Giriş
|
Hesabım
|
Listelerim
|
|
Remember to clear the cache and close the browser window.
English
Search Limit
Bütün Kütüphaneler
Electronic Resources
All
Başkent University Library
Anadolu OSB Meslek Yüksekokulu
Atasev Özel Koleksiyon
Erdoğan Tercan Collection
Fine Arts And Design Archive
Kazan Meslek Yüksekokulu
Law Collection
Ord.Prof.Dr. Enver Ziya Karal Tarih Uygulama Ars.Mrk.
Özel Koleksiyon Serdar Özersin
Thesis Collection
Tüm Alanlar
Başlık
Yazar
Konu
ISBN
ISSN
8
Search Field
Tüm Alanlar
Arama:
Gelişmiş Arama
Search Results
Electronic Resources
Arama Sonuçlarını Sınırlandır
Daraltılmış:
+
Dil: English
+
Konu: Computer crimes.
+
Konu: Computer security.
Yazar
Dahil
Hariç
ProQuest (Firm)
(5)
Honick, Ron.
(2)
Alder, Raven.
(1)
Anzaldua, Reynaldo.
(1)
Bidwell, Teri.
(1)
Blair, John, author.
(1)
Burnett, Mark (Mark M.)
(1)
Carroll, John M. (John Millar), 1925-
(1)
Carvey, Harlan, author.
(1)
Carvey, Harlan.
(1)
Choi, Kyung-shick, 1973-
(1)
Craig, Paul.
(1)
Cross, Michael, 1965-
(1)
C̆ervĕn, Pavol.
(1)
Healey, Justin, editor.
(1)
Leibrock, Larry, editor.
(1)
Leman-Langlois, Stéphane, 1965-
(1)
Long, Johnny.
(1)
Mullen, Timothy M.
(1)
Russell, Ryan, 1969-
(1)
Schaefer, Dirk. editor.
(1)
Shavers, Brett, author.
(1)
SpringerLink (Online service)
(1)
Street, Jayson E.
(1)
Street, Jayson E. Dissecting the hack.
(1)
Thames, Lane. editor.
(1)
Volonino, Linda.
(1)
Daha fazla
Tümünü genişlet
Daha az
Hepsini Daralt
Materyal Türü
Dahil
Hariç
E-Kitap
Yayın Yılı
Dahil
Hariç
-
2005
(3)
2002
(2)
2010
(2)
2016
(2)
1987
(1)
2008
(1)
2011
(1)
2013
(1)
2015
(1)
2017
(1)
Daha fazla
Tümünü genişlet
Daha az
Hepsini Daralt
Konu
Dahil
Hariç
Electronic books.
(14)
Computer networks -- Security measures.
(4)
Microsoft Windows (Computer file)
(3)
Operating systems (Computers)
(3)
Acquisition of computer software.
(2)
Hackers.
(2)
TRUE CRIME -- White Collar Crime.
(2)
BUSINESS & ECONOMICS -- Industrial Management.
(1)
BUSINESS & ECONOMICS -- Management Science.
(1)
BUSINESS & ECONOMICS -- Management.
(1)
BUSINESS & ECONOMICS -- Organizational Behavior.
(1)
COMPUTERS -- Internet -- Security.
(1)
COMPUTERS -- Networking -- Security.
(1)
COMPUTERS -- Security -- General.
(1)
Case studies.
(1)
Communications Engineering, Networks.
(1)
Component software.
(1)
Computer crimes -- Case studies.
(1)
Computer crimes -- Fiction.
(1)
Computer crimes -- Investigation -- Methodology.
(1)
Computer crimes -- Investigation.
(1)
Computer hackers.
(1)
Computer networks.
(1)
Computer science.
(1)
Computer security -- Fiction.
(1)
Cybercrime.
(1)
Data protection.
(1)
Economic policy.
(1)
Electrical engineering.
(1)
Electronic data processing departments -- Security measures.
(1)
Electronic surveillance.
(1)
FICTION -- General.
(1)
Fiction.
(1)
Hackers -- Fiction.
(1)
Hackers -- Psychology -- Fiction.
(1)
Hackers -- Psychology.
(1)
Identification cards -- Forgeries.
(1)
Identity theft -- Fiction.
(1)
Identity theft.
(1)
Impostors and imposture.
(1)
Industrial and Production Engineering.
(1)
Industrial engineering.
(1)
Industrial management.
(1)
Innovation/Technology Management.
