Log In
|
My Account
|
My Lists
|
|
Remember to clear the cache and close the browser window.
Türkçe
Search Limit
Everything
Electronic Resources
All
Başkent University Library
Anadolu OSB Meslek Yüksekokulu
Atasev Özel Koleksiyon
Fine Arts And Design Archive
Erdoğan Tercan Collection
Kazan Meslek Yüksekokulu
Law Collection
Ord.Prof.Dr. Enver Ziya Karal Tarih Uygulama Ars.Mrk.
Özel Koleksiyon Serdar Özersin
Thesis Collection
All Fields
Title
Author
Subject
ISBN
ISSN
8
Search Field
All Fields
Search For:
Advanced Search
Search Results
Electronic Resources
Limit Search Results
Narrowed by:
+
Subject: Computer security.
Author
Include
Exclude
ProQuest (Firm)
(196)
SpringerLink (Online service)
(22)
Foster, James C.
(11)
Fourastier, Yannick, editor.
(11)
Piètre-Cambacédès, Ludovic, editor.
(11)
International Business Machines Corporation. International Technical Support Organization.
(10)
Long, Johnny.
(9)
Russell, Ryan, 1969-
(6)
Calder, Alan, author.
(5)
Carvey, Harlan A.
(5)
Cross, Michael, 1965-
(5)
Hurley, Chris.
(5)
Wiles, Jack.
(5)
Beale, Jay.
(4)
Bhateja, Vikrant. editor.
(4)
Cherry, Denny.
(4)
Cole, Eric.
(4)
Hunter, Laura E.
(4)
Limbert, Matthew, designer.
(4)
Piltzecker, Tony, 1975-
(4)
Rayns, Chris.
(4)
Ring, Sandra.
(4)
Rittinghouse, John W.
(4)
Satapathy, Suresh Chandra. editor.
(4)
Shinder, Thomas W.
(4)
Buchanan, Cameron, author.
(3)
Clercq, Jan de, 1968-
(3)
Contos, Brian T.
(3)
Cox, I. J. (Ingemar J.)
(3)
Katsaropoulos, Chris, editor.
(3)
Mullen, Timothy M.
(3)
Rogers, Mark, designer.
(3)
Sachs, Marcus H.
(3)
Shinder, Debra Littlejohn.
(3)
Winkler, J. R. (Joachim R.)
(3)
Wyler, Neil R.
(3)
XYPRO Technology Corporation.
(3)
Alder, Raven.
(2)
Amini, Rob.
(2)
Andress, Jason.
(2)
Aquilina, James M.
(2)
Baskin, Brian.
(2)
Bayles, Aaron W.
(2)
Ben-Natan, Ron.
(2)
Boulanger, Jean-Louis.
(2)
Brindley, Ed.
(2)
Burnett, Mark (Mark M.)
(2)
Casey, Eoghan.
(2)
Caswell, Brian.
(2)
Chaffin, Larry.
(2)
Chaki, Nabendu. editor.
(2)
Chaki, Rituparna. editor.
(2)
Chandramouli, Ramaswamy.
(2)
Clarke, Justin.
(2)
Cortesi, Agostino. editor.
(2)
Dalziel, Henry, author.
(2)
Dalziel, Henry, editor.
(2)
Engebretson, Pat (Patrick Henry), 1974-
(2)
Erickson, Jon, 1977-
(2)
Fair, Ted.
(2)
Ferraiolo, David.
(2)
Foster, Stephen C.
(2)
Fourastier, Yannick, author.
(2)
Goodman, Seymour E.
(2)
Grasdal, Martin.
(2)
Grillenmeier, Guido.
(2)
Hancock, Bill, 1957-
(2)
Henmi, Anne.
(2)
Honick, Ron.
(2)
Hutchens, Justin, author.
(2)
Joshi, Amit. editor.
(2)
Kinney, Steven.
(2)
Kleidermacher, David.
(2)
Kleidermacher, Mike.
(2)
Knapp, Eric.
(2)
Koh.
