Log In
|
My Account
|
My Lists
|
|
Remember to clear the cache and close the browser window.
Search Limit
Everything
E-Book
Journals
Beytepe Library
Health Sciences Library
Conservatory Library
Law Library
Social Sciences Vocational High School
DVD Collection
Prof.Dr. Onur Bilge Kula Collection
Rooms Restriction Values
All Fields
Title
Author
Subject
ISBN
ISSN
8
Search Field
All Fields
Target Value
Limit Value
Restriction Value
Search For:
Advanced Search
Limit Search Results
Narrowed by:
+
Subject: COMPUTERS.
Author
Include
Exclude
Allsopp, Wil, author.
(1)
Anand, Abhineet, editor.
(1)
Anandan, R.
(1)
Anson, Steve.
(1)
Arduin, Pierre-Emmanuel, author.
(1)
Balamurigan, A., editor.
(1)
Balamurugan, S. (Shanmugam), 1985-
(1)
Balusamy, Balamurugan, editor.
(1)
Benarous, Leila.
(1)
Benmammar, Badr.
(1)
Bhatt, Ravindara, editor.
(1)
Bitam, Salim.
(1)
Bouillard, Anne, author.
(1)
Boyer, Marc, author.
(1)
Carey, Marcus J. (Cybersecurity professional), author.
(1)
Carpenter, Perry, author.
(1)
Chandrasekaran, E.
(1)
Chatterjee, Jyotir Moy, editor.
(1)
Clinton, David.
(1)
Corronc, Euriell, author.
(1)
Dash, Subhasis, editor.
(1)
Delhaye, J.-L. (Jean-Loïc)
(1)
Dhanaraj, Rajesh Kumar, editor.
(1)
Duffy, Ken R., author.
(1)
Edwards, Jason (Cybersecurity expert), author.
(1)
Ganesh, Narayanan, editor.
(1)
Garg, Lalit, 1977- editor.
(1)
Ghosh, Hiranmay, author.
(1)
Ghosh, Ratan K., author.
(1)
Goudos, Sotirios K.
(1)
Goyal, Dinesh, 1976- editor.
(1)
Goyal, Neeraj Kumar, author.
(1)
Guha, Abhijit, editor.
(1)
Gupta, Anuj Kumar, editor.
(1)
Hachimi, Hanaa.
(1)
Hoang, Dinh Thai, 1986- author.
(1)
Iannone, Giovanni, author.
(1)
Jaware, Tushar H., editor.
(1)
Jin, Jennifer.
(1)
Kalita, Kanak, 1988- editor.
(1)
Karagiannidis, George K.
(1)
Khari, Manju, editor.
(1)
Kong, Joonho, author.
(1)
Kumar, Raghvendra, 1987- editor.
(1)
Lambros, Kyriakos P., author.
(1)
Law, Oscar Ming Kin, author.
(1)
Le, Dac-Nhuong, 1983- editor.
(1)
Lim, Wei Yang Bryan, editor.
(1)
Liu, Albert Chun-Chen, author.
(1)
Malviya, Rishabha, editor.
(1)
Matin, Mohammad A.
(1)
Matta, Anjanna, editor.
(1)
McHaney, Roger, author.
(1)
McMillan, Troy, author.
(1)
Mellouk, Abdelhamid.
(1)
Messier, Ric, author.
(1)
Migliaccio, Alessandro, author.
(1)
Milanova, Mariofanna, editor.
(1)
Mishra, Brojo Kishore, 1979- editor.
(1)
Mohindru, Vandana, editor.
(1)
Moschovitis, Christos J. P., author.
(1)
Moyo, Siegfried, author.
(1)
Munir, Arslan, author.
(1)
Murugesan, San, 1978- editor.
(1)
Médard, Muriel, author.
(1)
Niyato, Dusit, editor.
(1)
Panek, Crystal, author.
