Skip to:
Search Results
|
Bottom
|
Search Facets
|
Content
Giriş
|
Hesabım
|
Listelerim
|
|
Remember to clear the cache and close the browser window.
English
Search Limit
Bütün Kütüphaneler
Elektronik Kaynaklar
Hepsi
Başkent Üniversitesi Kütüphanesi
Anadolu OSB Meslek Yüksekokulu
Atasev Özel Koleksiyon
Erdoğan Tercan Koleksiyonu
Güzel Sanatlar ve Tasarım Arşivi
Kazan Meslek Yüksekokulu
Hukuk Koleksiyonu
Ord.Prof.Dr. Enver Ziya Karal Tarih Uygulama Ars.Mrk.
Özel Koleksiyon Serdar Özersin
Tez Koleksiyonu
Tüm Alanlar
Başlık
Yazar
Konu
ISBN
ISSN
13
Search Field
Tüm Alanlar
Arama:
Gelişmiş Arama
Search Results
Elektronik Kaynaklar
Arama Sonuçlarını Sınırlandır
Daraltılmış:
+
Yazar: ProQuest (Firm)
+
Language: English
+
Konu: Computer networks -- Security measures.
+
Konu: Electronic books.
Yazar
Dahil
Hariç
International Business Machines Corporation. International Technical Support Organization.
(4)
Shimonski, Robert.
(4)
Vacca, John R.
(4)
Foster, James C.
(3)
Shinder, Debra Littlejohn.
(3)
Shinder, Thomas W.
(3)
Beale, Jay.
(2)
Canavan, Tom.
(2)
Carvey, Harlan A.
(2)
Cole, Eric.
(2)
Erickson, Jon, 1977-
(2)
Grasdal, Martin.
(2)
Henmi, Anne.
(2)
Hunter, Laura E.
(2)
Osipov, Vitaly.
(2)
Pan, Yi, 1960-
(2)
Ramirez, Gilbert.
(2)
Rayns, Chris.
(2)
Rountree, Derrick.
(2)
Strebe, Matthew.
(2)
Tam, Kenneth.
(2)
Thuraisingham, Bhavani M.
(2)
Zalewski, Michal.
(2)
Ahmad, David R. Mirza.
(1)
Aissi, Selim.
(1)
Alcover, Jorge Blanco.
(1)
Ali, Shakeel.
(1)
Allison, Steve.
(1)
Allsopp, Wil.
(1)
Amini, Rob.
(1)
Amon, Cheri.
(1)
Andress, Jason.
(1)
Andrés, Steven.
(1)
Anson, Steve.
(1)
Antonius, Jesper.
(1)
Archibald, Neil.
(1)
Assing, Dominique.
(1)
Atiya, Amir F.
(1)
Babbin, Jacob.
(1)
Barnett, Ryan C.
(1)
Bayer, Chad M.
(1)
Beaver, Kevin.
(1)
Behrens, Thorsten.
(1)
Ben-Ari, Erez.
(1)
Bendell, Daniel H.
(1)
Bertino, Elisa.
(1)
Beyah, Raheem (Raheem A.), 1976-
(1)
Bhalla, Nish.
(1)
Birkholz, Erik Pace.
(1)
Bolt, Steven.
(1)
Briggs, Jonathan.
(1)
Burke, Josh.
(1)
Burnett, Mark (Mark M.)
(1)
Bücker, Axel.
(1)
Calé, Stéphane.
(1)
Cameron, Rob.
(1)
Cantrell, Chris.
(1)
Cantrell, Christopher.
(1)
Capurro, Rafael.
(1)
Carafano, James Jay, 1955-
(1)
Carey, David.
(1)
Caswell, Brian.
(1)
Chuvakin, Anton.
(1)
Clarke, Justin.
(1)
Connelly, Olly.
(1)
Conti, Greg.
(1)
Contos, Brian T.
(1)
Corbett, Cherita (Cherita L.)
(1)
Cross, Michael.
