Skip to:
Bottom
|
Search Facets
|
Content
Giriş
|
Hesabım
|
Listelerim
|
|
Remember to clear the cache and close the browser window.
English
Search Limit
Bütün Kütüphaneler
Elektronik Kaynaklar
Hepsi
Başkent Üniversitesi Kütüphanesi
Anadolu OSB Meslek Yüksekokulu
Atasev Özel Koleksiyon
Erdoğan Tercan Koleksiyonu
Güzel Sanatlar ve Tasarım Arşivi
Kazan Meslek Yüksekokulu
Hukuk Koleksiyonu
Ord.Prof.Dr. Enver Ziya Karal Tarih Uygulama Ars.Mrk.
Özel Koleksiyon Serdar Özersin
Tez Koleksiyonu
Tüm Alanlar
Başlık
Yazar
Konu
ISBN
ISSN
12
Search Field
Tüm Alanlar
Arama:
Gelişmiş Arama
Search Results
Elektronik Kaynaklar
Arama Sonuçlarını Sınırlandır
Daraltılmış:
+
Lokasyon: Elsevier E-Kitap Koleksiyonu
+
Konu: Computer security.
Yazar
Dahil
Hariç
Foster, James C.
(6)
Long, Johnny.
(6)
Russell, Ryan, 1969-
(5)
Cross, Michael, 1965-
(4)
Beale, Jay.
(3)
Hurley, Chris.
(3)
Mullen, Timothy M.
(3)
Rittinghouse, John W.
(3)
Alder, Raven.
(2)
Carvey, Harlan A.
(2)
Clercq, Jan de, 1968-
(2)
Cole, Eric.
(2)
Contos, Brian T.
(2)
Cox, I. J. (Ingemar J.)
(2)
Hunter, Laura E.
(2)
Maynor, David.
(2)
Piltzecker, Tony, 1975-
(2)
Ransome, James F.
(2)
Ring, Sandra.
(2)
Sachs, Marcus H.
(2)
Shein, Rob.
(2)
Wiles, Jack.
(2)
XYPRO Technology Corporation.
(2)
'Ken'@ftu.
(1)
131ah.
(1)
Ahmad, David R. Mirza.
(1)
Alvarado, Ellen.
(1)
Amini, Rob.
(1)
Anderson, Brian (Brian James)
(1)
Andress, Jason.
(1)
Aquilina, James M.
(1)
Baccas, Paul.
(1)
Baker, Andrew R.
(1)
Barrett, Diane.
(1)
Baskin, Brian.
(1)
Bayles, Aaron W.
(1)
Bednarczyk, Michael.
(1)
Ben-Natan, Ron.
(1)
Bergstra, J. A.
(1)
Bhardwaj, Pawan K.
(1)
Bidwell, Teri.
(1)
Bin Azad, Tariq.
(1)
Black Hat Press (Goodhue, Minn.)
(1)
Bloom, Jeffrey A. (Jeffrey Adam), 1964-
(1)
Bonnell, Ralph.
(1)
Bradley, Tony, 1969-
(1)
Bray, Rory.
(1)
Brindley, Ed.
(1)
Burnett, Mark (Mark M.)
(1)
Burton, James.
(1)
Campara, Djenana.
(1)
Carroll, John M. (John Millar), 1925-
(1)
Carvey, Harlan.
(1)
Casco, Steven.
(1)
Casey, Eoghan.
(1)
Caswell, Brian.
(1)
Chaffin, Larry.
(1)
Cherry, Denny.
(1)
Cid, Daniel.
(1)
Clark, Champ, III.
(1)
Clarke, Justin.
(1)
Cook, Randy (Randy R.)
(1)
Craig, Paul.
(1)
Devost, Matthew G.
(1)
Dubrawsky, Ido.
(1)
Ellis, Juanita.
(1)
Ely, Adam.
(1)
Engebretson, Pat (Patrick Henry), 1974-
(1)
Erbschloe, Michael.
(1)
Esler, Joel.
(1)
Fair, Ted.
(1)
Finisterre, Kevin.
(1)
Foster, Stephen C.
(1)
Gregg, Michael (Michael C.)
(1)
Grillenmeier, Guido.
(1)
Haines, Brad.
