Skip to:
Search Results
|
Content
|
Bottom
|
Search Facets
Log In
|
My Account
|
My Lists
|
|
Remember to clear the cache and close the browser window.
Search Limit
Everything
E-Book
Journals
Beytepe Library
Health Sciences Library
Conservatory Library
Law Library
Social Sciences Vocational High School
DVD Collection
Prof.Dr. Onur Bilge Kula Collection
Rooms Restriction Values
All Fields
Title
Author
Subject
ISBN
ISSN
13
Search Field
All Fields
Target Value
Limit Value
Restriction Value
Search For:
Advanced Search
Limit Search Results
Author
Include
Exclude
SpringerLink (Online service)
(15)
ScienceDirect (Online service)
(12)
Wiley InterScience (Online service)
(7)
Andress, Jason.
(5)
Cross, Michael, 1965-
(5)
Dubrawsky, Ido.
(5)
IGI Global, publisher.
(5)
Peltier, Thomas R.
(4)
Project Muse.
(4)
Shimonski, Robert.
(4)
Tiller, James S.
(4)
Vacca, John R.
(4)
Alder, Raven.
(3)
Andress, Jason, author.
(3)
Baumrucker, C. Tate.
(3)
Rittinghouse, John W.
(3)
Rogers, Russ.
(3)
Shinder, Debra Littlejohn.
(3)
Stallings, William.
(3)
Syngress Media, Inc.
(3)
Wiles, Jack.
(3)
Akyıldız, M. Alparslan.
(2)
Anderson, Brian (Brian James)
(2)
Andreou, Kimon.
(2)
Baker, Andrew R.
(2)
Barber, Brian.
(2)
Beale, Jay.
(2)
Bhardwaj, Pawan K.
(2)
Bradley, Tony, 1969-
(2)
Brotby, W. Krag.
(2)
Cameron, Rob.
(2)
Carafano, James Jay, 1955-
(2)
Carvey, Harlan A., author.
(2)
Chuvakin, Anton.
(2)
Cole, Eric.
(2)
Conrad, Eric, 1967-
(2)
Dwivedi, Himanshu.
(2)
Elbahadır, Hamza.
(2)
Esler, Joel.
(2)
Feldman, Joshua.
(2)
Gatford, Chris.
(2)
Gold, André.
(2)
Gregg, Michael (Michael C.)
(2)
Haines, Brad.
(2)
Harper, Allen.
(2)
Harris, Shon.
(2)
Howard, Patrick D.
(2)
Hunter, Laura E.
(2)
John Wiley & Sons.
(2)
Kleiman, Dave.
(2)
Kohlenberg, Toby.
(2)
Kouns, Jake.
(2)
Liu, Dale.
(2)
Liu, Vincent.
(2)
Long, Johnny.
(2)
Manzuik, Steve.
(2)
Maxwell, Doug.
(2)
Maynor, David.
(2)
McClure, Stuart.
(2)
Meng, Weizhi. editor. (orcid)0000-0003-4384-5786
(2)
Minoli, Daniel, 1952-
(2)
Misenar, Seth.
(2)
Northcutt, Stephen.
(2)
Orebaugh, Angela.
(2)
Oriyano, Sean-Philip.
(2)
Pathan, Al-Sakib Khan.
(2)
Porter, Thomas, PhD.
(2)
Ransome, James F.
(2)
Satyanarayana, Mahesh.
(2)
Scambray, Joel.
(2)
Seagren, Eric.
(2)
Shinder, Thomas W.
(2)
Snedaker, Susan.
(2)
Solomon, Michael G.
(2)
Thuraisingham, Bhavani M.
(2)
Varsalone, Jesse.
(2)
Wayner, Peter, 1964-
(2)
Weiss, Martin M.
(2)
Williams, Branden R.
(2)
Winterfeld, Steve.
(2)
ACM SIGSAC New Security Paradigms Workshop (2001 : Cloudcroft, NM, USA)
(1)
Abassi, Ryma, 1980- editor.
(1)
Acquisti, Alessandro.
(1)
Adams, Niall M., 1968-
(1)
Ahmad, David R. Mirza.
