Search Results for - Narrowed by: E-Book - Online Library - Electronic Library - Data protection. - Engineering. SirsiDynix Enterprise https://katalog.hacettepe.edu.tr/client/en_US/default/default/qf$003dITYPE$002509Material$002bType$0025091$00253AE-KITAP$002509E-Book$0026qf$003dLIBRARY$002509Library$0025091$00253AONLINE$002509Online$002bLibrary$0026qf$003dLOCATION$002509Shelf$002bLocation$0025091$00253AELEKKUTUPH$002509Electronic$002bLibrary$0026qf$003dSUBJECT$002509Subject$002509Data$002bprotection.$002509Data$002bprotection.$0026qf$003dSUBJECT$002509Subject$002509Engineering.$002509Engineering.$0026ps$003d300$0026isd$003dtrue? 2024-08-28T07:56:17Z Engineering Applications of Neural Networks 19th International Conference, EANN 2018, Bristol, UK, September 3-5, 2018, Proceedings ent://SD_ILS/0/SD_ILS:399759 2024-08-28T07:56:17Z 2024-08-28T07:56:17Z Author&#160;Pimenidis, Elias. editor. (orcid)0000-0003-3593-8640&#160;Jayne, Chrisina. editor. (orcid)0000-0001-7292-2109&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-98204-5">https://doi.org/10.1007/978-3-319-98204-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security with Intelligent Computing and Big-data Services ent://SD_ILS/0/SD_ILS:400872 2024-08-28T07:56:17Z 2024-08-28T07:56:17Z Author&#160;Peng, Sheng-Lung. editor.&#160;Wang, Shiuh-Jeng. editor.&#160;Balas, Valentina Emilia. editor.&#160;Zhao, Ming. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-76451-1">https://doi.org/10.1007/978-3-319-76451-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Sicherheitsgerichtete Echtzeitsysteme ent://SD_ILS/0/SD_ILS:337256 2024-08-28T07:56:17Z 2024-08-28T07:56:17Z Author&#160;Halang, Wolfgang A. author.&#160;Konakovsky, Rudolf M. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(337256.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-37298-8">http://dx.doi.org/10.1007/978-3-642-37298-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> PBX Security and Forensics A Practical Approach ent://SD_ILS/0/SD_ILS:331279 2024-08-28T07:56:17Z 2024-08-28T07:56:17Z Author&#160;Androulidakis, Iosif I. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(331279.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-1-4614-1656-2">http://dx.doi.org/10.1007/978-1-4614-1656-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Physical Unclonable Functions in Theory and Practice ent://SD_ILS/0/SD_ILS:331657 2024-08-28T07:56:17Z 2024-08-28T07:56:17Z Author&#160;B&ouml;hm, Christoph. author.&#160;Hofer, Maximilian. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(331657.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-1-4614-5040-5">http://dx.doi.org/10.1007/978-1-4614-5040-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advanced DPA Theory and Practice Towards the Security Limits of Secure Embedded Circuits ent://SD_ILS/0/SD_ILS:332116 2024-08-28T07:56:17Z 2024-08-28T07:56:17Z Author&#160;Peeters, Eric. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(332116.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-1-4614-6783-0">http://dx.doi.org/10.1007/978-1-4614-6783-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Wireless Networks and Security Issues, Challenges and Research Trends ent://SD_ILS/0/SD_ILS:334140 2024-08-28T07:56:17Z 2024-08-28T07:56:17Z Author&#160;Khan, Shafiullah. editor.&#160;Khan Pathan, Al-Sakib. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(334140.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-36169-2">http://dx.doi.org/10.1007/978-3-642-36169-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Mobile Phone Security and Forensics A Practical Approach ent://SD_ILS/0/SD_ILS:173990 2024-08-28T07:56:17Z 2024-08-28T07:56:17Z Author&#160;Androulidakis, Iosif I. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-1-4614-1650-0">http://dx.doi.org/10.1007/978-1-4614-1650-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Technology Convergence, Secure and Trust Computing, and Data Management ITCS 2012 &amp; STA 2012 ent://SD_ILS/0/SD_ILS:206735 2024-08-28T07:56:17Z 2024-08-28T07:56:17Z Author&#160;Park, Jong Hyuk (James). editor.&#160;Kim, Jongsung. editor.&#160;Zou, Deqing. editor.&#160;Lee, Yang Sun. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-94-007-5083-8">http://dx.doi.org/10.1007/978-94-007-5083-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Proceedings of the International Conference on IT Convergence and Security 2011 ent://SD_ILS/0/SD_ILS:206494 2024-08-28T07:56:17Z 2024-08-28T07:56:17Z Author&#160;Kim, Kuinam J. editor.&#160;Ahn, Seong Jin. