Search Results for Core. - Narrowed by: Security systems. SirsiDynix Enterprise https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dCore.$0026qf$003dSUBJECT$002509Subject$002509Security$002bsystems.$002509Security$002bsystems.$0026ic$003dtrue$0026ps$003d300?dt=list 2026-03-18T12:31:02Z Cyberspace, Cyberterrorism and the International Security in the Fourth Industrial Revolution Threats, Assessment and Responses ent://SD_ILS/0/SD_ILS:602378 2026-03-18T12:31:02Z 2026-03-18T12:31:02Z Author&#160;Montasari, Reza. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-50454-9">https://doi.org/10.1007/978-3-031-50454-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Secure Edge and Fog Computing Enabled AI for IoT and Smart Cities Includes selected Papers from International Conference on Advanced Computing &amp; Next-Generation Communication (ICACNGC 2022) ent://SD_ILS/0/SD_ILS:602934 2026-03-18T12:31:02Z 2026-03-18T12:31:02Z Author&#160;Abd El-Latif, Ahmed A. editor.&#160;Tawalbeh, Lo'ai. editor.&#160;Maleh, Yassine. editor. (orcid)0000-0003-4704-5364&#160;Gupta, Brij B. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-51097-7">https://doi.org/10.1007/978-3-031-51097-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Critical Infrastructure Protection in the Light of the Armed Conflicts ent://SD_ILS/0/SD_ILS:602887 2026-03-18T12:31:02Z 2026-03-18T12:31:02Z Author&#160;Kov&aacute;cs, T&uuml;nde Anna. editor. (orcid)0000-0002-5867-5882&#160;Nyikes, Zolt&aacute;n. editor.&#160;Berek, Tam&aacute;s. editor.&#160;Daruka, Norbert. editor. (orcid)0000-0002-7102-1787&#160;T&oacute;th, L&aacute;szl&oacute;. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-47990-8">https://doi.org/10.1007/978-3-031-47990-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Nuclear Power Plant Emergencies in the USA Managing Risks, Demographics and Response ent://SD_ILS/0/SD_ILS:615579 2026-03-18T12:31:02Z 2026-03-18T12:31:02Z Author&#160;Kyne, Dean. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-50343-1">https://doi.org/10.1007/978-3-319-50343-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security Practices Emerging Threats and Perspectives ent://SD_ILS/0/SD_ILS:616353 2026-03-18T12:31:02Z 2026-03-18T12:31:02Z Author&#160;Traor&eacute;, Issa. editor.&#160;Awad, Ahmed. editor.&#160;Woungang, Isaac. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-48947-6">https://doi.org/10.1007/978-3-319-48947-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> SCION: A Secure Internet Architecture ent://SD_ILS/0/SD_ILS:613238 2026-03-18T12:31:02Z 2026-03-18T12:31:02Z Author&#160;Perrig, Adrian. author.&#160;Szalachowski, Pawel. author.&#160;Reischuk, Raphael M. author.&#160;Chuat, Laurent. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-67080-5">https://doi.org/10.1007/978-3-319-67080-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Urban Resilience A Transformative Approach ent://SD_ILS/0/SD_ILS:614498 2026-03-18T12:31:02Z 2026-03-18T12:31:02Z Author&#160;Yamagata, Yoshiki. editor.&#160;Maruyama, Hiroshi. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-39812-9">https://doi.org/10.1007/978-3-319-39812-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cryptography Made Simple ent://SD_ILS/0/SD_ILS:617695 2026-03-18T12:31:02Z 2026-03-18T12:31:02Z Author&#160;Smart, Nigel. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-21936-3">https://doi.org/10.1007/978-3-319-21936-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Reliability and Safety Engineering ent://SD_ILS/0/SD_ILS:611385 2026-03-18T12:31:02Z 2026-03-18T12:31:02Z Author&#160;Verma, Ajit Kumar. author.&#160;Ajit, Srividya. author.&#160;Karanki, Durga Rao. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-1-4471-6269-8">https://doi.org/10.1007/978-1-4471-6269-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Ten Laws for Security ent://SD_ILS/0/SD_ILS:617805 2026-03-18T12:31:02Z 2026-03-18T12:31:02Z Author&#160;Diehl, Eric. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-42641-9">https://doi.org/10.1007/978-3-319-42641-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/>