Skip to:
Search Results
|
Content
|
Bottom
|
Search Facets
Log In
|
My Account
|
My Lists
|
|
Remember to clear the cache and close the browser window.
Search Limit
Everything
E-Book
Journals
Beytepe Library
Health Sciences Library
Conservatory Library
Law Library
Social Sciences Vocational High School
DVD Collection
Prof.Dr. Onur Bilge Kula Collection
Rooms Restriction Values
All Fields
Title
Author
Subject
ISBN
ISSN
13
Search Field
All Fields
Target Value
Limit Value
Restriction Value
Search For:
Advanced Search
Limit Search Results
Narrowed by:
+
Subject: Security.
Author
Include
Exclude
Carey, Marcus J. (Cybersecurity professional), author.
(2)
Allsopp, Wil, author.
(1)
Anson, Steve.
(1)
Benarous, Leila.
(1)
Bitam, Salim.
(1)
Carpenter, Perry, author.
(1)
Edwards, Jason (Cybersecurity expert), author.
(1)
Guha, Abhijit, editor.
(1)
Jin, Jennifer, author.
(1)
Jin, Jennifer.
(1)
Mellouk, Abdelhamid.
(1)
Messier, Ric, author.
(1)
Moschovitis, Christos J. P., author.
(1)
Moyo, Siegfried, author.
(1)
Panek, Crystal, author.
(1)
Poston, Howard E., III, author.
(1)
Pramanik, Sabyasachi, editor.
(1)
Samadi, Yasaman, 1993- author.
(1)
Samanta, Debabrata, 1987- editor.
(1)
Sohrabi, Nasrin, 1982- author.
(1)
Suaboot, Jakapan, 1984- author.
(1)
Tari, Zahir, 1961- author.
(1)
Tracy, Robb.
(1)
Vinay, M., editor.
(1)
Weaver, Griffin, author.
(1)
More
View All
Fewer
Collapse All
Language
Include
Exclude
English
(14)
Publication Date
Include
Exclude
-
2022
(4)
2019
(3)
2017
(2)
2020
(2)
2018
(1)
2023
(1)
2024
(1)
More
View All
Fewer
Collapse All
Subject
Include
Exclude
Electronic books.
(14)
COMPUTERS.
(13)
Computer networks -- Security measures
(11)
Computer networks -- Security measures.
(10)
Réseaux d'ordinateurs -- Sécurité -- Mesures.
(10)
Computer security.
(8)
Sécurité informatique.
(8)
Networking.
(7)
Viruses & Malware.
(5)
Computer Security
(4)
Online Safety & Privacy.
(4)
COMPUTERS -- Security -- General.
(3)
Computer security
(3)
Penetration testing (Computer security)
(3)
Cryptography.
(2)
Data protection
(2)
Data protection.
(2)
Protection de l'information (Informatique)
(2)
Tests d'intrusion.
(2)
BUSINESS & ECONOMICS -- Industries -- Computer Industry.
(1)
BUSINESS & ECONOMICS -- Production & Operations Management.
(1)
BUSINESS & ECONOMICS.
(1)
Blockchains (Databases)
(1)
Business enterprises -- Computer networks -- Security measures.
(1)
Business enterprises -- Computer programs.
(1)
Business enterprises -- Security measures
(1)
Business enterprises -- Security measures.
(1)
COMPUTERS -- Information Technology.
(1)
COMPUTERS -- Networking -- Security.
(1)
COMPUTERS -- Operating Systems -- General.
(1)
COMPUTERS -- Security -- Cryptography & Encryption.
(1)
COMPUTERS -- Security -- Cryptography.
(1)
COMPUTERS -- Security -- Networking.
(1)
COMPUTERS -- Security -- Online Safety & Privacy.
(1)
Chaînes de blocs.
(1)
Chiffrement (Informatique)
(1)
Computer crimes -- Prevention.
(1)
Computer crimes -- Risk assessment.
(1)
Computer industry
(1)
Computer industry.
