Skip to:
Search Results
|
Bottom
|
Search Facets
|
Content
Giriş
|
Hesabım
|
Listelerim
|
|
Remember to clear the cache and close the browser window.
English
Search Limit
Bütün Kütüphaneler
Elektronik Kaynaklar
Hepsi
Başkent Üniversitesi Kütüphanesi
Anadolu OSB Meslek Yüksekokulu
Atasev Özel Koleksiyon
Erdoğan Tercan Koleksiyonu
Güzel Sanatlar ve Tasarım Arşivi
Kazan Meslek Yüksekokulu
Hukuk Koleksiyonu
Ord.Prof.Dr. Enver Ziya Karal Tarih Uygulama Ars.Mrk.
Özel Koleksiyon Serdar Özersin
Tez Koleksiyonu
Tüm Alanlar
Başlık
Yazar
Konu
ISBN
ISSN
13
Search Field
Tüm Alanlar
Arama:
Gelişmiş Arama
Search Results
Elektronik Kaynaklar
Arama Sonuçlarını Sınırlandır
Daraltılmış:
+
Language: English
+
Kütüphane: Başkent Kütüphanesi
+
Konu: Computer crimes.
+
Konu: Computer security.
Yazar
Dahil
Hariç
ProQuest (Firm)
(5)
Honick, Ron.
(2)
Alder, Raven.
(1)
Anzaldua, Reynaldo.
(1)
Bidwell, Teri.
(1)
Blair, John, author.
(1)
Burnett, Mark (Mark M.)
(1)
Carroll, John M. (John Millar), 1925-
(1)
Carvey, Harlan, author.
(1)
Carvey, Harlan.
(1)
Choi, Kyung-shick, 1973-
(1)
Craig, Paul.
(1)
Cross, Michael, 1965-
(1)
C̆ervĕn, Pavol.
(1)
Healey, Justin, editor.
(1)
Leibrock, Larry, editor.
(1)
Leman-Langlois, Stéphane, 1965-
(1)
Long, Johnny.
(1)
Mullen, Timothy M.
(1)
Russell, Ryan, 1969-
(1)
Schaefer, Dirk. editor.
(1)
Shavers, Brett, author.
(1)
SpringerLink (Online service)
(1)
Street, Jayson E.
(1)
Street, Jayson E. Dissecting the hack.
(1)
Thames, Lane. editor.
(1)
Volonino, Linda.
(1)
Daha fazla
Tümünü genişlet
Daha az
Hepsini Daralt
Materyal Türü
Dahil
Hariç
E-Kitap
Yayın Yılı
Dahil
Hariç
-
2005
(3)
2002
(2)
2010
(2)
2016
(2)
1987
(1)
2008
(1)
2011
(1)
2013
(1)
2015
(1)
2017
(1)
Daha fazla
Tümünü genişlet
Daha az
Hepsini Daralt
Konu
Dahil
Hariç
Electronic books.
(14)
Computer networks -- Security measures.
(4)
Microsoft Windows (Computer file)
(3)
Operating systems (Computers)
(3)
Acquisition of computer software.
(2)
Hackers.
(2)
TRUE CRIME -- White Collar Crime.
(2)
BUSINESS & ECONOMICS -- Industrial Management.
(1)
BUSINESS & ECONOMICS -- Management Science.
(1)
BUSINESS & ECONOMICS -- Management.
(1)
BUSINESS & ECONOMICS -- Organizational Behavior.
(1)
COMPUTERS -- Internet -- Security.
(1)
COMPUTERS -- Networking -- Security.
(1)
COMPUTERS -- Security -- General.
(1)
Case studies.
(1)
Communications Engineering, Networks.
(1)
Component software.
(1)
Computer crimes -- Case studies.
(1)
Computer crimes -- Fiction.
(1)
Computer crimes -- Investigation -- Methodology.
(1)
Computer crimes -- Investigation.
(1)
Computer hackers.
(1)
Computer networks.
(1)
Computer science.
(1)
Computer security -- Fiction.
(1)
Cybercrime.
(1)
Data protection.
(1)
Economic policy.
(1)
Electrical engineering.
(1)
Electronic data processing departments -- Security measures.
(1)
Electronic surveillance.
(1)
FICTION -- General.
(1)
Fiction.
(1)
Hackers -- Fiction.
(1)
Hackers -- Psychology -- Fiction.
(1)
Hackers -- Psychology.
(1)
Identification cards -- Forgeries.
(1)
Identity theft -- Fiction.
(1)
Identity theft.
(1)
Impostors and imposture.
(1)
Industrial and Production Engineering.
