Search Results for Security Measures. - Narrowed by: 2008SirsiDynix Enterprisehttps://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dSecurity$002bMeasures.$0026qf$003dPUBDATE$002509Publication$002bDate$0025092008$0025092008$0026ps$003d300?dt=list2025-03-17T19:28:14ZThe future of the internet and how to stop itent://SD_ILS/0/SD_ILS:1349462025-03-17T19:28:14Z2025-03-17T19:28:14ZAuthor Zittrain, Jonathan L.<br/>Preferred Shelf Number TK5105.875.I57 Z53 2008<br/>Format: Books<br/>Availability Beytepe Library~1<br/>İnternet kullanımı ve aileent://SD_ILS/0/SD_ILS:1399012025-03-17T19:28:14Z2025-03-17T19:28:14ZPreferred Shelf Number TK5105.888 .I58 2008<br/>Format: Books<br/>Availability Beytepe Library~1<br/>Microsoft forefront security administration guideent://SD_ILS/0/SD_ILS:1463692025-03-17T19:28:14Z2025-03-17T19:28:14ZAuthor Varsalone, Jesse.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492447">http://www.sciencedirect.com/science/book/9781597492447</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Network security know it allent://SD_ILS/0/SD_ILS:1464012025-03-17T19:28:14Z2025-03-17T19:28:14ZAuthor Joshi, James B. D.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780123744630">http://www.sciencedirect.com/science/book/9780123744630</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Kismet hackingent://SD_ILS/0/SD_ILS:1478612025-03-17T19:28:14Z2025-03-17T19:28:14ZAuthor Haines, Brad. Schearer, Michael J. Thornton, Frank (Thorn)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491174">http://www.sciencedirect.com/science/book/9781597491174</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>SonicWALL secure wireless network integrated solutions guideent://SD_ILS/0/SD_ILS:1485622025-03-17T19:28:14Z2025-03-17T19:28:14ZAuthor Levy, Joe.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491938">http://www.sciencedirect.com/science/book/9781597491938</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Securing Citrix XenApp Server in the enterpriseent://SD_ILS/0/SD_ILS:1490502025-03-17T19:28:14Z2025-03-17T19:28:14ZAuthor Bin Azad, Tariq. Wilson, Connie. Wright., Michael.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492812">http://www.sciencedirect.com/science/book/9781597492812</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Nmap in the enterprise your guide to network scanningent://SD_ILS/0/SD_ILS:1464422025-03-17T19:28:14Z2025-03-17T19:28:14ZAuthor Orebaugh, Angela. Pinkard, Becky.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492416">http://www.sciencedirect.com/science/book/9781597492416</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>OSSEC host-based intrusion detection guideent://SD_ILS/0/SD_ILS:1483332025-03-17T19:28:14Z2025-03-17T19:28:14ZAuthor Hay, Andrew. Cid, Daniel. Bray, Rory.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492409">http://www.sciencedirect.com/science/book/9781597492409</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Security and Quality of Service in Ad Hoc Wireless Networksent://SD_ILS/0/SD_ILS:2378012025-03-17T19:28:14Z2025-03-17T19:28:14ZAuthor Mishra, Amitabh.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1017/CBO9780511619755">Access by subscription</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Introduction to Broadband Communication Systemsent://SD_ILS/0/SD_ILS:2480592025-03-17T19:28:14Z2025-03-17T19:28:14ZAuthor Akujuobi, Cajetan M. Sadiku, Matthew N.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1049/SBTE501E">http://dx.doi.org/10.1049/SBTE501E</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Wireless Internet Security Architecture and Protocolsent://SD_ILS/0/SD_ILS:2362052025-03-17T19:28:14Z2025-03-17T19:28:14ZAuthor Kempf, James.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1017/CBO9780511754739">Access by subscription</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Lloyd's MIU handbook of maritime securityent://SD_ILS/0/SD_ILS:2850072025-03-17T19:28:14Z2025-03-17T19:28:14ZAuthor Herbert-Burns, Rupert. Bateman, W. S. G. (Walter Samuel Grono) Lehr, Peter. Lloyd's (Firm)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781420054811">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Introduction to executive protectionent://SD_ILS/0/SD_ILS:2850112025-03-17T19:28:14Z2025-03-17T19:28:14ZAuthor June, Dale L.