Search Results for Security. - Narrowed by: 2005SirsiDynix Enterprisehttps://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dSecurity.$0026qf$003dPUBDATE$002509Publication$002bDate$0025092005$0025092005$0026ps$003d300$0026isd$003dtrue?dt=list2025-03-17T09:43:55ZVoIP securityent://SD_ILS/0/SD_ILS:2537152025-03-17T09:43:55Z2025-03-17T09:43:55ZAuthor Ransome, James F. Rittinghouse, John W.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781555583323">http://www.sciencedirect.com/science/book/9781555583323</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Information security fundamentalsent://SD_ILS/0/SD_ILS:2891552025-03-17T09:43:55Z2025-03-17T09:43:55ZAuthor Peltier, Thomas R. Peltier, Justin. Blackley, John A.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9780203488652">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Multimedia security handbookent://SD_ILS/0/SD_ILS:2867602025-03-17T09:43:55Z2025-03-17T09:43:55ZAuthor Furht, Borivoje. Kirovski, Darko.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781420038262">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Computer Network Securityent://SD_ILS/0/SD_ILS:1651132025-03-17T09:43:55Z2025-03-17T09:43:55ZAuthor Kizza, Joseph Migga. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/b106962">http://dx.doi.org/10.1007/b106962</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Pro PHP Securityent://SD_ILS/0/SD_ILS:1707622025-03-17T09:43:55Z2025-03-17T09:43:55ZAuthor Snyder, Chris. author. Southwell, Michael. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-1-4302-0057-4">http://dx.doi.org/10.1007/978-1-4302-0057-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Network security technologiesent://SD_ILS/0/SD_ILS:2900772025-03-17T09:43:55Z2025-03-17T09:43:55ZAuthor Fung, K. T. (Kwok T.)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9780203330708">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Security in E-Learningent://SD_ILS/0/SD_ILS:1652242025-03-17T09:43:55Z2025-03-17T09:43:55ZAuthor Weippl, Edgar. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/b136702">http://dx.doi.org/10.1007/b136702</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>IM, instant messaging, securityent://SD_ILS/0/SD_ILS:2537252025-03-17T09:43:55Z2025-03-17T09:43:55ZAuthor Rittinghouse, John W. Ransome, James F.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781555583385">http://www.sciencedirect.com/science/book/9781555583385</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Information security management handbookent://SD_ILS/0/SD_ILS:2891512025-03-17T09:43:55Z2025-03-17T09:43:55ZAuthor Tipton, Harold F. Krause, Micki.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9780203325438">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Information security management handbookent://SD_ILS/0/SD_ILS:2903202025-03-17T09:43:55Z2025-03-17T09:43:55ZAuthor Tipton, Harold F. Krause, Micki.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781420003406">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Physical security for ITent://SD_ILS/0/SD_ILS:2538552025-03-17T09:43:55Z2025-03-17T09:43:55ZAuthor Erbschloe, Michael, 1951-<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781555583279">http://www.sciencedirect.com/science/book/9781555583279</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Information security risk analysisent://SD_ILS/0/SD_ILS:2847642025-03-17T09:43:55Z2025-03-17T09:43:55ZAuthor Peltier, Thomas R.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781420031195">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>A practical guide to security assessmentsent://SD_ILS/0/SD_ILS:2883062025-03-17T09:43:55Z2025-03-17T09:43:55ZAuthor Kairab, Sudhanshu.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9780203507230">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Saving Social security : a balanced approachent://SD_ILS/0/SD_ILS:1059182025-03-17T09:43:55Z2025-03-17T09:43:55ZAuthor Diamond, Peter A. Orszag, Peter R., ort. yaz.<br/>Preferred Shelf Number HD 7125 .D525 2005<br/>Format: Books<br/>Availability Beytepe Library~1<br/>Encyclopedia of Cryptography and Securityent://SD_ILS/0/SD_ILS:1649302025-03-17T09:43:55Z2025-03-17T09:43:55ZAuthor Tilborg, Henk C. A. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/0-387-23483-7">http://dx.doi.org/10.1007/0-387-23483-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Climate change and global food securityent://SD_ILS/0/SD_ILS:1103412025-03-17T09:43:55Z2025-03-17T09:43:55ZAuthor Lal, R.<br/>Preferred Shelf Number S600.7.C54 C652 2005<br/>Format: Books<br/>Availability Beytepe Library~1<br/>Social Security, Demographics, and Riskent://SD_ILS/0/SD_ILS:1809032025-03-17T09:43:55Z2025-03-17T09:43:55ZAuthor Borgmann, Christoph. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/b137963">http://dx.doi.org/10.1007/b137963</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Information Processing and Security Systemsent://SD_ILS/0/SD_ILS:1652662025-03-17T09:43:55Z2025-03-17T09:43:55ZAuthor Saeed, Khalid. editor. Pejaś, Jerzy. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/b137371">http://dx.doi.org/10.1007/b137371</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Network security a practical approachent://SD_ILS/0/SD_ILS:2537072025-03-17T09:43:55Z2025-03-17T09:43:55ZAuthor Harrington, Jan L.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780123116338">http://www.sciencedirect.com/science/book/9780123116338</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Climate change and global food securityent://SD_ILS/0/SD_ILS:2867652025-03-17T09:43:55Z2025-03-17T09:43:55ZAuthor Lal, R.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781420028614">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Statistical methods in computer securityent://SD_ILS/0/SD_ILS:2886112025-03-17T09:43:55Z2025-03-17T09:43:55ZAuthor Chen, William W. S.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781420030884">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Information security management handbook. Vol. 2ent://SD_ILS/0/SD_ILS:2854412025-03-17T09:43:55Z2025-03-17T09:43:55ZAuthor Tipton, Harold F. Krause, Micki.