Log In
|
My Account
|
My Lists
|
|
Remember to clear the cache and close the browser window.
Search Limit
Everything
E-Book
Journals
Beytepe Library
Health Sciences Library
Conservatory Library
Law Library
Social Sciences Vocational High School
DVD Collection
Prof.Dr. Onur Bilge Kula Collection
Rooms Restriction Values
All Fields
Title
Author
Subject
ISBN
ISSN
8
Search Field
All Fields
Target Value
Limit Value
Restriction Value
Search For:
Advanced Search
Limit Search Results
Narrowed by:
+
Subject: Computer security.
Author
Include
Exclude
SpringerLink (Online service)
(23)
Dongarra, Jack. editor. (orcid)0000-0003-3247-1782
(3)
Fu, Haohuan. editor.
(3)
Krzhizhanovskaya, Valeria V. editor. (orcid)0000-0002-8247-129X
(3)
Lees, Michael Harold. editor.
(3)
Shi, Yong. editor.
(3)
Sloot, Peter M. A. editor. (orcid)0000-0002-3848-5395
(3)
Tian, Yingjie. editor.
(3)
Thuraisingham, Bhavani M., author.
(2)
Agrawal, Akshat, 1986- editor.
(1)
Agrawal, Prateek, editor.
(1)
Agrawal, Rashmi, 1978-
(1)
Ahmad Malik, Ishfaq.
(1)
Al-Shaer, Ehab. author.
(1)
Alcaraz, Cristina. editor. (orcid)0000-0003-0545-3191
(1)
Aldini, Alessandro. editor.
(1)
Almuhtadi, Wahab, author
(1)
Anderson, Ross. http://viaf.org/viaf/sourceID/LC%7cnb2004300232
(1)
Antonelli, Laura. editor.
(1)
Asai, Shojiro. editor.
(1)
August, Thomas D.
(1)
Aung, Khin Mi Mi. author.
(1)
B. Heras, Dora. editor.
(1)
Bahrami, Shahab. editor.
(1)
Baker, Paul, 1958, author.
(1)
Bamhdi, Alwi M.
(1)
Bautista, Elizabeth.
(1)
Beccuti, Marco. editor.
(1)
Benny, Daniel J.
(1)
Bhargava, Neeraj.
(1)
Bhargava, Ritu.
(1)
Bitsch, Friedemann. editor. (orcid)0000-0001-6152-4121
(1)
Blackwell, Clive. editor.
(1)
Boura, Christina, editor.
(1)
Bowers, John R.
(1)
C C, Sobin.
(1)
CRC Press LLC.
(1)
Cardellini, Valeria. editor.
(1)
Casalicchio, Emiliano. editor.
(1)
Chapple, Mike, author.
(1)
Chatterjee, Ayantika. author.
(1)
Chatterjee, Jyotir Moy, editor.
(1)
Chen, Liqun. editor. (orcid)0000-0003-2680-4907
(1)
Choudhury, Tanupriya, editor.
(1)
Collette, Ronald D.
(1)
Dai, Dong. editor.
(1)
Dalipi, Fisnik, editor
(1)
Das, Ravindra.
(1)
Duarte-González, Mario. editor.
(1)
Dubois, Catherine. editor.
(1)
Duraklar, Kazım author.
(1)
Díaz-Gutierrez, Yesid. editor.
(1)
Edwards, Jason (Cybersecurity expert), author.
(1)
Fan, Junfeng. editor.
(1)
Felderer, Michael, editor.
(1)
Figueroa-García, Juan Carlos. editor. (orcid)0000-0001-5544-5937
(1)
Fisch, Eric A.
(1)
Gallina, Barbara. editor. (orcid)0000-0002-6952-1053
(1)
Garcia Sanchez, José Daniel. editor.
(1)
Gaudiot, Jean-Luc.
(1)
Gentile, Michael., author.
(1)
Ghonge, Mangesh, 1984- editor.
(1)
Gierlichs, Benedikt. editor. (orcid)0000-0002-5866-1990
(1)
Goucher, Wendy, author.
(1)
Gupta, Sunil, 1979- editor.
(1)
Hameurlain, Abdelkader. editor.
(1)
Held, Jonathan S., author.
(1)
Hu, Changjun. editor.
(1)
Hughes, Chris (Christopher Matthew), author.
(1)
IGI Global, publisher.
(1)
Iqbal, Javaid.
(1)
Islam, Ray (Mohammad Rubyet), author.
(1)
Janca, Tanya. author.
