Skip to:
Search Results
|
Content
|
Bottom
|
Search Facets
Log In
|
My Account
|
My Lists
|
|
Remember to clear the cache and close the browser window.
Search Limit
Everything
E-Book
Journals
Beytepe Library
Health Sciences Library
Conservatory Library
Law Library
Social Sciences Vocational High School
DVD Collection
Prof.Dr. Onur Bilge Kula Collection
Rooms Restriction Values
All Fields
Title
Author
Subject
ISBN
ISSN
13
Search Field
All Fields
Target Value
Limit Value
Restriction Value
Search For:
Advanced Search
Limit Search Results
Narrowed by:
+
Subject: Computer security.
Author
Include
Exclude
ScienceDirect (Online service)
(12)
Akyıldız, M. Alparslan.
(2)
Kleiman, Dave.
(2)
Agre, Philip.
(1)
Andreou, Kimon.
(1)
Aslanbakan, Enes, yazar
(1)
Barber, Brian.
(1)
Bhardwaj, Pawan K.
(1)
Britz, Marjie.
(1)
Caldwell, Wilma, ed.
(1)
Canbek, Gürol.
(1)
Carvey, Harlan A.
(1)
Chaffin, Larry.
(1)
Chen, Hsinchun.
(1)
Clercq, Jan de, 1968-
(1)
Easttom, Chuck.
(1)
Grillenmeier, Guido.
(1)
Güven, Mehmet.
(1)
Hadnagy, Christopher.
(1)
Hoglund, Greg.
(1)
Hurley, Chris.
(1)
Jang, Michael H.
(1)
Kasım, Başar.
(1)
Klosek, Jacqueline.
(1)
McGraw, Gary, 1966- ort. yaz.
(1)
Nazario, Jose, ort. yaz.
(1)
Palmer, Brandon.
(1)
Pejas, Jerzy, 1954-, ed.
(1)
Pfleeger, Charles P., 1948-
(1)
Piegat, Andrzej, 1947-, ed.
(1)
Piltzecker, Tony, 1975-
(1)
Rotenberg, Marc.
(1)
Satyanarayana, Mahesh.
(1)
Sağıroğlu, Şeref.
(1)
Schneier, Bruce.
(1)
Shepherd, Matthew.
(1)
Singhal, Anoop, 1958-
(1)
Stamp, Mark.
(1)
Taylor, Laura.
(1)
Thomson, Herbert H., ort. yaz.
(1)
Tudor, Jan Killmeyer.
(1)
Tyson, Dave.
(1)
Usta, Gökhan.
(1)
Whittaker, James A., 1965-
(1)
Wiles, Jack.
(1)
Winkler, Ira.
(1)
Yılmaz, Davut.
(1)
Çeliktaş, Barış .
(1)
More
View All
Fewer
Collapse All
Language
Include
Exclude
English
(29)
Turkish
(7)
Publication Date
Include
Exclude
-
2007
(13)
2006
(7)
2004
(5)
2001
(2)
2019
(2)
2020
(2)
4
(1)
1996
(1)
2000
(1)
2003
(1)
2005
(1)
2009
(1)
2011
(1)
2018
(1)
More
View All
Fewer
Collapse All
Subject
Include
Exclude
Bilgisayar güvenliği.
(28)
Computer networks -- Security measures.
(7)
Bilgisayar ağları -- Güvenlik önlemleri.
(6)
Bilgisayar Güvenliği.
(5)
BİLGİSAYAR GÜVENLİĞİ.
(4)
Data protection.
(4)
Computer hackers.
(3)
Microsoft Windows (Bilgisayar kütüğü)
(3)
Microsoft Windows (Computer file)
(3)
Veri koruma.
(3)
Bilgisayar Yapısı.
(2)
Bilgisayar korsanları.
(2)
Bilgisayar suçları.
(2)
Computer architecture.
(2)
Computer crimes.
(2)
Computer software -- Testing.
(2)
Data mining.
(2)
National security.
(2)
Operating systems (Computers)
(2)
Privacy, Right of.
(2)
Veri madenciliği.
(2)
Artificial intelligence.
(1)
Açık kaynak yazılımı.
(1)
Bilgisayar Güvenliği .
(1)
Bilgisayar ağları -- Emniyet ölçüleri.
(1)
Bilgisayar suçları -- Korunma.
(1)
Bilgisayar suçları -- Soruşturma.
