Giriş
|
Hesabım
|
Listelerim
|
|
Remember to clear the cache and close the browser window.
English
Search Limit
Bütün Kütüphaneler
Electronic Resources
All
Başkent University Library
Anadolu OSB Meslek Yüksekokulu
Atasev Özel Koleksiyon
Erdoğan Tercan Collection
Fine Arts And Design Archive
Kazan Meslek Yüksekokulu
Law Collection
Ord.Prof.Dr. Enver Ziya Karal Tarih Uygulama Ars.Mrk.
Özel Koleksiyon Serdar Özersin
Thesis Collection
Tüm Alanlar
Başlık
Yazar
Konu
ISBN
ISSN
8
Search Field
Tüm Alanlar
Arama:
Gelişmiş Arama
Search Results
Electronic Resources
Arama Sonuçlarını Sınırlandır
Daraltılmış:
+
Yazar: Rogers, Russ.
+
Language: English
Yazar
Dahil
Hariç
ProQuest (Firm)
(5)
Snedaker, Susan.
(2)
Andress, Jason.
(1)
Bathurst, Rob.
(1)
Beale, Jay.
(1)
Cunningham, Bryan, JD.
(1)
Devost, Matthew G.
(1)
Engebretson, Pat.
(1)
Ghassemlouei, Alijohn.
(1)
Syngress Media, Inc.
(1)
Winterfeld, Steve.
(1)
Daha fazla
Tümünü genişlet
Daha az
Hepsini Daralt
Materyal Türü
Dahil
Hariç
E-Kitap
Yayın Yılı
Dahil
Hariç
-
2004
(3)
2005
(3)
2006
(2)
2007
(1)
2011
(1)
2013
(1)
Daha fazla
Tümünü genişlet
Daha az
Hepsini Daralt
Konu
Dahil
Hariç
Electronic books.
(11)
Computer networks -- Security measures -- Handbooks, manuals, etc.
(3)
Computer networks -- Security measures.
(3)
COMPUTERS -- Internet -- Security.
(2)
COMPUTERS -- Networking -- Security.
(2)
COMPUTERS -- Security -- General.
(2)
Computer security -- Evaluation.
(2)
Computer security -- Management -- Handbooks, manuals, etc.
(2)
Computer security.
(2)
Handbooks and manuals.
(2)
Computer hackers -- Fiction.
(1)
Computer hackers.
(1)
Computer networks -- Security measures -- Evaluation.
(1)
Computer networks.
(1)
Computer security -- Fiction.
(1)
Computer security -- Management.
(1)
Computers -- Access control.
(1)
Cyberterrorism.
(1)
Electronic book.
(1)
HISTORY -- Military -- Biological & Chemical Warfare.
(1)
Information resources management -- Evaluation.
(1)
Information technology -- Management.
(1)
Information warfare -- Handbooks, manuals, etc.
(1)
Information warfare.
(1)
Internet -- Security measures.
(1)
Mac OS.
(1)
Operating systems (Computers)
(1)
Suspense fiction.
(1)
Terrorism -- Computer network resources.
(1)
Daha fazla
Tümünü genişlet
Daha az
Hepsini Daralt
Kütüphane
Dahil
Hariç
Başkent Kütüphanesi
Lokasyon
Dahil
Hariç
Ebook Central
Elsevier E-Kitap Koleksiyonu
false
{sortLabel}
{alphabetical}
{relevance}
{include}
{exclude}
{facetName}
{results}
{displayName}
{count}
{error}
Eylem Seç
Ayırt
Listelerime ekle
Eposta
Yazdır
11 sonuç bulundu
1
Sırala:
Konuyla İlgili Sırala
Yayın Yılı (eskiden yeniye)
Yayın Yılı (yeniden eskiye)
Başlık
Yazar
OK
Eposta Adresleri
:
Phone Number:
Mobile Carrier:
AT&T
Boost
Nextel (Sprint)
Sprint (PCS)
T Mobile
TracFone
US Cellular
Verizon
Virgin
Select An Item
Data usage warning: You will receive one text message for each title you selected.
Standard text messaging rates apply.
Text it to me
Text it to me, and go to next item
00000000000
DEFAULTTR
Liste seç
Geçici Liste
Bunu varsayılan liste yap.
Öğeler başarıyla eklendi
Öğeler eklenirken hata oldu. Lütfen tekrar deneyiniz.
The hacker's guide to OS X exploiting OS X from the root up
1.
The hacker's guide to OS X exploiting OS X from the root up
by
Bathurst, Rob.
Click to View
Format:
Cyber warfare : techniques, tactics and tools for security practitioners
2.
Cyber warfare : techniques, tactics and tools for security practitioners
by
Andress, Jason.
ScienceDirect
http://www.sciencedirect.com/science/book/9781597496377
Format:
Nessus network auditing
3.
Nessus network auditing
by
Beale, Jay.
ScienceDirect
http://www.sciencedirect.com/science/book/9781597492089
Format:
Syngress IT security project management handbook
4.
Syngress IT security project management handbook
by
Snedaker, Susan.
Click to View
Format:
Syngress IT security project management handbook
5.
Syngress IT security project management handbook
by
Snedaker, Susan.
ScienceDirect
http://www.sciencedirect.com/science/book/9781597490764
Format:
Hacking a terror network the silent threat of covert channels
6.
Hacking a terror network the silent threat of covert channels
by
Rogers, Russ.
Click to View
Format:
Network security evaluation using the NSA IEM
7.
Network security evaluation using the NSA IEM
by
Rogers, Russ.
ScienceDirect
http://www.sciencedirect.com/science/book/9781597490351
Format:
Hacking a terror network : the silent threat of covert channels
8.
Hacking a terror network : the silent threat of covert channels
by
Rogers, Russ.
ScienceDirect
https://www.sciencedirect.com/science/book/9781928994985
Format:
Security assessment case studies for implementing the NSA lAM
9.
Security assessment case studies for implementing the NSA lAM
by
Rogers, Russ.
Click to View
Format:
Stealing the network how to own a continent
10.
Stealing the network how to own a continent
by
Rogers, Russ.
Click to View
Format:
Security assessment : case studies for implementing the NSA IAM
11.
Security assessment : case studies for implementing the NSA IAM
by
Rogers, Russ.
ScienceDirect
http://www.sciencedirect.com/science/book/9781932266962
Format:
Eylem Seç
Ayırt
Listelerime ekle
Eposta
Yazdır
1
Search Results
Electronic Resources
Search Results
Electronic Resources
OK
Eposta Adresleri
:
Phone Number:
Mobile Carrier:
AT&T
Boost
Nextel (Sprint)
Sprint (PCS)
T Mobile
TracFone
US Cellular
Verizon
Virgin
Select An Item
Data usage warning: You will receive one text message for each title you selected.
Standard text messaging rates apply.
Text it to me
Text it to me, and go to next item
Electronic Resources
Sonuçlar alınıyor Electronic Resources...
action