Search Results for Security Measures. - Narrowed by: 2012SirsiDynix Enterprisehttps://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dSecurity$002bMeasures.$0026qf$003dPUBDATE$002509Publication$002bDate$0025092012$0025092012$0026te$003dILS$0026ps$003d300?2024-11-03T00:32:04ZMaritime security in Southeast Asiaent://SD_ILS/0/SD_ILS:2395772024-11-03T00:32:04Z2024-11-03T00:32:04ZAuthor Bradford, John F. National Bureau of Asian Research (U.S.) Project Muse.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://muse.jhu.edu/books/9781939131133/">Full text available: </a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Wiki at war conflict in a socially networked worldent://SD_ILS/0/SD_ILS:2418372024-11-03T00:32:04Z2024-11-03T00:32:04ZAuthor Carafano, James Jay, 1955- Project Muse.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://muse.jhu.edu/books/9781603446570/">Full text available: </a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Maritime private security market responses to piracy, terrorism and waterborne security risks in the 21st centuryent://SD_ILS/0/SD_ILS:2607192024-11-03T00:32:04Z2024-11-03T00:32:04ZAuthor Berube, Claude G., 1966- Cullen, Patrick, 1974-<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://www.tandfebooks.com/isbn/9780203126608">Click here to view</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Competition and efficiency in international food supply chains improving food securityent://SD_ILS/0/SD_ILS:2608102024-11-03T00:32:04Z2024-11-03T00:32:04ZAuthor Williams, John, 1949-<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://www.tandfebooks.com/isbn/9780203122365">Click here to view</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Maritime piracyent://SD_ILS/0/SD_ILS:2609022024-11-03T00:32:04Z2024-11-03T00:32:04ZAuthor Haywood, Robert. Spivak, Roberta.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://www.tandfebooks.com/isbn/9780203144817">Click here to view</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>The early years health and safety handbookent://SD_ILS/0/SD_ILS:2622762024-11-03T00:32:04Z2024-11-03T00:32:04ZAuthor Parker, Lynn.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://www.tandfebooks.com/isbn/9780203809662">Click here to view</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Justice and security in the 21st century risks, rights and the rule of lawent://SD_ILS/0/SD_ILS:2597352024-11-03T00:32:04Z2024-11-03T00:32:04ZAuthor Ugelvik, Synnøve, 1978- Hudson, Barbara, 1945-<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://www.tandfebooks.com/isbn/9780203125588">Click here to view</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Ending campus violence new approaches to preventionent://SD_ILS/0/SD_ILS:2599552024-11-03T00:32:04Z2024-11-03T00:32:04ZAuthor Van Brunt, Brian.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://www.tandfebooks.com/isbn/9780203149560">Click here to view</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Advanced persistent threat understanding the danger and how to protect your organizationent://SD_ILS/0/SD_ILS:1460562024-11-03T00:32:04Z2024-11-03T00:32:04ZAuthor Cole, Eric.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597499491">http://www.sciencedirect.com/science/book/9781597499491</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Hacking web apps detecting and preventing web application security problemsent://SD_ILS/0/SD_ILS:1481612024-11-03T00:32:04Z2024-11-03T00:32:04ZAuthor Shema, Mike.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597499514">http://www.sciencedirect.com/science/book/9781597499514</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Handbook of loss prevention and crime preventionent://SD_ILS/0/SD_ILS:1481752024-11-03T00:32:04Z2024-11-03T00:32:04ZAuthor Fennelly, Lawrence J., 1940-<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780123852465">http://www.sciencedirect.com/science/book/9780123852465</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>CISSP study guideent://SD_ILS/0/SD_ILS:1487692024-11-03T00:32:04Z2024-11-03T00:32:04ZAuthor Conrad, Eric, 1967- Misenar, Seth. Feldman, Joshua.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597499613">http://www.sciencedirect.com/science/book/9781597499613</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Risk analysis and the security surveyent://SD_ILS/0/SD_ILS:1490622024-11-03T00:32:04Z2024-11-03T00:32:04ZAuthor Broder, James F. Tucker, Eugene.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780123822338">http://www.sciencedirect.com/science/book/9780123822338</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Information security risk assessment toolkit practical assessments through data collection and data analysisent://SD_ILS/0/SD_ILS:1454702024-11-03T00:32:04Z2024-11-03T00:32:04ZAuthor Talabis, Mark. Martin, Jason.