(1)
Pani, Subhendu Kumar, 1980- editor.
(1)
Pedersen, Morten Videbaek, author.
(1)
Peng, Sheng-Lung, editor.
(1)
Piper, Ben.
(1)
Poston, Howard E., III, author.
(1)
Pramanik, Sabyasachi, editor.
(1)
Pālamurukan̲, Ca., editor.
(1)
Qureshi, Mahmood Azhar, author.
(1)
Raja, Rohit, editor.
(1)
Rajkumar, S., author.
(1)
Rawat, Romil, editor.
(1)
Robinson, Dom, author.
(1)
Samadi, Yasaman, 1993- author.
(1)
Samanta, Debabrata, 1987- editor.
(1)
Seth, Ashish, editor.
(1)
Sharp, Matthew K., author.
(1)
Shen, X. (Xuemin), 1958- editor.
(1)
Singh, Sanjay Kumar, 1963- editor.
(1)
Singh, Umang, 1982-2021, editor.
(1)
Singh, Yashwant, editor.
(1)
Sohrabi, Nasrin, 1982- author.
(1)
Sondi, Patrick, author.
(1)
Srinivas, Mettu, editor.
(1)
Suaboot, Jakapan, 1984- author.
(1)
Sucharitha, G., editor.
(1)
Sumithra, M. G., editor.
(1)
Suseendran, G.
(1)
Tari, Zahir, 1961- author.
(1)
Tracy, Robb.
(1)
Tyagi, Amit Kumar.
(1)
Vasudevan, Vipindev Adat, author.
(1)
Venkatesan, Chandran, editor.
(1)
Verma, O. P. (Telecommunications engineer), editor.
(1)
Vinay, M., editor.
(1)
Wahl, Martine, author.
(1)
Weaver, Griffin, author.
(1)
Xiong, Zehui, editor.
(1)
Zhang, Junshan (Electrical engineer), editor.
(1)
More
View All
Fewer
Collapse All
Language
Include
Exclude
English
(49)
Publication Date
Include
Exclude
-
2021
(9)
2022
(9)
2024
(7)
2023
(6)
2018
(4)
2019
(4)
2020
(4)
2025
(4)
2017
(3)
More
View All
Fewer
Collapse All
Subject
Include
Exclude
Electronic books.
(44)
Networking.
(17)
Intelligence (AI) & Semantics.
(15)
Security.
(15)
Computer networks -- Security measures
(14)
Computer networks -- Security measures.
(13)
Réseaux d'ordinateurs -- Sécurité -- Mesures.
(13)
Computer security.
(12)
Sécurité informatique.
(12)
COMPUTERS -- Security -- General.
(7)
TECHNOLOGY & ENGINEERING.
(7)
Computer Security
(6)
Viruses & Malware.
(5)
Computer networks
(4)
Computer networks.
(4)
Computer security
(4)
Information Technology.
(4)
Mobile & Wireless Communications.
(4)
Neural networks (Computer science)
(4)
Online Safety & Privacy.
(4)
Réseaux neuronaux (Informatique)
(4)
Apprentissage automatique.
(3)
Client-Server Computing.
(3)
Machine learning.
(3)
Neural Networks.
(3)
Penetration testing (Computer security)
(3)
Réseaux d'ordinateurs.
(3)
Apprentissage profond.
(2)
Artificial Intelligence
(2)
Artificial intelligence
(2)
Artificial intelligence -- Medical applications
(2)
Artificial intelligence -- Medical applications.
(2)
Artificial intelligence.
(2)
BUSINESS & ECONOMICS.
(2)
COMPUTERS -- Information Technology.
(2)
COMPUTERS -- Networking -- Security.
(2)
COMPUTERS -- Security -- Networking.
(2)
COMPUTERS -- Security -- Online Safety & Privacy.
(2)
Certification Guides.
(2)
Computer Communication Networks
(2)
Computer networks -- Security measures -- Examinations
(2)
Computer networks -- Security measures -- Examinations -- Study guides.
