Search Results for Telecommunication--Security measures. SirsiDynix Enterprise https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dTelecommunication--Security$002bmeasures.$0026pe$003dd$00253A$0026ps$003d300? 2024-11-13T02:38:23Z Network performance and security : testing and analyzing using open source and low-cost tools ent://SD_ILS/0/SD_ILS:458789 2024-11-13T02:38:23Z 2024-11-13T02:38:23Z Author&#160;Chapman, Chris, author.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128035849">http://www.sciencedirect.com/science/book/9780128035849</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Strategic intelligence management : national security imperatives and information and communications technologies ent://SD_ILS/0/SD_ILS:270363 2024-11-13T02:38:23Z 2024-11-13T02:38:23Z Author&#160;Akhgar, Babak.&#160;Yates, Simeon.<br/>Preferred Shelf Number&#160;TK5102.85 A44 2013<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> New directions of modern cryptography ent://SD_ILS/0/SD_ILS:344263 2024-11-13T02:38:23Z 2024-11-13T02:38:23Z Author&#160;Cao, Zhenfu.<br/>Preferred Shelf Number&#160;ONLINE(344263.1)<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781466501409">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cryptanalysis of RSA and its variants ent://SD_ILS/0/SD_ILS:291418 2024-11-13T02:38:23Z 2024-11-13T02:38:23Z Author&#160;Hinek, M. Jason.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781420075199">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Chaos synchronization and cryptography for secure communications applications for encryption ent://SD_ILS/0/SD_ILS:277940 2024-11-13T02:38:23Z 2024-11-13T02:38:23Z Author&#160;Banerjee, Santo, 1976-&#160;IGI Global.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;EBSCOhost <a href="http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=310459">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=310459</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Seven deadliest Unified Communications attacks ent://SD_ILS/0/SD_ILS:148967 2024-11-13T02:38:23Z 2024-11-13T02:38:23Z Author&#160;York, Dan.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495479">http://www.sciencedirect.com/science/book/9781597495479</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Introduction to Broadband Communication Systems ent://SD_ILS/0/SD_ILS:248059 2024-11-13T02:38:23Z 2024-11-13T02:38:23Z Author&#160;Akujuobi, Cajetan M.&#160;Sadiku, Matthew N.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1049/SBTE501E">http://dx.doi.org/10.1049/SBTE501E</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Infosecurity 2008 threat analysis ent://SD_ILS/0/SD_ILS:145541 2024-11-13T02:38:23Z 2024-11-13T02:38:23Z Author&#160;Clark, Champ, III.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492249">http://www.sciencedirect.com/science/book/9781597492249</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Complete guide to security and privacy metrics measuring regulatory compliance, operational resilience, and ROI ent://SD_ILS/0/SD_ILS:289360 2024-11-13T02:38:23Z 2024-11-13T02:38:23Z Author&#160;Herrmann, Debra S.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781420013283">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cryptography, information theory, and error-correction a handbook for the 21st century ent://SD_ILS/0/SD_ILS:301860 2024-11-13T02:38:23Z 2024-11-13T02:38:23Z Author&#160;Bruen, Aiden A., 1941-&#160;Forcinito, Mario, 1962-&#160;Wiley InterScience (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;Wiley InterScience <a href="http://dx.doi.org/10.1002/9781118033296">An electronic book accessible through the World Wide Web; click for information</a> Contributor biographical information <a href="http://catdir.loc.gov/catdir/enhancements/fy0618/2004058044-b.html">http://catdir.loc.gov/catdir/enhancements/fy0618/2004058044-b.html</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Mobile and Wireless Communications Key technologies and future applications ent://SD_ILS/0/SD_ILS:247687 2024-11-13T02:38:23Z 2024-11-13T02:38:23Z Author&#160;Smyth, Peter, ed.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1049/PBBT009E">http://dx.doi.org/10.1049/PBBT009E</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Using the common criteria for IT security evaluation ent://SD_ILS/0/SD_ILS:290442 2024-11-13T02:38:23Z 2024-11-13T02:38:23Z Author&#160;Herrmann, Debra S.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781420031423">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Telecommunications Quality of Service Management ent://SD_ILS/0/SD_ILS:247987 2024-11-13T02:38:23Z 2024-11-13T02:38:23Z Author&#160;Oodan, Antony P.&#160;Ward, Keith E.&#160;Savolaine, Catherine G.&#160;Daneshmand, Mahmoud&#160;Hoath, Peter<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1049/PBTE048E">http://dx.doi.org/10.1049/PBTE048E</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Internet and Wireless Security ent://SD_ILS/0/SD_ILS:247682 2024-11-13T02:38:23Z 2024-11-13T02:38:23Z Author&#160;Temple, Robert, ed.&#160;Regnault, John, ed.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1049/PBBT004E">http://dx.doi.org/10.1049/PBBT004E</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Secure communications applications and management ent://SD_ILS/0/SD_ILS:301021 2024-11-13T02:38:23Z 2024-11-13T02:38:23Z Author&#160;Sutton, Roger J.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;John Wiley <a href="http://dx.doi.org/10.1002/0470845996">http://dx.doi.org/10.1002/0470845996</a> HathiTrust Digital Library Limited view (search only) <a href="http://catalog.hathitrust.org/api/volumes/oclc/48053806.html">http://catalog.hathitrust.org/api/volumes/oclc/48053806.html</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Carrier Scale IP Networks Designing and operating Internet networks ent://SD_ILS/0/SD_ILS:247679 2024-11-13T02:38:23Z 2024-11-13T02:38:23Z Author&#160;Willis, Peter, ed.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1049/PBBT001E">http://dx.doi.org/10.1049/PBBT001E</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security for telecommunications network management ent://SD_ILS/0/SD_ILS:249697 2024-11-13T02:38:23Z 2024-11-13T02:38:23Z Author&#160;Rozenblit, Moshe, 1944-<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;IEEE Xplore <a href="http://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=5263947">http://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=5263947</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Applied cryptography : protocols, algorithms, and source code in C ent://SD_ILS/0/SD_ILS:108014 2024-11-13T02:38:23Z 2024-11-13T02:38:23Z Author&#160;Schneier, Bruce.<br/>Preferred Shelf Number&#160;QA76.9.A25 S35 1996<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Contemporary cryptology the science of information integrity ent://SD_ILS/0/SD_ILS:249661 2024-11-13T02:38:23Z 2024-11-13T02:38:23Z Author&#160;Simmons, Gustavus J.&#160;Institute of Electrical and Electronics Engineers.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;IEEE Xplore <a href="http://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=5265879">http://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=5265879</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Principles of secure communication systems ent://SD_ILS/0/SD_ILS:86272 2024-11-13T02:38:23Z 2024-11-13T02:38:23Z Author&#160;Torrieri, Don J.<br/>Preferred Shelf Number&#160;TK 5102.5 T625 1992<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/>