Arama Sonuçları Information security - Daraltılmış: 2007SirsiDynix Enterprisehttps://katalog.hacettepe.edu.tr/client/tr_TR/default_tr/default_tr/qu$003dInformation$002bsecurity$0026qf$003dPUBDATE$002509Yay$0025C4$0025B1n$002bY$0025C4$0025B1l$0025C4$0025B1$0025092007$0025092007$0026ic$003dtrue$0026te$003dILS$0026ps$003d300?dt=list2024-12-29T03:09:43ZInformation security management handbookent://SD_ILS/0/SD_ILS:2871232024-12-29T03:09:43Z2024-12-29T03:09:43ZYazar Tipton, Harold F. Nozaki, Micki Krause.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://marc.crcnetbase.com/isbn/9781439893159">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Information security management handbookent://SD_ILS/0/SD_ILS:2891512024-12-29T03:09:43Z2024-12-29T03:09:43ZYazar Tipton, Harold F. Krause, Micki.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://marc.crcnetbase.com/isbn/9780203325438">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Information security management handbookent://SD_ILS/0/SD_ILS:2903202024-12-29T03:09:43Z2024-12-29T03:09:43ZYazar Tipton, Harold F. Krause, Micki.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://marc.crcnetbase.com/isbn/9781420003406">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Information security management handbookent://SD_ILS/0/SD_ILS:2907632024-12-29T03:09:43Z2024-12-29T03:09:43ZYazar Tipton, Harold F. Nozaki, Micki Krause.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://marc.crcnetbase.com/isbn/9781439853467">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Information security management handbookent://SD_ILS/0/SD_ILS:2897342024-12-29T03:09:43Z2024-12-29T03:09:43ZYazar Tipton, Harold F. Krause, Micki.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://marc.crcnetbase.com/isbn/9781420090956">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Information security management handbookent://SD_ILS/0/SD_ILS:2851612024-12-29T03:09:43Z2024-12-29T03:09:43ZYazar Tipton, Harold F. Krause, Micki.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://marc.crcnetbase.com/isbn/9781439833032">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Information security cost managementent://SD_ILS/0/SD_ILS:2865452024-12-29T03:09:43Z2024-12-29T03:09:43ZYazar Bazavan, Ioana V. Lim, Ian.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://marc.crcnetbase.com/isbn/9781420013832">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Information security : contemporary casesent://SD_ILS/0/SD_ILS:1110212024-12-29T03:09:43Z2024-12-29T03:09:43ZYazar Wright, Marie A. Kakalik, John S.<br/>Yer Numarası QA76.9.A25 W75 2007<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>Information security design, implementation, measurement, and complianceent://SD_ILS/0/SD_ILS:2884902024-12-29T03:09:43Z2024-12-29T03:09:43ZYazar Layton, Timothy P.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://marc.crcnetbase.com/isbn/9781420013412">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Zen and the art of information securityent://SD_ILS/0/SD_ILS:1456802024-12-29T03:09:43Z2024-12-29T03:09:43ZYazar Winkler, Ira.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491686">http://www.sciencedirect.com/science/book/9781597491686</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Zen and the art of information securityent://SD_ILS/0/SD_ILS:1122142024-12-29T03:09:43Z2024-12-29T03:09:43ZYazar Winkler, Ira. ScienceDirect (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491686">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Computational Intelligence in Information Assurance and Securityent://SD_ILS/0/SD_ILS:1861712024-12-29T03:09:43Z2024-12-29T03:09:43ZYazar Nedjah, Nadia. editor. Abraham, Ajith. editor. Mourelle, Luiza de Macedo. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-540-71078-3">http://dx.doi.org/10.1007/978-3-540-71078-3</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Information Security Practice and Experience Third International Conference, ISPEC 2007, Hong Kong, China, May 7-9, 2007. Proceedingsent://SD_ILS/0/SD_ILS:1864612024-12-29T03:09:43Z2024-12-29T03:09:43ZYazar Dawson, Ed. editor. Wong, Duncan S. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-540-72163-5">http://dx.doi.org/10.1007/978-3-540-72163-5</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Information Security Theory and Practices. Smart Cards, Mobile and Ubiquitous Computing Systems First IFIP TC6 / WG 8.8 / WG 11.2 International Workshop, WISTP 2007, Heraklion, Crete, Greece, May 9-11, 2007. Proceedingsent://SD_ILS/0/SD_ILS:1865132024-12-29T03:09:43Z2024-12-29T03:09:43ZYazar Sauveron, Damien. editor. Markantonakis, Konstantinos. editor. Bilas, Angelos. editor. Quisquater, Jean-Jacques. