Skip to:
Search Results
|
Bottom
|
Search Facets
|
Content
Giriş
|
Hesabım
|
Listelerim
|
|
Remember to clear the cache and close the browser window.
English
Search Limit
Bütün Kütüphaneler
Elektronik Kaynaklar
Hepsi
Başkent Üniversitesi Kütüphanesi
Anadolu OSB Meslek Yüksekokulu
Atasev Özel Koleksiyon
Erdoğan Tercan Koleksiyonu
Güzel Sanatlar ve Tasarım Arşivi
Kazan Meslek Yüksekokulu
Hukuk Koleksiyonu
Ord.Prof.Dr. Enver Ziya Karal Tarih Uygulama Ars.Mrk.
Özel Koleksiyon Serdar Özersin
Tez Koleksiyonu
Tüm Alanlar
Başlık
Yazar
Konu
ISBN
ISSN
13
Search Field
Tüm Alanlar
Arama:
Gelişmiş Arama
Search Results
Elektronik Kaynaklar
Arama Sonuçlarını Sınırlandır
Daraltılmış:
+
Konu: Computer security.
Yazar
Dahil
Hariç
ProQuest (Firm)
(196)
SpringerLink (Online service)
(22)
Foster, James C.
(11)
Fourastier, Yannick, editor.
(11)
Piètre-Cambacédès, Ludovic, editor.
(11)
International Business Machines Corporation. International Technical Support Organization.
(10)
Long, Johnny.
(9)
Russell, Ryan, 1969-
(6)
Calder, Alan, author.
(5)
Carvey, Harlan A.
(5)
Cross, Michael, 1965-
(5)
Hurley, Chris.
(5)
Wiles, Jack.
(5)
Beale, Jay.
(4)
Bhateja, Vikrant. editor.
(4)
Cherry, Denny.
(4)
Cole, Eric.
(4)
Hunter, Laura E.
(4)
Limbert, Matthew, designer.
(4)
Piltzecker, Tony, 1975-
(4)
Rayns, Chris.
(4)
Ring, Sandra.
(4)
Rittinghouse, John W.
(4)
Satapathy, Suresh Chandra. editor.
(4)
Shinder, Thomas W.
(4)
Buchanan, Cameron, author.
(3)
Clercq, Jan de, 1968-
(3)
Contos, Brian T.
(3)
Cox, I. J. (Ingemar J.)
(3)
Katsaropoulos, Chris, editor.
(3)
Mullen, Timothy M.
(3)
Rogers, Mark, designer.
(3)
Sachs, Marcus H.
(3)
Shinder, Debra Littlejohn.
(3)
Winkler, J. R. (Joachim R.)
(3)
Wyler, Neil R.
(3)
XYPRO Technology Corporation.
(3)
Alder, Raven.
(2)
Amini, Rob.
(2)
Andress, Jason.
(2)
Aquilina, James M.
(2)
Baskin, Brian.
(2)
Bayles, Aaron W.
(2)
Ben-Natan, Ron.
(2)
Boulanger, Jean-Louis.
(2)
Brindley, Ed.
(2)
Burnett, Mark (Mark M.)
(2)
Casey, Eoghan.
(2)
Caswell, Brian.
(2)
Chaffin, Larry.
(2)
Chaki, Nabendu. editor.
(2)
Chaki, Rituparna. editor.
(2)
Chandramouli, Ramaswamy.
(2)
Clarke, Justin.
(2)
Cortesi, Agostino. editor.
(2)
Dalziel, Henry, author.
(2)
Dalziel, Henry, editor.
(2)
Engebretson, Pat (Patrick Henry), 1974-
(2)
Erickson, Jon, 1977-
(2)
Fair, Ted.
(2)
Ferraiolo, David.
(2)
Foster, Stephen C.
(2)
Fourastier, Yannick, author.
(2)
Goodman, Seymour E.
(2)
Grasdal, Martin.
(2)
Grillenmeier, Guido.
(2)
Hancock, Bill, 1957-
(2)
Henmi, Anne.
(2)
Honick, Ron.
(2)
Hutchens, Justin, author.
(2)
Joshi, Amit. editor.
(2)
Kinney, Steven.
(2)
Kleidermacher, David.
(2)
Kleidermacher, Mike.
(2)
Knapp, Eric.
