Log In
|
My Account
|
My Lists
|
|
Remember to clear the cache and close the browser window.
Search Limit
Everything
E-Book
Journals
Beytepe Library
Health Sciences Library
Conservatory Library
Law Library
Social Sciences Vocational High School
DVD Collection
Prof.Dr. Onur Bilge Kula Collection
Rooms Restriction Values
All Fields
Title
Author
Subject
ISBN
ISSN
16
Search Field
All Fields
Target Value
Limit Value
Restriction Value
Search For:
Advanced Search
Limit Search Results
Narrowed by:
+
Subject: Computer security.
Author
Include
Exclude
SpringerLink (Online service)
(9)
Wiley InterScience (Online service)
(4)
Cross, Michael, 1965-
(3)
IGI Global, publisher.
(3)
ScienceDirect (Online service)
(3)
Wiles, Jack.
(3)
Akyıldız, M. Alparslan.
(2)
Anderson, Brian (Brian James)
(2)
Andreou, Kimon.
(2)
Barber, Brian.
(2)
Bhardwaj, Pawan K.
(2)
Brotby, W. Krag., author.
(2)
Carvey, Harlan A., author.
(2)
Dubrawsky, Ido.
(2)
Gregg, Michael (Michael C.)
(2)
Harper, Allen.
(2)
Harris, Shon.
(2)
Kleiman, Dave.
(2)
Liu, Vincent.
(2)
Long, Johnny.
(2)
Maynor, David.
(2)
Peltier, Thomas R., author.
(2)
Rittinghouse, John W.
(2)
Satyanarayana, Mahesh.
(2)
Scambray, Joel.
(2)
Solomon, Michael G.
(2)
Stallings, William.
(2)
Weiss, Martin M.
(2)
Acquisti, Alessandro.
(1)
Ahmad, David R. Mirza.
(1)
Alder, Raven.
(1)
Amini, Rob.
(1)
Andress, Jason, author.
(1)
Andress, Jason.
(1)
Ashbaugh, Douglas A., author.
(1)
Askarov, Aslan. editor.
(1)
Bacik, Sandy., author.
(1)
Ballew, Joli.
(1)
Baskin, Brian, author.
(1)
Baumrucker, C. Tate.
(1)
Beale, Jay.
(1)
Blask, Chris.
(1)
Blazy, Olivier. editor. (orcid)0000-0001-6205-8249
(1)
Bodmer, Sean.
(1)
Bowers, John R.
(1)
Bray, Rory.
(1)
Brodsky, Jacob.
(1)
Burton, James.
(1)
CRC Press LLC.
(1)
Caldwell, Wilma, ed.
(1)
Cannings, Rich.
(1)
Carvey, Harlan A.
(1)
Carvey, Harlan.
(1)
Chaitanya, Manish.
(1)
Cid, Carlos. editor. (orcid)0000-0001-5761-8694
(1)
Cid, Daniel.
(1)
Clarke, Justin.
(1)
Cole, Eric.
(1)
Contos, Brian T.
(1)
Cook, Randy (Randy R.)
(1)
Cross, Michael, 1965- author.
(1)
Dalziel, Henry, editor.
(1)
Davis, Chris (Christopher Michael)
(1)
Davis, Michael A.
(1)
DeFranco, Joanna F., author.
(1)
Deng, Robert. editor. (orcid)0000-0003-3491-8146
(1)
Dolev, Shlomi. editor.
(1)
Dubrawsky, Ida.
(1)
Dwivedi, Himanshu.
(1)
Eagle, Chris.
(1)
Easttom, Chuck.
(1)
Ellis, Juanita.
(1)
Ely, Adam.
(1)
Erbschloe, Michael.
(1)
Faruki, Parvez. editor.
(1)
Fisch, Eric A.
(1)
Fournaris, Apostolos P. editor. (orcid)0000-0002-4758-2349
(1)
Fowler, Kevvie, author.
(1)
Ganguly, Debashis., author.
(1)
Gaur, Manoj Singh. editor.
(1)
Geetha, S., 1979- editor.
(1)
Gomes, Araceli Treu, author.
(1)
Griffor, Edward R., editor.
(1)
Haines, Brad.
(1)
Hancock, Bill, 1957-
(1)
Hansen, René Rydhof. editor.
(1)
Hatch, Brian. Hacking Linux exposed.
(1)
Hay, Andrew.
(1)
Held, Jonathan S., author.
(1)
Hendler, Danny. editor.
(1)
Hinson, Gary.
