Giriş
|
Hesabım
|
Listelerim
|
|
Remember to clear the cache and close the browser window.
English
Search Limit
Bütün Kütüphaneler
Elektronik Kaynaklar
Hepsi
Başkent Üniversitesi Kütüphanesi
Anadolu OSB Meslek Yüksekokulu
Atasev Özel Koleksiyon
Erdoğan Tercan Koleksiyonu
Güzel Sanatlar ve Tasarım Arşivi
Kazan Meslek Yüksekokulu
Hukuk Koleksiyonu
Ord.Prof.Dr. Enver Ziya Karal Tarih Uygulama Ars.Mrk.
Özel Koleksiyon Serdar Özersin
Tez Koleksiyonu
Tüm Alanlar
Başlık
Yazar
Konu
ISBN
ISSN
8
Search Field
Tüm Alanlar
Arama:
Gelişmiş Arama
Search Results
Elektronik Kaynaklar
Arama Sonuçlarını Sınırlandır
Daraltılmış:
+
Materyal Türü: E-Kitap
+
Konu: Computer networks -- Security measures.
Yazar
Dahil
Hariç
ProQuest (Firm)
(147)
Shimonski, Robert.
(6)
Vacca, John R.
(6)
Beale, Jay.
(5)
Foster, James C.
(5)
Shinder, Debra Littlejohn.
(5)
Shinder, Thomas W.
(5)
Andress, Jason.
(4)
Henmi, Anne.
(4)
Hunter, Laura E.
(4)
International Business Machines Corporation. International Technical Support Organization.
(4)
Rittinghouse, John W.
(4)
Behrens, Thorsten.
(3)
Cardwell, Kevin, author.
(3)
Carvey, Harlan A.
(3)
Cole, Eric.
(3)
Cross, Michael, 1965-
(3)
Grasdal, Martin.
(3)
Limbert, Matthew, designer.
(3)
Long, Johnny.
(3)
Ramirez, Gilbert.
(3)
Rogers, Russ.
(3)
Wiles, Jack.
(3)
Winkler, J. R. (Joachim R.)
(3)
Ahmad, David R. Mirza.
(2)
Alder, Raven.
(2)
Amini, Rob.
(2)
Andrés, Steven.
(2)
Archibald, Neil.
(2)
Babbin, Jacob.
(2)
Birkholz, Erik Pace.
(2)
Burnett, Mark (Mark M.)
(2)
Cameron, Rob.
(2)
Canavan, Tom.
(2)
Cantrell, Chris.
(2)
Caswell, Brian.
(2)
Chuvakin, Anton.
(2)
Contos, Brian T.
(2)
Danielyan, Edgar.
(2)
Dubrawsky, Ido.
(2)
Erickson, Jon, 1977-
(2)
Gatford, Chris.
(2)
Gold, André.
(2)
Gonzalez, Deborah, author.
(2)
Haines, Brad.
(2)
Hancock, Bill, 1957-
(2)
Katsaropoulos, Chris, editor.
(2)
Khan, Umer.
(2)
Knipp, Eric.
(2)
Liska, Allan, author.
(2)
Liu, Dale.
(2)
Lucas, Mark.
(2)
Manzuik, Steve.
(2)
Meyer, Greg.
(2)
Morris, Greg.
(2)
Norman, Thomas L.
(2)
Orebaugh, Angela.
(2)
Osipov, Vitaly.
(2)
Ozkaya, Erdal, author.
(2)
Pan, Yi, 1960-
(2)
Parker, Tom.
(2)
Potter, Bruce.
(2)
Qian, Yi, 1962-
(2)
Ransome, James F.
(2)
Rash, Michael.
(2)
Rathaus, Noam.
(2)
Rayns, Chris.
(2)
Riley, Charles.
(2)
Ring, Sandra.
(2)
Rountree, Derrick.
(2)
Russell, Ryan, 1969-
(2)
Sachs, Marcus H.
(2)
Shema, Mike.
(2)
Singh, Abhishek.
(2)
Snedaker, Susan.
(2)
Stapko, Timothy John.
(2)
Strebe, Matthew.
(2)
Syngress Media, Inc.
(2)
Tam, Kenneth.
(2)
Thuraisingham, Bhavani M.
(2)
Todd, Chad.
(2)
Voeller, John G.
(2)
Warnicke, Ed.
(2)
Watkins, Stephen (Information security professional)
(2)
Wayner, Peter, 1964-
(2)
Wilhelm, Thomas.
(2)
Williams, Branden R.
