Search Results for System security. - Narrowed by: 2013 SirsiDynix Enterprise https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dSystem$002bsecurity.$0026qf$003dPUBDATE$002509Publication$002bDate$0025092013$0025092013$0026te$003dILS$0026ps$003d300?dt=list 2024-10-22T11:15:56Z Critical infrastructure system security and resiliency ent://SD_ILS/0/SD_ILS:291727 2024-10-22T11:15:56Z 2024-10-22T11:15:56Z Author&#160;Biringer, Betty E., 1952-&#160;Vugrin, Eric D.&#160;Warren, Drake E.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781466557512">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Network and System Security 7th International Conference, NSS 2013, Madrid, Spain, June 3-4, 2013. Proceedings ent://SD_ILS/0/SD_ILS:334638 2024-10-22T11:15:56Z 2024-10-22T11:15:56Z Author&#160;Lopez, Javier. editor.&#160;Huang, Xinyi. editor.&#160;Sandhu, Ravi. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(334638.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-38631-2">http://dx.doi.org/10.1007/978-3-642-38631-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Official (ISC)[superscript 2] guide to the CAP CBK ent://SD_ILS/0/SD_ILS:288056 2024-10-22T11:15:56Z 2024-10-22T11:15:56Z Author&#160;Howard, Patrick D.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781439820766">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Protection, security, and safeguards practical approaches and perspectives ent://SD_ILS/0/SD_ILS:288080 2024-10-22T11:15:56Z 2024-10-22T11:15:56Z Author&#160;June, Dale L.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781439869543">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer security literacy staying safe in a digital world ent://SD_ILS/0/SD_ILS:290839 2024-10-22T11:15:56Z 2024-10-22T11:15:56Z Author&#160;Jacobson, Douglas.&#160;Idziorek, Joseph.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781439856192">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Handbook of finite state based models and applications ent://SD_ILS/0/SD_ILS:291651 2024-10-22T11:15:56Z 2024-10-22T11:15:56Z Author&#160;Wang, Jiacun, editor of compilation.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781439846193">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Android security attacks and defenses ent://SD_ILS/0/SD_ILS:287193 2024-10-22T11:15:56Z 2024-10-22T11:15:56Z Author&#160;Misra, Anmol.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781439896471">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Fundamentals in modeling and control of mobile manipulators ent://SD_ILS/0/SD_ILS:287272 2024-10-22T11:15:56Z 2024-10-22T11:15:56Z Author&#160;Li, Zhijun, 1973-&#160;Ge, Shuzhi Sam.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781466580428">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Wireless sensor networks a cognitive perspective ent://SD_ILS/0/SD_ILS:288924 2024-10-22T11:15:56Z 2024-10-22T11:15:56Z Author&#160;Ibnkahla, Mohamed.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781439852811">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> PRAGMATIC security metrics applying metametrics to information security ent://SD_ILS/0/SD_ILS:289974 2024-10-22T11:15:56Z 2024-10-22T11:15:56Z Author&#160;Brotby, W. Krag.&#160;Hinson, Gary.&#160;Kabay, Michel E.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781439881538">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Telehealthcare computing and engineering principles and design ent://SD_ILS/0/SD_ILS:289980 2024-10-22T11:15:56Z 2024-10-22T11:15:56Z Author&#160;Hu, Fei, 1972-<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781466565746">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> The complete guide to physical security ent://SD_ILS/0/SD_ILS:290667 2024-10-22T11:15:56Z 2024-10-22T11:15:56Z Author&#160;Baker, Paul, 1958-&#160;Benny, Daniel J.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781420099645">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/>