Giriş
|
Hesabım
|
Listelerim
|
|
Remember to clear the cache and close the browser window.
English
Search Limit
Bütün Kütüphaneler
Elektronik Kaynaklar
Hepsi
Başkent Üniversitesi Kütüphanesi
Anadolu OSB Meslek Yüksekokulu
Atasev Özel Koleksiyon
Erdoğan Tercan Koleksiyonu
Güzel Sanatlar ve Tasarım Arşivi
Kazan Meslek Yüksekokulu
Hukuk Koleksiyonu
Ord.Prof.Dr. Enver Ziya Karal Tarih Uygulama Ars.Mrk.
Özel Koleksiyon Serdar Özersin
Tez Koleksiyonu
Tüm Alanlar
Başlık
Yazar
Konu
ISBN
ISSN
8
Search Field
Tüm Alanlar
Arama:
Gelişmiş Arama
Search Results
Elektronik Kaynaklar
Arama Sonuçlarını Sınırlandır
Daraltılmış:
+
Language: English
+
Lokasyon: Ebook Central
+
Yayın Yılı: 2011
+
Konu: Computer networks -- Security measures.
Yazar
Dahil
Hariç
ProQuest (Firm)
(17)
Ali, Shakeel.
(1)
Atiya, Amir F.
(1)
Ben-Ari, Erez.
(1)
Bertino, Elisa.
(1)
Canavan, Tom.
(1)
Connelly, Olly.
(1)
Davies, Joshua Dennis.
(1)
Demchak, Chris C.
(1)
Dewald, Andreas, author.
(1)
Dolev, Ran.
(1)
Duman, Ekrem.
(1)
Freiling, Felix, author of introduction, etc.
(1)
Göbel, Jan Gerrit, author.
(1)
Heriyanto, Tedi.
(1)
Krutz, Ronald L.
(1)
Kumar, Atul.
(1)
Meine, Bill.
(1)
Miletić, Darko.
(1)
Mönch, Kathrin, editor.
(1)
Nahari, Hadi.
(1)
Siliceo, Omar.
(1)
Solomon, Michael R.
(1)
Takahashi, Kenji.
(1)
Thuraisingham, Bhavani M.
(1)
Tsai, Jeffrey J.-P.
(1)
Wheeler, Evan.
(1)
Winkler, J. R. (Joachim R.)
(1)
Wright, Steve.
(1)
Yu, Zhenwei.
(1)
Daha fazla
Tümünü genişlet
Daha az
Hepsini Daralt
Materyal Türü
Dahil
Hariç
E-Kitap
Konu
Dahil
Hariç
Electronic books.
(19)
Computer security.
(7)
Data protection.
(3)
Web sites -- Security measures.
(2)
World Wide Web -- Security measures.
(2)
Business enterprises -- Computer networks -- Security measures.
(1)
Cloud computing.
(1)
Computer crimes -- Investments.
(1)
Computer network protocols.
(1)
Computer security -- Evaluation.
(1)
Computer-assisted instruction -- Security measures.
(1)
Computers -- Access control.
(1)
Credit cards.
(1)
Cyberspace -- Security measures.
(1)
Cyberterrorism -- Prevention.
(1)
Data protection -- Standards.
(1)
Database security.
(1)
Forensic sciences.
(1)
Information warfare.
(1)
Internet -- Security measures.
(1)
Liability for credit information.
(1)
Microsoft Windows (Computer file)
(1)
Moodle -- Handbooks, manuals, etc.
(1)
National security -- Risk assessment.
(1)
National security -- Technological innovations.
(1)
Open source software.
(1)
Oracle (Computer file)
(1)
Service-oriented architecture (Computer science)
(1)
WebSphere.
(1)
WordPress (Electronic resource)
(1)
Daha fazla
Tümünü genişlet
Daha az
Hepsini Daralt
Kütüphane
Dahil
Hariç
Başkent Kütüphanesi
false
{sortLabel}
{alphabetical}
{relevance}
{include}
{exclude}
{facetName}
{results}
{displayName}
{count}
{error}
Eylem Seç
Ayırt
Listelerime ekle
Eposta
Yazdır
19 sonuç bulundu
1
2
Sırala:
Konuyla İlgili Sırala
Yayın Yılı (eskiden yeniye)
Yayın Yılı (yeniden eskiye)
Başlık
Yazar
OK
Eposta Adresleri
:
Phone Number:
Mobile Carrier:
AT&T
Boost
Nextel (Sprint)
Sprint (PCS)
T Mobile
TracFone
US Cellular
Verizon
Virgin
Select An Item
Data usage warning: You will receive one text message for each title you selected.
