Search Results for Security Measures. - Narrowed by: 2010 SirsiDynix Enterprise https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dSecurity$002bMeasures.$0026qf$003dPUBDATE$002509Publication$002bDate$0025092010$0025092010$0026ic$003dtrue$0026ps$003d300?dt=list 2026-01-15T13:02:17Z Maritime security in Southeast Asia ent://SD_ILS/0/SD_ILS:239577 2026-01-15T13:02:17Z 2026-01-15T13:02:17Z Author&#160;Bradford, John F.&#160;National Bureau of Asian Research (U.S.)&#160;Project Muse.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://muse.jhu.edu/books/9781939131133/">Full text available: </a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Border security in the Al-Qaeda era ent://SD_ILS/0/SD_ILS:538571 2026-01-15T13:02:17Z 2026-01-15T13:02:17Z Author&#160;Winterdyk, John.&#160;Sundberg, Kelly W.<br/>Preferred Shelf Number&#160;K3265 .B67 2010 EB<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781420085464">https://www.taylorfrancis.com/books/9781420085464</a> Taylor & Francis <a href="https://www.taylorfrancis.com/books/9780367802899">https://www.taylorfrancis.com/books/9780367802899</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Re-thinking water and food security : fourth Botin Foundation water workshop ent://SD_ILS/0/SD_ILS:539278 2026-01-15T13:02:17Z 2026-01-15T13:02:17Z Author&#160;Marcelino Botin Water Forum (4th : 2009 : Santander, Spain)&#160;Martinez-Cortina, Luis.&#160;Garrido, Alberto, 1964-&#160;Lopez-Gunn, Elena.<br/>Preferred Shelf Number&#160;TD201 .M375 2009<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9780203829820">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> Airport and aviation security : U.S. policy and strategy in the age of global terrorism ent://SD_ILS/0/SD_ILS:539399 2026-01-15T13:02:17Z 2026-01-15T13:02:17Z Author&#160;Elias, Bartholomew., author.<br/>Preferred Shelf Number&#160;TL725.3 .S44 E45 2010<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781420070309">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> Risk analysis and security countermeasure selection ent://SD_ILS/0/SD_ILS:539402 2026-01-15T13:02:17Z 2026-01-15T13:02:17Z Author&#160;Norman, Thomas L., author.<br/>Preferred Shelf Number&#160;HV8290 .N67 2010<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781420078718">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> Vulnerability management ent://SD_ILS/0/SD_ILS:545698 2026-01-15T13:02:17Z 2026-01-15T13:02:17Z Author&#160;Foreman, Park., author.<br/>Preferred Shelf Number&#160;QA76.9 .A25 F656 2010<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781439801512">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> Network Security A Decision and Game-Theoretic Approach ent://SD_ILS/0/SD_ILS:237887 2026-01-15T13:02:17Z 2026-01-15T13:02:17Z Author&#160;Alpcan, Tansu.&#160;Ba&#351;ar, Tamer.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1017/CBO9780511760778">Access by subscription</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Food Crises and the WTO World Trade Forum ent://SD_ILS/0/SD_ILS:238910 2026-01-15T13:02:17Z 2026-01-15T13:02:17Z Author&#160;Karapinar, Baris.&#160;H&auml;berli, Christian.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1017/CBO9780511712005">Access by subscription</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cognitive Radio Networking and Security A Game-Theoretic View ent://SD_ILS/0/SD_ILS:238948 2026-01-15T13:02:17Z 2026-01-15T13:02:17Z Author&#160;Liu, K. J. Ray.&#160;Wang, Beibei.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1017/CBO9780511778773">Access by subscription</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Schools under surveillance cultures of control in public education ent://SD_ILS/0/SD_ILS:245796 2026-01-15T13:02:17Z 2026-01-15T13:02:17Z Author&#160;Torres, Rodolfo D., 1949-&#160;Monahan, Torin.&#160;Project Muse.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://muse.jhu.edu/books/9780813548265/">Full text available: </a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> PCI compliance understand and implement effective PCI data security standard compliance. ent://SD_ILS/0/SD_ILS:148342 2026-01-15T13:02:17Z 2026-01-15T13:02:17Z Author&#160;Chuvakin, Anton.&#160;Williams, Branden R.&#160;Spangenberg, Ward.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597494991">http://www.sciencedirect.com/science/book/9781597494991</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Seven deadliest USB attacks ent://SD_ILS/0/SD_ILS:148953 2026-01-15T13:02:17Z 2026-01-15T13:02:17Z Author&#160;Anderson, Brian (Brian James)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495530">http://www.sciencedirect.com/science/book/9781597495530</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Seven deadliest Unified Communications attacks ent://SD_ILS/0/SD_ILS:148967 2026-01-15T13:02:17Z 2026-01-15T13:02:17Z Author&#160;York, Dan.