Skip to:
Search Results
|
Content
|
Bottom
|
Search Facets
Giriş
|
Kütüphane Hesabım
|
Listelerim
|
|
Remember to clear the cache and close the browser window.
Search Limit
Tümü
E-Kitap
Dergiler
Beytepe Kütüphanesi
Sağlık Bilimleri Kütüphanesi
Konservatuvar Kütüphanesi
Hukuk Kütüphanesi
Sosyal Bilimler Meslek Yüksek Okulu
DVD Koleksiyonu
Prof.Dr. Onur Bilge Kula Koleksiyonu
Rooms Restriction Values
Tüm Alanlar
Başlık
Yazar
Konu
ISBN
ISSN
13
Search Field
Tüm Alanlar
Target Value
Limit Value
Restriction Value
Arama:
Gelişmiş Arama
Arama Sonuçlarını Sınırlandır
Yazar
Dahil
Hariç
SpringerLink (Online service)
(15)
ScienceDirect (Online service)
(12)
Wiley InterScience (Online service)
(7)
Andress, Jason.
(5)
Cross, Michael, 1965-
(5)
Dubrawsky, Ido.
(5)
IGI Global, publisher.
(5)
Peltier, Thomas R.
(4)
Project Muse.
(4)
Shimonski, Robert.
(4)
Tiller, James S.
(4)
Vacca, John R.
(4)
Alder, Raven.
(3)
Andress, Jason, author.
(3)
Baumrucker, C. Tate.
(3)
Rittinghouse, John W.
(3)
Rogers, Russ.
(3)
Shinder, Debra Littlejohn.
(3)
Stallings, William.
(3)
Syngress Media, Inc.
(3)
Wiles, Jack.
(3)
Akyıldız, M. Alparslan.
(2)
Anderson, Brian (Brian James)
(2)
Andreou, Kimon.
(2)
Baker, Andrew R.
(2)
Barber, Brian.
(2)
Beale, Jay.
(2)
Bhardwaj, Pawan K.
(2)
Bradley, Tony, 1969-
(2)
Brotby, W. Krag.
(2)
Cameron, Rob.
(2)
Carafano, James Jay, 1955-
(2)
Carvey, Harlan A., author.
(2)
Chuvakin, Anton.
(2)
Cole, Eric.
(2)
Conrad, Eric, 1967-
(2)
Dwivedi, Himanshu.
(2)
Elbahadır, Hamza.
(2)
Esler, Joel.
(2)
Feldman, Joshua.
(2)
Gatford, Chris.
(2)
Gold, André.
(2)
Gregg, Michael (Michael C.)
(2)
Haines, Brad.
(2)
Harper, Allen.
(2)
Harris, Shon.
(2)
Howard, Patrick D.
(2)
Hunter, Laura E.
(2)
John Wiley & Sons.
(2)
Kleiman, Dave.
(2)
Kohlenberg, Toby.
(2)
Kouns, Jake.
(2)
Liu, Dale.
(2)
Liu, Vincent.
(2)
Long, Johnny.
(2)
Manzuik, Steve.
(2)
Maxwell, Doug.
(2)
Maynor, David.
(2)
McClure, Stuart.
(2)
Meng, Weizhi. editor. (orcid)0000-0003-4384-5786
(2)
Minoli, Daniel, 1952-
(2)
Misenar, Seth.
(2)
Northcutt, Stephen.
(2)
Orebaugh, Angela.
(2)
Oriyano, Sean-Philip.
(2)
Pathan, Al-Sakib Khan.
(2)
Porter, Thomas, PhD.
(2)
Ransome, James F.
(2)
Satyanarayana, Mahesh.
(2)
Scambray, Joel.
(2)
Seagren, Eric.
(2)
Shinder, Thomas W.
(2)
Snedaker, Susan.
(2)
Solomon, Michael G.
(2)
Thuraisingham, Bhavani M.
(2)
Varsalone, Jesse.
(2)
Wayner, Peter, 1964-
(2)
Weiss, Martin M.
(2)
Williams, Branden R.
(2)
Winterfeld, Steve.
(2)
ACM SIGSAC New Security Paradigms Workshop (2001 : Cloudcroft, NM, USA)
(1)
Abassi, Ryma, 1980- editor.