(1)
Alapati, Sam R.
(1)
Alexander, Tom.
(1)
Alpcan, Tansu.
(1)
Alpern, Naomi J.
(1)
Amini, Rob.
(1)
Amon, Cherie, ort. yaz.
(1)
Andreasson, Kim J.
(1)
Andrés, Steven.
(1)
Archibald, Neil.
(1)
Artymiak, Jacek.
(1)
Ashbaugh, Douglas A.
(1)
Askarov, Aslan. editor.
(1)
Aspinwall, Jim.
(1)
Association for Computing Machinery. Special Interest Group on Security, Audit, and Control.
(1)
Babbin, Jacob.
(1)
Bacik, Sandy.
(1)
Bahadur, Gary.
(1)
Ballew, Joli.
(1)
Barnes, Christian.
(1)
Baskin, Brian, author.
(1)
Baskin, Brian.
(1)
Bassioni, Ghada. editor.
(1)
Başar, Tamer.
(1)
Beale, Jay
(1)
Behrens, Thorsten.
(1)
Bendell, Dan.
(1)
Bernik, Igor, author.
(1)
Berti, John.
(1)
Bhattacharyya, Dhruba K., author.
(1)
Bidgoli, Hossein, ed.
(1)
Bilge, Alper.
(1)
Birkholz, Erik Pace.
(1)
Blackley, John A.
(1)
Blask, Chris.
(1)
Blazy, Olivier. editor. (orcid)0000-0001-6205-8249
(1)
Bodmer, Sean.
(1)
Bolt, Steven.
(1)
Borkin, Mike.
(1)
Boudriga, Noureddine.
(1)
Bowers, John R.
(1)
Brashars, Joshua.
(1)
Bray, Rory.
(1)
Brodsky, Jacob.
(1)
Brooks, R. R. (Richard R.)
(1)
Brown, David, 1954-
(1)
Brown, Edwin Lyle.
(1)
Budaghyan, Lilya. editor.
(1)
Burnett, Mark M.
(1)
Burton, James.
(1)
CNET (Firm)
(1)
Caldwell, Wilma, ed.
(1)
Cannings, Rich.
(1)
Cantrell, Chris.
(1)
Carvalho, Alex de.
(1)
Carvey, Harlan A.
(1)
Carvey, Harlan.
(1)
Chaitanya, Manish.
(1)
Chang, Elizabeth.
(1)
Chapman, Chris, author.
(1)
Cheah, Chun Hai.
(1)
Cherry, Denny.
(1)
Chowdhury, Kaushik Roy. editor.
(1)
Chuvakin, Anton A., author.
(1)
Cid, Carlos. editor. (orcid)0000-0001-5761-8694
(1)
Cid, Daniel.
(1)
Clark, Chris, 1980-
(1)
Clarke, Justin.
(1)
Conrad, Eric, author.
(1)
Contesti, Diana-Lynn.
(1)
Contos, Brian T.
(1)
Cook, Randy (Randy R.)
(1)
Cross, Michael, 1965- author.
(1)
Cunningham, Bryan.
(1)
Dalziel, Henry, editor.
(1)
Danielyan, Edgar.
(1)
Das, Sajal K.
(1)
Davies, J. (N. John)
(1)
Davies, Joshua A. (Joshua Aaron)
(1)
Davis, Chris (Christopher Michael)
(1)
Davis, Michael A.
(1)
Davis, Peter T.
(1)
DeFranco, Joanna F., author.
(1)
Deal, Richard A.
(1)
Demchak, Chris C.
(1)
Deng, Robert. editor. (orcid)0000-0003-3491-8146
(1)
Di Felice, Marco. editor.
(1)
Dillon, Tharam S., 1943-
(1)
Dirican, Can Okan.
(1)
Dolev, Shlomi. editor.
(1)
Douligeris, C. (Christos)
(1)
Dubrawsky, Ida.
(1)
Eagle, Chris.
(1)
Easttom, Chuck.
(1)
Ellis, Juanita.
(1)
Ely, Adam.
(1)
Enbody, Richard J., author.
(1)
Erbschloe, Michael, 1951-
(1)
Erbschloe, Michael.
