Giriş
|
Kütüphane Hesabım
|
Listelerim
|
|
Remember to clear the cache and close the browser window.
Search Limit
Tümü
E-Kitap
Dergiler
Beytepe Kütüphanesi
Sağlık Bilimleri Kütüphanesi
Konservatuvar Kütüphanesi
Hukuk Kütüphanesi
Sosyal Bilimler Meslek Yüksek Okulu
DVD Koleksiyonu
Prof.Dr. Onur Bilge Kula Koleksiyonu
Rooms Restriction Values
Tüm Alanlar
Başlık
Yazar
Konu
ISBN
ISSN
8
Search Field
Tüm Alanlar
Target Value
Limit Value
Restriction Value
Arama:
Gelişmiş Arama
Arama Sonuçlarını Sınırlandır
Daraltılmış:
+
Konu: COMPUTERS / Networking / Security
Yazar
Dahil
Hariç
Das, Ravindra, author.
(4)
Ahmed, Mohiuddin (Computer scientist), editor.
(2)
Maleh, Yassine, 1987- editor.
(2)
Pathan, Al-Sakib Khan.
(2)
Abbasi, Waseem, editor.
(1)
Abou El Houda, Zakaria.
(1)
Abraham, Ajith, 1968- editor.
(1)
Adamson, James K.
(1)
Ahmad, Shabeer (Electronics engineer), author.
(1)
Akgün, Abdullah Talip.
(1)
Alam, Bashir, editor.
(1)
Alam, Mansaf, editor.
(1)
Alazab, Mamoun, 1980- editor.
(1)
Ali, Atif.
(1)
Andreu, Andres, 1968- author.
(1)
Arif, Muhammad (Computer scientist), editor.
(1)
Arockiam, Daniel, editor.
(1)
Asare, Felix Kyei, author.
(1)
Ashbourn, Julian, 1952- author.
(1)
Baddi, Youssef, editor.
(1)
Balas, Valentina Emilia.
(1)
Behal, Sunny, editor.
(1)
Bhandari, Abhinav, editor.
(1)
Bhardwaj, Akashdeep, 1971-
(1)
Bhardwaj, Akashdeep.
(1)
Bhatia, Komal, 1979- editor.
(1)
Bhatia, Sajal, editor.
(1)
Bhatia, Surbhi, 1988-
(1)
Bhatti, Baber Majid.
(1)
Brathwaite, Shimon, author.
(1)
Chaki, Rituparna.
(1)
Chaudry, Kiren, editor.
(1)
Cotton, Chase, author.
(1)
Dahiya, Susheela, editor.
(1)
Davis, Robert E.
(1)
Desalegn, Wendwossen, author.
(1)
Dhanaraj, Rajesh Kumar, editor.
(1)
Dowland, Paul, editor.
(1)
Durbha, Surya Srinivas, editor.
(1)
Dwivedi, Rinky, editor.
(1)
Engel, Barak.
(1)
Fagan, Peter (Writer on computer security), author.
(1)
Fowler, Bradley, 1968- author.
(1)
Geman, Oana, editor.
(1)
Goyal, K. K. (Krishan Kumar), editor.
(1)
Gupta, Brij, 1982- author.
(1)
Gupta, Koyel Datta, editor.
(1)
Hei, Xiali, editor.
(1)
Hu, Fei, 1972- editor.
(1)
Ijaz, Muhammad Fazal.
(1)
Imran Tariq, Muhammad.
(1)
Jaffar, M. Arfan, editor.
(1)
Jeyanthi, N., 1977- author.
(1)
Kabay, M. E.
(1)
Kantzavelou, Ioanna, editor.
(1)
Kaushik, Keshav, editor.
(1)
Khan, Inam Ullah.
(1)
Khan, Rijwan, 1981- editor.
(1)
Khurana, Mehak, editor.
(1)
King, Steve (Cybersecurity expert), author.
(1)
Kissoon, Tara, author.
(1)
Kohnke, Anne, author.
(1)
Kshetri, Naresh, editor.
(1)
Kudrati, Abbas, author.
