Arama Sonuçları Security -- Technology. - Daraltılmış: 2011SirsiDynix Enterprisehttps://katalog.hacettepe.edu.tr/client/tr_TR/default_tr/default_tr/qu$003dSecurity$002b--$002bTechnology.$0026qf$003dPUBDATE$002509Yay$0025C4$0025B1n$002bY$0025C4$0025B1l$0025C4$0025B1$0025092011$0025092011$0026ps$003d300$0026isd$003dtrue?2024-11-11T07:31:09ZSecurity Technology International Conference, SecTech 2011, Held as Part of the Future Generation Information Technology Conference, FGIT 2011, in Conjunction with GDC 2011, Jeju Island, Korea, December 8-10, 2011. Proceedingsent://SD_ILS/0/SD_ILS:1961212024-11-11T07:31:09Z2024-11-11T07:31:09ZYazar Kim, Tai-hoon. editor. Adeli, Hojjat. editor. Fang, Wai-chi. editor. Villalba, Javier García. editor. Arnett, Kirk P. editor.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-27189-2">http://dx.doi.org/10.1007/978-3-642-27189-2</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Security Aspects in Information Technology First International Conference, InfoSecHiComNet 2011, Haldia, India, October 19-22, 2011. Proceedingsent://SD_ILS/0/SD_ILS:1956832024-11-11T07:31:09Z2024-11-11T07:31:09ZYazar Joye, Marc. editor. Mukhopadhyay, Debdeep. editor. Tunstall, Michael. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-24586-2">http://dx.doi.org/10.1007/978-3-642-24586-2</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Climate change and global energy security technology and policy optionsent://SD_ILS/0/SD_ILS:2201732024-11-11T07:31:09Z2024-11-11T07:31:09ZYazar Brown, Marilyn A. Sovacool, Benjamin K.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim IEEE Xplore <a href="http://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=6276863">http://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=6276863</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Security de-engineering solving the problems in information risk managementent://SD_ILS/0/SD_ILS:2862092024-11-11T07:31:09Z2024-11-11T07:31:09ZYazar Tibble, Ian.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://marc.crcnetbase.com/isbn/9781439868355">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Auditing cloud computing a security and privacy guideent://SD_ILS/0/SD_ILS:2992632024-11-11T07:31:09Z2024-11-11T07:31:09ZYazar Halpert, Ben, 1986-<br/>Yer Numarası ONLINE<br/>Elektronik Erişim Image <a href="http://images.contentreserve.com/ImageType-100/0128-1/{F889EE2A-CF12-4647-85E0-03258F227FC1}Img100.jpg">http://images.contentreserve.com/ImageType-100/0128-1/{F889EE2A-CF12-4647-85E0-03258F227FC1}Img100.jpg</a>
Books24x7 <a href="http://www.books24x7.com/marc.asp?bookid=44303">http://www.books24x7.com/marc.asp?bookid=44303</a>
John Wiley <a href="http://dx.doi.org/10.1002/9781118269091">http://dx.doi.org/10.1002/9781118269091</a>
OverDrive (PDF) <a href="http://www.contentreserve.com/TitleInfo.asp?ID={F889EE2A-CF12-4647-85E0-03258F227FC1}&Format=50">http://www.contentreserve.com/TitleInfo.asp?ID={F889EE2A-CF12-4647-85E0-03258F227FC1}&Format=50</a>
OverDrive (EPUB) <a href="http://www.contentreserve.com/TitleInfo.asp?ID={F889EE2A-CF12-4647-85E0-03258F227FC1}&Format=410">http://www.contentreserve.com/TitleInfo.asp?ID={F889EE2A-CF12-4647-85E0-03258F227FC1}&Format=410</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Engineering information security the application of systems engineering concepts to achieve information assuranceent://SD_ILS/0/SD_ILS:2499162024-11-11T07:31:09Z2024-11-11T07:31:09ZYazar Jacobs, Stuart.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim IEEE Xplore <a href="http://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=6047604">http://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=6047604</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Security patch managementent://SD_ILS/0/SD_ILS:2851912024-11-11T07:31:09Z2024-11-11T07:31:09ZYazar Nicastro, Felicia M.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://marc.crcnetbase.com/isbn/9781439825006">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Official (ISC)[superscript 2] guide to the ISSAP CBKent://SD_ILS/0/SD_ILS:2887942024-11-11T07:31:09Z2024-11-11T07:31:09ZYazar Tipton, Harold F. International Information Systems Security Certification Consortium.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://marc.crcnetbase.com/isbn/9781439800980">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Practical risk management for the CIOent://SD_ILS/0/SD_ILS:2915712024-11-11T07:31:09Z2024-11-11T07:31:09ZYazar Scherling, Mark.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://marc.crcnetbase.com/isbn/9781439856543">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Security strategy from requirements to realityent://SD_ILS/0/SD_ILS:2888512024-11-11T07:31:09Z2024-11-11T07:31:09ZYazar Stackpole, Bill. Oksendahl, Eric.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://marc.crcnetbase.com/isbn/9781439827345">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>IT security metrics a practical framework for measuring security & protecting dataent://SD_ILS/0/SD_ILS:2932942024-11-11T07:31:09Z2024-11-11T07:31:09ZYazar Hayden, Lance.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://mhebooklibrary.com/reader/security-metrics-practical-framework-for-measuring-protecting-data">Subscription required</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Hacking exposed wireless wireless security secrets & solutionsent://SD_ILS/0/SD_ILS:2933002024-11-11T07:31:09Z2024-11-11T07:31:09ZYazar Cache, Johnny. Wright, Joshua. Liu, Vincent.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://mhebooklibrary.com/reader/hacking-exposed-wireless-second-edition">Subscription required</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Mobile application securityent://SD_ILS/0/SD_ILS:2933122024-11-11T07:31:09Z2024-11-11T07:31:09ZYazar Dwivedi, Himanshu. Clark, Chris, 1980- Thiel, David V.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://mhebooklibrary.com/reader/mobile-application-security">Subscription required</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>The petroleum triangle : oil, globalization, and terrorent://SD_ILS/0/SD_ILS:3758832024-11-11T07:31:09Z2024-11-11T07:31:09ZYazar Yetiv, Steven A.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://www.jstor.org/stable/10.7591/j.ctt7zfkz">http://www.jstor.org/stable/10.7591/j.ctt7zfkz</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>The theory that would not die : how Bayes' rule cracked the enigma code, hunted down Russian submarines, & emerged triumphant from two centuries of controversyent://SD_ILS/0/SD_ILS:3753862024-11-11T07:31:09Z2024-11-11T07:31:09ZYazar McGrayne, Sharon Bertsch.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://www.jstor.org/stable/10.2307/j.ctt1np76s">http://www.jstor.org/stable/10.2307/j.ctt1np76s</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>The basics of information security understanding the fundamentals of InfoSec in theory and practiceent://SD_ILS/0/SD_ILS:1453712024-11-11T07:31:09Z2024-11-11T07:31:09ZYazar Andress, Jason.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597496537">http://www.sciencedirect.com/science/book/9781597496537</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>