Skip to:
Search Results
|
Bottom
|
Search Facets
|
Content
Giriş
|
Hesabım
|
Listelerim
|
|
Remember to clear the cache and close the browser window.
English
Search Limit
Bütün Kütüphaneler
Elektronik Kaynaklar
Hepsi
Başkent Üniversitesi Kütüphanesi
Anadolu OSB Meslek Yüksekokulu
Atasev Özel Koleksiyon
Erdoğan Tercan Koleksiyonu
Güzel Sanatlar ve Tasarım Arşivi
Kazan Meslek Yüksekokulu
Hukuk Koleksiyonu
Ord.Prof.Dr. Enver Ziya Karal Tarih Uygulama Ars.Mrk.
Özel Koleksiyon Serdar Özersin
Tez Koleksiyonu
Tüm Alanlar
Başlık
Yazar
Konu
ISBN
ISSN
13
Search Field
Tüm Alanlar
Arama:
Gelişmiş Arama
Search Results
Elektronik Kaynaklar
Arama Sonuçlarını Sınırlandır
Daraltılmış:
+
Konu: 0489
+
Konu: 0984
Yazar
Dahil
Hariç
Colorado Technical University. Computer Science. degree granting institution.
(3)
Northcentral University. Business and Technology Management. degree granting institution.
(2)
Universidade NOVA de Lisboa (Portugal). degree granting institution.
(2)
University of Colorado at Denver. Computer Science and Information Systems. degree granting institution.
(2)
Adeghe, John I., author.
(1)
Alotaibi, Mazen, author.
(1)
Buehler, Erin, author.
(1)
Burney, Micaela L., author.
(1)
Buyukkayhan, Ahmet Salih, author.
(1)
California State University, Los Angeles. Computer Science. degree granting institution.
(1)
Capella University. School of Business and Technology. degree granting institution.
(1)
Capitol Technology University. Business and Information Sciences. degree granting institution.
(1)
Capitol Technology University. Cybersecurity. degree granting institution.
(1)
Cooper, Harry R., author.
(1)
Douglas, Zachary, author.
(1)
Drexel University. Digital Media (Westphal College of Media Arts and Design). degree granting institution.
(1)
Elebute, Kunle, author.
(1)
Guruji, Parag, author.
(1)
Karboviak, Kelton Olson, author.
(1)
Khan, Muhammad R., author.
(1)
Khojah, Mohammed, author.
(1)
Massachusetts Institute of Technology. degree granting institution.
(1)
Mathias, Henry, author.
(1)
Mohamad Noor, Noor Maizura, author.
(1)
Mohammadi Ghazi, Reza, author.
(1)
Murphy, David S., author.
(1)
Narne, Narendra Babu, author.
(1)
Northcentral University. School of Business and Technology Management. degree granting institution.
(1)
Northeastern University. Information Assurance. degree granting institution.
(1)
Oklahoma State University. Computer Science. degree granting institution.
(1)
Oloidi, Aramide, author.
(1)
Olorunsola, Folorunso Allan, author.
(1)
Palakvangsa-Na-Ayudhya, Srisupa, author.
(1)
Paulson, Erik Steven, author.
(1)
Plantevin, Par Valère, author.
(1)
Purdue University. Computer and Information Technology. degree granting institution.
(1)
Rhodes, Dustin, author.
(1)
Robert Morris University. Information Systems and Communications. degree granting institution.
(1)
Rochester Institute of Technology. Software Engineering. degree granting institution.
(1)
Rodolfo, Inês Martins Sequeira, author.
(1)
Sawada, Kae, author.
(1)
Scalise, Benjamin F., III, author.
(1)
Sesay, Abdul, author.
(1)
Silva, Luís Alexandre Ferreira da, author.
(1)
Steinberg, Bryan E., author.
(1)
Sylvertooth, Randall Earl, author.
(1)
The University of Manchester (United Kingdom). School of Computer Science. degree granting institution.
(1)
The University of Manchester (United Kingdom). School of Informatics. degree granting institution.
(1)
The University of North Carolina at Charlotte. Computer Science. degree granting institution.
(1)
The University of North Dakota. Computer Science. degree granting institution.
(1)
The University of Wisconsin - Madison. Computer Sciences. degree granting institution.
(1)
Thomas, Maurice A., author.
(1)
Thomas, Tyler William, author.