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-94-007-2911-7">http://dx.doi.org/10.1007/978-94-007-2911-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Kryptographie und IT-Sicherheit Grundlagen und Anwendungen ent://SD_ILS/0/SD_ILS:198973 2024-08-28T07:56:17Z 2024-08-28T07:56:17Z Author&#160;Spitz, Stephan. author.&#160;Pramateftakis, Michael. author.&#160;Swoboda, Joachim. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-8348-8120-5">http://dx.doi.org/10.1007/978-3-8348-8120-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> IT-Sicherheit mit System Integratives IT-Sicherheits-, Kontinuit&auml;ts- und Risikomanagement - Sicherheitspyramide - Standards und Practices - SOA und Softwareentwicklung ent://SD_ILS/0/SD_ILS:199017 2024-08-28T07:56:17Z 2024-08-28T07:56:17Z Author&#160;M&uuml;ller, Klaus-Rainer. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-8348-8178-6">http://dx.doi.org/10.1007/978-3-8348-8178-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> ISSE 2010 Securing Electronic Business Processes Highlights of the Information Security Solutions Europe 2010 Conference ent://SD_ILS/0/SD_ILS:199891 2024-08-28T07:56:17Z 2024-08-28T07:56:17Z Author&#160;Pohlmann, Norbert. editor.&#160;Reimer, Helmut. editor.&#160;Schneider, Wolfgang. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-8348-9788-6">http://dx.doi.org/10.1007/978-3-8348-9788-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security Risk Management Risikomanagement mit ISO/IEC 27001, 27005 und 31010 ent://SD_ILS/0/SD_ILS:199932 2024-08-28T07:56:17Z 2024-08-28T07:56:17Z Author&#160;Klipper, Sebastian. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-8348-9870-8">http://dx.doi.org/10.1007/978-3-8348-9870-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Trustworthy Internet ent://SD_ILS/0/SD_ILS:204521 2024-08-28T07:56:17Z 2024-08-28T07:56:17Z Author&#160;Salgarelli, Luca. editor.&#160;Bianchi, Giuseppe. editor.&#160;Blefari-Melazzi, Nicola. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-88-470-1818-1">http://dx.doi.org/10.1007/978-88-470-1818-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security Trends for FPGAS From Secured to Secure Reconfigurable Systems ent://SD_ILS/0/SD_ILS:206038 2024-08-28T07:56:17Z 2024-08-28T07:56:17Z Author&#160;Badrignans, Benoit. editor.&#160;Danger, Jean Luc. editor.&#160;Fischer, Viktor. editor.&#160;Gogniat, Guy. editor.&#160;Torres, Lionel. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-94-007-1338-3">http://dx.doi.org/10.1007/978-94-007-1338-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Machine Learning and Systems Engineering ent://SD_ILS/0/SD_ILS:205490 2024-08-28T07:56:17Z 2024-08-28T07:56:17Z Author&#160;Ao, Sio-Iong. editor.&#160;Rieger, Burghard. editor.&#160;Amouzegar, Mahyar A. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-90-481-9419-3">http://dx.doi.org/10.1007/978-90-481-9419-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security in Embedded Devices ent://SD_ILS/0/SD_ILS:172275 2024-08-28T07:56:17Z 2024-08-28T07:56:17Z Author&#160;Gebotys, Catherine H. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-1-4419-1530-6">http://dx.doi.org/10.1007/978-1-4419-1530-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Handbook of Information and Communication Security ent://SD_ILS/0/SD_ILS:190841 2024-08-28T07:56:17Z 2024-08-28T07:56:17Z Author&#160;Stavroulakis, Peter. editor.&#160;Stamp, Mark. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-04117-4">http://dx.doi.org/10.1007/978-3-642-04117-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Rollen und Berechtigungskonzepte Ans&auml;tze f&uuml;r das Identity- und Access Management im Unternehmen ent://SD_ILS/0/SD_ILS:199849 2024-08-28T07:56:17Z 2024-08-28T07:56:17Z Author&#160;Tsolkas, Alexander. author.&#160;Schmidt, Klaus. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-8348-9745-9">http://dx.doi.org/10.1007/978-3-8348-9745-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Les virus informatiques: th&eacute;orie, pratique et applications ent://SD_ILS/0/SD_ILS:176476 2024-08-28T07:56:17Z 2024-08-28T07:56:17Z Author&#160;Filiol, &Eacute;ric. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-2-287-98240-8">http://dx.doi.org/10.1007/978-2-287-98240-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Kryptographie und IT-Sicherheit Grundlagen und Anwendungen ent://SD_ILS/0/SD_ILS:199590 2024-08-28T07:56:17Z 2024-08-28T07:56:17Z Author&#160;Swoboda, Joachim. author.&#160;Spitz, Stephan. author.&#160;Pramateftakis, Michael. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-8348-9473-1">http://dx.doi.org/10.1007/978-3-8348-9473-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/>