Log In
|
My Account
|
My Lists
|
|
Remember to clear the cache and close the browser window.
Search Limit
Everything
E-Book
Journals
Beytepe Library
Health Sciences Library
Conservatory Library
Law Library
Social Sciences Vocational High School
DVD Collection
Prof.Dr. Onur Bilge Kula Collection
Rooms Restriction Values
All Fields
Title
Author
Subject
ISBN
ISSN
8
Search Field
All Fields
Target Value
Limit Value
Restriction Value
Search For:
Advanced Search
Limit Search Results
Narrowed by:
+
Subject: Security.
Author
Include
Exclude
Allsopp, Wil, author.
(1)
An, Jianpin, author.
(1)
Anand, R. S., author.
(1)
Anson, Steve.
(1)
BOGAN, CARL.
(1)
Baliyan, Anupam, 1976- author.
(1)
Chapple, Mike, author.
(1)
Chirillo, John, 1970- author.
(1)
Couretas, Jerry M., 1966- author.
(1)
David, Shiblin, author.
(1)
Dhatterwal, Jagjit Singh, author.
(1)
Gorecki, Andrew.
(1)
Guerrier, Claudine, author.
(1)
Hoang, Dinh Thai, 1986- author.
(1)
Hughes, Chris (Christopher Matthew), author.
(1)
Jakobsen, Adam Tilmar, author.
(1)
Jeyakrishnan, V., author.
(1)
Kaswan, Kuldeep Singh, author.
(1)
Khatoun, Rida, author.
(1)
Knight, Alissa, author.
(1)
Laurent, Sébastien, editor.
(1)
Lee, Martin (Computer security expert), author.
(1)
Liyanage, Madhusanka, author.
(1)
Mantas, Georgios.
(1)
Moschovitis, Christos J. P., author.
(1)
Niranjanamurthy, M., author.
(1)
Penttinen, Jyrki T. J., author.
(1)
Porambage, Pawani, author.
(1)
Quade, Phil.
(1)
Rani, Shalli, author.
(1)
Robinson, Nikki, author.
(1)
Rodriguez, Jonathan.
(1)
Saghezchi, Firooz.
(1)
Shelley, Joe.
(1)
Stewart, James Michael.
(1)
Sucasas, Victor.
(1)
Tounsi, Wiem, editor.
(1)
More
View All
Fewer
Collapse All
Language
Include
Exclude
English
(25)
Publication Date
Include
Exclude
-
2024
(5)
2023
(4)
2019
(3)
2020
(3)
2021
(3)
2025
(3)
2017
(1)
2018
(1)
2022
(1)
2026
(1)
More
View All
Fewer
Collapse All
Subject
Include
Exclude
Electronic books.
(25)
COMPUTERS.
(24)
Networking.
(16)
Cryptography.
(10)
Computer security.
(9)
Sécurité informatique.
(9)
Mobile & Wireless Communications.
(5)
TECHNOLOGY & ENGINEERING.
(5)
Viruses & Malware.
(5)
COMPUTERS -- Security -- General.
(3)
Computer Security
(3)
Computer networks -- Security measures
(3)
Computer networks -- Security measures.
(3)
Online Safety & Privacy.
(3)
Réseaux d'ordinateurs -- Sécurité -- Mesures.
(3)
Telecommunications.
(3)
6G mobile communication systems -- Security measures.
(2)
Computer security
(2)
Computers
(2)
Cyber intelligence (Computer security)
(2)
Intelligence (AI) & Semantics.
(2)
Internet des objets -- Sécurité -- Mesures.
(2)
Internet of things -- Security measures.
(2)
Penetration testing (Computer security)
(2)
Surveillance des menaces informatiques.
(2)
Tests d'intrusion.
(2)
Artificial Intelligence
(1)
Artificial satellites in telecommunication -- Security measures.
(1)
Automated vehicles
(1)
Automated vehicles -- Security measures.
(1)
Automated vehicles.
(1)
BUSINESS & ECONOMICS -- Industries -- Computer Industry.
(1)
BUSINESS & ECONOMICS.
(1)
Business enterprises -- Computer programs.
(1)
COMPUTERS -- Security -- Cryptography & Encryption.
(1)
COMPUTERS -- Security -- Cryptography.
(1)
COMPUTERS -- Security -- Networking.
(1)
Certification Guides.
(1)
Cloud Computing.
(1)
Cloud computing -- Security measures.
(1)
Computer Networks
(1)
Computer Science.