(1)
Hancock, Bill, 1957-
(1)
Hay, Andrew.
(1)
Henmi, Anne.
(1)
Hill, Terri.
(1)
Honick, Ron.
(1)
Hsiao, David K., 1933-
(1)
Johnson, Norris L.
(1)
Kerr, Douglas S., author.
(1)
Kinney, Steven.
(1)
Kipper, Gregory.
(1)
Knapp, Eric.
(1)
Kraus, Rob.
(1)
Leeuw, Karl de.
(1)
Lin, Ching-Yung.
(1)
Liu, Dale.
(1)
Liu, Vincent.
(1)
Lynch, F. William.
(1)
Madnick, Stuart E., author.
(1)
Malin, Cameron H.
(1)
Mansourov, Nikolai.
(1)
McClure, Stuart.
(1)
Meyer, Greg.
(1)
Miles, Wyman.
(1)
Miller, Drew, 1978-
(1)
Miller, Matthew L.
(1)
Mitchell, Ed, 1945-
(1)
Mitnick, Kevin D. (Kevin David), 1963-
(1)
Mookhey, K. K.
(1)
Nordfelt, Michael.
(1)
Parker, Tom.
(1)
Perez, Richard, 1969 October 17-
(1)
Piccard, Paul L.
(1)
Pinzon, D. Scott.
(1)
Posluns, Jeffrey.
(1)
Potter, Bruce.
(1)
Price, Mike (Mike Morgan)
(1)
Qian, Yi, 1962-
(1)
Rash, Michael.
(1)
Rathaus, Noam.
(1)
Rogers, Russ.
(1)
Schiller, Craig A.
(1)
Shepherd, Matthew.
(1)
Shimonski, Robert.
(1)
Shinder, Debra Littlejohn, author.
(1)
Shinder, Debra Littlejohn. Scene of the cybercrime.
(1)
Speed, Tim.
(1)
Stanger, James.
(1)
Stapko, Timothy John.
(1)
Stefanek, George L.
(1)
Taylor, Laura.
(1)
Timm, Carl.
(1)
Tittel, Ed, author.
(1)
Todd, Chad.
(1)
Traxler, Julie.
(1)
Tyson, Dave.
(1)
Varsalone, Jesse.
(1)
Watkins, Stephen (Information security professional)
(1)
Wilson, Connie.
(1)
Winkler, Ira.
(1)
Winkler, J. R. (Joachim R.)
(1)
Wotring, Brian.
(1)
Wright., Michael.
(1)
Wyler, Neil R.
(1)
Yu, Hong Heather, 1967-
(1)
Zelkowitz, Marvin V., 1945-
(1)
Zeng, Wenjun, 1967-
(1)
Daha fazla
Tümünü genişlet
Daha az
Hepsini Daralt
Materyal Türü
Dahil
Hariç
E-Kitap
Dil
Dahil
Hariç
English
(106)
Yayın Yılı
Dahil
Hariç
-
2007
(20)
2006
(14)
2008
(14)
2005
(13)
2004
(11)
2002
(7)
2010
(7)
2011
(7)
2003
(6)
2001
(4)
2009
(2)
1979
(1)
1987
(1)
Daha fazla
Tümünü genişlet
Daha az
Hepsini Daralt
Konu
Dahil
Hariç
Electronic books.
(106)
COMPUTERS -- Internet -- Security.
(62)
COMPUTERS -- Networking -- Security.
(62)
COMPUTERS -- Security -- General.
(62)
Computer networks -- Security measures.
(47)
Hackers.
(10)
Internet -- Security measures.
(8)
Data protection.
(6)
Microsoft Windows (Computer file)
(6)
Computer crimes -- Investigation.
(5)
Computer crimes.
(5)
Computer security -- Fiction.
(5)
Computer security -- Handbooks, manuals, etc.
(5)
Database security.
(5)
Fiction.
(5)
Hackers -- Fiction.
(5)
Handbooks and manuals.
(5)
Computer crimes -- Prevention.
(4)
Computer viruses.
(4)
Cyberterrorism.
(4)
FICTION -- General.
(4)
Andre fag (naturvidenskab og teknik) Andre fag
(3)
Client/server computing -- Security measures.
(3)
Computers -- Access control.