(2)
Krutz, Ronald L.
(2)
Kuhn, D. Richard.
(2)
Lin, Ching-Yung.
(2)
Malin, Cameron H.
(2)
Mao, Wenji.
(2)
Maynor, David.
(2)
Meyer, Greg.
(2)
Mitnick, Kevin D.
(2)
Moskowitz, Jeremy.
(2)
Nordfelt, Michael.
(2)
Oppliger, Rolf.
(2)
Parker, Tom.
(2)
Piccard, Paul L.
(2)
Pietre-Cambacedes, Ludovic, author.
(2)
Potter, Bruce.
(2)
Qian, Yi, 1962-
(2)
Ramachandran, Vivek, author.
(2)
Ramirez, Gilbert.
(2)
Ransome, James F.
(2)
Rash, Michael.
(2)
Rathaus, Noam.
(2)
Rogers, Russ.
(2)
Saeed, Khalid. editor.
(2)
ScienceDirect (Online service)
(2)
Shein, Rob.
(2)
Shimonski, Robert.
(2)
Stanger, James.
(2)
Stapko, Timothy John.
(2)
Ticher, Paul, author.
(2)
Todd, Chad.
(2)
Tyson, Dave.
(2)
Vacca, John R.
(2)
Wang, Fei-Yue.
(2)
Wheeler, Evan.
(2)
Winkler, Ira.
(2)
Wotring, Brian.
(2)
Young, Carl S., author.
(2)
Yu, Hong Heather, 1967-
(2)
Zalewski, Michal.
(2)
Zeng, Wenjun, 1967-
(2)
'Ken'@ftu.
(1)
131ah.
(1)
AXELOS Limited, author.
(1)
Abbadi, Imad M., author.
(1)
Ablon, Lillian, author.
(1)
Agre, Philip.
(1)
Ahmad, David R. Mirza.
(1)
Ahmad, Rabiah. editor.
(1)
Akashe, Shyam. editor.
(1)
Akleylek, Sedat, Doç. Dr., editör
(1)
Al-maadeed, Somaya. editor.
(1)
Alam, Shahnawaz, author.
(1)
Alcover, Jorge Blanco.
(1)
Aleroud, Ahmed. editor.
(1)
Alexander, Philip, 1963-
(1)
Alkan, Mustafa, Doç. Dr., yazar
(1)
Alsmadi, Izzat M. editor.
(1)
Alvarado, Ellen.
(1)
American Evaluation Association.
(1)
Amini, M. Hadi. author.
(1)
Amoroso, Edward G.
(1)
Anderson, Brian (Brian James)
(1)
Andress, Jason, author.
(1)
Andrés, Steven.
(1)
Antón, Philip S.
(1)
Anzaldua, Reynaldo.
(1)
Aquilina, James, author.
(1)
Archibald, Neil.
(1)
Arnold, Michael (Michael Konrad), 1964-
(1)
Arvanitis, Nicholas, editor.
(1)
Ashenden, Debi.
(1)
Assam, Tarek.
(1)
Awad, Ahmed. editor.
(1)
Axelrod, C. Warren.
(1)
Aydın, Ömer, Dr. Öğr. Üyesi, editör
(1)
Baccas, Paul.
(1)
Bajracharya, Chandra. author.
(1)
Baker, Andrew R.
(1)
Baker, Paul R., 1958-
(1)
Barnett, Ryan C.
(1)
Barrett, Diane.
(1)
Basagiannis, Stylianos, contributor.
(1)
Baskerville, Richard.
(1)
Baskin, Brian, author.
(1)
Bayuk, Jennifer L.
(1)
Beaver, Kevin.
(1)
Bednarczyk, Michael.
(1)
Beghdadi, Azeddine. editor.
(1)
Belapurkar, Abhijit.
(1)
Ben-Ari, Erez.
(1)
Bennett, Eleanor Leonne, cover designer.
(1)
Benny, Daniel J.
(1)
Berber, Leyla Keser
(1)
Berghe, Thierry van den, author.
(1)
Bergstra, J. A.