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597497350">http://www.sciencedirect.com/science/book/9781597497350</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Handbook on securing cyber-physical critical infrastructureent://SD_ILS/0/SD_ILS:1455792024-11-03T00:32:04Z2024-11-03T00:32:04ZAuthor Das, Sajal K. Kant, Krishna. Zhang, Nan, 1982-<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780124158153">http://www.sciencedirect.com/science/book/9780124158153</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Windows forensic analysis toolkit advanced analysis techniques for Windows 7ent://SD_ILS/0/SD_ILS:1456892024-11-03T00:32:04Z2024-11-03T00:32:04ZAuthor Carvey, Harlan A. Kolde, Jennifer.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597497275">http://www.sciencedirect.com/science/book/9781597497275</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Network intrusion analysis methodologies, tools, and techniques for incident analysis and responseent://SD_ILS/0/SD_ILS:1462742024-11-03T00:32:04Z2024-11-03T00:32:04ZAuthor Fichera, Joe, 1966- Bolt, Steven.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597499620">http://www.sciencedirect.com/science/book/9781597499620</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>The hacker's guide to OS X exploiting OS X from the root upent://SD_ILS/0/SD_ILS:1480062024-11-03T00:32:04Z2024-11-03T00:32:04ZAuthor Bathurst, Robert. Rogers, Russ. Ghassemlouei, Alijohn.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597499507">http://www.sciencedirect.com/science/book/9781597499507</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>The basics of cyber warfare understanding the fundamentals of cyber warfare in theory and practiceent://SD_ILS/0/SD_ILS:1452542024-11-03T00:32:04Z2024-11-03T00:32:04ZAuthor Winterfeld, Steve. Andress, Jason.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780124047372">http://www.sciencedirect.com/science/book/9780124047372</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>PCI compliance understand and implement effective PCI data security standard complianceent://SD_ILS/0/SD_ILS:1484292024-11-03T00:32:04Z2024-11-03T00:32:04ZAuthor Chuvakin, Anton. Williams, Branden R.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597499484">http://www.sciencedirect.com/science/book/9781597499484</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>SQL injection attacks and defenseent://SD_ILS/0/SD_ILS:1485162024-11-03T00:32:04Z2024-11-03T00:32:04ZAuthor Clarke, Justin.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597499637">http://www.sciencedirect.com/science/book/9781597499637</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Client-side attacks and defenseent://SD_ILS/0/SD_ILS:1487312024-11-03T00:32:04Z2024-11-03T00:32:04ZAuthor Oriyano, Sean-Philip. Shimonski, Robert.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495905">http://www.sciencedirect.com/science/book/9781597495905</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Managing the insider threat no dark cornersent://SD_ILS/0/SD_ILS:2908132024-11-03T00:32:04Z2024-11-03T00:32:04ZAuthor Catrantzos, Nick.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781439872932">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Operating systems demystifiedent://SD_ILS/0/SD_ILS:2941012024-11-03T00:32:04Z2024-11-03T00:32:04ZAuthor McHoes, Ann McIver, 1950- Ballew, Joli.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://mhebooklibrary.com/reader/operating-systems-demystified">Subscription required</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Photonic sensing principles and applications for safety and security monitoringent://SD_ILS/0/SD_ILS:2993652024-11-03T00:32:04Z2024-11-03T00:32:04ZAuthor Xiao, George. Bock, Wojtek J.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://proquest.safaribooksonline.com/?fpi=9781118310205">Available by subscription from Safari Books Online</a>
John Wiley <a href="http://dx.doi.org/10.1002/9781118310212">http://dx.doi.org/10.1002/9781118310212</a>
ebrary <a href="http://site.ebrary.com/id/10602117">http://site.ebrary.com/id/10602117</a>
Ebook Library <a href="http://public.eblib.com/EBLPublic/PublicView.do?ptiID=848527">http://public.eblib.com/EBLPublic/PublicView.do?ptiID=848527</a>
Volltext <a href="http://proquest.tech.safaribooksonline.de/9781118310205">http://proquest.tech.safaribooksonline.de/9781118310205</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Security aspects of uni-and multimodal hazmat transportation systemsent://SD_ILS/0/SD_ILS:3062652024-11-03T00:32:04Z2024-11-03T00:32:04ZAuthor Reniers, Genserik L. L. Zamparini, Luca.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access Wiley Online Library <a href="http://onlinelibrary.wiley.com/book/10.1002/9783527664818">http://onlinelibrary.wiley.com/book/10.1002/9783527664818</a>