(2)
Winterfeld, Steve.
(2)
Wotring, Brian.
(2)
Zalewski, Michal.
(2)
Ablon, Lillian, author.
(1)
Aggarwal, Manuj, author.
(1)
Aissi, Selim.
(1)
Alcover, Jorge Blanco.
(1)
Ali, Shakeel.
(1)
Allen, Lee, 1946- author.
(1)
Allison, Steve.
(1)
Allsopp, Wil, author.
(1)
Allsopp, Wil.
(1)
American Evaluation Association.
(1)
Amon, Cheri.
(1)
Anderson, Brian (Brian James)
(1)
Andress, Jason, author.
(1)
Anson, Steve.
(1)
Antonius, Jesper.
(1)
Assam, Tarek.
(1)
Assing, Dominique.
(1)
Atiya, Amir F.
(1)
Au, Man-Ho, editor.
(1)
Baker, Andrew R.
(1)
Banks, Allister, author.
(1)
Barnes, Christian.
(1)
Barnett, Ryan C.
(1)
Baskin, Brian, author.
(1)
Baskin, Brian.
(1)
Baumrucker, C. Tate.
(1)
Bautista, Wilson, author.
(1)
Bayer, Chad M.
(1)
Beaver, Kevin.
(1)
Bejtlich, Richard.
(1)
Ben-Ari, Erez.
(1)
Bendell, Dan.
(1)
Bendell, Daniel H.
(1)
Bennett, Eleanor Leonne, cover designer.
(1)
Bernard, Ray, author.
(1)
Bertino, Elisa.
(1)
Beyah, Raheem (Raheem A.), 1976-
(1)
Bhalla, Nish.
(1)
Bhardwaj, Pawan K.
(1)
Bhattacharjee, Sravani, author.
(1)
Bianco, David J., 1971-
(1)
Bindner, Andrew.
(1)
Blair, John, author.
(1)
Bolt, Steven.
(1)
Borkin, Mike.
(1)
Bouzefrane, Samia, editor.
(1)
Bradley, Tony, 1969-
(1)
Braman, Eric, editor.
(1)
Brant, Justin M.
(1)
Brashars, Joshua.
(1)
Bray, Rory.
(1)
Briggs, Jonathan.
(1)
Broad, James.
(1)
Buchanan, Cameron, author.
(1)
Burke, Josh.
(1)
Burton, James D.
(1)
Burton, James.
(1)
Bücker, Axel.
(1)
Calé, Stéphane.
(1)
Cantrell, Christopher.
(1)
Capurro, Rafael.
(1)
Carafano, James Jay, 1955-
(1)
Carbone, Fernando, author.
(1)
Carey, David.
(1)
Carpenter, Perry, author.
(1)
Carvey, Harlan A., author.
(1)
Carvey, Harlan, author.
(1)
Carvey, Harlan.
(1)
Casco, Steven.
(1)
Chapman, Chris, author.
(1)
Charles S. Edge, author.
(1)
Chauhan, Sudhanshu, author.
(1)
Cheah, Chun Hai.
(1)
Cherry, Denny.
(1)
Choo, Kim-Kwang Raymond, editor.
(1)
Chuvakin, Anton A., author.
(1)
Cid, Daniel.
(1)
Clark, Gregory, author.
(1)
Clarke, Justin.
(1)
Collins, Jon, author.
(1)
Connelly, Olly.
(1)
Conti, Greg.
(1)
Cook, Randy (Randy R.)
(1)
Corbett, Cherita (Cherita L.)
(1)
Courcier, Scar de, author.
(1)
Cross, Michael.
(1)
Cruz, Maria Ines, designer.
(1)
D'Arcy, John P., 1975-
(1)
Dabbous, Nora.
(1)
Dai, Yuan-Shun.
(1)
Dalziel, Henry, author.
(1)
Dalziel, Max, author.
(1)
Dattani, Dinesh D.
(1)
Davies, Joshua Dennis.
(1)
Davies, Saida.
(1)
DeLuccia, James J., 1977-
(1)
DeMott, Jared.
(1)
Death, Darren, author.
(1)
Delfanti, Alessandro.
(1)
Demchak, Chris C.
(1)
Deraison, Renaud.
(1)
Desai, Hemal, editor.
(1)
Devost, Matthew G.
(1)
Dewald, Andreas, author.
(1)
Diogenes, Yuri, author.
(1)
Dolev, Ran.
(1)
Donaldson, Scott E., author.
(1)
Duman, Ekrem.
