Arama Sonuçları Security Measures - Daraltılmış: 2011SirsiDynix Enterprisehttps://katalog.hacettepe.edu.tr/client/tr_TR/default_tr/default_tr/qu$003dSecurity$002bMeasures$0026qf$003dPUBDATE$002509Yay$0025C4$0025B1n$002bY$0025C4$0025B1l$0025C4$0025B1$0025092011$0025092011$0026te$003dILS$0026ps$003d300$0026isd$003dtrue?dt=list2024-12-27T04:09:56ZAuditing IT infrastructures for complianceent://SD_ILS/0/SD_ILS:2711512024-12-27T04:09:56Z2024-12-27T04:09:56ZYazar Weiss, Martin M. Solomon, Michael G.<br/>Yer Numarası QA76.9.A25 W428 2011<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>Hacker techniques, tools, and incident handlingent://SD_ILS/0/SD_ILS:2714382024-12-27T04:09:56Z2024-12-27T04:09:56ZYazar Oriyano, Sean-Philip. Gregg, Michael (Michael C.)<br/>Yer Numarası TK5105.59 O786 2011<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>Network security essentials : applications and standardsent://SD_ILS/0/SD_ILS:2714462024-12-27T04:09:56Z2024-12-27T04:09:56ZYazar Stallings, William.<br/>Yer Numarası TK5105.59 S782 2011<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>Network security firewalls and VPNsent://SD_ILS/0/SD_ILS:2714522024-12-27T04:09:56Z2024-12-27T04:09:56ZYazar Stewart, James Michael.<br/>Yer Numarası TK5105.59 S758 2011<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>Security strategies in Web applications and social networkingent://SD_ILS/0/SD_ILS:2715382024-12-27T04:09:56Z2024-12-27T04:09:56ZYazar Harwood, Mike.<br/>Yer Numarası HM742 H38 2011<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>Guidelines for the physical security of water utilities, ANSI/ASCE/EWRI 56-10 Guidelines for the physical security of wastewater/stormwater utilities, ANSI/ASCE/EWRI 57-10ent://SD_ILS/0/SD_ILS:2793192024-12-27T04:09:56Z2024-12-27T04:09:56ZYazar American Society of Civil Engineers. Environmental and Water Resources Institute (U.S.)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim EBSCOhost <a href="http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=442510">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=442510</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Blast protection of buildingsent://SD_ILS/0/SD_ILS:2799202024-12-27T04:09:56Z2024-12-27T04:09:56ZYazar American Society of Civil Engineers.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim EBSCOhost <a href="http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=466935">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=466935</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Official (ISC)2 guide to the SSCP CBKent://SD_ILS/0/SD_ILS:2869752024-12-27T04:09:56Z2024-12-27T04:09:56ZYazar Tipton, Harold F. International Information Systems Security Certification Consortium.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://marc.crcnetbase.com/isbn/9781439804841">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Wireless securityent://SD_ILS/0/SD_ILS:2881102024-12-27T04:09:56Z2024-12-27T04:09:56ZYazar Osterhage, Wolfgang.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://marc.crcnetbase.com/isbn/9781439896266">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Security strategy from requirements to realityent://SD_ILS/0/SD_ILS:2888512024-12-27T04:09:56Z2024-12-27T04:09:56ZYazar Stackpole, Bill. Oksendahl, Eric.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://marc.crcnetbase.com/isbn/9781439827345">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Security and policy driven computingent://SD_ILS/0/SD_ILS:2888792024-12-27T04:09:56Z2024-12-27T04:09:56ZYazar Liu, Lei, 1968-<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://marc.crcnetbase.com/isbn/9781439825808">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>The security risk assessment handbook a complete guide for performing security risk assessmentsent://SD_ILS/0/SD_ILS:2888902024-12-27T04:09:56Z2024-12-27T04:09:56ZYazar Landoll, Douglas J.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://marc.crcnetbase.com/isbn/9781439821497">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Casino security and gaming surveillanceent://SD_ILS/0/SD_ILS:2888952024-12-27T04:09:56Z2024-12-27T04:09:56ZYazar Boss, Derk J. Zajic, Alan W.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://marc.crcnetbase.com/isbn/9781420087833">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Securing global transportation networks a total security management approachent://SD_ILS/0/SD_ILS:2931692024-12-27T04:09:56Z2024-12-27T04:09:56ZYazar Ritter, Luke. Barrett, J. Michael. Wilson, Rosalyn A. Ridge, Thomas J.