Search Results for Information security - Narrowed by: Security systems.
SirsiDynix Enterprise
https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dInformation$002bsecurity$0026qf$003dSUBJECT$002509Subject$002509Security$002bsystems.$002509Security$002bsystems.$0026ic$003dtrue$0026te$003dILS$0026ps$003d300?dt=list
2026-03-30T21:35:45Z
Information Security Practices Emerging Threats and Perspectives
ent://SD_ILS/0/SD_ILS:616353
2026-03-30T21:35:45Z
2026-03-30T21:35:45Z
Author Traoré, Issa. editor. Awad, Ahmed. editor. Woungang, Isaac. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-48947-6">https://doi.org/10.1007/978-3-319-48947-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
SCION: A Secure Internet Architecture
ent://SD_ILS/0/SD_ILS:613238
2026-03-30T21:35:45Z
2026-03-30T21:35:45Z
Author Perrig, Adrian. author. Szalachowski, Pawel. author. Reischuk, Raphael M. author. Chuat, Laurent. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-67080-5">https://doi.org/10.1007/978-3-319-67080-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Secure Data Deletion
ent://SD_ILS/0/SD_ILS:617190
2026-03-30T21:35:45Z
2026-03-30T21:35:45Z
Author Reardon, Joel. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-28778-2">https://doi.org/10.1007/978-3-319-28778-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cryptography Made Simple
ent://SD_ILS/0/SD_ILS:617695
2026-03-30T21:35:45Z
2026-03-30T21:35:45Z
Author Smart, Nigel. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-21936-3">https://doi.org/10.1007/978-3-319-21936-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cyber Resilience: Applied Perspectives
ent://SD_ILS/0/SD_ILS:609353
2026-03-30T21:35:45Z
2026-03-30T21:35:45Z
Author Linkov, Igor. editor. Kott, Alexander. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-031-90109-6">https://doi.org/10.1007/978-3-031-90109-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
6G Cyber Security Resilience: Trends and Challenges
ent://SD_ILS/0/SD_ILS:608660
2026-03-30T21:35:45Z
2026-03-30T21:35:45Z
Author Gururaj, H. L. editor. Ravi, VinayaKumar. editor. (orcid)0000-0001-6873-6469 Shreyas, J. editor. Pavithra, N. editor. Sapna, R. editor.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-031-85008-0">https://doi.org/10.1007/978-3-031-85008-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cybersecurity 9th European Interdisciplinary Cybersecurity Conference, EICC 2025, Rennes, France, June 18-19, 2025, Proceedings
ent://SD_ILS/0/SD_ILS:608908
2026-03-30T21:35:45Z
2026-03-30T21:35:45Z
Author Praça, Isabel. editor. (orcid)0000-0002-2519-9859 Bernardi, Simona. editor. (orcid)0000-0002-2605-6243 Inácio, Pedro R.M. editor. (orcid)0000-0001-8221-0666 SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-031-94855-8">https://doi.org/10.1007/978-3-031-94855-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Future Industrial Internet Second Future Industrial Internet Symposium, FII 2024, Shenzhen, China, August 23, 2024, Proceedings
ent://SD_ILS/0/SD_ILS:608974
2026-03-30T21:35:45Z
2026-03-30T21:35:45Z
Author Yin, Hao. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-981-96-6736-9">https://doi.org/10.1007/978-981-96-6736-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Securing a Connected Future IoT Cybersecurity & IP Security for Makers and Users of Medical Technology
ent://SD_ILS/0/SD_ILS:610416
2026-03-30T21:35:45Z
2026-03-30T21:35:45Z
Author Harding, William. author. Hartmann, Andreas. author. O'Brien, Shayla. author. Sinzig, Viktor. author. Break, Gabriel. author.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-032-07309-9">https://doi.org/10.1007/978-3-032-07309-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cyber Malware Offensive and Defensive Systems
ent://SD_ILS/0/SD_ILS:602026
2026-03-30T21:35:45Z
2026-03-30T21:35:45Z
Author Almomani, Iman. editor. Maglaras, Leandros A. editor. Ferrag, Mohamed Amine. editor. Ayres, Nick. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-031-34969-0">https://doi.org/10.1007/978-3-031-34969-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Digital Resilience: Navigating Disruption and Safeguarding Data Privacy
