Giriş
|
Hesabım
|
Listelerim
|
|
Remember to clear the cache and close the browser window.
English
Search Limit
Bütün Kütüphaneler
Elektronik Kaynaklar
Hepsi
Başkent Üniversitesi Kütüphanesi
Anadolu OSB Meslek Yüksekokulu
Atasev Özel Koleksiyon
Erdoğan Tercan Koleksiyonu
Güzel Sanatlar ve Tasarım Arşivi
Kazan Meslek Yüksekokulu
Hukuk Koleksiyonu
Ord.Prof.Dr. Enver Ziya Karal Tarih Uygulama Ars.Mrk.
Özel Koleksiyon Serdar Özersin
Tez Koleksiyonu
Tüm Alanlar
Başlık
Yazar
Konu
ISBN
ISSN
8
Search Field
Tüm Alanlar
Arama:
Gelişmiş Arama
Search Results
Elektronik Kaynaklar
Arama Sonuçlarını Sınırlandır
Daraltılmış:
+
Yazar: ProQuest (Firm)
+
Library: Başkent Kütüphanesi
+
Yayın Yılı: 2013
+
Konu: Computer security.
Yazar
Dahil
Hariç
Baker, Paul R., 1958-
(1)
Barnett, Ryan C.
(1)
Beaver, Kevin.
(1)
Benny, Daniel J.
(1)
Bolt, Steven.
(1)
Boulanger, Jean-Louis.
(1)
Brooks, Hugh.
(1)
Brotby, W. Krag.
(1)
Chuvakin, Anton A.
(1)
Delfanti, Alessandro.
(1)
Diogenes, Yuri.
(1)
Fichera, Joe, 1966-
(1)
Gupta, Ravi.
(1)
Hicks, Richard.
(1)
Hinson, Gary.
(1)
Hosmer, Chet.
(1)
Kabay, M. E.
(1)
Laykin, Erik.
(1)
Leman-Langlois, Stéphane, 1965-
(1)
Loshin, Pete.
(1)
Loshin, Peter.
(1)
Mallett, Andrew.
(1)
Martin, Jason L.
(1)
Moskowitz, Jeremy.
(1)
Moulder, Patricia.
(1)
O'Connor, T. J.
(1)
Phillips, Christopher.
(1)
Phillips, Richard, 1958-
(1)
Raggo, Michael T.
(1)
Schmidt, Kevin J.
(1)
Shinder, Debra Littlejohn.
(1)
Shinder, Thomas W.
(1)
Sianjina, Rayton R.
(1)
Talabis, Mark Ryan N.
(1)
Wheeler, Evan.
(1)
Woody, Aaron.
(1)
Yang, Christopher.
(1)
Daha fazla
Tümünü genişlet
Daha az
Hepsini Daralt
Materyal Türü
Dahil
Hariç
E-Kitap
Dil
Dahil
Hariç
English
(22)
Konu
Dahil
Hariç
Electronic books.
(22)
Computer networks -- Security measures.
(5)
Computer hackers.
(3)
Data protection.
(2)
Operating systems (Computers)
(2)
Business enterprises -- Computer networks -- Security measures.
(1)
Business enterprises -- Security measures.
(1)
Citrix MetaFrame.
(1)
Client/server computing.
(1)
Computer crimes -- Investigation -- United States.
(1)
Computer crimes -- Investigation.
(1)
Computer crimes -- Prevention.
(1)
Computer crimes.
(1)
Computer science.
(1)
Corporations -- Corrupt practices.
(1)
Cyberspace -- Security measures.
(1)
Data encryption (Computer science)
(1)
Data mining.
(1)
Directory services (Computer network technology)
(1)
Educational technology -- Security measures.
(1)
Electronic commerce -- Security measures.
(1)
Electronic surveillance.
(1)
Fraud investigation.
(1)
Internet -- Security measures.
(1)
Intrusion detection systems (Computer security)
(1)
Microsoft Windows (Computer file)
(1)
Microsoft Windows server.
(1)
National security.
(1)
Online social networks.
(1)
Private security services.
(1)
Python (Computer program language)
(1)
Risk assessment.
(1)
Security systems.
