Log In
|
My Account
|
My Lists
|
|
Remember to clear the cache and close the browser window.
Search Limit
Everything
E-Book
Journals
Beytepe Library
Health Sciences Library
Conservatory Library
Law Library
Social Sciences Vocational High School
DVD Collection
Prof.Dr. Onur Bilge Kula Collection
Rooms Restriction Values
All Fields
Title
Author
Subject
ISBN
ISSN
8
Search Field
All Fields
Target Value
Limit Value
Restriction Value
Search For:
Advanced Search
Limit Search Results
Narrowed by:
+
Konu: Computer security.
Author
Include
Exclude
Edwards, Jason (Cybersecurity expert), author.
(2)
John Wiley & Sons, publisher.
(2)
Kissoon, Tara, author.
(2)
Peltier, Thomas R., author.
(2)
Abedin, Mohammad Zoynul, editor.
(1)
Anwar, Waqar, author.
(1)
Barkat, Abu, editor.
(1)
Basta, Alfred, author.
(1)
Basta, Nadine, author.
(1)
Bayuk, Jennifer L., author.
(1)
Blackley, John A.
(1)
Bowers, John R.
(1)
Carpenter, Perry, author.
(1)
Chapple, Mike, author.
(1)
Dalipi, Fisnik, editor
(1)
Davis, Robert E.
(1)
Dooley, Michael, 1962- author.
(1)
Dowland, Paul, editor.
(1)
Engel, Barak, author.
(1)
Essar, Mohammad Ilyas, author.
(1)
Fagan, Peter (Writer on computer security), author.
(1)
Held, Jonathan S., author.
(1)
Hill, David G. (David Gary), 1943, author.
(1)
Hughes, Chris (Christopher Matthew), author.
(1)
Hájek, Petr, editor.
(1)
Islam, Ray (Mohammad Rubyet), author.
(1)
Kabay, M. E.
(1)
Lambros, Kyriakos P., author.
(1)
Landoll, Douglas J., author.
(1)
Layton, Timothy P., author.
(1)
Lee, Yang-Im, author.
(1)
Martiri, Edlira, editor
(1)
McLaughlin, Kevin (Kevin Lynn), author.
(1)
Moschovitis, Christos J. P., author.
(1)
Moustafa, Nour, editor.
(1)
Moyo, Siegfried, author.
(1)
Peltier, Justin.
(1)
Peltier, Thomas R.
(1)
Robinson, Nikki, author.
(1)
Rooney, Timothy, 1962- author.
(1)
Shah, Kaushal, 1987- editor.
(1)
Sharp, Matthew K., author.
(1)
Shelley, Joe.
(1)
Singh, Tarnveer.
(1)
Stewart, James Michael.
(1)
Swanson, Charles (Chartered Security Professional), author.
(1)
Tanner, Nadean H., author.
(1)
Tiller, James S., author.
(1)
Tipton, Harold F.
(1)
Trim, Peter R. J., author.
(1)
Vajjhala, Narasimha, 1978- editor.
(1)
Weaver, Griffin, author.
(1)
Willett, Keith D., author.
(1)
Āhameda, Mahiuddina, editor.
(1)
More
View All
Fewer
Collapse All
Language
Include
Exclude
English
(37)
Publication Date
Include
Exclude
-
2024
(10)
2025
(7)
2022
(4)
2021
(3)
2005
(2)
2011
(2)
2017
(2)
2019
(2)
2001
(1)
2007
(1)
2008
(1)
2009
(1)
2023
(1)
More
View All
Fewer
Collapse All
Subject
Include
Exclude
Sécurité informatique.
(13)
Data protection.
(12)
Computer networks -- Security measures.
(11)
Electronic books.
(11)
COMPUTERS.
(10)
Security.
(10)
BUSINESS & ECONOMICS / Management
(6)
COMPUTERS / Networking / Security
(6)
Networking.
(6)
COMPUTERS / Security / General
(5)
Computer Security
(5)
Cryptography.
(5)
BUSINESS & ECONOMICS / Insurance / Risk Assessment & Management
(4)
BUSINESS & ECONOMICS / Production & Operations Management
(4)
Online Safety & Privacy.
(4)
Risk management.
(4)
BUSINESS & ECONOMICS / Information Management
(3)
BUSINESS & ECONOMICS.
(3)
Business enterprises -- Computer networks -- Security measures.
(3)
Computer crimes -- Prevention.
(3)
Protection de l'information (Informatique)
(3)
Risk assessment.
