Log In
|
My Account
|
My Lists
|
|
Remember to clear the cache and close the browser window.
Search Limit
Everything
E-Book
Journals
Beytepe Library
Health Sciences Library
Conservatory Library
Law Library
Social Sciences Vocational High School
DVD Collection
Prof.Dr. Onur Bilge Kula Collection
Rooms Restriction Values
All Fields
Title
Author
Subject
ISBN
ISSN
11
Search Field
All Fields
Target Value
Limit Value
Restriction Value
Search For:
Advanced Search
Limit Search Results
Narrowed by:
+
Subject: Computer networks -- Security measures.
Author
Include
Exclude
SpringerLink (Online service)
(15)
ScienceDirect (Online service)
(10)
Wiley InterScience (Online service)
(5)
Dubrawsky, Ido.
(4)
Project Muse.
(4)
Vacca, John R.
(4)
Alder, Raven.
(3)
Baumrucker, C. Tate.
(3)
Cross, Michael, 1965-
(3)
IGI Global, publisher.
(3)
Peltier, Thomas R.
(3)
Rittinghouse, John W.
(3)
Shimonski, Robert.
(3)
Stallings, William.
(3)
Wiles, Jack.
(3)
Anderson, Brian (Brian James)
(2)
Andreou, Kimon.
(2)
Andress, Jason, author.
(2)
Andress, Jason.
(2)
Baker, Andrew R.
(2)
Barber, Brian.
(2)
Beale, Jay.
(2)
Bhardwaj, Pawan K.
(2)
Bradley, Tony, 1969-
(2)
Cameron, Rob.
(2)
Carafano, James Jay, 1955-
(2)
Carvey, Harlan A., author.
(2)
Chuvakin, Anton.
(2)
Cole, Eric.
(2)
Elbahadır, Hamza.
(2)
Esler, Joel.
(2)
Gatford, Chris.
(2)
Gold, André.
(2)
Gregg, Michael (Michael C.)
(2)
Haines, Brad.
(2)
Harper, Allen.
(2)
Harris, Shon.
(2)
Hunter, Laura E.
(2)
John Wiley & Sons.
(2)
Kleiman, Dave.
(2)
Kohlenberg, Toby.
(2)
Liu, Dale.
(2)
Liu, Vincent.
(2)
Long, Johnny.
(2)
Manzuik, Steve.
(2)
Maynor, David.
(2)
Meng, Weizhi. editor. (orcid)0000-0003-4384-5786
(2)
Northcutt, Stephen.
(2)
Oriyano, Sean-Philip.
(2)
Porter, Thomas, PhD.
(2)
Ransome, James F.
(2)
Satyanarayana, Mahesh.
(2)
Shinder, Debra Littlejohn.
(2)
Shinder, Thomas W.
(2)
Solomon, Michael G.
(2)
Syngress Media, Inc.
(2)
Thuraisingham, Bhavani M.
(2)
Tiller, James S.
(2)
Varsalone, Jesse.
(2)
Wayner, Peter, 1964-
(2)
Weiss, Martin M.
(2)
Williams, Branden R.
(2)
Abassi, Ryma, 1980- editor.
(1)
Acquisti, Alessandro.
(1)
Ahmad, David R. Mirza.
(1)
Akyıldız, M. Alparslan.
(1)
Alapati, Sam R.
(1)
Alpcan, Tansu.
(1)
Amini, Rob.
(1)
Andrés, Steven.
(1)
Archibald, Neil.
(1)
Artymiak, Jacek.
(1)
Ashbaugh, Douglas A.
(1)
Askarov, Aslan. editor.
(1)
Babbin, Jacob.
(1)
Bacik, Sandy.
(1)
Bahadur, Gary.
(1)
Ballew, Joli.
(1)
Barnes, Christian.
(1)
Baskin, Brian, author.
(1)
Baskin, Brian.
(1)
Bassioni, Ghada. editor.
(1)
Başar, Tamer.
(1)
Beale, Jay
(1)
Behrens, Thorsten.
(1)
Bendell, Dan.
(1)
Bernik, Igor, author.
(1)
Bhattacharyya, Dhruba K., author.
(1)
Bidgoli, Hossein, ed.
(1)
Birkholz, Erik Pace.
(1)
Blackley, John A.
(1)
Blask, Chris.
(1)
Blazy, Olivier. editor. (orcid)0000-0001-6205-8249
(1)
Bodmer, Sean.
(1)
Bolt, Steven.
(1)
Borkin, Mike.
(1)
Boudriga, Noureddine.
(1)
Bowers, John R.
(1)
Brashars, Joshua.
(1)
Bray, Rory.
(1)
Brodsky, Jacob.
(1)
Brooks, R. R. (Richard R.)
(1)
Budaghyan, Lilya. editor.