(1)
Kumar, A. Suresh, editor.
(1)
Kumar, Vinod (Professor of electronics and communication), editor.
(1)
Kumaraswamy, Subra.
(1)
Kurasinski, Artur, author.
(1)
Küfeoğlu, Sinan.
(1)
Landoll, Douglas J., author.
(1)
Latif, Shahed.
(1)
Le, Dac-Nhuong, 1983-
(1)
Liu, Ren Ping.
(1)
Ma, Baihe.
(1)
Ma, Kun (Computer scientist), author.
(1)
Maglaras, Leandros, editor.
(1)
Mahajan, Shilpa, editor.
(1)
Maimon, David, 1978- author.
(1)
Mamta, author.
(1)
Mangla, Monika, editor.
(1)
Mangrulkar, Ramchandra, editor.
(1)
Maranga, Kennedy M., 1965- author.
(1)
Martin, David X., author.
(1)
Mather, Tim.
(1)
McLaughlin, Kevin (Kevin Lynn), author.
(1)
Melone, Michael, author.
(1)
Michalas, Antonis, editor.
(1)
Moallem, Abbas, author.
(1)
Moseley, Ralph, author.
(1)
Mounir, Soufyane, editor.
(1)
Murugan, Thangavel, 1989- editor.
(1)
Nagarhalli, Tatwadarshi P., editor.
(1)
Ni, Wei.
(1)
Okereafor, Kenneth.
(1)
Olejnik, Lukasz, author.
(1)
Ouaissa, Mariya.
(1)
Ouaissa, Mariyam.
(1)
Pal, Om, editor.
(1)
Pandey, Bishwajeet, author.
(1)
Pandey, Purnendu Shekhar, editor.
(1)
Perumal, Thinagaran, author.
(1)
Pillai, Binil, author.
(1)
Pomerleau, Pierre-Luc, author.
(1)
Pramanik, Sabyasachi, 1978-
(1)
Priyadarshini, Ishaani, 1992- author.
(1)
Priyadarshini, Ishaani, 1992- editor.
(1)
Raj, Balwinder.
(1)
Roy, Debdutta Barman.
(1)
Samandari, Amelia, editor.
(1)
Shaikh, Javed, author.
(1)
Sharma, Anand.
(1)
Sharma, Deepak Kumar, editor.
(1)
Sharma, Rohit, editor.
(1)
Sharma, Uzzal, editor.
(1)
Shekokar, Narendra M., editor.
(1)
Shin, Bongsik, author.
(1)
Shoemaker, Dan, author.
(1)
Sigler, Kenneth, author.
(1)
Singh, Arun Kumar.
(1)
Soni, Arun.
(1)
Stapleton, Jeffrey James, author.
(1)
Strang, Kenneth David, 1962- editor.
(1)
Tang, Alan, (Information Security), author.
(1)
Tang, Alan.
(1)
Tanwar, Rohit, editor.
(1)
Taye, Bayisa, author.
(1)
Tayyaba, Shahzadi.
(1)
Thakur, Kutub.
(1)
Thandeeswaran, N., author.
(1)
Tyagi, Amit Kumar, 1988- editor.
(1)
Vajjhala, Narasimha, 1978- editor.
(1)
Vasudevan, Hari (Engineer), editor.
(1)
Verma, Abhishek, editor.
(1)
W., Jaisingh, 1978- editor.
(1)
Wang, Xu.
(1)
Williams, Branden R., author.
(1)
Williams, Walter (Telecommunications engineer), author.
(1)
Wingreen, Stephen C., editor.
(1)
Wu, Yulei, editor.
(1)
Zaydi, Mounia, editor.
(1)
Daha fazla
Tümünü genişlet
Daha az
Hepsini Daralt
Dil
Dahil
Hariç
English
(73)
Yayın Yılı
Dahil
Hariç
-
2022
(19)
2021
(14)
2023
(14)
2025
(12)
2024
(11)
2020
(2)
2009
(1)
Daha fazla
Tümünü genişlet
Daha az
Hepsini Daralt
Konu
Dahil
Hariç
Computer security.
