Giriş
|
Hesabım
|
Listelerim
|
|
Remember to clear the cache and close the browser window.
English
Search Limit
Bütün Kütüphaneler
Elektronik Kaynaklar
Hepsi
Başkent Üniversitesi Kütüphanesi
Anadolu OSB Meslek Yüksekokulu
Atasev Özel Koleksiyon
Erdoğan Tercan Koleksiyonu
Güzel Sanatlar ve Tasarım Arşivi
Kazan Meslek Yüksekokulu
Hukuk Koleksiyonu
Ord.Prof.Dr. Enver Ziya Karal Tarih Uygulama Ars.Mrk.
Özel Koleksiyon Serdar Özersin
Tez Koleksiyonu
Tüm Alanlar
Başlık
Yazar
Konu
ISBN
ISSN
19
Search Field
Tüm Alanlar
Arama:
Gelişmiş Arama
Search Results
Elektronik Kaynaklar
Arama Sonuçlarını Sınırlandır
Daraltılmış:
+
Lokasyon: Elsevier E-Kitap Koleksiyonu
+
Konu: Computer security.
Yazar
Dahil
Hariç
Foster, James C.
(6)
Long, Johnny.
(6)
Russell, Ryan, 1969-
(5)
Cross, Michael, 1965-
(4)
Beale, Jay.
(3)
Hurley, Chris.
(3)
Mullen, Timothy M.
(3)
Rittinghouse, John W.
(3)
Alder, Raven.
(2)
Carvey, Harlan A.
(2)
Clercq, Jan de, 1968-
(2)
Cole, Eric.
(2)
Contos, Brian T.
(2)
Cox, I. J. (Ingemar J.)
(2)
Hunter, Laura E.
(2)
Maynor, David.
(2)
Piltzecker, Tony, 1975-
(2)
Ransome, James F.
(2)
Ring, Sandra.
(2)
Sachs, Marcus H.
(2)
Shein, Rob.
(2)
Wiles, Jack.
(2)
XYPRO Technology Corporation.
(2)
'Ken'@ftu.
(1)
131ah.
(1)
Ahmad, David R. Mirza.
(1)
Alvarado, Ellen.
(1)
Amini, Rob.
(1)
Amoroso, Edward G.
(1)
Anderson, Brian (Brian James)
(1)
Andress, Jason.
(1)
Aquilina, James M.
(1)
Baker, Andrew R.
(1)
Barrett, Diane.
(1)
Baskin, Brian.
(1)
Bayles, Aaron W.
(1)
Bednarczyk, Michael.
(1)
Ben-Natan, Ron.
(1)
Bergstra, J. A.
(1)
Bhardwaj, Pawan K.
(1)
Bidwell, Teri.
(1)
Bin Azad, Tariq.
(1)
Black Hat Press (Goodhue, Minn.)
(1)
Bloom, Jeffrey A. (Jeffrey Adam), 1964-
(1)
Bonnell, Ralph.
(1)
Bradley, Tony, 1969-
(1)
Bray, Rory.
(1)
Brindley, Ed.
(1)
Burnett, Mark (Mark M.)
(1)
Burton, James.
(1)
Campara, Djenana.
(1)
Carroll, John M. (John Millar), 1925-
(1)
Carvey, Harlan.
(1)
Casco, Steven.
(1)
Casey, Eoghan.
(1)
Caswell, Brian.
(1)
Chaffin, Larry.
(1)
Cherry, Denny.
(1)
Cid, Daniel.
(1)
Cook, Randy (Randy R.)
(1)
Craig, Paul.
(1)
Devost, Matthew G.
(1)
Ellis, Juanita.
(1)
Ely, Adam.
(1)
Engebretson, Pat (Patrick Henry), 1974-
(1)
Erbschloe, Michael.
(1)
Esler, Joel.
(1)
Fair, Ted.
(1)
Foster, Stephen C.
(1)
Gregg, Michael (Michael C.)
(1)
Grillenmeier, Guido.
(1)
Haines, Brad.
(1)
Hancock, Bill, 1957-
(1)
Hay, Andrew.
(1)
Henmi, Anne.
(1)
Hill, Terri.
(1)
Honick, Ron.
(1)
Hsiao, David K., 1933-
(1)
Johnson, Norris L.
(1)
Kerr, Douglas S., author.
