Giriş
|
Hesabım
|
Listelerim
|
|
Remember to clear the cache and close the browser window.
English
Search Limit
Bütün Kütüphaneler
Elektronik Kaynaklar
Hepsi
Başkent Üniversitesi Kütüphanesi
Anadolu OSB Meslek Yüksekokulu
Atasev Özel Koleksiyon
Erdoğan Tercan Koleksiyonu
Güzel Sanatlar ve Tasarım Arşivi
Kazan Meslek Yüksekokulu
Hukuk Koleksiyonu
Ord.Prof.Dr. Enver Ziya Karal Tarih Uygulama Ars.Mrk.
Özel Koleksiyon Serdar Özersin
Tez Koleksiyonu
Tüm Alanlar
Başlık
Yazar
Konu
ISBN
ISSN
8
Search Field
Tüm Alanlar
Arama:
Gelişmiş Arama
Search Results
Elektronik Kaynaklar
Arama Sonuçlarını Sınırlandır
Daraltılmış:
+
Language: English
+
Lokasyon: Ebook Central
+
Yayın Yılı: 2012
+
Konu: Computer security.
Yazar
Dahil
Hariç
ProQuest (Firm)
(21)
Alcover, Jorge Blanco.
(1)
Aquilina, James M.
(1)
Bruchez, Rudi.
(1)
Calderon Pale, Paulino.
(1)
Carvey, Harlan A.
(1)
Casey, Eoghan.
(1)
Cherry, Denny.
(1)
Clarke, Justin.
(1)
Honig, Andrew.
(1)
Khan, Latifur.
(1)
Kleidermacher, David.
(1)
Kleidermacher, Mike.
(1)
Kolde, Jennifer.
(1)
Macaulay, Tyson.
(1)
Malin, Cameron H.
(1)
Mao, Wenji.
(1)
Masini, Luca.
(1)
Masud, Mehedy.
(1)
Mjølsnes, Stig F., author.
(1)
Mularien, Peter.
(1)
Musumeci, Guillermo.
(1)
Neagu, Adrian.
(1)
Nordström, Kent.
(1)
Shema, Mike.
(1)
Sikorski, Michael.
(1)
Singer, Bryan.
(1)
Smallwood, Robert F., 1959-
(1)
Thuraisingham, Bhavani M.
(1)
Vincenzo, Rinaldi.
(1)
Wang, Fei-Yue.
(1)
Wiles, Jack.
(1)
Winch, Robert.
(1)
Woodbury, Carol.
(1)
Wyler, Neil R.
(1)
Zalewski, Michal.
(1)
Daha fazla
Tümünü genişlet
Daha az
Hepsini Daralt
Materyal Türü
Dahil
Hariç
E-Kitap
Konu
Dahil
Hariç
Electronic books.
(22)
Computer networks -- Security measures.
(6)
Application software -- Security measures.
(2)
Computer viruses.
(2)
Database security.
(2)
Malware (Computer software)
(2)
SQL server.
(2)
Application software.
(1)
Automatic machinery -- Security measures.
(1)
BEA WebLogic server.
(1)
Browsers (Computer programs)
(1)
Citrix MetaFrame.
(1)
Client/server computing -- Security measures.
(1)
Client/server computing.
(1)
Computer crimes -- Investigation -- United States -- Methodology.
(1)
Computer crimes -- Investigation.
(1)
Computer crimes -- Prevention.
(1)
Computer hackers.
(1)
Computer software -- Development.
(1)
Computers -- Access control.
(1)
Cyberspace -- Security measures.
(1)
Data mining.
(1)
Debugging in computer science.
(1)
Electronic records.
(1)
IBM computers -- Programming.
(1)
Internet -- Security measures.
(1)
Microsoft Forefront.
(1)
Microsoft Windows (Computer file)
(1)
Microsoft Windows (Computer file) -- Security measures.
(1)
Multidisciplinary design optimization.
(1)
National security.
(1)
Oracle (Computer file) -- Handbooks, manuals, etc.
(1)
Process control -- Security measures.
(1)
SQL (Computer program language)
(1)
Scripting languages (Computer science)
(1)
Web site development -- Security measures.
(1)
i5/OS.
