Log In
|
My Account
|
My Lists
|
|
Remember to clear the cache and close the browser window.
Search Limit
Everything
E-Book
Journals
Beytepe Library
Health Sciences Library
Conservatory Library
Law Library
Social Sciences Vocational High School
DVD Collection
Prof.Dr. Onur Bilge Kula Collection
Rooms Restriction Values
All Fields
Title
Author
Subject
ISBN
ISSN
8
Search Field
All Fields
Target Value
Limit Value
Restriction Value
Search For:
Advanced Search
Limit Search Results
Narrowed by:
+
Subject: Computer security.
Author
Include
Exclude
SpringerLink (Online service)
(3)
John Wiley & Sons, publisher.
(2)
Aden, Hartmut, editor.
(1)
Agrawal, Akshat, 1986- editor.
(1)
Agrawal, Prateek, editor.
(1)
Akila, M. editor
(1)
Anwar, Waqar, author.
(1)
Barman, Subhabrata, editor.
(1)
Basta, Alfred, author.
(1)
Basta, Nadine, author.
(1)
Bursell, Mike, author.
(1)
Carey, Marcus J. (Cybersecurity professional), author.
(1)
Carpenter, Perry, author.
(1)
Chatterjee, Jyotir Moy, editor.
(1)
Couretas, Jerry M., 1966- author.
(1)
Edwards, Jason (Cybersecurity expert), author.
(1)
Essar, Mohammad Ilyas, author.
(1)
Grimes, Roger A., author.
(1)
Guerraoui, Rachid. author.
(1)
Gupta, Nirupam. author.
(1)
Hadnagy, Christopher, author.
(1)
Hill, David G. (David Gary), 1943, author.
(1)
Hughes, Chris (Christopher Matthew), author.
(1)
Islam, Ray (Mohammad Rubyet), author.
(1)
Jin, Jennifer.
(1)
Joardar, Subhankar, editor.
(1)
Karpov, Pavel. editor. (orcid)0000-0003-4786-9806
(1)
Kautish, Sandeep, 1981- editor.
(1)
Kestner, Peter. author. (orcid)0009-0002-0437-9487
(1)
Khari, Manju, editor.
(1)
Koley, Santanu, editor.
(1)
Kumar, Budati Anil, edited.
(1)
Kumar, Raghvendra, 1987- editor.
(1)
Kumar, Singamaneni Kranthi, edited.
(1)
Kůrková, Věra. editor. (orcid)0000-0002-8181-2128
(1)
Landoll, Douglas J., author.
(1)
Le, Dac-Nhuong, 1983- editor.
(1)
Li, Xingwang (Computer scientist), edited.
(1)
Loiseau, Hugo, editor.
(1)
Madaan, Vishu, editor.
(1)
Maheswar, R. editor
(1)
Mena, Jesus., author.
(1)
Mishra, Brojo Kishore, 1979- editor.
(1)
Pinot, Rafael. author. (orcid)0000-0001-5372-8300
(1)
Rathee, Geetanjali, editor
(1)
Rawat, Romil, editor.
(1)
Robinson, Nikki, author.
(1)
Sharma, Anand, editor.
(1)
Sharma, Dilip Kumar, editor.
(1)
Sountharrajan, S. editor
(1)
Tetko, Igor V. editor. (orcid)0000-0002-6855-0012
(1)
Theis, Fabian. editor. (orcid)0000-0002-2419-1943
(1)
Ventre, Daniel, editor.
(1)
Weaver, Griffin, author.
(1)
Zaidoun, Ameur Salem, author.
(1)
Årnes, André, 1976- editor.
(1)
More
View All
Fewer
Collapse All
Language
Include
Exclude
English
(25)
Publication Date
Include
Exclude
-
2025
(4)
2018
(3)
2019
(3)
2022
(3)
2024
(3)
2011
(2)
2020
(2)
2023
(2)
2009
(1)
2021
(1)
2026
(1)
More
View All
Fewer
Collapse All
Subject
Include
Exclude
Sécurité informatique.
(19)
Electronic books.
(11)
Computer Security
(8)
COMPUTERS.
(6)
Computer networks -- Security measures.
(5)
Computer security
(5)
Réseaux d'ordinateurs -- Sécurité -- Mesures.
(5)
Computer networks -- Security measures
(4)
Data protection.
(4)
Cryptography.
(3)
Cyberinfrastructure -- Security measures.
(3)
Security.
(3)
TECHNOLOGY & ENGINEERING.
(3)
Artificial intelligence.
(2)
Cloud computing -- Security measures.
(2)
Hackers
(2)
Hackers.
(2)
Machine learning.
(2)
Networking.
(2)
Pirates informatiques.
(2)
Principles and Models of Security.
(2)
Algorithms.
(1)
BUSINESS & ECONOMICS -- Production & Operations Management.
(1)
BUSINESS & ECONOMICS.
