Skip to:
Search Results
|
Bottom
|
Search Facets
|
Content
Giriş
|
Hesabım
|
Listelerim
|
|
Remember to clear the cache and close the browser window.
English
Search Limit
Bütün Kütüphaneler
Elektronik Kaynaklar
Hepsi
Başkent Üniversitesi Kütüphanesi
Anadolu OSB Meslek Yüksekokulu
Atasev Özel Koleksiyon
Erdoğan Tercan Koleksiyonu
Güzel Sanatlar ve Tasarım Arşivi
Kazan Meslek Yüksekokulu
Hukuk Koleksiyonu
Ord.Prof.Dr. Enver Ziya Karal Tarih Uygulama Ars.Mrk.
Özel Koleksiyon Serdar Özersin
Tez Koleksiyonu
Tüm Alanlar
Başlık
Yazar
Konu
ISBN
ISSN
13
Search Field
Tüm Alanlar
Arama:
Gelişmiş Arama
Search Results
Elektronik Kaynaklar
Arama Sonuçlarını Sınırlandır
Daraltılmış:
+
Language: English
+
Konu: Computer crimes -- Prevention.
Yazar
Dahil
Hariç
ProQuest (Firm)
(10)
Engebretson, Pat (Patrick Henry), 1974-
(3)
Mehan, Julie E., author.
(2)
Winkler, Ira.
(2)
Akhgar, Babak.
(1)
Alcover, Jorge Blanco.
(1)
Andreasson, Kim J.
(1)
Arabnia, Hamid.
(1)
Barnett, Ryan C.
(1)
Bernik, Igor.
(1)
Berson, Thomas, editor.
(1)
Blue, Violet, author.
(1)
Clark, David, editor.
(1)
Clarke, R. V. G.
(1)
Dunham, Ken.
(1)
Ely, Adam.
(1)
Enbody, Richard, author.
(1)
Kaushik, Anjali, author.
(1)
Kendrick, Rupert.
(1)
Kennedy, David.
(1)
Krumsiek, Allison, author.
(1)
Lacey, David.
(1)
Libicki, Martin C., author.
(1)
Lin, Herbert S., editor.
(1)
Loshin, Peter, editor.
(1)
Maynor, David.
(1)
Mehan, Julie E.
(1)
Messier, Ric, author.
(1)
Monte, Matthew, author.
(1)
Moskowitz, Sanford, author.
(1)
National Defense Research Institute (U.S.), author.
(1)
National Research Council (U.S.). Computer Science and Telecommunications Board. Committee on Developing a Cybersecurity Primer, originator.
(1)
Newman, Graeme R.
(1)
Oriyano, Sean-Philip, author.
(1)
Pauli, Joshua J.
(1)
Perez, Richard, 1969 October 17-
(1)
Pollak, Julia, author.
(1)
Rand Corporation. National Security Research Division, sponsor.
(1)
Romanosky, Sasha, author.
(1)
Senty, David, author.
(1)
Shema, Mike.
(1)
Sood, Aditya K., author.
(1)
Timm, Carl.
(1)
Ulsch, N. MacDonnell, 1951- author.
(1)
Walker, Dori, cover designer.
(1)
White, Scott.
(1)
Wong, Caroline
(1)
Daha fazla
Tümünü genişlet
Daha az
Hepsini Daralt
Materyal Türü
Dahil
Hariç
E-Kitap
Kitap
Yayın Yılı
Dahil
Hariç
-
2014
(8)
2010
(4)
2013
(4)
2012
(3)
2015
(3)
2007
(2)
2009
(2)
2017
(2)
2003
(1)
2006
(1)
2008
(1)
2016
(1)
2018
(1)
Daha fazla
Tümünü genişlet
Daha az
Hepsini Daralt
Konu
Dahil
Hariç
Electronic books.
(32)
Computer security.
(12)
Computer networks -- Security measures.
(8)
COMPUTERS -- Internet -- Security.
(5)
COMPUTERS -- Networking -- Security.
(5)
COMPUTERS -- Security -- General.
(5)
Computer hackers.
(4)
Cyberterrorism -- Prevention.
(4)
Hackers.
(4)
Computer crimes.
(3)
Computer networks -- Security measures -- Standards.
(3)
Computer software -- Testing.
(3)
Cyberspace -- Security measures.
(3)
Information technology -- Security measures.
(3)
Internet -- Security measures.
(3)
Penetration testing (Computer security)
(3)
Business enterprises -- Computer networks -- Security measures.
(2)
Computer networks -- Security measures -- Government policy.
(2)
Computer networks -- Security measures -- Quality control.
(2)
Corporations -- Security measures.
(2)
Application software -- Security measures.
(1)
Bilgisayar güvenliği -- Değerlendirme.
(1)
Bilgisayar suçları -- Önleme.
(1)
COMPUTERS -- Digital Media -- General.
(1)
COMPUTERS -- Interactive & Multimedia.
(1)
COMPUTERS -- Web -- Site Design.
(1)
COMPUTERS -- Web -- User Generated Content.
(1)
Case studies.
(1)
Cell phone systems -- Security measures.
(1)
Cloud computing.
(1)
Computer crimes -- Case studies.
(1)
Computer crimes -- Prevention -- Government policy.
(1)
Computer security -- Evaluation.
(1)
Computer security -- Government policy.
(1)
Computer security -- United States.
(1)
Cyberterrorism.
(1)
Data protection -- Standards.
(1)
Electronic data processing departments -- Security measures.
