Skip to:
Search Results
|
Bottom
|
Search Facets
|
Content
Giriş
|
Hesabım
|
Listelerim
|
|
Remember to clear the cache and close the browser window.
English
Search Limit
Bütün Kütüphaneler
Electronic Resources
All
Başkent University Library
Anadolu OSB Meslek Yüksekokulu
Atasev Özel Koleksiyon
Erdoğan Tercan Collection
Fine Arts And Design Archive
Kazan Meslek Yüksekokulu
Law Collection
Ord.Prof.Dr. Enver Ziya Karal Tarih Uygulama Ars.Mrk.
Özel Koleksiyon Serdar Özersin
Thesis Collection
Tüm Alanlar
Başlık
Yazar
Konu
ISBN
ISSN
13
Search Field
Tüm Alanlar
Arama:
Gelişmiş Arama
Search Results
Electronic Resources
Arama Sonuçlarını Sınırlandır
Daraltılmış:
+
Konu: Computer networks -- Security measures.
Yazar
Dahil
Hariç
ProQuest (Firm)
(147)
Shimonski, Robert.
(6)
Vacca, John R.
(6)
Beale, Jay.
(5)
Foster, James C.
(5)
Shinder, Debra Littlejohn.
(5)
Shinder, Thomas W.
(5)
Andress, Jason.
(4)
Henmi, Anne.
(4)
Hunter, Laura E.
(4)
International Business Machines Corporation. International Technical Support Organization.
(4)
Rittinghouse, John W.
(4)
Behrens, Thorsten.
(3)
Cardwell, Kevin, author.
(3)
Carvey, Harlan A.
(3)
Cole, Eric.
(3)
Cross, Michael, 1965-
(3)
Grasdal, Martin.
(3)
Limbert, Matthew, designer.
(3)
Long, Johnny.
(3)
Ramirez, Gilbert.
(3)
Rogers, Russ.
(3)
Wiles, Jack.
(3)
Winkler, J. R. (Joachim R.)
(3)
Ahmad, David R. Mirza.
(2)
Alder, Raven.
(2)
Amini, Rob.
(2)
Andrés, Steven.
(2)
Archibald, Neil.
(2)
Babbin, Jacob.
(2)
Birkholz, Erik Pace.
(2)
Burnett, Mark (Mark M.)
(2)
Büyükgöze, Selma.
(2)
Cameron, Rob.
(2)
Canavan, Tom.
(2)
Cantrell, Chris.
(2)
Caswell, Brian.
(2)
Chuvakin, Anton.
(2)
Contos, Brian T.
(2)
Danielyan, Edgar.
(2)
El, Çağrı, ortak yazar
(2)
Erickson, Jon, 1977-
(2)
Gatford, Chris.
(2)
Gold, André.
(2)
Gonzalez, Deborah, author.
(2)
Haines, Brad.
(2)
Hancock, Bill, 1957-
(2)
Katsaropoulos, Chris, editor.
(2)
Khan, Umer.
(2)
Knipp, Eric.
(2)
Liska, Allan, author.
(2)
Lucas, Mark.
(2)
Manzuik, Steve.
(2)
Meyer, Greg.
(2)
Morris, Greg.
(2)
Norman, Thomas L.
(2)
Orebaugh, Angela.
(2)
Osipov, Vitaly.
(2)
Pan, Yi, 1960-
(2)
Parker, Tom.
(2)
Potter, Bruce.
(2)
Qian, Yi, 1962-
(2)
Ransome, James F.
(2)
Rash, Michael.
(2)
Rathaus, Noam.
(2)
Rayns, Chris.
(2)
Riley, Charles.
(2)
Ring, Sandra.
(2)
Rountree, Derrick.
(2)
Russell, Ryan, 1969-
(2)
Sachs, Marcus H.
(2)
Shema, Mike.
(2)
Singh, Abhishek.
(2)
Snedaker, Susan.
(2)
Stapko, Timothy John.
(2)
Strebe, Matthew.
(2)
Syngress Media, Inc.
(2)
Tam, Kenneth.
(2)
Thuraisingham, Bhavani M.
(2)
Todd, Chad.
(2)
Voeller, John G.
(2)
Warnicke, Ed.
(2)
Watkins, Stephen (Information security professional)
(2)
Wayner, Peter, 1964-
(2)
Williams, Branden R.
(2)
Winterfeld, Steve.
(2)
Wotring, Brian.
(2)
Zalewski, Michal.
(2)
Ablon, Lillian, author.
(1)
Aggarwal, Manuj, author.
(1)
Aissi, Selim.
(1)
Alcover, Jorge Blanco.
