Skip to:
Search Results
|
Content
|
Bottom
|
Search Facets
Giriş
|
Kütüphane Hesabım
|
Listelerim
|
|
Remember to clear the cache and close the browser window.
Search Limit
Tümü
E-Kitap
Dergiler
Beytepe Kütüphanesi
Sağlık Bilimleri Kütüphanesi
Konservatuvar Kütüphanesi
Hukuk Kütüphanesi
Sosyal Bilimler Meslek Yüksek Okulu
DVD Koleksiyonu
Prof.Dr. Onur Bilge Kula Koleksiyonu
Rooms Restriction Values
Tüm Alanlar
Başlık
Yazar
Konu
ISBN
ISSN
13
Search Field
Tüm Alanlar
Target Value
Limit Value
Restriction Value
Arama:
Gelişmiş Arama
Arama Sonuçlarını Sınırlandır
Daraltılmış:
+
Subject: Computer Security
Yazar
Dahil
Hariç
Jin, Jennifer.
(2)
Anson, Steve.
(1)
Arcuri, Jennifer, author.
(1)
Bruen, Aiden A., 1941-
(1)
Carey, Marcus J. (Cybersecurity professional)
(1)
Carey, Marcus J. (Cybersecurity professional), author.
(1)
Chatterjee, Jyotir Moy, editor.
(1)
Dooley, Michael, 1962- author.
(1)
Forcinito, Mario, 1962-
(1)
Fréminville, Marie de, author.
(1)
Ghonge, Mangesh, 1984- editor.
(1)
Hickey, Matthew (Computer security expert), author.
(1)
Khari, Manju, editor.
(1)
Kumar, Raghvendra, 1987- editor.
(1)
Le, Dac-Nhuong, 1983- editor.
(1)
Miroshnikov, Andrei, author.
(1)
Mishra, Brojo Kishore, 1979- editor.
(1)
Quade, Phil.
(1)
Rooney, Timothy, 1962- author.
(1)
Schneier, Bruce, 1963- author.
(1)
Tanner, Nadean H., author.
(1)
Tounsi, Wiem, editor.
(1)
Daha fazla
Tümünü genişlet
Daha az
Hepsini Daralt
Dil
Dahil
Hariç
English
(14)
Yayın Yılı
Dahil
Hariç
-
2019
(5)
2020
(5)
2005
(1)
2017
(1)
2018
(1)
2022
(1)
Daha fazla
Tümünü genişlet
Daha az
Hepsini Daralt
Konu
Dahil
Hariç
Computer security.
(14)
Sécurité informatique.
(14)
Electronic books.
(11)
COMPUTERS.
(9)
Security.
(9)
Cryptography.
(7)
COMPUTERS -- Security -- General.
(6)
Computer networks -- Security measures
(4)
Computer networks -- Security measures.
(4)
Réseaux d'ordinateurs -- Sécurité -- Mesures.
(4)
COMPUTERS -- Security -- Cryptography & Encryption.
(3)
Computersicherheit
(2)
Hacking
(2)
Hacking.
(2)
Networking.
(2)
Penetration testing (Computer security)
(2)
Piratage informatique.
(2)
Tests d'intrusion.
(2)
31.48 calculus of variations.
(1)
53.71 information, communication and signal theories.
(1)
54.10 theoretical informatics.
(1)
Business -- Data processing -- Security measures
(1)
Business -- Data processing -- Security measures.
(1)
COMPUTERS -- Internet -- Security.
(1)
COMPUTERS -- Networking -- Security.
(1)
COMPUTERS -- Security -- Cryptography.
(1)
COMPUTERS -- Security -- Network Security.
(1)
COMPUTERS -- Security -- Networking.
(1)
COMPUTERS -- Security -- Online Safety & Privacy.
(1)
Client-Server Computing.
(1)
Cloud computing -- Security measures.
(1)
Computer security -- Management
(1)
Computer security -- Management.
(1)
Computers
(1)
Computers.
(1)
Computersicherheit -- Theoretische Informatik.
(1)
Criptologia.
(1)
Cryptographie.
(1)
Cryptography
(1)
Data protection.
