Log In
|
My Account
|
My Lists
|
|
Remember to clear the cache and close the browser window.
Türkçe
Search Limit
Everything
Electronic Resources
All
Başkent University Library
Anadolu OSB Meslek Yüksekokulu
Atasev Özel Koleksiyon
Fine Arts And Design Archive
Erdoğan Tercan Collection
Kazan Meslek Yüksekokulu
Law Collection
Ord.Prof.Dr. Enver Ziya Karal Tarih Uygulama Ars.Mrk.
Özel Koleksiyon Serdar Özersin
Thesis Collection
All Fields
Title
Author
Subject
ISBN
ISSN
8
Search Field
All Fields
Search For:
Advanced Search
Search Results
Electronic Resources
Limit Search Results
Narrowed by:
+
Subject: Computer security.
Author
Include
Exclude
ProQuest (Firm)
(196)
SpringerLink (Online service)
(22)
Foster, James C.
(11)
Fourastier, Yannick, editor.
(11)
Piètre-Cambacédès, Ludovic, editor.
(11)
International Business Machines Corporation. International Technical Support Organization.
(10)
Long, Johnny.
(9)
Russell, Ryan, 1969-
(6)
Calder, Alan, author.
(5)
Carvey, Harlan A.
(5)
Cross, Michael, 1965-
(5)
Hurley, Chris.
(5)
Wiles, Jack.
(5)
Beale, Jay.
(4)
Bhateja, Vikrant. editor.
(4)
Cherry, Denny.
(4)
Cole, Eric.
(4)
Hunter, Laura E.
(4)
Limbert, Matthew, designer.
(4)
Piltzecker, Tony, 1975-
(4)
Rayns, Chris.
(4)
Ring, Sandra.
(4)
Rittinghouse, John W.
(4)
Satapathy, Suresh Chandra. editor.
(4)
Shinder, Thomas W.
(4)
Buchanan, Cameron, author.
(3)
Clercq, Jan de, 1968-
(3)
Contos, Brian T.
(3)
Cox, I. J. (Ingemar J.)
(3)
Katsaropoulos, Chris, editor.
(3)
Mullen, Timothy M.
(3)
Rogers, Mark, designer.
(3)
Sachs, Marcus H.
(3)
Shinder, Debra Littlejohn.
(3)
Winkler, J. R. (Joachim R.)
(3)
Wyler, Neil R.
(3)
XYPRO Technology Corporation.
(3)
Alder, Raven.
(2)
Amini, Rob.
(2)
Andress, Jason.
(2)
Aquilina, James M.
(2)
Baskin, Brian.
(2)
Bayles, Aaron W.
(2)
Ben-Natan, Ron.
(2)
Boulanger, Jean-Louis.
(2)
Brindley, Ed.
(2)
Burnett, Mark (Mark M.)
(2)
Casey, Eoghan.
(2)
Caswell, Brian.
(2)
Chaffin, Larry.
(2)
Chaki, Nabendu. editor.
(2)
Chaki, Rituparna. editor.
(2)
Chandramouli, Ramaswamy.
(2)
Clarke, Justin.
(2)
Cortesi, Agostino. editor.
(2)
Dalziel, Henry, author.
(2)
Dalziel, Henry, editor.
(2)
Engebretson, Pat (Patrick Henry), 1974-
(2)
Erickson, Jon, 1977-
(2)
Fair, Ted.
(2)
Ferraiolo, David.
(2)
Foster, Stephen C.
(2)
Fourastier, Yannick, author.
(2)
Goodman, Seymour E.
(2)
Grasdal, Martin.
(2)
Grillenmeier, Guido.
(2)
Hancock, Bill, 1957-
(2)
Henmi, Anne.
(2)
Honick, Ron.
(2)
Hutchens, Justin, author.
(2)
Joshi, Amit. editor.
(2)
Kinney, Steven.
(2)
Kleidermacher, David.
(2)
Kleidermacher, Mike.
(2)
Knapp, Eric.
(2)
Koh.
(2)
Krutz, Ronald L.
(2)
Kuhn, D. Richard.
(2)
Lin, Ching-Yung.
(2)
Malin, Cameron H.
(2)
Mao, Wenji.
