Giriş
|
Kütüphane Hesabım
|
Listelerim
|
|
Remember to clear the cache and close the browser window.
Search Limit
Tümü
E-Kitap
Dergiler
Beytepe Kütüphanesi
Sağlık Bilimleri Kütüphanesi
Konservatuvar Kütüphanesi
Hukuk Kütüphanesi
Sosyal Bilimler Meslek Yüksek Okulu
DVD Koleksiyonu
Prof.Dr. Onur Bilge Kula Koleksiyonu
Rooms Restriction Values
Tüm Alanlar
Başlık
Yazar
Konu
ISBN
ISSN
8
Search Field
Tüm Alanlar
Target Value
Limit Value
Restriction Value
Arama:
Gelişmiş Arama
Arama Sonuçlarını Sınırlandır
Daraltılmış:
+
Yayın Yılı: 2012
Yazar
Dahil
Hariç
Carafano, James Jay, 1955-
(2)
Project Muse.
(2)
Alapati, Sam R.
(1)
Andreasson, Kim J.
(1)
Andress, Jason.
(1)
Bahadur, Gary.
(1)
Ballew, Joli.
(1)
Bolt, Steven.
(1)
Carvalho, Alex de.
(1)
Carvey, Harlan A.
(1)
Chuvakin, Anton.
(1)
Clarke, Justin.
(1)
Cole, Eric.
(1)
Conrad, Eric, 1967-
(1)
Das, Sajal K.
(1)
Feldman, Joshua.
(1)
Fichera, Joe, 1966-
(1)
Ganguly, Debashis.
(1)
Inasi, Jason.
(1)
Kant, Krishna.
(1)
Khan, Latifur.
(1)
Kolde, Jennifer.
(1)
Kurtz, George.
(1)
Lahiri, Shibamouli.
(1)
Langner, Ralph.
(1)
Liu, Vincent.
(1)
Martin, Jason.
(1)
Masud, Mehedy.
(1)
McClure, Stuart.
(1)
McFadden, Matthew.
(1)
McHoes, Ann McIver, 1950-
(1)
Misenar, Seth.
(1)
Morrissey, Sean.
(1)
Oriyano, Sean-Philip.
(1)
Powell, Juliette, 1976-
(1)
Scambray, Joel.
(1)
Shimonski, Robert.
(1)
Speed, Tyler Justin.
(1)
Sullivan, Bryan, 1974-
(1)
Talabis, Mark.
(1)
Thuraisingham, Bhavani M.
(1)
Tiller, James S.
(1)
Valencia, Connie.
(1)
Varsalone, Jesse.
(1)
Williams, Branden R.
(1)
Winterfeld, Steve.
(1)
Wong, Caroline.
(1)
Zhang, Nan, 1982-
(1)
Daha fazla
Tümünü genişlet
Daha az
Hepsini Daralt
Dil
Dahil
Hariç
English
(25)
Konu
Dahil
Hariç
Computer networks -- Security measures.
(20)
Computer security.
(8)
Internet -- Security measures.
(4)
Computer networks -- Access control.
(3)
Application software -- Development.
(2)
Computer crimes -- Prevention.
(2)
Computer crimes.
(2)
Computer networks -- Access control
(2)
Data protection -- Standards.
(2)
Database management.
(2)
Database security.
(2)
Information society -- Political aspects.
(2)
Information technology -- Social aspects.
(2)
Information warfare -- Political aspects.
(2)
Internet and terrorism.
(2)
Risk management.
(2)
Social media.
(2)
Social networks.
(2)
War and society.
(2)
Application software -- Security measures.
(1)
Application software.
(1)
Business enterprises -- Data processing.
(1)
Business enterprises -- Security measures.
(1)
Client/server computing.
(1)
Computer capacity -- Planning.
(1)
Computer crimes -- Investigation -- United States -- Methodology.
(1)
Computer crimes -- Investigation.
(1)
Computer hackers.
(1)
Computer networks -- Security measures.
(1)
Computer networks -- Security measures -- Examinations -- Study guides.
(1)
Computer networks -- Security measures -- Government policy.
(1)
Computer networks -- Security measures -- Handbooks, manuals, etc.
(1)
Computer networks -- Security measures -- Testing.
(1)
Computer networks.
(1)
Computer security -- Evaluation.
(1)
Computer security -- Examinations -- Study guides.
(1)
Computer security -- Handbooks, manuals, etc.
(1)
Credit cards.
(1)
Data mining.
(1)
Data protection -- Law and legislation.
(1)
Data protection.
(1)
Data warehousing.
(1)
Decision making.
(1)
Economics -- Evaluation.
(1)
Electronic commerce.
(1)
Electronic data processing departments -- Security measures.
(1)
Government information -- Security measures.
(1)
Hard disk management.
(1)
Human capital -- Management.
(1)
Information technology -- Security measures.
(1)
Information warfare.
(1)
Internet -- Law and legislation.
(1)
Java (Computer program language)
(1)
Liability for credit information.
(1)
Linux.
(1)
Mac OS.
(1)
Memory management (Computer science)
(1)
Microcomputers -- Access control.
(1)
Microsoft Windows (Computer file)
(1)
Microsoft Windows (Computer file) -- Security measures.
(1)
Operating systems (Computers)
(1)
Oracle WebLogic server.
(1)
Penetration testing (Computer security)
(1)
Robust control.
(1)
Routing (Computer network management)
(1)
SQL (Computer program language)
(1)
Social media -- Security measures.
(1)
Social responsibility of business.
(1)
Web servers -- Computer programs.
(1)
Web servers.
(1)
Web site development.
(1)
Web sites -- Security measures.
(1)
World Wide Web -- Security measures.
(1)
Daha fazla
Tümünü genişlet
Daha az
Hepsini Daralt
Materyal Türü
Dahil
Hariç
E-Kitap
Kitap
Shelf Location
Dahil
Hariç
Beytepe Genel Koleksiyon
Elektronik Kütüphane
Kütüphane
Dahil
Hariç
Beytepe Kütüphanesi
Çevrimiçi Kütüphane
false
{sortLabel}
{alphabetical}
{relevance}
{include}
{exclude}
{facetName}
{results}
{displayName}
{count}
{error}
Eylem Seç
Ayırt
Listelerime ekle
Eposta
Yazdır
25 sonuç bulundu
1
2
3
Sıralama:
İlgiye Göre (Varsayılan)
Yıla Gore (Artan)
Yıla Gore (Azalan)
Başlık
Yazar
0
DEFAULT_TR
Liste seç
Geçici Liste
Bunu varsayılan liste yap.
Öğeler başarıyla eklendi
Öğeler eklenirken hata oldu. Lütfen tekrar deneyiniz.
One or more items could not be added because you are not logged in.
25.
Network intrusion analysis methodologies, tools, and techniques for incident analysis and response
Network intrusion analysis methodologies, tools, and techniques for incident analysis and response
Yazar
Fichera, Joe, 1966- Bolt, Steven.
Yer Numarası
ONLINE
Elektronik Erişim
ScienceDirect
http://www.sciencedirect.com/science/book/9781597499620
Format:
Durum
Çevrimiçi Kütüphane~1
Rafta:
Kopya:
Eylem Seç
Ayırt
Listelerime ekle
Eposta
Yazdır
1
2
3