Arama Sonuçları Security Measures. - Daraltılmış: 2009SirsiDynix Enterprisehttps://katalog.hacettepe.edu.tr/client/tr_TR/default_tr/default_tr/qu$003dSecurity$002bMeasures.$0026qf$003dPUBDATE$002509Yay$0025C4$0025B1n$002bY$0025C4$0025B1l$0025C4$0025B1$0025092009$0025092009$0026ic$003dtrue$0026ps$003d300?2024-11-13T03:50:17ZHow to develop and implement a security master planent://SD_ILS/0/SD_ILS:2878762024-11-13T03:50:17Z2024-11-13T03:50:17ZYazar Giles, Timothy.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://marc.crcnetbase.com/isbn/9781420086263">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>CISO soft skills securing organizations impaired by employee politics, apathy, and intolerant perspectivesent://SD_ILS/0/SD_ILS:2887442024-11-13T03:50:17Z2024-11-13T03:50:17ZYazar Collette, Ronald D. Gentile, Michael. Gentile, Skye.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://marc.crcnetbase.com/isbn/9781420089110">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Data protection governance, risk management, and complianceent://SD_ILS/0/SD_ILS:2897002024-11-13T03:50:17Z2024-11-13T03:50:17ZYazar Hill, David G. (David Gary), 1943-<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://marc.crcnetbase.com/isbn/9781439806937">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Building vulnerability assessments industrial hygiene and engineering conceptsent://SD_ILS/0/SD_ILS:2897132024-11-13T03:50:17Z2024-11-13T03:50:17ZYazar Boss, Martha J. Day, Dennis W.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://marc.crcnetbase.com/isbn/9781420078350">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Information security management metrics a definitive guide to effective security monitoring and measurementent://SD_ILS/0/SD_ILS:2913732024-11-13T03:50:17Z2024-11-13T03:50:17ZYazar Brotby, W. Krag.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://marc.crcnetbase.com/isbn/9781420052862">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>SIP securityent://SD_ILS/0/SD_ILS:2977912024-11-13T03:50:17Z2024-11-13T03:50:17ZYazar Sisalem, Dorgham. Wiley InterScience (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://onlinelibrary.wiley.com/book/10.1002/9780470516997">http://onlinelibrary.wiley.com/book/10.1002/9780470516997</a>
John Wiley <a href="http://dx.doi.org/10.1002/9780470516997">http://dx.doi.org/10.1002/9780470516997</a>
<a href="http://site.ebrary.com/lib/alltitles/Doc?id=10298102">http://site.ebrary.com/lib/alltitles/Doc?id=10298102</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Wireless and mobile network security security basics, security in On-the-shelf and emergeing technologiesent://SD_ILS/0/SD_ILS:2979922024-11-13T03:50:17Z2024-11-13T03:50:17ZYazar Chaouchi, Hakima. Laurent-Maknavicius, Maryline. Wiley InterScience (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim John Wiley <a href="http://dx.doi.org/10.1002/9780470611883">http://dx.doi.org/10.1002/9780470611883</a>
<a href="http://site.ebrary.com/lib/alltitles/Doc?id=10361067">http://site.ebrary.com/lib/alltitles/Doc?id=10361067</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Security in RFID and sensor networksent://SD_ILS/0/SD_ILS:2877972024-11-13T03:50:17Z2024-11-13T03:50:17ZYazar Kitsos, Paris. Zhang, Yan, 1977-<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://marc.crcnetbase.com/isbn/9781420068405">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Security manager's guide to disasters managing through emergencies, violence, and other workplace threatsent://SD_ILS/0/SD_ILS:2888222024-11-13T03:50:17Z2024-11-13T03:50:17ZYazar Manley, Anthony D., 1932-<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://marc.crcnetbase.com/isbn/9781439809075">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Homeland security and private sector business corporations' role in critical infrastructure protectionent://SD_ILS/0/SD_ILS:2905662024-11-13T03:50:17Z2024-11-13T03:50:17ZYazar Lee, Elsa.