Skip to:
Search Results
|
Content
|
Bottom
|
Search Facets
Giriş
|
Kütüphane Hesabım
|
Listelerim
|
|
Remember to clear the cache and close the browser window.
Search Limit
Tümü
E-Kitap
Dergiler
Beytepe Kütüphanesi
Sağlık Bilimleri Kütüphanesi
Konservatuvar Kütüphanesi
Hukuk Kütüphanesi
Sosyal Bilimler Meslek Yüksek Okulu
DVD Koleksiyonu
Prof.Dr. Onur Bilge Kula Koleksiyonu
Rooms Restriction Values
Tüm Alanlar
Başlık
Yazar
Konu
ISBN
ISSN
13
Search Field
Tüm Alanlar
Target Value
Limit Value
Restriction Value
Arama:
Gelişmiş Arama
Arama Sonuçlarını Sınırlandır
Daraltılmış:
+
Subject: Security.
Yazar
Dahil
Hariç
Carey, Marcus J. (Cybersecurity professional), author.
(2)
Allsopp, Wil, author.
(1)
Anson, Steve.
(1)
Benarous, Leila.
(1)
Bitam, Salim.
(1)
Carpenter, Perry, author.
(1)
Edwards, Jason (Cybersecurity expert), author.
(1)
Guha, Abhijit, editor.
(1)
Jin, Jennifer, author.
(1)
Jin, Jennifer.
(1)
Mellouk, Abdelhamid.
(1)
Messier, Ric, author.
(1)
Moschovitis, Christos J. P., author.
(1)
Moyo, Siegfried, author.
(1)
Panek, Crystal, author.
(1)
Poston, Howard E., III, author.
(1)
Pramanik, Sabyasachi, editor.
(1)
Samadi, Yasaman, 1993- author.
(1)
Samanta, Debabrata, 1987- editor.
(1)
Sohrabi, Nasrin, 1982- author.
(1)
Suaboot, Jakapan, 1984- author.
(1)
Tari, Zahir, 1961- author.
(1)
Tracy, Robb.
(1)
Vinay, M., editor.
(1)
Weaver, Griffin, author.
(1)
Daha fazla
Tümünü genişlet
Daha az
Hepsini Daralt
Dil
Dahil
Hariç
English
(14)
Yayın Yılı
Dahil
Hariç
-
2022
(4)
2019
(3)
2017
(2)
2020
(2)
2018
(1)
2023
(1)
2024
(1)
Daha fazla
Tümünü genişlet
Daha az
Hepsini Daralt
Konu
Dahil
Hariç
Electronic books.
(14)
COMPUTERS.
(13)
Computer networks -- Security measures
(11)
Computer networks -- Security measures.
(10)
Réseaux d'ordinateurs -- Sécurité -- Mesures.
(10)
Computer security.
(8)
Sécurité informatique.
(8)
Networking.
(7)
Viruses & Malware.
(5)
Computer Security
(4)
Online Safety & Privacy.
(4)
COMPUTERS -- Security -- General.
(3)
Computer security
(3)
Penetration testing (Computer security)
(3)
Cryptography.
(2)
Data protection
(2)
Data protection.
(2)
Protection de l'information (Informatique)
(2)
Tests d'intrusion.
(2)
BUSINESS & ECONOMICS -- Industries -- Computer Industry.
(1)
BUSINESS & ECONOMICS -- Production & Operations Management.
(1)
BUSINESS & ECONOMICS.
(1)
Blockchains (Databases)
(1)
Business enterprises -- Computer networks -- Security measures.
(1)
Business enterprises -- Computer programs.
(1)
Business enterprises -- Security measures
(1)
Business enterprises -- Security measures.
(1)
COMPUTERS -- Information Technology.
(1)
COMPUTERS -- Networking -- Security.
(1)
COMPUTERS -- Operating Systems -- General.
(1)
COMPUTERS -- Security -- Cryptography & Encryption.
(1)
COMPUTERS -- Security -- Cryptography.
(1)
COMPUTERS -- Security -- Networking.
(1)
COMPUTERS -- Security -- Online Safety & Privacy.
(1)
Chaînes de blocs.
(1)
Chiffrement (Informatique)
(1)
Computer crimes -- Prevention.
(1)
Computer crimes -- Risk assessment.
(1)
Computer industry
(1)
Computer industry.
