Skip to:
Search Results
|
Content
|
Bottom
|
Search Facets
Log In
|
My Account
|
My Lists
|
|
Remember to clear the cache and close the browser window.
Search Limit
Everything
E-Book
Journals
Beytepe Library
Health Sciences Library
Conservatory Library
Law Library
Social Sciences Vocational High School
DVD Collection
Prof.Dr. Onur Bilge Kula Collection
Rooms Restriction Values
All Fields
Title
Author
Subject
ISBN
ISSN
13
Search Field
All Fields
Target Value
Limit Value
Restriction Value
Search For:
Advanced Search
Limit Search Results
Author
Include
Exclude
SpringerLink (Online service)
(19)
Long, Johnny.
(4)
Elbahadır, Hamza.
(3)
Grand, Joe.
(3)
Grimes, Roger A., author.
(3)
Hacking, Ian.
(3)
Scambray, Joel.
(3)
Asadoorian, Paul.
(2)
Baloch, Rafay, author.
(2)
Foster, James C.
(2)
Hacking, Juliet.
(2)
Kleiman, Dave.
(2)
Liu, Vincent.
(2)
McClure, Stuart.
(2)
Pesce, Larry.
(2)
Schrödel, Tobias. author.
(2)
ScienceDirect (Online service)
(2)
Wilhelm, Thomas.
(2)
Abdelnour Nocera, José. editor.
(1)
Alberts, Gerard. editor.
(1)
Allsopp, Wil, author.
(1)
Alvim, Frederico Franco, author.
(1)
Andress, Jason.
(1)
Arcuri, Jennifer, author.
(1)
Aslanbakan, Enes, yazar
(1)
Balamurugan, S. editor
(1)
Balas, Valentina Emilia. editor.
(1)
Barfield, Woodrow. author.
(1)
Barken, Lee.
(1)
Bayles, Aaron W.
(1)
Beligiannis, Grigorios N. editor.
(1)
Bermel, Eric.
(1)
Bodmer, Sean.
(1)
Boudriga, Noureddine, author.
(1)
Bozkurt, Abbas.
(1)
Brashars, Joshua.
(1)
Brindley, Ed.
(1)
Burnett, Mark M.
(1)
Burrus, Nicolas. author.
(1)
Cache, Johnny.
(1)
Campany, David.
(1)
Cannings, Rich.
(1)
Carey, Marcus J. (Cybersecurity professional)
(1)
Carey, Marcus J. (Cybersecurity professional), author.
(1)
Carver, L. F., editor.
(1)
Chakrabarti, Satyajit. editor.
(1)
Chakraborty, Mohuya. editor.
(1)
Chang, Victor. editor.
(1)
Chen, Lei, 1978 July 28- editor.
(1)
Chicone, Rhonda, author.
(1)
Chiesa, Raoul, 1973, author.
(1)
Choudhury, Tanupriya editor
(1)
Ciappi, Silvio, 1965-
(1)
Clarke, Nathan. editor.
(1)
Cohen, Daniel J. (Daniel Jared), 1968-
(1)
Coleman, E. Gabriella, 1973-
(1)
Cools, Darren, illustrator.
(1)
Crawley, Kim.
(1)
Daniel, Herrera C. author.
(1)
Darling, Julie, author.
(1)
Davis, Michael A.
(1)
De Vuyst, Sara, author.
(1)
Dhavale, Sunita Vikrant, author.
(1)
Domas, Christopher, author.
(1)
Domas, Stephanie, author.
(1)
Du, Ke-Lin. editor.
(1)
Ducci, Stefania.
(1)
Dwivedi, Himanshu.
(1)
Eagle, Chris.
(1)
Echtler, Florian. author.
(1)
Edwards, Graeme (Financial and cybercrime investigator), author.
(1)
Engebretson, Pat (Patrick Henry), 1974-
(1)
Floridi, Luciano, 1964- editor.
(1)
Fu, Jie. editor.
(1)
Furnell, Steven. editor.
(1)
Ghai, Deepika. editor.
(1)
Gomes, Araceli Treu, author.
(1)
Goyal, S. B. editor.
