Skip to:
Search Results
|
Bottom
|
Search Facets
|
Content
Giriş
|
Hesabım
|
Listelerim
|
|
Remember to clear the cache and close the browser window.
English
Search Limit
Bütün Kütüphaneler
Elektronik Kaynaklar
Hepsi
Başkent Üniversitesi Kütüphanesi
Anadolu OSB Meslek Yüksekokulu
Atasev Özel Koleksiyon
Erdoğan Tercan Koleksiyonu
Güzel Sanatlar ve Tasarım Arşivi
Kazan Meslek Yüksekokulu
Hukuk Koleksiyonu
Ord.Prof.Dr. Enver Ziya Karal Tarih Uygulama Ars.Mrk.
Özel Koleksiyon Serdar Özersin
Tez Koleksiyonu
Tüm Alanlar
Başlık
Yazar
Konu
ISBN
ISSN
13
Search Field
Tüm Alanlar
Arama:
Gelişmiş Arama
Search Results
Elektronik Kaynaklar
Arama Sonuçlarını Sınırlandır
Daraltılmış:
+
Language: English
+
Yayın Yılı: 2016
+
Konu: Computer networks -- Security measures.
Yazar
Dahil
Hariç
Cardwell, Kevin, author.
(2)
Limbert, Matthew, designer.
(2)
Allen, Lee, 1946- author.
(1)
Blair, John, author.
(1)
Carvey, Harlan, author.
(1)
Chapman, Chris, author.
(1)
Fowler, Kevvie, author.
(1)
Furnell, Steve, editor.
(1)
Gallo, Timonthy, editor.
(1)
Gevers, Rickey, author.
(1)
Guerrier, Claudine, author.
(1)
Haaster, Jelle van, author.
(1)
Karyotis, Vasileios, author.
(1)
Khouzani, M. H. R., author.
(1)
Leibrock, Larry, editor.
(1)
Liska, Allan, author.
(1)
Mazurczyk, Wojciech, author.
(1)
Oppliger, Rolf, author.
(1)
Rispoli, Mike, editor.
(1)
Rose, Curtis, editor.
(1)
Rossberg, Michael, author.
(1)
Schäfer, Günter, author.
(1)
Shavers, Brett, author.
(1)
Sprengers, Martijn, author.
(1)
Stowe, Geoffrey, author.
(1)
Sullivant, John, author.
(1)
Sumner, Stuart, author.
(1)
Daha fazla
Tümünü genişlet
Daha az
Hepsini Daralt
Materyal Türü
Dahil
Hariç
E-Kitap
Konu
Dahil
Hariç
Electronic books.
(15)
Computer security.
(10)
Computer crimes.
(2)
Microsoft Windows (Computer file)
(2)
Operating systems (Computers)
(2)
Computer network protocols.
(1)
Computer networks -- Access control.
(1)
Computer networks.
(1)
Computer security -- Management.
(1)
Corporate culture.
(1)
Data protection.
(1)
Hacking.
(1)
Internet -- Security measures.
(1)
Internet domain names.
(1)
Malware (Computer software)
(1)
Malware (Computer software) -- Prevention.
(1)
Penetration testing (Computer security)
(1)
Security systems.
(1)
Social sciences -- Network analysis.
(1)
Wireless communication systems -- Security measures.
(1)
World Wide Web -- Security measures.
(1)
Daha fazla
Tümünü genişlet
Daha az
Hepsini Daralt
Kütüphane
Dahil
Hariç
Başkent Kütüphanesi
Lokasyon
Dahil
Hariç
Ebook Central
false
{sortLabel}
{alphabetical}
{relevance}
{include}
{exclude}
{facetName}
{results}
{displayName}
{count}
{error}
Eylem Seç
Ayırt
Listelerime ekle
Eposta
Yazdır
15 sonuç bulundu
1
2
Sırala:
Konuyla İlgili Sırala
Yayın Yılı (eskiden yeniye)
Yayın Yılı (yeniden eskiye)
Başlık
Yazar
OK
Eposta Adresleri
:
Phone Number:
Mobile Carrier:
AT&T
Boost
Nextel (Sprint)
Sprint (PCS)
T Mobile
TracFone
US Cellular
Verizon
Virgin
Select An Item
Data usage warning: You will receive one text message for each title you selected.
Standard text messaging rates apply.
Text it to me
Text it to me, and go to next item
000000000000
DEFAULTTR
Liste seç
Geçici Liste
Bunu varsayılan liste yap.
Öğeler başarıyla eklendi
Öğeler eklenirken hata oldu. Lütfen tekrar deneyiniz.
Security and privacy in the digital era. Volume 1
1.
Security and privacy in the digital era. Volume 1
by
Guerrier, Claudine, author.
Click to View
Format:
Security in fixed and wireless networks
2.
Security in fixed and wireless networks
by
Schäfer, Günter, author.
Click to View
Format:
SSL and TLS : theory and practice
3.
SSL and TLS : theory and practice
by
Oppliger, Rolf, author.
Click to View
Format:
Essential skills for hackers
4.
Essential skills for hackers
by
Cardwell, Kevin, author.
Click to View
Format:
Advanced penetration testing for highly-secured environments.
5.
Advanced penetration testing for highly-secured environments.
by
Allen, Lee, 1946- author.
Click to View
Format:
Dns security : defending the domain name system
6.
Dns security : defending the domain name system
by
Liska, Allan, author.
Click to View
Format:
Data breach preparation and response : breaches are certain, impact is not
7.
Data breach preparation and response : breaches are certain, impact is not
by
Fowler, Kevvie, author.
Click to View
Format:
Cyber guerilla
8.
Cyber guerilla
by
Haaster, Jelle van, author.
Click to View
Format:
Information hiding in communication networks : fundamentals, mechanisms, applications, and countermeasures
9.
Information hiding in communication networks : fundamentals, mechanisms, applications, and countermeasures
by
Mazurczyk, Wojciech, author.
Click to View
Format:
Building a corporate culture of security : strategies for strengthening organizational resiliency
10.
Building a corporate culture of security : strategies for strengthening organizational resiliency
by
Sullivant, John, author.
Click to View
Format:
Malware diffusion models for modern complex networks : theory and applications
11.
Malware diffusion models for modern complex networks : theory and applications
by
Karyotis, Vasileios, author.
Click to View
Format:
Windows registry forensics : advanced digital forensic analysis of the windows registry
12.
Windows registry forensics : advanced digital forensic analysis of the windows registry
by
Carvey, Harlan, author.
Click to View
Format:
Eylem Seç
Ayırt
Listelerime ekle
Eposta
Yazdır
1
2
Search Results
Elektronik Kaynaklar
Search Results
Elektronik Kaynaklar
OK
Eposta Adresleri
:
Phone Number:
Mobile Carrier:
AT&T
Boost
Nextel (Sprint)
Sprint (PCS)
T Mobile
TracFone
US Cellular
Verizon
Virgin
Select An Item
Data usage warning: You will receive one text message for each title you selected.
Standard text messaging rates apply.
Text it to me
Text it to me, and go to next item
Elektronik Kaynaklar
Sonuçlar alınıyor Elektronik Kaynaklar...
action
Go to:
Search Results
|
Search Facets
|
Top of Page