Skip to:
Search Results
|
Content
|
Bottom
|
Search Facets
Giriş
|
Kütüphane Hesabım
|
Listelerim
|
|
Remember to clear the cache and close the browser window.
Search Limit
Tümü
E-Kitap
Dergiler
Beytepe Kütüphanesi
Sağlık Bilimleri Kütüphanesi
Konservatuvar Kütüphanesi
Hukuk Kütüphanesi
Sosyal Bilimler Meslek Yüksek Okulu
DVD Koleksiyonu
Prof.Dr. Onur Bilge Kula Koleksiyonu
Rooms Restriction Values
Tüm Alanlar
Başlık
Yazar
Konu
ISBN
ISSN
13
Search Field
Tüm Alanlar
Target Value
Limit Value
Restriction Value
Arama:
Gelişmiş Arama
Arama Sonuçlarını Sınırlandır
Daraltılmış:
+
Subject: Networking.
Yazar
Dahil
Hariç
Le, Dac-Nhuong, 1983- editor.
(3)
Edwards, Jason (Cybersecurity expert), author.
(2)
Allsopp, Wil, author.
(1)
Anson, Steve.
(1)
Balasubramanian, Srinivasan.
(1)
Bamhdi, Alwi, editor.
(1)
Bayuk, Jennifer L., author.
(1)
Benmammar, Badr.
(1)
Bhatt, Chintan M., 1988- editor.
(1)
Braeken, An, 1970- editor.
(1)
Bullock, Jessey, author.
(1)
Carpenter, Perry, author.
(1)
Carroll, Brandon, author.
(1)
Chandramouli, Devaki, editor.
(1)
Chapple, Mike, author.
(1)
Chatterjee, Jyotir Moy, editor.
(1)
Chen, Lei, 1978 July 28- editor.
(1)
Chirillo, John, 1970- author.
(1)
Clinton, David.
(1)
Couretas, Jerry M., 1966- author.
(1)
Edwards, Jason, author.
(1)
Forno, Richard, author.
(1)
Gordon, Adam, author.
(1)
Goudos, Sotirios K.
(1)
Guerrier, Claudine, author.
(1)
Hoang, Dinh Thai, 1986- author.
(1)
Hughes, Chris (Christopher Matthew), author.
(1)
Jakobsen, Adam Tilmar, author.
(1)
Jakobsen, Adam Tilmar.
(1)
John Wiley & Sons, publisher.
(1)
Karagiannidis, George K.
(1)
Keren.
(1)
Khan, Arif Ali, editor.
(1)
Khatoun, Rida, author.
(1)
Kumar, Pardeep, 1976- editor.
(1)
Kumar, Raghvendra, 1987- editor.
(1)
Laurent, Sébastien, editor.
(1)
Le-Khac, Nhien-An, 1972- editor.
(1)
Lee, Martin (Computer security expert), author.
(1)
Li, Hu, author.
(1)
Liebhart, Rainer, editor.
(1)
Liyanage, Madhusanka, author.
(1)
Liyanage, Madhusanka, editor.
(1)
Lockett, Rachel, author.
(1)
Mack, Sean D., author.
(1)
Madhukar, Mani, editor.
(1)
Mammeri, Zoubir, author.
(1)
Mantas, Georgios.
(1)
Masoodi, Faheem Syeed, editor.
(1)
Mateczun, Laura, author.
(1)
Matin, Mohammad A.
(1)
McHaney, Roger, author.
(1)
Messier, Ric, author.
(1)
Miroshnikov, Andrei, author.
(1)
Moschovitis, Christos J. P., author.
(1)
Moskowitz, Jeremy.
(1)
Nagrath, Preeti, editor.
(1)
Nayyar, Anand, editor.
(1)
Nguyen, Nhu Gia, editor.
(1)
Norris, Donald F., author.
(1)
Penttinen, Jyrki T. J., author.
(1)
Piper, Ben.
(1)
Pirskanen, Juho, editor.
(1)
Porambage, Pawani, author.