(1)
Acquisti, Alessandro.
(1)
Adams, Niall M., 1968-
(1)
Ahmad, David R. Mirza.
(1)
Alapati, Sam R.
(1)
Alexander, Tom.
(1)
Alpcan, Tansu.
(1)
Alpern, Naomi J.
(1)
Amini, Rob.
(1)
Amon, Cherie, ort. yaz.
(1)
Andreasson, Kim J.
(1)
Andrés, Steven.
(1)
Archibald, Neil.
(1)
Artymiak, Jacek.
(1)
Ashbaugh, Douglas A.
(1)
Askarov, Aslan. editor.
(1)
Aspinwall, Jim.
(1)
Association for Computing Machinery. Special Interest Group on Security, Audit, and Control.
(1)
Babbin, Jacob.
(1)
Bacik, Sandy.
(1)
Bahadur, Gary.
(1)
Ballew, Joli.
(1)
Barnes, Christian.
(1)
Baskin, Brian, author.
(1)
Baskin, Brian.
(1)
Bassioni, Ghada. editor.
(1)
Başar, Tamer.
(1)
Beale, Jay
(1)
Behrens, Thorsten.
(1)
Bendell, Dan.
(1)
Bernik, Igor, author.
(1)
Berti, John.
(1)
Bhattacharyya, Dhruba K., author.
(1)
Bidgoli, Hossein, ed.
(1)
Bilge, Alper.
(1)
Birkholz, Erik Pace.
(1)
Blackley, John A.
(1)
Blask, Chris.
(1)
Blazy, Olivier. editor. (orcid)0000-0001-6205-8249
(1)
Bodmer, Sean.
(1)
Bolt, Steven.
(1)
Borkin, Mike.
(1)
Boudriga, Noureddine.
(1)
Bowers, John R.
(1)
Brashars, Joshua.
(1)
Bray, Rory.
(1)
Brodsky, Jacob.
(1)
Brooks, R. R. (Richard R.)
(1)
Brown, David, 1954-
(1)
Brown, Edwin Lyle.
(1)
Budaghyan, Lilya. editor.
(1)
Burnett, Mark M.
(1)
Burton, James.
(1)
CNET (Firm)
(1)
Caldwell, Wilma, ed.
(1)
Cannings, Rich.
(1)
Cantrell, Chris.
(1)
Carvalho, Alex de.
(1)
Carvey, Harlan A.
(1)
Carvey, Harlan.
(1)
Chaitanya, Manish.
(1)
Chang, Elizabeth.
(1)
Chapman, Chris, author.
(1)
Cheah, Chun Hai.
(1)
Cherry, Denny.
(1)
Chowdhury, Kaushik Roy. editor.
(1)
Chuvakin, Anton A., author.
(1)
Cid, Carlos. editor. (orcid)0000-0001-5761-8694
(1)
Cid, Daniel.
(1)
Clark, Chris, 1980-
(1)
Clarke, Justin.
(1)
Conrad, Eric, author.
(1)
Contesti, Diana-Lynn.
(1)
Contos, Brian T.
(1)
Cook, Randy (Randy R.)
(1)
Cross, Michael, 1965- author.
(1)
Cunningham, Bryan.
(1)
Dalziel, Henry, editor.
(1)
Danielyan, Edgar.
(1)
Das, Sajal K.
(1)
Davies, J. (N. John)
(1)
Davies, Joshua A. (Joshua Aaron)
(1)
Davis, Chris (Christopher Michael)
(1)
Davis, Michael A.
(1)
Davis, Peter T.
(1)
DeFranco, Joanna F., author.
(1)
Deal, Richard A.
(1)
Demchak, Chris C.
(1)
Deng, Robert. editor. (orcid)0000-0003-3491-8146
(1)
Di Felice, Marco. editor.
(1)
Dillon, Tharam S., 1943-
(1)
Dirican, Can Okan.
(1)
Dolev, Shlomi. editor.
(1)
Douligeris, C. (Christos)
(1)
Dubrawsky, Ida.
(1)
Eagle, Chris.
(1)
Easttom, Chuck.
(1)
Ellis, Juanita.
(1)
Ely, Adam.
(1)
Enbody, Richard J., author.
(1)
Erbschloe, Michael, 1951-
(1)
Erbschloe, Michael.
