Giriş
|
Kütüphane Hesabım
|
Listelerim
|
|
Remember to clear the cache and close the browser window.
Search Limit
Tümü
E-Kitap
Dergiler
Beytepe Kütüphanesi
Sağlık Bilimleri Kütüphanesi
Konservatuvar Kütüphanesi
Hukuk Kütüphanesi
Sosyal Bilimler Meslek Yüksek Okulu
DVD Koleksiyonu
Prof.Dr. Onur Bilge Kula Koleksiyonu
Rooms Restriction Values
Tüm Alanlar
Başlık
Yazar
Konu
ISBN
ISSN
8
Search Field
Tüm Alanlar
Target Value
Limit Value
Restriction Value
Arama:
Gelişmiş Arama
Arama Sonuçlarını Sınırlandır
Yazar
Dahil
Hariç
SpringerLink (Online service)
(20)
ScienceDirect (Online service)
(17)
Wiley InterScience (Online service)
(17)
IGI Global, publisher.
(13)
Project Muse.
(10)
Cross, Michael, 1965-
(6)
Rogers, Russ.
(6)
Andress, Jason.
(5)
Dubrawsky, Ido.
(5)
Rittinghouse, John W.
(5)
Shimonski, Robert.
(5)
Syngress Media, Inc.
(5)
Vacca, John R.
(5)
Hart-Davis, Guy.
(4)
Hurley, Chris.
(4)
John Wiley & Sons.
(4)
Peltier, Thomas R.
(4)
Radvanovsky, Robert.
(4)
Ransome, James F.
(4)
Tiller, James S.
(4)
Wiles, Jack.
(4)
Alder, Raven.
(3)
Andress, Jason, author.
(3)
Baumrucker, C. Tate.
(3)
Bradley, Tony, 1969-
(3)
Brotby, W. Krag.
(3)
Elbahadır, Hamza.
(3)
Furht, Borivoje.
(3)
Kipper, Gregory.
(3)
Kirovski, Darko.
(3)
Liu, Vincent.
(3)
McDougall, Allan.
(3)
Shinder, Debra Littlejohn.
(3)
Stallings, William.
(3)
Vellani, Karim H., 1971-
(3)
Akyıldız, M. Alparslan.
(2)
American Society of Civil Engineers.
(2)
Anderson, Brian (Brian James)
(2)
Andreou, Kimon.
(2)
Arata, Michael J.
(2)
Baker, Andrew R.
(2)
Barber, Brian.
(2)
Barken, Lee.
(2)
Barrett, Diane.
(2)
Beale, Jay.
(2)
Benny, Daniel J.
(2)
Bhardwaj, Pawan K.
(2)
Biringer, Betty E., 1952-
(2)
Boudriga, Noureddine.
(2)
Cameron, Rob.
(2)
Carafano, James Jay, 1955-
(2)
Carvey, Harlan A.
(2)
Carvey, Harlan A., author.
(2)
Chuvakin, Anton.
(2)
Cole, Eric.
(2)
Collette, Ronald D.
(2)
Conrad, Eric, 1967-
(2)
Coolidge, E. Coleen.
(2)
Dalziel, Henry, editor.
(2)
Dwivedi, Himanshu.
(2)
Esler, Joel.
(2)
Feldman, Joshua.
(2)
Fennelly, Lawrence J., 1940-
(2)
Gatford, Chris.
(2)
Gentile, Michael.
(2)
Gold, André.
(2)
Gonzalez, Deborah, author.
(2)
Goransson, Paul.
(2)
Gordon, Neil, 1959-
(2)
Greenlaw, Raymond.
(2)
Gregg, Michael (Michael C.)
(2)
Haines, Brad.
(2)
Hamerstone, Alex.
(2)
Harper, Allen.
(2)
Harris, Shon.
(2)
Herrmann, Debra S.
(2)
Hourani, Paul.
(2)
Howard, Patrick D.
(2)
Hunter, Laura E.
(2)
June, Dale L.
(2)
Kleiman, Dave.
(2)
Kohlenberg, Toby.