(2)
Cryptography.
(2)
Data Mining
(2)
Data mining.
(2)
Deep Learning
(2)
Deep learning (Machine learning)
(2)
Exploration de données (Informatique)
(2)
Guides de l'étudiant.
(2)
Information technology -- Management
(2)
Information technology -- Management.
(2)
Intelligence artificielle -- Applications en médecine.
(2)
Intelligence artificielle.
(2)
Internet des objets.
(2)
Internet of things
(2)
Internet of things.
(2)
Machine Learning
(2)
Medical informatics
(2)
Medical informatics.
(2)
Médecine -- Informatique.
(2)
Neural Networks, Computer
(2)
Optical Data Processing.
(2)
Programming.
(2)
Project Management.
(2)
Réseaux d'ordinateurs -- Sécurité -- Mesures -- Examens -- Guides de l'étudiant.
(2)
Software Development & Engineering.
(2)
Study guides
(2)
Study guides.
(2)
Systems Architecture.
(2)
Technologie de l'information -- Gestion.
(2)
Telecommunications engineers -- Certification
(2)
Telecommunications.
(2)
Tests d'intrusion.
(2)
examination study guides.
(2)
5G mobile communication systems -- Technological innovations.
(1)
Ad hoc networks (Computer networks)
(1)
Algorithmes.
(1)
Algorithms
(1)
Algorithms.
(1)
Artificial intelligence -- Industrial applications.
(1)
Automation
(1)
Automation -- Technological innovations.
(1)
Automatisation -- Innovations.
(1)
Automobiles -- Conception et construction.
(1)
Automobiles -- Design and construction.
(1)
BUSINESS & ECONOMICS -- Industries -- Computer Industry.
(1)
BUSINESS & ECONOMICS -- Production & Operations Management.
(1)
Blockchains (Databases)
(1)
Brain-computer interfaces
(1)
Brain-computer interfaces.
(1)
Business enterprises -- Computer networks
(1)
Business enterprises -- Computer networks -- Security measures.
(1)
Business enterprises -- Computer networks.
(1)
Business enterprises -- Computer programs.
(1)
COMPUTERS -- Computer Literacy.
(1)
COMPUTERS -- Computer Science.
(1)
COMPUTERS -- Data Processing.
(1)
COMPUTERS -- Hardware -- General.
(1)
COMPUTERS -- Internet -- Security.
(1)
COMPUTERS -- Machine Theory.
(1)
COMPUTERS -- Operating Systems -- General.
(1)
COMPUTERS -- Reference.
(1)
COMPUTERS -- Security -- Cryptography & Encryption.
(1)
COMPUTERS / Programming / Parallel.
(1)
Changement organisationnel.
(1)
Chaînes de blocs.
(1)
Chefs des services de l'information.
(1)
Chief information officers
(1)
Chief information officers.
(1)
Chiffrement (Informatique)
(1)
Cisco IOS
(1)
Cisco IOS.
(1)
Cloud Computing.
(1)
Cloud computing
(1)
Cloud computing -- Examinations -- Study guides.
(1)
Cloud computing.
(1)
Coding theory.
(1)
Communications mobiles 5G -- Innovations.
(1)
Computer Engineering.
(1)
Computer Graphics.
(1)
Computer Networks
(1)
Computer Science.
(1)
Computer algorithms
(1)
Computer algorithms.
(1)
Computer crimes -- Prevention.
(1)
Computer crimes -- Risk assessment.
(1)
Computer engineering
(1)
Computer engineering.
(1)
Computer industry
(1)
Computer industry.
(1)
Computer network protocols
(1)
Computer network protocols.
(1)
Computer networks -- Access control.
(1)
Computer networks -- Evaluation
(1)
Computer networks -- Evaluation.
(1)
Computer networks -- Management.
