Log In
|
My Account
|
My Lists
|
|
Remember to clear the cache and close the browser window.
Search Limit
Everything
E-Book
Journals
Beytepe Library
Health Sciences Library
Conservatory Library
Law Library
Social Sciences Vocational High School
DVD Collection
Prof.Dr. Onur Bilge Kula Collection
Rooms Restriction Values
All Fields
Title
Author
Subject
ISBN
ISSN
8
Search Field
All Fields
Target Value
Limit Value
Restriction Value
Search For:
Advanced Search
Limit Search Results
Narrowed by:
+
Subject: COMPUTERS / Networking / Security
Author
Include
Exclude
Das, Ravindra, author.
(4)
Ahmed, Mohiuddin (Computer scientist), editor.
(2)
Arif, Muhammad (Computer scientist), editor.
(2)
Maleh, Yassine, 1987- editor.
(2)
Pathan, Al-Sakib Khan.
(2)
Abbasi, Waseem, editor.
(1)
Abou El Houda, Zakaria.
(1)
Abraham, Ajith, 1968- editor.
(1)
Adamson, James K.
(1)
Ahmad, Shabeer (Electronics engineer), author.
(1)
Akgün, Abdullah Talip.
(1)
Alam, Bashir, editor.
(1)
Alam, Mansaf, editor.
(1)
Alazab, Mamoun, 1980- author.
(1)
Alazab, Mamoun, 1980- editor.
(1)
Ali, Atif.
(1)
Andreu, Andres, 1968- author.
(1)
Arockiam, Daniel, editor.
(1)
Asare, Felix Kyei, author.
(1)
Ashbourn, Julian, 1952- author.
(1)
Baddi, Youssef, editor.
(1)
Baker, Dennis J., editor.
(1)
Balas, Valentina Emilia, editor.
(1)
Balas, Valentina Emilia.
(1)
Balusamy, Balamarugan, editor.
(1)
Behal, Sunny, editor.
(1)
Bhadoria, Robin Singh, editor.
(1)
Bhandari, Abhinav, editor.
(1)
Bhardwaj, Akashdeep, 1971-
(1)
Bhardwaj, Akashdeep.
(1)
Bhatia, Komal, 1979- editor.
(1)
Bhatia, Sajal, editor.
(1)
Bhatia, Surbhi, 1988-
(1)
Bhatti, Baber Majid.
(1)
Brathwaite, Shimon, author.
(1)
Chaki, Rituparna.
(1)
Chatterjee, Parag, 1992- editor.
(1)
Chaudry, Kiren, editor.
(1)
Cotton, Chase, author.
(1)
Dahiya, Susheela, editor.
(1)
Davis, Robert E.
(1)
Desalegn, Wendwossen, author.
(1)
Dhanaraj, Rajesh Kumar, editor.
(1)
Dowland, Paul, editor.
(1)
Durbha, Surya Srinivas, editor.
(1)
Durgadevi, P., editor.
(1)
Dwivedi, Rinky, editor.
(1)
Engel, Barak.
(1)
Fagan, Peter (Writer on computer security), author.
(1)
Fowler, Bradley, 1968- author.
(1)
Geman, Oana, editor.
(1)
Goyal, K. K. (Krishan Kumar), editor.
(1)
Greenfield, Robert S., 1961-
(1)
Gupta, Brij, 1982- author.
(1)
Gupta, Koyel Datta, editor.
(1)
Gupta, V. B., editor.
(1)
Harisha, A., editor.
(1)
Hei, Xiali, editor.
(1)
Hu, Fei, 1972- editor.
(1)
Hussain, Ibrar, editor.
(1)
Ijaz, Muhammad Fazal.
(1)
Imran Tariq, Muhammad.
(1)
Jacob, Lija, editor.
(1)
Jaffar, M. Arfan, editor.
(1)
Jeyanthi, N., 1977- author.
(1)
John, Teenu, author.
(1)
Kabay, M. E.
(1)
Kantzavelou, Ioanna, editor.
(1)
Kaushik, Keshav, editor.
(1)
Khan, Inam Ullah.
(1)
Khan, Rijwan, 1981- editor.
(1)
Khurana, Mehak, editor.
(1)
King, Steve (Cybersecurity expert), author.
(1)
Kissoon, Tara, author.
(1)
Kohnke, Anne, author.
(1)
Kshetri, Naresh, editor.
(1)
Kudrati, Abbas, author.
(1)
Kumar, A. Suresh, editor.
(1)
Kumar, Vinod (Professor of electronics and communication), editor.
(1)
Kumaraswamy, Subra.
(1)
Kurasinski, Artur, author.
