Log In
|
My Account
|
My Lists
|
|
Remember to clear the cache and close the browser window.
Search Limit
Everything
E-Book
Journals
Beytepe Library
Health Sciences Library
Conservatory Library
Law Library
Social Sciences Vocational High School
DVD Collection
Prof.Dr. Onur Bilge Kula Collection
Rooms Restriction Values
All Fields
Title
Author
Subject
ISBN
ISSN
8
Search Field
All Fields
Target Value
Limit Value
Restriction Value
Search For:
Advanced Search
Limit Search Results
Narrowed by:
+
Subject: Computer crimes.
Author
Include
Exclude
SpringerLink (Online service)
(3)
Carafano, James Jay, 1955-
(2)
Project Muse.
(2)
Bernik, Igor, author.
(1)
Carvey, Harlan.
(1)
Eagle, Chris.
(1)
Ghernaouti-Helie, Solange, 1958, author.
(1)
Harper, Allen.
(1)
Harris, Shon.
(1)
Iorliam, Aamo. author.
(1)
Iyengar, S.S. editor.
(1)
Jakobsson, Markus.
(1)
Lenkey, Gideon.
(1)
Miller, Drew, 1978-
(1)
Ness, Jonathan.
(1)
Shimonski, Robert.
(1)
Skoudis, Ed.
(1)
Sun, Kun. editor.
(1)
Wang, Cliff. editor.
(1)
Willems, Eddy. author.
(1)
Williams, Terron.
(1)
Zeltser, Lenny.
(1)
More
View All
Fewer
Collapse All
Language
Include
Exclude
English
(13)
Publication Date
Include
Exclude
-
2012
(3)
2011
(2)
2014
(2)
2019
(2)
2004
(1)
2005
(1)
2013
(1)
2023
(1)
More
View All
Fewer
Collapse All
Subject
Include
Exclude
Computer networks -- Security measures.
(9)
Computer security.
(4)
Computer networks -- Access control
(2)
Cyber intelligence (Computer security)
(2)
Information society -- Political aspects.
(2)
Information technology -- Social aspects.
(2)
Information warfare -- Political aspects.
(2)
Internet -- Security measures.
(2)
Internet and terrorism.
(2)
Social media.
(2)
Social networks.
(2)
War and society.
(2)
Africa—Economic conditions.
(1)
Artificial intelligence.
(1)
Biometrics (Biology).
(1)
Component software.
(1)
Computational intelligence.
(1)
Computer Crime.
(1)
Computer crimes -- Investigation -- Methodology.
(1)
Computer hackers.
(1)
Computer networks -- Access control -- Handbooks, manuals, etc.
(1)
Computer networks -- Security measures -- Handbooks, manuals, etc.
(1)
Computer networks.
(1)
Computer security -- Handbooks, manuals, etc.
(1)
Computer security -- Law and legislation.
(1)
Computer security -- United States.
(1)
Computers.
(1)
Cooperating objects (Computer systems).
(1)
Cyber-Physical Systems.
(1)
Cybercrime.
(1)
Data protection.
(1)
Electronic commerce -- Security measures.
(1)
Electronic intelligence.
(1)
Internet in espionage.
(1)
Internet.
(1)
Law and legislation.
(1)
Malware (Computer software)
(1)
Microsoft Windows (Computer file)
(1)
Mobile and Network Security.
(1)
Operating systems (Computers)
(1)
Public safety.
(1)
Python (Computer program language)
(1)
Security systems.
(1)
More
View All
Fewer
Collapse All
Material Type
Include
Exclude
Book
E-Book
Shelf Location
Include
Exclude
Beytepe General Collection
CRC Ebooks
Electronic Library
Library
Include
Exclude
Beytepe Library
Online Library
false
{sortLabel}
{alphabetical}
{relevance}
{include}
{exclude}
{facetName}
{results}
{displayName}
{count}
{error}
Select an Action
Place Hold(s)
Add to My Lists
Email
Print
13 Results Found
1
2
Sort By:
Relevance (Default)
Publication Date (Ascending)
Publication Date (Descending)
Title
Author
0
DEFAULT
Select a list
Temporary List
Make this your default list.
The following items were successfully added.
There was an error while adding the following items. Please try again.
One or more items could not be added because you are not logged in.
13.
Malware : fighting malicious code
Malware : fighting malicious code
Author
Skoudis, Ed. Zeltser, Lenny.
Preferred Shelf Number
QA76.9.A25 S58 2004
Format:
Availability
Beytepe Library~1
Available:
Copies:
Select an Action
Place Hold(s)
Add to My Lists
Email
Print
1
2