Log In
|
My Account
|
My Lists
|
|
Remember to clear the cache and close the browser window.
Search Limit
Everything
E-Kitap
Dergiler
Beytepe Kütüphanesi
Sağlık Bilimleri Kütüphanesi
Konservatuvar Kütüphanesi
Hukuk Kütüphanesi
Sosyal Bilimler Meslek Yüksek Okulu
DVD Koleksiyonu
Prof.Dr. Onur Bilge Kula Koleksiyonu
Rooms Restriction Values
All Fields
Title
Author
Subject
ISBN
ISSN
15
Search Field
All Fields
Target Value
Limit Value
Restriction Value
Search For:
Advanced Search
Limit Search Results
Narrowed by:
+
Subject: Computer security.
Author
Include
Exclude
Clercq, Jan de, 1968-
(3)
Rittinghouse, John W.
(3)
CRC Press LLC.
(2)
Grillenmeier, Guido.
(2)
Ransome, James F.
(2)
XYPRO Technology Corporation.
(2)
Adams, Randee.
(1)
Agre, Philip.
(1)
Alvarado, Ellen.
(1)
Bauer, Craig P.
(1)
Bauer, Eric.
(1)
Ben-Natan, Ron.
(1)
Blake, Ian F..
(1)
Bloom, Jeffrey A. (Jeffrey Adam), 1964-
(1)
Campara, Djenana.
(1)
Cox, I. J. (Ingemar J.)
(1)
Ellis, Juanita.
(1)
Erbschloe, Michael.
(1)
Fisch, Eric A.
(1)
Hancock, Bill, 1957-
(1)
Hill, Terri.
(1)
Institute of Electrical and Electronics Engineers.
(1)
JACOBSON, DOUGLAS.
(1)
Jacobs, Stuart.
(1)
Katz, Jonathan, 1974-
(1)
Lin, Ching-Yung.
(1)
Lindell, Yehuda.
(1)
Mansourov, Nikolai.
(1)
Mao, Wenji.
(1)
Miller, Matthew L.
(1)
POHLMAN, MARLIN B.
(1)
Paul, Mano., author.
(1)
Peltier, Thomas R.
(1)
Quigley, Marian.
(1)
Raghunathan, Balaji., author.
(1)
Rotenberg, Marc.
(1)
STACKPOLE, BILL.
(1)
ScienceDirect (Online service)
(1)
Seroussi, Gadiel.
(1)
Simmons, Gustavus J.
(1)
Sloan, Robert, author.
(1)
Smart, Nigel P..
(1)
Speed, Tim.
(1)
Tipton, Harold F.
(1)
Tudor, Jan Killmeyer.
(1)
VARSALONE, JESSE.
(1)
Wang, Fei-Yue.
(1)
White, Gregory B.
(1)
Wiley InterScience (Online service)
(1)
Williams, Walter, author.
(1)
Yu, Hong Heather, 1967-
(1)
Zeng, Wenjun, 1967-
(1)
More
View All
Fewer
Collapse All
Language
Include
Exclude
English
(34)
Publication Date
Include
Exclude
-
2017
(8)
2004
(4)
2005
(4)
2001
(3)
2007
(3)
2011
(3)
2003
(2)
2006
(2)
2012
(2)
2013
(2)
1992
(1)
1999
(1)
2000
(1)
2010
(1)
2015
(1)
More
View All
Fewer
Collapse All
Subject
Include
Exclude
Computer networks -- Security measures.
(8)
Data protection.
(8)
Electronic books.
(6)
Bilgisayar güvenliği.
(2)
Client/server computing -- Security measures.
(2)
Cryptography.
(2)
Database security.
(2)
Electronic book collection.
(2)
Hewlett-Packard computers -- Security measures.
(2)
Information technology -- Security measures.
(2)
Internet -- Security measures.
(2)
Microsoft Windows (Computer file)
(2)
Privacy, Right of.
(2)
Business -- Data processing -- Security measures.
(1)
COMPUTERS -- Internet -- Security.
(1)
COMPUTERS -- Networking -- Security.
(1)
COMPUTERS -- Security -- General.
(1)
COMPUTERS / Networking / General
(1)
COMPUTERS / Security / General
(1)
Ciphers.
(1)
Cloud computing.
(1)
Computabilidade e modelos de computacao.
(1)
Computer architecture.
(1)
Computer software -- Development.
(1)
Computer software -- Quality control.
(1)
Computer software -- Reliability.
(1)
Computers -- Access control.
(1)
Cryptographie.
(1)
Cryptography -- History.
(1)
Cyberterrorism.
(1)
Data encryption (Computer science)
(1)
Database management.
(1)
Databescherming.
(1)
Digital watermarking.
(1)
Electronic mail messages -- Security measures.
(1)
Ethiek.
(1)
Geheimschrift.
(1)
Gizlilik hakkı.
(1)
Hackers.
(1)
Informatiebeleid.
(1)
Information technology -- Moral and ethical aspects.
(1)
Information technology -- Social aspects.
(1)
Instant messaging -- Security measures.
(1)
Intellectual property.
(1)
Internet -- Moral and ethical aspects.
(1)
Microsoft Windows (Bilgisayar kütüğü)
(1)
Microsoft Windows server.
(1)
Multimedia systems -- Security measures.
(1)
National security.
(1)
Operating systems (Computers)
(1)
Oracle (Computer file)
(1)
Ordinateurs -- Accès -- Contrôle.
(1)
Public key cryptography.
(1)
Service-oriented architecture (Computer science)
(1)
Systèmes informatiques -- Mesures de sûreté.
(1)
Sécurité informatique.
(1)
TECHNOLOGY & ENGINEERING / Quality Control.
(1)
Technology -- Social aspects.
(1)
Telecommunication systems -- Security measures.
(1)
Télécommunications, Systèmes de -- Sécurité -- Mesures.
(1)
Veiligheidspolitiek.
(1)
Veri koruma.
(1)
More
View All
Fewer
Collapse All
Material Type
Include
Exclude
Book
E-Book
Shelf Location
Include
Exclude
Beytepe General Collection
CRC Ebooks
Electronic Library
Library
Include
Exclude
Beytepe Library
Online Library
false
{sortLabel}
{alphabetical}
{relevance}
{include}
{exclude}
{facetName}
{results}
{displayName}
{count}
{error}
Select an Action
Place Hold(s)
Add to My Lists
Email
Print
37 Results Found
1
2
3
4
Sort By:
Relevance (Default)
Publication Date (Ascending)
Publication Date (Descending)
Title
Author
0
DEFAULT
Select a list
Temporary List
Make this your default list.
The following items were successfully added.
There was an error while adding the following items. Please try again.
One or more items could not be added because you are not logged in.
37.
Contemporary cryptology the science of information integrity
Contemporary cryptology the science of information integrity
Author
Simmons, Gustavus J. Institute of Electrical and Electronics Engineers.
Preferred Shelf Number
ONLINE
Electronic Access
IEEE Xplore
http://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=5265879
Format:
Availability
Online Library~1
Available:
Copies:
Select an Action
Place Hold(s)
Add to My Lists
Email
Print
1
2
3
4