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495479">http://www.sciencedirect.com/science/book/9781597495479</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Seven deadliest web application attacks ent://SD_ILS/0/SD_ILS:149103 2026-01-15T13:02:17Z 2026-01-15T13:02:17Z Author&#160;Shema, Mike.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495431">http://www.sciencedirect.com/science/book/9781597495431</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Seven deadliest network attacks ent://SD_ILS/0/SD_ILS:149185 2026-01-15T13:02:17Z 2026-01-15T13:02:17Z Author&#160;Prowell, Stacy J.&#160;Kraus, Rob.&#160;Borkin, Mike.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495493">http://www.sciencedirect.com/science/book/9781597495493</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Eleventh hour network+ exam N10-004 study guide ent://SD_ILS/0/SD_ILS:146455 2026-01-15T13:02:17Z 2026-01-15T13:02:17Z Author&#160;Alpern, Naomi J.&#160;Shimonski, Robert.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597494281">http://www.sciencedirect.com/science/book/9781597494281</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Digital forensics for network, Internet, and cloud computing a forensic evidence guide for moving targets and data ent://SD_ILS/0/SD_ILS:146482 2026-01-15T13:02:17Z 2026-01-15T13:02:17Z Author&#160;Lillard, Terrence.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495370">http://www.sciencedirect.com/science/book/9781597495370</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Virtualization and forensics a digital forensic investigator's guide to virtual environments ent://SD_ILS/0/SD_ILS:146715 2026-01-15T13:02:17Z 2026-01-15T13:02:17Z Author&#160;Barrett, Diane.&#160;Kipper, Gregory.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495578">http://www.sciencedirect.com/science/book/9781597495578</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Managed code rootkits hooking into runtime environments ent://SD_ILS/0/SD_ILS:147836 2026-01-15T13:02:17Z 2026-01-15T13:02:17Z Author&#160;Metula, Erez.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495745">http://www.sciencedirect.com/science/book/9781597495745</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> A guide to kernel exploitation attacking the core ent://SD_ILS/0/SD_ILS:148059 2026-01-15T13:02:17Z 2026-01-15T13:02:17Z Author&#160;Perla, Enrico.&#160;Massimiliano, Oldani.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597494861">http://www.sciencedirect.com/science/book/9781597494861</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Seven deadliest wireless technologies attacks ent://SD_ILS/0/SD_ILS:149033 2026-01-15T13:02:17Z 2026-01-15T13:02:17Z Author&#160;Haines, Brad.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495417">http://www.sciencedirect.com/science/book/9781597495417</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Seven deadliest social network attacks ent://SD_ILS/0/SD_ILS:149145 2026-01-15T13:02:17Z 2026-01-15T13:02:17Z Author&#160;Timm, Carl.&#160;Perez, Richard, 1969 Oct. 17-&#160;Ely, Adam.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495455">http://www.sciencedirect.com/science/book/9781597495455</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Hospital and healthcare security ent://SD_ILS/0/SD_ILS:145608 2026-01-15T13:02:17Z 2026-01-15T13:02:17Z Author&#160;Colling, Russell L.&#160;York, Tony W.&#160;Colling, Russell L. Hospital security.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781856176132">http://www.sciencedirect.com/science/book/9781856176132</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Dissecting the hack the forb1dd3n network ent://SD_ILS/0/SD_ILS:146585 2026-01-15T13:02:17Z 2026-01-15T13:02:17Z Author&#160;Street, Jayson E.&#160;Street, Jayson E. Dissecting the hack.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495684">http://www.sciencedirect.com/science/book/9781597495684</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Chaos synchronization and cryptography for secure communications applications for encryption ent://SD_ILS/0/SD_ILS:277940 2026-01-15T13:02:17Z 2026-01-15T13:02:17Z Author&#160;Banerjee, Santo, 1976-&#160;IGI Global.