Search ResultsElektronik Kaynaklar
Arama Sonuçlarını Sınırlandır
Yazar
Materyal Türü
Dil
Konu
Kütüphane
77 sonuç bulundu Arama sonuçlarına abone ol
00000000000000000000000000000000000000000000000000000000000000000000000000000DEFAULTTR
Yazdır
Liste seç
Bunu varsayılan liste yap.
Öğeler başarıyla eklendi
    Öğeler eklenirken hata oldu. Lütfen tekrar deneyiniz.
      by 
      Dalziel, Henry, author.
      Format: 
      Alıntı: 
      Infosec management fundamentals / Dalziel, Henry, author.
      by 
      Tiller, James S.
      Format: 
      Alıntı: 
      Adaptive security management architecture Tiller, James S.
      by 
      Abbadi, Imad M., author.
      Format: 
      Alıntı: 
      Cloud management and security / Abbadi, Imad M., author.
      by 
      Bertino, Elisa.
      Format: 
      Alıntı: 
      Identity management concepts, technologies, and systems / Bertino, Elisa.
      by 
      Boulanger, Jean-Louis.
      Format: 
      Alıntı: 
      Safety management for software-based equipment Boulanger, Jean-Louis.
      by 
      Willson, David, author.
      Format: 
      Alıntı: 
      Cyber security awareness for CEOs and management / Willson, David, author.
      by 
      Zeng, Wenjun, 1967-
      Format: 
      Alıntı: 
      Multimedia security technologies for digital rights management Zeng, Wenjun, 1967-
      by 
      Zeng, Wenjun, 1967-
      Format: 
      Alıntı: 
      Multimedia security technologies for digital rights management / Zeng, Wenjun, 1967-
      by 
      ProQuest (Firm)
      Format: 
      Alıntı: 
      Information management & computer security. Volume 15, Number 5, Papers from the HAISA 2007
      by 
      Jones, Andy, 1952-
      Format: 
      Alıntı: 
      Risk management for computer security Protecting your network and information assets / Jones, Andy
      by 
      Calder, Alan, author.
      Format: 
      Alıntı: 
      Information security risk management for ISO 27001/ISO 27002 / Calder, Alan, author.
      by 
      Spasovski, Martin.
      Format: 
      Alıntı: 
      OAuth 2.0 identity and access management patterns / Spasovski, Martin.
      by 
      Wheeler, Evan.
      Format: 
      Alıntı: 
      Security risk management building an information security risk management program from the ground
      by 
      Contos, Brian T.
      Format: 
      Alıntı: 
      Enemy at the water cooler real-life stories of insider threats and Enterprise Security Management
      by 
      Chuvakin, Anton A.
      Format: 
      Alıntı: 
      Logging and log management the authoritative guide to understanding the concepts surrounding
      by 
      Kumar, Atul.
      Format: 
      Alıntı: 
      Management: installation, configuration, and day-to-day tasks / Kumar, Atul.
      by 
      Yagüe, Mariemma.
      Format: 
      Alıntı: 
      management (EuDiRights) Yagüe, Mariemma.
      by 
      Bücker, Axel.
      Format: 
      Alıntı: 
      Federated identity management and web services security with IBM tivoli security solutions Bücker
      by 
      Contos, Brian T.
      Format: 
      Alıntı: 
      Physical and logical security convergence powered by enterprise security management / Contos, Brian
      by 
      Contos, Brian T.
      Format: 
      Alıntı: 
      Enemy at the water cooler : real-life stories of insider threats and Enterprise Security Management
      by 
      Dhillon, Gurpreet.
      Format: 
      Alıntı: 
      Logistics information management ;
      by 
      Ginodman, Veniamin, editor.
      Format: 
      Alıntı: 
      Information Management & Computer Security,
      by 
      Gritzalis, Stefanos.
      Format: 
      Alıntı: 
      Information Management & Computer Security ;
      by 
      Kane, Greg.
      Format: 
      Alıntı: 
      Security Executive Council risk management portfolio
      by 
      Lascu, Octavian.
      Format: 
      Alıntı: 
      IBM Cluster systems management.
      by 
      Guerrier, Claudine, author.
      Format: 
      Alıntı: 
      Innovation, Entrepreneurship, Management Series : Innovation and Technology Set
      by 
      Straub, Detmar W.
      Format: 
      Alıntı: 
      Advances in management information systems.
      by 
      Tyson, Dave.
      Format: 
      Alıntı: 
      Risk management.
      by 
      Mark, Talabis, author.
      Format: 
      Alıntı: 
      Information resources management -- Security measures.
      by 
      Messier, Ric, author.
      Format: 
      Alıntı: 
      Information technology -- Management.
      by 
      Moskowitz, Jeremy, author.
      Format: 
      Alıntı: 
      Software configuration management.
      by 
      Andress, Jason, author.
      Format: 
      Alıntı: 
      Information resources management.
      by 
      Moskowitz, Jeremy.
      Format: 
      Alıntı: 
      Software configuration management.
      by 
      Cross, Michael, 1965-
      Format: 
      Alıntı: 
      Risk management -- Social aspects.
      by 
      Moskowitz, Jeremy.
      Format: 
      Alıntı: 
      Software configuration management.
      by 
      Kleidermacher, David.
      Format: 
      Alıntı: 
      COMPUTERS -- Software Development & Engineering -- Project Management.
      by 
      Kahn, Miriam (Miriam B.)
      Format: 
      Alıntı: 
      Emergency management -- Planning.
      by 
      Thames, Lane. editor.