(1)
Computer networks -- Security measures -- Computer programs
(1)
Computer networks -- Security measures -- Computer programs.
(1)
Computer networks -- Security measures -- Examinations, questions, etc.
(1)
Computer security -- Computer programs
(1)
Computer security -- Computer programs.
(1)
Computers
(1)
Computers.
(1)
Criminalité informatique -- Évaluation du risque.
(1)
Data encryption (Computer science)
(1)
Electronic digital computers
(1)
Electronic digital computers.
(1)
Entrepreneurship.
(1)
Entreprises -- Logiciels.
(1)
Entreprises -- Sécurité -- Mesures.
(1)
Examinations
(1)
Examinations.
(1)
Gestion du risque.
(1)
Information filtering systems
(1)
Information filtering systems.
(1)
Information technology -- Management
(1)
Information technology -- Management.
(1)
Information technology -- Security measures -- Management.
(1)
Informatique -- Industrie.
(1)
Intelligent transportation systems -- Security measures
(1)
Internet -- Security measures
(1)
Internet -- Security measures.
(1)
Internet -- Sécurité -- Mesures.
(1)
Leadership.
(1)
Logiciels malveillants -- Identification -- Logiciels.
(1)
Malware (Computer software) -- Identification -- Computer programs.
(1)
Malware (Computer software) -- Prevention -- Computer programs.
(1)
Management information systems
(1)
Management information systems.
(1)
Neural Networks.
(1)
Ordinateurs.
(1)
Penetration testing (Computer security) -- Examinations, questions, etc.
(1)
Risk management
(1)
Risk management.
(1)
Réseaux ad hoc de véhicules -- Sécurité -- Mesures.
(1)
Réseaux d'ordinateurs -- Sécurité -- Mesures -- Examens, questions, etc.
(1)
Réseaux d'ordinateurs -- Sécurité -- Mesures -- Logiciels.
(1)
Systèmes d'information de gestion.
(1)
Systèmes de filtrage d'information.
(1)
Sécurité informatique -- Logiciels.
(1)
Technologie de l'information -- Gestion.
(1)
Technologie de l'information -- Sécurité -- Mesures -- Gestion.
(1)
Telecommunications engineers -- Certification
(1)
Telecommunications engineers -- Certification -- Examinations, questions, etc.
(1)
Tests d'intrusion -- Examens, questions, etc.
(1)
Vehicular ad hoc networks (Computer networks) -- Security measures.
(1)
More
View All
Fewer
Collapse All
Material Type
Include
Exclude
E-Book
Shelf Location
Include
Exclude
Wiley E-Book Collection
Library
Include
Exclude
Online Library
false
{sortLabel}
{alphabetical}
{relevance}
{include}
{exclude}
{facetName}
{results}
{displayName}
{count}
{error}
Select an Action
Place Hold(s)
Add to My Lists
Email
Print
14 Results Found
1
2
Sort By:
Relevance (Default)
Publication Date (Ascending)
Publication Date (Descending)
Title
Author
00
DEFAULT
Select a list
Temporary List
Make this your default list.
The following items were successfully added.
There was an error while adding the following items. Please try again.
One or more items could not be added because you are not logged in.
13.
Advanced penetration testing : hacking the world's most secure networks
Advanced penetration testing : hacking the world's most secure networks
Author
Allsopp, Wil, author.
Preferred Shelf Number
QA76.9 .A25
Electronic Access
https://onlinelibrary.wiley.com/doi/book/10.1002/9781119367741
Format:
Availability
Online Library~1
Available:
Copies:
14.
Network forensics
Network forensics
Author
Messier, Ric, author.
Preferred Shelf Number
TK5105.59
Electronic Access
https://onlinelibrary.wiley.com/doi/book/10.1002/9781119329190
Format:
Availability
Online Library~1
Available:
Copies:
Select an Action
Place Hold(s)
Add to My Lists
Email
Print
1
2
Go to:
Search Results
|
Top of Page
|
Search Facets