Log In
|
My Account
|
My Lists
|
|
Remember to clear the cache and close the browser window.
Search Limit
Everything
E-Book
Journals
Beytepe Library
Health Sciences Library
Conservatory Library
Law Library
Social Sciences Vocational High School
DVD Collection
Prof.Dr. Onur Bilge Kula Collection
Rooms Restriction Values
All Fields
Title
Author
Subject
ISBN
ISSN
8
Search Field
All Fields
Target Value
Limit Value
Restriction Value
Search For:
Advanced Search
Limit Search Results
Author
Include
Exclude
SpringerLink (Online service)
(37)
ScienceDirect (Online service)
(12)
Kissoon, Tara, author.
(7)
Wiley InterScience (Online service)
(7)
Andress, Jason.
(5)
Cross, Michael, 1965-
(5)
Dubrawsky, Ido.
(5)
IGI Global, publisher.
(5)
Pathan, Al-Sakib Khan.
(4)
Project Muse.
(4)
Shimonski, Robert.
(4)
Tiller, James S., author.
(4)
Vacca, John R.
(4)
Alder, Raven.
(3)
Andress, Jason, author.
(3)
Baumrucker, C. Tate.
(3)
Das, Ravindra, author.
(3)
Elbahadır, Hamza.
(3)
Peltier, Thomas R., author.
(3)
Rittinghouse, John W.
(3)
Rogers, Russ.
(3)
Seidl, David, CISSP, author.
(3)
Shinder, Debra Littlejohn.
(3)
Singh, Pradeep Kumar. editor.
(3)
Stallings, William.
(3)
Syngress Media, Inc.
(3)
Wiles, Jack.
(3)
Akyıldız, M. Alparslan.
(2)
Anderson, Brian (Brian James)
(2)
Andreou, Kimon.
(2)
Baker, Andrew R.
(2)
Barber, Brian.
(2)
Beale, Jay.
(2)
Bhardwaj, Pawan K.
(2)
Bhateja, Vikrant. editor.
(2)
Bradley, Tony, 1969-
(2)
Brooks, R. R. (Richard R.), author.
(2)
Brotby, W. Krag., author.
(2)
Cameron, Rob.
(2)
Carafano, James Jay, 1955-
(2)
Carey, Marcus J. (Cybersecurity professional), author.
(2)
Carvey, Harlan A., author.
(2)
Chuvakin, Anton.
(2)
Cole, Eric.
(2)
Conrad, Eric, 1967-
(2)
DeFranco, Joanna F., author.
(2)
Durbha, Surya Srinivas, editor.
(2)
Dwivedi, Himanshu.
(2)
Esler, Joel.
(2)
Feldman, Joshua.
(2)
Ganzha, Maria. editor.
(2)
Gatford, Chris.
(2)
Gold, André.
(2)
Gregg, Michael (Michael C.)
(2)
Haines, Brad.
(2)
Harper, Allen.
(2)
Harris, Shon.
(2)
Hunter, Laura E.
(2)
Jhanjhi, Noor Zaman, 1972- editor.
(2)
John Wiley & Sons.
(2)
Khurana, Mehak, editor.
(2)
Kleiman, Dave.
(2)
Kohlenberg, Toby.
(2)
Kouns, Jake.
(2)
Lee, Yang-Im, author.
(2)
Liu, Dale.
(2)
Liu, Vincent.
(2)
Long, Johnny.
(2)
Mahajan, Shilpa, editor.
(2)
Malisow, Ben, author.
(2)
Manzuik, Steve.
(2)
Maxwell, Doug.
(2)
Maynor, David.
(2)
McClure, Stuart.
(2)
Meng, Weizhi. editor. (orcid)0000-0003-4384-5786
(2)
Messier, Ric, author.
(2)
Michalas, Antonis, editor.
(2)
Misenar, Seth.
(2)
Nagarhalli, Tatwadarshi P., editor.
(2)
Northcutt, Stephen.
(2)
Orebaugh, Angela.
(2)
Oriyano, Sean-Philip.