(2)
Koh.
(2)
Krutz, Ronald L.
(2)
Kuhn, D. Richard.
(2)
Lin, Ching-Yung.
(2)
Malin, Cameron H.
(2)
Mao, Wenji.
(2)
Maynor, David.
(2)
Meyer, Greg.
(2)
Mitnick, Kevin D.
(2)
Moskowitz, Jeremy.
(2)
Nordfelt, Michael.
(2)
Oppliger, Rolf.
(2)
Parker, Tom.
(2)
Piccard, Paul L.
(2)
Pietre-Cambacedes, Ludovic, author.
(2)
Potter, Bruce.
(2)
Qian, Yi, 1962-
(2)
Ramachandran, Vivek, author.
(2)
Ramirez, Gilbert.
(2)
Ransome, James F.
(2)
Rash, Michael.
(2)
Rathaus, Noam.
(2)
Rogers, Russ.
(2)
Saeed, Khalid. editor.
(2)
ScienceDirect (Online service)
(2)
Shein, Rob.
(2)
Shimonski, Robert.
(2)
Stanger, James.
(2)
Stapko, Timothy John.
(2)
Ticher, Paul, author.
(2)
Todd, Chad.
(2)
Tyson, Dave.
(2)
Vacca, John R.
(2)
Wang, Fei-Yue.
(2)
Wheeler, Evan.
(2)
Winkler, Ira.
(2)
Wotring, Brian.
(2)
Young, Carl S., author.
(2)
Yu, Hong Heather, 1967-
(2)
Zalewski, Michal.
(2)
Zeng, Wenjun, 1967-
(2)
'Ken'@ftu.
(1)
131ah.
(1)
AXELOS Limited, author.
(1)
Abbadi, Imad M., author.
(1)
Ablon, Lillian, author.
(1)
Agre, Philip.
(1)
Ahmad, David R. Mirza.
(1)
Ahmad, Rabiah. editor.
(1)
Akashe, Shyam. editor.
(1)
Akleylek, Sedat, Doç. Dr., editör
(1)
Al-maadeed, Somaya. editor.
(1)
Alam, Shahnawaz, author.
(1)
Alcover, Jorge Blanco.
(1)
Aleroud, Ahmed. editor.
(1)
Alexander, Philip, 1963-
(1)
Alkan, Mustafa, Doç. Dr., yazar
(1)
Alsmadi, Izzat M. editor.
(1)
Alvarado, Ellen.
(1)
American Evaluation Association.
(1)
Amini, M. Hadi. author.
(1)
Amoroso, Edward G.
(1)
Anderson, Brian (Brian James)
(1)
Andress, Jason, author.
(1)
Andrés, Steven.
(1)
Antón, Philip S.
(1)
Anzaldua, Reynaldo.
(1)
Aquilina, James, author.
(1)
Archibald, Neil.
(1)
Arnold, Michael (Michael Konrad), 1964-
(1)
Arvanitis, Nicholas, editor.
(1)
Ashenden, Debi.
(1)
Assam, Tarek.
(1)
Awad, Ahmed. editor.
(1)
Axelrod, C. Warren.
(1)
Aydın, Ömer, Dr. Öğr. Üyesi, editör
(1)
Baccas, Paul.
(1)
Bajracharya, Chandra. author.
(1)
Baker, Andrew R.
(1)
Baker, Paul R., 1958-
(1)
Barnett, Ryan C.
(1)
Barrett, Diane.
(1)
Basagiannis, Stylianos, contributor.
(1)
Baskerville, Richard.
(1)
Baskin, Brian, author.
(1)
Bayuk, Jennifer L.
(1)
Beaver, Kevin.
(1)
Bednarczyk, Michael.
(1)
Beghdadi, Azeddine. editor.
(1)
Belapurkar, Abhijit.
(1)
Ben-Ari, Erez.
(1)
Bennett, Eleanor Leonne, cover designer.
(1)
Benny, Daniel J.
(1)
Berber, Leyla Keser
(1)
Berghe, Thierry van den, author.
(1)
Bergstra, J. A.
(1)
Bertino, Elisa.
(1)
Bhalla, Nish.
(1)
Bhardwaj, Pawan K.
(1)
Bhunia, Swarup, author.
(1)
Bhunia, Swarup. editor.