(1)
Bertino, Elisa.
(1)
Bhalla, Nish.
(1)
Bhardwaj, Pawan K.
(1)
Bhunia, Swarup, author.
(1)
Bhunia, Swarup. editor.
(1)
Bianco, David J., 1971-
(1)
Bidwell, Teri.
(1)
Bin Azad, Tariq.
(1)
Binnie, Christopher, author.
(1)
Bishop, Matt (Matthew A.)
(1)
Black Hat Press (Goodhue, Minn.)
(1)
Blair, John, author.
(1)
Blobel, Bernd.
(1)
Bloom, Jeffrey A. (Jeffrey Adam), 1964-
(1)
Bodur, Hüseyin, yazar.
(1)
Bolt, Steven.
(1)
Bonertz, Tina.
(1)
Bonnell, Ralph.
(1)
Borges de Oliveira, Fábio. author.
(1)
Boroojeni, Kianoosh G. author.
(1)
Bott, Ed.
(1)
Bouridane, Ahmed. editor.
(1)
Bradley, Jaron, author.
(1)
Bradley, Tony, 1969-
(1)
Bradley, Tony.
(1)
Brathwaite, Shimon, author.
(1)
Bray, Rory.
(1)
Breimeier, Johannes.
(1)
Brennen, Jerod, editor.
(1)
More
View All
Fewer
Collapse All
Material Type
Include
Exclude
Book
E-Book
Language
Include
Exclude
English
(467)
Turkish
(17)
French
(14)
German
(3)
Publication Date
Include
Exclude
-
2015
(40)
2005
(39)
2013
(37)
2004
(35)
2007
(35)
2017
(35)
2006
(31)
2014
(28)
2010
(27)
2011
(27)
2008
(25)
2012
(25)
2016
(22)
2003
(21)
2002
(20)
2019
(15)
2001
(10)
2018
(10)
2009
(9)
2022
(3)
1979
(2)
1987
(2)
1990
(2)
1991
(2)
1997
(2)
2000
(2)
2025
(2)
1300
(1)
1301
(1)
1302
(1)
1303
(1)
1304
(1)
1305
(1)
1306
(1)
1307
(1)
1308
(1)
1309
(1)
1310
(1)
1311
(1)
1312
(1)
1313
(1)
1314
(1)
1900
(1)
1901
(1)
1902
(1)
1903
(1)
1904
(1)
1905
(1)
1906
(1)
1907
(1)
1908
(1)
1909
(1)
1910
(1)
1911
(1)
1912
(1)
1913
(1)
1914
(1)
1915
(1)
1916
(1)
1917
(1)
1918
(1)
1919
(1)
1920
(1)
1921
(1)
1922
(1)
1923
(1)
1924
(1)
1925
(1)
1926
(1)
1927
(1)
1928
(1)
1929
(1)
1930
(1)
1931
(1)
1932
(1)
1933
(1)
1934
(1)
1935
(1)
1936
(1)
1937
(1)
1938
(1)
1939
(1)
1940
(1)
1941
(1)
1942
(1)
1943
(1)
1944
(1)
1945
(1)
1946
(1)
1947
(1)
1948
(1)
1949
(1)
1950
(1)
1951
(1)
1952
(1)
1953
(1)
1954
(1)
1955
(1)
1956
(1)
1957
(1)
1958
(1)
1959
(1)
1960
(1)
1961
(1)
1962
(1)
1963
(1)
1964
(1)
1965
(1)
1966
(1)
1967
(1)
1968
(1)
1969
(1)
1970
(1)
1971
(1)
1972
(1)
1973
(1)
1974
(1)
1975
(1)
1976
(1)
1977
(1)
1978
(1)
1980
(1)
1981
(1)
1982
(1)
1983
(1)
1984
(1)
1985
(1)
1986
(1)
1988
(1)
1989
(1)
1992
(1)
1993
(1)
1994
(1)
1995
(1)
1996
(1)
1998
(1)
1999
(1)
2020
(1)
More
View All
Fewer
Collapse All
Subject
Include
Exclude
Electronic books.
