Search Results for Computer Security - Narrowed by: Engineering. SirsiDynix Enterprise https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dComputer$002bSecurity$0026qf$003dSUBJECT$002509Subject$002509Engineering.$002509Engineering.$0026ps$003d300$0026isd$003dtrue? 2024-11-19T00:50:52Z Computational Intelligence, Cyber Security and Computational Models. Models and Techniques for Intelligent Systems and Automation Third International Conference, ICC3 2017, Coimbatore, India, December 14-16, 2017, Proceedings ent://SD_ILS/0/SD_ILS:399121 2024-11-19T00:50:52Z 2024-11-19T00:50:52Z Author&#160;Ganapathi, Geetha. editor.&#160;Subramaniam, Arumugam. editor.&#160;Gra&ntilde;a, Manuel. editor.&#160;Balusamy, Suresh. editor.&#160;Natarajan, Rajamanickam. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-13-0716-4">https://doi.org/10.1007/978-981-13-0716-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Human Factors in Cybersecurity Proceedings of the AHFE 2017 International Conference on Human Factors in Cybersecurity, July 17&minus;21, 2017, The Westin Bonaventure Hotel, Los Angeles, California, USA ent://SD_ILS/0/SD_ILS:399039 2024-11-19T00:50:52Z 2024-11-19T00:50:52Z Author&#160;Nicholson, Denise. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-60585-2">https://doi.org/10.1007/978-3-319-60585-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Recent Trends in Computer Applications Best Studies from the 2017 International Conference on Computer and Applications, Dubai, UAE ent://SD_ILS/0/SD_ILS:399536 2024-11-19T00:50:52Z 2024-11-19T00:50:52Z Author&#160;Alja&rsquo;am, Jihad Mohamad. editor.&#160;El Saddik, Abdulmotaleb. editor.&#160;Sadka, Abdul Hamid. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-89914-5">https://doi.org/10.1007/978-3-319-89914-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> IT Convergence and Security 2017 Volume 1 ent://SD_ILS/0/SD_ILS:400069 2024-11-19T00:50:52Z 2024-11-19T00:50:52Z Author&#160;Kim, Kuinam J. editor.&#160;Kim, Hyuncheol. editor.&#160;Baek, Nakhoon. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-10-6451-7">https://doi.org/10.1007/978-981-10-6451-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advanced Computing and Systems for Security Volume Six ent://SD_ILS/0/SD_ILS:400080 2024-11-19T00:50:52Z 2024-11-19T00:50:52Z Author&#160;Chaki, Rituparna. editor.&#160;Cortesi, Agostino. editor.&#160;Saeed, Khalid. editor.&#160;Chaki, Nabendu. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-10-8183-5">https://doi.org/10.1007/978-981-10-8183-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advanced Computing and Systems for Security Volume Five ent://SD_ILS/0/SD_ILS:401086 2024-11-19T00:50:52Z 2024-11-19T00:50:52Z Author&#160;Chaki, Rituparna. editor.&#160;Cortesi, Agostino. editor.&#160;Saeed, Khalid. editor.&#160;Chaki, Nabendu. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-10-8180-4">https://doi.org/10.1007/978-981-10-8180-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> IT Convergence and Security 2017 Volume 2 ent://SD_ILS/0/SD_ILS:402118 2024-11-19T00:50:52Z 2024-11-19T00:50:52Z Author&#160;Kim, Kuinam J. editor.&#160;Kim, Hyuncheol. editor.&#160;Baek, Nakhoon. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-10-6454-8">https://doi.org/10.1007/978-981-10-6454-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Women in Security Changing the Face of Technology and Innovation ent://SD_ILS/0/SD_ILS:402274 2024-11-19T00:50:52Z 2024-11-19T00:50:52Z Author&#160;Christofferson, Debra A. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-57795-1">https://doi.org/10.1007/978-3-319-57795-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Sustainable Interdependent Networks From Theory to Application ent://SD_ILS/0/SD_ILS:402493 2024-11-19T00:50:52Z 2024-11-19T00:50:52Z Author&#160;Amini, M. Hadi. editor.&#160;Boroojeni, Kianoosh G. editor.&#160;Iyengar, S.S. editor.&#160;Pardalos, Panos M. editor.&#160;Blaabjerg, Frede. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-74412-4">https://doi.org/10.1007/978-3-319-74412-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/>