Log In
|
My Account
|
My Lists
|
|
Remember to clear the cache and close the browser window.
Search Limit
Everything
E-Book
Journals
Beytepe Library
Health Sciences Library
Conservatory Library
Law Library
Social Sciences Vocational High School
DVD Collection
Prof.Dr. Onur Bilge Kula Collection
Rooms Restriction Values
All Fields
Title
Author
Subject
ISBN
ISSN
8
Search Field
All Fields
Target Value
Limit Value
Restriction Value
Search For:
Advanced Search
Limit Search Results
Narrowed by:
+
Subject: Computer security.
Author
Include
Exclude
Long, Johnny.
(3)
Scambray, Joel.
(3)
Kleiman, Dave.
(2)
Liu, Vincent.
(2)
McClure, Stuart.
(2)
Aslanbakan, Enes, yazar
(1)
Balas, Valentina Emilia. editor.
(1)
Bayles, Aaron W.
(1)
Bodmer, Sean.
(1)
Brindley, Ed.
(1)
Cache, Johnny.
(1)
Cannings, Rich.
(1)
Chakrabarti, Satyajit. editor.
(1)
Chakraborty, Mohuya. editor.
(1)
Chiesa, Raoul, 1973-
(1)
Ciappi, Silvio, 1965-
(1)
Davis, Michael A.
(1)
Ducci, Stefania.
(1)
Dwivedi, Himanshu.
(1)
Eagle, Chris.
(1)
Engebretson, Pat (Patrick Henry), 1974-
(1)
Foster, James C.
(1)
Gomes, Araceli Treu, author.
(1)
Hadnagy, Christopher.
(1)
Harper, Allen.
(1)
Harris, Shon.
(1)
Hatch, Brian. Hacking Linux exposed.
(1)
Hurley, Chris.
(1)
ISECOM (Organization)
(1)
Kurtz, George.
(1)
Lackey, Zane.
(1)
LeMasters, Aaron.
(1)
Lenkey, Gideon.
(1)
Mandal, J. K. editor.
(1)
McFadden, Matthew.
(1)
Mitnick, Kevin D. (Kevin David), 1963-
(1)
Morrissey, Sean.
(1)
Ness, Jonathan.
(1)
ScienceDirect (Online service)
(1)
Shackleford, Dave, editor.
(1)
Shema, Mike.
(1)
Sima, Caleb.
(1)
SpringerLink (Online service)
(1)
Ulsch, N. MacDonnell, 1951-
(1)
Usta, Gökhan.
(1)
Varsalone, Jesse.
(1)
Wiles, Jack.
(1)
Williams, Terron.
(1)
Winkler, Ira, author.
(1)
Wright, Joshua.
(1)
Yılmaz, Davut.
(1)
More
View All
Fewer
Collapse All
Language
Include
Exclude
English
(22)
Turkish
(2)
Publication Date
Include
Exclude
-
2011
(8)
2012
(4)
2008
(3)
2019
(3)
2007
(2)
2004
(1)
2005
(1)
2009
(1)
2010
(1)
2014
(1)
2017
(1)
More
View All
Fewer
Collapse All
Subject
Include
Exclude
Computer hackers.
(15)
Computer networks -- Security measures.
(10)
Bilgisayar güvenliği.
(4)
Computer crimes.
(4)
Computer crimes -- Prevention.
(3)
Computers -- Access control.
(3)
Bilgisayar korsanları.
(2)
Electronic books.
(2)
Malware (Computer software)
(2)
Web sites -- Security measures.
(2)
ActiveX.
(1)
Ajax (Web site development technology)
(1)
Application software -- Security measures.
(1)
Berkeley BSD (Computer file)
(1)
Bilgisayar ağları -- Güvenlik önlemleri.
(1)
Bilgisayar suçları.
(1)
Bluetooth technology -- Security measures.
(1)
Business enterprises -- Computer networks -- Security measures.
(1)
BİLGİSAYAR GÜVENLİĞİ.
(1)
C (Computer program language)
(1)
Computer networks -- Security measures.
(1)
Computer programs -- Security measures.
(1)
Computer security -- Law and legislation.
(1)
Computer security -- United States.
(1)
Computer software -- Testing.
(1)
Corporations -- Security measures.
(1)
Criminal behavior, Prediction of.
(1)
Data structures (Computer science).
(1)
Electrical engineering.
(1)
Google.
(1)
Hackers.
(1)
Hacking
(1)
Hacking.
(1)
Human-computer interaction.
(1)
Internal security.
(1)
Internet -- Security measures.
(1)
Internet programming.
(1)
Linux.
(1)
Microsoft Windows (Computer file)
(1)
Python (Computer program language)
(1)
Radio frequency identification systems.
(1)
Rootkits (Computer software)
(1)
SQL server.
(1)
Social engineering.
(1)
Sosyal mühendislik.
(1)
Web 2.0.
(1)
Web search engines.
(1)
Web site development -- Security measures.
(1)
Wireless LANs -- Security measures.
(1)
Wireless communication systems -- Security measures.
(1)
İnsan-bilgisayar etkileşimi.
(1)
İç güvenlik.
(1)
More
View All
Fewer
Collapse All
Material Type
Include
Exclude
Book
E-Book
Shelf Location
Include
Exclude
Beytepe General Collection
Electronic Library
Library
Include
Exclude
Beytepe Library
Online Library
false
{sortLabel}
{alphabetical}
{relevance}
{include}
{exclude}
{facetName}
{results}
{displayName}
{count}
{error}
Select an Action
Place Hold(s)
Add to My Lists
Email
Print
25 Results Found
1
2
3
Sort By:
Relevance (Default)
Publication Date (Ascending)
Publication Date (Descending)
Title
Author
0
DEFAULT
Select a list
Temporary List
Make this your default list.
The following items were successfully added.
There was an error while adding the following items. Please try again.
One or more items could not be added because you are not logged in.
25.
Defense against the black arts how hackers do what they do and how to protect against it
Defense against the black arts how hackers do what they do and how to protect against it
Author
Varsalone, Jesse. McFadden, Matthew. Morrissey, Sean.
Preferred Shelf Number
ONLINE
Electronic Access
Distributed by publisher. Purchase or institutional license may be required for access.
Format:
Availability
Online Library~1
Available:
Copies:
Select an Action
Place Hold(s)
Add to My Lists
Email
Print
1
2
3