Search Results for Computer Security - Narrowed by: System safety. SirsiDynix Enterprise https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dComputer$002bSecurity$0026qf$003dSUBJECT$002509Subject$002509System$002bsafety.$002509System$002bsafety.$0026ps$003d300? 2024-11-18T22:31:22Z The Art of War for Computer Security ent://SD_ILS/0/SD_ILS:483808 2024-11-18T22:31:22Z 2024-11-18T22:31:22Z Author&#160;Madsen, Tom. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-28569-2">https://doi.org/10.1007/978-3-030-28569-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> The NICE Cyber Security Framework Cyber Security Intelligence and Analytics ent://SD_ILS/0/SD_ILS:484062 2024-11-18T22:31:22Z 2024-11-18T22:31:22Z Author&#160;Alsmadi, Izzat. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-02360-7">https://doi.org/10.1007/978-3-030-02360-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Blockchain and Clinical Trial Securing Patient Data ent://SD_ILS/0/SD_ILS:486375 2024-11-18T22:31:22Z 2024-11-18T22:31:22Z Author&#160;Jahankhani, Hamid. editor.&#160;Kendzierskyj, Stefan. editor.&#160;Jamal, Arshad. editor.&#160;Epiphaniou, Gregory. editor.&#160;Al-Khateeb, Haider. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-11289-9">https://doi.org/10.1007/978-3-030-11289-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cybersecurity and Secure Information Systems Challenges and Solutions in Smart Environments ent://SD_ILS/0/SD_ILS:486909 2024-11-18T22:31:22Z 2024-11-18T22:31:22Z Author&#160;Hassanien, Aboul Ella. editor.&#160;Elhoseny, Mohamed. editor. (orcid)0000-0001-6347-8368&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-16837-7">https://doi.org/10.1007/978-3-030-16837-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Biometric-Based Physical and Cybersecurity Systems ent://SD_ILS/0/SD_ILS:484246 2024-11-18T22:31:22Z 2024-11-18T22:31:22Z Author&#160;Obaidat, Mohammad S. editor.&#160;Traore, Issa. editor. (orcid)0000-0003-2987-8047&#160;Woungang, Isaac. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-98734-7">https://doi.org/10.1007/978-3-319-98734-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Critical Infrastructure Security and Resilience Theories, Methods, Tools and Technologies ent://SD_ILS/0/SD_ILS:484275 2024-11-18T22:31:22Z 2024-11-18T22:31:22Z Author&#160;Gritzalis, Dimitris. editor.&#160;Theocharidou, Marianthi. editor. (orcid)0000-0002-8870-1746&#160;Stergiopoulos, George. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-00024-0">https://doi.org/10.1007/978-3-030-00024-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Speech Enhancement Techniques for Digital Hearing Aids ent://SD_ILS/0/SD_ILS:482802 2024-11-18T22:31:22Z 2024-11-18T22:31:22Z Author&#160;Borisagar, Komal R. author.&#160;Thanki, Rohit M. author. (orcid)0000-0002-0645-6266&#160;Sedani, Bhavin S. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-96821-6">https://doi.org/10.1007/978-3-319-96821-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/>