(2)
Maynor, David.
(2)
Meyer, Greg.
(2)
Mitnick, Kevin D.
(2)
Moskowitz, Jeremy.
(2)
Nordfelt, Michael.
(2)
Oppliger, Rolf.
(2)
Parker, Tom.
(2)
Piccard, Paul L.
(2)
Pietre-Cambacedes, Ludovic, author.
(2)
Potter, Bruce.
(2)
Qian, Yi, 1962-
(2)
Ramachandran, Vivek, author.
(2)
Ramirez, Gilbert.
(2)
Ransome, James F.
(2)
Rash, Michael.
(2)
Rathaus, Noam.
(2)
Rogers, Russ.
(2)
Saeed, Khalid. editor.
(2)
ScienceDirect (Online service)
(2)
Shein, Rob.
(2)
Shimonski, Robert.
(2)
Stanger, James.
(2)
Stapko, Timothy John.
(2)
Ticher, Paul, author.
(2)
Todd, Chad.
(2)
Tyson, Dave.
(2)
Vacca, John R.
(2)
Wang, Fei-Yue.
(2)
Wheeler, Evan.
(2)
Winkler, Ira.
(2)
Wotring, Brian.
(2)
Young, Carl S., author.
(2)
Yu, Hong Heather, 1967-
(2)
Zalewski, Michal.
(2)
Zeng, Wenjun, 1967-
(2)
'Ken'@ftu.
(1)
131ah.
(1)
AXELOS Limited, author.
(1)
Abbadi, Imad M., author.
(1)
Ablon, Lillian, author.
(1)
Agre, Philip.
(1)
Ahmad, David R. Mirza.
(1)
Ahmad, Rabiah. editor.
(1)
Akashe, Shyam. editor.
(1)
Akleylek, Sedat, Doç. Dr., editör
(1)
Al-maadeed, Somaya. editor.
(1)
Alam, Shahnawaz, author.
(1)
Alcover, Jorge Blanco.
(1)
Aleroud, Ahmed. editor.
(1)
Alexander, Philip, 1963-
(1)
Alkan, Mustafa, Doç. Dr., yazar
(1)
Alsmadi, Izzat M. editor.
(1)
Alvarado, Ellen.
(1)
American Evaluation Association.
(1)
Amini, M. Hadi. author.
(1)
Amoroso, Edward G.
(1)
Anderson, Brian (Brian James)
(1)
Andress, Jason, author.
(1)
Andrés, Steven.
(1)
Antón, Philip S.
(1)
Anzaldua, Reynaldo.
(1)
Aquilina, James, author.
(1)
Archibald, Neil.
(1)
Arnold, Michael (Michael Konrad), 1964-
(1)
Arvanitis, Nicholas, editor.
(1)
Ashenden, Debi.
(1)
Assam, Tarek.
(1)
Awad, Ahmed. editor.
(1)
Axelrod, C. Warren.
(1)
Aydın, Ömer, Dr. Öğr. Üyesi, editör
(1)
Baccas, Paul.
(1)
Bajracharya, Chandra. author.
(1)
Baker, Andrew R.
(1)
Baker, Paul R., 1958-
(1)
Barnett, Ryan C.
(1)
Barrett, Diane.
(1)
Basagiannis, Stylianos, contributor.
(1)
Baskerville, Richard.
(1)
Baskin, Brian, author.
(1)
Bayuk, Jennifer L.
(1)
Beaver, Kevin.
(1)
Bednarczyk, Michael.
(1)
Beghdadi, Azeddine. editor.
(1)
Belapurkar, Abhijit.
(1)
Ben-Ari, Erez.
(1)
Bennett, Eleanor Leonne, cover designer.
(1)
Benny, Daniel J.
(1)
Berber, Leyla Keser
(1)
Berghe, Thierry van den, author.
(1)
Bergstra, J. A.
(1)
Bertino, Elisa.
(1)
Bhalla, Nish.
(1)
Bhardwaj, Pawan K.
(1)
Bhunia, Swarup, author.
(1)
Bhunia, Swarup. editor.
(1)
Bianco, David J., 1971-
(1)
Bidwell, Teri.
(1)
Bin Azad, Tariq.
