Search Results for Security. - Narrowed by: 2006 SirsiDynix Enterprise https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dSecurity.$0026qf$003dPUBDATE$002509Publication$002bDate$0025092006$0025092006$0026te$003dILS$0026ps$003d300$0026isd$003dtrue?dt=list 2024-12-26T00:39:49Z RFID security ent://SD_ILS/0/SD_ILS:254074 2024-12-26T00:39:49Z 2024-12-26T00:39:49Z Author&#160;Thornton, Frank.&#160;Haines, Brad.&#160;Das, Anand M.&#160;Bhargava, Hersh.&#160;Campbell, Anita.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490474">http://www.sciencedirect.com/science/book/9781597490474</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Practical VoIP security ent://SD_ILS/0/SD_ILS:253669 2024-12-26T00:39:49Z 2024-12-26T00:39:49Z Author&#160;Porter, Thomas.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490603">http://www.sciencedirect.com/science/book/9781597490603</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Wireless security handbook ent://SD_ILS/0/SD_ILS:284785 2024-12-26T00:39:49Z 2024-12-26T00:39:49Z Author&#160;Earle, Aaron E.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781420031188">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer security fundamentals ent://SD_ILS/0/SD_ILS:108620 2024-12-26T00:39:49Z 2024-12-26T00:39:49Z Author&#160;Easttom, Chuck.<br/>Preferred Shelf Number&#160;QA76.9.A25 E325 2006<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Information security management handbook ent://SD_ILS/0/SD_ILS:289151 2024-12-26T00:39:49Z 2024-12-26T00:39:49Z Author&#160;Tipton, Harold F.&#160;Krause, Micki.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9780203325438">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information security management handbook ent://SD_ILS/0/SD_ILS:290320 2024-12-26T00:39:49Z 2024-12-26T00:39:49Z Author&#160;Tipton, Harold F.&#160;Krause, Micki.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781420003406">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Foundations of Computer Security ent://SD_ILS/0/SD_ILS:175390 2024-12-26T00:39:49Z 2024-12-26T00:39:49Z Author&#160;Salomon, David. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/1-84628-341-8">http://dx.doi.org/10.1007/1-84628-341-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Handbook of information security ent://SD_ILS/0/SD_ILS:108909 2024-12-26T00:39:49Z 2024-12-26T00:39:49Z Author&#160;Bidgoli, Hossein, ed.<br/>Preferred Shelf Number&#160;TK5105.59 H35 2006 V.1<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~3<br/> Writing security tools and exploits ent://SD_ILS/0/SD_ILS:253954 2024-12-26T00:39:49Z 2024-12-26T00:39:49Z Author&#160;Foster, James C.&#160;Liu, Vincent.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597499972">http://www.sciencedirect.com/science/book/9781597499972</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> CryptoGraphics : exploiting graphics cards for security ent://SD_ILS/0/SD_ILS:119741 2024-12-26T00:39:49Z 2024-12-26T00:39:49Z Author&#160;Cook, Debra L.&#160;Keromytis, Angelos.<br/>Preferred Shelf Number&#160;QA76.9.D314 C66 2006<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> CryptoGraphics Exploiting Graphics Cards for Security ent://SD_ILS/0/SD_ILS:166011 2024-12-26T00:39:49Z 2024-12-26T00:39:49Z Author&#160;Cook, Debra L. author.&#160;Keromytis, Angelos D. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/0-387-34189-7">http://dx.doi.org/10.1007/0-387-34189-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Syngress IT security project management handbook ent://SD_ILS/0/SD_ILS:253949 2024-12-26T00:39:49Z 2024-12-26T00:39:49Z Author&#160;Snedaker, Susan.&#160;Rogers, Russ.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490764">http://www.sciencedirect.com/science/book/9781597490764</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Sensing with Security Applications ent://SD_ILS/0/SD_ILS:169136 2024-12-26T00:39:49Z 2024-12-26T00:39:49Z Author&#160;Byrnes, Jim. editor.&#160;Ostheimer, Gerald. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/1-4020-4295-7">http://dx.doi.org/10.1007/1-4020-4295-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information security a strategic approach ent://SD_ILS/0/SD_ILS:249831 2024-12-26T00:39:49Z 2024-12-26T00:39:49Z Author&#160;LeVeque, Vincent.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;IEEE Xplore <a href="http://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=5989138">http://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=5989138</a> IEEE Xplore <a href="http://ieeexplore.ieee.org/servlet/opac?bknumber=5989138">http://ieeexplore.ieee.org/servlet/opac?bknumber=5989138</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information security principles and practice ent://SD_ILS/0/SD_ILS:301803 2024-12-26T00:39:49Z 2024-12-26T00:39:49Z Author&#160;Stamp, Mark.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://www.contentreserve.com/TitleInfo.asp?ID={310C0D18-7395-435E-BA71-41A0448F3D13}&Format=50">Click for information</a> Ebook Library <a href="http://public.eblib.com/EBLPublic/PublicView.do?ptiID=240929">http://public.eblib.com/EBLPublic/PublicView.do?ptiID=240929</a> John Wiley <a href="http://dx.doi.org/10.1002/0471744190">http://dx.doi.org/10.1002/0471744190</a> <a href="http://www3.interscience.wiley.com/cgi-bin/bookhome/109933408">http://www3.interscience.wiley.com/cgi-bin/bookhome/109933408</a> HathiTrust Digital Library, Limited view (search only) <a href="http://catalog.hathitrust.org/api/volumes/oclc/57754240.html">http://catalog.hathitrust.org/api/volumes/oclc/57754240.html</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security and sustainable development in Myanmar ent://SD_ILS/0/SD_ILS:259470 2024-12-26T00:39:49Z 2024-12-26T00:39:49Z Author&#160;James, Helen, 1947-<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://www.tandfebooks.com/isbn/9780203001981">Click here to view</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Enhancing computer security with smart technology ent://SD_ILS/0/SD_ILS:284793 2024-12-26T00:39:49Z 2024-12-26T00:39:49Z Author&#160;Vemuri, V. Rao.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781420031225">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Managing Information Systems Security and Privacy ent://SD_ILS/0/SD_ILS:181654 2024-12-26T00:39:49Z 2024-12-26T00:39:49Z Author&#160;Tr&#269;ek, Denis. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/3-540-28104-5">http://dx.doi.org/10.1007/3-540-28104-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information security : principles and practice ent://SD_ILS/0/SD_ILS:109477 2024-12-26T00:39:49Z 2024-12-26T00:39:49Z Author&#160;Stamp, Mark.<br/>Preferred Shelf Number&#160;QA76.9.A25 S69 2006<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Guide to Wireless Network Security ent://SD_ILS/0/SD_ILS:165680 2024-12-26T00:39:49Z 2024-12-26T00:39:49Z Author&#160;Vacca, John R. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-0-387-29845-0">http://dx.doi.org/10.1007/978-0-387-29845-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Quality of Protection Security Measurements and Metrics ent://SD_ILS/0/SD_ILS:166159 2024-12-26T00:39:49Z 2024-12-26T00:39:49Z Author&#160;Gollmann, Dieter. editor.&#160;Massacci, Fabio. editor.&#160;Yautsiukhin, Artsiom. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-0-387-36584-8">http://dx.doi.org/10.1007/978-0-387-36584-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> How to cheat at managing information security ent://SD_ILS/0/SD_ILS:253677 2024-12-26T00:39:49Z 2024-12-26T00:39:49Z Author&#160;Osborne, Mark.&#160;Summitt, Paul M.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491105">http://www.sciencedirect.com/science/book/9781597491105</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Democracy, Society and the Governance of Security ent://SD_ILS/0/SD_ILS:234896 2024-12-26T00:39:49Z 2024-12-26T00:39:49Z Author&#160;Wood, Jennifer.&#160;Dupont, Beno&icirc;t.