(1)
Robinson, Dom, author.
(1)
Robinson, Nikki, author.
(1)
Rodriguez, Jonathan.
(1)
Rose, Stephen.
(1)
Saghezchi, Firooz.
(1)
Samadi, Yasaman, 1993- author.
(1)
Savill, John, 1975- author.
(1)
Shelley, Joe.
(1)
Singla, Bhawna, editor.
(1)
Sohrabi, Nasrin, 1982- author.
(1)
Stewart, James Michael.
(1)
Suaboot, Jakapan, 1984- author.
(1)
Sucasas, Victor.
(1)
Takabi, Hassan, 1982- editor.
(1)
Tari, Zahir, 1961- author.
(1)
Wang, Han, author.
(1)
Weaver, Griffin, author.
(1)
Ylianttila, Mika, editor.
(1)
Daha fazla
Tümünü genişlet
Daha az
Hepsini Daralt
Dil
Dahil
Hariç
English
(50)
Yayın Yılı
Dahil
Hariç
-
2025
(10)
2024
(9)
2019
(8)
2023
(6)
2017
(4)
2021
(4)
2022
(4)
2018
(3)
2020
(2)
2026
(2)
Daha fazla
Tümünü genişlet
Daha az
Hepsini Daralt
Konu
Dahil
Hariç
COMPUTERS.
(50)
Electronic books.
(46)
Security.
(37)
Computer security.
(14)
Sécurité informatique.
(14)
Viruses & Malware.
(11)
Cryptography.
(9)
TECHNOLOGY & ENGINEERING.
(8)
Computer networks -- Security measures
(6)
Computer networks -- Security measures.
(6)
Mobile & Wireless Communications.
(6)
Online Safety & Privacy.
(6)
Réseaux d'ordinateurs -- Sécurité -- Mesures.
(6)
Telecommunications.
(6)
COMPUTERS -- Security -- General.
(5)
Computer security
(5)
COMPUTERS -- Information Technology.
(4)
Cloud computing.
(4)
Information Technology.
(4)
COMPUTERS -- Computer Literacy.
(3)
COMPUTERS -- Computer Science.
(3)
COMPUTERS -- Data Processing.
(3)
COMPUTERS -- Hardware -- General.
(3)
COMPUTERS -- Machine Theory.
(3)
COMPUTERS -- Reference.
(3)
Cloud computing
(3)
Computer Security
(3)
Infonuagique.
(3)
Information technology -- Management
(3)
Information technology -- Management.
(3)
Internet des objets -- Sécurité -- Mesures.
(3)
Internet of things -- Security measures.
(3)
Technologie de l'information -- Gestion.
(3)
6G mobile communication systems -- Security measures.
(2)
BUSINESS & ECONOMICS.
(2)
Certification Guides.
(2)
Cloud Computing.
(2)
Cloud computing -- Security measures.
(2)
Cyber intelligence (Computer security)
(2)
Cybernetics.
(2)
Data protection.
(2)
Infonuagique -- Sécurité -- Mesures.
(2)
Intelligence (AI) & Semantics.
(2)
Internet of things
(2)
Protection de l'information (Informatique)
(2)
Software Development & Engineering.
(2)
Surveillance des menaces informatiques.
(2)
TECHNOLOGY & ENGINEERING -- Mechanical.
(2)
Transmission sans fil.
(2)
Wireless communication systems.
(2)
5G mobile communication systems -- Technological innovations.
(1)
Administration locale -- États-Unis.
(1)
Africa
(1)
African.
(1)
Amazon Web Services (Firm)
(1)
Architecture orientée service (Informatique)
(1)
Artificial Intelligence
(1)
Artificial intelligence
(1)
Artificial intelligence.
(1)
BUSINESS & ECONOMICS -- Industries -- Computer Industry.
(1)
BUSINESS & ECONOMICS -- Production & Operations Management.
(1)
Blockchains (Databases)
(1)
Broadband communication systems
(1)
Broadband communication systems -- Technological innovations.