(1)
Bianco, David J., 1971-
(1)
Bidwell, Teri.
(1)
Bin Azad, Tariq.
(1)
Binnie, Christopher, author.
(1)
Bishop, Matt (Matthew A.)
(1)
Black Hat Press (Goodhue, Minn.)
(1)
Blair, John, author.
(1)
Blobel, Bernd.
(1)
Bloom, Jeffrey A. (Jeffrey Adam), 1964-
(1)
Bodur, Hüseyin, yazar.
(1)
Bolt, Steven.
(1)
Bonertz, Tina.
(1)
Bonnell, Ralph.
(1)
Borges de Oliveira, Fábio. author.
(1)
Boroojeni, Kianoosh G. author.
(1)
Bott, Ed.
(1)
Bouridane, Ahmed. editor.
(1)
Bradley, Jaron, author.
(1)
Bradley, Tony, 1969-
(1)
Bradley, Tony.
(1)
Brathwaite, Shimon, author.
(1)
Bray, Rory.
(1)
Breimeier, Johannes.
(1)
Brennen, Jerod, editor.
(1)
Daha fazla
Tümünü genişlet
Daha az
Hepsini Daralt
Materyal Türü
Dahil
Hariç
E-Kitap
Kitap
Dil
Dahil
Hariç
English
(467)
Turkish
(15)
French
(14)
German
(3)
Yayın Yılı
Dahil
Hariç
-
2015
(40)
2005
(39)
2013
(37)
2004
(35)
2007
(35)
2017
(35)
2006
(31)
2014
(28)
2010
(27)
2011
(27)
2008
(25)
2012
(25)
2016
(22)
2003
(21)
2002
(20)
2019
(14)
2001
(10)
2018
(10)
2009
(9)
2022
(3)
1979
(2)
1987
(2)
1990
(2)
1991
(2)
1997
(2)
2000
(2)
1300
(1)
1301
(1)
1302
(1)
1303
(1)
1304
(1)
1305
(1)
1306
(1)
1307
(1)
1308
(1)
1309
(1)
1310
(1)
1311
(1)
1312
(1)
1313
(1)
1314
(1)
1900
(1)
1901
(1)
1902
(1)
1903
(1)
1904
(1)
1905
(1)
1906
(1)
1907
(1)
1908
(1)
1909
(1)
1910
(1)
1911
(1)
1912
(1)
1913
(1)
1914
(1)
1915
(1)
1916
(1)
1917
(1)
1918
(1)
1919
(1)
1920
(1)
1921
(1)
1922
(1)
1923
(1)
1924
(1)
1925
(1)
1926
(1)
1927
(1)
1928
(1)
1929
(1)
1930
(1)
1931
(1)
1932
(1)
1933
(1)
1934
(1)
1935
(1)
1936
(1)
1937
(1)
1938
(1)
1939
(1)
1940
(1)
1941
(1)
1942
(1)
1943
(1)
1944
(1)
1945
(1)
1946
(1)
1947
(1)
1948
(1)
1949
(1)
1950
(1)
1951
(1)
1952
(1)
1953
(1)
1954
(1)
1955
(1)
1956
(1)
1957
(1)
1958
(1)
1959
(1)
1960
(1)
1961
(1)
1962
(1)
1963
(1)
1964
(1)
1965
(1)
1966
(1)
1967
(1)
1968
(1)
1969
(1)
1970
(1)
1971
(1)
1972
(1)
1973
(1)
1974
(1)
1975
(1)
1976
(1)
1977
(1)
1978
(1)
1980
(1)
1981
(1)
1982
(1)
1983
(1)
1984
(1)
1985
(1)
1986
(1)
1988
(1)
1989
(1)
1992
(1)
1993
(1)
1994
(1)
1995
(1)
1996
(1)
1998
(1)
1999
(1)
2020
(1)
2025
(1)
Daha fazla
Tümünü genişlet
Daha az
Hepsini Daralt
Konu
Dahil
Hariç
Electronic books.
(459)
Computer networks -- Security measures.
(162)
COMPUTERS -- Internet -- Security.
(68)
COMPUTERS -- Networking -- Security.
(68)
COMPUTERS -- Security -- General.
(68)
Data protection.
(43)
Internet -- Security measures.
(27)
Systems and Data Security.