(1)
Jaramillo-Isaza, Sebastián. editor. (orcid)0000-0002-2134-772X
(1)
Jeannot, Emmanuel. editor.
(1)
Jiang, Congfeng. editor.
(1)
John Wiley & Sons, publisher.
(1)
Kantarcioglu, Murat, author.
(1)
Katsikas, Sokratis K. editor. (orcid)0000-0003-2966-9683
(1)
Kautish, Sandeep, 1981- editor.
(1)
Khan, Latifur, author.
(1)
Khari, Manju, editor.
(1)
Khurshid, Shozab.
(1)
Konduri, Gangadhar.
(1)
Kumar, Budati Anil, edited.
(1)
Kumar, Prabhat.
(1)
Kumar, Raghvendra, 1987- editor.
(1)
Kumar, Randhir.
(1)
Kumar, Singamaneni Kranthi, edited.
(1)
Lahiri, Shuvendu K. editor.
(1)
Layton, Timothy P., author.
(1)
Le, Dac-Nhuong, 1983- editor.
(1)
Ledley, Robert Steven.
(1)
Lee, Stephen, 1975 June 8-
(1)
Li, Kuan-Ching.
(1)
Li, Xingwang (Computer scientist), edited.
(1)
Lincke, Susan. author.
(1)
Lopez, Javier. editor.
(1)
Madaan, Vishu, editor.
(1)
Manulis, Mark. editor. (orcid)0000-0002-1512-9670
(1)
Manumachu, Ravi Reddy. editor.
(1)
Martinelli, Fabio. editor.
(1)
Martiri, Edlira, editor
(1)
Masoodi, Faheem Syeed.
(1)
Melone, Michael, author.
(1)
Mencagli, Gabriele. editor.
(1)
Merat, Soorena, author.
(1)
Merkow, Mark S., author.
(1)
Mishra, Brojo Kishore, 1979- editor.
(1)
Mohammadi, Ali. editor.
(1)
Moschovitis, Christos J. P., author.
(1)
Mukhopadhyay, Debdeep, author.
(1)
Nakahara Jr., Jorge. author.
(1)
Naya-Plasencia, Maria, editor.
(1)
Orjuela-Cañon, Alvaro David. editor. (orcid)0000-0002-2057-7603
(1)
Paul, Mano., author.
(1)
Polian, Ilia. editor. (orcid)0000-0002-6563-2725
(1)
Poston, Howard E., III, author.
(1)
Prouff, Emmanuel. editor.
(1)
Quade, Phil.
(1)
Raghavan, Lakshmikanth.
(1)
Rathore, Pramod Singh, 1988-
(1)
Rawat, Romil, editor.
(1)
Reznik, Leonid, 1955- author.
(1)
Ricci, Laura. editor.
(1)
Robinson, Nikki, author.
(1)
Salis, Antonio. editor.
(1)
Saraf, Iqra.
(1)
Scandariato, Riccardo, editor.
(1)
Schifanella, Claudio. editor.
(1)
Schneider, Steve. editor. (orcid)0000-0001-8365-6993
(1)
Scott, Stephen L. editor.
(1)
Shafii, Reza.
(1)
Sharma, Anand, editor.
(1)
Sharma, Dilip Kumar, editor.
(1)
Shelley, Joe.
(1)
Skavhaug, Amund. editor.
(1)
Skillicorn, David B., author.
(1)
Stamp, Mark, author.
(1)
Stewart, James Michael.
(1)
Stöttinger, Marc. editor.
(1)
Subhra, Rajat, author.
(1)
Sukhija, Nitin.
(1)
Tang, Alan.
(1)
Tanwar, Rohit, editor.
(1)
Traxler, Julie.
(1)
Tyagi, Amit Kumar, editor.
(1)
Vacca, John R.
(1)
Vacca, John R., editor.
(1)
Vajjhala, Narasimha, 1978- editor.
(1)
Wagner, Roland. editor.
(1)
Wang, Chao. editor.
(1)
Wang, Shuangbao Paul.
(1)
Weaver, Griffin, author.
(1)
White, Gregory B.
(1)
Wiley InterScience (Online service)
(1)
Williams, Walter, author.
(1)
Wolf, Felix. editor.
(1)
Wolff, Burkhart. editor.
(1)
Yang, Wen. editor.
(1)
Ye, Nong.
(1)
Zamani, Mazdak, editor.
(1)
Zhu, Hong. editor.
