Search Results for Security Systems. - Narrowed by: 2014 SirsiDynix Enterprise https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dSecurity$002bSystems.$0026qf$003dPUBDATE$002509Publication$002bDate$0025092014$0025092014$0026ps$003d300?dt=list 2024-11-19T14:53:19Z Security for Cloud Storage Systems ent://SD_ILS/0/SD_ILS:487858 2024-11-19T14:53:19Z 2024-11-19T14:53:19Z Author&#160;Yang, Kan. author.&#160;Jia, Xiaohua. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-1-4614-7873-7">https://doi.org/10.1007/978-1-4614-7873-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security, Privacy and Trust in Cloud Systems ent://SD_ILS/0/SD_ILS:487946 2024-11-19T14:53:19Z 2024-11-19T14:53:19Z Author&#160;Nepal, Surya. editor.&#160;Pathan, Mukaddim. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-642-38586-5">https://doi.org/10.1007/978-3-642-38586-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Industrial network security : securing critical infrastructure networks for Smart Grid, SCADA , and other industrial control systems ent://SD_ILS/0/SD_ILS:355352 2024-11-19T14:53:19Z 2024-11-19T14:53:19Z Author&#160;Knapp, Eric D.&#160;Langill, Joel Thomas.<br/>Preferred Shelf Number&#160;ONLINE(355352.1)<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780124201149">http://www.sciencedirect.com/science/book/9780124201149</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Integrated Security Systems Design A Complete Reference for Building Enterprise-Wide Digital Security Systems ent://SD_ILS/0/SD_ILS:355561 2024-11-19T14:53:19Z 2024-11-19T14:53:19Z Author&#160;Norman, Thomas L.<br/>Preferred Shelf Number&#160;ONLINE(355561.1)<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128000229">http://www.sciencedirect.com/science/book/9780128000229</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Stabilization, Safety, and Security of Distributed Systems 16th International Symposium, SSS 2014, Paderborn, Germany, September 28 -- October 1, 2014. Proceedings ent://SD_ILS/0/SD_ILS:485732 2024-11-19T14:53:19Z 2024-11-19T14:53:19Z Author&#160;Felber, Pascal. editor.&#160;Garg, Vijay. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-11764-5">https://doi.org/10.1007/978-3-319-11764-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cryptography and Security Systems Third International Conference, CSS 2014, Lublin, Poland, September 22-24, 2014. Proceedings ent://SD_ILS/0/SD_ILS:488136 2024-11-19T14:53:19Z 2024-11-19T14:53:19Z Author&#160;Kotulski, Zbigniew. editor.&#160;Ksiezopolski, Bogdan. editor.&#160;Mazur, Katarzyna. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-662-44893-9">https://doi.org/10.1007/978-3-662-44893-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Availability, Reliability, and Security in Information Systems IFIP WG 8.4, 8.9, TC 5 International Cross-Domain Conference, CD-ARES 2014 and 4th InternationalWorkshop on Security and Cognitive Informatics for Homeland Defense, SeCIHD 2014, Fribourg, Switzerland, September 8-12, 2014. Proceedings ent://SD_ILS/0/SD_ILS:489055 2024-11-19T14:53:19Z 2024-11-19T14:53:19Z Author&#160;Teufel, Stephanie. editor.&#160;A Min, Tjoa. editor.&#160;You, Illsun. editor.&#160;Weippl, Edgar. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-10975-6">https://doi.org/10.1007/978-3-319-10975-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> ICT Systems Security and Privacy Protection 29th IFIP TC 11 International Conference, SEC 2014, Marrakech, Morocco, June 2-4, 2014, Proceedings ent://SD_ILS/0/SD_ILS:489201 2024-11-19T14:53:19Z 2024-11-19T14:53:19Z Author&#160;Cuppens-Boulahia, Nora. editor.&#160;Cuppens, Frederic. editor.&#160;Jajodia, Sushil. editor.&#160;Abou El Kalam, Anas. editor.&#160;Sans, Thierry. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-642-55415-5">https://doi.org/10.1007/978-3-642-55415-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Recent Trends in Computer Networks and Distributed Systems Security Second International Conference, SNDS 2014, Trivandrum, India, March 13-14, 2014. Proceedings ent://SD_ILS/0/SD_ILS:487966 2024-11-19T14:53:19Z 2024-11-19T14:53:19Z Author&#160;Martinez Perez, Gregorio. editor.&#160;Thampi, Sabu M. editor.&#160;Ko, Ryan. editor.&#160;Shu, Lei. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-642-54525-2">https://doi.org/10.1007/978-3-642-54525-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Trustworthy Reconfigurable Systems Enhancing the Security Capabilities of Reconfigurable Hardware Architectures ent://SD_ILS/0/SD_ILS:488721 2024-11-19T14:53:19Z 2024-11-19T14:53:19Z Author&#160;Feller, Thomas. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-658-07005-2">https://doi.org/10.1007/978-3-658-07005-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Agroforestry Systems in India: Livelihood Security &amp; Ecosystem Services ent://SD_ILS/0/SD_ILS:489371 2024-11-19T14:53:19Z 2024-11-19T14:53:19Z Author&#160;Dagar, Jagdish Chander. editor.&#160;Singh, Anil Kumar. editor.&#160;Arunachalam, Ayyanadar. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-81-322-1662-9">https://doi.org/10.1007/978-81-322-1662-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Systems Security 10th International Conference, ICISS 2014, Hyderabad, India, December 16-20, 2014. Proceedings ent://SD_ILS/0/SD_ILS:489545 2024-11-19T14:53:19Z 2024-11-19T14:53:19Z Author&#160;Prakash, Atul. editor.&#160;Shyamasundar, Rudrapatna. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-13841-1">https://doi.org/10.1007/978-3-319-13841-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Distributed networks : intelligence, security, and applications ent://SD_ILS/0/SD_ILS:285408 2024-11-19T14:53:19Z 2024-11-19T14:53:19Z Author&#160;Memon, Qurban Ali, editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781466559585">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Network anomaly detection : a machine learning perspective ent://SD_ILS/0/SD_ILS:285413 2024-11-19T14:53:19Z 2024-11-19T14:53:19Z Author&#160;Bhattacharyya, Dhruba K., author.&#160;Kalita, Jugal Kumar, author.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781466582095">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> SC-FDMA for mobile communications ent://SD_ILS/0/SD_ILS:287270 2024-11-19T14:53:19Z 2024-11-19T14:53:19Z Author&#160;Abd el-Samie, Fathi E.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781466510722">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Enterprise architecture and information assurance : developing a secure foundation ent://SD_ILS/0/SD_ILS:289995 2024-11-19T14:53:19Z 2024-11-19T14:53:19Z Author&#160;Scholz, James A., author.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781439841600">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Business continuity and disaster recovery planning for IT professionals ent://SD_ILS/0/SD_ILS:306695 2024-11-19T14:53:19Z 2024-11-19T14:53:19Z Author&#160;Snedaker, Susan.&#160;Rima, Chris.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780124105263">http://www.sciencedirect.com/science/book/9780124105263</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Building an information security awareness program defending against social engineering and technical threats ent://SD_ILS/0/SD_ILS:355618 2024-11-19T14:53:19Z 2024-11-19T14:53:19Z Author&#160;Gardner, Bill (Bill G.)&#160;Thomas, Valerie (Information security consultant)<br/>Preferred Shelf Number&#160;ONLINE(355618.1)<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780124199675">http://www.sciencedirect.com/science/book/9780124199675</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security risk assessment managing physical and operational security ent://SD_ILS/0/SD_ILS:355635 2024-11-19T14:53:19Z 2024-11-19T14:53:19Z Author&#160;White, John M.<br/>Preferred Shelf Number&#160;ONLINE(355635.1)<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128002216">http://www.sciencedirect.com/science/book/9780128002216</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security leader insights for success lessons and strategies from leading security professionals ent://SD_ILS/0/SD_ILS:355933 2024-11-19T14:53:19Z 2024-11-19T14:53:19Z Author&#160;Komendat, Dave.<br/>Preferred Shelf Number&#160;ONLINE(355933.1)<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128008447">http://www.sciencedirect.com/science/book/9780128008447</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Intrusion detection in wireless ad-hoc networks ent://SD_ILS/0/SD_ILS:356477 2024-11-19T14:53:19Z 2024-11-19T14:53:19Z Author&#160;Chaki, Nabendu, editor.&#160;Chaki, Rituparna, editor.<br/>Preferred Shelf Number&#160;ONLINE(356477.1)<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781466515673">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Global food security and supply ent://SD_ILS/0/SD_ILS:341677 2024-11-19T14:53:19Z 2024-11-19T14:53:19Z Author&#160;Martindale, Wayne, 1965-<br/>Preferred Shelf Number&#160;ONLINE(341677.1)<br/>Electronic Access&#160;Cover image <a href="http://catalogimages.wiley.com/images/db/jimages/9781118699324.jpg">http://catalogimages.wiley.com/images/db/jimages/9781118699324.jpg</a> John Wiley <a href="http://dx.doi.org/10.1002/9781118699287">http://dx.doi.org/10.1002/9781118699287</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Personnel protection : threat assessment profile ; proven practices ent://SD_ILS/0/SD_ILS:355714 2024-11-19T14:53:19Z 2024-11-19T14:53:19Z Author&#160;Miller, Jerome, author.&#160;Jones, Radford, author.<br/>Preferred Shelf Number&#160;ONLINE(355714.1)<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128009260">http://www.sciencedirect.com/science/book/9780128009260</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Software test attacks to break mobile and embedded devices ent://SD_ILS/0/SD_ILS:342868 2024-11-19T14:53:19Z 2024-11-19T14:53:19Z Author&#160;Hagar, Jon Duncan, author.<br/>Preferred Shelf Number&#160;ONLINE(342868.1)<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781466575318">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Physical layer security in wireless communications ent://SD_ILS/0/SD_ILS:342887 2024-11-19T14:53:19Z 2024-11-19T14:53:19Z Author&#160;Zhou, Xiangyun Sean, editor.&#160;Song, Lingyang, editor.&#160;Zhang, Yan, 1977- editor.<br/>Preferred Shelf Number&#160;ONLINE(342887.1)<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781466567016">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security leader insights for effective management : lessons and strategies from leading security professionals ent://SD_ILS/0/SD_ILS:355759 2024-11-19T14:53:19Z 2024-11-19T14:53:19Z Author&#160;Harrison, J. Randolph (Jewell Randolph), editor.<br/>Preferred Shelf Number&#160;ONLINE(355759.1)<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128008423">http://www.sciencedirect.com/science/book/9780128008423</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/>