Giriş
|
Kütüphane Hesabım
|
Listelerim
|
|
Remember to clear the cache and close the browser window.
Search Limit
Tümü
E-Kitap
Dergiler
Beytepe Kütüphanesi
Sağlık Bilimleri Kütüphanesi
Konservatuvar Kütüphanesi
Hukuk Kütüphanesi
Sosyal Bilimler Meslek Yüksek Okulu
DVD Koleksiyonu
Prof.Dr. Onur Bilge Kula Koleksiyonu
Rooms Restriction Values
Tüm Alanlar
Başlık
Yazar
Konu
ISBN
ISSN
8
Search Field
Tüm Alanlar
Target Value
Limit Value
Restriction Value
Arama:
Gelişmiş Arama
Arama Sonuçlarını Sınırlandır
Daraltılmış:
+
Konu: Computer security.
Yazar
Dahil
Hariç
Edwards, Jason (Cybersecurity expert), author.
(2)
John Wiley & Sons, publisher.
(2)
Kissoon, Tara, author.
(2)
Peltier, Thomas R., author.
(2)
Abedin, Mohammad Zoynul, editor.
(1)
Anwar, Waqar, author.
(1)
Barkat, Abu, editor.
(1)
Basta, Alfred, author.
(1)
Basta, Nadine, author.
(1)
Bayuk, Jennifer L., author.
(1)
Blackley, John A.
(1)
Bowers, John R.
(1)
Carpenter, Perry, author.
(1)
Chapple, Mike, author.
(1)
Dalipi, Fisnik, editor
(1)
Davis, Robert E.
(1)
Dooley, Michael, 1962- author.
(1)
Dowland, Paul, editor.
(1)
Engel, Barak, author.
(1)
Essar, Mohammad Ilyas, author.
(1)
Fagan, Peter (Writer on computer security), author.
(1)
Held, Jonathan S., author.
(1)
Hill, David G. (David Gary), 1943, author.
(1)
Hughes, Chris (Christopher Matthew), author.
(1)
Hájek, Petr, editor.
(1)
Islam, Ray (Mohammad Rubyet), author.
(1)
Kabay, M. E.
(1)
Lambros, Kyriakos P., author.
(1)
Landoll, Douglas J., author.
(1)
Layton, Timothy P., author.
(1)
Lee, Yang-Im, author.
(1)
Martiri, Edlira, editor
(1)
McLaughlin, Kevin (Kevin Lynn), author.
(1)
Moschovitis, Christos J. P., author.
(1)
Moustafa, Nour, editor.
(1)
Moyo, Siegfried, author.
(1)
Peltier, Justin.
(1)
Peltier, Thomas R.
(1)
Robinson, Nikki, author.
(1)
Rooney, Timothy, 1962- author.
(1)
Shah, Kaushal, 1987- editor.
(1)
Sharp, Matthew K., author.
(1)
Shelley, Joe.
(1)
Singh, Tarnveer.
(1)
Stewart, James Michael.
(1)
Swanson, Charles (Chartered Security Professional), author.
(1)
Tanner, Nadean H., author.
(1)
Tiller, James S., author.
(1)
Tipton, Harold F.
(1)
Trim, Peter R. J., author.
(1)
Vajjhala, Narasimha, 1978- editor.
(1)
Weaver, Griffin, author.
(1)
Willett, Keith D., author.
(1)
Āhameda, Mahiuddina, editor.
(1)
Daha fazla
Tümünü genişlet
Daha az
Hepsini Daralt
Dil
Dahil
Hariç
English
(37)
Yayın Yılı
Dahil
Hariç
-
2024
(10)
2025
(7)
2022
(4)
2021
(3)
2005
(2)
2011
(2)
2017
(2)
2019
(2)
2001
(1)
2007
(1)
2008
(1)
2009
(1)
2023
(1)
Daha fazla
Tümünü genişlet
Daha az
Hepsini Daralt
Konu
Dahil
Hariç
Sécurité informatique.
(13)
Data protection.
(12)
Computer networks -- Security measures.
(11)
Electronic books.
(11)
COMPUTERS.
(10)
Security.
(10)
BUSINESS & ECONOMICS / Management
(6)
COMPUTERS / Networking / Security
(6)
Networking.
(6)
COMPUTERS / Security / General
(5)
Computer Security
(5)
Cryptography.
(5)
BUSINESS & ECONOMICS / Insurance / Risk Assessment & Management
(4)
BUSINESS & ECONOMICS / Production & Operations Management
(4)
Online Safety & Privacy.
(4)
Risk management.
(4)
BUSINESS & ECONOMICS / Information Management
(3)
BUSINESS & ECONOMICS.
(3)
Business enterprises -- Computer networks -- Security measures.
(3)
Computer crimes -- Prevention.
(3)
Protection de l'information (Informatique)
(3)
Risk assessment.