(1)
Gururaj, H. L., 1988- editor.
(1)
Hacking, Juliet.
(1)
Hacking, Charlotte, 1979- author.
(1)
Hacking, Ian, author.
(1)
Hacking, Jane F., editor.
(1)
Hacking, Nigel. editor.
(1)
Hadnagy, Christopher, author.
(1)
Hadnagy, Christopher.
(1)
Haines, Brad.
(1)
Haller, Christopher, author.
(1)
Hardy, Jeffrey S., 1978- editor.
(1)
Harper, Allen.
(1)
Harris, Shon.
(1)
Hatch, Brian. Hacking Linux exposed.
(1)
Hawkins, Tom, 1972-
(1)
Hayel, Yezekael. editor. (orcid)
(1)
Hickey, Matthew (Computer security expert), author.
(1)
Hurley, Chris.
(1)
IGI Global, publisher.
(1)
ISECOM (Organization)
(1)
Islam, Sardar M. N. editor. (orcid)0000-0001-9451-7390
(1)
Jackson, John (Cybersecurity professional), author.
(1)
Jewkes, Yvonne, 1966- ed.
(1)
Jha, Anand, editor.
(1)
Jin, Jennifer, author.
(1)
Jin, Jennifer.
(1)
Kaczmarek, Richard.
(1)
Kantzavelou, Ioanna, editor.
(1)
Kaur, Gagandeep, editor
(1)
Knight, Alissa, author.
(1)
Kramer, Jeff. author.
(1)
Kristín Lárusdóttir, Marta. editor.
(1)
Kroupa, Tomas. editor.
(1)
Kumar, Vidyapati. editor.
(1)
Kurtz, George.
(1)
Kurtz, Jennifer Ann, author.
(1)
Kvassay, Miroslav. editor.
(1)
Lackey, Zane.
(1)
Lawry, Tom, author.
(1)
Le-Khac, Nhien-An, 1972- editor.
(1)
LeMasters, Aaron.
(1)
Lenkey, Gideon.
(1)
Letherby, Gayle, ed.
(1)
Maglaras, Leandros, editor.
(1)
Maleh, Yassine, 1987- author.
(1)
Mandal, J. K. editor.
(1)
Manogaran, Gunasekaran. author.
(1)
McLucas, Bruce. editor.
(1)
Messier, Ric, author.
(1)
Meyers, Arlen. editor.
(1)
Miranda, Eduardo Reck. editor.
(1)
Misra, Anmol., author.
(1)
Mitnick, Kevin D. (Kevin David), 1963-
(1)
Montasari, Reza. author.
(1)
Monteiro, Vitor, author.
(1)
Ness, Jonathan.
(1)
Nozaki, Micki Krause.
(1)
Oka, Dennis Kengo, author.
(1)
Oldenziel, Ruth. editor.
(1)
Ozelli, Selva, author.
(1)
Parker, Matt. author.
(1)
Patterson, Wayne, 1945- author.
(1)
Pauli, Joshua J.
(1)
Peter, Alexender. author.
(1)
Petrie, Helen. editor.
(1)
Piccinno, Antonio. editor.
(1)
Polstra, Philip, author.
(1)
Project Muse.
(1)
Putrino, David. author.
(1)
Rajakumar, G. editor.
(1)
Ramachandran, Muthu. editor.
(1)
Ramachandran, Vivek, editor.
(1)
Rana, Shaila, author.
(1)
Rawal, Bharat S. author.
(1)
Reidy, John. editor.
(1)
Reyes-Garcia, Everardo, author.
(1)
Rogers, Russ.
(1)
Romaniello, Matthew P., editor.
(1)
Rubio Núñez, Rafael, author.
(1)
Russell, Ryan, 1969-
(1)
SPIVEY, MARK D.
(1)
Schearer, Michael J.
(1)
Scheinfeldt, Tom.
(1)
Schneier, Bruce, 1963- author.
(1)
Shackleford, Dave, editor.
(1)
Shaffer, Joyce, author.
(1)
Sharma, Dinesh, editor.
(1)
Shema, Mike.
(1)
Sima, Caleb.
