Giriş
|
Kütüphane Hesabım
|
Listelerim
|
|
Remember to clear the cache and close the browser window.
Search Limit
Tümü
E-Kitap
Dergiler
Beytepe Kütüphanesi
Sağlık Bilimleri Kütüphanesi
Konservatuvar Kütüphanesi
Hukuk Kütüphanesi
Sosyal Bilimler Meslek Yüksek Okulu
DVD Koleksiyonu
Prof.Dr. Onur Bilge Kula Koleksiyonu
Rooms Restriction Values
Tüm Alanlar
Başlık
Yazar
Konu
ISBN
ISSN
8
Search Field
Tüm Alanlar
Target Value
Limit Value
Restriction Value
Arama:
Gelişmiş Arama
Arama Sonuçlarını Sınırlandır
Daraltılmış:
+
Konu: Security.
Yazar
Dahil
Hariç
Carey, Marcus J. (Cybersecurity professional), author.
(3)
Edwards, Jason (Cybersecurity expert), author.
(2)
Jin, Jennifer, author.
(2)
Jin, Jennifer.
(2)
Moschovitis, Christos J. P., author.
(2)
Allsopp, Wil, author.
(1)
An, Jianpin, author.
(1)
Anand, R. S., author.
(1)
Anson, Steve.
(1)
Bamhdi, Alwi, editor.
(1)
Bayuk, Jennifer L., author.
(1)
Benarous, Leila.
(1)
Bitam, Salim.
(1)
Bullock, Jessey, author.
(1)
Carey, Marcus J. (Cybersecurity professional)
(1)
Carpenter, Perry, author.
(1)
Chapple, Mike, author.
(1)
Couretas, Jerry M., 1966- author.
(1)
David, Shiblin, author.
(1)
Domas, Christopher, author.
(1)
Domas, Stephanie, author.
(1)
Edwards, Jason, author.
(1)
Forno, Richard, author.
(1)
Fréminville, Marie de, author.
(1)
Gordon, Adam, author.
(1)
Gorecki, Andrew.
(1)
Grimes, Roger A., author.
(1)
Guha, Abhijit, editor.
(1)
Hughes, Chris (Christopher Matthew), author.
(1)
Jakobsen, Adam Tilmar, author.
(1)
Janca, Tanya. author.
(1)
Jeyakrishnan, V., author.
(1)
John Wiley & Sons, publisher.
(1)
Kamhoua, Charles A., edtior.
(1)
Khatoun, Rida, author.
(1)
Knight, Alissa, author.
(1)
Lambros, Kyriakos P., author.
(1)
Laurent, Sébastien, editor.
(1)
Lee, Martin (Computer security expert), author.
(1)
Mack, Sean D., author.
(1)
Mammeri, Zoubir, author.
(1)
Masoodi, Faheem Syeed, editor.
(1)
Mateczun, Laura, author.
(1)
Mellouk, Abdelhamid.
(1)
Messier, Ric, author.
(1)
Miroshnikov, Andrei, author.
(1)
Moyo, Siegfried, author.
(1)
Niranjanamurthy, M., author.
(1)
Njilla, Laurent L., editor.
(1)
Norris, Donald F., author.
(1)
O'Flynn, Colin.
(1)
Panek, Crystal, author.
(1)
Poston, Howard E., III, author.
(1)
Pramanik, Sabyasachi, editor.
(1)
Prouff, Emmanuel, editor.
(1)
Quade, Phil.
(1)
Renault, Guenael.
(1)
Rivain, Mattieu.
(1)
Robinson, Nikki, author.
(1)
Samadi, Yasaman, 1993- author.
(1)
Samanta, Debabrata, 1987- editor.
(1)
Schneier, Bruce, 1963- author.
(1)
Sharp, Matthew K., author.
(1)
Shelley, Joe.
(1)
Shetty, Sachin, editor.
(1)
Sohrabi, Nasrin, 1982- author.
(1)
Stewart, James Michael.
(1)
Suaboot, Jakapan, 1984- author.
(1)
Tanner, Nadean H., author.
(1)
Tari, Zahir, 1961- author.
(1)
Tounsi, Wiem, editor.
(1)
Tracy, Robb.
(1)
Vinay, M., editor.
(1)
Weaver, Griffin, author.
(1)
Daha fazla
Tümünü genişlet
Daha az
Hepsini Daralt
Dil
Dahil
Hariç
English
(49)
Yayın Yılı
Dahil
Hariç
-
2019
(9)
2024
(9)
2022
(7)
2020
(6)
2025
(5)
2017
(4)
2021
(3)
2018
(2)
2023
(2)
2026
(2)
Daha fazla
Tümünü genişlet
Daha az
Hepsini Daralt
Konu
Dahil
Hariç
Electronic books.
(47)
COMPUTERS.
(46)
Computer security.
(33)
Sécurité informatique.
(33)
Cryptography.
(24)
Networking.