(1)
Computer networks -- Mathematical models
(1)
Computer networks -- Mathematical models.
(1)
Computer networks -- Reliability
(1)
Computer networks -- Reliability.
(1)
Computer networks -- Security measures -- Computer programs
(1)
Computer networks -- Security measures -- Computer programs.
(1)
Computer networks -- Security measures -- Examinations, questions, etc.
(1)
Computer networks -- Technological innovations
(1)
Computer networks -- Technological innovations.
(1)
Computer science
(1)
Computer science -- Technological innovations.
(1)
Computer science.
(1)
Computer security -- Computer programs
(1)
Computer security -- Computer programs.
(1)
Computer security -- Examinations
(1)
Computer security -- Examinations -- Study guides.
(1)
Computer simulation
(1)
Computer simulation.
(1)
Computer vision
(1)
Computers
(1)
Criminalité informatique -- Évaluation du risque.
(1)
Data Warehousing.
(1)
Data encryption (Computer science)
(1)
Data protection
(1)
Data protection.
(1)
Databases.
(1)
Diagnostic Imaging
(1)
Diagnostic imaging.
(1)
Digital communications -- Social aspects.
(1)
Digital communications -- Technological innovations.
(1)
Digital twins (Computer simulation)
(1)
Distributed Systems & Computing.
(1)
Drone aircraft
(1)
Drone aircraft -- Control systems.
(1)
Drone aircraft -- Industrial applications.
(1)
Drone aircraft -- Security measures.
(1)
Drones -- Applications industrielles.
(1)
Drones -- Systèmes de commande.
(1)
Drones -- Sécurité -- Mesures.
(1)
Electronic Data Processing
(1)
Electronic data processing -- Distributed processing
(1)
Electronic data processing -- Distributed processing -- Security measures
(1)
Electronic data processing -- Distributed processing -- Security measures.
(1)
Electronic data processing -- Distributed processing.
(1)
Electronic data processing personnel -- Certification
(1)
Electronic data processing personnel -- Certification.
(1)
Electronics.
(1)
Entrepreneurship.
(1)
Entreprises -- Logiciels.
(1)
Entreprises -- Réseaux d'ordinateurs.
(1)
Examinations
(1)
Examinations.
(1)
Finance.
(1)
Financial Risk Management.
(1)
Fuzzy systems
(1)
Fuzzy systems.
(1)
Imagerie médicale.
(1)
Imagerie pour le diagnostic.
(1)
Imaging systems in medicine
(1)
Imaging systems in medicine.
(1)
Infonuagique -- Examens -- Guides de l'étudiant.
(1)
Infonuagique.
(1)
Information filtering systems
(1)
Information filtering systems.
(1)
More
View All
Fewer
Collapse All
Material Type
Include
Exclude
E-Book
Shelf Location
Include
Exclude
Wiley E-Book Collection
Library
Include
Exclude
Online Library
false
{sortLabel}
{alphabetical}
{relevance}
{include}
{exclude}
{facetName}
{results}
{displayName}
{count}
{error}
Select an Action
Place Hold(s)
Add to My Lists
Email
Print
49 Results Found
1
2
3
4
5
Sort By:
Relevance (Default)
Publication Date (Ascending)
Publication Date (Descending)
Title
Author
0
DEFAULT
Select a list
Temporary List
Make this your default list.
The following items were successfully added.
There was an error while adding the following items. Please try again.
One or more items could not be added because you are not logged in.
49.
Advanced penetration testing : hacking the world's most secure networks
Advanced penetration testing : hacking the world's most secure networks
Author
Allsopp, Wil, author.
Preferred Shelf Number
QA76.9 .A25
Electronic Access
https://onlinelibrary.wiley.com/doi/book/10.1002/9781119367741
Format:
Availability
Online Library~1
Available:
Copies:
Select an Action
Place Hold(s)
Add to My Lists
Email
Print
1
2
3
4
5