Log In
|
My Account
|
My Lists
|
|
Remember to clear the cache and close the browser window.
Search Limit
Everything
E-Kitap
Dergiler
Beytepe Kütüphanesi
Sağlık Bilimleri Kütüphanesi
Konservatuvar Kütüphanesi
Hukuk Kütüphanesi
Sosyal Bilimler Meslek Yüksek Okulu
DVD Koleksiyonu
Prof.Dr. Onur Bilge Kula Koleksiyonu
Rooms Restriction Values
All Fields
Title
Author
Subject
ISBN
ISSN
8
Search Field
All Fields
Target Value
Limit Value
Restriction Value
Search For:
Advanced Search
Limit Search Results
Narrowed by:
+
Subject: Computer security.
Author
Include
Exclude
SpringerLink (Online service)
(4)
Wiley InterScience (Online service)
(2)
Adams, Randee.
(1)
Andress, Jason.
(1)
Bauer, Eric.
(1)
Brotby, W. Krag.
(1)
Cache, Johnny.
(1)
Christiansen, Bryan, 1960- editor.
(1)
Christofferson, Debra A. editor.
(1)
Collette, Ronald D.
(1)
Foreman, Park.
(1)
Fournaris, Apostolos P. editor. (orcid)0000-0002-4758-2349
(1)
Gentile, Michael.
(1)
Gentile, Skye.
(1)
Hill, David G. (David Gary), 1943-
(1)
IGI Global, publisher.
(1)
Idziorek, Joseph.
(1)
Jacobs, Stuart.
(1)
Jacobson, Douglas.
(1)
Kairab, Sudhanshu.
(1)
Kouns, Jake.
(1)
Lampropoulos, Konstantinos. editor.
(1)
Lanet, Jean-Louis. editor. (orcid)0000-0002-4751-3941
(1)
Lehto, Martti. editor.
(1)
Liu, Vincent.
(1)
Marín Tordera, Eva. editor.
(1)
Messier, Ric, author.
(1)
Minoli, Daniel, 1952-
(1)
Neittaanmäki, Pekka. editor.
(1)
Nicastro, Felicia M.
(1)
Oksendahl, Eric.
(1)
Piekarz, Agnieszka, 1990- editor.
(1)
Rogers, Russ.
(1)
Stackpole, Bill.
(1)
Stapleton, Jeffrey James, author.
(1)
Tibble, Ian.
(1)
Toma, Cristian. editor. (orcid)0000-0001-9316-7739
(1)
Trinckes, John J.
(1)
Vemuri, V. Rao.
(1)
Wright, Joshua.
(1)
Young, Carl S., author.
(1)
More
View All
Fewer
Collapse All
Language
Include
Exclude
English
(23)
Publication Date
Include
Exclude
-
2011
(6)
2009
(3)
2010
(3)
2019
(3)
2014
(2)
2018
(2)
2004
(1)
2005
(1)
2006
(1)
2012
(1)
2013
(1)
2016
(1)
More
View All
Fewer
Collapse All
Subject
Include
Exclude
Information technology -- Security measures.
(15)
Data protection.
(10)
Computer networks -- Security measures.
(5)
Business enterprises -- Computer networks -- Security measures.
(3)
Electronic books.
(3)
Application software.
(2)
Artificial intelligence.
(2)
Business -- Data processing -- Security measures.
(2)
Cloud computing.
(2)
Computer crimes -- Prevention.
(2)
Computer science.
(2)
Risk management.
(2)
Bluetooth technology -- Security measures.
(1)
Business -- Data processing -- Security measures -- Evaluation.
(1)
COMPUTERS -- Internet -- Security.
(1)
COMPUTERS -- Networking -- Security.
(1)
COMPUTERS -- Security -- General.
(1)
Computer communication systems.
(1)
Computer hackers.
(1)
Computer networks -- Security measures -- Evaluation.
(1)
Computer software -- Quality control.
(1)
Computer software -- Reliability.
(1)
Computer system failures.
(1)
Computers -- Access control.
(1)
Computers.
(1)
Computing Methodologies.
(1)
Data encryption (Computer science).
(1)
Data protection -- Standards.
(1)
Database security.
(1)
Electronic data processing departments -- Safety measures -- Planning.
(1)
Engineering.
(1)
Information Systems.
(1)
Information resources management.
(1)
Information technology -- Management.
(1)
Information technology -- Security measures -- Evaluation.
(1)
International business enterprises -- Security measures.
(1)
Machine learning.
(1)
Sociology.
(1)
Software engineering.
(1)
TECHNOLOGY & ENGINEERING / Quality Control.
(1)
Telecommunication.
(1)
Wireless LANs -- Security measures.
(1)
Wireless communication systems -- Security measures.
(1)
More
View All
Fewer
Collapse All
Material Type
Include
Exclude
E-Book
Shelf Location
Include
Exclude
Electronic Library
Library
Include
Exclude
Online Library
false
{sortLabel}
{alphabetical}
{relevance}
{include}
{exclude}
{facetName}
{results}
{displayName}
{count}
{error}
Select an Action
Place Hold(s)
Add to My Lists
Email
Print
25 Results Found
1
2
3
Sort By:
Relevance (Default)
Publication Date (Ascending)
Publication Date (Descending)
Title
Author
0
DEFAULT
Select a list
Temporary List
Make this your default list.
The following items were successfully added.
There was an error while adding the following items. Please try again.
One or more items could not be added because you are not logged in.
25.
Security assessment case studies for implementing the NSA IAM
Security assessment case studies for implementing the NSA IAM
Author
Rogers, Russ.
Preferred Shelf Number
ONLINE
Electronic Access
ScienceDirect
http://www.sciencedirect.com/science/book/9781932266962
Format:
Availability
Online Library~1
Available:
Copies:
Select an Action
Place Hold(s)
Add to My Lists
Email
Print
1
2
3