Tasarım Arşivi
Kazan Meslek Yüksekokulu
Hukuk Koleksiyonu
Ord.Prof.Dr. Enver Ziya Karal Tarih Uygulama Ars.Mrk.
Özel Koleksiyon Serdar Özersin
Tez Koleksiyonu
Tüm Alanlar
Başlık
Yazar
Konu
ISBN
ISSN
13
Search Field
Tüm Alanlar
Arama:
Gelişmiş Arama
Search Results
Elektronik Kaynaklar
Arama Sonuçlarını Sınırlandır
Daraltılmış:
+
Yayın Yılı: 2007
+
Konu: Computer security.
+
Konu: Electronic books.
Yazar
Dahil
Hariç
ProQuest (Firm)
(15)
Wiles, Jack.
(3)
Carvey, Harlan A.
(2)
Chaffin, Larry.
(2)
Clercq, Jan de, 1968-
(2)
Cross, Michael, 1965-
(2)
Grillenmeier, Guido.
(2)
Piltzecker, Tony, 1975-
(2)
Tyson, Dave.
(2)
Winkler, Ira.
(2)
Baker, Andrew R.
(1)
Beale, Jay.
(1)
Bergstra, J. A.
(1)
Black Hat Press (Goodhue, Minn.)
(1)
Chandramouli, Ramaswamy.
(1)
Conti, Greg.
(1)
Contos, Brian T.
(1)
Cross, Michael.
(1)
D'Arcy, John P., 1975-
(1)
Dubrawsky, Ido.
(1)
Esler, Joel.
(1)
Ferraiolo, David.
(1)
Goodman, Seymour E.
(1)
Hurley, Chris.
(1)
I͡Ashchenko, V. V.
(1)
Knop, J. V. (Jan V.)
(1)
Kuhn, D. Richard.
(1)
Leeuw, Karl de.
(1)
Lin, Herbert.
(1)
Long, Johnny.
(1)
Maynor, David.
(1)
Mookhey, K. K.
(1)
Mullen, Timothy M.
(1)
NATO Advanced Research Workshop on a Process for Developing a Common Vocabulary in the Information Security Area (2006 : Moscow, Russia)
(1)
National Research Council (U.S.). Committee on Improving Cybersecurity Research in the United States.
(1)
Pinzon, D. Scott.
(1)
Rathaus, Noam.
(1)
Russell, Ryan, 1969-
(1)
Salʹnikov, Alexey A.
(1)
Schiller, Craig A.
(1)
Shepherd, Matthew.
(1)
Shinder, Thomas W.
(1)
Taylor, Laura.
(1)
Yagüe, Mariemma.
(1)
Daha fazla
Tümünü genişlet
Daha az
Hepsini Daralt
Materyal Türü
Dahil
Hariç
E-Kitap
Dil
Dahil
Hariç
English
(35)
Konu
Dahil
Hariç
COMPUTERS -- Internet -- Security.
(13)
COMPUTERS -- Networking -- Security.
(13)
COMPUTERS -- Security -- General.
(13)
Computer networks -- Security measures.
(13)
Microsoft Windows (Computer file)
(5)
Data protection.
(3)
Web sites -- Security measures.
(3)
BUSINESS & ECONOMICS -- Corporate Governance.
(2)
BUSINESS & ECONOMICS -- Leadership.
(2)
BUSINESS & ECONOMICS -- Organizational Development.
(2)
BUSINESS & ECONOMICS -- Workplace Culture.
(2)
Business enterprises -- Security measures.
(2)
Computer crimes -- Investigation -- United States -- Methodology.
(2)
Computer crimes -- Investigation.
(2)
Computer crimes -- Prevention.
(2)
Computers -- Access control.
(2)
Internet -- Security measures.
(2)
LAW -- Forensic Science.
(2)
Microsoft Windows (Computer file) -- Security measures.
(2)
Risk management.
(2)
Réseaux d'ordinateurs -- Sécurité -- Mesures.
(2)
Agents intelligents (Logiciels)
(1)
Application software -- Security measures.
(1)
BUSINESS & ECONOMICS -- Business Writing.
(1)
Client/server computing.
(1)
Computer networks -- Access control.
(1)
Computer security -- Fiction.
(1)
Computer security -- History.
(1)
Copyright -- History.
(1)
Copyright.
(1)
Cryptography -- History.
(1)
Cryptography.
(1)
Cyberterrorism -- Fiction.
(1)
Cyberterrorism -- Prevention.
(1)
Cyberterrorism.
(1)
Databescherming.
(1)
Fiction.
(1)
Firewalls (Computer security)
(1)
Hackers -- Fiction.
