Arama Sonu&ccedil;lar&#305; Information security - Daralt&#305;lm&#305;&#351;: 2007 SirsiDynix Enterprise https://katalog.hacettepe.edu.tr/client/tr_TR/default_tr/default_tr/qu$003dInformation$002bsecurity$0026qf$003dPUBDATE$002509Yay$0025C4$0025B1n$002bY$0025C4$0025B1l$0025C4$0025B1$0025092007$0025092007$0026ic$003dtrue$0026te$003dILS$0026ps$003d300?dt=list 2024-12-29T03:09:43Z Information security management handbook ent://SD_ILS/0/SD_ILS:287123 2024-12-29T03:09:43Z 2024-12-29T03:09:43Z Yazar&#160;Tipton, Harold F.&#160;Nozaki, Micki Krause.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://marc.crcnetbase.com/isbn/9781439893159">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Information security management handbook ent://SD_ILS/0/SD_ILS:289151 2024-12-29T03:09:43Z 2024-12-29T03:09:43Z Yazar&#160;Tipton, Harold F.&#160;Krause, Micki.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://marc.crcnetbase.com/isbn/9780203325438">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Information security management handbook ent://SD_ILS/0/SD_ILS:290320 2024-12-29T03:09:43Z 2024-12-29T03:09:43Z Yazar&#160;Tipton, Harold F.&#160;Krause, Micki.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://marc.crcnetbase.com/isbn/9781420003406">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Information security management handbook ent://SD_ILS/0/SD_ILS:290763 2024-12-29T03:09:43Z 2024-12-29T03:09:43Z Yazar&#160;Tipton, Harold F.&#160;Nozaki, Micki Krause.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://marc.crcnetbase.com/isbn/9781439853467">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Information security management handbook ent://SD_ILS/0/SD_ILS:289734 2024-12-29T03:09:43Z 2024-12-29T03:09:43Z Yazar&#160;Tipton, Harold F.&#160;Krause, Micki.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://marc.crcnetbase.com/isbn/9781420090956">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Information security management handbook ent://SD_ILS/0/SD_ILS:285161 2024-12-29T03:09:43Z 2024-12-29T03:09:43Z Yazar&#160;Tipton, Harold F.&#160;Krause, Micki.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://marc.crcnetbase.com/isbn/9781439833032">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Information security cost management ent://SD_ILS/0/SD_ILS:286545 2024-12-29T03:09:43Z 2024-12-29T03:09:43Z Yazar&#160;Bazavan, Ioana V.&#160;Lim, Ian.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://marc.crcnetbase.com/isbn/9781420013832">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Information security : contemporary cases ent://SD_ILS/0/SD_ILS:111021 2024-12-29T03:09:43Z 2024-12-29T03:09:43Z Yazar&#160;Wright, Marie A.&#160;Kakalik, John S.<br/>Yer Numaras&#305;&#160;QA76.9.A25 W75 2007<br/>Format:&#160;Kitap<br/>Durum&#160;Beytepe K&uuml;t&uuml;phanesi~1<br/> Information security design, implementation, measurement, and compliance ent://SD_ILS/0/SD_ILS:288490 2024-12-29T03:09:43Z 2024-12-29T03:09:43Z Yazar&#160;Layton, Timothy P.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://marc.crcnetbase.com/isbn/9781420013412">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Zen and the art of information security ent://SD_ILS/0/SD_ILS:145680 2024-12-29T03:09:43Z 2024-12-29T03:09:43Z Yazar&#160;Winkler, Ira.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491686">http://www.sciencedirect.com/science/book/9781597491686</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Zen and the art of information security ent://SD_ILS/0/SD_ILS:112214 2024-12-29T03:09:43Z 2024-12-29T03:09:43Z Yazar&#160;Winkler, Ira.&#160;ScienceDirect (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491686">An electronic book accessible through the World Wide Web; click for information</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Computational Intelligence in Information Assurance and Security ent://SD_ILS/0/SD_ILS:186171 2024-12-29T03:09:43Z 2024-12-29T03:09:43Z Yazar&#160;Nedjah, Nadia. editor.