(1)
D'Arcy, John P., 1975-
(1)
Dabbous, Nora.
(1)
Dai, Yuan-Shun.
(1)
Danielyan, Edgar.
(1)
Davies, Joshua Dennis.
(1)
Davies, Saida.
(1)
DeLuccia, James J., 1977-
(1)
DeMott, Jared.
(1)
Delfanti, Alessandro.
(1)
Demchak, Chris C.
(1)
Deraison, Renaud.
(1)
Dolev, Ran.
(1)
Duman, Ekrem.
(1)
Dwivedi, Himanshu.
(1)
Eko, Lyombe.
(1)
Eldred, Michael.
(1)
Fadel, José.
(1)
Fichera, Joe, 1966-
(1)
Flynn, Hal.
(1)
Fortenberry, Benjamin W.
(1)
Fuller, Ed.
(1)
Furnell, Steven, 1970-
(1)
Ganci, John.
(1)
Gatford, Chris.
(1)
Geier, James T.
(1)
Gold, André.
(1)
Goodman, Seymour E.
(1)
Gutiérrez, Esteban.
(1)
Hancock, Bill, 1957-
(1)
Haroutunian , Evgueni.
(1)
Heinen, Neils.
(1)
Held, Gilbert, 1943-
(1)
Heriyanto, Tedi.
(1)
Hicks, Richard.
(1)
Hoffman, Daniel (Daniel V.), 1972-
(1)
Huseby, Sverre H.
(1)
Hänninen, Pekka.
(1)
Jagielski, Piotr.
(1)
Kappeler, Patrick.
(1)
Kenyon, Brian.
(1)
Khan, Latifur.
(1)
Khnaser, Elias N.
(1)
Khoury, Franjieh El.
(1)
Killion, Dave.
(1)
Kissell, Joe.
(1)
Knapp, Eric D.
(1)
Knipp, Eric.
(1)
Kolde, Jennifer.
(1)
Kotwica, Kathleen.
(1)
Kranakis, Evangelos.
(1)
Kritchever, Yury.
(1)
Krutz, Ronald L.
(1)
Kumar, Atul.
(1)
LaBelle, Peggy.
(1)
Langill, Joel.
(1)
Lathem, Chris.
(1)
Lin, Herbert.
(1)
Long, Johnny.
(1)
Loshin, Peter.
(1)
Lucas, Mark.
(1)
Lynn, Kevin.
(1)
Manzuik, Steve.
(1)
Masud, Mehedy.
(1)
Maxwell, Douglas D.
(1)
McNair, Janise (Janise Yvette), 1968-
(1)
Meine, Bill.
(1)
Meyer, Greg.
(1)
Miletić, Darko.
(1)
Miller, Charles Alfred.
(1)
Milroy, Derek.
(1)
Moeller, Robert R.
(1)
Morris, Greg.
(1)
NATO Advanced Study Institute on Network Security and Intrusion Detection (2005 : Yerevan, Armenia)
(1)
NATO Science for Peace and Security Programme.
(1)
Nabrdalik, Jakub.
(1)
Nagel, Daniel.
(1)
Nahari, Hadi.
(1)
National Research Council (U.S.). Committee on Improving Cybersecurity Research in the United States.
(1)
National Research Council (U.S.). Committee on Information Systems Trustworthiness.
(1)
Nazario, Jose.
(1)
Neely, Matthew.
(1)
Norman, Thomas L.
(1)
North Atlantic Treaty Organization. Public Diplomacy Division.
(1)
Ogden, Bill.
(1)
Oppliger, Rolf.
(1)
Orebaugh, Angela.
(1)
Oriyano, Sean-Philip.
(1)
Osborne, Mark.
(1)
Owens, Les.
(1)
Parker, Tom.
(1)
Pauli, Joshua J.
(1)
Piccard, Paul L.
(1)
Poisel, Richard.
(1)
Poole, Owen.
(1)
Potter, Bruce.
