Search Results for Computer security -- Case studies. - Narrowed by: Data protection.
SirsiDynix Enterprise
https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dComputer$002bsecurity$002b--$002bCase$002bstudies.$0026qf$003dSUBJECT$002509Subject$002509Data$002bprotection.$002509Data$002bprotection.$0026ps$003d300?dt=list
2026-04-06T04:00:22Z
Go Where the Bugs Are Essays Dedicated to Wolfgang Reif on the Occasion of His 65th Birthday
ent://SD_ILS/0/SD_ILS:601811
2026-04-06T04:00:22Z
2026-04-06T04:00:22Z
Author Ernst, Gidon. editor. (orcid)0000-0002-3289-5764 Güdemann, Matthias. editor. (orcid)0000-0002-1002-6023 Knapp, Alexander. editor. (orcid)0000-0002-4050-3249 Nafz, Florian. editor. (orcid)0000-0001-5725-4827 Ortmeier, Frank. editor. (orcid)0000-0001-6186-4142<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-031-92196-4">https://doi.org/10.1007/978-3-031-92196-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Digital Fingerprinting
ent://SD_ILS/0/SD_ILS:614393
2026-04-06T04:00:22Z
2026-04-06T04:00:22Z
Author Wang, Cliff. editor. Gerdes, Ryan M. editor. Guan, Yong. editor. Kasera, Sneha Kumar. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-1-4939-6601-1">https://doi.org/10.1007/978-1-4939-6601-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Understanding Social Engineering Based Scams
ent://SD_ILS/0/SD_ILS:613967
2026-04-06T04:00:22Z
2026-04-06T04:00:22Z
Author Jakobsson, Markus. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-1-4939-6457-4">https://doi.org/10.1007/978-1-4939-6457-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>