(1)
Business -- Data processing -- Security measures.
(1)
COMPUTERS -- Computer Simulation.
(1)
COMPUTERS -- Information Technology.
(1)
COMPUTERS -- Operating Systems -- General.
(1)
COMPUTERS -- Security -- Cryptography & Encryption.
(1)
COMPUTERS -- Security -- General.
(1)
Client-Server Computing.
(1)
Cloud Computing.
(1)
Communication électronique des pièces.
(1)
Computer Crime.
(1)
Computer Engineering.
(1)
Computer Simulation
(1)
Computer crimes -- Investigation
(1)
Computer crimes -- Investigation.
(1)
Computer crimes -- Investigations.
(1)
Computer crimes.
(1)
Computer organization.
(1)
Computer science
(1)
Computer science.
(1)
Computer security -- Management.
(1)
Computer simulation.
(1)
Computers -- Access control -- Testing
(1)
Computers -- Access control -- Testing.
(1)
Confidentialité des données.
(1)
Criminalistique.
(1)
Criminalité informatique -- Enquêtes.
(1)
Cryptographie.
(1)
Cryptography
(1)
Cyberinfrastructure
(1)
Cyberinfrastructure.
(1)
Cyberterrorism -- Prevention.
(1)
Data and Information Security.
(1)
Data privacy.
(1)
Electronic data processing -- Distributed processing -- Security measures
(1)
Electronic data processing -- Distributed processing -- Security measures.
(1)
Electronic discovery (Law)
(1)
Electronic evidence.
(1)
Forensic sciences
(1)
Forensic sciences -- Data processing.
(1)
Forensic sciences.
(1)
Hacking
(1)
Hacking.
(1)
Human-computer interaction
(1)
Human-computer interaction.
(1)
Infonuagique -- Sécurité -- Mesures.
(1)
Information technology -- Security measures -- Management.
(1)
Information technology -- Security measures.
(1)
Informatique.
(1)
Ingénierie sociale.
(1)
Insurance.
(1)
Intelligence artificielle.
(1)
Internet -- Security measures.
(1)
Internet -- Sécurité -- Mesures.
(1)
Internet des objets.
(1)
Internet of things
(1)
Internet of things.
(1)
Logiciels libres.
(1)
MEDICAL -- Forensic Medicine.
(1)
Materials Science.
(1)
Mobile & Wireless Communications.
(1)
Multiagent systems.
(1)
Online Safety & Privacy.
(1)
Open source software.
(1)
Optical Data Processing.
(1)
Optical data processing.
(1)
Parallel processing (Electronic computers)
(1)
Parallel processing (Electronic computers) -- Security measures.
(1)
Penetration testing (Computer security)
(1)
Piratage informatique.
(1)
Privacy-preserving techniques (Computer science)
(1)
Programming.
(1)
Protection de l'information (Informatique)
(1)
Risk Assessment & Management.
(1)
Risk assessment.
(1)
SOCIAL SCIENCE -- Anthropology -- General.
(1)
SOCIAL SCIENCE -- Regional Studies.
(1)
SOCIAL SCIENCE -- Sociology -- General.
(1)
Simulation par ordinateur.
(1)
Social engineering
(1)
Social engineering.
(1)
Sécurité informatique -- Gestion.
(1)
Technologie de l'information -- Sécurité -- Mesures -- Gestion.
(1)
Telecommunications.
(1)
Tests d'intrusion.
(1)
Traitement réparti -- Sécurité -- Mesures.
(1)
Transmission sans fil.
(1)
Viruses & Malware.
(1)
Wireless communication systems
(1)
Wireless communication systems.
(1)
forensic science.
(1)
simulation.
(1)
More
View All
Fewer
Collapse All
Material Type
Include
Exclude
E-Book
Shelf Location
Include
Exclude
1:SPRINGER
CRC Ebooks
Electronic Library
Wiley E-Book Collection
Library
Include
Exclude
Online Library
false
{sortLabel}
{alphabetical}
{relevance}
{include}
{exclude}
{facetName}
{results}
{displayName}
{count}
{error}
Select an Action
Place Hold(s)
Add to My Lists
Email
Print
25 Results Found
1
2
3
Sort By:
Relevance (Default)
Publication Date (Ascending)
Publication Date (Descending)
Title
Author
0
DEFAULT
Select a list
Temporary List
Make this your default list.
The following items were successfully added.
There was an error while adding the following items. Please try again.
One or more items could not be added because you are not logged in.
25.
Data protection : governance, risk management, and compliance
Data protection : governance, risk management, and compliance
Author
Hill, David G. (David Gary), 1943, author.
Preferred Shelf Number
QA76.9 .A25 H52 2009
Electronic Access
Click here to view.
Format:
Availability
Online Library~1
Available:
Copies:
Select an Action
Place Hold(s)
Add to My Lists
Email
Print
1
2
3