Giriş
|
Kütüphane Hesabım
|
Listelerim
|
|
Remember to clear the cache and close the browser window.
Search Limit
Tümü
E-Kitap
Dergiler
Beytepe Kütüphanesi
Sağlık Bilimleri Kütüphanesi
Konservatuvar Kütüphanesi
Hukuk Kütüphanesi
Sosyal Bilimler Meslek Yüksek Okulu
DVD Koleksiyonu
Prof.Dr. Onur Bilge Kula Koleksiyonu
Rooms Restriction Values
Tüm Alanlar
Başlık
Yazar
Konu
ISBN
ISSN
8
Search Field
Tüm Alanlar
Target Value
Limit Value
Restriction Value
Arama:
Gelişmiş Arama
Arama Sonuçlarını Sınırlandır
Daraltılmış:
+
Konu: Electronic books.
Yazar
Dahil
Hariç
Stamp, Mark.
(3)
Wiley InterScience (Online service)
(3)
Alder, Raven.
(2)
Cole, Eric.
(2)
Konheim, Alan G., 1934-
(2)
Long, Johnny.
(2)
Ring, Sandra.
(2)
Taylor and Francis.
(2)
Abbadi, Imad M., author.
(1)
Adams, Randee.
(1)
Ahmad, David R. Mirza.
(1)
Amini, Rob.
(1)
Andress, Jason.
(1)
Andrés, Steven.
(1)
Baskin, Brian.
(1)
Bauer, Eric.
(1)
Bayles, Aaron W.
(1)
Beale, Jay.
(1)
Brindley, Ed.
(1)
Brotby, W. Krag.
(1)
Burnett, Mark (Mark M.)
(1)
Craig, Paul.
(1)
Cross, Michael, 1965-
(1)
Danielyan, Edgar.
(1)
Davies, Joshua A. (Joshua Aaron)
(1)
Dorf, Richard C., author.
(1)
Dorf, Richard C., editor.
(1)
Douligeris, C. (Christos)
(1)
Dube, Roger.
(1)
Dubrawsky, Ido.
(1)
Fair, Ted.
(1)
Foster, James C.
(1)
Hancock, Bill, 1957-
(1)
Honick, Ron.
(1)
Hunter, Laura E.
(1)
Hurley, Chris.
(1)
IGI Global, publisher.
(1)
Institute of Electrical and Electronics Engineers.
(1)
Jacobs, Stuart.
(1)
Khan, Muhammad Salman, author.
(1)
Kissell, Joe.
(1)
Knipp, Eric.
(1)
Krause, Micki.
(1)
Lewis, T. G. (Theodore Gyle), 1941-
(1)
Low, Richard M., 1967-
(1)
Maynor, David.
(1)
Moeller, Robert R.
(1)
Mookhey, K. K.
(1)
Mullen, Timothy M.
(1)
Nordfelt, Michael.
(1)
Piltzecker, Tony, 1975-
(1)
Porter, Thomas.
(1)
Quigley, Marian.
(1)
Rima, Chris.
(1)
Rittinghouse, John W.
(1)
Rountree, Derrick.
(1)
Rozenblit, Moshe, 1944-
(1)
Russell, Ryan, 1969-
(1)
Shinder, Debra Littlejohn.
(1)
Simmons, Gustavus J.
(1)
Sisalem, Dorgham.
(1)
Snedaker, Susan.
(1)
Tipton, Harold F.
(1)
Tittel, Ed.
(1)
Touhill, C. J., 1938- author.
(1)
Touhill, Gregory J., author.
(1)
Ulsch, N. MacDonnell, 1951-
(1)
Vacca, John R.
(1)
Wall, David.
(1)
Wyler, Neil R.
(1)
XYPRO Technology Corporation.
(1)
Daha fazla
Tümünü genişlet
Daha az
Hepsini Daralt
Dil
Dahil
Hariç
English
(43)
Yayın Yılı
Dahil
Hariç
-
2006
(8)
2005
(7)
2007
(7)
2011
(4)
2014
(4)
2002
(3)
2004
(3)
2009
(3)
2010
(3)
2019
(2)
1992
(1)
2000
(1)
2003
(1)
2008
(1)
2012
(1)
2013
(1)
Daha fazla
Tümünü genişlet
Daha az
Hepsini Daralt
Konu
Dahil
Hariç
Computer security.
(30)
Computer networks -- Security measures.
(23)
Cryptography.
(4)
Computer crimes -- Prevention.
(3)
Computer hackers.
(3)
Data encryption (Computer science)
(3)
Data protection.
(3)
Information technology -- Security measures.
(3)
Cloud computing.
(2)
Computer crimes.
(2)
Electronic book collection.
(2)
Internet -- Security measures.
(2)
Acquisition of computer software.
(1)
Biomedical engineering.
(1)
Biosensing Techniques.
(1)
Biosensores.
(1)
Biosensors.
(1)
Business -- Data processing -- Security measures.
(1)
Business enterprises -- Computer networks -- Security measures.
(1)
COMPUTERS -- Computer Engineering.
(1)
COMPUTERS -- Hardware -- General.
(1)
COMPUTERS -- Internet -- Security.
(1)
COMPUTERS -- Machine Theory.
(1)
COMPUTERS -- Networking -- Security.