(3)
Firewalls (Computer security)
(3)
LAW -- Forensic Science.
(3)
Microsoft Windows server.
(3)
Operating systems (Computers)
(3)
Short stories.
(3)
Wireless communication systems -- Security measures.
(3)
BUSINESS & ECONOMICS -- Corporate Governance.
(2)
BUSINESS & ECONOMICS -- Leadership.
(2)
BUSINESS & ECONOMICS -- Organizational Development.
(2)
BUSINESS & ECONOMICS -- Workplace Culture.
(2)
COMPUTERS -- Security -- Cryptography.
(2)
COMPUTERS -- Security -- Viruses.
(2)
Client/server computing.
(2)
Computer networks.
(2)
Computerbeveiliging.
(2)
Computercriminaliteit.
(2)
Computersicherheit
(2)
Cyberterrorism -- Fiction.
(2)
Digital watermarking.
(2)
Electronic book.
(2)
Electronic data processing departments -- Security measures.
(2)
Electronic mail messages -- Security measures.
(2)
Embedded computer systems.
(2)
Engineering & Applied Sciences.
(2)
Forensic sciences.
(2)
Hewlett-Packard computers -- Security measures.
(2)
Instant messaging -- Security measures.
(2)
Open source software.
(2)
Réseaux d'ordinateurs -- Sécurité -- Mesures.
(2)
SQL server.
(2)
Security systems.
(2)
Spyware (Computer software)
(2)
Systèmes informatiques -- Sécurité -- Mesures.
(2)
Web servers -- Security measures.
(2)
Web sites -- Security measures.
(2)
Acquisition of computer software.
(1)
Agents intelligents (Logiciels)
(1)
Application software -- Security measures.
(1)
BUSINESS & ECONOMICS -- Business Writing.
(1)
BUSINESS & ECONOMICS -- Industrial Management.
(1)
BUSINESS & ECONOMICS -- Management Science.
(1)
BUSINESS & ECONOMICS -- Management.
(1)
BUSINESS & ECONOMICS -- Organizational Behavior.
(1)
Bases de données -- Sécurité -- Mesures.
(1)
Business enterprises -- Security measures.
(1)
COMPUTER INFORMATION SECURITY.
(1)
COMPUTERS -- Digital Media -- General.
(1)
COMPUTERS -- Hardware -- Handheld Devices.
(1)
COMPUTERS -- Hardware -- Personal Computers -- General.
(1)
COMPUTERS -- Hardware -- Personal Computers -- Macintosh.
(1)
COMPUTERS -- Hardware -- Personal Computers -- PCs.
(1)
COMPUTERS -- Interactive & Multimedia.
(1)
COMPUTERS -- Microprocessors.
(1)
COMPUTERS -- Online Services.
(1)
COMPUTERS -- Operating Systems -- DOS.
(1)
COMPUTERS -- Operating Systems -- General.
(1)
COMPUTERS -- Operating Systems -- Macintosh.
(1)
COMPUTERS -- Operating Systems -- Windows Server & NT.
(1)
COMPUTERS -- Operating Systems -- Windows Workstation.
(1)
COMPUTERS -- Security -- Networking.
(1)
COMPUTERS -- System Administration -- Storage & Retrieval.
(1)
COMPUTERS -- System Administration -- Windows Administration.
(1)
COMPUTERS -- Web -- Site Design.
(1)
COMPUTERS -- Web -- User Generated Content.
(1)
Centres de traitement de l'information -- Sûreté -- Mesures.
(1)
Citrix MetaFrame.
(1)
Cloud computing.
(1)
ColdFusion.
(1)
Component software.
(1)
Computer Science.
(1)
Computer crimes -- Fiction.
(1)
Computer crimes -- Investigation -- Handbooks, manuals, etc.
(1)
Computer crimes -- Investigation -- Methodology.
(1)
Computer crimes -- Investigation -- United States -- Methodology.
(1)
Computer hackers.
(1)
Computer networks -- Access control.
(1)
Computer networks -- Reliability.
(1)
Computer networks -- Security measures -- Fiction.
(1)
Computer networks -- Security measures -- Handbooks, manuals, etc.
(1)
Computer science.
(1)
Computer security
(1)
Computer security -- History.
