Skip to:
Search Results
|
Bottom
|
Search Facets
|
Content
Log In
|
My Account
|
My Lists
|
|
Remember to clear the cache and close the browser window.
Türkçe
Search Limit
Everything
Electronic Resources
All
Başkent University Library
Anadolu OSB Meslek Yüksekokulu
Atasev Özel Koleksiyon
Fine Arts And Design Archive
Erdoğan Tercan Collection
Kazan Meslek Yüksekokulu
Law Collection
Ord.Prof.Dr. Enver Ziya Karal Tarih Uygulama Ars.Mrk.
Özel Koleksiyon Serdar Özersin
Thesis Collection
All Fields
Title
Author
Subject
ISBN
ISSN
13
Search Field
All Fields
Search For:
Advanced Search
Search Results
Electronic Resources
Limit Search Results
Narrowed by:
+
Subject: Computer security.
Author
Include
Exclude
ProQuest (Firm)
(9)
Andress, Jason.
(2)
Mitnick, Kevin D.
(2)
SpringerLink (Online service)
(2)
Winkler, J. R. (Joachim R.)
(2)
Alexander, Philip, 1963-
(1)
Axelrod, C. Warren.
(1)
Bayuk, Jennifer L.
(1)
Bhateja, Vikrant. editor.
(1)
Contos, Brian T.
(1)
Cox, I. J. (Ingemar J.)
(1)
Devost, Matthew G.
(1)
Ellis, Juanita.
(1)
Gantz, Stephen D.
(1)
Hawker, Andrew.
(1)
Hosack, Bryan., author.
(1)
Johnson, Norris L.
(1)
Joukov, Nikolai. editor.
(1)
Kim, Kuinam. editor.
(1)
Krush, Waylon.
(1)
Lin, Ching-Yung.
(1)
Long, Johnny.
(1)
Mandal, Jyotsna Kumar. editor.
(1)
Martínez-Ballesté, Antoni.
(1)
Maske, Steve.
(1)
Maynor, David.
(1)
Mehan, Julie E.
(1)
Messier, Ric, author.
(1)
Milne, George R., author.
(1)
Misra, Anmol.
(1)
Mitnick, Kevin D. (Kevin David), 1963-
(1)
Moeller, Robert R.
(1)
Qian, Yi, 1962-
(1)
Ransome, James.
(1)
Rogers, Mark, designer.
(1)
Rogers, Russ.
(1)
Romer, Brian, editor.
(1)
Sagers, Glen., author.
(1)
Sanyal, Manas Kumar. editor.
(1)
Satapathy, Suresh Chandra. editor.
(1)
Schoenfield, Brook.
(1)
Schutzer, Daniel, 1940-
(1)
Shinder, Debra Littlejohn, author.
(1)
Simon, William L., joint author
(1)
Simon,William L., ortak yazar
(1)
Smallwood, Robert F., 1959-
(1)
Solanas, Agusti.
(1)
Speed, Tim.
(1)
Stefanek, George L.
(1)
Tezcan, Nejat Eralp, translated
(1)
Tezcan, Nejat Eralp, çeviren
(1)
Tittel, Ed, author.
(1)
Todd, Chad.
(1)
Vasudevan, Vinod, author.
(1)
Wiles, Jack.
(1)
Winkler, Ira.
(1)
Young, Carl S., author.
(1)
Yu, Hong Heather, 1967-
(1)
Zeng, Wenjun, 1967-
(1)
More
View All
Fewer
Collapse All
Material Type
Include
Exclude
Book
E-Book
Language
Include
Exclude
English
(35)
Turkish
(2)
Publication Date
Include
Exclude
-
2007
(4)
2008
(4)
2009
(4)
2011
(4)
2014
(3)
2002
(2)
2003
(2)
2005
(2)
2006
(2)
2010
(2)
2015
(2)
2016
(2)
2017
(2)
2000
(1)
2001
(1)
2012
(1)
More
View All
Fewer
Collapse All
Subject
Include
Exclude
Electronic books.
(33)
Computer networks -- Security measures.
(14)
COMPUTERS -- Internet -- Security.
(13)
COMPUTERS -- Networking -- Security.
(13)
COMPUTERS -- Security -- General.
(13)
Information technology -- Security measures.
(9)
Data protection.
(7)
Cloud computing.
(3)
Computer crimes -- Prevention.
(3)
Artificial intelligence.
(2)
Bilgisayar güvenliği.
(2)
Bilişim teknolojisi -- Sosyal yönler.
(2)
Business enterprises -- Computer networks -- Security measures.
(2)
Communications Engineering, Networks.
(2)
Computational intelligence.
(2)
Computer science.