(1)
Küfeoğlu, Sinan.
(1)
Landoll, Douglas J., author.
(1)
Latif, Shahed.
(1)
Le, Dac-Nhuong, 1983-
(1)
Li, Ming, author.
(1)
Liu, Ren Ping.
(1)
Ma, Baihe.
(1)
Ma, Kun (Computer scientist), author.
(1)
Maglaras, Leandros, editor.
(1)
Mahajan, Shilpa, editor.
(1)
Maimon, David, 1978- author.
(1)
Mamta, author.
(1)
Mangla, Monika, editor.
(1)
Mangrulkar, Ramchandra, editor.
(1)
Maranga, Kennedy M., 1965- author.
(1)
Marcella, Albert J.
(1)
Martin, David X., author.
(1)
Mather, Tim.
(1)
McLaughlin, Kevin (Kevin Lynn), author.
(1)
Melone, Michael, author.
(1)
Michalas, Antonis, editor.
(1)
Mishra, Amarnath (Forensic scientist), editor.
(1)
Moallem, Abbas, author.
(1)
Moseley, Ralph, author.
(1)
Mounir, Soufyane, editor.
(1)
Murugan, Thangavel, 1989- editor.
(1)
Nafis, Md Tabrez, editor.
(1)
Nagarhalli, Tatwadarshi P., editor.
(1)
Nand, Parma (Computer scientist), editor.
(1)
Ni, Wei.
(1)
Okereafor, Kenneth.
(1)
Olejnik, Lukasz, author.
(1)
Ouaissa, Mariya.
(1)
Ouaissa, Mariyam.
(1)
Pal, Om, editor.
(1)
Pandey, Bishwajeet, author.
(1)
Pandey, Purnendu Shekhar, editor.
(1)
Pathak, Yadunath, editor.
(1)
Perumal, Thinagaran, author.
(1)
Pillai, Binil, author.
(1)
Pomerleau, Pierre-Luc, author.
(1)
Pramanik, Sabyasachi, 1978-
(1)
Priyadarshini, Ishaani, 1992- author.
(1)
Priyadarshini, Ishaani, 1992- editor.
(1)
Qureshi, Nawab Muhammad Faseeh, editor.
(1)
Raj, Balwinder.
(1)
Robinson, Paul H., 1948- editor.
(1)
Roy, Debdutta Barman.
(1)
Samandari, Amelia, editor.
(1)
Shaikh, Javed, author.
(1)
Shandilya, Shishir K., 1981- editor.
(1)
Sharma, Anand.
(1)
Sharma, Deepak Kumar, editor.
(1)
Sharma, Rohit, editor.
(1)
Sharma, Uzzal, editor.
(1)
Shekokar, Narendra M., editor.
(1)
Shin, Bongsik, author.
(1)
Shoemaker, Dan, author.
(1)
Sigler, Kenneth, author.
(1)
Singh, Arun Kumar.
(1)
Singh, Chandra (Professor of engineering), editor.
(1)
Soni, Arun.
(1)
Stapleton, Jeffrey James, author.
(1)
Strang, Kenneth David, 1962- editor.
(1)
Sujay, Devangana, editor.
(1)
Surendran, Roopak, author.
(1)
Tang, Alan, (Information Security), author.
(1)
Tang, Alan.
(1)
Tanwar, Rohit, editor.
(1)
Taye, Bayisa, author.
(1)
Tayyaba, Shahzadi.
(1)
Thakur, Kutub.
(1)
Thandeeswaran, N., author.
(1)
Thomas, Tony, author.
(1)
Tyagi, Amit Kumar, 1988- editor.
(1)
Upadhyaya, Prashant A., author.
(1)
Vajjhala, Narasimha, 1978- editor.
(1)
Vasudevan, Hari (Engineer), editor.
(1)
Verma, Abhishek, editor.
(1)
Verma, Anshul (Computer scientist)
(1)
Verma, Pradeepika.
(1)
Vijayalakshmi, S. (Associate professor), editor.
(1)
W., Jaisingh, 1978- editor.
(1)
Wang, Paul S., author.
(1)
Wang, Xu.
(1)
Wazir, Samar, editor.
(1)
Williams, Branden R., author.
(1)
Williams, Walter (Telecommunications engineer), author.
(1)
Wingreen, Stephen C., editor.
(1)
Wu, Yulei, editor.
(1)
Zaydi, Mounia, editor.
(1)
More
View All
Fewer
Collapse All
Language
Include
Exclude
English
(85)
Publication Date
Include
Exclude
-
2022
(21)
2021
(16)
2024
(16)
2023
(15)
2025
(14)
2020
(2)
2009
(1)
More
View All
Fewer
Collapse All
Subject
Include
Exclude
Computer security.
