Arama Sonuçları Security Measures - Daraltılmış: 2008SirsiDynix Enterprisehttps://katalog.hacettepe.edu.tr/client/tr_TR/default_tr/default_tr/qu$003dSecurity$002bMeasures$0026qf$003dPUBDATE$002509Yay$0025C4$0025B1n$002bY$0025C4$0025B1l$0025C4$0025B1$0025092008$0025092008$0026te$003dILS$0026ps$003d300?dt=list2024-12-26T15:52:58ZSecurity and Quality of Service in Ad Hoc Wireless Networksent://SD_ILS/0/SD_ILS:2378012024-12-26T15:52:58Z2024-12-26T15:52:58ZYazar Mishra, Amitabh.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1017/CBO9780511619755">Access by subscription</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Wireless Internet Security Architecture and Protocolsent://SD_ILS/0/SD_ILS:2362052024-12-26T15:52:58Z2024-12-26T15:52:58ZYazar Kempf, James.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1017/CBO9780511754739">Access by subscription</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Introduction to Broadband Communication Systemsent://SD_ILS/0/SD_ILS:2480592024-12-26T15:52:58Z2024-12-26T15:52:58ZYazar Akujuobi, Cajetan M. Sadiku, Matthew N.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1049/SBTE501E">http://dx.doi.org/10.1049/SBTE501E</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Lloyd's MIU handbook of maritime securityent://SD_ILS/0/SD_ILS:2850072024-12-26T15:52:58Z2024-12-26T15:52:58ZYazar Herbert-Burns, Rupert. Bateman, W. S. G. (Walter Samuel Grono) Lehr, Peter. Lloyd's (Firm)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://marc.crcnetbase.com/isbn/9781420054811">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Introduction to executive protectionent://SD_ILS/0/SD_ILS:2850112024-12-26T15:52:58Z2024-12-26T15:52:58ZYazar June, Dale L.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://marc.crcnetbase.com/isbn/9781420043464">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Transportation infrastructure security utilizing intelligent transportation systemsent://SD_ILS/0/SD_ILS:2976842024-12-26T15:52:58Z2024-12-26T15:52:58ZYazar Fries, Ryan Nicholas. Chowdhury, Mashrur A. Brummond, Jeffrey. Wiley InterScience (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim John Wiley <a href="http://dx.doi.org/10.1002/9780470432853">http://dx.doi.org/10.1002/9780470432853</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Security in wireless ad hoc and sensor networksent://SD_ILS/0/SD_ILS:2977892024-12-26T15:52:58Z2024-12-26T15:52:58ZYazar Çayirci, E. (Erdal) Levi, Albert, 1969- Wiley InterScience (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim John Wiley <a href="http://dx.doi.org/10.1002/9780470516782">http://dx.doi.org/10.1002/9780470516782</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Distributed systems security issues, processes and solutionsent://SD_ILS/0/SD_ILS:2984222024-12-26T15:52:58Z2024-12-26T15:52:58ZYazar Belapurkar, Abhijit. Wiley InterScience (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim John Wiley <a href="http://dx.doi.org/10.1002/9780470751787">http://dx.doi.org/10.1002/9780470751787</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Building an effective information security policy architectureent://SD_ILS/0/SD_ILS:2905772024-12-26T15:52:58Z2024-12-26T15:52:58ZYazar Bacik, Sandy.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://marc.crcnetbase.com/isbn/9781420059069">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Secure computer and network systems modeling, analysis and designent://SD_ILS/0/SD_ILS:2966652024-12-26T15:52:58Z2024-12-26T15:52:58ZYazar Ye, Nong. Wiley InterScience (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim Contributor biographical information <a href="http://catdir.loc.gov/catdir/enhancements/fy0833/2007037133-b.html">http://catdir.loc.gov/catdir/enhancements/fy0833/2007037133-b.html</a>
