Giriş
|
Hesabım
|
Listelerim
|
|
Remember to clear the cache and close the browser window.
English
Search Limit
Bütün Kütüphaneler
Elektronik Kaynaklar
Hepsi
Başkent Üniversitesi Kütüphanesi
Anadolu OSB Meslek Yüksekokulu
Atasev Özel Koleksiyon
Erdoğan Tercan Koleksiyonu
Güzel Sanatlar ve Tasarım Arşivi
Kazan Meslek Yüksekokulu
Hukuk Koleksiyonu
Ord.Prof.Dr. Enver Ziya Karal Tarih Uygulama Ars.Mrk.
Özel Koleksiyon Serdar Özersin
Tez Koleksiyonu
Tüm Alanlar
Başlık
Yazar
Konu
ISBN
ISSN
14
Search Field
Tüm Alanlar
Arama:
Gelişmiş Arama
Search Results
Elektronik Kaynaklar
Arama Sonuçlarını Sınırlandır
Daraltılmış:
+
Library: Başkent Kütüphanesi
+
Lokasyon: Ebook Central
+
Konu: Computer security.
Yazar
Dahil
Hariç
ProQuest (Firm)
(196)
Fourastier, Yannick, editor.
(11)
Piètre-Cambacédès, Ludovic, editor.
(11)
International Business Machines Corporation. International Technical Support Organization.
(10)
Foster, James C.
(5)
Calder, Alan, author.
(4)
Limbert, Matthew, designer.
(4)
Rayns, Chris.
(4)
Shinder, Thomas W.
(4)
Buchanan, Cameron, author.
(3)
Carvey, Harlan A.
(3)
Katsaropoulos, Chris, editor.
(3)
Long, Johnny.
(3)
Rogers, Mark, designer.
(3)
Shinder, Debra Littlejohn.
(3)
Boulanger, Jean-Louis.
(2)
Chandramouli, Ramaswamy.
(2)
Cherry, Denny.
(2)
Cole, Eric.
(2)
Dalziel, Henry, author.
(2)
Dalziel, Henry, editor.
(2)
Erickson, Jon, 1977-
(2)
Ferraiolo, David.
(2)
Fourastier, Yannick, author.
(2)
Goodman, Seymour E.
(2)
Grasdal, Martin.
(2)
Hunter, Laura E.
(2)
Hurley, Chris.
(2)
Hutchens, Justin, author.
(2)
Koh.
(2)
Krutz, Ronald L.
(2)
Kuhn, D. Richard.
(2)
Moskowitz, Jeremy.
(2)
Oppliger, Rolf.
(2)
Pietre-Cambacedes, Ludovic, author.
(2)
Piltzecker, Tony, 1975-
(2)
Ramachandran, Vivek, author.
(2)
Ramirez, Gilbert.
(2)
Ring, Sandra.
(2)
Vacca, John R.
(2)
Wheeler, Evan.
(2)
Wiles, Jack.
(2)
Wyler, Neil R.
(2)
Young, Carl S., author.
(2)
Zalewski, Michal.
(2)
AXELOS Limited, author.
(1)
Abbadi, Imad M., author.
(1)
Ablon, Lillian, author.
(1)
Agre, Philip.
(1)
Alam, Shahnawaz, author.
(1)
Alcover, Jorge Blanco.
(1)
Alexander, Philip, 1963-
(1)
American Evaluation Association.
(1)
Amini, Rob.
(1)
Andress, Jason, author.
(1)
Andrés, Steven.
(1)
Antón, Philip S.
(1)
Anzaldua, Reynaldo.
(1)
Aquilina, James M.
(1)
Aquilina, James, author.
(1)
Archibald, Neil.
(1)
Arnold, Michael (Michael Konrad), 1964-
(1)
Arvanitis, Nicholas, editor.
(1)
Ashenden, Debi.
(1)
Assam, Tarek.
(1)
Axelrod, C. Warren.
(1)
Baker, Paul R., 1958-
(1)
Barnett, Ryan C.
(1)
Basagiannis, Stylianos, contributor.
(1)
Baskerville, Richard.
(1)
Baskin, Brian, author.
(1)
Baskin, Brian.
(1)
Bayles, Aaron W.
(1)
Bayuk, Jennifer L.
(1)
Beale, Jay.
(1)
Beaver, Kevin.
(1)
Belapurkar, Abhijit.
(1)
Ben-Ari, Erez.
(1)
Ben-Natan, Ron.
(1)
Bennett, Eleanor Leonne, cover designer.
(1)
Benny, Daniel J.
(1)
Berghe, Thierry van den, author.
(1)
Bertino, Elisa.
(1)
Bhalla, Nish.
