Arama Sonu&ccedil;lar&#305; Security systems. - Daralt&#305;lm&#305;&#351;: 2010 SirsiDynix Enterprise https://katalog.hacettepe.edu.tr/client/tr_TR/default_tr/default_tr/qu$003dSecurity$002bsystems.$0026qf$003dPUBDATE$002509Yay$0025C4$0025B1n$002bY$0025C4$0025B1l$0025C4$0025B1$0025092010$0025092010$0026ps$003d300? 2024-11-13T07:26:01Z Water productivity in rainfed agriculture redrawing the rainbow of water to achieve food security in rainfed smallholder systems ent://SD_ILS/0/SD_ILS:290055 2024-11-13T07:26:01Z 2024-11-13T07:26:01Z Yazar&#160;Makurira, Hodson.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://marc.crcnetbase.com/isbn/9780203093429">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Information Security Theory and Practices. Security and Privacy of Pervasive Systems and Smart Devices 4th IFIP WG 11.2 International Workshop, WISTP 2010, Passau, Germany, April 12-14, 2010. Proceedings ent://SD_ILS/0/SD_ILS:191973 2024-11-13T07:26:01Z 2024-11-13T07:26:01Z Yazar&#160;Samarati, Pierangela. editor.&#160;Tunstall, Michael. editor.&#160;Posegga, Joachim. editor.&#160;Markantonakis, Konstantinos. editor.&#160;Sauveron, Damien. editor.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-3-642-12368-9">http://dx.doi.org/10.1007/978-3-642-12368-9</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Stabilization, Safety, and Security of Distributed Systems 12th International Symposium, SSS 2010, New York, NY, USA, September 20-22, 2010. Proceedings ent://SD_ILS/0/SD_ILS:193160 2024-11-13T07:26:01Z 2024-11-13T07:26:01Z Yazar&#160;Dolev, Shlomi. editor.&#160;Cobb, Jorge. editor.&#160;Fischer, Michael. editor.&#160;Yung, Moti. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-3-642-16023-3">http://dx.doi.org/10.1007/978-3-642-16023-3</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Computational Intelligence in Security for Information Systems 2010 Proceedings of the 3rd International Conference on Computational Intelligence in Security for Information Systems (CISIS&rsquo;10) ent://SD_ILS/0/SD_ILS:193359 2024-11-13T07:26:01Z 2024-11-13T07:26:01Z Yazar&#160;Herrero, &Aacute;lvaro. editor.&#160;Corchado, Emilio. editor.&#160;Redondo, Carlos. editor.&#160;Alonso, &Aacute;ngel. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-3-642-16626-6">http://dx.doi.org/10.1007/978-3-642-16626-6</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Security in Emerging Wireless Communication and Networking Systems First International ICST Workshop, SEWCN 2009, Athens, Greece, September 14, 2009, Revised Selected Papers ent://SD_ILS/0/SD_ILS:191712 2024-11-13T07:26:01Z 2024-11-13T07:26:01Z Yazar&#160;Gu, Qijun. editor.&#160;Zang, Wanyu. editor.&#160;Yu, Meng. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-3-642-11526-4">http://dx.doi.org/10.1007/978-3-642-11526-4</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Security and Privacy in Mobile Information and Communication Systems Second International ICST Conference, MobiSec 2010, Catania, Sicily, Italy, May 27-28, 2010, Revised Selected Papers ent://SD_ILS/0/SD_ILS:193620 2024-11-13T07:26:01Z 2024-11-13T07:26:01Z Yazar&#160;Schmidt, Andreas U. editor.&#160;Russello, Giovanni. editor.&#160;Lioy, Antonio. editor.&#160;Prasad, Neeli R. editor.&#160;Lian, Shiguo. editor.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-3-642-17502-2">http://dx.doi.org/10.1007/978-3-642-17502-2</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Risk analysis and security countermeasure selection ent://SD_ILS/0/SD_ILS:288785 2024-11-13T07:26:01Z 2024-11-13T07:26:01Z Yazar&#160;Norman, Thomas L.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://marc.crcnetbase.com/isbn/9781420078718">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Science and technology of terrorism and counterterrorism ent://SD_ILS/0/SD_ILS:286279 2024-11-13T07:26:01Z 2024-11-13T07:26:01Z Yazar&#160;Ghosh, Tushar K., Dr.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://marc.crcnetbase.com/isbn/9781439875612">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Security of mobile communications ent://SD_ILS/0/SD_ILS:286605 2024-11-13T07:26:01Z 2024-11-13T07:26:01Z Yazar&#160;Boudriga, Noureddine.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://marc.crcnetbase.com/isbn/9780849379420">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Food security and soil quality ent://SD_ILS/0/SD_ILS:286944 2024-11-13T07:26:01Z 2024-11-13T07:26:01Z Yazar&#160;Lal, R.&#160;Stewart, B. A. (Bobby Alton), 1932-<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://marc.crcnetbase.com/isbn/9781439800584">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Virtualization and forensics a digital forensic investigator's guide to virtual environments ent://SD_ILS/0/SD_ILS:306330 2024-11-13T07:26:01Z 2024-11-13T07:26:01Z Yazar&#160;Barrett, Diane.&#160;Kipper, Gregory.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495578">http://www.sciencedirect.com/science/book/9781597495578</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Security, risk and the biometric state governing borders and bodies ent://SD_ILS/0/SD_ILS:266690 2024-11-13T07:26:01Z 2024-11-13T07:26:01Z Yazar&#160;M&uuml;ller, Benjamin.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://www.tandfebooks.com/isbn/9780203858042">Click here to view</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> The handbook of technology management ent://SD_ILS/0/SD_ILS:134517 2024-11-13T07:26:01Z 2024-11-13T07:26:01Z Yazar&#160;Bidgoli, Hossein.<br/>Yer Numaras&#305;&#160;HD45 .H294 2010 V.1<br/>Format:&#160;Kitap<br/>Durum&#160;Beytepe K&uuml;t&uuml;phanesi~3<br/> Managed code rootkits hooking into runtime environments ent://SD_ILS/0/SD_ILS:147836 2024-11-13T07:26:01Z 2024-11-13T07:26:01Z Yazar&#160;Metula, Erez.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495745">http://www.sciencedirect.com/science/book/9781597495745</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> A guide to kernel exploitation attacking the core ent://SD_ILS/0/SD_ILS:148059 2024-11-13T07:26:01Z 2024-11-13T07:26:01Z Yazar&#160;Perla, Enrico.&#160;Massimiliano, Oldani.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597494861">http://www.sciencedirect.com/science/book/9781597494861</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Seven deadliest wireless technologies attacks ent://SD_ILS/0/SD_ILS:149033 2024-11-13T07:26:01Z 2024-11-13T07:26:01Z Yazar&#160;Haines, Brad.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495417">http://www.sciencedirect.com/science/book/9781597495417</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Metrics and methods for security risk management ent://SD_ILS/0/SD_ILS:146306 2024-11-13T07:26:01Z 2024-11-13T07:26:01Z Yazar&#160;Young, Carl S.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781856179782">http://www.sciencedirect.com/science/book/9781856179782</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Virtualization and forensics a digital forensic investigator's guide to virtual environments ent://SD_ILS/0/SD_ILS:146715 2024-11-13T07:26:01Z 2024-11-13T07:26:01Z Yazar&#160;Barrett, Diane.&#160;Kipper, Gregory.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495578">http://www.sciencedirect.com/science/book/9781597495578</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/>