(1)
Howard, Doug.
(1)
Howard, Michael, 1965-
(1)
Hunter, Laura E.
(1)
ISECOM (Organization)
(1)
Jacobs, Stuart.
(1)
Jacobson Jr., Michael J. editor. (orcid)0000-0002-4906-0544
(1)
Jinwala, Devesh. editor.
(1)
John Wiley & Sons.
(1)
Johnson, Norris L.
(1)
Joshi, R. C., author.
(1)
Kabay, Michel E.
(1)
Kairab, Sudhanshu., author.
(1)
Kane, Greg, editor of compilation.
(1)
Khan, Latifur.
(1)
Khosrow-Pour, Mehdi, 1951- editor.
(1)
Kissell, Joe.
(1)
Kolde, Jennifer.
(1)
Koppel, Lorna, editor of compilation.
(1)
Kouns, Jake.
(1)
Kurtz, George.
(1)
Lackey, Zane.
(1)
Lahiri, Shibamouli.
(1)
Lampropoulos, Konstantinos. editor.
(1)
Laxmi, Vijay. editor.
(1)
Layton, Timothy P., author.
(1)
LeBlanc, David, 1960-
(1)
LeMasters, Aaron.
(1)
Leary, Mark, author.
(1)
Lenkey, Gideon.
(1)
Levi, Albert, 1969-
(1)
Li, Shancang, author.
(1)
Li, Zhou. editor.
(1)
Lillard, Terrence.
(1)
Lin, Zhiqiang. editor.
(1)
Liska, Allan, author.
(1)
Liu, Dale.
(1)
Liu, Lei, 1968, author.
(1)
Lodha, Sachin. editor.
(1)
Lynch, F. William.
(1)
Majumdar, Suryadipta. editor. (orcid)0000-0002-6501-4214
(1)
Martin, Brian, editor.
(1)
Marín Tordera, Eva. editor.
(1)
Masud, Mehedy., author.
(1)
McClure, Stuart.
(1)
McHoes, Ann McIver, 1950-
(1)
Meng, Weizhi. editor. (orcid)0000-0003-4384-5786
(1)
Miles, Wyman.
(1)
Miller, David, 1959 Nov. 5-
(1)
Minoli, Daniel, 1952-
(1)
Mitchell, Ed, 1945-
(1)
Moeller, Robert R.
(1)
Nandi, Sukumar. editor.
(1)
Ness, Jonathan.
(1)
Niemi, Valtteri.
(1)
Nyberg, Kaisa, 1948-
(1)
Oncioiu, Ionica, 1972- editor.
(1)
Oriyano, Sean-Philip.
(1)
Osipov, Vitaly.
(1)
Papamanthou, Charalampos. editor.
(1)
Parker, Tom, 1982-
(1)
Pathan, Al-Sakib Khan, editor.
(1)
Perez, Richard, 1969 Oct. 17-
(1)
Phamila, Asnath Victy, 1978- editor.
(1)
Polychronakis, Michalis. editor.
(1)
Prince, Kevin.
(1)
Qian, Yi, 1962-
(1)
Radvanovsky, Robert.
(1)
Rafnsson, Willard. editor.
(1)
Ransome, James F.
(1)
Ring, Sandra.
(1)
Romdhani, Imed, contributor.
(1)
Russell, Ryan, 1969-
(1)
Sammons, John, author.
(1)
Sardana, Anjali.
(1)
Schiller, Craig A.
(1)
Schiller, Mike.
(1)
Schäfer, Günter, Dr.-Ing.
(1)
Shackleford, Dave, editor.
(1)
Shinder, Debra Littlejohn. Scene of the cybercrime.
(1)
Sima, Caleb.
(1)
Sims, Kristin, author.
(1)
Singh, Virendra. editor.
(1)
Skoudis, Ed.
(1)
Speed, Tim.
(1)
Stapko, Timothy John.
(1)
Stapleton, Jeffrey James, author.
(1)
Stefanek, George L.
(1)
Stowe, Geoffrey, author.
(1)
Street, Jayson E.
(1)
Street, Jayson E. Dissecting the hack.
(1)
Street, Jayson E., author.
(1)
Sullivan, Bryan, 1974-
(1)
Sweeney, Michael
(1)
Talukder, Asoke K., author.
(1)
Thuraisingham, Bhavani M.
(1)
Tibble, Ian., author.
(1)
Tiller, James S., author.
(1)
Timm, Carl.
(1)
Todd, Chad.
(1)
Todorov, Dobromir., author.
