Arama Sonuçları Security Measures - Daraltılmış: 2008SirsiDynix Enterprisehttps://katalog.hacettepe.edu.tr/client/tr_TR/default_tr/default_tr/qu$003dSecurity$002bMeasures$0026qf$003dPUBDATE$002509Yay$0025C4$0025B1n$002bY$0025C4$0025B1l$0025C4$0025B1$0025092008$0025092008$0026ps$003d300?2025-02-27T06:08:34ZTransportation systems securityent://SD_ILS/0/SD_ILS:3428272025-02-27T06:08:34Z2025-02-27T06:08:34ZYazar McDougall, Allan. Radvanovsky, Robert.<br/>Yer Numarası ONLINE(342827.1)<br/>Elektronik Erişim <a href="http://marc.crcnetbase.com/isbn/9781466528055">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Building an effective information security policy architectureent://SD_ILS/0/SD_ILS:2905772025-02-27T06:08:34Z2025-02-27T06:08:34ZYazar Bacik, Sandy.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://marc.crcnetbase.com/isbn/9781420059069">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Distributed systems security issues, processes and solutionsent://SD_ILS/0/SD_ILS:2984222025-02-27T06:08:34Z2025-02-27T06:08:34ZYazar Belapurkar, Abhijit. Wiley InterScience (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim John Wiley <a href="http://dx.doi.org/10.1002/9780470751787">http://dx.doi.org/10.1002/9780470751787</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>ICT futures delivering pervasive, real-time and secure servicesent://SD_ILS/0/SD_ILS:3027682025-02-27T06:08:34Z2025-02-27T06:08:34ZYazar Warren, Paul (Paul W.) Davies, J. (N. John) Brown, David, 1954- Wiley InterScience (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim John Wiley <a href="http://dx.doi.org/10.1002/9780470758656">http://dx.doi.org/10.1002/9780470758656</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Lloyd's MIU handbook of maritime securityent://SD_ILS/0/SD_ILS:2850072025-02-27T06:08:34Z2025-02-27T06:08:34ZYazar Herbert-Burns, Rupert. Bateman, W. S. G. (Walter Samuel Grono) Lehr, Peter. Lloyd's (Firm)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://marc.crcnetbase.com/isbn/9781420054811">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Introduction to executive protectionent://SD_ILS/0/SD_ILS:2850112025-02-27T06:08:34Z2025-02-27T06:08:34ZYazar June, Dale L.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://marc.crcnetbase.com/isbn/9781420043464">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Wireless Internet Security Architecture and Protocolsent://SD_ILS/0/SD_ILS:2362052025-02-27T06:08:34Z2025-02-27T06:08:34ZYazar Kempf, James.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1017/CBO9780511754739">Access by subscription</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Secure computer and network systems modeling, analysis and designent://SD_ILS/0/SD_ILS:2966652025-02-27T06:08:34Z2025-02-27T06:08:34ZYazar Ye, Nong. Wiley InterScience (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim Contributor biographical information <a href="http://catdir.loc.gov/catdir/enhancements/fy0833/2007037133-b.html">http://catdir.loc.gov/catdir/enhancements/fy0833/2007037133-b.html</a>
John Wiley <a href="http://dx.doi.org/10.1002/9780470023273">http://dx.doi.org/10.1002/9780470023273</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Host Identity Protocol (HIP) towards the secure mobile Internetent://SD_ILS/0/SD_ILS:3028022025-02-27T06:08:34Z2025-02-27T06:08:34ZYazar Gurtov, Andrei.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim John Wiley <a href="http://dx.doi.org/10.1002/9780470772898">http://dx.doi.org/10.1002/9780470772898</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>The library security and safety guide to prevention, planning, and responseent://SD_ILS/0/SD_ILS:3165372025-02-27T06:08:34Z2025-02-27T06:08:34ZYazar Kahn, Miriam (Miriam B.)<br/>Yer Numarası Z679.6 K34 2008<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>Multimedia content encryption techniques and applicationsent://SD_ILS/0/SD_ILS:2859522025-02-27T06:08:34Z2025-02-27T06:08:34ZYazar Lian, Shiguo.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://marc.crcnetbase.com/isbn/9781420065282">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Security software development assessing and managing security risksent://SD_ILS/0/SD_ILS:2860162025-02-27T06:08:34Z2025-02-27T06:08:34ZYazar Ashbaugh, Douglas A.