Arama Sonuçları Security systems. - Daraltılmış: 2005SirsiDynix Enterprisehttps://katalog.hacettepe.edu.tr/client/tr_TR/default_tr/default_tr/qu$003dSecurity$002bsystems.$0026qf$003dPUBDATE$002509Yay$0025C4$0025B1n$002bY$0025C4$0025B1l$0025C4$0025B1$0025092005$0025092005$0026ps$003d300?2024-11-13T06:55:17ZInformation Processing and Security Systemsent://SD_ILS/0/SD_ILS:1652662024-11-13T06:55:17Z2024-11-13T06:55:17ZYazar Saeed, Khalid. editor. Pejaś, Jerzy. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/b137371">http://dx.doi.org/10.1007/b137371</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Assessing and managing security risk in IT systems a structured methodologyent://SD_ILS/0/SD_ILS:2854882024-11-13T06:55:17Z2024-11-13T06:55:17ZYazar McCumber, John, 1956-<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://marc.crcnetbase.com/isbn/9780203490426">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Systems and human science, for safety, security, and dependability seleced papers of the 1st International Symposium SSR2003, Osaka, Japan, November 2003ent://SD_ILS/0/SD_ILS:2546032024-11-13T06:55:17Z2024-11-13T06:55:17ZYazar International Symposium on Systems and Human Science (1st : 2003 : Osaka University) Arai, Tatsuo. Yamamoto, Shigeru, 1964- Makino, Kazuhisa. Ōsaka Daigaku.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780444518132">http://www.sciencedirect.com/science/book/9780444518132</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Monitoring, Security, and Rescue Techniques in Multiagent Systemsent://SD_ILS/0/SD_ILS:1833132024-11-13T06:55:17Z2024-11-13T06:55:17ZYazar Dunin-Kęplicz, Barbara. author. Jankowski, Andrzej. author. Skowron, Andrzej. author. Szczuka, Marcin. author. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/3-540-32370-8">http://dx.doi.org/10.1007/3-540-32370-8</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Enhanced Methods in Computer Security, Biometric and Artificial Intelligence Systemsent://SD_ILS/0/SD_ILS:1649312024-11-13T06:55:17Z2024-11-13T06:55:17ZYazar Pejaś, Jerzy. editor. Piegat, Andrzej. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/b101135">http://dx.doi.org/10.1007/b101135</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Enhanced methods in computer security, biometric and artificial intelligence systemsent://SD_ILS/0/SD_ILS:1098642024-11-13T06:55:17Z2024-11-13T06:55:17ZYazar Pejas, Jerzy, 1954-, ed. Piegat, Andrzej, 1947-, ed.<br/>Yer Numarası QA76.9.A25 E545 2005<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>Information Systems Security First International Conference, ICISS 2005, Kolkata, India, December 19-21, 2005. Proceedingsent://SD_ILS/0/SD_ILS:1833642024-11-13T06:55:17Z2024-11-13T06:55:17ZYazar Jajodia, Sushil. editor. Mazumdar, Chandan. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/11593980">http://dx.doi.org/10.1007/11593980</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Cryptography, information theory, and error-correction a handbook for the 21st centuryent://SD_ILS/0/SD_ILS:3018602024-11-13T06:55:17Z2024-11-13T06:55:17ZYazar Bruen, Aiden A., 1941- Forcinito, Mario, 1962- Wiley InterScience (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim Wiley InterScience <a href="http://dx.doi.org/10.1002/9781118033296">An electronic book accessible through the World Wide Web; click for information</a>
Contributor biographical information <a href="http://catdir.loc.gov/catdir/enhancements/fy0618/2004058044-b.html">http://catdir.loc.gov/catdir/enhancements/fy0618/2004058044-b.html</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Multimedia security handbookent://SD_ILS/0/SD_ILS:2867602024-11-13T06:55:17Z2024-11-13T06:55:17ZYazar Furht, Borivoje. Kirovski, Darko.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://marc.crcnetbase.com/isbn/9781420038262">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Bulletproof wireless security GSM, UMTS, 802.11 and ad hoc securityent://SD_ILS/0/SD_ILS:2547222024-11-13T06:55:17Z2024-11-13T06:55:17ZYazar Chandra, Praphul.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780750677462">http://www.sciencedirect.com/science/book/9780750677462</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Özel güvenlik tedbirlerient://SD_ILS/0/SD_ILS:1144302024-11-13T06:55:17Z2024-11-13T06:55:17ZYazar Ünsal, Faruk İpekoğlu, Murat.<br/>Yer Numarası HV8291.T9 U573 2005<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>