Giriş
|
Kütüphane Hesabım
|
Listelerim
|
|
Remember to clear the cache and close the browser window.
Search Limit
Tümü
E-Kitap
Dergiler
Beytepe Kütüphanesi
Sağlık Bilimleri Kütüphanesi
Konservatuvar Kütüphanesi
Hukuk Kütüphanesi
Sosyal Bilimler Meslek Yüksek Okulu
DVD Koleksiyonu
Prof.Dr. Onur Bilge Kula Koleksiyonu
Rooms Restriction Values
Tüm Alanlar
Başlık
Yazar
Konu
ISBN
ISSN
8
Search Field
Tüm Alanlar
Target Value
Limit Value
Restriction Value
Arama:
Gelişmiş Arama
Arama Sonuçlarını Sınırlandır
Yazar
Dahil
Hariç
Carey, Marcus J. (Cybersecurity professional), author.
(3)
Jin, Jennifer, author.
(2)
Jin, Jennifer.
(2)
Taylor and Francis.
(2)
Arun, Jai Singh, author.
(1)
Bray, Shannon, 1972-
(1)
Carey, Marcus J. (Cybersecurity professional)
(1)
Diffie, Whitfield, writer of foreword.
(1)
Duraklar, Kazım author.
(1)
Fréminville, Marie de, author.
(1)
Harishankar, Ray, author.
(1)
Kahn, David, eauthor.
(1)
Katz, Jonathan, author.
(1)
Knight, Alissa, author.
(1)
Menezes, Alfred J., author.
(1)
Mondal, Bhaskar, editor.
(1)
Quade, Phil.
(1)
Rajput, Shyam Singh, editor.
(1)
Rjaibi, Walid, author.
(1)
Vanstone, Scott A., author.
(1)
van Oorschot, Paul C., author.
(1)
Daha fazla
Tümünü genişlet
Daha az
Hepsini Daralt
Dil
Dahil
Hariç
English
(13)
Yayın Yılı
Dahil
Hariç
-
2020
(5)
2019
(3)
2025
(2)
1997
(1)
2014
(1)
2018
(1)
2026
(1)
Daha fazla
Tümünü genişlet
Daha az
Hepsini Daralt
Konu
Dahil
Hariç
Cryptography.
(11)
Electronic books.
(9)
Security.
(8)
Computer security.
(7)
Sécurité informatique.
(6)
COMPUTERS -- Security -- Cryptography & Encryption.
(5)
COMPUTERS.
(5)
COMPUTERS -- Security -- Cryptography.
(4)
Computer Security
(4)
Computer security
(3)
Computers
(3)
Computers.
(3)
Ordinateurs.
(3)
COMPUTERS / Internet / Online Safety & Privacy
(2)
COMPUTERS / Security / Cryptography & Encryption
(2)
COMPUTERS / Security / Network Security
(2)
Computer networks -- Security measures
(2)
Computer networks -- Security measures.
(2)
Electronic digital computers
(2)
Electronic digital computers.
(2)
Penetration testing (Computer security)
(2)
Réseaux d'ordinateurs -- Sécurité -- Mesures.
(2)
Tests d'intrusion.
(2)
Automated vehicles
(1)
Automated vehicles -- Security measures.
(1)
Automated vehicles.
(1)
Business -- Data processing -- Security measures
(1)
Business -- Data processing -- Security measures.
(1)
Business enterprises -- Security measures
(1)
Business enterprises -- Security measures.
(1)
COMPUTERS / Interactive & Multimedia
(1)
COMPUTERS / Operating Systems / General.
(1)
COMPUTERS / Security / Cryptography.
(1)
COMPUTERS / Security / General
(1)
COMPUTERS / Security / General.
(1)
COMPUTERS / Security / Viruses & Malware
(1)
Causes & prevention of crime
(1)
Chiffrement (Informatique)
(1)
Computer architecture & logic design
(1)
Computer networking & communications
(1)
Computer security -- Management
(1)
Computer security -- Management.
(1)
Computers -- Access control -- Handbooks, manuals, etc.
(1)
Computers -- Access control.
(1)
Criminology - legal aspects
(1)
Cryptographie.
(1)
Cryptography -- Handbooks, manuals, etc.
(1)
Data encryption (Computer science)
(1)
Data protection
(1)
Data protection.
(1)
Digital communications -- Security measures.
(1)
Electronic intelligence.
(1)
Entreprises -- Sécurité -- Mesures.
(1)
Gestion -- Informatique -- Sécurité -- Mesures.
(1)
Gestion du risque.
(1)
Hacking
(1)
Hacking.
(1)
Information technology -- Security measures -- Management.
(1)
Informatique quantique.
(1)
Internet -- Law and legislation.
(1)
LAW / Privacy
(1)
Law enforcement.
(1)
Legal aspects of IT
(1)
Military intelligence.
(1)
Multimedia systems -- Security measures.
(1)
POLITICAL SCIENCE / Political Freedom & Security / International Security.
(1)
Piratage informatique.
(1)
Police & security services
(1)
Police law & police procedures
(1)
Protection de l'information (Informatique)
(1)
Python (Computer program language)
(1)
Python (Langage de programmation)
(1)
Quantum computing.
(1)
Risk management
(1)
Risk management.
(1)
Security services
(1)
Sécurité informatique -- Gestion.
(1)
Technologie de l'information -- Sécurité -- Mesures -- Gestion.
(1)
Véhicules autonomes -- Sécurité -- Mesures.
(1)
Véhicules autonomes.
(1)
World War, 1939-1945 -- Cryptography.
(1)
World War, 1939-1945 -- Electronic intelligence.
(1)
World War, 1939-1945 -- Military intelligence.
(1)
police;law enforcement;national security;cybersecurity;security technologies
(1)
Daha fazla
Tümünü genişlet
Daha az
Hepsini Daralt
Materyal Türü
Dahil
Hariç
E-Kitap
Shelf Location
Dahil
Hariç
CRC Ekitapları
Taylor Francis E-Kitap Koleksiyonu
Wiley E-Kitap Koleksiyonu
Kütüphane
Dahil
Hariç
Çevrimiçi Kütüphane
false
{sortLabel}
{alphabetical}
{relevance}
{include}
{exclude}
{facetName}
{results}
{displayName}
{count}
{error}
Eylem Seç
Ayırt
Listelerime ekle
Eposta
Yazdır
13 sonuç bulundu
1
2
Sıralama:
İlgiye Göre (Varsayılan)
Yıla Gore (Artan)
Yıla Gore (Azalan)
Başlık
Yazar
0
DEFAULT_TR
Liste seç
Geçici Liste
Bunu varsayılan liste yap.
Öğeler başarıyla eklendi
Öğeler eklenirken hata oldu. Lütfen tekrar deneyiniz.
One or more items could not be added because you are not logged in.
1.
How i discovered World War II's greatest spy and other stories of intelligence and code
How i discovered World War II's greatest spy and other stories of intelligence and code
Yazar
Kahn, David, eauthor. Taylor and Francis.
Yer Numarası
D810 .S7
Elektronik Erişim
Click here to view.
Format:
Durum
Çevrimiçi Kütüphane~1
Rafta:
Kopya:
Eylem Seç
Ayırt
Listelerime ekle
Eposta
Yazdır
1
2