(1)
Tisdale, Susan M., author.
(1)
Tripathi, Rashmi, author.
(1)
Universite du Quebec a Chicoutimi (Canada). Informatique et mathématique. degree granting institution.
(1)
University of California, Berkeley. Information Management and Systems. degree granting institution.
(1)
University of California, Santa Cruz. Computer Science. degree granting institution.
(1)
University of Colorado at Denver. Recording Arts. degree granting institution.
(1)
University of Maryland, Baltimore County. Human Centered Computing. degree granting institution.
(1)
University of Missouri - Kansas City. Computer Science. degree granting institution.
(1)
Utica College. Cybersecurity. degree granting institution.
(1)
Walden University. Management. degree granting institution.
(1)
Wilmington University (Delaware). College of Education. degree granting institution.
(1)
Xie, Jiachi, author.
(1)
Daha fazla
Tümünü genişlet
Daha az
Hepsini Daralt
Materyal Türü
Dahil
Hariç
E-Tez
Dil
Dahil
Hariç
English
(35)
Yayın Yılı
Dahil
Hariç
-
2018
(21)
2019
(7)
2017
(3)
2005
(2)
2016
(2)
Konu
Dahil
Hariç
Computer science.
(35)
Information technology.
(35)
0723
(8)
Information science.
(8)
0310
(3)
Business administration.
(3)
0710
(2)
Educational technology.
(2)
0206
(1)
0306
(1)
0389
(1)
0454
(1)
0464
(1)
0543
(1)
0544
(1)
0703
(1)
0745
(1)
0750
(1)
0771
(1)
0790
(1)
0800
(1)
Artificial intelligence.
(1)
Biology.
(1)
Civil engineering.
(1)
Computer engineering.
(1)
Design.
(1)
Electrical engineering.
(1)
Higher education.
(1)
Law enforcement.
(1)
Management.
(1)
Military studies.
(1)
Organizational behavior.
(1)
Robotics.
(1)
Systems science.
(1)
Daha fazla
Tümünü genişlet
Daha az
Hepsini Daralt
Kütüphane
Dahil
Hariç
Başkent Kütüphanesi
Lokasyon
Dahil
Hariç
Proquest E-Tez Koleksiyonu
false
{sortLabel}
{alphabetical}
{relevance}
{include}
{exclude}
{facetName}
{results}
{displayName}
{count}
{error}
Eylem Seç
Ayırt
Listelerime ekle
Eposta
Yazdır
35 sonuç bulundu
1
2
3
Sırala:
Konuyla İlgili Sırala
Yayın Yılı (eskiden yeniye)
Yayın Yılı (yeniden eskiye)
Başlık
Yazar
OK
Eposta Adresleri
:
Phone Number:
Mobile Carrier:
AT&T
Boost
Nextel (Sprint)
Sprint (PCS)
T Mobile
TracFone
US Cellular
Verizon
Virgin
Select An Item
Data usage warning: You will receive one text message for each title you selected.
Standard text messaging rates apply.
Text it to me
Text it to me, and go to next item
000000000000
DEFAULTTR
Liste seç
Geçici Liste
Bunu varsayılan liste yap.
Öğeler başarıyla eklendi
Öğeler eklenirken hata oldu. Lütfen tekrar deneyiniz.
Exploring the Policies, Cybersecurity Strategists Need to Combat Non-state Actors in the Cyber-Domain of U.S. Military Warfare
1.
Exploring the Policies, Cybersecurity Strategists Need to Combat Non-state Actors in the Cyber-Domain of U.S. Military Warfare
by
Scalise, Benjamin F., III, author.
http://gateway.proquest.com/openurl?url_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:dissertation&res_dat=xri:pqm&rft_dat=xri:pqdiss:13807364
Format:
Evaluating Electronic Health Records Interoperability Symbiotic Relationship to Information Management Governance Security Risks
2.
Evaluating Electronic Health Records Interoperability Symbiotic Relationship to Information Management Governance Security Risks
by
Thomas, Maurice A., author.
http://gateway.proquest.com/openurl?url_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:dissertation&res_dat=xri:pqm&rft_dat=xri:pqdiss:13808526
Format:
Project Management Maturity in It: The Implementation of Industry Project Management Structure in Higher Education
3.
