Log In
|
My Account
|
My Lists
|
|
Remember to clear the cache and close the browser window.
Search Limit
Everything
E-Book
Journals
Beytepe Library
Health Sciences Library
Conservatory Library
Law Library
Social Sciences Vocational High School
DVD Collection
Prof.Dr. Onur Bilge Kula Collection
Rooms Restriction Values
All Fields
Title
Author
Subject
ISBN
ISSN
8
Search Field
All Fields
Target Value
Limit Value
Restriction Value
Search For:
Advanced Search
Limit Search Results
Author
Include
Exclude
SpringerLink (Online service)
(13)
Long, Johnny.
(4)
Grand, Joe.
(3)
Hacking, Ian.
(3)
Scambray, Joel.
(3)
Asadoorian, Paul.
(2)
Elbahadır, Hamza.
(2)
Foster, James C.
(2)
Hacking, Juliet.
(2)
Kleiman, Dave.
(2)
Liu, Vincent.
(2)
McClure, Stuart.
(2)
Pesce, Larry.
(2)
Schrödel, Tobias. author.
(2)
ScienceDirect (Online service)
(2)
Wilhelm, Thomas.
(2)
Abdelnour Nocera, José. editor.
(1)
Alberts, Gerard. editor.
(1)
Andress, Jason.
(1)
Aslanbakan, Enes, yazar
(1)
Balas, Valentina Emilia. editor.
(1)
Baloch, Rafay, author.
(1)
Barfield, Woodrow. author.
(1)
Barken, Lee.
(1)
Bayles, Aaron W.
(1)
Bermel, Eric.
(1)
Bodmer, Sean.
(1)
Bozkurt, Abbas.
(1)
Brashars, Joshua.
(1)
Brindley, Ed.
(1)
Burnett, Mark M.
(1)
Burrus, Nicolas. author.
(1)
Cache, Johnny.
(1)
Campany, David.
(1)
Cannings, Rich.
(1)
Chakrabarti, Satyajit. editor.
(1)
Chakraborty, Mohuya. editor.
(1)
Chiesa, Raoul, 1973-
(1)
Ciappi, Silvio, 1965-
(1)
Clarke, Nathan. editor.
(1)
Cohen, Daniel J. (Daniel Jared), 1968-
(1)
Coleman, E. Gabriella, 1973-
(1)
Daniel, Herrera C. author.
(1)
Davis, Michael A.
(1)
Dhavale, Sunita Vikrant, author.
(1)
Ducci, Stefania.
(1)
Dwivedi, Himanshu.
(1)
Eagle, Chris.
(1)
Echtler, Florian. author.
(1)
Engebretson, Pat (Patrick Henry), 1974-
(1)
Fu, Jie. editor.
(1)
Furnell, Steven. editor.
(1)
Gomes, Araceli Treu, author.
(1)
Hacking, Juliet.
(1)
Hacking, Ian, author.
(1)
Hacking, Nigel. editor.
(1)
Hadnagy, Christopher.
(1)
Haines, Brad.
(1)
Harper, Allen.
(1)
Harris, Shon.
(1)
Hatch, Brian. Hacking Linux exposed.
(1)
Hayel, Yezekael. editor. (orcid)
(1)
Held, Gilbert, 1943-
(1)
Hurley, Chris.
(1)
IGI Global, publisher.
(1)
ISECOM (Organization)
(1)
Jewkes, Yvonne, 1966- ed.
(1)
Kaczmarek, Richard.
(1)
Kramer, Jeff. author.
(1)
Kristín Lárusdóttir, Marta. editor.
(1)
Kroupa, Tomas. editor.
(1)
Kurtz, George.
(1)
Kurtz, Jennifer Ann, author.
(1)
Lackey, Zane.
(1)
LeMasters, Aaron.
(1)
Lenkey, Gideon.
(1)
Letherby, Gayle, ed.
(1)
Mandal, J. K. editor.
(1)
McFadden, Matthew.
(1)
McLucas, Bruce. editor.
(1)
Meyers, Arlen. editor.
(1)
Misra, Anmol.
(1)
Mitnick, Kevin D. (Kevin David), 1963-
(1)
Montasari, Reza. author.
(1)
Morrissey, Sean.
(1)
Ness, Jonathan.
(1)
Oldenziel, Ruth. editor.
(1)
Parker, Matt. author.
(1)
Pauli, Joshua J.
(1)
Petrie, Helen. editor.
(1)
Piccinno, Antonio. editor.
(1)
Polstra, Philip, author.
(1)
Project Muse.
(1)
Putrino, David. author.
(1)
Ramachandran, Vivek, editor.
(1)
Reidy, John. editor.
