Log In
|
My Account
|
My Lists
|
|
Remember to clear the cache and close the browser window.
Türkçe
Search Limit
Everything
Electronic Resources
All
Başkent University Library
Anadolu OSB Meslek Yüksekokulu
Atasev Özel Koleksiyon
Fine Arts And Design Archive
Erdoğan Tercan Collection
Kazan Meslek Yüksekokulu
Law Collection
Ord.Prof.Dr. Enver Ziya Karal Tarih Uygulama Ars.Mrk.
Özel Koleksiyon Serdar Özersin
Thesis Collection
All Fields
Title
Author
Subject
ISBN
ISSN
8
Search Field
All Fields
Search For:
Advanced Search
Search Results
Electronic Resources
Limit Search Results
Narrowed by:
+
Subject: Computer security.
Author
Include
Exclude
ProQuest (Firm)
(196)
SpringerLink (Online service)
(22)
Foster, James C.
(11)
Fourastier, Yannick, editor.
(11)
Piètre-Cambacédès, Ludovic, editor.
(11)
International Business Machines Corporation. International Technical Support Organization.
(10)
Long, Johnny.
(9)
Russell, Ryan, 1969-
(6)
Calder, Alan, author.
(5)
Carvey, Harlan A.
(5)
Cross, Michael, 1965-
(5)
Hurley, Chris.
(5)
Wiles, Jack.
(5)
Beale, Jay.
(4)
Bhateja, Vikrant. editor.
(4)
Cherry, Denny.
(4)
Cole, Eric.
(4)
Hunter, Laura E.
(4)
Limbert, Matthew, designer.
(4)
Piltzecker, Tony, 1975-
(4)
Rayns, Chris.
(4)
Ring, Sandra.
(4)
Rittinghouse, John W.
(4)
Satapathy, Suresh Chandra. editor.
(4)
Shinder, Thomas W.
(4)
Buchanan, Cameron, author.
(3)
Clercq, Jan de, 1968-
(3)
Contos, Brian T.
(3)
Cox, I. J. (Ingemar J.)
(3)
Katsaropoulos, Chris, editor.
(3)
Mullen, Timothy M.
(3)
Rogers, Mark, designer.
(3)
Sachs, Marcus H.
(3)
Shinder, Debra Littlejohn.
(3)
Winkler, J. R. (Joachim R.)
(3)
Wyler, Neil R.
(3)
XYPRO Technology Corporation.
(3)
Alder, Raven.
(2)
Amini, Rob.
(2)
Andress, Jason.
(2)
Aquilina, James M.
(2)
Baskin, Brian.
(2)
Bayles, Aaron W.
(2)
Ben-Natan, Ron.
(2)
Boulanger, Jean-Louis.
(2)
Brindley, Ed.
(2)
Burnett, Mark (Mark M.)
(2)
Casey, Eoghan.
(2)
Caswell, Brian.
(2)
Chaffin, Larry.
(2)
Chaki, Nabendu. editor.
(2)
Chaki, Rituparna. editor.
(2)
Chandramouli, Ramaswamy.
(2)
Clarke, Justin.
(2)
Cortesi, Agostino. editor.
(2)
Dalziel, Henry, author.
(2)
Dalziel, Henry, editor.
(2)
Engebretson, Pat (Patrick Henry), 1974-
(2)
Erickson, Jon, 1977-
(2)
Fair, Ted.
(2)
Ferraiolo, David.
(2)
Foster, Stephen C.
(2)
Fourastier, Yannick, author.
(2)
Goodman, Seymour E.
(2)
Grasdal, Martin.
(2)
Grillenmeier, Guido.
(2)
Hancock, Bill, 1957-
(2)
Henmi, Anne.
(2)
Honick, Ron.
(2)
Hutchens, Justin, author.
(2)
Joshi, Amit. editor.
(2)
Kinney, Steven.
(2)
Kleidermacher, David.
(2)
Kleidermacher, Mike.
(2)
Knapp, Eric.
(2)
Koh.
(2)
Krutz, Ronald L.
(2)
Kuhn, D. Richard.
(2)
Lin, Ching-Yung.