(1)
Singh, Tarnveer, author.
(1)
Skoudis, Ed.
(1)
Syngress Media, Inc.
(1)
Taddeo, Mariarosaria, editor.
(1)
Takabi, Hassan, 1982- editor.
(1)
Thornton, Frank (Thorn)
(1)
Thornton, Frank.
(1)
Tipton, Harold F.
(1)
Tomar, Geetam, editor.
(1)
Trinckes, John J., author.
(1)
Troia, Vinny, author.
(1)
Trotter, Fred.
(1)
Tucker, Allen B.
(1)
Uhlman, David.
(1)
Ulsch, N. MacDonnell, 1951-
(1)
Usta, Gökhan.
(1)
Varsalone, Jesse, author.
(1)
Vuppalapati, Chandrasekar. editor.
(1)
WARD, RALPH.
(1)
Walters, Robert J. editor.
(1)
Wiles, Jack.
(1)
Williams, Terron.
(1)
Wills, Gary. editor.
(1)
Winckler, Marco. editor.
(1)
Winkler, Ira, author.
(1)
Winston-Proctor, Cynthia E., author.
(1)
Wright, Joshua.
(1)
Wylie, Phillip L., author.
(1)
Wyse, Dominic, 1964- author.
(1)
Yarusso, Albert.
(1)
Yılmaz, Davut.
(1)
Zaitseva, Elena. editor.
(1)
Zheng, Sarah Y., author.
(1)
More
View All
Fewer
Collapse All
Language
Include
Exclude
English
(111)
Turkish
(8)
German
(2)
Publication Date
Include
Exclude
-
2023
(12)
2011
(11)
2019
(10)
2020
(9)
2025
(9)
2012
(8)
2017
(8)
2015
(7)
2004
(6)
2007
(6)
2013
(6)
2014
(6)
2024
(6)
2026
(6)
2021
(5)
2008
(4)
2010
(4)
2018
(4)
2005
(3)
2016
(3)
2022
(3)
2009
(2)
1975
(1)
2001
(1)
2002
(1)
2006
(1)
More
View All
Fewer
Collapse All
Subject
Include
Exclude
Computer security.
(38)
Computer networks -- Security measures.
(23)
Computer hackers.
(20)
Electronic books.
(15)
Sécurité informatique.
(11)
COMPUTERS.
(9)
Hacking.
(9)
Penetration testing (Computer security)
(9)
Cryptography.
(8)
Security.
(8)
Computer security
(7)
Hacking
(7)
Piratage informatique.
(6)
Artificial intelligence.
(5)
Bilgisayar korsanları.
(5)
Computer Security
(5)
Bilgisayar ağları -- Güvenlik önlemleri.
(4)
Bilgisayar güvenliği
(4)
Bilgisayar güvenliği.
(4)
Computer crimes -- Prevention.
(4)
Computer crimes.
(4)
Hackers.
(4)
Social engineering.
(4)
Tests d'intrusion.
(4)
Business enterprises -- Computer networks -- Security measures.
(3)
COMPUTERS -- Security -- General.
(3)
COMPUTERS -- Security -- Network Security.
(3)
Computer networks -- Security measures
(3)
Computers -- Access control.
(3)
Data and Information Security.
(3)
Data protection.
(3)
Hackers
(3)
Hacking -- Prevention.
(3)
Réseaux d'ordinateurs -- Sécurité -- Mesures.
(3)
Web sites -- Security measures.
(3)
Wireless communication systems -- Security measures.
(3)
Wireless communication systems.
(3)
Application software -- Security measures.
(2)
COMPUTERS -- Security -- Cryptography & Encryption.
(2)
COMPUTERS / Cryptography
(2)
COMPUTERS / Security / General
(2)
Communications Engineering, Networks.
(2)
Computer crimes -- Investigation
(2)
Computer crimes -- Investigation.
(2)
Computer fraud.
(2)
Computers.
(2)
Criminalité informatique -- Enquêtes.
(2)
Criminology.
(2)
Economics.
(2)
Google.
(2)
Human-computer interaction.
(2)
Induction (Logic)
(2)
Industrial management.