(44)
COMPUTERS / Security / General
(35)
COMPUTERS / Cryptography
(25)
COMPUTERS / Internet / Security
(23)
Computer networks -- Security measures.
(21)
COMPUTERS / Networking / General
(8)
COMPUTERS / Security / Viruses
(8)
BUSINESS & ECONOMICS / Management
(6)
COMPUTERS / Artificial Intelligence
(5)
COMPUTERS / Computer Engineering
(5)
Computer crimes -- Prevention.
(5)
Artificial intelligence.
(4)
Computer crimes -- Investigation.
(4)
Data protection.
(4)
Blockchains (Databases)
(3)
Internet -- Security measures.
(3)
Internet of things.
(3)
LAW / Privacy
(3)
BUSINESS & ECONOMICS / Production & Operations Management
(2)
Business enterprises -- Computer networks -- Security measures.
(2)
COMPUTERS / Computer Science
(2)
COMPUTERS / Data Processing / General
(2)
Cloud computing -- Security measures.
(2)
Computational intelligence.
(2)
Computer networks -- Management.
(2)
Computer security -- Case studies.
(2)
Computer security -- Data processing.
(2)
Computer security -- Law and legislation -- United States.
(2)
Computer security -- Management.
(2)
Cooperating objects (Computer systems)
(2)
Cyberspace -- Security measures.
(2)
Data encryption (Computer science)
(2)
Machine learning -- Industrial applications.
(2)
Privacy, Right of.
(2)
TECHNOLOGY / Manufacturing
(2)
Trust.
(2)
5G mobile communication systems.
(1)
Activity programs in education.
(1)
Agile software development.
(1)
Artificial intelligence -- Industrial applications.
(1)
Artificial intelligence -- Law and legislation -- China.
(1)
Artificial intelligence -- Law and legislation -- Criminal provisions.
(1)
Artificial intelligence -- Law and legislation.
(1)
Artificial intelligence -- Medical applications.
(1)
Auditing.
(1)
Authentication.
(1)
BUSINESS & ECONOMICS / Auditing
(1)
BUSINESS & ECONOMICS / Insurance / Risk Assessment & Management
(1)
BUSINESS & ECONOMICS / Leadership
(1)
BUSINESS & ECONOMICS / Management Science
(1)
Behavioral cybersecurity.
(1)
Big data.
(1)
Blockchains (Databases) -- Industrial applications.
(1)
Blockchains (Databases) -- Security measures.
(1)
Business -- Data processing -- Security measures.
(1)
Business -- Data processing.
(1)
Business information services -- Security measures.
(1)
Business intelligence -- Risk assessment.
(1)
COMPUTERS / Computer Architecture
(1)
COMPUTERS / Computer Vision & Pattern Recognition
(1)
COMPUTERS / Database Management / Data Mining
(1)
COMPUTERS / Disaster Recovery
(1)
COMPUTERS / Hardware / General
(1)
COMPUTERS / Hardware / Network Hardware
(1)
COMPUTERS / Management Information Systems
(1)
COMPUTERS / Networking / Network Protocols
(1)
COMPUTERS / Programming / Systems Analysis & Design
(1)
COMPUTERS / Social Aspects / Human-Computer Interaction
(1)
COVID-19 Pandemic, 2020-
(1)
COVID-19 Pandemic, 2020- -- Economic aspects.
(1)
COVID-19 Pandemic, 2020- -- European Union countries.
(1)
COVID-19 Pandemic, 2020- -- United States.
(1)
Chief information officers.
(1)
Classroom learning centers.
(1)
Cloud Computing.
(1)
Cloud computing / Security measures.
(1)
Commercial crimes -- Law and legislation.
(1)
Comptuter networks -- Security measures.
(1)
Computer algorithms.
(1)
Computer crimes -- Investigation -- Data processing.
(1)
Computer crimes -- Investigation -- India -- Case studies.
(1)
Computer crimes -- Law and legislation.
(1)
Computer crimes.
(1)
Computer logic.
(1)
Computer networks -- Environmental aspects.
(1)
Computer networks -- Research.
(1)
Computer networks -- Security measures -- Data processing.
(1)
Computer networks -- Security measures -- Government policy.
(1)
Computer networks -- Security measures -- Management.
(1)
Computer networks -- Security measures -- Study and teaching.
(1)
Computer networks -- Technological innovations.
(1)
Computer networks / Security measures.
(1)
Computer security -- Examinations, questions, etc.
(1)
Computer security -- Government policy -- United States.
(1)
Computer security -- Government policy.
