Search Results for Security. - Narrowed by: 2005 SirsiDynix Enterprise https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dSecurity.$0026qf$003dPUBDATE$002509Publication$002bDate$0025092005$0025092005$0026te$003dILS$0026ps$003d300$0026isd$003dtrue? 2024-11-15T16:32:58Z VoIP security ent://SD_ILS/0/SD_ILS:253715 2024-11-15T16:32:58Z 2024-11-15T16:32:58Z Author&#160;Ransome, James F.&#160;Rittinghouse, John W.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781555583323">http://www.sciencedirect.com/science/book/9781555583323</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information security fundamentals ent://SD_ILS/0/SD_ILS:289155 2024-11-15T16:32:58Z 2024-11-15T16:32:58Z Author&#160;Peltier, Thomas R.&#160;Peltier, Justin.&#160;Blackley, John A.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9780203488652">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Multimedia security handbook ent://SD_ILS/0/SD_ILS:286760 2024-11-15T16:32:58Z 2024-11-15T16:32:58Z Author&#160;Furht, Borivoje.&#160;Kirovski, Darko.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781420038262">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer Network Security ent://SD_ILS/0/SD_ILS:165113 2024-11-15T16:32:58Z 2024-11-15T16:32:58Z Author&#160;Kizza, Joseph Migga. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/b106962">http://dx.doi.org/10.1007/b106962</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Pro PHP Security ent://SD_ILS/0/SD_ILS:170762 2024-11-15T16:32:58Z 2024-11-15T16:32:58Z Author&#160;Snyder, Chris. author.&#160;Southwell, Michael. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-1-4302-0057-4">http://dx.doi.org/10.1007/978-1-4302-0057-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Network security technologies ent://SD_ILS/0/SD_ILS:290077 2024-11-15T16:32:58Z 2024-11-15T16:32:58Z Author&#160;Fung, K. T. (Kwok T.)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9780203330708">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security in E-Learning ent://SD_ILS/0/SD_ILS:165224 2024-11-15T16:32:58Z 2024-11-15T16:32:58Z Author&#160;Weippl, Edgar. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/b136702">http://dx.doi.org/10.1007/b136702</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> IM, instant messaging, security ent://SD_ILS/0/SD_ILS:253725 2024-11-15T16:32:58Z 2024-11-15T16:32:58Z Author&#160;Rittinghouse, John W.&#160;Ransome, James F.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781555583385">http://www.sciencedirect.com/science/book/9781555583385</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information security management handbook ent://SD_ILS/0/SD_ILS:290320 2024-11-15T16:32:58Z 2024-11-15T16:32:58Z Author&#160;Tipton, Harold F.&#160;Krause, Micki.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781420003406">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information security management handbook ent://SD_ILS/0/SD_ILS:289151 2024-11-15T16:32:58Z 2024-11-15T16:32:58Z Author&#160;Tipton, Harold F.&#160;Krause, Micki.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9780203325438">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information security risk analysis ent://SD_ILS/0/SD_ILS:284764 2024-11-15T16:32:58Z 2024-11-15T16:32:58Z Author&#160;Peltier, Thomas R.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781420031195">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Physical security for IT ent://SD_ILS/0/SD_ILS:253855 2024-11-15T16:32:58Z 2024-11-15T16:32:58Z Author&#160;Erbschloe, Michael, 1951-<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781555583279">http://www.sciencedirect.com/science/book/9781555583279</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> A practical guide to security assessments ent://SD_ILS/0/SD_ILS:288306 2024-11-15T16:32:58Z 2024-11-15T16:32:58Z Author&#160;Kairab, Sudhanshu.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9780203507230">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Processing and Security Systems ent://SD_ILS/0/SD_ILS:165266 2024-11-15T16:32:58Z 2024-11-15T16:32:58Z Author&#160;Saeed, Khalid. editor.&#160;Peja&#347;, Jerzy. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/b137371">http://dx.doi.org/10.1007/b137371</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Encyclopedia of Cryptography and Security ent://SD_ILS/0/SD_ILS:164930 2024-11-15T16:32:58Z 2024-11-15T16:32:58Z Author&#160;Tilborg, Henk C. A. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/0-387-23483-7">http://dx.doi.org/10.1007/0-387-23483-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Social Security, Demographics, and Risk ent://SD_ILS/0/SD_ILS:180903 2024-11-15T16:32:58Z 2024-11-15T16:32:58Z Author&#160;Borgmann, Christoph. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/b137963">http://dx.doi.org/10.1007/b137963</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Network security a practical approach ent://SD_ILS/0/SD_ILS:253707 2024-11-15T16:32:58Z 2024-11-15T16:32:58Z Author&#160;Harrington, Jan L.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780123116338">http://www.sciencedirect.com/science/book/9780123116338</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Statistical methods in computer security ent://SD_ILS/0/SD_ILS:288611 2024-11-15T16:32:58Z 2024-11-15T16:32:58Z Author&#160;Chen, William W. S.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781420030884">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information security management handbook. Vol. 2 ent://SD_ILS/0/SD_ILS:285441 2024-11-15T16:32:58Z 2024-11-15T16:32:58Z Author&#160;Tipton, Harold F.&#160;Krause, Micki.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9780203005552">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Climate change and global food security ent://SD_ILS/0/SD_ILS:110341 2024-11-15T16:32:58Z 2024-11-15T16:32:58Z Author&#160;Lal, R.<br/>Preferred Shelf Number&#160;S600.7.C54 C652 2005<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Saving Social security : a balanced approach ent://SD_ILS/0/SD_ILS:105918 2024-11-15T16:32:58Z 2024-11-15T16:32:58Z Author&#160;Diamond, Peter A.&#160;Orszag, Peter R., ort. yaz.<br/>Preferred Shelf Number&#160;HD 7125 .D525 2005<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Climate change and global food security ent://SD_ILS/0/SD_ILS:286765 2024-11-15T16:32:58Z 2024-11-15T16:32:58Z Author&#160;Lal, R.