(1)
Kinney, Steven.
(1)
Kipper, Gregory.
(1)
Knapp, Eric.
(1)
Kraus, Rob.
(1)
Leeuw, Karl de.
(1)
Lin, Ching-Yung.
(1)
Liu, Dale.
(1)
Liu, Vincent.
(1)
Lynch, F. William.
(1)
Madnick, Stuart E., author.
(1)
Malin, Cameron H.
(1)
Mansourov, Nikolai.
(1)
Massimiliano, Oldani.
(1)
McClure, Stuart.
(1)
Metula, Erez.
(1)
Meyer, Greg.
(1)
Miles, Wyman.
(1)
Miller, Drew, 1978-
(1)
Miller, Matthew L.
(1)
Mitchell, Ed, 1945-
(1)
Mitnick, Kevin D. (Kevin David), 1963-
(1)
Mookhey, K. K.
(1)
Nordfelt, Michael.
(1)
Parker, Tom.
(1)
Perez, Richard, 1969 October 17-
(1)
Perla, Enrico.
(1)
Piccard, Paul L.
(1)
Pinzon, D. Scott.
(1)
Posluns, Jeffrey.
(1)
Potter, Bruce.
(1)
Price, Mike (Mike Morgan)
(1)
Qian, Yi, 1962-
(1)
Rash, Michael.
(1)
Rathaus, Noam.
(1)
Rogers, Russ.
(1)
Schiller, Craig A.
(1)
Shepherd, Matthew.
(1)
Shimonski, Robert.
(1)
Shinder, Debra Littlejohn, author.
(1)
Shinder, Debra Littlejohn. Scene of the cybercrime.
(1)
Speed, Tim.
(1)
Stanger, James.
(1)
Stapko, Timothy John.
(1)
Stefanek, George L.
(1)
Street, Jayson E.
(1)
Street, Jayson E. Dissecting the hack.
(1)
Taylor, Laura.
(1)
Timm, Carl.
(1)
Tittel, Ed, author.
(1)
Todd, Chad.
(1)
Traxler, Julie.
(1)
Tyson, Dave.
(1)
Varsalone, Jesse.
(1)
Watkins, Stephen (Information security professional)
(1)
Wilson, Connie.
(1)
Winkler, Ira.
(1)
Winkler, J. R. (Joachim R.)
(1)
Wotring, Brian.
(1)
Wright., Michael.
(1)
Wyler, Neil R.
(1)
Yu, Hong Heather, 1967-
(1)
Zelkowitz, Marvin V., 1945-
(1)
Zeng, Wenjun, 1967-
(1)
Daha fazla
Tümünü genişlet
Daha az
Hepsini Daralt
Materyal Türü
Dahil
Hariç
E-Kitap
Dil
Dahil
Hariç
English
(106)
Yayın Yılı
Dahil
Hariç
-
2007
(19)
2006
(14)
2005
(13)
2008
(12)
2004
(11)
2010
(10)
2011
(8)
2002
(7)
2003
(6)
2001
(4)
1979
(1)
1987
(1)
2009
(1)
Daha fazla
Tümünü genişlet
Daha az
Hepsini Daralt
Konu
Dahil
Hariç
Electronic books.
(106)
COMPUTERS -- Internet -- Security.
(60)
COMPUTERS -- Networking -- Security.
(60)
COMPUTERS -- Security -- General.
(60)
Computer networks -- Security measures.
(47)
Hackers.
(11)
Internet -- Security measures.
(8)
Computer crimes -- Investigation.
(6)
Computer crimes.
(6)
Microsoft Windows (Computer file)
(6)
Computer security -- Fiction.
(5)
Computer security -- Handbooks, manuals, etc.
(5)
Data protection.
(5)
Fiction.
(5)
Hackers -- Fiction.
(5)
Handbooks and manuals.
(5)
Computer crimes -- Prevention.
(4)
Computer viruses.
(4)
Cyberterrorism.
(4)
Database security.
(4)
FICTION -- General.
(4)
Andre fag (naturvidenskab og teknik) Andre fag
(3)
Client/server computing -- Security measures.
(3)
Computers -- Access control.
(3)
Firewalls (Computer security)
(3)
LAW -- Forensic Science.
(3)
Microsoft Windows server.
(3)
Operating systems (Computers)
(3)
Short stories.