(1)
Bhunia, Swarup, author.
(1)
Bianco, David J., 1971-
(1)
Binnie, Christopher, author.
(1)
Blair, John, author.
(1)
Blobel, Bernd.
(1)
Bolt, Steven.
(1)
Bonertz, Tina.
(1)
Bradley, Jaron, author.
(1)
Bradley, Tony.
(1)
Brathwaite, Shimon, author.
(1)
Breimeier, Johannes.
(1)
Brennen, Jerod, editor.
(1)
Brewer, Jacqueline, editor.
(1)
Brindley, Ed.
(1)
Brooks, Hugh.
(1)
Brotby, W. Krag.
(1)
Bruchez, Rudi.
(1)
Bullock, Jessey, author.
(1)
Burke, Josh.
(1)
Burnett, Mark (Mark M.)
(1)
Burnett, Mark.
(1)
Bücker, Axel.
(1)
Cabric, Marko, author.
(1)
Calder, Alan.
(1)
Calderon Pale, Paulino.
(1)
Caloyannides, Michael A.
(1)
Caloyannides, Michael A. Computer forensics and privacy.
(1)
Cantrell, Christopher.
(1)
Carbone, Fernando, author.
(1)
Cardwell, Kevin, author.
(1)
Carvey, Harlan A., author.
(1)
Carvey, Harlan, author.
(1)
Casey, Eoghan, author.
(1)
Casey, Eoghan.
(1)
Caswell, Brian.
(1)
Cesario, Cristiano.
(1)
Chaffin, Larry.
(1)
Chapman, Chris, author.
(1)
Chikofsky, Elliot J.
(1)
Choi, Kyung-shick, 1973-
(1)
Chuvakin, Anton A.
(1)
Clark, Gregory, author.
(1)
Clarke, Justin.
(1)
Clercq, Jan de, 1968-
(1)
Coburn, Andrew (Andrew W.), author.
(1)
Cole, Eric, author.
(1)
Conti, Greg.
(1)
Contos, Brian T.
(1)
Cook, Jim, 1944-
(1)
Couretas, Jerry M., 1966- author.
(1)
Cox, I. J. (Ingemar J.)
(1)
Cross, Michael, 1965-
(1)
Cross, Michael.
(1)
Cruz, Maria Ines, cover designer.
(1)
Cruz, Maria Ines, designer.
(1)
Cyborski, Shannon, author.
(1)
C̆ervĕn, Pavol.
(1)
D'Arcy, John P., 1975-
(1)
Dai, Yuan-Shun.
(1)
Dattani, Dinesh D.
(1)
Day, Graham, 1945- author.
(1)
DeMott, Jared.
(1)
Delfanti, Alessandro.
(1)
Dent, Alexander W.
(1)
Deraison, Renaud.
(1)
Dhali, Maruf Ahmed, cover designer.
(1)
Dhillon, Gurpreet.
(1)
Diogenes, Yuri.
(1)
Dolev, Ran.
(1)
Donaldson, Scott E., author.
(1)
Eilam, Eldad.
(1)
Ejzyn, Alain, author.
(1)
Esparza, Javier.
(1)
Essaaidi, Mohamed.
(1)
European Commission. Information Society DG.
(1)
Evergreen, Stephanie.
(1)
Fabbri, Rosato.
(1)
Fahy, Bob, editor.
(1)
Fair, Ted.
(1)
Fernandez-Medina, Eduardo.
(1)
Ficco, Massimo, editor.
(1)
Fichera, Joe, 1966-
(1)
Filip, Werner.
(1)
Fionov, Andrey.
(1)
Forristal, Jeff.
(1)
Foster, James.
(1)
Foster, Stephen C.
(1)
Fowler, Kevvie, author.
(1)
Franco, Pedro, author.
(1)
Friedman, Beth, editor.
(1)
Fuller, Ed.
(1)
Furnell, Steve, editor.
(1)
Furnell, Steven, 1970-
(1)
Gallo, Timonthy, editor.
(1)
Galvan, Karla.
(1)
Gantz, Stephen D.
(1)
Gavrilenko, K., author.
(1)
Gehrmann, Christian.
(1)
Geiselhart, Gregory.
(1)
Ginodman, Veniamin, editor.
(1)
Goldstein, Emmanuel J.
(1)
Gomzin, Slava.
(1)
González, Belén.
(1)
Gore, Bruce, cover designer.
(1)
Govindaradjane, Punithavathy, contributor.
(1)
Grillenmeier, Guido.
(1)
Grimes, Roger A., author.
(1)
Gritzalis, Stefanos.
(1)
Grumberg, Orna.
(1)
Gruschka, Nils.