(1)
Daha fazla
Tümünü genişlet
Daha az
Hepsini Daralt
Kütüphane
Dahil
Hariç
Başkent Kütüphanesi
false
{sortLabel}
{alphabetical}
{relevance}
{include}
{exclude}
{facetName}
{results}
{displayName}
{count}
{error}
Eylem Seç
Ayırt
Listelerime ekle
Eposta
Yazdır
22 sonuç bulundu
1
2
Sırala:
Konuyla İlgili Sırala
Yayın Yılı (eskiden yeniye)
Yayın Yılı (yeniden eskiye)
Başlık
Yazar
OK
Eposta Adresleri
:
Phone Number:
Mobile Carrier:
AT&T
Boost
Nextel (Sprint)
Sprint (PCS)
T Mobile
TracFone
US Cellular
Verizon
Virgin
Select An Item
Data usage warning: You will receive one text message for each title you selected.
Standard text messaging rates apply.
Text it to me
Text it to me, and go to next item
000000000000
DEFAULTTR
Liste seç
Geçici Liste
Bunu varsayılan liste yap.
Öğeler başarıyla eklendi
Öğeler eklenirken hata oldu. Lütfen tekrar deneyiniz.
Securing SQL servers protecting your database from attackers
1.
Securing SQL servers protecting your database from attackers
by
Cherry, Denny.
Click to View
Format:
Getting started with Citrix XenApp 6.5 design and implement Citrix farms based on XenApp 6.5
2.
Getting started with Citrix XenApp 6.5 design and implement Citrix farms based on XenApp 6.5
by
Musumeci, Guillermo.
Click to View
Format:
Hacking web apps detecting and preventing web application security problems
3.
Hacking web apps detecting and preventing web application security problems
by
Shema, Mike.
Click to View
Format:
Microsoft Forefront Identity Manager 2010 R2 handbook
4.
Microsoft Forefront Identity Manager 2010 R2 handbook
by
Nordström, Kent.
Click to View
Format:
Malware forensics field guide for Windows systems digital forensics field guides
5.
Malware forensics field guide for Windows systems digital forensics field guides
by
Malin, Cameron H.
Click to View
Format:
SQL injection attacks and defense
6.
SQL injection attacks and defense
by
Clarke, Justin.
Click to View
Format:
Practical malware analysis the hands-on guide to dissecting malicious software
7.
Practical malware analysis the hands-on guide to dissecting malicious software
by
Sikorski, Michael.
Click to View
Format:
The tangled Web a guide to securing modern Web applications
8.
The tangled Web a guide to securing modern Web applications
by
Zalewski, Michal.
Click to View
Format:
Microsoft SQL Server 2012 security cookbook
9.
Microsoft SQL Server 2012 security cookbook
by
Bruchez, Rudi.
Click to View
Format:
Oracle 11g anti-hacker's cookbook
10.
Oracle 11g anti-hacker's cookbook
by
Neagu, Adrian.
Click to View
Format:
Securing WebLogic Server 12c learn to develop, administer, and troubleshot your WebLogic Server
11.
Securing WebLogic Server 12c learn to develop, administer, and troubleshot your WebLogic Server
by
Masini, Luca.
Click to View
Format:
Nmap 6 network exploration and security auditing cookbook ; a complete guide to mastering Nmap 6 and its scripting engine, covering practical tasks for penetration testers and system administrators
12.
Nmap 6 network exploration and security auditing cookbook ; a complete guide to mastering Nmap 6 and its scripting engine, covering practical tasks for penetration testers and system administrators
by
Calderon Pale, Paulino.
Click to View
Format:
Eylem Seç
Ayırt
Listelerime ekle
Eposta
Yazdır
1
2
Search Results
Elektronik Kaynaklar
Search Results
Elektronik Kaynaklar
OK
Eposta Adresleri
:
Phone Number:
Mobile Carrier:
AT&T
Boost
Nextel (Sprint)
Sprint (PCS)
T Mobile
TracFone
US Cellular
Verizon
Virgin
Select An Item
Data usage warning: You will receive one text message for each title you selected.
Standard text messaging rates apply.
Text it to me
Text it to me, and go to next item
Elektronik Kaynaklar
Sonuçlar alınıyor Elektronik Kaynaklar...
action