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1017/CBO9780511489358">Access by subscription</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Assurance Security in the Information Environment ent://SD_ILS/0/SD_ILS:175440 2024-12-26T00:39:49Z 2024-12-26T00:39:49Z Author&#160;Blyth, Andrew. author.&#160;Kovacich, Gerald L. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/1-84628-489-9">http://dx.doi.org/10.1007/1-84628-489-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Critical infrastructure homeland security and emergency preparedness ent://SD_ILS/0/SD_ILS:290261 2024-12-26T00:39:49Z 2024-12-26T00:39:49Z Author&#160;Radvanovsky, Robert.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781420007428">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Multimedia security technologies for digital rights management ent://SD_ILS/0/SD_ILS:254554 2024-12-26T00:39:49Z 2024-12-26T00:39:49Z Author&#160;Zeng, Wenjun, 1967-&#160;Yu, Hong Heather, 1967-&#160;Lin, Ching-Yung.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780123694768">http://www.sciencedirect.com/science/book/9780123694768</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Biometric User Authentication for it Security From Fundamentals to Handwriting ent://SD_ILS/0/SD_ILS:165467 2024-12-26T00:39:49Z 2024-12-26T00:39:49Z Author&#160;Vielhauer, Claus. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/0-387-28094-4">http://dx.doi.org/10.1007/0-387-28094-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Desertification in the Mediterranean Region. A Security Issue ent://SD_ILS/0/SD_ILS:168994 2024-12-26T00:39:49Z 2024-12-26T00:39:49Z Author&#160;Kepner, William G. editor.&#160;Rubio, Jose L. editor.&#160;Mouat, David A. editor.&#160;Pedrazzini, Fausto. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/1-4020-3760-0">http://dx.doi.org/10.1007/1-4020-3760-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Optical Imaging Sensors and Systems for Homeland Security Applications ent://SD_ILS/0/SD_ILS:165456 2024-12-26T00:39:49Z 2024-12-26T00:39:49Z Author&#160;Javidi, Bahram. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/b137387">http://dx.doi.org/10.1007/b137387</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> How to cheat at designing security for a Windows Server 2003 network ent://SD_ILS/0/SD_ILS:253670 2024-12-26T00:39:49Z 2024-12-26T00:39:49Z Author&#160;Amini, Rob.&#160;Hunter, Laura E.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492430">http://www.sciencedirect.com/science/book/9781597492430</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Environmental Security and Environmental Management: The Role of Risk Assessment ent://SD_ILS/0/SD_ILS:169031 2024-12-26T00:39:49Z 2024-12-26T00:39:49Z Author&#160;Morel, Benoit. editor.&#160;Linkov, Igor. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/1-4020-3893-3">http://dx.doi.org/10.1007/1-4020-3893-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Environmental Security and Sustainable Land Use - with special reference to Central Asia ent://SD_ILS/0/SD_ILS:169195 2024-12-26T00:39:49Z 2024-12-26T00:39:49Z Author&#160;Vogtmann, Hartmut. editor.&#160;Dobretsov, Nikolai. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/1-4020-4493-3">http://dx.doi.org/10.1007/1-4020-4493-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security of Water Supply Systems: from Source to Tap ent://SD_ILS/0/SD_ILS:169215 2024-12-26T00:39:49Z 2024-12-26T00:39:49Z Author&#160;Pollert, Jaroslav. editor.&#160;Dedus, Bozidar. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/1-4020-4564-6">http://dx.doi.org/10.1007/1-4020-4564-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Remote Sensing of the Atmosphere for Environmental Security Proceedings of the NATO Advanced Research Workshop on Remote Sensing of the Atmosphere for Environmental Security Rabat, Morocco 16&ndash;19 November 2005 ent://SD_ILS/0/SD_ILS:169371 2024-12-26T00:39:49Z 2024-12-26T00:39:49Z Author&#160;Perrin, Agn&egrave;s. editor.&#160;Ben Sari-Zizi, Najate. editor.&#160;Demaison, Jean. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-1-4020-5090-9">http://dx.doi.org/10.1007/978-1-4020-5090-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Sequrity for computer networks : an introduction to data security in teleprocessing and electronic funds transfer ent://SD_ILS/0/SD_ILS:62188 2024-12-26T00:39:49Z 2024-12-26T00:39:49Z Author&#160;Davies, Donald Watts, 1924-&#160;Price, W. L., ort.yaz.<br/>Preferred Shelf Number&#160;TK 5105 D43 1989<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Formal Aspects in Security and Trust Thrid International Workshop, FAST 2005, Newcastle upon Tyne, UK, July 18-19, 2005, Revised Selected Papers ent://SD_ILS/0/SD_ILS:183455 2024-12-26T00:39:49Z 2024-12-26T00:39:49Z Author&#160;Dimitrakos, Theo. editor.&#160;Martinelli, Fabio. editor.&#160;Ryan, Peter Y. A. editor.&#160;Schneider, Steve. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/11679219">http://dx.doi.org/10.1007/11679219</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Emerging Trends in Information and Communication Security International Conference, ETRICS 2006, Freiburg, Germany, June 6-9, 2006. Proceedings ent://SD_ILS/0/SD_ILS:184130 2024-12-26T00:39:49Z 2024-12-26T00:39:49Z Author&#160;M&uuml;ller, G&uuml;nter. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/11766155">http://dx.doi.org/10.1007/11766155</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Applied Cryptography and Network Security 4th International Conference, ACNS 2006, Singapore, June 6-9, 2006. Proceedings ent://SD_ILS/0/SD_ILS:184150 2024-12-26T00:39:49Z 2024-12-26T00:39:49Z Author&#160;Zhou, Jianying. editor.&#160;Yung, Moti. editor.&#160;Bao, Feng. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/11767480">http://dx.doi.org/10.1007/11767480</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Financial Cryptography and Data Security 10th International Conference, FC 2006 Anguilla, British West Indies, February 27-March 2, 2006 Revised Selected Papers ent://SD_ILS/0/SD_ILS:184908 2024-12-26T00:39:49Z 2024-12-26T00:39:49Z Author&#160;Crescenzo, Giovanni. editor.&#160;Rubin, Avi. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/11889663">http://dx.doi.org/10.1007/11889663</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Intelligence and Security Informatics IEEE International Conference on Intelligence and Security Informatics, ISI 2006, San Diego, CA, USA, May 23-24, 2006. Proceedings ent://SD_ILS/0/SD_ILS:184072 2024-12-26T00:39:49Z 2024-12-26T00:39:49Z Author&#160;Mehrotra, Sharad. editor.&#160;Zeng, Daniel D. editor.&#160;Chen, Hsinchun. editor.&#160;Thuraisingham, Bhavani. editor.&#160;Wang, Fei-Yue. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/11760146">http://dx.doi.org/10.1007/11760146</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> ITIL Security Management realisieren IT-Service Security Management nach ITIL &mdash; So gehen Sie vor ent://SD_ILS/0/SD_ILS:199240 2024-12-26T00:39:49Z 2024-12-26T00:39:49Z Author&#160;Brunnstein, Jochen. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-8348-9072-6">http://dx.doi.org/10.1007/978-3-8348-9072-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> ISSE 2006 &mdash; Securing Electronic Busines Processes Highlights of the Information Security Solutions Europe 2006 Conference ent://SD_ILS/0/SD_ILS:199337 2024-12-26T00:39:49Z 2024-12-26T00:39:49Z Author&#160;Paulus, Sachar. author.&#160;Pohlmann, Norbert. author.&#160;Reimer, Helmut. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-8348-9195-2">http://dx.doi.org/10.1007/978-3-8348-9195-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> The shield and the cloak the security of the commons ent://SD_ILS/0/SD_ILS:233165 2024-12-26T00:39:49Z 2024-12-26T00:39:49Z Author&#160;Hart, Gary, 1936-<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;Oxford scholarship online <a href="http://dx.doi.org/10.1093/acprof:oso/9780195306163.001.0001">http://dx.doi.org/10.1093/acprof:oso/9780195306163.001.0001</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security Practice and Experience Second International Conference, ISPEC 2006, Hangzhou, China, April 11-14, 2006. Proceedings ent://SD_ILS/0/SD_ILS:183605 2024-12-26T00:39:49Z 2024-12-26T00:39:49Z Author&#160;Chen, Kefei. editor.