Search Results for Telecommunication -- Security measures. - Narrowed by: EnglishSirsiDynix Enterprisehttps://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dTelecommunication$002b--$002bSecurity$002bmeasures.$0026qf$003dLANGUAGE$002509Language$002509ENG$002509English$0026ps$003d300?2024-10-30T14:13:05ZNetwork performance and security : testing and analyzing using open source and low-cost toolsent://SD_ILS/0/SD_ILS:4587892024-10-30T14:13:05Z2024-10-30T14:13:05ZAuthor Chapman, Chris, author.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128035849">http://www.sciencedirect.com/science/book/9780128035849</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Strategic intelligence management : national security imperatives and information and communications technologiesent://SD_ILS/0/SD_ILS:2703632024-10-30T14:13:05Z2024-10-30T14:13:05ZAuthor Akhgar, Babak. Yates, Simeon.<br/>Preferred Shelf Number TK5102.85 A44 2013<br/>Format: Books<br/>Availability Beytepe Library~1<br/>New directions of modern cryptographyent://SD_ILS/0/SD_ILS:3442632024-10-30T14:13:05Z2024-10-30T14:13:05ZAuthor Cao, Zhenfu.<br/>Preferred Shelf Number ONLINE(344263.1)<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781466501409">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Cryptanalysis of RSA and its variantsent://SD_ILS/0/SD_ILS:2914182024-10-30T14:13:05Z2024-10-30T14:13:05ZAuthor Hinek, M. Jason.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781420075199">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Seven deadliest Unified Communications attacksent://SD_ILS/0/SD_ILS:1489672024-10-30T14:13:05Z2024-10-30T14:13:05ZAuthor York, Dan.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495479">http://www.sciencedirect.com/science/book/9781597495479</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Chaos synchronization and cryptography for secure communications applications for encryptionent://SD_ILS/0/SD_ILS:2779402024-10-30T14:13:05Z2024-10-30T14:13:05ZAuthor Banerjee, Santo, 1976- IGI Global.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access EBSCOhost <a href="http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=310459">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=310459</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Introduction to Broadband Communication Systemsent://SD_ILS/0/SD_ILS:2480592024-10-30T14:13:05Z2024-10-30T14:13:05ZAuthor Akujuobi, Cajetan M. Sadiku, Matthew N.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1049/SBTE501E">http://dx.doi.org/10.1049/SBTE501E</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Infosecurity 2008 threat analysisent://SD_ILS/0/SD_ILS:1455412024-10-30T14:13:05Z2024-10-30T14:13:05ZAuthor Clark, Champ, III.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492249">http://www.sciencedirect.com/science/book/9781597492249</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Complete guide to security and privacy metrics measuring regulatory compliance, operational resilience, and ROIent://SD_ILS/0/SD_ILS:2893602024-10-30T14:13:05Z2024-10-30T14:13:05ZAuthor Herrmann, Debra S.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781420013283">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Cryptography, information theory, and error-correction a handbook for the 21st centuryent://SD_ILS/0/SD_ILS:3018602024-10-30T14:13:05Z2024-10-30T14:13:05ZAuthor Bruen, Aiden A., 1941- Forcinito, Mario, 1962- Wiley InterScience (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access Wiley InterScience <a href="http://dx.doi.org/10.1002/9781118033296">An electronic book accessible through the World Wide Web; click for information</a>
Contributor biographical information <a href="http://catdir.loc.gov/catdir/enhancements/fy0618/2004058044-b.html">http://catdir.loc.gov/catdir/enhancements/fy0618/2004058044-b.html</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Mobile and Wireless Communications Key technologies and future applicationsent://SD_ILS/0/SD_ILS:2476872024-10-30T14:13:05Z2024-10-30T14:13:05ZAuthor Smyth, Peter, ed.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1049/PBBT009E">http://dx.doi.org/10.1049/PBBT009E</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Using the common criteria for IT security evaluationent://SD_ILS/0/SD_ILS:2904422024-10-30T14:13:05Z2024-10-30T14:13:05ZAuthor Herrmann, Debra S.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781420031423">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Telecommunications Quality of Service Managementent://SD_ILS/0/SD_ILS:2479872024-10-30T14:13:05Z2024-10-30T14:13:05ZAuthor Oodan, Antony P. Ward, Keith E. Savolaine, Catherine G. Daneshmand, Mahmoud Hoath, Peter<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1049/PBTE048E">http://dx.doi.org/10.1049/PBTE048E</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Internet and Wireless Securityent://SD_ILS/0/SD_ILS:2476822024-10-30T14:13:05Z2024-10-30T14:13:05ZAuthor Temple, Robert, ed. Regnault, John, ed.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1049/PBBT004E">http://dx.doi.org/10.1049/PBBT004E</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Secure communications applications and managementent://SD_ILS/0/SD_ILS:3010212024-10-30T14:13:05Z2024-10-30T14:13:05ZAuthor Sutton, Roger J.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access John Wiley <a href="http://dx.doi.org/10.1002/0470845996">http://dx.doi.org/10.1002/0470845996</a>
HathiTrust Digital Library Limited view (search only) <a href="http://catalog.hathitrust.org/api/volumes/oclc/48053806.html">http://catalog.hathitrust.org/api/volumes/oclc/48053806.html</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Carrier Scale IP Networks Designing and operating Internet networksent://SD_ILS/0/SD_ILS:2476792024-10-30T14:13:05Z2024-10-30T14:13:05ZAuthor Willis, Peter, ed.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1049/PBBT001E">http://dx.doi.org/10.1049/PBBT001E</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Applied cryptography : protocols, algorithms, and source code in Cent://SD_ILS/0/SD_ILS:1080142024-10-30T14:13:05Z2024-10-30T14:13:05ZAuthor Schneier, Bruce.<br/>Preferred Shelf Number QA76.9.A25 S35 1996<br/>Format: Books<br/>Availability Beytepe Library~1<br/>Principles of secure communication systemsent://SD_ILS/0/SD_ILS:862722024-10-30T14:13:05Z2024-10-30T14:13:05ZAuthor Torrieri, Don J.<br/>Preferred Shelf Number TK 5102.5 T625 1992<br/>Format: Books<br/>Availability Beytepe Library~1<br/>