Log In
|
My Account
|
My Lists
|
|
Remember to clear the cache and close the browser window.
Search Limit
Everything
E-Book
Journals
Beytepe Library
Health Sciences Library
Conservatory Library
Law Library
Social Sciences Vocational High School
DVD Collection
Prof.Dr. Onur Bilge Kula Collection
Rooms Restriction Values
All Fields
Title
Author
Subject
ISBN
ISSN
8
Search Field
All Fields
Target Value
Limit Value
Restriction Value
Search For:
Advanced Search
Limit Search Results
Author
Include
Exclude
Carey, Marcus J. (Cybersecurity professional), author.
(3)
Jin, Jennifer, author.
(2)
Jin, Jennifer.
(2)
Taylor and Francis.
(2)
Arun, Jai Singh, author.
(1)
Bray, Shannon, 1972-
(1)
Carey, Marcus J. (Cybersecurity professional)
(1)
Diffie, Whitfield, writer of foreword.
(1)
Duraklar, Kazım author.
(1)
Fréminville, Marie de, author.
(1)
Harishankar, Ray, author.
(1)
Kahn, David, eauthor.
(1)
Katz, Jonathan, author.
(1)
Knight, Alissa, author.
(1)
Menezes, Alfred J., author.
(1)
Mondal, Bhaskar, editor.
(1)
Quade, Phil.
(1)
Rajput, Shyam Singh, editor.
(1)
Rjaibi, Walid, author.
(1)
Vanstone, Scott A., author.
(1)
van Oorschot, Paul C., author.
(1)
More
View All
Fewer
Collapse All
Language
Include
Exclude
English
(13)
Publication Date
Include
Exclude
-
2020
(5)
2019
(3)
2025
(2)
1997
(1)
2014
(1)
2018
(1)
2026
(1)
More
View All
Fewer
Collapse All
Subject
Include
Exclude
Cryptography.
(11)
Electronic books.
(9)
Security.
(8)
Computer security.
(7)
Sécurité informatique.
(6)
COMPUTERS -- Security -- Cryptography & Encryption.
(5)
COMPUTERS.
(5)
COMPUTERS -- Security -- Cryptography.
(4)
Computer Security
(4)
Computer security
(3)
Computers
(3)
Computers.
(3)
Ordinateurs.
(3)
COMPUTERS / Internet / Online Safety & Privacy
(2)
COMPUTERS / Security / Cryptography & Encryption
(2)
COMPUTERS / Security / Network Security
(2)
Computer networks -- Security measures
(2)
Computer networks -- Security measures.
(2)
Electronic digital computers
(2)
Electronic digital computers.
(2)
Penetration testing (Computer security)
(2)
Réseaux d'ordinateurs -- Sécurité -- Mesures.
(2)
Tests d'intrusion.
(2)
Automated vehicles
(1)
Automated vehicles -- Security measures.
(1)
Automated vehicles.
(1)
Business -- Data processing -- Security measures
(1)
Business -- Data processing -- Security measures.
(1)
Business enterprises -- Security measures
(1)
Business enterprises -- Security measures.
(1)
COMPUTERS / Interactive & Multimedia
(1)
COMPUTERS / Operating Systems / General.
(1)
COMPUTERS / Security / Cryptography.
(1)
COMPUTERS / Security / General
(1)
COMPUTERS / Security / General.
(1)
COMPUTERS / Security / Viruses & Malware
(1)
Causes & prevention of crime
(1)
Chiffrement (Informatique)
(1)
Computer architecture & logic design
(1)
Computer networking & communications
(1)
Computer security -- Management
(1)
Computer security -- Management.
(1)
Computers -- Access control -- Handbooks, manuals, etc.
(1)
Computers -- Access control.
(1)
Criminology - legal aspects
(1)
Cryptographie.
(1)
Cryptography -- Handbooks, manuals, etc.
(1)
Data encryption (Computer science)
(1)
Data protection
(1)
Data protection.
(1)
Digital communications -- Security measures.
(1)
Electronic intelligence.
(1)
Entreprises -- Sécurité -- Mesures.
(1)
Gestion -- Informatique -- Sécurité -- Mesures.
(1)
Gestion du risque.
(1)
Hacking
(1)
Hacking.
(1)
Information technology -- Security measures -- Management.
(1)
Informatique quantique.
(1)
Internet -- Law and legislation.
(1)
LAW / Privacy
(1)
Law enforcement.
(1)
Legal aspects of IT
(1)
Military intelligence.
(1)
Multimedia systems -- Security measures.
(1)
POLITICAL SCIENCE / Political Freedom & Security / International Security.
(1)
Piratage informatique.
(1)
Police & security services
(1)
Police law & police procedures
(1)
Protection de l'information (Informatique)
(1)
Python (Computer program language)
(1)
Python (Langage de programmation)
(1)
Quantum computing.
(1)
Risk management
(1)
Risk management.
(1)
Security services
(1)
Sécurité informatique -- Gestion.
(1)
Technologie de l'information -- Sécurité -- Mesures -- Gestion.
(1)
Véhicules autonomes -- Sécurité -- Mesures.
(1)
Véhicules autonomes.
(1)
World War, 1939-1945 -- Cryptography.
(1)
World War, 1939-1945 -- Electronic intelligence.
(1)
World War, 1939-1945 -- Military intelligence.
(1)
police;law enforcement;national security;cybersecurity;security technologies
(1)
More
View All
Fewer
Collapse All
Material Type
Include
Exclude
E-Book
Shelf Location
Include
Exclude
CRC Ebooks
Taylor Francis E-Book Collection
Wiley E-Book Collection
Library
Include
Exclude
Online Library
false
{sortLabel}
{alphabetical}
{relevance}
{include}
{exclude}
{facetName}
{results}
{displayName}
{count}
{error}
Select an Action
Place Hold(s)
Add to My Lists
Email
Print
13 Results Found
1
2
Sort By:
Relevance (Default)
Publication Date (Ascending)
Publication Date (Descending)
Title
Author
0
DEFAULT
Select a list
Temporary List
Make this your default list.
The following items were successfully added.
There was an error while adding the following items. Please try again.
One or more items could not be added because you are not logged in.
13.
How i discovered World War II's greatest spy and other stories of intelligence and code
How i discovered World War II's greatest spy and other stories of intelligence and code
Author
Kahn, David, eauthor. Taylor and Francis.
Preferred Shelf Number
D810 .S7
Electronic Access
Click here to view.
Format:
Availability
Online Library~1
Available:
Copies:
Select an Action
Place Hold(s)
Add to My Lists
Email
Print
1
2