(2)
Kotwica, Kathleen.
(2)
Kouns, Jake.
(2)
Landoll, Douglas J.
(2)
Lim, Ian.
(2)
Liu, Dale.
(2)
Long, Johnny.
(2)
Manzuik, Steve.
(2)
Maxwell, Doug.
(2)
Maynor, David.
(2)
McClure, Stuart.
(2)
Meng, Weizhi. editor. (orcid)0000-0003-4384-5786
(2)
Minoli, Daniel, 1952-
(2)
Misenar, Seth.
(2)
Neely, Matthew.
(2)
Norman, Thomas L.
(2)
Northcutt, Stephen.
(2)
Orebaugh, Angela.
(2)
Oriyano, Sean-Philip.
(2)
Pathan, Al-Sakib Khan.
(2)
Pearson, Robert L.
(2)
Porter, Thomas, PhD.
(2)
Sachs, Marcus H.
(2)
Sanyk, Chris.
(2)
Satyanarayana, Mahesh.
(2)
Scambray, Joel.
(2)
Seagren, Eric.
(2)
Shema, Mike.
(2)
Shinder, Thomas W.
(2)
Snedaker, Susan.
(2)
Solomon, Michael G.
(2)
Thenkabail, Prasad Srinivasa, 1958-
(2)
Thuraisingham, Bhavani M.
(2)
Tyson, Dave.
(2)
Varsalone, Jesse.
(2)
Ventre, Daniel.
(2)
Wayner, Peter, 1964-
(2)
Weiss, Martin M.
(2)
Williams, Branden R.
(2)
Willmot, Phil.
(2)
Winterfeld, Steve.
(2)
XYPRO Technology Corporation.
(2)
Zhang, Yan, 1977-
(2)
Çontar, Furkan.
(2)
ACM SIGSAC New Security Paradigms Workshop (2001 : Cloudcroft, NM, USA)
(1)
Abassi, Ryma, 1980- editor.
(1)
Abraham, Ajin, author.
(1)
Acquisti, Alessandro.
(1)
Adams, Niall M., 1968-
(1)
Ahmad, David R. Mirza.
(1)
Ahn, Roy. editor.
(1)
Akansu, Ali N., 1958-
(1)
Akhgar, Babak.
(1)
Akujuobi, Cajetan M.
(1)
Akyıldız, M. Alparslan.
(1)
Alapati, Sam R.
(1)
Alexander, Tom.
(1)
Alpcan, Tansu.
(1)
Alpern, Naomi J.
(1)
Alvarado, Ellen.
(1)
American Institute of Chemical Engineers. Center for Chemical Process Safety, author.
(1)
American Institute of Chemical Engineers. Center for Chemical Process Safety.
(1)
Amini, Rob.
(1)
Amon, Cherie, ort. yaz.
(1)
Anderson, Kerry Ann, author.
(1)
Andreasson, Kim J.
(1)
Andrés, Steven.
(1)
Anjum, Farooq.
(1)
Appel, Edward J., author.
(1)
Arbaugh, William A.
(1)
Archibald, Neil.
(1)
Artymiak, Jacek.
(1)
Arway, Arthur G.
(1)
Arık, Emel.
(1)
Ashbaugh, Douglas A.
(1)
Askarov, Aslan. editor.
(1)
Aspinwall, Jim.
(1)
Association for Computing Machinery. Special Interest Group on Security, Audit, and Control.
(1)
Association of College and Research Libraries.
(1)
Ast, Scott Alan.
(1)
Au, Man-Ho, editor.
(1)
Auerswald, Philip E..
(1)
August, Thomas D.
(1)
Ayre, Lori Bowen.
(1)
Babbin, Jacob.
(1)
Babcock, Charles.
(1)
Bacik, Sandy.
(1)
Bahadur, Gary.
(1)
Baker, Paul, 1958-
(1)
Ballew, Joli.
(1)
Banday, Mohammad Tariq, 1969- editor.
(1)
Banerjee, Santo, 1976-
(1)
Banga, S. S. (Surinder S.), editor of compilation.
