Giriş
|
Kütüphane Hesabım
|
Listelerim
|
|
Remember to clear the cache and close the browser window.
Search Limit
Tümü
E-Kitap
Dergiler
Beytepe Kütüphanesi
Sağlık Bilimleri Kütüphanesi
Konservatuvar Kütüphanesi
Hukuk Kütüphanesi
Sosyal Bilimler Meslek Yüksek Okulu
DVD Koleksiyonu
Prof.Dr. Onur Bilge Kula Koleksiyonu
Rooms Restriction Values
Tüm Alanlar
Başlık
Yazar
Konu
ISBN
ISSN
8
Search Field
Tüm Alanlar
Target Value
Limit Value
Restriction Value
Arama:
Gelişmiş Arama
Arama Sonuçlarını Sınırlandır
Daraltılmış:
+
Konu: Computer security
Yazar
Dahil
Hariç
Agrawal, Akshat, 1986- editor.
(1)
Agrawal, Prateek, editor.
(1)
Akila, M. editor
(1)
Anand, R. S., author.
(1)
Dalipi, Fisnik, editor
(1)
David, Shiblin, author.
(1)
Duraklar, Kazım author.
(1)
Edwards, Jason, author.
(1)
Forno, Richard, author.
(1)
Grimes, Roger A., author.
(1)
Jeyakrishnan, V., author.
(1)
Kautish, Sandeep, 1981- editor.
(1)
Khatoun, Rida, author.
(1)
Mack, Sean D., author.
(1)
Madaan, Vishu, editor.
(1)
Maheswar, R. editor
(1)
Martiri, Edlira, editor
(1)
Mateczun, Laura, author.
(1)
Menon, Pranav, contributor.
(1)
Moyo, Siegfried, author.
(1)
Niranjanamurthy, M., author.
(1)
Norris, Donald F., author.
(1)
Poston, Howard E., III, author.
(1)
Rathee, Geetanjali, editor
(1)
Sharma, Anand, editor.
(1)
Sharma, Dilip Kumar, editor.
(1)
Sharma, Sanjay (Financial executive), author.
(1)
Sountharrajan, S. editor
(1)
Vajjhala, Narasimha, 1978- editor.
(1)
Daha fazla
Tümünü genişlet
Daha az
Hepsini Daralt
Dil
Dahil
Hariç
English
(13)
Yayın Yılı
Dahil
Hariç
-
2022
(5)
2025
(3)
2017
(1)
2020
(1)
2021
(1)
2023
(1)
2024
(1)
Daha fazla
Tümünü genişlet
Daha az
Hepsini Daralt
Konu
Dahil
Hariç
Computer security.
(11)
Electronic books.
(10)
Sécurité informatique.
(9)
COMPUTERS.
(8)
Security.
(8)
Networking.
(4)
Online Safety & Privacy.
(4)
Cryptography.
(3)
COMPUTERS / Internet / Online Safety & Privacy
(2)
COMPUTERS / Security / General
(2)
COMPUTERS / Security / Network Security
(2)
Causes & prevention of crime
(2)
Computer architecture & logic design
(2)
Computer networking & communications
(2)
Computer networks -- Security measures
(2)
Computer networks -- Security measures.
(2)
Criminology - legal aspects
(2)
Data protection
(2)
Legal aspects of IT
(2)
Réseaux d'ordinateurs -- Sécurité -- Mesures.
(2)
Security services
(2)
TECHNOLOGY & ENGINEERING.
(2)
Administration locale -- États-Unis.
(1)
Artificial intelligence.
(1)
BUSINESS & ECONOMICS -- Corporate Governance.
(1)
BUSINESS & ECONOMICS / Insurance / Risk Assessment & Management
(1)
BUSINESS & ECONOMICS.
(1)
Blockchains (Databases)
(1)
Business strategy
(1)
COMPUTERS -- Security -- General.
(1)
COMPUTERS / Security / Cryptography & Encryption
(1)
Chaînes de blocs.