(2)
Piramuthu, Selwyn. editor.
(2)
Porter, Thomas, PhD.
(2)
Ranganathan, G. editor.
(2)
Ransome, James F.
(2)
Satyanarayana, Mahesh.
(2)
Scambray, Joel.
(2)
Seagren, Eric.
(2)
Shekokar, Narendra M., editor.
(2)
Shinder, Thomas W.
(2)
Snedaker, Susan.
(2)
Solomon, Michael G.
(2)
Tanwar, Sudeep. editor.
(2)
Trim, Peter R. J., author.
(2)
Vacca, John R., editor.
(2)
Vuppalapati, Chandrasekar. editor.
(2)
Wayner, Peter, 1964-
(2)
Weiss, Martin M.
(2)
Williams, Branden R.
(2)
Williams, Branden R., author.
(2)
Winterfeld, Steve.
(2)
Yang, Xin-She. editor.
(2)
Çontar, Furkan.
(2)
ACM SIGSAC New Security Paradigms Workshop (2001 : Cloudcroft, NM, USA)
(1)
Abassi, Ryma, 1980- editor.
(1)
Abdelhakim, Boudhir Anouar. editor. (orcid)0000-0003-4036-9956
(1)
Abdullah, Azween Bin, 1961- editor.
(1)
Abedin, Mohammad Zoynul, editor.
(1)
Abou El Houda, Zakaria, editor
(1)
Acquisti, Alessandro.
(1)
Adams, Niall M., 1968-
(1)
Adamson, James K.
(1)
Ahmad, Badlishah. editor.
(1)
Ahmad, David R. Mirza.
(1)
Ahmad, Shabeer (Electronics engineer), author.
(1)
Ajmera, Pawan K. editor.
(1)
Alapati, Sam R.
(1)
Alencar, Marcelo S., 1957- author.
(1)
Alexander, Tom.
(1)
Alexandrou, Alex (Professor of information technology security), author.
(1)
Allsopp, Wil, author.
(1)
Alpcan, Tansu.
(1)
Alpern, Naomi J.
(1)
Amini, Rob.
(1)
Amon, Cherie, ort. yaz.
(1)
Anand A., Jose, 1975- editor.
(1)
Andreasson, Kim J.
(1)
Andrés, Steven.
(1)
Ane, Bernadetta Kwintiana. editor.
(1)
Anson, Steve.
(1)
Antonucci, Domenic, author.
(1)
Anwar, Waqar, author.
(1)
Archibald, Neil.
(1)
Arcuri, Jennifer, author.
(1)
Arduin, Pierre-Emmanuel, author.
(1)
Arefin, Mohammad Shamsul, editor.
(1)
Artymiak, Jacek.
(1)
Ashbaugh, Douglas A., author.
(1)
Askarov, Aslan. editor.
(1)
Aspinwall, Jim.
(1)
Association for Computing Machinery. Special Interest Group on Security, Audit, and Control.
(1)
Austin, Greg, 1951- editor.
(1)
Babbin, Jacob.
(1)
Bacik, Sandy., author.
(1)
Badotra, Sumit, editor.
(1)
Bahadur, Gary.
(1)
Bakrī, Saʻd ʻAlī al-Ḥājj, editor
(1)
Balamurigan, A., editor.
(1)
Balasubramanian, R. editor.
(1)
Ballew, Joli.
(1)
Banda, Latha, 1983- editor.
(1)
Banoth, Rajkumar, author.
(1)
Bansal, Hari Om. editor.
(1)
Bansal, Ramesh C. editor. (orcid)0000-0002-1725-2648
(1)
Barnes, Christian.
(1)
Baskin, Brian, author.
(1)
Baskin, Brian.
(1)
Bassioni, Ghada. editor.
(1)
Basta, Alfred, author.
(1)
Basta, Nadine, author.
(1)
Başar, Tamer.
(1)
Beale, Jay
(1)
Behrens, Thorsten.
(1)
Beligiannis, Grigorios N. editor.
(1)
Ben Ahmed, Mohamed. editor.
