Arama Sonuçları Security Systems. - Daraltılmış: 2006SirsiDynix Enterprisehttps://katalog.hacettepe.edu.tr/client/tr_TR/default_tr/default_tr/qu$003dSecurity$002bSystems.$0026qf$003dPUBDATE$002509Yay$0025C4$0025B1n$002bY$0025C4$0025B1l$0025C4$0025B1$0025092006$0025092006$0026ps$003d300$0026isd$003dtrue?2024-11-15T16:33:33ZManaging Information Systems Security and Privacyent://SD_ILS/0/SD_ILS:1816542024-11-15T16:33:33Z2024-11-15T16:33:33ZYazar Trček, Denis. author. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/3-540-28104-5">http://dx.doi.org/10.1007/3-540-28104-5</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Security of Water Supply Systems: from Source to Tapent://SD_ILS/0/SD_ILS:1692152024-11-15T16:33:33Z2024-11-15T16:33:33ZYazar Pollert, Jaroslav. editor. Dedus, Bozidar. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/1-4020-4564-6">http://dx.doi.org/10.1007/1-4020-4564-6</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Security Management, Integrity, and Internal Control in Information Systems IFIP TC-11 WG 11.1 & WG 11.5 Joint Working Conferenceent://SD_ILS/0/SD_ILS:1657962024-11-15T16:33:33Z2024-11-15T16:33:33ZYazar Dowland, Paul. editor. Furnell, Steve. editor. Thuraisingham, Bhavani. editor. Wang, X. Sean. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/0-387-31167-X">http://dx.doi.org/10.1007/0-387-31167-X</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Access Control Systems Security, Identity Management and Trust Modelsent://SD_ILS/0/SD_ILS:1654332024-11-15T16:33:33Z2024-11-15T16:33:33ZYazar Benantar, Messaoud. author. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/0-387-27716-1">http://dx.doi.org/10.1007/0-387-27716-1</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Optical Imaging Sensors and Systems for Homeland Security Applicationsent://SD_ILS/0/SD_ILS:1654562024-11-15T16:33:33Z2024-11-15T16:33:33ZYazar Javidi, Bahram. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/b137387">http://dx.doi.org/10.1007/b137387</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Stabilization, Safety, and Security of Distributed Systems 8th International Symposium, SSS 2006, Dallas, TX, USA, November 17-19, 2006. Proceedingsent://SD_ILS/0/SD_ILS:1852652024-11-15T16:33:33Z2024-11-15T16:33:33ZYazar Datta, Ajoy K. editor. Gradinariu, Maria. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-540-49823-0">http://dx.doi.org/10.1007/978-3-540-49823-0</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Information Systems Security Second International Conference, ICISS 2006, Kolkata, India, December 19-21, 2006. Proceedingsent://SD_ILS/0/SD_ILS:1856662024-11-15T16:33:33Z2024-11-15T16:33:33ZYazar Bagchi, Aditya. editor. Atluri, Vijayalakshmi. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/11961635">http://dx.doi.org/10.1007/11961635</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Biometrics, Computer Security Systems and Artificial Intelligence Applicationsent://SD_ILS/0/SD_ILS:1661542024-11-15T16:33:33Z2024-11-15T16:33:33ZYazar Saeed, Khalid. editor. Pejaś, Jerzy. editor. Mosdorf, Romuald. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-0-387-36503-9">http://dx.doi.org/10.1007/978-0-387-36503-9</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Essential computer security everyone's guide to e-mail, Internet, and wireless securityent://SD_ILS/0/SD_ILS:1458402024-11-15T16:33:33Z2024-11-15T16:33:33ZYazar Bradley, Tony, 1969- Carvey, Harlan A.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491143">http://www.sciencedirect.com/science/book/9781597491143</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Multimedia security technologies for digital rights managementent://SD_ILS/0/SD_ILS:2545542024-11-15T16:33:33Z2024-11-15T16:33:33ZYazar Zeng, Wenjun, 1967- Yu, Hong Heather, 1967- Lin, Ching-Yung.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780123694768">http://www.sciencedirect.com/science/book/9780123694768</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Multimedia watermarking techniques and applicationsent://SD_ILS/0/SD_ILS:2885062024-11-15T16:33:33Z2024-11-15T16:33:33ZYazar Furht, Borivoje. Kirovski, Darko.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://marc.crcnetbase.com/isbn/9781420013467">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Wireless security handbookent://SD_ILS/0/SD_ILS:2847852024-11-15T16:33:33Z2024-11-15T16:33:33ZYazar Earle, Aaron E.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://marc.crcnetbase.com/isbn/9781420031188">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Information security a strategic approachent://SD_ILS/0/SD_ILS:2498312024-11-15T16:33:33Z2024-11-15T16:33:33ZYazar LeVeque, Vincent.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim IEEE Xplore <a href="http://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=5989138">http://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=5989138</a>
IEEE Xplore <a href="http://ieeexplore.ieee.org/servlet/opac?bknumber=5989138">http://ieeexplore.ieee.org/servlet/opac?bknumber=5989138</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Multimedia encryption and authentication techniques and applicationsent://SD_ILS/0/SD_ILS:2884962024-11-15T16:33:33Z2024-11-15T16:33:33ZYazar Furht, Borivoje. Kirovski, Darko.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://marc.crcnetbase.com/isbn/9781420013450">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>