(44)
COMPUTERS / Security / General
(31)
COMPUTERS / Cryptography
(23)
COMPUTERS / Internet / Security
(22)
Computer networks -- Security measures.
(21)
BUSINESS & ECONOMICS / Management
(6)
COMPUTERS / Security / Viruses
(5)
COMPUTERS / Artificial Intelligence
(4)
COMPUTERS / Computer Engineering
(4)
COMPUTERS / Networking / General
(4)
Computer crimes -- Prevention.
(4)
Data protection.
(4)
Internet -- Security measures.
(3)
LAW / Privacy
(3)
Artificial intelligence.
(2)
BUSINESS & ECONOMICS / Production & Operations Management
(2)
Blockchains (Databases)
(2)
Business enterprises -- Computer networks -- Security measures.
(2)
COMPUTERS / Data Processing / General
(2)
Cloud computing -- Security measures.
(2)
Computational intelligence.
(2)
Computer networks -- Management.
(2)
Computer security -- Case studies.
(2)
Computer security -- Data processing.
(2)
Computer security -- Law and legislation -- United States.
(2)
Computer security -- Management.
(2)
Cyberspace -- Security measures.
(2)
Internet of things.
(2)
Machine learning -- Industrial applications.
(2)
TECHNOLOGY / Manufacturing
(2)
Trust.
(2)
Activity programs in education.
(1)
Agile software development.
(1)
Artificial intelligence -- Industrial applications.
(1)
Artificial intelligence -- Medical applications.
(1)
Auditing.
(1)
Authentication.
(1)
BUSINESS & ECONOMICS / Auditing
(1)
BUSINESS & ECONOMICS / Insurance / Risk Assessment & Management
(1)
BUSINESS & ECONOMICS / Leadership
(1)
BUSINESS & ECONOMICS / Management Science
(1)
Big data.
(1)
Blockchains (Databases) -- Industrial applications.
(1)
Blockchains (Databases) -- Security measures.
(1)
Business -- Data processing -- Security measures.
(1)
Business -- Data processing.
(1)
Business information services -- Security measures.
(1)
Business intelligence -- Risk assessment.
(1)
COMPUTERS / Computer Architecture
(1)
COMPUTERS / Computer Vision & Pattern Recognition
(1)
COMPUTERS / Database Management / Data Mining
(1)
COMPUTERS / Disaster Recovery
(1)
COMPUTERS / Hardware / General
(1)
COMPUTERS / Hardware / Network Hardware
(1)
COMPUTERS / Management Information Systems
(1)
COMPUTERS / Networking / Network Protocols
(1)
COMPUTERS / Programming / Systems Analysis & Design
(1)
COMPUTERS / Social Aspects / Human-Computer Interaction
(1)
COVID-19 Pandemic, 2020-
(1)
COVID-19 Pandemic, 2020- -- Economic aspects.
(1)
COVID-19 Pandemic, 2020- -- European Union countries.
(1)
COVID-19 Pandemic, 2020- -- United States.
(1)
Chief information officers.
(1)
Classroom learning centers.
(1)
Cloud Computing.
(1)
Cloud computing / Security measures.
(1)
Commercial crimes -- Law and legislation.
(1)
Comptuter networks -- Security measures.
(1)
Computer crimes -- Investigation -- India -- Case studies.
(1)
Computer crimes -- Investigation.
(1)
Computer networks -- Environmental aspects.
(1)
Computer networks -- Security measures -- Data processing.
(1)
Computer networks -- Security measures -- Government policy.
(1)
Computer networks -- Security measures -- Management.
(1)
Computer networks -- Security measures -- Study and teaching.
(1)
Computer networks / Security measures.
(1)
Computer security -- Examinations, questions, etc.
(1)
Computer security -- Government policy -- United States.
(1)
Computer security -- Government policy.
(1)
Computer security -- India -- Case studies.
(1)
Computer security -- Law and legislation -- European Union countries.
(1)
Computer security -- Law and legislation.
(1)
Computer security -- Moral and ethical aspects.