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781420043464">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Security software development assessing and managing security risksent://SD_ILS/0/SD_ILS:2860162025-03-17T19:28:14Z2025-03-17T19:28:14ZAuthor Ashbaugh, Douglas A.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781420063813">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Digital privacy theory, technologies, and practicesent://SD_ILS/0/SD_ILS:2868242025-03-17T19:28:14Z2025-03-17T19:28:14ZAuthor Acquisti, Alessandro.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781420052183">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Building an effective information security policy architectureent://SD_ILS/0/SD_ILS:2905772025-03-17T19:28:14Z2025-03-17T19:28:14ZAuthor Bacik, Sandy.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781420059069">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Transportation systems securityent://SD_ILS/0/SD_ILS:2905982025-03-17T19:28:14Z2025-03-17T19:28:14ZAuthor McDougall, Allan. Radvanovsky, Robert. Clavadetscher, Carl.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781420063790">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Managing global supply chains compliance, security, and dealing with terrorisment://SD_ILS/0/SD_ILS:2914822025-03-17T19:28:14Z2025-03-17T19:28:14ZAuthor Cook, Thomas A., 1953-<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781420064582">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>ISA server 2006ent://SD_ILS/0/SD_ILS:1150802025-03-17T19:28:14Z2025-03-17T19:28:14ZAuthor İnan, Yüksel. Demirli, Nihat.<br/>Preferred Shelf Number TK5105.59 .I536 2008<br/>Format: Books<br/>Availability Beytepe Library~2<br/>How to cheat at securing Linuxent://SD_ILS/0/SD_ILS:1455402025-03-17T19:28:14Z2025-03-17T19:28:14ZAuthor Krishnamurthy Madwachar, Mohan.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492072">http://www.sciencedirect.com/science/book/9781597492072</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Infosecurity 2008 threat analysisent://SD_ILS/0/SD_ILS:1455412025-03-17T19:28:14Z2025-03-17T19:28:14ZAuthor Clark, Champ, III.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492249">http://www.sciencedirect.com/science/book/9781597492249</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Information assurance dependability and security in networked systemsent://SD_ILS/0/SD_ILS:1455532025-03-17T19:28:14Z2025-03-17T19:28:14ZAuthor Qian, Yi, 1962-<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780123735669">http://www.sciencedirect.com/science/book/9780123735669</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Integrating ISA Server 2006 with Microsoft Exchange 2007ent://SD_ILS/0/SD_ILS:1456282025-03-17T19:28:14Z2025-03-17T19:28:14ZAuthor Strachan, Fergus.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492751">http://www.sciencedirect.com/science/book/9781597492751</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Netcat power toolsent://SD_ILS/0/SD_ILS:1462772025-03-17T19:28:14Z2025-03-17T19:28:14ZAuthor Kanclirz, Jan. Baskin, Brian.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492577">http://www.sciencedirect.com/science/book/9781597492577</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Practical embedded security building secure resource-constrained systemsent://SD_ILS/0/SD_ILS:1474162025-03-17T19:28:14Z2025-03-17T19:28:14ZAuthor Stapko, Timothy John.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780750682152">http://www.sciencedirect.com/science/book/9780750682152</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Google hacking for penetration testers. Volume 2ent://SD_ILS/0/SD_ILS:1480292025-03-17T19:28:14Z2025-03-17T19:28:14ZAuthor Long, Johnny.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491761">http://www.sciencedirect.com/science/book/9781597491761</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Scene of the cybercrimeent://SD_ILS/0/SD_ILS:1489552025-03-17T19:28:14Z2025-03-17T19:28:14ZAuthor Cross, Michael, 1965- Shinder, Debra Littlejohn. Scene of the cybercrime.