Search Results for Computer Security - Narrowed by: E-Book - English - 2014 - Computers.
SirsiDynix Enterprise
https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dComputer$002bSecurity$0026qf$003dITYPE$002509Material$002bType$0025091$00253AE-KITAP$002509E-Book$0026qf$003dLANGUAGE$002509Language$002509ENG$002509English$0026qf$003dPUBDATE$002509Publication$002bDate$0025092014$0025092014$0026qf$003dSUBJECT$002509Subject$002509Computers.$002509Computers.$0026ic$003dtrue$0026te$003dILS$0026ps$003d300?
2024-09-09T23:37:49Z
Progress in Cryptology – AFRICACRYPT 2014 7th International Conference on Cryptology in Africa, Marrakesh, Morocco, May 28-30, 2014. Proceedings
ent://SD_ILS/0/SD_ILS:485545
2024-09-09T23:37:49Z
2024-09-09T23:37:49Z
Author Pointcheval, David. editor. Vergnaud, Damien. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-06734-6">https://doi.org/10.1007/978-3-319-06734-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Privacy vs. Security
ent://SD_ILS/0/SD_ILS:487072
2024-09-09T23:37:49Z
2024-09-09T23:37:49Z
Author Stalla-Bourdillon, Sophie. author. Phillips, Joshua. author. Ryan, Mark D. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-1-4471-6530-9">https://doi.org/10.1007/978-1-4471-6530-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cyberterrorism Understanding, Assessment, and Response
ent://SD_ILS/0/SD_ILS:488243
2024-09-09T23:37:49Z
2024-09-09T23:37:49Z
Author Chen, Thomas M. editor. Jarvis, Lee. editor. Macdonald, Stuart. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-1-4939-0962-9">https://doi.org/10.1007/978-1-4939-0962-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Advances in Cryptology -- ASIACRYPT 2014 20th International Conference on the Theory and Application of Cryptology and Information Security, Kaoshiung, Taiwan, China, December 7-11, 2014, Part II
ent://SD_ILS/0/SD_ILS:488956
2024-09-09T23:37:49Z
2024-09-09T23:37:49Z
Author Sarkar, Palash. editor. Iwata, Tetsu. editor. (orcid)0000-0002-4729-0979 SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-662-45608-8">https://doi.org/10.1007/978-3-662-45608-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cybersecurity in Switzerland
ent://SD_ILS/0/SD_ILS:489573
2024-09-09T23:37:49Z
2024-09-09T23:37:49Z
Author Dunn Cavelty, Myriam. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-10620-5">https://doi.org/10.1007/978-3-319-10620-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Electronic Identity
ent://SD_ILS/0/SD_ILS:484375
2024-09-09T23:37:49Z
2024-09-09T23:37:49Z
Author de Andrade, Norberto Nuno Gomes. author. Chen-Wilson, Lisha. author. Argles, David. author. Wills, Gary. author. Schiano di Zenise, Michele. author.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-1-4471-6449-4">https://doi.org/10.1007/978-1-4471-6449-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Trust and Trustworthy Computing 7th International Conference, TRUST 2014, Heraklion, Crete, Greece, June 30 -- July 2, 2014, Proceedings
ent://SD_ILS/0/SD_ILS:485594
2024-09-09T23:37:49Z
2024-09-09T23:37:49Z
Author Holz, Thorsten. editor. (orcid)0000-0002-2783-1264 Ioannidis, Sotiris. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-08593-7">https://doi.org/10.1007/978-3-319-08593-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Large-Scale Data Analytics
ent://SD_ILS/0/SD_ILS:488092
2024-09-09T23:37:49Z
2024-09-09T23:37:49Z
Author Gkoulalas-Divanis, Aris. editor. Labbi, Abderrahim. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-1-4614-9242-9">https://doi.org/10.1007/978-1-4614-9242-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Code Breaking in the Pacific
ent://SD_ILS/0/SD_ILS:488233
2024-09-09T23:37:49Z
2024-09-09T23:37:49Z
Author Donovan, Peter. author. Mack, John. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-08278-3">https://doi.org/10.1007/978-3-319-08278-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Pervasive Wireless Environments: Detecting and Localizing User Spoofing
ent://SD_ILS/0/SD_ILS:488438
2024-09-09T23:37:49Z
2024-09-09T23:37:49Z
Author Yang, Jie. author. Chen, Yingying. author. Trappe, Wade. author. Cheng, Jerry. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-07356-9">https://doi.org/10.1007/978-3-319-07356-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Transactions on Large-Scale Data- and Knowledge-Centered Systems XVI Selected Papers from ACOMP 2013