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781420028614">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Optical and Digital Techniques for Information Security ent://SD_ILS/0/SD_ILS:165090 2024-11-15T16:32:58Z 2024-11-15T16:32:58Z Author&#160;Javidi, Bahram. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/b105098">http://dx.doi.org/10.1007/b105098</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Network security evaluation using the NSA IEM ent://SD_ILS/0/SD_ILS:253945 2024-11-15T16:32:58Z 2024-11-15T16:32:58Z Author&#160;Rogers, Russ.&#160;Cunningham, Bryan.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490351">http://www.sciencedirect.com/science/book/9781597490351</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Emerging Threats to Energy Security and Stability ent://SD_ILS/0/SD_ILS:168932 2024-11-15T16:32:58Z 2024-11-15T16:32:58Z Author&#160;McPherson, Hugo. editor.&#160;Duncan Wood, W. editor.&#160;Robinson, Derek M. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/1-4020-3567-5">http://dx.doi.org/10.1007/1-4020-3567-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer Security in the 21st Century ent://SD_ILS/0/SD_ILS:165001 2024-11-15T16:32:58Z 2024-11-15T16:32:58Z Author&#160;Lee, D. T. editor.&#160;Shieh, S. P. editor.&#160;Tygar, J. D. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/b104203">http://dx.doi.org/10.1007/b104203</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Impacts and Risk Assessment of Technology for Internet Security Enabled Information Small-Medium Enterprises (TEISMES) ent://SD_ILS/0/SD_ILS:165267 2024-11-15T16:32:58Z 2024-11-15T16:32:58Z Author&#160;Shoniregun, Charles A. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/b137376">http://dx.doi.org/10.1007/b137376</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Black Hat physical device security exploiting hardware and software ent://SD_ILS/0/SD_ILS:254025 2024-11-15T16:32:58Z 2024-11-15T16:32:58Z Author&#160;Miller, Drew, 1978-<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781932266818">http://www.sciencedirect.com/science/book/9781932266818</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Transboundary Water Resources: Strategies for Regional Security and Ecological Stability Proceedings of the NATO Advanced Research Workshop on Transboundary Water Resources: Strategies for Regional Security and Ecological Stability Novosibirsk, Russia 25&ndash;27 August, 2003 ent://SD_ILS/0/SD_ILS:168802 2024-11-15T16:32:58Z 2024-11-15T16:32:58Z Author&#160;Vogtmann, Hartmut. editor.&#160;Dobretsov, Nikolai. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/1-4020-3082-7">http://dx.doi.org/10.1007/1-4020-3082-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Nessus, Snort, &amp; Ethereal power tools customizing open source security applications ent://SD_ILS/0/SD_ILS:253942 2024-11-15T16:32:58Z 2024-11-15T16:32:58Z Author&#160;Archibald, Neil.&#160;Ramirez, Gilbert, 1972-&#160;Rathaus, Noam.&#160;Syngress Media, Inc.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490207">http://www.sciencedirect.com/science/book/9781597490207</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Sequrity for computer networks : an introduction to data security in teleprocessing and electronic funds transfer ent://SD_ILS/0/SD_ILS:62188 2024-11-15T16:32:58Z 2024-11-15T16:32:58Z Author&#160;Davies, Donald Watts, 1924-&#160;Price, W. L., ort.yaz.<br/>Preferred Shelf Number&#160;TK 5105 D43 1989<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Producing security : multinational corporations, globalization, and the changing calculus of conflict ent://SD_ILS/0/SD_ILS:375917 2024-11-15T16:32:58Z 2024-11-15T16:32:58Z Author&#160;Brooks, Stephen G., 1971- author.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://www.jstor.org/stable/10.2307/j.ctt7sjz7">http://www.jstor.org/stable/10.2307/j.ctt7sjz7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Certification and Security in Inter-Organizational E-Service ent://SD_ILS/0/SD_ILS:165086 2024-11-15T16:32:58Z 2024-11-15T16:32:58Z Author&#160;Nardelli, Enrico. editor.&#160;Talamo, Maurizio. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/11397427">http://dx.doi.org/10.1007/11397427</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security and Privacy in the Age of Ubiquitous Computing IFIP TC11 20th International Information Security Conference May 30 &ndash; June 1, 2005, Chiba, Japan ent://SD_ILS/0/SD_ILS:165165 2024-11-15T16:32:58Z 2024-11-15T16:32:58Z Author&#160;Sasaki, Ryoichi. editor.&#160;Qing, Sihan. editor.&#160;Okamoto, Eiji. editor.&#160;Yoshiura, Hiroshi. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/b135818">http://dx.doi.org/10.1007/b135818</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information security and ethics social and organizational issues ent://SD_ILS/0/SD_ILS:152966 2024-11-15T16:32:58Z 2024-11-15T16:32:58Z Author&#160;Quigley, Marian.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;EBSCOhost <a href="http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=108396">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=108396</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Network Control and Engineering for QoS, Security and Mobility, III IFIP TC6 / WG6.2, 6.6, 6.7 and 6.8 Third International Conference on Network Control and Engineering for QoS, Security and Mobility, NetCon 2004 on November 2&ndash;5, 2004, Palma de Mallorca, Spain ent://SD_ILS/0/SD_ILS:164872 2024-11-15T16:32:58Z 2024-11-15T16:32:58Z Author&#160;Ga&iuml;ti, Dominique. editor.&#160;Galm&eacute;s, Sebasti&agrave;. editor.&#160;Puigjaner, Ramon. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/b100917">http://dx.doi.org/10.1007/b100917</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Privacy, Security and Trust within the Context of Pervasive Computing ent://SD_ILS/0/SD_ILS:164923 2024-11-15T16:32:58Z 2024-11-15T16:32:58Z Author&#160;Robinson, Philip. editor.&#160;Vogt, Harald. editor.&#160;Wagealla, Waleed. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/b101573">http://dx.doi.org/10.1007/b101573</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Enhanced Methods in Computer Security, Biometric and Artificial Intelligence Systems ent://SD_ILS/0/SD_ILS:164931 2024-11-15T16:32:58Z 2024-11-15T16:32:58Z Author&#160;Peja&#347;, Jerzy. editor.&#160;Piegat, Andrzej. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/b101135">http://dx.doi.org/10.1007/b101135</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Formal Aspects in Security and Trust IFIP TC1 WG1.7 Workshop on Formal Aspects in Security and Trust (FAST), World Computer Congress, August 22&ndash;27, 2004, Toulouse, France ent://SD_ILS/0/SD_ILS:165011 2024-11-15T16:32:58Z 2024-11-15T16:32:58Z Author&#160;Dimitrakos, Theo. editor.&#160;Martinelli, Fabio. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/b104303">http://dx.doi.org/10.1007/b104303</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Communications and Multimedia Security 8th IFIP TC-6 TC-11 Conference on Communications and Multimedia Security, Sept. 15&ndash;18, 2004, Windermere, The Lake District, United Kingdom ent://SD_ILS/0/SD_ILS:165055 2024-11-15T16:32:58Z 2024-11-15T16:32:58Z Author&#160;Chadwick, David. editor.&#160;Preneel, Bart. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/b105674">http://dx.doi.org/10.1007/b105674</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Net-Centric Approaches to Intelligence and National Security ent://SD_ILS/0/SD_ILS:165242 2024-11-15T16:32:58Z 2024-11-15T16:32:58Z Author&#160;Ladner, Roy. editor.&#160;Petry, Frederick E. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/b137009">http://dx.doi.org/10.1007/b137009</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Applied Cryptography and Network Security Third International Conference, ACNS 2005, New York, NY, USA, June 7-10, 2005. Proceedings ent://SD_ILS/0/SD_ILS:182721 2024-11-15T16:32:58Z 2024-11-15T16:32:58Z Author&#160;Ioannidis, John. editor.&#160;Keromytis, Angelos. editor.&#160;Yung, Moti. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/b137093">http://dx.doi.org/10.1007/b137093</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security 8th International Conference, ISC 2005, Singapore, September 20-23, 2005. Proceedings ent://SD_ILS/0/SD_ILS:183003 2024-11-15T16:32:58Z 2024-11-15T16:32:58Z Author&#160;Zhou, Jianying. editor.&#160;Lopez, Javier. editor.&#160;Deng, Robert H. editor.&#160;Bao, Feng. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/11556992">http://dx.doi.org/10.1007/11556992</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Foundations of Security Analysis and Design III FOSAD 2004/2005 Tutorial Lectures ent://SD_ILS/0/SD_ILS:183009 2024-11-15T16:32:58Z 2024-11-15T16:32:58Z Author&#160;Aldini, Alessandro. editor.&#160;Gorrieri, Roberto. editor.&#160;Martinelli, Fabio. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/11554578">http://dx.doi.org/10.1007/11554578</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Data and Applications Security XIX 19th Annual IFIP WG 11.3 Working Conference on Data and Applications Security, Storrs, CT, USA, August 7-10, 2005. Proceedings ent://SD_ILS/0/SD_ILS:183010 2024-11-15T16:32:58Z 2024-11-15T16:32:58Z Author&#160;Jajodia, Sushil. editor.&#160;Wijesekera, Duminda. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/11535706">http://dx.doi.org/10.1007/11535706</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Communications and Multimedia Security 9th IFIP TC-6 TC-11International Conference, CMS 2005, Salzburg, Austria, September 19 &ndash; 21, 2005. Proceedings ent://SD_ILS/0/SD_ILS:183049 2024-11-15T16:32:58Z 2024-11-15T16:32:58Z Author&#160;Dittmann, Jana. editor.&#160;Katzenbeisser, Stefan. editor.&#160;Uhl, Andreas. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/11552055">http://dx.doi.org/10.1007/11552055</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security Practice and Experience First International Conference, ISPEC 2005, Singapore, April 11-14, 2005. Proceedings ent://SD_ILS/0/SD_ILS:183050 2024-11-15T16:32:58Z 2024-11-15T16:32:58Z Author&#160;Deng, Robert H. editor.&#160;Bao, Feng. editor.&#160;Pang, HweeHwa. editor.&#160;Zhou, Jianying. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/b107167">http://dx.doi.org/10.1007/b107167</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer Security &ndash; ESORICS 2005 10th European Symposium on Research in Computer Security, Milan, Italy, September 12-14, 2005. Proceedings ent://SD_ILS/0/SD_ILS:183052 2024-11-15T16:32:58Z 2024-11-15T16:32:58Z Author&#160;Vimercati, Sabrina de Capitani. editor.&#160;Syverson, Paul. editor.&#160;Gollmann, Dieter. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/11555827">http://dx.doi.org/10.1007/11555827</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer Network Security Third International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2005, St. Petersburg, Russia, September 24-28, 2005. Proceedings ent://SD_ILS/0/SD_ILS:183066 2024-11-15T16:32:58Z 2024-11-15T16:32:58Z Author&#160;Gorodetsky, Vladimir. editor.&#160;Kotenko, Igor. editor.&#160;Skormin, Victor. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/11560326">http://dx.doi.org/10.1007/11560326</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer Safety, Reliability, and Security 24th International Conference, SAFECOMP 2005, Fredrikstad, Norway, September 28-30, 2005. Proceedings ent://SD_ILS/0/SD_ILS:183068 2024-11-15T16:32:58Z 2024-11-15T16:32:58Z Author&#160;Winther, Rune. editor.&#160;Gran, Bj&oslash;rn Axel. editor.&#160;Dahll, Gustav. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/11563228">http://dx.doi.org/10.1007/11563228</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cryptology and Network Security 4th International Conference, CANS 2005, Xiamen, China, December 14-16, 2005. Proceedings ent://SD_ILS/0/SD_ILS:183283 2024-11-15T16:32:58Z 2024-11-15T16:32:58Z Author&#160;Desmedt, Yvo G. editor.&#160;Wang, Huaxiong. editor.&#160;Mu, Yi. editor.&#160;Li, Yongqing. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/11599371">http://dx.doi.org/10.1007/11599371</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Monitoring, Security, and Rescue Techniques in Multiagent Systems ent://SD_ILS/0/SD_ILS:183313 2024-11-15T16:32:58Z 2024-11-15T16:32:58Z Author&#160;Dunin-K&#281;plicz, Barbara. author.&#160;Jankowski, Andrzej. author.&#160;Skowron, Andrzej. author.&#160;Szczuka, Marcin. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/3-540-32370-8">http://dx.doi.org/10.1007/3-540-32370-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information and Communications Security 7th International Conference, ICICS 2005, Beijing, China, December 10-13, 2005. Proceedings ent://SD_ILS/0/SD_ILS:183162 2024-11-15T16:32:58Z 2024-11-15T16:32:58Z Author&#160;Qing, Sihan. editor.&#160;Mao, Wenbo. editor.&#160;L&oacute;pez, Javier. editor.&#160;Wang, Guilin. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/11602897">http://dx.doi.org/10.1007/11602897</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security in Communication Networks 4th International Conference, SCN 2004, Amalfi, Italy, September 8-10, 2004, Revised Selected Papers ent://SD_ILS/0/SD_ILS:182394 2024-11-15T16:32:58Z 2024-11-15T16:32:58Z Author&#160;Blundo, Carlo. editor.&#160;Cimato, Stelvio. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/b105083">http://dx.doi.org/10.1007/b105083</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computational Intelligence and Security International Conference, CIS 2005, Xi&rsquo;an, China, December 15-19, 2005, Proceedings, Part II ent://SD_ILS/0/SD_ILS:182769 2024-11-15T16:32:58Z 2024-11-15T16:32:58Z Author&#160;Hao, Yue. editor.&#160;Liu, Jiming. editor.&#160;Wang, Yu-Ping. editor.&#160;Cheung, Yiu-ming. editor.&#160;Yin, Hujun. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/11596981">http://dx.doi.org/10.1007/11596981</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computational Intelligence and Security International Conference, CIS 2005, Xi&rsquo;an, China, December 15-19, 2005, Proceedings Part I ent://SD_ILS/0/SD_ILS:182770 2024-11-15T16:32:58Z 2024-11-15T16:32:58Z Author&#160;Hao, Yue. editor.&#160;Liu, Jiming. editor.&#160;Wang, Yuping. editor.&#160;Cheung, Yiu-ming. editor.&#160;Yin, Hujun. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/11596448">http://dx.doi.org/10.1007/11596448</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Intelligence and Security Informatics IEEE International Conference on Intelligence and Security Informatics, ISI 2005, Atlanta, GA, USA, May 19-20, 2005. Proceedings ent://SD_ILS/0/SD_ILS:183127 2024-11-15T16:32:58Z 2024-11-15T16:32:58Z Author&#160;Kantor, Paul. editor.&#160;Muresan, Gheorghe. editor.&#160;Roberts, Fred. editor.&#160;Zeng, Daniel D. editor.&#160;Wang, Fei-Yue. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/b136511">http://dx.doi.org/10.1007/b136511</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security and Cryptology &ndash; ICISC 2004 7th International Conference, Seoul, Korea, December 2-3, 2004, Revised Selected Papers ent://SD_ILS/0/SD_ILS:183146 2024-11-15T16:32:58Z 2024-11-15T16:32:58Z Author&#160;Park, Choon-sik. editor.&#160;Chee, Seongtaek. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/b137120">http://dx.doi.org/10.1007/b137120</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Trust, Privacy, and Security in Digital Business Second International Conference, TrustBus 2005, Copenhagen, Denmark, August 22-26, 2005. Proceedings ent://SD_ILS/0/SD_ILS:182889 2024-11-15T16:32:58Z 2024-11-15T16:32:58Z Author&#160;Katsikas, Sokratis. editor.&#160;L&oacute;pez, Javier. editor.&#160;Pernul, G&uuml;nther. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/11537878">http://dx.doi.org/10.1007/11537878</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security Applications 5th International Workshop, WISA 2004, Jeju Island, Korea, August 23-25, 2004, Revised Selected Papers ent://SD_ILS/0/SD_ILS:182902 2024-11-15T16:32:58Z 2024-11-15T16:32:58Z Author&#160;Lim, Chae Hoon. editor.&#160;Yung, Moti. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/b103174">http://dx.doi.org/10.1007/b103174</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security Protocols 11th International Workshop, Cambridge, UK, April 2-4, 2003, Revised Selected Papers ent://SD_ILS/0/SD_ILS:182922 2024-11-15T16:32:58Z 2024-11-15T16:32:58Z Author&#160;Christianson, Bruce. editor.&#160;Crispo, Bruno. editor.&#160;Malcolm, James A. editor.&#160;Roe, Michael. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/11542322">http://dx.doi.org/10.1007/11542322</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Cryptology - ASIACRYPT 2005 11th International Conference on the Theory and Application of Cryptology and Information Security, Chennai, India, December 4-8, 2005. Proceedings ent://SD_ILS/0/SD_ILS:183254 2024-11-15T16:32:58Z 2024-11-15T16:32:58Z Author&#160;Roy, Bimal. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/11593447">http://dx.doi.org/10.1007/11593447</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Immigration Phobia and the Security Dilemma Russia, Europe, and the United States ent://SD_ILS/0/SD_ILS:235005 2024-11-15T16:32:58Z 2024-11-15T16:32:58Z Author&#160;Alexseev, Mikhail A..<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1017/CBO9780511528064">Access by subscription</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security in Ad-hoc and Sensor Networks First European Workshop, ESAS 2004, Heidelberg, Germany, August 6, 2004, Revised Selected Papers ent://SD_ILS/0/SD_ILS:182328 2024-11-15T16:32:58Z 2024-11-15T16:32:58Z Author&#160;Castelluccia, Claude. editor.&#160;Hartenstein, Hannes. editor.&#160;Paar, Christof. editor.&#160;Westhoff, Dirk. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/b105219">http://dx.doi.org/10.1007/b105219</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security and Privacy in Ad-hoc and Sensor Networks Second European Workshop, ESAS 2005, Visegrad, Hungary, July 13-14, 2005. Revised Selected Papers ent://SD_ILS/0/SD_ILS:182782 2024-11-15T16:32:58Z 2024-11-15T16:32:58Z Author&#160;Molva, Refik. editor.&#160;Tsudik, Gene. editor.&#160;Westhoff, Dirk. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/11601494">http://dx.doi.org/10.1007/11601494</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Financial Cryptography and Data Security 9th International Conference, FC 2005, Roseau, The Commonwealth Of Dominica, February 28 &ndash; March 3, 2005. Revised Papers ent://SD_ILS/0/SD_ILS:182827 2024-11-15T16:32:58Z 2024-11-15T16:32:58Z Author&#160;Patrick, Andrew S. editor.&#160;Yung, Moti. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/b137875">http://dx.doi.org/10.1007/b137875</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security and Privacy 10th Australasian Conference, ACISP 2005, Brisbane, Australia, July 4-6, 2005. Proceedings ent://SD_ILS/0/SD_ILS:182830 2024-11-15T16:32:58Z 2024-11-15T16:32:58Z Author&#160;Boyd, Colin. editor.&#160;Gonz&aacute;lez Nieto, Juan Manuel. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/b137750">http://dx.doi.org/10.1007/b137750</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security in Pervasive Computing Second International Conference, SPC 2005, Boppard, Germany, April 6-8, 2005. Proceedings ent://SD_ILS/0/SD_ILS:183072 2024-11-15T16:32:58Z 2024-11-15T16:32:58Z Author&#160;Hutter, Dieter. editor.