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://marc.crcnetbase.com/isbn/9781420070798">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Mobile communication systems and securityent://SD_ILS/0/SD_ILS:2498072024-11-13T03:50:17Z2024-11-13T03:50:17ZYazar Rhee, Man Young.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim IEEE Xplore <a href="http://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=5628362">http://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=5628362</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Security in an IPv6 environmentent://SD_ILS/0/SD_ILS:2915042024-11-13T03:50:17Z2024-11-13T03:50:17ZYazar Minoli, Daniel, 1952- Kouns, Jake.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://marc.crcnetbase.com/isbn/9781420092301">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Information security governance a practical development and implementation approachent://SD_ILS/0/SD_ILS:2977432024-11-13T03:50:17Z2024-11-13T03:50:17ZYazar Brotby, W. Krag.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim Ebook Library <a href="http://public.eblib.com/EBLPublic/PublicView.do?ptiID=433807">http://public.eblib.com/EBLPublic/PublicView.do?ptiID=433807</a>
John Wiley <a href="http://dx.doi.org/10.1002/9780470476017">http://dx.doi.org/10.1002/9780470476017</a>
<a href="http://site.ebrary.com/lib/alltitles/Doc?id=10313652">http://site.ebrary.com/lib/alltitles/Doc?id=10313652</a>
<a href="http://swb.eblib.com/patron/FullRecord.aspx?p=433807">http://swb.eblib.com/patron/FullRecord.aspx?p=433807</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Security risk management body of knowledgeent://SD_ILS/0/SD_ILS:2977592024-11-13T03:50:17Z2024-11-13T03:50:17ZYazar Talbot, Julian. Jakeman, Miles Gareth. Wiley InterScience (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim John Wiley <a href="http://dx.doi.org/10.1002/9780470494974">http://dx.doi.org/10.1002/9780470494974</a>
Books24x7 <a href="http://www.books24x7.com/marc.asp?bookid=43285">http://www.books24x7.com/marc.asp?bookid=43285</a>
MyiLibrary, Table of contents <a href="http://www.myilibrary.com?id=230340&ref=toc">http://www.myilibrary.com?id=230340&ref=toc</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Information warfareent://SD_ILS/0/SD_ILS:3040692024-11-13T03:50:17Z2024-11-13T03:50:17ZYazar Ventre, Daniel.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim John Wiley <a href="http://dx.doi.org/10.1002/9781118381533">http://dx.doi.org/10.1002/9781118381533</a>
<a href="http://lib.myilibrary.com?id=477736">http://lib.myilibrary.com?id=477736</a>
OverDrive (PDF) <a href="http://www.contentreserve.com/TitleInfo.asp?ID={02D73229-3728-4EE5-942B-28D4B82AED18}&Format=50">http://www.contentreserve.com/TitleInfo.asp?ID={02D73229-3728-4EE5-942B-28D4B82AED18}&Format=50</a>
OverDrive (EPUB) <a href="http://www.contentreserve.com/TitleInfo.asp?ID={02D73229-3728-4EE5-942B-28D4B82AED18}&Format=410">http://www.contentreserve.com/TitleInfo.asp?ID={02D73229-3728-4EE5-942B-28D4B82AED18}&Format=410</a>
OverDrive (READ) <a href="http://www.contentreserve.com/TitleInfo.asp?ID={02D73229-3728-4EE5-942B-28D4B82AED18}&Format=610">http://www.contentreserve.com/TitleInfo.asp?ID={02D73229-3728-4EE5-942B-28D4B82AED18}&Format=610</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>International aviation and terrorism evolving threat, evolving securityent://SD_ILS/0/SD_ILS:2668682024-11-13T03:50:17Z2024-11-13T03:50:17ZYazar Harrison, John, 1970-<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://www.tandfebooks.com/isbn/9780203878712">Click here to view</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Remote sensing of global croplands for food securityent://SD_ILS/0/SD_ILS:2685732024-11-13T03:50:17Z2024-11-13T03:50:17ZYazar Thenkabail, Prasad Srinivasa, 1958-<br/>Yer Numarası S494.5.R4 R454 2009<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>Remote sensing of global croplands for food securityent://SD_ILS/0/SD_ILS:2869902024-11-13T03:50:17Z2024-11-13T03:50:17ZYazar Thenkabail, Prasad Srinivasa, 1958-<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://marc.crcnetbase.com/isbn/9781420090109">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Next generation SSH2 implementation securing data in motionent://SD_ILS/0/SD_ILS:1462752024-11-13T03:50:17Z2024-11-13T03:50:17ZYazar Liu, Dale.