Search Results for Security Measures. - Narrowed by: 2009 SirsiDynix Enterprise https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dSecurity$002bMeasures.$0026qf$003dPUBDATE$002509Publication$002bDate$0025092009$0025092009$0026ps$003d300? 2024-09-13T12:45:33Z International aviation and terrorism evolving threat, evolving security ent://SD_ILS/0/SD_ILS:266868 2024-09-13T12:45:33Z 2024-09-13T12:45:33Z Author&#160;Harrison, John, 1970-<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://www.tandfebooks.com/isbn/9780203878712">Click here to view</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Remote sensing of global croplands for food security ent://SD_ILS/0/SD_ILS:268573 2024-09-13T12:45:33Z 2024-09-13T12:45:33Z Author&#160;Thenkabail, Prasad Srinivasa, 1958-<br/>Preferred Shelf Number&#160;S494.5.R4 R454 2009<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Remote sensing of global croplands for food security ent://SD_ILS/0/SD_ILS:286990 2024-09-13T12:45:33Z 2024-09-13T12:45:33Z Author&#160;Thenkabail, Prasad Srinivasa, 1958-<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781420090109">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security in RFID and sensor networks ent://SD_ILS/0/SD_ILS:287797 2024-09-13T12:45:33Z 2024-09-13T12:45:33Z Author&#160;Kitsos, Paris.&#160;Zhang, Yan, 1977-<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781420068405">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> How to develop and implement a security master plan ent://SD_ILS/0/SD_ILS:287876 2024-09-13T12:45:33Z 2024-09-13T12:45:33Z Author&#160;Giles, Timothy.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781420086263">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> CISO soft skills securing organizations impaired by employee politics, apathy, and intolerant perspectives ent://SD_ILS/0/SD_ILS:288744 2024-09-13T12:45:33Z 2024-09-13T12:45:33Z Author&#160;Collette, Ronald D.&#160;Gentile, Michael.&#160;Gentile, Skye.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781420089110">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security manager's guide to disasters managing through emergencies, violence, and other workplace threats ent://SD_ILS/0/SD_ILS:288822 2024-09-13T12:45:33Z 2024-09-13T12:45:33Z Author&#160;Manley, Anthony D., 1932-<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781439809075">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Data protection governance, risk management, and compliance ent://SD_ILS/0/SD_ILS:289700 2024-09-13T12:45:33Z 2024-09-13T12:45:33Z Author&#160;Hill, David G. (David Gary), 1943-<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781439806937">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Building vulnerability assessments industrial hygiene and engineering concepts ent://SD_ILS/0/SD_ILS:289713 2024-09-13T12:45:33Z 2024-09-13T12:45:33Z Author&#160;Boss, Martha J.&#160;Day, Dennis W.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781420078350">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Homeland security and private sector business corporations' role in critical infrastructure protection ent://SD_ILS/0/SD_ILS:290566 2024-09-13T12:45:33Z 2024-09-13T12:45:33Z Author&#160;Lee, Elsa.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781420070798">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information security management metrics a definitive guide to effective security monitoring and measurement ent://SD_ILS/0/SD_ILS:291373 2024-09-13T12:45:33Z 2024-09-13T12:45:33Z Author&#160;Brotby, W. Krag.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781420052862">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Mobile communication systems and security ent://SD_ILS/0/SD_ILS:249807 2024-09-13T12:45:33Z 2024-09-13T12:45:33Z Author&#160;Rhee, Man Young.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;IEEE Xplore <a href="http://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=5628362">http://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=5628362</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security in an IPv6 environment ent://SD_ILS/0/SD_ILS:291504 2024-09-13T12:45:33Z 2024-09-13T12:45:33Z Author&#160;Minoli, Daniel, 1952-&#160;Kouns, Jake.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781420092301">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information security governance a practical development and implementation approach ent://SD_ILS/0/SD_ILS:297743 2024-09-13T12:45:33Z 2024-09-13T12:45:33Z Author&#160;Brotby, W. Krag.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;Ebook Library <a href="http://public.eblib.com/EBLPublic/PublicView.do?ptiID=433807">http://public.eblib.com/EBLPublic/PublicView.do?ptiID=433807</a> John Wiley <a href="http://dx.doi.org/10.1002/9780470476017">http://dx.doi.org/10.1002/9780470476017</a> <a href="http://site.ebrary.com/lib/alltitles/Doc?id=10313652">http://site.ebrary.com/lib/alltitles/Doc?id=10313652</a> <a href="http://swb.eblib.com/patron/FullRecord.aspx?p=433807">http://swb.eblib.com/patron/FullRecord.aspx?p=433807</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security risk management body of knowledge ent://SD_ILS/0/SD_ILS:297759 2024-09-13T12:45:33Z 2024-09-13T12:45:33Z Author&#160;Talbot, Julian.&#160;Jakeman, Miles Gareth.&#160;Wiley InterScience (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;John Wiley <a href="http://dx.doi.org/10.1002/9780470494974">http://dx.doi.org/10.1002/9780470494974</a> Books24x7 <a href="http://www.books24x7.com/marc.asp?bookid=43285">http://www.books24x7.com/marc.asp?bookid=43285</a> MyiLibrary, Table of contents <a href="http://www.myilibrary.com?id=230340&ref=toc">http://www.myilibrary.com?id=230340&ref=toc</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> SIP security ent://SD_ILS/0/SD_ILS:297791 2024-09-13T12:45:33Z 2024-09-13T12:45:33Z Author&#160;Sisalem, Dorgham.