Giriş
|
Kütüphane Hesabım
|
Listelerim
|
|
Remember to clear the cache and close the browser window.
Search Limit
Tümü
E-Kitap
Dergiler
Beytepe Kütüphanesi
Sağlık Bilimleri Kütüphanesi
Konservatuvar Kütüphanesi
Hukuk Kütüphanesi
Sosyal Bilimler Meslek Yüksek Okulu
DVD Koleksiyonu
Prof.Dr. Onur Bilge Kula Koleksiyonu
Rooms Restriction Values
Tüm Alanlar
Başlık
Yazar
Konu
ISBN
ISSN
8
Search Field
Tüm Alanlar
Target Value
Limit Value
Restriction Value
Arama:
Gelişmiş Arama
Arama Sonuçlarını Sınırlandır
Yazar
Dahil
Hariç
SpringerLink (Online service)
(37)
ScienceDirect (Online service)
(12)
Kissoon, Tara, author.
(7)
Wiley InterScience (Online service)
(7)
Andress, Jason.
(5)
Cross, Michael, 1965-
(5)
Dubrawsky, Ido.
(5)
IGI Global, publisher.
(5)
Pathan, Al-Sakib Khan.
(4)
Project Muse.
(4)
Shimonski, Robert.
(4)
Tiller, James S., author.
(4)
Vacca, John R.
(4)
Alder, Raven.
(3)
Andress, Jason, author.
(3)
Baumrucker, C. Tate.
(3)
Das, Ravindra, author.
(3)
Elbahadır, Hamza.
(3)
Peltier, Thomas R., author.
(3)
Rittinghouse, John W.
(3)
Rogers, Russ.
(3)
Seidl, David, CISSP, author.
(3)
Shinder, Debra Littlejohn.
(3)
Singh, Pradeep Kumar. editor.
(3)
Stallings, William.
(3)
Syngress Media, Inc.
(3)
Wiles, Jack.
(3)
Akyıldız, M. Alparslan.
(2)
Anderson, Brian (Brian James)
(2)
Andreou, Kimon.
(2)
Baker, Andrew R.
(2)
Barber, Brian.
(2)
Beale, Jay.
(2)
Bhardwaj, Pawan K.
(2)
Bhateja, Vikrant. editor.
(2)
Bradley, Tony, 1969-
(2)
Brooks, R. R. (Richard R.), author.
(2)
Brotby, W. Krag., author.
(2)
Cameron, Rob.
(2)
Carafano, James Jay, 1955-
(2)
Carey, Marcus J. (Cybersecurity professional), author.
(2)
Carvey, Harlan A., author.
(2)
Chuvakin, Anton.
(2)
Cole, Eric.
(2)
Conrad, Eric, 1967-
(2)
DeFranco, Joanna F., author.
(2)
Durbha, Surya Srinivas, editor.
(2)
Dwivedi, Himanshu.
(2)
Esler, Joel.
(2)
Feldman, Joshua.
(2)
Ganzha, Maria. editor.
(2)
Gatford, Chris.
(2)
Gold, André.
(2)
Gregg, Michael (Michael C.)
(2)
Haines, Brad.
(2)
Harper, Allen.
(2)
Harris, Shon.
(2)
Hunter, Laura E.
(2)
Jhanjhi, Noor Zaman, 1972- editor.
(2)
John Wiley & Sons.
(2)
Khurana, Mehak, editor.
(2)
Kleiman, Dave.
(2)
Kohlenberg, Toby.
(2)
Kouns, Jake.
(2)
Lee, Yang-Im, author.
(2)
Liu, Dale.
(2)
Liu, Vincent.
(2)
Long, Johnny.
(2)
Mahajan, Shilpa, editor.
(2)
Malisow, Ben, author.
(2)
Manzuik, Steve.
(2)
Maxwell, Doug.
(2)
Maynor, David.
(2)
McClure, Stuart.
(2)
Meng, Weizhi. editor. (orcid)0000-0003-4384-5786
(2)
Messier, Ric, author.
(2)
Michalas, Antonis, editor.
(2)
Misenar, Seth.
(2)
Nagarhalli, Tatwadarshi P., editor.
