Skip to:
Search Results
|
Bottom
|
Search Facets
|
Content
Giriş
|
Hesabım
|
Listelerim
|
|
Remember to clear the cache and close the browser window.
English
Search Limit
Bütün Kütüphaneler
Elektronik Kaynaklar
Hepsi
Başkent Üniversitesi Kütüphanesi
Anadolu OSB Meslek Yüksekokulu
Atasev Özel Koleksiyon
Erdoğan Tercan Koleksiyonu
Güzel Sanatlar ve Tasarım Arşivi
Kazan Meslek Yüksekokulu
Hukuk Koleksiyonu
Ord.Prof.Dr. Enver Ziya Karal Tarih Uygulama Ars.Mrk.
Özel Koleksiyon Serdar Özersin
Tez Koleksiyonu
Tüm Alanlar
Başlık
Yazar
Konu
ISBN
ISSN
13
Search Field
Tüm Alanlar
Arama:
Gelişmiş Arama
Search Results
Elektronik Kaynaklar
Arama Sonuçlarını Sınırlandır
Daraltılmış:
+
Language: English
+
Lokasyon: Ebook Central
+
Yayın Yılı: 2014
+
Konu: Computer networks -- Security measures.
Yazar
Dahil
Hariç
Katsaropoulos, Chris, editor.
(2)
Vacca, John R.
(2)
Voeller, John G.
(2)
Andress, Jason, author.
(1)
Bennett, Eleanor Leonne, cover designer.
(1)
Bianco, David J., 1971-
(1)
Bindner, Andrew.
(1)
Braman, Eric, editor.
(1)
Broad, James.
(1)
Buchanan, Cameron, author.
(1)
Carbone, Fernando, author.
(1)
Cardwell, Kevin, author.
(1)
Carvey, Harlan A., author.
(1)
Cherry, Denny.
(1)
Collins, Jon, author.
(1)
Cruz, Maria Ines, designer.
(1)
Edwards, Matthew, editor of compilation.
(1)
Enbody, Richard, author.
(1)
Foushee, James E.
(1)
Gantz, Stephen D.
(1)
Gavrilenko, K., author.
(1)
Ginodman, Veniamin, editor.
(1)
Gomzin, Slava.
(1)
Gonzalez, Deborah, author.
(1)
Gupta, Aditya, author.
(1)
Hathaway, Melissa E., editor of compilation.
(1)
Herkanaidu, Ram, editor.
(1)
Hutchens, Justin, author.
(1)
Jasej, Michal, cover designer.
(1)
Jaswal, Nipun, author.
(1)
LaRock, Thomas.
(1)
Limbert, Matthew, designer.
(1)
Loshin, Peter, editor.
(1)
Maske, Steve.
(1)
Michajlowski, A., author.
(1)
Mowbray, Thomas J.
(1)
Norman, Thomas, author.
(1)
Obelets, Natalya, editor.
(1)
Pandey, Abhishek, cover designer.
(1)
Perez, Andre, author.
(1)
ProQuest (Firm)
(1)
Rass, Stefan, author.
(1)
Rearick, Benjamin, project director.
(1)
Rima, Chris.
(1)
Samayan, Malathi, project director.
(1)
Sanders, Chris, 1986-
(1)
Sawant, Aniket, cover designer.
(1)
Shapira, Elad, author of introduction, etc.
(1)
Shi, Tony, cover designer.
(1)
Shostack, Adam.
(1)
Slamanig, Daniel, author.
(1)
Smith, Jason (Adjunct associate professor)
(1)
Snedaker, Susan.
(1)
Sood, Aditya K., author.
(1)
Susmann, Philip, editor.
(1)
Touhill, C. Joseph, author.
(1)
Touhill, Gregory J., author.
(1)
Ulsch, N. MacDonnell, 1951- author.
(1)
Vaseashta, A. (Ashok), editor.
(1)
Vladimirov, A., author.
(1)
Walker, Stephen W.
(1)
Winterfeld, Steven, editor.
(1)
Daha fazla
Tümünü genişlet
Daha az
Hepsini Daralt
Materyal Türü
Dahil
Hariç
E-Kitap
Konu
Dahil
Hariç
Electronic books.
(35)
Computer security.
(15)
Computers -- Access control.
(5)
Cyberspace -- Security measures.
(3)
Internet -- Security measures.
(3)
Penetration testing (Computer security)
(3)
Computer crimes -- Prevention.
(2)
Cyberterrorism -- Prevention.
(2)
Electronic data processing departments -- Security measures.
(2)
Android (Electronic resource)
(1)
Application software -- Design.
(1)
Application software -- Development.
(1)
Business -- Data processing -- Security measures.
(1)
Business enterprises -- Computer networks -- Security measures.
(1)
Business enterprises -- Security measures.
(1)
Business travel -- Safety measures.
(1)
Cloud computing.
(1)
Computer crimes -- Investigation -- United States -- Methodology.
(1)
Computer hackers.
(1)
Computer security -- Management.
(1)
Computer security -- Testing.
(1)
Computers -- Security.
(1)
Corporations -- Security measures.
(1)
Crisis management.
(1)
Cyberinfrastructure -- Security measures.
