Logging in...
User ID
:
Password
:
Register
Forgot your PIN?
Forgot my PIN
Enter your username and a recovery link will be emailed to the email address on file at your library.
User ID
:
Log In
|
My Account
|
My Lists
|
Send a Request
|
|
Remember to clear the cache and close the browser window.
Rooms Restriction Values
All Fields
Title
Author
General Note
Keyword in Author headings
Subject
Keyword in Subject headings
ISBN
Preferred Shelf Number
Search Field
All Fields
Target Value
Limit Value
Restriction Value
Search For:
To enable accessibility mode, return to the beginning of the page and use the link in the menu bar.
Advanced Search
Home Room
Book Collection
E-Book Collection
Multimedia Collection
Thesis Collection
Transportation Engineering Collection
Periodicals Collections
Green Campus
Limit Search Results
Narrowed by:
Included
Subject: Computer security.
Author
Include
Exclude
SpringerLink (Online service)
(364)
ScienceDirect (Online service)
(54)
ProQuest (Firm)
(33)
Safari, an O'Reilly Media Company.
(27)
IGI Global.
(23)
International Business Machines Corporation. International Technical Support Organization.
(19)
O'Reilly (Firm), publisher.
(19)
Syngress.
(13)
Fourastier, Yannick, editor.
(11)
Packt Publishing, publisher.
(11)
Piètre-Cambacédès, Ludovic, editor.
(11)
Manning (Firm), publisher.
(10)
Redbooks, IBM.
(10)
Long, Johnny.
(9)
O'Reilly for Higher Education (Firm), distributor.
(9)
Bücker, Axel.
(7)
Foster, James C.
(7)
Ozkaya, Erdal, author.
(7)
Beale, Jay.
(6)
Carvey, Harlan A.
(6)
Cole, Eric.
(6)
Hurley, Chris.
(6)
Moskowitz, Jeremy.
(6)
Shinder, Thomas W.
(6)
Viega, John.
(6)
Wiles, Jack.
(6)
Calder, Alan.
(5)
Casey, Eoghan.
(5)
Chaki, Nabendu. editor.
(5)
Dalziel, Henry, author.
(5)
Diogenes, Yuri, author.
(5)
Gupta, Sunil, speaker.
(5)
International Business Machines Corporation. International Technical Support Organization, issuing body.
(5)
Messier, Ric, author.
(5)
Mullen, Timothy M.
(5)
Oni, Alexander, presenter.
(5)
Rahalkar, Sagar, author.
(5)
Ring, Sandra.
(5)
Santos, Omar, on-screen presenter.
(5)
Santos, Omar, presenter.
(5)
Takagi, Tsuyoshi. editor.
(5)
Aquilina, James M.
(4)
Baskin, Brian.
(4)
Beaver, Kevin.
(4)
Bertino, Elisa. editor. (orcid)0000-0002-4029-7051
(4)
Calder, Alan, 1957- author.
(4)
Carvey, Harlan A., author.
(4)
Chaki, Rituparna. editor.
(4)
Cherry, Denny.
(4)
Cole, Eric, author.
(4)
Cortesi, Agostino. editor.
(4)
Cross, Michael, 1965-
(4)
Diogenes, Yuri.
(4)
Fortino, Giancarlo. editor.
(4)
Furnell, Steven.
(4)
Ganji, Mohadeseh. editor.
(4)
Hassan, Nihad A., author.
(4)
Jaswal, Nipun, author.
(4)
Joshi, Amit. editor.
(4)
Katsikas, Sokratis. editor.
(4)
Kim, Kuinam J. editor.
(4)
Kleiman, Dave.
(4)
Klein, Tobias.
(4)
Lambrinoudakis, Costas. editor.
(4)
Limbert, Matthew, designer.
(4)
Lockhart, Andrew.
(4)
Lopez, Javier. editor.
(4)
Malin, Cameron H.
(4)
Messier, Ric, presenter.
(4)
O'Reilly & Associates, publisher.
