Log In
|
My Account
|
My Lists
|
|
Remember to clear the cache and close the browser window.
Search Limit
Everything
E-Book
Journals
Beytepe Library
Health Sciences Library
Conservatory Library
Law Library
Social Sciences Vocational High School
DVD Collection
Prof.Dr. Onur Bilge Kula Collection
Rooms Restriction Values
All Fields
Title
Author
Subject
ISBN
ISSN
8
Search Field
All Fields
Target Value
Limit Value
Restriction Value
Search For:
Advanced Search
Limit Search Results
Narrowed by:
+
Publication Date: 2002
Author
Include
Exclude
Maxwell, Doug.
(2)
Peltier, Thomas R.
(2)
Russell, Ryan, 1969-
(2)
Shinder, Debra Littlejohn.
(2)
'Ken'@ftu.
(1)
Ahmad, David R. Mirza.
(1)
Amon, Cherie, ort. yaz.
(1)
Barnes, Christian.
(1)
Bidwell, Teri.
(1)
Campbell, Douglas E., 1954-
(1)
Carrington, Charles (Charles Dudley)
(1)
Casco, Steven.
(1)
Cross, Michael, 1965-
(1)
Curts, Raymond J.
(1)
Danielyan, Edgar.
(1)
Davies, Donald Watts, 1924-
(1)
Davis, Peter T.
(1)
Grasdal, Martin.
(1)
Herrmann, Debra S.
(1)
Howard, Patrick D.
(1)
Kenyon, Tony, 1960-
(1)
Knipp, Eric.
(1)
McBride, Patrick.
(1)
Meyer, Greg.
(1)
O'Farrell, Neal.
(1)
Osipav, Vitaly.
(1)
Poisel, Richard.
(1)
Price, W. L., ort.yaz.
(1)
Regnault, John, ed.
(1)
Shinder, Thomas W.
(1)
Stajano, Frank.
(1)
Stefanek, George L.
(1)
Sweeney, Mike.
(1)
Temple, Robert, ed.
(1)
Tittel, Ed.
(1)
Wayner, Peter, 1964-
(1)
Weaver, Woody.
(1)
Wiley InterScience (Online service)
(1)
More
View All
Fewer
Collapse All
Language
Include
Exclude
English
(25)
Subject
Include
Exclude
Computer networks -- Security measures.
(12)
Computer security.
(8)
Data protection.
(3)
Electronic books.
(3)
Computer networks -- Security measures -- Handbooks, manuals, etc.
(2)
Computer security -- Handbooks, manuals, etc.
(2)
Routers (Computer networks)
(2)
Biometric identification.
(1)
Business -- Data processing -- Security measures.
(1)
BİLGİSAYAR AĞLARI -- EMNİYET ÖLÇÜLERİ -- EL KİTAPLARI, VB.
(1)
BİLGİSAYAR GÜVENLİĞİ -- EL KİTAPLARI, VB.
(1)
Cisco Systems, Inc.
(1)
ColdFusion.
(1)
Computer crimes -- Investigation -- Handbooks, manuals, etc.
(1)
Computer crimes.
(1)
Computer networks -- Management.
(1)
Computer networks -- Security measures -- Examinations -- Study guides.
(1)
Computer networks--Access control.
(1)
Computer networks--Security measures.
(1)
Computer security equipment industry -- Directories.
(1)
Cryptography.
(1)
Digital computer simulation.
(1)
Digital watermarking.
(1)
Electronic commerce -- Directories.
(1)
Electronic data processing personnel -- Certification.
(1)
Firewalls (Computer security)
(1)
Forensic sciences -- Handbooks, manuals, etc.
(1)
High performance computing.
(1)
Human-computer interaction.
(1)
Identification cards -- Forgeries.
(1)
Impostors and imposture.
(1)
Information retrieval.
(1)
Information warfare.
(1)
Internet -- Security measures.
(1)
Internet fraud.
(1)
Internet.
(1)
Microsoft ISA server.
(1)
Military telecommunication.
(1)
Mobile computing.
(1)
Programming languages (Electronic computers).
(1)
Public key cryptography.
(1)
Telecommunication--Security measures.
(1)
VERİ İlETİM SİSTEMLERİ -- EMNİYET ÖLÇÜLERİ.
(1)
Virtual computer systems.
(1)
Virtual reality.
(1)
Wireless LANs -- Security measures.
(1)
Wireless communication systems -- Security measures.
(1)
XML (Document markup language)
(1)
XML (Document markup language).
(1)
More
View All
Fewer
Collapse All
Material Type
Include
Exclude
Book
E-Book
Shelf Location
Include
Exclude
Beytepe General Collection
Electronic Library
Library
Include
Exclude
Beytepe Library
Online Library
false
{sortLabel}
{alphabetical}
{relevance}
{include}
{exclude}
{facetName}
{results}
{displayName}
{count}
{error}
Select an Action
Place Hold(s)
Add to My Lists
Email
Print
25 Results Found
1
2
3
Sort By:
Relevance (Default)
Publication Date (Ascending)
Publication Date (Descending)
Title
Author
0
DEFAULT
Select a list
Temporary List
Make this your default list.
The following items were successfully added.
There was an error while adding the following items. Please try again.
One or more items could not be added because you are not logged in.
25.
Security for ubiquitous computing
Security for ubiquitous computing
Author
Stajano, Frank. Wiley InterScience (Online service)
Preferred Shelf Number
ONLINE
Electronic Access
John Wiley
http://dx.doi.org/10.1002/0470848693
Format:
Availability
Online Library~1
Available:
Copies:
Select an Action
Place Hold(s)
Add to My Lists
Email
Print
1
2
3