(2)
Internet -- Security measures.
(2)
Internet programming.
(2)
Malware (Computer software)
(2)
Medical records -- Access control -- United States.
(2)
Mobile and Network Security.
(2)
Mobile computing -- Security measures.
(2)
Networking.
(2)
Ordinateurs.
(2)
Pirates informatiques.
(2)
Probabilities.
(2)
Reverse engineering.
(2)
Routers (Computer networks)
(2)
Telecommunication.
(2)
Viruses & Malware.
(2)
Web search engines.
(2)
Wireless LANs -- Security measures.
(2)
Active server pages -- Security measures.
(1)
ActiveX.
(1)
Affaires.
(1)
Aging -- Popular works.
(1)
Aging -- Prevention -- Social aspects.
(1)
Ajax (Web site development technology)
(1)
Algorithms.
(1)
Android (Electronic resource)
(1)
Application software.
(1)
Architecture logicielle.
(1)
Artificial intelligence -- Data processing.
(1)
Artificial intelligence -- Political aspects.
(1)
Asia, Central -- Civilization.
(1)
Asia, Central -- Colonization.
(1)
Asia, Central -- Relations -- Russia.
(1)
Asia, Central -- Relations -- Soviet Union.
(1)
Assembly Language.
(1)
Automated vehicles
(1)
Automated vehicles -- Security measures.
(1)
Automated vehicles.
(1)
Automotive computers -- Programming.
(1)
Automotive telematics -- Security measures.
(1)
BUSINESS & ECONOMICS -- Corporate Finance -- General.
(1)
BUSINESS & ECONOMICS / Education
(1)
BUSINESS & ECONOMICS / Leadership
(1)
BUSINESS & ECONOMICS / Production & Operations Management
(1)
BUSINESS & ECONOMICS.
(1)
BeagleBone (Computer)
(1)
Berkeley BSD (Computer file)
(1)
Big data.
(1)
Bilgisayar suçları.
(1)
Biomedical engineering.
(1)
Biotechnology -- Social aspects.
(1)
Bluetooth technology -- Security measures.
(1)
Boards of directors.
(1)
Brain -- Care and hygiene -- Popular works.
(1)
Brain -- Popular works.
(1)
Business enterprises -- Computer networks -- Security measures
(1)
Business.
(1)
BİLGİSAYAR GÜVENLİĞİ.
(1)
C (Computer program language)
(1)
COMPUTERS -- Computer Literacy.
(1)
COMPUTERS -- Computer Science.
(1)
COMPUTERS -- Data Processing.
(1)
COMPUTERS -- Hardware -- General.
(1)
COMPUTERS -- Information Technology.
(1)
COMPUTERS -- Machine Theory.
(1)
COMPUTERS -- Reference.
(1)
COMPUTERS -- Security -- Cryptography.
(1)
COMPUTERS -- Security -- Online Safety & Privacy.
(1)
COMPUTERS -- User Interfaces.
(1)
COMPUTERS / Information Technology
(1)
COMPUTERS / Internet / Application Development
(1)
COMPUTERS / Internet / Security
(1)
COMPUTERS / Networking / Security
(1)
COMPUTERS / Programming / Quality Assurance & Testing
(1)
COMPUTERS / Security / Viruses
(1)
COMPUTERS / Social Aspects / General
(1)
COMPUTERS / Social Aspects / Human-Computer Interaction
(1)
COVID-19 (Disease) -- Economic aspects
(1)
COVID-19 (Disease) -- Economic aspects.
(1)
COVID-19 -- Aspect économique.
(1)
Classical literature -- Appreciation -- Haiti.
(1)
Classical literature -- Influence.
(1)
Cloud computing -- Security measures.
(1)
Communication in learning and scholarship -- Technological innovations.
(1)
Computational intelligence.
(1)
Computer Communication Networks.
(1)
Computer System Implementation.
(1)
Computer and Information Systems Applications.
(1)
Computer crimes -- Prevention -- Popular works.
(1)
Computer games -- Programming.
(1)
Computer graphics
(1)
Computer graphics.
