Log In
|
My Account
|
My Lists
|
|
Remember to clear the cache and close the browser window.
Search Limit
Everything
E-Book
Journals
Beytepe Library
Health Sciences Library
Conservatory Library
Law Library
Social Sciences Vocational High School
DVD Collection
Prof.Dr. Onur Bilge Kula Collection
Rooms Restriction Values
All Fields
Title
Author
Subject
ISBN
ISSN
13
Search Field
All Fields
Target Value
Limit Value
Restriction Value
Search For:
Advanced Search
Limit Search Results
Narrowed by:
+
Subject: Security.
Author
Include
Exclude
An, Jianpin, author.
(1)
Anand, R. S., author.
(1)
BOGAN, CARL.
(1)
Bayuk, Jennifer L., author.
(1)
Braeken, An, 1970- editor.
(1)
Bray, Shannon, 1972-
(1)
Bullock, Jessey, author.
(1)
Chandramouli, Devaki, editor.
(1)
Chirillo, John, 1970- author.
(1)
Couretas, Jerry M., 1966- author.
(1)
David, Shiblin, author.
(1)
Domas, Christopher, author.
(1)
Domas, Stephanie, author.
(1)
Edwards, Jason (Cybersecurity expert), author.
(1)
Gordon, Adam, author.
(1)
Gorecki, Andrew.
(1)
Janca, Tanya. author.
(1)
Jeyakrishnan, V., author.
(1)
John Wiley & Sons, publisher.
(1)
Keren.
(1)
Kumar, Pardeep, 1976- editor.
(1)
Liebhart, Rainer, editor.
(1)
Liyanage, Madhusanka, author.
(1)
Liyanage, Madhusanka, editor.
(1)
Mack, Sean D., author.
(1)
Mammeri, Zoubir, author.
(1)
Mantas, Georgios.
(1)
Moschovitis, Christos J. P., author.
(1)
Moyo, Siegfried, author.
(1)
Niranjanamurthy, M., author.
(1)
Penttinen, Jyrki T. J., author.
(1)
Pirskanen, Juho, editor.
(1)
Porambage, Pawani, author.
(1)
Rodriguez, Jonathan.
(1)
Saghezchi, Firooz.
(1)
Sucasas, Victor.
(1)
Tanner, Nadean H., author.
(1)
Tyagi, Amit Kumar, editor.
(1)
Ylianttila, Mika, editor.
(1)
More
View All
Fewer
Collapse All
Language
Include
Exclude
English
(25)
Publication Date
Include
Exclude
-
2024
(7)
2025
(6)
2019
(4)
2020
(2)
2021
(2)
2017
(1)
2022
(1)
2023
(1)
2026
(1)
More
View All
Fewer
Collapse All
Subject
Include
Exclude
COMPUTERS.
(25)
Electronic books.
(25)
Computer security.
(13)
Cryptography.
(13)
Networking.
(13)
Sécurité informatique.
(13)
TECHNOLOGY & ENGINEERING.
(6)
Mobile & Wireless Communications.
(5)
Telecommunications.
(5)
Viruses & Malware.
(5)
Computer security
(4)
COMPUTERS -- Security -- General.
(3)
Data protection.
(3)
Online Safety & Privacy.
(3)
Protection de l'information (Informatique)
(3)
6G mobile communication systems -- Security measures.
(2)
Computer Security
(2)
Cybernetics.
(2)
Data protection
(2)
Internet des objets -- Sécurité -- Mesures.
(2)
Internet of things -- Security measures.
(2)
Signals & Signal Processing.
(2)
TECHNOLOGY & ENGINEERING -- Mechanical.
(2)
Architecture logicielle.
(1)
Artificial satellites in telecommunication -- Security measures.
(1)
Assembly Language.
(1)
BUSINESS & ECONOMICS.
(1)
Broadband communication systems
(1)
Broadband communication systems -- Technological innovations.
(1)
Business enterprises -- Data processing -- Security measures.
(1)
Business enterprises -- Security measures
(1)
Business enterprises -- Security measures.
