Giriş
|
Hesabım
|
Listelerim
|
|
Remember to clear the cache and close the browser window.
English
Search Limit
Bütün Kütüphaneler
Elektronik Kaynaklar
Hepsi
Başkent Üniversitesi Kütüphanesi
Anadolu OSB Meslek Yüksekokulu
Atasev Özel Koleksiyon
Erdoğan Tercan Koleksiyonu
Güzel Sanatlar ve Tasarım Arşivi
Kazan Meslek Yüksekokulu
Hukuk Koleksiyonu
Ord.Prof.Dr. Enver Ziya Karal Tarih Uygulama Ars.Mrk.
Özel Koleksiyon Serdar Özersin
Tez Koleksiyonu
Tüm Alanlar
Başlık
Yazar
Konu
ISBN
ISSN
8
Search Field
Tüm Alanlar
Arama:
Gelişmiş Arama
Search Results
Elektronik Kaynaklar
Arama Sonuçlarını Sınırlandır
Daraltılmış:
+
Language: English
+
Konu: Internet -- Security measures.
Yazar
Dahil
Hariç
ProQuest (Firm)
(31)
Carvey, Harlan A.
(5)
Long, Johnny.
(2)
Shinder, Debra Littlejohn.
(2)
Shinder, Thomas W.
(2)
Wyler, Neil R.
(2)
Ab Rahman, Nurul Hidayah, reviewer.
(1)
Agrawal, Vivek, contributor.
(1)
Andress, Jason.
(1)
Belapurkar, Abhijit.
(1)
Bishop, Allison, editor.
(1)
Blue, Violet, author.
(1)
Bolt, Steven.
(1)
Bradley, Tony, 1969-
(1)
Bradley, Tony.
(1)
Bus, Jacques.
(1)
Buterin, Vitalik, writer of foreword.
(1)
Cantrell, Christopher.
(1)
Carvey, Harlan A., author.
(1)
Choo, Kim-Kwang Raymond, editor.
(1)
Cole, Eric.
(1)
Cruz, Maria Ines, designer.
(1)
Dalziel, Henry, author.
(1)
Devost, Matthew G.
(1)
Dhillon, Gurpreet.
(1)
Ellis, Juanita.
(1)
Engel, Mary, author.
(1)
Erbschloe, Michael.
(1)
Fernandez-Medina, Eduardo.
(1)
Fichera, Joe, 1966-
(1)
Flynn, Hal.
(1)
Gevers, Rickey, author.
(1)
Gilchrist, Alasdair, author.
(1)
Gonzalez, Deborah, author.
(1)
Gorman, G. E.
(1)
Gritzalis, Stefanos.
(1)
Haaster, Jelle van, author.
(1)
Hexmoor, Henry, author.
(1)
Hildebrandt, M.
(1)
Hsu, D. Frank (Derbiau Frank), 1948- editor.
(1)
Huon, Jean-Paul, author.
(1)
Hutchinson, William.
(1)
Jakobsson, Markus.
(1)
Katsaropoulos, Chris, editor.
(1)
Kendrick, Rupert.
(1)
Killion, Dave.
(1)
Ko, Ryan, editor.
(1)
Kolde, Jennifer.
(1)
Krutz, Ronald L.
(1)
Li, Shancang, author.
(1)
Lin, Herbert.
(1)
Marinucci, Dorothy, editor.
(1)
Mehan, Julie E.
(1)
Messier, Ric, author.
(1)
Mougayar, William, author.
(1)
Mowbray, Thomas J.
(1)
Nahari, Hadi.
(1)
National Academies (U.S.). Policy and Global Affairs Division.
(1)
National Research Council (U.S.). Committee on Deterring Cyberattacks: Informing Strategies and Developing Options for U.S. Policy.
(1)
National Research Council (U.S.). Committee on Information Systems Trustworthiness.
(1)
National Research Council (U.S.). Computer Science and Telecommunications Board.
(1)
National Research Council (U.S.). Division on Engineering and Physical Sciences.
(1)
O'Hara, Kieron.
(1)
Oppliger, Rolf.
(1)
Paret, Dominique, author.
(1)
Penttinen, Jyrki T. J., author.
(1)
Pinto, Marcus.
(1)
Raymond, Mark, editor.
(1)
Rearick, Benjamin, project director.
(1)
Rogers, Russ.
(1)
Russell, Kevin.
(1)
Russell, Ryan, 1969-
(1)
Russell, Ryan.