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9780203005552">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Optical and Digital Techniques for Information Securityent://SD_ILS/0/SD_ILS:1650902025-03-17T09:43:55Z2025-03-17T09:43:55ZAuthor Javidi, Bahram. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/b105098">http://dx.doi.org/10.1007/b105098</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Emerging Threats to Energy Security and Stabilityent://SD_ILS/0/SD_ILS:1689322025-03-17T09:43:55Z2025-03-17T09:43:55ZAuthor McPherson, Hugo. editor. Duncan Wood, W. editor. Robinson, Derek M. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/1-4020-3567-5">http://dx.doi.org/10.1007/1-4020-3567-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Network security evaluation using the NSA IEMent://SD_ILS/0/SD_ILS:2539452025-03-17T09:43:55Z2025-03-17T09:43:55ZAuthor Rogers, Russ. Cunningham, Bryan.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490351">http://www.sciencedirect.com/science/book/9781597490351</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Computer Security in the 21st Centuryent://SD_ILS/0/SD_ILS:1650012025-03-17T09:43:55Z2025-03-17T09:43:55ZAuthor Lee, D. T. editor. Shieh, S. P. editor. Tygar, J. D. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/b104203">http://dx.doi.org/10.1007/b104203</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Impacts and Risk Assessment of Technology for Internet Security Enabled Information Small-Medium Enterprises (TEISMES)ent://SD_ILS/0/SD_ILS:1652672025-03-17T09:43:55Z2025-03-17T09:43:55ZAuthor Shoniregun, Charles A. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/b137376">http://dx.doi.org/10.1007/b137376</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Black Hat physical device security exploiting hardware and softwareent://SD_ILS/0/SD_ILS:2540252025-03-17T09:43:55Z2025-03-17T09:43:55ZAuthor Miller, Drew, 1978-<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781932266818">http://www.sciencedirect.com/science/book/9781932266818</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Transboundary Water Resources: Strategies for Regional Security and Ecological Stability Proceedings of the NATO Advanced Research Workshop on Transboundary Water Resources: Strategies for Regional Security and Ecological Stability Novosibirsk, Russia 25–27 August, 2003ent://SD_ILS/0/SD_ILS:1688022025-03-17T09:43:55Z2025-03-17T09:43:55ZAuthor Vogtmann, Hartmut. editor. Dobretsov, Nikolai. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/1-4020-3082-7">http://dx.doi.org/10.1007/1-4020-3082-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Nessus, Snort, & Ethereal power tools customizing open source security applicationsent://SD_ILS/0/SD_ILS:2539422025-03-17T09:43:55Z2025-03-17T09:43:55ZAuthor Archibald, Neil. Ramirez, Gilbert, 1972- Rathaus, Noam. Syngress Media, Inc.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490207">http://www.sciencedirect.com/science/book/9781597490207</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Sequrity for computer networks : an introduction to data security in teleprocessing and electronic funds transferent://SD_ILS/0/SD_ILS:621882025-03-17T09:43:55Z2025-03-17T09:43:55ZAuthor Davies, Donald Watts, 1924- Price, W. L., ort.yaz.<br/>Preferred Shelf Number TK 5105 D43 1989<br/>Format: Books<br/>Availability Beytepe Library~1<br/>Producing security : multinational corporations, globalization, and the changing calculus of conflictent://SD_ILS/0/SD_ILS:3759172025-03-17T09:43:55Z2025-03-17T09:43:55ZAuthor Brooks, Stephen G., 1971- author.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://www.jstor.org/stable/10.2307/j.ctt7sjz7">http://www.jstor.org/stable/10.2307/j.ctt7sjz7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Enhanced methods in computer security, biometric and artificial intelligence systemsent://SD_ILS/0/SD_ILS:1098642025-03-17T09:43:55Z2025-03-17T09:43:55ZAuthor Pejas, Jerzy, 1954-, ed. Piegat, Andrzej, 1947-, ed.<br/>Preferred Shelf Number QA76.9.A25 E545 2005<br/>Format: Books<br/>Availability Beytepe Library~1<br/>Designing security a Windows server 2003 network (70-298) : textbookent://SD_ILS/0/SD_ILS:1067452025-03-17T09:43:55Z2025-03-17T09:43:55ZAuthor Northrup, Tony.<br/>Preferred Shelf Number QA76.3 .N877 2005T<br/>Format: Books<br/>Availability Beytepe Library~1<br/>Designing security a Windows server 2003 network (70-298) : Lab manualent://SD_ILS/0/SD_ILS:1124402025-03-17T09:43:55Z2025-03-17T09:43:55ZAuthor Northrup, Tony.<br/>Preferred Shelf Number QA76.3 .N877 2005<br/>Format: Books<br/>Availability Beytepe Library~1<br/>Developing strategies to deal with trauma in children.: a means of ensuring conflict prevention security and social stability : case study : 12-15-year-olds in Serbiaent://SD_ILS/0/SD_ILS:1157412025-03-17T09:43:55Z2025-03-17T09:43:55ZAuthor NATO Advanced Research Workshop on Developing Strategies to Deal with Post-Conflict Trauma in Children (2004 : Bratislava, Slovakia) Donnelly, Jill.<br/>Preferred Shelf Number RJ506.P55 N38 2005<br/>Format: Books<br/>Availability Beytepe Library~1<br/>The future of social security policy : women, work and a citizens basic incomeent://SD_ILS/0/SD_ILS:1157972025-03-17T09:43:55Z2025-03-17T09:43:55ZAuthor McKay, Ailsa.<br/>Preferred Shelf Number HC79.P63 M34 2005<br/>Format: Books<br/>Availability Beytepe Library~1<br/>Privacy, Security and Trust within the Context of Pervasive Computingent://SD_ILS/0/SD_ILS:1649232025-03-17T09:43:55Z2025-03-17T09:43:55ZAuthor Robinson, Philip. editor. Vogt, Harald. editor. Wagealla, Waleed. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/b101573">http://dx.doi.org/10.1007/b101573</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Enhanced Methods in Computer Security, Biometric and Artificial Intelligence Systemsent://SD_ILS/0/SD_ILS:1649312025-03-17T09:43:55Z2025-03-17T09:43:55ZAuthor Pejaś, Jerzy. editor. Piegat, Andrzej. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/b101135">http://dx.doi.org/10.1007/b101135</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Security and Privacy in the Age of Ubiquitous Computing IFIP TC11 20th International Information Security Conference May 30 – June 1, 2005, Chiba, Japanent://SD_ILS/0/SD_ILS:1651652025-03-17T09:43:55Z2025-03-17T09:43:55ZAuthor Sasaki, Ryoichi. editor. Qing, Sihan. editor. Okamoto, Eiji. editor. Yoshiura, Hiroshi. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/b135818">http://dx.doi.org/10.1007/b135818</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Developing strategies to deal with trauma in children a means of ensuring conflict prevention security and social stability : case study : 12-15-year-olds in Serbiaent://SD_ILS/0/SD_ILS:1245522025-03-17T09:43:55Z2025-03-17T09:43:55ZAuthor NATO Advanced Research Workshop on Developing Strategies to Deal with Post-Conflict Trauma in Children (2004 : Bratislava, Slovakia) Donnelly, Jill. ebrary, Inc.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://site.ebrary.com/lib/hacettepe/Doc?id=10130683">http://site.ebrary.com/lib/hacettepe/Doc?id=10130683</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Network Control and Engineering for QoS, Security and Mobility, III IFIP TC6 / WG6.2, 6.6, 6.7 and 6.8 Third International Conference on Network Control and Engineering for QoS, Security and Mobility, NetCon 2004 on November 2–5, 2004, Palma de Mallorca, Spainent://SD_ILS/0/SD_ILS:1648722025-03-17T09:43:55Z2025-03-17T09:43:55ZAuthor Gaïti, Dominique. editor. Galmés, Sebastià. editor. Puigjaner, Ramon. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/b100917">http://dx.doi.org/10.1007/b100917</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Formal Aspects in Security and Trust IFIP TC1 WG1.7 Workshop on Formal Aspects in Security and Trust (FAST), World Computer Congress, August 22–27, 2004, Toulouse, Franceent://SD_ILS/0/SD_ILS:1650112025-03-17T09:43:55Z2025-03-17T09:43:55ZAuthor Dimitrakos, Theo. editor. Martinelli, Fabio. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/b104303">http://dx.doi.org/10.1007/b104303</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Certification and Security in Inter-Organizational E-Serviceent://SD_ILS/0/SD_ILS:1650862025-03-17T09:43:55Z2025-03-17T09:43:55ZAuthor Nardelli, Enrico. editor. Talamo, Maurizio. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/11397427">http://dx.doi.org/10.1007/11397427</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Communications and Multimedia Security 8th IFIP TC-6 TC-11 Conference on Communications and Multimedia Security, Sept. 15–18, 2004, Windermere, The Lake District, United Kingdoment://SD_ILS/0/SD_ILS:1650552025-03-17T09:43:55Z2025-03-17T09:43:55ZAuthor Chadwick, David. editor. Preneel, Bart. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/b105674">http://dx.doi.org/10.1007/b105674</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Cyberspace Security and Defense: Research Issues Proceedings of the NATO Advanced Research Workshop on Cyberspace Security and Defense: Research Issues Gdansk, Poland 6–9 September 2004ent://SD_ILS/0/SD_ILS:1688832025-03-17T09:43:55Z2025-03-17T09:43:55ZAuthor Kowalik, Janusz S. editor. Gorski, Janusz. editor. Sachenko, Anatoly. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/1-4020-3381-8">http://dx.doi.org/10.1007/1-4020-3381-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Security and Privacy in Ad-hoc and Sensor Networks Second European Workshop, ESAS 2005, Visegrad, Hungary, July 13-14, 2005. Revised Selected Papersent://SD_ILS/0/SD_ILS:1827822025-03-17T09:43:55Z2025-03-17T09:43:55ZAuthor Molva, Refik. editor. Tsudik, Gene. editor. Westhoff, Dirk. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/11601494">http://dx.doi.org/10.1007/11601494</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Financial Cryptography and Data Security 9th International Conference, FC 2005, Roseau, The Commonwealth Of Dominica, February 28 – March 3, 2005. Revised Papersent://SD_ILS/0/SD_ILS:1828272025-03-17T09:43:55Z2025-03-17T09:43:55ZAuthor Patrick, Andrew S. editor. Yung, Moti. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/b137875">http://dx.doi.org/10.1007/b137875</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Information Security and Privacy 10th Australasian Conference, ACISP 2005, Brisbane, Australia, July 4-6, 2005. Proceedingsent://SD_ILS/0/SD_ILS:1828302025-03-17T09:43:55Z2025-03-17T09:43:55ZAuthor Boyd, Colin. editor. González Nieto, Juan Manuel. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/b137750">http://dx.doi.org/10.1007/b137750</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Trust, Privacy, and Security in Digital Business Second International Conference, TrustBus 2005, Copenhagen, Denmark, August 22-26, 2005. Proceedingsent://SD_ILS/0/SD_ILS:1828892025-03-17T09:43:55Z2025-03-17T09:43:55ZAuthor Katsikas, Sokratis. editor. López, Javier. editor. Pernul, Günther. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/11537878">http://dx.doi.org/10.1007/11537878</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Information Security Applications 5th International Workshop, WISA 2004, Jeju Island, Korea, August 23-25, 2004, Revised Selected Papersent://SD_ILS/0/SD_ILS:1829022025-03-17T09:43:55Z2025-03-17T09:43:55ZAuthor Lim, Chae Hoon. editor. Yung, Moti. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/b103174">http://dx.doi.org/10.1007/b103174</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Security Protocols 11th International Workshop, Cambridge, UK, April 2-4, 2003, Revised Selected Papersent://SD_ILS/0/SD_ILS:1829222025-03-17T09:43:55Z2025-03-17T09:43:55ZAuthor Christianson, Bruce. editor. Crispo, Bruno. editor. Malcolm, James A. editor. Roe, Michael. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/11542322">http://dx.doi.org/10.1007/11542322</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Intelligence and Security Informatics IEEE International Conference on Intelligence and Security Informatics, ISI 2005, Atlanta, GA, USA, May 19-20, 2005. Proceedingsent://SD_ILS/0/SD_ILS:1831272025-03-17T09:43:55Z2025-03-17T09:43:55ZAuthor Kantor, Paul. editor. Muresan, Gheorghe. editor. Roberts, Fred. editor. Zeng, Daniel D. editor. Wang, Fei-Yue. editor.