Search Results for Security Measures. - Narrowed by: 2008SirsiDynix Enterprisehttps://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dSecurity$002bMeasures.$0026qf$003dPUBDATE$002509Publication$002bDate$0025092008$0025092008$0026te$003dILS$0026ps$003d300$0026isd$003dtrue?2024-11-08T02:24:43ZISA server 2006ent://SD_ILS/0/SD_ILS:1150802024-11-08T02:24:43Z2024-11-08T02:24:43ZAuthor İnan, Yüksel. Demirli, Nihat.<br/>Preferred Shelf Number TK5105.59 .I536 2008<br/>Format: Books<br/>Availability Beytepe Library~2<br/>The future of the internet and how to stop itent://SD_ILS/0/SD_ILS:1349462024-11-08T02:24:43Z2024-11-08T02:24:43ZAuthor Zittrain, Jonathan L.<br/>Preferred Shelf Number TK5105.875.I57 Z53 2008<br/>Format: Books<br/>Availability Beytepe Library~1<br/>Kismet hackingent://SD_ILS/0/SD_ILS:1478612024-11-08T02:24:43Z2024-11-08T02:24:43ZAuthor Haines, Brad. Schearer, Michael J. Thornton, Frank (Thorn)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491174">http://www.sciencedirect.com/science/book/9781597491174</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Digital privacy theory, technologies, and practicesent://SD_ILS/0/SD_ILS:2868242024-11-08T02:24:43Z2024-11-08T02:24:43ZAuthor Acquisti, Alessandro.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781420052183">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Information assurance architectureent://SD_ILS/0/SD_ILS:2911232024-11-08T02:24:43Z2024-11-08T02:24:43ZAuthor Willett, Keith D.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9780849380686">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>The library security and safety guide to prevention, planning, and responseent://SD_ILS/0/SD_ILS:3165372024-11-08T02:24:43Z2024-11-08T02:24:43ZAuthor Kahn, Miriam (Miriam B.)<br/>Preferred Shelf Number Z679.6 K34 2008<br/>Format: Books<br/>Availability Beytepe Library~1<br/>Managing global supply chains compliance, security, and dealing with terrorisment://SD_ILS/0/SD_ILS:2914822024-11-08T02:24:43Z2024-11-08T02:24:43ZAuthor Cook, Thomas A., 1953-<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781420064582">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Lloyd's MIU handbook of maritime securityent://SD_ILS/0/SD_ILS:2850072024-11-08T02:24:43Z2024-11-08T02:24:43ZAuthor Herbert-Burns, Rupert. Bateman, W. S. G. (Walter Samuel Grono) Lehr, Peter. Lloyd's (Firm)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781420054811">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Introduction to executive protectionent://SD_ILS/0/SD_ILS:2850112024-11-08T02:24:43Z2024-11-08T02:24:43ZAuthor June, Dale L.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781420043464">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Multimedia content encryption techniques and applicationsent://SD_ILS/0/SD_ILS:2859522024-11-08T02:24:43Z2024-11-08T02:24:43ZAuthor Lian, Shiguo.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781420065282">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Security software development assessing and managing security risksent://SD_ILS/0/SD_ILS:2860162024-11-08T02:24:43Z2024-11-08T02:24:43ZAuthor Ashbaugh, Douglas A.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781420063813">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Architecting secure software systemsent://SD_ILS/0/SD_ILS:2887492024-11-08T02:24:43Z2024-11-08T02:24:43ZAuthor Talukder, Asoke K. Chaitanya, Manish.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781420087857">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Introduction to Broadband Communication Systemsent://SD_ILS/0/SD_ILS:2480592024-11-08T02:24:43Z2024-11-08T02:24:43ZAuthor Akujuobi, Cajetan M. Sadiku, Matthew N.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1049/SBTE501E">http://dx.doi.org/10.1049/SBTE501E</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Secure computer and network systems modeling, analysis and designent://SD_ILS/0/SD_ILS:2966652024-11-08T02:24:43Z2024-11-08T02:24:43ZAuthor Ye, Nong. Wiley InterScience (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access Contributor biographical information <a href="http://catdir.loc.gov/catdir/enhancements/fy0833/2007037133-b.html">http://catdir.loc.gov/catdir/enhancements/fy0833/2007037133-b.html</a>