(3)
Wireless communication systems -- Security measures.
(3)
BUSINESS & ECONOMICS -- Corporate Governance.
(2)
BUSINESS & ECONOMICS -- Leadership.
(2)
BUSINESS & ECONOMICS -- Organizational Development.
(2)
BUSINESS & ECONOMICS -- Workplace Culture.
(2)
COMPUTERS -- Security -- Cryptography.
(2)
COMPUTERS -- Security -- Viruses.
(2)
Client/server computing.
(2)
Computer hackers.
(2)
Computer networks.
(2)
Computerbeveiliging.
(2)
Computercriminaliteit.
(2)
Computersicherheit
(2)
Cyberterrorism -- Fiction.
(2)
Digital watermarking.
(2)
Electronic book.
(2)
Electronic data processing departments -- Security measures.
(2)
Electronic mail messages -- Security measures.
(2)
Embedded computer systems.
(2)
Engineering & Applied Sciences.
(2)
Forensic sciences.
(2)
Hewlett-Packard computers -- Security measures.
(2)
Instant messaging -- Security measures.
(2)
Open source software.
(2)
SQL server.
(2)
Security systems.
(2)
Spyware (Computer software)
(2)
TRUE CRIME -- White Collar Crime.
(2)
United States.
(2)
Virtual computer systems -- Security measures.
(2)
Web servers -- Security measures.
(2)
Web sites -- Security measures.
(2)
Acquisition of computer software.
(1)
Agents intelligents (Logiciels)
(1)
Application software -- Security measures.
(1)
BUSINESS & ECONOMICS -- Business Writing.
(1)
BUSINESS & ECONOMICS -- Industrial Management.
(1)
BUSINESS & ECONOMICS -- Management Science.
(1)
BUSINESS & ECONOMICS -- Management.
(1)
BUSINESS & ECONOMICS -- Organizational Behavior.
(1)
Bases de données -- Sécurité -- Mesures.
(1)
Business enterprises -- Security measures.
(1)
COMPUTER INFORMATION SECURITY.
(1)
COMPUTERS -- Digital Media -- General.
(1)
COMPUTERS -- Hardware -- Handheld Devices.
(1)
COMPUTERS -- Hardware -- Personal Computers -- General.
(1)
COMPUTERS -- Hardware -- Personal Computers -- Macintosh.
(1)
COMPUTERS -- Hardware -- Personal Computers -- PCs.
(1)
COMPUTERS -- Interactive & Multimedia.
(1)
COMPUTERS -- Microprocessors.
(1)
COMPUTERS -- Online Services.
(1)
COMPUTERS -- Operating Systems -- DOS.
(1)
COMPUTERS -- Operating Systems -- General.
(1)
COMPUTERS -- Operating Systems -- Macintosh.
(1)
COMPUTERS -- Operating Systems -- Windows Server & NT.
(1)
COMPUTERS -- Operating Systems -- Windows Workstation.
(1)
COMPUTERS -- Security -- Networking.
(1)
COMPUTERS -- System Administration -- Storage & Retrieval.
(1)
COMPUTERS -- System Administration -- Windows Administration.
(1)
COMPUTERS -- Web -- Site Design.
(1)
COMPUTERS -- Web -- User Generated Content.
(1)
Case studies.
(1)
Centres de traitement de l'information -- Sûreté -- Mesures.
(1)
Citrix MetaFrame.
(1)
Cloud computing.
(1)
ColdFusion.
(1)
Common Language Runtime.
(1)
Component software.
(1)
Computer Science.
(1)
Computer crimes -- Case studies.
(1)
Computer crimes -- Fiction.
(1)
Computer crimes -- Investigation -- Handbooks, manuals, etc.
(1)
Computer crimes -- Investigation -- Methodology.
(1)
Computer crimes -- Investigation -- United States -- Methodology.
(1)
Computer networks -- Access control.
(1)
Computer networks -- Reliability.
(1)
Computer networks -- Security measures -- Fiction.
(1)
Computer networks -- Security measures -- Handbooks, manuals, etc.
(1)
Computer science.
(1)
Computer security
(1)
Computer security -- History.
(1)
Computer security -- United States.
(1)
Computer software -- Testing.
(1)
Computer viruses -- Identification.
(1)
Computers -- Access control -- Passwords.
