Giriş
|
Kütüphane Hesabım
|
Listelerim
|
|
Remember to clear the cache and close the browser window.
Search Limit
Tümü
E-Kitap
Dergiler
Beytepe Kütüphanesi
Sağlık Bilimleri Kütüphanesi
Konservatuvar Kütüphanesi
Hukuk Kütüphanesi
Sosyal Bilimler Meslek Yüksek Okulu
DVD Koleksiyonu
Prof.Dr. Onur Bilge Kula Koleksiyonu
Rooms Restriction Values
Tüm Alanlar
Başlık
Yazar
Konu
ISBN
ISSN
8
Search Field
Tüm Alanlar
Target Value
Limit Value
Restriction Value
Arama:
Gelişmiş Arama
Arama Sonuçlarını Sınırlandır
Daraltılmış:
+
Konu: Computer security.
Yazar
Dahil
Hariç
Couretas, Jerry M., 1966- author.
(2)
Edwards, Jason (Cybersecurity expert), author.
(2)
John Wiley & Sons, publisher.
(2)
SpringerLink (Online service)
(2)
Weaver, Griffin, author.
(2)
Aden, Hartmut, editor.
(1)
Akila, M. editor
(1)
Anson, Steve.
(1)
Anwar, Waqar, author.
(1)
Arcuri, Jennifer, author.
(1)
Bahi, Jacques Mohcine., author.
(1)
Balamurugan, S. editor
(1)
Basta, Alfred, author.
(1)
Basta, Nadine, author.
(1)
Brooks, Charles J., author.
(1)
Brooks, Chuck (Writer of Inside cyber), author.
(1)
Carey, Marcus J. (Cybersecurity professional)
(1)
Carey, Marcus J. (Cybersecurity professional), author.
(1)
Cheng, Wei. author. (orcid)0000-0001-9433-7576
(1)
Choudhury, Tanupriya editor
(1)
Craig, Philip, author.
(1)
Domas, Christopher, author.
(1)
Domas, Stephanie, author.
(1)
Edwards, Jason, author.
(1)
Essar, Mohammad Ilyas, author.
(1)
Ghonge, Mangesh, 1984- editor.
(1)
Gregg, Michael (Michael C.)
(1)
Grimes, Roger A., author.
(1)
Gritzalis, Dimitris. editor.
(1)
Grow, Christopher, author.
(1)
Guilley, Sylvain. author. (orcid)0000-0002-5044-3534
(1)
Guyeux, Christophe.
(1)
Hadnagy, Christopher, author.
(1)
Hickey, Matthew (Computer security expert), author.
(1)
Hughes, Chris (Christopher Matthew), author.
(1)
IGI Global, publisher.
(1)
Information Resources Management Association, editor.
(1)
Islam, Ray (Mohammad Rubyet), author.
(1)
Jin, Jennifer, author.
(1)
Jin, Jennifer.
(1)
Kaur, Gagandeep, editor
(1)
Khan, Latifur.
(1)
Loiseau, Hugo, editor.
(1)
Maheswar, R. editor
(1)
Masud, Mehedy., author.
(1)
Moallem, Abbas, author.
(1)
Moschovitis, Christos J. P., author.
(1)
Nicastro, Felicia M., author.
(1)
Oriyano, Sean-Philip.
(1)
Rathaus, Noam
(1)
Rathaus, Noam.
(1)
Rathee, Geetanjali, editor
(1)
Reznik, Leonid, 1955- author.
(1)
Rioul, Olivier. author. (orcid)0000-0002-8681-8916
(1)
Robinson, Nikki, author.
(1)
ScienceDirect (Online service)
(1)
Short, Donald, author.
(1)
Sountharrajan, S. editor
(1)
Stergiopoulos, George. editor.
(1)
Tanner, Nadean H., author.
(1)
Theocharidou, Marianthi. editor. (orcid)0000-0002-8870-1746
(1)
Thuraisingham, Bhavani M.