(1)
Guerrier, Claudine, author.
(1)
Gupta, Aditya, author.
(1)
Gupta, Ravi.
(1)
Guzman, Aaron, author.
(1)
Hadnagy, Christopher.
(1)
Hancock, Bill, 1957-
(1)
Daha fazla
Tümünü genişlet
Daha az
Hepsini Daralt
Materyal Türü
Dahil
Hariç
E-Kitap
Dil
Dahil
Hariç
English
(318)
French
(14)
German
(3)
Yayın Yılı
Dahil
Hariç
-
2015
(40)
2013
(35)
2014
(28)
2005
(23)
2012
(22)
2016
(22)
2004
(21)
2006
(16)
2010
(16)
2003
(15)
2007
(15)
2011
(14)
2017
(13)
2008
(11)
2019
(11)
2002
(10)
2018
(7)
2001
(6)
2009
(5)
2000
(2)
1991
(1)
1997
(1)
2020
(1)
Daha fazla
Tümünü genişlet
Daha az
Hepsini Daralt
Konu
Dahil
Hariç
Electronic books.
(335)
Computer networks -- Security measures.
(109)
Data protection.
(34)
Internet -- Security measures.
(18)
Computer hackers.
(14)
Computers -- Access control.
(13)
Microsoft Windows (Computer file)
(11)
Data encryption (Computer science)
(10)
Business enterprises -- Computer networks -- Security measures.
(9)
Operating systems (Computers)
(9)
Computer crimes.
(8)
Cryptography.
(8)
Computer crimes -- Prevention.
(7)
Information technology -- Security measures.
(7)
Database security.
(6)
Computer crimes -- Investigation.
(5)
Cyberterrorism -- Prevention.
(5)
Malware (Computer software)
(5)
Security systems.
(5)
Cloud computing -- Security measures.
(4)
Cloud computing.
(4)
Computer networks -- Access control.
(4)
Computer viruses.
(4)
Cyberspace -- Security measures.
(4)
Firewalls (Computer security)
(4)
Client/server computing.
(3)
Computer crimes -- Investigation -- United States -- Methodology.
(3)
Computer software -- Development.
(3)
Computers -- Access control -- Passwords.
(3)
Corporations -- Security measures.
(3)
Data mining.
(3)
Digital watermarking.
(3)
Directory services (Computer network technology)
(3)
Electronic information resources -- Access control.
(3)
Embedded computer systems.
(3)
Forensic sciences.
(3)
Linux.
(3)
Microsoft Windows (Computer file) -- Security measures.
(3)
Microsoft Windows server.
(3)
Privacy, Right of.
(3)
Python (Computer program language)
(3)
Risk management.
(3)
Software configuration management.
(3)
World Wide Web -- Security measures.
(3)
z/OS.
(3)
Application software -- Security measures.
(2)
Business enterprises -- Security measures.
(2)
Citrix MetaFrame.
(2)
Client/server computing -- Security measures.
(2)
Computer science.
(2)
Computer software -- Reliability.
(2)
Debugging in computer science.
(2)
Electronic commerce -- Security measures.
(2)
Electronic data processing departments -- Auditing.
(2)
Hacking.
(2)
IBM software.
(2)
Information technology -- Auditing.
(2)
Information technology -- Management.
(2)
Information visualization.
(2)
Internet -- Safety measures.
(2)
Internet and children.
(2)
Internet searching.
(2)
Intrusion detection systems (Computer security)
(2)
Mac OS.
(2)
Microsoft ISA server.
(2)
National security.
(2)
Open source software.
(2)
Penetration testing (Computer security)
(2)
Process control -- Security measures.
(2)
Reverse engineering.
(2)
Risk assessment.
(2)
SQL server.
(2)
Social media.
(2)
Spyware (Computer software)
(2)
Terrorism -- Prevention.
(2)
Wireless communication systems -- Security measures.
(2)
AIX (Computer file)
(1)
Acquisition of computer software.
(1)
Algebra, Boolean.
(1)
Altre visioni. Solaris.
(1)
Application software.
(1)
Archives -- Safety measures.
(1)
Artificial intelligence.
(1)
Automatic machinery -- Security measures.
(1)
Avionics -- Safety measures.
(1)
BEA WebLogic server.
(1)
Big data -- Security measures.
(1)
Bluetooth technology -- Security measures.
(1)
Bluetooth technology.
(1)
Browsers (Computer programs)
(1)
Business enterpri -- Computer networks -- Security measures.
(1)
Business planning.
(1)
CORBA (Computer architecture)
(1)
Cocoa (Application development environment)
(1)
ColdFusion.
(1)
Commercial crimes.
