Skip to:
Search Results
|
Bottom
|
Search Facets
|
Content
Giriş
|
Hesabım
|
Listelerim
|
|
Remember to clear the cache and close the browser window.
English
Search Limit
Bütün Kütüphaneler
Elektronik Kaynaklar
Hepsi
Başkent Üniversitesi Kütüphanesi
Anadolu OSB Meslek Yüksekokulu
Atasev Özel Koleksiyon
Erdoğan Tercan Koleksiyonu
Güzel Sanatlar ve Tasarım Arşivi
Kazan Meslek Yüksekokulu
Hukuk Koleksiyonu
Ord.Prof.Dr. Enver Ziya Karal Tarih Uygulama Ars.Mrk.
Özel Koleksiyon Serdar Özersin
Tez Koleksiyonu
Tüm Alanlar
Başlık
Yazar
Konu
ISBN
ISSN
13
Search Field
Tüm Alanlar
Arama:
Gelişmiş Arama
Search Results
Elektronik Kaynaklar
Arama Sonuçlarını Sınırlandır
Daraltılmış:
+
Language: English
+
Konu: Computer networks -- Security measures.
Yazar
Dahil
Hariç
ProQuest (Firm)
(147)
Shimonski, Robert.
(6)
Vacca, John R.
(6)
Beale, Jay.
(5)
Foster, James C.
(5)
Shinder, Debra Littlejohn.
(5)
Shinder, Thomas W.
(5)
Andress, Jason.
(4)
Henmi, Anne.
(4)
Hunter, Laura E.
(4)
International Business Machines Corporation. International Technical Support Organization.
(4)
Rittinghouse, John W.
(4)
Behrens, Thorsten.
(3)
Cardwell, Kevin, author.
(3)
Carvey, Harlan A.
(3)
Cole, Eric.
(3)
Cross, Michael, 1965-
(3)
Grasdal, Martin.
(3)
Limbert, Matthew, designer.
(3)
Long, Johnny.
(3)
Ramirez, Gilbert.
(3)
Rogers, Russ.
(3)
Wiles, Jack.
(3)
Winkler, J. R. (Joachim R.)
(3)
Ahmad, David R. Mirza.
(2)
Alder, Raven.
(2)
Amini, Rob.
(2)
Andrés, Steven.
(2)
Archibald, Neil.
(2)
Babbin, Jacob.
(2)
Birkholz, Erik Pace.
(2)
Burnett, Mark (Mark M.)
(2)
Cameron, Rob.
(2)
Canavan, Tom.
(2)
Cantrell, Chris.
(2)
Caswell, Brian.
(2)
Chuvakin, Anton.
(2)
Contos, Brian T.
(2)
Danielyan, Edgar.
(2)
Dubrawsky, Ido.
(2)
Erickson, Jon, 1977-
(2)
Gatford, Chris.
(2)
Gold, André.
(2)
Gonzalez, Deborah, author.
(2)
Haines, Brad.
(2)
Hancock, Bill, 1957-
(2)
Katsaropoulos, Chris, editor.
(2)
Khan, Umer.
(2)
Knipp, Eric.
(2)
Liska, Allan, author.
(2)
Liu, Dale.
(2)
Lucas, Mark.
(2)
Manzuik, Steve.
(2)
Meyer, Greg.
(2)
Morris, Greg.
(2)
Norman, Thomas L.
(2)
Orebaugh, Angela.
(2)
Osipov, Vitaly.
(2)
Ozkaya, Erdal, author.
(2)
Pan, Yi, 1960-
(2)
Parker, Tom.
(2)
Potter, Bruce.
(2)
Qian, Yi, 1962-
(2)
Ransome, James F.
(2)
Rash, Michael.
(2)
Rathaus, Noam.
(2)
Rayns, Chris.
(2)
Riley, Charles.
(2)
Ring, Sandra.
(2)
Rountree, Derrick.
