Giriş
|
Hesabım
|
Listelerim
|
|
Remember to clear the cache and close the browser window.
English
Search Limit
Bütün Kütüphaneler
Electronic Resources
All
Başkent University Library
Anadolu OSB Meslek Yüksekokulu
Atasev Özel Koleksiyon
Erdoğan Tercan Collection
Fine Arts And Design Archive
Kazan Meslek Yüksekokulu
Law Collection
Ord.Prof.Dr. Enver Ziya Karal Tarih Uygulama Ars.Mrk.
Özel Koleksiyon Serdar Özersin
Thesis Collection
Tüm Alanlar
Başlık
Yazar
Konu
ISBN
ISSN
11
Search Field
Tüm Alanlar
Arama:
Gelişmiş Arama
Search Results
Electronic Resources
Arama Sonuçlarını Sınırlandır
Daraltılmış:
+
Kütüphane: Başkent Kütüphanesi
+
Yayın Yılı: 2006
+
Konu: Computer networks -- Security measures.
Yazar
Dahil
Hariç
ProQuest (Firm)
(11)
Contos, Brian T.
(2)
Aissi, Selim.
(1)
Amini, Rob.
(1)
Babbin, Jacob.
(1)
Bendell, Daniel H.
(1)
Bhardwaj, Pawan K.
(1)
Cantrell, Chris.
(1)
Cole, Eric.
(1)
Dabbous, Nora.
(1)
Flynn, Hal.
(1)
Fortenberry, Benjamin W.
(1)
Gregg, Michael (Michael C.)
(1)
Gutiérrez, Esteban.
(1)
Henmi, Anne.
(1)
Hunter, Laura E.
(1)
Lathem, Chris.
(1)
Long, Johnny.
(1)
Lucas, Mark.
(1)
Lynn, Kevin.
(1)
Maynor, David.
(1)
Osborne, Mark.
(1)
Osman, Onur, ortak yazar
(1)
Piccard, Paul L.
(1)
Prasad, Anand.
(1)
Reed, Joshua.
(1)
Ring, Sandra.
(1)
Sachs, Marcus H.
(1)
Singh, Abhishek.
(1)
Uçan, Osman Nuri, 1960-.
(1)
Watkins, Stephen (Information security professional)
(1)
Daha fazla
Tümünü genişlet
Daha az
Hepsini Daralt
Materyal Türü
Dahil
Hariç
E-Kitap
Kitap
Dil
Dahil
Hariç
English
(15)
Turkish
(1)
Konu
Dahil
Hariç
Electronic books.
(15)
Computer security.
(9)
Computer hackers.
(4)
COMPUTERS -- Internet -- Security.
(3)
COMPUTERS -- Networking -- Security.
(3)
COMPUTERS -- Security -- General.
(3)
Firewalls (Computer security)
(3)
Application logging (Computer science)
(1)
Bilgisayar ağları -- Güvenlik önlemleri.
(1)
Bilgisayar ağları.
(1)
COMPUTERS -- Operating Systems -- DOS.
(1)
COMPUTERS -- Operating Systems -- Macintosh.
(1)
COMPUTERS -- Operating Systems -- Windows Server & NT.
(1)
COMPUTERS -- Operating Systems -- Windows Workstation.
(1)
COMPUTERS -- System Administration -- Windows Administration.
(1)
Commercial crimes.
(1)
Computer crimes -- Prevention.
(1)
Computer networks -- Management.
(1)
Computer networks.
(1)
Computer security -- Management.
(1)
Database security.
(1)
Electronic information resources -- Access control.
(1)
Hackers.
(1)
Instant messaging.
(1)
Internet -- Security measures.
(1)
Microsoft Windows (Computer file)
(1)
Microsoft Windows server.
(1)
Microsoft Windows.
(1)
Operating systems (Computers)
(1)
Operations systems (Computer)
(1)
Peer-to-peer architecture (Computer networks)
(1)
Wireless communication systems -- Security measures.
(1)
Daha fazla
Tümünü genişlet
Daha az
Hepsini Daralt
Lokasyon
Dahil
Hariç
Ebook Central
Elsevier E-Kitap Koleksiyonu
Merkez Kütüphane
false
{sortLabel}
{alphabetical}
{relevance}
{include}
{exclude}
{facetName}
{results}
{displayName}
{count}
{error}
Eylem Seç
Ayırt
Listelerime ekle
Eposta
Yazdır
16 sonuç bulundu
1
2
Sırala:
Konuyla İlgili Sırala
Yayın Yılı (eskiden yeniye)
Yayın Yılı (yeniden eskiye)
Başlık
Yazar
OK
Eposta Adresleri
:
Phone Number:
Mobile Carrier:
AT&T
Boost
Nextel (Sprint)
Sprint (PCS)
T Mobile
TracFone
US Cellular
Verizon
Virgin
Select An Item
Data usage warning: You will receive one text message for each title you selected.
Standard text messaging rates apply.
Text it to me
Text it to me, and go to next item
000000000000
DEFAULTTR
Liste seç
Geçici Liste
Bunu varsayılan liste yap.
Öğeler başarıyla eklendi
Öğeler eklenirken hata oldu. Lütfen tekrar deneyiniz.
Firewall policies and VPN configurations
1.
Firewall policies and VPN configurations
by
Cantrell, Chris.
Click to View
Format:
Enemy at the water cooler real-life stories of insider threats and Enterprise Security Management countermeasures
2.
Enemy at the water cooler real-life stories of insider threats and Enterprise Security Management countermeasures
by
Contos, Brian T.
Click to View
Format:
How to cheat at designing security for a Windows Server 2003 network
3.
How to cheat at designing security for a Windows Server 2003 network
by
Amini, Rob.
Click to View
Format:
Security log management identifying patterns in the chaos
4.
Security log management identifying patterns in the chaos
by
Babbin, Jacob.
Click to View
Format:
Penetration tester's open source toolkit
5.
Penetration tester's open source toolkit
by
Long, Johnny.
Click to View
Format:
Securing IM and P2P applications for the enterprise
6.
Securing IM and P2P applications for the enterprise
by
Piccard, Paul L.
Click to View
Format:
Insider threat protecting the enterprise from sabotage, spying, and theft
7.
Insider threat protecting the enterprise from sabotage, spying, and theft
by
Cole, Eric.
Click to View
Format:
Configuring SonicWALL firewalls
8.
Configuring SonicWALL firewalls
by
Lathem, Chris.
Click to View
Format:
How to cheat at managing information security
9.
How to cheat at managing information security
by
Osborne, Mark.
Click to View
Format:
Designing and building enterprise DMZs
10.
Designing and building enterprise DMZs
by
Flynn, Hal.
Click to View
Format:
Security for mobile networks and platforms
11.
Security for mobile networks and platforms
by
Aissi, Selim.
Click to View
Format:
How to cheat at Windows system administration using command line scripts
12.
How to cheat at Windows system administration using command line scripts
by
Bhardwaj, Pawan K.
ScienceDirect
http://www.sciencedirect.com/science/book/9781597491051
Format:
Eylem Seç
Ayırt
Listelerime ekle
Eposta
Yazdır
1
2
Search Results
Electronic Resources
Search Results
Electronic Resources
OK
Eposta Adresleri
:
Phone Number:
Mobile Carrier:
AT&T
Boost
Nextel (Sprint)
Sprint (PCS)
T Mobile
TracFone
US Cellular
Verizon
Virgin
Select An Item
Data usage warning: You will receive one text message for each title you selected.
Standard text messaging rates apply.
Text it to me
Text it to me, and go to next item
Electronic Resources
Sonuçlar alınıyor Electronic Resources...
action