Log In
|
My Account
|
My Lists
|
|
Remember to clear the cache and close the browser window.
Search Limit
Everything
E-Book
Journals
Beytepe Library
Health Sciences Library
Conservatory Library
Law Library
Social Sciences Vocational High School
DVD Collection
Prof.Dr. Onur Bilge Kula Collection
Rooms Restriction Values
All Fields
Title
Author
Subject
ISBN
ISSN
8
Search Field
All Fields
Target Value
Limit Value
Restriction Value
Search For:
Advanced Search
Limit Search Results
Narrowed by:
+
Subject: Computer crimes.
Author
Include
Exclude
SpringerLink (Online service)
(3)
Carafano, James Jay, 1955-
(2)
Project Muse.
(2)
Alexandrou, Alex (Professor of information technology security), author.
(1)
Antonucci, Domenic, author.
(1)
Bernik, Igor, author.
(1)
Carvey, Harlan.
(1)
Eagle, Chris.
(1)
Harper, Allen.
(1)
Harris, Shon.
(1)
Iorliam, Aamo. author.
(1)
Iyengar, S.S. editor.
(1)
Lenkey, Gideon.
(1)
Manjikian, Mary, author.
(1)
Miller, Drew, 1978-
(1)
Ness, Jonathan.
(1)
Skoudis, Ed.
(1)
Sun, Kun. editor.
(1)
Wang, Cliff. editor.
(1)
Willems, Eddy. author.
(1)
Williams, Terron.
(1)
Zeltser, Lenny.
(1)
More
View All
Fewer
Collapse All
Language
Include
Exclude
English
(13)
Publication Date
Include
Exclude
-
2011
(2)
2012
(2)
2019
(2)
2023
(2)
2004
(1)
2005
(1)
2014
(1)
2017
(1)
2022
(1)
More
View All
Fewer
Collapse All
Subject
Include
Exclude
Computer networks -- Security measures.
(10)
Computer security.
(5)
Computer networks -- Access control
(2)
Computer security -- Law and legislation.
(2)
Information society -- Political aspects.
(2)
Information technology -- Social aspects.
(2)
Information warfare -- Political aspects.
(2)
Internet and terrorism.
(2)
Social media.
(2)
Social networks.
(2)
War and society.
(2)
Africa—Economic conditions.
(1)
Artificial intelligence.
(1)
BUSINESS & ECONOMICS.
(1)
Biometrics (Biology).
(1)
Business -- Data processing -- Security measures
(1)
Business -- Data processing -- Security measures.
(1)
Business enterprises -- Computer networks -- Security measures
(1)
Business enterprises -- Computer networks -- Security measures.
(1)
COMPUTER SCIENCE -- General.
(1)
COMPUTERS / Security / General
(1)
Component software.
(1)
Computational intelligence.
(1)
Computer Crime.
(1)
Computer crimes
(1)
Computer crimes -- Investigation -- Methodology.
(1)
Computer hackers.
(1)
Computer networks -- Access control -- Handbooks, manuals, etc.
(1)
Computer networks -- Security measures -- Handbooks, manuals, etc.
(1)
Computer networks -- Security measures -- Moral and ethical aspects.
(1)
Computer networks.
(1)
Computer security -- Handbooks, manuals, etc.
(1)
Computer security -- United States.
(1)
Computers.
(1)
Cooperating objects (Computer systems).
(1)
Criminalité informatique.
(1)
Cyber-Physical Systems.
(1)
Cybercrime.
(1)
Cyberspace -- Security measures
(1)
Cyberspace -- Security measures.
(1)
Electronic books.
(1)
Finance.
(1)
Financial Risk Management.
(1)
Gestion -- Informatique -- Sécurité -- Mesures.
(1)
Gestion du risque.
(1)
Internet -- Moral and ethical aspects.
(1)
Internet.
(1)
LAW / Criminal Law / General
(1)
Law and legislation.
(1)
Malware (Computer software)
(1)
Microsoft Windows (Computer file)
(1)
Mobile and Network Security.
(1)
Operating systems (Computers)
(1)
PHILOSOPHY / Ethics & Moral Philosophy
(1)
POLITICAL SCIENCE / Political Freedom & Security / General
(1)
POLITICAL SCIENCE / Political Freedom & Security / Law Enforcement
(1)
Public safety.
(1)
Python (Computer program language)
(1)
Risk Management
(1)
Risk management.
(1)
Security systems.
(1)
More
View All
Fewer
Collapse All
Material Type
Include
Exclude
Book
E-Book
Shelf Location
Include
Exclude
Beytepe General Collection
Electronic Library
Taylor Francis E-Book Collection
Wiley E-Book Collection
Library
Include
Exclude
Beytepe Library
Online Library
false
{sortLabel}
{alphabetical}
{relevance}
{include}
{exclude}
{facetName}
{results}
{displayName}
{count}
{error}
Select an Action
Place Hold(s)
Add to My Lists
Email
Print
13 Results Found
1
2
Sort By:
Relevance (Default)
Publication Date (Ascending)
Publication Date (Descending)
Title
Author
0
DEFAULT
Select a list
Temporary List
Make this your default list.
The following items were successfully added.
There was an error while adding the following items. Please try again.
One or more items could not be added because you are not logged in.
13.
Malware : fighting malicious code
Malware : fighting malicious code
Author
Skoudis, Ed. Zeltser, Lenny.
Preferred Shelf Number
QA76.9.A25 S58 2004
Format:
Availability
Beytepe Library~1
Available:
Copies:
Select an Action
Place Hold(s)
Add to My Lists
Email
Print
1
2