Giriş
|
Hesabım
|
Listelerim
|
|
Remember to clear the cache and close the browser window.
English
Search Limit
Bütün Kütüphaneler
Elektronik Kaynaklar
Hepsi
Başkent Üniversitesi Kütüphanesi
Anadolu OSB Meslek Yüksekokulu
Atasev Özel Koleksiyon
Erdoğan Tercan Koleksiyonu
Güzel Sanatlar ve Tasarım Arşivi
Kazan Meslek Yüksekokulu
Hukuk Koleksiyonu
Ord.Prof.Dr. Enver Ziya Karal Tarih Uygulama Ars.Mrk.
Özel Koleksiyon Serdar Özersin
Tez Koleksiyonu
Tüm Alanlar
Başlık
Yazar
Konu
ISBN
ISSN
8
Search Field
Tüm Alanlar
Arama:
Gelişmiş Arama
Search Results
Elektronik Kaynaklar
Arama Sonuçlarını Sınırlandır
Daraltılmış:
+
Language: English
+
Konu: Computer security -- Handbooks, manuals, etc.
Yazar
Dahil
Hariç
Foster, James C.
(4)
ProQuest (Firm)
(4)
Liu, Vincent.
(2)
Mullen, Timothy M.
(2)
Wallace, Michael, 1960-
(2)
Webber, Larry.
(2)
AXELOS Limited, author.
(1)
Aquilina, James M.
(1)
Bingley, Richard, author.
(1)
Casey, Eoghan.
(1)
Das, Sajal K.
(1)
Foster, Stephen C.
(1)
Griffor, Edward, editor.
(1)
Kant, Krishna.
(1)
Malin, Cameron H.
(1)
McClure, Stuart.
(1)
Price, Mike (Mike Morgan)
(1)
Rose, Curtis W.
(1)
Shinder, Debra Littlejohn, author.
(1)
Tittel, Ed, author.
(1)
Zhang, Nan, 1982-
(1)
Daha fazla
Tümünü genişlet
Daha az
Hepsini Daralt
Materyal Türü
Dahil
Hariç
E-Kitap
Yayın Yılı
Dahil
Hariç
-
2004
(3)
2006
(2)
2011
(2)
2015
(2)
2002
(1)
2005
(1)
2010
(1)
2012
(1)
2014
(1)
2017
(1)
Daha fazla
Tümünü genişlet
Daha az
Hepsini Daralt
Konu
Dahil
Hariç
Electronic books.
(14)
Computer security.
(5)
Handbooks and manuals.
(5)
COMPUTERS -- Internet -- Security.
(4)
COMPUTERS -- Networking -- Security.
(4)
COMPUTERS -- Security -- General.
(4)
Computer networks -- Security measures -- Handbooks, manuals, etc.
(4)
Data protection -- Handbooks, manuals, etc.
(3)
Business planning -- Handbooks, manuals, etc.
(2)
Crisis management -- Handbooks, manuals, etc.
(2)
Emergency management -- Handbooks, manuals, etc.
(2)
Forensic sciences -- Handbooks, manuals, etc.
(2)
Microsoft software -- Security measures -- Handbooks, manuals, etc.
(2)
COMPUTERS -- Security -- Cryptography.
(1)
Computer crimes -- Investigation -- Handbooks, manuals, etc.
(1)
Computer crimes -- Investigation.
(1)
Computer networks -- Security measures.
(1)
Computer viruses -- Handbooks, manuals, etc.
(1)
Computercriminaliteit.
(1)
Criminalistiek.
(1)
Data recovery (Computer science) -- Handbooks, manuals, etc.
(1)
Data recovery (Computer science) -- Planning -- Handbooks, manuals, etc.
(1)
Forensic sciences.
(1)
Langages de programmation -- Guides, manuels, etc.
(1)
Linux -- Handbooks, manuals, etc.
(1)
Malware (Computer software) -- Handbooks, manuals, etc.
(1)
Programming languages (Electronic computers)
(1)
Programming languages (Electronic computers) -- Handbooks, manuals, etc.
(1)
Protection de l'information (Informatique) -- Guides, manuels, etc.
(1)
Security consultants -- Handbooks, manuals, etc.
(1)
Systèmes informatiques -- Sécurité -- Mesures -- Guides, manuels, etc.
