Search Results for Data protection. - Narrowed by: Engineering.
SirsiDynix Enterprise
https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dData$002bprotection.$0026qf$003dSUBJECT$002509Subject$002509Engineering.$002509Engineering.$0026ic$003dtrue$0026ps$003d300$0026isd$003dtrue?
2024-11-14T15:13:34Z
Engineering Applications of Neural Networks 19th International Conference, EANN 2018, Bristol, UK, September 3-5, 2018, Proceedings
ent://SD_ILS/0/SD_ILS:399759
2024-11-14T15:13:34Z
2024-11-14T15:13:34Z
Author Pimenidis, Elias. editor. (orcid)0000-0003-3593-8640 Jayne, Chrisina. editor. (orcid)0000-0001-7292-2109 SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-98204-5">https://doi.org/10.1007/978-3-319-98204-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security with Intelligent Computing and Big-data Services
ent://SD_ILS/0/SD_ILS:400872
2024-11-14T15:13:34Z
2024-11-14T15:13:34Z
Author Peng, Sheng-Lung. editor. Wang, Shiuh-Jeng. editor. Balas, Valentina Emilia. editor. Zhao, Ming. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-76451-1">https://doi.org/10.1007/978-3-319-76451-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Physical Unclonable Functions in Theory and Practice
ent://SD_ILS/0/SD_ILS:331657
2024-11-14T15:13:34Z
2024-11-14T15:13:34Z
Author Böhm, Christoph. author. Hofer, Maximilian. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(331657.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-1-4614-5040-5">http://dx.doi.org/10.1007/978-1-4614-5040-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Advanced DPA Theory and Practice Towards the Security Limits of Secure Embedded Circuits
ent://SD_ILS/0/SD_ILS:332116
2024-11-14T15:13:34Z
2024-11-14T15:13:34Z
Author Peeters, Eric. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(332116.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-1-4614-6783-0">http://dx.doi.org/10.1007/978-1-4614-6783-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Wireless Networks and Security Issues, Challenges and Research Trends
ent://SD_ILS/0/SD_ILS:334140
2024-11-14T15:13:34Z
2024-11-14T15:13:34Z
Author Khan, Shafiullah. editor. Khan Pathan, Al-Sakib. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(334140.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-36169-2">http://dx.doi.org/10.1007/978-3-642-36169-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
PBX Security and Forensics A Practical Approach
ent://SD_ILS/0/SD_ILS:331279
2024-11-14T15:13:34Z
2024-11-14T15:13:34Z
Author Androulidakis, Iosif I. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(331279.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-1-4614-1656-2">http://dx.doi.org/10.1007/978-1-4614-1656-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Sicherheitsgerichtete Echtzeitsysteme
ent://SD_ILS/0/SD_ILS:337256
2024-11-14T15:13:34Z
2024-11-14T15:13:34Z
Author Halang, Wolfgang A. author. Konakovsky, Rudolf M. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(337256.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-37298-8">http://dx.doi.org/10.1007/978-3-642-37298-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Proceedings of the International Conference on IT Convergence and Security 2011
ent://SD_ILS/0/SD_ILS:206494
2024-11-14T15:13:34Z
2024-11-14T15:13:34Z
Author Kim, Kuinam J. editor. Ahn, Seong Jin. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-94-007-2911-7">http://dx.doi.org/10.1007/978-94-007-2911-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Technology Convergence, Secure and Trust Computing, and Data Management ITCS 2012 & STA 2012
ent://SD_ILS/0/SD_ILS:206735
2024-11-14T15:13:34Z
2024-11-14T15:13:34Z
Author Park, Jong Hyuk (James). editor. Kim, Jongsung. editor. Zou, Deqing. editor. Lee, Yang Sun. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-94-007-5083-8">http://dx.doi.org/10.1007/978-94-007-5083-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Mobile Phone Security and Forensics A Practical Approach
ent://SD_ILS/0/SD_ILS:173990
2024-11-14T15:13:34Z
2024-11-14T15:13:34Z
Author Androulidakis, Iosif I. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-1-4614-1650-0">http://dx.doi.org/10.1007/978-1-4614-1650-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
