Giriş
|
Hesabım
|
Listelerim
|
|
Remember to clear the cache and close the browser window.
English
Search Limit
Bütün Kütüphaneler
Elektronik Kaynaklar
Hepsi
Başkent Üniversitesi Kütüphanesi
Anadolu OSB Meslek Yüksekokulu
Atasev Özel Koleksiyon
Erdoğan Tercan Koleksiyonu
Güzel Sanatlar ve Tasarım Arşivi
Kazan Meslek Yüksekokulu
Hukuk Koleksiyonu
Ord.Prof.Dr. Enver Ziya Karal Tarih Uygulama Ars.Mrk.
Özel Koleksiyon Serdar Özersin
Tez Koleksiyonu
Tüm Alanlar
Başlık
Yazar
Konu
ISBN
ISSN
8
Search Field
Tüm Alanlar
Arama:
Gelişmiş Arama
Search Results
Elektronik Kaynaklar
Arama Sonuçlarını Sınırlandır
Daraltılmış:
+
Language: English
+
Kütüphane: Başkent Kütüphanesi
+
Yayın Yılı: 2003
+
Konu: Computer security.
Yazar
Dahil
Hariç
ProQuest (Firm)
(15)
Beale, Jay.
(2)
Foster, James C.
(2)
Hancock, Bill, 1957-
(2)
Hunter, Laura E.
(2)
Rittinghouse, John W.
(2)
Shimonski, Robert.
(2)
Antón, Philip S.
(1)
Arnold, Michael (Michael Konrad), 1964-
(1)
Burton, James.
(1)
Caswell, Brian.
(1)
Chandramouli, Ramaswamy.
(1)
Ellis, Juanita.
(1)
Erickson, Jon, 1977-
(1)
Ferraiolo, David.
(1)
International Business Machines Corporation. International Technical Support Organization.
(1)
Jacobs, Josh.
(1)
Kuhn, D. Richard.
(1)
Liotine, Matthew.
(1)
Oppliger, Rolf.
(1)
Poole, Owen.
(1)
Posluns, Jeffrey.
(1)
Rayns, Chris.
(1)
Russell, Ryan, 1969-
(1)
Schmucker, Martin.
(1)
Speed, Tim.
(1)
Wolthusen, Stephen D.
(1)
Daha fazla
Tümünü genişlet
Daha az
Hepsini Daralt
Materyal Türü
Dahil
Hariç
E-Kitap
Konu
Dahil
Hariç
Electronic books.
(21)
Computer networks -- Security measures.
(11)
COMPUTERS -- Internet -- Security.
(4)
COMPUTERS -- Networking -- Security.
(4)
COMPUTERS -- Security -- General.
(4)
Computer viruses.
(2)
Cryptography.
(2)
Data protection.
(2)
Internet -- Security measures.
(2)
Internet searching.
(2)
Andre fag (naturvidenskab og teknik) Andre fag
(1)
Computer hackers.
(1)
Computer networks -- Access control.
(1)
Computer networks -- Planning.
(1)
Computer science.
(1)
Computer security -- Fiction.
(1)
Computers -- Access control.
(1)
Data encryption (Computer science)
(1)
Digital watermarking.
(1)
FICTION -- General.
(1)
Fiction.
(1)
Hackers -- Fiction.
(1)
Hackers.
(1)
Information technology.
(1)
Intrusion detection systems (Computer security)
(1)
Risk assessment.
(1)
Short stories
(1)
Short stories, American -- 21st century.
(1)
Short stories, American.
(1)
Short stories.
(1)
Snort (Software)
(1)
Snort 2.0
(1)
Technology -- Research -- United States.
(1)
World Wide Web -- Security measures.
(1)
z/OS.
(1)
Daha fazla
Tümünü genişlet
Daha az
Hepsini Daralt
Lokasyon
Dahil
Hariç
Ebook Central
Elsevier E-Kitap Koleksiyonu
false
{sortLabel}
{alphabetical}
{relevance}
{include}
{exclude}
{facetName}
{results}
{displayName}
{count}
{error}
Eylem Seç
Ayırt
Listelerime ekle
Eposta
Yazdır
21 sonuç bulundu
1
2
Sırala:
Konuyla İlgili Sırala
Yayın Yılı (eskiden yeniye)
Yayın Yılı (yeniden eskiye)
Başlık
Yazar
OK
Eposta Adresleri
:
Phone Number:
Mobile Carrier:
AT&T
Boost
Nextel (Sprint)
Sprint (PCS)
T Mobile
TracFone
US Cellular
Verizon
Virgin
Select An Item
Data usage warning: You will receive one text message for each title you selected.
Standard text messaging rates apply.
Text it to me
Text it to me, and go to next item
000000000000
DEFAULTTR
Liste seç
Geçici Liste
Bunu varsayılan liste yap.
Öğeler başarıyla eklendi
Öğeler eklenirken hata oldu. Lütfen tekrar deneyiniz.
Hacking the art of exploitation
1.
Hacking the art of exploitation
by
Erickson, Jon, 1977-
Click to View
Format:
Configuring Symantec Antivirus, Corporate Edition
2.
Configuring Symantec Antivirus, Corporate Edition
by
Hunter, Laura E.
Click to View
Format:
Snort 2.0 intrusion detection
3.
Snort 2.0 intrusion detection
by
Beale, Jay.
Click to View
Format:
SSCP study guide and & DVD training system
4.
SSCP study guide and & DVD training system
by
Jacobs, Josh.
Click to View
Format:
Network security a practical guide
5.
Network security a practical guide
by
Poole, Owen.
Click to View
Format:
Finding and fixing vulnerabilities in information systems the vulnerability assessment & mitigation methodology
6.
Finding and fixing vulnerabilities in information systems the vulnerability assessment & mitigation methodology
by
Antón, Philip S.
Click to View
Format:
Techniques and applications of digital watermarking and content protection
7.
Techniques and applications of digital watermarking and content protection
by
Arnold, Michael (Michael Konrad), 1964-
Click to View
Format:
Security technologies for the World Wide Web
8.
Security technologies for the World Wide Web
by
Oppliger, Rolf.
Click to View
Format:
Role-based access control
9.
Role-based access control
by
Ferraiolo, David.
Click to View
Format:
Mission-critical network planning
10.
Mission-critical network planning
by
Liotine, Matthew.
Click to View
Format:
Cybersecurity operations handbook
11.
Cybersecurity operations handbook
by
Rittinghouse, John W.
Click to View
Format:
zSeries crypto guide update
12.
zSeries crypto guide update
by
Rayns, Chris.
Click to View
Format:
Eylem Seç
Ayırt
Listelerime ekle
Eposta
Yazdır
1
2
Search Results
Elektronik Kaynaklar
Search Results
Elektronik Kaynaklar
OK
Eposta Adresleri
:
Phone Number:
Mobile Carrier:
AT&T
Boost
Nextel (Sprint)
Sprint (PCS)
T Mobile
TracFone
US Cellular
Verizon
Virgin
Select An Item
Data usage warning: You will receive one text message for each title you selected.
Standard text messaging rates apply.
Text it to me
Text it to me, and go to next item
Elektronik Kaynaklar
Sonuçlar alınıyor Elektronik Kaynaklar...
action