(2)
Russell, Ryan, 1969-
(2)
Sachs, Marcus H.
(2)
Shema, Mike.
(2)
Singh, Abhishek.
(2)
Snedaker, Susan.
(2)
Stapko, Timothy John.
(2)
Strebe, Matthew.
(2)
Syngress Media, Inc.
(2)
Tam, Kenneth.
(2)
Thuraisingham, Bhavani M.
(2)
Todd, Chad.
(2)
Voeller, John G.
(2)
Warnicke, Ed.
(2)
Watkins, Stephen (Information security professional)
(2)
Wayner, Peter, 1964-
(2)
Wilhelm, Thomas.
(2)
Williams, Branden R.
(2)
Winterfeld, Steve.
(2)
Wotring, Brian.
(2)
Zalewski, Michal.
(2)
Ablon, Lillian, author.
(1)
Aggarwal, Manuj, author.
(1)
Aissi, Selim.
(1)
Alcover, Jorge Blanco.
(1)
Ali, Shakeel.
(1)
Allen, Lee, 1946- author.
(1)
Allison, Steve.
(1)
Allsopp, Wil, author.
(1)
Allsopp, Wil.
(1)
American Evaluation Association.
(1)
Amon, Cheri.
(1)
Anderson, Brian (Brian James)
(1)
Andress, Jason, author.
(1)
Anson, Steve.
(1)
Antonius, Jesper.
(1)
Assam, Tarek.
(1)
Assing, Dominique.
(1)
Atiya, Amir F.
(1)
Au, Man-Ho, editor.
(1)
Baker, Andrew R.
(1)
Banks, Allister, author.
(1)
Barnes, Christian.
(1)
Barnett, Ryan C.
(1)
Baskin, Brian, author.
(1)
Baskin, Brian.
(1)
Baumrucker, C. Tate.
(1)
Bautista, Wilson, author.
(1)
Bayer, Chad M.
(1)
Beaver, Kevin.
(1)
Bejtlich, Richard.
(1)
Ben-Ari, Erez.
(1)
Bendell, Dan.
(1)
Bendell, Daniel H.
(1)
Bennett, Eleanor Leonne, cover designer.
(1)
Bernard, Ray, author.
(1)
Bertino, Elisa.
(1)
Beyah, Raheem (Raheem A.), 1976-
(1)
Bhalla, Nish.
(1)
Bhardwaj, Pawan K.
(1)
Bhattacharjee, Sravani, author.
(1)
Bianco, David J., 1971-
(1)
Bindner, Andrew.
(1)
Blair, John, author.
(1)
Bolt, Steven.
(1)
Borkin, Mike.
(1)
Bradley, Tony, 1969-
(1)
Braman, Eric, editor.
(1)
Brant, Justin M.
(1)
Brashars, Joshua.
(1)
Bray, Rory.
(1)
Briggs, Jonathan.
(1)
Broad, James.
(1)
Buchanan, Cameron, author.
(1)
Burke, Josh.
(1)
Burton, James D.
(1)
Burton, James.
(1)
Bücker, Axel.
(1)
Calé, Stéphane.
(1)
Cantrell, Christopher.
(1)
Capurro, Rafael.
(1)
Carafano, James Jay, 1955-
(1)
Carbone, Fernando, author.
(1)
Carey, David.
(1)
Carpenter, Perry, author.
(1)
Carvey, Harlan A., author.
(1)
Carvey, Harlan, author.
(1)
Carvey, Harlan.
(1)
Casco, Steven.
(1)
Chapman, Chris, author.
(1)
Charles S. Edge, author.
(1)
Chauhan, Sudhanshu, author.
(1)
Cheah, Chun Hai.
(1)
Cherry, Denny.
(1)
Choo, Kim-Kwang Raymond, editor.
(1)
Chuvakin, Anton A., author.
(1)
Cid, Daniel.
(1)
Clark, Gregory, author.
