Log In
|
My Account
|
My Lists
|
|
Remember to clear the cache and close the browser window.
Search Limit
Everything
E-Book
Journals
Beytepe Library
Health Sciences Library
Conservatory Library
Law Library
Social Sciences Vocational High School
DVD Collection
Prof.Dr. Onur Bilge Kula Collection
Rooms Restriction Values
All Fields
Title
Author
Subject
ISBN
ISSN
21
Search Field
All Fields
Target Value
Limit Value
Restriction Value
Search For:
Advanced Search
Limit Search Results
Narrowed by:
+
Subject: Computer security
Author
Include
Exclude
Agrawal, Akshat, 1986- editor.
(1)
Agrawal, Prateek, editor.
(1)
Akila, M. editor
(1)
Anand, R. S., author.
(1)
Dalipi, Fisnik, editor
(1)
David, Shiblin, author.
(1)
Duraklar, Kazım author.
(1)
Edwards, Jason, author.
(1)
Forno, Richard, author.
(1)
Grimes, Roger A., author.
(1)
Jeyakrishnan, V., author.
(1)
Kautish, Sandeep, 1981- editor.
(1)
Khatoun, Rida, author.
(1)
Mack, Sean D., author.
(1)
Madaan, Vishu, editor.
(1)
Maheswar, R. editor
(1)
Martiri, Edlira, editor
(1)
Mateczun, Laura, author.
(1)
Menon, Pranav, contributor.
(1)
Moyo, Siegfried, author.
(1)
Niranjanamurthy, M., author.
(1)
Norris, Donald F., author.
(1)
Poston, Howard E., III, author.
(1)
Rathee, Geetanjali, editor
(1)
Sharma, Anand, editor.
(1)
Sharma, Dilip Kumar, editor.
(1)
Sharma, Sanjay (Financial executive), author.
(1)
Sountharrajan, S. editor
(1)
Vajjhala, Narasimha, 1978- editor.
(1)
More
View All
Fewer
Collapse All
Language
Include
Exclude
English
(13)
Publication Date
Include
Exclude
-
2022
(5)
2025
(3)
2017
(1)
2020
(1)
2021
(1)
2023
(1)
2024
(1)
More
View All
Fewer
Collapse All
Subject
Include
Exclude
Computer security.
(11)
Electronic books.
(10)
Sécurité informatique.
(9)
COMPUTERS.
(8)
Security.
(8)
Networking.
(4)
Online Safety & Privacy.
(4)
Cryptography.
(3)
COMPUTERS / Internet / Online Safety & Privacy
(2)
COMPUTERS / Security / General
(2)
COMPUTERS / Security / Network Security
(2)
Causes & prevention of crime
(2)
Computer architecture & logic design
(2)
Computer networking & communications
(2)
Computer networks -- Security measures
(2)
Computer networks -- Security measures.
(2)
Criminology - legal aspects
(2)
Data protection
(2)
Legal aspects of IT
(2)
Réseaux d'ordinateurs -- Sécurité -- Mesures.
(2)
Security services
(2)
TECHNOLOGY & ENGINEERING.
(2)
Administration locale -- États-Unis.
(1)
Artificial intelligence.
(1)
BUSINESS & ECONOMICS -- Corporate Governance.
(1)
BUSINESS & ECONOMICS / Insurance / Risk Assessment & Management
(1)
BUSINESS & ECONOMICS.
(1)
Blockchains (Databases)
(1)
Business strategy
(1)
COMPUTERS -- Security -- General.
(1)
COMPUTERS / Security / Cryptography & Encryption
(1)
Chaînes de blocs.
(1)
Chiffrement (Informatique)
(1)
Cloud Computing.
(1)
Computer Science.
(1)
Computer crimes -- Risk assessment.
(1)
Computer security -- United States.
(1)
Criminalité informatique -- Évaluation du risque.
(1)
Cyberinfrastructure -- Security measures.
(1)
Data encryption (Computer science)
(1)
Data protection -- Law and legislation
(1)
Data protection -- Law and legislation -- European Union countries.
(1)
Data protection.
(1)
Digital communications -- Security measures.
(1)
Domotique -- Sécurité -- Mesures.
(1)
Dwellings -- Security measures
(1)
Dwellings -- Security measures.
(1)
Entrepreneurship.
(1)
European Parliament. General Data Protection Regulation.
(1)
European Union countries
(1)
Habitations -- Sécurité -- Mesures.
(1)
Hacking
(1)
Hacking.
(1)
Home automation -- Security measures.
(1)
Industrie 4.0.
(1)
Industry 4.0
(1)
Industry 4.0.
(1)
Internet -- Law and legislation.
(1)
Internet -- Security measures.
(1)
Internet -- Sécurité -- Mesures.
(1)
Internet des objets.
(1)
Internet of things
(1)
Internet of things.
(1)
LAW / Privacy
(1)
Law enforcement.
(1)
Leadership.
(1)
Local government
(1)
Local government -- United States.
(1)
Management information systems
(1)
Management information systems.
(1)
Micro-ordinateurs -- Accès -- Contrôle.
(1)
Microcomputers -- Access control
(1)
Microcomputers -- Access control.
(1)
Mobile & Wireless Communications.
(1)
Parlement européen. General Data Protection Regulation
(1)
Piratage informatique.
(1)
Police & security services
(1)
Police law & police procedures
(1)
Privacy, Right of
(1)
Protection de l'information (Informatique)
(1)
Protection de l'information (Informatique) -- Droit -- Pays de l'Union européenne.
(1)
Systèmes d'information de gestion.
(1)
Sécurité informatique -- États-Unis.
(1)
Telecommunications.
(1)
Transmission sans fil.
(1)
United States
(1)
Viruses & Malware.
(1)
Wireless communication systems
(1)
Wireless communication systems.
(1)
cybersecurity;threat intelligence;risk assessment;artificial intelligence
(1)
police;law enforcement;national security;cybersecurity;security technologies
(1)
More
View All
Fewer
Collapse All
Material Type
Include
Exclude
E-Book
Shelf Location
Include
Exclude
Taylor Francis E-Book Collection
Wiley E-Book Collection
Library
Include
Exclude
Online Library
false
{sortLabel}
{alphabetical}
{relevance}
{include}
{exclude}
{facetName}
{results}
{displayName}
{count}
{error}
Select an Action
Place Hold(s)
Add to My Lists
Email
Print
13 Results Found
1
2
Sort By:
Relevance (Default)
Publication Date (Ascending)
Publication Date (Descending)
Title
Author
0
DEFAULT
Select a list
Temporary List
Make this your default list.
The following items were successfully added.
There was an error while adding the following items. Please try again.
One or more items could not be added because you are not logged in.
13.
Hacking the hacker : learn from the experts who take down hackers
Hacking the hacker : learn from the experts who take down hackers
Author
Grimes, Roger A., author.
Preferred Shelf Number
QA76.9 .A25
Electronic Access
https://onlinelibrary.wiley.com/doi/book/10.1002/9781119396260
Format:
Availability
Online Library~1
Available:
Copies:
Select an Action
Place Hold(s)
Add to My Lists
Email
Print
1
2