ent://SD_ILS/0/SD_ILS:603395
2026-03-30T21:35:45Z
2026-03-30T21:35:45Z
Author Shandilya, Shishir Kumar. author. (orcid)0000-0002-3308-4445 Datta, Agni. author. Kartik, Yash. author. Nagar, Atulya. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-031-53290-0">https://doi.org/10.1007/978-3-031-53290-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cyberspace, Cyberterrorism and the International Security in the Fourth Industrial Revolution Threats, Assessment and Responses
ent://SD_ILS/0/SD_ILS:602378
2026-03-30T21:35:45Z
2026-03-30T21:35:45Z
Author Montasari, Reza. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-031-50454-9">https://doi.org/10.1007/978-3-031-50454-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Secure Edge and Fog Computing Enabled AI for IoT and Smart Cities Includes selected Papers from International Conference on Advanced Computing & Next-Generation Communication (ICACNGC 2022)
ent://SD_ILS/0/SD_ILS:602934
2026-03-30T21:35:45Z
2026-03-30T21:35:45Z
Author Abd El-Latif, Ahmed A. editor. Tawalbeh, Lo'ai. editor. Maleh, Yassine. editor. (orcid)0000-0003-4704-5364 Gupta, Brij B. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-031-51097-7">https://doi.org/10.1007/978-3-031-51097-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cyber Resilience Fundamentals
ent://SD_ILS/0/SD_ILS:602876
2026-03-30T21:35:45Z
2026-03-30T21:35:45Z
Author Tjoa, Simon. author. Gafić, Melisa. author. Kieseberg, Peter. author. (orcid)0000-0002-2847-2152 SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-031-52064-8">https://doi.org/10.1007/978-3-031-52064-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Critical Infrastructure Protection in the Light of the Armed Conflicts
ent://SD_ILS/0/SD_ILS:602887
2026-03-30T21:35:45Z
2026-03-30T21:35:45Z
Author Kovács, Tünde Anna. editor. (orcid)0000-0002-5867-5882 Nyikes, Zoltán. editor. Berek, Tamás. editor. Daruka, Norbert. editor. (orcid)0000-0002-7102-1787 Tóth, László. editor.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-031-47990-8">https://doi.org/10.1007/978-3-031-47990-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
The NICE Cyber Security Framework Cyber Security Intelligence and Analytics
ent://SD_ILS/0/SD_ILS:527712
2026-03-30T21:35:45Z
2026-03-30T21:35:45Z
Author Alsmadi, Izzat. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-031-21651-0">https://doi.org/10.1007/978-3-031-21651-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Multimedia Forensics and Security Foundations, Innovations, and Applications
ent://SD_ILS/0/SD_ILS:611692
2026-03-30T21:35:45Z
2026-03-30T21:35:45Z
Author Hassanien, Aboul Ella. editor. Mostafa Fouad, Mohamed. editor. Manaf, Azizah Abdul. editor. Zamani, Mazdak. editor. Ahmad, Rabiah. editor.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-44270-9">https://doi.org/10.1007/978-3-319-44270-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Biometric Security and Privacy Opportunities & Challenges in The Big Data Era
ent://SD_ILS/0/SD_ILS:611932
2026-03-30T21:35:45Z
2026-03-30T21:35:45Z
Author Jiang, Richard. editor. (orcid)0000-0003-1721-9474 Al-maadeed, Somaya. editor. Bouridane, Ahmed. editor. Crookes, Prof. Danny. editor. Beghdadi, Azeddine. editor.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-47301-7">https://doi.org/10.1007/978-3-319-47301-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Resilience and Risk Methods and Application in Environment, Cyber and Social Domains
ent://SD_ILS/0/SD_ILS:612480
2026-03-30T21:35:45Z
2026-03-30T21:35:45Z
Author Linkov, Igor. editor. (orcid)0000-0002-0823-8107 Palma-Oliveira, José Manuel. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-94-024-1123-2">https://doi.org/10.1007/978-94-024-1123-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Secure and Trustworthy Transportation Cyber-Physical Systems
ent://SD_ILS/0/SD_ILS:612754
2026-03-30T21:35:45Z
2026-03-30T21:35:45Z
Author Sun, Yunchuan. editor. Song, Houbing. editor. (orcid)0000-0003-2631-9223 SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-981-10-3892-1">https://doi.org/10.1007/978-981-10-3892-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Strategic Engineering for Cloud Computing and Big Data Analytics