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;EBSCOhost <a href="http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=310459">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=310459</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information technology risk management in enterprise environments a review of industry practices and a practical guide to risk management teams ent://SD_ILS/0/SD_ILS:297862 2026-01-15T13:02:17Z 2026-01-15T13:02:17Z Author&#160;Kouns, Jake.&#160;Minoli, Daniel, 1952-&#160;Wiley InterScience (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;John Wiley <a href="http://dx.doi.org/10.1002/9780470558133">http://dx.doi.org/10.1002/9780470558133</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> WiMAX security and quality of service an end-to-end perspective ent://SD_ILS/0/SD_ILS:298107 2026-01-15T13:02:17Z 2026-01-15T13:02:17Z Author&#160;Tang, Seok-Yee, 1968-&#160;M&uuml;ller, Peter, 1961 July 8-&#160;Sharif, Hamid R. (Hamid Reza), 1958-&#160;Wiley InterScience (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;Ebook Library <a href="http://public.eblib.com/EBLPublic/PublicView.do?ptiID=543017">http://public.eblib.com/EBLPublic/PublicView.do?ptiID=543017</a> John Wiley <a href="http://dx.doi.org/10.1002/9780470665749">http://dx.doi.org/10.1002/9780470665749</a> Books24x7 <a href="http://www.books24x7.com/marc.asp?bookid=36479">http://www.books24x7.com/marc.asp?bookid=36479</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Mac security bible ent://SD_ILS/0/SD_ILS:303881 2026-01-15T13:02:17Z 2026-01-15T13:02:17Z Author&#160;Kissell, Joe.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;Wiley InterScience <a href="http://dx.doi.org/10.1002/9781118257739">An electronic book accessible through the World Wide Web; click for information</a> Safari Books Online <a href="http://proquest.safaribooksonline.com/640">http://proquest.safaribooksonline.com/640</a> <a href="http://proquest.safaribooksonline.com/?fpi=9780470474198">http://proquest.safaribooksonline.com/?fpi=9780470474198</a> Safari Books Online <a href="http://proquest.safaribooksonline.com/9780470474198">http://proquest.safaribooksonline.com/9780470474198</a> Books24x7 <a href="http://www.books24x7.com/marc.asp?bookid=40737">http://www.books24x7.com/marc.asp?bookid=40737</a> <a href="http://site.ebrary.com/lib/alltitles/Doc?id=10358774">http://site.ebrary.com/lib/alltitles/Doc?id=10358774</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> IT audit, control, and security ent://SD_ILS/0/SD_ILS:304008 2026-01-15T13:02:17Z 2026-01-15T13:02:17Z Author&#160;Moeller, Robert R.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;Wiley InterScience <a href="http://dx.doi.org/10.1002/9781118269138">An electronic book accessible through the World Wide Web; click for information</a> Ebook Library <a href="http://public.eblib.com/EBLPublic/PublicView.do?ptiID=624573">http://public.eblib.com/EBLPublic/PublicView.do?ptiID=624573</a> Books24x7 <a href="http://www.books24x7.com/marc.asp?bookid=40717">http://www.books24x7.com/marc.asp?bookid=40717</a> <a href="http://site.ebrary.com/lib/alltitles/Doc?id=10469768">http://site.ebrary.com/lib/alltitles/Doc?id=10469768</a> <a href="http://swb.eblib.com/patron/FullRecord.aspx?p=624573">http://swb.eblib.com/patron/FullRecord.aspx?p=624573</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Seven deadliest USB attacks ent://SD_ILS/0/SD_ILS:306328 2026-01-15T13:02:17Z 2026-01-15T13:02:17Z Author&#160;Anderson, Brian (Brian James)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495530">http://www.sciencedirect.com/science/book/9781597495530</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Virtualization and forensics a digital forensic investigator's guide to virtual environments ent://SD_ILS/0/SD_ILS:306330 2026-01-15T13:02:17Z 2026-01-15T13:02:17Z Author&#160;Barrett, Diane.&#160;Kipper, Gregory.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495578">http://www.sciencedirect.com/science/book/9781597495578</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> One nation under siege Congress, terrorism, and the fate of American democracy ent://SD_ILS/0/SD_ILS:246111 2026-01-15T13:02:17Z 2026-01-15T13:02:17Z Author&#160;Jones Evans, Jocelyn.&#160;Project Muse.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://muse.jhu.edu/books/9780813173825/">Full text available: </a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> China's cyberwarfare capability ent://SD_ILS/0/SD_ILS:281481 2026-01-15T13:02:17Z 2026-01-15T13:02:17Z Author&#160;Marvel, Elisabette M.