(1)
Cyberterrorism.
(1)
Emergency management.
(1)
Executives -- Protection.
(1)
Forensic sciences.
(1)
Fraud -- Prevention.
(1)
Information resources management.
(1)
Information storage and retrieval systems -- Security measures.
(1)
Information technology -- Auditing.
(1)
Infrastructure (Economics)
(1)
Management information systems -- Security measures.
(1)
Microsoft Windows (Computer file) -- Security measures.
(1)
Open source intelligence.
(1)
Risk assessment.
(1)
Security consultants.
(1)
Situational awareness.
(1)
Daha fazla
Tümünü genişlet
Daha az
Hepsini Daralt
Kütüphane
Dahil
Hariç
Başkent Kütüphanesi
false
{sortLabel}
{alphabetical}
{relevance}
{include}
{exclude}
{facetName}
{results}
{displayName}
{count}
{error}
Eylem Seç
Ayırt
Listelerime ekle
Eposta
Yazdır
35 sonuç bulundu
1
2
3
Sırala:
Konuyla İlgili Sırala
Yayın Yılı (eskiden yeniye)
Yayın Yılı (yeniden eskiye)
Başlık
Yazar
OK
Eposta Adresleri
:
Phone Number:
Mobile Carrier:
AT&T
Boost
Nextel (Sprint)
Sprint (PCS)
T Mobile
TracFone
US Cellular
Verizon
Virgin
Select An Item
Data usage warning: You will receive one text message for each title you selected.
Standard text messaging rates apply.
Text it to me
Text it to me, and go to next item
000000000000
DEFAULTTR
Liste seç
Geçici Liste
Bunu varsayılan liste yap.
Öğeler başarıyla eklendi
Öğeler eklenirken hata oldu. Lütfen tekrar deneyiniz.
Assessing information security : strategies, tactics, logic and framework
1.
Assessing information security : strategies, tactics, logic and framework
by
Vladimirov, A., author.
Click to View
Format:
Hacking with Kali : practical penetration testing techniques
2.
Hacking with Kali : practical penetration testing techniques
by
Broad, James.
Click to View
Format:
Business continuity and disaster recovery planning for IT professionals
3.
Business continuity and disaster recovery planning for IT professionals
by
Snedaker, Susan.
Click to View
Format:
Kali Linux CTF Blueprints : build, test, and customize your own Capture the Flag challenges across multiple platforms designed to be attacked with Kali Linux
4.
Kali Linux CTF Blueprints : build, test, and customize your own Capture the Flag challenges across multiple platforms designed to be attacked with Kali Linux
by
Buchanan, Cameron, author.
Click to View
Format:
The basics of information security : understanding the fundamentals of InfoSec in theory and practice
5.
The basics of information security : understanding the fundamentals of InfoSec in theory and practice
by
Andress, Jason, author.
Click to View
Format:
Cybersecurity for executives : a practical guide
6.
Cybersecurity for executives : a practical guide
by
Touhill, Gregory J., author.
Click to View
Format:
Security architect : careers in information security
7.
Security architect : careers in information security
by
Collins, Jon, author.
Click to View
Format:
Cyber threat! : how to manage the growing risk of cyber attacks
8.
Cyber threat! : how to manage the growing risk of cyber attacks
by
Ulsch, N. MacDonnell, 1951- author.
Click to View
Format:
Building virtual pentesting labs for advanced penetration testing : build intricate virtual architecture to practice any penetration testing technique virtually
9.
Building virtual pentesting labs for advanced penetration testing : build intricate virtual architecture to practice any penetration testing technique virtually
by
Cardwell, Kevin, author.
Click to View
Format:
Learning pentesting for Android devices : a practical guide to learning penetration testing for Android devices and applications
10.
Learning pentesting for Android devices : a practical guide to learning penetration testing for Android devices and applications
by
Gupta, Aditya, author.
Click to View
Format:
Computer forensics with FTK : enhance your computer forensics knowledge through illustrations, tips, tricks, and practical real-world scenarios
11.
Computer forensics with FTK : enhance your computer forensics knowledge through illustrations, tips, tricks, and practical real-world scenarios
by
Carbone, Fernando, author.
Click to View
Format:
Windows forensic analysis toolkit : advanced analysis techniques for Windows 8
12.
Windows forensic analysis toolkit : advanced analysis techniques for Windows 8
by
Carvey, Harlan A., author.
Click to View
Format:
Eylem Seç
Ayırt
Listelerime ekle
Eposta
Yazdır
1
2
3
Search Results
Elektronik Kaynaklar
Search Results
Elektronik Kaynaklar
OK
Eposta Adresleri
:
Phone Number:
Mobile Carrier:
AT&T
Boost
Nextel (Sprint)
Sprint (PCS)
T Mobile
TracFone
US Cellular
Verizon
Virgin
Select An Item
Data usage warning: You will receive one text message for each title you selected.
Standard text messaging rates apply.
Text it to me
Text it to me, and go to next item
Elektronik Kaynaklar
Sonuçlar alınıyor Elektronik Kaynaklar...
action
Go to:
Search Results
|
Search Facets
|
Top of Page