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://mhebooklibrary.com/reader/securing-global-transportation-networks">Subscription required</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Architectural security codes and guidelines best practices for today's construction challengesent://SD_ILS/0/SD_ILS:2931732024-12-27T04:09:56Z2024-12-27T04:09:56ZYazar Wible, Robert C.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://mhebooklibrary.com/reader/architectural-security-codes-guidelines">Subscription required</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Construction site securityent://SD_ILS/0/SD_ILS:2932032024-12-27T04:09:56Z2024-12-27T04:09:56ZYazar Arata, Michael J.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://mhebooklibrary.com/reader/construction-site-security">Subscription required</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Property condition assessmentsent://SD_ILS/0/SD_ILS:2932062024-12-27T04:09:56Z2024-12-27T04:09:56ZYazar Kubba, Shamil A. A.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://mhebooklibrary.com/reader/property-condition-assessments">Subscription required</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Perimeter securityent://SD_ILS/0/SD_ILS:2932132024-12-27T04:09:56Z2024-12-27T04:09:56ZYazar Arata, Michael J.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://mhebooklibrary.com/reader/perimeter-security">Subscription required</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>IT security metrics a practical framework for measuring security & protecting dataent://SD_ILS/0/SD_ILS:2932942024-12-27T04:09:56Z2024-12-27T04:09:56ZYazar Hayden, Lance.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://mhebooklibrary.com/reader/security-metrics-practical-framework-for-measuring-protecting-data">Subscription required</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Mac OS X system administrationent://SD_ILS/0/SD_ILS:2932982024-12-27T04:09:56Z2024-12-27T04:09:56ZYazar Hart-Davis, Guy.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://mhebooklibrary.com/reader/mac-os-x-system-administration">Subscription required</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Hacking exposed wireless wireless security secrets & solutionsent://SD_ILS/0/SD_ILS:2933002024-12-27T04:09:56Z2024-12-27T04:09:56ZYazar Cache, Johnny. Wright, Joshua. Liu, Vincent.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://mhebooklibrary.com/reader/hacking-exposed-wireless-second-edition">Subscription required</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Wireless network administration a beginner's guideent://SD_ILS/0/SD_ILS:2933052024-12-27T04:09:56Z2024-12-27T04:09:56ZYazar Soyinka, Wale.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://mhebooklibrary.com/reader/wireless-network-administration-beginners-guide">Subscription required</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Mobile application securityent://SD_ILS/0/SD_ILS:2933122024-12-27T04:09:56Z2024-12-27T04:09:56ZYazar Dwivedi, Himanshu. Clark, Chris, 1980- Thiel, David V.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://mhebooklibrary.com/reader/mobile-application-security">Subscription required</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>CNET do-it-yourself home networking projects 24 cool things you didn't know you could do!ent://SD_ILS/0/SD_ILS:2936872024-12-27T04:09:56Z2024-12-27T04:09:56ZYazar Aspinwall, Jim. CNET (Firm)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://mhebooklibrary.com/reader/cnet-doityourself-home-networking-projects">Subscription required</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Risk and Safety Analysis of Nuclear Systemsent://SD_ILS/0/SD_ILS:2988912024-12-27T04:09:56Z2024-12-27T04:09:56ZYazar Lee, John C., 1941- author. McCormick, Norman J., 1938- author. Wiley InterScience (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim Wiley InterScience <a href="http://dx.doi.org/10.1002/9781118043462">An electronic book accessible through the World Wide Web; click for information</a>
MyiLibrary, Table of contents <a href="http://www.myilibrary.com?id=325614&ref=toc">http://www.myilibrary.com?id=325614&ref=toc</a>
Books24x7 <a href="http://www.books24x7.com/marc.asp?bookid=43276">http://www.books24x7.com/marc.asp?bookid=43276</a>
