Search Results for Computer networks. - Narrowed by: Wireless communication systems -- Security measures. SirsiDynix Enterprise https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dComputer$002bnetworks.$0026qf$003dSUBJECT$002509Subject$002509Wireless$002bcommunication$002bsystems$002b--$002bSecurity$002bmeasures.$002509Wireless$002bcommunication$002bsystems$002b--$002bSecurity$002bmeasures.$0026ic$003dtrue$0026te$003dILS$0026ps$003d300$0026isd$003dtrue?dt=list 2024-06-24T18:12:29Z Honeypot a new paradigm to information security ent://SD_ILS/0/SD_ILS:288961 2024-06-24T18:12:29Z 2024-06-24T18:12:29Z Author&#160;Joshi, R. C.&#160;Sardana, Anjali.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781439869994">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Mobile application security ent://SD_ILS/0/SD_ILS:293312 2024-06-24T18:12:29Z 2024-06-24T18:12:29Z Author&#160;Dwivedi, Himanshu.&#160;Clark, Chris, 1980-&#160;Thiel, David V.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://mhebooklibrary.com/reader/mobile-application-security">Subscription required</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Seven deadliest wireless technologies attacks ent://SD_ILS/0/SD_ILS:149033 2024-06-24T18:12:29Z 2024-06-24T18:12:29Z Author&#160;Haines, Brad.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495417">http://www.sciencedirect.com/science/book/9781597495417</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security in an IPv6 environment ent://SD_ILS/0/SD_ILS:291504 2024-06-24T18:12:29Z 2024-06-24T18:12:29Z Author&#160;Minoli, Daniel, 1952-&#160;Kouns, Jake.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781420092301">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security in wireless ad hoc and sensor networks ent://SD_ILS/0/SD_ILS:297789 2024-06-24T18:12:29Z 2024-06-24T18:12:29Z Author&#160;&Ccedil;ayirci, E. (Erdal)&#160;Levi, Albert, 1969-&#160;Wiley InterScience (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;John Wiley <a href="http://dx.doi.org/10.1002/9780470516782">http://dx.doi.org/10.1002/9780470516782</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Kismet hacking ent://SD_ILS/0/SD_ILS:147861 2024-06-24T18:12:29Z 2024-06-24T18:12:29Z Author&#160;Haines, Brad.&#160;Schearer, Michael J.&#160;Thornton, Frank (Thorn)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491174">http://www.sciencedirect.com/science/book/9781597491174</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> UMTS security ent://SD_ILS/0/SD_ILS:295861 2024-06-24T18:12:29Z 2024-06-24T18:12:29Z Author&#160;Niemi, Valtteri.&#160;Nyberg, Kaisa, 1948-<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://www.contentreserve.com/TitleInfo.asp?ID={465C10B2-1465-4D2B-AAAD-DED651D62D3D}&Format=50">Click for information</a> Wiley InterScience - Full text online <a href="http://onlinelibrary.wiley.com/book/10.1002/0470091584">http://onlinelibrary.wiley.com/book/10.1002/0470091584</a> John Wiley <a href="http://dx.doi.org/10.1002/0470091584">http://dx.doi.org/10.1002/0470091584</a> HathiTrust Digital Library, Limited view (search only) <a href="http://catalog.hathitrust.org/api/volumes/oclc/53183293.html">http://catalog.hathitrust.org/api/volumes/oclc/53183293.html</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security in fixed and wireless networks an introduction to securing data communications ent://SD_ILS/0/SD_ILS:301122 2024-06-24T18:12:29Z 2024-06-24T18:12:29Z Author&#160;Sch&auml;fer, G&uuml;nter, Dr.-Ing.&#160;John Wiley &amp; Sons.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;John Wiley <a href="http://dx.doi.org/10.1002/0470863722">http://dx.doi.org/10.1002/0470863722</a> <a href="http://www3.interscience.wiley.com/cgi-bin/bookhome/112477198">http://www3.interscience.wiley.com/cgi-bin/bookhome/112477198</a> Contributor biographical information <a href="http://catdir.loc.gov/catdir/bios/wiley047/2004299184.html">http://catdir.loc.gov/catdir/bios/wiley047/2004299184.html</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Hack proofing your wireless network ent://SD_ILS/0/SD_ILS:254049 2024-06-24T18:12:29Z 2024-06-24T18:12:29Z Author&#160;Barnes, Christian.&#160;O'Farrell, Neal.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781928994596">http://www.sciencedirect.com/science/book/9781928994596</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/>