&#160;Ullmann, Markus. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/b135497">http://dx.doi.org/10.1007/b135497</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Systems Security First International Conference, ICISS 2005, Kolkata, India, December 19-21, 2005. Proceedings ent://SD_ILS/0/SD_ILS:183364 2024-11-15T16:32:58Z 2024-11-15T16:32:58Z Author&#160;Jajodia, Sushil. editor.&#160;Mazumdar, Chandan. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/11593980">http://dx.doi.org/10.1007/11593980</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security and Cryptology First SKLOIS Conference, CISC 2005, Beijing, China, December 15-17, 2005. Proceedings ent://SD_ILS/0/SD_ILS:183366 2024-11-15T16:32:58Z 2024-11-15T16:32:58Z Author&#160;Feng, Dengguo. editor.&#160;Lin, Dongdai. editor.&#160;Yung, Moti. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/11599548">http://dx.doi.org/10.1007/11599548</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Developing strategies to deal with trauma in children.: a means of ensuring conflict prevention security and social stability : case study : 12-15-year-olds in Serbia ent://SD_ILS/0/SD_ILS:115741 2024-11-15T16:32:58Z 2024-11-15T16:32:58Z Author&#160;NATO Advanced Research Workshop on Developing Strategies to Deal with Post-Conflict Trauma in Children (2004 : Bratislava, Slovakia)&#160;Donnelly, Jill.<br/>Preferred Shelf Number&#160;RJ506.P55 N38 2005<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> The future of social security policy : women, work and a citizens basic income ent://SD_ILS/0/SD_ILS:115797 2024-11-15T16:32:58Z 2024-11-15T16:32:58Z Author&#160;McKay, Ailsa.<br/>Preferred Shelf Number&#160;HC79.P63 M34 2005<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Sockets, shellcode, porting &amp; coding reverse engineering exploits and tool coding for security professionals ent://SD_ILS/0/SD_ILS:253938 2024-11-15T16:32:58Z 2024-11-15T16:32:58Z Author&#160;Foster, James C.&#160;Price, Mike (Mike Morgan)&#160;McClure, Stuart.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490054">http://www.sciencedirect.com/science/book/9781597490054</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Bulletproof wireless security GSM, UMTS, 802.11 and ad hoc security ent://SD_ILS/0/SD_ILS:254722 2024-11-15T16:32:58Z 2024-11-15T16:32:58Z Author&#160;Chandra, Praphul.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780750677462">http://www.sciencedirect.com/science/book/9780750677462</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Assessing and managing security risk in IT systems a structured methodology ent://SD_ILS/0/SD_ILS:285488 2024-11-15T16:32:58Z 2024-11-15T16:32:58Z Author&#160;McCumber, John, 1956-<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9780203490426">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Disruptive security technologies with mobile code and peer-to-peer networks ent://SD_ILS/0/SD_ILS:291305 2024-11-15T16:32:58Z 2024-11-15T16:32:58Z Author&#160;Brooks, R. R. (Richard R.)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781420038880">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Managing an information security and privacy awareness and training program ent://SD_ILS/0/SD_ILS:284780 2024-11-15T16:32:58Z 2024-11-15T16:32:58Z Author&#160;Herold, Rebecca.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781420031256">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Handbook of wireless local area networks applications, technology, security, and standards ent://SD_ILS/0/SD_ILS:290150 2024-11-15T16:32:58Z 2024-11-15T16:32:58Z Author&#160;Ilyas, Mohammad, 1953-&#160;Ahson, Syed.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9780203492512">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Database and applications security integrating information security and data management ent://SD_ILS/0/SD_ILS:284552 2024-11-15T16:32:58Z 2024-11-15T16:32:58Z Author&#160;Thuraisingham, Bhavani M.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9780203486061">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> International Conflict and Security Law Essays in Memory of Hilaire McCoubrey ent://SD_ILS/0/SD_ILS:235428 2024-11-15T16:32:58Z 2024-11-15T16:32:58Z Author&#160;Burchill, Richard.&#160;White, Nigel D..&#160;Morris, Justin.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1017/CBO9780511495137">Access by subscription</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> The Market for Force The Consequences of Privatizing Security ent://SD_ILS/0/SD_ILS:235394 2024-11-15T16:32:58Z 2024-11-15T16:32:58Z Author&#160;Avant, Deborah D..<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1017/CBO9780511490866">Access by subscription</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Implementing database security and auditing a guide for DBAs, information security administrators and auditors ent://SD_ILS/0/SD_ILS:253860 2024-11-15T16:32:58Z 2024-11-15T16:32:58Z Author&#160;Ben-Natan, Ron.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781555583347">http://www.sciencedirect.com/science/book/9781555583347</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Systems and human science, for safety, security, and dependability seleced papers of the 1st International Symposium SSR2003, Osaka, Japan, November 2003 ent://SD_ILS/0/SD_ILS:254603 2024-11-15T16:32:58Z 2024-11-15T16:32:58Z Author&#160;International Symposium on Systems and Human Science (1st : 2003 : Osaka University)&#160;Arai, Tatsuo.&#160;Yamamoto, Shigeru, 1964-&#160;Makino, Kazuhisa.&#160;&#332;saka Daigaku.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780444518132">http://www.sciencedirect.com/science/book/9780444518132</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Error correcting coding and security for data networks analysis of the superchannel concept ent://SD_ILS/0/SD_ILS:301147 2024-11-15T16:32:58Z 2024-11-15T16:32:58Z Author&#160;Kabatiansky, G.&#160;Krouk, E.&#160;Semenov, S.&#160;John Wiley &amp; Sons.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;John Wiley <a href="http://dx.doi.org/10.1002/0470867574">http://dx.doi.org/10.1002/0470867574</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Air Pollution Modeling for Environmental Security Proceedings of the NATO Advanced Research Workshop on Advances in Air Pollution Modeling for Environmental Security Borovetz, Bulgaria 8&ndash;12 May 2004 ent://SD_ILS/0/SD_ILS:168877 2024-11-15T16:32:58Z 2024-11-15T16:32:58Z Author&#160;Farag&oacute;, Istv&aacute;n. editor.