Wiley InterScience <a href="http://dx.doi.org/10.1002/9783527664818">http://dx.doi.org/10.1002/9783527664818</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Multilaterally secure pervasive cooperation privacy protection, accountability and secure communication for the age of pervasive computingent://SD_ILS/0/SD_ILS:2795142024-11-03T00:32:04Z2024-11-03T00:32:04ZAuthor Weber, Stefan G. IOS Press.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access EBSCOhost <a href="http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=529563">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=529563</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>RFID in libraries a step toward interoperabilityent://SD_ILS/0/SD_ILS:2810692024-11-03T00:32:04Z2024-11-03T00:32:04ZAuthor Ayre, Lori Bowen.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access EBSCOhost <a href="http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=563865">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=563865</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Data mining tools for malware detectionent://SD_ILS/0/SD_ILS:2871022024-11-03T00:32:04Z2024-11-03T00:32:04ZAuthor Masud, Mehedy. Khan, Latifur. Thuraisingham, Bhavani M.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781439854556">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Smart grid security an end-to-end view of security in the new electrical grident://SD_ILS/0/SD_ILS:2880302024-11-03T00:32:04Z2024-11-03T00:32:04ZAuthor Sorebo, Gilbert. Echols, Michael.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781439855898">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Motor fleet safety and security managementent://SD_ILS/0/SD_ILS:2900222024-11-03T00:32:04Z2024-11-03T00:32:04ZAuthor Della-Giustina, Daniel.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781439895085">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Ports in a storm : public management in a turbulent worldent://SD_ILS/0/SD_ILS:3764012024-11-03T00:32:04Z2024-11-03T00:32:04ZAuthor Donahue, John D. Moore, Mark H., 1947-<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://www.jstor.org/stable/10.7864/j.ctt12636r">http://www.jstor.org/stable/10.7864/j.ctt12636r</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Against security : how we go wrong at airports, subways, and other sites of ambiguous dangerent://SD_ILS/0/SD_ILS:3767132024-11-03T00:32:04Z2024-11-03T00:32:04ZAuthor Molotch, Harvey Luskin, author.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://www.jstor.org/stable/10.2307/j.cttq94nr">http://www.jstor.org/stable/10.2307/j.cttq94nr</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>How Ottawa spends, 2012-2013 : the Harper majority, budget cuts, and the new oppositionent://SD_ILS/0/SD_ILS:3769632024-11-03T00:32:04Z2024-11-03T00:32:04ZAuthor Doern, G. Bruce. Stoney, Christopher.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://www.jstor.org/stable/10.2307/j.ctt1pq1f8">http://www.jstor.org/stable/10.2307/j.ctt1pq1f8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Wiki at war conflict in a socially networked worldent://SD_ILS/0/SD_ILS:2767002024-11-03T00:32:04Z2024-11-03T00:32:04ZAuthor Carafano, James Jay, 1955- Project Muse.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://muse.jhu.edu/books/9781603446587/">Full text available: </a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>RC4 stream cipher and its variantsent://SD_ILS/0/SD_ILS:2852492024-11-03T00:32:04Z2024-11-03T00:32:04ZAuthor Paul, Goutam. Maitra, Subhamoy, 1970-<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781439831373">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Network and application security fundamentals and practicesent://SD_ILS/0/SD_ILS:2889932024-11-03T00:32:04Z2024-11-03T00:32:04ZAuthor Ganguly, Debashis. Lahiri, Shibamouli.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781466502451">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Information security governance simplified from the boardroom to the keyboardent://SD_ILS/0/SD_ILS:2906622024-11-03T00:32:04Z2024-11-03T00:32:04ZAuthor Fitzgerald, Todd.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781439811658">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Wireless network security a beginner's guideent://SD_ILS/0/SD_ILS:2932302024-11-03T00:32:04Z2024-11-03T00:32:04ZAuthor Wrightson, Tyler.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://mhebooklibrary.com/reader/wireless-network-security-beginners-guide">Subscription required</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Security metrics a beginner's guideent://SD_ILS/0/SD_ILS:2932382024-11-03T00:32:04Z2024-11-03T00:32:04ZAuthor Wong, Caroline.