(1)
Computer crimes -- Investigation.
(1)
Computer industry
(1)
Computer industry.
(1)
Computer security -- Government policy
(1)
Computer security -- Government policy.
(1)
Computer security -- Law and legislation
(1)
Computer security -- Law and legislation.
(1)
Computer security -- Management
(1)
Computer security -- Management.
(1)
Computers.
(1)
Confidentialité des données.
(1)
Criminalité informatique -- Enquêtes.
(1)
Cyberguerre (Science militaire)
(1)
Cyberinfrastructure -- Security measures.
(1)
Cybernetics.
(1)
Cyberspace operations (Military science)
(1)
Cyberterrorism -- Prevention
(1)
Cyberterrorism -- Prevention.
(1)
Data privacy
(1)
Data privacy.
(1)
Data protection
(1)
Data protection.
(1)
Distributed Systems & Computing.
(1)
Domotique -- Sécurité -- Mesures.
(1)
Dwellings -- Security measures
(1)
Dwellings -- Security measures.
(1)
Entreprises -- Logiciels.
(1)
GSM (Radiotéléphonie) -- Sécurité -- Mesures.
(1)
Global system for mobile communications -- Security measures.
(1)
Global system for mobile communications -- Technological innovation.
(1)
Habitations -- Sécurité -- Mesures.
(1)
Home automation -- Security measures.
(1)
Industrie 4.0.
(1)
Industry 4.0
(1)
Industry 4.0.
(1)
Infonuagique -- Sécurité -- Mesures.
(1)
Information Technology.
(1)
Information technology -- Management
(1)
Information technology -- Management.
(1)
Information technology -- Security measures
(1)
Information technology -- Security measures.
(1)
Informatique -- Industrie.
(1)
Informatique quantique.
(1)
Insurance.
(1)
Internet -- Government policy
(1)
Internet -- Government policy.
(1)
Internet -- Law and legislation
(1)
Internet -- Law and legislation.
(1)
Internet -- Politique gouvernementale.
(1)
Internet of things
(1)
Medical informatics
(1)
Medical informatics -- Security measures.
(1)
Médecine -- Informatique -- Sécurité -- Mesures.
(1)
Ordinateurs.
(1)
Protection de l'information (Informatique)
(1)
Quantum computing
(1)
Quantum computing.
(1)
Risk Assessment & Management.
(1)
Satellites artificiels dans les télécommunications -- Sécurité -- Mesures.
(1)
Signals & Signal Processing.
(1)
Systems Architecture.
(1)
Sécurité informatique -- Gestion.
(1)
Sécurité informatique -- Politique gouvernementale.
(1)
TECHNOLOGY & ENGINEERING -- Mechanical.
(1)
Technologie de l'information -- Gestion.
(1)
Technologie de l'information -- Sécurité -- Mesures.
(1)
Technologie de l'information.
(1)
Transmission sans fil.
(1)
Transport -- Sécurité -- Mesures.
(1)
Transportation -- Security measures.
(1)
Véhicules autonomes -- Sécurité -- Mesures.
(1)
Véhicules autonomes.
(1)
Wireless communication systems
(1)
Wireless communication systems -- Security measures
(1)
Wireless communication systems.
(1)
information technology.
(1)
More
View All
Fewer
Collapse All
Material Type
Include
Exclude
E-Book
Shelf Location
Include
Exclude
Wiley E-Book Collection
Library
Include
Exclude
Online Library
false
{sortLabel}
{alphabetical}
{relevance}
{include}
{exclude}
{facetName}
{results}
{displayName}
{count}
{error}
Select an Action
Place Hold(s)
Add to My Lists
Email
Print
25 Results Found
1
2
3
Sort By:
Relevance (Default)
Publication Date (Ascending)
Publication Date (Descending)
Title
Author
0
DEFAULT
Select a list
Temporary List
Make this your default list.
The following items were successfully added.
There was an error while adding the following items. Please try again.
One or more items could not be added because you are not logged in.
25.
Advanced penetration testing : hacking the world's most secure networks
Advanced penetration testing : hacking the world's most secure networks
Author
Allsopp, Wil, author.
Preferred Shelf Number
QA76.9 .A25
Electronic Access
https://onlinelibrary.wiley.com/doi/book/10.1002/9781119367741
Format:
Availability
Online Library~1
Available:
Copies:
Select an Action
Place Hold(s)
Add to My Lists
Email
Print
1
2
3