Log In
|
My Account
|
My Lists
|
|
Remember to clear the cache and close the browser window.
Search Limit
Everything
E-Book
Journals
Beytepe Library
Health Sciences Library
Conservatory Library
Law Library
Social Sciences Vocational High School
DVD Collection
Prof.Dr. Onur Bilge Kula Collection
Rooms Restriction Values
All Fields
Title
Author
Subject
ISBN
ISSN
8
Search Field
All Fields
Target Value
Limit Value
Restriction Value
Search For:
Advanced Search
Limit Search Results
Narrowed by:
+
Library: Online Library
Author
Include
Exclude
Deibert, Ronald.
(2)
Baş, Esra, author.
(1)
Blask, Chris.
(1)
Bodmer, Sean.
(1)
Bradley, Tony, 1969-
(1)
Brown, Edwin Lyle., author.
(1)
Burnett, Mark.
(1)
Carvey, Harlan A.
(1)
Cherry, Denny.
(1)
Clark, Champ, III.
(1)
Davis, Michael A.
(1)
Dong, Qiuxiang.
(1)
Fadyushin, Vyacheslav.
(1)
Faircloth, Jeremy, author.
(1)
Faircloth, Jeremy.
(1)
Gaetjen, Scott.
(1)
Graff, Mark, contributor.
(1)
Grimes, Roger A., author.
(1)
Harper, Allen.
(1)
Harris, Shon.
(1)
Hatch, Brian. Hacking Linux exposed.
(1)
Hayes, Patrick author.
(1)
Henry, Kevin, contributor.
(1)
Hoover, Christopher, contributor.
(1)
Howard, Michael, 1965-
(1)
Howard, Patrick D., author.
(1)
Huang, Dijiang.
(1)
ISECOM (Organization)
(1)
Jahangir, Hamza.
(1)
Katz, Jonathan, author.
(1)
Kleiman, Dave.
(1)
Knox, David (David C.)
(1)
LaRock, Thomas.
(1)
LeBlanc, David, 1960-
(1)
LeMasters, Aaron.
(1)
Long, Johnny.
(1)
Malisow, Ben, contributor.
(1)
McClure, Stuart.
(1)
Menezes, Alfred J., author.
(1)
Metula, Erez.
(1)
Miller, David, 1959 Nov. 5-
(1)
Murphy, Sean, contributor.
(1)
Muth, Tyler.
(1)
Norman, Thomas L.
(1)
Norman, Thomas, CSC.
(1)
Oakes, Charles, contributor.
(1)
POHLMAN, MARLIN B.
(1)
Pajari, George, contributor.
(1)
Parker, Jeff T., contributor.
(1)
Pathan, Al-Sakib Khan, editor.
(1)
Project Muse.
(1)
Rash, Michael (Michael Brandon)
(1)
Richter, Andy, author.
(1)
Rogers, Russ.
(1)
Rountree, Derrick.
(1)
Sack, Patrick.
(1)
Scambray, Joel.
(1)
Scheidel, Jeff.
(1)
ScienceDirect (Online service)
(1)
Seidl, David, contributor.
(1)
Taylor and Francis.
(1)
Tiller, James S., author.
(1)
Todorov, Dobromir., author.
(1)
VanDyke, Stephen.
(1)
Vanstone, Scott A., author.
(1)
Vasquez, Mike, contributor.
(1)
Vaswani, Vikram.
(1)
Viega, John.
(1)
Wark, Richard.
(1)
Warsinske, John, author.
(1)
Wise, Bryan.
(1)
Wood, Jeremy, author.
(1)
Zhu, Yan (Professor of computer security)
(1)
van Oorschot, Paul C., author.
(1)
More
View All
Fewer
Collapse All
Language
Include
Exclude
English
(37)
Publication Date
Include
Exclude
-
2011
(10)
2007
(4)
2006
(3)
2013
(3)
2008
(2)
2014
(2)
2017
(2)
1997
(1)
2004
(1)
2005
(1)
2010
(1)
2012
(1)
2015
(1)
2018
(1)
2019
(1)
2020
(1)
2021
(1)
2025
(1)
2026
(1)
More
View All
Fewer
Collapse All
Subject
Include
Exclude
Computers -- Access control.
(29)
Computer security.
(19)
Computer networks -- Security measures.
(17)
Database security.
(5)
Computer hackers.
(4)
Electronic books.
(4)
Computers -- Access control -- Passwords.
(3)
Cryptography.
(3)
Oracle (Computer file)
(3)
Penetration testing (Computer security)
(3)
Administrative agencies -- Information resources management -- Security measures -- United States -- Examinations -- Study guides.
(2)
Computer network protocols.
(2)
Computer networks -- Security measures -- Examinations -- Study guides.
(2)
Computer networks -- Security measures -- Testing.
(2)
Computers -- Access control -- Examinations -- Study guides.
(2)
Data protection.
(2)
Database management.
(2)
Information storage and retrieval systems -- Security measures.
(2)
Rootkits (Computer software)
(2)
Web servers -- Security measures.
(2)
Administration publique -- Gestion de l'information -- États-Unis -- Sécurité -- Mesures -- Examens -- Guides de l'étudiant.
(1)
Application logging (Computer science)
(1)
BUSINESS & ECONOMICS -- Industrial Management.
