Skip to:
Search Results
|
Content
|
Bottom
|
Search Facets
Log In
|
My Account
|
My Lists
|
|
Remember to clear the cache and close the browser window.
Search Limit
Everything
E-Book
Journals
Beytepe Library
Health Sciences Library
Conservatory Library
Law Library
Social Sciences Vocational High School
DVD Collection
Prof.Dr. Onur Bilge Kula Collection
Rooms Restriction Values
All Fields
Title
Author
Subject
ISBN
ISSN
13
Search Field
All Fields
Target Value
Limit Value
Restriction Value
Search For:
Advanced Search
Limit Search Results
Narrowed by:
+
Publication Date: 2010
Author
Include
Exclude
Tipton, Harold F.
(6)
SpringerLink (Online service)
(5)
Krause, Micki.
(3)
Anderson, Brian (Brian James)
(2)
Barrett, Diane.
(2)
Kipper, Gregory.
(2)
Kraus, Rob.
(2)
Nozaki, Micki Krause.
(2)
Wiley InterScience (Online service)
(2)
Alpcan, Tansu.
(1)
Alpern, Naomi J.
(1)
Başar, Tamer.
(1)
Borkin, Mike.
(1)
Boulanger, Jean-Louis.
(1)
Brown, Dan, 1964-
(1)
Campara, Djenana.
(1)
Chuvakin, Anton.
(1)
Davies, Donald Watts, 1924-
(1)
Echizen, Isao. editor.
(1)
Ely, Adam.
(1)
Engebretson, Pat (Patrick Henry), 1974-
(1)
Foreman, Park.
(1)
Gritzalis, Dimitris. editor.
(1)
Haines, Brad.
(1)
Herold, Rebecca.
(1)
Hinek, M. Jason.
(1)
Howard, Doug.
(1)
Kissell, Joe.
(1)
Konheim, Alan G., 1934-
(1)
Kotenko, Igor. editor.
(1)
Kouns, Jake.
(1)
Kunihiro, Noboru. editor.
(1)
Lillard, Terrence.
(1)
Liu, K. J. Ray.
(1)
Mansourov, Nikolai.
(1)
Marvel, Elisabette M.
(1)
Massimiliano, Oldani.
(1)
Merkow, Mark S.
(1)
Metula, Erez.
(1)
Minoli, Daniel, 1952-
(1)
Moeller, Robert R.
(1)
Norman, Thomas L.
(1)
Peltier, Thomas R.
(1)
Perez, Richard, 1969 Oct. 17-
(1)
Perla, Enrico.
(1)
Preneel, Bart. editor.
(1)
Price, W. L., ort.yaz.
(1)
Prince, Kevin.
(1)
Prowell, Stacy J.
(1)
Raghavan, Lakshmikanth.
(1)
Rosenberg, Burton.
(1)
Rountree, Derrick.
(1)
Salomon, David. author.
(1)
Sasaki, Ryoichi. editor.
(1)
Schoitsch, Erwin. editor.
(1)
Shema, Mike.
(1)
Shimonski, Robert.
(1)
Skormin, Victor. editor.
(1)
Soner, Sezer.
(1)
Spangenberg, Ward.
(1)
Street, Jayson E.
(1)
Street, Jayson E. Dissecting the hack.
(1)
Theoharidou, Marianthi. editor.
(1)
Timm, Carl.
(1)
Trinckes, John J.
(1)
Wang, Beibei.
(1)
Wilhelm, Thomas.
(1)
Williams, Branden R.
(1)
More
View All
Fewer
Collapse All
Language
Include
Exclude
English
(48)
Turkish
(1)
Subject
Include
Exclude
Computer security.
(25)
Computer networks -- Security measures.
(16)
Computer science.
(5)
Computer security -- Management -- Handbooks, manuals, etc.
(5)
Data protection -- Handbooks, manuals, etc.
(5)
Data protection.
(5)
Computer Communication Networks.
(4)
Computer crimes -- Investigation.
(4)
Computer software.
(3)
Data encryption (Computer science).
(3)
Electronic books.
(3)
Information technology -- Security measures.
(3)
Virtual computer systems -- Security measures.
(3)
Computer crimes -- Prevention.