(1)
Binnie, Christopher, author.
(1)
Bishop, Matt (Matthew A.)
(1)
Black Hat Press (Goodhue, Minn.)
(1)
Blair, John, author.
(1)
Blobel, Bernd.
(1)
Bloom, Jeffrey A. (Jeffrey Adam), 1964-
(1)
Bodur, Hüseyin, yazar.
(1)
Bolt, Steven.
(1)
Bonertz, Tina.
(1)
Bonnell, Ralph.
(1)
Borges de Oliveira, Fábio. author.
(1)
Boroojeni, Kianoosh G. author.
(1)
Bott, Ed.
(1)
Bouridane, Ahmed. editor.
(1)
Bradley, Jaron, author.
(1)
Bradley, Tony, 1969-
(1)
Bradley, Tony.
(1)
Brathwaite, Shimon, author.
(1)
Bray, Rory.
(1)
Breimeier, Johannes.
(1)
Brennen, Jerod, editor.
(1)
More
View All
Fewer
Collapse All
Material Type
Include
Exclude
Book
E-Book
Language
Include
Exclude
English
(467)
Turkish
(17)
French
(14)
German
(3)
Publication Date
Include
Exclude
-
2015
(40)
2005
(39)
2013
(37)
2004
(35)
2007
(35)
2017
(35)
2006
(31)
2014
(28)
2010
(27)
2011
(27)
2008
(25)
2012
(25)
2016
(22)
2003
(21)
2002
(20)
2019
(15)
2001
(10)
2018
(10)
2009
(9)
2022
(3)
1979
(2)
1987
(2)
1990
(2)
1991
(2)
1997
(2)
2000
(2)
2025
(2)
1300
(1)
1301
(1)
1302
(1)
1303
(1)
1304
(1)
1305
(1)
1306
(1)
1307
(1)
1308
(1)
1309
(1)
1310
(1)
1311
(1)
1312
(1)
1313
(1)
1314
(1)
1900
(1)
1901
(1)
1902
(1)
1903
(1)
1904
(1)
1905
(1)
1906
(1)
1907
(1)
1908
(1)
1909
(1)
1910
(1)
1911
(1)
1912
(1)
1913
(1)
1914
(1)
1915
(1)
1916
(1)
1917
(1)
1918
(1)
1919
(1)
1920
(1)
1921
(1)
1922
(1)
1923
(1)
1924
(1)
1925
(1)
1926
(1)
1927
(1)
1928
(1)
1929
(1)
1930
(1)
1931
(1)
1932
(1)
1933
(1)
1934
(1)
1935
(1)
1936
(1)
1937
(1)
1938
(1)
1939
(1)
1940
(1)
1941
(1)
1942
(1)
1943
(1)
1944
(1)
1945
(1)
1946
(1)
1947
(1)
1948
(1)
1949
(1)
1950
(1)
1951
(1)
1952
(1)
1953
(1)
1954
(1)
1955
(1)
1956
(1)
1957
(1)
1958
(1)
1959
(1)
1960
(1)
1961
(1)
1962
(1)
1963
(1)
1964
(1)
1965
(1)
1966
(1)
1967
(1)
1968
(1)
1969
(1)
1970
(1)
1971
(1)
1972
(1)
1973
(1)
1974
(1)
1975
(1)
1976
(1)
1977
(1)
1978
(1)
1980
(1)
1981
(1)
1982
(1)
1983
(1)
1984
(1)
1985
(1)
1986
(1)
1988
(1)
1989
(1)
1992
(1)
1993
(1)
1994
(1)
1995
(1)
1996
(1)
1998
(1)
1999
(1)
2020
(1)
More
View All
Fewer
Collapse All
Subject
Include
Exclude
Electronic books.
(459)
Computer networks -- Security measures.
(162)
COMPUTERS -- Internet -- Security.
(68)
COMPUTERS -- Networking -- Security.
(68)
COMPUTERS -- Security -- General.
(68)
Data protection.
(43)
Internet -- Security measures.
(27)
Systems and Data Security.
(22)
Bilgisayar güvenliği.
(21)
Engineering.
(21)
Computer hackers.
(19)
Computers -- Access control.
