Skip to:
Search Results
|
Content
|
Bottom
|
Search Facets
Log In
|
My Account
|
My Lists
|
|
Remember to clear the cache and close the browser window.
Search Limit
Everything
E-Book
Journals
Beytepe Library
Health Sciences Library
Conservatory Library
Law Library
Social Sciences Vocational High School
DVD Collection
Prof.Dr. Onur Bilge Kula Collection
Rooms Restriction Values
All Fields
Title
Author
Subject
ISBN
ISSN
13
Search Field
All Fields
Target Value
Limit Value
Restriction Value
Search For:
Advanced Search
Limit Search Results
Narrowed by:
+
Subject: Networking.
Author
Include
Exclude
Le, Dac-Nhuong, 1983- editor.
(3)
Edwards, Jason (Cybersecurity expert), author.
(2)
Allsopp, Wil, author.
(1)
Anson, Steve.
(1)
Balasubramanian, Srinivasan.
(1)
Bamhdi, Alwi, editor.
(1)
Bayuk, Jennifer L., author.
(1)
Benmammar, Badr.
(1)
Bhatt, Chintan M., 1988- editor.
(1)
Braeken, An, 1970- editor.
(1)
Bullock, Jessey, author.
(1)
Carpenter, Perry, author.
(1)
Carroll, Brandon, author.
(1)
Chandramouli, Devaki, editor.
(1)
Chapple, Mike, author.
(1)
Chatterjee, Jyotir Moy, editor.
(1)
Chen, Lei, 1978 July 28- editor.
(1)
Chirillo, John, 1970- author.
(1)
Clinton, David.
(1)
Couretas, Jerry M., 1966- author.
(1)
Edwards, Jason, author.
(1)
Forno, Richard, author.
(1)
Gordon, Adam, author.
(1)
Goudos, Sotirios K.
(1)
Guerrier, Claudine, author.
(1)
Hoang, Dinh Thai, 1986- author.
(1)
Hughes, Chris (Christopher Matthew), author.
(1)
Jakobsen, Adam Tilmar, author.
(1)
Jakobsen, Adam Tilmar.
(1)
John Wiley & Sons, publisher.
(1)
Karagiannidis, George K.
(1)
Keren.
(1)
Khan, Arif Ali, editor.
(1)
Khatoun, Rida, author.
(1)
Kumar, Pardeep, 1976- editor.
(1)
Kumar, Raghvendra, 1987- editor.
(1)
Laurent, Sébastien, editor.
(1)
Le-Khac, Nhien-An, 1972- editor.
(1)
Lee, Martin (Computer security expert), author.
(1)
Li, Hu, author.
(1)
Liebhart, Rainer, editor.
(1)
Liyanage, Madhusanka, author.
(1)
Liyanage, Madhusanka, editor.
(1)
Lockett, Rachel, author.
(1)
Mack, Sean D., author.
(1)
Madhukar, Mani, editor.
(1)
Mammeri, Zoubir, author.
(1)
Mantas, Georgios.
(1)
Masoodi, Faheem Syeed, editor.
(1)
Mateczun, Laura, author.
(1)
Matin, Mohammad A.
(1)
McHaney, Roger, author.
(1)
Messier, Ric, author.
(1)
Miroshnikov, Andrei, author.
(1)
Moschovitis, Christos J. P., author.
(1)
Moskowitz, Jeremy.
(1)
Nagrath, Preeti, editor.
(1)
Nayyar, Anand, editor.
(1)
Nguyen, Nhu Gia, editor.
(1)
Norris, Donald F., author.
(1)
Penttinen, Jyrki T. J., author.
(1)
Piper, Ben.
(1)
Pirskanen, Juho, editor.
(1)
Porambage, Pawani, author.
(1)
Robinson, Dom, author.
(1)
Robinson, Nikki, author.
(1)
Rodriguez, Jonathan.
(1)
Rose, Stephen.
(1)
Saghezchi, Firooz.
(1)
Samadi, Yasaman, 1993- author.
(1)
Savill, John, 1975- author.
(1)
Shelley, Joe.
(1)
Singla, Bhawna, editor.
(1)
Sohrabi, Nasrin, 1982- author.
(1)
Stewart, James Michael.
(1)
Suaboot, Jakapan, 1984- author.
(1)
Sucasas, Victor.
(1)
Takabi, Hassan, 1982- editor.
(1)
Tari, Zahir, 1961- author.
(1)
Wang, Han, author.
(1)
Weaver, Griffin, author.
(1)
Ylianttila, Mika, editor.
(1)
More
View All
Fewer
Collapse All
Language
Include
Exclude
English
(50)
Publication Date
Include
Exclude
-
2025
(10)
2024
(9)
2019
(8)
2023
(6)
2017
(4)
2021
(4)
2022
(4)
2018
(3)
2020
(2)
2026
(2)
More
View All
Fewer
Collapse All
Subject
Include
Exclude
COMPUTERS.
(50)
Electronic books.
(46)
Security.
(37)
Computer security.
(14)
Sécurité informatique.
(14)
Viruses & Malware.
