Search Results for Security -- Technology. - Narrowed by: 2009SirsiDynix Enterprisehttps://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dSecurity$002b--$002bTechnology.$0026qf$003dPUBDATE$002509Publication$002bDate$0025092009$0025092009$0026ps$003d300?2024-09-20T23:20:58ZWireless Technology Applications, Management, and Securityent://SD_ILS/0/SD_ILS:1668802024-09-20T23:20:58Z2024-09-20T23:20:58ZAuthor Powell, Steven. editor. Shim, J.P. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-0-387-71787-6">http://dx.doi.org/10.1007/978-0-387-71787-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Advances in Security Technology International Conference, SecTech 2008, and Its Special Sessions, Sanya, Hainan Island, China, December 13-15, 2008. Revised Selected Papersent://SD_ILS/0/SD_ILS:1913112024-09-20T23:20:58Z2024-09-20T23:20:58ZAuthor Kim, Haeng-kon. editor. Kim, Tai-hoon. editor. Kiumi, Akingbehin. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-10240-0">http://dx.doi.org/10.1007/978-3-642-10240-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Justifying Ballistic Missile Defence Technology, Security and Cultureent://SD_ILS/0/SD_ILS:2351732024-09-20T23:20:58Z2024-09-20T23:20:58ZAuthor Peoples, Columba.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1017/CBO9780511691874">Access by subscription</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Security Technology International Conference, SecTech 2009, Held as Part of the Future Generation Information Technology Conference, FGIT 2009, Jeju Island, Korea, December 10-12, 2009. Proceedingsent://SD_ILS/0/SD_ILS:1914942024-09-20T23:20:58Z2024-09-20T23:20:58ZAuthor Ślęzak, Dominik. editor. Kim, Tai-hoon. editor. Fang, Wai-Chi. editor. Arnett, Kirk P. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-10847-1">http://dx.doi.org/10.1007/978-3-642-10847-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Data protection governance, risk management, and complianceent://SD_ILS/0/SD_ILS:2897002024-09-20T23:20:58Z2024-09-20T23:20:58ZAuthor Hill, David G. (David Gary), 1943-<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781439806937">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Information security management metrics a definitive guide to effective security monitoring and measurementent://SD_ILS/0/SD_ILS:2913732024-09-20T23:20:58Z2024-09-20T23:20:58ZAuthor Brotby, W. Krag.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781420052862">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>The effective CIO how to achieve outstanding success through strategic alignment, financial management, and IT governanceent://SD_ILS/0/SD_ILS:2914062024-09-20T23:20:58Z2024-09-20T23:20:58ZAuthor Brown, Eric J. Yarberry, William.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781420064643">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Information security governance a practical development and implementation approachent://SD_ILS/0/SD_ILS:2977432024-09-20T23:20:58Z2024-09-20T23:20:58ZAuthor Brotby, W. Krag.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access Ebook Library <a href="http://public.eblib.com/EBLPublic/PublicView.do?ptiID=433807">http://public.eblib.com/EBLPublic/PublicView.do?ptiID=433807</a>
John Wiley <a href="http://dx.doi.org/10.1002/9780470476017">http://dx.doi.org/10.1002/9780470476017</a>
<a href="http://site.ebrary.com/lib/alltitles/Doc?id=10313652">http://site.ebrary.com/lib/alltitles/Doc?id=10313652</a>
<a href="http://swb.eblib.com/patron/FullRecord.aspx?p=433807">http://swb.eblib.com/patron/FullRecord.aspx?p=433807</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Information warfareent://SD_ILS/0/SD_ILS:3040692024-09-20T23:20:58Z2024-09-20T23:20:58ZAuthor Ventre, Daniel.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access John Wiley <a href="http://dx.doi.org/10.1002/9781118381533">http://dx.doi.org/10.1002/9781118381533</a>
<a href="http://lib.myilibrary.com?id=477736">http://lib.myilibrary.com?id=477736</a>
OverDrive (PDF) <a href="http://www.contentreserve.com/TitleInfo.asp?ID={02D73229-3728-4EE5-942B-28D4B82AED18}&Format=50">http://www.contentreserve.com/TitleInfo.asp?ID={02D73229-3728-4EE5-942B-28D4B82AED18}&Format=50</a>
OverDrive (EPUB) <a href="http://www.contentreserve.com/TitleInfo.asp?ID={02D73229-3728-4EE5-942B-28D4B82AED18}&Format=410">http://www.contentreserve.com/TitleInfo.asp?ID={02D73229-3728-4EE5-942B-28D4B82AED18}&Format=410</a>
OverDrive (READ) <a href="http://www.contentreserve.com/TitleInfo.asp?ID={02D73229-3728-4EE5-942B-28D4B82AED18}&Format=610">http://www.contentreserve.com/TitleInfo.asp?ID={02D73229-3728-4EE5-942B-28D4B82AED18}&Format=610</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>CISO soft skills securing organizations impaired by employee politics, apathy, and intolerant perspectivesent://SD_ILS/0/SD_ILS:2887442024-09-20T23:20:58Z2024-09-20T23:20:58ZAuthor Collette, Ronald D. Gentile, Michael. Gentile, Skye.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781420089110">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>