(459)
Computer networks -- Security measures.
(162)
COMPUTERS -- Internet -- Security.
(68)
COMPUTERS -- Networking -- Security.
(68)
COMPUTERS -- Security -- General.
(68)
Data protection.
(43)
Internet -- Security measures.
(27)
Systems and Data Security.
(22)
Bilgisayar güvenliği.
(21)
Engineering.
(21)
Computer hackers.
(19)
Computers -- Access control.
(19)
Microsoft Windows (Computer file)
(17)
Computer crimes.
(15)
Communications Engineering, Networks.
(14)
Electrical engineering.
(14)
Database security.
(13)
Computer crimes -- Prevention.
(12)
Cryptography.
(12)
Hackers.
(12)
Operating systems (Computers)
(12)
Computer crimes -- Investigation.
(11)
Data encryption (Computer science)
(11)
Business enterprises -- Computer networks -- Security measures.
(10)
Computational intelligence.
(10)
Information technology -- Security measures.
(10)
Computer viruses.
(8)
Firewalls (Computer security)
(7)
Security systems.
(7)
Client/server computing.
(6)
Cloud computing.
(6)
Computer science.
(6)
Computer security -- Fiction.
(6)
Cyberterrorism -- Prevention.
(6)
Cyberterrorism.
(6)
Microsoft Windows server.
(6)
Signal, Image and Speech Processing.
(6)
Artificial intelligence.
(5)
Client/server computing -- Security measures.
(5)
Computer networks -- Access control.
(5)
Computer security -- Handbooks, manuals, etc.
(5)
Digital watermarking.
(5)
Embedded computer systems.
(5)
Fiction.
(5)
Forensic sciences.
(5)
Hackers -- Fiction.
(5)
Handbooks and manuals.
(5)
Malware (Computer software)
(5)
SQL server.
(5)
Wireless communication systems -- Security measures.
(5)
Artificial Intelligence (incl. Robotics).
(4)
Cloud computing -- Security measures.
(4)
Computer crimes -- Investigation -- United States -- Methodology.
(4)
Computer software -- Development.
(4)
Computers -- Access control -- Passwords.
(4)
Cyberspace -- Security measures.
(4)
Data encryption (Computer science).
(4)
FICTION -- General.
(4)
Linux.
(4)
Microsoft Windows (Computer file) -- Security measures.
(4)
National security.
(4)
Open source software.
(4)
Process control -- Security measures.
(4)
Risk management.
(4)
Spyware (Computer software)
(4)
World Wide Web -- Security measures.
(4)
Andre fag (naturvidenskab og teknik) Andre fag
(3)
Application software -- Security measures.
(3)
Business enterprises -- Security measures.
(3)
Circuits and Systems.
(3)
Citrix MetaFrame.
(3)
Computer networks.
(3)
Corporations -- Security measures.
(3)
Data Encryption.
(3)
Data mining.
(3)
Directory services (Computer network technology)
(3)
Electronic circuits.
(3)
Electronic data processing departments -- Security measures.
(3)
Electronic information resources -- Access control.
(3)
Hewlett-Packard computers -- Security measures.
(3)
Information Systems Applications (incl. Internet).
(3)
Information resources management.
(3)
Intellectual property.
(3)
Internet programming.
(3)
Intrusion detection systems (Computer security)
(3)
LAW -- Forensic Science.
(3)
Mac OS.
(3)
Privacy, Right of.
(3)
Python (Computer program language)
(3)
Security Science and Technology.
(3)
Short stories.
(3)
Software configuration management.
(3)
System safety.
(3)
Web servers -- Security measures.
(3)
Web sites -- Security measures.
(3)
z/OS.
(3)
Acquisition of computer software.
(2)
Application software.
(2)
BUSINESS & ECONOMICS -- Corporate Governance.
(2)
BUSINESS & ECONOMICS -- Leadership.
(2)
BUSINESS & ECONOMICS -- Organizational Development.
