Search Results for Application software -- Development - Narrowed by: Data protection.
SirsiDynix Enterprise
https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dApplication$002bsoftware$002b$002b--$002bDevelopment$0026qf$003dSUBJECT$002509Subject$002509Data$002bprotection.$002509Data$002bprotection.$0026ps$003d300?dt=list
2026-03-24T18:48:10Z
Analysis and Design of Next-Generation Software Architectures Generative AI, Cybersecurity, and Cloud Computing
ent://SD_ILS/0/SD_ILS:608484
2026-03-24T18:48:10Z
2026-03-24T18:48:10Z
Author Langer, Arthur M. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-031-76212-3">https://doi.org/10.1007/978-3-031-76212-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Large Language Models in Cybersecurity Threats, Exposure and Mitigation
ent://SD_ILS/0/SD_ILS:603753
2026-03-24T18:48:10Z
2026-03-24T18:48:10Z
Author Kucharavy, Andrei. editor. Plancherel, Octave. editor. Mulder, Valentin. editor. Mermoud, Alain. editor. Lenders, Vincent. editor.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-031-54827-7">https://doi.org/10.1007/978-3-031-54827-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Software security : concepts & practices
ent://SD_ILS/0/SD_ILS:570473
2026-03-24T18:48:10Z
2026-03-24T18:48:10Z
Author Khan, Suhel Ahmad, author. Kumar, Rajeev, author. Khan, R. A. (Raees Ahmad), author.<br/>Preferred Shelf Number QA76.76 .D47<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003330516">https://www.taylorfrancis.com/books/9781003330516</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cyber Security Intelligence and Analytics The 5th International Conference on Cyber Security Intelligence and Analytics (CSIA 2023), Volume 2
ent://SD_ILS/0/SD_ILS:526849
2026-03-24T18:48:10Z
2026-03-24T18:48:10Z
Author Xu, Zheng. editor. Alrabaee, Saed. editor. Loyola-González, Octavio. editor. Cahyani, Niken Dwi Wahyu. editor. Ab Rahman, Nurul Hidayah. editor.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-031-31775-0">https://doi.org/10.1007/978-3-031-31775-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Guide to Security in SDN and NFV Challenges, Opportunities, and Applications
ent://SD_ILS/0/SD_ILS:613138
2026-03-24T18:48:10Z
2026-03-24T18:48:10Z
Author Zhu, Shao Ying. editor. Scott-Hayward, Sandra. editor. Jacquin, Ludovic. editor. Hill, Richard. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-64653-4">https://doi.org/10.1007/978-3-319-64653-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>