(1)
Benarous, Leila.
(1)
Bendell, Dan.
(1)
Benmammar, Badr.
(1)
Bernik, Igor, author.
(1)
Berti, John.
(1)
Bhambri, Pankaj, editor.
(1)
Bhatia, Surbhi, 1988-
(1)
Bhattacharyya, Dhruba K., author.
(1)
Bhong, Shashikant S., author.
(1)
Bidgoli, Hossein, ed.
(1)
Bijalwan, Anchit, author.
(1)
Bilge, Alper.
(1)
Bindhu, V. editor.
(1)
Birkholz, Erik Pace.
(1)
Birrane, Edward J., author.
(1)
Bitam, Salim.
(1)
Blask, Chris.
(1)
Blazy, Olivier. editor. (orcid)0000-0001-6205-8249
(1)
Bodmer, Sean.
(1)
Bolt, Steven.
(1)
Borkin, Mike.
(1)
Boudriga, Noureddine.
(1)
Bowers, John R.
(1)
Brashars, Joshua.
(1)
Bray, Rory.
(1)
Brodsky, Jacob.
(1)
Brooks, Charles J., author.
(1)
Brown, David, 1954-
(1)
Brown, Edwin Lyle., author.
(1)
Brown, Jeffrey W., author.
(1)
Budaghyan, Lilya. editor.
(1)
Burnett, Mark M.
(1)
Burton, James.
(1)
Büyükgöze, Selma.
(1)
More
View All
Fewer
Collapse All
Language
Include
Exclude
English
(498)
Turkish
(16)
Publication Date
Include
Exclude
-
2011
(45)
2023
(42)
2022
(35)
2007
(34)
2019
(30)
2006
(25)
2012
(24)
2014
(24)
2004
(20)
2008
(19)
2010
(19)
2005
(18)
2020
(17)
2025
(17)
2017
(16)
2021
(16)
2002
(15)
2003
(15)
2013
(15)
2009
(13)
2018
(12)
2024
(12)
2016
(9)
2001
(8)
2015
(8)
2026
(8)
2000
(2)
1999
(1)
More
View All
Fewer
Collapse All
Subject
Include
Exclude
Computer networks -- Security measures.
(400)
Computer security.
(192)
Electronic books.
(44)
Data protection.
(41)
Computer networks -- Security measures
(28)
Réseaux d'ordinateurs -- Sécurité -- Mesures.
(28)
Artificial intelligence.
(27)
COMPUTERS / Networking / Security
(27)
COMPUTERS / Security / General
(26)
Business enterprises -- Computer networks -- Security measures.
(25)
Computer networks -- Security measures -- Examinations -- Study guides.
(24)
Internet -- Security measures.
(22)
Mobile and Network Security.
(22)
Bilgisayar ağları -- Güvenlik önlemleri.
(20)
COMPUTERS.
(19)
Computer crimes -- Prevention.
(19)
COMPUTERS / Internet / Security
(18)
Computers -- Access control.
(18)
Sécurité informatique.
(18)
Computational intelligence.
(17)
Computer hackers.
(17)
Firewalls (Computer security)
(17)
COMPUTERS / Cryptography
(15)
Computer security -- Examinations -- Study guides.
(14)
Information technology -- Security measures.
(14)
Penetration testing (Computer security)
(14)
Security.
(14)
COMPUTERS -- Security -- General.
(13)
Computer crimes.
(13)
Risk management.
(13)
Computer networks -- Security measures -- Examinations
(12)
Guides de l'étudiant.
(12)
Réseaux d'ordinateurs -- Sécurité -- Mesures -- Examens -- Guides de l'étudiant.
(12)
Study guides
(12)
Study guides.
(12)
Telecommunication.
(12)
examination study guides.
(12)
Communications Engineering, Networks.
(11)
Electronic data processing personnel -- Certification.
(11)
Computer Security
(10)
Computer crimes -- Investigation.
(10)
COMPUTERS / Computer Engineering
(9)
Electronic data processing personnel -- Certification
(9)
Networking.
