Giriş
|
Hesabım
|
Listelerim
|
|
Remember to clear the cache and close the browser window.
English
Search Limit
Bütün Kütüphaneler
Elektronik Kaynaklar
Hepsi
Başkent Üniversitesi Kütüphanesi
Anadolu OSB Meslek Yüksekokulu
Atasev Özel Koleksiyon
Erdoğan Tercan Koleksiyonu
Güzel Sanatlar ve Tasarım Arşivi
Kazan Meslek Yüksekokulu
Hukuk Koleksiyonu
Ord.Prof.Dr. Enver Ziya Karal Tarih Uygulama Ars.Mrk.
Özel Koleksiyon Serdar Özersin
Tez Koleksiyonu
Tüm Alanlar
Başlık
Yazar
Konu
ISBN
ISSN
8
Search Field
Tüm Alanlar
Arama:
Gelişmiş Arama
Search Results
Elektronik Kaynaklar
Arama Sonuçlarını Sınırlandır
Daraltılmış:
+
Publication Date: 2002
+
Konu: Computer security.
Yazar
Dahil
Hariç
ProQuest (Firm)
(10)
International Business Machines Corporation. International Technical Support Organization.
(2)
Meyer, Greg.
(2)
Russell, Ryan, 1969-
(2)
'Ken'@ftu.
(1)
Ahmad, David R. Mirza.
(1)
Berber, Leyla Keser
(1)
Bidwell, Teri.
(1)
Blobel, Bernd.
(1)
Bloom, Jeffrey A. (Jeffrey Adam), 1964-
(1)
Casco, Steven.
(1)
Cox, I. J. (Ingemar J.)
(1)
Cross, Michael, 1965-
(1)
C̆ervĕn, Pavol.
(1)
Dhillon, Gurpreet.
(1)
Galbreath, Nick
(1)
Hutchinson, William.
(1)
Kaufman, Charlie.
(1)
Lang, Ulrich.
(1)
Lascu, Octavian.
(1)
Miller, Matthew L.
(1)
O'Farrell, Neal.
(1)
Perlman, Radia, joint author
(1)
Rayns, Chris.
(1)
Schreiner, Rudolf.
(1)
Shinder, Debra Littlejohn, author.
(1)
Simonis, Drew.
(1)
Speciner, Mike, joint author
(1)
Stefanek, George L.
(1)
Tittel, Ed, author.
(1)
Warren, Matt.
(1)
Daha fazla
Tümünü genişlet
Daha az
Hepsini Daralt
Materyal Türü
Dahil
Hariç
E-Kitap
Kitap
Dil
Dahil
Hariç
English
(18)
Turkish
(1)
Konu
Dahil
Hariç
Electronic books.
(17)
Computer networks -- Security measures.
(6)
COMPUTERS -- Internet -- Security.
(4)
COMPUTERS -- Networking -- Security.
(4)
COMPUTERS -- Security -- General.
(4)
Bilgisayar güvenliği.
(3)
ColdFusion.
(2)
Computer crimes.
(2)
Computers -- Access control.
(2)
Data protection.
(2)
Database security.
(2)
Internet -- Security measures.
(2)
XML (Document markup language)
(2)
AIX (Computer file)
(1)
Bilgisayar ağları -- Hukuk ve yasama.
(1)
Bilgisayarlar -- Erişim kontrolü.
(1)
COMPUTERS -- Security -- Cryptography.
(1)
CORBA (Computer architecture)
(1)
Computer crimes -- Investigation -- Handbooks, manuals, etc.
(1)
Computer crimes -- Investigation.
(1)
Computer networks -- Law and legislation.
(1)
Computer networks -- Security measures -- Handbooks, manuals, etc.
(1)
Computer networks -- Security measures -- United States.
(1)
Computer security -- Handbooks, manuals, etc.
(1)
Computer security -- United States.
(1)
Computercriminaliteit.
(1)
Criminalistiek.
(1)
Cryptography.
(1)
Database design.
(1)
Digital signatures.
(1)
Digital watermarking.
(1)
Dijital imzalar.
(1)
Distributed operating systems (Computers)
(1)
Electronic commerce -- Law and legislation.
(1)
Electronic funds transfers.
(1)
Elektronik fon transferi.
(1)
Elektronik ticaret -- Hukuk ve yasama.
(1)
Forensic sciences -- Handbooks, manuals, etc.
(1)
Forensic sciences.
(1)
Handbooks and manuals.