(1)
Ali, Shakeel.
(1)
Allen, Lee, 1946- author.
(1)
Allison, Steve.
(1)
Allsopp, Wil, author.
(1)
Allsopp, Wil.
(1)
American Evaluation Association.
(1)
Amon, Cheri.
(1)
Anderson, Brian (Brian James)
(1)
Andress, Jason, author.
(1)
Anson, Steve.
(1)
Antonius, Jesper.
(1)
Assam, Tarek.
(1)
Assing, Dominique.
(1)
Atiya, Amir F.
(1)
Au, Man-Ho, editor.
(1)
Ağ ve Bilgi Güvenliği Sempozyumu (4th : 2011 : Ankara, Turkey)
(1)
Baker, Andrew R.
(1)
Banks, Allister, author.
(1)
Barnes, Christian.
(1)
Barnett, Ryan C.
(1)
Baskin, Brian, author.
(1)
Baumrucker, C. Tate.
(1)
Bayer, Chad M.
(1)
Beaver, Kevin.
(1)
Bejtlich, Richard.
(1)
Ben-Ari, Erez.
(1)
Bendell, Dan.
(1)
Bendell, Daniel H.
(1)
Bennett, Eleanor Leonne, cover designer.
(1)
Bernard, Ray, author.
(1)
Bertino, Elisa.
(1)
Beyah, Raheem (Raheem A.), 1976-
(1)
Bhalla, Nish.
(1)
Bhardwaj, Pawan K.
(1)
Bhattacharjee, Sravani, author.
(1)
Bianco, David J., 1971-
(1)
Bindner, Andrew.
(1)
Blair, John, author.
(1)
Bolt, Steven.
(1)
Borkin, Mike.
(1)
Bouzefrane, Samia, editor.
(1)
Bradley, Tony, 1969-
(1)
Braman, Eric, editor.
(1)
Brant, Justin M.
(1)
Brashars, Joshua.
(1)
Bray, Rory.
(1)
Briggs, Jonathan.
(1)
Broad, James.
(1)
Buchanan, Cameron, author.
(1)
Burke, Josh.
(1)
Burton, James D.
(1)
Burton, James.
(1)
Bücker, Axel.
(1)
Calé, Stéphane.
(1)
Canlı, Mustafa
(1)
Cantrell, Christopher.
(1)
Capurro, Rafael.
(1)
Carafano, James Jay, 1955-
(1)
Carbone, Fernando, author.
(1)
Carey, David.
(1)
Carpenter, Perry, author.
(1)
Carvey, Harlan A., author.
(1)
Carvey, Harlan, author.
(1)
Carvey, Harlan.
(1)
Casco, Steven.
(1)
Chapman, Chris, author.
(1)
Charles S. Edge, author.
(1)
Chauhan, Sudhanshu, author.
(1)
Cheah, Chun Hai.
(1)
Cherry, Denny.
(1)
Choo, Kim-Kwang Raymond, editor.
(1)
Chuvakin, Anton A., author.
(1)
Cid, Daniel.
(1)
Clark, Gregory, author.
(1)
Clarke, Justin.
(1)
Collins, Jon, author.
(1)
Connelly, Olly.
(1)
Conti, Greg.
(1)
Cook, Randy (Randy R.)
(1)
Corbett, Cherita (Cherita L.)
(1)
Courcier, Scar de, author.
(1)
Cross, Michael.
(1)
Cruz, Maria Ines, designer.
(1)
D'Arcy, John P., 1975-
(1)
Dabbous, Nora.
(1)
Dai, Yuan-Shun.
(1)
Dalziel, Henry, author.
(1)
Dalziel, Max, author.
(1)
Dattani, Dinesh D.
(1)
Davies, Joshua Dennis.
(1)
Davies, Saida.
(1)
DeLuccia, James J., 1977-
(1)
DeMott, Jared.
(1)
Death, Darren, author.
(1)
Delfanti, Alessandro.
(1)
Demchak, Chris C.
(1)
Deraison, Renaud.
(1)
Desai, Hemal, editor.
(1)
Devost, Matthew G.
(1)
Dewald, Andreas, author.
(1)
Diogenes, Yuri, author.
(1)
Dolev, Ran.
(1)
Donaldson, Scott E., author.
(1)
Dubrawsky, Ido.
(1)
Duman, Ekrem.
(1)
Dwivedi, Himanshu.
(1)
Edwards, Matthew, editor of compilation.
(1)
Eko, Lyombe.