(1)
Barnes, Christian.
(1)
Barrett, J. Michael.
(1)
Baskin, Brian, author.
(1)
Baskin, Brian.
(1)
Bassioni, Ghada. editor.
(1)
Bateman, W. S. G. (Walter Samuel Grono)
(1)
Bates, Regis J. author.
(1)
Bathurst, Robert.
(1)
Başar, Tamer.
(1)
Beale, Jay
(1)
Beaver, Kevin, author.
(1)
Beaver, Kevin.
(1)
Behrens, Thorsten.
(1)
Belapurkar, Abhijit.
(1)
Bendell, Dan.
(1)
Benny, Daniel J., author.
(1)
Bermel, Eric.
(1)
Bernik, Igor, author.
(1)
Berson, Alex.
(1)
Berson, Alex. Master data management and customer data integration for a global enterprise.
(1)
Berti, John.
(1)
Berube, Claude G., 1966-
(1)
Bhargav, Abhay, author.
(1)
Bhargav, Abhay.
(1)
Bhattacharyya, Dhruba K., author.
(1)
Bidgoli, Hossein, ed.
(1)
Daha fazla
Tümünü genişlet
Daha az
Hepsini Daralt
Dil
Dahil
Hariç
English
(631)
Turkish
(24)
Yayın Yılı
Dahil
Hariç
-
2011
(94)
2007
(58)
2014
(57)
2012
(55)
2010
(42)
2006
(40)
2013
(40)
2008
(39)
2009
(29)
2004
(28)
2005
(27)
2015
(27)
2019
(26)
2003
(22)
2002
(17)
2016
(14)
2017
(13)
2001
(8)
2018
(8)
2020
(4)
2023
(4)
1999
(3)
2000
(3)
1992
(2)
2021
(2)
2022
(2)
1985
(1)
1988
(1)
1996
(1)
2024
(1)
Daha fazla
Tümünü genişlet
Daha az
Hepsini Daralt
Konu
Dahil
Hariç
Computer networks -- Security measures.
(278)
Computer security.
(189)
Electronic books.
(40)
Data protection.
(36)
Internet -- Security measures.
(36)
Information technology -- Security measures.
(30)
Wireless communication systems -- Security measures.
(28)
Bilgisayar ağları -- Güvenlik önlemleri.
(20)
Computer hackers.
(20)
Computers -- Access control.
(20)
Firewalls (Computer security)
(20)
Computer crimes -- Prevention.
(19)
Wireless LANs -- Security measures.
(18)
Business enterprises -- Computer networks -- Security measures.
(14)
Business enterprises -- Security measures.
(13)
Computer crimes -- Investigation.
(13)
Data encryption (Computer science)
(13)
Mobile computing -- Security measures.
(13)
Risk management.
(13)
Web sites -- Security measures.
(13)
Cloud computing -- Security measures.
(12)
Computer networks -- Security measures -- Examinations -- Study guides.
(12)
Penetration testing (Computer security)
(12)
Private security services.
(12)
Computer crimes.
(11)
Cryptography.
(11)
Database security.
(11)
Risk assessment.
(11)
Bilgisayar güvenliği.
(9)
Business -- Data processing -- Security measures.
(9)
Internet.
(9)
Mobile communication systems -- Security measures.
(9)
Operating systems (Computers)
(9)
Client/server computing.
(8)
Computer networks -- Access control.
(8)
Computer networks -- Management.
(8)
Computer security -- Examinations -- Study guides.
(8)
Industries -- Security measures.
(8)
Security systems.
(8)
Telecommunication -- Security measures.
(8)
Application software -- Development.
(7)
Application software -- Security measures.
(7)
Computer communication systems.
(7)
Computer network protocols.
(7)
Computer networks -- Security measures -- Handbooks, manuals, etc.
(7)
Computer security -- Management.
(7)
Data protection -- Standards.
(7)
Database management.
(7)
Electronic data processing personnel -- Certification.
(7)
Microsoft Windows (Computer file)
(7)
Terrorism -- Prevention.