&#160;Georgiev, Krassimir. editor.&#160;Havasi, &Aacute;gnes. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/1-4020-3351-6">http://dx.doi.org/10.1007/1-4020-3351-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cyberspace Security and Defense: Research Issues Proceedings of the NATO Advanced Research Workshop on Cyberspace Security and Defense: Research Issues Gdansk, Poland 6&ndash;9 September 2004 ent://SD_ILS/0/SD_ILS:168883 2024-11-15T16:32:58Z 2024-11-15T16:32:58Z Author&#160;Kowalik, Janusz S. editor.&#160;Gorski, Janusz. editor.&#160;Sachenko, Anatoly. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/1-4020-3381-8">http://dx.doi.org/10.1007/1-4020-3381-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Enhanced methods in computer security, biometric and artificial intelligence systems ent://SD_ILS/0/SD_ILS:109864 2024-11-15T16:32:58Z 2024-11-15T16:32:58Z Author&#160;Pejas, Jerzy, 1954-, ed.&#160;Piegat, Andrzej, 1947-, ed.<br/>Preferred Shelf Number&#160;QA76.9.A25 E545 2005<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Developing strategies to deal with trauma in children a means of ensuring conflict prevention security and social stability : case study : 12-15-year-olds in Serbia ent://SD_ILS/0/SD_ILS:124552 2024-11-15T16:32:58Z 2024-11-15T16:32:58Z Author&#160;NATO Advanced Research Workshop on Developing Strategies to Deal with Post-Conflict Trauma in Children (2004 : Bratislava, Slovakia)&#160;Donnelly, Jill.&#160;ebrary, Inc.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://site.ebrary.com/lib/hacettepe/Doc?id=10130683">http://site.ebrary.com/lib/hacettepe/Doc?id=10130683</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Designing security a Windows server 2003 network (70-298) : Lab manual ent://SD_ILS/0/SD_ILS:112440 2024-11-15T16:32:58Z 2024-11-15T16:32:58Z Author&#160;Northrup, Tony.<br/>Preferred Shelf Number&#160;QA76.3 .N877 2005<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Designing security a Windows server 2003 network (70-298) : textbook ent://SD_ILS/0/SD_ILS:106745 2024-11-15T16:32:58Z 2024-11-15T16:32:58Z Author&#160;Northrup, Tony.<br/>Preferred Shelf Number&#160;QA76.3 .N877 2005T<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> AAA and network security for mobile access radius, diameter, EAP, PKI, and IP mobility ent://SD_ILS/0/SD_ILS:295729 2024-11-15T16:32:58Z 2024-11-15T16:32:58Z Author&#160;Nakhjiri, Madjid.&#160;Nakhjiri, Mahsa.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;John Wiley <a href="http://dx.doi.org/10.1002/0470017465">http://dx.doi.org/10.1002/0470017465</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Human development report 2005 : International cooperation at a crossroads: Aid, trade and security in an unegual world. ent://SD_ILS/0/SD_ILS:105567 2024-11-15T16:32:58Z 2024-11-15T16:32:58Z Preferred Shelf Number&#160;HD72 H85 2005<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> The Austin Protocol Compiler ent://SD_ILS/0/SD_ILS:164876 2024-11-15T16:32:58Z 2024-11-15T16:32:58Z Author&#160;McGuire, Tommy M. author.&#160;Gouda, Mohamed G. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/b101038">http://dx.doi.org/10.1007/b101038</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Intrusion Detection and Correlation Challenges and Solutions ent://SD_ILS/0/SD_ILS:164919 2024-11-15T16:32:58Z 2024-11-15T16:32:58Z Author&#160;Kruegel, Christopher. author.&#160;Valeur, Fredrik. author.&#160;Vigna, Giovanni. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/b101493">http://dx.doi.org/10.1007/b101493</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Image and Video Encryption From Digital Rights Management to Secured Personal Communication ent://SD_ILS/0/SD_ILS:164920 2024-11-15T16:32:58Z 2024-11-15T16:32:58Z Author&#160;Jajodia, Sushil. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/b101495">http://dx.doi.org/10.1007/b101495</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Case studies and theory development in the social sciences ent://SD_ILS/0/SD_ILS:115767 2024-11-15T16:32:58Z 2024-11-15T16:32:58Z Author&#160;George, Alexander L.&#160;Bennett, Andrew, 1956-<br/>Preferred Shelf Number&#160;H61 .G46 2005<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> G&uuml;venlik &Ccedil;al&#305;&#351;malar&#305; Dergisi. ent://SD_ILS/0/SD_ILS:342920 2024-11-15T16:32:58Z 2024-11-15T16:32:58Z Format:&#160;Continuing Resources&#160;Other<br/>Availability&#160;~0<br/> &#304;&#351; Hukuku ve Sosyal G&uuml;venlik Hukuku Dergisi . ent://SD_ILS/0/SD_ILS:371749 2024-11-15T16:32:58Z 2024-11-15T16:32:58Z Format:&#160;Continuing Resources&#160;Other<br/>Availability&#160;~0<br/> NATO AND TERRORISM Catastrophic Terrorism and First Responders: Threats and Mitigation Proceedings of the Nato Advanced Research Workshop on Catastrophic Terrorism and First Responders: Threats and Mitigation Neuhausen-Stuttgart, Germany 10&ndash;12 May 2004 ent://SD_ILS/0/SD_ILS:152158 2024-11-15T16:32:58Z 2024-11-15T16:32:58Z Author&#160;Steinh&auml;usler, Friedrich.&#160;Edwards, Frances.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/1-4020-3585-3">http://dx.doi.org/10.1007/1-4020-3585-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> From Cells to Proteins: Imaging Nature across Dimensions Proceedings of the NATO Advanced Study Institute on From Cells to Proteins: Imaging Nature across Dimensions Pisa, Italy 12&ndash;23 September 2004 ent://SD_ILS/0/SD_ILS:168946 2024-11-15T16:32:58Z 2024-11-15T16:32:58Z Author&#160;Evangelista, Valtere. editor.&#160;Barsanti, Laura. editor.&#160;Passarelli, Vincenzo. editor.&#160;Gualtieri, Paolo. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/1-4020-3616-7">http://dx.doi.org/10.1007/1-4020-3616-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Defense against Bioterror Detection Technologies, Implementation Strategies and Commercial Opportunities ent://SD_ILS/0/SD_ILS:168884 2024-11-15T16:32:58Z 2024-11-15T16:32:58Z Author&#160;Morrison, Dennis. editor.&#160;Milanovich, Fred. editor.&#160;Ivnitski, Dmitri. editor.&#160;Austin, Thomas R. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/1-4020-3384-2">http://dx.doi.org/10.1007/1-4020-3384-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Equidosimetry &mdash; Ecological Standardization and Equidosimetry for Radioecology and Environmental Ecology Proceedings of the NATO Advanced Research Workshop on Ecological Standardization and Equidosimetry for Radioecology and Environmental Ecology Kiev, Ukraine 14&ndash;20 April 2002 ent://SD_ILS/0/SD_ILS:168958 2024-11-15T16:32:58Z 2024-11-15T16:32:58Z Author&#160;Br&eacute;chignac, F. editor.