(1)
IBM Cluster systems management.
(1)
Identification cards -- Forgeries.
(1)
Impostors and imposture.
(1)
Internet fraud.
(1)
Java (bilgisayar program dili).
(1)
Java (computer program language).
(1)
Kriptografi.
(1)
Medical informatics.
(1)
Medical records -- Access control.
(1)
Medical records -- Data processing.
(1)
Software protection.
(1)
World Wide Web -- Security measures.
(1)
z/OS.
(1)
İnternet -- Emniyet ölçümleri.
(1)
Daha fazla
Tümünü genişlet
Daha az
Hepsini Daralt
Kütüphane
Dahil
Hariç
Başkent Kütüphanesi
Lokasyon
Dahil
Hariç
Ebook Central
Elsevier E-Kitap Koleksiyonu
Merkez Kütüphane
Özel Koleksiyon Serdar Özersin
false
{sortLabel}
{alphabetical}
{relevance}
{include}
{exclude}
{facetName}
{results}
{displayName}
{count}
{error}
Eylem Seç
Ayırt
Listelerime ekle
Eposta
Yazdır
20 sonuç bulundu
1
2
Sırala:
Konuyla İlgili Sırala
Yayın Yılı (eskiden yeniye)
Yayın Yılı (yeniden eskiye)
Başlık
Yazar
OK
Eposta Adresleri
:
Phone Number:
Mobile Carrier:
AT&T
Boost
Nextel (Sprint)
Sprint (PCS)
T Mobile
TracFone
US Cellular
Verizon
Virgin
Select An Item
Data usage warning: You will receive one text message for each title you selected.
Standard text messaging rates apply.
Text it to me
Text it to me, and go to next item
000000000000
DEFAULTTR
Liste seç
Geçici Liste
Bunu varsayılan liste yap.
Öğeler başarıyla eklendi
Öğeler eklenirken hata oldu. Lütfen tekrar deneyiniz.
Putting the latest z/OS security features to work
1.
Putting the latest z/OS security features to work
by
Rayns, Chris.
Click to View
Format:
An introduction to security in a CSM 1.3 for AIX 5L environment
2.
An introduction to security in a CSM 1.3 for AIX 5L environment
by
Lascu, Octavian.
Click to View
Format:
Cybersecurity today and tomorrow pay now or pay later
3.
Cybersecurity today and tomorrow pay now or pay later
by
ProQuest (Firm)
Click to View
Format:
Developing secure distributed systems with CORBA
4.
Developing secure distributed systems with CORBA
by
Lang, Ulrich.
Click to View
Format:
Special issue on internet security
5.
Special issue on internet security
by
Dhillon, Gurpreet.
Click to View
Format:
Check Point NG next generation security administration
6.
Check Point NG next generation security administration
by
Simonis, Drew.
Click to View
Format:
Hack proofing ColdFusion
7.
Hack proofing ColdFusion
by
Meyer, Greg.
Click to View
Format:
Hack proofing XML
8.
Hack proofing XML
by
O'Farrell, Neal.
Click to View
Format:
Analysis, design, and implementation of secure and interoperable distributed health information systems
9.
Analysis, design, and implementation of secure and interoperable distributed health information systems
by
Blobel, Bernd.
Click to View
Format:
Crackproof your software the best ways to protect your software against crackers
10.
Crackproof your software the best ways to protect your software against crackers
by
C̆ervĕn, Pavol.
Click to View
Format:
İnternet üzerinden yapılan işlemlerde elektronik para ve dijital imza
11.
İnternet üzerinden yapılan işlemlerde elektronik para ve dijital imza
by
Berber, Leyla Keser
Format:
Cryptography for internet and database applications : developing secret and public key techniques with Java
12.
Cryptography for internet and database applications : developing secret and public key techniques with Java
by
Galbreath, Nick
Format:
Eylem Seç
Ayırt
Listelerime ekle
Eposta
Yazdır
1
2
Search Results
Elektronik Kaynaklar
Search Results
Elektronik Kaynaklar
OK
Eposta Adresleri
:
Phone Number:
Mobile Carrier:
AT&T
Boost
Nextel (Sprint)
Sprint (PCS)
T Mobile
TracFone
US Cellular
Verizon
Virgin
Select An Item
Data usage warning: You will receive one text message for each title you selected.
Standard text messaging rates apply.
Text it to me
Text it to me, and go to next item
Elektronik Kaynaklar
Sonuçlar alınıyor Elektronik Kaynaklar...
action