(1)
Prasad, Anand.
(1)
Putte, Geert van de.
(1)
Qian, Yi, 1962-
(1)
Rash, Michael.
(1)
Rathaus, Noam.
(1)
Reed, Joshua.
(1)
Riexinger, Dieter.
(1)
Ring, Sandra.
(1)
Rittinghouse, John W.
(1)
Rogers, Paul.
(1)
Russell, Kevin.
(1)
Russell, Ryan, 1969-
(1)
Sachs, Marcus H.
(1)
Samani, Raj.
(1)
Schneider, Fred B.
(1)
Shahbazian, E. (Elisa)
(1)
Shema, Mike.
(1)
Shinder, Dr. Thomas W.
(1)
Siliceo, Omar.
(1)
Singh, Abhishek.
(1)
Solomon, Michael R.
(1)
Sommer, Frank.
(1)
Speed, Tyler Justin.
(1)
Stapko, Timothy John.
(1)
Sumida, Atsushi.
(1)
Takahashi, Kenji.
(1)
Takanen, Ari.
(1)
Tiller, James S.
(1)
Todd, Chad.
(1)
Tsai, Jeffrey J.-P.
(1)
Ventre, Daniel.
(1)
Warnicke, Ed.
(1)
Wheeler, Evan.
(1)
White, Bill.
(1)
White, Scott.
(1)
Wiles, Jack.
(1)
Daha fazla
Tümünü genişlet
Daha az
Hepsini Daralt
Materyal Türü
Dahil
Hariç
E-Kitap
Yayın Yılı
Dahil
Hariç
-
2013
(20)
2011
(17)
2005
(16)
2003
(15)
2004
(15)
2008
(12)
2006
(11)
2012
(11)
2007
(9)
2002
(8)
2010
(5)
2001
(3)
2009
(3)
1999
(1)
2014
(1)
Daha fazla
Tümünü genişlet
Daha az
Hepsini Daralt
Konu
Dahil
Hariç
Computer security.
(65)
Internet -- Security measures.
(13)
Computer hackers.
(10)
Firewalls (Computer security)
(7)
Computer networks -- Access control.
(6)
Computers -- Access control.
(5)
Web sites -- Security measures.
(5)
WebSphere.
(5)
Computer network protocols.
(4)
World Wide Web -- Security measures.
(4)
Computer crimes -- Prevention.
(3)
Data encryption (Computer science)
(3)
Data protection.
(3)
Information warfare.
(3)
Java (Computer program language)
(3)
Microsoft Windows (Computer file)
(3)
Microsoft Windows server.
(3)
Operating systems (Computers)
(3)
Penetration testing (Computer security)
(3)
Wireless communication systems -- Security measures.
(3)
z/OS.
(3)
Application software -- Security measures.
(2)
Computer crimes -- Investigation -- United States -- Methodology.
(2)
Computer crimes -- Investigation.
(2)
Computer network architectures.
(2)
Computer networks -- Management.
(2)
Computer security -- Management.
(2)
Computer viruses.
(2)
Cyberspace -- Security measures.
(2)
Cyberterrorism -- Prevention.
(2)
Database security.
(2)
Internet.
(2)
Microsoft ISA server.
(2)
Microsoft Windows (Computer file) -- Security measures.
(2)
Open source software.
(2)
Oracle (Computer file)
(2)
Technology -- Research -- United States.
(2)
Web portals -- Security measures.
(2)
Web servers -- Security measures.
(2)
Application logging (Computer science)
(1)
Biometric identification.
(1)
Browsers (Computer programs)
(1)
Business enterprises -- Computer networks -- Security measures.
(1)
Business enterprises -- Security measures.
(1)
Cisco Systems, Inc.
(1)
Cloud computing.
(1)
ColdFusion.
(1)
Commercial crimes.
(1)
Computational grids (Computer systems)
(1)
Computer crimes -- Investigation -- United States.
(1)
Computer crimes -- Investments.
(1)
Computer crimes.