(1)
COMPUTERS -- Security -- General.
(1)
COMPUTERS / Software Development & Engineering / General.
(1)
Cisco Systems, Inc.
(1)
Civil defense -- United States.
(1)
Client/server computing -- Security measures.
(1)
Computabilidade e modelos de computacao.
(1)
Computer crimes -- Fiction.
(1)
Computer crimes -- Investigation -- Handbooks, manuals, etc.
(1)
Computer engineering.
(1)
Computer hackers -- Fiction.
(1)
Computer hackers -- Psychology -- Fiction.
(1)
Computer hackers -- Psychology.
(1)
Computer input-output equipment.
(1)
Computer networks -- Access control.
(1)
Computer networks -- Management.
(1)
Computer networks -- Security measures -- Handbooks, manuals, etc.
(1)
Computer networks -- Security measures -- United States.
(1)
Computer science.
(1)
Computer security -- Computer programs.
(1)
Computer security -- Data processing.
(1)
Computer security -- Equipment and supplies.
(1)
Computer security -- Fiction.
(1)
Computer security -- Handbooks, manuals, etc.
(1)
Computer security -- Management -- Handbooks, manuals, etc.
(1)
Computer security -- Management.
(1)
Computer security -- United States -- Planning.
(1)
Computer software -- Quality control.
(1)
Computer software -- Reliability.
(1)
Computers -- Access control.
(1)
Corporations -- Security measures.
(1)
Crisis management.
(1)
Cryptographie.
(1)
Data protection -- Handbooks, manuals, etc.
(1)
Database security.
(1)
Databescherming.
(1)
Digital electronics.
(1)
Electronic data processing departments -- Auditing.
(1)
Electronic data processing departments -- Security measures.
(1)
Electronics, Medical -- Instrumentation.
(1)
Electrónica médica.
(1)
Ethiek.
(1)
Forensic sciences -- Handbooks, manuals, etc.
(1)
Geheimschrift.
(1)
Génie logiciel.
(1)
Hashing (Computer science)
(1)
Hewlett-Packard computers -- Security measures.
(1)
Identity theft -- Fiction.
(1)
Identity theft.
(1)
Informatiebeleid.
(1)
Information resources management.
(1)
Information technology -- Auditing.
(1)
Information technology -- Moral and ethical aspects.
(1)
Information technology -- Social aspects.
(1)
Ingeniería biomédica.
(1)
Internet telephony -- Security measures.
(1)
Internet.
(1)
Mac OS.
(1)
Machine learning.
(1)
Macintosh (Computer) -- Programming.
(1)
Management information systems -- Security measures.
(1)
Medical electronics.
(1)
Microsoft Windows server.
(1)
Nanotechnology.
(1)
Open source software.
(1)
Operating systems (Computers)
(1)
Ordinateurs -- Accès -- Contrôle.
(1)
Ordinateurs -- Conception et construction.
(1)
Session Initiation Protocol (Computer network protocol)
(1)
Short stories.
(1)
Software engineering.
(1)
Spyware (Computer software)
(1)
Systèmes informatiques -- Mesures de sûreté.
(1)
Sécurité informatique.
(1)
TECHNOLOGY & ENGINEERING / Electronics / General.
(1)
TECHNOLOGY & ENGINEERING / Quality Control.
(1)
Technology -- Social aspects.
(1)
Telecommunication -- Security measures.
(1)
Telecommunication systems -- Security measures.
(1)
Telecommunication.
(1)
Terrorism -- Government policy -- United States.
(1)
Terrorism -- United States -- Prevention.
(1)
Télécommunications, Systèmes de -- Sécurité -- Mesures.
(1)
Veiligheidspolitiek.
(1)
Web services.
(1)
Web sites -- Security measures.
(1)
Wireless LANs.
(1)
Électronique numérique.
(1)
Daha fazla
Tümünü genişlet
Daha az
Hepsini Daralt
Materyal Türü
Dahil
Hariç
E-Kitap
Shelf Location
Dahil
Hariç
CRC Ekitapları
Elektronik Kütüphane
Kütüphane
Dahil
Hariç
Çevrimiçi Kütüphane
false
{sortLabel}
{alphabetical}
{relevance}
{include}
{exclude}
{facetName}
{results}
{displayName}
{count}
{error}
Eylem Seç
Ayırt
Listelerime ekle
Eposta
Yazdır
49 sonuç bulundu
1
2
3
4
5
Sıralama:
İlgiye Göre (Varsayılan)
Yıla Gore (Artan)
Yıla Gore (Azalan)
Başlık
Yazar
0
DEFAULT_TR
Liste seç
Geçici Liste
Bunu varsayılan liste yap.
Öğeler başarıyla eklendi
Öğeler eklenirken hata oldu. Lütfen tekrar deneyiniz.
One or more items could not be added because you are not logged in.
49.
Contemporary cryptology the science of information integrity
Contemporary cryptology the science of information integrity
Yazar
Simmons, Gustavus J. Institute of Electrical and Electronics Engineers.
Yer Numarası
ONLINE
Elektronik Erişim
IEEE Xplore
http://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=5265879
Format:
Durum
Çevrimiçi Kütüphane~1
Rafta:
Kopya:
Eylem Seç
Ayırt
Listelerime ekle
Eposta
Yazdır
1
2
3
4
5