John Wiley <a href="http://dx.doi.org/10.1002/9780470023273">http://dx.doi.org/10.1002/9780470023273</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>ICT futures delivering pervasive, real-time and secure servicesent://SD_ILS/0/SD_ILS:3027682024-12-26T15:52:58Z2024-12-26T15:52:58ZYazar Warren, Paul (Paul W.) Davies, J. (N. John) Brown, David, 1954- Wiley InterScience (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim John Wiley <a href="http://dx.doi.org/10.1002/9780470758656">http://dx.doi.org/10.1002/9780470758656</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Host Identity Protocol (HIP) towards the secure mobile Internetent://SD_ILS/0/SD_ILS:3028022024-12-26T15:52:58Z2024-12-26T15:52:58ZYazar Gurtov, Andrei.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim John Wiley <a href="http://dx.doi.org/10.1002/9780470772898">http://dx.doi.org/10.1002/9780470772898</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Multimedia content encryption techniques and applicationsent://SD_ILS/0/SD_ILS:2859522024-12-26T15:52:58Z2024-12-26T15:52:58ZYazar Lian, Shiguo.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://marc.crcnetbase.com/isbn/9781420065282">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Security software development assessing and managing security risksent://SD_ILS/0/SD_ILS:2860162024-12-26T15:52:58Z2024-12-26T15:52:58ZYazar Ashbaugh, Douglas A.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://marc.crcnetbase.com/isbn/9781420063813">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Digital privacy theory, technologies, and practicesent://SD_ILS/0/SD_ILS:2868242024-12-26T15:52:58Z2024-12-26T15:52:58ZYazar Acquisti, Alessandro.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://marc.crcnetbase.com/isbn/9781420052183">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Transportation systems securityent://SD_ILS/0/SD_ILS:2905982024-12-26T15:52:58Z2024-12-26T15:52:58ZYazar McDougall, Allan. Radvanovsky, Robert. Clavadetscher, Carl.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://marc.crcnetbase.com/isbn/9781420063790">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Architecting secure software systemsent://SD_ILS/0/SD_ILS:2887492024-12-26T15:52:58Z2024-12-26T15:52:58ZYazar Talukder, Asoke K. Chaitanya, Manish.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://marc.crcnetbase.com/isbn/9781420087857">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Managing global supply chains compliance, security, and dealing with terrorisment://SD_ILS/0/SD_ILS:2914822024-12-26T15:52:58Z2024-12-26T15:52:58ZYazar Cook, Thomas A., 1953-<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://marc.crcnetbase.com/isbn/9781420064582">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Information assurance architectureent://SD_ILS/0/SD_ILS:2911232024-12-26T15:52:58Z2024-12-26T15:52:58ZYazar Willett, Keith D.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://marc.crcnetbase.com/isbn/9780849380686">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>İnternet kullanımı ve aileent://SD_ILS/0/SD_ILS:1399012024-12-26T15:52:58Z2024-12-26T15:52:58ZYer Numarası TK5105.888 .I58 2008<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>Kismet hackingent://SD_ILS/0/SD_ILS:1478612024-12-26T15:52:58Z2024-12-26T15:52:58ZYazar Haines, Brad. Schearer, Michael J. Thornton, Frank (Thorn)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491174">http://www.sciencedirect.com/science/book/9781597491174</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>OSSEC host-based intrusion detection guideent://SD_ILS/0/SD_ILS:1483332024-12-26T15:52:58Z2024-12-26T15:52:58ZYazar Hay, Andrew. Cid, Daniel. Bray, Rory.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492409">http://www.sciencedirect.com/science/book/9781597492409</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>SonicWALL secure wireless network integrated solutions guideent://SD_ILS/0/SD_ILS:1485622024-12-26T15:52:58Z2024-12-26T15:52:58ZYazar Levy, Joe.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491938">http://www.sciencedirect.com/science/book/9781597491938</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Scene of the cybercrimeent://SD_ILS/0/SD_ILS:1489552024-12-26T15:52:58Z2024-12-26T15:52:58ZYazar Cross, Michael, 1965- Shinder, Debra Littlejohn. Scene of the cybercrime.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492768">http://www.sciencedirect.com/science/book/9781597492768</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Securing Citrix XenApp Server in the enterpriseent://SD_ILS/0/SD_ILS:1490502024-12-26T15:52:58Z2024-12-26T15:52:58ZYazar Bin Azad, Tariq. Wilson, Connie. Wright., Michael.