(1)
More
View All
Fewer
Collapse All
Language
Include
Exclude
English
(73)
Publication Date
Include
Exclude
-
2019
(11)
2018
(10)
2022
(9)
2025
(8)
2021
(6)
2014
(4)
2024
(4)
2023
(3)
2001
(2)
2007
(2)
2011
(2)
2012
(2)
1999
(1)
2000
(1)
2004
(1)
2005
(1)
2006
(1)
2008
(1)
2013
(1)
2015
(1)
2017
(1)
2020
(1)
2026
(1)
More
View All
Fewer
Collapse All
Subject
Include
Exclude
Sécurité informatique.
(18)
Artificial intelligence.
(12)
Electronic books.
(12)
Logic design.
(12)
Computer networks -- Security measures.
(10)
COMPUTERS / Security / General
(9)
COMPUTERS.
(7)
Computer Security
(7)
Software engineering.
(7)
Data protection.
(6)
Security.
(6)
COMPUTERS / Computer Graphics / Game Programming & Design
(5)
COMPUTERS / Programming / Systems Analysis & Design
(5)
Computer communication systems.
(5)
Computer network architectures.
(5)
Computer security
(5)
Cryptography.
(5)
Computer science.
(4)
Computers.
(4)
Data encryption (Computer science).
(4)
Information theory.
(4)
Intelligence artificielle.
(3)
Internet -- Security measures.
(3)
Machine learning.
(3)
Online Safety & Privacy.
(3)
Social sciences -- Data processing.
(3)
Application software -- Development.
(2)
Artificial Intelligence
(2)
Blockchains (Databases)
(2)
Business enterprises -- Security measures.
(2)
COMPUTERS / Artificial Intelligence
(2)
COMPUTERS / Computer Science
(2)
COMPUTERS / Internet / Online Safety & Privacy
(2)
COMPUTERS / Internet / Security
(2)
COMPUTERS / Networking / Security
(2)
COMPUTERS / Security / Network Security
(2)
Causes & prevention of crime
(2)
Computer Communication Networks.
(2)
Computer architecture & logic design
(2)
Computer networking & communications
(2)
Computer networks -- Security measures
(2)
Computer organization.
(2)
Computer software -- Development.
(2)
Criminology - legal aspects
(2)
Cyberinfrastructure -- Security measures.
(2)
Data encryption (Computer science)
(2)
Data structures (Computer scienc.
(2)
Database management.
(2)
Electronic circuits.
(2)
Internet of things.
(2)
LAW / Privacy
(2)
Legal aspects of IT
(2)
Management information systems.
(2)
Microprogramming.
(2)
Networking.
(2)
Operating systems (Computers).
(2)
Protection de l'information (Informatique)
(2)
Réseaux d'ordinateurs -- Sécurité -- Mesures.
(2)
Security services
(2)
Service-oriented architecture (Computer science)
(2)
TECHNOLOGY & ENGINEERING.
(2)
Telecommunications.
(2)
Viruses & Malware.
(2)
Algorithm Design and Cybersecurity;Cybersecurity Landscape;Cybersecurity Laws and Regulations;Mental Health and Cybersecurity;Predictive Steps for Technology Adoption;Quantum Computing in Cybersecurity;Technology Revolution Impact on Organizations Security;social engineering
(1)
Algorithms.
(1)
Application software.
(1)
Apprentissage automatique.
(1)
BUSINESS & ECONOMICS / Insurance / Risk Assessment & Management
(1)
BUSINESS & ECONOMICS / Statistics
(1)
BUSINESS & ECONOMICS.
(1)
Business -- Data processing -- Security measures.
(1)
Business Information Systems.
(1)
Business enterprises -- Computer networks -- Security measures.
(1)
Business enterprises -- Security measures
(1)
Business information services.
(1)
Business strategy
(1)
COMPUTERS -- Security -- Cryptography.
(1)
COMPUTERS -- Security -- General.
(1)
COMPUTERS / Cryptography
(1)
COMPUTERS / Data Modeling & Design
(1)
COMPUTERS / Data Processing / General
(1)
COMPUTERS / General
(1)
COMPUTERS / Information Technology
(1)
COMPUTERS / Networking / General
(1)
COMPUTERS / Programming / Quality Assurance & Testing
(1)
COMPUTERS / Security / Cryptography & Encryption
(1)
COMPUTERS / Security / Viruses
(1)
Certification Guides.
(1)
Chaînes de blocs.
(1)
Chiffrement (Informatique)
(1)
Client-Server Computing.
(1)
Client/server computing.
(1)
Cloud computing -- Security measures.
(1)
Coding theory.
(1)
Computational complexity.
(1)
Computational intelligence.
(1)
Computer architecture.
(1)
Computer industry.