(1)
Rogers, Russ.
(1)
Russell, Ryan, 1969-
(1)
Schearer, Michael J.
(1)
Scheinfeldt, Tom.
(1)
Shackleford, Dave, editor.
(1)
Shema, Mike.
(1)
Sima, Caleb.
(1)
Skoudis, Ed.
(1)
Spivey, Mark D.
(1)
Syngress Media, Inc.
(1)
Thornton, Frank (Thorn)
(1)
Thornton, Frank.
(1)
Trinckes, John J.
(1)
Trotter, Fred.
(1)
Uhlman, David.
(1)
Ulsch, N. MacDonnell, 1951-
(1)
Usta, Gökhan.
(1)
Varsalone, Jesse.
(1)
Wiles, Jack.
(1)
Williams, Terron.
(1)
Winckler, Marco. editor.
(1)
Winkler, Ira, author.
(1)
Wright, Joshua.
(1)
Yarusso, Albert.
(1)
Yılmaz, Davut.
(1)
Çıtak, Ömer.
(1)
Özdabak, İrfan.
(1)
More
View All
Fewer
Collapse All
Language
Include
Exclude
English
(63)
Turkish
(7)
German
(2)
Publication Date
Include
Exclude
-
2011
(10)
2012
(8)
2007
(6)
2013
(6)
2015
(6)
2004
(5)
2014
(5)
2023
(5)
2008
(4)
2019
(4)
2005
(3)
2010
(2)
2016
(2)
2017
(2)
1975
(1)
2001
(1)
2002
(1)
2006
(1)
2009
(1)
2018
(1)
More
View All
Fewer
Collapse All
Subject
Include
Exclude
Computer security.
(25)
Computer hackers.
(20)
Computer networks -- Security measures.
(16)
Bilgisayar güvenliği.
(4)
Bilgisayar korsanları.
(4)
Computer crimes -- Prevention.
(4)
Computer crimes.
(4)
Bilgisayar ağları -- Güvenlik önlemleri.
(3)
Bilgisayar güvenliği
(3)
Computer security
(3)
Computers -- Access control.
(3)
Electronic books.
(3)
Penetration testing (Computer security)
(3)
Web sites -- Security measures.
(3)
Wireless communication systems.
(3)
Application software -- Security measures.
(2)
Business enterprises -- Computer networks -- Security measures.
(2)
Economics.
(2)
Google.
(2)
Hackers.
(2)
Induction (Logic)
(2)
Industrial management.
(2)
Internet -- Security measures.
(2)
Internet programming.
(2)
Malware (Computer software)
(2)
Medical records -- Access control -- United States.
(2)
Operating systems (Computers)
(2)
Probabilities.
(2)
Routers (Computer networks)
(2)
Web search engines.
(2)
Wireless LANs -- Security measures.
(2)
Wireless communication systems -- Security measures.
(2)
Active server pages -- Security measures.
(1)
ActiveX.
(1)
Ajax (Web site development technology)
(1)
Android (Electronic resource)
(1)
BeagleBone (Computer)
(1)
Berkeley BSD (Computer file)
(1)
Bilgisayar suçları.
(1)
Biomedical engineering.
(1)
Bluetooth technology -- Security measures.
(1)
BİLGİSAYAR GÜVENLİĞİ.
(1)
C (Computer program language)
(1)
Communication in learning and scholarship -- Technological innovations.
(1)
Computer games -- Programming.
(1)
Computer input-output equipment.
(1)
Computer network protocols.
(1)
Computer networks -- Security measures.
(1)
Computer programmers.
(1)
Computer programming -- Moral and ethical aspects.
(1)
Computer programming -- Social aspects.
(1)
Computer programs -- Security measures.
(1)
Computer science.
(1)
Computer security -- Examinations -- Practice.
(1)
Computer security -- Law and legislation.
(1)
Computer security -- United States.
(1)
Computer software -- Testing.
(1)
Computer vision.
(1)
Computers and civilization.
(1)
Computers.
(1)
Corporations -- Security measures.
(1)
Criminal behavior, Prediction of.
(1)
Criminology.
(1)
Cyberterrorism -- Prevention.
(1)
Data protection -- Law and legislation -- United States.
(1)
Data structures (Computer science).
(1)
DİLLER -- FELSEFE.
(1)
Electrical engineering.
(1)
Electronic villages (Computer networks) -- Handbooks, manuals, etc.
(1)
Entrepreneurship.
(1)
Fotografçılar -- Biyografi.
(1)
Fotoğrafçılık -- Tarihi -- 19. yüzyıl.
(1)
Fotoğrafçılık -- Tarihi -- 20. yüzyıl
(1)
Fotoğrafçılık -- Tarihçe.