(1)
Fadyushin, Vyacheslav.
(1)
Faircloth, Jeremy, author.
(1)
Faircloth, Jeremy.
(1)
Faruki, Parvez. editor.
(1)
Fichera, Joe, 1966-
(1)
Fisch, Eric A.
(1)
Foster, James C.
(1)
Fournaris, Apostolos P. editor. (orcid)0000-0002-4758-2349
(1)
Foushee, James E.
(1)
Fowler, Kevvie, author.
(1)
Fung, K. T. (Kwok T.)
(1)
Furnell, Steven, 1970- editor.
(1)
Furnell, Steven. editor. (orcid)0000-0003-0984-7542
(1)
Ganguly, Debashis.
(1)
Gantz, Stephen D.
(1)
Gathegi, John N.
(1)
Gaur, Manoj Singh. editor.
(1)
More
View All
Fewer
Collapse All
Language
Include
Exclude
English
(334)
Turkish
(13)
Publication Date
Include
Exclude
-
2011
(45)
2007
(34)
2006
(25)
2012
(25)
2014
(25)
2008
(21)
2004
(19)
2005
(19)
2010
(19)
2019
(19)
2002
(16)
2003
(16)
2013
(14)
2009
(11)
2016
(9)
2017
(9)
2015
(8)
2001
(7)
2018
(4)
2000
(2)
2020
(2)
2021
(2)
1999
(1)
More
View All
Fewer
Collapse All
Subject
Include
Exclude
Computer networks -- Security measures.
(277)
Computer security.
(133)
Electronic books.
(25)
Data protection.
(20)
Bilgisayar ağları -- Güvenlik önlemleri.
(19)
Internet -- Security measures.
(19)
Computer hackers.
(17)
Computers -- Access control.
(17)
Firewalls (Computer security)
(17)
Business enterprises -- Computer networks -- Security measures.
(14)
Computer networks -- Security measures -- Examinations -- Study guides.
(12)
Information technology -- Security measures.
(11)
Computer crimes -- Prevention.
(10)
Computer crimes.
(9)
Penetration testing (Computer security)
(9)
Wireless communication systems -- Security measures.
(9)
Computer crimes -- Investigation.
(8)
Computer security -- Examinations -- Study guides.
(8)
Database security.
(8)
Operating systems (Computers)
(8)
Web sites -- Security measures.
(8)
Computer communication systems.
(7)
Computer networks -- Access control.
(7)
Computer networks -- Management.
(7)
Computer networks -- Security measures -- Handbooks, manuals, etc.
(7)
Data protection -- Standards.
(7)
Electronic data processing personnel -- Certification.
(7)
Bilgisayar güvenliği.
(6)
Client/server computing.
(6)
Microsoft Windows (Computer file)
(6)
Application software.
(5)
Computer network protocols.
(5)
Computer networks -- Security measures -- Testing.
(5)
Computers.
(5)
Data encryption (Computer science).
(5)
Linux.
(5)
Artificial intelligence.
(4)
Business -- Data processing -- Security measures.
(4)
Computer security -- Handbooks, manuals, etc.
(4)
Computer viruses.
(4)
Credit cards.
(4)
Cyberspace -- Security measures.
(4)
Data encryption (Computer science)
(4)
Database management.
(4)
Electronic commerce -- Security measures.
(4)
Electronic data processing departments -- Security measures.
(4)
Information resources management.
(4)
Information warfare.
(4)
Internet telephony -- Security measures.
(4)
Internet.
(4)
Malware (Computer software)
(4)
Microsoft Windows server.
(4)
Open source software.
(4)
Risk assessment.
(4)
Risk management.
(4)
Ad hoc networks (Computer networks) -- Security measures.
(3)
Application software -- Development.
(3)
Bilgisayar korsanları.
(3)
Business enterprises -- Computer networks.
(3)
Cloud computing -- Security measures.
(3)
Computer Communication Networks.
(3)
Computer Security.
(3)
Computer crimes -- Investigation -- Methodology.
(3)
Computer networks -- Security measures -- Computer programs.
(3)
Computer networks -- Security measures -- United States.
