Skip to:
Search Results
|
Content
|
Bottom
|
Search Facets
Log In
|
My Account
|
My Lists
|
|
Remember to clear the cache and close the browser window.
Search Limit
Everything
E-Book
Journals
Beytepe Library
Health Sciences Library
Conservatory Library
Law Library
Social Sciences Vocational High School
DVD Collection
Prof.Dr. Onur Bilge Kula Collection
Rooms Restriction Values
All Fields
Title
Author
Subject
ISBN
ISSN
13
Search Field
All Fields
Target Value
Limit Value
Restriction Value
Search For:
Advanced Search
Limit Search Results
Narrowed by:
+
Subject: Computer crimes -- Prevention.
Author
Include
Exclude
IGI Global, publisher.
(5)
Maynor, David.
(2)
ScienceDirect (Online service)
(2)
Winkler, Ira.
(2)
Andreasson, Kim J.
(1)
Appel, Edward J.
(1)
Appel, Edward J., author.
(1)
Blackley, John A.
(1)
Christiansen, Bryan, 1960- editor.
(1)
Dube, Roger.
(1)
Dunham, Ken.
(1)
Ely, Adam.
(1)
Enbody, Richard J., author.
(1)
Engebretson, Pat (Patrick Henry), 1974-
(1)
Geetha, S., 1979- editor.
(1)
Graham, James.
(1)
Gunasekhar, T., 1990- author.
(1)
Howard, Rick.
(1)
Information Resources Management Association, editor.
(1)
Khan, Muhammad Salman, author.
(1)
Kiran, P. Sai, author.
(1)
Krishna Reddy, V., author.
(1)
Messier, Ric, author.
(1)
O'Connor, T. J.
(1)
Pauli, Joshua J.
(1)
Peltier, Justin.
(1)
Peltier, Thomas R.
(1)
Perez, Richard, 1969 Oct. 17-
(1)
Phamila, Asnath Victy, 1978- editor.
(1)
Piekarz, Agnieszka, 1990- editor.
(1)
Rao, B. Thirumala, author.
(1)
Rao, K. Thirupathi, author.
(1)
Shema, Mike.
(1)
Sood, Aditya K., author.
(1)
Timm, Carl.
(1)
Ulsch, N. MacDonnell, 1951-
(1)
Wiley InterScience (Online service)
(1)
Wong, Caroline.
(1)
More
View All
Fewer
Collapse All
Language
Include
Exclude
English
(25)
Publication Date
Include
Exclude
-
2019
(5)
2012
(3)
2014
(3)
2006
(2)
2007
(2)
2009
(2)
2010
(2)
2013
(2)
2003
(1)
2008
(1)
2011
(1)
2015
(1)
More
View All
Fewer
Collapse All
Subject
Include
Exclude
Computer security.
(13)
Computer networks -- Security measures.
(9)
Computer hackers.
(3)
Electronic books.
(3)
Bilgisayar suçları -- Korunma.
(2)
Cyberspace -- Security measures.
(2)
Information technology -- Security measures.
(2)
Internet searching.
(2)
Application software -- Security measures.
(1)
Bilgi ağları -- Güvenlik önlemleri.
(1)
Bilgi güvenliği.
(1)
Bilgisayar güvenliği.
(1)
Business enterprises -- Computer networks -- Security measures.
(1)
Business enterprises -- Security measures.
(1)
Cell phone systems -- Security measures.
(1)
Cloud computing -- Security measures.
(1)
Cloud computing.
(1)
Computer Security.
(1)
Computer crimes -- Case studies.
(1)
Computer crimes -- Investigation.
(1)
Computer crimes.
(1)
Computer input-output equipment.
(1)
Computer networks -- Security measures -- Government policy.
(1)
Computer programs -- Security measures.
(1)
Computer security -- Computer programs.
(1)
Computer security -- Data processing.
(1)
Computer security -- Equipment and supplies.
(1)
Computer security -- Evaluation.
(1)
Computer software -- Testing.
(1)
Computing Methodologies.
(1)
Corporations -- Security measures.
(1)
Criminal investigation.
(1)
Cyberterrorism -- Prevention.
(1)
Data protection -- Law and legislation.
(1)
Data protection -- Standards.
(1)
Data protection.
(1)
Decision making.
(1)
Electronic data processing departments -- Security measures.
(1)
Electronic surveillance.
(1)
Employee crimes -- Prevention.
(1)
Employee screening.
(1)
Government information -- Security measures.
(1)
Information technology -- Management.
(1)
Information technology -- Social aspects.
(1)
International business enterprises -- Security measures.
(1)
Internet -- Security measures.
(1)
Machine learning.
(1)
Malware (Computer software) -- Prevention.
(1)
Microcomputers -- Access control.
(1)
Mobile communication systems -- Security measures.
(1)
Mobile computing -- Security measures.
(1)
National security -- Data processing.
(1)
National security.
(1)
Online social networks -- Security measures.
(1)
Penetration testing (Computer security)
(1)
Personnel management -- Information technology.
(1)
Python (Computer program language)
(1)
Risk assessment.
(1)
Risk management.
(1)
Social change.
(1)
Virtual computer systems -- Security measures.
(1)
Web 2.0 -- Security measures.
(1)
Web applications -- Security measures.
(1)
Web site development -- Security measures.
(1)
Web sites -- Security measures.
(1)
Wireless Internet -- Security measures.
(1)
Wireless communication systems -- Security measures.
(1)
More
View All
Fewer
Collapse All
Material Type
Include
Exclude
E-Book
Shelf Location
Include
Exclude
Electronic Library
Library
Include
Exclude
Online Library
false
{sortLabel}
{alphabetical}
{relevance}
{include}
{exclude}
{facetName}
{results}
{displayName}
{count}
{error}
Select an Action
Place Hold(s)
Add to My Lists
Email
Print
25 Results Found
1
2
3
Sort By:
Relevance (Default)
Publication Date (Ascending)
Publication Date (Descending)
Title
Author
0
DEFAULT
Select a list
Temporary List
Make this your default list.
The following items were successfully added.
There was an error while adding the following items. Please try again.
One or more items could not be added because you are not logged in.
25.
Managing a network vulnerability assessment
Managing a network vulnerability assessment
Author
Peltier, Thomas R. Peltier, Justin. Blackley, John A.
Preferred Shelf Number
ONLINE
Electronic Access
Distributed by publisher. Purchase or institutional license may be required for access.
Format:
Availability
Online Library~1
Available:
Copies:
Select an Action
Place Hold(s)
Add to My Lists
Email
Print
1
2
3
Go to:
Search Results
|
Top of Page
|
Search Facets