Search Results for Data protection. - Narrowed by: Online Library - Data structures (Computer science). - Information systems.
SirsiDynix Enterprise
https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dData$002bprotection.$0026qf$003dLIBRARY$002509Library$0025091$00253AONLINE$002509Online$002bLibrary$0026qf$003dSUBJECT$002509Subject$002509Data$002bstructures$002b$002528Computer$002bscience$002529.$002509Data$002bstructures$002b$002528Computer$002bscience$002529.$0026qf$003dSUBJECT$002509Subject$002509Information$002bsystems.$002509Information$002bsystems.$0026ps$003d300?
2024-09-02T06:27:36Z
Automatic Malware Analysis An Emulator Based Approach
ent://SD_ILS/0/SD_ILS:331796
2024-09-02T06:27:36Z
2024-09-02T06:27:36Z
Author Yin, Heng. author. Song, Dawn. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(331796.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-1-4614-5523-3">http://dx.doi.org/10.1007/978-1-4614-5523-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Android Malware
ent://SD_ILS/0/SD_ILS:332276
2024-09-02T06:27:36Z
2024-09-02T06:27:36Z
Author Jiang, Xuxian. author. Zhou, Yajin. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(332276.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-1-4614-7394-7">http://dx.doi.org/10.1007/978-1-4614-7394-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
A Survey of Data Leakage Detection and Prevention Solutions
ent://SD_ILS/0/SD_ILS:174080
2024-09-02T06:27:36Z
2024-09-02T06:27:36Z
Author Shabtai, Asaf. author. Elovici, Yuval. author. Rokach, Lior. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-1-4614-2053-8">http://dx.doi.org/10.1007/978-1-4614-2053-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Data Security and Security Data 27th British National Conference on Databases, BNCOD 27, Dundee, UK, June 29 - July 1, 2010. Revised Selected Papers
ent://SD_ILS/0/SD_ILS:196019
2024-09-02T06:27:36Z
2024-09-02T06:27:36Z
Author MacKinnon, Lachlan M. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-25704-9">http://dx.doi.org/10.1007/978-3-642-25704-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Understanding High-Dimensional Spaces
ent://SD_ILS/0/SD_ILS:197368
2024-09-02T06:27:36Z
2024-09-02T06:27:36Z
Author Skillicorn, David B. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-33398-9">http://dx.doi.org/10.1007/978-3-642-33398-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Spyware and Adware
ent://SD_ILS/0/SD_ILS:167516
2024-09-02T06:27:36Z
2024-09-02T06:27:36Z
Author Aycock, John. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-0-387-77741-2">http://dx.doi.org/10.1007/978-0-387-77741-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cyber Situational Awareness Issues and Research
ent://SD_ILS/0/SD_ILS:171874
2024-09-02T06:27:36Z
2024-09-02T06:27:36Z
Author Jajodia, Sushil. editor. Liu, Peng. editor. Swarup, Vipin. editor. Wang, Cliff. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-1-4419-0140-8">http://dx.doi.org/10.1007/978-1-4419-0140-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Insider Threats in Cyber Security
ent://SD_ILS/0/SD_ILS:172782
2024-09-02T06:27:36Z
2024-09-02T06:27:36Z
Author Probst, Christian W. editor. Hunker, Jeffrey. editor. Gollmann, Dieter. editor. Bishop, Matt. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-1-4419-7133-3">http://dx.doi.org/10.1007/978-1-4419-7133-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Transactions on Computational Science IV Special Issue on Security in Computing
ent://SD_ILS/0/SD_ILS:189853
2024-09-02T06:27:36Z
2024-09-02T06:27:36Z
Author Gavrilova, Marina L. editor. Tan, C. J. Kenneth. editor. Moreno, Edward David. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-01004-0">http://dx.doi.org/10.1007/978-3-642-01004-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Identity and Privacy in the Internet Age 14th Nordic Conference on Secure IT Systems, NordSec 2009, Oslo, Norway, 14-16 October 2009. Proceedings
ent://SD_ILS/0/SD_ILS:191053
2024-09-02T06:27:36Z
2024-09-02T06:27:36Z
Author Jøsang, Audun. editor. Maseng, Torleiv. editor. Knapskog, Svein Johan. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-04766-4">http://dx.doi.org/10.1007/978-3-642-04766-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security and Privacy in Communication Networks 5th International ICST Conference, SecureComm 2009, Athens, Greece, September 14-18, 2009, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:191214
2024-09-02T06:27:36Z
2024-09-02T06:27:36Z
Author Chen, Yan. editor. Dimitriou, Tassos D. editor. Zhou, Jianying. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-05284-2">http://dx.doi.org/10.1007/978-3-642-05284-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Advances in Communication and Networking Second International Conference on Future Generation Communication and Networking, FGCN 2008, Sanya, Hainan Island, China, December 13-15, 2008. Revised Selected Papers
ent://SD_ILS/0/SD_ILS:191309
2024-09-02T06:27:36Z