(11)
Cryptography.
(9)
TECHNOLOGY & ENGINEERING.
(8)
Computer networks -- Security measures
(6)
Computer networks -- Security measures.
(6)
Mobile & Wireless Communications.
(6)
Online Safety & Privacy.
(6)
Réseaux d'ordinateurs -- Sécurité -- Mesures.
(6)
Telecommunications.
(6)
COMPUTERS -- Security -- General.
(5)
Computer security
(5)
COMPUTERS -- Information Technology.
(4)
Cloud computing.
(4)
Information Technology.
(4)
COMPUTERS -- Computer Literacy.
(3)
COMPUTERS -- Computer Science.
(3)
COMPUTERS -- Data Processing.
(3)
COMPUTERS -- Hardware -- General.
(3)
COMPUTERS -- Machine Theory.
(3)
COMPUTERS -- Reference.
(3)
Cloud computing
(3)
Computer Security
(3)
Infonuagique.
(3)
Information technology -- Management
(3)
Information technology -- Management.
(3)
Internet des objets -- Sécurité -- Mesures.
(3)
Internet of things -- Security measures.
(3)
Technologie de l'information -- Gestion.
(3)
6G mobile communication systems -- Security measures.
(2)
BUSINESS & ECONOMICS.
(2)
Certification Guides.
(2)
Cloud Computing.
(2)
Cloud computing -- Security measures.
(2)
Cyber intelligence (Computer security)
(2)
Cybernetics.
(2)
Data protection.
(2)
Infonuagique -- Sécurité -- Mesures.
(2)
Intelligence (AI) & Semantics.
(2)
Internet of things
(2)
Protection de l'information (Informatique)
(2)
Software Development & Engineering.
(2)
Surveillance des menaces informatiques.
(2)
TECHNOLOGY & ENGINEERING -- Mechanical.
(2)
Transmission sans fil.
(2)
Wireless communication systems.
(2)
5G mobile communication systems -- Technological innovations.
(1)
Administration locale -- États-Unis.
(1)
Africa
(1)
African.
(1)
Amazon Web Services (Firm)
(1)
Architecture orientée service (Informatique)
(1)
Artificial Intelligence
(1)
Artificial intelligence
(1)
Artificial intelligence.
(1)
BUSINESS & ECONOMICS -- Industries -- Computer Industry.
(1)
BUSINESS & ECONOMICS -- Production & Operations Management.
(1)
Blockchains (Databases)
(1)
Broadband communication systems
(1)
Broadband communication systems -- Technological innovations.
(1)
Business -- Data processing
(1)
Business -- Data processing.
(1)
Business enterprises -- Computer networks
(1)
Business enterprises -- Computer networks -- Security measures.
(1)
Business enterprises -- Computer networks.
(1)
Business enterprises -- Computer programs.
(1)
Business enterprises -- Data processing -- Security measures.
(1)
COMPUTERS -- Operating Systems -- General.
(1)
COMPUTERS -- Security -- Networking.
(1)
COVID-19 Pandemic, 2020-2023 -- Social aspects -- Africa.
(1)
Changement organisationnel.
(1)
Chaînes de blocs.
(1)
Cloud computing -- Examinations -- Study guides.
(1)
Cloud computing -- Security measures
(1)
Communications mobiles 5G -- Innovations.
(1)
Computer Communication Networks
(1)
Computer Networks
(1)
Computer Science.
(1)
Computer crimes -- Investigation.
(1)
Computer crimes -- Prevention.
(1)
Computer industry
(1)
Computer industry.
(1)
Computer networks
(1)
Computer networks -- Security measures -- Computer programs
(1)
Computer networks -- Security measures -- Computer programs.
(1)
Computer networks -- Security measures -- Examinations
(1)
Computer networks -- Security measures -- Examinations -- Study guides.
(1)
Computer networks.
(1)
Computer security -- Computer programs
(1)
Computer security -- Computer programs.
(1)
Computer security -- Examinations
(1)
Computer security -- Examinations -- Study guides.
(1)
Computer security -- Government policy
(1)
Computer security -- Government policy.
(1)
Computer security -- Law and legislation
(1)
Computer security -- Law and legislation.
(1)
Computer security -- United States.
(1)
Computer software -- Development
(1)
Computer software -- Development.
(1)
Computers
(1)
Computersicherheit
(1)
Confidentialité des données.
(1)
Criminalité informatique -- Enquêtes.
(1)
Cryptographie.
(1)
Cyberguerre (Science militaire)
(1)
Cyberinfrastructure -- Security measures.
(1)
Cyberspace operations (Military science)
(1)
Cyberterrorism -- Prevention
(1)
Cyberterrorism -- Prevention.
(1)
Data privacy
(1)
Data privacy.
(1)
Data protection
(1)
Digital forensic science
(1)
Digital forensic science.
(1)
Domotique -- Sécurité -- Mesures.
(1)
Dwellings -- Security measures
(1)
Dwellings -- Security measures.
(1)
Electronic data processing personnel -- Certification
(1)
Electronic data processing personnel -- Certification.