(19)
Microsoft Windows (Computer file)
(17)
Computer crimes.
(15)
Communications Engineering, Networks.
(14)
Electrical engineering.
(14)
Database security.
(13)
Computer crimes -- Prevention.
(12)
Cryptography.
(12)
Hackers.
(12)
Operating systems (Computers)
(12)
Computer crimes -- Investigation.
(11)
Data encryption (Computer science)
(11)
Business enterprises -- Computer networks -- Security measures.
(10)
Computational intelligence.
(10)
Information technology -- Security measures.
(10)
Computer viruses.
(8)
Firewalls (Computer security)
(7)
Security systems.
(7)
Client/server computing.
(6)
Cloud computing.
(6)
Computer science.
(6)
Computer security -- Fiction.
(6)
Cyberterrorism -- Prevention.
(6)
Cyberterrorism.
(6)
Microsoft Windows server.
(6)
Signal, Image and Speech Processing.
(6)
Artificial intelligence.
(5)
Client/server computing -- Security measures.
(5)
Computer networks -- Access control.
(5)
Computer security -- Handbooks, manuals, etc.
(5)
Digital watermarking.
(5)
Embedded computer systems.
(5)
Fiction.
(5)
Forensic sciences.
(5)
Hackers -- Fiction.
(5)
Handbooks and manuals.
(5)
Malware (Computer software)
(5)
SQL server.
(5)
Wireless communication systems -- Security measures.
(5)
Artificial Intelligence (incl. Robotics).
(4)
Cloud computing -- Security measures.
(4)
Computer crimes -- Investigation -- United States -- Methodology.
(4)
Computer software -- Development.
(4)
Computers -- Access control -- Passwords.
(4)
Cyberspace -- Security measures.
(4)
Data encryption (Computer science).
(4)
FICTION -- General.
(4)
Linux.
(4)
Microsoft Windows (Computer file) -- Security measures.
(4)
National security.
(4)
Open source software.
(4)
Process control -- Security measures.
(4)
Risk management.
(4)
Spyware (Computer software)
(4)
World Wide Web -- Security measures.
(4)
Andre fag (naturvidenskab og teknik) Andre fag
(3)
Application software -- Security measures.
(3)
Business enterprises -- Security measures.
(3)
Circuits and Systems.
(3)
Citrix MetaFrame.
(3)
Computer networks.
(3)
Corporations -- Security measures.
(3)
Data Encryption.
(3)
Data mining.
(3)
Directory services (Computer network technology)
(3)
Electronic circuits.
(3)
Electronic data processing departments -- Security measures.
(3)
Electronic information resources -- Access control.
(3)
Hewlett-Packard computers -- Security measures.
(3)
Information Systems Applications (incl. Internet).
(3)
Information resources management.
(3)
Intellectual property.
(3)
Internet programming.
(3)
Intrusion detection systems (Computer security)
(3)
LAW -- Forensic Science.
(3)
Mac OS.
(3)
Privacy, Right of.
(3)
Python (Computer program language)
(3)
Security Science and Technology.
(3)
Short stories.
(3)
Software configuration management.
(3)
System safety.
(3)
Web servers -- Security measures.
(3)
Web sites -- Security measures.
(3)
z/OS.
(3)
Acquisition of computer software.
(2)
Application software.
(2)
BUSINESS & ECONOMICS -- Corporate Governance.
(2)
BUSINESS & ECONOMICS -- Leadership.
(2)
BUSINESS & ECONOMICS -- Organizational Development.
(2)
BUSINESS & ECONOMICS -- Workplace Culture.
(2)
Big Data/Analytics.
(2)
Big data.
(2)
Bilgisayarlar -- Erişim kontrolü.
(2)
Bilişim teknolojisi -- Sosyal yönler.
(2)
Biometrics (Biology).
(2)
Biometrics.
(2)
COMPUTERS -- Security -- Cryptography.
(2)
COMPUTERS -- Security -- Viruses.
(2)
ColdFusion.
(2)
Computer Communication Networks.
(2)
Computer communication systems.
(2)
Computer crimes -- Case studies.
(2)
Computer networks -- Reliability.
(2)
Computer security -- United States.
(2)
Computer software -- Reliability.
(2)
Computer software -- Testing.
