Giriş
|
Kütüphane Hesabım
|
Listelerim
|
|
Remember to clear the cache and close the browser window.
Search Limit
Tümü
E-Kitap
Dergiler
Beytepe Kütüphanesi
Sağlık Bilimleri Kütüphanesi
Konservatuvar Kütüphanesi
Hukuk Kütüphanesi
Sosyal Bilimler Meslek Yüksek Okulu
DVD Koleksiyonu
Prof.Dr. Onur Bilge Kula Koleksiyonu
Rooms Restriction Values
Tüm Alanlar
Başlık
Yazar
Konu
ISBN
ISSN
8
Search Field
Tüm Alanlar
Target Value
Limit Value
Restriction Value
Arama:
Gelişmiş Arama
Arama Sonuçlarını Sınırlandır
Daraltılmış:
+
Konu: Security.
Yazar
Dahil
Hariç
An, Jianpin, author.
(1)
Anand, R. S., author.
(1)
BOGAN, CARL.
(1)
Bayuk, Jennifer L., author.
(1)
Braeken, An, 1970- editor.
(1)
Bray, Shannon, 1972-
(1)
Bullock, Jessey, author.
(1)
Chandramouli, Devaki, editor.
(1)
Chirillo, John, 1970- author.
(1)
Couretas, Jerry M., 1966- author.
(1)
David, Shiblin, author.
(1)
Domas, Christopher, author.
(1)
Domas, Stephanie, author.
(1)
Edwards, Jason (Cybersecurity expert), author.
(1)
Gordon, Adam, author.
(1)
Gorecki, Andrew.
(1)
Janca, Tanya. author.
(1)
Jeyakrishnan, V., author.
(1)
John Wiley & Sons, publisher.
(1)
Keren.
(1)
Kumar, Pardeep, 1976- editor.
(1)
Liebhart, Rainer, editor.
(1)
Liyanage, Madhusanka, author.
(1)
Liyanage, Madhusanka, editor.
(1)
Mack, Sean D., author.
(1)
Mammeri, Zoubir, author.
(1)
Mantas, Georgios.
(1)
Moschovitis, Christos J. P., author.
(1)
Moyo, Siegfried, author.
(1)
Niranjanamurthy, M., author.
(1)
Penttinen, Jyrki T. J., author.
(1)
Pirskanen, Juho, editor.
(1)
Porambage, Pawani, author.
(1)
Rodriguez, Jonathan.
(1)
Saghezchi, Firooz.
(1)
Sucasas, Victor.
(1)
Tanner, Nadean H., author.
(1)
Tyagi, Amit Kumar, editor.
(1)
Ylianttila, Mika, editor.
(1)
Daha fazla
Tümünü genişlet
Daha az
Hepsini Daralt
Dil
Dahil
Hariç
English
(25)
Yayın Yılı
Dahil
Hariç
-
2024
(7)
2025
(6)
2019
(4)
2020
(2)
2021
(2)
2017
(1)
2022
(1)
2023
(1)
2026
(1)
Daha fazla
Tümünü genişlet
Daha az
Hepsini Daralt
Konu
Dahil
Hariç
COMPUTERS.
(25)
Electronic books.
(25)
Computer security.
(13)
Cryptography.
(13)
Networking.
(13)
Sécurité informatique.
(13)
TECHNOLOGY & ENGINEERING.
(6)
Mobile & Wireless Communications.
(5)
Telecommunications.
(5)
Viruses & Malware.
(5)
Computer security
(4)
COMPUTERS -- Security -- General.
(3)
Data protection.
(3)
Online Safety & Privacy.
(3)
Protection de l'information (Informatique)
(3)
6G mobile communication systems -- Security measures.
(2)
Computer Security
(2)
Cybernetics.
(2)
Data protection
(2)
Internet des objets -- Sécurité -- Mesures.
(2)
Internet of things -- Security measures.
(2)
Signals & Signal Processing.
(2)
TECHNOLOGY & ENGINEERING -- Mechanical.
(2)
Architecture logicielle.
(1)
Artificial satellites in telecommunication -- Security measures.
(1)
Assembly Language.
(1)
BUSINESS & ECONOMICS.
(1)
Broadband communication systems
(1)
Broadband communication systems -- Technological innovations.
(1)
Business enterprises -- Data processing -- Security measures.
(1)
Business enterprises -- Security measures
(1)
Business enterprises -- Security measures.