&#160;Deng, Robert. editor.&#160;Lai, Xuejia. editor.&#160;Zhou, Jianying. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/11689522">http://dx.doi.org/10.1007/11689522</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security Applications 6th International Workshop, WISA 2005, Jeju Island, Korea, August 22-24, 2005, Revised Selected Papers ent://SD_ILS/0/SD_ILS:183638 2024-12-26T00:39:49Z 2024-12-26T00:39:49Z Author&#160;Song, Joo-Seok. editor.&#160;Kwon, Taekyoung. editor.&#160;Yung, Moti. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/11604938">http://dx.doi.org/10.1007/11604938</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security and Cryptology - ICISC 2005 8th International Conference, Seoul, Korea, December 1-2, 2005, Revised Selected Papers ent://SD_ILS/0/SD_ILS:183712 2024-12-26T00:39:49Z 2024-12-26T00:39:49Z Author&#160;Won, Dong Ho. editor.&#160;Kim, Seungjoo. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/11734727">http://dx.doi.org/10.1007/11734727</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Intelligence and Security Informatics International Workshop, WISI 2006, Singapore, April 9, 2006. Proceedings ent://SD_ILS/0/SD_ILS:183715 2024-12-26T00:39:49Z 2024-12-26T00:39:49Z Author&#160;Chen, Hsinchun. editor.&#160;Wang, Fei-Yue. editor.&#160;Yang, Christopher C. editor.&#160;Zeng, Daniel. editor.&#160;Chau, Michael. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/11734628">http://dx.doi.org/10.1007/11734628</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security in Pervasive Computing Third International Conference, SPC 2006, York, UK, April 18-21, 2006. Proceedings ent://SD_ILS/0/SD_ILS:183718 2024-12-26T00:39:49Z 2024-12-26T00:39:49Z Author&#160;Clark, John A. editor.&#160;Paige, Richard F. editor.&#160;Polack, Fiona A. C. editor.&#160;Brooke, Phillip J. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/11734666">http://dx.doi.org/10.1007/11734666</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Vesuvius education, security and prosperity = Educazione, sicurezza e prosperit&agrave; ent://SD_ILS/0/SD_ILS:255399 2024-12-26T00:39:49Z 2024-12-26T00:39:49Z Author&#160;Dobran, F.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780444521040">http://www.sciencedirect.com/science/book/9780444521040</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security and Privacy 11th Australasian Conference, ACISP 2006, Melbourne, Australia, July 3-5, 2006. Proceedings ent://SD_ILS/0/SD_ILS:184257 2024-12-26T00:39:49Z 2024-12-26T00:39:49Z Author&#160;Batten, Lynn Margaret. editor.&#160;Safavi-Naini, Reihaneh. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/11780656">http://dx.doi.org/10.1007/11780656</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security@Work Pragmatische Konzeption und Implementierung von IT-Sicherheit mit L&ouml;ungsbeispielen auf Open-Source-Basis ent://SD_ILS/0/SD_ILS:184358 2024-12-26T00:39:49Z 2024-12-26T00:39:49Z Author&#160;Eschweiler, J&ouml;g. author.&#160;Atencio Psille, Daniel E. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/3-540-36226-6">http://dx.doi.org/10.1007/3-540-36226-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Data and Applications Security XX 20th Annual IFIP WG 11.3 Working Conference on Data and Applications Security, Sophia Antipolis, France, July 31-August 2, 2006. Proceedings ent://SD_ILS/0/SD_ILS:184439 2024-12-26T00:39:49Z 2024-12-26T00:39:49Z Author&#160;Damiani, Ernesto. editor.&#160;Liu, Peng. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/11805588">http://dx.doi.org/10.1007/11805588</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security and Cryptography for Networks 5th International Conference, SCN 2006, Maiori, Italy, September 6-8, 2006. Proceedings ent://SD_ILS/0/SD_ILS:184658 2024-12-26T00:39:49Z 2024-12-26T00:39:49Z Author&#160;Prisco, Roberto. editor.&#160;Yung, Moti. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/11832072">http://dx.doi.org/10.1007/11832072</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer Security &ndash; ESORICS 2006 11th European Symposium on Research in Computer Security, Hamburg, Germany, September 18-20, 2006. Proceedings ent://SD_ILS/0/SD_ILS:184783 2024-12-26T00:39:49Z 2024-12-26T00:39:49Z Author&#160;Gollmann, Dieter. editor.&#160;Meier, Jan. editor.&#160;Sabelfeld, Andrei. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/11863908">http://dx.doi.org/10.1007/11863908</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer Safety, Reliability, and Security 25th International Conference, SAFECOMP 2006, Gdansk, Poland, September 27-29, 2006. Proceedings ent://SD_ILS/0/SD_ILS:184859 2024-12-26T00:39:49Z 2024-12-26T00:39:49Z Author&#160;G&oacute;rski, Janusz. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/11875567">http://dx.doi.org/10.1007/11875567</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security and Cryptology &ndash; ICISC 2006 9th International Conference, Busan, Korea, November 30 - December 1, 2006. Proceedings ent://SD_ILS/0/SD_ILS:185180 2024-12-26T00:39:49Z 2024-12-26T00:39:49Z Author&#160;Rhee, Min Surp. editor.&#160;Lee, Byoungcheon. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/11927587">http://dx.doi.org/10.1007/11927587</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cryptology and Network Security 5th International Conference, CANS 2006, Suzhou, China, December 8-10, 2006. Proceedings ent://SD_ILS/0/SD_ILS:185207 2024-12-26T00:39:49Z 2024-12-26T00:39:49Z Author&#160;Pointcheval, David. editor.&#160;Mu, Yi. editor.&#160;Chen, Kefei. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/11935070">http://dx.doi.org/10.1007/11935070</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Cryptology &ndash; ASIACRYPT 2006 12th International Conference on the Theory and Application of Cryptology and Information Security, Shanghai, China, December 3-7, 2006. Proceedings ent://SD_ILS/0/SD_ILS:185214 2024-12-26T00:39:49Z 2024-12-26T00:39:49Z Author&#160;Lai, Xuejia. editor.&#160;Chen, Kefei. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/11935230">http://dx.doi.org/10.1007/11935230</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information and Communications Security 8th International Conference, ICICS 2006, Raleigh, NC, USA, December 4-7, 2006. Proceedings ent://SD_ILS/0/SD_ILS:185217 2024-12-26T00:39:49Z 2024-12-26T00:39:49Z Author&#160;Ning, Peng. editor.&#160;Qing, Sihan. editor.&#160;Li, Ninghui. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/11935308">http://dx.doi.org/10.1007/11935308</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security and Cryptology Second SKLOIS Conference, Inscrypt 2006, Beijing, China, November 29 - December 1, 2006. Proceedings ent://SD_ILS/0/SD_ILS:185235 2024-12-26T00:39:49Z 2024-12-26T00:39:49Z Author&#160;Lipmaa, Helger. editor.&#160;Yung, Moti. editor.&#160;Lin, Dongdai. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/11937807">http://dx.doi.org/10.1007/11937807</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Stabilization, Safety, and Security of Distributed Systems 8th International Symposium, SSS 2006, Dallas, TX, USA, November 17-19, 2006. Proceedings ent://SD_ILS/0/SD_ILS:185265 2024-12-26T00:39:49Z 2024-12-26T00:39:49Z Author&#160;Datta, Ajoy K. editor.&#160;Gradinariu, Maria. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-49823-0">http://dx.doi.org/10.1007/978-3-540-49823-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Critical Information Infrastructures Security First International Workshop, CRITIS 2006, Samos, Greece, August 31 - September 1, 2006. Revised Papers ent://SD_ILS/0/SD_ILS:185707 2024-12-26T00:39:49Z 2024-12-26T00:39:49Z Author&#160;Lopez, Javier. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/11962977">http://dx.doi.org/10.1007/11962977</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security log management identifying patterns in the chaos ent://SD_ILS/0/SD_ILS:253947 2024-12-26T00:39:49Z 2024-12-26T00:39:49Z Author&#160;Babbin, Jacob.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490429">http://www.sciencedirect.com/science/book/9781597490429</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Critical infrastructure protection in homeland security defending a networked nation ent://SD_ILS/0/SD_ILS:303065 2024-12-26T00:39:49Z 2024-12-26T00:39:49Z Author&#160;Lewis, T. G. (Theodore Gyle), 1941-<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://www.contentreserve.com/TitleInfo.asp?ID={B7674963-A0F9-4349-AB2D-7F1D59FE8883}&Format=50">Click for information</a> John Wiley <a href="http://dx.doi.org/10.1002/0471789542">http://dx.doi.org/10.1002/0471789542</a> <a href="http://www3.interscience.wiley.com/cgi-bin/bookhome/112100959">http://www3.interscience.wiley.com/cgi-bin/bookhome/112100959</a> MyiLibrary, Table of contents <a href="http://www.myilibrary.com?id=41147&ref=toc">http://www.myilibrary.com?id=41147&ref=toc</a> HathiTrust Digital Library, Limited view (search only) <a href="http://catalog.hathitrust.org/api/volumes/oclc/61651657.html">http://catalog.hathitrust.org/api/volumes/oclc/61651657.html</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Building and implementing a security certification and accreditation program official (ISC) guide to the CAP CBK ent://SD_ILS/0/SD_ILS:290106 2024-12-26T00:39:49Z 2024-12-26T00:39:49Z Author&#160;Howard, Patrick D.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9780203492482">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information security architecture an integrated approach to security in the organization ent://SD_ILS/0/SD_ILS:290176 2024-12-26T00:39:49Z 2024-12-26T00:39:49Z Author&#160;Tudor, Jan Killmeyer.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9780203488751">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> The security risk assessment handbook a complete guide for performing security risk assessments ent://SD_ILS/0/SD_ILS:284790 2024-12-26T00:39:49Z 2024-12-26T00:39:49Z Author&#160;Landoll, Douglas J.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781420031232">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Old Europe, new security : evolution for a complex world ent://SD_ILS/0/SD_ILS:134217 2024-12-26T00:39:49Z 2024-12-26T00:39:49Z Author&#160;Adamski, Janet.&#160;Johnson, Mary Troy.&#160;Schweiss, Christina.<br/>Preferred Shelf Number&#160;JZ5588 .O53 2006<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Embedded Security in Cars Securing Current and Future Automotive IT Applications ent://SD_ILS/0/SD_ILS:181739 2024-12-26T00:39:49Z 2024-12-26T00:39:49Z Author&#160;Lemke, Kerstin. editor.&#160;Paar, Christof. editor.&#160;Wolf, Marko. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/3-540-28428-1">http://dx.doi.org/10.1007/3-540-28428-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Essential computer security everyone's guide to e-mail, Internet, and wireless security ent://SD_ILS/0/SD_ILS:145840 2024-12-26T00:39:49Z 2024-12-26T00:39:49Z Author&#160;Bradley, Tony, 1969-&#160;Carvey, Harlan A.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491143">http://www.sciencedirect.com/science/book/9781597491143</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Enemy at the water cooler real-life stories of insider threats and Enterprise Security Management countermeasures ent://SD_ILS/0/SD_ILS:146475 2024-12-26T00:39:49Z 2024-12-26T00:39:49Z Author&#160;Contos, Brian T.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491297">http://www.sciencedirect.com/science/book/9781597491297</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Network Control and Engineering for Qos, Security and Mobility, V IFIP 19th World Computer Congress, TC-6, 5th IFIP International Conference on Network Control and Engineering for QoS, Security and Mobility, August 20&ndash;25, 2006, Santiago, Chile ent://SD_ILS/0/SD_ILS:166080 2024-12-26T00:39:49Z 2024-12-26T00:39:49Z Author&#160;Ga&iuml;ti, Dominique. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-0-387-34827-8">http://dx.doi.org/10.1007/978-0-387-34827-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information security architecture : an integrated approach to security in the organization ent://SD_ILS/0/SD_ILS:110865 2024-12-26T00:39:49Z 2024-12-26T00:39:49Z Author&#160;Tudor, Jan Killmeyer.<br/>Preferred Shelf Number&#160;QA76.9.A25 T83 2006<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> A Classical Introduction to Cryptography Applications for Communications Security ent://SD_ILS/0/SD_ILS:165205 2024-12-26T00:39:49Z 2024-12-26T00:39:49Z Author&#160;Vaudenay, Serge. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/b136373">http://dx.doi.org/10.1007/b136373</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Access Control Systems Security, Identity Management and Trust Models ent://SD_ILS/0/SD_ILS:165433 2024-12-26T00:39:49Z 2024-12-26T00:39:49Z Author&#160;Benantar, Messaoud. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/0-387-27716-1">http://dx.doi.org/10.1007/0-387-27716-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Intelligence and Security Informatics for International Security Information Sharing and Data Mining ent://SD_ILS/0/SD_ILS:165714 2024-12-26T00:39:49Z 2024-12-26T00:39:49Z Author&#160;Chen, Hsinchun. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/0-387-30332-4">http://dx.doi.org/10.1007/0-387-30332-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Intelligence and security informatics for international security : information sharing and data mining ent://SD_ILS/0/SD_ILS:119786 2024-12-26T00:39:49Z 2024-12-26T00:39:49Z Author&#160;Chen, Hsinchun.<br/>Preferred Shelf Number&#160;QA76.76.E95 C44 2006<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Beyond the risk society : critical reflections on risk and human security ent://SD_ILS/0/SD_ILS:133814 2024-12-26T00:39:49Z 2024-12-26T00:39:49Z Author&#160;Mythen, Gabe.&#160;Walklate, Sandra.<br/>Preferred Shelf Number&#160;HM1101 .B49 2006<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Australia&rsquo;s Arc of Instability The Political and Cultural Dynamics of Regional Security ent://SD_ILS/0/SD_ILS:152191 2024-12-26T00:39:49Z 2024-12-26T00:39:49Z Author&#160;Rumley, Dennis.&#160;Forbes, Vivian Louis.&#160;Griffin, Christopher.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/1-4020-3826-7">http://dx.doi.org/10.1007/1-4020-3826-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security Management, Integrity, and Internal Control in Information Systems IFIP TC-11 WG 11.1 &amp; WG 11.5 Joint Working Conference ent://SD_ILS/0/SD_ILS:165796 2024-12-26T00:39:49Z 2024-12-26T00:39:49Z Author&#160;Dowland, Paul. editor.&#160;Furnell, Steve. editor.&#160;Thuraisingham, Bhavani. editor.&#160;Wang, X. Sean. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/0-387-31167-X">http://dx.doi.org/10.1007/0-387-31167-X</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security and Privacy in Dynamic Environments Proceedings of the IFIP TC-11 21st International Information Security Conference (SEC 2006), 22&ndash;24 May 2006, Karlstad, Sweden ent://SD_ILS/0/SD_ILS:165935 2024-12-26T00:39:49Z 2024-12-26T00:39:49Z Author&#160;Fischer-H&uuml;bner, Simone. editor.&#160;Rannenberg, Kai. editor.&#160;Yngstr&ouml;m, Louise. editor.&#160;Lindskog, Stefan. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/0-387-33406-8">http://dx.doi.org/10.1007/0-387-33406-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Biometrics, Computer Security Systems and Artificial Intelligence Applications ent://SD_ILS/0/SD_ILS:166154 2024-12-26T00:39:49Z 2024-12-26T00:39:49Z Author&#160;Saeed, Khalid. editor.&#160;Peja&#347;, Jerzy. editor.&#160;Mosdorf, Romuald. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-0-387-36503-9">http://dx.doi.org/10.1007/978-0-387-36503-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Sensing with Security Applications Proceedings of the NATO Advanced Study Institute, held in St. Etienne de Tinee, France, August 28-September 11, 2004 ent://SD_ILS/0/SD_ILS:169151 2024-12-26T00:39:49Z 2024-12-26T00:39:49Z Author&#160;Golovin, Alexander A. editor.&#160;Nepomnyashchy, Alexander A. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/1-4020-4355-4">http://dx.doi.org/10.1007/1-4020-4355-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Machine Learning and Data Mining for Computer Security Methods and Applications ent://SD_ILS/0/SD_ILS:175344 2024-12-26T00:39:49Z 2024-12-26T00:39:49Z Author&#160;Maloof, Marcus A. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/1-84628-253-5">http://dx.doi.org/10.1007/1-84628-253-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security 9th International Conference, ISC 2006, Samos Island, Greece, August 30 - September 2, 2006. Proceedings ent://SD_ILS/0/SD_ILS:184677 2024-12-26T00:39:49Z 2024-12-26T00:39:49Z Author&#160;Katsikas, Sokratis K. editor.&#160;L&oacute;pez, Javier. editor.&#160;Backes, Michael. editor.&#160;Gritzalis, Stefanos. editor.&#160;Preneel, Bart. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/11836810">http://dx.doi.org/10.1007/11836810</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Multimedia Content Representation, Classification and Security International Workshop, MRCS 2006, Istanbul, Turkey, September 11-13, 2006. Proceedings ent://SD_ILS/0/SD_ILS:184726 2024-12-26T00:39:49Z 2024-12-26T00:39:49Z Author&#160;Gunsel, Bilge. editor.&#160;Jain, Anil K. editor.&#160;Tekalp, A. Murat. editor.&#160;Sankur, B&uuml;lent. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/11848035">http://dx.doi.org/10.1007/11848035</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security Protocols 12th International Workshop, Cambridge, UK, April 26-28, 2004. Revised Selected Papers ent://SD_ILS/0/SD_ILS:184763 2024-12-26T00:39:49Z 2024-12-26T00:39:49Z Author&#160;Christianson, Bruce. editor.&#160;Crispo, Bruno. editor.&#160;Malcolm, James A. editor.&#160;Roe, Michael. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/11861386">http://dx.doi.org/10.1007/11861386</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Information and Computer Security First International Workshop on Security, IWSEC 2006, Kyoto, Japan, October 23-24, 2006. Proceedings ent://SD_ILS/0/SD_ILS:185034 2024-12-26T00:39:49Z 2024-12-26T00:39:49Z Author&#160;Yoshiura, Hiroshi. editor.&#160;Sakurai, Kouichi. editor.&#160;Rannenberg, Kai. editor.&#160;Murayama, Yuko. editor.&#160;Kawamura, Shinichi. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/11908739">http://dx.doi.org/10.1007/11908739</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Communications and Multimedia Security 10th IFIP TC-6 TC-11 International Conference, CMS 2006, Heraklion, Crete, Greece, October 19-21, 2006. Proceedings ent://SD_ILS/0/SD_ILS:185039 2024-12-26T00:39:49Z 2024-12-26T00:39:49Z Author&#160;Leitold, Herbert. editor.&#160;Markatos, Evangelos P. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/11909033">http://dx.doi.org/10.1007/11909033</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Transactions on Data Hiding and Multimedia Security I ent://SD_ILS/0/SD_ILS:185169 2024-12-26T00:39:49Z 2024-12-26T00:39:49Z Author&#160;Shi, Yun Q. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/11926214">http://dx.doi.org/10.1007/11926214</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Systems Security Second International Conference, ICISS 2006, Kolkata, India, December 19-21, 2006. Proceedings ent://SD_ILS/0/SD_ILS:185666 2024-12-26T00:39:49Z 2024-12-26T00:39:49Z Author&#160;Bagchi, Aditya. editor.&#160;Atluri, Vijayalakshmi. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/11961635">http://dx.doi.org/10.1007/11961635</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security and Privacy in Ad-Hoc and Sensor Networks Third European Workshop, ESAS 2006, Hamburg, Germany, September 20-21, 2006, Revised Selected Papers ent://SD_ILS/0/SD_ILS:185732 2024-12-26T00:39:49Z 2024-12-26T00:39:49Z Author&#160;Butty&aacute;n, Levente. editor.&#160;Gligor, Virgil D. editor.&#160;Westhoff, Dirk. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/11964254">http://dx.doi.org/10.1007/11964254</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer Viruses and Malware ent://SD_ILS/0/SD_ILS:166010 2024-12-26T00:39:49Z 2024-12-26T00:39:49Z Author&#160;Aycock, John. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/0-387-34188-9">http://dx.doi.org/10.1007/0-387-34188-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Understanding Intrusion Detection Through Visualization ent://SD_ILS/0/SD_ILS:165418 2024-12-26T00:39:49Z 2024-12-26T00:39:49Z Author&#160;Axelsson, Stefan. author.&#160;Sands, David. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/0-387-27636-X">http://dx.doi.org/10.1007/0-387-27636-X</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Hop Integrity in the Internet ent://SD_ILS/0/SD_ILS:165645 2024-12-26T00:39:49Z 2024-12-26T00:39:49Z Author&#160;Huang, Chin-Tser. author.&#160;Gouda, Mohamed G. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/0-387-29444-9">http://dx.doi.org/10.1007/0-387-29444-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Privacy Preserving Data Mining ent://SD_ILS/0/SD_ILS:165653 2024-12-26T00:39:49Z 2024-12-26T00:39:49Z Author&#160;Vaidya, Jaideep. author.&#160;Zhu, Yu Michael. author.&#160;Clifton, Christopher W. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-0-387-29489-6">http://dx.doi.org/10.1007/978-0-387-29489-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Multivariate Public Key Cryptosystems ent://SD_ILS/0/SD_ILS:166190 2024-12-26T00:39:49Z 2024-12-26T00:39:49Z Author&#160;Ding, Jintai. author.&#160;Gower, Jason E. author.&#160;Schmidt, Dieter S. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-0-387-36946-4">http://dx.doi.org/10.1007/978-0-387-36946-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Safety Improvements through Lessons Learned from Operational Experience in Nuclear Research Facilities ent://SD_ILS/0/SD_ILS:169030 2024-12-26T00:39:49Z 2024-12-26T00:39:49Z Author&#160;Lambert, Francis. editor.&#160;Volkov, Yuri. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/1-4020-3888-7">http://dx.doi.org/10.1007/1-4020-3888-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Ecological Risks Associated with the Destruction of Chemical Weapons ent://SD_ILS/0/SD_ILS:168819 2024-12-26T00:39:49Z 2024-12-26T00:39:49Z Author&#160;Kolodkin, Vladimir M. editor.&#160;Ruck, Wolfgang. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/1-4020-3137-8">http://dx.doi.org/10.1007/1-4020-3137-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Concurrent Zero-Knowledge With Additional Background by Oded Goldreich ent://SD_ILS/0/SD_ILS:183559 2024-12-26T00:39:49Z 2024-12-26T00:39:49Z Author&#160;Rosen, Alon. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/3-540-32939-0">http://dx.doi.org/10.1007/3-540-32939-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> G&uuml;venlik &Ccedil;al&#305;&#351;malar&#305; Dergisi. ent://SD_ILS/0/SD_ILS:342920 2024-12-26T00:39:49Z 2024-12-26T00:39:49Z Format:&#160;Continuing Resources&#160;Other<br/>Availability&#160;~0<br/> &#304;&#351; Hukuku ve Sosyal G&uuml;venlik Hukuku Dergisi . ent://SD_ILS/0/SD_ILS:371749 2024-12-26T00:39:49Z 2024-12-26T00:39:49Z Format:&#160;Continuing Resources&#160;Other<br/>Availability&#160;~0<br/> Management of Intentional and Accidental Water Pollution ent://SD_ILS/0/SD_ILS:169281 2024-12-26T00:39:49Z 2024-12-26T00:39:49Z Author&#160;Dura, Gyula. editor.&#160;Kambourova, Veska. editor.&#160;Simeonova, Fina. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/1-4020-4800-9">http://dx.doi.org/10.1007/1-4020-4800-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Detection and Disposal of Improvised Explosives ent://SD_ILS/0/SD_ILS:169304 2024-12-26T00:39:49Z 2024-12-26T00:39:49Z Author&#160;Schubert, Hiltmar. editor.