Standard text messaging rates apply.
Text it to me
Text it to me, and go to next item
000000000000
DEFAULTTR
Liste seç
Geçici Liste
Bunu varsayılan liste yap.
Öğeler başarıyla eklendi
Öğeler eklenirken hata oldu. Lütfen tekrar deneyiniz.
Wars of disruption and resilience cybered conflict, power, and national security
1.
Wars of disruption and resilience cybered conflict, power, and national security
by
Demchak, Chris C.
Click to View
Format:
Use of risk analysis in computer-aided persuasion
2.
Use of risk analysis in computer-aided persuasion
by
Duman, Ekrem.
Click to View
Format:
IBM WebSphere application server V7.0 security secure your WebSphere applications with Java EE and JAAS security standards
3.
IBM WebSphere application server V7.0 security secure your WebSphere applications with Java EE and JAAS security standards
by
Siliceo, Omar.
Click to View
Format:
Moodle security learn how to install and configure Moodle in the most secure way possible
4.
Moodle security learn how to install and configure Moodle in the most secure way possible
by
Miletić, Darko.
Click to View
Format:
WordPress 3 ultimate security protect your WordPress site and its network
5.
WordPress 3 ultimate security protect your WordPress site and its network
by
Connelly, Olly.
Click to View
Format:
Oracle Identity and Access Manager 11g for administrators administer Oracle Identity and Access Management: installation, configuration, and day-to-day tasks
6.
Oracle Identity and Access Manager 11g for administrators administer Oracle Identity and Access Management: installation, configuration, and day-to-day tasks
by
Kumar, Atul.
Click to View
Format:
Microsoft Forefront UAG 2010 administrator's handbook take full command of Microsoft Forefront Unified Access Gateway to secure your business applications and provide dynamic remote access with DirectAccess
7.
Microsoft Forefront UAG 2010 administrator's handbook take full command of Microsoft Forefront Unified Access Gateway to secure your business applications and provide dynamic remote access with DirectAccess
by
Ben-Ari, Erez.
Click to View
Format:
BackTrack 4 assuring security by penetration testing : master the art of penetration testing with BackTrack
8.
BackTrack 4 assuring security by penetration testing : master the art of penetration testing with BackTrack
by
Ali, Shakeel.
Click to View
Format:
Security risk management building an information security risk management program from the ground up
9.
Security risk management building an information security risk management program from the ground up
by
Wheeler, Evan.
Click to View
Format:
Securing the cloud cloud computer security techniques and tactics
10.
Securing the cloud cloud computer security techniques and tactics
by
Winkler, J. R. (Joachim R.)
Click to View
Format:
CMS security handbook the comprehensive guide for WordPress, Joomla!, Drupal, and Plone
11.
CMS security handbook the comprehensive guide for WordPress, Joomla!, Drupal, and Plone
by
Canavan, Tom.
Click to View
Format:
Implementing SSL/TLS using cryptography and PKI
12.
Implementing SSL/TLS using cryptography and PKI
by
Davies, Joshua Dennis.
Click to View
Format:
Eylem Seç
Ayırt
Listelerime ekle
Eposta
Yazdır
1
2
Search Results
Elektronik Kaynaklar
Search Results
Elektronik Kaynaklar
OK
Eposta Adresleri
:
Phone Number:
Mobile Carrier:
AT&T
Boost
Nextel (Sprint)
Sprint (PCS)
T Mobile
TracFone
US Cellular
Verizon
Virgin
Select An Item
Data usage warning: You will receive one text message for each title you selected.
Standard text messaging rates apply.
Text it to me
Text it to me, and go to next item
Elektronik Kaynaklar
Sonuçlar alınıyor Elektronik Kaynaklar...
action