(2)
Malin, Cameron H.
(2)
Mao, Wenji.
(2)
Maynor, David.
(2)
Meyer, Greg.
(2)
Mitnick, Kevin D.
(2)
Moskowitz, Jeremy.
(2)
Nordfelt, Michael.
(2)
Oppliger, Rolf.
(2)
Parker, Tom.
(2)
Piccard, Paul L.
(2)
Pietre-Cambacedes, Ludovic, author.
(2)
Potter, Bruce.
(2)
Qian, Yi, 1962-
(2)
Ramachandran, Vivek, author.
(2)
Ramirez, Gilbert.
(2)
Ransome, James F.
(2)
Rash, Michael.
(2)
Rathaus, Noam.
(2)
Rogers, Russ.
(2)
Saeed, Khalid. editor.
(2)
ScienceDirect (Online service)
(2)
Shein, Rob.
(2)
Shimonski, Robert.
(2)
Stanger, James.
(2)
Stapko, Timothy John.
(2)
Ticher, Paul, author.
(2)
Todd, Chad.
(2)
Tyson, Dave.
(2)
Vacca, John R.
(2)
Wang, Fei-Yue.
(2)
Wheeler, Evan.
(2)
Winkler, Ira.
(2)
Wotring, Brian.
(2)
Young, Carl S., author.
(2)
Yu, Hong Heather, 1967-
(2)
Zalewski, Michal.
(2)
Zeng, Wenjun, 1967-
(2)
'Ken'@ftu.
(1)
131ah.
(1)
AXELOS Limited, author.
(1)
Abbadi, Imad M., author.
(1)
Ablon, Lillian, author.
(1)
Agre, Philip.
(1)
Ahmad, David R. Mirza.
(1)
Ahmad, Rabiah. editor.
(1)
Akashe, Shyam. editor.
(1)
Akleylek, Sedat, Doç. Dr., editör
(1)
Al-maadeed, Somaya. editor.
(1)
Alam, Shahnawaz, author.
(1)
Alcover, Jorge Blanco.
(1)
Aleroud, Ahmed. editor.
(1)
Alexander, Philip, 1963-
(1)
Alkan, Mustafa, Doç. Dr., yazar
(1)
Alsmadi, Izzat M. editor.
(1)
Alvarado, Ellen.
(1)
American Evaluation Association.
(1)
Amini, M. Hadi. author.
(1)
Amoroso, Edward G.
(1)
Anderson, Brian (Brian James)
(1)
Andress, Jason, author.
(1)
Andrés, Steven.
(1)
Antón, Philip S.
(1)
Anzaldua, Reynaldo.
(1)
Aquilina, James, author.
(1)
Archibald, Neil.
(1)
Arnold, Michael (Michael Konrad), 1964-
(1)
Arvanitis, Nicholas, editor.
(1)
Ashenden, Debi.
(1)
Assam, Tarek.
(1)
Awad, Ahmed. editor.
(1)
Axelrod, C. Warren.
(1)
Aydın, Ömer, Dr. Öğr. Üyesi, editör
(1)
Baccas, Paul.
(1)
Bajracharya, Chandra. author.
(1)
Baker, Andrew R.
(1)
Baker, Paul R., 1958-
(1)
Barnett, Ryan C.
(1)
Barrett, Diane.
(1)
Basagiannis, Stylianos, contributor.
(1)
Baskerville, Richard.
(1)
Baskin, Brian, author.
(1)
Bayuk, Jennifer L.
(1)
Beaver, Kevin.
(1)
Bednarczyk, Michael.
(1)
Beghdadi, Azeddine. editor.
(1)
Belapurkar, Abhijit.
(1)
Ben-Ari, Erez.
(1)
Bennett, Eleanor Leonne, cover designer.
(1)
Benny, Daniel J.
(1)
Berber, Leyla Keser
(1)
Berghe, Thierry van den, author.
(1)
Bergstra, J. A.
(1)
Bertino, Elisa.
(1)
Bhalla, Nish.
(1)
Bhardwaj, Pawan K.
(1)
Bhunia, Swarup, author.