&#160;Abraham, Ajith. editor.&#160;Mourelle, Luiza de Macedo. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-3-540-71078-3">http://dx.doi.org/10.1007/978-3-540-71078-3</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Information Security Practice and Experience Third International Conference, ISPEC 2007, Hong Kong, China, May 7-9, 2007. Proceedings ent://SD_ILS/0/SD_ILS:186461 2024-12-29T03:09:43Z 2024-12-29T03:09:43Z Yazar&#160;Dawson, Ed. editor.&#160;Wong, Duncan S. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-3-540-72163-5">http://dx.doi.org/10.1007/978-3-540-72163-5</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Information Security Theory and Practices. Smart Cards, Mobile and Ubiquitous Computing Systems First IFIP TC6 / WG 8.8 / WG 11.2 International Workshop, WISTP 2007, Heraklion, Crete, Greece, May 9-11, 2007. Proceedings ent://SD_ILS/0/SD_ILS:186513 2024-12-29T03:09:43Z 2024-12-29T03:09:43Z Yazar&#160;Sauveron, Damien. editor.&#160;Markantonakis, Konstantinos. editor.&#160;Bilas, Angelos. editor.&#160;Quisquater, Jean-Jacques. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-3-540-72354-7">http://dx.doi.org/10.1007/978-3-540-72354-7</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Advances in Information and Computer Security Second International Workshop on Security, IWSEC 2007, Nara, Japan, October 29-31, 2007. Proceedings ent://SD_ILS/0/SD_ILS:187467 2024-12-29T03:09:43Z 2024-12-29T03:09:43Z Yazar&#160;Miyaji, Atsuko. editor.&#160;Kikuchi, Hiroaki. editor.&#160;Rannenberg, Kai. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-3-540-75651-4">http://dx.doi.org/10.1007/978-3-540-75651-4</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Information and Communications Security 9th International Conference, ICICS 2007, Zhengzhou, China, December 12-15, 2007. Proceedings ent://SD_ILS/0/SD_ILS:187773 2024-12-29T03:09:43Z 2024-12-29T03:09:43Z Yazar&#160;Qing, Sihan. editor.&#160;Imai, Hideki. editor.&#160;Wang, Guilin. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-3-540-77048-0">http://dx.doi.org/10.1007/978-3-540-77048-0</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Information Systems Security Third International Conference, ICISS 2007, Delhi, India, December 16-20, 2007. Proceedings ent://SD_ILS/0/SD_ILS:187790 2024-12-29T03:09:43Z 2024-12-29T03:09:43Z Yazar&#160;McDaniel, Patrick. editor.&#160;Gupta, Shyam K. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-3-540-77086-2">http://dx.doi.org/10.1007/978-3-540-77086-2</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Information Security Applications 8th International Workshop, WISA 2007, Jeju Island, Korea, August 27-29, 2007, Revised Selected Papers ent://SD_ILS/0/SD_ILS:187904 2024-12-29T03:09:43Z 2024-12-29T03:09:43Z Yazar&#160;Kim, Sehun. editor.&#160;Yung, Moti. editor.&#160;Lee, Hyung-Woo. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-3-540-77535-5">http://dx.doi.org/10.1007/978-3-540-77535-5</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> New Approaches for Security, Privacy and Trust in Complex Environments Proceedings of the IFIP TC-11 22nd International Information Security Conference (SEC 2007), 14&ndash;16 May 2007, Sandton, South Africa ent://SD_ILS/0/SD_ILS:166940 2024-12-29T03:09:43Z 2024-12-29T03:09:43Z Yazar&#160;Venter, Hein. editor.&#160;Eloff, Mariki. editor.&#160;Labuschagne, Les. editor.&#160;Eloff, Jan. editor.&#160;Solms, Rossouw. editor.