Search Results for Security. - Narrowed by: 2005SirsiDynix Enterprisehttps://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dSecurity.$0026qf$003dPUBDATE$002509Publication$002bDate$0025092005$0025092005$0026te$003dILS$0026ps$003d300$0026isd$003dtrue?2024-11-15T16:32:58ZVoIP securityent://SD_ILS/0/SD_ILS:2537152024-11-15T16:32:58Z2024-11-15T16:32:58ZAuthor Ransome, James F. Rittinghouse, John W.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781555583323">http://www.sciencedirect.com/science/book/9781555583323</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Information security fundamentalsent://SD_ILS/0/SD_ILS:2891552024-11-15T16:32:58Z2024-11-15T16:32:58ZAuthor Peltier, Thomas R. Peltier, Justin. Blackley, John A.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9780203488652">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Multimedia security handbookent://SD_ILS/0/SD_ILS:2867602024-11-15T16:32:58Z2024-11-15T16:32:58ZAuthor Furht, Borivoje. Kirovski, Darko.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781420038262">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Computer Network Securityent://SD_ILS/0/SD_ILS:1651132024-11-15T16:32:58Z2024-11-15T16:32:58ZAuthor Kizza, Joseph Migga. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/b106962">http://dx.doi.org/10.1007/b106962</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Pro PHP Securityent://SD_ILS/0/SD_ILS:1707622024-11-15T16:32:58Z2024-11-15T16:32:58ZAuthor Snyder, Chris. author. Southwell, Michael. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-1-4302-0057-4">http://dx.doi.org/10.1007/978-1-4302-0057-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Network security technologiesent://SD_ILS/0/SD_ILS:2900772024-11-15T16:32:58Z2024-11-15T16:32:58ZAuthor Fung, K. T. (Kwok T.)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9780203330708">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Security in E-Learningent://SD_ILS/0/SD_ILS:1652242024-11-15T16:32:58Z2024-11-15T16:32:58ZAuthor Weippl, Edgar. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/b136702">http://dx.doi.org/10.1007/b136702</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>IM, instant messaging, securityent://SD_ILS/0/SD_ILS:2537252024-11-15T16:32:58Z2024-11-15T16:32:58ZAuthor Rittinghouse, John W. Ransome, James F.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781555583385">http://www.sciencedirect.com/science/book/9781555583385</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Information security management handbookent://SD_ILS/0/SD_ILS:2903202024-11-15T16:32:58Z2024-11-15T16:32:58ZAuthor Tipton, Harold F. Krause, Micki.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781420003406">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Information security management handbookent://SD_ILS/0/SD_ILS:2891512024-11-15T16:32:58Z2024-11-15T16:32:58ZAuthor Tipton, Harold F. Krause, Micki.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9780203325438">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Information security risk analysisent://SD_ILS/0/SD_ILS:2847642024-11-15T16:32:58Z2024-11-15T16:32:58ZAuthor Peltier, Thomas R.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781420031195">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Physical security for ITent://SD_ILS/0/SD_ILS:2538552024-11-15T16:32:58Z2024-11-15T16:32:58ZAuthor Erbschloe, Michael, 1951-<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781555583279">http://www.sciencedirect.com/science/book/9781555583279</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>A practical guide to security assessmentsent://SD_ILS/0/SD_ILS:2883062024-11-15T16:32:58Z2024-11-15T16:32:58ZAuthor Kairab, Sudhanshu.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9780203507230">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Information Processing and Security Systemsent://SD_ILS/0/SD_ILS:1652662024-11-15T16:32:58Z2024-11-15T16:32:58ZAuthor Saeed, Khalid. editor. Pejaś, Jerzy. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/b137371">http://dx.doi.org/10.1007/b137371</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Encyclopedia of Cryptography and Securityent://SD_ILS/0/SD_ILS:1649302024-11-15T16:32:58Z2024-11-15T16:32:58ZAuthor Tilborg, Henk C. A. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/0-387-23483-7">http://dx.doi.org/10.1007/0-387-23483-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Social Security, Demographics, and Riskent://SD_ILS/0/SD_ILS:1809032024-11-15T16:32:58Z2024-11-15T16:32:58ZAuthor Borgmann, Christoph. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/b137963">http://dx.doi.org/10.1007/b137963</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Network security a practical approachent://SD_ILS/0/SD_ILS:2537072024-11-15T16:32:58Z2024-11-15T16:32:58ZAuthor Harrington, Jan L.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780123116338">http://www.sciencedirect.com/science/book/9780123116338</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Statistical methods in computer securityent://SD_ILS/0/SD_ILS:2886112024-11-15T16:32:58Z2024-11-15T16:32:58ZAuthor Chen, William W. S.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781420030884">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Information security management handbook. Vol. 2ent://SD_ILS/0/SD_ILS:2854412024-11-15T16:32:58Z2024-11-15T16:32:58ZAuthor Tipton, Harold F. Krause, Micki.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9780203005552">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Climate change and global food securityent://SD_ILS/0/SD_ILS:1103412024-11-15T16:32:58Z2024-11-15T16:32:58ZAuthor Lal, R.<br/>Preferred Shelf Number S600.7.C54 C652 2005<br/>Format: Books<br/>Availability Beytepe Library~1<br/>Saving Social security : a balanced approachent://SD_ILS/0/SD_ILS:1059182024-11-15T16:32:58Z2024-11-15T16:32:58ZAuthor Diamond, Peter A. Orszag, Peter R., ort. yaz.<br/>Preferred Shelf Number HD 7125 .D525 2005<br/>Format: Books<br/>Availability Beytepe Library~1<br/>Climate change and global food securityent://SD_ILS/0/SD_ILS:2867652024-11-15T16:32:58Z2024-11-15T16:32:58ZAuthor Lal, R.