Search Results for Identification. - Narrowed by: Computer security.
SirsiDynix Enterprise
https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dIdentification.$0026qf$003dSUBJECT$002509Subject$002509Computer$002bsecurity.$002509Computer$002bsecurity.$0026ps$003d300?
2025-12-15T07:17:29Z
Radio Frequency Identification: Security and Privacy Issues 10th International Workshop, RFIDSec 2014, Oxford, UK, July 21-23, 2014, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:486671
2025-12-15T07:17:29Z
2025-12-15T07:17:29Z
Author Saxena, Nitesh. editor. Sadeghi, Ahmad-Reza. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-13066-8">https://doi.org/10.1007/978-3-319-13066-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Mechanics of user identification and authentication : fundamentals of identity management
ent://SD_ILS/0/SD_ILS:539940
2025-12-15T07:17:29Z
2025-12-15T07:17:29Z
Author Todorov, Dobromir., author.<br/>Preferred Shelf Number TK5105.59 .T575 2007<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781420052206">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>
Hacking exposed Linux Linux security secrets and solutions.
ent://SD_ILS/0/SD_ILS:293324
2025-12-15T07:17:29Z
2025-12-15T07:17:29Z
Author Hatch, Brian. Hacking Linux exposed. ISECOM (Organization)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://mhebooklibrary.com/reader/hacking-exposed-linux">Subscription required</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Malware forensics investigating and analyzing malicious code
ent://SD_ILS/0/SD_ILS:147914
2025-12-15T07:17:29Z
2025-12-15T07:17:29Z
Author Aquilina, James M. Casey, Eoghan. Malin, Cameron H.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492683">http://www.sciencedirect.com/science/book/9781597492683</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Software deployment, updating, and patching
ent://SD_ILS/0/SD_ILS:544966
2025-12-15T07:17:29Z
2025-12-15T07:17:29Z
Author Stackpole, Bill., author. Hanrion, Patrick.<br/>Preferred Shelf Number QA76.76 .C69 S74 2007<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781420013290">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>
Enhanced methods in computer security, biometric and artificial intelligence systems
ent://SD_ILS/0/SD_ILS:109864
2025-12-15T07:17:29Z
2025-12-15T07:17:29Z
Author Pejas, Jerzy, 1954-, ed. Piegat, Andrzej, 1947-, ed.<br/>Preferred Shelf Number QA76.9.A25 E545 2005<br/>Format: Books<br/>Availability Beytepe Library~1<br/>
Hack proofing your identity in the information age protect your family on the internet!
ent://SD_ILS/0/SD_ILS:253617
2025-12-15T07:17:29Z
2025-12-15T07:17:29Z
Author Bidwell, Teri. Cross, Michael, 1965- Russell, Ryan, 1969-<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836517">http://www.sciencedirect.com/science/book/9781931836517</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>