Search Results for Security Systems. - Narrowed by: 2009 SirsiDynix Enterprise https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dSecurity$002bSystems.$0026qf$003dPUBDATE$002509Publication$002bDate$0025092009$0025092009$0026ps$003d300?dt=list 2024-11-19T14:41:10Z Open Source Systems Security Certification ent://SD_ILS/0/SD_ILS:167460 2024-11-19T14:41:10Z 2024-11-19T14:41:10Z Author&#160;Damiani, Ernesto. author.&#160;Ardagna, Claudio Agostino. author.&#160;El Ioini, Nabil. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-0-387-77324-7">http://dx.doi.org/10.1007/978-0-387-77324-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Mobile communication systems and security ent://SD_ILS/0/SD_ILS:249807 2024-11-19T14:41:10Z 2024-11-19T14:41:10Z Author&#160;Rhee, Man Young.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;IEEE Xplore <a href="http://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=5628362">http://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=5628362</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security Theory and Practice. Smart Devices, Pervasive Systems, and Ubiquitous Networks Third IFIP WG 11.2 International Workshop, WISTP 2009, Brussels, Belgium, September 1-4, 2009, Proceedings ent://SD_ILS/0/SD_ILS:190785 2024-11-19T14:41:10Z 2024-11-19T14:41:10Z Author&#160;Markowitch, Olivier. editor.&#160;Bilas, Angelos. editor.&#160;Hoepman, Jaap-Henk. editor.&#160;Mitchell, Chris J. editor.&#160;Quisquater, Jean-Jacques. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-03944-7">http://dx.doi.org/10.1007/978-3-642-03944-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Proceedings of the International Workshop on Computational Intelligence in Security for Information Systems CISIS&rsquo;08 ent://SD_ILS/0/SD_ILS:189000 2024-11-19T14:41:10Z 2024-11-19T14:41:10Z Author&#160;Corchado, Emilio. editor.&#160;Zunino, Rodolfo. editor.&#160;Gastaldo, Paolo. editor.&#160;Herrero, &Aacute;lvaro. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-88181-0">http://dx.doi.org/10.1007/978-3-540-88181-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security and Privacy in Mobile Information and Communication Systems First International ICST Conference, MobiSec 2009, Turin, Italy, June 3-5, 2009, Revised Selected Papers ent://SD_ILS/0/SD_ILS:190947 2024-11-19T14:41:10Z 2024-11-19T14:41:10Z Author&#160;Schmidt, Andreas U. editor.&#160;Lian, Shiguo. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-04434-2">http://dx.doi.org/10.1007/978-3-642-04434-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Systems Security 5th International Conference, ICISS 2009 Kolkata, India, December 14-18, 2009 Proceedings ent://SD_ILS/0/SD_ILS:191472 2024-11-19T14:41:10Z 2024-11-19T14:41:10Z Author&#160;Prakash, Atul. editor.&#160;Sen Gupta, Indranil. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-10772-6">http://dx.doi.org/10.1007/978-3-642-10772-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security in Computing Systems Challenges, Approaches and Solutions ent://SD_ILS/0/SD_ILS:188131 2024-11-19T14:41:10Z 2024-11-19T14:41:10Z Author&#160;Biskup, Joachim. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-78442-5">http://dx.doi.org/10.1007/978-3-540-78442-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Safety and Security in Multiagent Systems Research Results from 2004-2006 ent://SD_ILS/0/SD_ILS:191086 2024-11-19T14:41:10Z 2024-11-19T14:41:10Z Author&#160;Barley, Mike. editor.&#160;Mouratidis, Haralambos. editor.&#160;Unruh, Amy. editor.&#160;Spears, Diana. editor.&#160;Scerri, Paul. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-04879-1">http://dx.doi.org/10.1007/978-3-642-04879-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computational Intelligence in Security for Information Systems CISIS&rsquo;09, 2nd International Workshop Burgos, Spain, September 2009 Proceedings ent://SD_ILS/0/SD_ILS:190834 2024-11-19T14:41:10Z 2024-11-19T14:41:10Z Author&#160;Herrero, &Aacute;lvaro. editor.&#160;Gastaldo, Paolo. editor.&#160;Zunino, Rodolfo. editor.&#160;Corchado, Emilio. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-04091-7">http://dx.doi.org/10.1007/978-3-642-04091-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Stabilization, Safety, and Security of Distributed Systems 11th International Symposium, SSS 2009, Lyon, France, November 3-6, 2009. Proceedings ent://SD_ILS/0/SD_ILS:191165 2024-11-19T14:41:10Z 2024-11-19T14:41:10Z Author&#160;Guerraoui, Rachid. editor.&#160;Petit, Franck. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-05118-0">http://dx.doi.org/10.1007/978-3-642-05118-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security Engineering for Vehicular IT Systems Improving the Trustworthiness and Dependability of Automotive IT Applications ent://SD_ILS/0/SD_ILS:199691 2024-11-19T14:41:10Z 2024-11-19T14:41:10Z Author&#160;Wolf, Marko. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-8348-9581-3">http://dx.doi.org/10.1007/978-3-8348-9581-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Mobile malware attacks and defense ent://SD_ILS/0/SD_ILS:146413 2024-11-19T14:41:10Z 2024-11-19T14:41:10Z Author&#160;Dunham, Ken.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492980">http://www.sciencedirect.com/science/book/9781597492980</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security ent://SD_ILS/0/SD_ILS:264993 2024-11-19T14:41:10Z 2024-11-19T14:41:10Z Author&#160;Zedner, Lucia.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://www.tandfebooks.com/isbn/9780203871133">Click here to view</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security in RFID and sensor networks ent://SD_ILS/0/SD_ILS:287797 2024-11-19T14:41:10Z 2024-11-19T14:41:10Z Author&#160;Kitsos, Paris.&#160;Zhang, Yan, 1977-<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781420068405">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> How to develop and implement a security master plan ent://SD_ILS/0/SD_ILS:287876 2024-11-19T14:41:10Z 2024-11-19T14:41:10Z Author&#160;Giles, Timothy.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781420086263">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security in an IPv6 environment ent://SD_ILS/0/SD_ILS:291504 2024-11-19T14:41:10Z 2024-11-19T14:41:10Z Author&#160;Minoli, Daniel, 1952-&#160;Kouns, Jake.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781420092301">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Marine navigation and safety of sea transportation ent://SD_ILS/0/SD_ILS:290184 2024-11-19T14:41:10Z 2024-11-19T14:41:10Z Author&#160;International Navigational Symposium on Marine Navigation and Safety of Sea Transportation (8th : 2009 : Gdynia, Poland)&#160;Weintrit, Adam.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9780203869345">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Wireless and mobile network security security basics, security in On-the-shelf and emergeing technologies ent://SD_ILS/0/SD_ILS:297992 2024-11-19T14:41:10Z 2024-11-19T14:41:10Z Author&#160;Chaouchi, Hakima.&#160;Laurent-Maknavicius, Maryline.&#160;Wiley InterScience (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;John Wiley <a href="http://dx.doi.org/10.1002/9780470611883">http://dx.doi.org/10.1002/9780470611883</a> <a href="http://site.ebrary.com/lib/alltitles/Doc?id=10361067">http://site.ebrary.com/lib/alltitles/Doc?id=10361067</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/>