(1)
COMPUTERS -- Security -- Cryptography & Encryption.
(1)
Chiffrement (Informatique)
(1)
Computer Science.
(1)
Computer crimes -- Risk assessment.
(1)
Computer networks -- Security measures
(1)
Computer networks -- Security measures.
(1)
Computer programming.
(1)
Computer security -- Management
(1)
Computer security -- Management.
(1)
Computer software -- Development.
(1)
Confidentialité des données.
(1)
Criminalité informatique -- Évaluation du risque.
(1)
Cryptographie.
(1)
Data encryption (Computer science)
(1)
Data privacy
(1)
Data privacy.
(1)
Entrepreneurship.
(1)
Entreprises -- Informatique -- Sécurité -- Mesures.
(1)
Entreprises -- Sécurité -- Mesures.
(1)
GSM (Radiotéléphonie) -- Sécurité -- Mesures.
(1)
Global system for mobile communications -- Security measures.
(1)
Global system for mobile communications -- Technological innovation.
(1)
Hacking.
(1)
Industrie 4.0.
(1)
Industry 4.0
(1)
Industry 4.0.
(1)
Industry 5.0.
(1)
Internet of things
(1)
Leadership.
(1)
Management information systems
(1)
Management information systems.
(1)
Medical informatics
(1)
Medical informatics -- Security measures.
(1)
Micro-ordinateurs -- Accès -- Contrôle.
(1)
Microcomputers -- Access control
(1)
Microcomputers -- Access control.
(1)
Mobile communication systems -- Technological innovations
(1)
Mobile communication systems -- Technological innovations.
(1)
Médecine -- Informatique -- Sécurité -- Mesures.
(1)
Piratage informatique.
(1)
Programmation (Informatique)
(1)
Programming Languages.
(1)
Python (Computer program language)
(1)
Python (Langage de programmation)
(1)
Quality Assurance & Testing.
(1)
Radiocommunications mobiles -- Innovations.
(1)
Reverse engineering.
(1)
Réseaux d'ordinateurs -- Sécurité -- Mesures.
(1)
Rétro-ingénierie.
(1)
Satellites artificiels dans les télécommunications -- Sécurité -- Mesures.
(1)
Software Development & Engineering.
(1)
Software architecture.
(1)
Systèmes d'information de gestion.
(1)
Sécurité informatique -- Gestion.
(1)
Technologie de l'information.
(1)
Transport -- Sécurité -- Mesures.
(1)
Transportation -- Security measures.
(1)
Wireless communication systems -- Security measures
(1)
Wireless sensor networks
(1)
Wireless sensor networks -- Technological innovations.
(1)
X86 assembly language (Computer program language)
(1)
X86 assembly language (Langage de programmation)
(1)
information technology.
(1)
More
View All
Fewer
Collapse All
Material Type
Include
Exclude
E-Book
Shelf Location
Include
Exclude
Wiley E-Book Collection
Library
Include
Exclude
Online Library
false
{sortLabel}
{alphabetical}
{relevance}
{include}
{exclude}
{facetName}
{results}
{displayName}
{count}
{error}
Select an Action
Place Hold(s)
Add to My Lists
Email
Print
25 Results Found
1
2
3
Sort By:
Relevance (Default)
Publication Date (Ascending)
Publication Date (Descending)
Title
Author
0
DEFAULT
Select a list
Temporary List
Make this your default list.
The following items were successfully added.
There was an error while adding the following items. Please try again.
One or more items could not be added because you are not logged in.
1.
Wireshark for security professionals : using Wireshark and the Metasploit Framework
Wireshark for security professionals : using Wireshark and the Metasploit Framework
Author
Bullock, Jessey, author. Gordon, Adam, author.
Preferred Shelf Number
QA76.9 .A25
Electronic Access
https://onlinelibrary.wiley.com/doi/book/10.1002/9781119183457
Format:
Availability
Online Library~1
Available:
Copies:
Select an Action
Place Hold(s)
Add to My Lists
Email
Print
1
2
3