(1)
Computer Security
(1)
Computer architecture.
(1)
Computer crimes -- Case studies.
(1)
Computer crimes -- Investigation -- United States.
(1)
Computer crimes -- Investments.
(1)
Computer hackers -- Fiction.
(1)
Computer network protocols.
(1)
Computer networks -- Certification.
(1)
Computer networks -- Design and construction.
(1)
Computer networks -- Examinations -- Study guides.
(1)
Computer networks -- Planning.
(1)
Computer networks -- Reliability.
(1)
Computer networks -- Security measures -- Standards.
(1)
Computer networks -- Security measures -- United States.
(1)
Computer networks.
(1)
Computer programming.
(1)
Computer security -- Fiction.
(1)
Computer security -- Forecasting.
(1)
Computer security -- United States.
(1)
Computer security -- Vocational guidance.
(1)
Computer simulation.
(1)
Computer software -- Evaluation.
(1)
Computer systems -- Reliability.
(1)
Computers -- Access control -- Standards.
(1)
Computers -- Reliability.
(1)
Confidential business information.
(1)
Corporate culture.
(1)
Corporations -- Corrupt practices.
(1)
Cryptography -- Mathematics.
(1)
Cryptography -- Standards.
(1)
Cyberinfrastructure -- Security measures.
(1)
Cyberinfrastructure.
(1)
Cyberterrorism.
(1)
Data protection -- Security measures.
(1)
Data protection -- Standards.
(1)
Database design.
(1)
Distributed operating systems (Computers)
(1)
Educational technology -- Security measures.
(1)
Electronic data processing -- Backup processing alternatives.
(1)
Electronic data processing -- Distributed processing -- Security measures.
(1)
Electronic data processing -- Distributed processing.
(1)
Electronic data processing departments -- Contracting out.
(1)
Electronic data processing departments -- Security measures.
(1)
Electronic mail systems -- Security measures.
(1)
Electronic records -- Conservation and restoration.
(1)
Electronic records.
(1)
Electronic surveillance.
(1)
Emergency management -- Planning.
(1)
Encryption
(1)
Fraud investigation.
(1)
Future of Privacy
(1)
Groupware (Computer software)
(1)
Hackers.
(1)
Hashing (Computer science)
(1)
Hewlett-Packard computers -- Security measures.
(1)
Human-computer interaction.
(1)
IBM Cluster systems management.
(1)
IBM Database 2.
(1)
IBM computers -- Programming.
(1)
IBM computers.
(1)
IEEE 802.11 (Standard)
(1)
Industrial safety -- Management.
(1)
Information Assurance
(1)
Information Exchange
(1)
Information policy -- European Union countries.
(1)
Information resources management -- Security measures.
(1)
Information resources management.
(1)
Information storage and retrieval systems -- Business -- Security measures.
(1)
Information technology -- Certification.
(1)
Information technology -- Standards.
(1)
Information technology.
(1)
Information warfare.
(1)
Instant messaging.
(1)
Intellectual property.
(1)
Internet -- Access control.
(1)
Internet -- Law and legislation.
(1)
Internet domain names.
(1)
Internet of things -- Security measures.
(1)
Internet of things.
(1)
Internet programming.
(1)
Internet.
(1)
Java (Computer program language)
(1)
Kali Linux.
(1)
Languages, Artificial.
(1)
Libraries -- Safety measures.
(1)
Library information networks -- Security measures.
(1)
Linux -- Examinations -- Study guides.
(1)
Macintosh (Computer) -- Programming.
(1)
Management information systems.
(1)
Medical informatics.
(1)
Medical records -- Access control.
(1)
Medical records -- Data processing.
(1)
Microsoft Forefront.
(1)
Microsoft Windows (Computer file) -- Examinations -- Study guides.
(1)
Multidisciplinary design optimization.
(1)
Multimedia systems -- Security measures.
(1)
Narraciones solaris.
(1)
Network Security
(1)
Network performance (Telecommunication)
(1)
Online social networks -- Safety measures.
(1)
Online social networks -- Security measures.
(1)
Online social networks.
(1)
Open source intelligence.
(1)
Oracle (Computer file)
(1)
Daha fazla
Tümünü genişlet
Daha az
Hepsini Daralt
false
{sortLabel}
{alphabetical}
{relevance}
{include}
{exclude}
{facetName}
{results}
{displayName}
{count}
{error}
Arama Sonuçları için sonuç bulunamadı
Diğer Kütüphaneler'a geç
Search Results
Elektronik Kaynaklar
Search Results
Elektronik Kaynaklar
Elektronik Kaynaklar
Sonuçlar alınıyor Elektronik Kaynaklar...
action