(2)
Northcutt, Stephen.
(2)
Orebaugh, Angela.
(2)
Oriyano, Sean-Philip.
(2)
Piramuthu, Selwyn. editor.
(2)
Porter, Thomas, PhD.
(2)
Ranganathan, G. editor.
(2)
Ransome, James F.
(2)
Satyanarayana, Mahesh.
(2)
Scambray, Joel.
(2)
Seagren, Eric.
(2)
Shekokar, Narendra M., editor.
(2)
Shinder, Thomas W.
(2)
Snedaker, Susan.
(2)
Solomon, Michael G.
(2)
Tanwar, Sudeep. editor.
(2)
Trim, Peter R. J., author.
(2)
Vacca, John R., editor.
(2)
Vuppalapati, Chandrasekar. editor.
(2)
Wayner, Peter, 1964-
(2)
Weiss, Martin M.
(2)
Williams, Branden R.
(2)
Williams, Branden R., author.
(2)
Winterfeld, Steve.
(2)
Yang, Xin-She. editor.
(2)
Çontar, Furkan.
(2)
ACM SIGSAC New Security Paradigms Workshop (2001 : Cloudcroft, NM, USA)
(1)
Abassi, Ryma, 1980- editor.
(1)
Abdelhakim, Boudhir Anouar. editor. (orcid)0000-0003-4036-9956
(1)
Abdullah, Azween Bin, 1961- editor.
(1)
Abedin, Mohammad Zoynul, editor.
(1)
Abou El Houda, Zakaria, editor
(1)
Acquisti, Alessandro.
(1)
Adams, Niall M., 1968-
(1)
Adamson, James K.
(1)
Ahmad, Badlishah. editor.
(1)
Ahmad, David R. Mirza.
(1)
Ahmad, Shabeer (Electronics engineer), author.
(1)
Ajmera, Pawan K. editor.
(1)
Alapati, Sam R.
(1)
Alencar, Marcelo S., 1957- author.
(1)
Alexander, Tom.
(1)
Alexandrou, Alex (Professor of information technology security), author.
(1)
Allsopp, Wil, author.
(1)
Alpcan, Tansu.
(1)
Alpern, Naomi J.
(1)
Amini, Rob.
(1)
Amon, Cherie, ort. yaz.
(1)
Anand A., Jose, 1975- editor.
(1)
Andreasson, Kim J.
(1)
Andrés, Steven.
(1)
Ane, Bernadetta Kwintiana. editor.
(1)
Anson, Steve.
(1)
Antonucci, Domenic, author.
(1)
Anwar, Waqar, author.
(1)
Archibald, Neil.
(1)
Arcuri, Jennifer, author.
(1)
Arduin, Pierre-Emmanuel, author.
(1)
Arefin, Mohammad Shamsul, editor.
(1)
Artymiak, Jacek.
(1)
Ashbaugh, Douglas A., author.
(1)
Askarov, Aslan. editor.
(1)
Aspinwall, Jim.
(1)
Association for Computing Machinery. Special Interest Group on Security, Audit, and Control.
(1)
Austin, Greg, 1951- editor.
(1)
Babbin, Jacob.
(1)
Bacik, Sandy., author.
(1)
Badotra, Sumit, editor.
(1)
Bahadur, Gary.
(1)
Bakrī, Saʻd ʻAlī al-Ḥājj, editor
(1)
Balamurigan, A., editor.
(1)
Balasubramanian, R. editor.
(1)
Ballew, Joli.
(1)
Banda, Latha, 1983- editor.
(1)
Banoth, Rajkumar, author.
(1)
Bansal, Hari Om. editor.
(1)
Bansal, Ramesh C. editor. (orcid)0000-0002-1725-2648
(1)
Barnes, Christian.
(1)
Baskin, Brian, author.
(1)
Baskin, Brian.
(1)
Bassioni, Ghada. editor.
(1)
Basta, Alfred, author.
(1)
Basta, Nadine, author.
(1)
Başar, Tamer.
(1)
Beale, Jay
(1)
Behrens, Thorsten.
(1)
Beligiannis, Grigorios N. editor.
(1)
Ben Ahmed, Mohamed. editor.