(1)
Digital forensic science
(1)
Digital forensic science.
(1)
Electronic data processing -- Distributed processing -- Security measures
(1)
Electronic data processing -- Distributed processing -- Security measures.
(1)
Fehlerkorrekturcode
(1)
Fehlerkorrigierender Code.
(1)
Gestion -- Informatique -- Sécurité -- Mesures.
(1)
Hacking -- Moral and ethical aspects.
(1)
Infonuagique -- Sécurité -- Mesures.
(1)
Information technology -- Security measures -- Management.
(1)
Information theory.
(1)
Informationstheorie -- 0 Gesamtdarstellung.
(1)
Internet des objets -- Sécurité -- Mesures.
(1)
Internet domain names -- Security measures.
(1)
Internet of things -- Security measures.
(1)
Kryptologie
(1)
Kryptologie -- 0 Gesamtdarstellung.
(1)
Microsoft Windows (Computer file)
(1)
Online Safety & Privacy.
(1)
Optimization.
(1)
Ordinateurs.
(1)
Parallel processing (Electronic computers)
(1)
Parallel processing (Electronic computers) -- Security measures.
(1)
Piratage informatique -- Aspect moral.
(1)
Secret code.
(1)
Security systems
(1)
Security systems.
(1)
Systèmes de sécurité.
(1)
Systèmes de télécommunications -- Sécurité -- Mesures.
(1)
Systèmes de télécommunications.
(1)
Sécurité informatique -- Gestion.
(1)
TECHNOLOGY & ENGINEERING.
(1)
Technologie de l'information -- Sécurité -- Mesures -- Gestion.
(1)
Telecommunication systems
(1)
Telecommunication systems -- Security measures
(1)
Telecommunication systems -- Security measures.
(1)
Telecommunication systems.
(1)
Telecommunications.
(1)
Telekommunikation
(1)
Teoria da informação.
(1)
Theoretische Informatik -- Computersicherheit.
(1)
Traitement réparti -- Sécurité -- Mesures.
(1)
Viruses & Malware.
(1)
Daha fazla
Tümünü genişlet
Daha az
Hepsini Daralt
Materyal Türü
Dahil
Hariç
E-Kitap
Shelf Location
Dahil
Hariç
Wiley E-Kitap Koleksiyonu
Kütüphane
Dahil
Hariç
Çevrimiçi Kütüphane
false
{sortLabel}
{alphabetical}
{relevance}
{include}
{exclude}
{facetName}
{results}
{displayName}
{count}
{error}
Eylem Seç
Ayırt
Listelerime ekle
Eposta
Yazdır
14 sonuç bulundu
1
2
Sıralama:
İlgiye Göre (Varsayılan)
Yıla Gore (Artan)
Yıla Gore (Azalan)
Başlık
Yazar
00
DEFAULT_TR
Liste seç
Geçici Liste
Bunu varsayılan liste yap.
Öğeler başarıyla eklendi
Öğeler eklenirken hata oldu. Lütfen tekrar deneyiniz.
One or more items could not be added because you are not logged in.
13.
DNS security management
DNS security management
Yazar
Dooley, Michael, 1962- author. Rooney, Timothy, 1962- author.
Yer Numarası
QA76.9 .A25
Elektronik Erişim
https://onlinelibrary.wiley.com/doi/book/10.1002/9781119328292
Format:
Durum
Çevrimiçi Kütüphane~1
Rafta:
Kopya:
14.
Cryptography, information theory, and error-correction : a handbook for the 21st century
Cryptography, information theory, and error-correction : a handbook for the 21st century
Yazar
Bruen, Aiden A., 1941- Forcinito, Mario, 1962-
Yer Numarası
QA76.9 .A25 B79 2005
Elektronik Erişim
https://onlinelibrary.wiley.com/doi/book/10.1002/9781118033296
https://onlinelibrary.wiley.com/doi/book/10.1002/9781119582397
Format:
Durum
Çevrimiçi Kütüphane~1
Rafta:
Kopya:
Eylem Seç
Ayırt
Listelerime ekle
Eposta
Yazdır
1
2
Go to:
Search Results
|
Top of Page
|
Search Facets