Search Results for Security. - Narrowed by: 2005SirsiDynix Enterprisehttps://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dSecurity.$0026qf$003dPUBDATE$002509Publication$002bDate$0025092005$0025092005$0026te$003dILS$0026ps$003d300$0026isd$003dtrue?2024-11-15T14:55:40ZVoIP securityent://SD_ILS/0/SD_ILS:2537152024-11-15T14:55:40Z2024-11-15T14:55:40ZAuthor Ransome, James F. Rittinghouse, John W.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781555583323">http://www.sciencedirect.com/science/book/9781555583323</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Information security fundamentalsent://SD_ILS/0/SD_ILS:2891552024-11-15T14:55:40Z2024-11-15T14:55:40ZAuthor Peltier, Thomas R. Peltier, Justin. Blackley, John A.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9780203488652">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Multimedia security handbookent://SD_ILS/0/SD_ILS:2867602024-11-15T14:55:40Z2024-11-15T14:55:40ZAuthor Furht, Borivoje. Kirovski, Darko.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781420038262">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Pro PHP Securityent://SD_ILS/0/SD_ILS:1707622024-11-15T14:55:40Z2024-11-15T14:55:40ZAuthor Snyder, Chris. author. Southwell, Michael. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-1-4302-0057-4">http://dx.doi.org/10.1007/978-1-4302-0057-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Computer Network Securityent://SD_ILS/0/SD_ILS:1651132024-11-15T14:55:40Z2024-11-15T14:55:40ZAuthor Kizza, Joseph Migga. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/b106962">http://dx.doi.org/10.1007/b106962</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Network security technologiesent://SD_ILS/0/SD_ILS:2900772024-11-15T14:55:40Z2024-11-15T14:55:40ZAuthor Fung, K. T. (Kwok T.)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9780203330708">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Security in E-Learningent://SD_ILS/0/SD_ILS:1652242024-11-15T14:55:40Z2024-11-15T14:55:40ZAuthor Weippl, Edgar. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/b136702">http://dx.doi.org/10.1007/b136702</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>IM, instant messaging, securityent://SD_ILS/0/SD_ILS:2537252024-11-15T14:55:40Z2024-11-15T14:55:40ZAuthor Rittinghouse, John W. Ransome, James F.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781555583385">http://www.sciencedirect.com/science/book/9781555583385</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Information security management handbookent://SD_ILS/0/SD_ILS:2891512024-11-15T14:55:40Z2024-11-15T14:55:40ZAuthor Tipton, Harold F. Krause, Micki.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9780203325438">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Information security management handbookent://SD_ILS/0/SD_ILS:2903202024-11-15T14:55:40Z2024-11-15T14:55:40ZAuthor Tipton, Harold F. Krause, Micki.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781420003406">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Information security risk analysisent://SD_ILS/0/SD_ILS:2847642024-11-15T14:55:40Z2024-11-15T14:55:40ZAuthor Peltier, Thomas R.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781420031195">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Physical security for ITent://SD_ILS/0/SD_ILS:2538552024-11-15T14:55:40Z2024-11-15T14:55:40ZAuthor Erbschloe, Michael, 1951-<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781555583279">http://www.sciencedirect.com/science/book/9781555583279</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>A practical guide to security assessmentsent://SD_ILS/0/SD_ILS:2883062024-11-15T14:55:40Z2024-11-15T14:55:40ZAuthor Kairab, Sudhanshu.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9780203507230">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Encyclopedia of Cryptography and Securityent://SD_ILS/0/SD_ILS:1649302024-11-15T14:55:40Z2024-11-15T14:55:40ZAuthor Tilborg, Henk C. A. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/0-387-23483-7">http://dx.doi.org/10.1007/0-387-23483-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Information Processing and Security Systemsent://SD_ILS/0/SD_ILS:1652662024-11-15T14:55:40Z2024-11-15T14:55:40ZAuthor Saeed, Khalid. editor. Pejaś, Jerzy. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/b137371">http://dx.doi.org/10.1007/b137371</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Social Security, Demographics, and Riskent://SD_ILS/0/SD_ILS:1809032024-11-15T14:55:40Z2024-11-15T14:55:40ZAuthor Borgmann, Christoph. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/b137963">http://dx.doi.org/10.1007/b137963</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Information security management handbook. Vol. 2ent://SD_ILS/0/SD_ILS:2854412024-11-15T14:55:40Z2024-11-15T14:55:40ZAuthor Tipton, Harold F. Krause, Micki.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9780203005552">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Statistical methods in computer securityent://SD_ILS/0/SD_ILS:2886112024-11-15T14:55:40Z2024-11-15T14:55:40ZAuthor Chen, William W. S.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781420030884">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Climate change and global food securityent://SD_ILS/0/SD_ILS:2867652024-11-15T14:55:40Z2024-11-15T14:55:40ZAuthor Lal, R.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781420028614">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Network security a practical approachent://SD_ILS/0/SD_ILS:2537072024-11-15T14:55:40Z2024-11-15T14:55:40ZAuthor Harrington, Jan L.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780123116338">http://www.sciencedirect.com/science/book/9780123116338</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Saving Social security : a balanced approachent://SD_ILS/0/SD_ILS:1059182024-11-15T14:55:40Z2024-11-15T14:55:40ZAuthor Diamond, Peter A. Orszag, Peter R., ort. yaz.<br/>Preferred Shelf Number HD 7125 .D525 2005<br/>Format: Books<br/>Availability Beytepe Library~1<br/>Climate change and global food securityent://SD_ILS/0/SD_ILS:1103412024-11-15T14:55:40Z2024-11-15T14:55:40ZAuthor Lal, R.