Search Results for Security Measures. - Narrowed by: 2009SirsiDynix Enterprisehttps://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dSecurity$002bMeasures.$0026qf$003dPUBDATE$002509Publication$002bDate$0025092009$0025092009$0026te$003dILS$0026ps$003d300?2024-11-03T00:37:50ZMobile communication systems and securityent://SD_ILS/0/SD_ILS:2498072024-11-03T00:37:50Z2024-11-03T00:37:50ZAuthor Rhee, Man Young.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access IEEE Xplore <a href="http://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=5628362">http://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=5628362</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>International aviation and terrorism evolving threat, evolving securityent://SD_ILS/0/SD_ILS:2668682024-11-03T00:37:50Z2024-11-03T00:37:50ZAuthor Harrison, John, 1970-<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://www.tandfebooks.com/isbn/9780203878712">Click here to view</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Remote sensing of global croplands for food securityent://SD_ILS/0/SD_ILS:2685732024-11-03T00:37:50Z2024-11-03T00:37:50ZAuthor Thenkabail, Prasad Srinivasa, 1958-<br/>Preferred Shelf Number S494.5.R4 R454 2009<br/>Format: Books<br/>Availability Beytepe Library~1<br/>Disappearing cryptography information hiding : steganography & watermarkingent://SD_ILS/0/SD_ILS:1464502024-11-03T00:37:50Z2024-11-03T00:37:50ZAuthor Wayner, Peter, 1964-<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780123744791">http://www.sciencedirect.com/science/book/9780123744791</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Virtualization for security including sandboxing, disaster recovery, high availability, forensic analysis, and honeypottingent://SD_ILS/0/SD_ILS:1467752024-11-03T00:37:50Z2024-11-03T00:37:50ZAuthor Hoopes, John.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597493055">http://www.sciencedirect.com/science/book/9781597493055</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Cloud security and privacyent://SD_ILS/0/SD_ILS:1447222024-11-03T00:37:50Z2024-11-03T00:37:50ZAuthor Mather, Tim. Kumaraswamy, Subra. Latif, Shahed.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access EBSCOhost <a href="http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=414816">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=414816</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Next generation SSH2 implementation securing data in motionent://SD_ILS/0/SD_ILS:1462752024-11-03T00:37:50Z2024-11-03T00:37:50ZAuthor Liu, Dale.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492836">http://www.sciencedirect.com/science/book/9781597492836</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Mobile malware attacks and defenseent://SD_ILS/0/SD_ILS:1464132024-11-03T00:37:50Z2024-11-03T00:37:50ZAuthor Dunham, Ken.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492980">http://www.sciencedirect.com/science/book/9781597492980</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Eleventh hour security+ exam SYO-201 study guideent://SD_ILS/0/SD_ILS:1465342024-11-03T00:37:50Z2024-11-03T00:37:50ZAuthor Dubrawsky, Ido.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597494274">http://www.sciencedirect.com/science/book/9781597494274</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Computer and information security handbookent://SD_ILS/0/SD_ILS:1488842024-11-03T00:37:50Z2024-11-03T00:37:50ZAuthor Vacca, John R.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780123743541">http://www.sciencedirect.com/science/book/9780123743541</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>GFI network security and PCI compliance power toolsent://SD_ILS/0/SD_ILS:1481432024-11-03T00:37:50Z2024-11-03T00:37:50ZAuthor Posey, Brien. Thompson, Troy.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492850">http://www.sciencedirect.com/science/book/9781597492850</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Cisco router and switch forensics investigating and analyzing malicious network activityent://SD_ILS/0/SD_ILS:1487032024-11-03T00:37:50Z2024-11-03T00:37:50ZAuthor Liu, Dale.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597494182">http://www.sciencedirect.com/science/book/9781597494182</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>SAP security configuration and deployment the IT administrator's guide to best practicesent://SD_ILS/0/SD_ILS:1489942024-11-03T00:37:50Z2024-11-03T00:37:50ZAuthor Wun-Young, Leslie. Hirao, Joey.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492843">http://www.sciencedirect.com/science/book/9781597492843</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Security in an IPv6 environmentent://SD_ILS/0/SD_ILS:2915042024-11-03T00:37:50Z2024-11-03T00:37:50ZAuthor Minoli, Daniel, 1952- Kouns, Jake.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781420092301">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>SIP securityent://SD_ILS/0/SD_ILS:2977912024-11-03T00:37:50Z2024-11-03T00:37:50ZAuthor Sisalem, Dorgham. Wiley InterScience (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://onlinelibrary.wiley.com/book/10.1002/9780470516997">http://onlinelibrary.wiley.com/book/10.1002/9780470516997</a>
John Wiley <a href="http://dx.doi.org/10.1002/9780470516997">http://dx.doi.org/10.1002/9780470516997</a>
<a href="http://site.ebrary.com/lib/alltitles/Doc?id=10298102">http://site.ebrary.com/lib/alltitles/Doc?id=10298102</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Wireless and mobile network security security basics, security in On-the-shelf and emergeing technologiesent://SD_ILS/0/SD_ILS:2979922024-11-03T00:37:50Z2024-11-03T00:37:50ZAuthor Chaouchi, Hakima. Laurent-Maknavicius, Maryline. Wiley InterScience (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access John Wiley <a href="http://dx.doi.org/10.1002/9780470611883">http://dx.doi.org/10.1002/9780470611883</a>