(1)
Clarke, Justin.
(1)
Collins, Jon, author.
(1)
Connelly, Olly.
(1)
Conti, Greg.
(1)
Cook, Randy (Randy R.)
(1)
Corbett, Cherita (Cherita L.)
(1)
Courcier, Scar de, author.
(1)
Cross, Michael.
(1)
Cruz, Maria Ines, designer.
(1)
D'Arcy, John P., 1975-
(1)
Dabbous, Nora.
(1)
Dai, Yuan-Shun.
(1)
Dalziel, Henry, author.
(1)
Dalziel, Max, author.
(1)
Dattani, Dinesh D.
(1)
Davies, Joshua Dennis.
(1)
Davies, Saida.
(1)
DeLuccia, James J., 1977-
(1)
DeMott, Jared.
(1)
Death, Darren, author.
(1)
Delfanti, Alessandro.
(1)
Demchak, Chris C.
(1)
Deraison, Renaud.
(1)
Desai, Hemal, editor.
(1)
Devost, Matthew G.
(1)
Dewald, Andreas, author.
(1)
Diogenes, Yuri, author.
(1)
Dolev, Ran.
(1)
Donaldson, Scott E., author.
(1)
Duman, Ekrem.
(1)
Dwivedi, Himanshu.
(1)
Edwards, Matthew, editor of compilation.
(1)
Eko, Lyombe.
(1)
Daha fazla
Tümünü genişlet
Daha az
Hepsini Daralt
Materyal Türü
Dahil
Hariç
E-Kitap
Yayın Yılı
Dahil
Hariç
-
2014
(35)
2013
(33)
2004
(27)
2005
(26)
2006
(26)
2007
(25)
2011
(25)
2008
(23)
2003
(22)
2017
(21)
2015
(20)
2002
(18)
2018
(17)
2016
(15)
2010
(14)
2012
(12)
2009
(8)
2019
(7)
2001
(6)
1999
(1)
Daha fazla
Tümünü genişlet
Daha az
Hepsini Daralt
Konu
Dahil
Hariç
Electronic books.
(381)
Computer security.
(160)
COMPUTERS -- Internet -- Security.
(65)
COMPUTERS -- Networking -- Security.
(65)
COMPUTERS -- Security -- General.
(65)
Internet -- Security measures.
(31)
Firewalls (Computer security)
(18)
Computers -- Access control.
(15)
Computer hackers.
(14)
Computer networks -- Access control.
(14)
Penetration testing (Computer security)
(12)
Computer crimes -- Investigation.
(10)
Data protection.
(10)
Microsoft Windows (Computer file)
(10)
Wireless communication systems -- Security measures.
(10)
Computer crimes -- Prevention.
(8)
Web sites -- Security measures.
(8)
Computer network protocols.
(7)
Computer security -- Management.
(7)
Operating systems (Computers)
(7)
Cyberspace -- Security measures.
(6)
Data encryption (Computer science)
(6)
Hackers.
(6)
Computer crimes.
(5)
Computer viruses.
(5)
Cyberterrorism -- Prevention.
(5)
Data protection -- Standards.
(5)
Microsoft ISA server.
(5)
Open source software.
(5)
WebSphere.
(5)
World Wide Web -- Security measures.
(5)
Andre fag (naturvidenskab og teknik) Andre fag
(4)
Application software -- Security measures.
(4)
Cloud computing.
(4)
Computer crimes -- Investigation -- United States -- Methodology.
(4)
Computer networks -- Management.
(4)
Computer networks -- Security measures -- Handbooks, manuals, etc.
(4)
Credit cards.
(4)
Database security.
(4)
Forensic sciences.
(4)
Handbooks and manuals.
(4)
Information resources management.
(4)
Information technology -- Security measures.
(4)
Information warfare.
(4)
Internet.
(4)
Liability for credit information.
(4)
Microsoft Windows (Computer file) -- Security measures.