<a href="http://site.ebrary.com/lib/alltitles/Doc?id=10494682">http://site.ebrary.com/lib/alltitles/Doc?id=10494682</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Auditing cloud computing a security and privacy guideent://SD_ILS/0/SD_ILS:2992632024-12-27T04:09:56Z2024-12-27T04:09:56ZYazar Halpert, Ben, 1986-<br/>Yer Numarası ONLINE<br/>Elektronik Erişim Image <a href="http://images.contentreserve.com/ImageType-100/0128-1/{F889EE2A-CF12-4647-85E0-03258F227FC1}Img100.jpg">http://images.contentreserve.com/ImageType-100/0128-1/{F889EE2A-CF12-4647-85E0-03258F227FC1}Img100.jpg</a>
Books24x7 <a href="http://www.books24x7.com/marc.asp?bookid=44303">http://www.books24x7.com/marc.asp?bookid=44303</a>
John Wiley <a href="http://dx.doi.org/10.1002/9781118269091">http://dx.doi.org/10.1002/9781118269091</a>
OverDrive (PDF) <a href="http://www.contentreserve.com/TitleInfo.asp?ID={F889EE2A-CF12-4647-85E0-03258F227FC1}&Format=50">http://www.contentreserve.com/TitleInfo.asp?ID={F889EE2A-CF12-4647-85E0-03258F227FC1}&Format=50</a>
OverDrive (EPUB) <a href="http://www.contentreserve.com/TitleInfo.asp?ID={F889EE2A-CF12-4647-85E0-03258F227FC1}&Format=410">http://www.contentreserve.com/TitleInfo.asp?ID={F889EE2A-CF12-4647-85E0-03258F227FC1}&Format=410</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Effective security managementent://SD_ILS/0/SD_ILS:1464712024-12-27T04:09:56Z2024-12-27T04:09:56ZYazar Sennewald, Charles A., 1931-<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780123820129">http://www.sciencedirect.com/science/book/9780123820129</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Penetration tester's open source toolkitent://SD_ILS/0/SD_ILS:1482252024-12-27T04:09:56Z2024-12-27T04:09:56ZYazar Faircloth, Jeremy.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597496278">http://www.sciencedirect.com/science/book/9781597496278</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Coding for penetration testers building better toolsent://SD_ILS/0/SD_ILS:1487852024-12-27T04:09:56Z2024-12-27T04:09:56ZYazar Andress, Jason. Linn, Ryan.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597497299">http://www.sciencedirect.com/science/book/9781597497299</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Securing the smart grid next generation power grid securityent://SD_ILS/0/SD_ILS:1491442024-12-27T04:09:56Z2024-12-27T04:09:56ZYazar Flick, Tony. Morehouse, Justin.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495707">http://www.sciencedirect.com/science/book/9781597495707</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Security risk management building an information security risk management program from the ground upent://SD_ILS/0/SD_ILS:1491722024-12-27T04:09:56Z2024-12-27T04:09:56ZYazar Wheeler, Evan.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597496155">http://www.sciencedirect.com/science/book/9781597496155</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Our biometric future facial recognition technology and the culture of surveillanceent://SD_ILS/0/SD_ILS:2438222024-12-27T04:09:56Z2024-12-27T04:09:56ZYazar Gates, Kelly. Project Muse.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://muse.jhu.edu/books/9780814732793/">Full text available: </a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Terrorism and the Olympics major event security and lessons for the futureent://SD_ILS/0/SD_ILS:2653692024-12-27T04:09:56Z2024-12-27T04:09:56ZYazar Richards, Anthony. Fussey, Peter. Silke, Andrew.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://www.tandfebooks.com/isbn/9780203835227">Click here to view</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Wars of disruption and resilience cybered conflict, power, and national securityent://SD_ILS/0/SD_ILS:2443122024-12-27T04:09:56Z2024-12-27T04:09:56ZYazar Demchak, Chris C. Project Muse.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://muse.jhu.edu/books/9780820341378/">Full text available: </a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Nuclear energy and global governance ensuring safety, security, and non-proliferationent://SD_ILS/0/SD_ILS:2625362024-12-27T04:09:56Z2024-12-27T04:09:56ZYazar Findlay, Trevor, 1951-<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://www.tandfebooks.com/isbn/9780203834503">Click here to view</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>The securitization of migration a study of movement and orderent://SD_ILS/0/SD_ILS:2653362024-12-27T04:09:56Z2024-12-27T04:09:56ZYazar Bourbeau, Philippe, 1972 Nov. 3-<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://www.tandfebooks.com/isbn/9780203829349">Click here to view</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Readings and cases in information security : law and ethicsent://SD_ILS/0/SD_ILS:2677432024-12-27T04:09:56Z2024-12-27T04:09:56ZYazar Whitman, Michael E. Mattord, Herbert J.