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://mhebooklibrary.com/reader/security-metrics-beginners-guide">Subscription required</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Securing the clicks network security in the age of social mediaent://SD_ILS/0/SD_ILS:2932402024-11-03T00:32:04Z2024-11-03T00:32:04ZAuthor Bahadur, Gary. Inasi, Jason. Carvalho, Alex de. Powell, Juliette, 1976- Valencia, Connie.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://mhebooklibrary.com/reader/securing-clicks-network-security-in-age-social-media">Subscription required</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Web application security a beginner's guideent://SD_ILS/0/SD_ILS:2932412024-11-03T00:32:04Z2024-11-03T00:32:04ZAuthor Sullivan, Bryan, 1974- Liu, Vincent.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://mhebooklibrary.com/reader/web-application-security-beginners-guide">Subscription required</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Oracle WebLogic server 11g administration handbookent://SD_ILS/0/SD_ILS:2932432024-11-03T00:32:04Z2024-11-03T00:32:04ZAuthor Alapati, Sam R.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://mhebooklibrary.com/reader/oracle-weblogic-server-11g-administration-handbook">Subscription required</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>iPhone geekery 50 insanely cool hacks and mods for your iPhone 4Sent://SD_ILS/0/SD_ILS:2934462024-11-03T00:32:04Z2024-11-03T00:32:04ZAuthor Hart-Davis, Guy.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://mhebooklibrary.com/reader/iphone-geekery-50-insanely-cool-hacks-mods-for-your-4s">Subscription required</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Robust control system networks how to achieve reliable control after Stuxnetent://SD_ILS/0/SD_ILS:2801812024-11-03T00:32:04Z2024-11-03T00:32:04ZAuthor Langner, Ralph.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access EBSCOhost <a href="http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=501116">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=501116</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Cybersecurity public sector threats and responsesent://SD_ILS/0/SD_ILS:2862022024-11-03T00:32:04Z2024-11-03T00:32:04ZAuthor Andreasson, Kim J.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781439846643">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>CISO's guide to penetration testing a framework to plan, manage, and maximize benefitsent://SD_ILS/0/SD_ILS:2871052024-11-03T00:32:04Z2024-11-03T00:32:04ZAuthor Tiller, James S.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781439880289">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Defense against the black arts how hackers do what they do and how to protect against itent://SD_ILS/0/SD_ILS:2915812024-11-03T00:32:04Z2024-11-03T00:32:04ZAuthor Varsalone, Jesse. McFadden, Matthew. Morrissey, Sean.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781439821220">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Visual cryptography and secret image sharingent://SD_ILS/0/SD_ILS:2915822024-11-03T00:32:04Z2024-11-03T00:32:04ZAuthor Cimato, Stelvio. Yang, Ching-Nung.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781439837221">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>The healthy PC preventive care, home remedies, and green computingent://SD_ILS/0/SD_ILS:2934642024-11-03T00:32:04Z2024-11-03T00:32:04ZAuthor Hart-Davis, Guy. Holzman, Carey. Healthy PC.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://mhebooklibrary.com/reader/healthy-pc-preventive-care-home-remedies-green-computing-2nd-edition">Subscription required</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Hacking exposed 7 : network security secrets & solutionsent://SD_ILS/0/SD_ILS:2700332024-11-03T00:32:04Z2024-11-03T00:32:04ZAuthor McClure, Stuart. Scambray, Joel. Kurtz, George.<br/>Preferred Shelf Number TK5105.59 M48 2012<br/>Format: Books<br/>Availability Beytepe Library~1<br/>Handbook of loss prevention and crime preventionent://SD_ILS/0/SD_ILS:2700432024-11-03T00:32:04Z2024-11-03T00:32:04ZAuthor Fennelly, Lawrence J., 1940-<br/>Preferred Shelf Number HV8290 H345 2012<br/>Format: Books<br/>Availability Beytepe Library~1<br/>The death of the Internetent://SD_ILS/0/SD_ILS:2704362024-11-03T00:32:04Z2024-11-03T00:32:04ZAuthor Jakobsson, Markus.<br/>Preferred Shelf Number TK5105.875.I57 D43 2012<br/>Format: Books<br/>Availability Beytepe Library~1<br/>Asset protection through security awarenessent://SD_ILS/0/SD_ILS:2861362024-11-03T00:32:04Z2024-11-03T00:32:04ZAuthor Speed, Tyler Justin.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781439809839">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Cybersecurity for industrial control systems SCADA, DCS, PLC, HMI, and SISent://SD_ILS/0/SD_ILS:2861402024-11-03T00:32:04Z2024-11-03T00:32:04ZAuthor Macaulay, Tyson. Singer, Bryan.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781439801987">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>