(1)
Chiffrement (Informatique)
(1)
Cloud Computing.
(1)
Computer Science.
(1)
Computer crimes -- Risk assessment.
(1)
Computer security -- United States.
(1)
Criminalité informatique -- Évaluation du risque.
(1)
Cyberinfrastructure -- Security measures.
(1)
Data encryption (Computer science)
(1)
Data protection -- Law and legislation
(1)
Data protection -- Law and legislation -- European Union countries.
(1)
Data protection.
(1)
Digital communications -- Security measures.
(1)
Domotique -- Sécurité -- Mesures.
(1)
Dwellings -- Security measures
(1)
Dwellings -- Security measures.
(1)
Entrepreneurship.
(1)
European Parliament. General Data Protection Regulation.
(1)
European Union countries
(1)
Habitations -- Sécurité -- Mesures.
(1)
Hacking
(1)
Hacking.
(1)
Home automation -- Security measures.
(1)
Industrie 4.0.
(1)
Industry 4.0
(1)
Industry 4.0.
(1)
Internet -- Law and legislation.
(1)
Internet -- Security measures.
(1)
Internet -- Sécurité -- Mesures.
(1)
Internet des objets.
(1)
Internet of things
(1)
Internet of things.
(1)
LAW / Privacy
(1)
Law enforcement.
(1)
Leadership.
(1)
Local government
(1)
Local government -- United States.
(1)
Management information systems
(1)
Management information systems.
(1)
Micro-ordinateurs -- Accès -- Contrôle.
(1)
Microcomputers -- Access control
(1)
Microcomputers -- Access control.
(1)
Mobile & Wireless Communications.
(1)
Parlement européen. General Data Protection Regulation
(1)
Piratage informatique.
(1)
Police & security services
(1)
Police law & police procedures
(1)
Privacy, Right of
(1)
Protection de l'information (Informatique)
(1)
Protection de l'information (Informatique) -- Droit -- Pays de l'Union européenne.
(1)
Systèmes d'information de gestion.
(1)
Sécurité informatique -- États-Unis.
(1)
Telecommunications.
(1)
Transmission sans fil.
(1)
United States
(1)
Viruses & Malware.
(1)
Wireless communication systems
(1)
Wireless communication systems.
(1)
cybersecurity;threat intelligence;risk assessment;artificial intelligence
(1)
police;law enforcement;national security;cybersecurity;security technologies
(1)
Daha fazla
Tümünü genişlet
Daha az
Hepsini Daralt
Materyal Türü
Dahil
Hariç
E-Kitap
Shelf Location
Dahil
Hariç
Taylor Francis E-Kitap Koleksiyonu
Wiley E-Kitap Koleksiyonu
Kütüphane
Dahil
Hariç
Çevrimiçi Kütüphane
false
{sortLabel}
{alphabetical}
{relevance}
{include}
{exclude}
{facetName}
{results}
{displayName}
{count}
{error}
Eylem Seç
Ayırt
Listelerime ekle
Eposta
Yazdır
13 sonuç bulundu
1
2
Sıralama:
İlgiye Göre (Varsayılan)
Yıla Gore (Artan)
Yıla Gore (Azalan)
Başlık
Yazar
0
DEFAULT_TR
Liste seç
Geçici Liste
Bunu varsayılan liste yap.
Öğeler başarıyla eklendi
Öğeler eklenirken hata oldu. Lütfen tekrar deneyiniz.
One or more items could not be added because you are not logged in.
13.
Hacking the hacker : learn from the experts who take down hackers
Hacking the hacker : learn from the experts who take down hackers
Yazar
Grimes, Roger A., author.
Yer Numarası
QA76.9 .A25
Elektronik Erişim
https://onlinelibrary.wiley.com/doi/book/10.1002/9781119396260
Format:
Durum
Çevrimiçi Kütüphane~1
Rafta:
Kopya:
Eylem Seç
Ayırt
Listelerime ekle
Eposta
Yazdır
1
2