Skip to:
Search Results
|
Content
|
Bottom
|
Search Facets
Log In
|
My Account
|
My Lists
|
|
Remember to clear the cache and close the browser window.
Search Limit
Everything
E-Kitap
Dergiler
Beytepe Kütüphanesi
Sağlık Bilimleri Kütüphanesi
Konservatuvar Kütüphanesi
Hukuk Kütüphanesi
Sosyal Bilimler Meslek Yüksek Okulu
DVD Koleksiyonu
Prof.Dr. Onur Bilge Kula Koleksiyonu
Rooms Restriction Values
All Fields
Title
Author
Subject
ISBN
ISSN
13
Search Field
All Fields
Target Value
Limit Value
Restriction Value
Search For:
Advanced Search
Limit Search Results
Narrowed by:
+
Subject: Computer Security
Author
Include
Exclude
Agrawal, Rashmi, 1978-
(1)
Anderson, Ross. http://viaf.org/viaf/sourceID/LC%7cnb2004300232
(1)
Anson, Steve.
(1)
Arcuri, Jennifer, author.
(1)
Bhargava, Neeraj.
(1)
Bhargava, Ritu.
(1)
Bruen, Aiden A., 1941-
(1)
Bursell, Mike, author.
(1)
Carey, Marcus J. (Cybersecurity professional)
(1)
Chatterjee, Jyotir Moy, editor.
(1)
Forcinito, Mario, 1962-
(1)
Guha, Abhijit, editor.
(1)
Hadnagy, Christopher, author.
(1)
Hickey, Matthew (Computer security expert), author.
(1)
Jin, Jennifer.
(1)
Khari, Manju, editor.
(1)
Kumar, Raghvendra, 1987- editor.
(1)
Lambros, Kyriakos P., author.
(1)
Le, Dac-Nhuong, 1983- editor.
(1)
Mishra, Brojo Kishore, 1979- editor.
(1)
Pramanik, Sabyasachi, editor.
(1)
Rathore, Pramod Singh, 1988-
(1)
Reznik, Leonid, 1955- author.
(1)
Samanta, Debabrata, 1987- editor.
(1)
Schneier, Bruce, 1963- author.
(1)
Sharp, Matthew K., author.
(1)
Tanner, Nadean H., author.
(1)
Vinay, M., editor.
(1)
More
View All
Fewer
Collapse All
Language
Include
Exclude
English
(14)
Publication Date
Include
Exclude
-
2020
(4)
2022
(4)
2019
(3)
2005
(1)
2018
(1)
2021
(1)
More
View All
Fewer
Collapse All
Subject
Include
Exclude
Computer security.
(14)
Sécurité informatique.
(14)
Electronic books.
(9)
COMPUTERS.
(7)
Security.
(6)
Computer networks -- Security measures
(4)
Computer networks -- Security measures.
(4)
Cryptography.
(4)
Réseaux d'ordinateurs -- Sécurité -- Mesures.
(4)
COMPUTERS -- Security -- General.
(3)
Artificial Intelligence
(2)
Artificial intelligence.
(2)
Hacking
(2)
Hacking.
(2)
Intelligence artificielle.
(2)
Piratage informatique.
(2)
31.48 calculus of variations.
(1)
53.71 information, communication and signal theories.
(1)
54.10 theoretical informatics.
(1)
Apprentissage automatique.
(1)
BUSINESS & ECONOMICS.
(1)
COMPUTERS -- Internet -- Security.
(1)
COMPUTERS -- Networking -- Security.
(1)
COMPUTERS -- Security -- Cryptography & Encryption.
(1)
COMPUTERS -- Security -- Network Security.
(1)
COMPUTERS -- Security -- Networking.
(1)
COMPUTERS -- Security -- Online Safety & Privacy.
(1)
Chefs des services de l'information.
(1)
Chief information officers
(1)
Chief information officers.
(1)
Client-Server Computing.
(1)
Cloud computing -- Security measures.
(1)
Computersicherheit
(1)
Computersicherheit -- Theoretische Informatik.
(1)
Criptologia.
(1)
Cryptographie.
(1)
Cryptography
(1)
Data Mining
(1)
Data mining.
(1)
Data protection.