(1)
Computer security -- India -- Case studies.
(1)
Computer security -- Law and legislation -- European Union countries.
(1)
Computer security -- Law and legislation.
(1)
Computer security -- Moral and ethical aspects.
(1)
Computer security -- Political aspects.
(1)
Computer security -- Social aspects.
(1)
Computer security -- Study and teaching.
(1)
Computer security -- Technologial innovations.
(1)
Computer security -- Technological innovations.
(1)
Computer security -- Vocational guidance.
(1)
Computer software -- Development.
(1)
Computersicherheit.
(1)
Credit cards -- Security measures.
(1)
Criminal investigation -- Technological innovations.
(1)
Criminal investigation.
(1)
Criminal liability.
(1)
Cryptography.
(1)
Cyber intelligence (Computer security)
(1)
Cyberspace -- Security measures -- European Union countries.
(1)
Cyberspace -- Security measures -- United States.
(1)
Cyberterrorism -- Prevention.
(1)
Cyberterrorism -- Simulation methods.
(1)
Data mining.
(1)
Data privacy -- Case studies.
(1)
Data privacy -- European Union countries.
(1)
Data privacy -- United States.
(1)
Data protection -- Law and legislation -- China.
(1)
Data protection -- Law and legislation -- European Union countries.
(1)
Data protection -- Law and legislation -- United States.
(1)
Data protection -- Law and legislation.
(1)
Data protection -- Standards.
(1)
Decision making.
(1)
Deep learning (Machine learning) -- Security measures.
(1)
Digital forensic science -- India -- Case studies.
(1)
Digital forensic science.
(1)
EDUCATION / Computers & Technology
(1)
Edge computing.
(1)
Education -- Data processing.
(1)
Electronic data processing -- Distriuted processing.
(1)
Electronic evidence.
(1)
Emergency management.
(1)
European Parliament. General Data Protection Regulation.
(1)
Evidence, Criminal.
(1)
Forensic sciences -- Technological innovations.
(1)
Fractal analysis.
(1)
Hacking -- Prevention.
(1)
Heterogeneous distributed computing systems.
(1)
Information technology -- Management.
(1)
Information technology -- Security measures.
(1)
Internet of things -- Security measures.
(1)
Internet users -- Identification.
(1)
LAW / Forensic Science
(1)
Law enforcement.
(1)
Local area networks (Computer networks) -- Traffic -- Mathematical models.
(1)
MEDICAL / Infectious Diseases
(1)
Machine learning -- Security measures.
(1)
Malware (Computer software)
(1)
Management.
(1)
Medicine -- Data processing.
(1)
Mobile communication systems -- Security measures.
(1)
Mobile computing -- Security measures.
(1)
Nanoelectronics.
(1)
Online social networks -- Security measures.
(1)
POLITICAL SCIENCE / Public Policy / General
(1)
Phishing -- Prevention.
(1)
Public key infrastructure (Computer security)
(1)
Risk assessment.
(1)
Risk management.
(1)
Security systems -- Design and construction.
(1)
Sicherheitsmassnahme.
(1)
Software-defined networking (Computer network technology) -- Security measures.
(1)
Sustainable development.
(1)
TECHNOLOGY / Engineering / General
(1)
TECHNOLOGY / Nanotechnology
(1)
TECHNOLOGY / Operations Research
(1)
Telecommunication -- Traffic -- Mathematical models.
(1)
Ubiquitous computing.
(1)
More
View All
Fewer
Collapse All
Material Type
Include
Exclude
E-Book
Shelf Location
Include
Exclude
Electronic Library
Taylor Francis E-Book Collection
Library
Include
Exclude
Online Library
false
{sortLabel}
{alphabetical}
{relevance}
{include}
{exclude}
{facetName}
{results}
{displayName}
{count}
{error}
Select an Action
Place Hold(s)
Add to My Lists
Email
Print
85 Results Found
1
..
4
5
6
7
8
Sort By:
Relevance (Default)
Publication Date (Ascending)
Publication Date (Descending)
Title
Author
0
DEFAULT
Select a list
Temporary List
Make this your default list.
The following items were successfully added.
There was an error while adding the following items. Please try again.
One or more items could not be added because you are not logged in.
85.
Cloud security and privacy
Cloud security and privacy
Author
Mather, Tim. Kumaraswamy, Subra. Latif, Shahed.
Preferred Shelf Number
ONLINE
Electronic Access
EBSCOhost
http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=414816
Format:
Availability
Online Library~1
Available:
Copies:
Select an Action
Place Hold(s)
Add to My Lists
Email
Print
1
..
4
5
6
7
8