(1)
Computer networks -- Auditing.
(1)
Computer networks -- Design and construction.
(1)
Computer networks -- Reliability.
(1)
Computer networks -- Remote access.
(1)
Computer networks -- Security measures -- United States.
(1)
Computer networks -- Social aspects.
(1)
Computer networks -- Standards.
(1)
Computer networks -- Testing.
(1)
Computer science.
(1)
Computer security -- Evaluation -- Methodology.
(1)
Computer security -- Evaluation.
(1)
Computer security -- United States.
(1)
Computer software -- Development.
(1)
Computer-assisted instruction -- Security measures.
(1)
Credit cards.
(1)
Cryptography.
(1)
Data encryption (Computer science) -- Examinations -- Study guides.
(1)
Data mining.
(1)
Data protection -- Standards.
(1)
Database design.
(1)
Distributed operating systems (Computers) -- Security measures.
(1)
Electronic commerce -- Security measures.
(1)
Electronic data processing -- Distributed processing.
(1)
Electronic data processing departments -- Auditing.
(1)
Electronic data processing personnel -- Certification -- Study guides.
(1)
Electronic information resources -- Access control.
(1)
Electronics in military engineering.
(1)
Embedded computer systems.
(1)
Extranets (Computer networks)
(1)
Forensic sciences.
(1)
Freedom of speech -- France -- History.
(1)
Freedom of speech -- United States -- History.
(1)
Groupware (Computer software)
(1)
Hacktivism.
(1)
IBM Tivoli identity manager.
(1)
IBM computers.
(1)
IEEE 802.11 (Standard)
(1)
IEEE 802.16 (Standard)
(1)
Identity (Philosophical concept)
(1)
Industrial marketing -- Planning.
(1)
Industrial marketing -- Security measures.
(1)
Information networks -- Security measures.
(1)
Information society -- Political aspects.
(1)
Information storage and retrieval systems -- Security measures.
(1)
Information technology -- Auditing.
(1)
Information technology -- Management.
(1)
Information technology -- Security measures.
(1)
Information technology -- Social aspects.
(1)
Information visualization.
(1)
Information warfare -- Political aspects.
(1)
Instant messaging.
(1)
Internet -- Law and legislation -- France.
(1)
Internet -- Law and legislation -- United States.
(1)
Internet and terrorism.
(1)
Internetworking (Telecommunication)
(1)
Intrusion detection systems (Computer security)
(1)
Iris (Eye)
(1)
Joomla! (Computer file)
(1)
Liability for credit information.
(1)
Local area networks (Computer networks) -- Security measures.
(1)
Mac OS.
(1)
Macintosh (Computer) -- Programming.
(1)
Mass media -- Law and legislation.
(1)
Microsoft Windows (Computer file) -- Examinations -- Study guides.
(1)
Military telecommunication.
(1)
Moodle -- Handbooks, manuals, etc.
(1)
National security -- Risk assessment.
(1)
National security -- Technological innovations.
(1)
Peer-to-peer architecture (Computer networks)
(1)
Privacy, Right of -- France.
(1)
Privacy, Right of -- United States.
(1)
Public key infrastructure (Computer security)
(1)
SQL (Computer program language)
(1)
Semantic Web.
(1)
Sensor networks -- Security measures.
(1)
September 11 Terrorist Attacks, 2001.
(1)
Service-oriented architecture (Computer science)
(1)
Smart power grids -- Security measures.
(1)
Social media.
(1)
Social networks.
(1)
TCP/IP (Computer network protocol)
(1)
Telecommunication policy -- United States.
(1)
UNIX (Computer file)
(1)
UNIX Shells.
(1)
Visual perception.
(1)
War and society.
(1)
Web applications -- Security measures.
(1)
Web site development -- Security measures.
(1)
Web site development.
(1)
Web sites -- Authoring programs.
(1)
Wide area networks (Computer networks) -- Access.
(1)
Wireless LANs.