(3)
Réseaux d'ordinateurs -- Sécurité -- Mesures.
(3)
Viruses & Malware.
(3)
Artificial intelligence.
(2)
Business -- Data processing -- Security measures.
(2)
Business enterprises -- Security measures.
(2)
COMPUTERS -- Security -- General.
(2)
COMPUTERS / Cryptography
(2)
Chief information officers.
(2)
Computer networks -- Security measures
(2)
Computer security
(2)
Corporations -- Security measures.
(2)
Cyberinfrastructure -- Security measures.
(2)
Data protection
(2)
Information technology -- Management.
(2)
Auditing.
(1)
BUSINESS & ECONOMICS -- Production & Operations Management.
(1)
BUSINESS & ECONOMICS / Auditing
(1)
BUSINESS & ECONOMICS / Facility Management
(1)
BUSINESS & ECONOMICS / General
(1)
BUSINESS & ECONOMICS / Infrastructure
(1)
Blockchains (Databases)
(1)
Business -- Data processing.
(1)
Business enterprises -- Communication systems -- Management.
(1)
Business enterprises -- Data processing -- Security measures.
(1)
Business enterprises -- Security measures
(1)
Business intelligence.
(1)
Business strategy
(1)
COMPUTERS -- Information Technology.
(1)
COMPUTERS -- Operating Systems -- General.
(1)
COMPUTERS / Computer Engineering
(1)
COMPUTERS / Information Technology
(1)
COMPUTERS / Internet / Online Safety & Privacy
(1)
COMPUTERS / Security / Network Security
(1)
COMPUTERS / Social Aspects / Human-Computer Interaction
(1)
Causes & prevention of crime
(1)
Certification Guides.
(1)
Chefs des services de l'information.
(1)
Chief information officers
(1)
Computer architecture & logic design
(1)
Computer crimes -- Risk assessment.
(1)
Computer networking & communications
(1)
Computer security -- Management.
(1)
Computers -- Access control.
(1)
Confidential business information.
(1)
Criminalité informatique -- Évaluation du risque.
(1)
Criminology - legal aspects
(1)
Cybernetics.
(1)
Cyberterrorism -- Prevention.
(1)
Database security.
(1)
Electronic commerce -- Security measures.
(1)
Entrepreneurship.
(1)
Entreprises -- Informatique -- Sécurité -- Mesures.
(1)
Entreprises -- Sécurité -- Mesures.
(1)
Finance.
(1)
Financial Risk Management.
(1)
Information resources management.
(1)
Information technology -- Security measures.
(1)
Insurance.
(1)
Intelligence artificielle.
(1)
Internet domain names -- Security measures.
(1)
Leadership.
(1)
Legal aspects of IT
(1)
Logiciels libres.
(1)
Management information systems
(1)
Management information systems -- Security measures.
(1)
Management information systems.
(1)
Open source software.
(1)
Risk Assessment & Management.
(1)
Security services
(1)
Systèmes d'information de gestion -- Sécurité -- Mesures.
(1)
Systèmes d'information de gestion.
(1)
Sécurité informatique -- Gestion.
(1)
TECHNOLOGY & ENGINEERING.
(1)
TECHNOLOGY / Electronics / Digital
(1)
TECHNOLOGY / Operations Research
(1)
Telecommunications.
(1)
cybersecurity;threat intelligence;risk assessment;artificial intelligence
(1)
More
View All
Fewer
Collapse All
Material Type
Include
Exclude
E-Book
Shelf Location
Include
Exclude
CRC Ebooks
Taylor Francis E-Book Collection
Wiley E-Book Collection
Library
Include
Exclude
Online Library
false
{sortLabel}
{alphabetical}
{relevance}
{include}
{exclude}
{facetName}
{results}
{displayName}
{count}
{error}
Select an Action
Place Hold(s)
Add to My Lists
Email
Print
37 Results Found
1
2
3
4
Sort By:
Relevance (Default)
Publication Date (Ascending)
Publication Date (Descending)
Title
Author
0
DEFAULT
Select a list
Temporary List
Make this your default list.
The following items were successfully added.
There was an error while adding the following items. Please try again.
One or more items could not be added because you are not logged in.
37.
Securing e-business applications and communications
Securing e-business applications and communications
Author
Held, Jonathan S., author. Bowers, John R.
Preferred Shelf Number
QA76.9 .A25 H435 2001
Electronic Access
Click here to view.
Format:
Availability
Online Library~1
Available:
Copies:
Select an Action
Place Hold(s)
Add to My Lists
Email
Print
1
2
3
4