(23)
Computer Security
(13)
Computer networks -- Security measures
(11)
Computer security
(11)
Viruses & Malware.
(11)
COMPUTERS -- Security -- General.
(10)
Computer networks -- Security measures.
(10)
Online Safety & Privacy.
(10)
Réseaux d'ordinateurs -- Sécurité -- Mesures.
(10)
COMPUTERS -- Security -- Cryptography & Encryption.
(4)
Data protection.
(4)
Penetration testing (Computer security)
(4)
Protection de l'information (Informatique)
(4)
BUSINESS & ECONOMICS.
(3)
COMPUTERS -- Security -- Cryptography.
(3)
Computers
(3)
Computers.
(3)
Data protection
(3)
Hacking.
(3)
Ordinateurs.
(3)
Piratage informatique.
(3)
Tests d'intrusion.
(3)
Blockchains (Databases)
(2)
Business enterprises -- Security measures
(2)
Business enterprises -- Security measures.
(2)
COMPUTERS -- Security -- Online Safety & Privacy.
(2)
Chaînes de blocs.
(2)
Chiffrement (Informatique)
(2)
Computer security -- Management
(2)
Computer security -- Management.
(2)
Cryptographie.
(2)
Cyber intelligence (Computer security)
(2)
Cybernetics.
(2)
Data encryption (Computer science)
(2)
Electronic digital computers
(2)
Electronic digital computers.
(2)
Entreprises -- Sécurité -- Mesures.
(2)
Hacking
(2)
Surveillance des menaces informatiques.
(2)
Sécurité informatique -- Gestion.
(2)
Administration locale -- États-Unis.
(1)
Architecture logicielle.
(1)
Artificial satellites in telecommunication -- Security measures.
(1)
Assembly Language.
(1)
Automated vehicles
(1)
Automated vehicles -- Security measures.
(1)
Automated vehicles.
(1)
BUSINESS & ECONOMICS -- Industries -- Computer Industry.
(1)
BUSINESS & ECONOMICS -- Production & Operations Management.
(1)
Business -- Data processing -- Security measures
(1)
Business -- Data processing -- Security measures.
(1)
Business enterprises -- Computer networks -- Security measures.
(1)
Business enterprises -- Computer programs.
(1)
Business enterprises -- Data processing -- Security measures.
(1)
COMPUTERS -- Information Technology.
(1)
COMPUTERS -- Networking -- Security.
(1)
COMPUTERS -- Operating Systems -- General.
(1)
COMPUTERS -- Security -- Networking.
(1)
Certification Guides.
(1)
Chefs des services de l'information.
(1)
Chief information officers
(1)
Chief information officers.
(1)
Cloud Computing.
(1)
Cloud computing -- Security measures.
(1)
Computer Science.
(1)
Computer crimes -- Investigation.
(1)
Computer crimes -- Prevention.
(1)
Computer crimes -- Risk assessment.
(1)
Computer industry
(1)
Computer industry.
(1)
Computer networks -- Security measures -- Computer programs
(1)
Computer networks -- Security measures -- Computer programs.
(1)
Computer networks -- Security measures -- Examinations, questions, etc.
(1)
Computer programming.
(1)
Computer security -- Computer programs
(1)
Computer security -- Computer programs.
(1)
Computer security -- Government policy
(1)
Computer security -- Government policy.
(1)
Computer security -- Law and legislation
(1)
Computer security -- Law and legislation.
(1)
Computer security -- United States.
(1)
Computer software -- Development.
(1)
Computersicherheit
(1)
Criminalité informatique -- Enquêtes.
(1)
Criminalité informatique -- Évaluation du risque.
(1)
Cyberguerre (Science militaire)
(1)
Cyberinfrastructure -- Security measures.
(1)
Cyberspace operations (Military science)
(1)
Cyberterrorism -- Prevention
(1)
Cyberterrorism -- Prevention.
(1)
Domotique -- Sécurité -- Mesures.
(1)
Dwellings -- Security measures
(1)
Dwellings -- Security measures.
(1)
Entrepreneurship.
(1)
Entreprises -- Informatique -- Sécurité -- Mesures.
(1)
Entreprises -- Logiciels.
(1)
Examinations
(1)
Examinations.
(1)
Finance.
(1)
Financial Risk Management.
(1)
Gestion -- Informatique -- Sécurité -- Mesures.
(1)
Gestion du risque.
(1)
Habitations -- Sécurité -- Mesures.
(1)
Home automation -- Security measures.
(1)
Industrie 4.0.
(1)
Industry 4.0
(1)
Industry 4.0.
(1)
Infonuagique -- Sécurité -- Mesures.
(1)
Information Technology.
(1)
Information filtering systems
(1)
Information filtering systems.
(1)
Information technology -- Management
(1)
Information technology -- Management.
(1)
Information technology -- Security measures -- Management.
(1)
Informatique -- Industrie.
(1)
Insurance.
(1)
Intelligent transportation systems -- Security measures
(1)
Internet -- Government policy
(1)
Internet -- Government policy.