(1)
Burnett, Mark M.
(1)
Burton, James.
(1)
Caldwell, Wilma, ed.
(1)
Cannings, Rich.
(1)
Cantrell, Chris.
(1)
Carvalho, Alex de.
(1)
Carvey, Harlan A.
(1)
Carvey, Harlan.
(1)
Chaitanya, Manish.
(1)
Chapman, Chris, author.
(1)
Cheah, Chun Hai.
(1)
Cherry, Denny.
(1)
Chowdhury, Kaushik Roy. editor.
(1)
Chuvakin, Anton A., author.
(1)
Cid, Carlos. editor. (orcid)0000-0001-5761-8694
(1)
Cid, Daniel.
(1)
Clarke, Justin.
(1)
Contos, Brian T.
(1)
Cook, Randy (Randy R.)
(1)
Cross, Michael, 1965- author.
(1)
Danielyan, Edgar.
(1)
Davies, Joshua A. (Joshua Aaron)
(1)
Davis, Chris (Christopher Michael)
(1)
Davis, Michael A.
(1)
Davis, Peter T.
(1)
DeFranco, Joanna F., author.
(1)
Deal, Richard A.
(1)
Demchak, Chris C.
(1)
Deng, Robert. editor. (orcid)0000-0003-3491-8146
(1)
Di Felice, Marco. editor.
(1)
Dolev, Shlomi. editor.
(1)
Douligeris, C. (Christos)
(1)
Dubrawsky, Ida.
(1)
Dwivedi, Himanshu.
(1)
Eagle, Chris.
(1)
Easttom, Chuck.
(1)
Ellis, Juanita.
(1)
Ely, Adam.
(1)
Enbody, Richard J., author.
(1)
Erbschloe, Michael, 1951-
(1)
Erbschloe, Michael.
(1)
Fadyushin, Vyacheslav.
(1)
Faruki, Parvez. editor.
(1)
Fichera, Joe, 1966-
(1)
Fisch, Eric A.
(1)
Foster, James C.
(1)
Fournaris, Apostolos P. editor. (orcid)0000-0002-4758-2349
(1)
Foushee, James E.
(1)
Fowler, Kevvie, author.
(1)
Fung, K. T. (Kwok T.)
(1)
Furnell, Steven. editor. (orcid)0000-0003-0984-7542
(1)
Ganguly, Debashis.
(1)
Gaur, Manoj Singh. editor.
(1)
Geetha, S., 1979- editor.
(1)
Gevers, Rickey, author.
(1)
Gomes, Araceli Treu, author.
(1)
Gonzalez, Deborah, author.
(1)
Gough, Michael, 1963-
(1)
Gough, Michael.
(1)
Grasdal, Martin.
(1)
Griffor, Edward R., editor.
(1)
Gueye, Assane. editor. (orcid)0000-0001-6469-4716
(1)
Haaster, Jelle van, author.
(1)
Hallberg, Bruce A., 1964-
(1)
Hancock, Bill, 1957-
(1)
Hansen, René Rydhof. editor.
(1)
Harley, David.
(1)
Harrington, Jan L.
(1)
Hart-Davis, Guy.
(1)
Hatch, Brian. Hacking Linux exposed.
(1)
Hay, Andrew.
(1)
Held, Jonathan S.
(1)
Hendler, Danny. editor.
(1)
Henmi, Anne.
(1)
Howard, Doug.
(1)
Howard, Michael, 1965-
(1)
Hsu, D. Frank (Derbiau Frank), 1948-
(1)
ISECOM (Organization)
(1)
Inasi, Jason.
(1)
Iorliam, Aamo. author.
(1)
Jacobs, Stuart.
(1)
Jacobson Jr., Michael J. editor. (orcid)0000-0002-4906-0544
(1)
Jinwala, Devesh. editor.
(1)
Johnson, Norris L.
(1)
Jones, Andy.
(1)
Joshi, James B. D.
(1)
Joshi, R. C.
(1)
Juniper Networks, Inc.
(1)
Kabatiansky, G.
(1)
Kahate, Atul.
(1)
Kalita, Jugal Kumar, author.
(1)
Kanclirz, Jan.
(1)
Kane, Greg, editor of compilation.
(1)
Kaplan, Steve, 1955-
(1)
Kasacavage, Victor.
(1)
Kebe, Cheikh M.F. editor.
(1)
Kenyon, Tony, 1960-
(1)
More
View All
Fewer
Collapse All
Language
Include
Exclude
English
(266)
Turkish
(8)
Publication Date
Include
Exclude
-
2011
(32)
2007
(27)
2014
(24)
2006
(20)
2012
(20)
2008
(18)
2004
(17)
2019
(17)
2010
(16)
2005
(14)
2003
(13)
2002
(12)
2013
(10)
2017
(8)
2009
(7)
2016
(6)
2015
(5)
2001
(4)
2018
(4)
2000
(2)
1999
(1)
2020
(1)
2021
(1)
More
View All
Fewer
Collapse All
Subject
Include
Exclude
Computer security.
