Skip to:
Search Results
|
Content
|
Bottom
|
Search Facets
Giriş
|
Kütüphane Hesabım
|
Listelerim
|
|
Remember to clear the cache and close the browser window.
Search Limit
Tümü
E-Kitap
Dergiler
Beytepe Kütüphanesi
Sağlık Bilimleri Kütüphanesi
Konservatuvar Kütüphanesi
Hukuk Kütüphanesi
Sosyal Bilimler Meslek Yüksek Okulu
DVD Koleksiyonu
Prof.Dr. Onur Bilge Kula Koleksiyonu
Rooms Restriction Values
Tüm Alanlar
Başlık
Yazar
Konu
ISBN
ISSN
13
Search Field
Tüm Alanlar
Target Value
Limit Value
Restriction Value
Arama:
Gelişmiş Arama
Arama Sonuçlarını Sınırlandır
Daraltılmış:
+
Subject: Computer security.
Yazar
Dahil
Hariç
Edwards, Jason (Cybersecurity expert), author.
(2)
SpringerLink (Online service)
(2)
Weaver, Griffin, author.
(2)
Brown, Tracy Celaya, author.
(1)
Carpenter, Perry, author.
(1)
Chatterjee, Jyotir Moy, editor.
(1)
Couretas, Jerry M., 1966- author.
(1)
Dalziel, Henry, editor.
(1)
Erbacher, Robert F. editor.
(1)
Goucher, Wendy, author.
(1)
Herawan, Tutut. author.
(1)
John Wiley & Sons, publisher.
(1)
Khari, Manju, editor.
(1)
Kiah, Miss Laiha Mat. author.
(1)
Kott, Alexander. editor.
(1)
Kumar, Raghvendra, 1987- editor.
(1)
Le, Dac-Nhuong, 1983- editor.
(1)
Mishra, Brojo Kishore, 1979- editor.
(1)
Norman, Azah Anir. author.
(1)
Palanisamy, Rathika. author. (orcid)0000-0001-6495-1081
(1)
Peltier, Thomas R., author.
(1)
Tudor, Jan Killmeyer., author.
(1)
Wang, Cliff. editor.
(1)
Willson, David (Lawyer), author.
(1)
Winkler, Ira, author.
(1)
Zaidoun, Ameur Salem, author.
(1)
Årnes, André, 1976- editor.
(1)
Daha fazla
Tümünü genişlet
Daha az
Hepsini Daralt
Dil
Dahil
Hariç
English
(14)
Yayın Yılı
Dahil
Hariç
-
2018
(2)
2019
(2)
2022
(2)
2002
(1)
2006
(1)
2014
(1)
2016
(1)
2021
(1)
2024
(1)
2025
(1)
2026
(1)
Daha fazla
Tümünü genişlet
Daha az
Hepsini Daralt
Konu
Dahil
Hariç
Sécurité informatique.
(8)
Electronic books.
(5)
COMPUTERS.
(4)
Computer networks -- Security measures.
(4)
Computer Security
(3)
Computer security
(3)
Data protection.
(3)
Business enterprises -- Computer networks -- Security measures.
(2)
Computer networks -- Security measures
(2)
Networking.
(2)
Réseaux d'ordinateurs -- Sécurité -- Mesures.
(2)
Security.
(2)
BUSINESS & ECONOMICS -- Production & Operations Management.
(1)
Business enterprises -- Security measures
(1)
Business enterprises -- Security measures.
(1)
COMPUTERS -- Computer Simulation.
(1)
COMPUTERS -- Information Technology.
(1)
COMPUTERS -- Operating Systems -- General.
(1)
COMPUTERS -- Security -- General.
(1)
COMPUTERS / Internet / Security
(1)
COMPUTERS / Security / General
(1)
Client-Server Computing.
(1)
Communication électronique des pièces.
(1)
Computer Engineering.
(1)
Computer Simulation
(1)
Computer architecture.
(1)
Computer communication systems.
(1)
Computer crimes -- Investigation
(1)
Computer crimes -- Investigation.
(1)
Computer crimes -- Prevention.
(1)
Computer science
(1)
Computer science.
(1)
Computer simulation.
(1)
Confidentialité des données.
(1)
Corporations -- Security measures.
(1)
Criminalistique.
(1)
Criminalité informatique -- Enquêtes.
(1)
Cyberinfrastructure
(1)
Cyberinfrastructure.
(1)
Data Engineering.
(1)
Data and Information Security.
(1)
Data encryption (Computer science).
(1)
Data privacy.
(1)
Electronic data processing -- Distributed processing -- Security measures
(1)
Electronic data processing -- Distributed processing -- Security measures.
(1)
Electronic discovery (Law)
(1)
Engineering -- Data processing.
(1)
Entreprises -- Sécurité -- Mesures.
(1)
Forensic sciences
(1)
Forensic sciences.
(1)
Informatique.
(1)
MEDICAL -- Forensic Medicine.
(1)
Materials Science.
(1)
Mobile and Network Security.
(1)
Online Safety & Privacy.
(1)
Organizational behavior.
(1)
Parallel processing (Electronic computers)
(1)
Parallel processing (Electronic computers) -- Security measures.
(1)
Principles and Models of Security.
(1)
Privacy-preserving techniques (Computer science)
(1)
Programming.
(1)
Protection de l'information (Informatique)
(1)
Risk communication.
(1)
Risk perception.
(1)
Security Services.
(1)
Simulation par ordinateur.
(1)
TECHNOLOGY & ENGINEERING.
(1)
Traitement réparti -- Sécurité -- Mesures.
(1)
Viruses & Malware.
(1)
forensic science.
(1)
simulation.
(1)
Daha fazla
Tümünü genişlet
Daha az
Hepsini Daralt
Materyal Türü
Dahil
Hariç
E-Kitap
Shelf Location
Dahil
Hariç
1:SPRINGER
CRC Ekitapları
Elektronik Kütüphane
Taylor Francis E-Kitap Koleksiyonu
Wiley E-Kitap Koleksiyonu
Kütüphane
Dahil
Hariç
Çevrimiçi Kütüphane
false
{sortLabel}
{alphabetical}
{relevance}
{include}
{exclude}
{facetName}
{results}
{displayName}
{count}
{error}
Eylem Seç
Ayırt
Listelerime ekle
Eposta
Yazdır
14 sonuç bulundu
1
2
Sıralama:
İlgiye Göre (Varsayılan)
Yıla Gore (Artan)
Yıla Gore (Azalan)
Başlık
Yazar
00
DEFAULT_TR
Liste seç
Geçici Liste
Bunu varsayılan liste yap.
Öğeler başarıyla eklendi
Öğeler eklenirken hata oldu. Lütfen tekrar deneyiniz.
One or more items could not be added because you are not logged in.
13.
Information security architecture : an integrated approach to security in the organization
Information security architecture : an integrated approach to security in the organization
Yazar
Tudor, Jan Killmeyer., author.
Yer Numarası
QA76.9 .A25 T83 2006
Elektronik Erişim
Click here to view.
Format:
Durum
Çevrimiçi Kütüphane~1
Rafta:
Kopya:
14.
Information security policies, procedures, and standards : guidelines for effective information security management
Information security policies, procedures, and standards : guidelines for effective information security management
Yazar
Peltier, Thomas R., author.
Yer Numarası
QA76.9 .A25 P46 2002
Elektronik Erişim
Click here to view.
Format:
Durum
Çevrimiçi Kütüphane~1
Rafta:
Kopya:
Eylem Seç
Ayırt
Listelerime ekle
Eposta
Yazdır
1
2
Go to:
Search Results
|
Top of Page
|
Search Facets