(1)
Vemuri, V. Rao.
(1)
Ventre, Daniel, editor.
(1)
Zaidoun, Ameur Salem, author.
(1)
Årnes, André, 1976- editor.
(1)
Daha fazla
Tümünü genişlet
Daha az
Hepsini Daralt
Dil
Dahil
Hariç
English
(37)
Yayın Yılı
Dahil
Hariç
-
2025
(6)
2019
(4)
2020
(4)
2022
(4)
2024
(4)
2018
(3)
2007
(2)
2011
(2)
2017
(2)
2006
(1)
2012
(1)
2013
(1)
2021
(1)
2023
(1)
2026
(1)
Daha fazla
Tümünü genişlet
Daha az
Hepsini Daralt
Konu
Dahil
Hariç
Sécurité informatique.
(26)
Electronic books.
(15)
COMPUTERS.
(11)
Security.
(11)
Computer Security
(10)
Cryptography.
(10)
Computer networks -- Security measures.
(8)
Computer security
(7)
Networking.
(5)
Artificial intelligence.
(4)
Data protection.
(4)
Hacking.
(4)
Piratage informatique.
(4)
Réseaux d'ordinateurs -- Sécurité -- Mesures.
(4)
Computer networks -- Security measures
(3)
Hacking
(3)
Intelligence artificielle.
(3)
BUSINESS & ECONOMICS.
(2)
COMPUTERS -- Security -- General.
(2)
COMPUTERS -- Security -- Networking.
(2)
Computer crimes.
(2)
Cyberinfrastructure -- Security measures.
(2)
Machine learning.
(2)
Ordinateurs.
(2)
Protection de l'information (Informatique)
(2)
TECHNOLOGY & ENGINEERING.
(2)
Viruses & Malware.
(2)
5G mobile communication systems.
(1)
Affaires.
(1)
Application software.
(1)
Apprentissage automatique.
(1)
Architecture logicielle.
(1)
Artificial Intelligence
(1)
Assembly Language.
(1)
Bilgisayar ağları.
(1)
Business enterprises -- Computer networks -- Security measures.
(1)
Business enterprises -- Security measures
(1)
Business enterprises -- Security measures.
(1)
Business.
(1)
COMPUTERS -- Computer Simulation.
(1)
COMPUTERS -- Security -- Cryptography & Encryption.
(1)
COMPUTERS -- Security -- Cryptography.
(1)
COMPUTERS -- Security -- Network Security.
(1)
COMPUTERS / Networking / Security
(1)
Chaotic behavior in systems.
(1)
Coding and Information Theory.
(1)
Coding theory.
(1)
Communication électronique des pièces.
(1)
Communications mobiles 5G.
(1)
Computer Engineering.
(1)
Computer Simulation
(1)
Computer crimes -- Investigation
(1)
Computer crimes -- Investigation.
(1)
Computer crimes -- Prevention.
(1)
Computer hackers.
(1)
Computer science
(1)
Computer science.
(1)
Computer security -- Law and legislation
(1)
Computer security -- Management.
(1)
Computer simulation.
(1)
Computers
(1)
Computers & Information Technology.
(1)
Computers.
(1)
Confidentialité des données.
(1)
Criminalistique.
(1)
Criminalité informatique -- Enquêtes.
(1)
Cryptology.
(1)
Cyberinfrastructure
(1)
Cyberinfrastructure.
(1)
Cybernetics.
(1)
Cyberterrorism -- Prevention.
(1)
Data encryption (Computer science).
(1)
Data mining.
(1)
Data privacy.
(1)
Data protection
(1)
Data protection -- Law and legislation.
(1)
Digital forensic science
(1)
Digital forensic science.
(1)
Dynamics.
(1)
Electronic digital computers
(1)
Electronic digital computers.
(1)
Electronic discovery (Law)
(1)
Entreprises -- Sécurité -- Mesures.