&#160;Kuznetsov, Andrey. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-1-4020-4887-6">http://dx.doi.org/10.1007/978-1-4020-4887-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Transboundary Floods: Reducing Risks Through Flood Management ent://SD_ILS/0/SD_ILS:169308 2024-12-26T00:39:49Z 2024-12-26T00:39:49Z Author&#160;Marsalek, Jiri. editor.&#160;Stancalie, Gheorghe. editor.&#160;Balint, Gabor. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/1-4020-4902-1">http://dx.doi.org/10.1007/1-4020-4902-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Countering Nuclear and Radiological Terrorism ent://SD_ILS/0/SD_ILS:169315 2024-12-26T00:39:49Z 2024-12-26T00:39:49Z Author&#160;Apikyan, Samuel. editor.&#160;Diamond, David, 1915-2005 editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/1-4020-4921-8">http://dx.doi.org/10.1007/1-4020-4921-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Protection of Civilian Infrastructure from Acts of Terrorism ent://SD_ILS/0/SD_ILS:169316 2024-12-26T00:39:49Z 2024-12-26T00:39:49Z Author&#160;Frolov, Konstantin V. editor.&#160;Baecher, Gregory B. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/1-4020-4924-2">http://dx.doi.org/10.1007/1-4020-4924-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Radiation Risk Estimates in Normal and Emergency Situations ent://SD_ILS/0/SD_ILS:169326 2024-12-26T00:39:49Z 2024-12-26T00:39:49Z Author&#160;Cigna, Arrigo A. editor.&#160;Durante, Marco. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/1-4020-4956-0">http://dx.doi.org/10.1007/1-4020-4956-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Nuclear Science and Safety in Europe ent://SD_ILS/0/SD_ILS:169329 2024-12-26T00:39:49Z 2024-12-26T00:39:49Z Author&#160;&#268;ech&aacute;k, Tomas. editor.&#160;Jenkovszky, L&aacute;szl&oacute;. editor.&#160;Karpenko, Iurii. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-1-4020-4965-1">http://dx.doi.org/10.1007/978-1-4020-4965-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Radiation Detectors for Medical Applications ent://SD_ILS/0/SD_ILS:169372 2024-12-26T00:39:49Z 2024-12-26T00:39:49Z Author&#160;Tavernier, Stefaan. editor.&#160;Gektin, Alexander. editor.&#160;Grinyov, Boris. editor.&#160;Moses, William W. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/1-4020-5093-3">http://dx.doi.org/10.1007/1-4020-5093-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Chemicals as Intentional and Accidental Global Environmental Threats ent://SD_ILS/0/SD_ILS:169374 2024-12-26T00:39:49Z 2024-12-26T00:39:49Z Author&#160;Simeonov, Lubomir. editor.&#160;Chirila, Elisabeta. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-1-4020-5098-5">http://dx.doi.org/10.1007/978-1-4020-5098-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Stand-Off Detection of Suicide Bombers and Mobile Subjects ent://SD_ILS/0/SD_ILS:169391 2024-12-26T00:39:49Z 2024-12-26T00:39:49Z Author&#160;Schubert, Hiltmar. editor.&#160;Rimski-Korsakov, A. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/1-4020-5159-X">http://dx.doi.org/10.1007/1-4020-5159-X</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Combined and Hybrid Adsorbents Fundamentals and Applications ent://SD_ILS/0/SD_ILS:169396 2024-12-26T00:39:49Z 2024-12-26T00:39:49Z Author&#160;Loureiro, Jos&eacute; Miguel. editor.&#160;Kartel, Mykola T. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/1-4020-5172-7">http://dx.doi.org/10.1007/1-4020-5172-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Virus Diseases and Crop Biosecurity ent://SD_ILS/0/SD_ILS:169425 2024-12-26T00:39:49Z 2024-12-26T00:39:49Z Author&#160;Cooper, Ian. editor.&#160;K&uuml;hne, Thomas. editor.&#160;Polishchuk, Valery P. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-1-4020-5298-9">http://dx.doi.org/10.1007/978-1-4020-5298-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Medical Treatment of Intoxications and Decontamination of Chemical Agent in the Area of Terrorist Attack ent://SD_ILS/0/SD_ILS:169102 2024-12-26T00:39:49Z 2024-12-26T00:39:49Z Author&#160;Dishovsky, Christophor. editor.&#160;Pivovarov, Alexander. editor.&#160;Benschop, Hendrik. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/1-4020-4170-5">http://dx.doi.org/10.1007/1-4020-4170-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> BIOELECTROMAGNETICS Current Concepts The Mechanisms of the Biological Effect of Extremely High Power Pulses ent://SD_ILS/0/SD_ILS:169132 2024-12-26T00:39:49Z 2024-12-26T00:39:49Z Author&#160;Ayrapetyan, Sinerik N. editor.&#160;Markov, Marko S. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/1-4020-4278-7">http://dx.doi.org/10.1007/1-4020-4278-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Ecotoxicology, Ecological Risk Assessment and Multiple Stressors ent://SD_ILS/0/SD_ILS:169191 2024-12-26T00:39:49Z 2024-12-26T00:39:49Z Author&#160;Arapis, Gerassimos. editor.&#160;Goncharova, Nadezhda. editor.&#160;Baveye, Philippe. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/1-4020-4476-3">http://dx.doi.org/10.1007/1-4020-4476-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Radiation and Environmental Safety in North-West Russia Use of Impact Assessments and Risk Estimation ent://SD_ILS/0/SD_ILS:169242 2024-12-26T00:39:49Z 2024-12-26T00:39:49Z Author&#160;Strand, Per. editor.&#160;Sneve, Malgorzata. editor.&#160;Pechkurov, Andrey. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/1-4020-4649-9">http://dx.doi.org/10.1007/1-4020-4649-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Integrated Urban Water Resources Management ent://SD_ILS/0/SD_ILS:169249 2024-12-26T00:39:49Z 2024-12-26T00:39:49Z Author&#160;Hlavinek, Petr. editor.&#160;Kukharchyk, Tamara. editor.&#160;Marsalek, Jiri. editor.&#160;Mahrikova, Ivana. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/1-4020-4685-5">http://dx.doi.org/10.1007/1-4020-4685-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Geomagnetics for Aeronautical Safety A Case Study in and around the Balkans ent://SD_ILS/0/SD_ILS:169350 2024-12-26T00:39:49Z 2024-12-26T00:39:49Z Author&#160;Rasson, Jean L. editor.&#160;Delipetrov, Todor. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-1-4020-5025-1">http://dx.doi.org/10.1007/978-1-4020-5025-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Polis bilimleri dergisi = Turkish journal of police studies ent://SD_ILS/0/SD_ILS:229319 2024-12-26T00:39:49Z 2024-12-26T00:39:49Z Electronic Access&#160;<a href="http://www.pa.edu.tr/?app=ED77B64B-C77A-47E1-89ED-FB78A53019E4">Elektronik Eri?im</a><br/>Format:&#160;Continuing Resources&#160;Other<br/>Availability&#160;~0<br/> Masters of Illusion American Leadership in the Media Age ent://SD_ILS/0/SD_ILS:235509 2024-12-26T00:39:49Z 2024-12-26T00:39:49Z Author&#160;Rosefielde, Steven.&#160;Mills, D. Quinn.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1017/CBO9780511510977">Access by subscription</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Seeds of Disaster, Roots of Response How Private Action Can Reduce Public Vulnerability ent://SD_ILS/0/SD_ILS:235967 2024-12-26T00:39:49Z 2024-12-26T00:39:49Z Author&#160;Auerswald, Philip E..&#160;Branscomb, Lewis M..&#160;La Porte, Todd M..&#160;Michel-Kerjan, Erwann O..<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1017/CBO9780511509735">Access by subscription</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> International Relations The Path Not Taken ent://SD_ILS/0/SD_ILS:236002 2024-12-26T00:39:49Z 2024-12-26T00:39:49Z Author&#160;Schoenbaum, Thomas J..<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1017/CBO9780511511295">Access by subscription</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Insider threat protecting the enterprise from sabotage, spying, and theft ent://SD_ILS/0/SD_ILS:253661 2024-12-26T00:39:49Z 2024-12-26T00:39:49Z Author&#160;Cole, Eric.&#160;Ring, Sandra.