Search Results for Security systems - Narrowed by: 2005 SirsiDynix Enterprise https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dSecurity$002bsystems$0026qf$003dPUBDATE$002509Publication$002bDate$0025092005$0025092005$0026ps$003d300? 2026-01-22T05:32:54Z Information Processing and Security Systems ent://SD_ILS/0/SD_ILS:165266 2026-01-22T05:32:54Z 2026-01-22T05:32:54Z Author&#160;Saeed, Khalid. editor.&#160;Peja&#347;, Jerzy. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/b137371">http://dx.doi.org/10.1007/b137371</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Systems and human science, for safety, security, and dependability seleced papers of the 1st International Symposium SSR2003, Osaka, Japan, November 2003 ent://SD_ILS/0/SD_ILS:254603 2026-01-22T05:32:54Z 2026-01-22T05:32:54Z Author&#160;International Symposium on Systems and Human Science (1st : 2003 : Osaka University)&#160;Arai, Tatsuo.&#160;Yamamoto, Shigeru, 1964-&#160;Makino, Kazuhisa.&#160;&#332;saka Daigaku.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780444518132">http://www.sciencedirect.com/science/book/9780444518132</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Monitoring, Security, and Rescue Techniques in Multiagent Systems ent://SD_ILS/0/SD_ILS:183313 2026-01-22T05:32:54Z 2026-01-22T05:32:54Z Author&#160;Dunin-K&#281;plicz, Barbara. author.&#160;Jankowski, Andrzej. author.&#160;Skowron, Andrzej. author.&#160;Szczuka, Marcin. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/3-540-32370-8">http://dx.doi.org/10.1007/3-540-32370-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Systems Security First International Conference, ICISS 2005, Kolkata, India, December 19-21, 2005. Proceedings ent://SD_ILS/0/SD_ILS:183364 2026-01-22T05:32:54Z 2026-01-22T05:32:54Z Author&#160;Jajodia, Sushil. editor.&#160;Mazumdar, Chandan. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/11593980">http://dx.doi.org/10.1007/11593980</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Enhanced Methods in Computer Security, Biometric and Artificial Intelligence Systems ent://SD_ILS/0/SD_ILS:164931 2026-01-22T05:32:54Z 2026-01-22T05:32:54Z Author&#160;Peja&#347;, Jerzy. editor.&#160;Piegat, Andrzej. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/b101135">http://dx.doi.org/10.1007/b101135</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Enhanced methods in computer security, biometric and artificial intelligence systems ent://SD_ILS/0/SD_ILS:109864 2026-01-22T05:32:54Z 2026-01-22T05:32:54Z Author&#160;Pejas, Jerzy, 1954-, ed.&#160;Piegat, Andrzej, 1947-, ed.<br/>Preferred Shelf Number&#160;QA76.9.A25 E545 2005<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Assessing and managing security risk in IT systems : a structured methodology ent://SD_ILS/0/SD_ILS:542250 2026-01-22T05:32:54Z 2026-01-22T05:32:54Z Author&#160;McCumber, John, 1956, author.<br/>Preferred Shelf Number&#160;QA76.9 .A25 M4284 2005<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781135488970">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> Information security management handbook ent://SD_ILS/0/SD_ILS:542831 2026-01-22T05:32:54Z 2026-01-22T05:32:54Z Author&#160;Tipton, Harold F.&#160;Krause, Micki.<br/>Preferred Shelf Number&#160;QA76.9 .A25 I54165 2003<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781420003406">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> Cryptography, information theory, and error-correction a handbook for the 21st century ent://SD_ILS/0/SD_ILS:301860 2026-01-22T05:32:54Z 2026-01-22T05:32:54Z Author&#160;Bruen, Aiden A., 1941-&#160;Forcinito, Mario, 1962-&#160;Wiley InterScience (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;Wiley InterScience <a href="http://dx.doi.org/10.1002/9781118033296">An electronic book accessible through the World Wide Web; click for information</a> Contributor biographical information <a href="http://catdir.loc.gov/catdir/enhancements/fy0618/2004058044-b.html">http://catdir.loc.gov/catdir/enhancements/fy0618/2004058044-b.html</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Bulletproof wireless security GSM, UMTS, 802.11 and ad hoc security ent://SD_ILS/0/SD_ILS:254722 2026-01-22T05:32:54Z 2026-01-22T05:32:54Z Author&#160;Chandra, Praphul.