(1)
Bhunia, Swarup. editor.
(1)
Bianco, David J., 1971-
(1)
Bidwell, Teri.
(1)
Bin Azad, Tariq.
(1)
Binnie, Christopher, author.
(1)
Bishop, Matt (Matthew A.)
(1)
Black Hat Press (Goodhue, Minn.)
(1)
Blair, John, author.
(1)
Blobel, Bernd.
(1)
Bloom, Jeffrey A. (Jeffrey Adam), 1964-
(1)
Bodur, Hüseyin, yazar.
(1)
Bolt, Steven.
(1)
Bonertz, Tina.
(1)
Bonnell, Ralph.
(1)
Borges de Oliveira, Fábio. author.
(1)
Boroojeni, Kianoosh G. author.
(1)
Bott, Ed.
(1)
Bouridane, Ahmed. editor.
(1)
Bradley, Jaron, author.
(1)
Bradley, Tony, 1969-
(1)
Bradley, Tony.
(1)
Brathwaite, Shimon, author.
(1)
Bray, Rory.
(1)
Breimeier, Johannes.
(1)
Brennen, Jerod, editor.
(1)
More
View All
Fewer
Collapse All
Material Type
Include
Exclude
Book
E-Book
Language
Include
Exclude
English
(467)
Turkish
(17)
French
(14)
German
(3)
Publication Date
Include
Exclude
-
2015
(40)
2005
(39)
2013
(37)
2004
(35)
2007
(35)
2017
(35)
2006
(31)
2014
(28)
2010
(27)
2011
(27)
2008
(25)
2012
(25)
2016
(22)
2003
(21)
2002
(20)
2019
(15)
2001
(10)
2018
(10)
2009
(9)
2022
(3)
1979
(2)
1987
(2)
1990
(2)
1991
(2)
1997
(2)
2000
(2)
2025
(2)
1300
(1)
1301
(1)
1302
(1)
1303
(1)
1304
(1)
1305
(1)
1306
(1)
1307
(1)
1308
(1)
1309
(1)
1310
(1)
1311
(1)
1312
(1)
1313
(1)
1314
(1)
1900
(1)
1901
(1)
1902
(1)
1903
(1)
1904
(1)
1905
(1)
1906
(1)
1907
(1)
1908
(1)
1909
(1)
1910
(1)
1911
(1)
1912
(1)
1913
(1)
1914
(1)
1915
(1)
1916
(1)
1917
(1)
1918
(1)
1919
(1)
1920
(1)
1921
(1)
1922
(1)
1923
(1)
1924
(1)
1925
(1)
1926
(1)
1927
(1)
1928
(1)
1929
(1)
1930
(1)
1931
(1)
1932
(1)
1933
(1)
1934
(1)
1935
(1)
1936
(1)
1937
(1)
1938
(1)
1939
(1)
1940
(1)
1941
(1)
1942
(1)
1943
(1)
1944
(1)
1945
(1)
1946
(1)
1947
(1)
1948
(1)
1949
(1)
1950
(1)
1951
(1)
1952
(1)
1953
(1)
1954
(1)
1955
(1)
1956
(1)
1957
(1)
1958
(1)
1959
(1)
1960
(1)
1961
(1)
1962
(1)
1963
(1)
1964
(1)
1965
(1)
1966
(1)
1967
(1)
1968
(1)
1969
(1)
1970
(1)
1971
(1)
1972
(1)
1973
(1)
1974
(1)
1975
(1)
1976
(1)
1977
(1)
1978
(1)
1980
(1)
1981
(1)
1982
(1)
1983
(1)
1984
(1)
1985
(1)
1986
(1)
1988
(1)
1989
(1)
1992
(1)
1993
(1)
1994
(1)
1995
(1)
1996
(1)
1998
(1)
1999
(1)
2020
(1)
More
View All
Fewer
Collapse All
Subject
Include
Exclude
Electronic books.
(459)
Computer networks -- Security measures.
(162)
COMPUTERS -- Internet -- Security.
(68)
COMPUTERS -- Networking -- Security.
(68)
COMPUTERS -- Security -- General.
(68)
Data protection.