(1)
Computer software -- Testing.
(1)
Computer viruses -- Identification.
(1)
Computers -- Access control -- Passwords.
(1)
Copyright -- History.
(1)
Copyright.
(1)
Criminalistiek.
(1)
Cryptography -- History.
(1)
Cryptography.
(1)
DATA STORAGE.
(1)
DATA SYSTEMS.
(1)
Data encryption (Computer science)
(1)
Databescherming.
(1)
Electrical & Computer Engineering.
(1)
Electronic data processing departments Security measures
(1)
Electronic mail systems -- Security measures.
(1)
Field guides.
(1)
Forensic sciences -- Handbooks, manuals, etc.
(1)
Google.
(1)
Hackers -- Psychology -- Fiction.
(1)
Hackers -- Psychology.
(1)
History.
(1)
INFORMATION RETRIEVAL.
(1)
Identification cards -- Forgeries.
(1)
Identity theft -- Fiction.
(1)
Identity theft.
(1)
Impostors and imposture.
(1)
Industries -- Security measures.
(1)
Information resources management.
(1)
Information technology -- Security measures.
(1)
Information technology.
(1)
Intellectual property.
(1)
Internet fraud.
(1)
Internet programming.
(1)
Internet.
(1)
Intrusion detection systems (Computer security)
(1)
Langages de programmation -- Guides, manuels, etc.
(1)
Linux.
(1)
MULTIPLE ACCESS.
(1)
Mac OS.
(1)
Malware (Computer software) -- Prevention.
(1)
Metasploit (Electronic resource)
(1)
Microsoft Windows (Computer file) -- Security measures.
(1)
Microsoft Windows.
(1)
Microsoft software -- Security measures -- Handbooks, manuals, etc.
(1)
Multimedia systems -- Security measures.
(1)
OSSEC (Computer file)
(1)
Online social networks -- Security measures.
(1)
Operations systems (Computer)
(1)
Ordinateurs -- Accès -- Contrôle.
(1)
Peer-to-peer architecture (Computer networks)
(1)
Process control -- Security measures.
(1)
Programming languages (Electronic computers)
(1)
Programming languages (Electronic computers) -- Handbooks, manuals, etc.
(1)
Protection de l'information (Informatique)
(1)
Protection de l'information (Informatique) -- Guides, manuels, etc.
(1)
Risk management.
(1)
Réseaux d'ordinateurs.
(1)
SQL (Computer program language)
(1)
Short stories
(1)
Short stories, American -- 21st century.
(1)
Short stories, American.
(1)
Sites Web -- Sécurité -- Mesures.
(1)
Snort (Computer file)
(1)
Snort (Software)
(1)
Snort 2.0
(1)
Solaris (Computer file)
(1)
Spam filtering (Electronic mail)
(1)
Suspense fiction.
(1)
Systèmes informatiques -- Sécurité -- Mesures -- Guides, manuels, etc.
(1)
TECHNOLOGY & ENGINEERING -- Industrial Engineering.
(1)
TRUE CRIME -- White Collar Crime.
(1)
Telecommunication -- Security measures.
(1)
Telecommunications.
(1)
Transmission sans fil.
(1)
UNIX Shells.
(1)
United States.
(1)
Virtual computer systems -- Security measures.
(1)
Virus informatiques.
(1)
Web 2.0 -- Security measures.
(1)
Web search engines.
(1)
Web sites -- Design.
(1)
Wireless LANs -- Security measures.
(1)
World Wide Web -- Security measures.
(1)
XML (Document markup language)
(1)
Überwachung
(1)
Daha fazla
Tümünü genişlet
Daha az
Hepsini Daralt
Kütüphane
Dahil
Hariç
Başkent Kütüphanesi
false
{sortLabel}
{alphabetical}
{relevance}
{include}
{exclude}
{facetName}
{results}
{displayName}
{count}
{error}
Arama Sonuçları için sonuç bulunamadı
Diğer Kütüphaneler'a geç
Search Results
Elektronik Kaynaklar
Search Results
Elektronik Kaynaklar
Elektronik Kaynaklar
Sonuçlar alınıyor Elektronik Kaynaklar...
action
Go to:
Search Facets
|
Top of Page