Logging in...
User ID
Password
Register
Forgot your PIN?
Forgot my PIN
Enter your username and a recovery link will be emailed to the email address on file at your library.
User ID
Skip to:
Search Results
|
Content
|
Bottom
Search Results for
Home
Log In
My Account
My Lists
Disable Accessibility Mode
Help
Rooms Restriction Values
All Fields
Title
Author
General Note
Keyword in Author headings
Subject
Keyword in Subject headings
ISBN
Preferred Shelf Number
Search Field
All Fields
Target Value
Limit Value
Restriction Value
Search For:
Advanced Search
Search Options
Search Options
Home Room
Book Collection
E-Book Collection
Multimedia Collection
Thesis Collection
Transportation Engineering Collection
Periodicals Collections
Green Campus
29 Results
Sort
Selected
Relevance (Default)
Publication Date (Ascending)
Publication Date (Descending)
Title
Author
Filter
Only Show Available
Narrowed by:
Clear all
Included
Book
Included
Computer security.
Author
Language
Publication Date
Subject
Shelf Location
Library
false
Sort By: A to Z
Sort By: Number of Results
{displayName}
{count}
{error}
Sort By:
Relevance (Default)
Publication Date (Ascending)
Publication Date (Descending)
Title
Author
000000000000
DEFAULT
Title
Select a list
Temporary List
Always add to this list
Uygulamalı siber güvenlik ve hacking
Uygulamalı siber güvenlik ve hacking
by
Altınkaynak, Mustafa, author
Format:
Books
Add to My Lists
Email
Checking for actions...
Google Preview
Place Hold
Hacking Interface
Hacking Interface
by
Elbahadır, Hamza, author.
Format:
Books
Add to My Lists
Email
Checking for actions...
Google Preview
Place Hold
View Other Search Results
Afet durumunda kamuda veri güvenliği
Afet durumunda kamuda veri güvenliği
by
İstanbul İl Özel İdaresi
Format:
Books
Add to My Lists
Email
Checking for actions...
Place Hold
The complete book of data anonymization : from planning to implementation
The complete book of data anonymization : from planning to implementation
by
Raghunathan, Balaji, author.
Format:
Books
Add to My Lists
Email
Checking for actions...
Google Preview
Place Hold
The tangled Web: a guide to securing modern Web applications
The tangled Web: a guide to securing modern Web applications
by
Zalewski, Michal.
Format:
Books
Add to My Lists
Email
Checking for actions...
Google Preview
Place Hold
10 adımda bilgisayar güvenliği
10 adımda bilgisayar güvenliği
by
Gelişken, Uğur, author.
Format:
Books
Add to My Lists
Email
Checking for actions...
Google Preview
Place Hold
Nmap network scanning : official Nmap project guide to network discovery and security scanning
Nmap network scanning : official Nmap project guide to network discovery and security scanning
by
Lyon, Gordon Fyodor.
Format:
Books
Add to My Lists
Email
Checking for actions...
Google Preview
Place Hold
Panoptikon gözün iktidarı =b Panoptikon : vart gjennomsiktige samfunn
Panoptikon gözün iktidarı =b Panoptikon : vart gjennomsiktige samfunn
by
Apenes, Georg.
Format:
Books
Add to My Lists
Email
Checking for actions...
Google Preview
Place Hold
Privacy-preserving data mining : models and algorithms
Privacy-preserving data mining : models and algorithms
by
Aggarwal, Charu C.
Format:
Books
Add to My Lists
Email
Checking for actions...
Google Preview
Place Hold
Teori ve uygulamalar ile TCP/IP ağ güvenliği / Can Okan Dirican.
Teori ve uygulamalar ile TCP/IP ağ güvenliği / Can Okan Dirican.
by
Dirican, Can Okan.
Format:
Books
Add to My Lists
Email
Checking for actions...
Google Preview
Place Hold
Aldatma sanatı: güvenliğin insan boyutunun kullanılması
Aldatma sanatı: güvenliğin insan boyutunun kullanılması
by
Mitnick, Kevin D. (Kevin David), 1963- author
Format:
Books
Add to My Lists
Email
Checking for actions...
Google Preview
Place Hold
Windows, Linux, BSD için ağ güvenliği ipuçları : 100 etkin güvenlik tekniği
Windows, Linux, BSD için ağ güvenliği ipuçları : 100 etkin güvenlik tekniği
by
Lockhart, Andrew.
Format:
Books
Add to My Lists
Email
Checking for actions...
Google Preview
Place Hold
Page
of 3
Go to:
Search Results
|
Top of Page