(4)
Microsoft Windows server.
(4)
Security systems.
(4)
Web servers -- Security measures.
(4)
z/OS.
(4)
Business enterprises -- Computer networks -- Security measures.
(3)
COMPUTERS -- Computer Literacy.
(3)
COMPUTERS -- Computer Science.
(3)
COMPUTERS -- Data Processing.
(3)
COMPUTERS -- Hardware -- General.
(3)
COMPUTERS -- Information Technology.
(3)
COMPUTERS -- Machine Theory.
(3)
COMPUTERS -- Reference.
(3)
COMPUTERS -- Security -- Cryptography.
(3)
Client/server computing.
(3)
Cloud computing -- Security measures.
(3)
Computer network architectures.
(3)
Computer networks.
(3)
Computer science.
(3)
Cryptography.
(3)
Cyberterrorism.
(3)
Electronic book.
(3)
Electronic data processing departments -- Security measures.
(3)
Engineering & Applied Sciences.
(3)
Information storage and retrieval systems -- Security measures.
(3)
Information technology -- Management.
(3)
Internet telephony -- Security measures.
(3)
Java (Computer program language)
(3)
Kali Linux.
(3)
Malware (Computer software) -- Prevention.
(3)
Routers (Computer networks)
(3)
Réseaux d'ordinateurs -- Sécurité -- Mesures.
(3)
Réseaux d'ordinateurs.
(3)
Application software -- Development.
(2)
Business -- Data processing -- Security measures.
(2)
Business enterprises -- Security measures.
(2)
COMPUTERS -- Data Transmission Systems -- General.
(2)
COMPUTERS -- Networking -- Vendor Specific.
(2)
Cisco Systems, Inc.
(2)
ColdFusion.
(2)
Computer crimes -- Case studies.
(2)
Computer networks -- Reliability.
(2)
Computer networks -- Testing.
(2)
Computer security -- Evaluation -- Methodology.
(2)
Computer security -- Evaluation.
(2)
Computer software -- Development.
(2)
Computerbeveiliging.
(2)
Computercriminaliteit.
(2)
Computernetwerken.
(2)
Computersicherheit
(2)
Crisis management.
(2)
Digital watermarking.
(2)
Electrical & Computer Engineering.
(2)
Electronic data processing personnel -- Certification -- Study guides.
(2)
Electronic information resources -- Access control.
(2)
Electronic mail systems -- Security measures.
(2)
Embedded computer systems.
(2)
Hacking.
(2)
Information technology -- Auditing.
(2)
Information visualization.
(2)
Intrusion detection systems (Computer security)
(2)
LAW -- Forensic Science.
(2)
Malware (Computer software)
(2)
Microsoft Exchange server.
(2)
Microsoft Windows.
(2)
Open source intelligence.
(2)
Oracle (Computer file)
(2)
Peer-to-peer architecture (Computer networks)
(2)
Protection de l'information (Informatique)
(2)
Rechnernetz
(2)
Software.
(2)
TCP/IP (Computer network protocol)
(2)
Technology -- Research -- United States.
(2)
Telecommunications.
(2)
UNIX Shells.
(2)
Web portals -- Security measures.
(2)
Wide area networks (Computer networks) -- Access.
(2)
Wireless LANs.
(2)
Active server pages -- Security measures.
(1)
Active server pages.
(1)
Agents intelligents (Logiciels)
(1)
Android (Electronic resource)
(1)
Application logging (Computer science)
(1)
Application software -- Design.
(1)
Application software.
(1)
Aufsatzsammlung.
(1)
BUSINESS & ECONOMICS -- Corporate Governance.
(1)
BUSINESS & ECONOMICS -- Leadership.
(1)
BUSINESS & ECONOMICS -- Organizational Development.
(1)
BUSINESS & ECONOMICS -- Workplace Culture.
(1)
Biometric identification.
(1)
Brain-computer interfaces.