(1)
Daha fazla
Tümünü genişlet
Daha az
Hepsini Daralt
Kütüphane
Dahil
Hariç
Başkent Kütüphanesi
Lokasyon
Dahil
Hariç
E-Kütüphane
Ebook Central
Elsevier E-Kitap Koleksiyonu
false
{sortLabel}
{alphabetical}
{relevance}
{include}
{exclude}
{facetName}
{results}
{displayName}
{count}
{error}
Eylem Seç
Ayırt
Listelerime ekle
Eposta
Yazdır
14 sonuç bulundu
1
2
Sırala:
Konuyla İlgili Sırala
Yayın Yılı (eskiden yeniye)
Yayın Yılı (yeniden eskiye)
Başlık
Yazar
OK
Eposta Adresleri
:
Phone Number:
Mobile Carrier:
AT&T
Boost
Nextel (Sprint)
Sprint (PCS)
T Mobile
TracFone
US Cellular
Verizon
Virgin
Select An Item
Data usage warning: You will receive one text message for each title you selected.
Standard text messaging rates apply.
Text it to me
Text it to me, and go to next item
000000000000
DEFAULTTR
Liste seç
Geçici Liste
Bunu varsayılan liste yap.
Öğeler başarıyla eklendi
Öğeler eklenirken hata oldu. Lütfen tekrar deneyiniz.
Handbook of system safety and security : cyber risk and risk management, cyber security, threat analysis, functional safety, software systems, and cyber physical systems
1.
Handbook of system safety and security : cyber risk and risk management, cyber security, threat analysis, functional safety, software systems, and cyber physical systems
by
Griffor, Edward, editor.
Click to View
Format:
The security consultant's handbook
2.
The security consultant's handbook
by
Bingley, Richard, author.
Click to View
Format:
Resilia (Tm) pocketbook : cyber resilience best practice
3.
Resilia (Tm) pocketbook : cyber resilience best practice
by
AXELOS Limited, author.
Click to View
Format:
Malware forensics field guide for Linux systems
4.
Malware forensics field guide for Linux systems
by
Malin, Cameron H.
Click to View
Format:
Handbook on securing cyber-physical critical infrastructure
5.
Handbook on securing cyber-physical critical infrastructure
by
Das, Sajal K.
Click to View
Format:
Thor's Microsoft security bible a collection of practical security techniques
6.
Thor's Microsoft security bible a collection of practical security techniques
by
Mullen, Timothy M.
ScienceDirect
http://www.sciencedirect.com/science/book/9781597495721
Format:
Thor's Microsoft security bible : a collection of practical security techniques
7.
Thor's Microsoft security bible : a collection of practical security techniques
by
Mullen, Timothy M.
ScienceDirect
http://www.sciencedirect.com/science/book/9781597495721
Format:
The disaster recovery handbook a step-by-step plan to ensure business continuity and protect vital operations, facilities, and assets
8.
The disaster recovery handbook a step-by-step plan to ensure business continuity and protect vital operations, facilities, and assets
by
Wallace, Michael, 1960-
Click to View
Format:
Writing security tools and exploits
9.
Writing security tools and exploits
by
Foster, James C.
Click to View
Format:
Writing security tools and exploits
10.
Writing security tools and exploits
by
Foster, James C.
ScienceDirect
http://www.sciencedirect.com/science/book/9781597499972
Format:
Sockets, shellcode, porting & coding : reverse engineering exploits and tool coding for security professionals
11.
Sockets, shellcode, porting & coding : reverse engineering exploits and tool coding for security professionals
by
Foster, James C.
ScienceDirect
http://www.sciencedirect.com/science/book/9781597490054
Format:
The disaster recovery handbook a step-by-step plan to ensure business continuity and protect vital operations, facilities, and assets
12.
The disaster recovery handbook a step-by-step plan to ensure business continuity and protect vital operations, facilities, and assets
by
Wallace, Michael, 1960-
Click to View
Format:
Eylem Seç
Ayırt
Listelerime ekle
Eposta
Yazdır
1
2
Search Results
Elektronik Kaynaklar
Search Results
Elektronik Kaynaklar
OK
Eposta Adresleri
:
Phone Number:
Mobile Carrier:
AT&T
Boost
Nextel (Sprint)
Sprint (PCS)
T Mobile
TracFone
US Cellular
Verizon
Virgin
Select An Item
Data usage warning: You will receive one text message for each title you selected.
Standard text messaging rates apply.
Text it to me
Text it to me, and go to next item
Elektronik Kaynaklar
Sonuçlar alınıyor Elektronik Kaynaklar...
action