Skip to:
Search Results
|
Bottom
|
Search Facets
|
Content
Giriş
|
Hesabım
|
Listelerim
|
|
Remember to clear the cache and close the browser window.
English
Search Limit
Bütün Kütüphaneler
Elektronik Kaynaklar
Hepsi
Başkent Üniversitesi Kütüphanesi
Anadolu OSB Meslek Yüksekokulu
Atasev Özel Koleksiyon
Erdoğan Tercan Koleksiyonu
Güzel Sanatlar ve Tasarım Arşivi
Kazan Meslek Yüksekokulu
Hukuk Koleksiyonu
Ord.Prof.Dr. Enver Ziya Karal Tarih Uygulama Ars.Mrk.
Özel Koleksiyon Serdar Özersin
Tez Koleksiyonu
Tüm Alanlar
Başlık
Yazar
Konu
ISBN
ISSN
13
Search Field
Tüm Alanlar
Arama:
Gelişmiş Arama
Search Results
Elektronik Kaynaklar
Arama Sonuçlarını Sınırlandır
Daraltılmış:
+
Konu: Computer security.
+
Konu: Electronic books.
Yazar
Dahil
Hariç
ProQuest (Firm)
(196)
Foster, James C.
(11)
International Business Machines Corporation. International Technical Support Organization.
(10)
Long, Johnny.
(9)
Russell, Ryan, 1969-
(6)
Carvey, Harlan A.
(5)
Cross, Michael, 1965-
(5)
Hurley, Chris.
(5)
Wiles, Jack.
(5)
Beale, Jay.
(4)
Calder, Alan, author.
(4)
Cherry, Denny.
(4)
Cole, Eric.
(4)
Hunter, Laura E.
(4)
Limbert, Matthew, designer.
(4)
Piltzecker, Tony, 1975-
(4)
Rayns, Chris.
(4)
Ring, Sandra.
(4)
Rittinghouse, John W.
(4)
Shinder, Thomas W.
(4)
Buchanan, Cameron, author.
(3)
Clercq, Jan de, 1968-
(3)
Contos, Brian T.
(3)
Cox, I. J. (Ingemar J.)
(3)
Katsaropoulos, Chris, editor.
(3)
Mullen, Timothy M.
(3)
Rogers, Mark, designer.
(3)
Sachs, Marcus H.
(3)
Shinder, Debra Littlejohn.
(3)
Winkler, J. R. (Joachim R.)
(3)
Wyler, Neil R.
(3)
XYPRO Technology Corporation.
(3)
Alder, Raven.
(2)
Amini, Rob.
(2)
Andress, Jason.
(2)
Aquilina, James M.
(2)
Baskin, Brian.
(2)
Bayles, Aaron W.
(2)
Ben-Natan, Ron.
(2)
Boulanger, Jean-Louis.
(2)
Brindley, Ed.
(2)
Burnett, Mark (Mark M.)
(2)
Casey, Eoghan.
(2)
Caswell, Brian.
(2)
Chaffin, Larry.
(2)
Chandramouli, Ramaswamy.
(2)
Clarke, Justin.
(2)
Dalziel, Henry, author.
(2)
Dalziel, Henry, editor.
(2)
Engebretson, Pat (Patrick Henry), 1974-
(2)
Erickson, Jon, 1977-
(2)
Fair, Ted.
(2)
Ferraiolo, David.
(2)
Foster, Stephen C.
(2)
Goodman, Seymour E.
(2)
Grasdal, Martin.
(2)
Grillenmeier, Guido.
(2)
Hancock, Bill, 1957-
(2)
Henmi, Anne.
(2)
Honick, Ron.
(2)
Hutchens, Justin, author.
(2)
Kinney, Steven.
(2)
Kleidermacher, David.
(2)
Kleidermacher, Mike.
(2)
Knapp, Eric.
(2)
Koh.
(2)
Krutz, Ronald L.
(2)
Kuhn, D. Richard.
(2)
Lin, Ching-Yung.
(2)
Malin, Cameron H.
(2)
Mao, Wenji.
(2)
Maynor, David.
(2)
Meyer, Greg.
(2)
Moskowitz, Jeremy.
(2)
Nordfelt, Michael.
(2)
Oppliger, Rolf.
(2)
Parker, Tom.
(2)
Piccard, Paul L.
(2)
Potter, Bruce.
(2)
Qian, Yi, 1962-
(2)
Ramachandran, Vivek, author.
(2)
Ramirez, Gilbert.
(2)
Ransome, James F.
(2)
Rash, Michael.
(2)
Rathaus, Noam.
(2)
Rogers, Russ.
