Skip to:
Search Results
|
Content
|
Bottom
|
Search Facets
Log In
|
My Account
|
My Lists
|
|
Remember to clear the cache and close the browser window.
Search Limit
Everything
E-Book
Journals
Beytepe Library
Health Sciences Library
Conservatory Library
Law Library
Social Sciences Vocational High School
DVD Collection
Prof.Dr. Onur Bilge Kula Collection
Rooms Restriction Values
All Fields
Title
Author
Subject
ISBN
ISSN
13
Search Field
All Fields
Target Value
Limit Value
Restriction Value
Search For:
Advanced Search
Limit Search Results
Narrowed by:
+
Subject: Computer crimes.
Author
Include
Exclude
SpringerLink (Online service)
(17)
Carafano, James Jay, 1955-
(2)
Iorliam, Aamo. author.
(2)
Kleiman, Dave.
(2)
Project Muse.
(2)
Agrawal, Namrata. editor.
(1)
Alcaraz, Cristina. editor. (orcid)0000-0003-0545-3191
(1)
Alder, Raven.
(1)
Almgren, Magnus. editor. (orcid)0000-0002-3383-9617
(1)
Antón, Annie. editor.
(1)
Berlingerio, Michele. editor.
(1)
Bernik, Igor, author.
(1)
Bidwell, Teri.
(1)
Bokhari, M. U. editor.
(1)
Brancik, Kenneth C.
(1)
Brefeld, Ulf. editor.
(1)
Britz, Marjie.
(1)
Burnett, Mark (Mark M.)
(1)
Carvey, Harlan.
(1)
Chiesa, Raoul, 1973-
(1)
Ciappi, Silvio, 1965-
(1)
Craig, Paul.
(1)
Cross, Michael, 1965-
(1)
Cuppens, Frédéric. editor.
(1)
Cuppens, Nora. editor.
(1)
Curry, Edward. editor.
(1)
Cybenko, George. editor. (orcid)0000-0001-7734-2912
(1)
Daly, Elizabeth. editor.
(1)
Ducci, Stefania.
(1)
Eagle, Chris.
(1)
Fila, Barbara. editor. (orcid)0000-0002-1824-7621
(1)
Flammini, Francesco. editor.
(1)
Ghernaouti-Hélie, Solange, 1958- author.
(1)
Giacinto, Giorgio. editor. (orcid)0000-0002-5759-3017
(1)
Graham, James.
(1)
Gritzalis, Dimitris. editor.
(1)
Gritzalis, Stefanos. editor.
(1)
Harper, Allen.
(1)
Harris, Shon.
(1)
Honick, Ron.
(1)
Howard, Rick.
(1)
Hurley, Neil. editor. (orcid)0000-0001-8428-2866
(1)
Hämmerli, Bernhard M. editor.
(1)
IGI Global, publisher.
(1)
Information Resources Management Association, editor.
(1)
Kalloniatis, Christos. editor. (orcid)0000-0002-8844-2596
(1)
Katsikas, Sokratis K. editor. (orcid)0000-0003-2966-9683
(1)
Kim, Gwangsu. editor.
(1)
Kim, Hyoung Joong. editor.
(1)
Lambrinoudakis, Costas. editor. (orcid)0000-0002-6575-9814
(1)
Leman-Langlois, Stéphane, 1965-
(1)
Lenkey, Gideon.
(1)
Lin, Xiaodong. author.
(1)
Long, Johnny.
(1)
Luiijf, Eric. editor. (orcid)0000-0002-1821-9890
(1)
MacNamee, Brian. editor. (orcid)0000-0003-2518-0274
(1)
Madsen, Tom. author.
(1)
Marascu, Alice. editor.
(1)
Maurice, Clémentine. editor. (orcid)0000-0002-8896-9494
(1)
Miller, Drew, 1978-
(1)
Mullen, Timothy M.
(1)
Mylopoulos, John. editor.
(1)
Ness, Jonathan.
(1)
Nicholson, Denise. editor.
(1)
Perdisci, Roberto. editor.
(1)
Peterson, Gilbert. editor.
(1)
Pinelli, Fabio. editor.
(1)
Piva, Alessandro. editor. (orcid)0000-0002-3047-0519
(1)
Pym, David. editor. (orcid)0000-0002-6504-5838
(1)
Russell, Ryan, 1969-
(1)
Saini, Dharmendra. editor.
(1)
ScienceDirect (Online service)
(1)
Shenoi, Sujeet. editor.
(1)
Shi, Yun-Qing. editor.
(1)
Shimonski, Robert.
(1)
Skoudis, Ed.
(1)
Stergiopoulos, George. editor.
(1)
Theocharidou, Marianthi. editor. (orcid)0000-0002-8870-1746
(1)
Willems, Eddy. author.
(1)
Williams, Terron.