(22)
Engineering.
(21)
Bilgisayar güvenliği.
(19)
Computer hackers.
(19)
Computers -- Access control.
(19)
Microsoft Windows (Computer file)
(17)
Computer crimes.
(15)
Communications Engineering, Networks.
(14)
Electrical engineering.
(14)
Database security.
(13)
Computer crimes -- Prevention.
(12)
Cryptography.
(12)
Hackers.
(12)
Operating systems (Computers)
(12)
Computer crimes -- Investigation.
(11)
Data encryption (Computer science)
(11)
Business enterprises -- Computer networks -- Security measures.
(10)
Computational intelligence.
(10)
Information technology -- Security measures.
(9)
Computer viruses.
(8)
Firewalls (Computer security)
(7)
Security systems.
(7)
Client/server computing.
(6)
Cloud computing.
(6)
Computer science.
(6)
Computer security -- Fiction.
(6)
Cyberterrorism -- Prevention.
(6)
Microsoft Windows server.
(6)
Signal, Image and Speech Processing.
(6)
Artificial intelligence.
(5)
Client/server computing -- Security measures.
(5)
Computer networks -- Access control.
(5)
Computer security -- Handbooks, manuals, etc.
(5)
Cyberterrorism.
(5)
Digital watermarking.
(5)
Embedded computer systems.
(5)
Fiction.
(5)
Forensic sciences.
(5)
Hackers -- Fiction.
(5)
Handbooks and manuals.
(5)
Malware (Computer software)
(5)
SQL server.
(5)
Wireless communication systems -- Security measures.
(5)
Artificial Intelligence (incl. Robotics).
(4)
Cloud computing -- Security measures.
(4)
Computer crimes -- Investigation -- United States -- Methodology.
(4)
Computer software -- Development.
(4)
Computers -- Access control -- Passwords.
(4)
Cyberspace -- Security measures.
(4)
Data encryption (Computer science).
(4)
FICTION -- General.
(4)
Linux.
(4)
Microsoft Windows (Computer file) -- Security measures.
(4)
National security.
(4)
Open source software.
(4)
Process control -- Security measures.
(4)
Risk management.
(4)
Spyware (Computer software)
(4)
World Wide Web -- Security measures.
(4)
Andre fag (naturvidenskab og teknik) Andre fag
(3)
Application software -- Security measures.
(3)
Business enterprises -- Security measures.
(3)
Circuits and Systems.
(3)
Citrix MetaFrame.
(3)
Computer networks.
(3)
Corporations -- Security measures.
(3)
Data Encryption.
(3)
Data mining.
(3)
Directory services (Computer network technology)
(3)
Electronic circuits.
(3)
Electronic data processing departments -- Security measures.
(3)
Electronic information resources -- Access control.
(3)
Hewlett-Packard computers -- Security measures.
(3)
Information Systems Applications (incl. Internet).
(3)
Information resources management.
(3)
Intellectual property.
(3)
Internet programming.
(3)
Intrusion detection systems (Computer security)
(3)
LAW -- Forensic Science.
(3)
Mac OS.
(3)
Privacy, Right of.
(3)
Python (Computer program language)
(3)
Security Science and Technology.
(3)
Short stories.
(3)
Software configuration management.
(3)
System safety.
(3)
Web servers -- Security measures.
(3)
Web sites -- Security measures.
(3)
z/OS.
(3)
Acquisition of computer software.
(2)
Application software.
(2)
BUSINESS & ECONOMICS -- Corporate Governance.
(2)
BUSINESS & ECONOMICS -- Leadership.
(2)
BUSINESS & ECONOMICS -- Organizational Development.
(2)
BUSINESS & ECONOMICS -- Workplace Culture.
(2)
Big Data/Analytics.
(2)
Big data.
(2)
Bilgisayarlar -- Erişim kontrolü.
(2)
Bilişim teknolojisi -- Sosyal yönler.
(2)
Biometrics (Biology).
(2)
Biometrics.
(2)
COMPUTERS -- Security -- Cryptography.
(2)
COMPUTERS -- Security -- Viruses.
(2)
ColdFusion.
(2)
Computer Communication Networks.
(2)
Computer communication systems.
(2)
Computer crimes -- Case studies.
(2)
Computer networks -- Reliability.
(2)
Computer security -- United States.
