Skip to:
Search Results
|
Bottom
|
Search Facets
|
Content
Giriş
|
Hesabım
|
Listelerim
|
|
Remember to clear the cache and close the browser window.
English
Search Limit
Bütün Kütüphaneler
Elektronik Kaynaklar
Hepsi
Başkent Üniversitesi Kütüphanesi
Anadolu OSB Meslek Yüksekokulu
Atasev Özel Koleksiyon
Erdoğan Tercan Koleksiyonu
Güzel Sanatlar ve Tasarım Arşivi
Kazan Meslek Yüksekokulu
Hukuk Koleksiyonu
Ord.Prof.Dr. Enver Ziya Karal Tarih Uygulama Ars.Mrk.
Özel Koleksiyon Serdar Özersin
Tez Koleksiyonu
Tüm Alanlar
Başlık
Yazar
Konu
ISBN
ISSN
13
Search Field
Tüm Alanlar
Arama:
Gelişmiş Arama
Search Results
Elektronik Kaynaklar
Arama Sonuçlarını Sınırlandır
Daraltılmış:
+
Yayın Yılı: 2015
+
Konu: Computer security.
+
Konu: Electronic books.
Yazar
Dahil
Hariç
Fourastier, Yannick, editor.
(11)
Piètre-Cambacédès, Ludovic, editor.
(11)
Dalziel, Henry, author.
(2)
Fourastier, Yannick, author.
(2)
Pietre-Cambacedes, Ludovic, author.
(2)
Rogers, Mark, designer.
(2)
AXELOS Limited, author.
(1)
Ablon, Lillian, author.
(1)
Alam, Shahnawaz, author.
(1)
Arvanitis, Nicholas, editor.
(1)
Basagiannis, Stylianos, contributor.
(1)
Baskin, Brian, author.
(1)
Brennen, Jerod, editor.
(1)
Buchanan, Cameron, author.
(1)
Clark, Gregory, author.
(1)
Cruz, Maria Ines, cover designer.
(1)
Franco, Pedro, author.
(1)
Govindaradjane, Punithavathy, contributor.
(1)
Healey, Justin, editor.
(1)
Hexmoor, Henry, author.
(1)
Honan, Brian, author.
(1)
Jirasek, Vladimir, editor.
(1)
Jordan, Brittney, contributor.
(1)
Kamm, Liina, editor.
(1)
Katsaropoulos, Chris, editor.
(1)
Kaye, D., editor.
(1)
Knapp, Eric D., author.
(1)
Langill, Joel Thomas, author.
(1)
Laud, Peeter, editor.
(1)
Lee, Stefano Kewan, author.
(1)
Li, Qing, author.
(1)
Libicki, Martin C., author.
(1)
Limbert, Matthew, designer.
(1)
Mark, Talabis, author.
(1)
Martin, Brian, editor.
(1)
Milne, George R., author.
(1)
Monte, Matthew, author.
(1)
Moskowitz, Jeremy, author.
(1)
Nathans, David, author.
(1)
Ramachandran, Vivek, author.
(1)
Rearick, Benjamin, editor.
(1)
Reavis, Jim, author.
(1)
Samani, Raj, author.
(1)
Samani, Raj, editor.
(1)
Seitz, Justin, author.
(1)
Sims, Kristin, author.
(1)
Skopik, Florian, editor.
(1)
Smith, Paul, editor.
(1)
Street, Jayson E., author.
(1)
Ticher, Paul, author.
(1)
Tokareva, Natalia, author.
(1)
Vacche, Andrea Dalle, author.
(1)
Vasudevan, Vinod, author.
(1)
Vittie, Lori Mac, author.
(1)
Webb, Tim (Children's story adapter), author.
(1)
Young, Carl S., author.
(1)
Daha fazla
Tümünü genişlet
Daha az
Hepsini Daralt
Materyal Türü
Dahil
Hariç
E-Kitap
Dil
Dahil
Hariç
English
(27)
French
(13)
Konu
Dahil
Hariç
Computer networks -- Security measures.
(7)
Data encryption (Computer science)
(3)
Data protection.
(2)
Algebra, Boolean.
(1)
Big data -- Security measures.
(1)
Business enterpri -- Computer networks -- Security measures.
(1)
Business enterprises -- Computer networks -- Security measures.
(1)
Cloud computing -- Security measures.
(1)
Cloud computing.
(1)
Computer crimes -- Case studies.
(1)
Computer crimes -- Investigation.
(1)
Computer crimes -- Prevention.
(1)
Computer crimes.
(1)
Computer networks -- Security measures -- Standards.
(1)
Computer networks.
(1)
Computer software -- Reliability.
(1)
Computers -- Access control.
(1)
Corporations -- Security measures.
(1)
Cyberterrorism -- Prevention.
(1)
Data protection -- Security measures.
(1)
Data protection -- Standards.