(1)
Business -- Data processing
(1)
Business -- Data processing.
(1)
Business enterprises -- Computer networks
(1)
Business enterprises -- Computer networks -- Security measures.
(1)
Business enterprises -- Computer networks.
(1)
Business enterprises -- Computer programs.
(1)
Business enterprises -- Data processing -- Security measures.
(1)
COMPUTERS -- Operating Systems -- General.
(1)
COMPUTERS -- Security -- Networking.
(1)
COVID-19 Pandemic, 2020-2023 -- Social aspects -- Africa.
(1)
Changement organisationnel.
(1)
Chaînes de blocs.
(1)
Cloud computing -- Examinations -- Study guides.
(1)
Cloud computing -- Security measures
(1)
Communications mobiles 5G -- Innovations.
(1)
Computer Communication Networks
(1)
Computer Networks
(1)
Computer Science.
(1)
Computer crimes -- Investigation.
(1)
Computer crimes -- Prevention.
(1)
Computer industry
(1)
Computer industry.
(1)
Computer networks
(1)
Computer networks -- Security measures -- Computer programs
(1)
Computer networks -- Security measures -- Computer programs.
(1)
Computer networks -- Security measures -- Examinations
(1)
Computer networks -- Security measures -- Examinations -- Study guides.
(1)
Computer networks.
(1)
Computer security -- Computer programs
(1)
Computer security -- Computer programs.
(1)
Computer security -- Examinations
(1)
Computer security -- Examinations -- Study guides.
(1)
Computer security -- Government policy
(1)
Computer security -- Government policy.
(1)
Computer security -- Law and legislation
(1)
Computer security -- Law and legislation.
(1)
Computer security -- United States.
(1)
Computer software -- Development
(1)
Computer software -- Development.
(1)
Computers
(1)
Computersicherheit
(1)
Confidentialité des données.
(1)
Criminalité informatique -- Enquêtes.
(1)
Cryptographie.
(1)
Cyberguerre (Science militaire)
(1)
Cyberinfrastructure -- Security measures.
(1)
Cyberspace operations (Military science)
(1)
Cyberterrorism -- Prevention
(1)
Cyberterrorism -- Prevention.
(1)
Data privacy
(1)
Data privacy.
(1)
Data protection
(1)
Digital forensic science
(1)
Digital forensic science.
(1)
Domotique -- Sécurité -- Mesures.
(1)
Dwellings -- Security measures
(1)
Dwellings -- Security measures.
(1)
Electronic data processing personnel -- Certification
(1)
Electronic data processing personnel -- Certification.
(1)
Entreprises -- Informatique -- Sécurité -- Mesures.
(1)
Entreprises -- Logiciels.
(1)
Entreprises -- Réseaux d'ordinateurs.
(1)
GSM (Radiotéléphonie) -- Sécurité -- Mesures.
(1)
Gestion -- Informatique.
(1)
Global system for mobile communications -- Security measures.
(1)
Global system for mobile communications -- Technological innovation.
(1)
Guides de l'étudiant.
(1)
Génie logiciel.
(1)
Habitations -- Sécurité -- Mesures.
(1)
Home automation -- Security measures.
(1)
Infonuagique -- Examens -- Guides de l'étudiant.
(1)
Information filtering systems
(1)
Information filtering systems.
(1)
Information technology -- Security measures
(1)
Information technology -- Security measures.
(1)
Informatique -- Industrie.
(1)
Informatique mobile.
(1)
Insurance.
(1)
Intelligence artificielle.
(1)
Interconnexion de réseaux (Télécommunications)
(1)
Internet -- Government policy
(1)
Internet -- Government policy.
(1)
Internet -- Law and legislation
(1)
Internet -- Law and legislation.
(1)
Internet -- Politique gouvernementale.
(1)
Internet -- Security measures
(1)
Internet -- Security measures.
(1)
Internet -- Sécurité -- Mesures.
(1)
Internet des objets.
(1)
Internet of things.
(1)
Internetworking (Telecommunication)
(1)
Intrusion detection systems (Computer security)
(1)
Leadership.
