Search Results for Telecommunication--Security measures. - Narrowed by: English
SirsiDynix Enterprise
https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dTelecommunication--Security$002bmeasures.$0026qf$003dLANGUAGE$002509Language$002509ENG$002509English$0026ps$003d300?
2025-12-16T10:57:10Z
Network performance and security : testing and analyzing using open source and low-cost tools
ent://SD_ILS/0/SD_ILS:458789
2025-12-16T10:57:10Z
2025-12-16T10:57:10Z
Author Chapman, Chris, author.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128035849">http://www.sciencedirect.com/science/book/9780128035849</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Strategic intelligence management : national security imperatives and information and communications technologies
ent://SD_ILS/0/SD_ILS:270363
2025-12-16T10:57:10Z
2025-12-16T10:57:10Z
Author Akhgar, Babak. Yates, Simeon.<br/>Preferred Shelf Number TK5102.85 A44 2013<br/>Format: Books<br/>Availability Beytepe Library~1<br/>
New directions of modern cryptography
ent://SD_ILS/0/SD_ILS:344263
2025-12-16T10:57:10Z
2025-12-16T10:57:10Z
Author Cao, Zhenfu.<br/>Preferred Shelf Number ONLINE(344263.1)<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781466501409">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Chaos synchronization and cryptography for secure communications applications for encryption
ent://SD_ILS/0/SD_ILS:277940
2025-12-16T10:57:10Z
2025-12-16T10:57:10Z
Author Banerjee, Santo, 1976- IGI Global.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access EBSCOhost <a href="http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=310459">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=310459</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Seven deadliest Unified Communications attacks
ent://SD_ILS/0/SD_ILS:148967
2025-12-16T10:57:10Z
2025-12-16T10:57:10Z
Author York, Dan.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495479">http://www.sciencedirect.com/science/book/9781597495479</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cryptanalysis of RSA and its variants
ent://SD_ILS/0/SD_ILS:542078
2025-12-16T10:57:10Z
2025-12-16T10:57:10Z
Author Hinek, M. Jason., author.<br/>Preferred Shelf Number TK5102.94 .H56 2010<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781420075199">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>
Introduction to Broadband Communication Systems
ent://SD_ILS/0/SD_ILS:248059
2025-12-16T10:57:10Z
2025-12-16T10:57:10Z
Author Akujuobi, Cajetan M. Sadiku, Matthew N.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1049/SBTE501E">http://dx.doi.org/10.1049/SBTE501E</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Infosecurity 2008 threat analysis
ent://SD_ILS/0/SD_ILS:145541
2025-12-16T10:57:10Z
2025-12-16T10:57:10Z
Author Clark, Champ, III.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492249">http://www.sciencedirect.com/science/book/9781597492249</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Complete guide to security and privacy metrics : measuring regulatory compliance, operational resilience, and ROI
ent://SD_ILS/0/SD_ILS:546961
2025-12-16T10:57:10Z
2025-12-16T10:57:10Z
Author Herrmann, Debra S., author.<br/>Preferred Shelf Number TK5102.85 .H4685 2007<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781420013283">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>
Cryptography, information theory, and error-correction a handbook for the 21st century
ent://SD_ILS/0/SD_ILS:301860
2025-12-16T10:57:10Z
2025-12-16T10:57:10Z
Author Bruen, Aiden A., 1941- Forcinito, Mario, 1962- Wiley InterScience (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access Wiley InterScience <a href="http://dx.doi.org/10.1002/9781118033296">An electronic book accessible through the World Wide Web; click for information</a>
Contributor biographical information <a href="http://catdir.loc.gov/catdir/enhancements/fy0618/2004058044-b.html">http://catdir.loc.gov/catdir/enhancements/fy0618/2004058044-b.html</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Mobile and Wireless Communications Key technologies and future applications
ent://SD_ILS/0/SD_ILS:247687
2025-12-16T10:57:10Z
2025-12-16T10:57:10Z
Author Smyth, Peter, ed.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1049/PBBT009E">http://dx.doi.org/10.1049/PBBT009E</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Telecommunications Quality of Service Management
ent://SD_ILS/0/SD_ILS:247987
2025-12-16T10:57:10Z
2025-12-16T10:57:10Z
Author Oodan, Antony P. Ward, Keith E. Savolaine, Catherine G. Daneshmand, Mahmoud Hoath, Peter<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1049/PBTE048E">http://dx.doi.org/10.1049/PBTE048E</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Using the common criteria for IT security evaluation
ent://SD_ILS/0/SD_ILS:538965
2025-12-16T10:57:10Z
2025-12-16T10:57:10Z
Author Herrmann, Debra S., author.<br/>Preferred Shelf Number TK5102.85 .H47 2003<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781420031423">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>
Secure communications applications and management
ent://SD_ILS/0/SD_ILS:301021
2025-12-16T10:57:10Z
2025-12-16T10:57:10Z
Author Sutton, Roger J.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access John Wiley <a href="http://dx.doi.org/10.1002/0470845996">http://dx.doi.org/10.1002/0470845996</a>
HathiTrust Digital Library Limited view (search only) <a href="http://catalog.hathitrust.org/api/volumes/oclc/48053806.html">http://catalog.hathitrust.org/api/volumes/oclc/48053806.html</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Internet and Wireless Security
ent://SD_ILS/0/SD_ILS:247682
2025-12-16T10:57:10Z
2025-12-16T10:57:10Z
Author Temple, Robert, ed. Regnault, John, ed.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1049/PBBT004E">http://dx.doi.org/10.1049/PBBT004E</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Carrier Scale IP Networks Designing and operating Internet networks
ent://SD_ILS/0/SD_ILS:247679
2025-12-16T10:57:10Z
2025-12-16T10:57:10Z
Author Willis, Peter, ed.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1049/PBBT001E">http://dx.doi.org/10.1049/PBBT001E</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Applied cryptography : protocols, algorithms, and source code in C
ent://SD_ILS/0/SD_ILS:108014
2025-12-16T10:57:10Z
2025-12-16T10:57:10Z
Author Schneier, Bruce.<br/>Preferred Shelf Number QA76.9.A25 S35 1996<br/>Format: Books<br/>Availability Beytepe Library~1<br/>
Principles of secure communication systems
ent://SD_ILS/0/SD_ILS:86272
2025-12-16T10:57:10Z
2025-12-16T10:57:10Z
Author Torrieri, Don J.<br/>Preferred Shelf Number TK 5102.5 T625 1992<br/>Format: Books<br/>Availability Beytepe Library~1<br/>