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;EBSCOhost <a href="http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=581824">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=581824</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security 2020 reduce security risks this decade ent://SD_ILS/0/SD_ILS:303839 2026-01-15T13:02:17Z 2026-01-15T13:02:17Z Author&#160;Howard, Doug.&#160;Prince, Kevin.&#160;Wiley InterScience (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;Wiley InterScience <a href="http://dx.doi.org/10.1002/9781118255803">An electronic book accessible through the World Wide Web; click for information</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> This is not a firedrill crisis intervention and prevention on college campuses ent://SD_ILS/0/SD_ILS:304055 2026-01-15T13:02:17Z 2026-01-15T13:02:17Z Author&#160;Myer, Rick.&#160;James, Richard K., 1942-&#160;Moulton, Patrice.&#160;Wiley InterScience (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;Wiley InterScience <a href="http://dx.doi.org/10.1002/9781118269909">An electronic book accessible through the World Wide Web; click for information</a> Ebook Library <a href="http://public.eblib.com/EBLPublic/PublicView.do?ptiID=706613">http://public.eblib.com/EBLPublic/PublicView.do?ptiID=706613</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Working positively with personality disorder in secure settings a practitioner's perspective ent://SD_ILS/0/SD_ILS:318962 2026-01-15T13:02:17Z 2026-01-15T13:02:17Z Author&#160;Willmot, Phil.&#160;Gordon, Neil, 1959-<br/>Preferred Shelf Number&#160;ONLINE(318962.1)<br/>Electronic Access&#160;Wiley InterScience <a href="http://dx.doi.org/10.1002/9780470973110">An electronic book accessible through the World Wide Web; click for information</a> Ebook Library <a href="http://public.eblib.com/choice/publicfullrecord.aspx?p=624713">http://public.eblib.com/choice/publicfullrecord.aspx?p=624713</a> ebrary <a href="http://site.ebrary.com/id/10441456">http://site.ebrary.com/id/10441456</a> EBSCOhost <a href="http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=345825">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=345825</a> Wiley InterScience - Full Text Online <a href="http://www.library.uiuc.edu/proxy/go.php?url=http://onlinelibrary.wiley.com/book/10.1002/9780470973110">http://www.library.uiuc.edu/proxy/go.php?url=http://onlinelibrary.wiley.com/book/10.1002/9780470973110</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information security risk analysis ent://SD_ILS/0/SD_ILS:538713 2026-01-15T13:02:17Z 2026-01-15T13:02:17Z Author&#160;Peltier, Thomas R., author.<br/>Preferred Shelf Number&#160;QA76.9 .A25 P429 2010<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781439839577">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> Cryptanalysis of RSA and its variants ent://SD_ILS/0/SD_ILS:542078 2026-01-15T13:02:17Z 2026-01-15T13:02:17Z Author&#160;Hinek, M. Jason., author.<br/>Preferred Shelf Number&#160;TK5102.94 .H56 2010<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781420075199">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> Handbook of financial cryptography and security ent://SD_ILS/0/SD_ILS:542098 2026-01-15T13:02:17Z 2026-01-15T13:02:17Z Author&#160;Rosenberg, Burton.<br/>Preferred Shelf Number&#160;HG1710 .H34 2010<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781420059823">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> Security of mobile communications ent://SD_ILS/0/SD_ILS:544848 2026-01-15T13:02:17Z 2026-01-15T13:02:17Z Author&#160;Boudriga, Noureddine, author.<br/>Preferred Shelf Number&#160;TK5102.85 .B68 2010<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9780849379420">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> Handbook of modern hospital safety ent://SD_ILS/0/SD_ILS:546683 2026-01-15T13:02:17Z 2026-01-15T13:02:17Z Author&#160;Charney, William, 1947-<br/>Preferred Shelf Number&#160;RA969.95 .H37 2010<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781420047868">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> The executive MBA in information security ent://SD_ILS/0/SD_ILS:539948 2026-01-15T13:02:17Z 2026-01-15T13:02:17Z Author&#160;Trinckes, John J., author.<br/>Preferred Shelf Number&#160;HF5548.37 .T75 2010<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781439810088">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> Managing security overseas : protecting employees and assets in volatile regions ent://SD_ILS/0/SD_ILS:544939 2026-01-15T13:02:17Z 2026-01-15T13:02:17Z Author&#160;Ast, Scott Alan., author.<br/>Preferred Shelf Number&#160;HD2785 .A88 2010<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781439804681">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/>