(1)
Local government
(1)
Local government -- United States.
(1)
Logiciels malveillants -- Identification -- Logiciels.
(1)
Malware (Computer software) -- Identification -- Computer programs.
(1)
Malware (Computer software) -- Prevention -- Computer programs.
(1)
Management -- Data processing
(1)
Management -- Data processing.
(1)
Management information systems
(1)
Management information systems.
(1)
Medical informatics
(1)
Medical informatics -- Security measures.
(1)
Micro-ordinateurs -- Accès -- Contrôle.
(1)
Microcomputers -- Access control
(1)
Microcomputers -- Access control.
(1)
Microsoft Windows (Computer file)
(1)
Mobile communication systems
(1)
Mobile communication systems -- Technological innovations
(1)
Mobile communication systems -- Technological innovations.
(1)
Mobile communication systems.
(1)
Mobile computing
(1)
Mobile computing.
(1)
Médecine -- Informatique -- Sécurité -- Mesures.
(1)
Médias sociaux -- Sécurité -- Mesures.
(1)
Network Protocols.
(1)
Organizational Innovation
(1)
Organizational change
(1)
Organizational change.
(1)
POLITICAL SCIENCE.
(1)
Pandémie de COVID-19, 2020-2023 -- Aspect social -- Afrique.
(1)
Penetration testing (Computer security)
(1)
Project Management.
(1)
Radiocommunications mobiles -- Innovations.
(1)
Radiocommunications mobiles.
(1)
Risk Assessment & Management.
(1)
Réseaux SDN.
(1)
Réseaux d'ordinateurs -- Sécurité -- Mesures -- Examens -- Guides de l'étudiant.
(1)
Réseaux d'ordinateurs -- Sécurité -- Mesures -- Logiciels.
(1)
Réseaux d'ordinateurs.
(1)
Service-oriented architecture (Computer science)
(1)
Services Web -- Sécurité -- Mesures.
(1)
Signals & Signal Processing.
(1)
Social aspects
(1)
Social media -- Security measures.
(1)
Daha fazla
Tümünü genişlet
Daha az
Hepsini Daralt
Materyal Türü
Dahil
Hariç
E-Kitap
Shelf Location
Dahil
Hariç
Wiley E-Kitap Koleksiyonu
Kütüphane
Dahil
Hariç
Çevrimiçi Kütüphane
false
{sortLabel}
{alphabetical}
{relevance}
{include}
{exclude}
{facetName}
{results}
{displayName}
{count}
{error}
Eylem Seç
Ayırt
Listelerime ekle
Eposta
Yazdır
50 sonuç bulundu
1
2
3
4
5
Sıralama:
İlgiye Göre (Varsayılan)
Yıla Gore (Artan)
Yıla Gore (Azalan)
Başlık
Yazar
00
DEFAULT_TR
Liste seç
Geçici Liste
Bunu varsayılan liste yap.
Öğeler başarıyla eklendi
Öğeler eklenirken hata oldu. Lütfen tekrar deneyiniz.
One or more items could not be added because you are not logged in.
49.
Advanced penetration testing : hacking the world's most secure networks
Advanced penetration testing : hacking the world's most secure networks
Yazar
Allsopp, Wil, author.
Yer Numarası
QA76.9 .A25
Elektronik Erişim
https://onlinelibrary.wiley.com/doi/book/10.1002/9781119367741
Format:
Durum
Çevrimiçi Kütüphane~1
Rafta:
Kopya:
50.
Network forensics
Network forensics
Yazar
Messier, Ric, author.
Yer Numarası
TK5105.59
Elektronik Erişim
https://onlinelibrary.wiley.com/doi/book/10.1002/9781119329190
Format:
Durum
Çevrimiçi Kütüphane~1
Rafta:
Kopya:
Eylem Seç
Ayırt
Listelerime ekle
Eposta
Yazdır
1
2
3
4
5
Go to:
Search Results
|
Top of Page
|
Search Facets