(3)
Réseaux d'ordinateurs -- Sécurité -- Mesures.
(3)
Viruses & Malware.
(3)
Artificial intelligence.
(2)
Business -- Data processing -- Security measures.
(2)
Business enterprises -- Security measures.
(2)
COMPUTERS -- Security -- General.
(2)
COMPUTERS / Cryptography
(2)
Chief information officers.
(2)
Computer networks -- Security measures
(2)
Computer security
(2)
Corporations -- Security measures.
(2)
Cyberinfrastructure -- Security measures.
(2)
Data protection
(2)
Information technology -- Management.
(2)
Auditing.
(1)
BUSINESS & ECONOMICS -- Production & Operations Management.
(1)
BUSINESS & ECONOMICS / Auditing
(1)
BUSINESS & ECONOMICS / Facility Management
(1)
BUSINESS & ECONOMICS / General
(1)
BUSINESS & ECONOMICS / Infrastructure
(1)
Blockchains (Databases)
(1)
Business -- Data processing.
(1)
Business enterprises -- Communication systems -- Management.
(1)
Business enterprises -- Data processing -- Security measures.
(1)
Business enterprises -- Security measures
(1)
Business intelligence.
(1)
Business strategy
(1)
COMPUTERS -- Information Technology.
(1)
COMPUTERS -- Operating Systems -- General.
(1)
COMPUTERS / Computer Engineering
(1)
COMPUTERS / Information Technology
(1)
COMPUTERS / Internet / Online Safety & Privacy
(1)
COMPUTERS / Security / Network Security
(1)
COMPUTERS / Social Aspects / Human-Computer Interaction
(1)
Causes & prevention of crime
(1)
Certification Guides.
(1)
Chefs des services de l'information.
(1)
Chief information officers
(1)
Computer architecture & logic design
(1)
Computer crimes -- Risk assessment.
(1)
Computer networking & communications
(1)
Computer security -- Management.
(1)
Computers -- Access control.
(1)
Confidential business information.
(1)
Criminalité informatique -- Évaluation du risque.
(1)
Criminology - legal aspects
(1)
Cybernetics.
(1)
Cyberterrorism -- Prevention.
(1)
Database security.
(1)
Electronic commerce -- Security measures.
(1)
Entrepreneurship.
(1)
Entreprises -- Informatique -- Sécurité -- Mesures.
(1)
Entreprises -- Sécurité -- Mesures.
(1)
Finance.
(1)
Financial Risk Management.
(1)
Information resources management.
(1)
Information technology -- Security measures.
(1)
Insurance.
(1)
Intelligence artificielle.
(1)
Internet domain names -- Security measures.
(1)
Leadership.
(1)
Legal aspects of IT
(1)
Logiciels libres.
(1)
Management information systems
(1)
Management information systems -- Security measures.
(1)
Management information systems.
(1)
Open source software.
(1)
Risk Assessment & Management.
(1)
Security services
(1)
Systèmes d'information de gestion -- Sécurité -- Mesures.
(1)
Systèmes d'information de gestion.
(1)
Sécurité informatique -- Gestion.
(1)
TECHNOLOGY & ENGINEERING.
(1)
TECHNOLOGY / Electronics / Digital
(1)
TECHNOLOGY / Operations Research
(1)
Telecommunications.
(1)
cybersecurity;threat intelligence;risk assessment;artificial intelligence
(1)
Daha fazla
Tümünü genişlet
Daha az
Hepsini Daralt
Materyal Türü
Dahil
Hariç
E-Kitap
Shelf Location
Dahil
Hariç
CRC Ekitapları
Taylor Francis E-Kitap Koleksiyonu
Wiley E-Kitap Koleksiyonu
Kütüphane
Dahil
Hariç
Çevrimiçi Kütüphane
false
{sortLabel}
{alphabetical}
{relevance}
{include}
{exclude}
{facetName}
{results}
{displayName}
{count}
{error}
Eylem Seç
Ayırt
Listelerime ekle
Eposta
Yazdır
37 sonuç bulundu
1
2
3
4
Sıralama:
İlgiye Göre (Varsayılan)
Yıla Gore (Artan)
Yıla Gore (Azalan)
Başlık
Yazar
0
DEFAULT_TR
Liste seç
Geçici Liste
Bunu varsayılan liste yap.
Öğeler başarıyla eklendi
Öğeler eklenirken hata oldu. Lütfen tekrar deneyiniz.
One or more items could not be added because you are not logged in.
37.
Securing e-business applications and communications
Securing e-business applications and communications
Yazar
Held, Jonathan S., author. Bowers, John R.
Yer Numarası
QA76.9 .A25 H435 2001
Elektronik Erişim
Click here to view.
Format:
Durum
Çevrimiçi Kütüphane~1
Rafta:
Kopya:
Eylem Seç
Ayırt
Listelerime ekle
Eposta
Yazdır
1
2
3
4