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://marc.crcnetbase.com/isbn/9781420063813">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Architecting secure software systemsent://SD_ILS/0/SD_ILS:2887492025-02-27T06:08:34Z2025-02-27T06:08:34ZYazar Talukder, Asoke K. Chaitanya, Manish.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://marc.crcnetbase.com/isbn/9781420087857">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Transportation systems securityent://SD_ILS/0/SD_ILS:2905982025-02-27T06:08:34Z2025-02-27T06:08:34ZYazar McDougall, Allan. Radvanovsky, Robert. Clavadetscher, Carl.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://marc.crcnetbase.com/isbn/9781420063790">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Transportation infrastructure security utilizing intelligent transportation systemsent://SD_ILS/0/SD_ILS:2976842025-02-27T06:08:34Z2025-02-27T06:08:34ZYazar Fries, Ryan Nicholas. Chowdhury, Mashrur A. Brummond, Jeffrey. Wiley InterScience (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim John Wiley <a href="http://dx.doi.org/10.1002/9780470432853">http://dx.doi.org/10.1002/9780470432853</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Security in wireless ad hoc and sensor networksent://SD_ILS/0/SD_ILS:2977892025-02-27T06:08:34Z2025-02-27T06:08:34ZYazar Çayirci, E. (Erdal) Levi, Albert, 1969- Wiley InterScience (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim John Wiley <a href="http://dx.doi.org/10.1002/9780470516782">http://dx.doi.org/10.1002/9780470516782</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Digital privacy theory, technologies, and practicesent://SD_ILS/0/SD_ILS:2868242025-02-27T06:08:34Z2025-02-27T06:08:34ZYazar Acquisti, Alessandro.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://marc.crcnetbase.com/isbn/9781420052183">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Information assurance architectureent://SD_ILS/0/SD_ILS:2911232025-02-27T06:08:34Z2025-02-27T06:08:34ZYazar Willett, Keith D.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://marc.crcnetbase.com/isbn/9780849380686">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Managing global supply chains compliance, security, and dealing with terrorisment://SD_ILS/0/SD_ILS:2914822025-02-27T06:08:34Z2025-02-27T06:08:34ZYazar Cook, Thomas A., 1953-<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://marc.crcnetbase.com/isbn/9781420064582">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>The future of the internet and how to stop itent://SD_ILS/0/SD_ILS:1349462025-02-27T06:08:34Z2025-02-27T06:08:34ZYazar Zittrain, Jonathan L.<br/>Yer Numarası TK5105.875.I57 Z53 2008<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>Microsoft forefront security administration guideent://SD_ILS/0/SD_ILS:1463692025-02-27T06:08:34Z2025-02-27T06:08:34ZYazar Varsalone, Jesse.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492447">http://www.sciencedirect.com/science/book/9781597492447</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Network security know it allent://SD_ILS/0/SD_ILS:1464012025-02-27T06:08:34Z2025-02-27T06:08:34ZYazar Joshi, James B. D.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780123744630">http://www.sciencedirect.com/science/book/9780123744630</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Nmap in the enterprise your guide to network scanningent://SD_ILS/0/SD_ILS:1464422025-02-27T06:08:34Z2025-02-27T06:08:34ZYazar Orebaugh, Angela. Pinkard, Becky.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492416">http://www.sciencedirect.com/science/book/9781597492416</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>OSSEC host-based intrusion detection guideent://SD_ILS/0/SD_ILS:1483332025-02-27T06:08:34Z2025-02-27T06:08:34ZYazar Hay, Andrew. Cid, Daniel. Bray, Rory.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492409">http://www.sciencedirect.com/science/book/9781597492409</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>SonicWALL secure wireless network integrated solutions guideent://SD_ILS/0/SD_ILS:1485622025-02-27T06:08:34Z2025-02-27T06:08:34ZYazar Levy, Joe.