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/b136511">http://dx.doi.org/10.1007/b136511</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Information Security and Cryptology – ICISC 2004 7th International Conference, Seoul, Korea, December 2-3, 2004, Revised Selected Papersent://SD_ILS/0/SD_ILS:1831462025-03-17T09:43:55Z2025-03-17T09:43:55ZAuthor Park, Choon-sik. editor. Chee, Seongtaek. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/b137120">http://dx.doi.org/10.1007/b137120</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Advances in Cryptology - ASIACRYPT 2005 11th International Conference on the Theory and Application of Cryptology and Information Security, Chennai, India, December 4-8, 2005. Proceedingsent://SD_ILS/0/SD_ILS:1832542025-03-17T09:43:55Z2025-03-17T09:43:55ZAuthor Roy, Bimal. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/11593447">http://dx.doi.org/10.1007/11593447</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Monitoring, Security, and Rescue Techniques in Multiagent Systemsent://SD_ILS/0/SD_ILS:1833132025-03-17T09:43:55Z2025-03-17T09:43:55ZAuthor Dunin-Kęplicz, Barbara. author. Jankowski, Andrzej. author. Skowron, Andrzej. author. Szczuka, Marcin. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/3-540-32370-8">http://dx.doi.org/10.1007/3-540-32370-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Security in Ad-hoc and Sensor Networks First European Workshop, ESAS 2004, Heidelberg, Germany, August 6, 2004, Revised Selected Papersent://SD_ILS/0/SD_ILS:1823282025-03-17T09:43:55Z2025-03-17T09:43:55ZAuthor Castelluccia, Claude. editor. Hartenstein, Hannes. editor. Paar, Christof. editor. Westhoff, Dirk. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/b105219">http://dx.doi.org/10.1007/b105219</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Computational Intelligence and Security International Conference, CIS 2005, Xi’an, China, December 15-19, 2005, Proceedings, Part IIent://SD_ILS/0/SD_ILS:1827692025-03-17T09:43:55Z2025-03-17T09:43:55ZAuthor Hao, Yue. editor. Liu, Jiming. editor. Wang, Yu-Ping. editor. Cheung, Yiu-ming. editor. Yin, Hujun. editor.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/11596981">http://dx.doi.org/10.1007/11596981</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Computational Intelligence and Security International Conference, CIS 2005, Xi’an, China, December 15-19, 2005, Proceedings Part Ient://SD_ILS/0/SD_ILS:1827702025-03-17T09:43:55Z2025-03-17T09:43:55ZAuthor Hao, Yue. editor. Liu, Jiming. editor. Wang, Yuping. editor. Cheung, Yiu-ming. editor. Yin, Hujun. editor.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/11596448">http://dx.doi.org/10.1007/11596448</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Information and Communications Security 7th International Conference, ICICS 2005, Beijing, China, December 10-13, 2005. Proceedingsent://SD_ILS/0/SD_ILS:1831622025-03-17T09:43:55Z2025-03-17T09:43:55ZAuthor Qing, Sihan. editor. Mao, Wenbo. editor. López, Javier. editor. Wang, Guilin. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/11602897">http://dx.doi.org/10.1007/11602897</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Information security and ethics social and organizational issuesent://SD_ILS/0/SD_ILS:1529662025-03-17T09:43:55Z2025-03-17T09:43:55ZAuthor Quigley, Marian.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access EBSCOhost <a href="http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=108396">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=108396</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Net-Centric Approaches to Intelligence and National Securityent://SD_ILS/0/SD_ILS:1652422025-03-17T09:43:55Z2025-03-17T09:43:55ZAuthor Ladner, Roy. editor. Petry, Frederick E. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/b137009">http://dx.doi.org/10.1007/b137009</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Advances in Air Pollution Modeling for Environmental Security Proceedings of the NATO Advanced Research Workshop on Advances in Air Pollution Modeling for Environmental Security Borovetz, Bulgaria 8–12 May 2004ent://SD_ILS/0/SD_ILS:1688772025-03-17T09:43:55Z2025-03-17T09:43:55ZAuthor Faragó, István. editor. Georgiev, Krassimir. editor. Havasi, Ágnes. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/1-4020-3351-6">http://dx.doi.org/10.1007/1-4020-3351-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Security in Communication Networks 4th International Conference, SCN 2004, Amalfi, Italy, September 8-10, 2004, Revised Selected Papersent://SD_ILS/0/SD_ILS:1823942025-03-17T09:43:55Z2025-03-17T09:43:55ZAuthor Blundo, Carlo. editor. Cimato, Stelvio. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/b105083">http://dx.doi.org/10.1007/b105083</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Applied Cryptography and Network Security Third International Conference, ACNS 2005, New York, NY, USA, June 7-10, 2005. Proceedingsent://SD_ILS/0/SD_ILS:1827212025-03-17T09:43:55Z2025-03-17T09:43:55ZAuthor Ioannidis, John. editor. Keromytis, Angelos. editor. Yung, Moti. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/b137093">http://dx.doi.org/10.1007/b137093</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Information Security 8th International Conference, ISC 2005, Singapore, September 20-23, 2005. Proceedingsent://SD_ILS/0/SD_ILS:1830032025-03-17T09:43:55Z2025-03-17T09:43:55ZAuthor Zhou, Jianying. editor. Lopez, Javier. editor. Deng, Robert H. editor. Bao, Feng. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/11556992">http://dx.doi.org/10.1007/11556992</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Foundations of Security Analysis and Design III FOSAD 2004/2005 Tutorial Lecturesent://SD_ILS/0/SD_ILS:1830092025-03-17T09:43:55Z2025-03-17T09:43:55ZAuthor Aldini, Alessandro. editor. Gorrieri, Roberto. editor. Martinelli, Fabio. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/11554578">http://dx.doi.org/10.1007/11554578</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Data and Applications Security XIX 19th Annual IFIP WG 11.3 Working Conference on Data and Applications Security, Storrs, CT, USA, August 7-10, 2005. Proceedingsent://SD_ILS/0/SD_ILS:1830102025-03-17T09:43:55Z2025-03-17T09:43:55ZAuthor Jajodia, Sushil. editor. Wijesekera, Duminda. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/11535706">http://dx.doi.org/10.1007/11535706</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Communications and Multimedia Security 9th IFIP TC-6 TC-11International Conference, CMS 2005, Salzburg, Austria, September 19 – 21, 2005. Proceedingsent://SD_ILS/0/SD_ILS:1830492025-03-17T09:43:55Z2025-03-17T09:43:55ZAuthor Dittmann, Jana. editor. Katzenbeisser, Stefan. editor. Uhl, Andreas. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/11552055">http://dx.doi.org/10.1007/11552055</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Information Security Practice and Experience First International Conference, ISPEC 2005, Singapore, April 11-14, 2005. Proceedingsent://SD_ILS/0/SD_ILS:1830502025-03-17T09:43:55Z2025-03-17T09:43:55ZAuthor Deng, Robert H. editor. Bao, Feng. editor. Pang, HweeHwa. editor. Zhou, Jianying. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/b107167">http://dx.doi.org/10.1007/b107167</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Computer Security – ESORICS 2005 10th European Symposium on Research in Computer Security, Milan, Italy, September 12-14, 2005. Proceedingsent://SD_ILS/0/SD_ILS:1830522025-03-17T09:43:55Z2025-03-17T09:43:55ZAuthor Vimercati, Sabrina de Capitani. editor. Syverson, Paul. editor. Gollmann, Dieter. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/11555827">http://dx.doi.org/10.1007/11555827</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Computer Network Security Third International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2005, St. Petersburg, Russia, September 24-28, 2005. Proceedingsent://SD_ILS/0/SD_ILS:1830662025-03-17T09:43:55Z2025-03-17T09:43:55ZAuthor Gorodetsky, Vladimir. editor. Kotenko, Igor. editor. Skormin, Victor. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/11560326">http://dx.doi.org/10.1007/11560326</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Computer Safety, Reliability, and Security 24th International Conference, SAFECOMP 2005, Fredrikstad, Norway, September 28-30, 2005. Proceedingsent://SD_ILS/0/SD_ILS:1830682025-03-17T09:43:55Z2025-03-17T09:43:55ZAuthor Winther, Rune. editor. Gran, Bjørn Axel. editor. Dahll, Gustav. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/11563228">http://dx.doi.org/10.1007/11563228</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Security in Pervasive Computing Second International Conference, SPC 2005, Boppard, Germany, April 6-8, 2005. Proceedingsent://SD_ILS/0/SD_ILS:1830722025-03-17T09:43:55Z2025-03-17T09:43:55ZAuthor Hutter, Dieter. editor. Ullmann, Markus. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/b135497">http://dx.doi.org/10.1007/b135497</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Cryptology and Network Security 4th International Conference, CANS 2005, Xiamen, China, December 14-16, 2005. Proceedingsent://SD_ILS/0/SD_ILS:1832832025-03-17T09:43:55Z2025-03-17T09:43:55ZAuthor Desmedt, Yvo G. editor. Wang, Huaxiong. editor. Mu, Yi. editor. Li, Yongqing. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/11599371">http://dx.doi.org/10.1007/11599371</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Information Systems Security First International Conference, ICISS 2005, Kolkata, India, December 19-21, 2005. Proceedingsent://SD_ILS/0/SD_ILS:1833642025-03-17T09:43:55Z2025-03-17T09:43:55ZAuthor Jajodia, Sushil. editor. Mazumdar, Chandan. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/11593980">http://dx.doi.org/10.1007/11593980</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Information Security and Cryptology First SKLOIS Conference, CISC 2005, Beijing, China, December 15-17, 2005. Proceedingsent://SD_ILS/0/SD_ILS:1833662025-03-17T09:43:55Z2025-03-17T09:43:55ZAuthor Feng, Dengguo. editor. Lin, Dongdai. editor. Yung, Moti. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/11599548">http://dx.doi.org/10.1007/11599548</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Implementing database security and auditing a guide for DBAs, information security administrators and auditorsent://SD_ILS/0/SD_ILS:2538602025-03-17T09:43:55Z2025-03-17T09:43:55ZAuthor Ben-Natan, Ron.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781555583347">http://www.sciencedirect.com/science/book/9781555583347</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Sockets, shellcode, porting & coding reverse engineering exploits and tool coding for security professionalsent://SD_ILS/0/SD_ILS:2539382025-03-17T09:43:55Z2025-03-17T09:43:55ZAuthor Foster, James C. Price, Mike (Mike Morgan) McClure, Stuart.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490054">http://www.sciencedirect.com/science/book/9781597490054</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Immigration Phobia and the Security Dilemma Russia, Europe, and the United Statesent://SD_ILS/0/SD_ILS:2350052025-03-17T09:43:55Z2025-03-17T09:43:55ZAuthor Alexseev, Mikhail A..<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1017/CBO9780511528064">Access by subscription</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>The Market for Force The Consequences of Privatizing Securityent://SD_ILS/0/SD_ILS:2353942025-03-17T09:43:55Z2025-03-17T09:43:55ZAuthor Avant, Deborah D..<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1017/CBO9780511490866">Access by subscription</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>International Conflict and Security Law Essays in Memory of Hilaire McCoubreyent://SD_ILS/0/SD_ILS:2354282025-03-17T09:43:55Z2025-03-17T09:43:55ZAuthor Burchill, Richard. White, Nigel D.. Morris, Justin.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1017/CBO9780511495137">Access by subscription</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Handbook of wireless local area networks applications, technology, security, and standardsent://SD_ILS/0/SD_ILS:2901502025-03-17T09:43:55Z2025-03-17T09:43:55ZAuthor Ilyas, Mohammad, 1953- Ahson, Syed.