(1)
Dwivedi, Himanshu.
(1)
Edwards, Matthew, editor of compilation.
(1)
Daha fazla
Tümünü genişlet
Daha az
Hepsini Daralt
Dil
Dahil
Hariç
English
(381)
German
(2)
English, Middle (1100-1500)
(1)
Yayın Yılı
Dahil
Hariç
-
2014
(35)
2013
(33)
2004
(27)
2005
(26)
2006
(26)
2007
(25)
2011
(25)
2008
(23)
2003
(22)
2017
(22)
2015
(21)
2002
(18)
2018
(18)
2016
(15)
2010
(14)
2012
(12)
2009
(8)
2019
(7)
2001
(6)
1999
(1)
Daha fazla
Tümünü genişlet
Daha az
Hepsini Daralt
Konu
Dahil
Hariç
Electronic books.
(384)
Computer security.
(161)
COMPUTERS -- Internet -- Security.
(65)
COMPUTERS -- Networking -- Security.
(65)
COMPUTERS -- Security -- General.
(65)
Internet -- Security measures.
(31)
Firewalls (Computer security)
(18)
Computer networks -- Access control.
(15)
Computers -- Access control.
(15)
Computer hackers.
(14)
Penetration testing (Computer security)
(12)
Data protection.
(11)
Computer crimes -- Investigation.
(10)
Microsoft Windows (Computer file)
(10)
Wireless communication systems -- Security measures.
(10)
Computer crimes -- Prevention.
(8)
Web sites -- Security measures.
(8)
Computer network protocols.
(7)
Computer security -- Management.
(7)
Operating systems (Computers)
(7)
Cyberspace -- Security measures.
(6)
Data encryption (Computer science)
(6)
Hackers.
(6)
Computer crimes.
(5)
Computer viruses.
(5)
Cyberterrorism -- Prevention.
(5)
Data protection -- Standards.
(5)
Database security.
(5)
Microsoft ISA server.
(5)
Open source software.
(5)
WebSphere.
(5)
World Wide Web -- Security measures.
(5)
Andre fag (naturvidenskab og teknik) Andre fag
(4)
Application software -- Security measures.
(4)
Cloud computing.
(4)
Computer crimes -- Investigation -- United States -- Methodology.
(4)
Computer networks -- Management.
(4)
Computer networks -- Security measures -- Handbooks, manuals, etc.
(4)
Credit cards.
(4)
Forensic sciences.
(4)
Handbooks and manuals.
(4)
Information resources management.
(4)
Information technology -- Management.
(4)
Information technology -- Security measures.
(4)
Information warfare.
(4)
Internet.
(4)
Liability for credit information.
(4)
Microsoft Windows (Computer file) -- Security measures.
(4)
Microsoft Windows server.
(4)
Security systems.
(4)
Web servers -- Security measures.
(4)
z/OS.
(4)
Business enterprises -- Computer networks -- Security measures.
(3)
COMPUTERS -- Computer Literacy.
(3)
COMPUTERS -- Computer Science.
(3)
COMPUTERS -- Data Processing.
(3)
COMPUTERS -- Hardware -- General.
(3)
COMPUTERS -- Information Technology.
(3)
COMPUTERS -- Machine Theory.
(3)
COMPUTERS -- Reference.
(3)
COMPUTERS -- Security -- Cryptography.
(3)
Client/server computing.
(3)
Cloud computing -- Security measures.
(3)
Computer network architectures.
(3)
Computer networks.
(3)
Computer science.
(3)
Cryptography.
(3)
Cyberterrorism.
(3)
Electronic book.
(3)
Electronic data processing departments -- Security measures.
(3)
Engineering & Applied Sciences.
(3)
Information storage and retrieval systems -- Security measures.
(3)
Internet telephony -- Security measures.
(3)
Java (Computer program language)
(3)
Kali Linux.
(3)
Malware (Computer software) -- Prevention.
(3)
Routers (Computer networks)
(3)
Réseaux d'ordinateurs -- Sécurité -- Mesures.
(3)
Réseaux d'ordinateurs.
(3)
Application software -- Development.
(2)
Business -- Data processing -- Security measures.
(2)
Business enterprises -- Security measures.
(2)
COMPUTERS -- Data Transmission Systems -- General.
(2)
COMPUTERS -- Networking -- Vendor Specific.
(2)
Cisco Systems, Inc.
(2)
ColdFusion.
(2)
Computer crimes -- Case studies.
(2)
Computer networks -- Reliability.