(2)
Computer software -- Reliability.
(2)
Computer software -- Testing.
(2)
Computerbeveiliging.
(2)
Computercriminaliteit.
(2)
Computersicherheit
(2)
Cyberterrorism -- Fiction.
(2)
Debugging in computer science.
(2)
Electronic book.
(2)
Electronic commerce -- Security measures.
(2)
Electronic data processing departments -- Auditing.
(2)
Electronic mail messages -- Security measures.
(2)
Electronic mail systems -- Security measures.
(2)
Electronics and Microelectronics, Instrumentation.
(2)
Electronics.
(2)
Engineering & Applied Sciences.
(2)
Hacking.
(2)
IBM software.
(2)
Information technology -- Auditing.
(2)
Information technology -- Management.
(2)
Information technology -- Social aspects.
(2)
Information technology.
(2)
Information visualization.
(2)
Instant messaging -- Security measures.
(2)
Internal security.
(2)
Internet -- Safety measures.
(2)
Internet and children.
(2)
Internet searching.
(2)
Internet.
(2)
Kriptografi.
(2)
Microelectronics.
(2)
Microsoft ISA server.
(2)
Multimedia systems -- Security measures.
(2)
Online social networks -- Security measures.
(2)
Peer-to-peer architecture (Computer networks)
(2)
Penetration testing (Computer security)
(2)
Programming languages (Electronic computers)
(2)
Reverse engineering.
(2)
Risk assessment.
(2)
Réseaux d'ordinateurs -- Sécurité -- Mesures.
(2)
SQL (Computer program language)
(2)
Social engineering.
(2)
Social media.
(2)
Spam filtering (Electronic mail)
(2)
Systèmes informatiques -- Sécurité -- Mesures.
(2)
TECHNOLOGY & ENGINEERING -- Industrial Engineering.
(2)
TRUE CRIME -- White Collar Crime.
(2)
Terrorism -- Prevention.
(2)
United States.
(2)
Veri koruma.
(2)
Virtual computer systems -- Security measures.
(2)
Web sites -- Design.
(2)
XML (Document markup language)
(2)
İç güvenlik.
(2)
AIX (Computer file)
(1)
Agents intelligents (Logiciels)
(1)
Algebra, Boolean.
(1)
Algorithms.
(1)
Altre visioni. Solaris.
(1)
Application software -- Development.
(1)
Archives -- Safety measures.
(1)
Automatic machinery -- Security measures.
(1)
Avionics -- Safety measures.
(1)
BEA WebLogic server.
(1)
BUSINESS & ECONOMICS -- Business Writing.
(1)
BUSINESS & ECONOMICS -- Industrial Management.
(1)
BUSINESS & ECONOMICS -- Management Science.
(1)
BUSINESS & ECONOMICS -- Management.
(1)
BUSINESS & ECONOMICS -- Organizational Behavior.
(1)
Bases de données -- Sécurité -- Mesures.
(1)
Big data -- Security measures.
(1)
Big data -- Social aspects.
(1)
Bilgisayar ağları -- Güvenlik önlemleri.
(1)
Bilgisayar ağları -- Hukuk ve yasama.
(1)
Bilgisayar güvenliği -- Yazılım.
(1)
Bluetooth technology -- Security measures.
(1)
Bluetooth technology.
(1)
Browsers (Computer programs)
(1)
Business enterpri -- Computer networks -- Security measures.
(1)
Business planning.
(1)
Büyük veri -- Sosyal yönler.
(1)
COMPUTER INFORMATION SECURITY.
(1)
COMPUTERS -- Digital Media -- General.
(1)
COMPUTERS -- Hardware -- Handheld Devices.
(1)
COMPUTERS -- Hardware -- Personal Computers -- General.
(1)
Daha fazla
Tümünü genişlet
Daha az
Hepsini Daralt
Kütüphane
Dahil
Hariç
Başkent Kütüphanesi
Lokasyon
Dahil
Hariç
Atasev Özel Koleksiyonu
E-Kütüphane
Ebook Central
Elsevier E-Kitap Koleksiyonu
Kazan Meslek Yüksekokulu
Merkez Kütüphane
SPRINGER
Özel Koleksiyon Sercan-İlhan Gülsün (2.Kat)
Özel Koleksiyon Serdar Özersin
Daha fazla
Tümünü genişlet
Daha az
Hepsini Daralt
false
{sortLabel}
{alphabetical}
{relevance}
{include}
{exclude}
{facetName}
{results}
{displayName}
{count}
{error}
Eylem Seç
Ayırt
Listelerime ekle
Eposta
Yazdır
500 sonuç bulundu
1
2
3
4
5
..