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9780203492512">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Bulletproof wireless security GSM, UMTS, 802.11 and ad hoc securityent://SD_ILS/0/SD_ILS:2547222025-03-17T09:43:55Z2025-03-17T09:43:55ZAuthor Chandra, Praphul.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780750677462">http://www.sciencedirect.com/science/book/9780750677462</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Systems and human science, for safety, security, and dependability seleced papers of the 1st International Symposium SSR2003, Osaka, Japan, November 2003ent://SD_ILS/0/SD_ILS:2546032025-03-17T09:43:55Z2025-03-17T09:43:55ZAuthor International Symposium on Systems and Human Science (1st : 2003 : Osaka University) Arai, Tatsuo. Yamamoto, Shigeru, 1964- Makino, Kazuhisa. Ōsaka Daigaku.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780444518132">http://www.sciencedirect.com/science/book/9780444518132</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Disruptive security technologies with mobile code and peer-to-peer networksent://SD_ILS/0/SD_ILS:2913052025-03-17T09:43:55Z2025-03-17T09:43:55ZAuthor Brooks, R. R. (Richard R.)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781420038880">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Error correcting coding and security for data networks analysis of the superchannel conceptent://SD_ILS/0/SD_ILS:3011472025-03-17T09:43:55Z2025-03-17T09:43:55ZAuthor Kabatiansky, G. Krouk, E. Semenov, S. John Wiley & Sons.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access John Wiley <a href="http://dx.doi.org/10.1002/0470867574">http://dx.doi.org/10.1002/0470867574</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>AAA and network security for mobile access radius, diameter, EAP, PKI, and IP mobilityent://SD_ILS/0/SD_ILS:2957292025-03-17T09:43:55Z2025-03-17T09:43:55ZAuthor Nakhjiri, Madjid. Nakhjiri, Mahsa.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access John Wiley <a href="http://dx.doi.org/10.1002/0470017465">http://dx.doi.org/10.1002/0470017465</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Database and applications security integrating information security and data managementent://SD_ILS/0/SD_ILS:2845522025-03-17T09:43:55Z2025-03-17T09:43:55ZAuthor Thuraisingham, Bhavani M.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9780203486061">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Managing an information security and privacy awareness and training programent://SD_ILS/0/SD_ILS:2847802025-03-17T09:43:55Z2025-03-17T09:43:55ZAuthor Herold, Rebecca.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781420031256">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Assessing and managing security risk in IT systems a structured methodologyent://SD_ILS/0/SD_ILS:2854882025-03-17T09:43:55Z2025-03-17T09:43:55ZAuthor McCumber, John, 1956-<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9780203490426">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Human development report 2005 : International cooperation at a crossroads: Aid, trade and security in an unegual world.ent://SD_ILS/0/SD_ILS:1055672025-03-17T09:43:55Z2025-03-17T09:43:55ZPreferred Shelf Number HD72 H85 2005<br/>Format: Books<br/>Availability Beytepe Library~1<br/>Intrusion Detection and Correlation Challenges and Solutionsent://SD_ILS/0/SD_ILS:1649192025-03-17T09:43:55Z2025-03-17T09:43:55ZAuthor Kruegel, Christopher. author. Valeur, Fredrik. author. Vigna, Giovanni. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/b101493">http://dx.doi.org/10.1007/b101493</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Image and Video Encryption From Digital Rights Management to Secured Personal Communicationent://SD_ILS/0/SD_ILS:1649202025-03-17T09:43:55Z2025-03-17T09:43:55ZAuthor Jajodia, Sushil. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/b101495">http://dx.doi.org/10.1007/b101495</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>The Austin Protocol Compilerent://SD_ILS/0/SD_ILS:1648762025-03-17T09:43:55Z2025-03-17T09:43:55ZAuthor McGuire, Tommy M. author. Gouda, Mohamed G. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/b101038">http://dx.doi.org/10.1007/b101038</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Case studies and theory development in the social sciencesent://SD_ILS/0/SD_ILS:1157672025-03-17T09:43:55Z2025-03-17T09:43:55ZAuthor George, Alexander L. Bennett, Andrew, 1956-<br/>Preferred Shelf Number H61 .G46 2005<br/>Format: Books<br/>Availability Beytepe Library~1<br/>Güvenlik Çalışmaları Dergisi.ent://SD_ILS/0/SD_ILS:3429202025-03-17T09:43:55Z2025-03-17T09:43:55ZFormat: Continuing Resources Other<br/>Availability ~0<br/>İş Hukuku ve Sosyal Güvenlik Hukuku Dergisi .ent://SD_ILS/0/SD_ILS:3717492025-03-17T09:43:55Z2025-03-17T09:43:55ZFormat: Continuing Resources Other<br/>Availability ~0<br/>From Cells to Proteins: Imaging Nature across Dimensions Proceedings of the NATO Advanced Study Institute on From Cells to Proteins: Imaging Nature across Dimensions Pisa, Italy 12–23 September 2004ent://SD_ILS/0/SD_ILS:1689462025-03-17T09:43:55Z2025-03-17T09:43:55ZAuthor Evangelista, Valtere. editor. Barsanti, Laura. editor. Passarelli, Vincenzo. editor. Gualtieri, Paolo. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/1-4020-3616-7">http://dx.doi.org/10.1007/1-4020-3616-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Equidosimetry — Ecological Standardization and Equidosimetry for Radioecology and Environmental Ecology Proceedings of the NATO Advanced Research Workshop on Ecological Standardization and Equidosimetry for Radioecology and Environmental Ecology Kiev, Ukraine 14–20 April 2002ent://SD_ILS/0/SD_ILS:1689582025-03-17T09:43:55Z2025-03-17T09:43:55ZAuthor Bréchignac, F. editor. Desmet, G. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/1-4020-3650-7">http://dx.doi.org/10.1007/1-4020-3650-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>NATO AND TERRORISM Catastrophic Terrorism and First Responders: Threats and Mitigation Proceedings of the Nato Advanced Research Workshop on Catastrophic Terrorism and First Responders: Threats and Mitigation Neuhausen-Stuttgart, Germany 10–12 May 2004ent://SD_ILS/0/SD_ILS:1521582025-03-17T09:43:55Z2025-03-17T09:43:55ZAuthor Steinhäusler, Friedrich. Edwards, Frances. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/1-4020-3585-3">http://dx.doi.org/10.1007/1-4020-3585-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Defense against Bioterror Detection Technologies, Implementation Strategies and Commercial Opportunitiesent://SD_ILS/0/SD_ILS:1688842025-03-17T09:43:55Z2025-03-17T09:43:55ZAuthor Morrison, Dennis. editor. Milanovich, Fred. editor. Ivnitski, Dmitri. editor. Austin, Thomas R. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/1-4020-3384-2">http://dx.doi.org/10.1007/1-4020-3384-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Configuring Check Point NGX VPN-1/fire wall-ent://SD_ILS/0/SD_ILS:2539432025-03-17T09:43:55Z2025-03-17T09:43:55ZAuthor Stephens, Robert. Stiefel, Barry J. Watkins, Stephen (Information security professional)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490313">http://www.sciencedirect.com/science/book/9781597490313</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Polis bilimleri dergisi = Turkish journal of police studiesent://SD_ILS/0/SD_ILS:2293192025-03-17T09:43:55Z2025-03-17T09:43:55ZElectronic Access <a href="http://www.pa.edu.tr/?app=ED77B64B-C77A-47E1-89ED-FB78A53019E4">Elektronik Eri?im</a><br/>Format: Continuing Resources Other<br/>Availability ~0<br/>The Law and Economics of Cybersecurityent://SD_ILS/0/SD_ILS:2355182025-03-17T09:43:55Z2025-03-17T09:43:55ZAuthor Grady, Mark F.. Parisi, Francesco.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1017/CBO9780511511523">Access by subscription</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>İş güvencesi hukuku : işe iade davalarıent://SD_ILS/0/SD_ILS:1018152025-03-17T09:43:55Z2025-03-17T09:43:55ZAuthor Bilgili, Abbas.<br/>Preferred Shelf Number KKX 1279 .B55 2005<br/>Format: Books<br/>Availability Law Library~1<br/>Güvenlik sektörünün parlamenter gözetimi : ilkeler, mekanizmalar ve uygulamalarent://SD_ILS/0/SD_ILS:1071402025-03-17T09:43:55Z2025-03-17T09:43:55ZAuthor Born, Hans. Kaliber, Esra Ortakan, çev. Kaliber, Alper, çev.<br/>Preferred Shelf Number UA10.5 .B67 2005<br/>Format: Books<br/>Availability Beytepe Library~1<br/>Sorulu cevaplı yeni iş hukuku uygulamasıent://SD_ILS/0/SD_ILS:1020772025-03-17T09:43:55Z2025-03-17T09:43:55ZAuthor İnciroğlu, Lütfi.<br/>Preferred Shelf Number KKX1270 .I53 2005<br/>Format: Books<br/>Availability Law Library~1<br/>Soru ve yanıtlarla iş sözleşmesinin feshi ve iş güvencesient://SD_ILS/0/SD_ILS:1020782025-03-17T09:43:55Z2025-03-17T09:43:55ZAuthor Çalık, Şefik.<br/>Preferred Shelf Number KKX 1279 .C25 2005<br/>Format: Books<br/>Availability Law Library~1<br/>Küresel çatışmanın yeni alanları : kaynak savaşlarıent://SD_ILS/0/SD_ILS:1031052025-03-17T09:43:55Z2025-03-17T09:43:55ZAuthor Klare, Michael T., 1942- İnciler, Özge, çev.<br/>Preferred Shelf Number UA 23 .K5320 2004<br/>Format: Books<br/>Availability Beytepe Library~1<br/>Ulus devletin çöküşü : Yirmi birinci yüzyılda kaos ve düzenent://SD_ILS/0/SD_ILS:1040402025-03-17T09:43:55Z2025-03-17T09:43:55ZAuthor Cooper, Robert, 1947- Karahan, Berrin.<br/>Preferred Shelf Number JZ1308 .C6620 2005<br/>Format: Books<br/>Availability Beytepe Library~1<br/>TCP / IP ve ağ güvenliği : teori ve uygulamalar ileent://SD_ILS/0/SD_ILS:1128132025-03-17T09:43:55Z2025-03-17T09:43:55ZAuthor Dirican, Can Okan.<br/>Preferred Shelf Number TK 5105.55 D5753 2005<br/>Format: Books<br/>Availability Beytepe Library~2<br/>Beginning cryptography with Javaent://SD_ILS/0/SD_ILS:1442032025-03-17T09:43:55Z2025-03-17T09:43:55ZAuthor Hook, David, 1962-<br/>Preferred Shelf Number ONLINE<br/>Electronic Access EBSCOhost <a href="http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=142234">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=142234</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>European Union with Turkey : the possible impact of Turkey's membership on the European Unionent://SD_ILS/0/SD_ILS:1042772025-03-17T09:43:55Z2025-03-17T09:43:55ZAuthor Laçiner, Sedat. Özcan, Mehmet. Bal, İhsan.<br/>Preferred Shelf Number HC241.25.T9 L3 2005<br/>Format: Books<br/>Availability Beytepe Library~2<br/>Özel güvenlik tedbirlerient://SD_ILS/0/SD_ILS:1144302025-03-17T09:43:55Z2025-03-17T09:43:55ZAuthor Ünsal, Faruk İpekoğlu, Murat.<br/>Preferred Shelf Number HV8291.T9 U573 2005<br/>Format: Books<br/>Availability Beytepe Library~1<br/>Stealing the network how to own an identityent://SD_ILS/0/SD_ILS:2536632025-03-17T09:43:55Z2025-03-17T09:43:55ZAuthor Alder, Raven. Mullen, Timothy M. Long, Johnny.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490061">http://www.sciencedirect.com/science/book/9781597490061</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Software piracy exposedent://SD_ILS/0/SD_ILS:2536642025-03-17T09:43:55Z2025-03-17T09:43:55ZAuthor Craig, Paul. Honick, Ron. Burnett, Mark (Mark M.)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781932266986">http://www.sciencedirect.com/science/book/9781932266986</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Cisco PIX firewalls configure, manage, & troubleshootent://SD_ILS/0/SD_ILS:2536672025-03-17T09:43:55Z2025-03-17T09:43:55ZAuthor Behrens, Thorsten. Riley, Charles. Khan, Umer.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490047">http://www.sciencedirect.com/science/book/9781597490047</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Aggressive network self-defenseent://SD_ILS/0/SD_ILS:2536722025-03-17T09:43:55Z2025-03-17T09:43:55ZAuthor Wyler, Neil R.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836203">http://www.sciencedirect.com/science/book/9781931836203</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Cyber spying tracking your family's (sometimes) secret online livesent://SD_ILS/0/SD_ILS:2536732025-03-17T09:43:55Z2025-03-17T09:43:55ZAuthor Fair, Ted. Nordfelt, Michael. Ring, Sandra. Cole, Eric.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836418">http://www.sciencedirect.com/science/book/9781931836418</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>InfoSec career hacking sell your skillz, not your soulent://SD_ILS/0/SD_ILS:2536812025-03-17T09:43:55Z2025-03-17T09:43:55ZAuthor Bayles, Aaron W. Brindley, Ed. Foster, James C. Hurley, Chris. Long, Johnny.