Search Results for Security Systems. - Narrowed by: 2010 SirsiDynix Enterprise https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dSecurity$002bSystems.$0026qf$003dPUBDATE$002509Publication$002bDate$0025092010$0025092010$0026ic$003dtrue$0026ps$003d300$0026isd$003dtrue? 2024-11-15T04:11:06Z Stabilization, Safety, and Security of Distributed Systems 12th International Symposium, SSS 2010, New York, NY, USA, September 20-22, 2010. Proceedings ent://SD_ILS/0/SD_ILS:193160 2024-11-15T04:11:06Z 2024-11-15T04:11:06Z Author&#160;Dolev, Shlomi. editor.&#160;Cobb, Jorge. editor.&#160;Fischer, Michael. editor.&#160;Yung, Moti. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-16023-3">http://dx.doi.org/10.1007/978-3-642-16023-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security Theory and Practices. Security and Privacy of Pervasive Systems and Smart Devices 4th IFIP WG 11.2 International Workshop, WISTP 2010, Passau, Germany, April 12-14, 2010. Proceedings ent://SD_ILS/0/SD_ILS:191973 2024-11-15T04:11:06Z 2024-11-15T04:11:06Z Author&#160;Samarati, Pierangela. editor.&#160;Tunstall, Michael. editor.&#160;Posegga, Joachim. editor.&#160;Markantonakis, Konstantinos. editor.&#160;Sauveron, Damien. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-12368-9">http://dx.doi.org/10.1007/978-3-642-12368-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security in Emerging Wireless Communication and Networking Systems First International ICST Workshop, SEWCN 2009, Athens, Greece, September 14, 2009, Revised Selected Papers ent://SD_ILS/0/SD_ILS:191712 2024-11-15T04:11:06Z 2024-11-15T04:11:06Z Author&#160;Gu, Qijun. editor.&#160;Zang, Wanyu. editor.&#160;Yu, Meng. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-11526-4">http://dx.doi.org/10.1007/978-3-642-11526-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Water productivity in rainfed agriculture redrawing the rainbow of water to achieve food security in rainfed smallholder systems ent://SD_ILS/0/SD_ILS:290055 2024-11-15T04:11:06Z 2024-11-15T04:11:06Z Author&#160;Makurira, Hodson.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9780203093429">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computational Intelligence in Security for Information Systems 2010 Proceedings of the 3rd International Conference on Computational Intelligence in Security for Information Systems (CISIS&rsquo;10) ent://SD_ILS/0/SD_ILS:193359 2024-11-15T04:11:06Z 2024-11-15T04:11:06Z Author&#160;Herrero, &Aacute;lvaro. editor.&#160;Corchado, Emilio. editor.&#160;Redondo, Carlos. editor.&#160;Alonso, &Aacute;ngel. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-16626-6">http://dx.doi.org/10.1007/978-3-642-16626-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security and Privacy in Mobile Information and Communication Systems Second International ICST Conference, MobiSec 2010, Catania, Sicily, Italy, May 27-28, 2010, Revised Selected Papers ent://SD_ILS/0/SD_ILS:193620 2024-11-15T04:11:06Z 2024-11-15T04:11:06Z Author&#160;Schmidt, Andreas U. editor.&#160;Russello, Giovanni. editor.&#160;Lioy, Antonio. editor.&#160;Prasad, Neeli R. editor.&#160;Lian, Shiguo. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-17502-2">http://dx.doi.org/10.1007/978-3-642-17502-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Managed code rootkits hooking into runtime environments ent://SD_ILS/0/SD_ILS:147836 2024-11-15T04:11:06Z 2024-11-15T04:11:06Z Author&#160;Metula, Erez.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495745">http://www.sciencedirect.com/science/book/9781597495745</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> A guide to kernel exploitation attacking the core ent://SD_ILS/0/SD_ILS:148059 2024-11-15T04:11:06Z 2024-11-15T04:11:06Z Author&#160;Perla, Enrico.&#160;Massimiliano, Oldani.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597494861">http://www.sciencedirect.com/science/book/9781597494861</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> The handbook of technology management ent://SD_ILS/0/SD_ILS:134517 2024-11-15T04:11:06Z 2024-11-15T04:11:06Z Author&#160;Bidgoli, Hossein.<br/>Preferred Shelf Number&#160;HD45 .H294 2010 V.1<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~3<br/> Metrics and methods for security risk management ent://SD_ILS/0/SD_ILS:146306 2024-11-15T04:11:06Z 2024-11-15T04:11:06Z Author&#160;Young, Carl S.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781856179782">http://www.sciencedirect.com/science/book/9781856179782</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Seven deadliest wireless technologies attacks ent://SD_ILS/0/SD_ILS:149033 2024-11-15T04:11:06Z 2024-11-15T04:11:06Z Author&#160;Haines, Brad.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495417">http://www.sciencedirect.com/science/book/9781597495417</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Virtualization and forensics a digital forensic investigator's guide to virtual environments ent://SD_ILS/0/SD_ILS:146715 2024-11-15T04:11:06Z 2024-11-15T04:11:06Z Author&#160;Barrett, Diane.&#160;Kipper, Gregory.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495578">http://www.sciencedirect.com/science/book/9781597495578</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security, risk and the biometric state governing borders and bodies ent://SD_ILS/0/SD_ILS:266690 2024-11-15T04:11:06Z 2024-11-15T04:11:06Z Author&#160;M&uuml;ller, Benjamin.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://www.tandfebooks.com/isbn/9780203858042">Click here to view</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Science and technology of terrorism and counterterrorism ent://SD_ILS/0/SD_ILS:286279 2024-11-15T04:11:06Z 2024-11-15T04:11:06Z Author&#160;Ghosh, Tushar K., Dr.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781439875612">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Risk analysis and security countermeasure selection ent://SD_ILS/0/SD_ILS:288785 2024-11-15T04:11:06Z 2024-11-15T04:11:06Z Author&#160;Norman, Thomas L.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781420078718">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security of mobile communications ent://SD_ILS/0/SD_ILS:286605 2024-11-15T04:11:06Z 2024-11-15T04:11:06Z Author&#160;Boudriga, Noureddine.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9780849379420">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Food security and soil quality ent://SD_ILS/0/SD_ILS:286944 2024-11-15T04:11:06Z 2024-11-15T04:11:06Z Author&#160;Lal, R.&#160;Stewart, B. A. (Bobby Alton), 1932-<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781439800584">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Virtualization and forensics a digital forensic investigator's guide to virtual environments ent://SD_ILS/0/SD_ILS:306330 2024-11-15T04:11:06Z 2024-11-15T04:11:06Z Author&#160;Barrett, Diane.&#160;Kipper, Gregory.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495578">http://www.sciencedirect.com/science/book/9781597495578</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/>