John Wiley <a href="http://dx.doi.org/10.1002/9780470023273">http://dx.doi.org/10.1002/9780470023273</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Security in wireless ad hoc and sensor networksent://SD_ILS/0/SD_ILS:2977892024-11-08T02:24:43Z2024-11-08T02:24:43ZAuthor Çayirci, E. (Erdal) Levi, Albert, 1969- Wiley InterScience (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access John Wiley <a href="http://dx.doi.org/10.1002/9780470516782">http://dx.doi.org/10.1002/9780470516782</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Distributed systems security issues, processes and solutionsent://SD_ILS/0/SD_ILS:2984222024-11-08T02:24:43Z2024-11-08T02:24:43ZAuthor Belapurkar, Abhijit. Wiley InterScience (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access John Wiley <a href="http://dx.doi.org/10.1002/9780470751787">http://dx.doi.org/10.1002/9780470751787</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Security and Quality of Service in Ad Hoc Wireless Networksent://SD_ILS/0/SD_ILS:2378012024-11-08T02:24:43Z2024-11-08T02:24:43ZAuthor Mishra, Amitabh.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1017/CBO9780511619755">Access by subscription</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Transportation systems securityent://SD_ILS/0/SD_ILS:3428272024-11-08T02:24:43Z2024-11-08T02:24:43ZAuthor McDougall, Allan. Radvanovsky, Robert.<br/>Preferred Shelf Number ONLINE(342827.1)<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781466528055">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Transportation infrastructure security utilizing intelligent transportation systemsent://SD_ILS/0/SD_ILS:2976842024-11-08T02:24:43Z2024-11-08T02:24:43ZAuthor Fries, Ryan Nicholas. Chowdhury, Mashrur A. Brummond, Jeffrey. Wiley InterScience (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access John Wiley <a href="http://dx.doi.org/10.1002/9780470432853">http://dx.doi.org/10.1002/9780470432853</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Wireless Internet Security Architecture and Protocolsent://SD_ILS/0/SD_ILS:2362052024-11-08T02:24:43Z2024-11-08T02:24:43ZAuthor Kempf, James.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1017/CBO9780511754739">Access by subscription</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>SonicWALL secure wireless network integrated solutions guideent://SD_ILS/0/SD_ILS:1485622024-11-08T02:24:43Z2024-11-08T02:24:43ZAuthor Levy, Joe.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491938">http://www.sciencedirect.com/science/book/9781597491938</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Netcat power toolsent://SD_ILS/0/SD_ILS:1462772024-11-08T02:24:43Z2024-11-08T02:24:43ZAuthor Kanclirz, Jan. Baskin, Brian.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492577">http://www.sciencedirect.com/science/book/9781597492577</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Network security know it allent://SD_ILS/0/SD_ILS:1464012024-11-08T02:24:43Z2024-11-08T02:24:43ZAuthor Joshi, James B. D.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780123744630">http://www.sciencedirect.com/science/book/9780123744630</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Scene of the cybercrimeent://SD_ILS/0/SD_ILS:1489552024-11-08T02:24:43Z2024-11-08T02:24:43ZAuthor Cross, Michael, 1965- Shinder, Debra Littlejohn. Scene of the cybercrime.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492768">http://www.sciencedirect.com/science/book/9781597492768</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>İnternet kullanımı ve aileent://SD_ILS/0/SD_ILS:1399012024-11-08T02:24:43Z2024-11-08T02:24:43ZPreferred Shelf Number TK5105.888 .I58 2008<br/>Format: Books<br/>Availability Beytepe Library~1<br/>How to cheat at securing Linuxent://SD_ILS/0/SD_ILS:1455402024-11-08T02:24:43Z2024-11-08T02:24:43ZAuthor Krishnamurthy Madwachar, Mohan.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492072">http://www.sciencedirect.com/science/book/9781597492072</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Infosecurity 2008 threat analysisent://SD_ILS/0/SD_ILS:1455412024-11-08T02:24:43Z2024-11-08T02:24:43ZAuthor Clark, Champ, III.