(4)
Pan, Zhaoqing. editor. (orcid)0000-0003-1390-399X
(4)
Piltzecker, Tony, 1975-
(4)
Rashidi, Lida. editor.
(4)
Rittinghouse, John W.
(4)
Rogers, Russ.
(4)
Russell, Ryan, 1969-
(4)
Saeed, Khalid. editor.
(4)
Seacord, Robert C.
(4)
Shenoi, Sujeet. editor.
(4)
Sun, Xingming. editor. (orcid)0000-0001-7982-726X
(4)
Wagner, Roland. editor.
(4)
Winkler, Ira, author.
(4)
Wyler, Neil R.
(4)
Yung, Moti. editor.
(4)
Zalewski, Michal.
(4)
Zhang, Liang-Jie. editor.
(4)
Zhu, Sencun. editor.
(4)
İzmir Institute of Technology. Computer Engineering.
(4)
Ackerman, Pascal, author.
(3)
Alcaraz Calero, Jose M. editor.
(3)
Alder, Raven.
(3)
Aldini, Alessandro. editor.
(3)
Andress, Jason, author.
(3)
Ayala, Luis, author.
(3)
Bebis, George. editor.
(3)
Boyle, Richard. editor.
(3)
Brabetz, Sebastian, author.
(3)
Calder, Alan, 1957-
(3)
Calder, Alan, author.
(3)
Carey, Marcus J. (Cybersecurity professional), author.
(3)
Chen, Liqun. editor.
(3)
Cheng, Wen-Huang. editor.
(3)
Clarke, Justin.
(3)
Contos, Brian T.
(3)
Craig, Paul.
(3)
Cuppens, Frédéric. editor.
(3)
Dang, Tran Khanh. editor.
(3)
Dion, Jason, on-screen presenter.
(3)
Donaldson, Scott E., author.
(3)
Dongarra, Jack. editor.
(3)
Eilam, Eldad.
(3)
El Saddik, Abdulmotaleb. editor.
(3)
Erickson, Jon, 1977-
(3)
Fischer-Hübner, Simone. editor.
(3)
Fu, Haohuan. editor.
(3)
Gantz, Stephen D.
(3)
Garcia-Alfaro, Joaquin. editor.
(3)
Garfinkel, Simson.
(3)
Givre, Charles, presenter.
(3)
Gregg, Michael (Michael C.)
(3)
Grimes, Roger A., author.
(3)
Guerrieri, Antonio. editor.
(3)
Hammer, Barbara. editor.
(3)
Hijazi, Rami, author.
(3)
Ho, Bao. editor.
(3)
Hong, Richang. editor.
(3)
Honick, Ron.
(3)
Howard, Michael, 1965-
(3)
Iliadis, Lazaros. editor.
(3)
Ioannidis, Sotiris. editor.
(3)
Kalsi, Tajinder, author.
(3)
Katsaropoulos, Chris, editor.
(3)
Katz, Jonathan. editor.
(3)
Koracin, Darko. editor.
(3)
Krutz, Ronald L.
(3)
Krutz, Ronald L., 1938-
(3)
Krzhizhanovskaya, Valeria V. editor. (orcid)0000-0002-8247-129X
(3)
Kurosu, Masaaki. editor.
(3)
Küng, Josef. editor.
(3)
Kůrková, Věra. editor.
(3)
Lees, Michael Harold. editor.
(3)
Liska, Allan, author.
(3)
Loshin, Peter.
(3)
Maglogiannis, Ilias. editor.
(3)
Manolopoulos, Yannis. editor.
(3)
Martinelli, Fabio. editor.
(3)
Mauw, Sjouke. editor.
(3)
Maynor, David.
(3)
Messdaghi, Chloé, presenter.
(3)
Messier, Ric.
(3)
Mishra, Durgesh Kumar. editor.
(3)
Mitnick, Kevin D. (Kevin David), 1963-
(3)
Ngo, Chong-Wah. editor.
(3)
O'Reilly & Associates.
(3)
Olups, Rihards, author.
