Skip to:
Search Results
|
Content
|
Bottom
|
Search Facets
Log In
|
My Account
|
My Lists
|
|
Remember to clear the cache and close the browser window.
Search Limit
Everything
E-Book
Journals
Beytepe Library
Health Sciences Library
Conservatory Library
Law Library
Social Sciences Vocational High School
DVD Collection
Prof.Dr. Onur Bilge Kula Collection
Rooms Restriction Values
All Fields
Title
Author
Subject
ISBN
ISSN
13
Search Field
All Fields
Target Value
Limit Value
Restriction Value
Search For:
Advanced Search
Limit Search Results
Narrowed by:
+
Subject: Computer security.
Author
Include
Exclude
Abd El-Latif, Ahmed A.
(1)
Abu Barkat, Abu.
(1)
Ahmad, Sadique.
(1)
Ahmed, Mohiuddin (Computer scientist)
(1)
Al-Hawamdeh, Suliman, editor.
(1)
Balamurugan, S. editor
(1)
Carpenter, Perry, author.
(1)
Chang, Xiaqing, editor.
(1)
Choudhury, Tanupriya editor
(1)
El-Affendi, Mohammed A.
(1)
Engel, Barak, author.
(1)
Ghonge, Mangesh, 1984- editor.
(1)
Islam, Ray (Mohammad Rubyet), author.
(1)
Kaur, Gagandeep, editor
(1)
Khan, R. A. (Raees Ahmad), author.
(1)
Khan, Suhel Ahmad, author.
(1)
Kumar, Rajeev, author.
(1)
Maleh, Yassine.
(1)
McDonough, Bart R., author.
(1)
Merkow, Mark S.
(1)
Pathan, Al-Sakib Khan.
(1)
Rao, Udai Pratap, editor.
(1)
Rawat, Romil, editor.
(1)
Vacca, John R., editor.
(1)
More
View All
Fewer
Collapse All
Language
Include
Exclude
English
(14)
Publication Date
Include
Exclude
-
2022
(3)
2023
(3)
2019
(2)
2020
(2)
2025
(2)
2021
(1)
2024
(1)
More
View All
Fewer
Collapse All
Subject
Include
Exclude
COMPUTERS / Information Technology
(7)
COMPUTERS / Security / General
(7)
Sécurité informatique.
(6)
Computer networks -- Security measures.
(4)
Computer Security
(3)
Data protection.
(3)
Electronic books.
(3)
COMPUTERS -- Information Technology.
(2)
COMPUTERS.
(2)
Computer networks -- Security measures
(2)
Réseaux d'ordinateurs -- Sécurité -- Mesures.
(2)
Affaires.
(1)
Application software -- Development.
(1)
Artificial intelligence.
(1)
BUSINESS & ECONOMICS -- Production & Operations Management.
(1)
BUSINESS & ECONOMICS / Production & Operations Management
(1)
BUSINESS & ECONOMICS.
(1)
Blockchains (Databases)
(1)
Business.
(1)
COMPUTERS -- Operating Systems -- General.
(1)
COMPUTERS / Computer Graphics / Game Programming & Design
(1)
COMPUTERS / Computer Science
(1)
COMPUTERS / Cryptography
(1)
COMPUTERS / Internet / Security
(1)
COMPUTERS / Networking / General
(1)
COMPUTERS / Programming / Software Development
(1)
Chief information officers.
(1)
Cloud computing -- Security measures.
(1)
Computer crimes -- Prevention
(1)
Computer crimes -- Prevention.
(1)
Computer security
(1)
Computer software -- Security measures.
(1)
Computers & Information Technology.
(1)
Cyber intelligence (Computer security)
(1)
Digital forensic science
(1)
Digital forensic science.
(1)
EDUCATION / Computers & Technology
(1)
EDUCATION / Distance Education & Learning
(1)
Educational technology.
(1)
Industries.
(1)
Industry 5.0 -- Security measures.
(1)
Information technology -- Management.
(1)
Intelligence artificielle.
(1)
Internet of things -- Security measures.
(1)
Livres numériques.
(1)
MATHEMATICS / General
(1)
Networking.
(1)
Online Safety & Privacy.
(1)
Optical Data Processing.
(1)
Ordinateurs.
(1)
Security.
(1)
Software architecture.
(1)
Viruses & Malware.
(1)
business (commercial function)
(1)
computers.
(1)
e-books.
(1)
More
View All
Fewer
Collapse All
Material Type
Include
Exclude
E-Book
Shelf Location
Include
Exclude
Taylor Francis E-Book Collection
Wiley E-Book Collection
Library
Include
Exclude
Online Library
false
{sortLabel}
{alphabetical}
{relevance}
{include}
{exclude}
{facetName}
{results}
{displayName}
{count}
{error}
Select an Action
Place Hold(s)
Add to My Lists
Email
Print
14 Results Found
1
2
Sort By:
Relevance (Default)
Publication Date (Ascending)
Publication Date (Descending)
Title
Author
00
DEFAULT
Select a list
Temporary List
Make this your default list.
The following items were successfully added.
There was an error while adding the following items. Please try again.
One or more items could not be added because you are not logged in.
13.
Cyber smart : five habits to protect your family, money, and identity from cyber criminals
Cyber smart : five habits to protect your family, money, and identity from cyber criminals
Author
McDonough, Bart R., author.
Preferred Shelf Number
TK5105.59
Electronic Access
https://onlinelibrary.wiley.com/doi/book/10.1002/9781119559658
Format:
Availability
Online Library~1
Available:
Copies:
14.
Transformational security awareness : what neuroscientists, storytellers, and marketers can teach us about driving secure behaviors
Transformational security awareness : what neuroscientists, storytellers, and marketers can teach us about driving secure behaviors
Author
Carpenter, Perry, author.
Preferred Shelf Number
QA76.9 .A25 C37 2019 EB
Electronic Access
https://onlinelibrary.wiley.com/doi/book/10.1002/9781119566380
Format:
Availability
Online Library~1
Available:
Copies:
Select an Action
Place Hold(s)
Add to My Lists
Email
Print
1
2
Go to:
Search Results
|
Top of Page
|
Search Facets