(7)
Application software.
(6)
Corporations -- Security measures.
(6)
Cyberspace -- Security measures.
(6)
Electronic commerce -- Security measures.
(6)
Electronic data processing departments -- Security measures.
(6)
Internet telephony -- Security measures.
(6)
National security -- United States.
(6)
Shipping -- Security measures.
(6)
Bilgisayar güvenliği
(5)
Buildings -- Security measures.
(5)
Cloud computing.
(5)
Computer networks -- Security measures -- Testing.
(5)
Computer networks.
(5)
Computer security
(5)
Computer security -- Handbooks, manuals, etc.
(5)
Computer viruses.
(5)
Computers.
(5)
Data encryption (Computer science).
(5)
IEEE 802.11 (Standard)
(5)
Industries -- Security measures -- Management.
(5)
Information resources management.
(5)
Information technology -- Management.
(5)
Information warfare.
(5)
Linux.
(5)
Malware (Computer software)
(5)
Management information systems -- Security measures.
(5)
Multimedia systems -- Security measures.
(5)
Online social networks -- Security measures.
(5)
Telecommunication--Security measures.
(5)
Terrorism -- United States -- Prevention.
(5)
Wireless LANs.
(5)
Wireless communication systems.
(5)
Android (Electronic resource)
(4)
Artificial intelligence.
(4)
Bilgisayar korsanları.
(4)
Computer Security.
(4)
Computer security -- Evaluation.
(4)
Credit cards.
(4)
Crisis management.
(4)
Cyber intelligence (Computer security)
(4)
Cyberterrorism -- Prevention.
(4)
Electronic mail systems -- Security measures.
(4)
Electronic security systems.
(4)
Electronic surveillance.
(4)
Freight and freightage -- Security measures.
(4)
Information storage and retrieval systems -- Security measures.
(4)
Mac OS.
(4)
Machine learning.
(4)
Microsoft ISA server.
(4)
Microsoft Windows server.
(4)
Mobile communication systems.
(4)
Office buildings -- Security measures.
(4)
Open source software.
(4)
Oracle (Computer file)
(4)
Retail trade -- Security measures.
(4)
Security Measures.
(4)
Telecommunication systems -- Security measures.
(4)
Virtual computer systems -- Security measures.
(4)
Virtual computer systems.
(4)
Web site development.
(4)
Wireless Internet -- Security measures.
(4)
World Wide Web -- Security measures.
(4)
Ad hoc networks (Computer networks) -- Security measures.
(3)
Airports -- Security measures -- United States.
(3)
Bilgisayar ağları -- Güvenlik önlemleri.
(3)
Business enterprises -- Computer networks.
(3)
Business intelligence.
(3)
Civil defense -- United States.
(3)
Client/server computing -- Security measures.
(3)
Coding theory.
(3)
Computer Communication Networks.
(3)
Computer crimes -- Case studies.
(3)
Computer crimes -- Investigation -- Methodology.
(3)
Computer networks -- Security measures -- Computer programs.
(3)
Computer networks -- Security measures -- United States.
(3)
Computer networks -- Security measures.
(3)
Computer science.
(3)
Computer security -- Case studies.
(3)
Electronic book collection.
(3)
Electronic mail messages -- Security measures.
(3)
Extranets (Computer networks)
(3)
Food supply -- Security measures.
(3)
Güvenlik duvarları (Bilgisayar güvenliği)
(3)
Harbors -- Security measures.
(3)
Infrastructure (Economics) -- Security measures -- United States.
(3)
Liability for credit information.
(3)
Libraries -- Security measures.
(3)
Merchant marine -- Security measures.
(3)
Microsoft Internet information server.
(3)
Operating systems (Computers) -- Security measures.
(3)
Private security services -- Management.
(3)
Process control -- Security measures.
(3)
Routers (Computer networks)
(3)
SQL (Computer program language)
(3)
School violence -- United States -- Prevention.
(3)
Schools -- Safety measures -- Handbooks, manuals, etc.
