Search Results for - Narrowed by: E-Book - Online Library - Electronic Library - 2014 - Computer security. - Computers. SirsiDynix Enterprise https://katalog.hacettepe.edu.tr/client/en_US/default/default/qf$003dITYPE$002509Material$002bType$0025091$00253AE-KITAP$002509E-Book$0026qf$003dLIBRARY$002509Library$0025091$00253AONLINE$002509Online$002bLibrary$0026qf$003dLOCATION$002509Shelf$002bLocation$0025091$00253AELEKKUTUPH$002509Electronic$002bLibrary$0026qf$003dPUBDATE$002509Publication$002bDate$0025092014$0025092014$0026qf$003dSUBJECT$002509Subject$002509Computer$002bsecurity.$002509Computer$002bsecurity.$0026qf$003dSUBJECT$002509Subject$002509Computers.$002509Computers.$0026ic$003dtrue$0026te$003dILS$0026rt$003dfalse$00257C$00257C$00257CISBN$00257C$00257C$00257CISBN$0026ps$003d300$0026isd$003dtrue? 2024-08-20T17:27:15Z Electronic Identity ent://SD_ILS/0/SD_ILS:484375 2024-08-20T17:27:15Z 2024-08-20T17:27:15Z Author&#160;de Andrade, Norberto Nuno Gomes. author.&#160;Chen-Wilson, Lisha. author.&#160;Argles, David. author.&#160;Wills, Gary. author.&#160;Schiano di Zenise, Michele. author.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-1-4471-6449-4">https://doi.org/10.1007/978-1-4471-6449-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Large-Scale Data Analytics ent://SD_ILS/0/SD_ILS:488092 2024-08-20T17:27:15Z 2024-08-20T17:27:15Z Author&#160;Gkoulalas-Divanis, Aris. editor.&#160;Labbi, Abderrahim. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-1-4614-9242-9">https://doi.org/10.1007/978-1-4614-9242-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Code Breaking in the Pacific ent://SD_ILS/0/SD_ILS:488233 2024-08-20T17:27:15Z 2024-08-20T17:27:15Z Author&#160;Donovan, Peter. author.&#160;Mack, John. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-08278-3">https://doi.org/10.1007/978-3-319-08278-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cyberterrorism Understanding, Assessment, and Response ent://SD_ILS/0/SD_ILS:488243 2024-08-20T17:27:15Z 2024-08-20T17:27:15Z Author&#160;Chen, Thomas M. editor.&#160;Jarvis, Lee. editor.&#160;Macdonald, Stuart. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-1-4939-0962-9">https://doi.org/10.1007/978-1-4939-0962-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Digital Forensics and Cyber Crime Fifth International Conference, ICDF2C 2013, Moscow, Russia, September 26-27, 2013, Revised Selected Papers ent://SD_ILS/0/SD_ILS:488522 2024-08-20T17:27:15Z 2024-08-20T17:27:15Z Author&#160;Gladyshev, Pavel. editor.&#160;Marrington, Andrew. editor.&#160;Baggili, Ibrahim. editor. (orcid)0000-0002-9574-9537&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-14289-0">https://doi.org/10.1007/978-3-319-14289-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Trust Management VIII 8th IFIP WG 11.11 International Conference, IFIPTM 2014, Singapore, July 7-10, 2014, Proceedings ent://SD_ILS/0/SD_ILS:488530 2024-08-20T17:27:15Z 2024-08-20T17:27:15Z Author&#160;Zhou, Jianying. editor.&#160;Gal-Oz, Nurit. editor.&#160;Zhang, Jie. editor.&#160;Gudes, Ehud. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-662-43813-8">https://doi.org/10.1007/978-3-662-43813-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Applied Cryptography and Network Security 12th International Conference, ACNS 2014, Lausanne, Switzerland, June 10-13, 2014. Proceedings ent://SD_ILS/0/SD_ILS:488916 2024-08-20T17:27:15Z 2024-08-20T17:27:15Z Author&#160;Boureanu, Ioana. editor.&#160;Owesarski, Philippe. editor.&#160;Vaudenay, Serge. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-07536-5">https://doi.org/10.1007/978-3-319-07536-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Human Aspects of Information Security, Privacy, and Trust Second International Conference, HAS 2014, Held as Part of HCI International 2014, Heraklion, Crete, Greece, June 22-27, 2014, Proceedings ent://SD_ILS/0/SD_ILS:488930 2024-08-20T17:27:15Z 2024-08-20T17:27:15Z Author&#160;Tryfonas, Theo. editor.&#160;Askoxylakis, Ioannis. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-07620-1">https://doi.org/10.1007/978-3-319-07620-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Theory of Cryptography 11th International Conference, TCC 2014, San Diego, CA, USA, February 24-26, 2014, Proceedings ent://SD_ILS/0/SD_ILS:488975 2024-08-20T17:27:15Z 2024-08-20T17:27:15Z Author&#160;Lindell, Yehuda. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-642-54242-8">https://doi.org/10.1007/978-3-642-54242-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cybersecurity in Switzerland ent://SD_ILS/0/SD_ILS:489573 2024-08-20T17:27:15Z 2024-08-20T17:27:15Z Author&#160;Dunn Cavelty, Myriam. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-10620-5">https://doi.org/10.1007/978-3-319-10620-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Cryptology -- ASIACRYPT 2014 20th International Conference on the Theory and Application of Cryptology and Information Security, Kaoshiung, Taiwan, China, December 7-11, 2014, Part II ent://SD_ILS/0/SD_ILS:488956 2024-08-20T17:27:15Z 2024-08-20T17:27:15Z Author&#160;Sarkar, Palash. editor.&#160;Iwata, Tetsu. editor. (orcid)0000-0002-4729-0979&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-662-45608-8">https://doi.org/10.1007/978-3-662-45608-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Network Hardening An Automated Approach to Improving Network Security ent://SD_ILS/0/SD_ILS:486885 2024-08-20T17:27:15Z 2024-08-20T17:27:15Z Author&#160;Wang, Lingyu. author.&#160;Albanese, Massimiliano. author.&#160;Jajodia, Sushil. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-04612-9">https://doi.org/10.1007/978-3-319-04612-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Pairing-Based Cryptography -- Pairing 2013 6th International Conference, Beijing, China, November 22-24, 2013, Revised Selected Papers ent://SD_ILS/0/SD_ILS:486893 2024-08-20T17:27:15Z 2024-08-20T17:27:15Z Author&#160;Cao, Zhenfu. editor.&#160;Zhang, Fangguo. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-04873-4">https://doi.org/10.1007/978-3-319-04873-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Privacy vs. Security ent://SD_ILS/0/SD_ILS:487072 2024-08-20T17:27:15Z 2024-08-20T17:27:15Z Author&#160;Stalla-Bourdillon, Sophie. author.&#160;Phillips, Joshua. author.&#160;Ryan, Mark D. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-1-4471-6530-9">https://doi.org/10.1007/978-1-4471-6530-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Pervasive Wireless Environments: Detecting and Localizing User Spoofing ent://SD_ILS/0/SD_ILS:488438 2024-08-20T17:27:15Z 2024-08-20T17:27:15Z Author&#160;Yang, Jie. author.&#160;Chen, Yingying. author.&#160;Trappe, Wade. author.&#160;Cheng, Jerry. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-07356-9">https://doi.org/10.1007/978-3-319-07356-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Foundations of Security Analysis and Design VII FOSAD 2012 / 2013 Tutorial Lectures ent://SD_ILS/0/SD_ILS:488996 2024-08-20T17:27:15Z 2024-08-20T17:27:15Z Author&#160;Aldini, Alessandro. editor.&#160;Lopez, Javier. editor.&#160;Martinelli, Fabio. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-10082-1">https://doi.org/10.1007/978-3-319-10082-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Cryptology -- ASIACRYPT 2014 20th International Conference on the Theory and Application of Cryptology and Information Security, Kaoshiung, Taiwan, China, December 7-11, 2014, Proceedings, Part I ent://SD_ILS/0/SD_ILS:489016 2024-08-20T17:27:15Z 2024-08-20T17:27:15Z Author&#160;Sarkar, Palash. editor.&#160;Iwata, Tetsu. editor. (orcid)0000-0002-4729-0979&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-662-45611-8">https://doi.org/10.1007/978-3-662-45611-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Transactions on Large-Scale Data- and Knowledge-Centered Systems XVI Selected Papers from ACOMP 2013 ent://SD_ILS/0/SD_ILS:485061 2024-08-20T17:27:15Z 2024-08-20T17:27:15Z Author&#160;Hameurlain, Abdelkader. editor.&#160;K&uuml;ng, Josef. editor.&#160;Wagner, Roland. editor.&#160;Dang, Tran Khanh. editor. (orcid)0000-0002-7282-3589&#160;Thoai, Nam. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-662-45947-8">https://doi.org/10.1007/978-3-662-45947-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Progress in Cryptology &ndash; AFRICACRYPT 2014 7th International Conference on Cryptology in Africa, Marrakesh, Morocco, May 28-30, 2014. Proceedings ent://SD_ILS/0/SD_ILS:485545 2024-08-20T17:27:15Z 2024-08-20T17:27:15Z Author&#160;Pointcheval, David. editor.&#160;Vergnaud, Damien. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-06734-6">https://doi.org/10.1007/978-3-319-06734-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Trust and Trustworthy Computing 7th International Conference, TRUST 2014, Heraklion, Crete, Greece, June 30 -- July 2, 2014, Proceedings ent://SD_ILS/0/SD_ILS:485594 2024-08-20T17:27:15Z 2024-08-20T17:27:15Z Author&#160;Holz, Thorsten. editor. (orcid)0000-0002-2783-1264&#160;Ioannidis, Sotiris. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-08593-7">https://doi.org/10.1007/978-3-319-08593-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/>