(1)
Daha fazla
Tümünü genişlet
Daha az
Hepsini Daralt
Materyal Türü
Dahil
Hariç
E-Kitap
Kitap
Dil
Dahil
Hariç
English
(369)
Turkish
(6)
German
(2)
English, Middle (1100-1500)
(1)
Yayın Yılı
Dahil
Hariç
-
2014
(35)
2013
(34)
2004
(27)
2006
(27)
2005
(26)
2011
(26)
2007
(24)
2003
(22)
2008
(22)
2015
(21)
2017
(21)
2002
(18)
2016
(15)
2010
(13)
2012
(13)
2018
(12)
2009
(7)
2019
(7)
2001
(6)
1999
(1)
2022
(1)
Daha fazla
Tümünü genişlet
Daha az
Hepsini Daralt
Konu
Dahil
Hariç
Electronic books.
(372)
Computer security.
(160)
COMPUTERS -- Internet -- Security.
(61)
COMPUTERS -- Networking -- Security.
(61)
COMPUTERS -- Security -- General.
(61)
Internet -- Security measures.
(31)
Firewalls (Computer security)
(18)
Computer networks -- Access control.
(15)
Computers -- Access control.
(15)
Computer hackers.
(13)
Penetration testing (Computer security)
(12)
Data protection.
(10)
Microsoft Windows (Computer file)
(10)
Wireless communication systems -- Security measures.
(10)
Computer crimes -- Investigation.
(9)
Computer crimes -- Prevention.
(8)
Web sites -- Security measures.
(8)
Computer network protocols.
(7)
Computer security -- Management.
(7)
Operating systems (Computers)
(7)
Bilgisayar ağları -- Güvenlik önlemleri.
(6)
Cyberspace -- Security measures.
(6)
Data encryption (Computer science)
(6)
Computer crimes.
(5)
Computer viruses.
(5)
Cyberterrorism -- Prevention.
(5)
Data protection -- Standards.
(5)
Database security.
(5)
Hackers.
(5)
Microsoft ISA server.
(5)
Open source software.
(5)
WebSphere.
(5)
World Wide Web -- Security measures.
(5)
Andre fag (naturvidenskab og teknik) Andre fag
(4)
Application software -- Security measures.
(4)
Cloud computing.
(4)
Computer crimes -- Investigation -- United States -- Methodology.
(4)
Computer networks -- Management.
(4)
Computer networks -- Security measures -- Handbooks, manuals, etc.
(4)
Computer networks.
(4)
Credit cards.
(4)
Forensic sciences.
(4)
Handbooks and manuals.
(4)
Information resources management.
(4)
Information technology -- Security measures.
(4)
Information warfare.
(4)
Internet.
(4)
Liability for credit information.
(4)
Microsoft Windows (Computer file) -- Security measures.
(4)
Microsoft Windows server.
(4)
Security systems.
(4)
Web servers -- Security measures.
(4)
z/OS.
(4)
Business enterprises -- Computer networks -- Security measures.
(3)
COMPUTERS -- Computer Literacy.
(3)
COMPUTERS -- Computer Science.
(3)
COMPUTERS -- Data Processing.
(3)
COMPUTERS -- Hardware -- General.
(3)
COMPUTERS -- Information Technology.
(3)
COMPUTERS -- Machine Theory.
(3)
COMPUTERS -- Reference.
(3)
COMPUTERS -- Security -- Cryptography.
(3)
Client/server computing.
(3)
Computer network architectures.
(3)
Computer science.
(3)
Cryptography.
(3)
Cyberterrorism.
(3)
Electronic book.
(3)
Electronic data processing departments -- Security measures.
(3)
Engineering & Applied Sciences.
(3)
Information storage and retrieval systems -- Security measures.
(3)
Information technology -- Management.
(3)
Internet telephony -- Security measures.
(3)
Java (Computer program language)
(3)
Malware (Computer software) -- Prevention.
(3)
Application software -- Development.
(2)
Business -- Data processing -- Security measures.
(2)
Business enterprises -- Security measures.
(2)
COMPUTERS -- Data Transmission Systems -- General.
(2)
COMPUTERS -- Networking -- Vendor Specific.
(2)
Cisco Systems, Inc.
(2)
Cloud computing -- Security measures.
(2)
ColdFusion.
(2)
Computer crimes -- Case studies.
(2)
Computer networks -- Reliability.
(2)
Computer security -- Evaluation -- Methodology.
(2)
Computer security -- Evaluation.
(2)
Computer software -- Development.
(2)
Computerbeveiliging.
(2)
Computercriminaliteit.
(2)
Computernetwerken.
(2)
Computersicherheit
(2)
Crisis management.
(2)
Digital watermarking.
(2)
Electrical & Computer Engineering.