(2)
Computer hackers.
(2)
Computer security -- Examinations -- Study guides.
(2)
Computer security -- Management.
(2)
Data encryption (Computer science)
(2)
Electronic data processing personnel -- Certification.
(2)
Game theory.
(2)
Risk assessment.
(2)
Risk management.
(2)
Avionics -- Safety measures.
(1)
Bilgisayar güvenliği -- Roman.
(1)
Business enterprises -- Computer networks -- Security measures.
(1)
Business enterprises -- Security measures.
(1)
China -- Military policy.
(1)
Cloud computing -- Security measures.
(1)
Cognitive radio networks.
(1)
Common Language Runtime (Computer science)
(1)
Computer architecture.
(1)
Computer crimes -- Case studies.
(1)
Computer networks -- Access control.
(1)
Computer networks -- Examinations -- Study guides.
(1)
Computer networks -- Security measures -- Examinations -- Study guides.
(1)
Computer networks -- Security measures -- United States.
(1)
Computer security -- Examinations -- Practice.
(1)
Computer security -- Fiction.
(1)
Computer software -- Development.
(1)
Computer software -- Reliability.
(1)
Computer software -- Testing.
(1)
Computer systems -- Reliability.
(1)
Computer viruses.
(1)
Computers -- Access control.
(1)
Credit cards.
(1)
Cryptography -- Fiction.
(1)
Cryptography.
(1)
Cyberspace -- Security measures.
(1)
Data protection -- Management.
(1)
Data protection -- Standards.
(1)
Electronic commerce -- Security measures.
(1)
Electronic data processing departments -- Auditing.
(1)
Electronic funds transfers -- Security measures.
(1)
Hashing (Computer science)
(1)
Information Systems.
(1)
Information systems.
(1)
Information technology -- Auditing.
(1)
Information warfare -- China.
(1)
Information warfare -- United States -- Prevention.
(1)
Intelligence service -- Fiction.
(1)
Internet -- Security measures.
(1)
Liability for credit information.
(1)
Mac OS.
(1)
Macintosh (Computer) -- Programming.
(1)
Malware (Computer software) -- Prevention.
(1)
Microsoft Windows (Computer file)
(1)
Office buildings -- Security measures.
(1)
Online social networks -- Security measures.
(1)
Operating systems (Computers)
(1)
Operating systems (Computers) -- Security measures.
(1)
Public key cryptography.
(1)
Rootkits (Computer software)
(1)
Security systems.
(1)
Software engineering.
(1)
Telecommunication -- Security measures -- Mathematics.
(1)
VERİ İlETİM SİSTEMLERİ -- EMNİYET ÖLÇÜLERİ.
(1)
Web 2.0 -- Security measures.
(1)
Web services -- Security measures.
(1)
Wireless communication systems -- Security measures.
(1)
Wireless communication systems.
(1)
İstihbarat servisi -- Roman.
(1)
Şifreyazım -- Roman.
(1)
More
View All
Fewer
Collapse All
Material Type
Include
Exclude
Book
E-Book
Shelf Location
Include
Exclude
Beytepe General Collection
Electronic Library
Library
Include
Exclude
Beytepe Library
Online Library
false
{sortLabel}
{alphabetical}
{relevance}
{include}
{exclude}
{facetName}
{results}
{displayName}
{count}
{error}
Select an Action
Place Hold(s)
Add to My Lists
Email
Print
49 Results Found
1
2
3
4
5
Sort By:
Relevance (Default)
Publication Date (Ascending)
Publication Date (Descending)
Title
Author
0
DEFAULT
Select a list
Temporary List
Make this your default list.
The following items were successfully added.
There was an error while adding the following items. Please try again.
One or more items could not be added because you are not logged in.
49.
Seven deadliest USB attacks
Seven deadliest USB attacks
Author
Anderson, Brian (Brian James)
Preferred Shelf Number
ONLINE
Electronic Access
ScienceDirect
http://www.sciencedirect.com/science/book/9781597495530
Format:
Availability
Online Library~1
Available:
Copies:
Select an Action
Place Hold(s)
Add to My Lists
Email
Print
1
2
3
4
5
Go to:
Search Results
|
Top of Page
|
Search Facets