Log In
|
My Account
|
My Lists
|
|
Search Limit
Everything
E-Book
Journals
Beytepe Library
Health Sciences Library
Conservatory Library
Law Library
Social Sciences Vocational High School
DVD Collection
Prof.Dr. Onur Bilge Kula Collection
Rooms Restriction Values
All Fields
Title
Author
Subject
ISBN
ISSN
8
Search Field
All Fields
Title
Author
Subject
ISBN
ISSN
Target Value
Limit Value
Restriction Value
Search For:
Advanced Search
close
Limit Search Results
Narrowed by:
+
Publication Date: 2012
Author
Include
Exclude
SpringerLink (Online service)
(7)
Matthews, Martin S.
(4)
Tipton, Harold F.
(4)
Project Muse.
(3)
Ballew, Joli.
(2)
Carafano, James Jay, 1955-
(2)
Daniel, Peter. editor.
(2)
Krause, Micki.
(2)
Nozaki, Micki Krause.
(2)
Ortmeier, Frank. editor.
(2)
Adams, Randee.
(1)
Akerkar, Rajendra.
(1)
Alapati, Sam R.
(1)
Alcaraz Calero, Jose M. editor.
(1)
Andreasson, Kim J.
(1)
Andress, Jason.
(1)
Aquilina, James M.
(1)
Arnett, Kirk P. editor.
(1)
Bahadur, Gary.
(1)
Bathurst, Robert.
(1)
Bauer, Eric.
(1)
Bayuk, Jennifer L.
(1)
Bolt, Steven.
(1)
Bouton, Gary David, 1953-
(1)
Brown, Lawrie
(1)
Carvalho, Alex de.
(1)
Carvey, Harlan A.
(1)
Casey, Eoghan.
(1)
Chuvakin, Anton.
(1)
Cimato, Stelvio.
(1)
Clarke, Justin.
(1)
Cole, Eric.
(1)
Conrad, Eric, 1967-
(1)
Das, Sajal K.
(1)
Davies, Donald Watts, 1924-
(1)
Deibert, Ronald.
(1)
Fang, Wai-chi. editor.
(1)
Feldman, Joshua.
(1)
Fichera, Joe, 1966-
(1)
Foresti, Sara. editor.
(1)
Ganguly, Debashis.
(1)
Ghassemlouei, Alijohn.
(1)
Hanaoka, Goichiro. editor.
(1)
Hart-Davis, Guy.
(1)
Holzman, Carey. Healthy PC.
(1)
Inasi, Jason.
(1)
Kang, Byeong-Ho. editor.
(1)
Kant, Krishna.
(1)
Khan, Latifur.
(1)
Khan, Muhammad Khurram. editor.
(1)
Kim, Tai-hoon. editor.
(1)
Kleidermacher, David.
(1)
Kleidermacher, Mike.
(1)
Kolde, Jennifer.
(1)
Kotenko, Igor. editor.
(1)
Kurtz, George.
(1)
Lahiri, Shibamouli.
(1)
Langner, Ralph.
(1)
Ledley, Robert Steven.
(1)
Liu, Vincent.
(1)
Lowrance, William W..
(1)
Macaulay, Tyson.
(1)
Maddalena, Lucia.
(1)
Maitra, Subhamoy, 1970-
(1)
Malin, Cameron H.
(1)
Mao, Wenji.
(1)
Martin, Jason.
(1)
Martinelli, Fabio. editor.
(1)
Masud, Mehedy.
(1)
Matthews, Carole Boggs.
(1)
McClure, Stuart.
(1)
McFadden, Matthew.
(1)
McHoes, Ann McIver, 1950-
(1)
Merkow, Mark S.
(1)
Misenar, Seth.
(1)
Morris, Heather.
(1)
Morrissey, Sean.
(1)
Oriyano, Sean-Philip.
(1)
Pal, Sankar K.
(1)
Paul, Goutam.
(1)
Paul, Mano.
(1)
Petrosino, Alfredo.
(1)
Powell, Juliette, 1976-
(1)
Price, W. L., ort.yaz.
(1)
Raghavan, Lakshmikanth.
(1)
Rogers, Russ.
(1)
Sandberg, Bobbi.
(1)
Scambray, Joel.
(1)
Shema, Mike.
(1)
Shimonski, Robert.
(1)
Singer, Bryan.
(1)
Skormin, Victor. editor.
(1)
Speed, Tyler Justin.
(1)
Srinivas Sajja, Priti.
(1)
Stallings, William.
(1)
Stoica, Adrian. editor.
(1)
Strufe, Thorsten. editor.
(1)
Sullivan, Bryan, 1974-
(1)
Talabis, Mark.