(3)
Schools -- Security measures -- Handbooks, manuals, etc.
(3)
Service-oriented architecture (Computer science)
(3)
Smartphones -- Security measures.
(3)
Social media -- Security measures.
(3)
Telecommunication systems--Management.
(3)
Telecommunications engineers -- Certification.
(3)
Transportation -- Security measures -- United States.
(3)
Web servers.
(3)
Agriculture -- Security measures.
(2)
Ajax (Web site development technology)
(2)
Application logging (Computer science)
(2)
Artificial satellites in agriculture.
(2)
Bilgisayar Güvenliği.
(2)
Biometric identification.
(2)
Bluetooth technology -- Security measures.
(2)
Book thefts -- Prevention.
(2)
Burglary protection.
(2)
Business -- Data processing.
(2)
Cell phone systems.
(2)
Citrix MetaFrame.
(2)
Component software.
(2)
Compuer networks -- Security measures.
(2)
Computer architecture.
(2)
Computer crimes -- Prevention -- Measurement.
(2)
Computer networks -- Access control
(2)
Computer networks -- Remote access.
(2)
Computer networks -- Security measures
(2)
Computer networks -- Security measures -- Case studies.
(2)
Computer networks -- Security measures -- Congresses.
(2)
Computer networks -- Security measures -- Evaluation.
(2)
Computer networks -- Security measures -- Examinations, questions, etc.
(2)
Computer networks -- Security measures -- Software.
(2)
Computer networks--Access control.
(2)
Computer networks--Security measures.
(2)
Computer security -- Computer programs.
(2)
Computer security -- Evaluation -- Methodology.
(2)
Computer security -- United States.
(2)
Computers -- Access control -- Passwords.
(2)
Confidential business information.
(2)
Corporations -- Security measures -- Management.
(2)
Crime prevention and architectural design.
(2)
Crops -- Remote sensing.
(2)
Cyberterrorism.
(2)
Data protection
(2)
Data protection -- Law and legislation.
(2)
Data warehousing.
(2)
Digital subscriber lines.
(2)
Digital watermarking.
(2)
Dwellings -- Security measures.
(2)
Electric power systems -- Security measures.
(2)
Electrical engineering.
(2)
Electronic commerce.
(2)
Electronic data processing departments -- Auditing.
(2)
Daha fazla
Tümünü genişlet
Daha az
Hepsini Daralt
Materyal Türü
Dahil
Hariç
E-Kitap
Kitap
Sözlük
Shelf Location
Dahil
Hariç
Beytepe Danışma Koleksiyonu
Beytepe Genel Koleksiyon
Elektronik Kütüphane
Hukuk Genel Koleksiyon
Sağlık Bilimleri Genel Koleksiyon
Kütüphane
Dahil
Hariç
Beytepe Kütüphanesi
Hukuk Kütüphanesi
Sağlık Bilimleri Kütüphanesi
Çevrimiçi Kütüphane
false
{sortLabel}
{alphabetical}
{relevance}
{include}
{exclude}
{facetName}
{results}
{displayName}
{count}
{error}
Eylem Seç
Ayırt
Listelerime ekle
Eposta
Yazdır
661 sonuç bulundu
1
..
52
53
54
55
56
Sıralama:
İlgiye Göre (Varsayılan)
Yıla Gore (Artan)
Yıla Gore (Azalan)
Başlık
Yazar
0
DEFAULT_TR
Liste seç
Geçici Liste
Bunu varsayılan liste yap.
Öğeler başarıyla eklendi
Öğeler eklenirken hata oldu. Lütfen tekrar deneyiniz.
One or more items could not be added because you are not logged in.
661.
Auditing IT infrastructures for compliance
Auditing IT infrastructures for compliance
Yazar
Weiss, Martin M. Solomon, Michael G.
Yer Numarası
QA76.9.A25 W428
Format:
Durum
Beytepe Kütüphanesi~1
Rafta:
Kopya:
Eylem Seç
Ayırt
Listelerime ekle
Eposta
Yazdır
1
..
52
53
54
55
56