Giriş
|
Hesabım
|
Listelerim
|
|
Remember to clear the cache and close the browser window.
English
Search Limit
Bütün Kütüphaneler
Elektronik Kaynaklar
Hepsi
Başkent Üniversitesi Kütüphanesi
Anadolu OSB Meslek Yüksekokulu
Atasev Özel Koleksiyon
Erdoğan Tercan Koleksiyonu
Güzel Sanatlar ve Tasarım Arşivi
Kazan Meslek Yüksekokulu
Hukuk Koleksiyonu
Ord.Prof.Dr. Enver Ziya Karal Tarih Uygulama Ars.Mrk.
Özel Koleksiyon Serdar Özersin
Tez Koleksiyonu
Tüm Alanlar
Başlık
Yazar
Konu
ISBN
ISSN
105
Search Field
Tüm Alanlar
Arama:
Gelişmiş Arama
Search Results
Elektronik Kaynaklar
Arama Sonuçlarını Sınırlandır
Daraltılmış:
+
Dil: English
+
Lokasyon: Ebook Central
+
Yayın Yılı: 2010
+
Konu: Computer security.
Yazar
Dahil
Hariç
ProQuest (Firm)
(14)
Boulanger, Jean-Louis.
(1)
Choi, Kyung-shick, 1973-
(1)
Esparza, Javier.
(1)
Goldstein, Emmanuel J.
(1)
Grumberg, Orna.
(1)
Kalali, Masoud.
(1)
Kissell, Joe.
(1)
Konheim, Alan G., 1934-
(1)
Krutz, Ronald L.
(1)
Lee, Graham J.
(1)
Martínez-Ballesté, Antoni.
(1)
Merkow, Mark S., author.
(1)
Moeller, Robert R.
(1)
Moskowitz, Jeremy.
(1)
Raghavan, Lakshmikanth, author.
(1)
Smith, Russell.
(1)
Solanas, Agusti.
(1)
Spanfelner, Bernd.
(1)
TECHNION. Israel Institute of Technology (Israel)
(1)
Technische Universität München (Germany)
(1)
Tiller, James S.
(1)
Vines, Russell Dean.
(1)
Zhang, Rui.
(1)
Daha fazla
Tümünü genişlet
Daha az
Hepsini Daralt
Materyal Türü
Dahil
Hariç
E-Kitap
Konu
Dahil
Hariç
Electronic books.
(16)
Computer networks -- Security measures.
(3)
Data encryption (Computer science)
(2)
Operating systems (Computers)
(2)
Artificial intelligence.
(1)
Avionics -- Safety measures.
(1)
Cloud computing -- Security measures.
(1)
Cocoa (Application development environment)
(1)
Computer architecture.
(1)
Computer crimes.
(1)
Computer hackers.
(1)
Computer software -- Development.
(1)
Computer software -- Reliability.
(1)
Computer systems -- Reliability.
(1)
Computers -- Access control.
(1)
Computers -- Reliability.
(1)
Cryptography.
(1)
Data protection.
(1)
Directory services (Computer network technology)
(1)
Electronic data processing departments -- Auditing.
(1)
Electronic information resources -- Access control.
(1)
Hashing (Computer science)
(1)
Information technology -- Auditing.
(1)
Information technology -- Security measures.
(1)
Internet programming.
(1)
Java (Computer program language)
(1)
Languages, Artificial.
(1)
Mac OS.
(1)
Macintosh (Computer) -- Programming.
(1)
Microsoft Windows (Computer file)
(1)
Programming languages (Electronic computers)
(1)
Software configuration management.
(1)
Daha fazla
Tümünü genişlet
Daha az
Hepsini Daralt
Kütüphane
Dahil
Hariç
Başkent Kütüphanesi
false
{sortLabel}
{alphabetical}
{relevance}
{include}
{exclude}
{facetName}
{results}
{displayName}
{count}
{error}
Eylem Seç
Ayırt
Listelerime ekle
Eposta
Yazdır
16 sonuç bulundu
1
2
Sırala:
Konuyla İlgili Sırala
Yayın Yılı (eskiden yeniye)
Yayın Yılı (yeniden eskiye)
Başlık
Yazar
OK
Eposta Adresleri
:
Phone Number:
Mobile Carrier:
AT&T
Boost
Nextel (Sprint)
Sprint (PCS)
T Mobile
TracFone
US Cellular
Verizon
Virgin
Select An Item
Data usage warning: You will receive one text message for each title you selected.
Standard text messaging rates apply.
Text it to me
Text it to me, and go to next item
000000000000
DEFAULTTR
Liste seç
Geçici Liste
Bunu varsayılan liste yap.
Öğeler başarıyla eklendi
Öğeler eklenirken hata oldu. Lütfen tekrar deneyiniz.
Least privilege security for Windows 7, Vista, And XP secure desktops for regulatory compliance and business agility
1.
Least privilege security for Windows 7, Vista, And XP secure desktops for regulatory compliance and business agility
by
Smith, Russell.
Click to View
Format:
GlassFish security secure your GlassFish installation, web applications, EJB applications, application client module, and web services using Java EE and GlassFish security measures
2.
GlassFish security secure your GlassFish installation, web applications, EJB applications, application client module, and web services using Java EE and GlassFish security measures
by
Kalali, Masoud.
Click to View
Format:
Safety of computer architectures
3.
Safety of computer architectures
by
Boulanger, Jean-Louis.
Click to View
Format:
Risk factors in computer-crime victimization
4.
Risk factors in computer-crime victimization
by
Choi, Kyung-shick, 1973-
Click to View
Format:
Advances in artificial intelligence for privacy protection and security
5.
Advances in artificial intelligence for privacy protection and security
by
Solanas, Agusti.
Click to View
Format:
Relation based access control
6.
Relation based access control
by
Zhang, Rui.
Click to View
Format:
Secure and resilient software development
7.
Secure and resilient software development
by
Merkow, Mark S., author.
Click to View
Format:
Group policy fundamentals, security, and the managed desktop
8.
Group policy fundamentals, security, and the managed desktop
by
Moskowitz, Jeremy.
Click to View
Format:
Dear hacker letters to the editor of 2600
9.
Dear hacker letters to the editor of 2600
by
Goldstein, Emmanuel J.
Click to View
Format:
Hashing in computer science fifty years of slicing and dicing
10.
Hashing in computer science fifty years of slicing and dicing
by
Konheim, Alan G., 1934-
Click to View
Format:
Professional Cocoa application security
11.
Professional Cocoa application security
by
Lee, Graham J.
Click to View
Format:
IT audit, control, and security
12.
IT audit, control, and security
by
Moeller, Robert R.
Click to View
Format:
Eylem Seç
Ayırt
Listelerime ekle
Eposta
Yazdır
1
2
Search Results
Elektronik Kaynaklar
Search Results
Elektronik Kaynaklar
OK
Eposta Adresleri
:
Phone Number:
Mobile Carrier:
AT&T
Boost
Nextel (Sprint)
Sprint (PCS)
T Mobile
TracFone
US Cellular
Verizon
Virgin
Select An Item
Data usage warning: You will receive one text message for each title you selected.
Standard text messaging rates apply.
Text it to me
Text it to me, and go to next item
Elektronik Kaynaklar
Sonuçlar alınıyor Elektronik Kaynaklar...
action