(3)
Computer networks.
(3)
Computer science.
(3)
Computer security -- Case studies.
(3)
Cryptography.
(3)
Cyber intelligence (Computer security)
(3)
Electronic book collection.
(3)
Extranets (Computer networks)
(3)
Information storage and retrieval systems -- Security measures.
(3)
Liability for credit information.
(3)
Mac OS.
(3)
Machine learning.
(3)
Microsoft ISA server.
(3)
Microsoft Internet information server.
(3)
Routers (Computer networks)
(3)
Telecommunications engineers -- Certification.
(3)
Web servers.
(3)
Wireless communication systems.
(3)
Application logging (Computer science)
(2)
Application software -- Security measures.
(2)
Bilgisayar ağları -- Güvenlik önlemleri.
(2)
Bilgisayar güvenliği
(2)
Biometric identification.
(2)
Business enterprises -- Security measures.
(2)
Coding theory.
(2)
Component software.
(2)
Computer architecture.
(2)
Computer crimes -- Case studies.
(2)
Computer networks -- Access control
(2)
Computer networks -- Remote access.
(2)
Computer networks -- Security measures
(2)
Computer networks -- Security measures -- Case studies.
(2)
Computer networks -- Security measures -- Congresses.
(2)
Computer networks -- Security measures -- Evaluation.
(2)
Computer networks -- Security measures -- Examinations, questions, etc.
(2)
Computer networks -- Security measures -- Software.
(2)
Computer networks -- Security measures.
(2)
Computer networks--Security measures.
(2)
Computer security
(2)
Computer security -- Computer programs.
(2)
Computer security -- Evaluation -- Methodology.
(2)
Computer security -- Evaluation.
(2)
Computer security -- Management.
(2)
Computer security -- United States.
(2)
Corporations -- Security measures.
(2)
Crisis management.
(2)
Cyberterrorism.
(2)
Data protection -- Law and legislation.
(2)
Electronic commerce.
(2)
Electronic data processing departments -- Auditing.
(2)
Electronic data processing personnel -- Certification -- Study guides.
(2)
Electronic mail systems -- Security measures.
(2)
Game theory.
(2)
Güvenlik duvarları (Bilgisayar güvenliği)
(2)
Home computer networks -- Security measures.
(2)
Home computer networks.
(2)
Information society -- Political aspects.
(2)
Information technology -- Social aspects.
(2)
Information warfare -- Political aspects.
(2)
Internet and terrorism.
(2)
Internetworking (Telecommunication)
(2)
Law and legislation.
(2)
Macintosh (Computer) -- Programming.
(2)
Microsoft Exchange server.
(2)
Microsoft Windows.
(2)
Military telecommunication.
(2)
Mobile communication systems -- Security measures.
(2)
Operations systems (Computer)
(2)
Privacy, Right of.
(2)
Public key infrastructure (Computer security)
(2)
Routing (Computer network management)
(2)
SQL (Computer program language)
(2)
Service-oriented architecture (Computer science)
(2)
Social media.
(2)
Social networks.
(2)
TCP/IP (Computer network protocol)
(2)
UNIX Shells.
(2)
Virtual computer systems.
(2)
War and society.
(2)
Web servers -- Security measures.
(2)
Wireless LANs -- Security measures.
(2)
Wireless LANs.
(2)
Access control.
(1)
Active server pages -- Security measures.
(1)
ActiveX.
(1)
Ad hoc networks (Computer networks) -- Management.
(1)
Ad hoc networks (Computer networks) -- Quality control.
(1)
Administrative agencies -- Information resources management -- Security measures -- United States -- Examinations -- Study guides.
(1)
Administrative agencies -- Information resources management -- Security measures -- United States.
(1)
Africa—Economic conditions.
(1)
Ajax (Web site development technology)
(1)
Algebra -- Data processing.
(1)
Android (Electronic resource)
(1)
AppleScript (Computer program language)
(1)
Application program interfaces (Computer software)
(1)
Askeri telekomünikasyon.
(1)
Auditing, Internal.
(1)
Açık kaynak yazılımı.
(1)
Bank credit cards.
