Search Results for Application software -- Development - Narrowed by: Data protection. SirsiDynix Enterprise https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dApplication$002bsoftware$002b$002b--$002bDevelopment$0026qf$003dSUBJECT$002509Subject$002509Data$002bprotection.$002509Data$002bprotection.$0026ps$003d300?dt=list 2026-03-24T18:48:10Z Analysis and Design of Next-Generation Software Architectures Generative AI, Cybersecurity, and Cloud Computing ent://SD_ILS/0/SD_ILS:608484 2026-03-24T18:48:10Z 2026-03-24T18:48:10Z Author&#160;Langer, Arthur M. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-76212-3">https://doi.org/10.1007/978-3-031-76212-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Large Language Models in Cybersecurity Threats, Exposure and Mitigation ent://SD_ILS/0/SD_ILS:603753 2026-03-24T18:48:10Z 2026-03-24T18:48:10Z Author&#160;Kucharavy, Andrei. editor.&#160;Plancherel, Octave. editor.&#160;Mulder, Valentin. editor.&#160;Mermoud, Alain. editor.&#160;Lenders, Vincent. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-54827-7">https://doi.org/10.1007/978-3-031-54827-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Software security : concepts &amp; practices ent://SD_ILS/0/SD_ILS:570473 2026-03-24T18:48:10Z 2026-03-24T18:48:10Z Author&#160;Khan, Suhel Ahmad, author.&#160;Kumar, Rajeev, author.&#160;Khan, R. A. (Raees Ahmad), author.<br/>Preferred Shelf Number&#160;QA76.76 .D47<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003330516">https://www.taylorfrancis.com/books/9781003330516</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cyber Security Intelligence and Analytics The 5th International Conference on Cyber Security Intelligence and Analytics (CSIA 2023), Volume 2 ent://SD_ILS/0/SD_ILS:526849 2026-03-24T18:48:10Z 2026-03-24T18:48:10Z Author&#160;Xu, Zheng. editor.&#160;Alrabaee, Saed. editor.&#160;Loyola-Gonz&aacute;lez, Octavio. editor.&#160;Cahyani, Niken Dwi Wahyu. editor.&#160;Ab Rahman, Nurul Hidayah. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-31775-0">https://doi.org/10.1007/978-3-031-31775-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Guide to Security in SDN and NFV Challenges, Opportunities, and Applications ent://SD_ILS/0/SD_ILS:613138 2026-03-24T18:48:10Z 2026-03-24T18:48:10Z Author&#160;Zhu, Shao Ying. editor.&#160;Scott-Hayward, Sandra. editor.&#160;Jacquin, Ludovic. editor.&#160;Hill, Richard. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-64653-4">https://doi.org/10.1007/978-3-319-64653-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/>