&#160;Desmet, G. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/1-4020-3650-7">http://dx.doi.org/10.1007/1-4020-3650-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Configuring Check Point NGX VPN-1/fire wall- ent://SD_ILS/0/SD_ILS:253943 2024-11-15T16:32:58Z 2024-11-15T16:32:58Z Author&#160;Stephens, Robert.&#160;Stiefel, Barry J.&#160;Watkins, Stephen (Information security professional)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490313">http://www.sciencedirect.com/science/book/9781597490313</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Polis bilimleri dergisi = Turkish journal of police studies ent://SD_ILS/0/SD_ILS:229319 2024-11-15T16:32:58Z 2024-11-15T16:32:58Z Electronic Access&#160;<a href="http://www.pa.edu.tr/?app=ED77B64B-C77A-47E1-89ED-FB78A53019E4">Elektronik Eri?im</a><br/>Format:&#160;Continuing Resources&#160;Other<br/>Availability&#160;~0<br/> The Law and Economics of Cybersecurity ent://SD_ILS/0/SD_ILS:235518 2024-11-15T16:32:58Z 2024-11-15T16:32:58Z Author&#160;Grady, Mark F..&#160;Parisi, Francesco.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1017/CBO9780511511523">Access by subscription</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Beginning cryptography with Java ent://SD_ILS/0/SD_ILS:144203 2024-11-15T16:32:58Z 2024-11-15T16:32:58Z Author&#160;Hook, David, 1962-<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;EBSCOhost <a href="http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=142234">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=142234</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Trusted Computing ent://SD_ILS/0/SD_ILS:247871 2024-11-15T16:32:58Z 2024-11-15T16:32:58Z Author&#160;Mitchell, Chris, ed.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1049/PBPC006E">http://dx.doi.org/10.1049/PBPC006E</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Host integrity monitoring using Osiris and Samhain ent://SD_ILS/0/SD_ILS:253940 2024-11-15T16:32:58Z 2024-11-15T16:32:58Z Author&#160;Wotring, Brian.&#160;Potter, Bruce.&#160;Ranum, Marcus J.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490184">http://www.sciencedirect.com/science/book/9781597490184</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Hacking a terror network the silent threat of covert channels ent://SD_ILS/0/SD_ILS:253987 2024-11-15T16:32:58Z 2024-11-15T16:32:58Z Author&#160;Rogers, Russ.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781928994985">http://www.sciencedirect.com/science/book/9781928994985</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Stealing the network how to own an identity ent://SD_ILS/0/SD_ILS:253663 2024-11-15T16:32:58Z 2024-11-15T16:32:58Z Author&#160;Alder, Raven.&#160;Mullen, Timothy M.&#160;Long, Johnny.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490061">http://www.sciencedirect.com/science/book/9781597490061</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Software piracy exposed ent://SD_ILS/0/SD_ILS:253664 2024-11-15T16:32:58Z 2024-11-15T16:32:58Z Author&#160;Craig, Paul.&#160;Honick, Ron.&#160;Burnett, Mark (Mark M.)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781932266986">http://www.sciencedirect.com/science/book/9781932266986</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cisco PIX firewalls configure, manage, &amp; troubleshoot ent://SD_ILS/0/SD_ILS:253667 2024-11-15T16:32:58Z 2024-11-15T16:32:58Z Author&#160;Behrens, Thorsten.&#160;Riley, Charles.&#160;Khan, Umer.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490047">http://www.sciencedirect.com/science/book/9781597490047</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Aggressive network self-defense ent://SD_ILS/0/SD_ILS:253672 2024-11-15T16:32:58Z 2024-11-15T16:32:58Z Author&#160;Wyler, Neil R.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836203">http://www.sciencedirect.com/science/book/9781931836203</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cyber spying tracking your family's (sometimes) secret online lives ent://SD_ILS/0/SD_ILS:253673 2024-11-15T16:32:58Z 2024-11-15T16:32:58Z Author&#160;Fair, Ted.&#160;Nordfelt, Michael.&#160;Ring, Sandra.&#160;Cole, Eric.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836418">http://www.sciencedirect.com/science/book/9781931836418</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> InfoSec career hacking sell your skillz, not your soul ent://SD_ILS/0/SD_ILS:253681 2024-11-15T16:32:58Z 2024-11-15T16:32:58Z Author&#160;Bayles, Aaron W.&#160;Brindley, Ed.&#160;Foster, James C.&#160;Hurley, Chris.&#160;Long, Johnny.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490115">http://www.sciencedirect.com/science/book/9781597490115</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Buffer overflow attacks detect, exploit, prevent ent://SD_ILS/0/SD_ILS:254023 2024-11-15T16:32:58Z 2024-11-15T16:32:58Z Author&#160;Foster, James C.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781932266672">http://www.sciencedirect.com/science/book/9781932266672</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> The counterterrorism handbook tactics, procedures, and techniques ent://SD_ILS/0/SD_ILS:286862 2024-11-15T16:32:58Z 2024-11-15T16:32:58Z Author&#160;Bolz, Frank, 1930-&#160;Dudonis, Kenneth J.&#160;Schulz, David P.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781420057904">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Scalable and secure internet services and architecture ent://SD_ILS/0/SD_ILS:285796 2024-11-15T16:32:58Z 2024-11-15T16:32:58Z Author&#160;Xu, Chengzhong.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781420035209">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> The ethical hack a framework for business value penetration testing ent://SD_ILS/0/SD_ILS:288310 2024-11-15T16:32:58Z 2024-11-15T16:32:58Z Author&#160;Tiller, James S.