(1)
Traxler, Julie.
(1)
Ulsch, N. MacDonnell, 1951-
(1)
Usta, Gökhan.
(1)
VARSALONE, JESSE.
(1)
Vacca, John R.
(1)
VanDyke, Stephen.
(1)
Varsalone, Jesse.
(1)
Vemuri, V. Rao.
(1)
Viega, John.
(1)
More
View All
Fewer
Collapse All
Language
Include
Exclude
English
(128)
Turkish
(4)
Publication Date
Include
Exclude
-
2011
(18)
2019
(13)
2006
(11)
2008
(11)
2010
(11)
2007
(10)
2012
(7)
2014
(7)
2017
(7)
2003
(6)
2004
(6)
2001
(4)
2009
(4)
2013
(4)
2016
(4)
2002
(2)
2005
(2)
2020
(2)
1999
(1)
2000
(1)
2015
(1)
2018
(1)
More
View All
Fewer
Collapse All
Subject
Include
Exclude
Computer networks -- Security measures.
(123)
Data protection.
(14)
Computer hackers.
(12)
Electronic books.
(12)
Business enterprises -- Computer networks -- Security measures.
(8)
Internet -- Security measures.
(8)
Computers -- Access control.
(7)
Bilgisayar ağları -- Güvenlik önlemleri.
(6)
Bilgisayar güvenliği.
(6)
Computer crimes -- Investigation.
(6)
Database security.
(6)
Information technology -- Security measures.
(6)
Microsoft Windows (Computer file)
(6)
Web sites -- Security measures.
(6)
Computer communication systems.
(5)
Computer crimes -- Prevention.
(5)
Wireless communication systems -- Security measures.
(5)
Application software.
(4)
Computer crimes.
(4)
Operating systems (Computers)
(4)
Computer crimes -- Investigation -- Methodology.
(3)
Computers.
(3)
Data encryption (Computer science).
(3)
Electronic book collection.
(3)
Firewalls (Computer security)
(3)
Risk assessment.
(3)
Application software -- Development.
(2)
Artificial intelligence.
(2)
Component software.
(2)
Computer crimes -- Case studies.
(2)
Computer networks.
(2)
Corporations -- Security measures.
(2)
Cyber intelligence (Computer security)
(2)
Data encryption (Computer science)
(2)
Electronic data processing departments -- Auditing.
(2)
Hackers.
(2)
Information resources management.
(2)
Linux.
(2)
Mac OS.
(2)
Machine learning.
(2)
Malware (Computer software)
(2)
Microsoft Windows.
(2)
Operations systems (Computer)
(2)
Public key infrastructure (Computer security)
(2)
SQL (Computer program language)
(2)
Web servers -- Security measures.
(2)
Access control.
(1)
ActiveX.
(1)
Ad hoc networks (Computer networks) -- Security measures.
(1)
Ajax (Web site development technology)
(1)
Application logging (Computer science)
(1)
Application software -- Security measures.
(1)
Auditing, Internal.
(1)
Berkeley BSD (Computer file)
(1)
Bilgi ağları -- Güvenlik önlemleri.
(1)
Bilgi güvenliği.
(1)
Bilgisayar Güvenliği.
(1)
Bilgisayar ağları -- Emniyet ölçüleri.
(1)
Bilgisayar korsanları.
(1)
Bilgisayar suçları -- Korunma.
(1)
Business -- Data processing -- Security measures -- Evaluation.
(1)
Business -- Data processing -- Security measures.
(1)
Business -- Data processing.
(1)
Business enterprises -- Communication systems -- Management.
(1)
Business intelligence -- Data processing.
(1)
BİLGİSAYAR AĞLARI -- EMNİYET ÖLÇÜLERİ.
(1)
BİLGİSAYAR GÜVENLİĞİ.
(1)
C (Computer program language)
(1)
COMPUTERS -- Internet -- Security.
(1)
COMPUTERS -- Networking -- Security.
(1)
COMPUTERS -- Security -- General.
(1)
COMPUTERS / Networking / General
(1)
COMPUTERS / Security / General
(1)
Cloud computing -- Security measures.
(1)
Cloud computing.
(1)
Coding theory.
(1)
Computer architecture.
(1)
Computer crimes -- Investigation -- United States -- Methodology.
(1)
Computer networks -- Automatic control.
(1)
Computer networks -- Design and construction.
(1)
Computer networks -- Management.
(1)
Computer networks -- Reliability.
(1)
Computer networks -- Security measures.
