Giriş
|
Kütüphane Hesabım
|
Listelerim
|
|
Remember to clear the cache and close the browser window.
Rooms Restriction Values
Tüm Alanlar
Title
Author
General Note
Keyword in Author headings
Subject
Keyword in Subject headings
ISBN
Preferred Shelf Number
7
Search Field
Tüm Alanlar
Target Value
Limit Value
Restriction Value
Arama:
Gelişmiş Arama
DEFAULT_TR
Tez Koleksiyonu
DEFAULT_TR
Kitap Koleksiyonu
E-Kitap Koleksiyonu
Multimedia Koleksiyonu
Tez Koleksiyonu
Ulaştırma Mühendisliği Koleksiyonu
Basılı Süreli Yayınlar
Yeşil Kampüs
Arama Sonuçlarını Sınırlandır
Daraltılmış:
+
Shelf Location: Tez Koleksiyonu
+
Author: İzmir Institute Of Technology. Computer Engineering.
Author
Dahil
Hariç
Tuğlular, Tuğkan. Thesis advisor.
(3)
Tuğlular, Tuğkan Thesis advisor.
(2)
Algan, Fatih.
(1)
Asarcıklı, Şükran.
(1)
Aytaç, Sıtkı Thesis advisor.
(1)
Bacı, Recep.
(1)
Demiray, Sadettin.
(1)
Güratan, Işıl.
(1)
Koltuksuz, Ahmet Thesis advisor.
(1)
Yarımtepe, Oğuz.
(1)
Çağrıcı, Gökhan.
(1)
Daha fazla
Tümünü genişlet
Daha az
Hepsini Daralt
Material Type
Dahil
Hariç
Ek CD-ROM
Tez
Language
Dahil
Hariç
English
(7)
Publication Date
Dahil
Hariç
-
2005
(5)
2008
(1)
2009
(1)
Subject
Dahil
Hariç
Computer networks -- Security measures
(3)
Anomaly detection(Computer security)
(1)
Computer security.
(1)
Computer software -- Verification
(1)
Data warehousing
(1)
Firewalls (Computer security)
(1)
Parallel algorithms
(1)
Public key cryptography
(1)
Service-oriented architecture(Computer science)
(1)
Web services -- Security measures.
(1)
Web services.
(1)
Daha fazla
Tümünü genişlet
Daha az
Hepsini Daralt
Library
Dahil
Hariç
IYTE Library
false
{sortLabel}
{alphabetical}
{relevance}
{include}
{exclude}
{facetName}
{results}
{displayName}
{count}
{error}
Eylem Seç
Ayırt
Listelerime ekle
Eposta
Yazdır
7 sonuç bulundu
1
Sıralama:
İlgiye Göre (Varsayılan)
Yıla Gore (Artan)
Yıla Gore (Azalan)
Başlık
Yazar
0000000
DEFAULT_TR
Liste seç
Geçici Liste
Bunu varsayılan liste yap.
Öğeler başarıyla eklendi
Öğeler eklenirken hata oldu. Lütfen tekrar deneyiniz.
One or more items could not be added because you are not logged in.
1.
Anomaly detection using network traffic characterization
Anomaly detection using network traffic characterization
by
Yarımtepe, Oğuz.
Access to Electronic Version.
Format:
2.
Development of a web services security archhitecture based on net framework
Development of a web services security archhitecture based on net framework
by
Bacı, Recep.
Access to Electronic Version.
Format:
3.
An analysis of key generation efficiency of rsa cryptos ystem in distributed environments
An analysis of key generation efficiency of rsa cryptos ystem in distributed environments
by
Çağrıcı, Gökhan.
Access to Electronic Version.
Format:
4.
Improving misuse detection with neural networks
Improving misuse detection with neural networks
by
Demiray, Sadettin.
Access to Electronic Version
Format:
5.
Test driven software development
Test driven software development
by
Algan, Fatih.
Access to Electronic Version.
Format:
6.
Firewall monitoring using intrusion detection systems
Firewall monitoring using intrusion detection systems
by
Asarcıklı, Şükran.
Access to Electronic Version
Format:
7.
The Design and development of a data warehouse using sales database and requirements of a retail group
The Design and development of a data warehouse using sales database and requirements of a retail group
by
Güratan, Işıl.
Access to Electronic Version.
Format:
Eylem Seç
Ayırt
Listelerime ekle
Eposta
Yazdır
1