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9780203495414">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Codes the guide to secrecy from ancient to modern times ent://SD_ILS/0/SD_ILS:284865 2024-11-15T16:32:58Z 2024-11-15T16:32:58Z Author&#160;Mollin, Richard A., 1947-<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781420035087">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cryptography, information theory, and error-correction a handbook for the 21st century ent://SD_ILS/0/SD_ILS:301860 2024-11-15T16:32:58Z 2024-11-15T16:32:58Z Author&#160;Bruen, Aiden A., 1941-&#160;Forcinito, Mario, 1962-&#160;Wiley InterScience (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;Wiley InterScience <a href="http://dx.doi.org/10.1002/9781118033296">An electronic book accessible through the World Wide Web; click for information</a> Contributor biographical information <a href="http://catdir.loc.gov/catdir/enhancements/fy0618/2004058044-b.html">http://catdir.loc.gov/catdir/enhancements/fy0618/2004058044-b.html</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Curing the patch management headache ent://SD_ILS/0/SD_ILS:284778 2024-11-15T16:32:58Z 2024-11-15T16:32:58Z Author&#160;Nicastro, Felicia M.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781420031294">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Acing the security+ certification exam ent://SD_ILS/0/SD_ILS:313492 2024-11-15T16:32:58Z 2024-11-15T16:32:58Z Author&#160;Regan, Patrick E.<br/>Preferred Shelf Number&#160;QA76.3 R455 2005<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Advances in Elliptic Curve Cryptography ent://SD_ILS/0/SD_ILS:236058 2024-11-15T16:32:58Z 2024-11-15T16:32:58Z Author&#160;Blake, Ian F..&#160;Seroussi, Gadiel.&#160;Smart, Nigel P..<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1017/CBO9780511546570">Access by subscription</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Global Anti-Terrorism Law and Policy ent://SD_ILS/0/SD_ILS:238091 2024-11-15T16:32:58Z 2024-11-15T16:32:58Z Author&#160;Ramraj, Victor V..&#160;Hor, Michael.&#160;Roach, Kent.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1017/CBO9780511493874">Access by subscription</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Firewalls jumpstart for network and systems administrators ent://SD_ILS/0/SD_ILS:253842 2024-11-15T16:32:58Z 2024-11-15T16:32:58Z Author&#160;Vacca, John R.&#160;Ellis, Scott (Scott Raymond), 1968-<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781555582975">http://www.sciencedirect.com/science/book/9781555582975</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Business continuity and disaster recovery for infosec managers ent://SD_ILS/0/SD_ILS:253862 2024-11-15T16:32:58Z 2024-11-15T16:32:58Z Author&#160;Rittinghouse, John W.&#160;Ransome, James F.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781555583392">http://www.sciencedirect.com/science/book/9781555583392</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Configuring NetScreen firewalls ent://SD_ILS/0/SD_ILS:254016 2024-11-15T16:32:58Z 2024-11-15T16:32:58Z Author&#160;Cameron, Rob.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781932266399">http://www.sciencedirect.com/science/book/9781932266399</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Intrusion prevention and active response deploying network and host IPS ent://SD_ILS/0/SD_ILS:254017 2024-11-15T16:32:58Z 2024-11-15T16:32:58Z Author&#160;Rash, Michael (Michael Brandon)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781932266474">http://www.sciencedirect.com/science/book/9781932266474</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> How policies make citizens : senior political activism and the American welfare state ent://SD_ILS/0/SD_ILS:375915 2024-11-15T16:32:58Z 2024-11-15T16:32:58Z Author&#160;Campbell, Andrea Louise, 1966-<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://www.jstor.org/stable/10.2307/j.ctt7rtmp">http://www.jstor.org/stable/10.2307/j.ctt7rtmp</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Sorulu cevapl&#305; yeni i&#351; hukuku uygulamas&#305; ent://SD_ILS/0/SD_ILS:102077 2024-11-15T16:32:58Z 2024-11-15T16:32:58Z Author&#160;&#304;nciro&#287;lu, L&uuml;tfi.<br/>Preferred Shelf Number&#160;KKX1270 .I53 2005<br/>Format:&#160;Books<br/>Availability&#160;Law Library~1<br/> K&uuml;resel &ccedil;at&#305;&#351;man&#305;n yeni alanlar&#305; : kaynak sava&#351;lar&#305; ent://SD_ILS/0/SD_ILS:103105 2024-11-15T16:32:58Z 2024-11-15T16:32:58Z Author&#160;Klare, Michael T., 1942-&#160;&#304;nciler, &Ouml;zge, &ccedil;ev.<br/>Preferred Shelf Number&#160;UA 23 .K5320 2004<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> European Union with Turkey : the possible impact of Turkey's membership on the European Union ent://SD_ILS/0/SD_ILS:104277 2024-11-15T16:32:58Z 2024-11-15T16:32:58Z Author&#160;La&ccedil;iner, Sedat.&#160;&Ouml;zcan, Mehmet.&#160;Bal, &#304;hsan.<br/>Preferred Shelf Number&#160;HC241.25.T9 L3 2005<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~2<br/> TCP / IP ve a&#287; g&uuml;venli&#287;i : teori ve uygulamalar ile ent://SD_ILS/0/SD_ILS:112813 2024-11-15T16:32:58Z 2024-11-15T16:32:58Z Author&#160;Dirican, Can Okan.<br/>Preferred Shelf Number&#160;TK 5105.55 D5753 2005<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~2<br/> Soru ve yan&#305;tlarla i&#351; s&ouml;zle&#351;mesinin feshi ve i&#351; g&uuml;vencesi ent://SD_ILS/0/SD_ILS:102078 2024-11-15T16:32:58Z 2024-11-15T16:32:58Z Author&#160;&Ccedil;al&#305;k, &#350;efik.<br/>Preferred Shelf Number&#160;KKX 1279 .C25 2005<br/>Format:&#160;Books<br/>Availability&#160;Law Library~1<br/> G&uuml;venlik sekt&ouml;r&uuml;n&uuml;n parlamenter g&ouml;zetimi : ilkeler, mekanizmalar ve uygulamalar ent://SD_ILS/0/SD_ILS:107140 2024-11-15T16:32:58Z 2024-11-15T16:32:58Z Author&#160;Born, Hans.&#160;Kaliber, Esra Ortakan, &ccedil;ev.&#160;Kaliber, Alper, &ccedil;ev.<br/>Preferred Shelf Number&#160;UA10.5 .B67 2005<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> &Ouml;zel g&uuml;venlik tedbirleri ent://SD_ILS/0/SD_ILS:114430 2024-11-15T16:32:58Z 2024-11-15T16:32:58Z Author&#160;&Uuml;nsal, Faruk&#160;&#304;peko&#287;lu, Murat.<br/>Preferred Shelf Number&#160;HV8291.T9 U573 2005<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> &#304;&#351; g&uuml;vencesi hukuku : i&#351;e iade davalar&#305; ent://SD_ILS/0/SD_ILS:101815 2024-11-15T16:32:58Z 2024-11-15T16:32:58Z Author&#160;Bilgili, Abbas.<br/>Preferred Shelf Number&#160;KKX 1279 .B55 2005<br/>Format:&#160;Books<br/>Availability&#160;Law Library~1<br/> Ulus devletin &ccedil;&ouml;k&uuml;&#351;&uuml; : Yirmi birinci y&uuml;zy&#305;lda kaos ve d&uuml;zen ent://SD_ILS/0/SD_ILS:104040 2024-11-15T16:32:58Z 2024-11-15T16:32:58Z Author&#160;Cooper, Robert, 1947-&#160;Karahan, Berrin.<br/>Preferred Shelf Number&#160;JZ1308 .C6620 2005<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/>