(1)
Thampi, Sabu M. editor.
(1)
Thomas, Tony , 1927-1977 editor.
(1)
Thuraisingham, Bhavani M.
(1)
Tiller, James S.
(1)
Valencia, Connie.
(1)
Varsalone, Jesse.
(1)
Vasilakos, Thanos. editor.
(1)
Villalba, Javier GarcÃa. editor.
(1)
Wang, Fei-Yue.
(1)
Wang, Shuangbao Paul.
(1)
Wiles, Jack.
(1)
Wiley InterScience (Online service)
(1)
Williams, Branden R.
(1)
Winterfeld, Steve.
(1)
Wong, Caroline.
(1)
Yamauchi, Toshihiro. editor.
(1)
Yang, Ching-Nung.
(1)
Yung, Moti. editor.
(1)
Zhang, Nan, 1982-
(1)
Zomaya, Albert Y. editor.
(1)
More
View All
Fewer
Collapse All
Language
Include
Exclude
English
(61)
Subject
Include
Exclude
Computer security.
(26)
Computer networks -- Security measures.
(20)
Computer science.
(7)
Data protection.
(7)
Computer Communication Networks.
(6)
Internet -- Security measures.
(6)
Microsoft Windows (Computer file)
(6)
Data encryption (Computer science).
(5)
Computer security -- Management -- Handbooks, manuals, etc.
(4)
Computer software.
(4)
Data protection -- Handbooks, manuals, etc.
(4)
Operating systems (Computers)
(4)
Application software -- Development.
(3)
Computer crimes -- Prevention.
(3)
Computer networks -- Access control.
(3)
Computer networks.
(3)
Database security.
(3)
Electronic mail systems.
(3)
Hard disk management.
(3)
Information Systems.
(3)
Mac OS.
(3)
Software engineering.
(3)
World Wide Web.
(3)
Application software -- Security measures.
(2)
Application software.
(2)
Computer crimes -- Investigation.
(2)
Computer crimes.
(2)
Computer hackers.
(2)
Computer networks -- Access control
(2)
Computer security -- Handbooks, manuals, etc.
(2)
Computer software -- Reliability.
(2)
Data encryption (Computer science)
(2)
Data protection -- Standards.
(2)
Database management.
(2)
Information society -- Political aspects.
(2)
Information technology -- Social aspects.
(2)
Information warfare -- Political aspects.
(2)
Internet and terrorism.
(2)
Internet.
(2)
Multimedia systems.
(2)
Risk management.
(2)
Social media.
(2)
Social networks.
(2)
War and society.
(2)
Web site development.
(2)
Web sites -- Security measures.
(2)
Artificial intelligence -- Computer programs.
(1)
Artificial intelligence.
(1)
Automatic machinery -- Security measures.
(1)
Business enterprises -- Data processing.
(1)
Business enterprises -- Security measures.
(1)
Client/server computing.
(1)
Cloud computing.
(1)
Coding theory.
(1)
Compuer networks -- Security measures.
(1)
Computational complexity.
(1)
Computer Security.
(1)
Computer architecture.
(1)
Computer capacity -- Planning.
(1)
Computer crimes -- Investigation -- United States -- Methodology.
(1)
Computer file sharing -- Security measures.
(1)
Computer literacy -- Handbooks, manuals, etc.
(1)
Computer literacy.
(1)
Computer network architectures.
(1)
Computer networks -- Security measures.
(1)
Computer networks -- Security measures -- Examinations -- Study guides.
(1)
Computer networks -- Security measures -- Government policy.
(1)
Computer networks -- Security measures -- Handbooks, manuals, etc.
(1)
Computer networks -- Security measures -- Testing.
(1)
Computer programs -- Security measures.
(1)
Computer security -- Asia.
(1)
Computer security -- Evaluation.
(1)
Computer security -- Examinations -- Study guides.
(1)
Computer security -- Government policy.
(1)
Computer software -- Development.
(1)
Computer software -- Quality control.
(1)
Computer software -- Testing.
(1)
Computer systems -- Energy conservation.
(1)
Computer viruses.
(1)
Computers -- Access control -- Asia.
(1)
Computers and older people -- Handbooks, manuals, etc.
(1)
Computers and older people.
(1)
Confidentiality -- ethics.
(1)
Confidentiality -- legislation & jurisprudence.
(1)
Credit cards.
(1)
Cyberspace -- Government policy -- Asia.
(1)
Data mining.
(1)
Data protection -- Government policy.
(1)
Data protection -- Law and legislation.
(1)
Data warehousing.
(1)
Databases, Factual -- legislation & jurisprudence.