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781420028614">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Optical and Digital Techniques for Information Securityent://SD_ILS/0/SD_ILS:1650902024-11-15T16:32:58Z2024-11-15T16:32:58ZAuthor Javidi, Bahram. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/b105098">http://dx.doi.org/10.1007/b105098</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Network security evaluation using the NSA IEMent://SD_ILS/0/SD_ILS:2539452024-11-15T16:32:58Z2024-11-15T16:32:58ZAuthor Rogers, Russ. Cunningham, Bryan.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490351">http://www.sciencedirect.com/science/book/9781597490351</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Emerging Threats to Energy Security and Stabilityent://SD_ILS/0/SD_ILS:1689322024-11-15T16:32:58Z2024-11-15T16:32:58ZAuthor McPherson, Hugo. editor. Duncan Wood, W. editor. Robinson, Derek M. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/1-4020-3567-5">http://dx.doi.org/10.1007/1-4020-3567-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Computer Security in the 21st Centuryent://SD_ILS/0/SD_ILS:1650012024-11-15T16:32:58Z2024-11-15T16:32:58ZAuthor Lee, D. T. editor. Shieh, S. P. editor. Tygar, J. D. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/b104203">http://dx.doi.org/10.1007/b104203</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Impacts and Risk Assessment of Technology for Internet Security Enabled Information Small-Medium Enterprises (TEISMES)ent://SD_ILS/0/SD_ILS:1652672024-11-15T16:32:58Z2024-11-15T16:32:58ZAuthor Shoniregun, Charles A. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/b137376">http://dx.doi.org/10.1007/b137376</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Black Hat physical device security exploiting hardware and softwareent://SD_ILS/0/SD_ILS:2540252024-11-15T16:32:58Z2024-11-15T16:32:58ZAuthor Miller, Drew, 1978-<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781932266818">http://www.sciencedirect.com/science/book/9781932266818</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Transboundary Water Resources: Strategies for Regional Security and Ecological Stability Proceedings of the NATO Advanced Research Workshop on Transboundary Water Resources: Strategies for Regional Security and Ecological Stability Novosibirsk, Russia 25–27 August, 2003ent://SD_ILS/0/SD_ILS:1688022024-11-15T16:32:58Z2024-11-15T16:32:58ZAuthor Vogtmann, Hartmut. editor. Dobretsov, Nikolai. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/1-4020-3082-7">http://dx.doi.org/10.1007/1-4020-3082-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Nessus, Snort, & Ethereal power tools customizing open source security applicationsent://SD_ILS/0/SD_ILS:2539422024-11-15T16:32:58Z2024-11-15T16:32:58ZAuthor Archibald, Neil. Ramirez, Gilbert, 1972- Rathaus, Noam. Syngress Media, Inc.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490207">http://www.sciencedirect.com/science/book/9781597490207</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Sequrity for computer networks : an introduction to data security in teleprocessing and electronic funds transferent://SD_ILS/0/SD_ILS:621882024-11-15T16:32:58Z2024-11-15T16:32:58ZAuthor Davies, Donald Watts, 1924- Price, W. L., ort.yaz.<br/>Preferred Shelf Number TK 5105 D43 1989<br/>Format: Books<br/>Availability Beytepe Library~1<br/>Producing security : multinational corporations, globalization, and the changing calculus of conflictent://SD_ILS/0/SD_ILS:3759172024-11-15T16:32:58Z2024-11-15T16:32:58ZAuthor Brooks, Stephen G., 1971- author.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://www.jstor.org/stable/10.2307/j.ctt7sjz7">http://www.jstor.org/stable/10.2307/j.ctt7sjz7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Certification and Security in Inter-Organizational E-Serviceent://SD_ILS/0/SD_ILS:1650862024-11-15T16:32:58Z2024-11-15T16:32:58ZAuthor Nardelli, Enrico. editor. Talamo, Maurizio. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/11397427">http://dx.doi.org/10.1007/11397427</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Security and Privacy in the Age of Ubiquitous Computing IFIP TC11 20th International Information Security Conference May 30 – June 1, 2005, Chiba, Japanent://SD_ILS/0/SD_ILS:1651652024-11-15T16:32:58Z2024-11-15T16:32:58ZAuthor Sasaki, Ryoichi. editor. Qing, Sihan. editor. Okamoto, Eiji. editor. Yoshiura, Hiroshi. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/b135818">http://dx.doi.org/10.1007/b135818</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Information security and ethics social and organizational issuesent://SD_ILS/0/SD_ILS:1529662024-11-15T16:32:58Z2024-11-15T16:32:58ZAuthor Quigley, Marian.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access EBSCOhost <a href="http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=108396">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=108396</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Network Control and Engineering for QoS, Security and Mobility, III IFIP TC6 / WG6.2, 6.6, 6.7 and 6.8 Third International Conference on Network Control and Engineering for QoS, Security and Mobility, NetCon 2004 on November 2–5, 2004, Palma de Mallorca, Spainent://SD_ILS/0/SD_ILS:1648722024-11-15T16:32:58Z2024-11-15T16:32:58ZAuthor Gaïti, Dominique. editor. Galmés, Sebastià. editor. Puigjaner, Ramon. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/b100917">http://dx.doi.org/10.1007/b100917</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Privacy, Security and Trust within the Context of Pervasive Computingent://SD_ILS/0/SD_ILS:1649232024-11-15T16:32:58Z2024-11-15T16:32:58ZAuthor Robinson, Philip. editor. Vogt, Harald. editor. Wagealla, Waleed. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/b101573">http://dx.doi.org/10.1007/b101573</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Enhanced Methods in Computer Security, Biometric and Artificial Intelligence Systemsent://SD_ILS/0/SD_ILS:1649312024-11-15T16:32:58Z2024-11-15T16:32:58ZAuthor Pejaś, Jerzy. editor. Piegat, Andrzej. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/b101135">http://dx.doi.org/10.1007/b101135</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Formal Aspects in Security and Trust IFIP TC1 WG1.7 Workshop on Formal Aspects in Security and Trust (FAST), World Computer Congress, August 22–27, 2004, Toulouse, Franceent://SD_ILS/0/SD_ILS:1650112024-11-15T16:32:58Z2024-11-15T16:32:58ZAuthor Dimitrakos, Theo. editor. Martinelli, Fabio. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/b104303">http://dx.doi.org/10.1007/b104303</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Communications and Multimedia Security 8th IFIP TC-6 TC-11 Conference on Communications and Multimedia Security, Sept. 15–18, 2004, Windermere, The Lake District, United Kingdoment://SD_ILS/0/SD_ILS:1650552024-11-15T16:32:58Z2024-11-15T16:32:58ZAuthor Chadwick, David. editor. Preneel, Bart. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/b105674">http://dx.doi.org/10.1007/b105674</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Net-Centric Approaches to Intelligence and National Securityent://SD_ILS/0/SD_ILS:1652422024-11-15T16:32:58Z2024-11-15T16:32:58ZAuthor Ladner, Roy. editor. Petry, Frederick E. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/b137009">http://dx.doi.org/10.1007/b137009</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Applied Cryptography and Network Security Third International Conference, ACNS 2005, New York, NY, USA, June 7-10, 2005. Proceedingsent://SD_ILS/0/SD_ILS:1827212024-11-15T16:32:58Z2024-11-15T16:32:58ZAuthor Ioannidis, John. editor. Keromytis, Angelos. editor. Yung, Moti. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/b137093">http://dx.doi.org/10.1007/b137093</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Information Security 8th International Conference, ISC 2005, Singapore, September 20-23, 2005. Proceedingsent://SD_ILS/0/SD_ILS:1830032024-11-15T16:32:58Z2024-11-15T16:32:58ZAuthor Zhou, Jianying. editor. Lopez, Javier. editor. Deng, Robert H. editor. Bao, Feng. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/11556992">http://dx.doi.org/10.1007/11556992</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Foundations of Security Analysis and Design III FOSAD 2004/2005 Tutorial Lecturesent://SD_ILS/0/SD_ILS:1830092024-11-15T16:32:58Z2024-11-15T16:32:58ZAuthor Aldini, Alessandro. editor. Gorrieri, Roberto. editor. Martinelli, Fabio. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/11554578">http://dx.doi.org/10.1007/11554578</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Data and Applications Security XIX 19th Annual IFIP WG 11.3 Working Conference on Data and Applications Security, Storrs, CT, USA, August 7-10, 2005. Proceedingsent://SD_ILS/0/SD_ILS:1830102024-11-15T16:32:58Z2024-11-15T16:32:58ZAuthor Jajodia, Sushil. editor. Wijesekera, Duminda. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/11535706">http://dx.doi.org/10.1007/11535706</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Communications and Multimedia Security 9th IFIP TC-6 TC-11International Conference, CMS 2005, Salzburg, Austria, September 19 – 21, 2005. Proceedingsent://SD_ILS/0/SD_ILS:1830492024-11-15T16:32:58Z2024-11-15T16:32:58ZAuthor Dittmann, Jana. editor. Katzenbeisser, Stefan. editor. Uhl, Andreas. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/11552055">http://dx.doi.org/10.1007/11552055</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Information Security Practice and Experience First International Conference, ISPEC 2005, Singapore, April 11-14, 2005. Proceedingsent://SD_ILS/0/SD_ILS:1830502024-11-15T16:32:58Z2024-11-15T16:32:58ZAuthor Deng, Robert H. editor. Bao, Feng. editor. Pang, HweeHwa. editor. Zhou, Jianying. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/b107167">http://dx.doi.org/10.1007/b107167</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Computer Security – ESORICS 2005 10th European Symposium on Research in Computer Security, Milan, Italy, September 12-14, 2005. Proceedingsent://SD_ILS/0/SD_ILS:1830522024-11-15T16:32:58Z2024-11-15T16:32:58ZAuthor Vimercati, Sabrina de Capitani. editor. Syverson, Paul. editor. Gollmann, Dieter. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/11555827">http://dx.doi.org/10.1007/11555827</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Computer Network Security Third International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2005, St. Petersburg, Russia, September 24-28, 2005. Proceedingsent://SD_ILS/0/SD_ILS:1830662024-11-15T16:32:58Z2024-11-15T16:32:58ZAuthor Gorodetsky, Vladimir. editor. Kotenko, Igor. editor. Skormin, Victor. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/11560326">http://dx.doi.org/10.1007/11560326</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Computer Safety, Reliability, and Security 24th International Conference, SAFECOMP 2005, Fredrikstad, Norway, September 28-30, 2005. Proceedingsent://SD_ILS/0/SD_ILS:1830682024-11-15T16:32:58Z2024-11-15T16:32:58ZAuthor Winther, Rune. editor. Gran, Bjørn Axel. editor. Dahll, Gustav. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/11563228">http://dx.doi.org/10.1007/11563228</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Cryptology and Network Security 4th International Conference, CANS 2005, Xiamen, China, December 14-16, 2005. Proceedingsent://SD_ILS/0/SD_ILS:1832832024-11-15T16:32:58Z2024-11-15T16:32:58ZAuthor Desmedt, Yvo G. editor. Wang, Huaxiong. editor. Mu, Yi. editor. Li, Yongqing. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/11599371">http://dx.doi.org/10.1007/11599371</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Monitoring, Security, and Rescue Techniques in Multiagent Systemsent://SD_ILS/0/SD_ILS:1833132024-11-15T16:32:58Z2024-11-15T16:32:58ZAuthor Dunin-Kęplicz, Barbara. author. Jankowski, Andrzej. author. Skowron, Andrzej. author. Szczuka, Marcin. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/3-540-32370-8">http://dx.doi.org/10.1007/3-540-32370-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Information and Communications Security 7th International Conference, ICICS 2005, Beijing, China, December 10-13, 2005. Proceedingsent://SD_ILS/0/SD_ILS:1831622024-11-15T16:32:58Z2024-11-15T16:32:58ZAuthor Qing, Sihan. editor. Mao, Wenbo. editor. López, Javier. editor. Wang, Guilin. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/11602897">http://dx.doi.org/10.1007/11602897</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Security in Communication Networks 4th International Conference, SCN 2004, Amalfi, Italy, September 8-10, 2004, Revised Selected Papersent://SD_ILS/0/SD_ILS:1823942024-11-15T16:32:58Z2024-11-15T16:32:58ZAuthor Blundo, Carlo. editor. Cimato, Stelvio. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/b105083">http://dx.doi.org/10.1007/b105083</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Computational Intelligence and Security International Conference, CIS 2005, Xi’an, China, December 15-19, 2005, Proceedings, Part IIent://SD_ILS/0/SD_ILS:1827692024-11-15T16:32:58Z2024-11-15T16:32:58ZAuthor Hao, Yue. editor. Liu, Jiming. editor. Wang, Yu-Ping. editor. Cheung, Yiu-ming. editor. Yin, Hujun. editor.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/11596981">http://dx.doi.org/10.1007/11596981</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Computational Intelligence and Security International Conference, CIS 2005, Xi’an, China, December 15-19, 2005, Proceedings Part Ient://SD_ILS/0/SD_ILS:1827702024-11-15T16:32:58Z2024-11-15T16:32:58ZAuthor Hao, Yue. editor. Liu, Jiming. editor. Wang, Yuping. editor. Cheung, Yiu-ming. editor. Yin, Hujun. editor.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/11596448">http://dx.doi.org/10.1007/11596448</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Intelligence and Security Informatics IEEE International Conference on Intelligence and Security Informatics, ISI 2005, Atlanta, GA, USA, May 19-20, 2005. Proceedingsent://SD_ILS/0/SD_ILS:1831272024-11-15T16:32:58Z2024-11-15T16:32:58ZAuthor Kantor, Paul. editor. Muresan, Gheorghe. editor. Roberts, Fred. editor. Zeng, Daniel D. editor. Wang, Fei-Yue. editor.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/b136511">http://dx.doi.org/10.1007/b136511</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Information Security and Cryptology – ICISC 2004 7th International Conference, Seoul, Korea, December 2-3, 2004, Revised Selected Papersent://SD_ILS/0/SD_ILS:1831462024-11-15T16:32:58Z2024-11-15T16:32:58ZAuthor Park, Choon-sik. editor. Chee, Seongtaek. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/b137120">http://dx.doi.org/10.1007/b137120</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Trust, Privacy, and Security in Digital Business Second International Conference, TrustBus 2005, Copenhagen, Denmark, August 22-26, 2005. Proceedingsent://SD_ILS/0/SD_ILS:1828892024-11-15T16:32:58Z2024-11-15T16:32:58ZAuthor Katsikas, Sokratis. editor. López, Javier. editor. Pernul, Günther. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/11537878">http://dx.doi.org/10.1007/11537878</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Information Security Applications 5th International Workshop, WISA 2004, Jeju Island, Korea, August 23-25, 2004, Revised Selected Papersent://SD_ILS/0/SD_ILS:1829022024-11-15T16:32:58Z2024-11-15T16:32:58ZAuthor Lim, Chae Hoon. editor. Yung, Moti. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/b103174">http://dx.doi.org/10.1007/b103174</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Security Protocols 11th International Workshop, Cambridge, UK, April 2-4, 2003, Revised Selected Papersent://SD_ILS/0/SD_ILS:1829222024-11-15T16:32:58Z2024-11-15T16:32:58ZAuthor Christianson, Bruce. editor. Crispo, Bruno. editor. Malcolm, James A. editor. Roe, Michael. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/11542322">http://dx.doi.org/10.1007/11542322</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Advances in Cryptology - ASIACRYPT 2005 11th International Conference on the Theory and Application of Cryptology and Information Security, Chennai, India, December 4-8, 2005. Proceedingsent://SD_ILS/0/SD_ILS:1832542024-11-15T16:32:58Z2024-11-15T16:32:58ZAuthor Roy, Bimal. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/11593447">http://dx.doi.org/10.1007/11593447</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Immigration Phobia and the Security Dilemma Russia, Europe, and the United Statesent://SD_ILS/0/SD_ILS:2350052024-11-15T16:32:58Z2024-11-15T16:32:58ZAuthor Alexseev, Mikhail A..<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1017/CBO9780511528064">Access by subscription</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Security in Ad-hoc and Sensor Networks First European Workshop, ESAS 2004, Heidelberg, Germany, August 6, 2004, Revised Selected Papersent://SD_ILS/0/SD_ILS:1823282024-11-15T16:32:58Z2024-11-15T16:32:58ZAuthor Castelluccia, Claude. editor. Hartenstein, Hannes. editor. Paar, Christof. editor. Westhoff, Dirk. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/b105219">http://dx.doi.org/10.1007/b105219</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Security and Privacy in Ad-hoc and Sensor Networks Second European Workshop, ESAS 2005, Visegrad, Hungary, July 13-14, 2005. Revised Selected Papersent://SD_ILS/0/SD_ILS:1827822024-11-15T16:32:58Z2024-11-15T16:32:58ZAuthor Molva, Refik. editor. Tsudik, Gene. editor. Westhoff, Dirk. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/11601494">http://dx.doi.org/10.1007/11601494</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Financial Cryptography and Data Security 9th International Conference, FC 2005, Roseau, The Commonwealth Of Dominica, February 28 – March 3, 2005. Revised Papersent://SD_ILS/0/SD_ILS:1828272024-11-15T16:32:58Z2024-11-15T16:32:58ZAuthor Patrick, Andrew S. editor. Yung, Moti. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/b137875">http://dx.doi.org/10.1007/b137875</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Information Security and Privacy 10th Australasian Conference, ACISP 2005, Brisbane, Australia, July 4-6, 2005. Proceedingsent://SD_ILS/0/SD_ILS:1828302024-11-15T16:32:58Z2024-11-15T16:32:58ZAuthor Boyd, Colin. editor. González Nieto, Juan Manuel. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/b137750">http://dx.doi.org/10.1007/b137750</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Security in Pervasive Computing Second International Conference, SPC 2005, Boppard, Germany, April 6-8, 2005. Proceedingsent://SD_ILS/0/SD_ILS:1830722024-11-15T16:32:58Z2024-11-15T16:32:58ZAuthor Hutter, Dieter. editor. Ullmann, Markus. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/b135497">http://dx.doi.org/10.1007/b135497</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Information Systems Security First International Conference, ICISS 2005, Kolkata, India, December 19-21, 2005. Proceedingsent://SD_ILS/0/SD_ILS:1833642024-11-15T16:32:58Z2024-11-15T16:32:58ZAuthor Jajodia, Sushil. editor. Mazumdar, Chandan. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/11593980">http://dx.doi.org/10.1007/11593980</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Information Security and Cryptology First SKLOIS Conference, CISC 2005, Beijing, China, December 15-17, 2005. Proceedingsent://SD_ILS/0/SD_ILS:1833662024-11-15T16:32:58Z2024-11-15T16:32:58ZAuthor Feng, Dengguo. editor. Lin, Dongdai. editor. Yung, Moti. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/11599548">http://dx.doi.org/10.1007/11599548</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Developing strategies to deal with trauma in children.: a means of ensuring conflict prevention security and social stability : case study : 12-15-year-olds in Serbiaent://SD_ILS/0/SD_ILS:1157412024-11-15T16:32:58Z2024-11-15T16:32:58ZAuthor NATO Advanced Research Workshop on Developing Strategies to Deal with Post-Conflict Trauma in Children (2004 : Bratislava, Slovakia) Donnelly, Jill.<br/>Preferred Shelf Number RJ506.P55 N38 2005<br/>Format: Books<br/>Availability Beytepe Library~1<br/>The future of social security policy : women, work and a citizens basic incomeent://SD_ILS/0/SD_ILS:1157972024-11-15T16:32:58Z2024-11-15T16:32:58ZAuthor McKay, Ailsa.<br/>Preferred Shelf Number HC79.P63 M34 2005<br/>Format: Books<br/>Availability Beytepe Library~1<br/>Sockets, shellcode, porting & coding reverse engineering exploits and tool coding for security professionalsent://SD_ILS/0/SD_ILS:2539382024-11-15T16:32:58Z2024-11-15T16:32:58ZAuthor Foster, James C. Price, Mike (Mike Morgan) McClure, Stuart.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490054">http://www.sciencedirect.com/science/book/9781597490054</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Bulletproof wireless security GSM, UMTS, 802.11 and ad hoc securityent://SD_ILS/0/SD_ILS:2547222024-11-15T16:32:58Z2024-11-15T16:32:58ZAuthor Chandra, Praphul.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780750677462">http://www.sciencedirect.com/science/book/9780750677462</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Assessing and managing security risk in IT systems a structured methodologyent://SD_ILS/0/SD_ILS:2854882024-11-15T16:32:58Z2024-11-15T16:32:58ZAuthor McCumber, John, 1956-<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9780203490426">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Disruptive security technologies with mobile code and peer-to-peer networksent://SD_ILS/0/SD_ILS:2913052024-11-15T16:32:58Z2024-11-15T16:32:58ZAuthor Brooks, R. R. (Richard R.)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781420038880">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Managing an information security and privacy awareness and training programent://SD_ILS/0/SD_ILS:2847802024-11-15T16:32:58Z2024-11-15T16:32:58ZAuthor Herold, Rebecca.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781420031256">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Handbook of wireless local area networks applications, technology, security, and standardsent://SD_ILS/0/SD_ILS:2901502024-11-15T16:32:58Z2024-11-15T16:32:58ZAuthor Ilyas, Mohammad, 1953- Ahson, Syed.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9780203492512">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Database and applications security integrating information security and data managementent://SD_ILS/0/SD_ILS:2845522024-11-15T16:32:58Z2024-11-15T16:32:58ZAuthor Thuraisingham, Bhavani M.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9780203486061">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>International Conflict and Security Law Essays in Memory of Hilaire McCoubreyent://SD_ILS/0/SD_ILS:2354282024-11-15T16:32:58Z2024-11-15T16:32:58ZAuthor Burchill, Richard. White, Nigel D.. Morris, Justin.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1017/CBO9780511495137">Access by subscription</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>The Market for Force The Consequences of Privatizing Securityent://SD_ILS/0/SD_ILS:2353942024-11-15T16:32:58Z2024-11-15T16:32:58ZAuthor Avant, Deborah D..<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1017/CBO9780511490866">Access by subscription</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Implementing database security and auditing a guide for DBAs, information security administrators and auditorsent://SD_ILS/0/SD_ILS:2538602024-11-15T16:32:58Z2024-11-15T16:32:58ZAuthor Ben-Natan, Ron.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781555583347">http://www.sciencedirect.com/science/book/9781555583347</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Systems and human science, for safety, security, and dependability seleced papers of the 1st International Symposium SSR2003, Osaka, Japan, November 2003ent://SD_ILS/0/SD_ILS:2546032024-11-15T16:32:58Z2024-11-15T16:32:58ZAuthor International Symposium on Systems and Human Science (1st : 2003 : Osaka University) Arai, Tatsuo. Yamamoto, Shigeru, 1964- Makino, Kazuhisa. Ōsaka Daigaku.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780444518132">http://www.sciencedirect.com/science/book/9780444518132</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Error correcting coding and security for data networks analysis of the superchannel conceptent://SD_ILS/0/SD_ILS:3011472024-11-15T16:32:58Z2024-11-15T16:32:58ZAuthor Kabatiansky, G. Krouk, E. Semenov, S. John Wiley & Sons.