&#160;Wiley InterScience (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://onlinelibrary.wiley.com/book/10.1002/9780470516997">http://onlinelibrary.wiley.com/book/10.1002/9780470516997</a> John Wiley <a href="http://dx.doi.org/10.1002/9780470516997">http://dx.doi.org/10.1002/9780470516997</a> <a href="http://site.ebrary.com/lib/alltitles/Doc?id=10298102">http://site.ebrary.com/lib/alltitles/Doc?id=10298102</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Wireless and mobile network security security basics, security in On-the-shelf and emergeing technologies ent://SD_ILS/0/SD_ILS:297992 2024-09-13T12:45:33Z 2024-09-13T12:45:33Z Author&#160;Chaouchi, Hakima.&#160;Laurent-Maknavicius, Maryline.&#160;Wiley InterScience (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;John Wiley <a href="http://dx.doi.org/10.1002/9780470611883">http://dx.doi.org/10.1002/9780470611883</a> <a href="http://site.ebrary.com/lib/alltitles/Doc?id=10361067">http://site.ebrary.com/lib/alltitles/Doc?id=10361067</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information warfare ent://SD_ILS/0/SD_ILS:304069 2024-09-13T12:45:33Z 2024-09-13T12:45:33Z Author&#160;Ventre, Daniel.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;John Wiley <a href="http://dx.doi.org/10.1002/9781118381533">http://dx.doi.org/10.1002/9781118381533</a> <a href="http://lib.myilibrary.com?id=477736">http://lib.myilibrary.com?id=477736</a> OverDrive (PDF) <a href="http://www.contentreserve.com/TitleInfo.asp?ID={02D73229-3728-4EE5-942B-28D4B82AED18}&Format=50">http://www.contentreserve.com/TitleInfo.asp?ID={02D73229-3728-4EE5-942B-28D4B82AED18}&Format=50</a> OverDrive (EPUB) <a href="http://www.contentreserve.com/TitleInfo.asp?ID={02D73229-3728-4EE5-942B-28D4B82AED18}&Format=410">http://www.contentreserve.com/TitleInfo.asp?ID={02D73229-3728-4EE5-942B-28D4B82AED18}&Format=410</a> OverDrive (READ) <a href="http://www.contentreserve.com/TitleInfo.asp?ID={02D73229-3728-4EE5-942B-28D4B82AED18}&Format=610">http://www.contentreserve.com/TitleInfo.asp?ID={02D73229-3728-4EE5-942B-28D4B82AED18}&Format=610</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cloud security and privacy ent://SD_ILS/0/SD_ILS:144722 2024-09-13T12:45:33Z 2024-09-13T12:45:33Z Author&#160;Mather, Tim.&#160;Kumaraswamy, Subra.&#160;Latif, Shahed.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;EBSCOhost <a href="http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=414816">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=414816</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Next generation SSH2 implementation securing data in motion ent://SD_ILS/0/SD_ILS:146275 2024-09-13T12:45:33Z 2024-09-13T12:45:33Z Author&#160;Liu, Dale.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492836">http://www.sciencedirect.com/science/book/9781597492836</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Mobile malware attacks and defense ent://SD_ILS/0/SD_ILS:146413 2024-09-13T12:45:33Z 2024-09-13T12:45:33Z Author&#160;Dunham, Ken.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492980">http://www.sciencedirect.com/science/book/9781597492980</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Disappearing cryptography information hiding : steganography &amp; watermarking ent://SD_ILS/0/SD_ILS:146450 2024-09-13T12:45:33Z 2024-09-13T12:45:33Z Author&#160;Wayner, Peter, 1964-<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780123744791">http://www.sciencedirect.com/science/book/9780123744791</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Eleventh hour security+ exam SYO-201 study guide ent://SD_ILS/0/SD_ILS:146534 2024-09-13T12:45:33Z 2024-09-13T12:45:33Z Author&#160;Dubrawsky, Ido.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597494274">http://www.sciencedirect.com/science/book/9781597494274</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Virtualization for security including sandboxing, disaster recovery, high availability, forensic analysis, and honeypotting ent://SD_ILS/0/SD_ILS:146775 2024-09-13T12:45:33Z 2024-09-13T12:45:33Z Author&#160;Hoopes, John.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597493055">http://www.sciencedirect.com/science/book/9781597493055</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> GFI network security and PCI compliance power tools ent://SD_ILS/0/SD_ILS:148143 2024-09-13T12:45:33Z 2024-09-13T12:45:33Z Author&#160;Posey, Brien.&#160;Thompson, Troy.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492850">http://www.sciencedirect.com/science/book/9781597492850</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cisco router and switch forensics investigating and analyzing malicious network activity ent://SD_ILS/0/SD_ILS:148703 2024-09-13T12:45:33Z 2024-09-13T12:45:33Z Author&#160;Liu, Dale.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597494182">http://www.sciencedirect.com/science/book/9781597494182</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer and information security handbook ent://SD_ILS/0/SD_ILS:148884 2024-09-13T12:45:33Z 2024-09-13T12:45:33Z Author&#160;Vacca, John R.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780123743541">http://www.sciencedirect.com/science/book/9780123743541</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> SAP security configuration and deployment the IT administrator's guide to best practices ent://SD_ILS/0/SD_ILS:148994 2024-09-13T12:45:33Z 2024-09-13T12:45:33Z Author&#160;Wun-Young, Leslie.&#160;Hirao, Joey.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492843">http://www.sciencedirect.com/science/book/9781597492843</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Safe and secure schools 27 strategies for prevention and intervention ent://SD_ILS/0/SD_ILS:369274 2024-09-13T12:45:33Z 2024-09-13T12:45:33Z Author&#160;Brunner, Judy M.&#160;Lewis, Dennis K.<br/>Preferred Shelf Number&#160;ONLINE(369274.1)<br/>Electronic Access&#160;SAGE knowledge <a href="http://sk.sagepub.com/books/safe-and-secure-schools">http://sk.sagepub.com/books/safe-and-secure-schools</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/>