<br/>Yer Numarası TK5105.878 W54 2011<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>Effective security managementent://SD_ILS/0/SD_ILS:2699682024-12-27T04:09:56Z2024-12-27T04:09:56ZYazar Sennewald, Charles A.<br/>Yer Numarası HV8290 S46 2011<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>Guide to physical security planning & response for hospitals, medical, long term care facilitiesent://SD_ILS/0/SD_ILS:2786362024-12-27T04:09:56Z2024-12-27T04:09:56ZYazar Russell, Mary, 1953- Kendig, Jim. Philpott, Don, 1946-<br/>Yer Numarası ONLINE<br/>Elektronik Erişim EBSCOhost <a href="http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=398780">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=398780</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Guide to security considerations and practices for rare book, manuscript, and special collection librariesent://SD_ILS/0/SD_ILS:2800942024-12-27T04:09:56Z2024-12-27T04:09:56ZYazar Wilkie, Everett C. Association of College and Research Libraries.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim EBSCOhost <a href="http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=480845">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=480845</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Secure semantic service-oriented systemsent://SD_ILS/0/SD_ILS:2851052024-12-27T04:09:56Z2024-12-27T04:09:56ZYazar Thuraisingham, Bhavani M.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://marc.crcnetbase.com/isbn/9781420073324">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Secure Java for web application developmentent://SD_ILS/0/SD_ILS:2851662024-12-27T04:09:56Z2024-12-27T04:09:56ZYazar Bhargav, Abhay. Kumar, B. V. (Balepur Venkatanna), 1959-<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://marc.crcnetbase.com/isbn/9781439823569">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Security de-engineering solving the problems in information risk managementent://SD_ILS/0/SD_ILS:2862092024-12-27T04:09:56Z2024-12-27T04:09:56ZYazar Tibble, Ian.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://marc.crcnetbase.com/isbn/9781439868355">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Adaptive security management architectureent://SD_ILS/0/SD_ILS:2884512024-12-27T04:09:56Z2024-12-27T04:09:56ZYazar Tiller, James S.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://marc.crcnetbase.com/isbn/9781420013375">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Retail security and loss prevention solutionsent://SD_ILS/0/SD_ILS:2860962024-12-27T04:09:56Z2024-12-27T04:09:56ZYazar Greggo, Alan. Kresevich, Millie.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://marc.crcnetbase.com/isbn/9781420090086">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Staying safe at schoolent://SD_ILS/0/SD_ILS:2870842024-12-27T04:09:56Z2024-12-27T04:09:56ZYazar Quarles, Chester L. Quarles, Tammy.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://marc.crcnetbase.com/isbn/9781439858295">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Honeypot a new paradigm to information securityent://SD_ILS/0/SD_ILS:2889612024-12-27T04:09:56Z2024-12-27T04:09:56ZYazar Joshi, R. C. Sardana, Anjali.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://marc.crcnetbase.com/isbn/9781439869994">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Security of self-organizing networks MANET, WSN, WMN, VANETent://SD_ILS/0/SD_ILS:2907082024-12-27T04:09:56Z2024-12-27T04:09:56ZYazar Pathan, Al-Sakib Khan.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://marc.crcnetbase.com/isbn/9781439819203">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Practical risk management for the CIOent://SD_ILS/0/SD_ILS:2915712024-12-27T04:09:56Z2024-12-27T04:09:56ZYazar Scherling, Mark.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://marc.crcnetbase.com/isbn/9781439856543">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Management strategies for the cloud revolution how cloud computing is transforming business and why you can't afford to be left behindent://SD_ILS/0/SD_ILS:2929692024-12-27T04:09:56Z2024-12-27T04:09:56ZYazar Babcock, Charles.