(2)
ScienceDirect (Online service)
(2)
Shein, Rob.
(2)
Shimonski, Robert.
(2)
Stanger, James.
(2)
Stapko, Timothy John.
(2)
Todd, Chad.
(2)
Tyson, Dave.
(2)
Vacca, John R.
(2)
Wang, Fei-Yue.
(2)
Wheeler, Evan.
(2)
Winkler, Ira.
(2)
Wotring, Brian.
(2)
Young, Carl S., author.
(2)
Yu, Hong Heather, 1967-
(2)
Zalewski, Michal.
(2)
Zeng, Wenjun, 1967-
(2)
'Ken'@ftu.
(1)
131ah.
(1)
AXELOS Limited, author.
(1)
Abbadi, Imad M., author.
(1)
Ablon, Lillian, author.
(1)
Agre, Philip.
(1)
Ahmad, David R. Mirza.
(1)
Alam, Shahnawaz, author.
(1)
Alcover, Jorge Blanco.
(1)
Alexander, Philip, 1963-
(1)
Alvarado, Ellen.
(1)
American Evaluation Association.
(1)
Anderson, Brian (Brian James)
(1)
Andress, Jason, author.
(1)
Andrés, Steven.
(1)
Antón, Philip S.
(1)
Anzaldua, Reynaldo.
(1)
Aquilina, James, author.
(1)
Archibald, Neil.
(1)
Arnold, Michael (Michael Konrad), 1964-
(1)
Arvanitis, Nicholas, editor.
(1)
Ashenden, Debi.
(1)
Assam, Tarek.
(1)
Axelrod, C. Warren.
(1)
Baccas, Paul.
(1)
Baker, Andrew R.
(1)
Baker, Paul R., 1958-
(1)
Barnett, Ryan C.
(1)
Barrett, Diane.
(1)
Basagiannis, Stylianos, contributor.
(1)
Baskerville, Richard.
(1)
Baskin, Brian, author.
(1)
Bayuk, Jennifer L.
(1)
Beaver, Kevin.
(1)
Bednarczyk, Michael.
(1)
Belapurkar, Abhijit.
(1)
Ben-Ari, Erez.
(1)
Bennett, Eleanor Leonne, cover designer.
(1)
Benny, Daniel J.
(1)
Berghe, Thierry van den, author.
(1)
Bergstra, J. A.
(1)
Bertino, Elisa.
(1)
Bhalla, Nish.
(1)
Bhardwaj, Pawan K.
(1)
Bianco, David J., 1971-
(1)
Bidwell, Teri.
(1)
Bin Azad, Tariq.
(1)
Binnie, Christopher, author.
(1)
Black Hat Press (Goodhue, Minn.)
(1)
Blair, John, author.
(1)
Blobel, Bernd.
(1)
Bloom, Jeffrey A. (Jeffrey Adam), 1964-
(1)
Bolt, Steven.
(1)
Bonertz, Tina.
(1)
Bonnell, Ralph.
(1)
Bradley, Jaron, author.
(1)
Bradley, Tony, 1969-
(1)
Bradley, Tony.
(1)
Bray, Rory.
(1)
Breimeier, Johannes.
(1)
Brennen, Jerod, editor.
(1)
Brewer, Jacqueline, editor.
(1)
Brooks, Hugh.
(1)
Brotby, W. Krag.
(1)
Bruchez, Rudi.
(1)
Bullock, Jessey, author.
(1)
Burke, Josh.
(1)
Burnett, Mark.
(1)
Burton, James.
(1)
Bücker, Axel.
(1)
Cabric, Marko, author.
(1)
Calder, Alan.
(1)
Calderon Pale, Paulino.
(1)
Caloyannides, Michael A.
(1)
Caloyannides, Michael A. Computer forensics and privacy.
(1)
Campara, Djenana.
(1)
Cantrell, Christopher.
(1)
Carbone, Fernando, author.
(1)
Cardwell, Kevin, author.
(1)
Carroll, John M. (John Millar), 1925-
(1)
Carvey, Harlan A., author.
(1)
Carvey, Harlan, author.
(1)
Carvey, Harlan.
(1)
Casco, Steven.
(1)
Casey, Eoghan, author.
(1)
Cesario, Cristiano.
(1)
Chapman, Chris, author.
(1)
Chikofsky, Elliot J.
(1)
Choi, Kyung-shick, 1973-
(1)
Chuvakin, Anton A.
(1)
Cid, Daniel.
(1)
Clark, Champ, III.
(1)
Clark, Gregory, author.
(1)
Cole, Eric, author.
(1)
Conti, Greg.