(1)
Fadyushin, Vyacheslav.
(1)
Faircloth, Jeremy, author.
(1)
Faircloth, Jeremy.
(1)
Faruki, Parvez. editor.
(1)
Fichera, Joe, 1966-
(1)
Fisch, Eric A.
(1)
Foster, James C.
(1)
Fournaris, Apostolos P. editor. (orcid)0000-0002-4758-2349
(1)
Foushee, James E.
(1)
Fowler, Kevvie, author.
(1)
Fung, K. T. (Kwok T.)
(1)
Furnell, Steven, 1970- editor.
(1)
Furnell, Steven. editor. (orcid)0000-0003-0984-7542
(1)
Ganguly, Debashis.
(1)
Gantz, Stephen D.
(1)
Gathegi, John N.
(1)
Gaur, Manoj Singh. editor.
(1)
Daha fazla
Tümünü genişlet
Daha az
Hepsini Daralt
Dil
Dahil
Hariç
English
(334)
Turkish
(13)
Yayın Yılı
Dahil
Hariç
-
2011
(45)
2007
(34)
2006
(25)
2012
(25)
2014
(25)
2008
(21)
2004
(19)
2005
(19)
2010
(19)
2019
(19)
2002
(16)
2003
(16)
2013
(14)
2009
(11)
2016
(9)
2017
(9)
2015
(8)
2001
(7)
2018
(4)
2000
(2)
2020
(2)
2021
(2)
1999
(1)
Daha fazla
Tümünü genişlet
Daha az
Hepsini Daralt
Konu
Dahil
Hariç
Computer networks -- Security measures.
(277)
Computer security.
(133)
Electronic books.
(25)
Data protection.
(20)
Bilgisayar ağları -- Güvenlik önlemleri.
(19)
Internet -- Security measures.
(19)
Computer hackers.
(17)
Computers -- Access control.
(17)
Firewalls (Computer security)
(17)
Business enterprises -- Computer networks -- Security measures.
(14)
Computer networks -- Security measures -- Examinations -- Study guides.
(12)
Information technology -- Security measures.
(11)
Computer crimes -- Prevention.
(10)
Computer crimes.
(9)
Penetration testing (Computer security)
(9)
Wireless communication systems -- Security measures.
(9)
Computer crimes -- Investigation.
(8)
Computer security -- Examinations -- Study guides.
(8)
Database security.
(8)
Operating systems (Computers)
(8)
Web sites -- Security measures.
(8)
Computer communication systems.
(7)
Computer networks -- Access control.
(7)
Computer networks -- Management.
(7)
Computer networks -- Security measures -- Handbooks, manuals, etc.
(7)
Data protection -- Standards.
(7)
Electronic data processing personnel -- Certification.
(7)
Bilgisayar güvenliği.
(6)
Client/server computing.
(6)
Microsoft Windows (Computer file)
(6)
Application software.
(5)
Computer network protocols.
(5)
Computer networks -- Security measures -- Testing.
(5)
Computers.
(5)
Data encryption (Computer science).
(5)
Linux.
(5)
Artificial intelligence.
(4)
Business -- Data processing -- Security measures.
(4)
Computer security -- Handbooks, manuals, etc.
(4)
Computer viruses.
(4)
Credit cards.
(4)
Cyberspace -- Security measures.
(4)
Data encryption (Computer science)
(4)
Database management.
(4)
Electronic commerce -- Security measures.
(4)
Electronic data processing departments -- Security measures.
(4)
Information resources management.
(4)
Information warfare.
(4)
Internet telephony -- Security measures.
(4)
Internet.
(4)
Malware (Computer software)
(4)
Microsoft Windows server.
(4)
Open source software.
(4)
Risk assessment.
(4)
Risk management.
(4)
Ad hoc networks (Computer networks) -- Security measures.
(3)
Application software -- Development.
(3)
Bilgisayar korsanları.
(3)
Business enterprises -- Computer networks.
(3)
Cloud computing -- Security measures.
(3)
Computer Communication Networks.
(3)
Computer Security.
(3)
Computer crimes -- Investigation -- Methodology.
(3)
Computer networks -- Security measures -- Computer programs.
(3)
Computer networks -- Security measures -- United States.
(3)
Computer networks.