(1)
COMPUTERS -- Security -- Cryptography & Encryption.
(1)
Chiffrement (Informatique)
(1)
Computer Science.
(1)
Computer crimes -- Risk assessment.
(1)
Computer networks -- Security measures
(1)
Computer networks -- Security measures.
(1)
Computer programming.
(1)
Computer security -- Management
(1)
Computer security -- Management.
(1)
Computer software -- Development.
(1)
Confidentialité des données.
(1)
Criminalité informatique -- Évaluation du risque.
(1)
Cryptographie.
(1)
Data encryption (Computer science)
(1)
Data privacy
(1)
Data privacy.
(1)
Entrepreneurship.
(1)
Entreprises -- Informatique -- Sécurité -- Mesures.
(1)
Entreprises -- Sécurité -- Mesures.
(1)
GSM (Radiotéléphonie) -- Sécurité -- Mesures.
(1)
Global system for mobile communications -- Security measures.
(1)
Global system for mobile communications -- Technological innovation.
(1)
Hacking.
(1)
Industrie 4.0.
(1)
Industry 4.0
(1)
Industry 4.0.
(1)
Industry 5.0.
(1)
Internet of things
(1)
Leadership.
(1)
Management information systems
(1)
Management information systems.
(1)
Medical informatics
(1)
Medical informatics -- Security measures.
(1)
Micro-ordinateurs -- Accès -- Contrôle.
(1)
Microcomputers -- Access control
(1)
Microcomputers -- Access control.
(1)
Mobile communication systems -- Technological innovations
(1)
Mobile communication systems -- Technological innovations.
(1)
Médecine -- Informatique -- Sécurité -- Mesures.
(1)
Piratage informatique.
(1)
Programmation (Informatique)
(1)
Programming Languages.
(1)
Python (Computer program language)
(1)
Python (Langage de programmation)
(1)
Quality Assurance & Testing.
(1)
Radiocommunications mobiles -- Innovations.
(1)
Reverse engineering.
(1)
Réseaux d'ordinateurs -- Sécurité -- Mesures.
(1)
Rétro-ingénierie.
(1)
Satellites artificiels dans les télécommunications -- Sécurité -- Mesures.
(1)
Software Development & Engineering.
(1)
Software architecture.
(1)
Systèmes d'information de gestion.
(1)
Sécurité informatique -- Gestion.
(1)
Technologie de l'information.
(1)
Transport -- Sécurité -- Mesures.
(1)
Transportation -- Security measures.
(1)
Wireless communication systems -- Security measures
(1)
Wireless sensor networks
(1)
Wireless sensor networks -- Technological innovations.
(1)
X86 assembly language (Computer program language)
(1)
X86 assembly language (Langage de programmation)
(1)
information technology.
(1)
Daha fazla
Tümünü genişlet
Daha az
Hepsini Daralt
Materyal Türü
Dahil
Hariç
E-Kitap
Shelf Location
Dahil
Hariç
Wiley E-Kitap Koleksiyonu
Kütüphane
Dahil
Hariç
Çevrimiçi Kütüphane
false
{sortLabel}
{alphabetical}
{relevance}
{include}
{exclude}
{facetName}
{results}
{displayName}
{count}
{error}
Eylem Seç
Ayırt
Listelerime ekle
Eposta
Yazdır
25 sonuç bulundu
1
2
3
Sıralama:
İlgiye Göre (Varsayılan)
Yıla Gore (Artan)
Yıla Gore (Azalan)
Başlık
Yazar
0
DEFAULT_TR
Liste seç
Geçici Liste
Bunu varsayılan liste yap.
Öğeler başarıyla eklendi
Öğeler eklenirken hata oldu. Lütfen tekrar deneyiniz.
One or more items could not be added because you are not logged in.
25.
Wireshark for security professionals : using Wireshark and the Metasploit Framework
Wireshark for security professionals : using Wireshark and the Metasploit Framework
Yazar
Bullock, Jessey, author. Gordon, Adam, author.
Yer Numarası
QA76.9 .A25
Elektronik Erişim
https://onlinelibrary.wiley.com/doi/book/10.1002/9781119183457
Format:
Durum
Çevrimiçi Kütüphane~1
Rafta:
Kopya:
Eylem Seç
Ayırt
Listelerime ekle
Eposta
Yazdır
1
2
3