(2)
Computerbeveiliging.
(2)
Computercriminaliteit.
(2)
Computersicherheit
(2)
Cyberterrorism -- Fiction.
(2)
Debugging in computer science.
(2)
Electronic book.
(2)
Electronic commerce -- Security measures.
(2)
Electronic data processing departments -- Auditing.
(2)
Electronic mail messages -- Security measures.
(2)
Electronic mail systems -- Security measures.
(2)
Electronics and Microelectronics, Instrumentation.
(2)
Electronics.
(2)
Engineering & Applied Sciences.
(2)
Hacking.
(2)
IBM software.
(2)
Information technology -- Auditing.
(2)
Information technology -- Management.
(2)
Information technology -- Social aspects.
(2)
Information technology.
(2)
Information visualization.
(2)
Instant messaging -- Security measures.
(2)
Internal security.
(2)
Internet -- Safety measures.
(2)
Internet and children.
(2)
Internet searching.
(2)
Internet.
(2)
Kriptografi.
(2)
Microelectronics.
(2)
Microsoft ISA server.
(2)
Multimedia systems -- Security measures.
(2)
Online social networks -- Security measures.
(2)
Peer-to-peer architecture (Computer networks)
(2)
Penetration testing (Computer security)
(2)
Programming languages (Electronic computers)
(2)
Reverse engineering.
(2)
Risk assessment.
(2)
Réseaux d'ordinateurs -- Sécurité -- Mesures.
(2)
SQL (Computer program language)
(2)
Social engineering.
(2)
Social media.
(2)
Spam filtering (Electronic mail)
(2)
Systèmes informatiques -- Sécurité -- Mesures.
(2)
TECHNOLOGY & ENGINEERING -- Industrial Engineering.
(2)
TRUE CRIME -- White Collar Crime.
(2)
Terrorism -- Prevention.
(2)
United States.
(2)
Veri koruma.
(2)
Virtual computer systems -- Security measures.
(2)
Web sites -- Design.
(2)
XML (Document markup language)
(2)
İç güvenlik.
(2)
AIX (Computer file)
(1)
Agents intelligents (Logiciels)
(1)
Algebra, Boolean.
(1)
Algorithms.
(1)
Altre visioni. Solaris.
(1)
Application software -- Development.
(1)
Archives -- Safety measures.
(1)
Automatic machinery -- Security measures.
(1)
Avionics -- Safety measures.
(1)
BEA WebLogic server.
(1)
BUSINESS & ECONOMICS -- Business Writing.
(1)
BUSINESS & ECONOMICS -- Industrial Management.
(1)
BUSINESS & ECONOMICS -- Management Science.
(1)
BUSINESS & ECONOMICS -- Management.
(1)
BUSINESS & ECONOMICS -- Organizational Behavior.
(1)
Bases de données -- Sécurité -- Mesures.
(1)
Big data -- Security measures.
(1)
Big data -- Social aspects.
(1)
Bilgisayar ağları -- Güvenlik önlemleri.
(1)
Bilgisayar ağları -- Hukuk ve yasama.
(1)
Bilgisayar güvenliği -- Yazılım.
(1)
Bluetooth technology -- Security measures.
(1)
Bluetooth technology.
(1)
Browsers (Computer programs)
(1)
Business enterpri -- Computer networks -- Security measures.
(1)
Business planning.
(1)
Büyük veri -- Sosyal yönler.
(1)
COMPUTER INFORMATION SECURITY.
(1)
COMPUTERS -- Digital Media -- General.
(1)
COMPUTERS -- Hardware -- Handheld Devices.
(1)
COMPUTERS -- Hardware -- Personal Computers -- General.
(1)
More
View All
Fewer
Collapse All
Library
Include
Exclude
Başkent Library
Shelf Location
Include
Exclude
Atasev Private Collection
Central Library
E-Library
Ebook Central
Elsevier E-Book Collections
Kazan Vocational School
Private Collection Serdar Özersin
SPRINGER
Special Collection Sercan-İlhan Gülsün (2. Floor)
More
View All
Fewer
Collapse All
false
{sortLabel}
{alphabetical}
{relevance}
{include}
{exclude}
{facetName}
{results}
{displayName}
{count}
{error}
Select an Action
Place Hold(s)
Add to My Lists
Email
Print
502 Results Found
1
..
