Skip to:
Search Results
|
Content
|
Bottom
|
Search Facets
Log In
|
My Account
|
My Lists
|
|
Remember to clear the cache and close the browser window.
Search Limit
Everything
E-Book
Journals
Beytepe Library
Health Sciences Library
Conservatory Library
Law Library
Social Sciences Vocational High School
DVD Collection
Prof.Dr. Onur Bilge Kula Collection
Rooms Restriction Values
All Fields
Title
Author
Subject
ISBN
ISSN
13
Search Field
All Fields
Target Value
Limit Value
Restriction Value
Search For:
Advanced Search
Limit Search Results
Narrowed by:
+
Subject: Computer security.
Author
Include
Exclude
Edwards, Jason (Cybersecurity expert), author.
(2)
Weaver, Griffin, author.
(2)
Brown, Tracy Celaya, author.
(1)
Carpenter, Perry, author.
(1)
Chatterjee, Jyotir Moy, editor.
(1)
Couretas, Jerry M., 1966- author.
(1)
Dalziel, Henry, editor.
(1)
Erbacher, Robert F. editor.
(1)
Goucher, Wendy, author.
(1)
John Wiley & Sons, publisher.
(1)
Khari, Manju, editor.
(1)
Kott, Alexander. editor.
(1)
Kumar, Raghvendra, 1987- editor.
(1)
Le, Dac-Nhuong, 1983- editor.
(1)
Mishra, Brojo Kishore, 1979- editor.
(1)
Peltier, Thomas R., author.
(1)
SpringerLink (Online service)
(1)
Tudor, Jan Killmeyer., author.
(1)
Wang, Cliff. editor.
(1)
Willson, David (Lawyer), author.
(1)
Winkler, Ira, author.
(1)
Zaidoun, Ameur Salem, author.
(1)
Årnes, André, 1976- editor.
(1)
More
View All
Fewer
Collapse All
Language
Include
Exclude
English
(13)
Publication Date
Include
Exclude
-
2018
(2)
2019
(2)
2022
(2)
2002
(1)
2006
(1)
2014
(1)
2016
(1)
2021
(1)
2024
(1)
2026
(1)
More
View All
Fewer
Collapse All
Subject
Include
Exclude
Sécurité informatique.
(8)
Electronic books.
(5)
COMPUTERS.
(4)
Computer Security
(3)
Computer networks -- Security measures.
(3)
Computer security
(3)
Business enterprises -- Computer networks -- Security measures.
(2)
Computer networks -- Security measures
(2)
Data protection.
(2)
Networking.
(2)
Réseaux d'ordinateurs -- Sécurité -- Mesures.
(2)
Security.
(2)
BUSINESS & ECONOMICS -- Production & Operations Management.
(1)
Business enterprises -- Security measures
(1)
Business enterprises -- Security measures.
(1)
COMPUTERS -- Computer Simulation.
(1)
COMPUTERS -- Information Technology.
(1)
COMPUTERS -- Operating Systems -- General.
(1)
COMPUTERS -- Security -- General.
(1)
COMPUTERS / Internet / Security
(1)
COMPUTERS / Security / General
(1)
Client-Server Computing.
(1)
Communication électronique des pièces.
(1)
Computer Engineering.
(1)
Computer Simulation
(1)
Computer architecture.
(1)
Computer communication systems.
(1)
Computer crimes -- Investigation
(1)
Computer crimes -- Investigation.
(1)
Computer crimes -- Prevention.
(1)
Computer science
(1)
Computer science.
(1)
Computer simulation.
(1)
Confidentialité des données.
(1)
Corporations -- Security measures.
(1)
Criminalistique.
(1)
Criminalité informatique -- Enquêtes.
(1)
Cyberinfrastructure
(1)
Cyberinfrastructure.
(1)
Data encryption (Computer science).
(1)
Data privacy.
(1)
Electronic data processing -- Distributed processing -- Security measures
(1)
Electronic data processing -- Distributed processing -- Security measures.
(1)
Electronic discovery (Law)
(1)
Entreprises -- Sécurité -- Mesures.
(1)
Forensic sciences
(1)
Forensic sciences.
(1)
Informatique.
(1)
MEDICAL -- Forensic Medicine.
(1)
Materials Science.
(1)
Online Safety & Privacy.
(1)
Organizational behavior.
(1)
Parallel processing (Electronic computers)
(1)
Parallel processing (Electronic computers) -- Security measures.
(1)
Privacy-preserving techniques (Computer science)
(1)
Programming.
(1)
Protection de l'information (Informatique)
(1)
Risk communication.
(1)
Risk perception.
(1)
Simulation par ordinateur.
(1)
TECHNOLOGY & ENGINEERING.
(1)
Traitement réparti -- Sécurité -- Mesures.
(1)
Viruses & Malware.
(1)
forensic science.
(1)
simulation.
(1)
More
View All
Fewer
Collapse All
Material Type
Include
Exclude
E-Book
Shelf Location
Include
Exclude
CRC Ebooks
Electronic Library
Taylor Francis E-Book Collection
Wiley E-Book Collection
Library
Include
Exclude
Online Library
false
{sortLabel}
{alphabetical}
{relevance}
{include}
{exclude}
{facetName}
{results}
{displayName}
{count}
{error}
Select an Action
Place Hold(s)
Add to My Lists
Email
Print
13 Results Found
1
2
Sort By:
Relevance (Default)
Publication Date (Ascending)
Publication Date (Descending)
Title
Author
0
DEFAULT
Select a list
Temporary List
Make this your default list.
The following items were successfully added.
There was an error while adding the following items. Please try again.
One or more items could not be added because you are not logged in.
13.
Information security policies, procedures, and standards : guidelines for effective information security management
Information security policies, procedures, and standards : guidelines for effective information security management
Author
Peltier, Thomas R., author.
Preferred Shelf Number
QA76.9 .A25 P46 2002
Electronic Access
Click here to view.
Format:
Availability
Online Library~1
Available:
Copies:
Select an Action
Place Hold(s)
Add to My Lists
Email
Print
1
2
Go to:
Search Results
|
Top of Page
|
Search Facets