(2)
Electrical engineering.
(2)
Electronic data processing departments -- Auditing.
(2)
Engineering.
(2)
Information resources management.
(2)
Information technology -- Auditing.
(2)
Information technology -- Management.
(2)
Information technology -- Social aspects.
(2)
Information technology.
(2)
Internal security.
(2)
Internet -- Security measures.
(2)
Systems and Data Security.
(2)
İç güvenlik.
(2)
Artificial Intelligence (incl. Robotics).
(1)
BUSINESS & ECONOMICS -- Corporate Governance.
(1)
BUSINESS & ECONOMICS -- Leadership.
(1)
BUSINESS & ECONOMICS -- Organizational Development.
(1)
BUSINESS & ECONOMICS -- Workplace Culture.
(1)
COMPUTERS -- Security -- Cryptography.
(1)
Computer Science.
(1)
Computer Security
(1)
Computer crimes -- Investigation -- Handbooks, manuals, etc.
(1)
Computer crimes -- Investigation.
(1)
Computer networks -- Certification.
(1)
Computer networks -- Reliability.
(1)
Computer networks -- Security measures -- Handbooks, manuals, etc.
(1)
Computer networks -- Security measures -- Standards.
(1)
Computer security -- Handbooks, manuals, etc.
(1)
Computer software -- Reliability.
(1)
Computercriminaliteit.
(1)
Criminalistiek.
(1)
Cyberspace -- Security measures.
(1)
Cyberterrorism.
(1)
Data protection -- Standards.
(1)
Database security.
(1)
Digital watermarking.
(1)
Electronic records.
(1)
Encryption
(1)
Engineering & Applied Sciences.
(1)
Forensic sciences -- Handbooks, manuals, etc.
(1)
Forensic sciences.
(1)
Future of Privacy
(1)
Hackers.
(1)
Handbooks and manuals.
(1)
Industries -- Security measures.
(1)
Information Assurance
(1)
Information Exchange
(1)
Information technology -- Certification.
(1)
Information technology -- Standards.
(1)
Intellectual property.
(1)
Internet -- Access control.
(1)
Internet searching.
(1)
Management information systems.
(1)
Multimedia systems -- Security measures.
(1)
Network Security
(1)
Personal Computing Security
(1)
Personally Identifiable Information (PII)
(1)
Privacy
(1)
Privacy Harms and Protections
(1)
Technology
(1)
Teleshopping.
(1)
More
View All
Fewer
Collapse All
Library
Include
Exclude
Başkent Library
Shelf Location
Include
Exclude
Atasev Private Collection
Central Library
E-Library
Ebook Central
Elsevier E-Book Collections
SPRINGER
Special Collection Sercan-İlhan Gülsün (2. Floor)
More
View All
Fewer
Collapse All
false
{sortLabel}
{alphabetical}
{relevance}
{include}
{exclude}
{facetName}
{results}
{displayName}
{count}
{error}
Select an Action
Place Hold(s)
Add to My Lists
Email
Print
37 Results Found
1
2
3
4
Sort By:
Relevance (Default)
Publication Date (Ascending)
Publication Date (Descending)
Title
Author
OK
Email Address
:
Phone Number:
Mobile Carrier:
AT&T
Boost
Nextel (Sprint)
Sprint (PCS)
T Mobile
TracFone
US Cellular
Verizon
Virgin
Select An Item
Data usage warning: You will receive one text message for each title you selected.
Standard text messaging rates apply.
Text it to me
Text it to me, and go to next item
0
DEFAULT
Select a list
Temporary List
Make this your default list.
The following items were successfully added.
There was an error while adding the following items. Please try again.
Techno Security's guide to managing risks : for IT managers, auditors, and investigators
37.
Techno Security's guide to managing risks : for IT managers, auditors, and investigators
by
Wiles, Jack.
ScienceDirect
http://www.sciencedirect.com/science/book/9781597491389
Format:
Excerpt:
Information discusses collecting hardware and information from the scene. Amber Schroader on Cell Phone
Select an Action
Place Hold(s)
Add to My Lists
Email
Print
1
2
3
4
Search Results
Electronic Resources
Search Results
Electronic Resources
OK
Email Address
:
Phone Number:
Mobile Carrier:
AT&T
Boost
Nextel (Sprint)
Sprint (PCS)
T Mobile
TracFone
US Cellular
Verizon
Virgin
Select An Item
Data usage warning: You will receive one text message for each title you selected.
Standard text messaging rates apply.
Text it to me
Text it to me, and go to next item
Electronic Resources
Fetching Results for Electronic Resources...
action
Go to:
Search Results
|
Search Facets
|
Top of Page