(1)
Cook, Jim, 1944-
(1)
Cook, Randy (Randy R.)
(1)
Couretas, Jerry M., 1966- author.
(1)
Daha fazla
Tümünü genişlet
Daha az
Hepsini Daralt
Materyal Türü
Dahil
Hariç
E-Kitap
Dil
Dahil
Hariç
English
(427)
German
(3)
French
(1)
Yayın Yılı
Dahil
Hariç
-
2005
(36)
2007
(35)
2013
(35)
2004
(32)
2006
(30)
2014
(28)
2015
(27)
2011
(26)
2008
(25)
2012
(25)
2010
(24)
2016
(22)
2003
(21)
2002
(17)
2017
(13)
2001
(10)
2009
(7)
2018
(7)
2019
(5)
2000
(2)
1979
(1)
1987
(1)
1991
(1)
1997
(1)
2020
(1)
Daha fazla
Tümünü genişlet
Daha az
Hepsini Daralt
Konu
Dahil
Hariç
Computer networks -- Security measures.
(156)
COMPUTERS -- Internet -- Security.
(67)
COMPUTERS -- Networking -- Security.
(67)
COMPUTERS -- Security -- General.
(67)
Data protection.
(39)
Internet -- Security measures.
(26)
Computer hackers.
(17)
Microsoft Windows (Computer file)
(17)
Computers -- Access control.
(16)
Computer crimes.
(13)
Computer crimes -- Prevention.
(12)
Database security.
(12)
Operating systems (Computers)
(12)
Data encryption (Computer science)
(11)
Hackers.
(11)
Computer crimes -- Investigation.
(10)
Cryptography.
(10)
Business enterprises -- Computer networks -- Security measures.
(9)
Information technology -- Security measures.
(9)
Computer viruses.
(8)
Firewalls (Computer security)
(7)
Security systems.
(7)
Client/server computing.
(6)
Cloud computing.
(6)
Computer security -- Fiction.
(6)
Microsoft Windows server.
(6)
Client/server computing -- Security measures.
(5)
Computer networks -- Access control.
(5)
Computer science.
(5)
Computer security -- Handbooks, manuals, etc.
(5)
Cyberterrorism -- Prevention.
(5)
Cyberterrorism.
(5)
Digital watermarking.
(5)
Embedded computer systems.
(5)
Fiction.
(5)
Forensic sciences.
(5)
Hackers -- Fiction.
(5)
Handbooks and manuals.
(5)
Malware (Computer software)
(5)
SQL server.
(5)
Wireless communication systems -- Security measures.
(5)
Cloud computing -- Security measures.
(4)
Computer crimes -- Investigation -- United States -- Methodology.
(4)
Computer software -- Development.
(4)
Computers -- Access control -- Passwords.
(4)
Cyberspace -- Security measures.
(4)
FICTION -- General.
(4)
Linux.
(4)
Microsoft Windows (Computer file) -- Security measures.
(4)
Open source software.
(4)
Process control -- Security measures.
(4)
Risk management.
(4)
Spyware (Computer software)
(4)
World Wide Web -- Security measures.
(4)
Andre fag (naturvidenskab og teknik) Andre fag
(3)
Application software -- Security measures.
(3)
Business enterprises -- Security measures.
(3)
Citrix MetaFrame.
(3)
Computer networks.
(3)
Corporations -- Security measures.
(3)
Data mining.
(3)
Directory services (Computer network technology)
(3)
Electronic data processing departments -- Security measures.
(3)
Electronic information resources -- Access control.
(3)
Hewlett-Packard computers -- Security measures.
(3)
Information resources management.
(3)
Internet programming.
(3)
Intrusion detection systems (Computer security)
(3)
LAW -- Forensic Science.
(3)
Mac OS.
(3)
National security.
(3)
Privacy, Right of.
(3)
Python (Computer program language)
(3)
Short stories.
(3)
Software configuration management.
(3)
Web servers -- Security measures.
(3)
Web sites -- Security measures.
(3)
z/OS.
(3)
Acquisition of computer software.
(2)
BUSINESS & ECONOMICS -- Corporate Governance.
(2)
BUSINESS & ECONOMICS -- Leadership.
(2)
BUSINESS & ECONOMICS -- Organizational Development.
(2)
BUSINESS & ECONOMICS -- Workplace Culture.
(2)
COMPUTERS -- Security -- Cryptography.
(2)
COMPUTERS -- Security -- Viruses.
(2)
ColdFusion.
(2)
Computer networks -- Reliability.
(2)
Computer software -- Reliability.
(2)
Computer software -- Testing.
(2)
Computerbeveiliging.
(2)
Computercriminaliteit.