(1)
Browsers (Computer programs)
(1)
Business enterprises -- Computer networks.
(1)
Business enterprises -- Computer programs.
(1)
Business planning.
(1)
Business travel -- Safety measures.
(1)
COMPUTERS -- Digital Media -- General.
(1)
COMPUTERS -- Hardware -- Handheld Devices.
(1)
COMPUTERS -- Hardware -- Personal Computers -- General.
(1)
COMPUTERS -- Interactive & Multimedia.
(1)
COMPUTERS -- Microprocessors.
(1)
COMPUTERS -- Online Services.
(1)
COMPUTERS -- Operating Systems -- DOS.
(1)
COMPUTERS -- Operating Systems -- Macintosh.
(1)
COMPUTERS -- Operating Systems -- Windows Server & NT.
(1)
COMPUTERS -- Operating Systems -- Windows Workstation.
(1)
COMPUTERS -- Security -- Networking.
(1)
COMPUTERS -- System Administration -- Email Administration.
(1)
COMPUTERS -- System Administration -- Storage & Retrieval.
(1)
COMPUTERS -- System Administration -- Windows Administration.
(1)
COMPUTERS -- Web -- Site Design.
(1)
COMPUTERS -- Web -- User Generated Content.
(1)
Cartes de crédit.
(1)
Case studies.
(1)
Cities and towns -- Technological innovations.
(1)
Commercial crimes.
(1)
Component software.
(1)
Computational grids (Computer systems)
(1)
Computer Science.
(1)
Computer algorithms.
(1)
Computer architecture.
(1)
Computer crimes -- Investigation -- Handbooks, manuals, etc.
(1)
Computer crimes -- Investigation -- Methodology.
(1)
Computer crimes -- Investigation -- United States.
(1)
Computer crimes -- Investments.
(1)
Computer industry.
(1)
Computer networks -- Auditing.
(1)
Computer networks -- Design and construction.
(1)
Computer networks -- Remote access.
(1)
Computer networks -- Security measures -- Examinations, questions, etc.
(1)
Computer networks -- Security measures -- Fiction.
(1)
Computer networks -- Security measures -- Software.
(1)
Computer networks -- Security measures -- United States.
(1)
Computer networks -- Social aspects.
(1)
Computer networks -- Standards.
(1)
Computer networks Security measures
(1)
Computer programming.
(1)
Computer security -- Examinations -- Practice.
(1)
Computer security -- Fiction.
(1)
Computer security -- Handbooks, manuals, etc.
(1)
Computer security -- Management -- Handbooks, manuals, etc.
(1)
Computer security -- Testing.
(1)
Computer security -- United States.
(1)
Computer-assisted instruction -- Security measures.
(1)
Computers -- Security.
(1)
Computers and civilization -- Social aspects.
(1)
Computers.
(1)
Confidential business information.
(1)
Corporate culture.
(1)
Corporations -- Security measures.
(1)
Credit cards -- Security measures -- Standards -- Handbooks, manuals, etc.
(1)
Criminalistiek.
(1)
Cyber intelligence (Computer security)
(1)
Daha fazla
Tümünü genişlet
Daha az
Hepsini Daralt
Kütüphane
Dahil
Hariç
Başkent Kütüphanesi
Lokasyon
Dahil
Hariç
E-Kütüphane
Ebook Central
Elsevier E-Kitap Koleksiyonu
false
{sortLabel}
{alphabetical}
{relevance}
{include}
{exclude}
{facetName}
{results}
{displayName}
{count}
{error}
Eylem Seç
Ayırt
Listelerime ekle
Eposta
Yazdır
381 sonuç bulundu
1
2
3
4
5
6
..