(1)
Computer networks -- Security measures
(1)
Computer networks -- Security measures -- Evaluation.
(1)
Computer science.
(1)
Computer security -- Law and legislation.
(1)
Computer security -- United States.
(1)
Computer system failures.
(1)
Computers -- Access control -- Passwords.
(1)
Computers and civilization.
(1)
Confidential business information.
(1)
Corporations -- Auditing.
(1)
Cybernetics.
(1)
Cyberterrorism.
(1)
Data mining.
(1)
Data protection -- Law and legislation.
(1)
Data protection -- Standards.
(1)
Database management.
(1)
Delictes informàtics -- Estats Units d'Amèrica -- Metodologia.
(1)
Digital communications -- Security measures.
(1)
Digital forensic science.
(1)
Electronic commerce -- Security measures.
(1)
Electronic data processing -- Auditing.
(1)
Electronic data processing departments -- Safety measures -- Planning.
(1)
Electronic information resources -- Access control.
(1)
Embedded computer systems.
(1)
Forensic sciences.
(1)
Global system for mobile communications -- Security measures.
(1)
Google.
(1)
Güvenlik duvarları (Bilgisayar güvenliği)
(1)
Hacking.
(1)
Hard disk management.
(1)
Industries -- Security measures.
(1)
Information audits.
(1)
Information storage and retrieval systems -- Security measures.
(1)
Information technology -- Auditing.
(1)
Information technology -- Management.
(1)
Information technology -- Security measures -- Evaluation.
(1)
Information technology.
(1)
Internet -- Mesures de seguretat.
(1)
Internet domain names.
(1)
Internet of things.
(1)
Internet programming.
(1)
Law and legislation.
(1)
Macintosh (Computer) -- Programming.
(1)
Malware (Computer software) -- Prevention.
(1)
Mathematical statistics.
(1)
Memory management (Computer science)
(1)
Microsoft Windows (Computer file) -- Security measures.
(1)
Microsoft Windows (Fitxer informàtic) -- Mesures de seguretat.
(1)
Microsoft Windows server.
(1)
Mobile communication systems -- Security measures.
(1)
National security.
(1)
OSSEC (Computer file)
(1)
Online social networks -- Security measures.
(1)
Open source software.
(1)
Ordinadors, Xarxes d' -- Mesures de seguretat.
(1)
Public safety.
(1)
Python (Computer program language)
(1)
Radio frequency identification systems.
(1)
Risk management.
(1)
Rootkits (Computer software)
(1)
Routing (Computer network management)
(1)
Security systems.
(1)
Seguretat informàtica.
(1)
Self-adaptive software.
(1)
Sensor networks -- Security measures.
(1)
Service-oriented architecture (Computer science)
(1)
Sibernetik.
(1)
Solaris (Computer file)
(1)
Storage area networks (Computer networks) -- Security measures.
(1)
UNIX Shells.
(1)
Ulusal Güvenlik.
(1)
Universal Mobile Telecommunications System -- Security measures.
(1)
Web 2.0 -- Security measures.
(1)
Web 2.0.
(1)
Web search engines.
(1)
Web servers -- Software.
(1)
Web services.
(1)
Web sites -- Design.
(1)
World Wide Web -- Security measures.
(1)
İşletim sistemleri (Bilgisayar)
(1)
More
View All
Fewer
Collapse All
Material Type
Include
Exclude
Book
E-Book
Shelf Location
Include
Exclude
Beytepe General Collection
CRC Ebooks
Electronic Library
Library
Include
Exclude
Beytepe Library
Online Library
false
{sortLabel}
{alphabetical}
{relevance}
{include}
{exclude}
{facetName}
{results}
{displayName}
{count}
{error}
Select an Action
Place Hold(s)
Add to My Lists
Email
Print
133 Results Found
1
..
8
9
10
11
12
Sort By:
Relevance (Default)
Publication Date (Ascending)
Publication Date (Descending)
Title
Author
0
DEFAULT
Select a list
Temporary List
Make this your default list.
The following items were successfully added.
There was an error while adding the following items. Please try again.
One or more items could not be added because you are not logged in.
1.
Auditing IT infrastructures for compliance
Auditing IT infrastructures for compliance
Author
Weiss, Martin M. Solomon, Michael G.
Preferred Shelf Number
QA76.9.A25 W428
Format:
Availability
Beytepe Library~1
Available:
Copies:
Select an Action
Place Hold(s)
Add to My Lists
Email
Print
1
..
8
9
10
11
12