ent://SD_ILS/0/SD_ILS:485061
2024-09-09T23:37:49Z
2024-09-09T23:37:49Z
Author Hameurlain, Abdelkader. editor. Küng, Josef. editor. Wagner, Roland. editor. Dang, Tran Khanh. editor. (orcid)0000-0002-7282-3589 Thoai, Nam. editor.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-662-45947-8">https://doi.org/10.1007/978-3-662-45947-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Network Hardening An Automated Approach to Improving Network Security
ent://SD_ILS/0/SD_ILS:486885
2024-09-09T23:37:49Z
2024-09-09T23:37:49Z
Author Wang, Lingyu. author. Albanese, Massimiliano. author. Jajodia, Sushil. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-04612-9">https://doi.org/10.1007/978-3-319-04612-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Pairing-Based Cryptography -- Pairing 2013 6th International Conference, Beijing, China, November 22-24, 2013, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:486893
2024-09-09T23:37:49Z
2024-09-09T23:37:49Z
Author Cao, Zhenfu. editor. Zhang, Fangguo. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-04873-4">https://doi.org/10.1007/978-3-319-04873-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Digital Forensics and Cyber Crime Fifth International Conference, ICDF2C 2013, Moscow, Russia, September 26-27, 2013, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:488522
2024-09-09T23:37:49Z
2024-09-09T23:37:49Z
Author Gladyshev, Pavel. editor. Marrington, Andrew. editor. Baggili, Ibrahim. editor. (orcid)0000-0002-9574-9537 SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-14289-0">https://doi.org/10.1007/978-3-319-14289-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Trust Management VIII 8th IFIP WG 11.11 International Conference, IFIPTM 2014, Singapore, July 7-10, 2014, Proceedings
ent://SD_ILS/0/SD_ILS:488530
2024-09-09T23:37:49Z
2024-09-09T23:37:49Z
Author Zhou, Jianying. editor. Gal-Oz, Nurit. editor. Zhang, Jie. editor. Gudes, Ehud. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-662-43813-8">https://doi.org/10.1007/978-3-662-43813-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Applied Cryptography and Network Security 12th International Conference, ACNS 2014, Lausanne, Switzerland, June 10-13, 2014. Proceedings
ent://SD_ILS/0/SD_ILS:488916
2024-09-09T23:37:49Z
2024-09-09T23:37:49Z
Author Boureanu, Ioana. editor. Owesarski, Philippe. editor. Vaudenay, Serge. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-07536-5">https://doi.org/10.1007/978-3-319-07536-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Human Aspects of Information Security, Privacy, and Trust Second International Conference, HAS 2014, Held as Part of HCI International 2014, Heraklion, Crete, Greece, June 22-27, 2014, Proceedings
ent://SD_ILS/0/SD_ILS:488930
2024-09-09T23:37:49Z
2024-09-09T23:37:49Z
Author Tryfonas, Theo. editor. Askoxylakis, Ioannis. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-07620-1">https://doi.org/10.1007/978-3-319-07620-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Foundations of Security Analysis and Design VII FOSAD 2012 / 2013 Tutorial Lectures
ent://SD_ILS/0/SD_ILS:488996
2024-09-09T23:37:49Z
2024-09-09T23:37:49Z
Author Aldini, Alessandro. editor. Lopez, Javier. editor. Martinelli, Fabio. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-10082-1">https://doi.org/10.1007/978-3-319-10082-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Advances in Cryptology -- ASIACRYPT 2014 20th International Conference on the Theory and Application of Cryptology and Information Security, Kaoshiung, Taiwan, China, December 7-11, 2014, Proceedings, Part I
ent://SD_ILS/0/SD_ILS:489016
2024-09-09T23:37:49Z
2024-09-09T23:37:49Z
Author Sarkar, Palash. editor. Iwata, Tetsu. editor. (orcid)0000-0002-4729-0979 SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-662-45611-8">https://doi.org/10.1007/978-3-662-45611-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Theory of Cryptography 11th International Conference, TCC 2014, San Diego, CA, USA, February 24-26, 2014, Proceedings
ent://SD_ILS/0/SD_ILS:488975
2024-09-09T23:37:49Z
2024-09-09T23:37:49Z
Author Lindell, Yehuda. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-642-54242-8">https://doi.org/10.1007/978-3-642-54242-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>