(1)
Bilgisayar yazılımı -- Test etme.
(1)
Biometric identification.
(1)
Business enterprises -- Security measures.
(1)
BİLGİSAYAR AĞLARI -- EMNİYET ÖLÇÜLERİ.
(1)
BİLGİSAYAR YAZILIMI -- TEST ETME.
(1)
Casus yazılım (Bilgisayar yazılımı).
(1)
Client/server computing.
(1)
Computer crimes -- Investigation.
(1)
Computer crimes -- Prevention.
(1)
Computer networks -- Security measures
(1)
Cryptography.
(1)
Cybernetics.
(1)
Data recovery (Computer science)
(1)
Data warehousing.
(1)
Expert systems (Computer science)
(1)
Firewalls (Computer security)
(1)
Gizlilik Hakkı.
(1)
Gizlilik hakkı.
(1)
Güvenlik duvarları (Bilgisayar güvenliği)
(1)
Hackers.
(1)
Hacking
(1)
Human-computer interaction.
(1)
Internal security.
(1)
Kablosuz LAN'lar -- Güvenlik önlemleri.
(1)
Kablosuz iletişim sistemleri -- Güvenlik önlemleri.
(1)
Linux.
(1)
MOBİL İLETİŞİM SİSTEMLERİ.
(1)
Microsoft Windows.
(1)
Milli güvenlik.
(1)
Mobile communication systems.
(1)
Open source software.
(1)
OpenBSD (Electronic resource)
(1)
OpenBSD (Elektronik kaynak)
(1)
Operations systems (Computer)
(1)
Program kırıcıları.
(1)
Risk management.
(1)
Risk yönetimi.
(1)
SQL server.
(1)
SQL sunucu.
(1)
Sibernetik.
(1)
Social engineering.
(1)
Software maintenance.
(1)
Sosyal mühendislik.
(1)
Spyware (Computer software).
(1)
Telecommunication -- Security measures.
(1)
Telekomünikasyon -- Emniyet Ölçüleri.
(1)
Ticari teşebbüsler -- Güvenlik önlemleri.
(1)
Ulusal Güvenlik.
(1)
Uzman sistemler (Bilgisayar bilimi)
(1)
Veri Koruma .
(1)
Veri depolama.
(1)
Veri kurtarma (Bilgisayar bilimi)
(1)
Wireless LANs -- Security measures.
(1)
Wireless communication systems -- Security measures.
(1)
Yapay zeka.
(1)
Yazılım bakımı.
(1)
İnsan-bilgisayar etkileşimi.
(1)
İstemci/sunucu hesaplama.
(1)
İç güvenlik.
(1)
İşletim Sistemleri (Bilgisayarlar)
(1)
İşletim sistemleri (Bilgisayar)
(1)
İşletim sistemleri (Bilgisayarlar)
(1)
Şifreyazım.
(1)
More
View All
Fewer
Collapse All
Material Type
Include
Exclude
Book
Cd-Rom
E-Book
Thesis
Shelf Location
Include
Exclude
Beytepe CD-ROM Koleksiyonu
Beytepe General Collection
Beytepe Tez Koleksiyonu
Electronic Library
Library
Include
Exclude
Beytepe Library
Online Library
false
{sortLabel}
{alphabetical}
{relevance}
{include}
{exclude}
{facetName}
{results}
{displayName}
{count}
{error}
Select an Action
Place Hold(s)
Add to My Lists
Email
Print
38 Results Found
1
2
3
4
Sort By:
Relevance (Default)
Publication Date (Ascending)
Publication Date (Descending)
Title
Author
00
DEFAULT
Select a list
Temporary List
Make this your default list.
The following items were successfully added.
There was an error while adding the following items. Please try again.
One or more items could not be added because you are not logged in.
37.
Data privacy in the information age
Data privacy in the information age
Author
Klosek, Jacqueline.
Preferred Shelf Number
QA76.9.A25 K57 2000
Format:
Availability
Beytepe Library~1
Available:
Copies:
38.
Applied cryptography : protocols, algorithms, and source code in C
Applied cryptography : protocols, algorithms, and source code in C
Author
Schneier, Bruce.
Preferred Shelf Number
QA76.9.A25 S35 1996
Format:
Availability
Beytepe Library~1
Available:
Copies:
Select an Action
Place Hold(s)
Add to My Lists
Email
Print
1
2
3
4
Go to:
Search Results
|
Top of Page
|
Search Facets