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://mhebooklibrary.com/reader/management-strategies-for-cloud-revolution-how-computing-transforming-business-you-cant-afford-to-be-left-behind">Subscription required</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Tips and traps for new home ownersent://SD_ILS/0/SD_ILS:2930222024-12-27T04:09:56Z2024-12-27T04:09:56ZYazar Irwin, Robert, 1941-<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://mhebooklibrary.com/reader/tips-traps-for-new-home-owners">Subscription required</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Oracle Fusion middleware 11g architecture and managementent://SD_ILS/0/SD_ILS:2932522024-12-27T04:09:56Z2024-12-27T04:09:56ZYazar Shafii, Reza. Lee, Stephen, 1975 June 8- Konduri, Gangadhar.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://mhebooklibrary.com/reader/oracle-fusion-middleware-11g-architecture-management">Subscription required</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Gray hat hacking the ethical hacker's handbookent://SD_ILS/0/SD_ILS:2932552024-12-27T04:09:56Z2024-12-27T04:09:56ZYazar Harris, Shon. Harper, Allen. Eagle, Chris. Ness, Jonathan. Lenkey, Gideon.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://mhebooklibrary.com/reader/gray-hat-hacking-ethical-hackers-handbook-3rd-edition">Subscription required</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Microsoft SQL server 2008 R2 master data services implementation & administrationent://SD_ILS/0/SD_ILS:2932612024-12-27T04:09:56Z2024-12-27T04:09:56ZYazar Graham, Tyler. Selhorn, Suzanne.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://mhebooklibrary.com/reader/microsoft-sql-server-2008-r2-master-data-services">Subscription required</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>IT auditing using controls to protect information assetsent://SD_ILS/0/SD_ILS:2932622024-12-27T04:09:56Z2024-12-27T04:09:56ZYazar Davis, Chris (Christopher Michael) Schiller, Mike. Wheeler, Kevin.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://mhebooklibrary.com/reader/auditing-using-controls-to-protect-information-assets-2nd-edition">Subscription required</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Master data management and data governanceent://SD_ILS/0/SD_ILS:2932672024-12-27T04:09:56Z2024-12-27T04:09:56ZYazar Berson, Alex. Dubov, Lawrence. Berson, Alex. Master data management and customer data integration for a global enterprise.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://mhebooklibrary.com/reader/master-data-management-governance-2e">Subscription required</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>iPad & iPhone administrator's guide enterprise deployment strategies and security solutionsent://SD_ILS/0/SD_ILS:2932682024-12-27T04:09:56Z2024-12-27T04:09:56ZYazar Hart-Davis, Guy.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://mhebooklibrary.com/reader/ipad-iphone-administrators-guide">Subscription required</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Hacking exposed web applications web application security secrets and solutionsent://SD_ILS/0/SD_ILS:2932772024-12-27T04:09:56Z2024-12-27T04:09:56ZYazar Scambray, Joel. Liu, Vincent. Sima, Caleb.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://mhebooklibrary.com/reader/hacking-exposed-web-applications-3e">Subscription required</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Security information and event management (SIEM) implementationent://SD_ILS/0/SD_ILS:2932792024-12-27T04:09:56Z2024-12-27T04:09:56ZYazar Miller, David, 1959 Nov. 5- Harris, Shon. Harper, Allen. VanDyke, Stephen. Blask, Chris.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://mhebooklibrary.com/reader/security-information-event-management-siem-implementation">Subscription required</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Designing an IAM framework with Oracle identity and access management suiteent://SD_ILS/0/SD_ILS:2932892024-12-27T04:09:56Z2024-12-27T04:09:56ZYazar Scheidel, Jeff.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://mhebooklibrary.com/reader/designing-iam-framework-oracle-identity-access-management-suite">Subscription required</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Hacking exposed malware & rootkits malware & rootkits security secrets & solutionsent://SD_ILS/0/SD_ILS:2933972024-12-27T04:09:56Z2024-12-27T04:09:56ZYazar Davis, Michael A. Bodmer, Sean. LeMasters, Aaron.