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492768">http://www.sciencedirect.com/science/book/9781597492768</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Security in wireless ad hoc and sensor networksent://SD_ILS/0/SD_ILS:2977892025-03-17T19:28:14Z2025-03-17T19:28:14ZAuthor Çayirci, E. (Erdal) Levi, Albert, 1969- Wiley InterScience (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access John Wiley <a href="http://dx.doi.org/10.1002/9780470516782">http://dx.doi.org/10.1002/9780470516782</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Transportation systems securityent://SD_ILS/0/SD_ILS:3428272025-03-17T19:28:14Z2025-03-17T19:28:14ZAuthor McDougall, Allan. Radvanovsky, Robert.<br/>Preferred Shelf Number ONLINE(342827.1)<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781466528055">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>The library security and safety guide to prevention, planning, and responseent://SD_ILS/0/SD_ILS:3165372025-03-17T19:28:14Z2025-03-17T19:28:14ZAuthor Kahn, Miriam (Miriam B.)<br/>Preferred Shelf Number Z679.6 K34 2008<br/>Format: Books<br/>Availability Beytepe Library~1<br/>Multimedia content encryption techniques and applicationsent://SD_ILS/0/SD_ILS:2859522025-03-17T19:28:14Z2025-03-17T19:28:14ZAuthor Lian, Shiguo.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781420065282">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Architecting secure software systemsent://SD_ILS/0/SD_ILS:2887492025-03-17T19:28:14Z2025-03-17T19:28:14ZAuthor Talukder, Asoke K. Chaitanya, Manish.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781420087857">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Information assurance architectureent://SD_ILS/0/SD_ILS:2911232025-03-17T19:28:14Z2025-03-17T19:28:14ZAuthor Willett, Keith D.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9780849380686">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Secure computer and network systems modeling, analysis and designent://SD_ILS/0/SD_ILS:2966652025-03-17T19:28:14Z2025-03-17T19:28:14ZAuthor Ye, Nong. Wiley InterScience (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access Contributor biographical information <a href="http://catdir.loc.gov/catdir/enhancements/fy0833/2007037133-b.html">http://catdir.loc.gov/catdir/enhancements/fy0833/2007037133-b.html</a>
John Wiley <a href="http://dx.doi.org/10.1002/9780470023273">http://dx.doi.org/10.1002/9780470023273</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Transportation infrastructure security utilizing intelligent transportation systemsent://SD_ILS/0/SD_ILS:2976842025-03-17T19:28:14Z2025-03-17T19:28:14ZAuthor Fries, Ryan Nicholas. Chowdhury, Mashrur A. Brummond, Jeffrey. Wiley InterScience (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access John Wiley <a href="http://dx.doi.org/10.1002/9780470432853">http://dx.doi.org/10.1002/9780470432853</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Distributed systems security issues, processes and solutionsent://SD_ILS/0/SD_ILS:2984222025-03-17T19:28:14Z2025-03-17T19:28:14ZAuthor Belapurkar, Abhijit. Wiley InterScience (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access John Wiley <a href="http://dx.doi.org/10.1002/9780470751787">http://dx.doi.org/10.1002/9780470751787</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>ICT futures delivering pervasive, real-time and secure servicesent://SD_ILS/0/SD_ILS:3027682025-03-17T19:28:14Z2025-03-17T19:28:14ZAuthor Warren, Paul (Paul W.) Davies, J. (N. John) Brown, David, 1954- Wiley InterScience (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access John Wiley <a href="http://dx.doi.org/10.1002/9780470758656">http://dx.doi.org/10.1002/9780470758656</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Host Identity Protocol (HIP) towards the secure mobile Internetent://SD_ILS/0/SD_ILS:3028022025-03-17T19:28:14Z2025-03-17T19:28:14ZAuthor Gurtov, Andrei.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access John Wiley <a href="http://dx.doi.org/10.1002/9780470772898">http://dx.doi.org/10.1002/9780470772898</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>