Search Results for Telecommunication -- Security measures. - Narrowed by: Online LibrarySirsiDynix Enterprisehttps://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dTelecommunication$002b--$002bSecurity$002bmeasures.$0026qf$003dLIBRARY$002509Library$0025091$00253AONLINE$002509Online$002bLibrary$0026ps$003d300?2024-10-30T14:05:50ZNetwork performance and security : testing and analyzing using open source and low-cost toolsent://SD_ILS/0/SD_ILS:4587892024-10-30T14:05:50Z2024-10-30T14:05:50ZAuthor Chapman, Chris, author.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128035849">http://www.sciencedirect.com/science/book/9780128035849</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>New directions of modern cryptographyent://SD_ILS/0/SD_ILS:3442632024-10-30T14:05:50Z2024-10-30T14:05:50ZAuthor Cao, Zhenfu.<br/>Preferred Shelf Number ONLINE(344263.1)<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781466501409">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Cryptanalysis of RSA and its variantsent://SD_ILS/0/SD_ILS:2914182024-10-30T14:05:50Z2024-10-30T14:05:50ZAuthor Hinek, M. Jason.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781420075199">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Seven deadliest Unified Communications attacksent://SD_ILS/0/SD_ILS:1489672024-10-30T14:05:50Z2024-10-30T14:05:50ZAuthor York, Dan.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495479">http://www.sciencedirect.com/science/book/9781597495479</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Chaos synchronization and cryptography for secure communications applications for encryptionent://SD_ILS/0/SD_ILS:2779402024-10-30T14:05:50Z2024-10-30T14:05:50ZAuthor Banerjee, Santo, 1976- IGI Global.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access EBSCOhost <a href="http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=310459">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=310459</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Introduction to Broadband Communication Systemsent://SD_ILS/0/SD_ILS:2480592024-10-30T14:05:50Z2024-10-30T14:05:50ZAuthor Akujuobi, Cajetan M. Sadiku, Matthew N.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1049/SBTE501E">http://dx.doi.org/10.1049/SBTE501E</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Infosecurity 2008 threat analysisent://SD_ILS/0/SD_ILS:1455412024-10-30T14:05:50Z2024-10-30T14:05:50ZAuthor Clark, Champ, III.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492249">http://www.sciencedirect.com/science/book/9781597492249</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Complete guide to security and privacy metrics measuring regulatory compliance, operational resilience, and ROIent://SD_ILS/0/SD_ILS:2893602024-10-30T14:05:50Z2024-10-30T14:05:50ZAuthor Herrmann, Debra S.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781420013283">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Cryptography, information theory, and error-correction a handbook for the 21st centuryent://SD_ILS/0/SD_ILS:3018602024-10-30T14:05:50Z2024-10-30T14:05:50ZAuthor Bruen, Aiden A., 1941- Forcinito, Mario, 1962- Wiley InterScience (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access Wiley InterScience <a href="http://dx.doi.org/10.1002/9781118033296">An electronic book accessible through the World Wide Web; click for information</a>
Contributor biographical information <a href="http://catdir.loc.gov/catdir/enhancements/fy0618/2004058044-b.html">http://catdir.loc.gov/catdir/enhancements/fy0618/2004058044-b.html</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Mobile and Wireless Communications Key technologies and future applicationsent://SD_ILS/0/SD_ILS:2476872024-10-30T14:05:50Z2024-10-30T14:05:50ZAuthor Smyth, Peter, ed.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1049/PBBT009E">http://dx.doi.org/10.1049/PBBT009E</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Using the common criteria for IT security evaluationent://SD_ILS/0/SD_ILS:2904422024-10-30T14:05:50Z2024-10-30T14:05:50ZAuthor Herrmann, Debra S.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781420031423">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Telecommunications Quality of Service Managementent://SD_ILS/0/SD_ILS:2479872024-10-30T14:05:50Z2024-10-30T14:05:50ZAuthor Oodan, Antony P. Ward, Keith E. Savolaine, Catherine G. Daneshmand, Mahmoud Hoath, Peter<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1049/PBTE048E">http://dx.doi.org/10.1049/PBTE048E</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Internet and Wireless Securityent://SD_ILS/0/SD_ILS:2476822024-10-30T14:05:50Z2024-10-30T14:05:50ZAuthor Temple, Robert, ed. Regnault, John, ed.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1049/PBBT004E">http://dx.doi.org/10.1049/PBBT004E</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Secure communications applications and managementent://SD_ILS/0/SD_ILS:3010212024-10-30T14:05:50Z2024-10-30T14:05:50ZAuthor Sutton, Roger J.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access John Wiley <a href="http://dx.doi.org/10.1002/0470845996">http://dx.doi.org/10.1002/0470845996</a>
HathiTrust Digital Library Limited view (search only) <a href="http://catalog.hathitrust.org/api/volumes/oclc/48053806.html">http://catalog.hathitrust.org/api/volumes/oclc/48053806.html</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Carrier Scale IP Networks Designing and operating Internet networksent://SD_ILS/0/SD_ILS:2476792024-10-30T14:05:50Z2024-10-30T14:05:50ZAuthor Willis, Peter, ed.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1049/PBBT001E">http://dx.doi.org/10.1049/PBBT001E</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Security for telecommunications network managementent://SD_ILS/0/SD_ILS:2496972024-10-30T14:05:50Z2024-10-30T14:05:50ZAuthor Rozenblit, Moshe, 1944-<br/>Preferred Shelf Number ONLINE<br/>Electronic Access IEEE Xplore <a href="http://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=5263947">http://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=5263947</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Contemporary cryptology the science of information integrityent://SD_ILS/0/SD_ILS:2496612024-10-30T14:05:50Z2024-10-30T14:05:50ZAuthor Simmons, Gustavus J. Institute of Electrical and Electronics Engineers.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access IEEE Xplore <a href="http://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=5265879">http://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=5265879</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>