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://mhebooklibrary.com/reader/hacking-exposed-malware-rootkits">Subscription required</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Home networking demystified a self-teaching guideent://SD_ILS/0/SD_ILS:2941432024-12-27T04:09:56Z2024-12-27T04:09:56ZYazar Long, Larry E.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://mhebooklibrary.com/reader/home-networking-demystified">Subscription required</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Working positively with personality disorder in secure settings a practitioner's perspectiveent://SD_ILS/0/SD_ILS:2985792024-12-27T04:09:56Z2024-12-27T04:09:56ZYazar Willmot, Phil. Gordon, Neil, 1959- Wiley InterScience (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim Wiley InterScience <a href="http://dx.doi.org/10.1002/9780470973110">An electronic book accessible through the World Wide Web; click for information</a>
Wiley InterScience - Full Text Online <a href="http://www.library.uiuc.edu/proxy/go.php?url=http://onlinelibrary.wiley.com/book/10.1002/9780470973110">http://www.library.uiuc.edu/proxy/go.php?url=http://onlinelibrary.wiley.com/book/10.1002/9780470973110</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Cryptography and network securityent://SD_ILS/0/SD_ILS:3862412024-12-27T04:09:56Z2024-12-27T04:09:56ZYazar Kahate, Atul.<br/>Yer Numarası TK5105.59 K12 2011<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>Next catastrophe : reducing our vulnerabilities to natural, industrial, and terrorist disastersent://SD_ILS/0/SD_ILS:3752872024-12-27T04:09:56Z2024-12-27T04:09:56ZYazar Perrow, Charles.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://www.jstor.org/stable/10.2307/j.ctt7t4c1">http://www.jstor.org/stable/10.2307/j.ctt7t4c1</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Legal issues in information securityent://SD_ILS/0/SD_ILS:3654182024-12-27T04:09:56Z2024-12-27T04:09:56ZYazar Grama, Joanna Lyn, author.<br/>Yer Numarası KF1263.C65 G73 2011<br/>Format: Kitap<br/>Durum Hukuk Kütüphanesi~1<br/>Proactive school security and emergency preparedness planningent://SD_ILS/0/SD_ILS:3691052024-12-27T04:09:56Z2024-12-27T04:09:56ZYazar Trump, Kenneth S.<br/>Yer Numarası ONLINE(369105.1)<br/>Elektronik Erişim SAGE knowledge <a href="http://sk.sagepub.com/books/proactive-school-security-and-emergency-preparedness-planning">http://sk.sagepub.com/books/proactive-school-security-and-emergency-preparedness-planning</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Intelligence and U.S. Foreign Policy : Iraq, 9/11, and Misguided Reform.ent://SD_ILS/0/SD_ILS:3757422024-12-27T04:09:56Z2024-12-27T04:09:56ZYer Numarası ONLINE<br/>Elektronik Erişim <a href="http://www.jstor.org/stable/10.7312/pill15792">http://www.jstor.org/stable/10.7312/pill15792</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Energy and security in South Asia : cooperation or conflict?ent://SD_ILS/0/SD_ILS:3757312024-12-27T04:09:56Z2024-12-27T04:09:56ZYazar Ebinger, Charles K.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://www.jstor.org/stable/10.7864/j.ctt127x8w">http://www.jstor.org/stable/10.7864/j.ctt127x8w</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Microsoft Windows server 2008 a beginner's guideent://SD_ILS/0/SD_ILS:2933682024-12-27T04:09:56Z2024-12-27T04:09:56ZYazar Matthews, Martin S.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://mhebooklibrary.com/reader/microsoft-windows-server-2008-beginners-guide">Subscription required</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Citrix Access Suite 4 advanced concepts the official guideent://SD_ILS/0/SD_ILS:2933722024-12-27T04:09:56Z2024-12-27T04:09:56ZYazar Kaplan, Steve, 1955- Jones, Andy.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://mhebooklibrary.com/reader/citrix-access-suite-4-advanced-concepts-official-guide-second-edition">Subscription required</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Networking a beginner's guideent://SD_ILS/0/SD_ILS:2933142024-12-27T04:09:56Z2024-12-27T04:09:56ZYazar Hallberg, Bruce A., 1964-<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://mhebooklibrary.com/reader/networking-beginners-guide-fifth-edition">Subscription required</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Oracle WebCenter 11g handbook build rich, customizable enterprise 2.0 applicationsent://SD_ILS/0/SD_ILS:2933162024-12-27T04:09:56Z2024-12-27T04:09:56ZYazar Desbiens, Fr�ed�eric. Moskovits, Peter. Weckerle, Philipp.