(123)
Electronic books.
(23)
Internet -- Security measures.
(18)
Bilgisayar ağları -- Güvenlik önlemleri.
(17)
Computer hackers.
(17)
Firewalls (Computer security)
(15)
Computers -- Access control.
(14)
Data protection.
(12)
Computer crimes -- Prevention.
(9)
Computer crimes -- Investigation.
(8)
Computer crimes.
(8)
Operating systems (Computers)
(8)
Web sites -- Security measures.
(8)
Wireless communication systems -- Security measures.
(8)
Computer communication systems.
(7)
Computer networks -- Access control.
(7)
Computer networks -- Management.
(7)
Data protection -- Standards.
(7)
Database security.
(7)
Client/server computing.
(6)
Information technology -- Security measures.
(6)
Microsoft Windows (Computer file)
(6)
Application software.
(5)
Bilgisayar güvenliği.
(5)
Computers.
(5)
Data encryption (Computer science).
(5)
Linux.
(5)
Artificial intelligence.
(4)
Computer network protocols.
(4)
Computer viruses.
(4)
Credit cards.
(4)
Data encryption (Computer science)
(4)
Database management.
(4)
Electronic data processing departments -- Security measures.
(4)
Information resources management.
(4)
Information warfare.
(4)
Internet telephony -- Security measures.
(4)
Internet.
(4)
Microsoft Windows server.
(4)
Open source software.
(4)
Penetration testing (Computer security)
(4)
Application software -- Development.
(3)
Bilgisayar korsanları.
(3)
Business -- Data processing -- Security measures.
(3)
Business enterprises -- Computer networks.
(3)
Computer Communication Networks.
(3)
Computer Security.
(3)
Computer crimes -- Investigation -- Methodology.
(3)
Computer networks.
(3)
Cryptography.
(3)
Cyberspace -- Security measures.
(3)
Electronic book collection.
(3)
Extranets (Computer networks)
(3)
Information storage and retrieval systems -- Security measures.
(3)
Liability for credit information.
(3)
Mac OS.
(3)
Machine learning.
(3)
Malware (Computer software)
(3)
Microsoft ISA server.
(3)
Microsoft Internet information server.
(3)
Risk assessment.
(3)
Risk management.
(3)
Routers (Computer networks)
(3)
Web servers.
(3)
Application logging (Computer science)
(2)
Application software -- Security measures.
(2)
Bilgisayar güvenliği
(2)
Business enterprises -- Security measures.
(2)
Cloud computing -- Security measures.
(2)
Coding theory.
(2)
Component software.
(2)
Computer architecture.
(2)
Computer crimes -- Case studies.
(2)
Computer networks -- Access control
(2)
Computer networks -- Remote access.
(2)
Computer science.
(2)
Computer security
(2)
Computer security -- Evaluation -- Methodology.
(2)
Computer security -- Management.
(2)
Crisis management.
(2)
Cyber intelligence (Computer security)
(2)
Cyberterrorism.
(2)
Data protection -- Law and legislation.
(2)
Electronic commerce -- Security measures.
(2)
Electronic commerce.
(2)
Electronic data processing departments -- Auditing.
(2)
Electronic mail systems -- Security measures.
(2)
Game theory.
(2)
Güvenlik duvarları (Bilgisayar güvenliği)
(2)
Information society -- Political aspects.
(2)
Information technology -- Social aspects.
(2)
Information warfare -- Political aspects.
(2)
Internet and terrorism.
(2)
Internetworking (Telecommunication)
(2)
Law and legislation.
(2)
Macintosh (Computer) -- Programming.
(2)
Microsoft Exchange server.
(2)
Microsoft Windows.
(2)
Military telecommunication.
(2)
Operations systems (Computer)
(2)
Public key infrastructure (Computer security)
(2)
Routing (Computer network management)
(2)
SQL (Computer program language)
(2)
Service-oriented architecture (Computer science)
(2)
Social media.
(2)
Social networks.
(2)
TCP/IP (Computer network protocol)
(2)
UNIX Shells.
(2)
War and society.
(2)
Web servers -- Security measures.
(2)
Wireless communication systems.
(2)
Access control.
(1)
Active server pages -- Security measures.
(1)
ActiveX.
(1)
Ad hoc networks (Computer networks) -- Security measures.
(1)
Africa—Economic conditions.
(1)
Ajax (Web site development technology)
(1)
Algebra -- Data processing.
(1)
AppleScript (Computer program language)
(1)
Application program interfaces (Computer software)
(1)
Askeri telekomünikasyon.
