Skip to:
Search Results
|
Content
|
Bottom
|
Search Facets
Log In
|
My Account
|
My Lists
|
|
Remember to clear the cache and close the browser window.
Search Limit
Everything
E-Book
Journals
Beytepe Library
Health Sciences Library
Conservatory Library
Law Library
Social Sciences Vocational High School
DVD Collection
Prof.Dr. Onur Bilge Kula Collection
Rooms Restriction Values
All Fields
Title
Author
Subject
ISBN
ISSN
13
Search Field
All Fields
Target Value
Limit Value
Restriction Value
Search For:
Advanced Search
Limit Search Results
Narrowed by:
+
Konu: Computer security.
Author
Include
Exclude
Agrawal, Akshat, 1986- editor.
(1)
Agrawal, Prateek, editor.
(1)
Agrawal, Rashmi, 1978-
(1)
Anand, R. S., author.
(1)
Anwar, Waqar, author.
(1)
Basta, Alfred, author.
(1)
Basta, Nadine, author.
(1)
Bhargava, Neeraj.
(1)
Bhargava, Ritu.
(1)
Boura, Christina, editor.
(1)
David, Shiblin, author.
(1)
Dooley, Michael, 1962- author.
(1)
Essar, Mohammad Ilyas, author.
(1)
Hook, David, 1962-
(1)
Jeyakrishnan, V., author.
(1)
John Wiley & Sons, publisher.
(1)
Kairab, Sudhanshu., author.
(1)
Kautish, Sandeep, 1981- editor.
(1)
Kumar, Budati Anil, edited.
(1)
Kumar, Singamaneni Kranthi, edited.
(1)
Landoll, Douglas J., author.
(1)
Li, Xingwang (Computer scientist), edited.
(1)
Madaan, Vishu, editor.
(1)
Naya-Plasencia, Maria, editor.
(1)
Niranjanamurthy, M., author.
(1)
O'Byrne, Serge, editor of compilation.
(1)
Quigley, Marian.
(1)
Rathore, Pramod Singh, 1988-
(1)
Rawat, Romil, editor.
(1)
Rooney, Timothy, 1962- author.
(1)
Sharma, Anand, editor.
(1)
Sharma, Dilip Kumar, editor.
(1)
Årnes, André, 1976- editor.
(1)
More
View All
Fewer
Collapse All
Language
Include
Exclude
English
(14)
Publication Date
Include
Exclude
-
2005
(3)
2021
(2)
2023
(2)
2025
(2)
2011
(1)
2013
(1)
2017
(1)
2018
(1)
2022
(1)
More
View All
Fewer
Collapse All
Subject
Include
Exclude
Sécurité informatique.
(9)
Electronic books.
(7)
Computer security
(4)
Cryptography.
(3)
TECHNOLOGY & ENGINEERING.
(3)
Telecommunications.
(3)
COMPUTERS -- Security -- General.
(2)
COMPUTERS.
(2)
Computer Security
(2)
Cyberinfrastructure -- Security measures.
(2)
Data mining.
(2)
Data protection.
(2)
Artificial Intelligence
(1)
Artificial intelligence.
(1)
Business -- Data processing -- Security measures -- Evaluation.
(1)
Business -- Data processing -- Security measures.
(1)
COMPUTERS -- Internet -- Security.
(1)
COMPUTERS -- Networking -- Security.
(1)
Communication électronique des pièces.
(1)
Computer crimes -- Investigation
(1)
Computer crimes -- Investigation.
(1)
Computer networks -- Security measures -- Evaluation.
(1)
Computer networks -- Security measures.
(1)
Computer security -- Management.
(1)
Criminalistique.
(1)
Criminalité informatique -- Enquêtes.
(1)
Cryptographie.
(1)
Cryptography
(1)
Cyberterrorism -- Prevention.
(1)
Data Mining
(1)
Electronic data processing departments -- Safety measures -- Planning.
(1)
Electronic discovery (Law)
(1)
Ethiek.
(1)
Exploration de données (Informatique)
(1)
Forensic sciences
(1)
Forensic sciences.
(1)
Industrie 4.0.
(1)
Industry 4.0
(1)
Industry 4.0.
(1)
Informatiebeleid.
(1)
Information technology -- Moral and ethical aspects.
(1)
Information technology -- Security measures -- Evaluation.
(1)
Information technology -- Social aspects.
(1)
Intelligence artificielle.
(1)
Internet -- Security measures.
(1)
Internet -- Sécurité -- Mesures.
(1)
Internet des objets.
(1)
Internet domain names -- Security measures.
(1)
Internet of things
(1)
Internet of things.
(1)
Java (Computer program language)
(1)
Logiciels libres.
(1)
MEDICAL -- Forensic Medicine.
(1)
Open source software.
(1)
Optical Data Processing.
(1)
Public key infrastructure (Computer security)
(1)
Risk assessment.
(1)
Réseaux d'ordinateurs -- Sécurité -- Mesures.
(1)
Security.
(1)
Sécurité informatique -- Gestion.
(1)
Technology -- Social aspects.
(1)
Veiligheidspolitiek.
(1)
forensic science.
(1)
More
View All
Fewer
Collapse All
Material Type
Include
Exclude
E-Book
Shelf Location
Include
Exclude
CRC Ebooks
Electronic Library
Wiley E-Book Collection
Library
Include
Exclude
Online Library
false
{sortLabel}
{alphabetical}
{relevance}
{include}
{exclude}
{facetName}
{results}
{displayName}
{count}
{error}
Select an Action
Place Hold(s)
Add to My Lists
Email
Print
14 Results Found
1
2
Sort By:
Relevance (Default)
Publication Date (Ascending)
Publication Date (Descending)
Title
Author
00
DEFAULT
Select a list
Temporary List
Make this your default list.
The following items were successfully added.
There was an error while adding the following items. Please try again.
One or more items could not be added because you are not logged in.
13.
Beginning cryptography with Java
Beginning cryptography with Java
Author
Hook, David, 1962-
Preferred Shelf Number
ONLINE
Electronic Access
EBSCOhost
http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=142234
Format:
Availability
Online Library~1
Available:
Copies:
14.
Information security and ethics social and organizational issues
Information security and ethics social and organizational issues
Author
Quigley, Marian.
Preferred Shelf Number
ONLINE
Electronic Access
EBSCOhost
http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=108396
Format:
Availability
Online Library~1
Available:
Copies:
Select an Action
Place Hold(s)
Add to My Lists
Email
Print
1
2
Go to:
Search Results
|
Top of Page
|
Search Facets