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492249">http://www.sciencedirect.com/science/book/9781597492249</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Information assurance dependability and security in networked systemsent://SD_ILS/0/SD_ILS:1455532024-11-08T02:24:43Z2024-11-08T02:24:43ZAuthor Qian, Yi, 1962-<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780123735669">http://www.sciencedirect.com/science/book/9780123735669</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Integrating ISA Server 2006 with Microsoft Exchange 2007ent://SD_ILS/0/SD_ILS:1456282024-11-08T02:24:43Z2024-11-08T02:24:43ZAuthor Strachan, Fergus.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492751">http://www.sciencedirect.com/science/book/9781597492751</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Microsoft forefront security administration guideent://SD_ILS/0/SD_ILS:1463692024-11-08T02:24:43Z2024-11-08T02:24:43ZAuthor Varsalone, Jesse.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492447">http://www.sciencedirect.com/science/book/9781597492447</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Nmap in the enterprise your guide to network scanningent://SD_ILS/0/SD_ILS:1464422024-11-08T02:24:43Z2024-11-08T02:24:43ZAuthor Orebaugh, Angela. Pinkard, Becky.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492416">http://www.sciencedirect.com/science/book/9781597492416</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Practical embedded security building secure resource-constrained systemsent://SD_ILS/0/SD_ILS:1474162024-11-08T02:24:43Z2024-11-08T02:24:43ZAuthor Stapko, Timothy John.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780750682152">http://www.sciencedirect.com/science/book/9780750682152</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Google hacking for penetration testers. Volume 2ent://SD_ILS/0/SD_ILS:1480292024-11-08T02:24:43Z2024-11-08T02:24:43ZAuthor Long, Johnny.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491761">http://www.sciencedirect.com/science/book/9781597491761</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>OSSEC host-based intrusion detection guideent://SD_ILS/0/SD_ILS:1483332024-11-08T02:24:43Z2024-11-08T02:24:43ZAuthor Hay, Andrew. Cid, Daniel. Bray, Rory.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492409">http://www.sciencedirect.com/science/book/9781597492409</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Securing Citrix XenApp Server in the enterpriseent://SD_ILS/0/SD_ILS:1490502024-11-08T02:24:43Z2024-11-08T02:24:43ZAuthor Bin Azad, Tariq. Wilson, Connie. Wright., Michael.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492812">http://www.sciencedirect.com/science/book/9781597492812</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Building an effective information security policy architectureent://SD_ILS/0/SD_ILS:2905772024-11-08T02:24:43Z2024-11-08T02:24:43ZAuthor Bacik, Sandy.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781420059069">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Transportation systems securityent://SD_ILS/0/SD_ILS:2905982024-11-08T02:24:43Z2024-11-08T02:24:43ZAuthor McDougall, Allan. Radvanovsky, Robert. Clavadetscher, Carl.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781420063790">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>ICT futures delivering pervasive, real-time and secure servicesent://SD_ILS/0/SD_ILS:3027682024-11-08T02:24:43Z2024-11-08T02:24:43ZAuthor Warren, Paul (Paul W.) Davies, J. (N. John) Brown, David, 1954- Wiley InterScience (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access John Wiley <a href="http://dx.doi.org/10.1002/9780470758656">http://dx.doi.org/10.1002/9780470758656</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Host Identity Protocol (HIP) towards the secure mobile Internetent://SD_ILS/0/SD_ILS:3028022024-11-08T02:24:43Z2024-11-08T02:24:43ZAuthor Gurtov, Andrei.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access John Wiley <a href="http://dx.doi.org/10.1002/9780470772898">http://dx.doi.org/10.1002/9780470772898</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>