(3)
Computer science.
(3)
Computer security -- Case studies.
(3)
Cryptography.
(3)
Cyber intelligence (Computer security)
(3)
Electronic book collection.
(3)
Extranets (Computer networks)
(3)
Information storage and retrieval systems -- Security measures.
(3)
Liability for credit information.
(3)
Mac OS.
(3)
Machine learning.
(3)
Microsoft ISA server.
(3)
Microsoft Internet information server.
(3)
Routers (Computer networks)
(3)
Telecommunications engineers -- Certification.
(3)
Web servers.
(3)
Wireless communication systems.
(3)
Application logging (Computer science)
(2)
Application software -- Security measures.
(2)
Bilgisayar ağları -- Güvenlik önlemleri.
(2)
Bilgisayar güvenliği
(2)
Biometric identification.
(2)
Business enterprises -- Security measures.
(2)
Coding theory.
(2)
Component software.
(2)
Computer architecture.
(2)
Computer crimes -- Case studies.
(2)
Computer networks -- Access control
(2)
Computer networks -- Remote access.
(2)
Computer networks -- Security measures
(2)
Computer networks -- Security measures -- Case studies.
(2)
Computer networks -- Security measures -- Congresses.
(2)
Computer networks -- Security measures -- Evaluation.
(2)
Computer networks -- Security measures -- Examinations, questions, etc.
(2)
Computer networks -- Security measures -- Software.
(2)
Computer networks -- Security measures.
(2)
Computer networks--Security measures.
(2)
Computer security
(2)
Computer security -- Computer programs.
(2)
Computer security -- Evaluation -- Methodology.
(2)
Computer security -- Evaluation.
(2)
Computer security -- Management.
(2)
Computer security -- United States.
(2)
Corporations -- Security measures.
(2)
Crisis management.
(2)
Cyberterrorism.
(2)
Data protection -- Law and legislation.
(2)
Electronic commerce.
(2)
Electronic data processing departments -- Auditing.
(2)
Electronic data processing personnel -- Certification -- Study guides.
(2)
Electronic mail systems -- Security measures.
(2)
Game theory.
(2)
Güvenlik duvarları (Bilgisayar güvenliği)
(2)
Home computer networks -- Security measures.
(2)
Home computer networks.
(2)
Information society -- Political aspects.
(2)
Information technology -- Social aspects.
(2)
Information warfare -- Political aspects.
(2)
Internet and terrorism.
(2)
Internetworking (Telecommunication)
(2)
Law and legislation.
(2)
Macintosh (Computer) -- Programming.
(2)
Microsoft Exchange server.
(2)
Microsoft Windows.
(2)
Military telecommunication.
(2)
Mobile communication systems -- Security measures.
(2)
Operations systems (Computer)
(2)
Privacy, Right of.
(2)
Public key infrastructure (Computer security)
(2)
Routing (Computer network management)
(2)
SQL (Computer program language)
(2)
Service-oriented architecture (Computer science)
(2)
Social media.
(2)
Social networks.
(2)
TCP/IP (Computer network protocol)
(2)
UNIX Shells.
(2)
Virtual computer systems.
(2)
War and society.
(2)
Web servers -- Security measures.
(2)
Wireless LANs -- Security measures.
(2)
Wireless LANs.
(2)
Access control.
(1)
Active server pages -- Security measures.
(1)
ActiveX.
(1)
Ad hoc networks (Computer networks) -- Management.
(1)
Ad hoc networks (Computer networks) -- Quality control.
(1)
Administrative agencies -- Information resources management -- Security measures -- United States -- Examinations -- Study guides.
(1)
Administrative agencies -- Information resources management -- Security measures -- United States.
(1)
Africa—Economic conditions.
(1)
Ajax (Web site development technology)
(1)
Algebra -- Data processing.
(1)
Android (Electronic resource)
(1)
AppleScript (Computer program language)
(1)
Application program interfaces (Computer software)
(1)
Askeri telekomünikasyon.
(1)
Auditing, Internal.
(1)
Açık kaynak yazılımı.
(1)
Bank credit cards.
(1)
Berkeley BSD (Computer file)
(1)
Bilgi ağları -- Güvenlik önlemleri.
(1)
Bilgi birikim ve erişim sistemleri -- Güvenlik önlemleri.