(1)
Samayan, Malathi, project director.
(1)
Schneider, Fred B.
(1)
Schreider, Tari, author.
(1)
Shimonski, Robert, author.
(1)
Smith, Gordon, editor.
(1)
Speed, Tim.
(1)
Sprengers, Martijn, author.
(1)
Studholme, Alan, designer.
(1)
Stuttard, Dafydd.
(1)
Syngress Media, Inc.
(1)
Tam, Kenneth.
(1)
Thornburgh, Dick.
(1)
Traxler, Julie.
(1)
Tselentis, Georgios.
(1)
Ventre, Daniel, editor.
(1)
Ventre, Daniel.
(1)
Waidner, Michael.
(1)
Warren, Matt.
(1)
Winterfeld, Steve.
(1)
Wunderlich, Holger.
(1)
Xu, Li D., author.
(1)
Yague, Mariemma.
(1)
Zelkowitz, Marvin V., 1945-
(1)
Zenir, John, contributor.
(1)
Zittrain, Jonathan (Jonathan L.), 1969-
(1)
Daha fazla
Tümünü genişlet
Daha az
Hepsini Daralt
Materyal Türü
Dahil
Hariç
E-Kitap
Yayın Yılı
Dahil
Hariç
-
2006
(6)
2013
(6)
2015
(6)
2005
(5)
2014
(5)
2017
(5)
2012
(4)
2001
(3)
2003
(3)
2004
(3)
2007
(3)
2008
(3)
2010
(3)
2002
(2)
2009
(2)
2011
(2)
2016
(2)
1999
(1)
2020
(1)
Daha fazla
Tümünü genişlet
Daha az
Hepsini Daralt
Konu
Dahil
Hariç
Electronic books.
(65)
Computer networks -- Security measures.
(31)
Computer security.
(25)
COMPUTERS -- Internet -- Security.
(6)
COMPUTERS -- Networking -- Security.
(6)
COMPUTERS -- Security -- General.
(6)
Internet -- Social aspects.
(5)
Computer crimes -- Investigation -- United States -- Methodology.
(4)
Microsoft Windows (Computer file) -- Security measures.
(4)
Computer crimes -- Prevention.
(3)
Computer crimes.
(3)
Electronic commerce -- Security measures.
(3)
Firewalls (Computer security)
(3)
Internet -- Safety measures.
(3)
Andre fag (naturvidenskab og teknik) Andre fag
(2)
Computer networks -- Security measures -- Quality control.
(2)
Computer networks -- Security measures -- Standards.
(2)
Computers -- Access control -- Passwords.
(2)
Cryptography.
(2)
Cyberspace -- Security measures.
(2)
Cyberterrorism -- Prevention.
(2)
Cyberterrorism.
(2)
Electronic data processing -- Distributed processing.
(2)
Electronic mail systems -- Security measures.
(2)
Internet -- Security measures -- Software.
(2)
Internet.
(2)
Privacy, Right of.
(2)
Software.
(2)
Spam filtering (Electronic mail)
(2)
Spyware (Computer software)
(2)
BUSINESS & ECONOMICS -- Corporate Governance.
(1)
BUSINESS & ECONOMICS -- Leadership.
(1)
BUSINESS & ECONOMICS -- Organizational Development.
(1)
BUSINESS & ECONOMICS -- Workplace Culture.
(1)
Business enterprises -- Computer networks -- Security measures.
(1)
COMPUTERS -- Online Services.
(1)
COMPUTERS -- System Administration -- Storage & Retrieval.
(1)
COMPUTERS -- Web -- Browsers.
(1)
Client/server computing.
(1)
Computer crimes -- Investigation -- United States.
(1)
Computer network protocols.
(1)
Computer networks -- Access control.
(1)
Cyber intelligence (Computer security)
(1)
Cyberspace.
(1)
Cyberterrorism -- United States -- Prevention.
(1)
Data encryption (Computer science)
(1)
Data protection.
(1)
Electrical & Computer Engineering.
(1)
Electronic data processing departments -- Security measures.
(1)
Electronic intelligence.
(1)
Engineering & Applied Sciences.
(1)
Google.
(1)
Information technology -- Security measures.
(1)
Information warfare.
(1)
Internet -- Technological innovations.
(1)
Internet and children.
(1)
Internet and teenagers.
(1)
Internet and women.
(1)
Internet in espionage.
(1)
Internet of things -- Security measures.