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492812">http://www.sciencedirect.com/science/book/9781597492812</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Integrating ISA Server 2006 with Microsoft Exchange 2007ent://SD_ILS/0/SD_ILS:1456282024-12-26T15:52:58Z2024-12-26T15:52:58ZYazar Strachan, Fergus.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492751">http://www.sciencedirect.com/science/book/9781597492751</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Netcat power toolsent://SD_ILS/0/SD_ILS:1462772024-12-26T15:52:58Z2024-12-26T15:52:58ZYazar Kanclirz, Jan. Baskin, Brian.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492577">http://www.sciencedirect.com/science/book/9781597492577</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Microsoft forefront security administration guideent://SD_ILS/0/SD_ILS:1463692024-12-26T15:52:58Z2024-12-26T15:52:58ZYazar Varsalone, Jesse.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492447">http://www.sciencedirect.com/science/book/9781597492447</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Network security know it allent://SD_ILS/0/SD_ILS:1464012024-12-26T15:52:58Z2024-12-26T15:52:58ZYazar Joshi, James B. D.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780123744630">http://www.sciencedirect.com/science/book/9780123744630</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Nmap in the enterprise your guide to network scanningent://SD_ILS/0/SD_ILS:1464422024-12-26T15:52:58Z2024-12-26T15:52:58ZYazar Orebaugh, Angela. Pinkard, Becky.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492416">http://www.sciencedirect.com/science/book/9781597492416</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Practical embedded security building secure resource-constrained systemsent://SD_ILS/0/SD_ILS:1474162024-12-26T15:52:58Z2024-12-26T15:52:58ZYazar Stapko, Timothy John.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780750682152">http://www.sciencedirect.com/science/book/9780750682152</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Google hacking for penetration testers. Volume 2ent://SD_ILS/0/SD_ILS:1480292024-12-26T15:52:58Z2024-12-26T15:52:58ZYazar Long, Johnny.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491761">http://www.sciencedirect.com/science/book/9781597491761</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>ISA server 2006ent://SD_ILS/0/SD_ILS:1150802024-12-26T15:52:58Z2024-12-26T15:52:58ZYazar İnan, Yüksel. Demirli, Nihat.<br/>Yer Numarası TK5105.59 .I536 2008<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~2<br/>The future of the internet and how to stop itent://SD_ILS/0/SD_ILS:1349462024-12-26T15:52:58Z2024-12-26T15:52:58ZYazar Zittrain, Jonathan L.<br/>Yer Numarası TK5105.875.I57 Z53 2008<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>How to cheat at securing Linuxent://SD_ILS/0/SD_ILS:1455402024-12-26T15:52:58Z2024-12-26T15:52:58ZYazar Krishnamurthy Madwachar, Mohan.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492072">http://www.sciencedirect.com/science/book/9781597492072</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Infosecurity 2008 threat analysisent://SD_ILS/0/SD_ILS:1455412024-12-26T15:52:58Z2024-12-26T15:52:58ZYazar Clark, Champ, III.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492249">http://www.sciencedirect.com/science/book/9781597492249</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Information assurance dependability and security in networked systemsent://SD_ILS/0/SD_ILS:1455532024-12-26T15:52:58Z2024-12-26T15:52:58ZYazar Qian, Yi, 1962-<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780123735669">http://www.sciencedirect.com/science/book/9780123735669</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Transportation systems securityent://SD_ILS/0/SD_ILS:3428272024-12-26T15:52:58Z2024-12-26T15:52:58ZYazar McDougall, Allan. Radvanovsky, Robert.<br/>Yer Numarası ONLINE(342827.1)<br/>Elektronik Erişim <a href="http://marc.crcnetbase.com/isbn/9781466528055">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>The library security and safety guide to prevention, planning, and responseent://SD_ILS/0/SD_ILS:3165372024-12-26T15:52:58Z2024-12-26T15:52:58ZYazar Kahn, Miriam (Miriam B.)<br/>Yer Numarası Z679.6 K34 2008<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>