Skip to:
Search Results
|
Content
|
Bottom
|
Search Facets
Log In
|
My Account
|
My Lists
|
|
Remember to clear the cache and close the browser window.
Search Limit
Everything
E-Book
Journals
Beytepe Library
Health Sciences Library
Conservatory Library
Law Library
Social Sciences Vocational High School
DVD Collection
Prof.Dr. Onur Bilge Kula Collection
Rooms Restriction Values
All Fields
Title
Author
Subject
ISBN
ISSN
13
Search Field
All Fields
Target Value
Limit Value
Restriction Value
Search For:
Advanced Search
Limit Search Results
Narrowed by:
+
Subject: Computer security.
Author
Include
Exclude
Carey, Marcus J. (Cybersecurity professional), author.
(1)
Dalipi, Fisnik, editor
(1)
Fellows, Lorraine. author.
(1)
Finney, George, author.
(1)
Fleckenstein, Mike. author.
(1)
Fréminville, Marie de, author.
(1)
Grimes, Roger A., author.
(1)
Hayes, Patrick author.
(1)
IGI Global, publisher.
(1)
Islam, Ray (Mohammad Rubyet), author.
(1)
Jin, Jennifer.
(1)
Lambros, Kyriakos P., author.
(1)
Martiri, Edlira, editor
(1)
McLaughlin, Kevin (Kevin Lynn), author.
(1)
Mohanty, Sachi Nandan, editor.
(1)
Oncioiu, Ionica, 1972- editor.
(1)
STACKPOLE, BILL.
(1)
Sharp, Matthew K., author.
(1)
Siegel, Carol A., author.
(1)
SpringerLink (Online service)
(1)
Sweeney, Mark, author.
(1)
Vajjhala, Narasimha, 1978- editor.
(1)
Vinduska, Zach, author.
(1)
More
View All
Fewer
Collapse All
Language
Include
Exclude
English
(14)
Publication Date
Include
Exclude
-
2025
(4)
2020
(3)
2017
(2)
2018
(1)
2019
(1)
2022
(1)
2024
(1)
2026
(1)
More
View All
Fewer
Collapse All
Subject
Include
Exclude
Sécurité informatique.
(7)
COMPUTERS.
(5)
Electronic books.
(5)
Cryptography.
(4)
Security.
(4)
Computer Security
(3)
Computer networks -- Security measures.
(3)
Computer security
(3)
Artificial intelligence.
(2)
Business -- Data processing -- Security measures.
(2)
Business enterprises -- Computer networks -- Security measures.
(2)
COMPUTERS -- Security -- Cryptography & Encryption.
(2)
COMPUTERS / Security / General
(2)
Data protection.
(2)
Réseaux d'ordinateurs -- Sécurité -- Mesures.
(2)
Apprentissage automatique -- Sécurité -- Mesures.
(1)
Artificial intelligence
(1)
Artificial intelligence -- Security measures.
(1)
BUSINESS & ECONOMICS / Insurance / Risk Assessment & Management
(1)
BUSINESS & ECONOMICS / Production & Operations Management
(1)
BUSINESS & ECONOMICS.
(1)
Business -- Data processing -- Security measures
(1)
Business strategy
(1)
COMPUTERS -- Security -- General.
(1)
COMPUTERS / Internet / Online Safety & Privacy
(1)
COMPUTERS / Internet / Security
(1)
COMPUTERS / Networking / Security
(1)
COMPUTERS / Security / Network Security
(1)
Causes & prevention of crime
(1)
Chefs des services de l'information.
(1)
Chief information officers
(1)
Chief information officers.
(1)
Computer architecture & logic design
(1)
Computer networking & communications
(1)
Computer networks -- Security measures
(1)
Computer security -- Management
(1)
Computer security -- Management.
(1)
Computers -- Access control.
(1)
Criminology - legal aspects
(1)
Finance.
(1)
Financial Risk Management.
(1)
Gestion -- Informatique -- Sécurité -- Mesures.
(1)
Hacking
(1)
Hacking.
(1)
Information systems.
(1)
Information technology -- Security measures -- Management.
(1)
Information technology -- Security measures.
(1)
Intelligence (AI) & Semantics.
(1)
Intelligence artificielle -- Sécurité -- Mesures.
(1)
Intelligence artificielle.
(1)
Legal aspects of IT
(1)
Machine learning
(1)
Machine learning -- Security measures.
(1)
Management information systems -- Security measures.
(1)
Management information systems.
(1)
Penetration testing (Computer security)
(1)
Piratage informatique.
(1)
Security services
(1)
Systèmes d'information de gestion -- Sécurité -- Mesures.
(1)
Sécurité informatique -- Gestion.
(1)
TECHNOLOGY / Operations Research
(1)
Technologie de l'information -- Sécurité -- Mesures -- Gestion.
(1)
Tests d'intrusion.
(1)
cybersecurity;threat intelligence;risk assessment;artificial intelligence
(1)
More
View All
Fewer
Collapse All
Material Type
Include
Exclude
E-Book
Shelf Location
Include
Exclude
CRC Ebooks
Electronic Library
Taylor Francis E-Book Collection
Wiley E-Book Collection
Library
Include
Exclude
Online Library
false
{sortLabel}
{alphabetical}
{relevance}
{include}
{exclude}
{facetName}
{results}
{displayName}
{count}
{error}
Select an Action
Place Hold(s)
Add to My Lists
Email
Print
14 Results Found
1
2
Sort By:
Relevance (Default)
Publication Date (Ascending)
Publication Date (Descending)
Title
Author
00
DEFAULT
Select a list
Temporary List
Make this your default list.
The following items were successfully added.
There was an error while adding the following items. Please try again.
One or more items could not be added because you are not logged in.
13.
Cybersecurity and decision makers : data security and digital trust
Cybersecurity and decision makers : data security and digital trust
Author
Fréminville, Marie de, author.
Preferred Shelf Number
HF5548.37 .F74 2020
Electronic Access
https://onlinelibrary.wiley.com/doi/book/10.1002/9781119720362
Format:
Availability
Online Library~1
Available:
Copies:
14.
Hacking the hacker : learn from the experts who take down hackers
Hacking the hacker : learn from the experts who take down hackers
Author
Grimes, Roger A., author.
Preferred Shelf Number
QA76.9 .A25
Electronic Access
https://onlinelibrary.wiley.com/doi/book/10.1002/9781119396260
Format:
Availability
Online Library~1
Available:
Copies:
Select an Action
Place Hold(s)
Add to My Lists
Email
Print
1
2
Go to:
Search Results
|
Top of Page
|
Search Facets