(1)
Internet pornography.
(1)
Internet programming.
(1)
Intrusion detection systems (Computer security)
(1)
Java (Computer program language)
(1)
LAW -- Forensic Science.
(1)
Microsoft ISA server.
(1)
Microsoft Windows (Computer file)
(1)
Networking -- Security measures.
(1)
Parenting.
(1)
Penetration testing (Computer security)
(1)
Security systems.
(1)
Technology -- Research -- United States.
(1)
Telecommunication policy -- United States.
(1)
Telecommunications.
(1)
United States.
(1)
Web search engines.
(1)
Web servers -- Security measures.
(1)
Web sites -- Design.
(1)
Wireless communication systems -- Security measures.
(1)
World Wide Web -- Security measures.
(1)
z/OS.
(1)
Daha fazla
Tümünü genişlet
Daha az
Hepsini Daralt
Kütüphane
Dahil
Hariç
Başkent Kütüphanesi
Lokasyon
Dahil
Hariç
Ebook Central
Elsevier E-Kitap Koleksiyonu
false
{sortLabel}
{alphabetical}
{relevance}
{include}
{exclude}
{facetName}
{results}
{displayName}
{count}
{error}
Eylem Seç
Ayırt
Listelerime ekle
Eposta
Yazdır
65 sonuç bulundu
1
2
3
4
5
..
6
Sırala:
Konuyla İlgili Sırala
Yayın Yılı (eskiden yeniye)
Yayın Yılı (yeniden eskiye)
Başlık
Yazar
OK
Eposta Adresleri
:
Phone Number:
Mobile Carrier:
AT&T
Boost
Nextel (Sprint)
Sprint (PCS)
T Mobile
TracFone
US Cellular
Verizon
Virgin
Select An Item
Data usage warning: You will receive one text message for each title you selected.
Standard text messaging rates apply.
Text it to me
Text it to me, and go to next item
000000000000
DEFAULTTR
Liste seç
Geçici Liste
Bunu varsayılan liste yap.
Öğeler başarıyla eklendi
Öğeler eklenirken hata oldu. Lütfen tekrar deneyiniz.
Building an effective cybersecurity program
1.
Building an effective cybersecurity program
by
Schreider, Tari, author.
Click to View
Format:
Wireless communications security : solutions for the internet of things
2.
Wireless communications security : solutions for the internet of things
by
Penttinen, Jyrki T. J., author.
Click to View
Format:
IoT security issues
3.
IoT security issues
by
Gilchrist, Alasdair, author.
Click to View
Format:
Securing the internet of things
4.
Securing the internet of things
by
Li, Shancang, author.
Click to View
Format:
Secure connected objects
5.
Secure connected objects
by
Paret, Dominique, author.
Click to View
Format:
Network forensics
6.
Network forensics
by
Messier, Ric, author.
Click to View
Format:
The business blockchain : promise, practice, and application of the next Internet technology
7.
The business blockchain : promise, practice, and application of the next Internet technology
by
Mougayar, William, author.
Click to View
Format:
Cyber guerilla
8.
Cyber guerilla
by
Haaster, Jelle van, author.
Click to View
Format:
How to attack and defend your website
9.
How to attack and defend your website
by
Dalziel, Henry, author.
Click to View
Format:
Computational network science : an algorithmic approach
10.
Computational network science : an algorithmic approach
by
Hexmoor, Henry, author.
Click to View
Format:
Managing online risk : apps, mobile, and social media security
11.
Managing online risk : apps, mobile, and social media security
by
Gonzalez, Deborah, author.
Click to View
Format:
Cyber reconnaissance, surveillance, and defense
12.
Cyber reconnaissance, surveillance, and defense
by
Shimonski, Robert, author.
Click to View
Format:
Eylem Seç
Ayırt
Listelerime ekle
Eposta
Yazdır
1
2
3
4
5
..
6
Search Results
Elektronik Kaynaklar
Search Results
Elektronik Kaynaklar
OK
Eposta Adresleri
:
Phone Number:
Mobile Carrier:
AT&T
Boost
Nextel (Sprint)
Sprint (PCS)
T Mobile
TracFone
US Cellular
Verizon
Virgin
Select An Item
Data usage warning: You will receive one text message for each title you selected.
Standard text messaging rates apply.
Text it to me
Text it to me, and go to next item
Elektronik Kaynaklar
Sonuçlar alınıyor Elektronik Kaynaklar...
action