2024-09-02T06:27:36Z
Author Kim, Tai-hoon. editor. Yang, Laurence T. editor. Park, Jong Hyuk. editor. Chang, Alan Chin-Chen. editor. Vasilakos, Thanos. editor.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-10236-3">http://dx.doi.org/10.1007/978-3-642-10236-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Global Initiatives to Secure Cyberspace An Emerging Landscape
ent://SD_ILS/0/SD_ILS:164783
2024-09-02T06:27:36Z
2024-09-02T06:27:36Z
Author Portnoy, Michael. editor. Goodman, Seymour. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-0-387-09764-0">http://dx.doi.org/10.1007/978-0-387-09764-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Secure Multi-Party Non-Repudiation Protocols and Applications
ent://SD_ILS/0/SD_ILS:167284
2024-09-02T06:27:36Z
2024-09-02T06:27:36Z
Author Onieva, José A. author. Lopez, Javier. author. Zhou, Jianying. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-0-387-75630-1">http://dx.doi.org/10.1007/978-0-387-75630-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Open Source Systems Security Certification
ent://SD_ILS/0/SD_ILS:167460
2024-09-02T06:27:36Z
2024-09-02T06:27:36Z
Author Damiani, Ernesto. author. Ardagna, Claudio Agostino. author. El Ioini, Nabil. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-0-387-77324-7">http://dx.doi.org/10.1007/978-0-387-77324-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Identifying Malicious Code Through Reverse Engineering
ent://SD_ILS/0/SD_ILS:167947
2024-09-02T06:27:36Z
2024-09-02T06:27:36Z
Author Singh, Abhishek. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-0-387-89468-3">http://dx.doi.org/10.1007/978-0-387-89468-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
E-business and Telecommunications 4th International Conference, ICETE 2007, Barcelona, Spain, July 28-31, 2007, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:189098
2024-09-02T06:27:36Z
2024-09-02T06:27:36Z
Author Filipe, Joaquim. editor. Obaidat, Mohammad S. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-540-88653-2">http://dx.doi.org/10.1007/978-3-540-88653-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Applied Cryptography and Network Security 7th International Conference, ACNS 2009, Paris-Rocquencourt, France, June 2-5, 2009. Proceedings
ent://SD_ILS/0/SD_ILS:190173
2024-09-02T06:27:36Z
2024-09-02T06:27:36Z
Author Abdalla, Michel. editor. Pointcheval, David. editor. Fouque, Pierre-Alain. editor. Vergnaud, Damien. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-01957-9">http://dx.doi.org/10.1007/978-3-642-01957-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Vulnerability Analysis and Defense for the Internet
ent://SD_ILS/0/SD_ILS:167162
2024-09-02T06:27:36Z
2024-09-02T06:27:36Z
Author Singh, Abhishek. editor. Singh, Baibhav. editor. Joseph, Hirosh. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-0-387-74390-5">http://dx.doi.org/10.1007/978-0-387-74390-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Intrusion Detection Systems
ent://SD_ILS/0/SD_ILS:167451
2024-09-02T06:27:36Z
2024-09-02T06:27:36Z
Author Mancini, Luigi V. editor. Pietro, Roberto. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-0-387-77265-3">http://dx.doi.org/10.1007/978-0-387-77265-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Botnet Detection Countering the Largest Security Threat
ent://SD_ILS/0/SD_ILS:166626
2024-09-02T06:27:36Z
2024-09-02T06:27:36Z
Author Lee, Wenke. editor. Wang, Cliff. editor. Dagon, David. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-0-387-68768-1">http://dx.doi.org/10.1007/978-0-387-68768-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Insider Attack and Cyber Security Beyond the Hacker
ent://SD_ILS/0/SD_ILS:167459
2024-09-02T06:27:36Z
2024-09-02T06:27:36Z
Author Stolfo, Salvatore J. editor. Bellovin, Steven M. editor. Keromytis, Angelos D. editor. Hershkop, Shlomo. editor. Smith, Sean W. editor.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-0-387-77322-3">http://dx.doi.org/10.1007/978-0-387-77322-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Privacy-Respecting Intrusion Detection
ent://SD_ILS/0/SD_ILS:166560
2024-09-02T06:27:36Z
2024-09-02T06:27:36Z
Author Flegel, Ulrich. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-0-387-68254-9">http://dx.doi.org/10.1007/978-0-387-68254-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Online Business Security Systems
ent://SD_ILS/0/SD_ILS:166641
2024-09-02T06:27:36Z
2024-09-02T06:27:36Z
Author Williams, Godfried B. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-0-387-68850-3">http://dx.doi.org/10.1007/978-0-387-68850-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security, Privacy, and Trust in Modern Data Management
ent://SD_ILS/0/SD_ILS:185914
2024-09-02T06:27:36Z
2024-09-02T06:27:36Z
Author Petković, Milan. editor. Jonker, Willem. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-540-69861-6">http://dx.doi.org/10.1007/978-3-540-69861-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>