32
Sırala:
Konuyla İlgili Sırala
Yayın Yılı (eskiden yeniye)
Yayın Yılı (yeniden eskiye)
Başlık
Yazar
OK
Eposta Adresleri
:
Phone Number:
Mobile Carrier:
AT&T
Boost
Nextel (Sprint)
Sprint (PCS)
T Mobile
TracFone
US Cellular
Verizon
Virgin
Select An Item
Data usage warning: You will receive one text message for each title you selected.
Standard text messaging rates apply.
Text it to me
Text it to me, and go to next item
000000000000
DEFAULTTR
Liste seç
Geçici Liste
Bunu varsayılan liste yap.
Öğeler başarıyla eklendi
Öğeler eklenirken hata oldu. Lütfen tekrar deneyiniz.
Mastering Kali Linux for web penetration testing : test and evaluate all aspects of the design and implentation
37.
Mastering Kali Linux for web penetration testing : test and evaluate all aspects of the design and implentation
by
McPhee, Michael, author.
Click to View
Format:
Network forensics
38.
Network forensics
by
Messier, Ric, author.
Click to View
Format:
Information security handbook : develop a threat model and incident response strategy to build a strong information security framework
39.
Information security handbook : develop a threat model and incident response strategy to build a strong information security framework
by
Death, Darren, author.
Click to View
Format:
Kali linux wireless penetration testing cookbook : identify and assess vulnerabilities present in your wireless network, Wi-Fi, and Bluetooth enabled devices to improve your wireless security
40.
Kali linux wireless penetration testing cookbook : identify and assess vulnerabilities present in your wireless network, Wi-Fi, and Bluetooth enabled devices to improve your wireless security
by
Oriyano, Sean-Philip, author.
Click to View
Format:
Digital forensics with Kali Linux : perform data acquisition, digital investigation, and threat analysis using Kali Linux tools
41.
Digital forensics with Kali Linux : perform data acquisition, digital investigation, and threat analysis using Kali Linux tools
by
Parasram, Shiva V. N., author.
Click to View
Format:
ISO 37001 : an introduction to anti-bribery management systems : doing the right things
42.
ISO 37001 : an introduction to anti-bribery management systems : doing the right things
by
Field, Alan, author.
Click to View
Format:
Enterprise cloud security and governance : efficiently set data protection and privacy principles
43.
Enterprise cloud security and governance : efficiently set data protection and privacy principles
by
Vora, Zeal, author.
Click to View
Format:
Windows forensics cookbook : 61 recipes to help you analyze windows systems
44.
Windows forensics cookbook : 61 recipes to help you analyze windows systems
by
Skulkin, Oleg, author.
Click to View
Format:
Security in network functions virtualization
45.
Security in network functions virtualization
by
Zhang, Zonghua, author.
Click to View
Format:
Information hiding in communication networks : fundamentals, mechanisms, applications, and countermeasures
46.
Information hiding in communication networks : fundamentals, mechanisms, applications, and countermeasures
by
Mazurczyk, Wojciech, author.
Click to View
Format:
Essential skills for hackers
47.
Essential skills for hackers
by
Cardwell, Kevin, author.
Click to View
Format:
Malware diffusion models for modern complex networks : theory and applications
48.
Malware diffusion models for modern complex networks : theory and applications
by
Karyotis, Vasileios, author.
Click to View
Format:
Eylem Seç
Ayırt
Listelerime ekle
Eposta
Yazdır
1
2
3
4
5
6
..
32
Search Results
Elektronik Kaynaklar
Search Results
Elektronik Kaynaklar
OK
Eposta Adresleri
:
Phone Number:
Mobile Carrier:
AT&T
Boost
Nextel (Sprint)
Sprint (PCS)
T Mobile
TracFone
US Cellular
Verizon
Virgin
Select An Item
Data usage warning: You will receive one text message for each title you selected.
Standard text messaging rates apply.
Text it to me
Text it to me, and go to next item
Elektronik Kaynaklar
Sonuçlar alınıyor Elektronik Kaynaklar...
action
Go to:
Search Results
|
Search Facets
|
Top of Page