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491938">http://www.sciencedirect.com/science/book/9781597491938</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Securing Citrix XenApp Server in the enterpriseent://SD_ILS/0/SD_ILS:1490502025-02-27T06:08:34Z2025-02-27T06:08:34ZYazar Bin Azad, Tariq. Wilson, Connie. Wright., Michael.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492812">http://www.sciencedirect.com/science/book/9781597492812</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Kismet hackingent://SD_ILS/0/SD_ILS:1478612025-02-27T06:08:34Z2025-02-27T06:08:34ZYazar Haines, Brad. Schearer, Michael J. Thornton, Frank (Thorn)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491174">http://www.sciencedirect.com/science/book/9781597491174</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Google hacking for penetration testers. Volume 2ent://SD_ILS/0/SD_ILS:1480292025-02-27T06:08:34Z2025-02-27T06:08:34ZYazar Long, Johnny.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491761">http://www.sciencedirect.com/science/book/9781597491761</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Scene of the cybercrimeent://SD_ILS/0/SD_ILS:1489552025-02-27T06:08:34Z2025-02-27T06:08:34ZYazar Cross, Michael, 1965- Shinder, Debra Littlejohn. Scene of the cybercrime.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492768">http://www.sciencedirect.com/science/book/9781597492768</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Security and Quality of Service in Ad Hoc Wireless Networksent://SD_ILS/0/SD_ILS:2378012025-02-27T06:08:34Z2025-02-27T06:08:34ZYazar Mishra, Amitabh.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1017/CBO9780511619755">Access by subscription</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Introduction to Broadband Communication Systemsent://SD_ILS/0/SD_ILS:2480592025-02-27T06:08:34Z2025-02-27T06:08:34ZYazar Akujuobi, Cajetan M. Sadiku, Matthew N.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1049/SBTE501E">http://dx.doi.org/10.1049/SBTE501E</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>İnternet kullanımı ve aileent://SD_ILS/0/SD_ILS:1399012025-02-27T06:08:34Z2025-02-27T06:08:34ZYer Numarası TK5105.888 .I58 2008<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>How to cheat at securing Linuxent://SD_ILS/0/SD_ILS:1455402025-02-27T06:08:34Z2025-02-27T06:08:34ZYazar Krishnamurthy Madwachar, Mohan.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492072">http://www.sciencedirect.com/science/book/9781597492072</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Infosecurity 2008 threat analysisent://SD_ILS/0/SD_ILS:1455412025-02-27T06:08:34Z2025-02-27T06:08:34ZYazar Clark, Champ, III.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492249">http://www.sciencedirect.com/science/book/9781597492249</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Information assurance dependability and security in networked systemsent://SD_ILS/0/SD_ILS:1455532025-02-27T06:08:34Z2025-02-27T06:08:34ZYazar Qian, Yi, 1962-<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780123735669">http://www.sciencedirect.com/science/book/9780123735669</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Integrating ISA Server 2006 with Microsoft Exchange 2007ent://SD_ILS/0/SD_ILS:1456282025-02-27T06:08:34Z2025-02-27T06:08:34ZYazar Strachan, Fergus.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492751">http://www.sciencedirect.com/science/book/9781597492751</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Netcat power toolsent://SD_ILS/0/SD_ILS:1462772025-02-27T06:08:34Z2025-02-27T06:08:34ZYazar Kanclirz, Jan. Baskin, Brian.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492577">http://www.sciencedirect.com/science/book/9781597492577</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Practical embedded security building secure resource-constrained systemsent://SD_ILS/0/SD_ILS:1474162025-02-27T06:08:34Z2025-02-27T06:08:34ZYazar Stapko, Timothy John.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780750682152">http://www.sciencedirect.com/science/book/9780750682152</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>ISA server 2006ent://SD_ILS/0/SD_ILS:1150802025-02-27T06:08:34Z2025-02-27T06:08:34ZYazar İnan, Yüksel. Demirli, Nihat.<br/>Yer Numarası TK5105.59 .I536 2008<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~2<br/>