(3)
Parvin, Bahram. editor.
(3)
Parziale, Lydia, author.
(3)
Patch, Kimberly.
(3)
Pearson (Firm), publisher.
(3)
Persiano, Giuseppe. editor.
(3)
Phung, Dinh. editor.
(3)
Potter, Bruce.
(3)
Ray, Indrakshi. editor.
(3)
Robshaw, Matthew. editor.
(3)
Rogers, Mark, designer.
(3)
Russell, Brian, author.
(3)
Schiller, Craig A.
(3)
Seitz, Justin, author.
(3)
Sharma, Himanshu, author.
(3)
Shepherd, Matthew.
(3)
Shi, Yong. editor.
(3)
Shinder, Debra Littlejohn.
(3)
Siegel, Stanley G., author.
(3)
Sloot, Peter M. A. editor. (orcid)0000-0002-3848-5395
(3)
Smalley, Eric.
(3)
Steinberg, Joseph (Cybersecurity expert), author.
(3)
Sutton, David (Information security practitioner), author.
(3)
Taylor, Laura.
(3)
Thampi, Sabu M. editor.
(3)
Thoai, Nam. editor.
(3)
Tian, Yingjie. editor.
(3)
Tseng, Vincent S. editor.
(3)
Wang, Guojun. editor.
(3)
Wang, Meng. editor.
(3)
Webb, Geoffrey I. editor. (orcid)0000-0001-9963-5169
(3)
White, Bill, author.
(3)
Williams, Chris K., author.
(3)
Winkler, Ira.
(3)
Woody, Aaron.
(3)
Wotring, Brian.
(3)
XYPRO Technology Corporation.
(3)
Yamasaki, Toshihiko. editor.
(3)
Albing, Carl, author.
(2)
Allen, Julia H.
(2)
Alvarado, Ellen.
(2)
Amiri, Iraj Sadegh, 1977- author.
(2)
Androulidakis, Iosif I. author.
(2)
Anonymous, author.
(2)
Anson, Steve.
(2)
Anzaldua, Reynaldo.
(2)
More
View All
Fewer
Collapse All
Material Type
Include
Exclude
E-Book
(1855)
Book
(22)
Supplementary CD-ROM
(7)
Thesis
(6)
Language
Include
Exclude
English
(1828)
German
(23)
French
(16)
Turkish
(6)
Chinese
(4)
Undetermined
(4)
Polish
(3)
Japanese
(1)
Norwegian
(1)
Russian
(1)
More
View All
Fewer
Collapse All
Publication Date
Include
Exclude
This graph shows the distribution of publication dates for use with a date range slider. Switch to Years view for a more detailed breakdown of search results by year.
From Publication Year
-
To Publication Year
2018
(299)
2016
(258)
2015
(117)
2022
(109)
2014
(86)
2019
(86)
2013
(81)
2012
(70)
2005
(68)
2011
(66)
2006
(65)
2008
(65)
2017
(64)
2020
(63)
2021
(62)
2010
(60)
2007
(59)
2004
(55)
2009
(43)
2002
(40)
2003
(40)
2001
(25)
2000
(8)
1998
(4)
1999
(4)
1995
(3)
1990
(2)
1994
(2)
1996
(2)
1997
(2)
2023
(2)
3
(1)
1991
(1)
1992
(1)
1993
(1)
More
View All
Fewer
Collapse All
Subject
Include
Exclude
Electronic books.
(921)
Sécurité informatique.
(807)
Computer networks -- Security measures.
(505)
Computer Security
(496)
Systems and Data Security.
(357)
Réseaux d'ordinateurs -- Sécurité -- Mesures.
(287)
COMPUTERS -- Security -- General.
(207)
Data protection.
(169)
Computer Communication Networks.
(150)
Computer science.
(149)
COMPUTERS -- Networking -- Security.
(142)
Data encryption (Computer science).
(141)
COMPUTERS -- Internet -- Security.
(137)
Cryptology.