<a href="http://site.ebrary.com/lib/alltitles/Doc?id=10361067">http://site.ebrary.com/lib/alltitles/Doc?id=10361067</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Safe and secure schools 27 strategies for prevention and interventionent://SD_ILS/0/SD_ILS:3692742024-11-03T00:37:50Z2024-11-03T00:37:50ZAuthor Brunner, Judy M. Lewis, Dennis K.<br/>Preferred Shelf Number ONLINE(369274.1)<br/>Electronic Access SAGE knowledge <a href="http://sk.sagepub.com/books/safe-and-secure-schools">http://sk.sagepub.com/books/safe-and-secure-schools</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Security manager's guide to disasters managing through emergencies, violence, and other workplace threatsent://SD_ILS/0/SD_ILS:2888222024-11-03T00:37:50Z2024-11-03T00:37:50ZAuthor Manley, Anthony D., 1932-<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781439809075">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Building vulnerability assessments industrial hygiene and engineering conceptsent://SD_ILS/0/SD_ILS:2897132024-11-03T00:37:50Z2024-11-03T00:37:50ZAuthor Boss, Martha J. Day, Dennis W.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781420078350">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Data protection governance, risk management, and complianceent://SD_ILS/0/SD_ILS:2897002024-11-03T00:37:50Z2024-11-03T00:37:50ZAuthor Hill, David G. (David Gary), 1943-<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781439806937">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Information security governance a practical development and implementation approachent://SD_ILS/0/SD_ILS:2977432024-11-03T00:37:50Z2024-11-03T00:37:50ZAuthor Brotby, W. Krag.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access Ebook Library <a href="http://public.eblib.com/EBLPublic/PublicView.do?ptiID=433807">http://public.eblib.com/EBLPublic/PublicView.do?ptiID=433807</a>
John Wiley <a href="http://dx.doi.org/10.1002/9780470476017">http://dx.doi.org/10.1002/9780470476017</a>
<a href="http://site.ebrary.com/lib/alltitles/Doc?id=10313652">http://site.ebrary.com/lib/alltitles/Doc?id=10313652</a>
<a href="http://swb.eblib.com/patron/FullRecord.aspx?p=433807">http://swb.eblib.com/patron/FullRecord.aspx?p=433807</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>CISO soft skills securing organizations impaired by employee politics, apathy, and intolerant perspectivesent://SD_ILS/0/SD_ILS:2887442024-11-03T00:37:50Z2024-11-03T00:37:50ZAuthor Collette, Ronald D. Gentile, Michael. Gentile, Skye.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781420089110">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Homeland security and private sector business corporations' role in critical infrastructure protectionent://SD_ILS/0/SD_ILS:2905662024-11-03T00:37:50Z2024-11-03T00:37:50ZAuthor Lee, Elsa.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781420070798">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Security risk management body of knowledgeent://SD_ILS/0/SD_ILS:2977592024-11-03T00:37:50Z2024-11-03T00:37:50ZAuthor Talbot, Julian. Jakeman, Miles Gareth. Wiley InterScience (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access John Wiley <a href="http://dx.doi.org/10.1002/9780470494974">http://dx.doi.org/10.1002/9780470494974</a>
Books24x7 <a href="http://www.books24x7.com/marc.asp?bookid=43285">http://www.books24x7.com/marc.asp?bookid=43285</a>
MyiLibrary, Table of contents <a href="http://www.myilibrary.com?id=230340&ref=toc">http://www.myilibrary.com?id=230340&ref=toc</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Remote sensing of global croplands for food securityent://SD_ILS/0/SD_ILS:2869902024-11-03T00:37:50Z2024-11-03T00:37:50ZAuthor Thenkabail, Prasad Srinivasa, 1958-<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781420090109">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Security in RFID and sensor networksent://SD_ILS/0/SD_ILS:2877972024-11-03T00:37:50Z2024-11-03T00:37:50ZAuthor Kitsos, Paris. Zhang, Yan, 1977-<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781420068405">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>How to develop and implement a security master planent://SD_ILS/0/SD_ILS:2878762024-11-03T00:37:50Z2024-11-03T00:37:50ZAuthor Giles, Timothy.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781420086263">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Information security management metrics a definitive guide to effective security monitoring and measurementent://SD_ILS/0/SD_ILS:2913732024-11-03T00:37:50Z2024-11-03T00:37:50ZAuthor Brotby, W. Krag.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781420052862">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Information warfareent://SD_ILS/0/SD_ILS:3040692024-11-03T00:37:50Z2024-11-03T00:37:50ZAuthor Ventre, Daniel.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access John Wiley <a href="http://dx.doi.org/10.1002/9781118381533">http://dx.doi.org/10.1002/9781118381533</a>
<a href="http://lib.myilibrary.com?id=477736">http://lib.myilibrary.com?id=477736</a>
OverDrive (PDF) <a href="http://www.contentreserve.com/TitleInfo.asp?ID={02D73229-3728-4EE5-942B-28D4B82AED18}&Format=50">http://www.contentreserve.com/TitleInfo.asp?ID={02D73229-3728-4EE5-942B-28D4B82AED18}&Format=50</a>
OverDrive (EPUB) <a href="http://www.contentreserve.com/TitleInfo.asp?ID={02D73229-3728-4EE5-942B-28D4B82AED18}&Format=410">http://www.contentreserve.com/TitleInfo.asp?ID={02D73229-3728-4EE5-942B-28D4B82AED18}&Format=410</a>
OverDrive (READ) <a href="http://www.contentreserve.com/TitleInfo.asp?ID={02D73229-3728-4EE5-942B-28D4B82AED18}&Format=610">http://www.contentreserve.com/TitleInfo.asp?ID={02D73229-3728-4EE5-942B-28D4B82AED18}&Format=610</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>