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://mhebooklibrary.com/reader/oracle-webcenter-11g-handbook">Subscription required</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>24 deadly sins of software security programming flaws and how to fix thement://SD_ILS/0/SD_ILS:2933192024-12-27T04:09:56Z2024-12-27T04:09:56ZYazar Howard, Michael, 1965- LeBlanc, David, 1960- Viega, John.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://mhebooklibrary.com/reader/24-deadly-sins-software-security-programming-flaws-how-to-fix-them">Subscription required</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Cisco ASA configurationent://SD_ILS/0/SD_ILS:2933222024-12-27T04:09:56Z2024-12-27T04:09:56ZYazar Deal, Richard A.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://mhebooklibrary.com/reader/cisco-asa-configuration">Subscription required</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Hacking exposed Linux Linux security secrets and solutions.ent://SD_ILS/0/SD_ILS:2933242024-12-27T04:09:56Z2024-12-27T04:09:56ZYazar Hatch, Brian. Hacking Linux exposed. ISECOM (Organization)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://mhebooklibrary.com/reader/hacking-exposed-linux">Subscription required</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Fedora 7 & Red Hat Enterprise Linux the complete referenceent://SD_ILS/0/SD_ILS:2933282024-12-27T04:09:56Z2024-12-27T04:09:56ZYazar Petersen, Richard, 1949-<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://mhebooklibrary.com/reader/fedora-core-7-red-hat-enterprise-linux-complete-reference">Subscription required</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Ajax the complete referenceent://SD_ILS/0/SD_ILS:2933442024-12-27T04:09:56Z2024-12-27T04:09:56ZYazar Powell, Thomas A., 1968-<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://mhebooklibrary.com/reader/ajax-complete-reference">Subscription required</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Hacking exposed Web 2.0 Web 2.0 security secrets and solutionsent://SD_ILS/0/SD_ILS:2933522024-12-27T04:09:56Z2024-12-27T04:09:56ZYazar Cannings, Rich. Dwivedi, Himanshu. Lackey, Zane.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://mhebooklibrary.com/reader/hacking-exposed-web-20-security-secrets-solutions">Subscription required</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Oracle Enterprise manager 10g grid control implementation guideent://SD_ILS/0/SD_ILS:2933552024-12-27T04:09:56Z2024-12-27T04:09:56ZYazar New, Michael.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://mhebooklibrary.com/reader/oracle-enterprise-manager-10g-grid-control-implementation-guide">Subscription required</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Microsoft Windows server 2008 the complete referenceent://SD_ILS/0/SD_ILS:2933672024-12-27T04:09:56Z2024-12-27T04:09:56ZYazar Ruest, Danielle. Ruest, Nelson.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://mhebooklibrary.com/reader/microsoft-windows-server-2008-complete-reference">Subscription required</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Implementing SSL/TLS using cryptography and PKIent://SD_ILS/0/SD_ILS:3038382024-12-27T04:09:56Z2024-12-27T04:09:56ZYazar Davies, Joshua A. (Joshua Aaron)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim Wiley InterScience <a href="http://dx.doi.org/10.1002/9781118255797">An electronic book accessible through the World Wide Web; click for information</a>
<a href="http://proquest.safaribooksonline.com/?fpi=9780470920411">Available by subscription from Safari Books Online</a>
<a href="http://public.eblib.com/EBLPublic/PublicView.do?ptiID=706899">Click here to view book</a>
Books24x7 <a href="http://www.books24x7.com/marc.asp?bookid=40694">http://www.books24x7.com/marc.asp?bookid=40694</a>
Volltext <a href="http://proquest.safaribooksonline.com/9780470920411">http://proquest.safaribooksonline.com/9780470920411</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Essentials of online payment security and fraud preventionent://SD_ILS/0/SD_ILS:3040862024-12-27T04:09:56Z2024-12-27T04:09:56ZYazar Montague, David A., 1967-<br/>Yer Numarası ONLINE<br/>Elektronik Erişim Wiley InterScience <a href="http://dx.doi.org/10.1002/9781118386750">An electronic book accessible through the World Wide Web; click for information</a>