Project Management Maturity in It: The Implementation of Industry Project Management Structure in Higher Education
by
Steinberg, Bryan E., author.
http://gateway.proquest.com/openurl?url_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:dissertation&res_dat=xri:pqm&rft_dat=xri:pqdiss:13812682
Format:
Cyber-security Challenges in Financial Institutions in Nigeria: A Multiple Case Study
4.
Cyber-security Challenges in Financial Institutions in Nigeria: A Multiple Case Study
by
Oloidi, Aramide, author.
http://gateway.proquest.com/openurl?url_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:dissertation&res_dat=xri:pqm&rft_dat=xri:pqdiss:13813041
Format:
Exploring the Cloud Adoption Processes SMEs Need to Secure Their Business
5.
Exploring the Cloud Adoption Processes SMEs Need to Secure Their Business
by
Adeghe, John I., author.
http://gateway.proquest.com/openurl?url_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:dissertation&res_dat=xri:pqm&rft_dat=xri:pqdiss:13813322
Format:
Analyzing Small Businesses' Adoption of Big Data Security Analytics
6.
Analyzing Small Businesses' Adoption of Big Data Security Analytics
by
Mathias, Henry, author.
http://gateway.proquest.com/openurl?url_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:dissertation&res_dat=xri:pqm&rft_dat=xri:pqdiss:13857503
Format:
Understanding and Mitigating Attacks Targeting Web Browsers
7.
Understanding and Mitigating Attacks Targeting Web Browsers
by
Buyukkayhan, Ahmet Salih, author.
http://gateway.proquest.com/openurl?url_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:dissertation&res_dat=xri:pqm&rft_dat=xri:pqdiss:13860953
Format:
Design, Implementation, and Evaluation of Emerge2Maturity, an Innovative Serious Game That Uses Simulation to Depict the Data Warehouse Development
8.
Design, Implementation, and Evaluation of Emerge2Maturity, an Innovative Serious Game That Uses Simulation to Depict the Data Warehouse Development
by
Khojah, Mohammed, author.
http://gateway.proquest.com/openurl?url_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:dissertation&res_dat=xri:pqm&rft_dat=xri:pqdiss:10810051
Format:
Exploring Inclusive Learning Interactions for Students with Intellectual Disabilities in Postsecondary Education
9.
Exploring Inclusive Learning Interactions for Students with Intellectual Disabilities in Postsecondary Education
by
Buehler, Erin, author.
http://gateway.proquest.com/openurl?url_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:dissertation&res_dat=xri:pqm&rft_dat=xri:pqdiss:10812171
Format:
Wearing the Badge and the Camera: A Sociomaterial Perspective on Police Use of Body-Worn Cameras
10.
Wearing the Badge and the Camera: A Sociomaterial Perspective on Police Use of Body-Worn Cameras
by
Sesay, Abdul, author.
http://gateway.proquest.com/openurl?url_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:dissertation&res_dat=xri:pqm&rft_dat=xri:pqdiss:10811499
Format:
Security Code Review with Static Analysis Techniques for the Detection and Remediation of Security Vulnerabilities
11.
Security Code Review with Static Analysis Techniques for the Detection and Remediation of Security Vulnerabilities
by
Thomas, Tyler William, author.
http://gateway.proquest.com/openurl?url_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:dissertation&res_dat=xri:pqm&rft_dat=xri:pqdiss:10822885
Format:
Zero-Day Vulnerability In Software-Defined Networks: A Quantitative Study
12.
Zero-Day Vulnerability In Software-Defined Networks: A Quantitative Study
by
Olorunsola, Folorunso Allan, author.
http://gateway.proquest.com/openurl?url_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:dissertation&res_dat=xri:pqm&rft_dat=xri:pqdiss:10823009
Format:
Eylem Seç
Ayırt
Listelerime ekle
Eposta
Yazdır
1
2
3
Search Results
Elektronik Kaynaklar
Search Results
Elektronik Kaynaklar
OK
Eposta Adresleri
:
Phone Number:
Mobile Carrier:
AT&T
Boost
Nextel (Sprint)
Sprint (PCS)
T Mobile
TracFone
US Cellular
Verizon
Virgin
Select An Item
Data usage warning: You will receive one text message for each title you selected.
Standard text messaging rates apply.
Text it to me
Text it to me, and go to next item
Elektronik Kaynaklar
Sonuçlar alınıyor Elektronik Kaynaklar...
action
Go to:
Search Results
|
Search Facets
|
Top of Page