(1)
Computer networks -- Security measures -- Computer programs
(1)
Computer networks -- Security measures -- Computer programs.
(1)
Computer networks -- Security measures -- Examinations, questions, etc.
(1)
Computer security -- Computer programs
(1)
Computer security -- Computer programs.
(1)
Computers
(1)
Computers.
(1)
Criminalité informatique -- Évaluation du risque.
(1)
Data encryption (Computer science)
(1)
Electronic digital computers
(1)
Electronic digital computers.
(1)
Entrepreneurship.
(1)
Entreprises -- Logiciels.
(1)
Entreprises -- Sécurité -- Mesures.
(1)
Examinations
(1)
Examinations.
(1)
Gestion du risque.
(1)
Information filtering systems
(1)
Information filtering systems.
(1)
Information technology -- Management
(1)
Information technology -- Management.
(1)
Information technology -- Security measures -- Management.
(1)
Informatique -- Industrie.
(1)
Intelligent transportation systems -- Security measures
(1)
Internet -- Security measures
(1)
Internet -- Security measures.
(1)
Internet -- Sécurité -- Mesures.
(1)
Leadership.
(1)
Logiciels malveillants -- Identification -- Logiciels.
(1)
Malware (Computer software) -- Identification -- Computer programs.
(1)
Malware (Computer software) -- Prevention -- Computer programs.
(1)
Management information systems
(1)
Management information systems.
(1)
Neural Networks.
(1)
Ordinateurs.
(1)
Penetration testing (Computer security) -- Examinations, questions, etc.
(1)
Risk management
(1)
Risk management.
(1)
Réseaux ad hoc de véhicules -- Sécurité -- Mesures.
(1)
Réseaux d'ordinateurs -- Sécurité -- Mesures -- Examens, questions, etc.
(1)
Réseaux d'ordinateurs -- Sécurité -- Mesures -- Logiciels.
(1)
Systèmes d'information de gestion.
(1)
Systèmes de filtrage d'information.
(1)
Sécurité informatique -- Logiciels.
(1)
Technologie de l'information -- Gestion.
(1)
Technologie de l'information -- Sécurité -- Mesures -- Gestion.
(1)
Telecommunications engineers -- Certification
(1)
Telecommunications engineers -- Certification -- Examinations, questions, etc.
(1)
Tests d'intrusion -- Examens, questions, etc.
(1)
Vehicular ad hoc networks (Computer networks) -- Security measures.
(1)
Daha fazla
Tümünü genişlet
Daha az
Hepsini Daralt
Materyal Türü
Dahil
Hariç
E-Kitap
Shelf Location
Dahil
Hariç
Wiley E-Kitap Koleksiyonu
Kütüphane
Dahil
Hariç
Çevrimiçi Kütüphane
false
{sortLabel}
{alphabetical}
{relevance}
{include}
{exclude}
{facetName}
{results}
{displayName}
{count}
{error}
Eylem Seç
Ayırt
Listelerime ekle
Eposta
Yazdır
14 sonuç bulundu
1
2
Sıralama:
İlgiye Göre (Varsayılan)
Yıla Gore (Artan)
Yıla Gore (Azalan)
Başlık
Yazar
00
DEFAULT_TR
Liste seç
Geçici Liste
Bunu varsayılan liste yap.
Öğeler başarıyla eklendi
Öğeler eklenirken hata oldu. Lütfen tekrar deneyiniz.
One or more items could not be added because you are not logged in.
13.
Network forensics
Network forensics
Yazar
Messier, Ric, author.
Yer Numarası
TK5105.59
Elektronik Erişim
https://onlinelibrary.wiley.com/doi/book/10.1002/9781119329190
Format:
Durum
Çevrimiçi Kütüphane~1
Rafta:
Kopya:
14.
Advanced penetration testing : hacking the world's most secure networks
Advanced penetration testing : hacking the world's most secure networks
Yazar
Allsopp, Wil, author.
Yer Numarası
QA76.9 .A25
Elektronik Erişim
https://onlinelibrary.wiley.com/doi/book/10.1002/9781119367741
Format:
Durum
Çevrimiçi Kütüphane~1
Rafta:
Kopya:
Eylem Seç
Ayırt
Listelerime ekle
Eposta
Yazdır
1
2
Go to:
Search Results
|
Top of Page
|
Search Facets