Search Results for Information security. - Narrowed by: 2012SirsiDynix Enterprisehttps://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dInformation$002bsecurity.$0026qf$003dPUBDATE$002509Publication$002bDate$0025092012$0025092012$0026ps$003d300?dt=list2026-01-18T11:02:19ZInformation security management handbookent://SD_ILS/0/SD_ILS:5397932026-01-18T11:02:19Z2026-01-18T11:02:19ZAuthor Tipton, Harold F. Nozaki, Micki Krause.<br/>Preferred Shelf Number QA76.9 .A25 I54165 2007<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781439893159">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>Information security management handbookent://SD_ILS/0/SD_ILS:5428312026-01-18T11:02:19Z2026-01-18T11:02:19ZAuthor Tipton, Harold F. Krause, Micki.<br/>Preferred Shelf Number QA76.9 .A25 I54165 2003<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781420003406">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>Information security management handbookent://SD_ILS/0/SD_ILS:5387822026-01-18T11:02:19Z2026-01-18T11:02:19ZAuthor Tipton, Harold F. Nozaki, Micki Krause.<br/>Preferred Shelf Number QA76.9 .A25 I54165<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781439853467">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>Information Sharing and Data Protection in the Area of Freedom, Security and Justice Towards Harmonised Data Protection Principles for Information Exchange at EU-levelent://SD_ILS/0/SD_ILS:1950112026-01-18T11:02:19Z2026-01-18T11:02:19ZAuthor Boehm, Franziska. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-22392-1">http://dx.doi.org/10.1007/978-3-642-22392-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Information Security Technology for Applications 16th Nordic Conference on Secure IT Systems, NordSec 2011, Tallinn, Estonia, October 26-28, 2011, Revised Selected Papersent://SD_ILS/0/SD_ILS:1967382026-01-18T11:02:19Z2026-01-18T11:02:19ZAuthor Laud, Peeter. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-29615-4">http://dx.doi.org/10.1007/978-3-642-29615-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Information Flow Based Security Control Beyond RBAC How to enable fine-grained security policy enforcement in business processes beyond limitations of role-based access control (RBAC)ent://SD_ILS/0/SD_ILS:1989532026-01-18T11:02:19Z2026-01-18T11:02:19ZAuthor Fischer-Hellmann, Klaus-Peter. author. Bischoff, Rainer. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-8348-2618-3">http://dx.doi.org/10.1007/978-3-8348-2618-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Information Security Technology for Applications 15th Nordic Conference on Secure IT Systems, NordSec 2010, Espoo, Finland, October 27-29, 2010, Revised Selected Papersent://SD_ILS/0/SD_ILS:1963032026-01-18T11:02:19Z2026-01-18T11:02:19ZAuthor Aura, Tuomas. editor. Järvinen, Kimmo. editor. Nyberg, Kaisa. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-27937-9">http://dx.doi.org/10.1007/978-3-642-27937-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Information Security Theory and Practice. Security, Privacy and Trust in Computing Systems and Ambient Intelligent Ecosystems 6th IFIP WG 11.2 International Workshop, WISTP 2012, Egham, UK, June 20-22, 2012. Proceedingsent://SD_ILS/0/SD_ILS:1969952026-01-18T11:02:19Z2026-01-18T11:02:19ZAuthor Askoxylakis, Ioannis. editor. Pöhls, Henrich C. editor. Posegga, Joachim. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-30955-7">http://dx.doi.org/10.1007/978-3-642-30955-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Information Security and Privacy 17th Australasian Conference, ACISP 2012, Wollongong, NSW, Australia, July 9-11, 2012. Proceedingsent://SD_ILS/0/SD_ILS:1970802026-01-18T11:02:19Z2026-01-18T11:02:19ZAuthor Susilo, Willy. editor. Mu, Yi. editor. Seberry, Jennifer. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-31448-3">http://dx.doi.org/10.1007/978-3-642-31448-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Information Security and Cryptology - ICISC 2011 14th International Conference, Seoul, Korea, November 30 - December 2, 2011. Revised Selected Papersent://SD_ILS/0/SD_ILS:1971532026-01-18T11:02:19Z2026-01-18T11:02:19ZAuthor Kim, Howon. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-31912-9">http://dx.doi.org/10.1007/978-3-642-31912-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Information Theoretic Security 6th International Conference, ICITS 2012, Montreal, QC, Canada, August 15-17, 2012. Proceedingsent://SD_ILS/0/SD_ILS:1972012026-01-18T11:02:19Z2026-01-18T11:02:19ZAuthor Smith, Adam. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-32284-6">http://dx.doi.org/10.1007/978-3-642-32284-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Multidisciplinary Research and Practice for Information Systems IFIP WG 8.4, 8.9/TC 5 International Cross-Domain Conference and Workshop on Availability, Reliability, and Security, CD-ARES 2012, Prague, Czech Republic, August 20-24, 2012. Proceedingsent://SD_ILS/0/SD_ILS:1972272026-01-18T11:02:19Z2026-01-18T11:02:19ZAuthor Quirchmayr, Gerald. editor. Basl, Josef. editor. You, Ilsun. editor. Xu, Lida. editor. Weippl, Edgar. editor.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-32498-7">http://dx.doi.org/10.1007/978-3-642-32498-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Advances in Information and Computer Security 7th International Workshop on Security, IWSEC 2012, Fukuoka, Japan, November 7-9, 2012. Proceedingsent://SD_ILS/0/SD_ILS:1974752026-01-18T11:02:19Z2026-01-18T11:02:19ZAuthor Hanaoka, Goichiro. editor. Yamauchi, Toshihiro. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-34117-5">http://dx.doi.org/10.1007/978-3-642-34117-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Information and Communications Security 14th International Conference, ICICS 2012, Hong Kong, China, October 29-31, 2012. Proceedingsent://SD_ILS/0/SD_ILS:1974782026-01-18T11:02:19Z2026-01-18T11:02:19ZAuthor Chim, Tat Wing. editor. Yuen, Tsz Hon. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-34129-8">http://dx.doi.org/10.1007/978-3-642-34129-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Information Security and Cryptology 7th International Conference, Inscrypt 2011, Beijing, China, November 30 – December 3, 2011. Revised Selected Papersent://SD_ILS/0/SD_ILS:1975412026-01-18T11:02:19Z2026-01-18T11:02:19ZAuthor Wu, Chuan-Kun. editor. Yung, Moti. editor. Lin, Dongdai. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-34704-7">http://dx.doi.org/10.1007/978-3-642-34704-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Advances in Cryptology – ASIACRYPT 2012 18th International Conference on the Theory and Application of Cryptology and Information Security, Beijing, China, December 2-6, 2012. Proceedingsent://SD_ILS/0/SD_ILS:1975592026-01-18T11:02:19Z2026-01-18T11:02:19ZAuthor Wang, Xiaoyun. editor. Sako, Kazue. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-34961-4">http://dx.doi.org/10.1007/978-3-642-34961-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Information Systems Security 8th International Conference, ICISS 2012, Guwahati, India, December 15-19, 2012. Proceedingsent://SD_ILS/0/SD_ILS:1975662026-01-18T11:02:19Z2026-01-18T11:02:19ZAuthor Venkatakrishnan, Venkat. editor. Goswami, Diganta. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-35130-3">http://dx.doi.org/10.1007/978-3-642-35130-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>ISSE 2012 Securing Electronic Business Processes Highlights of the Information Security Solutions Europe 2012 Conferenceent://SD_ILS/0/SD_ILS:1976622026-01-18T11:02:19Z2026-01-18T11:02:19ZAuthor Reimer, Helmut. editor. Pohlmann, Norbert. editor. Schneider, Wolfgang. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-658-00333-3">http://dx.doi.org/10.1007/978-3-658-00333-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Information security risk assessment toolkit practical assessments through data collection and data analysisent://SD_ILS/0/SD_ILS:1454702026-01-18T11:02:19Z2026-01-18T11:02:19ZAuthor Talabis, Mark. Martin, Jason.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597497350">http://www.sciencedirect.com/science/book/9781597497350</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Information Security Applications 12th International Workshop, WISA 2011, Jeju Island, Korea, August 22-24, 2011. Revised Selected Papersent://SD_ILS/0/SD_ILS:1962912026-01-18T11:02:19Z2026-01-18T11:02:19ZAuthor Jung, Souhwan. editor. Yung, Moti. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-27890-7">http://dx.doi.org/10.1007/978-3-642-27890-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Security and Intelligent Information Systems International Joint Conferences, SIIS 2011, Warsaw, Poland, June 13-14, 2011, Revised Selected Papersent://SD_ILS/0/SD_ILS:1958942026-01-18T11:02:19Z2026-01-18T11:02:19ZAuthor Bouvry, Pascal. editor. Kłopotek, Mieczysław A. editor. Leprévost, Franck. editor. Marciniak, Małgorzata. editor. Mykowiecka, Agnieszka. editor.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-25261-7">http://dx.doi.org/10.1007/978-3-642-25261-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Information Security Practice and Experience 8th International Conference, ISPEC 2012, Hangzhou, China, April 9-12, 2012. Proceedingsent://SD_ILS/0/SD_ILS:1966132026-01-18T11:02:19Z2026-01-18T11:02:19ZAuthor Ryan, Mark D. editor. Smyth, Ben. editor. Wang, Guilin. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-29101-2">http://dx.doi.org/10.1007/978-3-642-29101-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Security and Privacy in Mobile Information and Communication Systems Third International ICST Conference, MobiSec 2011, Aalborg, Denmark, May 17-19, 2011, Revised Selected Papersent://SD_ILS/0/SD_ILS:1968502026-01-18T11:02:19Z2026-01-18T11:02:19ZAuthor Prasad, Ramjee. editor. Farkas, Károly. editor. Schmidt, Andreas U. editor. Lioy, Antonio. editor. Russello, Giovanni. editor.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-30244-2">http://dx.doi.org/10.1007/978-3-642-30244-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Information Security and Privacy Research 27th IFIP TC 11 Information Security and Privacy Conference, SEC 2012, Heraklion, Crete, Greece, June 4-6, 2012. Proceedingsent://SD_ILS/0/SD_ILS:1968862026-01-18T11:02:19Z2026-01-18T11:02:19ZAuthor Gritzalis, Dimitris. editor. Furnell, Steven. editor. Theoharidou, Marianthi. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-30436-1">http://dx.doi.org/10.1007/978-3-642-30436-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Information Security 15th International Conference, ISC 2012, Passau, Germany, September 19-21, 2012. Proceedingsent://SD_ILS/0/SD_ILS:1973652026-01-18T11:02:19Z2026-01-18T11:02:19ZAuthor Gollmann, Dieter. editor. Freiling, Felix C. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-33383-5">http://dx.doi.org/10.1007/978-3-642-33383-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Security and Privacy in Mobile Information and Communication Systems 4th International Conference, MobiSec 2012, Frankfurt am Main, Germany, June 25-26, 2012, Revised Selected Papersent://SD_ILS/0/SD_ILS:1973672026-01-18T11:02:19Z2026-01-18T11:02:19ZAuthor Schmidt, Andreas U. editor. Russello, Giovanni. editor. Krontiris, Ioannis. editor. Lian, Shiguo. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-33392-7">http://dx.doi.org/10.1007/978-3-642-33392-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Progress in Cryptology – LATINCRYPT 2012 2nd International Conference on Cryptology and Information Security in Latin America, Santiago, Chile, October 7-10, 2012. Proceedingsent://SD_ILS/0/SD_ILS:1973842026-01-18T11:02:19Z2026-01-18T11:02:19ZAuthor Hevia, Alejandro. editor. Neven, Gregory. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-33481-8">http://dx.doi.org/10.1007/978-3-642-33481-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Network Computing and Information Security Second International Conference, NCIS 2012, Shanghai, China, December 7-9, 2012. Proceedingsent://SD_ILS/0/SD_ILS:1975802026-01-18T11:02:19Z2026-01-18T11:02:19ZAuthor Lei, Jingsheng. editor. Wang, Fu Lee. editor. Li, Mo. editor. Luo, Yuan. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-35211-9">http://dx.doi.org/10.1007/978-3-642-35211-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Information Security Applications 13th International Workshop, WISA 2012, Jeju Island, Korea, August 16-18, 2012, Revised Selected Papersent://SD_ILS/0/SD_ILS:1976042026-01-18T11:02:19Z2026-01-18T11:02:19ZAuthor Lee, Dong Hoon. editor. Yung, Moti. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-35416-8">http://dx.doi.org/10.1007/978-3-642-35416-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Information security governance simplified : from the boardroom to the keyboardent://SD_ILS/0/SD_ILS:5419522026-01-18T11:02:19Z2026-01-18T11:02:19ZAuthor Fitzgerald, Todd., author.<br/>Preferred Shelf Number TK5105.59 .F58 2012<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781439811658">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>Access contested security, identity, and resistance in Asian cyberspace information revolution and global politicsent://SD_ILS/0/SD_ILS:2475422026-01-18T11:02:19Z2026-01-18T11:02:19ZAuthor Deibert, Ronald. Project Muse.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://muse.jhu.edu/books/9780262298919/">Full text available: </a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Operational Semantics and Verification of Security Protocolsent://SD_ILS/0/SD_ILS:1881952026-01-18T11:02:19Z2026-01-18T11:02:19ZAuthor Cremers, Cas. author. Mauw, Sjouke. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-540-78636-8">http://dx.doi.org/10.1007/978-3-540-78636-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Fault Analysis in Cryptographyent://SD_ILS/0/SD_ILS:1967462026-01-18T11:02:19Z2026-01-18T11:02:19ZAuthor Joye, Marc. editor. Tunstall, Michael. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-29656-7">http://dx.doi.org/10.1007/978-3-642-29656-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Multilaterally secure pervasive cooperation privacy protection, accountability and secure communication for the age of pervasive computingent://SD_ILS/0/SD_ILS:2795142026-01-18T11:02:19Z2026-01-18T11:02:19ZAuthor Weber, Stefan G. IOS Press.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access EBSCOhost <a href="http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=529563">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=529563</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Intelligent technologies for web applicationsent://SD_ILS/0/SD_ILS:5436132026-01-18T11:02:19Z2026-01-18T11:02:19ZAuthor Srinivas Sajja, Priti, author. Akerkar, Rajendra, author.<br/>Preferred Shelf Number TK5105.88815<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9780429065965">https://www.taylorfrancis.com/books/9780429065965</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Multimedia image and video processingent://SD_ILS/0/SD_ILS:5424692026-01-18T11:02:19Z2026-01-18T11:02:19ZAuthor Guan, Ling. He, Yifeng, 1972- Kung, S. Y. (Sun Yuan)<br/>Preferred Shelf Number QA76.575 .M83285 2012<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781315217765">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>Cybersecurity : public sector threats and responsesent://SD_ILS/0/SD_ILS:5454062026-01-18T11:02:19Z2026-01-18T11:02:19ZAuthor Andreasson, Kim J.<br/>Preferred Shelf Number TK5105.59 .C927 2012<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781439846643">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>Visual cryptography and secret image sharingent://SD_ILS/0/SD_ILS:5394682026-01-18T11:02:19Z2026-01-18T11:02:19ZAuthor Cimato, Stelvio. Yang, Ching-Nung.<br/>Preferred Shelf Number TA1637 .V544 2012<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781315217659">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>The Counterterrorism Handbook : Tactics, Procedures, and Techniques, Fourth Editionent://SD_ILS/0/SD_ILS:5464292026-01-18T11:02:19Z2026-01-18T11:02:19ZAuthor Bolz, Jr., Frank, author. Dudonis, Kenneth J., author. Schulz, David P., author. Taylor and Francis.<br/>Preferred Shelf Number HV6431 .B65 2012<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9780429270512">Click here to view.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Asset protection through security awarenessent://SD_ILS/0/SD_ILS:5466872026-01-18T11:02:19Z2026-01-18T11:02:19ZAuthor Speed, Tyler Justin., author.<br/>Preferred Shelf Number TK5105.59 .S643 2012<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781439809839">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>