(134)
Information Systems Applications (incl. Internet).
(121)
Artificial intelligence.
(117)
Electronic books. -- local.
(110)
Computers and Society.
(79)
Software engineering.
(76)
Internet -- Security measures.
(71)
Management of Computing and Information Systems.
(71)
Protection de l'information (Informatique)
(71)
Information Systems.
(69)
Algorithm Analysis and Problem Complexity.
(62)
Computer software.
(62)
Computers -- Access control.
(57)
Computer crimes.
(56)
Data mining.
(56)
Penetration testing (Computer security)
(56)
Microsoft Windows (Computer file)
(55)
Computer crimes -- Investigation.
(54)
Hackers.
(51)
Computer crimes -- Prevention.
(50)
Instructional films.
(48)
Tests d'intrusion.
(48)
Internet videos.
(47)
Nonfiction films.
(47)
Data Mining and Knowledge Discovery.
(44)
Engineering & Applied Sciences.
(44)
Computer Science.
(42)
Computer vision.
(42)
Information technology -- Security measures.
(41)
Pirates informatiques.
(41)
Hacking.
(40)
Image Processing and Computer Vision.
(40)
Ordinateurs -- Accès -- Contrôle.
(38)
Communications Engineering, Networks.
(37)
Criminalité informatique -- Enquêtes.
(37)
Telecommunication.
(37)
Computer network architectures.
(36)
Information systems.
(36)
Data encryption (Computer science)
(35)
Internet -- Sécurité -- Mesures.
(35)
Business enterprises -- Computer networks -- Security measures.
(34)
Malware (Computer software)
(34)
Operating systems (Computers)
(33)
Piratage informatique.
(32)
Computer Systems Organization and Communication Networks.
(31)
Computer hackers.
(30)
Computer networks -- Access control.
(30)
Security.
(30)
Chiffrement (Informatique)
(29)
Cloud computing.
(29)
Cryptography.
(29)
Special Purpose and Application-Based Systems.
(29)
Electronic videos.
(28)
Information Systems and Communication Service.
(28)
Linux.
(28)
Logiciels malveillants.
(28)
Cloud computing -- Security measures.
(27)
Coding theory.
(27)
Computers -- Law and legislation.
(26)
Legal Aspects of Computing.
(26)
Coding and Information Theory.
(25)
Computersicherheit
(25)
Systèmes d'exploitation (Ordinateurs)
(25)
operating systems.
(25)
Data structures (Computer scienc.
(24)
Python (Computer program language)
(24)
Criminalité informatique.
(23)
Information Storage and Retrieval.
(23)
Information storage and retrieva.
(23)
Technologie de l'information -- Sécurité -- Mesures.
(23)
Application software -- Development.
(22)
Data Structures and Information Theory.
(22)
Handbooks and manuals.
(22)
Computer networks.
(21)
User Interfaces and Human Computer Interaction.
(21)
Computational complexity.
(19)
Computer security -- Handbooks, manuals, etc.
(19)
Computer software -- Development.
(19)
Cryptographie.
(19)
Database management.
(19)
Database security.
(19)
Discrete Mathematics in Computer Science.
(19)
Forensic sciences.
(19)
Information technology -- Management.
(19)
Sécurité informatique -- Guides, manuels, etc.
(19)
Electronic data processing personnel -- Certification.
(18)
Engineering.
(18)
Films de formation.
(18)
Infonuagique -- Sécurité -- Mesures.
(18)
Infonuagique.
(18)
Kali Linux.
(18)
Privacy, Right of.
(18)
Computer Appl. in Social and Behavioral Sciences.
(17)
Computer system performance.
(17)
Films autres que de fiction.
(17)
Logiciels d'application -- Développement.
(17)
Social sciences -- Data processing.
(17)
System Performance and Evaluation.
(17)
Vidéos sur Internet.
(17)
Webcast
(17)
Client/server computing.
(16)
Computational Intelligence.
(16)
Computer viruses.
(16)
Computers -- Security -- General.