(1)
Social media.
(1)
Software configuration management.
(1)
Daha fazla
Tümünü genişlet
Daha az
Hepsini Daralt
Lokasyon
Dahil
Hariç
Ebook Central
false
{sortLabel}
{alphabetical}
{relevance}
{include}
{exclude}
{facetName}
{results}
{displayName}
{count}
{error}
Eylem Seç
Ayırt
Listelerime ekle
Eposta
Yazdır
22 sonuç bulundu
1
2
Sırala:
Konuyla İlgili Sırala
Yayın Yılı (eskiden yeniye)
Yayın Yılı (yeniden eskiye)
Başlık
Yazar
OK
Eposta Adresleri
:
Phone Number:
Mobile Carrier:
AT&T
Boost
Nextel (Sprint)
Sprint (PCS)
T Mobile
TracFone
US Cellular
Verizon
Virgin
Select An Item
Data usage warning: You will receive one text message for each title you selected.
Standard text messaging rates apply.
Text it to me
Text it to me, and go to next item
000000000000
DEFAULTTR
Liste seç
Geçici Liste
Bunu varsayılan liste yap.
Öğeler başarıyla eklendi
Öğeler eklenirken hata oldu. Lütfen tekrar deneyiniz.
Investigative computer forensics the practical guide for lawyers, accountants, investigators, and business executives
1.
Investigative computer forensics the practical guide for lawyers, accountants, investigators, and business executives
by
Laykin, Erik.
Click to View
Format:
Technocrime, policing and surveillance
2.
Technocrime, policing and surveillance
by
Leman-Langlois, Stéphane, 1965-
Click to View
Format:
Biohackers the politics of open science
3.
Biohackers the politics of open science
by
Delfanti, Alessandro.
Click to View
Format:
Safety management for software-based equipment
4.
Safety management for software-based equipment
by
Boulanger, Jean-Louis.
Click to View
Format:
Using social media for global security
5.
Using social media for global security
by
Gupta, Ravi.
Click to View
Format:
Citrix Access Gateway VPX 5.04 essentials a practical step-by-step guide to provide secure remote access using the Citrix Access Gateway VPX
6.
Citrix Access Gateway VPX 5.04 essentials a practical step-by-step guide to provide secure remote access using the Citrix Access Gateway VPX
by
Mallett, Andrew.
Click to View
Format:
Intelligent systems for security informatics
7.
Intelligent systems for security informatics
by
Yang, Christopher.
Click to View
Format:
Cyber security for educational leaders a guide to understanding and implementing technology policies
8.
Cyber security for educational leaders a guide to understanding and implementing technology policies
by
Sianjina, Rayton R.
Click to View
Format:
Pragmatic security metrics applying metametrics to information security
9.
Pragmatic security metrics applying metametrics to information security
by
Brotby, W. Krag.
Click to View
Format:
Information security risk assessment toolkit practical assessments through data collection and data analysis
10.
Information security risk assessment toolkit practical assessments through data collection and data analysis
by
Talabis, Mark Ryan N.
Click to View
Format:
Network intrusion analysis methodologies, tools, and techniques for incident analysis and response
11.
Network intrusion analysis methodologies, tools, and techniques for incident analysis and response
by
Fichera, Joe, 1966-
Click to View
Format:
Data hiding exposing concealed data in multimedia, operating systems, mobile devices, and network protocols
12.
Data hiding exposing concealed data in multimedia, operating systems, mobile devices, and network protocols
by
Raggo, Michael T.
Click to View
Format:
Eylem Seç
Ayırt
Listelerime ekle
Eposta
Yazdır
1
2
Search Results
Elektronik Kaynaklar
Search Results
Elektronik Kaynaklar
OK
Eposta Adresleri
:
Phone Number:
Mobile Carrier:
AT&T
Boost
Nextel (Sprint)
Sprint (PCS)
T Mobile
TracFone
US Cellular
Verizon
Virgin
Select An Item
Data usage warning: You will receive one text message for each title you selected.
Standard text messaging rates apply.
Text it to me
Text it to me, and go to next item
Elektronik Kaynaklar
Sonuçlar alınıyor Elektronik Kaynaklar...
action