(1)
Auditing, Internal.
(1)
Açık kaynak yazılımı.
(1)
Bank credit cards.
(1)
Berkeley BSD (Computer file)
(1)
Bilgi ağları -- Güvenlik önlemleri.
(1)
Bilgi birikim ve erişim sistemleri -- Güvenlik önlemleri.
(1)
Bilgi güvenliği.
(1)
Bilgi savaşı.
(1)
Bilgisayar Güvenliği.
(1)
Bilgisayar ağları -- Bilgisayar güvenliği.
(1)
Bilgisayar ağları -- Emniyet ölçüleri.
(1)
Bilgisayar ağları -- Güvenlik ölçümleri.
(1)
Bilgisayar ağları -- Güvenlik önlemleri.
(1)
Bilgisayar güvenliği -- Değerlendirme -- Methodoloji.
(1)
Bilgisayar suçları -- Korunma.
(1)
Biometric identification.
(1)
Biometrics (Biology).
(1)
Business -- Data processing.
(1)
Business enterprises -- Communication systems -- Management.
(1)
Business enterprises -- Computer networks -- Security measures.
(1)
Business intelligence -- Data processing.
(1)
BİLGİSAYAR AĞLARI -- EMNİYET ÖLÇÜLERİ.
(1)
BİLGİSAYAR GÜVENLİĞİ.
(1)
C (Computer program language)
(1)
COMPUTERS -- Internet -- Security.
(1)
COMPUTERS -- Networking -- Security.
(1)
COMPUTERS -- Security -- General.
(1)
COMPUTERS / Internet / Security
(1)
COMPUTERS / Networking / Security
(1)
COMPUTERS / Security / General
(1)
Chief information officers.
(1)
Cisco IOS.
(1)
Cisco Systems, Inc.
(1)
Citrix MetaFrame.
(1)
Cloud Computing.
(1)
Cloud computing / Security measures.
(1)
Cloud computing.
(1)
Cognitive radio networks.
(1)
Computer algorithms.
(1)
Computer capacity -- Planning.
(1)
Computer crimes -- Investigation -- United States -- Methodology.
(1)
Computer input-output equipment.
(1)
Computer network architectures.
(1)
Computer networks -- Automatic control.
(1)
Computer networks -- Design and construction.
(1)
Computer networks -- Design.
(1)
Computer networks -- Reliability.
(1)
Computer networks -- Scalability.
(1)
Computer networks -- Testing.
(1)
Computer networks / Security measures.
(1)
Computer security -- Evaluation.
(1)
Computer security -- Law and legislation.
(1)
Computer security -- United States.
(1)
Computer software -- Management.
(1)
Computer system failures.
(1)
Computer system performance.
(1)
Computer terminals -- Remote terminals.
(1)
Computer vision.
(1)
Computers -- Access control -- Passwords.
(1)
Computers -- Law and legislation.
(1)
Computers and civilization.
(1)
Computersicherheit.
(1)
Corporations -- Auditing.
(1)
Corporations -- Security measures.
(1)
Credit cards -- Security measures.
(1)
Cybernetics.
(1)
Cyberterrorism -- Prevention.
(1)
Data mining.
(1)
Data protection -- Turkey.
(1)
Data warehousing.
(1)
Decision making.
(1)
Delictes informàtics -- Estats Units d'Amèrica -- Metodologia.
(1)
Digital communications -- Security measures.
(1)
Digital forensic science.
(1)
Digital watermarking.
(1)
Disruptive technologies.
(1)
Distributed databases.
(1)
Economics -- Evaluation.
(1)
Electronic data processing -- Auditing.
(1)
More
View All
Fewer
Collapse All
Material Type
Include
Exclude
Book
E-Book
Shelf Location
Include
Exclude
Beytepe General Collection
Electronic Library
Library
Include
Exclude
Beytepe Library
Online Library
false
{sortLabel}
{alphabetical}
{relevance}
{include}
{exclude}
{facetName}
{results}
{displayName}
{count}
{error}
Select an Action
Place Hold(s)
Add to My Lists
Email
Print
277 Results Found
1
..
20
21
22
23
24
Sort By:
Relevance (Default)
Publication Date (Ascending)
Publication Date (Descending)
Title
Author
0
DEFAULT
Select a list
Temporary List
Make this your default list.
The following items were successfully added.
There was an error while adding the following items. Please try again.
One or more items could not be added because you are not logged in.
277.
Auditing IT infrastructures for compliance
Auditing IT infrastructures for compliance
Author
Weiss, Martin M. Solomon, Michael G.
Preferred Shelf Number
QA76.9.A25 W428
Format:
Availability
Beytepe Library~1
Available:
Copies:
Select an Action
Place Hold(s)
Add to My Lists
Email
Print
1
..
20
21
22
23
24