Giriş
|
Hesabım
|
Listelerim
|
|
Remember to clear the cache and close the browser window.
English
Search Limit
Bütün Kütüphaneler
Elektronik Kaynaklar
Hepsi
Başkent Üniversitesi Kütüphanesi
Anadolu OSB Meslek Yüksekokulu
Atasev Özel Koleksiyon
Erdoğan Tercan Koleksiyonu
Güzel Sanatlar ve Tasarım Arşivi
Kazan Meslek Yüksekokulu
Hukuk Koleksiyonu
Ord.Prof.Dr. Enver Ziya Karal Tarih Uygulama Ars.Mrk.
Özel Koleksiyon Serdar Özersin
Tez Koleksiyonu
Tüm Alanlar
Başlık
Yazar
Konu
ISBN
ISSN
26
Search Field
Tüm Alanlar
Arama:
Gelişmiş Arama
Search Results
Elektronik Kaynaklar
Arama Sonuçlarını Sınırlandır
Daraltılmış:
+
Language: English
+
Kütüphane: Başkent Kütüphanesi
+
Lokasyon: Elsevier E-Kitap Koleksiyonu
+
Yayın Yılı: 2009
+
Konu: COMPUTERS -- Security -- General.
Yazar
Dahil
Hariç
Liu, Dale.
(2)
Benton, K. David.
(1)
Dunham, Ken.
(1)
Hirao, Joey.
(1)
Hoopes, John.
(1)
Peterson, Cathleen P.
(1)
Posey, Brien.
(1)
Schuler, Karen.
(1)
Thompson, Troy.
(1)
Vacca, John R.
(1)
Vincze, Éva.
(1)
Wun-Young, Leslie.
(1)
Daha fazla
Tümünü genişlet
Daha az
Hepsini Daralt
Materyal Türü
Dahil
Hariç
E-Kitap
Konu
Dahil
Hariç
COMPUTERS -- Internet -- Security.
(8)
COMPUTERS -- Networking -- Security.
(8)
Electronic books.
(8)
Computer networks -- Security measures.
(4)
Aufsatzsammlung.
(1)
Business enterprises -- Computer networks -- Security measures.
(1)
Business information services -- Security measures.
(1)
Case studies.
(1)
Cell phone systems -- Security measures.
(1)
Computer crimes -- Case studies.
(1)
Computer crimes -- Investigation.
(1)
Computer crimes -- Prevention.
(1)
Computer crimes.
(1)
Computer networks -- Security measures -- Handbooks, manuals, etc.
(1)
Computer networks Security measures
(1)
Computer security.
(1)
Computersicherheit
(1)
Credit cards -- Security measures -- Standards -- Handbooks, manuals, etc.
(1)
Data encryption (Computer science)
(1)
Database security.
(1)
Datensicherung
(1)
Electronic discovery (Law)
(1)
Electronic discovery (Law) -- United States.
(1)
GFI Software (Firm)
(1)
GFI Software (Firm) -- Handbooks, manuals, etc.
(1)
Hackers.
(1)
Handbooks and manuals.
(1)
Informationssystem
(1)
Informatique.
(1)
Manuels.
(1)
Mobile communication systems -- Security measures.
(1)
Mobile computing -- Security measures.
(1)
Rechnernetz
(1)
Records -- Management -- Data processing.
(1)
Records retention.
(1)
Routers (Computer networks)
(1)
SAP ERP.
(1)
Sécurité informatique.
(1)
UNIX Shells.
(1)
United States.
(1)
Virtual computer systems.
(1)
Virtual storage (Computer science) -- Security measures.
(1)
Wireless Internet -- Security measures.
(1)
Daha fazla
Tümünü genişlet
Daha az
Hepsini Daralt
false
{sortLabel}
{alphabetical}
{relevance}
{include}
{exclude}
{facetName}
{results}
{displayName}
{count}
{error}
Eylem Seç
Ayırt
Listelerime ekle
Eposta
Yazdır
8 sonuç bulundu
1
Sırala:
Konuyla İlgili Sırala
Yayın Yılı (eskiden yeniye)
Yayın Yılı (yeniden eskiye)
Başlık
Yazar
OK
Eposta Adresleri
:
Phone Number:
Mobile Carrier:
AT&T
Boost
Nextel (Sprint)
Sprint (PCS)
T Mobile
TracFone
US Cellular
Verizon
Virgin
Select An Item
Data usage warning: You will receive one text message for each title you selected.
Standard text messaging rates apply.
Text it to me
Text it to me, and go to next item
00000000
DEFAULTTR
Liste seç
Geçici Liste
Bunu varsayılan liste yap.
Öğeler başarıyla eklendi
Öğeler eklenirken hata oldu. Lütfen tekrar deneyiniz.
SAP security configuration and deployment : the IT administrator's guide to best practices
1.
SAP security configuration and deployment : the IT administrator's guide to best practices
by
Wun-Young, Leslie.
ScienceDirect
http://www.sciencedirect.com/science/book/9781597492843
Format:
Next generation SSH2 implementation : securing data in motion
2.
Next generation SSH2 implementation : securing data in motion
by
Liu, Dale.
ScienceDirect
https://www.sciencedirect.com/science/book/9781597492836
Format:
Mobile malware attacks and defense
3.
Mobile malware attacks and defense
by
Dunham, Ken.
ScienceDirect
https://www.sciencedirect.com/science/book/9781597492980
Format:
GFI network security and PCI compliance power tools
4.
GFI network security and PCI compliance power tools
by
Posey, Brien.
ScienceDirect
https://www.sciencedirect.com/science/book/9781597492850
Format:
E-discovery : creating and managing an enterprisewide program : a technical guide to digital investigation and litigation support
5.
E-discovery : creating and managing an enterprisewide program : a technical guide to digital investigation and litigation support
by
Schuler, Karen.
ScienceDirect
http://www.sciencedirect.com/science/book/9781597492966
Format:
Virtualization for security : including sandboxing, disaster recovery, high availability, forensic analysis, and honeypotting
6.
Virtualization for security : including sandboxing, disaster recovery, high availability, forensic analysis, and honeypotting
by
Hoopes, John.
ScienceDirect
https://www.sciencedirect.com/science/book/9781597493055
Format:
Computer and information security handbook
7.
Computer and information security handbook
by
Vacca, John R.
ScienceDirect
https://www.sciencedirect.com/science/book/9780123743541
Format:
Cisco router and switch forensics : investigating and analyzing malicious network activity
8.
Cisco router and switch forensics : investigating and analyzing malicious network activity
by
Liu, Dale.
ScienceDirect
https://www.sciencedirect.com/science/book/9781597494182
Format:
Eylem Seç
Ayırt
Listelerime ekle
Eposta
Yazdır
1
Search Results
Elektronik Kaynaklar
Search Results
Elektronik Kaynaklar
OK
Eposta Adresleri
:
Phone Number:
Mobile Carrier:
AT&T
Boost
Nextel (Sprint)
Sprint (PCS)
T Mobile
TracFone
US Cellular
Verizon
Virgin
Select An Item
Data usage warning: You will receive one text message for each title you selected.
Standard text messaging rates apply.
Text it to me
Text it to me, and go to next item
Elektronik Kaynaklar
Sonuçlar alınıyor Elektronik Kaynaklar...
action