(1)
Electronic surveillance.
(1)
Freedom of information.
(1)
Government information -- Security measures.
(1)
Human rights.
(1)
Industries -- Security measures.
(1)
Information technology -- Management.
(1)
Information warfare.
(1)
Internet -- Moral and ethical aspects.
(1)
Internet -- Safety measures.
(1)
Internet access.
(1)
Internet and women.
(1)
Internet fraud -- Prevention.
(1)
Malware (Computer software) -- Prevention.
(1)
Management -- Employee participation.
(1)
Management information systems -- Human factors.
(1)
Microcomputers -- Access control.
(1)
Mikrobilgisayarlar -- Ulaşım kontrolü.
(1)
Mobile communication systems -- Security measures.
(1)
Mobile computing -- Security measures.
(1)
Online social networks -- Security measures.
(1)
Privacy, Right of.
(1)
Professions -- Supply and demand.
(1)
Security systems.
(1)
Threats -- Safety measures.
(1)
Veri koruma -- Standartlar.
(1)
Web 2.0 -- Security measures.
(1)
Web applications -- Security measures.
(1)
Web site development -- Security measures.
(1)
Web sites -- Security measures.
(1)
Wireless Internet -- Security measures.
(1)
Daha fazla
Tümünü genişlet
Daha az
Hepsini Daralt
Kütüphane
Dahil
Hariç
Başkent Kütüphanesi
Lokasyon
Dahil
Hariç
E-Kütüphane
Ebook Central
Elsevier E-Kitap Koleksiyonu
Merkez Kütüphane
false
{sortLabel}
{alphabetical}
{relevance}
{include}
{exclude}
{facetName}
{results}
{displayName}
{count}
{error}
Eylem Seç
Ayırt
Listelerime ekle
Eposta
Yazdır
33 sonuç bulundu
1
2
3
Sırala:
Konuyla İlgili Sırala
Yayın Yılı (eskiden yeniye)
Yayın Yılı (yeniden eskiye)
Başlık
Yazar
OK
Eposta Adresleri
:
Phone Number:
Mobile Carrier:
AT&T
Boost
Nextel (Sprint)
Sprint (PCS)
T Mobile
TracFone
US Cellular
Verizon
Virgin
Select An Item
Data usage warning: You will receive one text message for each title you selected.
Standard text messaging rates apply.
Text it to me
Text it to me, and go to next item
000000000000
DEFAULTTR
Liste seç
Geçici Liste
Bunu varsayılan liste yap.
Öğeler başarıyla eklendi
Öğeler eklenirken hata oldu. Lütfen tekrar deneyiniz.
Cyber mobs : destructive online communities
1.
Cyber mobs : destructive online communities
by
Krumsiek, Allison, author.
Click to View
Format:
Penetration testing essentials
2.
Penetration testing essentials
by
Oriyano, Sean-Philip, author.
Click to View
Format:
Cybercrime and business : strategies for global corporate security
3.
Cybercrime and business : strategies for global corporate security
by
Moskowitz, Sanford, author.
Click to View
Format:
Insider threat : a guide to understanding, detecting, and defending against the enemy from within
4.
Insider threat : a guide to understanding, detecting, and defending against the enemy from within
by
Mehan, Julie E., author.
Click to View
Format:
Internet freedom software and illicit activity : supporting human rights without enabling criminals
5.
Internet freedom software and illicit activity : supporting human rights without enabling criminals
by
National Defense Research Institute (U.S.), author.
Click to View
Format:
Network attacks & exploitation : a framework
6.
Network attacks & exploitation : a framework
by
Monte, Matthew, author.
Click to View
Format:
The smart girl's guide to privacy : practical tips for staying safe online
7.
The smart girl's guide to privacy : practical tips for staying safe online
by
Blue, Violet, author.
Click to View
Format:
Emerging trends in ICT security
8.
Emerging trends in ICT security
by
Akhgar, Babak.
Click to View
Format:
CyberWar, CyberTerror, CyberCrime and CyberActivism : an in-depth guide to the role of standards in cybersecurity enviroment
9.
CyberWar, CyberTerror, CyberCrime and CyberActivism : an in-depth guide to the role of standards in cybersecurity enviroment
by
Mehan, Julie E., author.
Click to View
Format:
Targeted cyber attacks : multi-staged attacks driven by exploits and malware
10.
Targeted cyber attacks : multi-staged attacks driven by exploits and malware
by
Sood, Aditya K., author.
Click to View
Format:
Collaboration with cloud computing : security, social media, and unified communications
11.
Collaboration with cloud computing : security, social media, and unified communications
by
Messier, Ric, author.
Click to View
Format:
Cybercrime and cyberwarfare
12.
Cybercrime and cyberwarfare
by
Bernik, Igor.
Click to View
Format:
Eylem Seç
Ayırt
Listelerime ekle
Eposta
Yazdır
1
2
3
Search Results
Elektronik Kaynaklar
Search Results
Elektronik Kaynaklar
OK
Eposta Adresleri
:
Phone Number:
Mobile Carrier:
AT&T
Boost
Nextel (Sprint)
Sprint (PCS)
T Mobile
TracFone
US Cellular
Verizon
Virgin
Select An Item
Data usage warning: You will receive one text message for each title you selected.
Standard text messaging rates apply.
Text it to me
Text it to me, and go to next item
Elektronik Kaynaklar
Sonuçlar alınıyor Elektronik Kaynaklar...
action
Go to:
Search Results
|
Search Facets
|
Top of Page