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-540-72354-7">http://dx.doi.org/10.1007/978-3-540-72354-7</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Advances in Information and Computer Security Second International Workshop on Security, IWSEC 2007, Nara, Japan, October 29-31, 2007. Proceedingsent://SD_ILS/0/SD_ILS:1874672024-12-29T03:09:43Z2024-12-29T03:09:43ZYazar Miyaji, Atsuko. editor. Kikuchi, Hiroaki. editor. Rannenberg, Kai. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-540-75651-4">http://dx.doi.org/10.1007/978-3-540-75651-4</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Information and Communications Security 9th International Conference, ICICS 2007, Zhengzhou, China, December 12-15, 2007. Proceedingsent://SD_ILS/0/SD_ILS:1877732024-12-29T03:09:43Z2024-12-29T03:09:43ZYazar Qing, Sihan. editor. Imai, Hideki. editor. Wang, Guilin. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-540-77048-0">http://dx.doi.org/10.1007/978-3-540-77048-0</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Information Systems Security Third International Conference, ICISS 2007, Delhi, India, December 16-20, 2007. Proceedingsent://SD_ILS/0/SD_ILS:1877902024-12-29T03:09:43Z2024-12-29T03:09:43ZYazar McDaniel, Patrick. editor. Gupta, Shyam K. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-540-77086-2">http://dx.doi.org/10.1007/978-3-540-77086-2</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Information Security Applications 8th International Workshop, WISA 2007, Jeju Island, Korea, August 27-29, 2007, Revised Selected Papersent://SD_ILS/0/SD_ILS:1879042024-12-29T03:09:43Z2024-12-29T03:09:43ZYazar Kim, Sehun. editor. Yung, Moti. editor. Lee, Hyung-Woo. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-540-77535-5">http://dx.doi.org/10.1007/978-3-540-77535-5</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>New Approaches for Security, Privacy and Trust in Complex Environments Proceedings of the IFIP TC-11 22nd International Information Security Conference (SEC 2007), 14–16 May 2007, Sandton, South Africaent://SD_ILS/0/SD_ILS:1669402024-12-29T03:09:43Z2024-12-29T03:09:43ZYazar Venter, Hein. editor. Eloff, Mariki. editor. Labuschagne, Les. editor. Eloff, Jan. editor. Solms, Rossouw. editor.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-0-387-72367-9">http://dx.doi.org/10.1007/978-0-387-72367-9</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Fifth World Conference on Information Security Education Proceedings of the IFIP TC11 WG 11.8, WISE 5, 19 to 21 June 2007, United States Military Academy, West Point, New York, USAent://SD_ILS/0/SD_ILS:1670382024-12-29T03:09:43Z2024-12-29T03:09:43ZYazar Futcher, Lynn. editor. Dodge, Ronald. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-0-387-73269-5">http://dx.doi.org/10.1007/978-0-387-73269-5</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Information Security 10th International Conference, ISC 2007, Valparaíso, Chile, October 9-12, 2007. Proceedingsent://SD_ILS/0/SD_ILS:1874292024-12-29T03:09:43Z2024-12-29T03:09:43ZYazar Garay, Juan A. editor. Lenstra, Arjen K. editor. Mambo, Masahiro. editor. Peralta, René. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-540-75496-1">http://dx.doi.org/10.1007/978-3-540-75496-1</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Information Security and Cryptology - ICISC 2007 10th International Conference, Seoul, Korea, November 29-30, 2007. Proceedingsent://SD_ILS/0/SD_ILS:1876812024-12-29T03:09:43Z2024-12-29T03:09:43ZYazar Nam, Kil-Hyun. editor. Rhee, Gwangsoo. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-540-76788-6">http://dx.doi.org/10.1007/978-3-540-76788-6</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>The history of information security a comprehensive handbookent://SD_ILS/0/SD_ILS:1455322024-12-29T03:09:43Z2024-12-29T03:09:43ZYazar Leeuw, Karl de. Bergstra, J. A.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780444516084">http://www.sciencedirect.com/science/book/9780444516084</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>ISSE/SECURE 2007 Securing Electronic Business Processes Highlights of the Information Security Solutions Europe/SECURE 2007 Conferenceent://SD_ILS/0/SD_ILS:1995372024-12-29T03:09:43Z2024-12-29T03:09:43ZYazar Pohlmann, Norbert. author. Reimer, Helmut. author. Schneider, Wolfgang. author. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-8348-9418-2">http://dx.doi.org/10.1007/978-3-8348-9418-2</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>The history of information security a comprehensive handbookent://SD_ILS/0/SD_ILS:1122052024-12-29T03:09:43Z2024-12-29T03:09:43ZYazar Leeuw, Karl de. Bergstra, J. A. ScienceDirect (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780444516084">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Information Security Applications 7th International Workshop, WISA 2006, Jeju Island, Korea, August 28-30, 2006, Revised Selected Papersent://SD_ILS/0/SD_ILS:1861752024-12-29T03:09:43Z2024-12-29T03:09:43ZYazar Lee, Jae Kwang. editor. Yi, Okyeon. editor. Yung, Moti. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-540-71093-6">http://dx.doi.org/10.1007/978-3-540-71093-6</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Information Security and Privacy 12th Australasian Conference, ACISP 2007, Townsville, Australia, July 2-4, 2007. Proceedingsent://SD_ILS/0/SD_ILS:1868592024-12-29T03:09:43Z2024-12-29T03:09:43ZYazar Pieprzyk, Josef. editor. Ghodosi, Hossein. editor. Dawson, Ed. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-540-73458-1">http://dx.doi.org/10.1007/978-3-540-73458-1</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Advances in Cryptology – ASIACRYPT 2007 13th International Conference on the Theory and Application of Cryptology and Information Security, Kuching, Malaysia, December 2-6, 2007. Proceedingsent://SD_ILS/0/SD_ILS:1877202024-12-29T03:09:43Z2024-12-29T03:09:43ZYazar Kurosawa, Kaoru. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-540-76900-2">http://dx.doi.org/10.1007/978-3-540-76900-2</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Security for Wireless Sensor Networksent://SD_ILS/0/SD_ILS:1663532024-12-29T03:09:43Z2024-12-29T03:09:43ZYazar Liu, Donggang. author. Ning, Peng. author. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-0-387-46781-8">http://dx.doi.org/10.1007/978-0-387-46781-8</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Secure Data Management in Decentralized Systemsent://SD_ILS/0/SD_ILS:1654302024-12-29T03:09:43Z2024-12-29T03:09:43ZYazar Yu, Ting. editor. Jajodia, Sushil. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-0-387-27696-0">http://dx.doi.org/10.1007/978-0-387-27696-0</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Malware Detectionent://SD_ILS/0/SD_ILS:1662942024-12-29T03:09:43Z2024-12-29T03:09:43ZYazar Christodorescu, Mihai. editor. Jha, Somesh. editor. Maughan, Douglas. editor. Song, Dawn. editor. Wang, Cliff. editor.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-0-387-44599-1">http://dx.doi.org/10.1007/978-0-387-44599-1</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Electronic Postage Systems Technology, Security, Economicsent://SD_ILS/0/SD_ILS:1662962024-12-29T03:09:43Z2024-12-29T03:09:43ZYazar Bleumer, Gerrit. author. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-0-387-44606-6">http://dx.doi.org/10.1007/978-0-387-44606-6</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Preserving Privacy in On-Line Analytical Processing (OLAP)ent://SD_ILS/0/SD_ILS:1663362024-12-29T03:09:43Z2024-12-29T03:09:43ZYazar Wang, Lingyu. author. Jajodia, Sushil. author. Wijesekera, Duminda. author. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-0-387-46274-5">http://dx.doi.org/10.1007/978-0-387-46274-5</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Secure Localization and Time Synchronization for Wireless Sensor and Ad Hoc Networksent://SD_ILS/0/SD_ILS:1663372024-12-29T03:09:43Z2024-12-29T03:09:43ZYazar Poovendran, Radha. editor. Roy, Sumit. editor. Wang, Cliff. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-0-387-46276-9">http://dx.doi.org/10.1007/978-0-387-46276-9</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Data Warehousing and Data Mining Techniques for Cyber Securityent://SD_ILS/0/SD_ILS:1663792024-12-29T03:09:43Z2024-12-29T03:09:43ZYazar Singhal, Anoop. author. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-0-387-47653-7">http://dx.doi.org/10.1007/978-0-387-47653-7</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Network Security Policies and Proceduresent://SD_ILS/0/SD_ILS:1663932024-12-29T03:09:43Z2024-12-29T03:09:43ZYazar Frye, Douglas W. author. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-0-387-47955-2">http://dx.doi.org/10.1007/978-0-387-47955-2</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Privacy-Respecting Intrusion Detectionent://SD_ILS/0/SD_ILS:1665602024-12-29T03:09:43Z2024-12-29T03:09:43ZYazar Flegel, Ulrich. author. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-0-387-68254-9">http://dx.doi.org/10.1007/978-0-387-68254-9</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Synchronizing Internet Protocol Security (SIPSec)ent://SD_ILS/0/SD_ILS:1666002024-12-29T03:09:43Z2024-12-29T03:09:43ZYazar Shoniregun, Charles A. author. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-0-387-68569-4">http://dx.doi.org/10.1007/978-0-387-68569-4</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Data warehousing and data mining techniques for cyber securityent://SD_ILS/0/SD_ILS:1104342024-12-29T03:09:43Z2024-12-29T03:09:43ZYazar Singhal, Anoop, 1958-<br/>Yer Numarası QA76.9.A25 S563 2007<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>Introduction to Cryptography Principles and Applicationsent://SD_ILS/0/SD_ILS:1851852024-12-29T03:09:43Z2024-12-29T03:09:43ZYazar Delfs, Hans. author. Knebl, Helmut. author. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/3-540-49244-5">http://dx.doi.org/10.1007/3-540-49244-5</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Formal Correctness of Security Protocols With 62 Figures and 4 Tablesent://SD_ILS/0/SD_ILS:1853682024-12-29T03:09:43Z2024-12-29T03:09:43ZYazar Bella, Giampaolo. author. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-540-68136-6">http://dx.doi.org/10.1007/978-3-540-68136-6</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Cyberlaw, security & privacyent://SD_ILS/0/SD_ILS:1129552024-12-29T03:09:43Z2024-12-29T03:09:43ZYazar The Second International Conference on Legal, Security and Privacy Issues in Information Technology (LSPI) (2nd 2007 Beijing, China). Kierkegaard, Sylvia Mercado.<br/>Yer Numarası K564.C6 .C994 2007<br/>Format: Kitap<br/>Durum Hukuk Kütüphanesi~1<br/>National security issues in science, law, and technologyent://SD_ILS/0/SD_ILS:2876022024-12-29T03:09:43Z2024-12-29T03:09:43ZYazar Johnson, Thomas Alfred.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://marc.crcnetbase.com/isbn/9781420019087">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Terrorism and organized hate crime intelligence gathering, analysis, and investigationsent://SD_ILS/0/SD_ILS:2847282024-12-29T03:09:43Z2024-12-29T03:09:43ZYazar Ronczkowski, Michael.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://marc.crcnetbase.com/isbn/9780849378508">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Strategic security management a risk assessment guide for decision makersent://SD_ILS/0/SD_ILS:3064712024-12-29T03:09:43Z2024-12-29T03:09:43ZYazar Vellani, Karim H., 1971-<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780123708977">http://www.sciencedirect.com/science/book/9780123708977</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Strategic security management a risk assessment guide for decision makersent://SD_ILS/0/SD_ILS:1486612024-12-29T03:09:43Z2024-12-29T03:09:43ZYazar Vellani, Karim H., 1971-<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780123708977">http://www.sciencedirect.com/science/book/9780123708977</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Integrated security systems design concepts, specifications, and implementationent://SD_ILS/0/SD_ILS:1455522024-12-29T03:09:43Z2024-12-29T03:09:43ZYazar Norman, Thomas L.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780750679091">http://www.sciencedirect.com/science/book/9780750679091</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Integrated security systems design concepts, specifications, and implementationent://SD_ILS/0/SD_ILS:1121752024-12-29T03:09:43Z2024-12-29T03:09:43ZYazar Norman, Thomas, CSC. ScienceDirect (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780750679091">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Strategic security management a risk assessment guide for decision makersent://SD_ILS/0/SD_ILS:1122012024-12-29T03:09:43Z2024-12-29T03:09:43ZYazar Vellani, Karim H., 1971- ScienceDirect (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780123708977">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>