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-0-387-72367-9">http://dx.doi.org/10.1007/978-0-387-72367-9</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Fifth World Conference on Information Security Education Proceedings of the IFIP TC11 WG 11.8, WISE 5, 19 to 21 June 2007, United States Military Academy, West Point, New York, USA ent://SD_ILS/0/SD_ILS:167038 2024-12-29T03:09:43Z 2024-12-29T03:09:43Z Yazar&#160;Futcher, Lynn. editor.&#160;Dodge, Ronald. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-0-387-73269-5">http://dx.doi.org/10.1007/978-0-387-73269-5</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Information Security 10th International Conference, ISC 2007, Valpara&iacute;so, Chile, October 9-12, 2007. Proceedings ent://SD_ILS/0/SD_ILS:187429 2024-12-29T03:09:43Z 2024-12-29T03:09:43Z Yazar&#160;Garay, Juan A. editor.&#160;Lenstra, Arjen K. editor.&#160;Mambo, Masahiro. editor.&#160;Peralta, Ren&eacute;. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-3-540-75496-1">http://dx.doi.org/10.1007/978-3-540-75496-1</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Information Security and Cryptology - ICISC 2007 10th International Conference, Seoul, Korea, November 29-30, 2007. Proceedings ent://SD_ILS/0/SD_ILS:187681 2024-12-29T03:09:43Z 2024-12-29T03:09:43Z Yazar&#160;Nam, Kil-Hyun. editor.&#160;Rhee, Gwangsoo. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-3-540-76788-6">http://dx.doi.org/10.1007/978-3-540-76788-6</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> The history of information security a comprehensive handbook ent://SD_ILS/0/SD_ILS:145532 2024-12-29T03:09:43Z 2024-12-29T03:09:43Z Yazar&#160;Leeuw, Karl de.&#160;Bergstra, J. A.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780444516084">http://www.sciencedirect.com/science/book/9780444516084</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> ISSE/SECURE 2007 Securing Electronic Business Processes Highlights of the Information Security Solutions Europe/SECURE 2007 Conference ent://SD_ILS/0/SD_ILS:199537 2024-12-29T03:09:43Z 2024-12-29T03:09:43Z Yazar&#160;Pohlmann, Norbert. author.&#160;Reimer, Helmut. author.&#160;Schneider, Wolfgang. author.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-3-8348-9418-2">http://dx.doi.org/10.1007/978-3-8348-9418-2</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> The history of information security a comprehensive handbook ent://SD_ILS/0/SD_ILS:112205 2024-12-29T03:09:43Z 2024-12-29T03:09:43Z Yazar&#160;Leeuw, Karl de.&#160;Bergstra, J. A.&#160;ScienceDirect (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780444516084">An electronic book accessible through the World Wide Web; click for information</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Information Security Applications 7th International Workshop, WISA 2006, Jeju Island, Korea, August 28-30, 2006, Revised Selected Papers ent://SD_ILS/0/SD_ILS:186175 2024-12-29T03:09:43Z 2024-12-29T03:09:43Z Yazar&#160;Lee, Jae Kwang. editor.&#160;Yi, Okyeon. editor.&#160;Yung, Moti. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-3-540-71093-6">http://dx.doi.org/10.1007/978-3-540-71093-6</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Information Security and Privacy 12th Australasian Conference, ACISP 2007, Townsville, Australia, July 2-4, 2007. Proceedings ent://SD_ILS/0/SD_ILS:186859 2024-12-29T03:09:43Z 2024-12-29T03:09:43Z Yazar&#160;Pieprzyk, Josef. editor.&#160;Ghodosi, Hossein. editor.&#160;Dawson, Ed. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-3-540-73458-1">http://dx.doi.org/10.1007/978-3-540-73458-1</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Advances in Cryptology &ndash; ASIACRYPT 2007 13th International Conference on the Theory and Application of Cryptology and Information Security, Kuching, Malaysia, December 2-6, 2007. Proceedings ent://SD_ILS/0/SD_ILS:187720 2024-12-29T03:09:43Z 2024-12-29T03:09:43Z Yazar&#160;Kurosawa, Kaoru. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-3-540-76900-2">http://dx.doi.org/10.1007/978-3-540-76900-2</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Security for Wireless Sensor Networks ent://SD_ILS/0/SD_ILS:166353 2024-12-29T03:09:43Z 2024-12-29T03:09:43Z Yazar&#160;Liu, Donggang. author.&#160;Ning, Peng. author.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-0-387-46781-8">http://dx.doi.org/10.1007/978-0-387-46781-8</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Secure Data Management in Decentralized Systems ent://SD_ILS/0/SD_ILS:165430 2024-12-29T03:09:43Z 2024-12-29T03:09:43Z Yazar&#160;Yu, Ting. editor.&#160;Jajodia, Sushil. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-0-387-27696-0">http://dx.doi.org/10.1007/978-0-387-27696-0</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Malware Detection ent://SD_ILS/0/SD_ILS:166294 2024-12-29T03:09:43Z 2024-12-29T03:09:43Z Yazar&#160;Christodorescu, Mihai. editor.&#160;Jha, Somesh. editor.&#160;Maughan, Douglas. editor.&#160;Song, Dawn. editor.&#160;Wang, Cliff. editor.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-0-387-44599-1">http://dx.doi.org/10.1007/978-0-387-44599-1</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Electronic Postage Systems Technology, Security, Economics ent://SD_ILS/0/SD_ILS:166296 2024-12-29T03:09:43Z 2024-12-29T03:09:43Z Yazar&#160;Bleumer, Gerrit. author.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-0-387-44606-6">http://dx.doi.org/10.1007/978-0-387-44606-6</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Preserving Privacy in On-Line Analytical Processing (OLAP) ent://SD_ILS/0/SD_ILS:166336 2024-12-29T03:09:43Z 2024-12-29T03:09:43Z Yazar&#160;Wang, Lingyu. author.&#160;Jajodia, Sushil. author.&#160;Wijesekera, Duminda. author.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-0-387-46274-5">http://dx.doi.org/10.1007/978-0-387-46274-5</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Secure Localization and Time Synchronization for Wireless Sensor and Ad Hoc Networks ent://SD_ILS/0/SD_ILS:166337 2024-12-29T03:09:43Z 2024-12-29T03:09:43Z Yazar&#160;Poovendran, Radha. editor.&#160;Roy, Sumit. editor.&#160;Wang, Cliff. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-0-387-46276-9">http://dx.doi.org/10.1007/978-0-387-46276-9</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Data Warehousing and Data Mining Techniques for Cyber Security ent://SD_ILS/0/SD_ILS:166379 2024-12-29T03:09:43Z 2024-12-29T03:09:43Z Yazar&#160;Singhal, Anoop. author.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-0-387-47653-7">http://dx.doi.org/10.1007/978-0-387-47653-7</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Network Security Policies and Procedures ent://SD_ILS/0/SD_ILS:166393 2024-12-29T03:09:43Z 2024-12-29T03:09:43Z Yazar&#160;Frye, Douglas W. author.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-0-387-47955-2">http://dx.doi.org/10.1007/978-0-387-47955-2</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Privacy-Respecting Intrusion Detection ent://SD_ILS/0/SD_ILS:166560 2024-12-29T03:09:43Z 2024-12-29T03:09:43Z Yazar&#160;Flegel, Ulrich. author.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-0-387-68254-9">http://dx.doi.org/10.1007/978-0-387-68254-9</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Synchronizing Internet Protocol Security (SIPSec) ent://SD_ILS/0/SD_ILS:166600 2024-12-29T03:09:43Z 2024-12-29T03:09:43Z Yazar&#160;Shoniregun, Charles A. author.