(1)
Berkeley BSD (Computer file)
(1)
Bilgi ağları -- Güvenlik önlemleri.
(1)
Bilgi birikim ve erişim sistemleri -- Güvenlik önlemleri.
(1)
Bilgi güvenliği.
(1)
Bilgi savaşı.
(1)
Bilgi teknolojisi -- Güvenlik önlemleri
(1)
Bilgisayar Ağları -- Emniyet Ölçüleri -- Kongreler.
(1)
Bilgisayar Güvenliği -- Kongreler.
(1)
Bilgisayar Güvenliği.
(1)
Bilgisayar ağları -- Bilgisayar güvenliği.
(1)
Bilgisayar ağları -- Emniyet ölçüleri -- Vaka incelemesi.
(1)
Bilgisayar ağları -- Emniyet ölçüleri.
(1)
Bilgisayar ağları -- Güvenlik ölçümleri.
(1)
Bilgisayar ağları -- Güvenlik önlemleri
(1)
Bilgisayar ağları -- Güvenlik önlemleri -- Sınavlar, sorular, vb.
(1)
Bilgisayar ağları -- Güvenlik önlemleri -- Türkiye
(1)
Bilgisayar ağları -- Güvenlik önlemleri -- Yazılım.
(1)
Bilgisayar ağları -- Veri güvenliği.
(1)
Bilgisayar ağları--Güvenlik önlemleri.
(1)
Bilgisayar ağları--Standartlar.
(1)
Bilgisayar güvenliği -- Değerlendirme -- Methodoloji.
(1)
Bilgisayar güvenliği -- Vaka incelemesi.
(1)
Bilgisayar güvenliği -- Yönetim
(1)
Bilgisayar suçları -- Korunma.
(1)
Biometrics (Biology).
(1)
BlackBerry (Smartphone)
(1)
Bluetooth technology -- Security measures.
(1)
Broadband communication systems.
(1)
Business -- Data processing -- Security measures -- Evaluation.
(1)
Business -- Data processing.
(1)
Business enterprises -- Communication systems -- Management.
(1)
Business enterprises -- Data processing.
(1)
Business information services -- Security measures.
(1)
Business intelligence -- Data processing.
(1)
BİLGİSAYAR AĞLARI -- EMNİYET ÖLÇÜLERİ -- EL KİTAPLARI, VB.
(1)
BİLGİSAYAR AĞLARI -- EMNİYET ÖLÇÜLERİ.
(1)
BİLGİSAYAR GÜVENLİĞİ -- EL KİTAPLARI, VB.
(1)
More
View All
Fewer
Collapse All
Material Type
Include
Exclude
Book
E-Book
Shelf Location
Include
Exclude
Beytepe General Collection
Electronic Library
Library
Include
Exclude
Beytepe Library
Online Library
false
{sortLabel}
{alphabetical}
{relevance}
{include}
{exclude}
{facetName}
{results}
{displayName}
{count}
{error}
Select an Action
Place Hold(s)
Add to My Lists
Email
Print
350 Results Found
1
..
26
27
28
29
30
Sort By:
Relevance (Default)
Publication Date (Ascending)
Publication Date (Descending)
Title
Author
00
DEFAULT
Select a list
Temporary List
Make this your default list.
The following items were successfully added.
There was an error while adding the following items. Please try again.
One or more items could not be added because you are not logged in.
349.
Secure computers and networks analysis, design, and implementation
Secure computers and networks analysis, design, and implementation
Author
Fisch, Eric A. White, Gregory B.
Preferred Shelf Number
ONLINE
Electronic Access
Distributed by publisher. Purchase or institutional license may be required for access.
Format:
Availability
Online Library~1
Available:
Copies:
350.
Auditing IT infrastructures for compliance
Auditing IT infrastructures for compliance
Author
Weiss, Martin M. Solomon, Michael G.
Preferred Shelf Number
QA76.9.A25 W428
Format:
Availability
Beytepe Library~1
Available:
Copies:
Select an Action
Place Hold(s)
Add to My Lists
Email
Print
1
..
26
27
28
29
30
Go to:
Search Results
|
Top of Page
|
Search Facets