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;Volltext <a href="http://www.sciencedirect.com/science/book/9781597490481">http://www.sciencedirect.com/science/book/9781597490481</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Penetration tester's open source toolkit ent://SD_ILS/0/SD_ILS:253676 2024-12-26T00:39:49Z 2024-12-26T00:39:49Z Author&#160;Long, Johnny.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490214">http://www.sciencedirect.com/science/book/9781597490214</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Securing IM and P2P applications for the enterprise ent://SD_ILS/0/SD_ILS:253939 2024-12-26T00:39:49Z 2024-12-26T00:39:49Z Author&#160;Piccard, Paul L.&#160;Sachs, Marcus H.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490177">http://www.sciencedirect.com/science/book/9781597490177</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> How to cheat at configuring ISA server 2004 ent://SD_ILS/0/SD_ILS:253948 2024-12-26T00:39:49Z 2024-12-26T00:39:49Z Author&#160;Shinder, Thomas W.&#160;Shinder, Debra Littlejohn.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490573">http://www.sciencedirect.com/science/book/9781597490573</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Combating spyware in the enterprise ent://SD_ILS/0/SD_ILS:254075 2024-12-26T00:39:49Z 2024-12-26T00:39:49Z Author&#160;Baskin, Brian.&#160;Piltzecker, Tony, 1975-<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490641">http://www.sciencedirect.com/science/book/9781597490641</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Emergent information technologies and enabling policies for counter-terrorism ent://SD_ILS/0/SD_ILS:249429 2024-12-26T00:39:49Z 2024-12-26T00:39:49Z Author&#160;Popp, Robert L.&#160;Yen, John.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;IEEE Xplore <a href="http://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=5444075">http://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=5444075</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Securing HP NonStop servers in an open systems world TCP/IP, OSS &amp; SQL ent://SD_ILS/0/SD_ILS:253863 2024-12-26T00:39:49Z 2024-12-26T00:39:49Z Author&#160;XYPRO Technology Corporation.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781555583446">http://www.sciencedirect.com/science/book/9781555583446</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> How to cheat at securing a wireless network ent://SD_ILS/0/SD_ILS:253951 2024-12-26T00:39:49Z 2024-12-26T00:39:49Z Author&#160;Hurley, Chris.&#160;Barken, Lee.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490870">http://www.sciencedirect.com/science/book/9781597490870</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Configuring SonicWALL firewalls ent://SD_ILS/0/SD_ILS:253952 2024-12-26T00:39:49Z 2024-12-26T00:39:49Z Author&#160;Bendell, Dan.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492508">http://www.sciencedirect.com/science/book/9781597492508</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> The complete guide for CPP examination preparation ent://SD_ILS/0/SD_ILS:285601 2024-12-26T00:39:49Z 2024-12-26T00:39:49Z Author&#160;Muuss, James P.&#160;Rabern, David.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781420004427">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Quantum communications and cryptography ent://SD_ILS/0/SD_ILS:290332 2024-12-26T00:39:49Z 2024-12-26T00:39:49Z Author&#160;Sergienko, Alexander V.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781420026603">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> The CISO handbook a practical guide to securing your company ent://SD_ILS/0/SD_ILS:290416 2024-12-26T00:39:49Z 2024-12-26T00:39:49Z Author&#160;Gentile, Michael.&#160;Collette, Ronald D.&#160;August, Thomas D.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781420031379">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Trust and reputation for service-oriented environments technologies for building business intelligence and consumer confidence ent://SD_ILS/0/SD_ILS:296679 2024-12-26T00:39:49Z 2024-12-26T00:39:49Z Author&#160;Chang, Elizabeth.&#160;Dillon, Tharam S., 1943-&#160;Hussain, Farookh K.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://www3.interscience.wiley.com/cgi-bin/homepage/?isbn=9780470028261">Find on the Web</a> John Wiley <a href="http://dx.doi.org/10.1002/9780470028261">http://dx.doi.org/10.1002/9780470028261</a> <a href="http://www3.interscience.wiley.com/cgi-bin/bookhome/113488845">http://www3.interscience.wiley.com/cgi-bin/bookhome/113488845</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Securing utility and energy infrastructures ent://SD_ILS/0/SD_ILS:296785 2024-12-26T00:39:49Z 2024-12-26T00:39:49Z Author&#160;Ness, Larry.&#160;John Wiley &amp; Sons.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;John Wiley <a href="http://dx.doi.org/10.1002/0470054549">http://dx.doi.org/10.1002/0470054549</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Multimedia encryption and authentication techniques and applications ent://SD_ILS/0/SD_ILS:288496 2024-12-26T00:39:49Z 2024-12-26T00:39:49Z Author&#160;Furht, Borivoje.&#160;Kirovski, Darko.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781420013450">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Multimedia watermarking techniques and applications ent://SD_ILS/0/SD_ILS:288506 2024-12-26T00:39:49Z 2024-12-26T00:39:49Z Author&#160;Furht, Borivoje.&#160;Kirovski, Darko.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781420013467">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Firewall policies and VPN configurations ent://SD_ILS/0/SD_ILS:254076 2024-12-26T00:39:49Z 2024-12-26T00:39:49Z Author&#160;Henmi, Anne.&#160;Lucas, Mark.&#160;Singh, Abhishek.&#160;Cantrell, Chris.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490887">http://www.sciencedirect.com/science/book/9781597490887</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Trusted platform module basics using TPM in embedded systems ent://SD_ILS/0/SD_ILS:254421 2024-12-26T00:39:49Z 2024-12-26T00:39:49Z Author&#160;Kinney, Steven.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780750679602">http://www.sciencedirect.com/science/book/9780750679602</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Audit and trace log management consolidation and analysis ent://SD_ILS/0/SD_ILS:284590 2024-12-26T00:39:49Z 2024-12-26T00:39:49Z Author&#160;Maier, Phillip Q.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9780203491768">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Official (ISC)[superscript]2 guide to the CISSP-ISSEP CBK ent://SD_ILS/0/SD_ILS:286485 2024-12-26T00:39:49Z 2024-12-26T00:39:49Z Author&#160;Hansche, Susan.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9780203888933">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Hack the stack using snort and ethereal to master the 8 layers of an insecure network ent://SD_ILS/0/SD_ILS:147954 2024-12-26T00:39:49Z 2024-12-26T00:39:49Z Author&#160;Gregg, Michael (Michael C.)&#160;Watkins, Stephen.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491099">http://www.sciencedirect.com/science/book/9781597491099</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Syngress force emerging threat analysis from mischief to malicious ent://SD_ILS/0/SD_ILS:148488 2024-12-26T00:39:49Z 2024-12-26T00:39:49Z Author&#160;Maynor, David.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490566">http://www.sciencedirect.com/science/book/9781597490566</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> How to cheat at Windows System Administration using command line scripts ent://SD_ILS/0/SD_ILS:112107 2024-12-26T00:39:49Z 2024-12-26T00:39:49Z Author&#160;Bhardwaj, Pawan K.&#160;Andreou, Kimon.&#160;Barber, Brian.&#160;Kleiman, Dave.&#160;Satyanarayana, Mahesh.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491051">An electronic book accessible through the World Wide Web; click for information</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Building online communities with Drupal, phpBB, and WordPress ent://SD_ILS/0/SD_ILS:114019 2024-12-26T00:39:49Z 2024-12-26T00:39:49Z Author&#160;Douglass, Robert T.