(16)
Java (Computer program language)
(16)
Open source software.
(16)
Audiobooks.
(15)
Firewalls (Computer security)
(15)
Operating systems (Computers).
(15)
Réseaux d'ordinateurs.
(15)
Security systems.
(15)
COMPUTERS -- Security -- Networking.
(14)
Network security.
(14)
Technologie de l'information -- Gestion.
(14)
BUSINESS & ECONOMICS -- Industrial Management.
(13)
BUSINESS & ECONOMICS -- Management Science.
(13)
BUSINESS & ECONOMICS -- Management.
(13)
BUSINESS & ECONOMICS -- Organizational Behavior.
(13)
Cyberterrorism.
(13)
Java (Langage de programmation)
(13)
Machine learning.
(13)
Python (Langage de programmation)
(13)
Study guides.
(13)
e-Commerce/e-business.
(13)
Business -- Data processing -- Security measures.
(12)
Coupe-feu (Sécurité informatique)
(12)
Datensicherung
(12)
Downloadable audio books.
(12)
Electronic commerce -- Security measures.
(12)
Examinations.
(12)
Mac OS.
(12)
Metasploit (Electronic resource)
(12)
Risk management.
(12)
Virtual computer systems.
(12)
Web sites -- Security measures.
(12)
Architecture client-serveur (Informatique)
(11)
Bases de données -- Sécurité -- Mesures.
(11)
Big data.
(11)
COMPUTERS -- Data Processing.
(11)
Computerbeveiliging.
(11)
Logic design.
(11)
Management information systems.
(11)
Privacy.
(11)
Signal, Image and Speech Processing.
(11)
Systèmes virtuels (Informatique)
(11)
United States.
(11)
Apprentissage automatique.
(10)
COMPUTERS -- Information Technology.
(10)
COMPUTERS -- Security -- Cryptography.
(10)
Computer Appl. in Administrative Data Processing.
(10)
Computer Communication Networks
(10)
Criminalistique.
(10)
Cyberspace -- Security measures.
(10)
Forensic Sciences
(10)
Guides et manuels.
(10)
Logiciels libres.
(10)
Mathematical Logic and Formal Languages.
(10)
Microsoft Windows server.
(10)
Web services.
(10)
Wireless communication systems -- Security measures.
(10)
forensic science.
(10)
z/OS.
(10)
Client/server computing -- Security measures.
(9)
Computing Milieux.
(9)
Cyberterrorism -- Prevention.
(9)
Electrical & Computer Engineering.
(9)
Electronic information resources -- Access control.
(9)
Génie logiciel.
(9)
Optical pattern recognition.
(9)
Pattern Recognition.
(9)
Security Science and Technology.
(9)
Software.
(9)
Telecommunications.
(9)
Virus informatiques.
(9)
Application software -- Security measures.
(8)
Biometrics.
(8)
Business enterprises -- Security measures.
(8)
COMPUTERS -- Computer Literacy.
(8)
COMPUTERS -- Computer Science.
(8)
COMPUTERS -- Hardware -- General.
(8)
COMPUTERS -- Machine Theory.
(8)
COMPUTERS -- Reference.
(8)
Computer security -- Software.
(8)
Computer software -- Reliability.
(8)
Conference papers and proceedings.
(8)
Cyber intelligence (Computer security)
(8)
Debugging in computer science.
(8)
More
View All
Fewer
Collapse All
Shelf Location
Include
Exclude
O'reilly E-Books
(981)
Ebrary Collection
(407)
Springer Collection
(364)
Online
(69)
IGI Global
(24)
On Shelf
(23)
Thesis Collection
(6)
Knovel Collection
(4)
ACS Collection
(3)
EBSCO
(2)
Taylor&Francis E-Book Collection
(1)
More
View All
Fewer
Collapse All
Library
Include
Exclude
IYTE Library
(1884)
false
{sortLabel}
{alphabetical}
{relevance}
{include}
{exclude}
{facetName}
{results}
{displayName}
{count}
{error}
No results found