(9)
Wireless communication systems -- Security measures.
(9)
Computer networks -- Access control.
(8)
Computer networks -- Management.
(8)
Computer security
(8)
Cryptography.
(8)
Data encryption (Computer science)
(8)
Data protection -- Standards.
(8)
Database security.
(8)
Machine learning.
(8)
Operating systems (Computers)
(8)
Web sites -- Security measures.
(8)
Computer communication systems.
(7)
Computer network protocols.
(7)
Computer networks -- Security measures -- Handbooks, manuals, etc.
(7)
Cyberspace -- Security measures.
(7)
Data and Information Security.
(7)
Electronic data processing personnel -- Certification -- Study guides.
(7)
Telecommunications engineers -- Certification
(7)
Application software.
(6)
Bilgisayar güvenliği.
(6)
COMPUTERS -- Networking -- Security.
(6)
COMPUTERS / Information Technology
(6)
Client/server computing.
(6)
Computer networks -- Security measures -- Computer programs.
(6)
Computer security -- Examinations
(6)
Computers.
(6)
Microsoft Windows (Computer file)
(6)
Sécurité informatique -- Examens -- Guides de l'étudiant.
(6)
Telecommunications engineers -- Certification.
(6)
BUSINESS & ECONOMICS / Management
(5)
Business -- Data processing -- Security measures.
(5)
Cloud computing -- Security measures.
(5)
Computer networks -- Security measures -- Testing.
(5)
Computer security -- Management.
(5)
Data encryption (Computer science).
(5)
Information technology -- Management.
(5)
Linux.
(5)
Open source software.
(5)
Signal processing.
(5)
Signal, Speech and Image Processing.
(5)
Viruses & Malware.
(5)
Behavioral cybersecurity.
(4)
Bilgisayar korsanları.
(4)
COMPUTERS -- Security -- Networking.
(4)
COMPUTERS -- Security -- Online Safety & Privacy.
(4)
COMPUTERS / Computer Science
(4)
COMPUTERS / Networking / General
(4)
Cloud Computing.
(4)
Computer security -- Case studies.
(4)
Computer security -- Handbooks, manuals, etc.
(4)
Computer viruses.
(4)
Corporations -- Security measures.
(4)
Credit cards.
(4)
Cyber intelligence (Computer security)
(4)
Database management.
(4)
Digital forensic science.
(4)
Electronic commerce -- Security measures.
(4)
Electronic data processing departments -- Security measures.
(4)
Information resources management.
(4)
Information warfare.
(4)
Intelligence artificielle.
(4)
Internet telephony -- Security measures.
(4)
Internet.
(4)
Malware (Computer software)
(4)
Microsoft Windows server.
(4)
Online Safety & Privacy.
(4)
Risk assessment.
(4)
Tests d'intrusion.
(4)
Wireless communication systems.
(4)
Ad hoc networks (Computer networks) -- Security measures.
(3)
Application software -- Development.
(3)
Artificial intelligence -- Industrial applications.
(3)
BUSINESS & ECONOMICS / Information Management
(3)
Bilgisayar ağları -- Güvenlik önlemleri.
(3)
Bilgisayar güvenliği
(3)
Business enterprises -- Computer networks.
(3)
Business enterprises -- Security measures.
(3)
Business information services -- Security measures.
(3)
COMPUTERS -- Information Technology.
(3)
COMPUTERS -- Internet -- Security.
(3)
COMPUTERS / Artificial Intelligence
(3)
COMPUTERS / Database Management / Data Mining
(3)
Chief information officers.
(3)
Computer Communication Networks.
(3)
Computer Security.
(3)
Computer crimes -- Investigation -- Methodology.
(3)
Computer networks -- Security measures -- Case studies.
(3)
Computer networks -- Security measures -- Examinations, questions, etc.
(3)
Computer networks -- Security measures -- Government policy.
(3)
Computer networks -- Security measures -- United States.
(3)
Computer networks -- Security measures.
(3)
Computer networks.
(3)
Computer science.