(1)
Internet fraud.
(1)
Management.
(1)
Online social networks -- Safety measures.
(1)
Production engineering.
(1)
R & D/Technology Policy.
(1)
Security systems.
(1)
Short stories.
(1)
Software protection.
(1)
Systems and Data Security.
(1)
Daha fazla
Tümünü genişlet
Daha az
Hepsini Daralt
Kütüphane
Dahil
Hariç
Başkent Kütüphanesi
Lokasyon
Dahil
Hariç
Ebook Central
Elsevier E-Kitap Koleksiyonu
SPRINGER
false
{sortLabel}
{alphabetical}
{relevance}
{include}
{exclude}
{facetName}
{results}
{displayName}
{count}
{error}
Eylem Seç
Ayırt
Listelerime ekle
Eposta
Yazdır
15 sonuç bulundu
1
2
Sırala:
Konuyla İlgili Sırala
Yayın Yılı (eskiden yeniye)
Yayın Yılı (yeniden eskiye)
Başlık
Yazar
OK
Eposta Adresleri
:
Phone Number:
Mobile Carrier:
AT&T
Boost
Nextel (Sprint)
Sprint (PCS)
T Mobile
TracFone
US Cellular
Verizon
Virgin
Select An Item
Data usage warning: You will receive one text message for each title you selected.
Standard text messaging rates apply.
Text it to me
Text it to me, and go to next item
000000000000
DEFAULTTR
Liste seç
Geçici Liste
Bunu varsayılan liste yap.
Öğeler başarıyla eklendi
Öğeler eklenirken hata oldu. Lütfen tekrar deneyiniz.
Cybersecurity for Industry 4.0 Analysis for Design and Manufacturing
1.
Cybersecurity for Industry 4.0 Analysis for Design and Manufacturing
by
Thames, Lane. editor.
http://dx.doi.org/10.1007/978-3-319-50660-9
Format:
Windows registry forensics : advanced digital forensic analysis of the windows registry
2.
Windows registry forensics : advanced digital forensic analysis of the windows registry
by
Carvey, Harlan, author.
Click to View
Format:
Hiding behind the keyboard : uncovering covert communication methods with forensic analysis
3.
Hiding behind the keyboard : uncovering covert communication methods with forensic analysis
by
Shavers, Brett, author.
Click to View
Format:
Online safety
4.
Online safety
by
Healey, Justin, editor.
Click to View
Format:
Technocrime, policing and surveillance
5.
Technocrime, policing and surveillance
by
Leman-Langlois, Stéphane, 1965-
Click to View
Format:
Windows Registry Forensics : Advanced Digital Forensic Analysis of the Windows Registry.
6.
Windows Registry Forensics : Advanced Digital Forensic Analysis of the Windows Registry.
by
Carvey, Harlan.
ScienceDirect
https://www.sciencedirect.com/science/book/9781597495806
Format:
Dissecting the hack : the forb1dd3n network
7.
Dissecting the hack : the forb1dd3n network
by
Street, Jayson E.
ScienceDirect
https://www.sciencedirect.com/science/book/9781597495684
Format:
Risk factors in computer-crime victimization
8.
Risk factors in computer-crime victimization
by
Choi, Kyung-shick, 1973-
Click to View
Format:
Computer forensics for dummies
9.
Computer forensics for dummies
by
Volonino, Linda.
Click to View
Format:
Stealing the network : how to own an identity
10.
Stealing the network : how to own an identity
by
Alder, Raven.
ScienceDirect
https://www.sciencedirect.com/science/book/9781597490061
Format:
Software piracy exposed
11.
Software piracy exposed
by
Craig, Paul.
ScienceDirect
https://www.sciencedirect.com/science/book/9781932266986
Format:
Software piracy exposed
12.
Software piracy exposed
by
Honick, Ron.
Click to View
Format:
Eylem Seç
Ayırt
Listelerime ekle
Eposta
Yazdır
1
2
Search Results
Electronic Resources
Search Results
Electronic Resources
OK
Eposta Adresleri
:
Phone Number:
Mobile Carrier:
AT&T
Boost
Nextel (Sprint)
Sprint (PCS)
T Mobile
TracFone
US Cellular
Verizon
Virgin
Select An Item
Data usage warning: You will receive one text message for each title you selected.
Standard text messaging rates apply.
Text it to me
Text it to me, and go to next item
Electronic Resources
Sonuçlar alınıyor Electronic Resources...
action