(1)
Gynecology .
(1)
Hacking
(1)
Hacking -- Prevention.
(1)
Hacking.
(1)
Health -- Information services -- Management.
(1)
Health insurance -- Law and legislation -- United States.
(1)
Health insurance claims -- United States.
(1)
Health services administration -- Information technology -- Standards -- United States.
(1)
Human-computer interaction.
(1)
Humanities -- Digital libraries.
(1)
Humanities -- Information technology.
(1)
Humanities -- Research.
(1)
IEEE 802.11 (Standard)
(1)
Intellectual freedom.
(1)
Internal security.
(1)
Internet -- Political aspects.
(1)
Internet searching.
(1)
Internet telephony -- Security measures.
(1)
Interventional radiology .
(1)
KRİMİNOLOJİ.
(1)
Kismet (Electronic resource)
(1)
Linux.
(1)
Logistic Models.
(1)
Management.
(1)
Mathematical Computing.
(1)
Mathematics -- Philosophy.
(1)
Mathematics.
(1)
Medical care -- Information services -- Standards -- United States.
(1)
Medical informatics -- Standards -- United States.
(1)
Medical records -- Data processing -- Standards -- United States.
(1)
Medical records -- Law and legislation -- United States.
(1)
Medical records -- Management -- Standards -- United States.
(1)
Medicine.
(1)
Microcomputers -- Maintenance and repair.
(1)
Microcomputers -- Upgrading.
(1)
Microsoft Windows (Computer file)
(1)
Microsoft Windows server.
(1)
Mobile computing -- Security measures.
(1)
OLASILIKLAR.
(1)
Operating systems (Computers) -- Security measures.
(1)
Penetration testing (Computer security) -- Equipment and supplies.
(1)
Personal computers.
(1)
Philosophy.
(1)
Photographers -- Biography.
(1)
Photography -- History -- 19th century.
(1)
Photography -- History -- 20th century.
(1)
Photography -- History.
(1)
Proof theory.
(1)
Python (Computer program language)
(1)
Radio frequency identification systems.
(1)
Radiology.
(1)
Reverse engineering.
(1)
Rootkits (Computer software)
(1)
SQL server.
(1)
Scholarly electronic publishing.
(1)
Smartphones -- Security measures.
(1)
Social engineering.
(1)
Sosyal mühendislik.
(1)
TCP/IP (Computer network protocol)
(1)
Telsiz iletişim sistemleri.
(1)
Terrorism -- Prevention -- Computer network resources.
(1)
Terrorists -- United States -- Fiction.
(1)
TÜMEVARIM (MANTIK)
(1)
United States. American Recovery and Reinvestment Act of 2009.
(1)
United States. Health Information Technology for Economic and Clinical Health Act.
(1)
United States. Health Insurance Portability and Accountability Act of 1996.
(1)
VMware.
(1)
Video games -- Design.
(1)
Video games -- Equipment and supplies.
(1)
Virtual computer systems.
(1)
Web 2.0.
(1)
Web applications -- Security measures.
(1)
Web site development -- Security measures.
(1)
Wireless LANs -- Handbooks, manuals, etc.
(1)
Wireless LANs -- Security measures -- Handbooks, manuals, etc.
(1)
Yönlendiriciler (Bilgisayar ağları)
(1)
İnsan-bilgisayar etkileşimi.
(1)
İç güvenlik.
(1)
More
View All
Fewer
Collapse All
Material Type
Include
Exclude
Art Book
Book
E-Book
Shelf Location
Include
Exclude
Beytepe Art Collection
Beytepe General Collection
Electronic Library
Library
Include
Exclude
Beytepe Library
Online Library
false
{sortLabel}
{alphabetical}
{relevance}
{include}
{exclude}
{facetName}
{results}
{displayName}
{count}
{error}
Select an Action
Place Hold(s)
Add to My Lists
Email
Print
73 Results Found
1
..
3
4
5
6
7
Sort By:
Relevance (Default)
Publication Date (Ascending)
Publication Date (Descending)
Title
Author
0
DEFAULT
Select a list
Temporary List
Make this your default list.
The following items were successfully added.
There was an error while adding the following items. Please try again.
One or more items could not be added because you are not logged in.
73.
Criminology : a reader
Criminology : a reader
Author
Jewkes, Yvonne, 1966- ed. Letherby, Gayle, ed.
Preferred Shelf Number
HV 6025 C7455 2002
Format:
Availability
Beytepe Library~1
Available:
Copies:
Select an Action
Place Hold(s)
Add to My Lists
Email
Print
1
..
3
4
5
6
7