(1)
Decision making.
(1)
Digital media -- Handbooks, manuals, etc.
(1)
Economics -- Evaluation.
(1)
Electronic books.
(1)
Electronic commerce.
(1)
Electronic data processing -- Energy conservation.
(1)
Electronic data processing departments -- Security measures.
(1)
Electronic mail systems -- Handbooks, manuals, etc.
(1)
Government information -- Security measures.
(1)
Green technology.
(1)
Health Services Research -- ethics.
(1)
Health Services Research -- legislation & jurisprudence.
(1)
Human capital -- Management.
(1)
Image files -- Security measures.
(1)
Image processing -- Security measures.
(1)
Image processing.
(1)
Information technology -- Government policy.
(1)
Information technology -- Security measures.
(1)
Information warfare.
(1)
Internet -- Censorship -- Asia.
(1)
Internet -- Government policy -- Asia.
(1)
Internet -- Law and legislation.
(1)
Internet and older people -- Handbooks, manuals, etc.
(1)
Internet and older people.
(1)
Java (Computer program language)
(1)
Liability for credit information.
(1)
Linux.
(1)
Logic design.
(1)
Macintosh (Computer)
(1)
Macintosh (Computer) -- Maintenance and repair.
(1)
Malware (Computer software)
(1)
Memory management (Computer science)
(1)
Microcomputers -- Access control.
(1)
Microcomputers -- Handbooks, manuals, etc.
(1)
Microcomputers -- Maintenance and repair.
(1)
Microcomputers.
(1)
Microsoft Windows (Computer file) -- Handbooks, manuals, etc.
(1)
Microsoft Windows (Computer file) -- Security measures.
(1)
National security.
(1)
Online social networks -- Handbooks, manuals, etc.
(1)
Operating systems (Computers) -- Security measures.
(1)
Operating systems (Computers).
(1)
Oracle WebLogic server.
(1)
Pattern recognition systems.
(1)
Penetration testing (Computer security)
(1)
Photography -- Digital techniques -- Handbooks, manuals, etc.
(1)
Privacy -- legislation & jurisprudence.
(1)
Process control -- Security measures.
(1)
Robust control.
(1)
Routing (Computer network management)
(1)
SQL (Computer program language)
(1)
Semantic web.
(1)
Social media -- Handbooks, manuals, etc.
(1)
Social media -- Security measures.
(1)
Social responsibility of business.
(1)
Soft computing.
(1)
Stream ciphers.
(1)
System design.
(1)
TECHNOLOGY & ENGINEERING / Quality Control.
(1)
VERİ İlETİM SİSTEMLERİ -- EMNİYET ÖLÇÜLERİ.
(1)
Video surveillance.
(1)
Web servers -- Computer programs.
(1)
Web servers.
(1)
Web site development -- Security measures.
(1)
World Wide Web -- Handbooks, manuals, etc.
(1)
World Wide Web -- Security measures.
(1)
iTunes.
(1)
More
View All
Fewer
Collapse All
Material Type
Include
Exclude
Book
E-Book
Shelf Location
Include
Exclude
Beytepe General Collection
Electronic Library
Library
Include
Exclude
Beytepe Library
Online Library
false
{sortLabel}
{alphabetical}
{relevance}
{include}
{exclude}
{facetName}
{results}
{displayName}
{count}
{error}
Select an Action
Place Hold(s)
Add to My Lists
Email
Print
62 Results Found
1
2
3
4
5
6
Sort By:
Relevance (Default)
Publication Date (Ascending)
Publication Date (Descending)
Title
Author
00
DEFAULT
Select a list
Temporary List
Make this your default list.
The following items were successfully added.
There was an error while adding the following items. Please try again.
One or more items could not be added because you are not logged in.
1.
The healthy PC preventive care, home remedies, and green computing
The healthy PC preventive care, home remedies, and green computing
Author
Hart-Davis, Guy. Holzman, Carey. Healthy PC.
Preferred Shelf Number
ONLINE
Electronic Access
Subscription required
Format:
Availability
Online Library~1
Available:
Copies:
2.
Cyber security policy guidebook
Cyber security policy guidebook
Author
Bayuk, Jennifer L.
Preferred Shelf Number
ONLINE
Electronic Access
Wiley InterScience
An electronic book accessible through the World Wide Web; click for information
Connect to MyiLibrary resource.
ebrary
http://site.ebrary.com/id/10630610
Format:
Availability
Online Library~1
Available:
Copies:
Select an Action
Place Hold(s)
Add to My Lists
Email
Print
1
2
3
4
5
6
close
Security Reminder:
close
Remember to clear the cache and close the browser window.