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access John Wiley <a href="http://dx.doi.org/10.1002/0470867574">http://dx.doi.org/10.1002/0470867574</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Advances in Air Pollution Modeling for Environmental Security Proceedings of the NATO Advanced Research Workshop on Advances in Air Pollution Modeling for Environmental Security Borovetz, Bulgaria 8–12 May 2004ent://SD_ILS/0/SD_ILS:1688772024-11-15T16:32:58Z2024-11-15T16:32:58ZAuthor Faragó, István. editor. Georgiev, Krassimir. editor. Havasi, Ágnes. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/1-4020-3351-6">http://dx.doi.org/10.1007/1-4020-3351-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Cyberspace Security and Defense: Research Issues Proceedings of the NATO Advanced Research Workshop on Cyberspace Security and Defense: Research Issues Gdansk, Poland 6–9 September 2004ent://SD_ILS/0/SD_ILS:1688832024-11-15T16:32:58Z2024-11-15T16:32:58ZAuthor Kowalik, Janusz S. editor. Gorski, Janusz. editor. Sachenko, Anatoly. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/1-4020-3381-8">http://dx.doi.org/10.1007/1-4020-3381-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Enhanced methods in computer security, biometric and artificial intelligence systemsent://SD_ILS/0/SD_ILS:1098642024-11-15T16:32:58Z2024-11-15T16:32:58ZAuthor Pejas, Jerzy, 1954-, ed. Piegat, Andrzej, 1947-, ed.<br/>Preferred Shelf Number QA76.9.A25 E545 2005<br/>Format: Books<br/>Availability Beytepe Library~1<br/>Developing strategies to deal with trauma in children a means of ensuring conflict prevention security and social stability : case study : 12-15-year-olds in Serbiaent://SD_ILS/0/SD_ILS:1245522024-11-15T16:32:58Z2024-11-15T16:32:58ZAuthor NATO Advanced Research Workshop on Developing Strategies to Deal with Post-Conflict Trauma in Children (2004 : Bratislava, Slovakia) Donnelly, Jill. ebrary, Inc.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://site.ebrary.com/lib/hacettepe/Doc?id=10130683">http://site.ebrary.com/lib/hacettepe/Doc?id=10130683</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Designing security a Windows server 2003 network (70-298) : Lab manualent://SD_ILS/0/SD_ILS:1124402024-11-15T16:32:58Z2024-11-15T16:32:58ZAuthor Northrup, Tony.<br/>Preferred Shelf Number QA76.3 .N877 2005<br/>Format: Books<br/>Availability Beytepe Library~1<br/>Designing security a Windows server 2003 network (70-298) : textbookent://SD_ILS/0/SD_ILS:1067452024-11-15T16:32:58Z2024-11-15T16:32:58ZAuthor Northrup, Tony.<br/>Preferred Shelf Number QA76.3 .N877 2005T<br/>Format: Books<br/>Availability Beytepe Library~1<br/>AAA and network security for mobile access radius, diameter, EAP, PKI, and IP mobilityent://SD_ILS/0/SD_ILS:2957292024-11-15T16:32:58Z2024-11-15T16:32:58ZAuthor Nakhjiri, Madjid. Nakhjiri, Mahsa.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access John Wiley <a href="http://dx.doi.org/10.1002/0470017465">http://dx.doi.org/10.1002/0470017465</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Human development report 2005 : International cooperation at a crossroads: Aid, trade and security in an unegual world.ent://SD_ILS/0/SD_ILS:1055672024-11-15T16:32:58Z2024-11-15T16:32:58ZPreferred Shelf Number HD72 H85 2005<br/>Format: Books<br/>Availability Beytepe Library~1<br/>The Austin Protocol Compilerent://SD_ILS/0/SD_ILS:1648762024-11-15T16:32:58Z2024-11-15T16:32:58ZAuthor McGuire, Tommy M. author. Gouda, Mohamed G. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/b101038">http://dx.doi.org/10.1007/b101038</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Intrusion Detection and Correlation Challenges and Solutionsent://SD_ILS/0/SD_ILS:1649192024-11-15T16:32:58Z2024-11-15T16:32:58ZAuthor Kruegel, Christopher. author. Valeur, Fredrik. author. Vigna, Giovanni. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/b101493">http://dx.doi.org/10.1007/b101493</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Image and Video Encryption From Digital Rights Management to Secured Personal Communicationent://SD_ILS/0/SD_ILS:1649202024-11-15T16:32:58Z2024-11-15T16:32:58ZAuthor Jajodia, Sushil. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/b101495">http://dx.doi.org/10.1007/b101495</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Case studies and theory development in the social sciencesent://SD_ILS/0/SD_ILS:1157672024-11-15T16:32:58Z2024-11-15T16:32:58ZAuthor George, Alexander L. Bennett, Andrew, 1956-<br/>Preferred Shelf Number H61 .G46 2005<br/>Format: Books<br/>Availability Beytepe Library~1<br/>Güvenlik Çalışmaları Dergisi.ent://SD_ILS/0/SD_ILS:3429202024-11-15T16:32:58Z2024-11-15T16:32:58ZFormat: Continuing Resources Other<br/>Availability ~0<br/>İş Hukuku ve Sosyal Güvenlik Hukuku Dergisi .ent://SD_ILS/0/SD_ILS:3717492024-11-15T16:32:58Z2024-11-15T16:32:58ZFormat: Continuing Resources Other<br/>Availability ~0<br/>NATO AND TERRORISM Catastrophic Terrorism and First Responders: Threats and Mitigation Proceedings of the Nato Advanced Research Workshop on Catastrophic Terrorism and First Responders: Threats and Mitigation Neuhausen-Stuttgart, Germany 10–12 May 2004ent://SD_ILS/0/SD_ILS:1521582024-11-15T16:32:58Z2024-11-15T16:32:58ZAuthor Steinhäusler, Friedrich. Edwards, Frances. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/1-4020-3585-3">http://dx.doi.org/10.1007/1-4020-3585-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>From Cells to Proteins: Imaging Nature across Dimensions Proceedings of the NATO Advanced Study Institute on From Cells to Proteins: Imaging Nature across Dimensions Pisa, Italy 12–23 September 2004ent://SD_ILS/0/SD_ILS:1689462024-11-15T16:32:58Z2024-11-15T16:32:58ZAuthor Evangelista, Valtere. editor. Barsanti, Laura. editor. Passarelli, Vincenzo. editor. Gualtieri, Paolo. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/1-4020-3616-7">http://dx.doi.org/10.1007/1-4020-3616-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Defense against Bioterror Detection Technologies, Implementation Strategies and Commercial Opportunitiesent://SD_ILS/0/SD_ILS:1688842024-11-15T16:32:58Z2024-11-15T16:32:58ZAuthor Morrison, Dennis. editor. Milanovich, Fred. editor. Ivnitski, Dmitri. editor. Austin, Thomas R. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/1-4020-3384-2">http://dx.doi.org/10.1007/1-4020-3384-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Equidosimetry — Ecological Standardization and Equidosimetry for Radioecology and Environmental Ecology Proceedings of the NATO Advanced Research Workshop on Ecological Standardization and Equidosimetry for Radioecology and Environmental Ecology Kiev, Ukraine 14–20 April 2002ent://SD_ILS/0/SD_ILS:1689582024-11-15T16:32:58Z2024-11-15T16:32:58ZAuthor Bréchignac, F. editor. Desmet, G. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/1-4020-3650-7">http://dx.doi.org/10.1007/1-4020-3650-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Configuring Check Point NGX VPN-1/fire wall-ent://SD_ILS/0/SD_ILS:2539432024-11-15T16:32:58Z2024-11-15T16:32:58ZAuthor Stephens, Robert. Stiefel, Barry J. Watkins, Stephen (Information security professional)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490313">http://www.sciencedirect.com/science/book/9781597490313</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Polis bilimleri dergisi = Turkish journal of police studiesent://SD_ILS/0/SD_ILS:2293192024-11-15T16:32:58Z2024-11-15T16:32:58ZElectronic Access <a href="http://www.pa.edu.tr/?app=ED77B64B-C77A-47E1-89ED-FB78A53019E4">Elektronik Eri?im</a><br/>Format: Continuing Resources Other<br/>Availability ~0<br/>The Law and Economics of Cybersecurityent://SD_ILS/0/SD_ILS:2355182024-11-15T16:32:58Z2024-11-15T16:32:58ZAuthor Grady, Mark F.. Parisi, Francesco.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1017/CBO9780511511523">Access by subscription</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Beginning cryptography with Javaent://SD_ILS/0/SD_ILS:1442032024-11-15T16:32:58Z2024-11-15T16:32:58ZAuthor Hook, David, 1962-<br/>Preferred Shelf Number ONLINE<br/>Electronic Access EBSCOhost <a href="http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=142234">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=142234</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Trusted Computingent://SD_ILS/0/SD_ILS:2478712024-11-15T16:32:58Z2024-11-15T16:32:58ZAuthor Mitchell, Chris, ed.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1049/PBPC006E">http://dx.doi.org/10.1049/PBPC006E</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Host integrity monitoring using Osiris and Samhainent://SD_ILS/0/SD_ILS:2539402024-11-15T16:32:58Z2024-11-15T16:32:58ZAuthor Wotring, Brian. Potter, Bruce. Ranum, Marcus J.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490184">http://www.sciencedirect.com/science/book/9781597490184</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Hacking a terror network the silent threat of covert channelsent://SD_ILS/0/SD_ILS:2539872024-11-15T16:32:58Z2024-11-15T16:32:58ZAuthor Rogers, Russ.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781928994985">http://www.sciencedirect.com/science/book/9781928994985</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Stealing the network how to own an identityent://SD_ILS/0/SD_ILS:2536632024-11-15T16:32:58Z2024-11-15T16:32:58ZAuthor Alder, Raven. Mullen, Timothy M. Long, Johnny.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490061">http://www.sciencedirect.com/science/book/9781597490061</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Software piracy exposedent://SD_ILS/0/SD_ILS:2536642024-11-15T16:32:58Z2024-11-15T16:32:58ZAuthor Craig, Paul. Honick, Ron. Burnett, Mark (Mark M.)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781932266986">http://www.sciencedirect.com/science/book/9781932266986</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Cisco PIX firewalls configure, manage, & troubleshootent://SD_ILS/0/SD_ILS:2536672024-11-15T16:32:58Z2024-11-15T16:32:58ZAuthor Behrens, Thorsten. Riley, Charles. Khan, Umer.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490047">http://www.sciencedirect.com/science/book/9781597490047</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Aggressive network self-defenseent://SD_ILS/0/SD_ILS:2536722024-11-15T16:32:58Z2024-11-15T16:32:58ZAuthor Wyler, Neil R.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836203">http://www.sciencedirect.com/science/book/9781931836203</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Cyber spying tracking your family's (sometimes) secret online livesent://SD_ILS/0/SD_ILS:2536732024-11-15T16:32:58Z2024-11-15T16:32:58ZAuthor Fair, Ted. Nordfelt, Michael. Ring, Sandra. Cole, Eric.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836418">http://www.sciencedirect.com/science/book/9781931836418</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>InfoSec career hacking sell your skillz, not your soulent://SD_ILS/0/SD_ILS:2536812024-11-15T16:32:58Z2024-11-15T16:32:58ZAuthor Bayles, Aaron W. Brindley, Ed. Foster, James C. Hurley, Chris. Long, Johnny.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490115">http://www.sciencedirect.com/science/book/9781597490115</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Buffer overflow attacks detect, exploit, preventent://SD_ILS/0/SD_ILS:2540232024-11-15T16:32:58Z2024-11-15T16:32:58ZAuthor Foster, James C.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781932266672">http://www.sciencedirect.com/science/book/9781932266672</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>The counterterrorism handbook tactics, procedures, and techniquesent://SD_ILS/0/SD_ILS:2868622024-11-15T16:32:58Z2024-11-15T16:32:58ZAuthor Bolz, Frank, 1930- Dudonis, Kenneth J. Schulz, David P.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781420057904">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Scalable and secure internet services and architectureent://SD_ILS/0/SD_ILS:2857962024-11-15T16:32:58Z2024-11-15T16:32:58ZAuthor Xu, Chengzhong.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781420035209">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>The ethical hack a framework for business value penetration testingent://SD_ILS/0/SD_ILS:2883102024-11-15T16:32:58Z2024-11-15T16:32:58ZAuthor Tiller, James S.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9780203495414">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Codes the guide to secrecy from ancient to modern timesent://SD_ILS/0/SD_ILS:2848652024-11-15T16:32:58Z2024-11-15T16:32:58ZAuthor Mollin, Richard A., 1947-<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781420035087">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Cryptography, information theory, and error-correction a handbook for the 21st centuryent://SD_ILS/0/SD_ILS:3018602024-11-15T16:32:58Z2024-11-15T16:32:58ZAuthor Bruen, Aiden A., 1941- Forcinito, Mario, 1962- Wiley InterScience (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access Wiley InterScience <a href="http://dx.doi.org/10.1002/9781118033296">An electronic book accessible through the World Wide Web; click for information</a>
