Publisher
Edition
At
0
Access contested :
security, identity, and resistance in Asian cyberspace information revolution and global politics /
ISBN: 9780262016780
MIT Press,
2012.
HM851 .A253 2012
NEU Grand Library[General Collection] (2)
Available
0
ACM transactions on information and system security
Association for Computing Machinery,
c1998-
QA76.9.A25 A344
Online electronic
Not for loan
2
Advanced security technologies in networking /
ISBN: 1586031562 (IOS Press)
IOS Press ;
c2001.
TK5105.59 .N33 2001
NEU Grand Library[General Collection]
Available
29
Aldatma sanatı :
güvenliğin insan boyutunun kullanılması /
ISBN: 9757064912
ODTÜ Gelişme Vakfı,
2005.
QA76.9.A25 M58 2005
NEU Grand Library[General Collection]
Available
0
Analysis of cryptography methods /
Near East University,
2005.
QA76.9 .S46 2005
Storage
-
Ask reception
1
Applied public key infrastructure :
4th International Workshop : IWAP 2005 /
ISBN: 1586035509
IOS Press,
2005.
QA76.9.A25 I558 2005
NEU Grand Library[General Collection]
Available
0
The art of memory forensics :
detecting malware and threats in Windows, Linux, and Mac Memory /
ISBN: 9781118825044 (e-book)
QA76.76.C68 .A786 2014
University of Kyrenia Grand Library[General Collection] (2)
Available
0
Attitudes of employees towards cybersecurity /
Near East University,
2020.
QA76.9 .E43 2020
NEU Grand Library[Reserve Section] (2)
Available
0
Bilişim suçları :
bilişim sistemleri kullanılarak işlenen suçlar, adli bilişim /
ISBN: 9789963275243
KKX80.C65 C45 2017
NEU Grand Library[Hakkı Atun Section]
Available
0
A brief history of cryptology /
ISBN: 1591140846
Naval Institute Press,
2005.
TK5102.85 .B66 2005
NEU Grand Library[General Collection]
Available