(2)
BUSINESS & ECONOMICS -- Workplace Culture.
(2)
Big Data/Analytics.
(2)
Big data.
(2)
Bilgisayarlar -- Erişim kontrolü.
(2)
Bilişim teknolojisi -- Sosyal yönler.
(2)
Biometrics (Biology).
(2)
Biometrics.
(2)
COMPUTERS -- Security -- Cryptography.
(2)
COMPUTERS -- Security -- Viruses.
(2)
ColdFusion.
(2)
Computer Communication Networks.
(2)
Computer communication systems.
(2)
Computer crimes -- Case studies.
(2)
Computer networks -- Reliability.
(2)
Computer security -- United States.
(2)
Computer software -- Reliability.
(2)
Computer software -- Testing.
(2)
Computerbeveiliging.
(2)
Computercriminaliteit.
(2)
Computersicherheit
(2)
Cyberterrorism -- Fiction.
(2)
Debugging in computer science.
(2)
Electronic book.
(2)
Electronic commerce -- Security measures.
(2)
Electronic data processing departments -- Auditing.
(2)
Electronic mail messages -- Security measures.
(2)
Electronic mail systems -- Security measures.
(2)
Electronics and Microelectronics, Instrumentation.
(2)
Electronics.
(2)
Engineering & Applied Sciences.
(2)
Hacking.
(2)
IBM software.
(2)
Information technology -- Auditing.
(2)
Information technology -- Management.
(2)
Information technology -- Social aspects.
(2)
Information technology.
(2)
Information visualization.
(2)
Instant messaging -- Security measures.
(2)
Internal security.
(2)
Internet -- Safety measures.
(2)
Internet and children.
(2)
Internet searching.
(2)
Internet.
(2)
Kriptografi.
(2)
Microelectronics.
(2)
Microsoft ISA server.
(2)
Multimedia systems -- Security measures.
(2)
Online social networks -- Security measures.
(2)
Peer-to-peer architecture (Computer networks)
(2)
Penetration testing (Computer security)
(2)
Programming languages (Electronic computers)
(2)
Reverse engineering.
(2)
Risk assessment.
(2)
Réseaux d'ordinateurs -- Sécurité -- Mesures.
(2)
SQL (Computer program language)
(2)
Social engineering.
(2)
Social media.
(2)
Spam filtering (Electronic mail)
(2)
Systèmes informatiques -- Sécurité -- Mesures.
(2)
TECHNOLOGY & ENGINEERING -- Industrial Engineering.
(2)
TRUE CRIME -- White Collar Crime.
(2)
Terrorism -- Prevention.
(2)
United States.
(2)
Veri koruma.
(2)
Virtual computer systems -- Security measures.
(2)
Web sites -- Design.
(2)
XML (Document markup language)
(2)
İç güvenlik.
(2)
AIX (Computer file)
(1)
Agents intelligents (Logiciels)
(1)
Algebra, Boolean.
(1)
Algorithms.
(1)
Altre visioni. Solaris.
(1)
Application software -- Development.
(1)
Archives -- Safety measures.
(1)
Automatic machinery -- Security measures.
(1)
Avionics -- Safety measures.
(1)
BEA WebLogic server.
(1)
BUSINESS & ECONOMICS -- Business Writing.
(1)
BUSINESS & ECONOMICS -- Industrial Management.
(1)
BUSINESS & ECONOMICS -- Management Science.
(1)
BUSINESS & ECONOMICS -- Management.
(1)
BUSINESS & ECONOMICS -- Organizational Behavior.
(1)
Bases de données -- Sécurité -- Mesures.
(1)
Big data -- Security measures.
(1)
Big data -- Social aspects.
(1)
Bilgisayar ağları -- Güvenlik önlemleri.
(1)
Bilgisayar ağları -- Hukuk ve yasama.
(1)
Bilgisayar güvenliği -- Yazılım.
(1)
Bluetooth technology -- Security measures.
(1)
Bluetooth technology.
(1)
Browsers (Computer programs)
(1)
Business enterpri -- Computer networks -- Security measures.
