Log In
|
My Account
|
My Lists
|
|
Remember to clear the cache and close the browser window.
Search Limit
Everything
E-Book
Journals
Beytepe Library
Health Sciences Library
Conservatory Library
Law Library
Social Sciences Vocational High School
DVD Collection
Prof.Dr. Onur Bilge Kula Collection
Rooms Restriction Values
All Fields
Title
Author
Subject
ISBN
ISSN
8
Search Field
All Fields
Target Value
Limit Value
Restriction Value
Search For:
Advanced Search
Limit Search Results
Narrowed by:
+
Konu: Computer security.
Author
Include
Exclude
Couretas, Jerry M., 1966- author.
(2)
Edwards, Jason (Cybersecurity expert), author.
(2)
John Wiley & Sons, publisher.
(2)
SpringerLink (Online service)
(2)
Weaver, Griffin, author.
(2)
Aden, Hartmut, editor.
(1)
Akila, M. editor
(1)
Anson, Steve.
(1)
Anwar, Waqar, author.
(1)
Arcuri, Jennifer, author.
(1)
Bahi, Jacques Mohcine., author.
(1)
Balamurugan, S. editor
(1)
Basta, Alfred, author.
(1)
Basta, Nadine, author.
(1)
Brooks, Charles J., author.
(1)
Brooks, Chuck (Writer of Inside cyber), author.
(1)
Carey, Marcus J. (Cybersecurity professional)
(1)
Carey, Marcus J. (Cybersecurity professional), author.
(1)
Cheng, Wei. author. (orcid)0000-0001-9433-7576
(1)
Choudhury, Tanupriya editor
(1)
Craig, Philip, author.
(1)
Domas, Christopher, author.
(1)
Domas, Stephanie, author.
(1)
Edwards, Jason, author.
(1)
Essar, Mohammad Ilyas, author.
(1)
Ghonge, Mangesh, 1984- editor.
(1)
Gregg, Michael (Michael C.)
(1)
Grimes, Roger A., author.
(1)
Gritzalis, Dimitris. editor.
(1)
Grow, Christopher, author.
(1)
Guilley, Sylvain. author. (orcid)0000-0002-5044-3534
(1)
Guyeux, Christophe.
(1)
Hadnagy, Christopher, author.
(1)
Hickey, Matthew (Computer security expert), author.
(1)
Hughes, Chris (Christopher Matthew), author.
(1)
IGI Global, publisher.
(1)
Information Resources Management Association, editor.
(1)
Islam, Ray (Mohammad Rubyet), author.
(1)
Jin, Jennifer, author.
(1)
Jin, Jennifer.
(1)
Kaur, Gagandeep, editor
(1)
Khan, Latifur.
(1)
Loiseau, Hugo, editor.
(1)
Maheswar, R. editor
(1)
Masud, Mehedy., author.
(1)
Moallem, Abbas, author.
(1)
Moschovitis, Christos J. P., author.
(1)
Nicastro, Felicia M., author.
(1)
Oriyano, Sean-Philip.
(1)
Rathaus, Noam
(1)
Rathaus, Noam.
(1)
Rathee, Geetanjali, editor
(1)
Reznik, Leonid, 1955- author.
(1)
Rioul, Olivier. author. (orcid)0000-0002-8681-8916
(1)
Robinson, Nikki, author.
(1)
ScienceDirect (Online service)
(1)
Short, Donald, author.
(1)
Sountharrajan, S. editor
(1)
Stergiopoulos, George. editor.
(1)
Tanner, Nadean H., author.
(1)
Theocharidou, Marianthi. editor. (orcid)0000-0002-8870-1746
(1)
Thuraisingham, Bhavani M.
(1)
Vemuri, V. Rao.
(1)
Ventre, Daniel, editor.
(1)
Zaidoun, Ameur Salem, author.
(1)
Årnes, André, 1976- editor.
(1)
More
View All
Fewer
Collapse All
Language
Include
Exclude
English
(37)
Publication Date
Include
Exclude
-
2025
(6)
2019
(4)
2020
(4)
2022
(4)
2024
(4)
2018
(3)
2007
(2)
2011
(2)
2017
(2)
2006
(1)
2012
(1)
2013
(1)
2021
(1)
2023
(1)
2026
(1)
More
View All
Fewer
Collapse All
Subject
Include
Exclude
Sécurité informatique.
(26)
Electronic books.
(15)
COMPUTERS.
(11)
Security.
(11)
Computer Security
(10)
Cryptography.
(10)
Computer networks -- Security measures.
(8)
Computer security
(7)
Networking.
(5)
Artificial intelligence.
(4)
Data protection.
(4)
Hacking.
(4)
Piratage informatique.
(4)
Réseaux d'ordinateurs -- Sécurité -- Mesures.
(4)
Computer networks -- Security measures
(3)
Hacking
(3)
Intelligence artificielle.
(3)
BUSINESS & ECONOMICS.
(2)
COMPUTERS -- Security -- General.
(2)
COMPUTERS -- Security -- Networking.
(2)
Computer crimes.
(2)
Cyberinfrastructure -- Security measures.
(2)
Machine learning.
(2)
Ordinateurs.
(2)
Protection de l'information (Informatique)
(2)
TECHNOLOGY & ENGINEERING.
(2)
Viruses & Malware.
(2)
5G mobile communication systems.
(1)
Affaires.
(1)
Application software.
(1)
Apprentissage automatique.
(1)
Architecture logicielle.