(43)
Internet -- Security measures.
(27)
Systems and Data Security.
(22)
Bilgisayar güvenliği.
(21)
Engineering.
(21)
Computer hackers.
(19)
Computers -- Access control.
(19)
Microsoft Windows (Computer file)
(17)
Computer crimes.
(15)
Communications Engineering, Networks.
(14)
Electrical engineering.
(14)
Database security.
(13)
Computer crimes -- Prevention.
(12)
Cryptography.
(12)
Hackers.
(12)
Operating systems (Computers)
(12)
Computer crimes -- Investigation.
(11)
Data encryption (Computer science)
(11)
Business enterprises -- Computer networks -- Security measures.
(10)
Computational intelligence.
(10)
Information technology -- Security measures.
(10)
Computer viruses.
(8)
Firewalls (Computer security)
(7)
Security systems.
(7)
Client/server computing.
(6)
Cloud computing.
(6)
Computer science.
(6)
Computer security -- Fiction.
(6)
Cyberterrorism -- Prevention.
(6)
Cyberterrorism.
(6)
Microsoft Windows server.
(6)
Signal, Image and Speech Processing.
(6)
Artificial intelligence.
(5)
Client/server computing -- Security measures.
(5)
Computer networks -- Access control.
(5)
Computer security -- Handbooks, manuals, etc.
(5)
Digital watermarking.
(5)
Embedded computer systems.
(5)
Fiction.
(5)
Forensic sciences.
(5)
Hackers -- Fiction.
(5)
Handbooks and manuals.
(5)
Malware (Computer software)
(5)
SQL server.
(5)
Wireless communication systems -- Security measures.
(5)
Artificial Intelligence (incl. Robotics).
(4)
Cloud computing -- Security measures.
(4)
Computer crimes -- Investigation -- United States -- Methodology.
(4)
Computer software -- Development.
(4)
Computers -- Access control -- Passwords.
(4)
Cyberspace -- Security measures.
(4)
Data encryption (Computer science).
(4)
FICTION -- General.
(4)
Linux.
(4)
Microsoft Windows (Computer file) -- Security measures.
(4)
National security.
(4)
Open source software.
(4)
Process control -- Security measures.
(4)
Risk management.
(4)
Spyware (Computer software)
(4)
World Wide Web -- Security measures.
(4)
Andre fag (naturvidenskab og teknik) Andre fag
(3)
Application software -- Security measures.
(3)
Business enterprises -- Security measures.
(3)
Circuits and Systems.
(3)
Citrix MetaFrame.
(3)
Computer networks.
(3)
Corporations -- Security measures.
(3)
Data Encryption.
(3)
Data mining.
(3)
Directory services (Computer network technology)
(3)
Electronic circuits.
(3)
Electronic data processing departments -- Security measures.
(3)
Electronic information resources -- Access control.
(3)
Hewlett-Packard computers -- Security measures.
(3)
Information Systems Applications (incl. Internet).
(3)
Information resources management.
(3)
Intellectual property.
(3)
Internet programming.
(3)
Intrusion detection systems (Computer security)
(3)
LAW -- Forensic Science.
(3)
Mac OS.
(3)
Privacy, Right of.
(3)
Python (Computer program language)
(3)
Security Science and Technology.
(3)
Short stories.
(3)
Software configuration management.
(3)
System safety.
(3)
Web servers -- Security measures.
(3)
Web sites -- Security measures.
(3)
z/OS.
(3)
Acquisition of computer software.
(2)
Application software.
(2)
BUSINESS & ECONOMICS -- Corporate Governance.
(2)
BUSINESS & ECONOMICS -- Leadership.
(2)
BUSINESS & ECONOMICS -- Organizational Development.
(2)
BUSINESS & ECONOMICS -- Workplace Culture.
(2)
Big Data/Analytics.
(2)
Big data.
(2)
Bilgisayarlar -- Erişim kontrolü.
(2)
Bilişim teknolojisi -- Sosyal yönler.
(2)
Biometrics (Biology).
(2)
Biometrics.
(2)
COMPUTERS -- Security -- Cryptography.