(1)
Yoo, Chang D. editor.
(1)
Zeltser, Lenny.
(1)
Žutautaitė, Inga. editor. (orcid)0000-0002-6073-2823
(1)
More
View All
Fewer
Collapse All
Language
Include
Exclude
English
(37)
Publication Date
Include
Exclude
-
2019
(14)
2018
(4)
2005
(3)
2009
(3)
2007
(2)
2008
(2)
2011
(2)
2012
(2)
2013
(2)
2014
(2)
2002
(1)
2004
(1)
More
View All
Fewer
Collapse All
Subject
Include
Exclude
Computer security.
(29)
Computer networks -- Security measures.
(8)
Computers.
(6)
Data protection.
(5)
Artificial intelligence.
(3)
Computer hackers.
(3)
Computer organization.
(3)
Law and legislation.
(3)
Application software.
(2)
Bilgisayar güvenliği.
(2)
Bilgisayar suçları.
(2)
Coding theory.
(2)
Computer networks -- Access control
(2)
Cyber intelligence (Computer security)
(2)
Data encryption (Computer science).
(2)
Electronic books.
(2)
Information society -- Political aspects.
(2)
Information technology -- Social aspects.
(2)
Information warfare -- Political aspects.
(2)
Internet and terrorism.
(2)
Management information systems.
(2)
Public safety.
(2)
Social media.
(2)
Social networks.
(2)
System safety.
(2)
War and society.
(2)
Acquisition of computer software.
(1)
Africa—Economic conditions.
(1)
Biometrics (Biology).
(1)
Biometrics.
(1)
Component software.
(1)
Computer Communication Networks.
(1)
Computer communication systems.
(1)
Computer crimes -- Fiction.
(1)
Computer crimes -- Investigation -- Methodology.
(1)
Computer crimes -- Prevention.
(1)
Computer hackers -- Fiction.
(1)
Computer hackers -- Psychology -- Fiction.
(1)
Computer hackers -- Psychology.
(1)
Computer networks -- Access control -- Handbooks, manuals, etc.
(1)
Computer networks -- Security measures -- Handbooks, manuals, etc.
(1)
Computer networks.
(1)
Computer science.
(1)
Computer security -- Fiction.
(1)
Computer security -- Handbooks, manuals, etc.
(1)
Computer security -- Law and legislation
(1)
Computer security -- Law and legislation.
(1)
Computer security -- United States.
(1)
Computers -- Law and legislation.
(1)
Criminal behavior, Prediction of.
(1)
Data mining.
(1)
Data protection -- Law and legislation.
(1)
Electronic book collection.
(1)
Electronic intelligence.
(1)
Electronic surveillance.
(1)
Engineering.
(1)
Forensic medicine.
(1)
Identification cards -- Forgeries.
(1)
Identity theft -- Fiction.
(1)
Identity theft.
(1)
Impostors and imposture.
(1)
Industrial safety.
(1)
Information theory.
(1)
Internet -- Political aspects.
(1)
Internet -- Security measures.
(1)
Internet fraud.
(1)
Internet in espionage.
(1)
Internet.
(1)
Malware (Computer software)
(1)
Microsoft Windows (Computer file)
(1)
Multimedia systems.
(1)
Operating systems (Computers)
(1)
Optical data processing.
(1)
Programming languages (Electronic computers).
(1)
Python (Computer program language)
(1)
Reliability.
(1)
Robotics.
(1)
Security systems.
(1)
Short stories.
(1)
Software engineering.
(1)
More
View All
Fewer
Collapse All
Material Type
Include
Exclude
Book
E-Book
Shelf Location
Include
Exclude
Beytepe General Collection
Electronic Library
Library
Include
Exclude
Beytepe Library
Online Library
false
{sortLabel}
{alphabetical}
{relevance}
{include}
{exclude}
{facetName}
{results}
{displayName}
{count}
{error}
Select an Action
Place Hold(s)
Add to My Lists
Email
Print
37 Results Found
1
2
3
4
Sort By:
Relevance (Default)
Publication Date (Ascending)
Publication Date (Descending)
Title
Author
0
DEFAULT
Select a list
Temporary List
Make this your default list.
The following items were successfully added.
There was an error while adding the following items. Please try again.
One or more items could not be added because you are not logged in.
37.
Hack proofing your identity in the information age protect your family on the internet!
Hack proofing your identity in the information age protect your family on the internet!
Author
Bidwell, Teri. Cross, Michael, 1965- Russell, Ryan, 1969-
Preferred Shelf Number
ONLINE
Electronic Access
ScienceDirect
http://www.sciencedirect.com/science/book/9781931836517
Format:
Availability
Online Library~1
Available:
Copies:
Select an Action
Place Hold(s)
Add to My Lists
Email
Print
1
2
3
4
Go to:
Search Results
|
Top of Page
|
Search Facets