Log In
|
My Account
|
My Lists
|
|
Remember to clear the cache and close the browser window.
Search Limit
Everything
E-Book
Journals
Beytepe Library
Health Sciences Library
Conservatory Library
Law Library
Social Sciences Vocational High School
DVD Collection
Prof.Dr. Onur Bilge Kula Collection
Rooms Restriction Values
All Fields
Title
Author
Subject
ISBN
ISSN
8
Search Field
All Fields
Target Value
Limit Value
Restriction Value
Search For:
Advanced Search
Limit Search Results
Narrowed by:
+
Subject: Computer security.
Author
Include
Exclude
ScienceDirect (Online service)
(5)
Clercq, Jan de, 1968-
(3)
Rittinghouse, John W.
(3)
Barrett, Diane.
(2)
Grillenmeier, Guido.
(2)
Kipper, Gregory.
(2)
Ransome, James F.
(2)
Tyson, Dave.
(2)
Wiles, Jack.
(2)
XYPRO Technology Corporation.
(2)
Alvarado, Ellen.
(1)
Aquilina, James M.
(1)
Beale, Jay.
(1)
Ben-Natan, Ron.
(1)
Bin Azad, Tariq.
(1)
Campara, Djenana.
(1)
Carvey, Harlan A.
(1)
Carvey, Harlan.
(1)
Casey, Eoghan.
(1)
Cole, Eric.
(1)
Ely, Adam.
(1)
Engebretson, Pat (Patrick Henry), 1974-
(1)
Foster, James C.
(1)
Haines, Brad.
(1)
Hancock, Bill, 1957-
(1)
Heiderich, Mario.
(1)
Hill, Terri.
(1)
Kleidermacher, David.
(1)
Kleidermacher, Mike.
(1)
Kolde, Jennifer.
(1)
Kraus, Rob.
(1)
Long, Johnny.
(1)
Malin, Cameron H.
(1)
Mansourov, Nikolai.
(1)
Mao, Wenji.
(1)
Mitnick, Kevin D. (Kevin David), 1963-
(1)
Perez, Richard, 1969 Oct. 17-
(1)
Qian, Yi, 1962-
(1)
Rathaus, Noam
(1)
Rathaus, Noam.
(1)
Ring, Sandra.
(1)
Stapko, Timothy John.
(1)
Timm, Carl.
(1)
Wang, Fei-Yue.
(1)
Wilson, Connie.
(1)
Winkler, J. R. (Joachim R.)
(1)
Wright., Michael.
(1)
More
View All
Fewer
Collapse All
Language
Include
Exclude
English
(37)
Publication Date
Include
Exclude
-
2007
(10)
2010
(7)
2008
(4)
2004
(3)
2011
(3)
2012
(3)
2003
(2)
2005
(2)
2006
(2)
2013
(1)
More
View All
Fewer
Collapse All
Subject
Include
Exclude
Computer networks -- Security measures.
(12)
Bilgisayar güvenliği.
(4)
Client/server computing -- Security measures.
(3)
Computer hackers.
(3)
Electronic books.
(3)
Microsoft Windows (Computer file)
(3)
Business enterprises -- Security measures.
(2)
Client/server computing.
(2)
Computer crimes -- Investigation.
(2)
Computer crimes -- Prevention.
(2)
Data protection.
(2)
Hewlett-Packard computers -- Security measures.
(2)
Operating systems (Computers)
(2)
Risk management.
(2)
SQL server.
(2)
Virtual computer systems -- Security measures.
(2)
Application software -- Development.
(1)
Bilgisayar ağları -- Güvenlik önlemleri.
(1)
Bilgisayar ağları.
(1)
Citrix MetaFrame.
(1)
Cloud computing.
(1)
Component software.
(1)
Computer crimes -- Investigation -- Methodology.
(1)
Computer crimes -- Investigation -- United States -- Methodology.
(1)
Computer crimes.
(1)
Computer networks -- Reliability.
(1)
Computer networks.
(1)
Computer software -- Development.
(1)
Computer software -- Testing.
(1)
Computer viruses.
(1)
Cryptography.
(1)
Database security.
(1)
Electronic book collection.
(1)
Electronic mail messages -- Security measures.
(1)
Embedded computer systems.
(1)
Industries -- Security measures.
(1)
Instant messaging -- Security measures.
(1)
Internet -- Security measures.
(1)
Internet programming.
(1)
Intrusion detection systems (Computer security)
(1)
Malware (Computer software) -- Prevention.
(1)
Microsoft Windows (Bilgisayar kütüğü)
(1)
Microsoft Windows (Computer file) -- Security measures.
(1)
Microsoft Windows server.
(1)
National security.
(1)
Online social networks -- Security measures.
(1)
Risk yönetimi.
(1)
SQL sunucu.
(1)
Security systems.
(1)
Snort (Software)
(1)
Ticari teşebbüsler -- Güvenlik önlemleri.
(1)
Web 2.0 -- Security measures.
(1)
Web site development.
(1)
Wireless communication systems -- Security measures.
(1)
İstemci/sunucu hesaplama.
(1)
More
View All
Fewer
Collapse All
Material Type
Include
Exclude
E-Book
Shelf Location
Include
Exclude
Electronic Library
Library
Include
Exclude
Online Library
false
{sortLabel}
{alphabetical}
{relevance}
{include}
{exclude}
{facetName}
{results}
{displayName}
{count}
{error}
Select an Action
Place Hold(s)
Add to My Lists
Email
Print
37 Results Found
1
2
3
4
Sort By:
Relevance (Default)
Publication Date (Ascending)
Publication Date (Descending)
Title
Author
0
DEFAULT
Select a list
Temporary List
Make this your default list.
The following items were successfully added.
There was an error while adding the following items. Please try again.
One or more items could not be added because you are not logged in.
37.
Snort 2.0 intrusion detection
Snort 2.0 intrusion detection
Author
Beale, Jay. Foster, James C.
Preferred Shelf Number
ONLINE
Electronic Access
ScienceDirect
http://www.sciencedirect.com/science/book/9781931836746
Format:
Availability
Online Library~1
Available:
Copies:
Select an Action
Place Hold(s)
Add to My Lists
Email
Print
1
2
3
4