<br/>Preferred Shelf Number S600.7.C54 C652 2005<br/>Format: Books<br/>Availability Beytepe Library~1<br/>Optical and Digital Techniques for Information Securityent://SD_ILS/0/SD_ILS:1650902024-11-15T14:55:40Z2024-11-15T14:55:40ZAuthor Javidi, Bahram. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/b105098">http://dx.doi.org/10.1007/b105098</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Emerging Threats to Energy Security and Stabilityent://SD_ILS/0/SD_ILS:1689322024-11-15T14:55:40Z2024-11-15T14:55:40ZAuthor McPherson, Hugo. editor. Duncan Wood, W. editor. Robinson, Derek M. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/1-4020-3567-5">http://dx.doi.org/10.1007/1-4020-3567-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Network security evaluation using the NSA IEMent://SD_ILS/0/SD_ILS:2539452024-11-15T14:55:40Z2024-11-15T14:55:40ZAuthor Rogers, Russ. Cunningham, Bryan.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490351">http://www.sciencedirect.com/science/book/9781597490351</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Computer Security in the 21st Centuryent://SD_ILS/0/SD_ILS:1650012024-11-15T14:55:40Z2024-11-15T14:55:40ZAuthor Lee, D. T. editor. Shieh, S. P. editor. Tygar, J. D. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/b104203">http://dx.doi.org/10.1007/b104203</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Impacts and Risk Assessment of Technology for Internet Security Enabled Information Small-Medium Enterprises (TEISMES)ent://SD_ILS/0/SD_ILS:1652672024-11-15T14:55:40Z2024-11-15T14:55:40ZAuthor Shoniregun, Charles A. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/b137376">http://dx.doi.org/10.1007/b137376</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Black Hat physical device security exploiting hardware and softwareent://SD_ILS/0/SD_ILS:2540252024-11-15T14:55:40Z2024-11-15T14:55:40ZAuthor Miller, Drew, 1978-<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781932266818">http://www.sciencedirect.com/science/book/9781932266818</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Transboundary Water Resources: Strategies for Regional Security and Ecological Stability Proceedings of the NATO Advanced Research Workshop on Transboundary Water Resources: Strategies for Regional Security and Ecological Stability Novosibirsk, Russia 25–27 August, 2003ent://SD_ILS/0/SD_ILS:1688022024-11-15T14:55:40Z2024-11-15T14:55:40ZAuthor Vogtmann, Hartmut. editor. Dobretsov, Nikolai. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/1-4020-3082-7">http://dx.doi.org/10.1007/1-4020-3082-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Nessus, Snort, & Ethereal power tools customizing open source security applicationsent://SD_ILS/0/SD_ILS:2539422024-11-15T14:55:40Z2024-11-15T14:55:40ZAuthor Archibald, Neil. Ramirez, Gilbert, 1972- Rathaus, Noam. Syngress Media, Inc.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490207">http://www.sciencedirect.com/science/book/9781597490207</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Sequrity for computer networks : an introduction to data security in teleprocessing and electronic funds transferent://SD_ILS/0/SD_ILS:621882024-11-15T14:55:40Z2024-11-15T14:55:40ZAuthor Davies, Donald Watts, 1924- Price, W. L., ort.yaz.<br/>Preferred Shelf Number TK 5105 D43 1989<br/>Format: Books<br/>Availability Beytepe Library~1<br/>Producing security : multinational corporations, globalization, and the changing calculus of conflictent://SD_ILS/0/SD_ILS:3759172024-11-15T14:55:40Z2024-11-15T14:55:40ZAuthor Brooks, Stephen G., 1971- author.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://www.jstor.org/stable/10.2307/j.ctt7sjz7">http://www.jstor.org/stable/10.2307/j.ctt7sjz7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Developing strategies to deal with trauma in children a means of ensuring conflict prevention security and social stability : case study : 12-15-year-olds in Serbiaent://SD_ILS/0/SD_ILS:1245522024-11-15T14:55:40Z2024-11-15T14:55:40ZAuthor NATO Advanced Research Workshop on Developing Strategies to Deal with Post-Conflict Trauma in Children (2004 : Bratislava, Slovakia) Donnelly, Jill. ebrary, Inc.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://site.ebrary.com/lib/hacettepe/Doc?id=10130683">http://site.ebrary.com/lib/hacettepe/Doc?id=10130683</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Network Control and Engineering for QoS, Security and Mobility, III IFIP TC6 / WG6.2, 6.6, 6.7 and 6.8 Third International Conference on Network Control and Engineering for QoS, Security and Mobility, NetCon 2004 on November 2–5, 2004, Palma de Mallorca, Spainent://SD_ILS/0/SD_ILS:1648722024-11-15T14:55:40Z2024-11-15T14:55:40ZAuthor Gaïti, Dominique. editor. Galmés, Sebastià. editor. Puigjaner, Ramon. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/b100917">http://dx.doi.org/10.1007/b100917</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Privacy, Security and Trust within the Context of Pervasive Computingent://SD_ILS/0/SD_ILS:1649232024-11-15T14:55:40Z2024-11-15T14:55:40ZAuthor Robinson, Philip. editor. Vogt, Harald. editor. Wagealla, Waleed. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/b101573">http://dx.doi.org/10.1007/b101573</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Formal Aspects in Security and Trust IFIP TC1 WG1.7 Workshop on Formal Aspects in Security and Trust (FAST), World Computer Congress, August 22–27, 2004, Toulouse, Franceent://SD_ILS/0/SD_ILS:1650112024-11-15T14:55:40Z2024-11-15T14:55:40ZAuthor Dimitrakos, Theo. editor. Martinelli, Fabio. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/b104303">http://dx.doi.org/10.1007/b104303</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Communications and Multimedia Security 8th IFIP TC-6 TC-11 Conference on Communications and Multimedia Security, Sept. 15–18, 2004, Windermere, The Lake District, United Kingdoment://SD_ILS/0/SD_ILS:1650552024-11-15T14:55:40Z2024-11-15T14:55:40ZAuthor Chadwick, David. editor. Preneel, Bart. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/b105674">http://dx.doi.org/10.1007/b105674</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Advances in Cryptology - ASIACRYPT 2005 11th International Conference on the Theory and Application of Cryptology and Information Security, Chennai, India, December 4-8, 2005. Proceedingsent://SD_ILS/0/SD_ILS:1832542024-11-15T14:55:40Z2024-11-15T14:55:40ZAuthor Roy, Bimal. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/11593447">http://dx.doi.org/10.1007/11593447</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Cyberspace Security and Defense: Research Issues Proceedings of the NATO Advanced Research Workshop on Cyberspace Security and Defense: Research Issues Gdansk, Poland 6–9 September 2004ent://SD_ILS/0/SD_ILS:1688832024-11-15T14:55:40Z2024-11-15T14:55:40ZAuthor Kowalik, Janusz S. editor. Gorski, Janusz. editor. Sachenko, Anatoly. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/1-4020-3381-8">http://dx.doi.org/10.1007/1-4020-3381-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Security and Privacy in Ad-hoc and Sensor Networks Second European Workshop, ESAS 2005, Visegrad, Hungary, July 13-14, 2005. Revised Selected Papersent://SD_ILS/0/SD_ILS:1827822024-11-15T14:55:40Z2024-11-15T14:55:40ZAuthor Molva, Refik. editor. Tsudik, Gene. editor. Westhoff, Dirk. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/11601494">http://dx.doi.org/10.1007/11601494</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Financial Cryptography and Data Security 9th International Conference, FC 2005, Roseau, The Commonwealth Of Dominica, February 28 – March 3, 2005. Revised Papersent://SD_ILS/0/SD_ILS:1828272024-11-15T14:55:40Z2024-11-15T14:55:40ZAuthor Patrick, Andrew S. editor. Yung, Moti. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/b137875">http://dx.doi.org/10.1007/b137875</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Information Security 8th International Conference, ISC 2005, Singapore, September 20-23, 2005. Proceedingsent://SD_ILS/0/SD_ILS:1830032024-11-15T14:55:40Z2024-11-15T14:55:40ZAuthor Zhou, Jianying. editor. Lopez, Javier. editor. Deng, Robert H. editor. Bao, Feng. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/11556992">http://dx.doi.org/10.1007/11556992</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Foundations of Security Analysis and Design III FOSAD 2004/2005 Tutorial Lecturesent://SD_ILS/0/SD_ILS:1830092024-11-15T14:55:40Z2024-11-15T14:55:40ZAuthor Aldini, Alessandro. editor. Gorrieri, Roberto. editor. Martinelli, Fabio. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/11554578">http://dx.doi.org/10.1007/11554578</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Data and Applications Security XIX 19th Annual IFIP WG 11.3 Working Conference on Data and Applications Security, Storrs, CT, USA, August 7-10, 2005. Proceedingsent://SD_ILS/0/SD_ILS:1830102024-11-15T14:55:40Z2024-11-15T14:55:40ZAuthor Jajodia, Sushil. editor. Wijesekera, Duminda. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/11535706">http://dx.doi.org/10.1007/11535706</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Communications and Multimedia Security 9th IFIP TC-6 TC-11International Conference, CMS 2005, Salzburg, Austria, September 19 – 21, 2005. Proceedingsent://SD_ILS/0/SD_ILS:1830492024-11-15T14:55:40Z2024-11-15T14:55:40ZAuthor Dittmann, Jana. editor. Katzenbeisser, Stefan. editor. Uhl, Andreas. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/11552055">http://dx.doi.org/10.1007/11552055</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Information Security Practice and Experience First International Conference, ISPEC 2005, Singapore, April 11-14, 2005. Proceedingsent://SD_ILS/0/SD_ILS:1830502024-11-15T14:55:40Z2024-11-15T14:55:40ZAuthor Deng, Robert H. editor. Bao, Feng. editor. Pang, HweeHwa. editor. Zhou, Jianying. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/b107167">http://dx.doi.org/10.1007/b107167</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Computer Security – ESORICS 2005 10th European Symposium on Research in Computer Security, Milan, Italy, September 12-14, 2005. Proceedingsent://SD_ILS/0/SD_ILS:1830522024-11-15T14:55:40Z2024-11-15T14:55:40ZAuthor Vimercati, Sabrina de Capitani. editor. Syverson, Paul. editor. Gollmann, Dieter. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/11555827">http://dx.doi.org/10.1007/11555827</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Computer Network Security Third International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2005, St. Petersburg, Russia, September 24-28, 2005. Proceedingsent://SD_ILS/0/SD_ILS:1830662024-11-15T14:55:40Z2024-11-15T14:55:40ZAuthor Gorodetsky, Vladimir. editor. Kotenko, Igor. editor. Skormin, Victor. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/11560326">http://dx.doi.org/10.1007/11560326</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Computer Safety, Reliability, and Security 24th International Conference, SAFECOMP 2005, Fredrikstad, Norway, September 28-30, 2005. Proceedingsent://SD_ILS/0/SD_ILS:1830682024-11-15T14:55:40Z2024-11-15T14:55:40ZAuthor Winther, Rune. editor. Gran, Bjørn Axel. editor. Dahll, Gustav. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/11563228">http://dx.doi.org/10.1007/11563228</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Monitoring, Security, and Rescue Techniques in Multiagent Systemsent://SD_ILS/0/SD_ILS:1833132024-11-15T14:55:40Z2024-11-15T14:55:40ZAuthor Dunin-Kęplicz, Barbara. author. Jankowski, Andrzej. author. Skowron, Andrzej. author. Szczuka, Marcin. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/3-540-32370-8">http://dx.doi.org/10.1007/3-540-32370-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Information Systems Security First International Conference, ICISS 2005, Kolkata, India, December 19-21, 2005. Proceedingsent://SD_ILS/0/SD_ILS:1833642024-11-15T14:55:40Z2024-11-15T14:55:40ZAuthor Jajodia, Sushil. editor. Mazumdar, Chandan. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/11593980">http://dx.doi.org/10.1007/11593980</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Information Security and Cryptology First SKLOIS Conference, CISC 2005, Beijing, China, December 15-17, 2005. Proceedingsent://SD_ILS/0/SD_ILS:1833662024-11-15T14:55:40Z2024-11-15T14:55:40ZAuthor Feng, Dengguo. editor. Lin, Dongdai. editor. Yung, Moti. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/11599548">http://dx.doi.org/10.1007/11599548</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Security in Ad-hoc and Sensor Networks First European Workshop, ESAS 2004, Heidelberg, Germany, August 6, 2004, Revised Selected Papersent://SD_ILS/0/SD_ILS:1823282024-11-15T14:55:40Z2024-11-15T14:55:40ZAuthor Castelluccia, Claude. editor. Hartenstein, Hannes. editor. Paar, Christof. editor. Westhoff, Dirk. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/b105219">http://dx.doi.org/10.1007/b105219</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Security in Communication Networks 4th International Conference, SCN 2004, Amalfi, Italy, September 8-10, 2004, Revised Selected Papersent://SD_ILS/0/SD_ILS:1823942024-11-15T14:55:40Z2024-11-15T14:55:40ZAuthor Blundo, Carlo. editor. Cimato, Stelvio. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/b105083">http://dx.doi.org/10.1007/b105083</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Applied Cryptography and Network Security Third International Conference, ACNS 2005, New York, NY, USA, June 7-10, 2005. Proceedingsent://SD_ILS/0/SD_ILS:1827212024-11-15T14:55:40Z2024-11-15T14:55:40ZAuthor Ioannidis, John. editor. Keromytis, Angelos. editor. Yung, Moti. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/b137093">http://dx.doi.org/10.1007/b137093</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Computational Intelligence and Security International Conference, CIS 2005, Xi’an, China, December 15-19, 2005, Proceedings, Part IIent://SD_ILS/0/SD_ILS:1827692024-11-15T14:55:40Z2024-11-15T14:55:40ZAuthor Hao, Yue. editor. Liu, Jiming. editor. Wang, Yu-Ping. editor. Cheung, Yiu-ming. editor. Yin, Hujun. editor.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/11596981">http://dx.doi.org/10.1007/11596981</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Computational Intelligence and Security International Conference, CIS 2005, Xi’an, China, December 15-19, 2005, Proceedings Part Ient://SD_ILS/0/SD_ILS:1827702024-11-15T14:55:40Z2024-11-15T14:55:40ZAuthor Hao, Yue. editor. Liu, Jiming. editor. Wang, Yuping. editor. Cheung, Yiu-ming. editor. Yin, Hujun. editor.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/11596448">http://dx.doi.org/10.1007/11596448</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Information Security and Privacy 10th Australasian Conference, ACISP 2005, Brisbane, Australia, July 4-6, 2005. Proceedingsent://SD_ILS/0/SD_ILS:1828302024-11-15T14:55:40Z2024-11-15T14:55:40ZAuthor Boyd, Colin. editor. González Nieto, Juan Manuel. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/b137750">http://dx.doi.org/10.1007/b137750</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Trust, Privacy, and Security in Digital Business Second International Conference, TrustBus 2005, Copenhagen, Denmark, August 22-26, 2005. Proceedingsent://SD_ILS/0/SD_ILS:1828892024-11-15T14:55:40Z2024-11-15T14:55:40ZAuthor Katsikas, Sokratis. editor. López, Javier. editor. Pernul, Günther. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/11537878">http://dx.doi.org/10.1007/11537878</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Information Security Applications 5th International Workshop, WISA 2004, Jeju Island, Korea, August 23-25, 2004, Revised Selected Papersent://SD_ILS/0/SD_ILS:1829022024-11-15T14:55:40Z2024-11-15T14:55:40ZAuthor Lim, Chae Hoon. editor. Yung, Moti. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/b103174">http://dx.doi.org/10.1007/b103174</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Security Protocols 11th International Workshop, Cambridge, UK, April 2-4, 2003, Revised Selected Papersent://SD_ILS/0/SD_ILS:1829222024-11-15T14:55:40Z2024-11-15T14:55:40ZAuthor Christianson, Bruce. editor. Crispo, Bruno. editor. Malcolm, James A. editor. Roe, Michael. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/11542322">http://dx.doi.org/10.1007/11542322</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Security in Pervasive Computing Second International Conference, SPC 2005, Boppard, Germany, April 6-8, 2005. Proceedingsent://SD_ILS/0/SD_ILS:1830722024-11-15T14:55:40Z2024-11-15T14:55:40ZAuthor Hutter, Dieter. editor. Ullmann, Markus. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/b135497">http://dx.doi.org/10.1007/b135497</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Intelligence and Security Informatics IEEE International Conference on Intelligence and Security Informatics, ISI 2005, Atlanta, GA, USA, May 19-20, 2005. Proceedingsent://SD_ILS/0/SD_ILS:1831272024-11-15T14:55:40Z2024-11-15T14:55:40ZAuthor Kantor, Paul. editor. Muresan, Gheorghe. editor. Roberts, Fred. editor. Zeng, Daniel D. editor. Wang, Fei-Yue. editor.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/b136511">http://dx.doi.org/10.1007/b136511</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Information Security and Cryptology – ICISC 2004 7th International Conference, Seoul, Korea, December 2-3, 2004, Revised Selected Papersent://SD_ILS/0/SD_ILS:1831462024-11-15T14:55:40Z2024-11-15T14:55:40ZAuthor Park, Choon-sik. editor. Chee, Seongtaek. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/b137120">http://dx.doi.org/10.1007/b137120</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Information and Communications Security 7th International Conference, ICICS 2005, Beijing, China, December 10-13, 2005. Proceedingsent://SD_ILS/0/SD_ILS:1831622024-11-15T14:55:40Z2024-11-15T14:55:40ZAuthor Qing, Sihan. editor. Mao, Wenbo. editor. López, Javier. editor. Wang, Guilin. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/11602897">http://dx.doi.org/10.1007/11602897</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Cryptology and Network Security 4th International Conference, CANS 2005, Xiamen, China, December 14-16, 2005. Proceedingsent://SD_ILS/0/SD_ILS:1832832024-11-15T14:55:40Z2024-11-15T14:55:40ZAuthor Desmedt, Yvo G. editor. Wang, Huaxiong. editor. Mu, Yi. editor. Li, Yongqing. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/11599371">http://dx.doi.org/10.1007/11599371</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Information security and ethics social and organizational issuesent://SD_ILS/0/SD_ILS:1529662024-11-15T14:55:40Z2024-11-15T14:55:40ZAuthor Quigley, Marian.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access EBSCOhost <a href="http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=108396">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=108396</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Advances in Air Pollution Modeling for Environmental Security Proceedings of the NATO Advanced Research Workshop on Advances in Air Pollution Modeling for Environmental Security Borovetz, Bulgaria 8–12 May 2004ent://SD_ILS/0/SD_ILS:1688772024-11-15T14:55:40Z2024-11-15T14:55:40ZAuthor Faragó, István. editor. Georgiev, Krassimir. editor. Havasi, Ágnes. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/1-4020-3351-6">http://dx.doi.org/10.1007/1-4020-3351-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Enhanced Methods in Computer Security, Biometric and Artificial Intelligence Systemsent://SD_ILS/0/SD_ILS:1649312024-11-15T14:55:40Z2024-11-15T14:55:40ZAuthor Pejaś, Jerzy. editor. Piegat, Andrzej. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/b101135">http://dx.doi.org/10.1007/b101135</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Certification and Security in Inter-Organizational E-Serviceent://SD_ILS/0/SD_ILS:1650862024-11-15T14:55:40Z2024-11-15T14:55:40ZAuthor Nardelli, Enrico. editor. Talamo, Maurizio. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/11397427">http://dx.doi.org/10.1007/11397427</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Security and Privacy in the Age of Ubiquitous Computing IFIP TC11 20th International Information Security Conference May 30 – June 1, 2005, Chiba, Japanent://SD_ILS/0/SD_ILS:1651652024-11-15T14:55:40Z2024-11-15T14:55:40ZAuthor Sasaki, Ryoichi. editor. Qing, Sihan. editor. Okamoto, Eiji. editor. Yoshiura, Hiroshi. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/b135818">http://dx.doi.org/10.1007/b135818</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Net-Centric Approaches to Intelligence and National Securityent://SD_ILS/0/SD_ILS:1652422024-11-15T14:55:40Z2024-11-15T14:55:40ZAuthor Ladner, Roy. editor. Petry, Frederick E. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/b137009">http://dx.doi.org/10.1007/b137009</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Systems and human science, for safety, security, and dependability seleced papers of the 1st International Symposium SSR2003, Osaka, Japan, November 2003ent://SD_ILS/0/SD_ILS:2546032024-11-15T14:55:40Z2024-11-15T14:55:40ZAuthor International Symposium on Systems and Human Science (1st : 2003 : Osaka University) Arai, Tatsuo. Yamamoto, Shigeru, 1964- Makino, Kazuhisa. Ōsaka Daigaku.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780444518132">http://www.sciencedirect.com/science/book/9780444518132</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Bulletproof wireless security GSM, UMTS, 802.11 and ad hoc securityent://SD_ILS/0/SD_ILS:2547222024-11-15T14:55:40Z2024-11-15T14:55:40ZAuthor Chandra, Praphul.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780750677462">http://www.sciencedirect.com/science/book/9780750677462</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Assessing and managing security risk in IT systems a structured methodologyent://SD_ILS/0/SD_ILS:2854882024-11-15T14:55:40Z2024-11-15T14:55:40ZAuthor McCumber, John, 1956-<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9780203490426">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Disruptive security technologies with mobile code and peer-to-peer networksent://SD_ILS/0/SD_ILS:2913052024-11-15T14:55:40Z2024-11-15T14:55:40ZAuthor Brooks, R. R. (Richard R.)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781420038880">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Database and applications security integrating information security and data managementent://SD_ILS/0/SD_ILS:2845522024-11-15T14:55:40Z2024-11-15T14:55:40ZAuthor Thuraisingham, Bhavani M.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9780203486061">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Handbook of wireless local area networks applications, technology, security, and standardsent://SD_ILS/0/SD_ILS:2901502024-11-15T14:55:40Z2024-11-15T14:55:40ZAuthor Ilyas, Mohammad, 1953- Ahson, Syed.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9780203492512">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>The Market for Force The Consequences of Privatizing Securityent://SD_ILS/0/SD_ILS:2353942024-11-15T14:55:40Z2024-11-15T14:55:40ZAuthor Avant, Deborah D..<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1017/CBO9780511490866">Access by subscription</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>International Conflict and Security Law Essays in Memory of Hilaire McCoubreyent://SD_ILS/0/SD_ILS:2354282024-11-15T14:55:40Z2024-11-15T14:55:40ZAuthor Burchill, Richard. White, Nigel D.. Morris, Justin.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1017/CBO9780511495137">Access by subscription</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Managing an information security and privacy awareness and training programent://SD_ILS/0/SD_ILS:2847802024-11-15T14:55:40Z2024-11-15T14:55:40ZAuthor Herold, Rebecca.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781420031256">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Implementing database security and auditing a guide for DBAs, information security administrators and auditorsent://SD_ILS/0/SD_ILS:2538602024-11-15T14:55:40Z2024-11-15T14:55:40ZAuthor Ben-Natan, Ron.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781555583347">http://www.sciencedirect.com/science/book/9781555583347</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Sockets, shellcode, porting & coding reverse engineering exploits and tool coding for security professionalsent://SD_ILS/0/SD_ILS:2539382024-11-15T14:55:40Z2024-11-15T14:55:40ZAuthor Foster, James C. Price, Mike (Mike Morgan) McClure, Stuart.