(1)
Artificial Intelligence
(1)
Assembly Language.
(1)
Bilgisayar ağları.
(1)
Business enterprises -- Computer networks -- Security measures.
(1)
Business enterprises -- Security measures
(1)
Business enterprises -- Security measures.
(1)
Business.
(1)
COMPUTERS -- Computer Simulation.
(1)
COMPUTERS -- Security -- Cryptography & Encryption.
(1)
COMPUTERS -- Security -- Cryptography.
(1)
COMPUTERS -- Security -- Network Security.
(1)
COMPUTERS / Networking / Security
(1)
Chaotic behavior in systems.
(1)
Coding and Information Theory.
(1)
Coding theory.
(1)
Communication électronique des pièces.
(1)
Communications mobiles 5G.
(1)
Computer Engineering.
(1)
Computer Simulation
(1)
Computer crimes -- Investigation
(1)
Computer crimes -- Investigation.
(1)
Computer crimes -- Prevention.
(1)
Computer hackers.
(1)
Computer science
(1)
Computer science.
(1)
Computer security -- Law and legislation
(1)
Computer security -- Management.
(1)
Computer simulation.
(1)
Computers
(1)
Computers & Information Technology.
(1)
Computers.
(1)
Confidentialité des données.
(1)
Criminalistique.
(1)
Criminalité informatique -- Enquêtes.
(1)
Cryptology.
(1)
Cyberinfrastructure
(1)
Cyberinfrastructure.
(1)
Cybernetics.
(1)
Cyberterrorism -- Prevention.
(1)
Data encryption (Computer science).
(1)
Data mining.
(1)
Data privacy.
(1)
Data protection
(1)
Data protection -- Law and legislation.
(1)
Digital forensic science
(1)
Digital forensic science.
(1)
Dynamics.
(1)
Electronic digital computers
(1)
Electronic digital computers.
(1)
Electronic discovery (Law)
(1)
Entreprises -- Sécurité -- Mesures.
(1)
Forensic sciences
(1)
Forensic sciences.
(1)
Hackers
(1)
Hackers.
(1)
Hacking -- Moral and ethical aspects.
(1)
Human-computer interaction
(1)
Human-computer interaction.
(1)
Industrial productivity -- Effect of technological innovations on.
(1)
Industries.
(1)
Industry 5.0 -- Security measures.
(1)
Information theory.
(1)
Informatique quantique.
(1)
Informatique.
(1)
Ingénierie sociale.
(1)
Innovations.
(1)
Insurance.
(1)
Internet -- Political aspects.
(1)
Livres numériques.
(1)
Logiciels libres.
(1)
MEDICAL -- Forensic Medicine.
(1)
Machine Learning
(1)
Materials Science.
(1)
Mobile & Wireless Communications.
(1)
Online Safety & Privacy.
(1)
Open source software.
(1)
Penetration testing (Computer security)
(1)
Piratage informatique -- Aspect moral.
(1)
Pirates informatiques.
(1)
Principles and Models of Security.
(1)
Privacy-preserving techniques (Computer science)
(1)
Programming Languages.
(1)
Programming.
(1)
Quantum computing.
(1)
Reverse engineering.
(1)
Risk Assessment & Management.
(1)
Rétro-ingénierie.
(1)
SOCIAL SCIENCE -- Anthropology -- General.
(1)
SOCIAL SCIENCE -- Regional Studies.
(1)
SOCIAL SCIENCE -- Sociology -- General.
(1)
Simulation par ordinateur.
(1)
Social engineering
(1)
Social engineering.
(1)
Software architecture.
(1)
System safety.
(1)
Sécurité informatique -- Gestion.
(1)
TECHNOLOGY / Engineering / General
(1)
Technological innovations.
(1)
Technologie de l'information.
(1)
Tests d'intrusion.
(1)
Transmission sans fil.
(1)
Wireless communication systems
(1)
Wireless communication systems.
(1)
X86 assembly language (Computer program language)
(1)
X86 assembly language (Langage de programmation)
(1)
business (commercial function)
(1)
computers.
(1)
e-books.
(1)
forensic science.
(1)
information technology.
(1)
simulation.
(1)
More
View All
Fewer
Collapse All
Material Type
Include
Exclude
Book
E-Book
Shelf Location
Include
Exclude
1:SPRINGER
Beytepe General Collection
CRC Ebooks
Electronic Library
Taylor Francis E-Book Collection
Wiley E-Book Collection
More
View All
Fewer
Collapse All
Library
Include
Exclude
Beytepe Library
Online Library
false
{sortLabel}
{alphabetical}
{relevance}
{include}
{exclude}
{facetName}
{results}
{displayName}
{count}
{error}
Select an Action
Place Hold(s)
Add to My Lists
Email
Print
37 Results Found
1
2
3
4
Sort By:
Relevance (Default)
Publication Date (Ascending)
Publication Date (Descending)
Title
Author
0
DEFAULT
Select a list
Temporary List
Make this your default list.
The following items were successfully added.
There was an error while adding the following items. Please try again.
One or more items could not be added because you are not logged in.
37.
Enhancing computer security with smart technology
Enhancing computer security with smart technology
Author
Vemuri, V. Rao.
Preferred Shelf Number
TK5105.59 .E62 2005
Electronic Access
Click here to view.
Format:
Availability
Online Library~1
Available:
Copies:
Select an Action
Place Hold(s)
Add to My Lists
Email
Print
1
2
3
4