IT-Sicherheit mit System Integratives IT-Sicherheits-, Kontinuitäts- und Risikomanagement - Sicherheitspyramide - Standards und Practices - SOA und Softwareentwicklung
ent://SD_ILS/0/SD_ILS:199017
2024-11-14T15:13:34Z
2024-11-14T15:13:34Z
Author Müller, Klaus-Rainer. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-8348-8178-6">http://dx.doi.org/10.1007/978-3-8348-8178-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security Trends for FPGAS From Secured to Secure Reconfigurable Systems
ent://SD_ILS/0/SD_ILS:206038
2024-11-14T15:13:34Z
2024-11-14T15:13:34Z
Author Badrignans, Benoit. editor. Danger, Jean Luc. editor. Fischer, Viktor. editor. Gogniat, Guy. editor. Torres, Lionel. editor.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-94-007-1338-3">http://dx.doi.org/10.1007/978-94-007-1338-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Kryptographie und IT-Sicherheit Grundlagen und Anwendungen
ent://SD_ILS/0/SD_ILS:198973
2024-11-14T15:13:34Z
2024-11-14T15:13:34Z
Author Spitz, Stephan. author. Pramateftakis, Michael. author. Swoboda, Joachim. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-8348-8120-5">http://dx.doi.org/10.1007/978-3-8348-8120-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
ISSE 2010 Securing Electronic Business Processes Highlights of the Information Security Solutions Europe 2010 Conference
ent://SD_ILS/0/SD_ILS:199891
2024-11-14T15:13:34Z
2024-11-14T15:13:34Z
Author Pohlmann, Norbert. editor. Reimer, Helmut. editor. Schneider, Wolfgang. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-8348-9788-6">http://dx.doi.org/10.1007/978-3-8348-9788-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Security Risk Management Risikomanagement mit ISO/IEC 27001, 27005 und 31010
ent://SD_ILS/0/SD_ILS:199932
2024-11-14T15:13:34Z
2024-11-14T15:13:34Z
Author Klipper, Sebastian. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-8348-9870-8">http://dx.doi.org/10.1007/978-3-8348-9870-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Trustworthy Internet
ent://SD_ILS/0/SD_ILS:204521
2024-11-14T15:13:34Z
2024-11-14T15:13:34Z
Author Salgarelli, Luca. editor. Bianchi, Giuseppe. editor. Blefari-Melazzi, Nicola. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-88-470-1818-1">http://dx.doi.org/10.1007/978-88-470-1818-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Handbook of Information and Communication Security
ent://SD_ILS/0/SD_ILS:190841
2024-11-14T15:13:34Z
2024-11-14T15:13:34Z
Author Stavroulakis, Peter. editor. Stamp, Mark. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-04117-4">http://dx.doi.org/10.1007/978-3-642-04117-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Rollen und Berechtigungskonzepte Ansätze für das Identity- und Access Management im Unternehmen
ent://SD_ILS/0/SD_ILS:199849
2024-11-14T15:13:34Z
2024-11-14T15:13:34Z
Author Tsolkas, Alexander. author. Schmidt, Klaus. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-8348-9745-9">http://dx.doi.org/10.1007/978-3-8348-9745-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security in Embedded Devices
ent://SD_ILS/0/SD_ILS:172275
2024-11-14T15:13:34Z
2024-11-14T15:13:34Z
Author Gebotys, Catherine H. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-1-4419-1530-6">http://dx.doi.org/10.1007/978-1-4419-1530-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Machine Learning and Systems Engineering
ent://SD_ILS/0/SD_ILS:205490
2024-11-14T15:13:34Z
2024-11-14T15:13:34Z
Author Ao, Sio-Iong. editor. Rieger, Burghard. editor. Amouzegar, Mahyar A. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-90-481-9419-3">http://dx.doi.org/10.1007/978-90-481-9419-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Les virus informatiques: théorie, pratique et applications
ent://SD_ILS/0/SD_ILS:176476
2024-11-14T15:13:34Z
2024-11-14T15:13:34Z
Author Filiol, Éric. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-2-287-98240-8">http://dx.doi.org/10.1007/978-2-287-98240-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Kryptographie und IT-Sicherheit Grundlagen und Anwendungen
ent://SD_ILS/0/SD_ILS:199590
2024-11-14T15:13:34Z
2024-11-14T15:13:34Z
Author Swoboda, Joachim. author. Spitz, Stephan. author. Pramateftakis, Michael. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-8348-9473-1">http://dx.doi.org/10.1007/978-3-8348-9473-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>