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490054">http://www.sciencedirect.com/science/book/9781597490054</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>AAA and network security for mobile access radius, diameter, EAP, PKI, and IP mobilityent://SD_ILS/0/SD_ILS:2957292024-11-15T14:55:40Z2024-11-15T14:55:40ZAuthor Nakhjiri, Madjid. Nakhjiri, Mahsa.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access John Wiley <a href="http://dx.doi.org/10.1002/0470017465">http://dx.doi.org/10.1002/0470017465</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Error correcting coding and security for data networks analysis of the superchannel conceptent://SD_ILS/0/SD_ILS:3011472024-11-15T14:55:40Z2024-11-15T14:55:40ZAuthor Kabatiansky, G. Krouk, E. Semenov, S. John Wiley & Sons.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access John Wiley <a href="http://dx.doi.org/10.1002/0470867574">http://dx.doi.org/10.1002/0470867574</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Enhanced methods in computer security, biometric and artificial intelligence systemsent://SD_ILS/0/SD_ILS:1098642024-11-15T14:55:40Z2024-11-15T14:55:40ZAuthor Pejas, Jerzy, 1954-, ed. Piegat, Andrzej, 1947-, ed.<br/>Preferred Shelf Number QA76.9.A25 E545 2005<br/>Format: Books<br/>Availability Beytepe Library~1<br/>The future of social security policy : women, work and a citizens basic incomeent://SD_ILS/0/SD_ILS:1157972024-11-15T14:55:40Z2024-11-15T14:55:40ZAuthor McKay, Ailsa.<br/>Preferred Shelf Number HC79.P63 M34 2005<br/>Format: Books<br/>Availability Beytepe Library~1<br/>Designing security a Windows server 2003 network (70-298) : textbookent://SD_ILS/0/SD_ILS:1067452024-11-15T14:55:40Z2024-11-15T14:55:40ZAuthor Northrup, Tony.<br/>Preferred Shelf Number QA76.3 .N877 2005T<br/>Format: Books<br/>Availability Beytepe Library~1<br/>Designing security a Windows server 2003 network (70-298) : Lab manualent://SD_ILS/0/SD_ILS:1124402024-11-15T14:55:40Z2024-11-15T14:55:40ZAuthor Northrup, Tony.<br/>Preferred Shelf Number QA76.3 .N877 2005<br/>Format: Books<br/>Availability Beytepe Library~1<br/>Developing strategies to deal with trauma in children.: a means of ensuring conflict prevention security and social stability : case study : 12-15-year-olds in Serbiaent://SD_ILS/0/SD_ILS:1157412024-11-15T14:55:40Z2024-11-15T14:55:40ZAuthor NATO Advanced Research Workshop on Developing Strategies to Deal with Post-Conflict Trauma in Children (2004 : Bratislava, Slovakia) Donnelly, Jill.<br/>Preferred Shelf Number RJ506.P55 N38 2005<br/>Format: Books<br/>Availability Beytepe Library~1<br/>Immigration Phobia and the Security Dilemma Russia, Europe, and the United Statesent://SD_ILS/0/SD_ILS:2350052024-11-15T14:55:40Z2024-11-15T14:55:40ZAuthor Alexseev, Mikhail A..<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1017/CBO9780511528064">Access by subscription</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Human development report 2005 : International cooperation at a crossroads: Aid, trade and security in an unegual world.ent://SD_ILS/0/SD_ILS:1055672024-11-15T14:55:40Z2024-11-15T14:55:40ZPreferred Shelf Number HD72 H85 2005<br/>Format: Books<br/>Availability Beytepe Library~1<br/>The Austin Protocol Compilerent://SD_ILS/0/SD_ILS:1648762024-11-15T14:55:40Z2024-11-15T14:55:40ZAuthor McGuire, Tommy M. author. Gouda, Mohamed G. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/b101038">http://dx.doi.org/10.1007/b101038</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Intrusion Detection and Correlation Challenges and Solutionsent://SD_ILS/0/SD_ILS:1649192024-11-15T14:55:40Z2024-11-15T14:55:40ZAuthor Kruegel, Christopher. author. Valeur, Fredrik. author. Vigna, Giovanni. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/b101493">http://dx.doi.org/10.1007/b101493</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Image and Video Encryption From Digital Rights Management to Secured Personal Communicationent://SD_ILS/0/SD_ILS:1649202024-11-15T14:55:40Z2024-11-15T14:55:40ZAuthor Jajodia, Sushil. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/b101495">http://dx.doi.org/10.1007/b101495</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Case studies and theory development in the social sciencesent://SD_ILS/0/SD_ILS:1157672024-11-15T14:55:40Z2024-11-15T14:55:40ZAuthor George, Alexander L. Bennett, Andrew, 1956-<br/>Preferred Shelf Number H61 .G46 2005<br/>Format: Books<br/>Availability Beytepe Library~1<br/>Güvenlik Çalışmaları Dergisi.ent://SD_ILS/0/SD_ILS:3429202024-11-15T14:55:40Z2024-11-15T14:55:40ZFormat: Continuing Resources Other<br/>Availability ~0<br/>İş Hukuku ve Sosyal Güvenlik Hukuku Dergisi .ent://SD_ILS/0/SD_ILS:3717492024-11-15T14:55:40Z2024-11-15T14:55:40ZFormat: Continuing Resources Other<br/>Availability ~0<br/>NATO AND TERRORISM Catastrophic Terrorism and First Responders: Threats and Mitigation Proceedings of the Nato Advanced Research Workshop on Catastrophic Terrorism and First Responders: Threats and Mitigation Neuhausen-Stuttgart, Germany 10–12 May 2004ent://SD_ILS/0/SD_ILS:1521582024-11-15T14:55:40Z2024-11-15T14:55:40ZAuthor Steinhäusler, Friedrich. Edwards, Frances. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/1-4020-3585-3">http://dx.doi.org/10.1007/1-4020-3585-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Defense against Bioterror Detection Technologies, Implementation Strategies and Commercial Opportunitiesent://SD_ILS/0/SD_ILS:1688842024-11-15T14:55:40Z2024-11-15T14:55:40ZAuthor Morrison, Dennis. editor. Milanovich, Fred. editor. Ivnitski, Dmitri. editor. Austin, Thomas R. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/1-4020-3384-2">http://dx.doi.org/10.1007/1-4020-3384-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>From Cells to Proteins: Imaging Nature across Dimensions Proceedings of the NATO Advanced Study Institute on From Cells to Proteins: Imaging Nature across Dimensions Pisa, Italy 12–23 September 2004ent://SD_ILS/0/SD_ILS:1689462024-11-15T14:55:40Z2024-11-15T14:55:40ZAuthor Evangelista, Valtere. editor. Barsanti, Laura. editor. Passarelli, Vincenzo. editor. Gualtieri, Paolo. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/1-4020-3616-7">http://dx.doi.org/10.1007/1-4020-3616-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Equidosimetry — Ecological Standardization and Equidosimetry for Radioecology and Environmental Ecology Proceedings of the NATO Advanced Research Workshop on Ecological Standardization and Equidosimetry for Radioecology and Environmental Ecology Kiev, Ukraine 14–20 April 2002ent://SD_ILS/0/SD_ILS:1689582024-11-15T14:55:40Z2024-11-15T14:55:40ZAuthor Bréchignac, F. editor. Desmet, G. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/1-4020-3650-7">http://dx.doi.org/10.1007/1-4020-3650-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Configuring Check Point NGX VPN-1/fire wall-ent://SD_ILS/0/SD_ILS:2539432024-11-15T14:55:40Z2024-11-15T14:55:40ZAuthor Stephens, Robert. Stiefel, Barry J. Watkins, Stephen (Information security professional)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490313">http://www.sciencedirect.com/science/book/9781597490313</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Polis bilimleri dergisi = Turkish journal of police studiesent://SD_ILS/0/SD_ILS:2293192024-11-15T14:55:40Z2024-11-15T14:55:40ZElectronic Access <a href="http://www.pa.edu.tr/?app=ED77B64B-C77A-47E1-89ED-FB78A53019E4">Elektronik Eri?im</a><br/>Format: Continuing Resources Other<br/>Availability ~0<br/>The Law and Economics of Cybersecurityent://SD_ILS/0/SD_ILS:2355182024-11-15T14:55:40Z2024-11-15T14:55:40ZAuthor Grady, Mark F.. Parisi, Francesco.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1017/CBO9780511511523">Access by subscription</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Beginning cryptography with Javaent://SD_ILS/0/SD_ILS:1442032024-11-15T14:55:40Z2024-11-15T14:55:40ZAuthor Hook, David, 1962-<br/>Preferred Shelf Number ONLINE<br/>Electronic Access EBSCOhost <a href="http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=142234">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=142234</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Advances in Elliptic Curve Cryptographyent://SD_ILS/0/SD_ILS:2360582024-11-15T14:55:40Z2024-11-15T14:55:40ZAuthor Blake, Ian F.. Seroussi, Gadiel. Smart, Nigel P..<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1017/CBO9780511546570">Access by subscription</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Trusted Computingent://SD_ILS/0/SD_ILS:2478712024-11-15T14:55:40Z2024-11-15T14:55:40ZAuthor Mitchell, Chris, ed.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1049/PBPC006E">http://dx.doi.org/10.1049/PBPC006E</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Stealing the network how to own an identityent://SD_ILS/0/SD_ILS:2536632024-11-15T14:55:40Z2024-11-15T14:55:40ZAuthor Alder, Raven. Mullen, Timothy M. Long, Johnny.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490061">http://www.sciencedirect.com/science/book/9781597490061</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Software piracy exposedent://SD_ILS/0/SD_ILS:2536642024-11-15T14:55:40Z2024-11-15T14:55:40ZAuthor Craig, Paul. Honick, Ron. Burnett, Mark (Mark M.)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781932266986">http://www.sciencedirect.com/science/book/9781932266986</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Cisco PIX firewalls configure, manage, & troubleshootent://SD_ILS/0/SD_ILS:2536672024-11-15T14:55:40Z2024-11-15T14:55:40ZAuthor Behrens, Thorsten. Riley, Charles. Khan, Umer.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490047">http://www.sciencedirect.com/science/book/9781597490047</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Aggressive network self-defenseent://SD_ILS/0/SD_ILS:2536722024-11-15T14:55:40Z2024-11-15T14:55:40ZAuthor Wyler, Neil R.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836203">http://www.sciencedirect.com/science/book/9781931836203</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Cyber spying tracking your family's (sometimes) secret online livesent://SD_ILS/0/SD_ILS:2536732024-11-15T14:55:40Z2024-11-15T14:55:40ZAuthor Fair, Ted. Nordfelt, Michael. Ring, Sandra. Cole, Eric.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836418">http://www.sciencedirect.com/science/book/9781931836418</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>InfoSec career hacking sell your skillz, not your soulent://SD_ILS/0/SD_ILS:2536812024-11-15T14:55:40Z2024-11-15T14:55:40ZAuthor Bayles, Aaron W. Brindley, Ed. Foster, James C. Hurley, Chris. Long, Johnny.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490115">http://www.sciencedirect.com/science/book/9781597490115</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>The counterterrorism handbook tactics, procedures, and techniquesent://SD_ILS/0/SD_ILS:2868622024-11-15T14:55:40Z2024-11-15T14:55:40ZAuthor Bolz, Frank, 1930- Dudonis, Kenneth J. Schulz, David P.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781420057904">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>The ethical hack a framework for business value penetration testingent://SD_ILS/0/SD_ILS:2883102024-11-15T14:55:40Z2024-11-15T14:55:40ZAuthor Tiller, James S.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9780203495414">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Codes the guide to secrecy from ancient to modern timesent://SD_ILS/0/SD_ILS:2848652024-11-15T14:55:40Z2024-11-15T14:55:40ZAuthor Mollin, Richard A., 1947-<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781420035087">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Scalable and secure internet services and architectureent://SD_ILS/0/SD_ILS:2857962024-11-15T14:55:40Z2024-11-15T14:55:40ZAuthor Xu, Chengzhong.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781420035209">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Cryptography, information theory, and error-correction a handbook for the 21st centuryent://SD_ILS/0/SD_ILS:3018602024-11-15T14:55:40Z2024-11-15T14:55:40ZAuthor Bruen, Aiden A., 1941- Forcinito, Mario, 1962- Wiley InterScience (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access Wiley InterScience <a href="http://dx.doi.org/10.1002/9781118033296">An electronic book accessible through the World Wide Web; click for information</a>