(1)
Benarous, Leila.
(1)
Bendell, Dan.
(1)
Benmammar, Badr.
(1)
Bernik, Igor, author.
(1)
Berti, John.
(1)
Bhambri, Pankaj, editor.
(1)
Bhatia, Surbhi, 1988-
(1)
Bhattacharyya, Dhruba K., author.
(1)
Bhong, Shashikant S., author.
(1)
Bidgoli, Hossein, ed.
(1)
Bijalwan, Anchit, author.
(1)
Bilge, Alper.
(1)
Bindhu, V. editor.
(1)
Birkholz, Erik Pace.
(1)
Birrane, Edward J., author.
(1)
Bitam, Salim.
(1)
Blask, Chris.
(1)
Blazy, Olivier. editor. (orcid)0000-0001-6205-8249
(1)
Bodmer, Sean.
(1)
Bolt, Steven.
(1)
Borkin, Mike.
(1)
Boudriga, Noureddine.
(1)
Bowers, John R.
(1)
Brashars, Joshua.
(1)
Bray, Rory.
(1)
Brodsky, Jacob.
(1)
Brooks, Charles J., author.
(1)
Brown, David, 1954-
(1)
Brown, Edwin Lyle., author.
(1)
Brown, Jeffrey W., author.
(1)
Budaghyan, Lilya. editor.
(1)
Burnett, Mark M.
(1)
Burton, James.
(1)
Büyükgöze, Selma.
(1)
Daha fazla
Tümünü genişlet
Daha az
Hepsini Daralt
Dil
Dahil
Hariç
English
(498)
Turkish
(16)
Yayın Yılı
Dahil
Hariç
-
2011
(45)
2023
(42)
2022
(35)
2007
(34)
2019
(30)
2006
(25)
2012
(24)
2014
(24)
2004
(20)
2008
(19)
2010
(19)
2005
(18)
2020
(17)
2025
(17)
2017
(16)
2021
(16)
2002
(15)
2003
(15)
2013
(15)
2009
(13)
2018
(12)
2024
(12)
2016
(9)
2001
(8)
2015
(8)
2026
(8)
2000
(2)
1999
(1)
Daha fazla
Tümünü genişlet
Daha az
Hepsini Daralt
Konu
Dahil
Hariç
Computer networks -- Security measures.
(400)
Computer security.
(192)
Electronic books.
(44)
Data protection.
(41)
Computer networks -- Security measures
(28)
Réseaux d'ordinateurs -- Sécurité -- Mesures.
(28)
Artificial intelligence.
(27)
COMPUTERS / Networking / Security
(27)
COMPUTERS / Security / General
(26)
Business enterprises -- Computer networks -- Security measures.
(25)
Computer networks -- Security measures -- Examinations -- Study guides.
(24)
Internet -- Security measures.
(22)
Mobile and Network Security.
(22)
Bilgisayar ağları -- Güvenlik önlemleri.
(20)
COMPUTERS.
(19)
Computer crimes -- Prevention.
(19)
COMPUTERS / Internet / Security
(18)
Computers -- Access control.
(18)
Sécurité informatique.
(18)
Computational intelligence.
(17)
Computer hackers.
(17)
Firewalls (Computer security)
(17)
COMPUTERS / Cryptography
(15)
Computer security -- Examinations -- Study guides.
(14)
Information technology -- Security measures.
(14)
Penetration testing (Computer security)
(14)
Security.
(14)
COMPUTERS -- Security -- General.
(13)
Computer crimes.
(13)
Risk management.
(13)
Computer networks -- Security measures -- Examinations
(12)
Guides de l'étudiant.
(12)
Réseaux d'ordinateurs -- Sécurité -- Mesures -- Examens -- Guides de l'étudiant.
(12)
Study guides
(12)
Study guides.
(12)
Telecommunication.
(12)
examination study guides.
(12)
Communications Engineering, Networks.
(11)
Electronic data processing personnel -- Certification.
(11)
Computer Security
(10)
Computer crimes -- Investigation.
(10)
COMPUTERS / Computer Engineering
(9)
Electronic data processing personnel -- Certification
(9)
Networking.
(9)
Wireless communication systems -- Security measures.