(1)
Business planning.
(1)
Büyük veri -- Sosyal yönler.
(1)
COMPUTER INFORMATION SECURITY.
(1)
COMPUTERS -- Digital Media -- General.
(1)
COMPUTERS -- Hardware -- Handheld Devices.
(1)
COMPUTERS -- Hardware -- Personal Computers -- General.
(1)
More
View All
Fewer
Collapse All
Library
Include
Exclude
Başkent Library
Shelf Location
Include
Exclude
Atasev Private Collection
Central Library
E-Library
Ebook Central
Elsevier E-Book Collections
Kazan Vocational School
Private Collection Serdar Özersin
SPRINGER
Special Collection Sercan-İlhan Gülsün (2. Floor)
More
View All
Fewer
Collapse All
false
{sortLabel}
{alphabetical}
{relevance}
{include}
{exclude}
{facetName}
{results}
{displayName}
{count}
{error}
Select an Action
Place Hold(s)
Add to My Lists
Email
Print
502 Results Found
1
..
36
37
38
39
40
..
42
Sort By:
Relevance (Default)
Publication Date (Ascending)
Publication Date (Descending)
Title
Author
OK
Email Address
:
Phone Number:
Mobile Carrier:
AT&T
Boost
Nextel (Sprint)
Sprint (PCS)
T Mobile
TracFone
US Cellular
Verizon
Virgin
Select An Item
Data usage warning: You will receive one text message for each title you selected.
Standard text messaging rates apply.
Text it to me
Text it to me, and go to next item
000000000000
DEFAULT
Select a list
Temporary List
Make this your default list.
The following items were successfully added.
There was an error while adding the following items. Please try again.
Information getting, protecting and using data.
445.
Information getting, protecting and using data.
by
ProQuest (Firm)
Click to View
Format:
Information getting, protecting and using data.
446.
Information getting, protecting and using data.
by
ProQuest (Firm)
Click to View
Format:
Security secrets, intruders and ID tags.
447.
Security secrets, intruders and ID tags.
by
ProQuest (Firm)
Click to View
Format:
Network security a practical guide
448.
Network security a practical guide
by
Poole, Owen.
Click to View
Format:
Cybersecurity operations handbook
449.
Cybersecurity operations handbook
by
Rittinghouse, John W.
Click to View
Format:
Finding and fixing vulnerabilities in information systems the vulnerability assessment & mitigation methodology
450.
Finding and fixing vulnerabilities in information systems the vulnerability assessment & mitigation methodology
by
Antón, Philip S.
Click to View
Format:
Techniques and applications of digital watermarking and content protection
451.
Techniques and applications of digital watermarking and content protection
by
Arnold, Michael (Michael Konrad), 1964-
Click to View
Format:
Role-based access control
452.
Role-based access control
by
Ferraiolo, David.
Click to View
Format:
Security technologies for the World Wide Web
453.
Security technologies for the World Wide Web
by
Oppliger, Rolf.
Click to View
Format:
Mission-critical network planning
454.
Mission-critical network planning
by
Liotine, Matthew.
Click to View
Format:
Hacking the art of exploitation
455.
Hacking the art of exploitation
by
Erickson, Jon, 1977-
Click to View
Format:
Configuring Symantec Antivirus, Corporate Edition
456.
Configuring Symantec Antivirus, Corporate Edition
by
Hunter, Laura E.
Click to View
Format:
Select an Action
Place Hold(s)
Add to My Lists
Email
Print
1
..
36
37
38
39
40
..
42
Search Results
Electronic Resources
Search Results
Electronic Resources
OK
Email Address
:
Phone Number:
Mobile Carrier:
AT&T
Boost
Nextel (Sprint)
Sprint (PCS)
T Mobile
TracFone
US Cellular
Verizon
Virgin
Select An Item
Data usage warning: You will receive one text message for each title you selected.
Standard text messaging rates apply.
Text it to me
Text it to me, and go to next item
Electronic Resources
Fetching Results for Electronic Resources...
action