(1)
BUSINESS & ECONOMICS -- Management Science.
(1)
BUSINESS & ECONOMICS -- Management.
(1)
BUSINESS & ECONOMICS -- Organizational Behavior.
(1)
Berkeley BSD (Computer file)
(1)
Bilgi birikim ve erişim sistemleri -- Güvenlik önlemleri.
(1)
Bilgisayar ağları -- Güvenlik önlemleri.
(1)
Business -- Data processing.
(1)
Business intelligence -- Data processing.
(1)
C (Computer program language)
(1)
COMPUTERS -- Security -- Cryptography.
(1)
COMPUTERS / Cryptography
(1)
COMPUTERS / Database Management / Data Mining
(1)
COMPUTERS / Networking / Security
(1)
COMPUTERS / Operating Systems / General.
(1)
COMPUTERS / Security / General
(1)
COMPUTERS / Security / General.
(1)
Censuur.
(1)
Client/server computing.
(1)
Common Language Runtime (Computer science)
(1)
Computer Security
(1)
Computer Security.
(1)
Computer networks -- Access control.
(1)
Computer networks -- Security measures
(1)
Computer networks -- Security measures -- Examinations
(1)
Computer networks -- Security measures -- Standards.
(1)
Computer security -- Asia.
(1)
Computers -- Access control -- Asia.
(1)
Computers -- Access control -- Handbooks, manuals, etc.
(1)
Computers -- Access control -- Standards.
(1)
Computers -- Access control -- Testing
(1)
Computers -- Access control -- Testing.
(1)
Cryptographie.
(1)
Cryptography
(1)
Cryptography -- Handbooks, manuals, etc.
(1)
Cyberspace -- Government policy -- Asia.
(1)
Data encryption (Computer science)
(1)
Data protection -- Law and legislation.
(1)
Data recovery (Computer science)
(1)
Data transmission systems -- Security measures.
(1)
Databases.
(1)
Electronic information resources -- Access control.
(1)
Electronic mail systems -- Security measures.
(1)
False personation -- Prevention.
(1)
Filtering (signalen)
(1)
Firewalls (Computer security)
(1)
Guides de l'étudiant.
(1)
Hackers
(1)
Hackers.
(1)
Hacking
(1)
Hacking.
(1)
Identification.
(1)
Information technology -- Security measures.
(1)
Information technology.
(1)
Internet -- Censorship -- Asia.
(1)
Internet -- Censorship.
(1)
Internet -- Government policy -- Asia.
(1)
Internet -- Government policy.
(1)
Internet -- Security measures.
(1)
Internet.
(1)
Linux.
(1)
Malware (Computer software)
(1)
Medienfreiheit.
(1)
Microsoft Windows (Computer file)
(1)
Middleware.
(1)
MySQL (Electronic resource)
(1)
Open source software.
(1)
Oracle Application express.
(1)
Ordinateurs -- Accès -- Contrôle -- Examens -- Guides de l'étudiant.
(1)
Overheidsbeleid.
(1)
Piratage informatique.
(1)
Pirates informatiques.
(1)
Public key infrastructure (Computer security)
(1)
Radio frequency identification systems.
(1)
Relational databases.
(1)
Réseaux d'ordinateurs -- Sécurité -- Mesures -- Examens -- Guides de l'étudiant.
(1)
Réseaux d'ordinateurs -- Sécurité -- Mesures.
(1)
SQL (Computer program language)
(1)
SQL server.
(1)
SQL*PLUS (Computer program language)
(1)
Spam filtering (Electronic mail)
(1)
Spyware (Computer software)
(1)
Study guides
(1)
Study guides.
(1)
Sécurité informatique.
(1)
TECHNOLOGY / Engineering / Industrial
(1)
Telecommunication -- Security measures.
(1)
Telecommunications engineers -- Certification
(1)
Telecommunications engineers -- Certification -- United States.
(1)
Telecommunications engineers -- United States -- Certification.
(1)
United States
(1)
Virtual computer systems -- Security measures.
(1)
Web servers -- Software.
(1)
Zensur.
(1)
examination study guides.
(1)
More
View All
Fewer
Collapse All
Material Type
Include
Exclude
E-Book
Shelf Location
Include
Exclude
CRC Ebooks
Electronic Library
Taylor Francis E-Book Collection
Wiley E-Book Collection
false
{sortLabel}
{alphabetical}
{relevance}
{include}
{exclude}
{facetName}
{results}
{displayName}
{count}
{error}
Select an Action
Place Hold(s)
Add to My Lists
Email
Print
37 Results Found
1
2
3
4
Sort By:
Relevance (Default)
Publication Date (Ascending)
Publication Date (Descending)
Title
Author
0
DEFAULT
Select a list
Temporary List
Make this your default list.
The following items were successfully added.
There was an error while adding the following items. Please try again.
One or more items could not be added because you are not logged in.
37.
Security assessment case studies for implementing the NSA IAM
Security assessment case studies for implementing the NSA IAM
Author
Rogers, Russ.
Preferred Shelf Number
ONLINE
Electronic Access
ScienceDirect
http://www.sciencedirect.com/science/book/9781932266962
Format:
Availability
Online Library~1
Available:
Copies:
Select an Action
Place Hold(s)
Add to My Lists
Email
Print
1
2
3
4