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490115">http://www.sciencedirect.com/science/book/9781597490115</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Firewalls jumpstart for network and systems administratorsent://SD_ILS/0/SD_ILS:2538422025-03-17T09:43:55Z2025-03-17T09:43:55ZAuthor Vacca, John R. Ellis, Scott (Scott Raymond), 1968-<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781555582975">http://www.sciencedirect.com/science/book/9781555582975</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Business continuity and disaster recovery for infosec managersent://SD_ILS/0/SD_ILS:2538622025-03-17T09:43:55Z2025-03-17T09:43:55ZAuthor Rittinghouse, John W. Ransome, James F.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781555583392">http://www.sciencedirect.com/science/book/9781555583392</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Host integrity monitoring using Osiris and Samhainent://SD_ILS/0/SD_ILS:2539402025-03-17T09:43:55Z2025-03-17T09:43:55ZAuthor Wotring, Brian. Potter, Bruce. Ranum, Marcus J.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490184">http://www.sciencedirect.com/science/book/9781597490184</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Trusted Computingent://SD_ILS/0/SD_ILS:2478712025-03-17T09:43:55Z2025-03-17T09:43:55ZAuthor Mitchell, Chris, ed.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1049/PBPC006E">http://dx.doi.org/10.1049/PBPC006E</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Configuring NetScreen firewallsent://SD_ILS/0/SD_ILS:2540162025-03-17T09:43:55Z2025-03-17T09:43:55ZAuthor Cameron, Rob.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781932266399">http://www.sciencedirect.com/science/book/9781932266399</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Intrusion prevention and active response deploying network and host IPSent://SD_ILS/0/SD_ILS:2540172025-03-17T09:43:55Z2025-03-17T09:43:55ZAuthor Rash, Michael (Michael Brandon)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781932266474">http://www.sciencedirect.com/science/book/9781932266474</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Buffer overflow attacks detect, exploit, preventent://SD_ILS/0/SD_ILS:2540232025-03-17T09:43:55Z2025-03-17T09:43:55ZAuthor Foster, James C.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781932266672">http://www.sciencedirect.com/science/book/9781932266672</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Hacking a terror network the silent threat of covert channelsent://SD_ILS/0/SD_ILS:2539872025-03-17T09:43:55Z2025-03-17T09:43:55ZAuthor Rogers, Russ.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781928994985">http://www.sciencedirect.com/science/book/9781928994985</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Codes the guide to secrecy from ancient to modern timesent://SD_ILS/0/SD_ILS:2848652025-03-17T09:43:55Z2025-03-17T09:43:55ZAuthor Mollin, Richard A., 1947-<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781420035087">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Acing the security+ certification exament://SD_ILS/0/SD_ILS:3134922025-03-17T09:43:55Z2025-03-17T09:43:55ZAuthor Regan, Patrick E.<br/>Preferred Shelf Number QA76.3 R455 2005<br/>Format: Books<br/>Availability Beytepe Library~1<br/>Cryptography, information theory, and error-correction a handbook for the 21st centuryent://SD_ILS/0/SD_ILS:3018602025-03-17T09:43:55Z2025-03-17T09:43:55ZAuthor Bruen, Aiden A., 1941- Forcinito, Mario, 1962- Wiley InterScience (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access Wiley InterScience <a href="http://dx.doi.org/10.1002/9781118033296">An electronic book accessible through the World Wide Web; click for information</a>
Contributor biographical information <a href="http://catdir.loc.gov/catdir/enhancements/fy0618/2004058044-b.html">http://catdir.loc.gov/catdir/enhancements/fy0618/2004058044-b.html</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>How policies make citizens : senior political activism and the American welfare stateent://SD_ILS/0/SD_ILS:3759152025-03-17T09:43:55Z2025-03-17T09:43:55ZAuthor Campbell, Andrea Louise, 1966-<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://www.jstor.org/stable/10.2307/j.ctt7rtmp">http://www.jstor.org/stable/10.2307/j.ctt7rtmp</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Curing the patch management headacheent://SD_ILS/0/SD_ILS:2847782025-03-17T09:43:55Z2025-03-17T09:43:55ZAuthor Nicastro, Felicia M.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781420031294">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>The counterterrorism handbook tactics, procedures, and techniquesent://SD_ILS/0/SD_ILS:2868622025-03-17T09:43:55Z2025-03-17T09:43:55ZAuthor Bolz, Frank, 1930- Dudonis, Kenneth J. Schulz, David P.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781420057904">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>The ethical hack a framework for business value penetration testingent://SD_ILS/0/SD_ILS:2883102025-03-17T09:43:55Z2025-03-17T09:43:55ZAuthor Tiller, James S.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9780203495414">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Scalable and secure internet services and architectureent://SD_ILS/0/SD_ILS:2857962025-03-17T09:43:55Z2025-03-17T09:43:55ZAuthor Xu, Chengzhong.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781420035209">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Advances in Elliptic Curve Cryptographyent://SD_ILS/0/SD_ILS:2360582025-03-17T09:43:55Z2025-03-17T09:43:55ZAuthor Blake, Ian F.. Seroussi, Gadiel. Smart, Nigel P..<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1017/CBO9780511546570">Access by subscription</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Global Anti-Terrorism Law and Policyent://SD_ILS/0/SD_ILS:2380912025-03-17T09:43:55Z2025-03-17T09:43:55ZAuthor Ramraj, Victor V.. Hor, Michael. Roach, Kent.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1017/CBO9780511493874">Access by subscription</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>