(2)
COMPUTERS -- Security -- Viruses.
(2)
ColdFusion.
(2)
Computer Communication Networks.
(2)
Computer communication systems.
(2)
Computer crimes -- Case studies.
(2)
Computer networks -- Reliability.
(2)
Computer security -- United States.
(2)
Computer software -- Reliability.
(2)
Computer software -- Testing.
(2)
Computerbeveiliging.
(2)
Computercriminaliteit.
(2)
Computersicherheit
(2)
Cyberterrorism -- Fiction.
(2)
Debugging in computer science.
(2)
Electronic book.
(2)
Electronic commerce -- Security measures.
(2)
Electronic data processing departments -- Auditing.
(2)
Electronic mail messages -- Security measures.
(2)
Electronic mail systems -- Security measures.
(2)
Electronics and Microelectronics, Instrumentation.
(2)
Electronics.
(2)
Engineering & Applied Sciences.
(2)
Hacking.
(2)
IBM software.
(2)
Information technology -- Auditing.
(2)
Information technology -- Management.
(2)
Information technology -- Social aspects.
(2)
Information technology.
(2)
Information visualization.
(2)
Instant messaging -- Security measures.
(2)
Internal security.
(2)
Internet -- Safety measures.
(2)
Internet and children.
(2)
Internet searching.
(2)
Internet.
(2)
Kriptografi.
(2)
Microelectronics.
(2)
Microsoft ISA server.
(2)
Multimedia systems -- Security measures.
(2)
Online social networks -- Security measures.
(2)
Peer-to-peer architecture (Computer networks)
(2)
Penetration testing (Computer security)
(2)
Programming languages (Electronic computers)
(2)
Reverse engineering.
(2)
Risk assessment.
(2)
Réseaux d'ordinateurs -- Sécurité -- Mesures.
(2)
SQL (Computer program language)
(2)
Social engineering.
(2)
Social media.
(2)
Spam filtering (Electronic mail)
(2)
Systèmes informatiques -- Sécurité -- Mesures.
(2)
TECHNOLOGY & ENGINEERING -- Industrial Engineering.
(2)
TRUE CRIME -- White Collar Crime.
(2)
Terrorism -- Prevention.
(2)
United States.
(2)
Veri koruma.
(2)
Virtual computer systems -- Security measures.
(2)
Web sites -- Design.
(2)
XML (Document markup language)
(2)
İç güvenlik.
(2)
AIX (Computer file)
(1)
Agents intelligents (Logiciels)
(1)
Algebra, Boolean.
(1)
Algorithms.
(1)
Altre visioni. Solaris.
(1)
Application software -- Development.
(1)
Archives -- Safety measures.
(1)
Automatic machinery -- Security measures.
(1)
Avionics -- Safety measures.
(1)
BEA WebLogic server.
(1)
BUSINESS & ECONOMICS -- Business Writing.
(1)
BUSINESS & ECONOMICS -- Industrial Management.
(1)
BUSINESS & ECONOMICS -- Management Science.
(1)
BUSINESS & ECONOMICS -- Management.
(1)
BUSINESS & ECONOMICS -- Organizational Behavior.
(1)
Bases de données -- Sécurité -- Mesures.
(1)
Big data -- Security measures.
(1)
Big data -- Social aspects.
(1)
Bilgisayar ağları -- Güvenlik önlemleri.
(1)
Bilgisayar ağları -- Hukuk ve yasama.
(1)
Bilgisayar güvenliği -- Yazılım.
(1)
Bluetooth technology -- Security measures.
(1)
Bluetooth technology.
(1)
Browsers (Computer programs)
(1)
Business enterpri -- Computer networks -- Security measures.
(1)
Business planning.
(1)
Büyük veri -- Sosyal yönler.
(1)
COMPUTER INFORMATION SECURITY.
(1)
COMPUTERS -- Digital Media -- General.
(1)
COMPUTERS -- Hardware -- Handheld Devices.
(1)
COMPUTERS -- Hardware -- Personal Computers -- General.