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-0-387-68569-4">http://dx.doi.org/10.1007/978-0-387-68569-4</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Data warehousing and data mining techniques for cyber security ent://SD_ILS/0/SD_ILS:110434 2024-12-29T03:09:43Z 2024-12-29T03:09:43Z Yazar&#160;Singhal, Anoop, 1958-<br/>Yer Numaras&#305;&#160;QA76.9.A25 S563 2007<br/>Format:&#160;Kitap<br/>Durum&#160;Beytepe K&uuml;t&uuml;phanesi~1<br/> Introduction to Cryptography Principles and Applications ent://SD_ILS/0/SD_ILS:185185 2024-12-29T03:09:43Z 2024-12-29T03:09:43Z Yazar&#160;Delfs, Hans. author.&#160;Knebl, Helmut. author.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/3-540-49244-5">http://dx.doi.org/10.1007/3-540-49244-5</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Formal Correctness of Security Protocols With 62 Figures and 4 Tables ent://SD_ILS/0/SD_ILS:185368 2024-12-29T03:09:43Z 2024-12-29T03:09:43Z Yazar&#160;Bella, Giampaolo. author.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-3-540-68136-6">http://dx.doi.org/10.1007/978-3-540-68136-6</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Cyberlaw, security &amp; privacy ent://SD_ILS/0/SD_ILS:112955 2024-12-29T03:09:43Z 2024-12-29T03:09:43Z Yazar&#160;The Second International Conference on Legal, Security and Privacy Issues in Information Technology (LSPI) (2nd 2007 Beijing, China).&#160;Kierkegaard, Sylvia Mercado.<br/>Yer Numaras&#305;&#160;K564.C6 .C994 2007<br/>Format:&#160;Kitap<br/>Durum&#160;Hukuk K&uuml;t&uuml;phanesi~1<br/> National security issues in science, law, and technology ent://SD_ILS/0/SD_ILS:287602 2024-12-29T03:09:43Z 2024-12-29T03:09:43Z Yazar&#160;Johnson, Thomas Alfred.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://marc.crcnetbase.com/isbn/9781420019087">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Terrorism and organized hate crime intelligence gathering, analysis, and investigations ent://SD_ILS/0/SD_ILS:284728 2024-12-29T03:09:43Z 2024-12-29T03:09:43Z Yazar&#160;Ronczkowski, Michael.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://marc.crcnetbase.com/isbn/9780849378508">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Strategic security management a risk assessment guide for decision makers ent://SD_ILS/0/SD_ILS:306471 2024-12-29T03:09:43Z 2024-12-29T03:09:43Z Yazar&#160;Vellani, Karim H., 1971-<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780123708977">http://www.sciencedirect.com/science/book/9780123708977</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Strategic security management a risk assessment guide for decision makers ent://SD_ILS/0/SD_ILS:148661 2024-12-29T03:09:43Z 2024-12-29T03:09:43Z Yazar&#160;Vellani, Karim H., 1971-<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780123708977">http://www.sciencedirect.com/science/book/9780123708977</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Integrated security systems design concepts, specifications, and implementation ent://SD_ILS/0/SD_ILS:145552 2024-12-29T03:09:43Z 2024-12-29T03:09:43Z Yazar&#160;Norman, Thomas L.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780750679091">http://www.sciencedirect.com/science/book/9780750679091</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Integrated security systems design concepts, specifications, and implementation ent://SD_ILS/0/SD_ILS:112175 2024-12-29T03:09:43Z 2024-12-29T03:09:43Z Yazar&#160;Norman, Thomas, CSC.&#160;ScienceDirect (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780750679091">An electronic book accessible through the World Wide Web; click for information</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Strategic security management a risk assessment guide for decision makers ent://SD_ILS/0/SD_ILS:112201 2024-12-29T03:09:43Z 2024-12-29T03:09:43Z Yazar&#160;Vellani, Karim H., 1971-&#160;ScienceDirect (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780123708977">An electronic book accessible through the World Wide Web; click for information</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/>