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780750677462">http://www.sciencedirect.com/science/book/9780750677462</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> &Ouml;zel g&uuml;venlik tedbirleri ent://SD_ILS/0/SD_ILS:114430 2026-01-22T05:32:54Z 2026-01-22T05:32:54Z Author&#160;&Uuml;nsal, Faruk&#160;&#304;peko&#287;lu, Murat.<br/>Preferred Shelf Number&#160;HV8291.T9 U573 2005<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Distributed sensor networks ent://SD_ILS/0/SD_ILS:542802 2026-01-22T05:32:54Z 2026-01-22T05:32:54Z Author&#160;Iyengar, S. S. (Sundararaja S.)&#160;Brooks, R. R. (Richard R.)<br/>Preferred Shelf Number&#160;TK7872 .D48 D57 2005<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781439870785">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> The practical handbook of Internet computing ent://SD_ILS/0/SD_ILS:545276 2026-01-22T05:32:54Z 2026-01-22T05:32:54Z Author&#160;Singh, Munindar P. (Munindar Paul), 1964-<br/>Preferred Shelf Number&#160;QA76.625 .P73 2005<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9780203507223">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> Information security management handbook. Volume 2 ent://SD_ILS/0/SD_ILS:546290 2026-01-22T05:32:54Z 2026-01-22T05:32:54Z Author&#160;Tipton, Harold F.&#160;Krause, Micki.<br/>Preferred Shelf Number&#160;QA76.9 .A25 I54 2005<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781135484002">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> Computers, Software Engineering, and Digital Devices ent://SD_ILS/0/SD_ILS:542493 2026-01-22T05:32:54Z 2026-01-22T05:32:54Z Author&#160;Dorf, Richard C., author.&#160;Taylor and Francis.<br/>Preferred Shelf Number&#160;TK7885<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781420037050">Click here to view.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cryptography, information theory, and error-correction : a handbook for the 21st century ent://SD_ILS/0/SD_ILS:593044 2026-01-22T05:32:54Z 2026-01-22T05:32:54Z Author&#160;Bruen, Aiden A., 1941-&#160;Forcinito, Mario, 1962-<br/>Preferred Shelf Number&#160;QA76.9 .A25 B79 2005<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781118033296">https://onlinelibrary.wiley.com/doi/book/10.1002/9781118033296</a> <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119582397">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119582397</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Database and applications security : integrating information security and data management ent://SD_ILS/0/SD_ILS:540220 2026-01-22T05:32:54Z 2026-01-22T05:32:54Z Author&#160;Thuraisingham, Bhavani M., author.<br/>Preferred Shelf Number&#160;QA76.9 .D314 T47 2005<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9780203486061">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> The industrial information technology handbook ent://SD_ILS/0/SD_ILS:545487 2026-01-22T05:32:54Z 2026-01-22T05:32:54Z Author&#160;Zurawski, Richard.<br/>Preferred Shelf Number&#160;T58.5 .I513 2005<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781420036336">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> Disruptive security technologies with mobile code and peer-to-peer networks ent://SD_ILS/0/SD_ILS:545651 2026-01-22T05:32:54Z 2026-01-22T05:32:54Z Author&#160;Brooks, R. R. (Richard R.), author.<br/>Preferred Shelf Number&#160;TK5105.525 .B76 2004<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781420038880">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> Multimedia security handbook ent://SD_ILS/0/SD_ILS:546930 2026-01-22T05:32:54Z 2026-01-22T05:32:54Z Author&#160;Furht, Borivoje., author.&#160;Kirovski, Darko.<br/>Preferred Shelf Number&#160;QA76.9 .A25 F87 2005<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781420038262">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/>