(1)
Directory services (Computer network technology)
(1)
Electronic information resources -- Access control.
(1)
Future of Privacy
(1)
Hackers.
(1)
Information Exchange
(1)
Information resources management -- Security measures.
(1)
Information technology -- Standards.
(1)
Internet -- Access control.
(1)
Internet -- Security measures.
(1)
Microsoft Windows (Computer file)
(1)
Online social networks -- Safety measures.
(1)
Operating systems (Computers)
(1)
Privacy
(1)
Privacy Harms and Protections
(1)
Process control -- Security measures.
(1)
Python (Computer program language)
(1)
Risk management.
(1)
Security systems.
(1)
Smart power grids.
(1)
Social media.
(1)
Software configuration management.
(1)
Systems engineering.
(1)
Technology
(1)
Teleshopping.
(1)
Terrorism -- Prevention.
(1)
Daha fazla
Tümünü genişlet
Daha az
Hepsini Daralt
Kütüphane
Dahil
Hariç
Başkent Kütüphanesi
Lokasyon
Dahil
Hariç
Ebook Central
false
{sortLabel}
{alphabetical}
{relevance}
{include}
{exclude}
{facetName}
{results}
{displayName}
{count}
{error}
Eylem Seç
Ayırt
Listelerime ekle
Eposta
Yazdır
40 sonuç bulundu
1
2
3
4
Sırala:
Konuyla İlgili Sırala
Yayın Yılı (eskiden yeniye)
Yayın Yılı (yeniden eskiye)
Başlık
Yazar
OK
Eposta Adresleri
:
Phone Number:
Mobile Carrier:
AT&T
Boost
Nextel (Sprint)
Sprint (PCS)
T Mobile
TracFone
US Cellular
Verizon
Virgin
Select An Item
Data usage warning: You will receive one text message for each title you selected.
Standard text messaging rates apply.
Text it to me
Text it to me, and go to next item
000000000000
DEFAULTTR
Liste seç
Geçici Liste
Bunu varsayılan liste yap.
Öğeler başarıyla eklendi
Öğeler eklenirken hata oldu. Lütfen tekrar deneyiniz.
Information security analytics : finding security insights, patterns and anomalies in big data
1.
Information security analytics : finding security insights, patterns and anomalies in big data
by
Mark, Talabis, author.
Click to View
Format:
Industrial network security : securing critical infrastructure networks for smart grid, SCADA, and other industrial control systems
2.
Industrial network security : securing critical infrastructure networks for smart grid, SCADA, and other industrial control systems
by
Knapp, Eric D., author.
Click to View
Format:
Security intelligence : a practitioner's guide to solving enterprise security challenges
3.
Security intelligence : a practitioner's guide to solving enterprise security challenges
by
Li, Qing, author.
Click to View
Format:
Online safety
4.
Online safety
by
Healey, Justin, editor.
Click to View
Format:
Dissecting the hack : the V3rb0ten network
5.
Dissecting the hack : the V3rb0ten network
by
Street, Jayson E., author.
Click to View
Format:
Infosec management fundamentals
6.
Infosec management fundamentals
by
Dalziel, Henry, author.
Click to View
Format:
Securing social media in the enterprise
7.
Securing social media in the enterprise
by
Dalziel, Henry, author.
Click to View
Format:
Smart grid security : innovative solutions for a modernized grid
8.
Smart grid security : innovative solutions for a modernized grid
by
Skopik, Florian, editor.
Click to View
Format:
Bent functions : results and applications to cryptography
9.
Bent functions : results and applications to cryptography
by
Tokareva, Natalia, author.
Click to View
Format:
Data protection and the cloud : are the risks too great?
10.
Data protection and the cloud : are the risks too great?
by
Ticher, Paul, author.
Click to View
Format:
Web application security is a stack : how to CYA (Cover Your Apps) completely
11.
Web application security is a stack : how to CYA (Cover Your Apps) completely
by
Vittie, Lori Mac, author.
Click to View
Format:
Computational network science : an algorithmic approach
12.
Computational network science : an algorithmic approach
by
Hexmoor, Henry, author.
Click to View
Format:
Eylem Seç
Ayırt
Listelerime ekle
Eposta
Yazdır
1
2
3
4
Search Results
Elektronik Kaynaklar
Search Results
Elektronik Kaynaklar
OK
Eposta Adresleri
:
Phone Number:
Mobile Carrier:
AT&T
Boost
Nextel (Sprint)
Sprint (PCS)
T Mobile
TracFone
US Cellular
Verizon
Virgin
Select An Item
Data usage warning: You will receive one text message for each title you selected.
Standard text messaging rates apply.
Text it to me
Text it to me, and go to next item
Elektronik Kaynaklar
Sonuçlar alınıyor Elektronik Kaynaklar...
action
Go to:
Search Results
|
Search Facets
|
Top of Page