(9)
Computer networks -- Access control.
(8)
Computer networks -- Management.
(8)
Computer security
(8)
Cryptography.
(8)
Data encryption (Computer science)
(8)
Data protection -- Standards.
(8)
Database security.
(8)
Machine learning.
(8)
Operating systems (Computers)
(8)
Web sites -- Security measures.
(8)
Computer communication systems.
(7)
Computer network protocols.
(7)
Computer networks -- Security measures -- Handbooks, manuals, etc.
(7)
Cyberspace -- Security measures.
(7)
Data and Information Security.
(7)
Electronic data processing personnel -- Certification -- Study guides.
(7)
Telecommunications engineers -- Certification
(7)
Application software.
(6)
Bilgisayar güvenliği.
(6)
COMPUTERS -- Networking -- Security.
(6)
COMPUTERS / Information Technology
(6)
Client/server computing.
(6)
Computer networks -- Security measures -- Computer programs.
(6)
Computer security -- Examinations
(6)
Computers.
(6)
Microsoft Windows (Computer file)
(6)
Sécurité informatique -- Examens -- Guides de l'étudiant.
(6)
Telecommunications engineers -- Certification.
(6)
BUSINESS & ECONOMICS / Management
(5)
Business -- Data processing -- Security measures.
(5)
Cloud computing -- Security measures.
(5)
Computer networks -- Security measures -- Testing.
(5)
Computer security -- Management.
(5)
Data encryption (Computer science).
(5)
Information technology -- Management.
(5)
Linux.
(5)
Open source software.
(5)
Signal processing.
(5)
Signal, Speech and Image Processing.
(5)
Viruses & Malware.
(5)
Behavioral cybersecurity.
(4)
Bilgisayar korsanları.
(4)
COMPUTERS -- Security -- Networking.
(4)
COMPUTERS -- Security -- Online Safety & Privacy.
(4)
COMPUTERS / Computer Science
(4)
COMPUTERS / Networking / General
(4)
Cloud Computing.
(4)
Computer security -- Case studies.
(4)
Computer security -- Handbooks, manuals, etc.
(4)
Computer viruses.
(4)
Corporations -- Security measures.
(4)
Credit cards.
(4)
Cyber intelligence (Computer security)
(4)
Database management.
(4)
Digital forensic science.
(4)
Electronic commerce -- Security measures.
(4)
Electronic data processing departments -- Security measures.
(4)
Information resources management.
(4)
Information warfare.
(4)
Intelligence artificielle.
(4)
Internet telephony -- Security measures.
(4)
Internet.
(4)
Malware (Computer software)
(4)
Microsoft Windows server.
(4)
Online Safety & Privacy.
(4)
Risk assessment.
(4)
Tests d'intrusion.
(4)
Wireless communication systems.
(4)
Ad hoc networks (Computer networks) -- Security measures.
(3)
Application software -- Development.
(3)
Artificial intelligence -- Industrial applications.
(3)
BUSINESS & ECONOMICS / Information Management
(3)
Bilgisayar ağları -- Güvenlik önlemleri.
(3)
Bilgisayar güvenliği
(3)
Business enterprises -- Computer networks.
(3)
Business enterprises -- Security measures.
(3)
Business information services -- Security measures.
(3)
COMPUTERS -- Information Technology.
(3)
COMPUTERS -- Internet -- Security.
(3)
COMPUTERS / Artificial Intelligence
(3)
COMPUTERS / Database Management / Data Mining
(3)
Chief information officers.
(3)
Computer Communication Networks.
(3)
Computer Security.
(3)
Computer crimes -- Investigation -- Methodology.
(3)
Computer networks -- Security measures -- Case studies.
(3)
Computer networks -- Security measures -- Examinations, questions, etc.
(3)
Computer networks -- Security measures -- Government policy.
(3)
Computer networks -- Security measures -- United States.
(3)
Computer networks -- Security measures.
(3)
Computer networks.
(3)
Computer science.
(3)
Computer security -- Computer programs.
(3)
Data mining.
(3)
Data protection
(3)
Electronic book collection.
(3)
Examinations
(3)
Extranets (Computer networks)
(3)
Game theory.