Contributor biographical information <a href="http://catdir.loc.gov/catdir/enhancements/fy0618/2004058044-b.html">http://catdir.loc.gov/catdir/enhancements/fy0618/2004058044-b.html</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Curing the patch management headacheent://SD_ILS/0/SD_ILS:2847782024-11-15T16:32:58Z2024-11-15T16:32:58ZAuthor Nicastro, Felicia M.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781420031294">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Acing the security+ certification exament://SD_ILS/0/SD_ILS:3134922024-11-15T16:32:58Z2024-11-15T16:32:58ZAuthor Regan, Patrick E.<br/>Preferred Shelf Number QA76.3 R455 2005<br/>Format: Books<br/>Availability Beytepe Library~1<br/>Advances in Elliptic Curve Cryptographyent://SD_ILS/0/SD_ILS:2360582024-11-15T16:32:58Z2024-11-15T16:32:58ZAuthor Blake, Ian F.. Seroussi, Gadiel. Smart, Nigel P..<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1017/CBO9780511546570">Access by subscription</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Global Anti-Terrorism Law and Policyent://SD_ILS/0/SD_ILS:2380912024-11-15T16:32:58Z2024-11-15T16:32:58ZAuthor Ramraj, Victor V.. Hor, Michael. Roach, Kent.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1017/CBO9780511493874">Access by subscription</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Firewalls jumpstart for network and systems administratorsent://SD_ILS/0/SD_ILS:2538422024-11-15T16:32:58Z2024-11-15T16:32:58ZAuthor Vacca, John R. Ellis, Scott (Scott Raymond), 1968-<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781555582975">http://www.sciencedirect.com/science/book/9781555582975</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Business continuity and disaster recovery for infosec managersent://SD_ILS/0/SD_ILS:2538622024-11-15T16:32:58Z2024-11-15T16:32:58ZAuthor Rittinghouse, John W. Ransome, James F.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781555583392">http://www.sciencedirect.com/science/book/9781555583392</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Configuring NetScreen firewallsent://SD_ILS/0/SD_ILS:2540162024-11-15T16:32:58Z2024-11-15T16:32:58ZAuthor Cameron, Rob.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781932266399">http://www.sciencedirect.com/science/book/9781932266399</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Intrusion prevention and active response deploying network and host IPSent://SD_ILS/0/SD_ILS:2540172024-11-15T16:32:58Z2024-11-15T16:32:58ZAuthor Rash, Michael (Michael Brandon)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781932266474">http://www.sciencedirect.com/science/book/9781932266474</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>How policies make citizens : senior political activism and the American welfare stateent://SD_ILS/0/SD_ILS:3759152024-11-15T16:32:58Z2024-11-15T16:32:58ZAuthor Campbell, Andrea Louise, 1966-<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://www.jstor.org/stable/10.2307/j.ctt7rtmp">http://www.jstor.org/stable/10.2307/j.ctt7rtmp</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Sorulu cevaplı yeni iş hukuku uygulamasıent://SD_ILS/0/SD_ILS:1020772024-11-15T16:32:58Z2024-11-15T16:32:58ZAuthor İnciroğlu, Lütfi.<br/>Preferred Shelf Number KKX1270 .I53 2005<br/>Format: Books<br/>Availability Law Library~1<br/>Küresel çatışmanın yeni alanları : kaynak savaşlarıent://SD_ILS/0/SD_ILS:1031052024-11-15T16:32:58Z2024-11-15T16:32:58ZAuthor Klare, Michael T., 1942- İnciler, Özge, çev.<br/>Preferred Shelf Number UA 23 .K5320 2004<br/>Format: Books<br/>Availability Beytepe Library~1<br/>European Union with Turkey : the possible impact of Turkey's membership on the European Unionent://SD_ILS/0/SD_ILS:1042772024-11-15T16:32:58Z2024-11-15T16:32:58ZAuthor Laçiner, Sedat. Özcan, Mehmet. Bal, İhsan.<br/>Preferred Shelf Number HC241.25.T9 L3 2005<br/>Format: Books<br/>Availability Beytepe Library~2<br/>TCP / IP ve ağ güvenliği : teori ve uygulamalar ileent://SD_ILS/0/SD_ILS:1128132024-11-15T16:32:58Z2024-11-15T16:32:58ZAuthor Dirican, Can Okan.<br/>Preferred Shelf Number TK 5105.55 D5753 2005<br/>Format: Books<br/>Availability Beytepe Library~2<br/>Soru ve yanıtlarla iş sözleşmesinin feshi ve iş güvencesient://SD_ILS/0/SD_ILS:1020782024-11-15T16:32:58Z2024-11-15T16:32:58ZAuthor Çalık, Şefik.<br/>Preferred Shelf Number KKX 1279 .C25 2005<br/>Format: Books<br/>Availability Law Library~1<br/>Güvenlik sektörünün parlamenter gözetimi : ilkeler, mekanizmalar ve uygulamalarent://SD_ILS/0/SD_ILS:1071402024-11-15T16:32:58Z2024-11-15T16:32:58ZAuthor Born, Hans. Kaliber, Esra Ortakan, çev. Kaliber, Alper, çev.<br/>Preferred Shelf Number UA10.5 .B67 2005<br/>Format: Books<br/>Availability Beytepe Library~1<br/>Özel güvenlik tedbirlerient://SD_ILS/0/SD_ILS:1144302024-11-15T16:32:58Z2024-11-15T16:32:58ZAuthor Ünsal, Faruk İpekoğlu, Murat.<br/>Preferred Shelf Number HV8291.T9 U573 2005<br/>Format: Books<br/>Availability Beytepe Library~1<br/>İş güvencesi hukuku : işe iade davalarıent://SD_ILS/0/SD_ILS:1018152024-11-15T16:32:58Z2024-11-15T16:32:58ZAuthor Bilgili, Abbas.<br/>Preferred Shelf Number KKX 1279 .B55 2005<br/>Format: Books<br/>Availability Law Library~1<br/>Ulus devletin çöküşü : Yirmi birinci yüzyılda kaos ve düzenent://SD_ILS/0/SD_ILS:1040402024-11-15T16:32:58Z2024-11-15T16:32:58ZAuthor Cooper, Robert, 1947- Karahan, Berrin.<br/>Preferred Shelf Number JZ1308 .C6620 2005<br/>Format: Books<br/>Availability Beytepe Library~1<br/>