(1)
Entreprises -- Informatique -- Sécurité -- Mesures.
(1)
Entreprises -- Logiciels.
(1)
Entreprises -- Réseaux d'ordinateurs.
(1)
GSM (Radiotéléphonie) -- Sécurité -- Mesures.
(1)
Gestion -- Informatique.
(1)
Global system for mobile communications -- Security measures.
(1)
Global system for mobile communications -- Technological innovation.
(1)
Guides de l'étudiant.
(1)
Génie logiciel.
(1)
Habitations -- Sécurité -- Mesures.
(1)
Home automation -- Security measures.
(1)
Infonuagique -- Examens -- Guides de l'étudiant.
(1)
Information filtering systems
(1)
Information filtering systems.
(1)
Information technology -- Security measures
(1)
Information technology -- Security measures.
(1)
Informatique -- Industrie.
(1)
Informatique mobile.
(1)
Insurance.
(1)
Intelligence artificielle.
(1)
Interconnexion de réseaux (Télécommunications)
(1)
Internet -- Government policy
(1)
Internet -- Government policy.
(1)
Internet -- Law and legislation
(1)
Internet -- Law and legislation.
(1)
Internet -- Politique gouvernementale.
(1)
Internet -- Security measures
(1)
Internet -- Security measures.
(1)
Internet -- Sécurité -- Mesures.
(1)
Internet des objets.
(1)
Internet of things.
(1)
Internetworking (Telecommunication)
(1)
Intrusion detection systems (Computer security)
(1)
Leadership.
(1)
Local government
(1)
Local government -- United States.
(1)
Logiciels malveillants -- Identification -- Logiciels.
(1)
Malware (Computer software) -- Identification -- Computer programs.
(1)
Malware (Computer software) -- Prevention -- Computer programs.
(1)
Management -- Data processing
(1)
Management -- Data processing.
(1)
Management information systems
(1)
Management information systems.
(1)
Medical informatics
(1)
Medical informatics -- Security measures.
(1)
Micro-ordinateurs -- Accès -- Contrôle.
(1)
Microcomputers -- Access control
(1)
Microcomputers -- Access control.
(1)
Microsoft Windows (Computer file)
(1)
Mobile communication systems
(1)
Mobile communication systems -- Technological innovations
(1)
Mobile communication systems -- Technological innovations.
(1)
Mobile communication systems.
(1)
Mobile computing
(1)
Mobile computing.
(1)
Médecine -- Informatique -- Sécurité -- Mesures.
(1)
Médias sociaux -- Sécurité -- Mesures.
(1)
Network Protocols.
(1)
Organizational Innovation
(1)
Organizational change
(1)
Organizational change.
(1)
POLITICAL SCIENCE.
(1)
Pandémie de COVID-19, 2020-2023 -- Aspect social -- Afrique.
(1)
Penetration testing (Computer security)
(1)
Project Management.
(1)
Radiocommunications mobiles -- Innovations.
(1)
Radiocommunications mobiles.
(1)
Risk Assessment & Management.
(1)
Réseaux SDN.
(1)
Réseaux d'ordinateurs -- Sécurité -- Mesures -- Examens -- Guides de l'étudiant.
(1)
Réseaux d'ordinateurs -- Sécurité -- Mesures -- Logiciels.
(1)
Réseaux d'ordinateurs.
(1)
Service-oriented architecture (Computer science)
(1)
Services Web -- Sécurité -- Mesures.
(1)
Signals & Signal Processing.
(1)
Social aspects
(1)
Social media -- Security measures.
(1)
More
View All
Fewer
Collapse All
Material Type
Include
Exclude
E-Book
Shelf Location
Include
Exclude
Wiley E-Book Collection
Library
Include
Exclude
Online Library
false
{sortLabel}
{alphabetical}
{relevance}
{include}
{exclude}
{facetName}
{results}
{displayName}
{count}
{error}
Select an Action
Place Hold(s)
Add to My Lists
Email
Print
50 Results Found
1
2
3
4
5
Sort By:
Relevance (Default)
Publication Date (Ascending)
Publication Date (Descending)
Title
Author
00
DEFAULT
Select a list
Temporary List
Make this your default list.
The following items were successfully added.
There was an error while adding the following items. Please try again.
One or more items could not be added because you are not logged in.
49.
Advanced penetration testing : hacking the world's most secure networks
Advanced penetration testing : hacking the world's most secure networks
Author
Allsopp, Wil, author.
Preferred Shelf Number
QA76.9 .A25
Electronic Access
https://onlinelibrary.wiley.com/doi/book/10.1002/9781119367741
Format:
Availability
Online Library~1
Available:
Copies:
50.
Network forensics
Network forensics
Author
Messier, Ric, author.
Preferred Shelf Number
TK5105.59
Electronic Access
https://onlinelibrary.wiley.com/doi/book/10.1002/9781119329190
Format:
Availability
Online Library~1
Available:
Copies:
Select an Action
Place Hold(s)
Add to My Lists
Email
Print
1
2
3
4
5
Go to:
Search Results
|
Top of Page
|
Search Facets