(1)
Computer security -- Political aspects.
(1)
Computer security -- Social aspects.
(1)
Computer security -- Study and teaching.
(1)
Computer security -- Technologial innovations.
(1)
Computer security -- Technological innovations.
(1)
Computer security -- Vocational guidance.
(1)
Computer software -- Development.
(1)
Computersicherheit.
(1)
Cooperating objects (Computer systems)
(1)
Credit cards -- Security measures.
(1)
Cyber intelligence (Computer security)
(1)
Cyberspace -- Security measures -- European Union countries.
(1)
Cyberspace -- Security measures -- United States.
(1)
Cyberterrorism -- Prevention.
(1)
Cyberterrorism -- Simulation methods.
(1)
Data encryption (Computer science)
(1)
Data mining.
(1)
Data privacy -- Case studies.
(1)
Data privacy -- European Union countries.
(1)
Data privacy -- United States.
(1)
Data protection -- Law and legislation -- European Union countries.
(1)
Data protection -- Law and legislation -- United States.
(1)
Data protection -- Standards.
(1)
Decision making.
(1)
Deep learning (Machine learning) -- Security measures.
(1)
Digital forensic science -- India -- Case studies.
(1)
EDUCATION / Computers & Technology
(1)
Edge computing.
(1)
Education -- Data processing.
(1)
Electronic data processing -- Distriuted processing.
(1)
Emergency management.
(1)
European Parliament. General Data Protection Regulation.
(1)
Hacking -- Prevention.
(1)
Heterogeneous distributed computing systems.
(1)
Information technology -- Management.
(1)
Information technology -- Security measures.
(1)
Internet of things -- Security measures.
(1)
Internet users -- Identification.
(1)
MEDICAL / Infectious Diseases
(1)
Machine learning -- Security measures.
(1)
Management.
(1)
Medicine -- Data processing.
(1)
Nanoelectronics.
(1)
Online social networks -- Security measures.
(1)
POLITICAL SCIENCE / Public Policy / General
(1)
Phishing -- Prevention.
(1)
Privacy, Right of.
(1)
Public key infrastructure (Computer security)
(1)
Risk assessment.
(1)
Risk management.
(1)
Security systems -- Design and construction.
(1)
Sicherheitsmassnahme.
(1)
Software-defined networking (Computer network technology) -- Security measures.
(1)
Sustainable development.
(1)
TECHNOLOGY / Engineering / General
(1)
TECHNOLOGY / Nanotechnology
(1)
TECHNOLOGY / Operations Research
(1)
Ubiquitous computing.
(1)
Daha fazla
Tümünü genişlet
Daha az
Hepsini Daralt
Materyal Türü
Dahil
Hariç
E-Kitap
Shelf Location
Dahil
Hariç
Elektronik Kütüphane
Taylor Francis E-Kitap Koleksiyonu
Kütüphane
Dahil
Hariç
Çevrimiçi Kütüphane
false
{sortLabel}
{alphabetical}
{relevance}
{include}
{exclude}
{facetName}
{results}
{displayName}
{count}
{error}
Eylem Seç
Ayırt
Listelerime ekle
Eposta
Yazdır
73 sonuç bulundu
1
..
3
4
5
6
7
Sıralama:
İlgiye Göre (Varsayılan)
Yıla Gore (Artan)
Yıla Gore (Azalan)
Başlık
Yazar
0
DEFAULT_TR
Liste seç
Geçici Liste
Bunu varsayılan liste yap.
Öğeler başarıyla eklendi
Öğeler eklenirken hata oldu. Lütfen tekrar deneyiniz.
One or more items could not be added because you are not logged in.
73.
Cloud security and privacy
Cloud security and privacy
Yazar
Mather, Tim. Kumaraswamy, Subra. Latif, Shahed.
Yer Numarası
ONLINE
Elektronik Erişim
EBSCOhost
http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=414816
Format:
Durum
Çevrimiçi Kütüphane~1
Rafta:
Kopya:
Eylem Seç
Ayırt
Listelerime ekle
Eposta
Yazdır
1
..
3
4
5
6
7