42
Sırala:
Konuyla İlgili Sırala
Yayın Yılı (eskiden yeniye)
Yayın Yılı (yeniden eskiye)
Başlık
Yazar
OK
Eposta Adresleri
:
Phone Number:
Mobile Carrier:
AT&T
Boost
Nextel (Sprint)
Sprint (PCS)
T Mobile
TracFone
US Cellular
Verizon
Virgin
Select An Item
Data usage warning: You will receive one text message for each title you selected.
Standard text messaging rates apply.
Text it to me
Text it to me, and go to next item
000000000000
DEFAULTTR
Liste seç
Geçici Liste
Bunu varsayılan liste yap.
Öğeler başarıyla eklendi
Öğeler eklenirken hata oldu. Lütfen tekrar deneyiniz.
Ağ ve siber güvenlik temelleri : dijital dünyada güvende kalın
1.
Ağ ve siber güvenlik temelleri : dijital dünyada güvende kalın
by
Hınçer, Görkem, yazar.
Format:
Siber güvenlik ve savunma : siber güvenlik ontolojisi, tehditler ve çözümler
2.
Siber güvenlik ve savunma : siber güvenlik ontolojisi, tehditler ve çözümler
by
Sağıroğlu, Şeref, Prof. Dr., editör
Format:
Bilgisayar sistemlerinde güvenlik ve gizlilik
3.
Bilgisayar sistemlerinde güvenlik ve gizlilik
by
Aydın, Ömer, Dr. Öğr. Üyesi, editör
Format:
Sosyal mühendislik, bilgi güvenliği ve endüstri 4.0
4.
Sosyal mühendislik, bilgi güvenliği ve endüstri 4.0
by
Özmen, Cevdet, Dr., yazar.
Format:
Security controls evaluation, testing, and assessment handbook
5.
Security controls evaluation, testing, and assessment handbook
by
Johnson, Leighton, author.
Click to View
Format:
An introduction to cyber modeling and simulation
6.
An introduction to cyber modeling and simulation
by
Couretas, Jerry M., 1966- author.
Click to View
Format:
Cyber smart : five habits to protect your family, money, and identity from cyber criminals
7.
Cyber smart : five habits to protect your family, money, and identity from cyber criminals
by
McDonough, Bart, author.
Click to View
Format:
Solving cyber risk : protecting your company and society
8.
Solving cyber risk : protecting your company and society
by
Coburn, Andrew (Andrew W.), author.
Click to View
Format:
Cybersecurity law : protect yourself and your customers
9.
Cybersecurity law : protect yourself and your customers
by
Brathwaite, Shimon, author.
Click to View
Format:
Cyber security in parallel and distributed computing : concepts, techniques, applications and case studies
10.
Cyber security in parallel and distributed computing : concepts, techniques, applications and case studies
by
Le, Dac-Nhuong, 1983- editor.
Click to View
Format:
Cybersecurity blue team toolkit
11.
Cybersecurity blue team toolkit
by
Tanner, Nadean, author.
Click to View
Format:
Hardware security : a hands-on learning approach
12.
Hardware security : a hands-on learning approach
by
Bhunia, Swarup, author.
Click to View
Format:
Eylem Seç
Ayırt
Listelerime ekle
Eposta
Yazdır
1
2
3
4
5
..
42
Search Results
Elektronik Kaynaklar
Search Results
Elektronik Kaynaklar
OK
Eposta Adresleri
:
Phone Number:
Mobile Carrier:
AT&T
Boost
Nextel (Sprint)
Sprint (PCS)
T Mobile
TracFone
US Cellular
Verizon
Virgin
Select An Item
Data usage warning: You will receive one text message for each title you selected.
Standard text messaging rates apply.
Text it to me
Text it to me, and go to next item
Elektronik Kaynaklar
Sonuçlar alınıyor Elektronik Kaynaklar...
action
Go to:
Search Results
|
Search Facets
|
Top of Page