(1)
Computer input-output equipment.
(1)
Computer networks -- Security measures.
(1)
Computer networks -- Security measures -- Examinations
(1)
Computer networks -- Security measures -- Examinations -- Study guides.
(1)
Computer networks .
(1)
Computer programmers.
(1)
Computer programming -- Moral and ethical aspects.
(1)
Computer programming -- Social aspects.
(1)
Computer programs -- Security measures.
(1)
Computer science -- Handbooks, manuals, etc.
(1)
Computer science.
(1)
Computer security -- Examinations
(1)
Computer security -- Examinations -- Practice.
(1)
Computer security -- Examinations -- Study guides.
(1)
Computer security -- Juvenile literature.
(1)
Computer security -- Law and legislation.
(1)
Computer security -- Management -- Handbooks, manuals, etc.
(1)
Computer security -- Popular works.
(1)
Computer security -- Psychological aspects.
(1)
Computer security -- United States.
(1)
Computer software -- Testing.
(1)
Computer systems.
(1)
Computer vision.
(1)
Computers
(1)
Computers & Information Technology.
(1)
Computers -- Access control -- Testing
(1)
Computers -- Access control -- Testing.
(1)
Computers and civilization.
(1)
Corporations -- Security measures.
(1)
Corruption électorale -- Politique gouvernementale.
(1)
Crime Control and Security.
(1)
Criminal behavior, Prediction of.
(1)
Cryptographie.
(1)
Cryptography
(1)
Cryptology.
(1)
Cyberspace -- Security measures
(1)
Cyberspace -- Security measures.
(1)
Cyberterrorism -- Prevention.
(1)
Data Science.
(1)
Data encryption (Computer science).
(1)
Data protection -- Handbooks, manuals, etc.
(1)
Data protection -- Law and legislation -- United States.
(1)
Data structures (Computer science).
(1)
Digital currency
(1)
Digital currency.
(1)
Digital forensic science
(1)
Digital forensic science.
(1)
Digital humanities.
(1)
DİLLER -- FELSEFE.
(1)
EDUCATION / Computers & Technology
(1)
EDUCATION / Preschool & Kindergarten
(1)
EDUCATION / Professional Development
(1)
EDUCATION / Teaching Methods & Materials / Reading
(1)
EDUCATION / Teaching Methods & Materials / Science & Technology
(1)
Education and state.
(1)
Educational change.
(1)
Elections -- Corrupt practices -- Government policy.
(1)
More
View All
Fewer
Collapse All
Material Type
Include
Exclude
Art Book
Book
E-Book
Shelf Location
Include
Exclude
1:SPRINGER
Beytepe Art Collection
Beytepe General Collection
CRC Ebooks
Electronic Library
Taylor Francis E-Book Collection
Wiley E-Book Collection
More
View All
Fewer
Collapse All
Library
Include
Exclude
Beytepe Library
Online Library
false
{sortLabel}
{alphabetical}
{relevance}
{include}
{exclude}
{facetName}
{results}
{displayName}
{count}
{error}
Select an Action
Place Hold(s)
Add to My Lists
Email
Print
122 Results Found
1
..
7
8
9
10
11
Sort By:
Relevance (Default)
Publication Date (Ascending)
Publication Date (Descending)
Title
Author
00
DEFAULT
Select a list
Temporary List
Make this your default list.
The following items were successfully added.
There was an error while adding the following items. Please try again.
One or more items could not be added because you are not logged in.
121.
Computer science handbook
Computer science handbook
Author
Tucker, Allen B.
Preferred Shelf Number
QA76 .C54755 2004
Electronic Access
Click here to view.
Format:
Availability
Online Library~1
Available:
Copies:
122.
Criminology : a reader
Criminology : a reader
Author
Jewkes, Yvonne, 1966- ed. Letherby, Gayle, ed.
Preferred Shelf Number
HV 6025 C7455 2002
Format:
Availability
Beytepe Library~1
Available:
Copies:
Select an Action
Place Hold(s)
Add to My Lists
Email
Print
1
..
7
8
9
10
11
Go to:
Search Results
|
Top of Page
|
Search Facets