Ebook Library <a href="http://public.eblib.com/EBLPublic/PublicView.do?ptiID=624574">http://public.eblib.com/EBLPublic/PublicView.do?ptiID=624574</a>
<a href="http://swb.eblib.com/patron/FullRecord.aspx?p=624574">http://swb.eblib.com/patron/FullRecord.aspx?p=624574</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Android forensics investigation, analysis, and mobile security for Google Androident://SD_ILS/0/SD_ILS:1452532024-12-27T04:09:56Z2024-12-27T04:09:56ZYazar Hoog, Andrew. McCash, John.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597496513">http://www.sciencedirect.com/science/book/9781597496513</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>The basics of information security understanding the fundamentals of InfoSec in theory and practiceent://SD_ILS/0/SD_ILS:1453712024-12-27T04:09:56Z2024-12-27T04:09:56ZYazar Andress, Jason.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597496537">http://www.sciencedirect.com/science/book/9781597496537</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Industrial network security securing critical infrastructure networks for Smart Grid, SCADA, and other industrial control systemsent://SD_ILS/0/SD_ILS:1454572024-12-27T04:09:56Z2024-12-27T04:09:56ZYazar Knapp, Eric.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597496452">http://www.sciencedirect.com/science/book/9781597496452</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Thor's Microsoft security bible a collection of practical security techniquesent://SD_ILS/0/SD_ILS:1468082024-12-27T04:09:56Z2024-12-27T04:09:56ZYazar Mullen, Timothy M.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495721">http://www.sciencedirect.com/science/book/9781597495721</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Windows Registry Forensics Advanced Digital Forensic Analysis of the Windows Registry.ent://SD_ILS/0/SD_ILS:1456592024-12-27T04:09:56Z2024-12-27T04:09:56ZYazar Carvey, Harlan.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495806">http://www.sciencedirect.com/science/book/9781597495806</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Ninja hacking unconventional penetration testing tactics and techniquesent://SD_ILS/0/SD_ILS:1462632024-12-27T04:09:56Z2024-12-27T04:09:56ZYazar Wilhelm, Thomas. Andress, Jason.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495882">http://www.sciencedirect.com/science/book/9781597495882</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Eleventh hour CISSP study guideent://SD_ILS/0/SD_ILS:1465972024-12-27T04:09:56Z2024-12-27T04:09:56ZYazar Conrad, Eric, 1967- Misenar, Seth. Feldman, Joshua.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495660">http://www.sciencedirect.com/science/book/9781597495660</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Cyber warfare techniques, tactics and tools for security practitionersent://SD_ILS/0/SD_ILS:1474792024-12-27T04:09:56Z2024-12-27T04:09:56ZYazar Andress, Jason. Winterfeld, Steve. Rogers, Russ.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597496377">http://www.sciencedirect.com/science/book/9781597496377</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Securing the cloud cloud computer security techniques and tacticsent://SD_ILS/0/SD_ILS:1489802024-12-27T04:09:56Z2024-12-27T04:09:56ZYazar Winkler, J. R. (Joachim R.)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495929">http://www.sciencedirect.com/science/book/9781597495929</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Maritime security and the law of the seaent://SD_ILS/0/SD_ILS:2310062024-12-27T04:09:56Z2024-12-27T04:09:56ZYazar Klein, Natalie (Natalie S.)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim Oxford scholarship online <a href="http://dx.doi.org/10.1093/acprof:oso/9780199566532.001.0001">http://dx.doi.org/10.1093/acprof:oso/9780199566532.001.0001</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Engineering information security the application of systems engineering concepts to achieve information assuranceent://SD_ILS/0/SD_ILS:2499162024-12-27T04:09:56Z2024-12-27T04:09:56ZYazar Jacobs, Stuart.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim IEEE Xplore <a href="http://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=6047604">http://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=6047604</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>