(1)
Computer networks -- Design and construction.
(1)
Computer programming.
(1)
Computer simulation.
(1)
Computer software -- Reliability.
(1)
Computer software -- Testing.
(1)
Computer system failures.
(1)
Computers
(1)
Computers -- Law and legislation.
(1)
Computers and civilization.
(1)
Confidential business information.
(1)
Confidentialité des données.
(1)
Cryptographie.
(1)
Cryptography
(1)
Data Mining
(1)
Data and Information Security.
(1)
Data mining.
(1)
Data privacy.
(1)
Data protection
(1)
Data protection -- Law and legislation.
(1)
Database design.
(1)
Database security.
(1)
Digital communications -- Security measures.
(1)
Digital forensic science
(1)
Digital forensic science.
(1)
Electrical engineering.
(1)
Electronic commerce -- Security measures.
(1)
Electronic data processing -- Distributed processing
(1)
Electronic data processing -- Distributed processing -- Security measures
(1)
Electronic data processing -- Distributed processing -- Security measures.
(1)
Electronic data processing -- Distributed processing.
(1)
Electronic data processing departments -- Security measures.
(1)
Engineering design.
(1)
Entreprises -- Sécurité -- Mesures.
(1)
Exploration de données (Informatique)
(1)
Information systems.
(1)
Information technology -- Law and legislation.
(1)
Information technology -- Security measures.
(1)
Insurance.
(1)
Internet -- Law and legislation.
(1)
Internet -- Sécurité -- Mesures.
(1)
Internet des objets.
(1)
Internet of things
(1)
Law enforcement.
(1)
Legal Aspects of Computing.
(1)
Machine Learning
(1)
Mathematical optimization.
(1)
Microprogramming .
(1)
Neural networks (Neurobiology)
(1)
Number theory.
(1)
Optical Data Processing.
(1)
Oracle (Computer file)
(1)
Oracle WebLogic server.
(1)
Ordinateurs.
(1)
Organizational behavior.
(1)
Parallel processing (Electronic computers)
(1)
Parallel processing (Electronic computers) -- Security measures.
(1)
Pattern recognition.
(1)
Police & security services
(1)
Police law & police procedures
(1)
Principles and Models of Security.
(1)
Privacy-preserving techniques (Computer science)
(1)
Privacy.
(1)
Private security services.
(1)
Programmation (Informatique)
(1)
Public key infrastructure (Computer security)
(1)
Quality Assurance & Testing.
(1)
Quality control.
(1)
Relational databases.
(1)
Reliability.
(1)
Risk Assessment & Management.
(1)
Risk assessment.
(1)
Risk communication.
(1)
Risk perception.
(1)
Security systems.
(1)
Social engineering.
(1)
Software Development & Engineering.
(1)
Software architecture -- Security measures.
(1)
Software engineering -- Security measures.
(1)
Software protection.
(1)
System design.
(1)
Traitement réparti -- Sécurité -- Mesures.
(1)
Traitement réparti.
(1)
Web services.
(1)
Web sites -- Design.
(1)
cybersecurity;threat intelligence;risk assessment;artificial intelligence
(1)
police;law enforcement;national security;cybersecurity;security technologies
(1)
More
View All
Fewer
Collapse All
Material Type
Include
Exclude
Book
E-Book
Shelf Location
Include
Exclude
1:SPRINGER
Beytepe General Collection
CRC Ebooks
Electronic Library
Taylor Francis E-Book Collection
Wiley E-Book Collection
More
View All
Fewer
Collapse All
Library
Include
Exclude
Beytepe Library
Online Library
false
{sortLabel}
{alphabetical}
{relevance}
{include}
{exclude}
{facetName}
{results}
{displayName}
{count}
{error}
Select an Action
Place Hold(s)
Add to My Lists
Email
Print
73 Results Found
1
..
3
4
5
6
7
Sort By:
Relevance (Default)
Publication Date (Ascending)
Publication Date (Descending)
Title
Author
0
DEFAULT
Select a list
Temporary List
Make this your default list.
The following items were successfully added.
There was an error while adding the following items. Please try again.
One or more items could not be added because you are not logged in.
73.
Securing e-business applications and communications
Securing e-business applications and communications
Author
Held, Jonathan S., author. Bowers, John R.
Preferred Shelf Number
QA76.9 .A25 H435 2001
Electronic Access
Click here to view.
Format:
Availability
Online Library~1
Available:
Copies:
Select an Action
Place Hold(s)
Add to My Lists
Email
Print
1
..
3
4
5
6
7