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492836">http://www.sciencedirect.com/science/book/9781597492836</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Cloud security and privacyent://SD_ILS/0/SD_ILS:1447222024-11-13T03:50:17Z2024-11-13T03:50:17ZYazar Mather, Tim. Kumaraswamy, Subra. Latif, Shahed.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim EBSCOhost <a href="http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=414816">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=414816</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Mobile malware attacks and defenseent://SD_ILS/0/SD_ILS:1464132024-11-13T03:50:17Z2024-11-13T03:50:17ZYazar Dunham, Ken.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492980">http://www.sciencedirect.com/science/book/9781597492980</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Disappearing cryptography information hiding : steganography & watermarkingent://SD_ILS/0/SD_ILS:1464502024-11-13T03:50:17Z2024-11-13T03:50:17ZYazar Wayner, Peter, 1964-<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780123744791">http://www.sciencedirect.com/science/book/9780123744791</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Eleventh hour security+ exam SYO-201 study guideent://SD_ILS/0/SD_ILS:1465342024-11-13T03:50:17Z2024-11-13T03:50:17ZYazar Dubrawsky, Ido.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597494274">http://www.sciencedirect.com/science/book/9781597494274</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>GFI network security and PCI compliance power toolsent://SD_ILS/0/SD_ILS:1481432024-11-13T03:50:17Z2024-11-13T03:50:17ZYazar Posey, Brien. Thompson, Troy.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492850">http://www.sciencedirect.com/science/book/9781597492850</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>SAP security configuration and deployment the IT administrator's guide to best practicesent://SD_ILS/0/SD_ILS:1489942024-11-13T03:50:17Z2024-11-13T03:50:17ZYazar Wun-Young, Leslie. Hirao, Joey.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492843">http://www.sciencedirect.com/science/book/9781597492843</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Virtualization for security including sandboxing, disaster recovery, high availability, forensic analysis, and honeypottingent://SD_ILS/0/SD_ILS:1467752024-11-13T03:50:17Z2024-11-13T03:50:17ZYazar Hoopes, John.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597493055">http://www.sciencedirect.com/science/book/9781597493055</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Cisco router and switch forensics investigating and analyzing malicious network activityent://SD_ILS/0/SD_ILS:1487032024-11-13T03:50:17Z2024-11-13T03:50:17ZYazar Liu, Dale.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597494182">http://www.sciencedirect.com/science/book/9781597494182</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Computer and information security handbookent://SD_ILS/0/SD_ILS:1488842024-11-13T03:50:17Z2024-11-13T03:50:17ZYazar Vacca, John R.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780123743541">http://www.sciencedirect.com/science/book/9780123743541</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Safe and secure schools 27 strategies for prevention and interventionent://SD_ILS/0/SD_ILS:3692742024-11-13T03:50:17Z2024-11-13T03:50:17ZYazar Brunner, Judy M. Lewis, Dennis K.<br/>Yer Numarası ONLINE(369274.1)<br/>Elektronik Erişim SAGE knowledge <a href="http://sk.sagepub.com/books/safe-and-secure-schools">http://sk.sagepub.com/books/safe-and-secure-schools</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>