Contributor biographical information <a href="http://catdir.loc.gov/catdir/enhancements/fy0618/2004058044-b.html">http://catdir.loc.gov/catdir/enhancements/fy0618/2004058044-b.html</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Global Anti-Terrorism Law and Policyent://SD_ILS/0/SD_ILS:2380912024-11-15T14:55:40Z2024-11-15T14:55:40ZAuthor Ramraj, Victor V.. Hor, Michael. Roach, Kent.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1017/CBO9780511493874">Access by subscription</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Configuring NetScreen firewallsent://SD_ILS/0/SD_ILS:2540162024-11-15T14:55:40Z2024-11-15T14:55:40ZAuthor Cameron, Rob.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781932266399">http://www.sciencedirect.com/science/book/9781932266399</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Intrusion prevention and active response deploying network and host IPSent://SD_ILS/0/SD_ILS:2540172024-11-15T14:55:40Z2024-11-15T14:55:40ZAuthor Rash, Michael (Michael Brandon)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781932266474">http://www.sciencedirect.com/science/book/9781932266474</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Buffer overflow attacks detect, exploit, preventent://SD_ILS/0/SD_ILS:2540232024-11-15T14:55:40Z2024-11-15T14:55:40ZAuthor Foster, James C.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781932266672">http://www.sciencedirect.com/science/book/9781932266672</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Acing the security+ certification exament://SD_ILS/0/SD_ILS:3134922024-11-15T14:55:40Z2024-11-15T14:55:40ZAuthor Regan, Patrick E.<br/>Preferred Shelf Number QA76.3 R455 2005<br/>Format: Books<br/>Availability Beytepe Library~1<br/>Curing the patch management headacheent://SD_ILS/0/SD_ILS:2847782024-11-15T14:55:40Z2024-11-15T14:55:40ZAuthor Nicastro, Felicia M.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781420031294">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Firewalls jumpstart for network and systems administratorsent://SD_ILS/0/SD_ILS:2538422024-11-15T14:55:40Z2024-11-15T14:55:40ZAuthor Vacca, John R. Ellis, Scott (Scott Raymond), 1968-<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781555582975">http://www.sciencedirect.com/science/book/9781555582975</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Business continuity and disaster recovery for infosec managersent://SD_ILS/0/SD_ILS:2538622024-11-15T14:55:40Z2024-11-15T14:55:40ZAuthor Rittinghouse, John W. Ransome, James F.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781555583392">http://www.sciencedirect.com/science/book/9781555583392</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Host integrity monitoring using Osiris and Samhainent://SD_ILS/0/SD_ILS:2539402024-11-15T14:55:40Z2024-11-15T14:55:40ZAuthor Wotring, Brian. Potter, Bruce. Ranum, Marcus J.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490184">http://www.sciencedirect.com/science/book/9781597490184</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Hacking a terror network the silent threat of covert channelsent://SD_ILS/0/SD_ILS:2539872024-11-15T14:55:40Z2024-11-15T14:55:40ZAuthor Rogers, Russ.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781928994985">http://www.sciencedirect.com/science/book/9781928994985</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>How policies make citizens : senior political activism and the American welfare stateent://SD_ILS/0/SD_ILS:3759152024-11-15T14:55:40Z2024-11-15T14:55:40ZAuthor Campbell, Andrea Louise, 1966-<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://www.jstor.org/stable/10.2307/j.ctt7rtmp">http://www.jstor.org/stable/10.2307/j.ctt7rtmp</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Sorulu cevaplı yeni iş hukuku uygulamasıent://SD_ILS/0/SD_ILS:1020772024-11-15T14:55:40Z2024-11-15T14:55:40ZAuthor İnciroğlu, Lütfi.<br/>Preferred Shelf Number KKX1270 .I53 2005<br/>Format: Books<br/>Availability Law Library~1<br/>Soru ve yanıtlarla iş sözleşmesinin feshi ve iş güvencesient://SD_ILS/0/SD_ILS:1020782024-11-15T14:55:40Z2024-11-15T14:55:40ZAuthor Çalık, Şefik.<br/>Preferred Shelf Number KKX 1279 .C25 2005<br/>Format: Books<br/>Availability Law Library~1<br/>Küresel çatışmanın yeni alanları : kaynak savaşlarıent://SD_ILS/0/SD_ILS:1031052024-11-15T14:55:40Z2024-11-15T14:55:40ZAuthor Klare, Michael T., 1942- İnciler, Özge, çev.<br/>Preferred Shelf Number UA 23 .K5320 2004<br/>Format: Books<br/>Availability Beytepe Library~1<br/>Güvenlik sektörünün parlamenter gözetimi : ilkeler, mekanizmalar ve uygulamalarent://SD_ILS/0/SD_ILS:1071402024-11-15T14:55:40Z2024-11-15T14:55:40ZAuthor Born, Hans. Kaliber, Esra Ortakan, çev. Kaliber, Alper, çev.<br/>Preferred Shelf Number UA10.5 .B67 2005<br/>Format: Books<br/>Availability Beytepe Library~1<br/>Özel güvenlik tedbirlerient://SD_ILS/0/SD_ILS:1144302024-11-15T14:55:40Z2024-11-15T14:55:40ZAuthor Ünsal, Faruk İpekoğlu, Murat.<br/>Preferred Shelf Number HV8291.T9 U573 2005<br/>Format: Books<br/>Availability Beytepe Library~1<br/>TCP / IP ve ağ güvenliği : teori ve uygulamalar ileent://SD_ILS/0/SD_ILS:1128132024-11-15T14:55:40Z2024-11-15T14:55:40ZAuthor Dirican, Can Okan.<br/>Preferred Shelf Number TK 5105.55 D5753 2005<br/>Format: Books<br/>Availability Beytepe Library~2<br/>İş güvencesi hukuku : işe iade davalarıent://SD_ILS/0/SD_ILS:1018152024-11-15T14:55:40Z2024-11-15T14:55:40ZAuthor Bilgili, Abbas.<br/>Preferred Shelf Number KKX 1279 .B55 2005<br/>Format: Books<br/>Availability Law Library~1<br/>Ulus devletin çöküşü : Yirmi birinci yüzyılda kaos ve düzenent://SD_ILS/0/SD_ILS:1040402024-11-15T14:55:40Z2024-11-15T14:55:40ZAuthor Cooper, Robert, 1947- Karahan, Berrin.<br/>Preferred Shelf Number JZ1308 .C6620 2005<br/>Format: Books<br/>Availability Beytepe Library~1<br/>European Union with Turkey : the possible impact of Turkey's membership on the European Unionent://SD_ILS/0/SD_ILS:1042772024-11-15T14:55:40Z2024-11-15T14:55:40ZAuthor Laçiner, Sedat. Özcan, Mehmet. Bal, İhsan.<br/>Preferred Shelf Number HC241.25.T9 L3 2005<br/>Format: Books<br/>Availability Beytepe Library~2<br/>