(3)
Hackers.
(3)
Hacking.
(3)
Industries -- Security measures.
(3)
Information storage and retrieval systems -- Security measures.
(3)
Internet of things -- Industrial applications.
(3)
Internet of things.
(3)
Liability for credit information.
(3)
Mac OS.
(3)
Machine learning -- Security measures.
(3)
Microsoft ISA server.
(3)
Microsoft Internet information server.
(3)
Protection de l'information (Informatique)
(3)
Routers (Computer networks)
(3)
Trust.
(3)
Web servers.
(3)
Administrative agencies -- Information resources management -- Security measures -- United States -- Examinations -- Study guides.
(2)
Application logging (Computer science)
(2)
Application software -- Security measures.
(2)
Apprentissage automatique.
(2)
Artificial intelligence
(2)
Automation.
(2)
BUSINESS & ECONOMICS / General
(2)
BUSINESS & ECONOMICS / Leadership
(2)
BUSINESS & ECONOMICS / Production & Operations Management
(2)
BUSINESS & ECONOMICS.
(2)
Biometric identification.
(2)
Blockchains (Databases)
(2)
Business enterprises -- Computer networks -- Security measures
(2)
COMPUTERS / Computer Architecture
(2)
COMPUTERS / Computer Graphics / Game Programming & Design
(2)
COMPUTERS / Computer Vision & Pattern Recognition
(2)
COMPUTERS / Cybernetics
(2)
COMPUTERS / Groupware
(2)
COMPUTERS / Internet / Application Development
(2)
COMPUTERS / Security / Viruses
(2)
COMPUTERS / Social Aspects / Human-Computer Interaction
(2)
Certification Guides.
(2)
Cisco IOS.
(2)
Client-Server Computing.
(2)
Cloud computing -- Security measures -- Examinations -- Study guides.
(2)
Cloud computing.
(2)
Coding theory.
(2)
Component software.
(2)
Computer architecture.
(2)
Computer crimes -- Case studies.
(2)
Computer networks -- Access control
(2)
Computer networks -- Reliability.
(2)
Computer networks -- Remote access.
(2)
Computer networks -- Security measures -- Congresses.
(2)
Computer networks -- Security measures -- Data processing.
(2)
Computer networks -- Security measures -- Evaluation.
(2)
Computer networks -- Security measures -- Software.
(2)
Computer networks -- Security measures -- Study and teaching.
(2)
Computer networks--Security measures.
(2)
Computer security -- Data processing.
(2)
Computer security -- Evaluation -- Methodology.
(2)
Daha fazla
Tümünü genişlet
Daha az
Hepsini Daralt
Materyal Türü
Dahil
Hariç
E-Kitap
Kitap
Shelf Location
Dahil
Hariç
Beytepe Genel Koleksiyon
CRC Ekitapları
Elektronik Kütüphane
Taylor Francis E-Kitap Koleksiyonu
Wiley E-Kitap Koleksiyonu
Kütüphane
Dahil
Hariç
Beytepe Kütüphanesi
Çevrimiçi Kütüphane
false
{sortLabel}
{alphabetical}
{relevance}
{include}
{exclude}
{facetName}
{results}
{displayName}
{count}
{error}
Eylem Seç
Ayırt
Listelerime ekle
Eposta
Yazdır
517 sonuç bulundu
1
..
40
41
42
43
44
Sıralama:
İlgiye Göre (Varsayılan)
Yıla Gore (Artan)
Yıla Gore (Azalan)
Başlık
Yazar
0
DEFAULT_TR
Liste seç
Geçici Liste
Bunu varsayılan liste yap.
Öğeler başarıyla eklendi
Öğeler eklenirken hata oldu. Lütfen tekrar deneyiniz.
One or more items could not be added because you are not logged in.
1.
Auditing IT infrastructures for compliance
Auditing IT infrastructures for compliance
Yazar
Weiss, Martin M. Solomon, Michael G.
Yer Numarası
QA76.9.A25 W428
Format:
Durum
Beytepe Kütüphanesi~1
Rafta:
Kopya:
Eylem Seç
Ayırt
Listelerime ekle
Eposta
Yazdır
1
..
40
41
42
43
44