&#160;Little, Mike, 1962-&#160;Smith, Jared W.&#160;MyiLibrary.<br/>Preferred Shelf Number&#160;TK5105.888 D68 2006<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> 21. y&uuml;zy&#305;lda g&uuml;venlik ve istihbarat ent://SD_ILS/0/SD_ILS:127599 2024-12-26T00:39:49Z 2024-12-26T00:39:49Z Author&#160;Y&#305;lmaz, Sait.<br/>Preferred Shelf Number&#160;UA10.5 .Y55 2006<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Secure your network for free using NMAP, wireshark, snort, nessus, and MRTG ent://SD_ILS/0/SD_ILS:148969 2024-12-26T00:39:49Z 2024-12-26T00:39:49Z Author&#160;Seagren, Eric.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491235">http://www.sciencedirect.com/science/book/9781597491235</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cumhuriyet T&uuml;rkiyesi'nde sosyal g&uuml;venlik ve sosyal politikalar ent://SD_ILS/0/SD_ILS:107362 2024-12-26T00:39:49Z 2024-12-26T00:39:49Z Author&#160;&Ouml;zbek, Nadir.&#160;Emeklilik G&ouml;zetim Merkezi.&#160;Tarih Vakf&#305;.<br/>Preferred Shelf Number&#160;HD7211.93 O93 2006<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> How to cheat at Windows System Administration using command line scripts ent://SD_ILS/0/SD_ILS:145623 2024-12-26T00:39:49Z 2024-12-26T00:39:49Z Author&#160;Bhardwaj, Pawan K.&#160;Andreou, Kimon.&#160;Barber, Brian.&#160;Kleiman, Dave.&#160;Satyanarayana, Mahesh.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491051">http://www.sciencedirect.com/science/book/9781597491051</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Designing and building enterprise DMZs ent://SD_ILS/0/SD_ILS:147464 2024-12-26T00:39:49Z 2024-12-26T00:39:49Z Author&#160;Dubrawsky, Ido.&#160;Baumrucker, C. Tate.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491006">http://www.sciencedirect.com/science/book/9781597491006</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Designing and building enterprise DMZs ent://SD_ILS/0/SD_ILS:112159 2024-12-26T00:39:49Z 2024-12-26T00:39:49Z Author&#160;Dubrawsky, Ido.&#160;Baumrucker, C. Tate.&#160;ScienceDirect (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491006">An electronic book accessible through the World Wide Web; click for information</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Secure your network for free using NMAP, wireshark, snort, nessus, and MRTG ent://SD_ILS/0/SD_ILS:112197 2024-12-26T00:39:49Z 2024-12-26T00:39:49Z Author&#160;Seagren, Eric.&#160;ScienceDirect (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491235">An electronic book accessible through the World Wide Web; click for information</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Syngress force emerging threat analysis from mischief to malicious ent://SD_ILS/0/SD_ILS:112202 2024-12-26T00:39:49Z 2024-12-26T00:39:49Z Author&#160;Maynor, David.&#160;ScienceDirect (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490566">An electronic book accessible through the World Wide Web; click for information</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Bireysel emeklilik sistemi : D&uuml;nya ve T&uuml;rkiye uygulamas&#305;, vergi d&uuml;zenlemeleri, muhasebe ve hesap plan&#305; ent://SD_ILS/0/SD_ILS:124149 2024-12-26T00:39:49Z 2024-12-26T00:39:49Z Author&#160;&#350;en, Atakan.<br/>Preferred Shelf Number&#160;HD7105.35.T9 D46 2006<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> The MS workbook : living fully with multiple sclerosis ent://SD_ILS/0/SD_ILS:114771 2024-12-26T00:39:49Z 2024-12-26T00:39:49Z Author&#160;Fraser, Robert T.<br/>Preferred Shelf Number&#160;WL 360 M8796 2006<br/>Format:&#160;Books<br/>Availability&#160;Health Sciences Library~1<br/> Linux Patch Management : keeping Linux systems up to date ent://SD_ILS/0/SD_ILS:119550 2024-12-26T00:39:49Z 2024-12-26T00:39:49Z Author&#160;Jang, Michael H.<br/>Preferred Shelf Number&#160;QA76.76.O63 J368 2006<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> &#304;&#351; hukukunun temel yasalar&#305; ent://SD_ILS/0/SD_ILS:125192 2024-12-26T00:39:49Z 2024-12-26T00:39:49Z Author&#160;Kaya, Pir Ali.<br/>Preferred Shelf Number&#160;KKX1270 .K39 2006<br/>Format:&#160;Books<br/>Availability&#160;Law Library~1<br/> Toplumsal d&uuml;zenin in&#351;as&#305; : polis erkinin ele&#351;tirel teorisi ent://SD_ILS/0/SD_ILS:132002 2024-12-26T00:39:49Z 2024-12-26T00:39:49Z Author&#160;Neocleous, Mark&#160;Bekmen, Ahmet.<br/>Preferred Shelf Number&#160;JC474 N4619 2006<br/>Format:&#160;Books<br/>Availability&#160;Law Library~1&#160;Beytepe Library~1<br/> The Big blue Derinlik sarho&#351;lu&#287;u ent://SD_ILS/0/SD_ILS:121456 2024-12-26T00:39:49Z 2024-12-26T00:39:49Z Author&#160;Besson, Luc.&#160;Ledoux, Patrice.&#160;Arquette, Rosanna, 1959-&#160;Barr, Jean-Marc, 1960-&#160;Reno, Jean, 1948-<br/>Preferred Shelf Number&#160;PN1995.9.S67 B54 2006<br/>Format:&#160;Video disc<br/>Availability&#160;Beytepe Library~1<br/> Bilgi ve bilgisayar g&uuml;venli&#287;i : casus yaz&#305;l&#305;mlar ve korunma y&ouml;ntemleri ent://SD_ILS/0/SD_ILS:515469 2024-12-26T00:39:49Z 2024-12-26T00:39:49Z Author&#160;Canbek, G&uuml;rol.&#160;Sa&#287;&#305;ro&#287;lu, &#350;eref.<br/>Preferred Shelf Number&#160;QA76.9.A25 C36 2006<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> &#304;&#351;verenin i&#351; sa&#287;l&#305;&#287;&#305; ve g&uuml;venli&#287;ini sa&#287;lama h&uuml;k&uuml;ml&uuml;l&uuml;&#287;&uuml; ve sorumlulu&#287;u ent://SD_ILS/0/SD_ILS:388272 2024-12-26T00:39:49Z 2024-12-26T00:39:49Z Author&#160;K&#305;l&#305;&ccedil;, Leyla.<br/>Preferred Shelf Number&#160;KKX1322 K55 2006<br/>Format:&#160;Books<br/>Availability&#160;Law Library~2<br/> Ya&#351;l&#305;l&#305;k sigortas&#305; : (normlar&#305;n uyumla&#351;t&#305;r&#305;lmas&#305; ve yeniden yap&#305;land&#305;rma a&ccedil;&#305;s&#305;ndan) ent://SD_ILS/0/SD_ILS:393397 2024-12-26T00:39:49Z 2024-12-26T00:39:49Z Author&#160;Ba&#351;terzi, Fatma.<br/>Preferred Shelf Number&#160;HD7105.35 .T9 B37 2006<br/>Format:&#160;Books<br/>Availability&#160;Law Library~1<br/> Sorulu-cevapl&#305;-&ouml;rnekli-uygulamal&#305; yarg&#305; kararlar&#305; ile donat&#305;lm&#305;&#351;, sosyal g&uuml;venlik ve i&#351;sizlik sigortas&#305; uygulamalar&#305;nda, idari para cezalar&#305; itiraz ve dava yollar&#305; ent://SD_ILS/0/SD_ILS:509551 2024-12-26T00:39:49Z 2024-12-26T00:39:49Z Author&#160;Karaka&#351;, &#304;sa.<br/>Preferred Shelf Number&#160;KKX1512.A58 K37 2006<br/>Format:&#160;Books<br/>Availability&#160;Law Library~1<br/> Soru ve cevaplarla sosyal sigortalar ve genel sa&#287;l&#305;k sigortas&#305; kanunu sosyal g&uuml;venlik kurumu kanununun getirdi&#287;i yenilikler (550 soru - cevap) ent://SD_ILS/0/SD_ILS:509576 2024-12-26T00:39:49Z 2024-12-26T00:39:49Z Author&#160;&Ouml;zdemir, Cumhur Sinan.<br/>Preferred Shelf Number&#160;KKX1472 O93 2006<br/>Format:&#160;Books<br/>Availability&#160;Law Library~1<br/> A military history of modern Egypt : from the Ottoman Conquest to the Ramadan War ent://SD_ILS/0/SD_ILS:355067 2024-12-26T00:39:49Z 2024-12-26T00:39:49Z Author&#160;McGregor, Andrew James.<br/>Preferred Shelf Number&#160;DT81 M38 2006<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> The politics of insecurity : fear, migration, and asylum in the EU ent://SD_ILS/0/SD_ILS:422917 2024-12-26T00:39:49Z 2024-12-26T00:39:49Z Author&#160;Huysmans, Jef.<br/>Preferred Shelf Number&#160;JZ6009.E94 H89 2006<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Sosyal politika boyutunda Federal Almanya'da esnek &ccedil;al&#305;&#351;ma modelleri : Avrupa Birli&#287;i ve Federal Almanya mevzuat&#305; &#305;&#351;&#305;&#287;&#305;nda T&uuml;rkiye i&ccedil;in perspektifler ent://SD_ILS/0/SD_ILS:517353 2024-12-26T00:39:49Z 2024-12-26T00:39:49Z Author&#160;Hekimler, Alpay.&#160;T&uuml;rkiye &#304;&#351;veren Sendikalar&#305; Konfederasyonu.<br/>Preferred Shelf Number&#160;HD7179 H45 2006<br/>Format:&#160;Books<br/>Availability&#160;Law Library~1<br/>