(2)
Electronic data processing personnel -- Certification -- Study guides.
(2)
Electronic information resources -- Access control.
(2)
Electronic mail systems -- Security measures.
(2)
Embedded computer systems.
(2)
Hacking.
(2)
Information technology -- Auditing.
(2)
Information visualization.
(2)
Intrusion detection systems (Computer security)
(2)
Kali Linux.
(2)
LAW -- Forensic Science.
(2)
Malware (Computer software)
(2)
Microsoft Exchange server.
(2)
Microsoft Windows.
(2)
Open source intelligence.
(2)
Oracle (Computer file)
(2)
Peer-to-peer architecture (Computer networks)
(2)
Rechnernetz
(2)
Routers (Computer networks)
(2)
Réseaux d'ordinateurs -- Sécurité -- Mesures.
(2)
Réseaux d'ordinateurs.
(2)
Software.
(2)
Technology -- Research -- United States.
(2)
Telecommunications.
(2)
UNIX Shells.
(2)
Web portals -- Security measures.
(2)
Wide area networks (Computer networks) -- Access.
(2)
Wireless LANs.
(2)
Active server pages -- Security measures.
(1)
Active server pages.
(1)
Agents intelligents (Logiciels)
(1)
Android (Electronic resource)
(1)
Application logging (Computer science)
(1)
Application software -- Design.
(1)
Application software.
(1)
Aufsatzsammlung.
(1)
BUSINESS & ECONOMICS -- Corporate Governance.
(1)
BUSINESS & ECONOMICS -- Leadership.
(1)
BUSINESS & ECONOMICS -- Organizational Development.
(1)
BUSINESS & ECONOMICS -- Workplace Culture.
(1)
Bilgisayar ağları.
(1)
Bilgisayar güvenliği.
(1)
Biometric identification.
(1)
Brain-computer interfaces.
(1)
Browsers (Computer programs)
(1)
Business enterprises -- Computer networks.
(1)
Business planning.
(1)
Business travel -- Safety measures.
(1)
COMPUTERS -- Digital Media -- General.
(1)
COMPUTERS -- Hardware -- Handheld Devices.
(1)
COMPUTERS -- Hardware -- Personal Computers -- General.
(1)
COMPUTERS -- Interactive & Multimedia.
(1)
COMPUTERS -- Microprocessors.
(1)
COMPUTERS -- Online Services.
(1)
COMPUTERS -- Operating Systems -- DOS.
(1)
COMPUTERS -- Operating Systems -- Macintosh.
(1)
COMPUTERS -- Operating Systems -- Windows Server & NT.
(1)
COMPUTERS -- Operating Systems -- Windows Workstation.
(1)
COMPUTERS -- Security -- Networking.
(1)
COMPUTERS -- System Administration -- Email Administration.
(1)
COMPUTERS -- System Administration -- Storage & Retrieval.
(1)
COMPUTERS -- System Administration -- Windows Administration.
(1)
COMPUTERS -- Web -- Site Design.
(1)
COMPUTERS -- Web -- User Generated Content.
(1)
Cartes de crédit.
(1)
Case studies.
(1)
Cities and towns -- Technological innovations.
(1)
Commercial crimes.
(1)
Component software.
(1)
Computational grids (Computer systems)
(1)
Computer Science.
(1)
Computer algorithms.
(1)
Computer architecture.
(1)
Computer crimes -- Investigation -- Handbooks, manuals, etc.
(1)
Computer crimes -- Investigation -- Methodology.
(1)
Computer crimes -- Investigation -- United States.
(1)
Computer crimes -- Investments.
(1)
Computer networks -- Auditing.
(1)
Computer networks -- Design and construction.
(1)
Computer networks -- Remote access.
(1)
Computer networks -- Security measures -- Examinations, questions, etc.
(1)
Computer networks -- Security measures -- Fiction.
(1)
Computer networks -- Security measures -- Software.
(1)
Computer networks -- Security measures -- United States.
(1)
Computer networks -- Social aspects.
(1)
Computer networks -- Standards.
(1)
Computer networks -- Testing.
(1)
Computer networks Security measures
(1)
Computer programming.
(1)
Computer security -- Fiction.
(1)
Computer security -- Handbooks, manuals, etc.
(1)
Computer security -- Management -- Handbooks, manuals, etc.
(1)
Computer security -- Testing.
(1)
Computer security -- United States.
(1)
Computer-assisted instruction -- Security measures.
(1)
Computers -- Security.
(1)
Computers and civilization -- Social aspects.
(1)
Computers.
(1)
Confidential business information.
(1)
Corporate culture.
(1)
Corporations -- Security measures.