(1)
More
View All
Fewer
Collapse All
Library
Include
Exclude
Başkent Library
Shelf Location
Include
Exclude
Atasev Private Collection
Central Library
E-Library
Ebook Central
Elsevier E-Book Collections
Kazan Vocational School
Private Collection Serdar Özersin
SPRINGER
Special Collection Sercan-İlhan Gülsün (2. Floor)
More
View All
Fewer
Collapse All
false
{sortLabel}
{alphabetical}
{relevance}
{include}
{exclude}
{facetName}
{results}
{displayName}
{count}
{error}
Select an Action
Place Hold(s)
Add to My Lists
Email
Print
502 Results Found
1
2
3
4
5
..
42
Sort By:
Relevance (Default)
Publication Date (Ascending)
Publication Date (Descending)
Title
Author
OK
Email Address
:
Phone Number:
Mobile Carrier:
AT&T
Boost
Nextel (Sprint)
Sprint (PCS)
T Mobile
TracFone
US Cellular
Verizon
Virgin
Select An Item
Data usage warning: You will receive one text message for each title you selected.
Standard text messaging rates apply.
Text it to me
Text it to me, and go to next item
000000000000
DEFAULT
Select a list
Temporary List
Make this your default list.
The following items were successfully added.
There was an error while adding the following items. Please try again.
Ağ ve siber güvenlik temelleri : dijital dünyada güvende kalın
1.
Ağ ve siber güvenlik temelleri : dijital dünyada güvende kalın
by
Hınçer, Görkem, yazar.
Format:
Siber güvenlik rehberi : tehditten çözüme
2.
Siber güvenlik rehberi : tehditten çözüme
by
Yıldırım, Hakan, yazar.
Format:
Siber güvenlik ve savunma : siber güvenlik ontolojisi, tehditler ve çözümler
3.
Siber güvenlik ve savunma : siber güvenlik ontolojisi, tehditler ve çözümler
by
Sağıroğlu, Şeref, Prof. Dr., editör
Format:
Bilgisayar sistemlerinde güvenlik ve gizlilik
4.
Bilgisayar sistemlerinde güvenlik ve gizlilik
by
Aydın, Ömer, Dr. Öğr. Üyesi, editör
Format:
Sosyal mühendislik, bilgi güvenliği ve endüstri 4.0
5.
Sosyal mühendislik, bilgi güvenliği ve endüstri 4.0
by
Özmen, Cevdet, Dr., yazar.
Format:
Security controls evaluation, testing, and assessment handbook
6.
Security controls evaluation, testing, and assessment handbook
by
Johnson, Leighton, author.
Click to View
Format:
Siber güvenlik : saldırı & savunma stratejileri
7.
Siber güvenlik : saldırı & savunma stratejileri
by
Özkaya, Erdal
Format:
Understanding security issues
8.
Understanding security issues
by
Donaldson, Scott E., author.
Click to View
Format:
Cybersecurity law : protect yourself and your customers
9.
Cybersecurity law : protect yourself and your customers
by
Brathwaite, Shimon, author.
Click to View
Format:
Cybersecurity blue team toolkit
10.
Cybersecurity blue team toolkit
by
Tanner, Nadean, author.
Click to View
Format:
Cyber security in parallel and distributed computing : concepts, techniques, applications and case studies
11.
Cyber security in parallel and distributed computing : concepts, techniques, applications and case studies
by
Le, Dac-Nhuong, 1983- editor.
Click to View
Format:
Hardware security : a hands-on learning approach
12.
Hardware security : a hands-on learning approach
by
Bhunia, Swarup, author.
Click to View
Format:
Select an Action
Place Hold(s)
Add to My Lists
Email
Print
1
2
3
4
5
..
42
Search Results
Electronic Resources
Search Results
Electronic Resources
OK
Email Address
:
Phone Number:
Mobile Carrier:
AT&T
Boost
Nextel (Sprint)
Sprint (PCS)
T Mobile
TracFone
US Cellular
Verizon
Virgin
Select An Item
Data usage warning: You will receive one text message for each title you selected.
Standard text messaging rates apply.
Text it to me
Text it to me, and go to next item
Electronic Resources
Fetching Results for Electronic Resources...
action