32
33
34
35
36
..
42
Sort By:
Relevance (Default)
Publication Date (Ascending)
Publication Date (Descending)
Title
Author
OK
Email Address
:
Phone Number:
Mobile Carrier:
AT&T
Boost
Nextel (Sprint)
Sprint (PCS)
T Mobile
TracFone
US Cellular
Verizon
Virgin
Select An Item
Data usage warning: You will receive one text message for each title you selected.
Standard text messaging rates apply.
Text it to me
Text it to me, and go to next item
000000000000
DEFAULT
Select a list
Temporary List
Make this your default list.
The following items were successfully added.
There was an error while adding the following items. Please try again.
IM, instant messaging, security
397.
IM, instant messaging, security
by
Rittinghouse, John W.
ScienceDirect
http://www.sciencedirect.com/science/book/9781555583385
Format:
Implementing database security and auditing : a guide for DBAs, information security administrators and auditors
398.
Implementing database security and auditing : a guide for DBAs, information security administrators and auditors
by
Ben-Natan, Ron.
ScienceDirect
http://www.sciencedirect.com/science/book/9781555583347
Format:
Sockets, shellcode, porting & coding : reverse engineering exploits and tool coding for security professionals
399.
Sockets, shellcode, porting & coding : reverse engineering exploits and tool coding for security professionals
by
Foster, James C.
ScienceDirect
http://www.sciencedirect.com/science/book/9781597490054
Format:
Stealing the network : how to own an identity
400.
Stealing the network : how to own an identity
by
Alder, Raven.
ScienceDirect
https://www.sciencedirect.com/science/book/9781597490061
Format:
InfoSec career hacking : sell your skillz, not your soul
401.
InfoSec career hacking : sell your skillz, not your soul
by
Bayles, Aaron W.
ScienceDirect
https://www.sciencedirect.com/science/book/9781597490115
Format:
Host integrity monitoring : using Osiris and Samhain
402.
Host integrity monitoring : using Osiris and Samhain
by
Wotring, Brian.
ScienceDirect
http://www.sciencedirect.com/science/book/9781597490184
Format:
Hacking a terror network : the silent threat of covert channels
403.
Hacking a terror network : the silent threat of covert channels
by
Rogers, Russ.
ScienceDirect
https://www.sciencedirect.com/science/book/9781928994985
Format:
Cyber spying : tracking your family's (sometimes) secret online lives
404.
Cyber spying : tracking your family's (sometimes) secret online lives
by
Fair, Ted.
ScienceDirect
https://www.sciencedirect.com/science/book/9781931836418
Format:
Intrusion prevention and active response : deploying network and host IPS
405.
Intrusion prevention and active response : deploying network and host IPS
by
Rash, Michael.
ScienceDirect
http://www.sciencedirect.com/science/book/9781932266474
Format:
Buffer overflow attacks : detect, exploit, prevent
406.
Buffer overflow attacks : detect, exploit, prevent
by
Foster, James C.
ScienceDirect
http://www.sciencedirect.com/science/book/9781932266672
Format:
Black Hat physical device security : exploiting hardware and software
407.
Black Hat physical device security : exploiting hardware and software
by
Miller, Drew, 1978-
ScienceDirect
http://www.sciencedirect.com/science/book/9781932266818
Format:
Software piracy exposed
408.
Software piracy exposed
by
Craig, Paul.
ScienceDirect
https://www.sciencedirect.com/science/book/9781932266986
Format:
Select an Action
Place Hold(s)
Add to My Lists
Email
Print
1
..
32
33
34
35
36
..
42
Search Results
Electronic Resources
Search Results
Electronic Resources
OK
Email Address
:
Phone Number:
Mobile Carrier:
AT&T
Boost
Nextel (Sprint)
Sprint (PCS)
T Mobile
TracFone
US Cellular
Verizon
Virgin
Select An Item
Data usage warning: You will receive one text message for each title you selected.
Standard text messaging rates apply.
Text it to me
Text it to me, and go to next item
Electronic Resources
Fetching Results for Electronic Resources...
action