(2)
Computersicherheit
(2)
Cyberterrorism -- Fiction.
(2)
Debugging in computer science.
(2)
Electronic book.
(2)
Electronic commerce -- Security measures.
(2)
Electronic data processing departments -- Auditing.
(2)
Electronic mail messages -- Security measures.
(2)
Electronic mail systems -- Security measures.
(2)
Engineering & Applied Sciences.
(2)
Hacking.
(2)
IBM software.
(2)
Information technology -- Auditing.
(2)
Information technology -- Management.
(2)
Information technology.
(2)
Information visualization.
(2)
Instant messaging -- Security measures.
(2)
Intellectual property.
(2)
Internet -- Safety measures.
(2)
Internet and children.
(2)
Internet searching.
(2)
Internet.
(2)
Microsoft ISA server.
(2)
Multimedia systems -- Security measures.
(2)
Online social networks -- Security measures.
(2)
Peer-to-peer architecture (Computer networks)
(2)
Penetration testing (Computer security)
(2)
Programming languages (Electronic computers)
(2)
Reverse engineering.
(2)
Risk assessment.
(2)
Réseaux d'ordinateurs -- Sécurité -- Mesures.
(2)
SQL (Computer program language)
(2)
Social media.
(2)
Spam filtering (Electronic mail)
(2)
Systèmes informatiques -- Sécurité -- Mesures.
(2)
TECHNOLOGY & ENGINEERING -- Industrial Engineering.
(2)
Terrorism -- Prevention.
(2)
Web sites -- Design.
(2)
XML (Document markup language)
(2)
AIX (Computer file)
(1)
Agents intelligents (Logiciels)
(1)
Algebra, Boolean.
(1)
Altre visioni. Solaris.
(1)
Application software -- Development.
(1)
Application software.
(1)
Archives -- Safety measures.
(1)
Artificial intelligence.
(1)
Automatic machinery -- Security measures.
(1)
Avionics -- Safety measures.
(1)
BEA WebLogic server.
(1)
BUSINESS & ECONOMICS -- Business Writing.
(1)
BUSINESS & ECONOMICS -- Industrial Management.
(1)
BUSINESS & ECONOMICS -- Management Science.
(1)
BUSINESS & ECONOMICS -- Management.
(1)
BUSINESS & ECONOMICS -- Organizational Behavior.
(1)
Bases de données -- Sécurité -- Mesures.
(1)
Big data -- Security measures.
(1)
Bluetooth technology -- Security measures.
(1)
Bluetooth technology.
(1)
Browsers (Computer programs)
(1)
Business enterpri -- Computer networks -- Security measures.
(1)
Business planning.
(1)
COMPUTER INFORMATION SECURITY.
(1)
COMPUTERS -- Digital Media -- General.
(1)
COMPUTERS -- Hardware -- Handheld Devices.
(1)
COMPUTERS -- Hardware -- Personal Computers -- General.
(1)
COMPUTERS -- Hardware -- Personal Computers -- Macintosh.
(1)
COMPUTERS -- Hardware -- Personal Computers -- PCs.
(1)
COMPUTERS -- Interactive & Multimedia.
(1)
COMPUTERS -- Microprocessors.
(1)
COMPUTERS -- Online Services.
(1)
COMPUTERS -- Operating Systems -- DOS.
(1)
COMPUTERS -- Operating Systems -- General.
(1)
COMPUTERS -- Operating Systems -- Macintosh.
(1)
COMPUTERS -- Operating Systems -- Windows Server & NT.
(1)
COMPUTERS -- Operating Systems -- Windows Workstation.
(1)
COMPUTERS -- Security -- Networking.
(1)
COMPUTERS -- Software Development & Engineering -- Project Management.
(1)
COMPUTERS -- System Administration -- Storage & Retrieval.
(1)
COMPUTERS -- System Administration -- Windows Administration.
(1)
COMPUTERS -- Web -- Site Design.
(1)
COMPUTERS -- Web -- User Generated Content.
(1)
CORBA (Computer architecture)
(1)
Centres de traitement de l'information -- Sûreté -- Mesures.
(1)
Cocoa (Application development environment)
(1)
Commercial crimes.
(1)
Component software.
(1)
Computer Science.
(1)
Computer Security
(1)
Computer architecture.
(1)
Computer crimes -- Case studies.
(1)
Computer crimes -- Fiction.
(1)
Computer crimes -- Investigation -- Handbooks, manuals, etc.
(1)
Computer crimes -- Investigation -- Methodology.
(1)
Computer crimes -- Investigation -- United States.
(1)
Computer crimes -- Investments.