(1)
Electronic data processing -- Distributed processing
(1)
Electronic data processing -- Distributed processing -- Security measures
(1)
Electronic data processing -- Distributed processing -- Security measures.
(1)
Electronic data processing -- Distributed processing.
(1)
Exploration de données (Informatique)
(1)
Fehlerkorrekturcode
(1)
Fehlerkorrigierender Code.
(1)
Finance.
(1)
Financial Risk Management.
(1)
Hackers
(1)
Hackers.
(1)
Hacking -- Moral and ethical aspects.
(1)
Human-computer interaction
(1)
Human-computer interaction.
(1)
Infonuagique -- Sécurité -- Mesures.
(1)
Information theory.
(1)
Informationstheorie -- 0 Gesamtdarstellung.
(1)
Ingénierie sociale.
(1)
Kryptologie
(1)
Kryptologie -- 0 Gesamtdarstellung.
(1)
Machine Learning
(1)
Machine learning.
(1)
Management information systems -- Security measures.
(1)
Networking.
(1)
Online Safety & Privacy.
(1)
Optimization.
(1)
Parallel processing (Electronic computers)
(1)
Parallel processing (Electronic computers) -- Security measures.
(1)
Penetration testing (Computer security)
(1)
Piratage informatique -- Aspect moral.
(1)
Pirates informatiques.
(1)
SOCIAL SCIENCE -- Anthropology -- General.
(1)
SOCIAL SCIENCE -- Regional Studies.
(1)
SOCIAL SCIENCE -- Sociology -- General.
(1)
Secret code.
(1)
Security systems
(1)
Security systems.
(1)
Social engineering
(1)
Social engineering.
(1)
Systèmes d'information de gestion -- Sécurité -- Mesures.
(1)
Systèmes de sécurité.
(1)
Systèmes de télécommunications -- Sécurité -- Mesures.
(1)
Systèmes de télécommunications.
(1)
TECHNOLOGY & ENGINEERING.
(1)
Telecommunication systems
(1)
Telecommunication systems -- Security measures
(1)
Telecommunication systems -- Security measures.
(1)
Telecommunication systems.
(1)
Telecommunications.
(1)
Telekommunikation
(1)
Teoria da informação.
(1)
Tests d'intrusion.
(1)
Theoretische Informatik -- Computersicherheit.
(1)
Traitement réparti -- Sécurité -- Mesures.
(1)
Traitement réparti.
(1)
More
View All
Fewer
Collapse All
Material Type
Include
Exclude
E-Book
Shelf Location
Include
Exclude
Wiley E-Book Collection
Library
Include
Exclude
Online Library
false
{sortLabel}
{alphabetical}
{relevance}
{include}
{exclude}
{facetName}
{results}
{displayName}
{count}
{error}
Select an Action
Place Hold(s)
Add to My Lists
Email
Print
14 Results Found
1
2
Sort By:
Relevance (Default)
Publication Date (Ascending)
Publication Date (Descending)
Title
Author
00
DEFAULT
Select a list
Temporary List
Make this your default list.
The following items were successfully added.
There was an error while adding the following items. Please try again.
One or more items could not be added because you are not logged in.
13.
Social engineering : the science of human hacking
Social engineering : the science of human hacking
Author
Hadnagy, Christopher, author.
Preferred Shelf Number
HM668 .H33 2018
Electronic Access
https://onlinelibrary.wiley.com/doi/book/10.1002/9781119433729
Format:
Availability
Online Library~1
Available:
Copies:
14.
Cryptography, information theory, and error-correction : a handbook for the 21st century
Cryptography, information theory, and error-correction : a handbook for the 21st century
Author
Bruen, Aiden A., 1941- Forcinito, Mario, 1962-
Preferred Shelf Number
QA76.9 .A25 B79 2005
Electronic Access
https://onlinelibrary.wiley.com/doi/book/10.1002/9781118033296
https://onlinelibrary.wiley.com/doi/book/10.1002/9781119582397
Format:
Availability
Online Library~1
Available:
Copies:
Select an Action
Place Hold(s)
Add to My Lists
Email
Print
1
2
Go to:
Search Results
|
Top of Page
|
Search Facets