Log In
|
My Account
|
My Lists
|
|
Remember to clear the cache and close the browser window.
Search Limit
Everything
E-Book
Journals
Beytepe Library
Health Sciences Library
Conservatory Library
Law Library
Social Sciences Vocational High School
DVD Collection
Prof.Dr. Onur Bilge Kula Collection
Rooms Restriction Values
All Fields
Title
Author
Subject
ISBN
ISSN
8
Search Field
All Fields
Target Value
Limit Value
Restriction Value
Search For:
Advanced Search
Limit Search Results
Narrowed by:
+
Subject: Electronic books.
Author
Include
Exclude
Ahmad, David R. Mirza.
(1)
Alder, Raven.
(1)
Amini, Rob.
(1)
Andress, Jason.
(1)
Andrés, Steven.
(1)
Beale, Jay.
(1)
Cole, Eric.
(1)
Cross, Michael, 1965-
(1)
Danielyan, Edgar.
(1)
Davies, Joshua A. (Joshua Aaron)
(1)
Douligeris, C. (Christos)
(1)
Dubrawsky, Ido.
(1)
Hancock, Bill, 1957-
(1)
Hunter, Laura E.
(1)
Jacobs, Stuart.
(1)
Kissell, Joe.
(1)
Knipp, Eric.
(1)
Lewis, T. G. (Theodore Gyle), 1941-
(1)
Moeller, Robert R.
(1)
Porter, Thomas.
(1)
Rima, Chris.
(1)
Ring, Sandra.
(1)
Rittinghouse, John W.
(1)
Rozenblit, Moshe, 1944-
(1)
Russell, Ryan, 1969-
(1)
Shinder, Debra Littlejohn.
(1)
Sisalem, Dorgham.
(1)
Snedaker, Susan.
(1)
Tittel, Ed.
(1)
Touhill, C. J., 1938- author.
(1)
Touhill, Gregory J., author.
(1)
Ulsch, N. MacDonnell, 1951-
(1)
Vacca, John R.
(1)
Wall, David.
(1)
Wiley InterScience (Online service)
(1)
More
View All
Fewer
Collapse All
Language
Include
Exclude
English
(22)
Publication Date
Include
Exclude
-
2006
(4)
2002
(3)
2004
(3)
2007
(3)
2011
(3)
2014
(3)
2009
(2)
2010
(2)
2000
(1)
2003
(1)
More
View All
Fewer
Collapse All
Subject
Include
Exclude
Computer networks -- Security measures.
(23)
Computer security.
(12)
Data protection.
(2)
Information technology -- Security measures.
(2)
Business -- Data processing -- Security measures.
(1)
Business enterprises -- Computer networks -- Security measures.
(1)
COMPUTERS -- Internet -- Security.
(1)
COMPUTERS -- Networking -- Security.
(1)
COMPUTERS -- Security -- General.
(1)
Cisco Systems, Inc.
(1)
Civil defense -- United States.
(1)
Computer crimes -- Investigation -- Handbooks, manuals, etc.
(1)
Computer crimes -- Prevention.
(1)
Computer hackers.
(1)
Computer networks -- Management.
(1)
Computer networks -- Security measures -- Handbooks, manuals, etc.
(1)
Computer networks -- Security measures -- United States.
(1)
Computer science.
(1)
Computer security -- Handbooks, manuals, etc.
(1)
Computer security -- United States -- Planning.
(1)
Corporations -- Security measures.
(1)
Crisis management.
(1)
Data encryption (Computer science)
(1)
Database security.
(1)
Electronic book collection.
(1)
Electronic data processing departments -- Auditing.
(1)
Electronic data processing departments -- Security measures.
(1)
Forensic sciences -- Handbooks, manuals, etc.
(1)
Information resources management.
(1)
Information technology -- Auditing.
(1)
Internet telephony -- Security measures.
(1)
Mac OS.
(1)
Macintosh (Computer) -- Programming.
(1)
Management information systems -- Security measures.
(1)
Microsoft Windows server.
(1)
Operating systems (Computers)
(1)
Session Initiation Protocol (Computer network protocol)
(1)
Telecommunication -- Security measures.
(1)
Telecommunication.
(1)
Terrorism -- Government policy -- United States.
(1)
Terrorism -- United States -- Prevention.
(1)
Web sites -- Security measures.
(1)
Wireless LANs.
(1)
More
View All
Fewer
Collapse All
Material Type
Include
Exclude
E-Book
Shelf Location
Include
Exclude
Electronic Library
Library
Include
Exclude
Online Library
false
{sortLabel}
{alphabetical}
{relevance}
{include}
{exclude}
{facetName}
{results}
{displayName}
{count}
{error}
Select an Action
Place Hold(s)
Add to My Lists
Email
Print
25 Results Found
1
2
3
Sort By:
Relevance (Default)
Publication Date (Ascending)
Publication Date (Descending)
Title
Author
0
DEFAULT
Select a list
Temporary List
Make this your default list.
The following items were successfully added.
There was an error while adding the following items. Please try again.
One or more items could not be added because you are not logged in.
25.
Security for telecommunications network management
Security for telecommunications network management
Author
Rozenblit, Moshe, 1944-
Preferred Shelf Number
ONLINE
Electronic Access
IEEE Xplore
http://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=5263947
Format:
Availability
Online Library~1
Available:
Copies:
Select an Action
Place Hold(s)
Add to My Lists
Email
Print
1
2
3