(2)
Computer networks -- Testing.
(2)
Computer security -- Evaluation -- Methodology.
(2)
Computer security -- Evaluation.
(2)
Computer software -- Development.
(2)
Computerbeveiliging.
(2)
Computercriminaliteit.
(2)
Computernetwerken.
(2)
Computersicherheit
(2)
Crisis management.
(2)
Digital watermarking.
(2)
Electrical & Computer Engineering.
(2)
Electronic data processing personnel -- Certification -- Study guides.
(2)
Electronic information resources -- Access control.
(2)
Electronic mail systems -- Security measures.
(2)
Embedded computer systems.
(2)
Hacking.
(2)
Information technology -- Auditing.
(2)
Information visualization.
(2)
Intrusion detection systems (Computer security)
(2)
LAW -- Forensic Science.
(2)
Malware (Computer software)
(2)
Microsoft Exchange server.
(2)
Microsoft Windows.
(2)
Open source intelligence.
(2)
Oracle (Computer file)
(2)
Peer-to-peer architecture (Computer networks)
(2)
Protection de l'information (Informatique)
(2)
Rechnernetz
(2)
Software.
(2)
TCP/IP (Computer network protocol)
(2)
Technology -- Research -- United States.
(2)
Telecommunications.
(2)
UNIX Shells.
(2)
Web portals -- Security measures.
(2)
Wide area networks (Computer networks) -- Access.
(2)
Wireless LANs.
(2)
Active server pages -- Security measures.
(1)
Active server pages.
(1)
Agents intelligents (Logiciels)
(1)
Android (Electronic resource)
(1)
Application logging (Computer science)
(1)
Application software -- Design.
(1)
Application software.
(1)
Aufsatzsammlung.
(1)
BUSINESS & ECONOMICS -- Corporate Governance.
(1)
BUSINESS & ECONOMICS -- Leadership.
(1)
BUSINESS & ECONOMICS -- Organizational Development.
(1)
BUSINESS & ECONOMICS -- Workplace Culture.
(1)
Biometric identification.
(1)
Brain-computer interfaces.
(1)
Browsers (Computer programs)
(1)
Business enterprises -- Computer networks.
(1)
Business enterprises -- Computer programs.
(1)
Business planning.
(1)
Business travel -- Safety measures.
(1)
COMPUTERS -- Digital Media -- General.
(1)
COMPUTERS -- Hardware -- Handheld Devices.
(1)
COMPUTERS -- Hardware -- Personal Computers -- General.
(1)
COMPUTERS -- Interactive & Multimedia.
(1)
COMPUTERS -- Microprocessors.
(1)
COMPUTERS -- Online Services.
(1)
COMPUTERS -- Operating Systems -- DOS.
(1)
COMPUTERS -- Operating Systems -- Macintosh.
(1)
COMPUTERS -- Operating Systems -- Windows Server & NT.
(1)
COMPUTERS -- Operating Systems -- Windows Workstation.
(1)
COMPUTERS -- Security -- Networking.
(1)
COMPUTERS -- System Administration -- Email Administration.
(1)
COMPUTERS -- System Administration -- Storage & Retrieval.
(1)
COMPUTERS -- System Administration -- Windows Administration.
(1)
COMPUTERS -- Web -- Site Design.
(1)
COMPUTERS -- Web -- User Generated Content.
(1)
Cartes de crédit.
(1)
Case studies.
(1)
Cities and towns -- Technological innovations.
(1)
Commercial crimes.
(1)
Component software.
(1)
Computational grids (Computer systems)
(1)
Computer Science.
(1)
Computer algorithms.
(1)
Computer architecture.
(1)
Computer crimes -- Investigation -- Handbooks, manuals, etc.
(1)
Computer crimes -- Investigation -- Methodology.
(1)
Computer crimes -- Investigation -- United States.
(1)
Computer crimes -- Investments.
(1)
Computer industry.
(1)
Computer networks -- Auditing.
(1)
Computer networks -- Design and construction.
(1)
Computer networks -- Remote access.
(1)
Computer networks -- Security measures -- Examinations, questions, etc.
(1)
Computer networks -- Security measures -- Fiction.
(1)
Computer networks -- Security measures -- Software.
(1)
Computer networks -- Security measures -- United States.
(1)
Computer networks -- Social aspects.
(1)
Computer networks -- Standards.
(1)
Computer networks Security measures
(1)
Computer programming.
(1)
Computer security -- Examinations -- Practice.
(1)
Computer security -- Fiction.