(3)
Computer security -- Computer programs.
(3)
Data mining.
(3)
Data protection
(3)
Electronic book collection.
(3)
Examinations
(3)
Extranets (Computer networks)
(3)
Game theory.
(3)
Hackers.
(3)
Hacking.
(3)
Industries -- Security measures.
(3)
Information storage and retrieval systems -- Security measures.
(3)
Internet of things -- Industrial applications.
(3)
Internet of things.
(3)
Liability for credit information.
(3)
Mac OS.
(3)
Machine learning -- Security measures.
(3)
Microsoft ISA server.
(3)
Microsoft Internet information server.
(3)
Protection de l'information (Informatique)
(3)
Routers (Computer networks)
(3)
Trust.
(3)
Web servers.
(3)
Administrative agencies -- Information resources management -- Security measures -- United States -- Examinations -- Study guides.
(2)
Application logging (Computer science)
(2)
Application software -- Security measures.
(2)
Apprentissage automatique.
(2)
Artificial intelligence
(2)
Automation.
(2)
BUSINESS & ECONOMICS / General
(2)
BUSINESS & ECONOMICS / Leadership
(2)
BUSINESS & ECONOMICS / Production & Operations Management
(2)
BUSINESS & ECONOMICS.
(2)
Biometric identification.
(2)
Blockchains (Databases)
(2)
Business enterprises -- Computer networks -- Security measures
(2)
COMPUTERS / Computer Architecture
(2)
COMPUTERS / Computer Graphics / Game Programming & Design
(2)
COMPUTERS / Computer Vision & Pattern Recognition
(2)
COMPUTERS / Cybernetics
(2)
COMPUTERS / Groupware
(2)
COMPUTERS / Internet / Application Development
(2)
COMPUTERS / Security / Viruses
(2)
COMPUTERS / Social Aspects / Human-Computer Interaction
(2)
Certification Guides.
(2)
Cisco IOS.
(2)
Client-Server Computing.
(2)
Cloud computing -- Security measures -- Examinations -- Study guides.
(2)
Cloud computing.
(2)
Coding theory.
(2)
Component software.
(2)
Computer architecture.
(2)
Computer crimes -- Case studies.
(2)
Computer networks -- Access control
(2)
Computer networks -- Reliability.
(2)
Computer networks -- Remote access.
(2)
Computer networks -- Security measures -- Congresses.
(2)
Computer networks -- Security measures -- Data processing.
(2)
Computer networks -- Security measures -- Evaluation.
(2)
Computer networks -- Security measures -- Software.
(2)
Computer networks -- Security measures -- Study and teaching.
(2)
Computer networks--Security measures.
(2)
Computer security -- Data processing.
(2)
Computer security -- Evaluation -- Methodology.
(2)
More
View All
Fewer
Collapse All
Material Type
Include
Exclude
Book
E-Book
Shelf Location
Include
Exclude
Beytepe General Collection
CRC Ebooks
Electronic Library
Taylor Francis E-Book Collection
Wiley E-Book Collection
Library
Include
Exclude
Beytepe Library
Online Library
false
{sortLabel}
{alphabetical}
{relevance}
{include}
{exclude}
{facetName}
{results}
{displayName}
{count}
{error}
Select an Action
Place Hold(s)
Add to My Lists
Email
Print
517 Results Found
1
..
40
41
42
43
44
Sort By:
Relevance (Default)
Publication Date (Ascending)
Publication Date (Descending)
Title
Author
0
DEFAULT
Select a list
Temporary List
Make this your default list.
The following items were successfully added.
There was an error while adding the following items. Please try again.
One or more items could not be added because you are not logged in.
517.
Auditing IT infrastructures for compliance
Auditing IT infrastructures for compliance
Author
Weiss, Martin M. Solomon, Michael G.
Preferred Shelf Number
QA76.9.A25 W428
Format:
Availability
Beytepe Library~1
Available:
Copies:
Select an Action
Place Hold(s)
Add to My Lists
Email
Print
1
..
40
41
42
43
44