(1)
WordPress (Electronic resource)
(1)
Daha fazla
Tümünü genişlet
Daha az
Hepsini Daralt
Kütüphane
Dahil
Hariç
Başkent Kütüphanesi
Lokasyon
Dahil
Hariç
Ebook Central
false
{sortLabel}
{alphabetical}
{relevance}
{include}
{exclude}
{facetName}
{results}
{displayName}
{count}
{error}
Eylem Seç
Ayırt
Listelerime ekle
Eposta
Yazdır
147 sonuç bulundu
1
2
3
4
5
..
13
Sırala:
Konuyla İlgili Sırala
Yayın Yılı (eskiden yeniye)
Yayın Yılı (yeniden eskiye)
Başlık
Yazar
OK
Eposta Adresleri
:
Phone Number:
Mobile Carrier:
AT&T
Boost
Nextel (Sprint)
Sprint (PCS)
T Mobile
TracFone
US Cellular
Verizon
Virgin
Select An Item
Data usage warning: You will receive one text message for each title you selected.
Standard text messaging rates apply.
Text it to me
Text it to me, and go to next item
000000000000
DEFAULTTR
Liste seç
Geçici Liste
Bunu varsayılan liste yap.
Öğeler başarıyla eklendi
Öğeler eklenirken hata oldu. Lütfen tekrar deneyiniz.
Network and system security
1.
Network and system security
by
Vacca, John R.
Click to View
Format:
Biohackers the politics of open science
2.
Biohackers the politics of open science
by
Delfanti, Alessandro.
Click to View
Format:
Mobile access safety beyond BYOD
3.
Mobile access safety beyond BYOD
by
Assing, Dominique.
Click to View
Format:
Network intrusion analysis methodologies, tools, and techniques for incident analysis and response
4.
Network intrusion analysis methodologies, tools, and techniques for incident analysis and response
by
Fichera, Joe, 1966-
Click to View
Format:
UTM security with Fortinet Mastering FortiOS
5.
UTM security with Fortinet Mastering FortiOS
by
Tam, Kenneth.
Click to View
Format:
Advanced persistent threat understanding the danger and how to protect your organization
6.
Advanced persistent threat understanding the danger and how to protect your organization
by
Cole, Eric.
Click to View
Format:
The basics of cyber warfare understanding the fundamentals of cyber warfare in theory and practice
7.
The basics of cyber warfare understanding the fundamentals of cyber warfare in theory and practice
by
Winterfeld, Steve.
Click to View
Format:
Federated identity primer
8.
Federated identity primer
by
Rountree, Derrick.
Click to View
Format:
Hacking for dummies
9.
Hacking for dummies
by
Beaver, Kevin.
Click to View
Format:
Web application defender's cookbook battling hackers and protecting users
10.
Web application defender's cookbook battling hackers and protecting users
by
Barnett, Ryan C.
Click to View
Format:
Windows 2012 server network security securing your windows network systems and infrastructure
11.
Windows 2012 server network security securing your windows network systems and infrastructure
by
Rountree, Derrick.
Click to View
Format:
Practical anonymity hiding in plain sight online
12.
Practical anonymity hiding in plain sight online
by
Loshin, Peter.
Click to View
Format:
Eylem Seç
Ayırt
Listelerime ekle
Eposta
Yazdır
1
2
3
4
5
..
13
Search Results
Elektronik Kaynaklar
Search Results
Elektronik Kaynaklar
OK
Eposta Adresleri
:
Phone Number:
Mobile Carrier:
AT&T
Boost
Nextel (Sprint)
Sprint (PCS)
T Mobile
TracFone
US Cellular
Verizon
Virgin
Select An Item
Data usage warning: You will receive one text message for each title you selected.
Standard text messaging rates apply.
Text it to me
Text it to me, and go to next item
Elektronik Kaynaklar
Sonuçlar alınıyor Elektronik Kaynaklar...
action
Go to:
Search Results
|
Search Facets
|
Top of Page