(1)
Copyright -- History.
(1)
Copyright.
(1)
Criminalistiek.
(1)
Cryptography -- History.
(1)
Cryptography.
(1)
Cyberterrorism -- Prevention.
(1)
Cyberterrorism -- United States -- Prevention.
(1)
DATA STORAGE.
(1)
DATA SYSTEMS.
(1)
Data encryption (Computer science)
(1)
Databescherming.
(1)
Electrical & Computer Engineering.
(1)
Electronic data processing departments Security measures
(1)
Electronic mail systems -- Security measures.
(1)
Field guides.
(1)
Forensic sciences -- Handbooks, manuals, etc.
(1)
Google.
(1)
Hackers -- Psychology -- Fiction.
(1)
Hackers -- Psychology.
(1)
History.
(1)
INFORMATION RETRIEVAL.
(1)
Identification cards -- Forgeries.
(1)
Identity theft -- Fiction.
(1)
Identity theft.
(1)
Impostors and imposture.
(1)
Industries -- Security measures.
(1)
Information resources management.
(1)
Information technology -- Security measures.
(1)
Information technology.
(1)
Intellectual property.
(1)
Internet fraud.
(1)
Internet programming.
(1)
Internet.
(1)
Intrusion detection systems (Computer security)
(1)
Langages de programmation -- Guides, manuels, etc.
(1)
Linux.
(1)
MULTIPLE ACCESS.
(1)
Malware (Computer software) -- Prevention.
(1)
Metasploit (Electronic resource)
(1)
Microsoft Windows (Computer file) -- Security measures.
(1)
Microsoft Windows.
(1)
Microsoft software -- Security measures -- Handbooks, manuals, etc.
(1)
Multimedia systems -- Security measures.
(1)
National security -- United States.
(1)
National security.
(1)
OSSEC (Computer file)
(1)
Online social networks -- Security measures.
(1)
Operating systems (Computers) -- Security measures.
(1)
Operations systems (Computer)
(1)
Ordinateurs -- Accès -- Contrôle.
(1)
POLITICAL SCIENCE -- Political Freedom & Security -- Terrorism.
(1)
Peer-to-peer architecture (Computer networks)
(1)
Process control -- Security measures.
(1)
Programming languages (Electronic computers)
(1)
Programming languages (Electronic computers) -- Handbooks, manuals, etc.
(1)
Protection de l'information (Informatique)
(1)
Protection de l'information (Informatique) -- Guides, manuels, etc.
(1)
Risk management.
(1)
Rootkits (Computer software)
(1)
Réseaux d'ordinateurs -- Sécurité -- Mesures.
(1)
Réseaux d'ordinateurs.
(1)
Short stories
(1)
Short stories, American -- 21st century.
(1)
Short stories, American.
(1)
Sites Web -- Sécurité -- Mesures.
(1)
Snort (Computer file)
(1)
Snort (Software)
(1)
Snort 2.0
(1)
Solaris (Computer file)
(1)
Spam filtering (Electronic mail)
(1)
Suspense fiction.
(1)
Systèmes informatiques -- Sécurité -- Mesures -- Guides, manuels, etc.
(1)
Systèmes informatiques -- Sécurité -- Mesures.
(1)
TECHNOLOGY & ENGINEERING -- Industrial Engineering.
(1)
Telecommunications.
(1)
Transmission sans fil.
(1)
UNIX Shells.
(1)
Virus informatiques.
(1)
Web 2.0 -- Security measures.
(1)
Web search engines.
(1)
Web sites -- Design.
(1)
Wireless LANs -- Security measures.
(1)
World Wide Web -- Security measures.
(1)
XML (Document markup language)
(1)
Überwachung
(1)
Daha fazla
Tümünü genişlet
Daha az
Hepsini Daralt
Kütüphane
Dahil
Hariç
Başkent Kütüphanesi
false
{sortLabel}
{alphabetical}
{relevance}
{include}
{exclude}
{facetName}
{results}
{displayName}
{count}
{error}
Arama Sonuçları için sonuç bulunamadı
Diğer Kütüphaneler'a geç
Search Results
Elektronik Kaynaklar
Search Results
Elektronik Kaynaklar
Elektronik Kaynaklar
Sonuçlar alınıyor Elektronik Kaynaklar...
action