(1)
Hackers.
(1)
History.
(1)
Industries -- Security measures.
(1)
Information technology -- Management.
(1)
Information technology.
(1)
Information visualization.
(1)
Management information systems.
(1)
Metasploit (Electronic resource)
(1)
Open source software.
(1)
SQL server.
(1)
Security systems.
(1)
Sites Web -- Sécurité -- Mesures.
(1)
Snort (Computer file)
(1)
Systèmes informatiques -- Sécurité -- Mesures.
(1)
United States.
(1)
Visual perception.
(1)
Wireless LANs -- Security measures.
(1)
Wireless communication systems -- Security measures.
(1)
Daha fazla
Tümünü genişlet
Daha az
Hepsini Daralt
Kütüphane
Dahil
Hariç
Başkent Kütüphanesi
Lokasyon
Dahil
Hariç
Ebook Central
Elsevier E-Kitap Koleksiyonu
false
{sortLabel}
{alphabetical}
{relevance}
{include}
{exclude}
{facetName}
{results}
{displayName}
{count}
{error}
Eylem Seç
Ayırt
Listelerime ekle
Eposta
Yazdır
35 sonuç bulundu
1
2
3
Sırala:
Konuyla İlgili Sırala
Yayın Yılı (eskiden yeniye)
Yayın Yılı (yeniden eskiye)
Başlık
Yazar
OK
Eposta Adresleri
:
Phone Number:
Mobile Carrier:
AT&T
Boost
Nextel (Sprint)
Sprint (PCS)
T Mobile
TracFone
US Cellular
Verizon
Virgin
Select An Item
Data usage warning: You will receive one text message for each title you selected.
Standard text messaging rates apply.
Text it to me
Text it to me, and go to next item
000000000000
DEFAULTTR
Liste seç
Geçici Liste
Bunu varsayılan liste yap.
Öğeler başarıyla eklendi
Öğeler eklenirken hata oldu. Lütfen tekrar deneyiniz.
Papers from the first European workshop on technological & security issues in digital rights management (EuDiRights)
1.
Papers from the first European workshop on technological & security issues in digital rights management (EuDiRights)
by
Yagüe, Mariemma.
Click to View
Format:
Microsoft windows security fundamentals
2.
Microsoft windows security fundamentals
by
Clercq, Jan de, 1968-
Click to View
Format:
Security convergence managing enterprise security risk
3.
Security convergence managing enterprise security risk
by
Tyson, Dave.
Click to View
Format:
Techno security's guide to e-discovery and digital forensics
4.
Techno security's guide to e-discovery and digital forensics
by
Wiles, Jack.
Click to View
Format:
A process for developing a common vocabulary in the information security area
5.
A process for developing a common vocabulary in the information security area
by
NATO Advanced Research Workshop on a Process for Developing a Common Vocabulary in the Information Security Area (2006 : Moscow, Russia)
Click to View
Format:
Microsoft Vista for IT security professionals
6.
Microsoft Vista for IT security professionals
by
Piltzecker, Tony, 1975-
Click to View
Format:
Windows forensic analysis DVD toolkit,
7.
Windows forensic analysis DVD toolkit,
by
Carvey, Harlan A.
Click to View
Format:
Information management & computer security. Volume 15, Number 5, Papers from the HAISA 2007 Symposium
8.
Information management & computer security. Volume 15, Number 5, Papers from the HAISA 2007 Symposium
by
ProQuest (Firm)
Click to View
Format:
Zen and the art of information security
9.
Zen and the art of information security
by
Winkler, Ira.
Click to View
Format:
Best damn firewall book period
10.
Best damn firewall book period
by
Shinder, Thomas W.
Click to View
Format:
Role-based access control
11.
Role-based access control
by
Ferraiolo, David.
Click to View
Format:
Developer's guide to web application security
12.
Developer's guide to web application security
by
Cross, Michael.
Click to View
Format:
Eylem Seç
Ayırt
Listelerime ekle
Eposta
Yazdır
1
2
3
Search Results
Elektronik Kaynaklar
Search Results
Elektronik Kaynaklar
OK
Eposta Adresleri
:
Phone Number:
Mobile Carrier:
AT&T
Boost
Nextel (Sprint)
Sprint (PCS)
T Mobile
TracFone
US Cellular
Verizon
Virgin
Select An Item
Data usage warning: You will receive one text message for each title you selected.
Standard text messaging rates apply.
Text it to me
Text it to me, and go to next item
Elektronik Kaynaklar
Sonuçlar alınıyor Elektronik Kaynaklar...
action
Go to:
Search Results
|
Search Facets
|
Top of Page