(1)
Bilgi güvenliği.
(1)
Bilgi savaşı.
(1)
Bilgi teknolojisi -- Güvenlik önlemleri
(1)
Bilgisayar Ağları -- Emniyet Ölçüleri -- Kongreler.
(1)
Bilgisayar Güvenliği -- Kongreler.
(1)
Bilgisayar Güvenliği.
(1)
Bilgisayar ağları -- Bilgisayar güvenliği.
(1)
Bilgisayar ağları -- Emniyet ölçüleri -- Vaka incelemesi.
(1)
Bilgisayar ağları -- Emniyet ölçüleri.
(1)
Bilgisayar ağları -- Güvenlik ölçümleri.
(1)
Bilgisayar ağları -- Güvenlik önlemleri
(1)
Bilgisayar ağları -- Güvenlik önlemleri -- Sınavlar, sorular, vb.
(1)
Bilgisayar ağları -- Güvenlik önlemleri -- Türkiye
(1)
Bilgisayar ağları -- Güvenlik önlemleri -- Yazılım.
(1)
Bilgisayar ağları -- Veri güvenliği.
(1)
Bilgisayar ağları--Güvenlik önlemleri.
(1)
Bilgisayar ağları--Standartlar.
(1)
Bilgisayar güvenliği -- Değerlendirme -- Methodoloji.
(1)
Bilgisayar güvenliği -- Vaka incelemesi.
(1)
Bilgisayar güvenliği -- Yönetim
(1)
Bilgisayar suçları -- Korunma.
(1)
Biometrics (Biology).
(1)
BlackBerry (Smartphone)
(1)
Bluetooth technology -- Security measures.
(1)
Broadband communication systems.
(1)
Business -- Data processing -- Security measures -- Evaluation.
(1)
Business -- Data processing.
(1)
Business enterprises -- Communication systems -- Management.
(1)
Business enterprises -- Data processing.
(1)
Business information services -- Security measures.
(1)
Business intelligence -- Data processing.
(1)
BİLGİSAYAR AĞLARI -- EMNİYET ÖLÇÜLERİ -- EL KİTAPLARI, VB.
(1)
BİLGİSAYAR AĞLARI -- EMNİYET ÖLÇÜLERİ.
(1)
BİLGİSAYAR GÜVENLİĞİ -- EL KİTAPLARI, VB.
(1)
Daha fazla
Tümünü genişlet
Daha az
Hepsini Daralt
Materyal Türü
Dahil
Hariç
E-Kitap
Kitap
Shelf Location
Dahil
Hariç
Beytepe Genel Koleksiyon
Elektronik Kütüphane
Kütüphane
Dahil
Hariç
Beytepe Kütüphanesi
Çevrimiçi Kütüphane
false
{sortLabel}
{alphabetical}
{relevance}
{include}
{exclude}
{facetName}
{results}
{displayName}
{count}
{error}
Eylem Seç
Ayırt
Listelerime ekle
Eposta
Yazdır
350 sonuç bulundu
1
..
26
27
28
29
30
Sıralama:
İlgiye Göre (Varsayılan)
Yıla Gore (Artan)
Yıla Gore (Azalan)
Başlık
Yazar
00
DEFAULT_TR
Liste seç
Geçici Liste
Bunu varsayılan liste yap.
Öğeler başarıyla eklendi
Öğeler eklenirken hata oldu. Lütfen tekrar deneyiniz.
One or more items could not be added because you are not logged in.
349.
Security for telecommunications network management
Security for telecommunications network management
Yazar
Rozenblit, Moshe, 1944-
Yer Numarası
ONLINE
Elektronik Erişim
IEEE Xplore
http://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=5263947
Format:
Durum
Çevrimiçi Kütüphane~1
Rafta:
Kopya:
350.
Auditing IT infrastructures for compliance
Auditing IT infrastructures for compliance
Yazar
Weiss, Martin M. Solomon, Michael G.
Yer Numarası
QA76.9.A25 W428
Format:
Durum
Beytepe Kütüphanesi~1
Rafta:
Kopya:
Eylem Seç
Ayırt
Listelerime ekle
Eposta
Yazdır
1
..
26
27
28
29
30
Go to:
Search Results
|
Top of Page
|
Search Facets