ent://SD_ILS/0/SD_ILS:618221
2026-03-30T21:35:45Z
2026-03-30T21:35:45Z
Author Hosseinian-Far, Amin. editor. Ramachandran, Muthu. editor. Sarwar, Dilshad. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-52491-7">https://doi.org/10.1007/978-3-319-52491-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Open Source Intelligence Investigation From Strategy to Implementation
ent://SD_ILS/0/SD_ILS:611588
2026-03-30T21:35:45Z
2026-03-30T21:35:45Z
Author Akhgar, Babak. editor. Bayerl, P. Saskia. editor. Sampson, Fraser. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-47671-1">https://doi.org/10.1007/978-3-319-47671-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Industrial Espionage and Technical Surveillance Counter Measurers
ent://SD_ILS/0/SD_ILS:615414
2026-03-30T21:35:45Z
2026-03-30T21:35:45Z
Author Androulidakis, I.I. author. Kioupakis, Fragkiskos - Emmanouil. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-28666-2">https://doi.org/10.1007/978-3-319-28666-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
VoIP and PBX Security and Forensics A Practical Approach
ent://SD_ILS/0/SD_ILS:614000
2026-03-30T21:35:45Z
2026-03-30T21:35:45Z
Author Androulidakis, Iosif I. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-29721-7">https://doi.org/10.1007/978-3-319-29721-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Watermarking Security
ent://SD_ILS/0/SD_ILS:616141
2026-03-30T21:35:45Z
2026-03-30T21:35:45Z
Author Bas, Patrick. author. Furon, Teddy. author. Cayre, François. author. Doërr, Gwenaël. author. Mathon, Benjamin. author.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-981-10-0506-0">https://doi.org/10.1007/978-981-10-0506-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cryptology Transmitted Message Protection From Deterministic Chaos up to Optical Vortices
ent://SD_ILS/0/SD_ILS:616596
2026-03-30T21:35:45Z
2026-03-30T21:35:45Z
Author Izmailov, Igor. author. Poizner, Boris. author. Romanov, Ilia. author. Smolskiy, Sergey. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-30125-9">https://doi.org/10.1007/978-3-319-30125-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Mobile Phone Security and Forensics A Practical Approach
ent://SD_ILS/0/SD_ILS:615733
2026-03-30T21:35:45Z
2026-03-30T21:35:45Z
Author Androulidakis, Iosif I. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-29742-2">https://doi.org/10.1007/978-3-319-29742-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Ten Laws for Security
ent://SD_ILS/0/SD_ILS:617805
2026-03-30T21:35:45Z
2026-03-30T21:35:45Z
Author Diehl, Eric. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-42641-9">https://doi.org/10.1007/978-3-319-42641-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Game Theoretic Analysis of Congestion, Safety and Security Traffic and Transportation Theory
ent://SD_ILS/0/SD_ILS:529429
2026-03-30T21:35:45Z
2026-03-30T21:35:45Z
Author Hausken, Kjell. editor. Zhuang, Jun. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-11674-7">https://doi.org/10.1007/978-3-319-11674-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security Issues in Mobile NFC Devices
ent://SD_ILS/0/SD_ILS:529509
2026-03-30T21:35:45Z
2026-03-30T21:35:45Z
Author Roland, Michael. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-15488-6">https://doi.org/10.1007/978-3-319-15488-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Game Theoretic Analysis of Congestion, Safety and Security Networks, Air Traffic and Emergency Departments
ent://SD_ILS/0/SD_ILS:529568
2026-03-30T21:35:45Z
2026-03-30T21:35:45Z
Author Hausken, Kjell. editor. Zhuang, Jun. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-13009-5">https://doi.org/10.1007/978-3-319-13009-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cyber Security: Analytics, Technology and Automation
ent://SD_ILS/0/SD_ILS:529962
2026-03-30T21:35:45Z
2026-03-30T21:35:45Z
Author Lehto, Martti. editor. Neittaanmäki, Pekka. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-18302-2">https://doi.org/10.1007/978-3-319-18302-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>