(1)
Internet -- Law and legislation
(1)
Internet -- Law and legislation.
(1)
Internet -- Politique gouvernementale.
(1)
Internet -- Security measures
(1)
Internet -- Security measures.
(1)
Internet -- Sécurité -- Mesures.
(1)
Internet auctions -- Security measures.
(1)
Internet des objets -- Sécurité -- Mesures.
(1)
Internet of things -- Security measures.
(1)
Intrusion detection systems (Computer security)
(1)
Leadership.
(1)
Local government
(1)
Local government -- United States.
(1)
Logiciels malveillants -- Identification -- Logiciels.
(1)
Malware (Computer software) -- Identification -- Computer programs.
(1)
Malware (Computer software) -- Prevention -- Computer programs.
(1)
Management information systems
(1)
Management information systems -- Security measures.
(1)
Management information systems.
(1)
Micro-ordinateurs -- Accès -- Contrôle.
(1)
Microcomputers -- Access control
(1)
Microcomputers -- Access control.
(1)
Microsoft Windows (Computer file)
(1)
Mobile & Wireless Communications.
(1)
Neural Networks.
(1)
Penetration testing (Computer security) -- Examinations, questions, etc.
(1)
Programmation (Informatique)
(1)
Programming Languages.
(1)
Quality Assurance & Testing.
(1)
Reverse engineering.
(1)
Risk Assessment & Management.
(1)
Risk management
(1)
Risk management.
(1)
Réseaux ad hoc de véhicules -- Sécurité -- Mesures.
(1)
Réseaux d'ordinateurs -- Sécurité -- Mesures -- Examens, questions, etc.
(1)
Réseaux d'ordinateurs -- Sécurité -- Mesures -- Logiciels.
(1)
Rétro-ingénierie.
(1)
Satellites artificiels dans les télécommunications -- Sécurité -- Mesures.
(1)
Security systems
(1)
Security systems.
(1)
Signals & Signal Processing.
(1)
Software Development & Engineering.
(1)
Software architecture.
(1)
Systèmes d'information de gestion -- Sécurité -- Mesures.
(1)
Systèmes d'information de gestion.
(1)
Systèmes de détection d'intrusion (Sécurité informatique)
(1)
Systèmes de filtrage d'information.
(1)
Systèmes de sécurité.
(1)
Sécurité informatique -- Logiciels.
(1)
Sécurité informatique -- Politique gouvernementale.
(1)
Sécurité informatique -- États-Unis.
(1)
TECHNOLOGY & ENGINEERING.
(1)
Technologie de l'information -- Gestion.
(1)
Technologie de l'information -- Sécurité -- Mesures -- Gestion.
(1)
Technologie de l'information.
(1)
Telecommunications engineers -- Certification
(1)
Telecommunications engineers -- Certification -- Examinations, questions, etc.
(1)
Tests d'intrusion -- Examens, questions, etc.
(1)
Transport -- Sécurité -- Mesures.
(1)
Transportation -- Security measures.
(1)
United States
(1)
Vehicular ad hoc networks (Computer networks) -- Security measures.
(1)
Vente aux enchères sur Internet -- Sécurité -- Mesures.
(1)
Véhicules autonomes -- Sécurité -- Mesures.
(1)
Véhicules autonomes.
(1)
X86 assembly language (Computer program language)
(1)
X86 assembly language (Langage de programmation)
(1)
information technology.
(1)
Daha fazla
Tümünü genişlet
Daha az
Hepsini Daralt
Materyal Türü
Dahil
Hariç
E-Kitap
Shelf Location
Dahil
Hariç
Wiley E-Kitap Koleksiyonu
Kütüphane
Dahil
Hariç
Çevrimiçi Kütüphane
false
{sortLabel}
{alphabetical}
{relevance}
{include}
{exclude}
{facetName}
{results}
{displayName}
{count}
{error}
Eylem Seç
Ayırt
Listelerime ekle
Eposta
Yazdır
49 sonuç bulundu
1
2
3
4
5
Sıralama:
İlgiye Göre (Varsayılan)
Yıla Gore (Artan)
Yıla Gore (Azalan)
Başlık
Yazar
0
DEFAULT_TR
Liste seç
Geçici Liste
Bunu varsayılan liste yap.
Öğeler başarıyla eklendi
Öğeler eklenirken hata oldu. Lütfen tekrar deneyiniz.
One or more items could not be added because you are not logged in.
49.
Hacking the hacker : learn from the experts who take down hackers
Hacking the hacker : learn from the experts who take down hackers
Yazar
Grimes, Roger A., author.
Yer Numarası
QA76.9 .A25
Elektronik Erişim
https://onlinelibrary.wiley.com/doi/book/10.1002/9781119396260
Format:
Durum
Çevrimiçi Kütüphane~1
Rafta:
Kopya:
Eylem Seç
Ayırt
Listelerime ekle
Eposta
Yazdır
1
2
3
4
5