(1)
Industrial engineering.
(1)
Industrial management.
(1)
Innovation/Technology Management.
(1)
Internet fraud.
(1)
Management.
(1)
Online social networks -- Safety measures.
(1)
Production engineering.
(1)
R & D/Technology Policy.
(1)
Security systems.
(1)
Short stories.
(1)
Software protection.
(1)
Systems and Data Security.
(1)
Daha fazla
Tümünü genişlet
Daha az
Hepsini Daralt
Lokasyon
Dahil
Hariç
Ebook Central
Elsevier E-Kitap Koleksiyonu
SPRINGER
false
{sortLabel}
{alphabetical}
{relevance}
{include}
{exclude}
{facetName}
{results}
{displayName}
{count}
{error}
Eylem Seç
Ayırt
Listelerime ekle
Eposta
Yazdır
15 sonuç bulundu
1
2
Sırala:
Konuyla İlgili Sırala
Yayın Yılı (eskiden yeniye)
Yayın Yılı (yeniden eskiye)
Başlık
Yazar
OK
Eposta Adresleri
:
Phone Number:
Mobile Carrier:
AT&T
Boost
Nextel (Sprint)
Sprint (PCS)
T Mobile
TracFone
US Cellular
Verizon
Virgin
Select An Item
Data usage warning: You will receive one text message for each title you selected.
Standard text messaging rates apply.
Text it to me
Text it to me, and go to next item
000000000000
DEFAULTTR
Liste seç
Geçici Liste
Bunu varsayılan liste yap.
Öğeler başarıyla eklendi
Öğeler eklenirken hata oldu. Lütfen tekrar deneyiniz.
Cybersecurity for Industry 4.0 Analysis for Design and Manufacturing
1.
Cybersecurity for Industry 4.0 Analysis for Design and Manufacturing
by
Thames, Lane. editor.
http://dx.doi.org/10.1007/978-3-319-50660-9
Format:
Windows registry forensics : advanced digital forensic analysis of the windows registry
2.
Windows registry forensics : advanced digital forensic analysis of the windows registry
by
Carvey, Harlan, author.
Click to View
Format:
Hiding behind the keyboard : uncovering covert communication methods with forensic analysis
3.
Hiding behind the keyboard : uncovering covert communication methods with forensic analysis
by
Shavers, Brett, author.
Click to View
Format:
Online safety
4.
Online safety
by
Healey, Justin, editor.
Click to View
Format:
Technocrime, policing and surveillance
5.
Technocrime, policing and surveillance
by
Leman-Langlois, Stéphane, 1965-
Click to View
Format:
Windows Registry Forensics : Advanced Digital Forensic Analysis of the Windows Registry.
6.
Windows Registry Forensics : Advanced Digital Forensic Analysis of the Windows Registry.
by
Carvey, Harlan.
ScienceDirect
https://www.sciencedirect.com/science/book/9781597495806
Format:
Risk factors in computer-crime victimization
7.
Risk factors in computer-crime victimization
by
Choi, Kyung-shick, 1973-
Click to View
Format:
Dissecting the hack : the forb1dd3n network
8.
Dissecting the hack : the forb1dd3n network
by
Street, Jayson E.
ScienceDirect
https://www.sciencedirect.com/science/book/9781597495684
Format:
Computer forensics for dummies
9.
Computer forensics for dummies
by
Volonino, Linda.
Click to View
Format:
Software piracy exposed
10.
Software piracy exposed
by
Honick, Ron.
Click to View
Format:
Stealing the network : how to own an identity
11.
Stealing the network : how to own an identity
by
Alder, Raven.
ScienceDirect
https://www.sciencedirect.com/science/book/9781597490061
Format:
Software piracy exposed
12.
Software piracy exposed
by
Craig, Paul.
ScienceDirect
https://www.sciencedirect.com/science/book/9781932266986
Format:
Eylem Seç
Ayırt
Listelerime ekle
Eposta
Yazdır
1
2
Search Results
Elektronik Kaynaklar
Search Results
Elektronik Kaynaklar
OK
Eposta Adresleri
:
Phone Number:
Mobile Carrier:
AT&T
Boost
Nextel (Sprint)
Sprint (PCS)
T Mobile
TracFone
US Cellular
Verizon
Virgin
Select An Item
Data usage warning: You will receive one text message for each title you selected.
Standard text messaging rates apply.
Text it to me
Text it to me, and go to next item
Elektronik Kaynaklar
Sonuçlar alınıyor Elektronik Kaynaklar...
action
Go to:
Search Results
|
Search Facets
|
Top of Page