(1)
Computer hackers -- Fiction.
(1)
Computer network protocols.
(1)
Computer networks -- Certification.
(1)
Computer networks -- Design and construction.
(1)
Computer networks -- Examinations -- Study guides.
(1)
Computer networks -- Planning.
(1)
Computer networks -- Security measures -- Fiction.
(1)
Computer networks -- Security measures -- Handbooks, manuals, etc.
(1)
Computer networks -- Security measures -- Standards.
(1)
Computer networks -- Security measures -- United States.
(1)
Computer programming.
(1)
Computer security
(1)
Computer security -- Forecasting.
(1)
Computer security -- History.
(1)
Daha fazla
Tümünü genişlet
Daha az
Hepsini Daralt
Kütüphane
Dahil
Hariç
Başkent Kütüphanesi
Lokasyon
Dahil
Hariç
E-Kütüphane
Ebook Central
Elsevier E-Kitap Koleksiyonu
false
{sortLabel}
{alphabetical}
{relevance}
{include}
{exclude}
{facetName}
{results}
{displayName}
{count}
{error}
Eylem Seç
Ayırt
Listelerime ekle
Eposta
Yazdır
431 sonuç bulundu
1
2
3
4
5
..
36
Sırala:
Konuyla İlgili Sırala
Yayın Yılı (eskiden yeniye)
Yayın Yılı (yeniden eskiye)
Başlık
Yazar
OK
Eposta Adresleri
:
Phone Number:
Mobile Carrier:
AT&T
Boost
Nextel (Sprint)
Sprint (PCS)
T Mobile
TracFone
US Cellular
Verizon
Virgin
Select An Item
Data usage warning: You will receive one text message for each title you selected.
Standard text messaging rates apply.
Text it to me
Text it to me, and go to next item
000000000000
DEFAULTTR
Liste seç
Geçici Liste
Bunu varsayılan liste yap.
Öğeler başarıyla eklendi
Öğeler eklenirken hata oldu. Lütfen tekrar deneyiniz.
Kali Linux network scanning cookbook : take your penetration-testing skills to the next level
25.
Kali Linux network scanning cookbook : take your penetration-testing skills to the next level
by
Hixon, Michael, author.
Click to View
Format:
RIoT control : understanding and managing risks and the internet of things
26.
RIoT control : understanding and managing risks and the internet of things
by
Macaulay, Tyson, author.
Click to View
Format:
The information systems security officer's guide : establishing and managing a cyber security program
27.
The information systems security officer's guide : establishing and managing a cyber security program
by
Kovacich, Gerald L., author.
Click to View
Format:
Information technology security fundamentals
28.
Information technology security fundamentals
by
Sagers, Glen., author.
Click to View
Format:
Breaking into information security : crafting a custom career path to get the job you really want
29.
Breaking into information security : crafting a custom career path to get the job you really want
by
More, Josh, author.
Click to View
Format:
Cyber security awareness for CEOs and management
30.
Cyber security awareness for CEOs and management
by
Willson, David, author.
Click to View
Format:
Meeting people via WiFi and Bluetooth
31.
Meeting people via WiFi and Bluetooth
by
Schroeder, Joshua, author.
Click to View
Format:
Essential skills for hackers
32.
Essential skills for hackers
by
Cardwell, Kevin, author.
Click to View
Format:
You : for sale protecting your personal data and privacy online
33.
You : for sale protecting your personal data and privacy online
by
Sumner, Stuart, author.
Click to View
Format:
Security and privacy in the digital era. Volume 1
34.
Security and privacy in the digital era. Volume 1
by
Guerrier, Claudine, author.
Click to View
Format:
Security in fixed and wireless networks
35.
Security in fixed and wireless networks
by
Schäfer, Günter, author.
Click to View
Format:
Linux server security : hack and defend
36.
Linux server security : hack and defend
by
Binnie, Christopher, author.
Click to View
Format:
Eylem Seç
Ayırt
Listelerime ekle
Eposta
Yazdır
1
2
3
4
5
..
36
Search Results
Elektronik Kaynaklar
Search Results
Elektronik Kaynaklar
OK
Eposta Adresleri
:
Phone Number:
Mobile Carrier:
AT&T
Boost
Nextel (Sprint)
Sprint (PCS)
T Mobile
TracFone
US Cellular
Verizon
Virgin
Select An Item
Data usage warning: You will receive one text message for each title you selected.
Standard text messaging rates apply.
Text it to me
Text it to me, and go to next item
Elektronik Kaynaklar
Sonuçlar alınıyor Elektronik Kaynaklar...
action
Go to:
Search Results
|
Search Facets
|
Top of Page