(1)
Computer security -- Handbooks, manuals, etc.
(1)
Computer security -- Management -- Handbooks, manuals, etc.
(1)
Computer security -- Testing.
(1)
Computer security -- United States.
(1)
Computer-assisted instruction -- Security measures.
(1)
Computers -- Security.
(1)
Computers and civilization -- Social aspects.
(1)
Computers.
(1)
Confidential business information.
(1)
Corporate culture.
(1)
Corporations -- Security measures.
(1)
Credit cards -- Security measures -- Standards -- Handbooks, manuals, etc.
(1)
Criminalistiek.
(1)
Cyber intelligence (Computer security)
(1)
Daha fazla
Tümünü genişlet
Daha az
Hepsini Daralt
Kütüphane
Dahil
Hariç
Başkent Kütüphanesi
Lokasyon
Dahil
Hariç
E-Kütüphane
Ebook Central
Elsevier E-Kitap Koleksiyonu
false
{sortLabel}
{alphabetical}
{relevance}
{include}
{exclude}
{facetName}
{results}
{displayName}
{count}
{error}
Eylem Seç
Ayırt
Listelerime ekle
Eposta
Yazdır
384 sonuç bulundu
1
..
28
29
30
31
32
Sırala:
Konuyla İlgili Sırala
Yayın Yılı (eskiden yeniye)
Yayın Yılı (yeniden eskiye)
Başlık
Yazar
OK
Eposta Adresleri
:
Phone Number:
Mobile Carrier:
AT&T
Boost
Nextel (Sprint)
Sprint (PCS)
T Mobile
TracFone
US Cellular
Verizon
Virgin
Select An Item
Data usage warning: You will receive one text message for each title you selected.
Standard text messaging rates apply.
Text it to me
Text it to me, and go to next item
000000000000
DEFAULTTR
Liste seç
Geçici Liste
Bunu varsayılan liste yap.
Öğeler başarıyla eklendi
Öğeler eklenirken hata oldu. Lütfen tekrar deneyiniz.
Hack proofing your network
373.
Hack proofing your network
by
Ahmad, David R. Mirza.
Click to View
Format:
Managing Cisco network security
374.
Managing Cisco network security
by
Danielyan, Edgar.
Click to View
Format:
Nokia Network security solutions handbook
375.
Nokia Network security solutions handbook
by
Maxwell, Douglas D.
Click to View
Format:
Introduction to communication electronic warfare systems
376.
Introduction to communication electronic warfare systems
by
Poisel, Richard.
Click to View
Format:
Network security jumpstart
377.
Network security jumpstart
by
Strebe, Matthew.
Click to View
Format:
Hack proofing your Web applications
378.
Hack proofing your Web applications
by
Traxler, Julie.
ScienceDirect
https://www.sciencedirect.com/science/book/9781928994312
Format:
Hack proofing Windows 2000
379.
Hack proofing Windows 2000
by
Todd, Chad.
Available from ScienceDirect. Online version available for university members only. This requires an institutional login off-campus
ScienceDirect
https://www.sciencedirect.com/science/book/9781931836494
Format:
Hack proofing Sun Solaris 8
380.
Hack proofing Sun Solaris 8
by
Miles, Wyman.
ScienceDirect
http://www.sciencedirect.com/science/book/9781928994442
Format:
Configuring ISA server 2000 building firewalls for windows 2000
381.
Configuring ISA server 2000 building firewalls for windows 2000
by
Shinder, Thomas W.
Click to View
Format:
Hack proofing Windows 2000
382.
Hack proofing Windows 2000
by
Todd, Chad.
Click to View
Format:
Hack proofing your wireless network
383.
Hack proofing your wireless network
by
Owens, Les.
Click to View
Format:
Trust in cyberspace
384.
Trust in cyberspace
by
Schneider, Fred B.
Click to View
Format:
Eylem Seç
Ayırt
Listelerime ekle
Eposta
Yazdır
1
..
28
29
30
31
32
Search Results
Elektronik Kaynaklar
Search Results
Elektronik Kaynaklar
OK
Eposta Adresleri
:
Phone Number:
Mobile Carrier:
AT&T
Boost
Nextel (Sprint)
Sprint (PCS)
T Mobile
TracFone
US Cellular
Verizon
Virgin
Select An Item
Data usage warning: You will receive one text message for each title you selected.
Standard text messaging rates apply.
Text it to me
Text it to me, and go to next item
Elektronik Kaynaklar
Sonuçlar alınıyor Elektronik Kaynaklar...
action