(1)
Forensic sciences
(1)
Forensic sciences.
(1)
Hackers
(1)
Hackers.
(1)
Hacking -- Moral and ethical aspects.
(1)
Human-computer interaction
(1)
Human-computer interaction.
(1)
Industrial productivity -- Effect of technological innovations on.
(1)
Industries.
(1)
Industry 5.0 -- Security measures.
(1)
Information theory.
(1)
Informatique quantique.
(1)
Informatique.
(1)
Ingénierie sociale.
(1)
Innovations.
(1)
Insurance.
(1)
Internet -- Political aspects.
(1)
Livres numériques.
(1)
Logiciels libres.
(1)
MEDICAL -- Forensic Medicine.
(1)
Machine Learning
(1)
Materials Science.
(1)
Mobile & Wireless Communications.
(1)
Online Safety & Privacy.
(1)
Open source software.
(1)
Penetration testing (Computer security)
(1)
Piratage informatique -- Aspect moral.
(1)
Pirates informatiques.
(1)
Principles and Models of Security.
(1)
Privacy-preserving techniques (Computer science)
(1)
Programming Languages.
(1)
Programming.
(1)
Quantum computing.
(1)
Reverse engineering.
(1)
Risk Assessment & Management.
(1)
Rétro-ingénierie.
(1)
SOCIAL SCIENCE -- Anthropology -- General.
(1)
SOCIAL SCIENCE -- Regional Studies.
(1)
SOCIAL SCIENCE -- Sociology -- General.
(1)
Simulation par ordinateur.
(1)
Social engineering
(1)
Social engineering.
(1)
Software architecture.
(1)
System safety.
(1)
Sécurité informatique -- Gestion.
(1)
TECHNOLOGY / Engineering / General
(1)
Technological innovations.
(1)
Technologie de l'information.
(1)
Tests d'intrusion.
(1)
Transmission sans fil.
(1)
Wireless communication systems
(1)
Wireless communication systems.
(1)
X86 assembly language (Computer program language)
(1)
X86 assembly language (Langage de programmation)
(1)
business (commercial function)
(1)
computers.
(1)
e-books.
(1)
forensic science.
(1)
information technology.
(1)
simulation.
(1)
Daha fazla
Tümünü genişlet
Daha az
Hepsini Daralt
Materyal Türü
Dahil
Hariç
E-Kitap
Kitap
Shelf Location
Dahil
Hariç
1:SPRINGER
Beytepe Genel Koleksiyon
CRC Ekitapları
Elektronik Kütüphane
Taylor Francis E-Kitap Koleksiyonu
Wiley E-Kitap Koleksiyonu
Daha fazla
Tümünü genişlet
Daha az
Hepsini Daralt
Kütüphane
Dahil
Hariç
Beytepe Kütüphanesi
Çevrimiçi Kütüphane
false
{sortLabel}
{alphabetical}
{relevance}
{include}
{exclude}
{facetName}
{results}
{displayName}
{count}
{error}
Eylem Seç
Ayırt
Listelerime ekle
Eposta
Yazdır
37 sonuç bulundu
1
2
3
4
Sıralama:
İlgiye Göre (Varsayılan)
Yıla Gore (Artan)
Yıla Gore (Azalan)
Başlık
Yazar
0
DEFAULT_TR
Liste seç
Geçici Liste
Bunu varsayılan liste yap.
Öğeler başarıyla eklendi
Öğeler eklenirken hata oldu. Lütfen tekrar deneyiniz.
One or more items could not be added because you are not logged in.
37.
Enhancing computer security with smart technology
Enhancing computer security with smart technology
Yazar
Vemuri, V. Rao.
Yer Numarası
TK5105.59 .E62 2005
Elektronik Erişim
Click here to view.
Format:
Durum
Çevrimiçi Kütüphane~1
Rafta:
Kopya:
Eylem Seç
Ayırt
Listelerime ekle
Eposta
Yazdır
1
2
3
4