(1)
Credit cards -- Security measures -- Standards -- Handbooks, manuals, etc.
(1)
Criminalistiek.
(1)
Cyberinfrastructure -- Security measures.
(1)
Data encryption (Computer science) -- Examinations -- Study guides.
(1)
Data mining.
(1)
Daha fazla
Tümünü genişlet
Daha az
Hepsini Daralt
Kütüphane
Dahil
Hariç
Başkent Kütüphanesi
Lokasyon
Dahil
Hariç
E-Kütüphane
Ebook Central
Elsevier E-Kitap Koleksiyonu
Kazan Meslek Yüksekokulu
Merkez Kütüphane
false
{sortLabel}
{alphabetical}
{relevance}
{include}
{exclude}
{facetName}
{results}
{displayName}
{count}
{error}
Eylem Seç
Ayırt
Listelerime ekle
Eposta
Yazdır
378 sonuç bulundu
1
2
3
4
5
..
32
Sırala:
Konuyla İlgili Sırala
Yayın Yılı (eskiden yeniye)
Yayın Yılı (yeniden eskiye)
Başlık
Yazar
OK
Eposta Adresleri
:
Phone Number:
Mobile Carrier:
AT&T
Boost
Nextel (Sprint)
Sprint (PCS)
T Mobile
TracFone
US Cellular
Verizon
Virgin
Select An Item
Data usage warning: You will receive one text message for each title you selected.
Standard text messaging rates apply.
Text it to me
Text it to me, and go to next item
000000000000
DEFAULTTR
Liste seç
Geçici Liste
Bunu varsayılan liste yap.
Öğeler başarıyla eklendi
Öğeler eklenirken hata oldu. Lütfen tekrar deneyiniz.
Kendi siteni kendin koru
1.
Kendi siteni kendin koru
by
Büyükgöze, Selma.
Format:
Understanding security issues
2.
Understanding security issues
by
Donaldson, Scott E., author.
Click to View
Format:
Cyber security in parallel and distributed computing : concepts, techniques, applications and case studies
3.
Cyber security in parallel and distributed computing : concepts, techniques, applications and case studies
by
Le, Dac-Nhuong, 1983- editor.
Click to View
Format:
Transformational security awareness : what neuroscientists, storytellers, and marketers can teach us about driving secure behaviors
4.
Transformational security awareness : what neuroscientists, storytellers, and marketers can teach us about driving secure behaviors
by
Carpenter, Perry, author.
Click to View
Format:
The business of cybersecurity : foundations and ideologies
5.
The business of cybersecurity : foundations and ideologies
by
Sathnur, Ashwini, author.
Click to View
Format:
Cyber and you : the impact of technology on our lives
6.
Cyber and you : the impact of technology on our lives
by
Kendal, Maureen, author.
Click to View
Format:
Smart cities cybersecurity and privacy
7.
Smart cities cybersecurity and privacy
by
Kayhan Zrar Ghafoor, editor.
Click to View
Format:
Cyber smart : five habits to protect your family, money, and identity from cyber criminals
8.
Cyber smart : five habits to protect your family, money, and identity from cyber criminals
by
McDonough, Bart, author.
Click to View
Format:
IT-Sicherheit : Eine Einführung
9.
IT-Sicherheit : Eine Einführung
by
Hellmann, Roland, author.
Click to View
Format:
Empirical research for software security : foundations and experience
10.
Empirical research for software security : foundations and experience
by
ben Othmane, Lotfi, editor.
Click to View
Format:
Cybersecurity, attack and defense strategies : infrastructure security with Red Team and Blue Team tactics
11.
Cybersecurity, attack and defense strategies : infrastructure security with Red Team and Blue Team tactics
by
Diogenes, Yuri, author.
Click to View
Format:
Fuzzing for software security testing and quality assurance
12.
Fuzzing for software security testing and quality assurance
by
Takanen, Ari, author.
Click to View
Format:
Eylem Seç
Ayırt
Listelerime ekle
Eposta
Yazdır
1
2
3
4
5
..
32
Search Results
Electronic Resources
Search Results
Electronic Resources
OK
Eposta Adresleri
:
Phone Number:
Mobile Carrier:
AT&T
Boost
Nextel (Sprint)
Sprint (PCS)
T Mobile
TracFone
US Cellular
Verizon
Virgin
Select An Item
Data usage warning: You will receive one text message for each title you selected.
Standard text messaging rates apply.
Text it to me
Text it to me, and go to next item
Electronic Resources
Sonuçlar alınıyor Electronic Resources...
action
Go to:
Search Results
|
Search Facets
|
Top of Page