      Format: 
      Alıntı: 
      Innovation/Technology Management.
      by 
      Carroll, John M. (John Millar), 1925-
      Format: 
      Alıntı: 
      BUSINESS & ECONOMICS -- Industrial Management.
      by 
      Konheim, Alan G., 1934-
      Format: 
      Alıntı: 
      pt. 1. Mathematical preliminaries -- pt. 2. Hashing for storage : data management -- pt. 3. Some
      by 
      Burton, James.
      Format: 
      Alıntı: 
      device management; IDS Anti-Evasion Techniques.
      by 
      Vishwakarma, H.R . editor.
      Format: 
      Alıntı: 
      -centered services and systems and mobile data management. The novel and recent technologies presented in the book
      by 
      Mao, Wenji.
      Format: 
      Alıntı: 
      Analysis and Parallel Management -- 4. Modeling Organizational Behavior in Artificial Society -- 5. Data
      by 
      Wotring, Brian.
      Format: 
      Alıntı: 
      This book is about one of the most crucial aspects of system and security management: host
      by 
      Rash, Michael.
      Format: 
      Alıntı: 
      are going to be approaching management for funding in the next year or two to procure intrusion
      by 
      Rittinghouse, John W.
      Format: 
      Alıntı: 
      management requirements of 21st century companies. Wireless networks can easily be reconfigured, are very
      by 
      Traoré, Issa. editor.
      Format: 
      Alıntı: 
      presented in topics such as application security and threat management; modern authentication paradigms
      by 
      Bonnell, Ralph.
      Format: 
      Alıntı: 
      for all of the company's enterprise firewall, VPN and management solutions. It enables enterprises of
      by 
      Clercq, Jan de, 1968-
      Format: 
      Alıntı: 
      management across security-related boundaries. R2 also improves branch office server management and increases
      by 
      Kinney, Steven.
      Format: 
      Alıntı: 
      migration and secret management suite -- The trusted device driver -- TPM system deployment initialization
      by 
      Amini, Rob.
      Format: 
      Alıntı: 
      public key infrastructure -- Securing the network management process -- Securing network services and
      by 
      Rittinghouse, John W.
      Format: 
      Alıntı: 
      Management; IM Risk Management for Enterprise; The Business Value of IM; The Future of IM (contributed by
      by 
      Rittinghouse, John W.
      Format: 
      Alıntı: 
      operational security, asset protection, integrity management, availability methodology, incident response and
      by 
      Alsmadi, Izzat M. editor.
      Format: 
      Alıntı: 
      , unwanted traffic detection and control based on trust management software defined networks, security in
      by 
      Chaki, Rituparna. editor.
      Format: 
      Alıntı: 
      A Review on Energy Efficient Resource Management Strategies for Cloud -- Modeling and Analysis of
      by 
      Sagers, Glen., author.
      Format: 
      Alıntı: 
      management determining whether a strategic alliance with another firm which links their corporate information
      by 
      Mullen, Timothy M.
      Format: 
      Alıntı: 
      Management Gateway (TMG) -- Chapter 2. Internet Information Server (IIS) Authentication and Authorization
      by 
      Mansourov, Nikolai.
      Format: 
      Alıntı: 
      engineers tasked with system assurance, the book teaches you how to use the Object Management Group's (OMG
      by 
      Qian, Yi, 1962-
      Format: 
      Alıntı: 
      itemizing failsafe design features such as alarms, restoration protocols, and management configurations to
      by 
      Varsalone, Jesse.
      Format: 
      Alıntı: 
      your Data -- Part IV: Forefront Server Security Management Console -- Chapter 10: Introduction to the
      by 
      Wiles, Jack.
      Format: 
      Alıntı: 
      & Information; Management through Electronic Discovery; Win or Lose -- You Choose! -- Inside Secrets to
      by 
      Piccard, Paul L.
      Format: 
      Alıntı: 
      the management and security ramifications. These companies are now finding out the hard way that these
      by 
      Hunter, Laura E.
      Format: 
      Alıntı: 
      of "Centralized Antivirus Management." For the same reasons that Symantec bundled together these
      by 
      Stefanek, George L.
      Format: 
      Alıntı: 
      And Verification -- Ch. 14 Data Encryption -- Ch. 15 Configuration Management -- Ch. 16 Monitoring The
      by 
      Zelkowitz, Marvin V., 1945-
      Format: 
      Alıntı: 
      ; 9. Inadequate Credential Management Procedures; 10. Strategies for Defeating Identity Thieves; 11
      Format: 
      Alıntı: 
      , centralized server role management, and an improved file system. * Outlines steps for installing only the
      by 
      Winkler, Ira.
      Format: 
      Alıntı: 
      Security; Chapter 11. Is Security a Should or a Must?; Management Must Believe Security is a Must; So is
      by 
      Maynor, David.
      Format: 
      Alıntı: 
      networks, discusses management of RFID security. * From Hack the Stack, security expert Michael Gregg
      by 
      Clercq, Jan de, 1968-
      Format: 
      Alıntı: 
      -related concepts -- 8.4 Windows and UNIX account management and authentication integration approaches -- 8.5
      by 
      Leeuw, Karl de.
      Format: 
      Alıntı: 
      . Semiotics of Identity Management (P. Wisse) -- 8. History of Document Security (K.J. Schell) -- 9. From
      by 
      Wiles, Jack.
      Format: 
      Alıntı: 
      Management: Performing a Mini Risk Assessment -- Outsider-Insider Threats -- The Mind of a Social Engineer
      by 
      Satapathy, Suresh Chandra. editor.
      Format: 
      Alıntı: 
      -Organization Wireless Sensor Network for Traffic Management in Smart Cities -- Chapter 68. Inter Area Frequency
      by 
      Satapathy, Suresh Chandra. editor.
      Format: 
      Alıntı: 
      Authentication -- Chapter 72. ICT enabled proposed solutions for Soil Fertility Management in Indian Agriculture