Search Results for Information security - Narrowed by: Security systems. SirsiDynix Enterprise https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dInformation$002bsecurity$0026qf$003dSUBJECT$002509Subject$002509Security$002bsystems.$002509Security$002bsystems.$0026ic$003dtrue$0026te$003dILS$0026ps$003d300?dt=list 2026-03-30T21:35:45Z Information Security Practices Emerging Threats and Perspectives ent://SD_ILS/0/SD_ILS:616353 2026-03-30T21:35:45Z 2026-03-30T21:35:45Z Author&#160;Traor&eacute;, Issa. editor.&#160;Awad, Ahmed. editor.&#160;Woungang, Isaac. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-48947-6">https://doi.org/10.1007/978-3-319-48947-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> SCION: A Secure Internet Architecture ent://SD_ILS/0/SD_ILS:613238 2026-03-30T21:35:45Z 2026-03-30T21:35:45Z Author&#160;Perrig, Adrian. author.&#160;Szalachowski, Pawel. author.&#160;Reischuk, Raphael M. author.&#160;Chuat, Laurent. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-67080-5">https://doi.org/10.1007/978-3-319-67080-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Secure Data Deletion ent://SD_ILS/0/SD_ILS:617190 2026-03-30T21:35:45Z 2026-03-30T21:35:45Z Author&#160;Reardon, Joel. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-28778-2">https://doi.org/10.1007/978-3-319-28778-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cryptography Made Simple ent://SD_ILS/0/SD_ILS:617695 2026-03-30T21:35:45Z 2026-03-30T21:35:45Z Author&#160;Smart, Nigel. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-21936-3">https://doi.org/10.1007/978-3-319-21936-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cyber Resilience: Applied Perspectives ent://SD_ILS/0/SD_ILS:609353 2026-03-30T21:35:45Z 2026-03-30T21:35:45Z Author&#160;Linkov, Igor. editor.&#160;Kott, Alexander. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-90109-6">https://doi.org/10.1007/978-3-031-90109-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> 6G Cyber Security Resilience: Trends and Challenges ent://SD_ILS/0/SD_ILS:608660 2026-03-30T21:35:45Z 2026-03-30T21:35:45Z Author&#160;Gururaj, H. L. editor.&#160;Ravi, VinayaKumar. editor. (orcid)0000-0001-6873-6469&#160;Shreyas, J. editor.&#160;Pavithra, N. editor.&#160;Sapna, R. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-85008-0">https://doi.org/10.1007/978-3-031-85008-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cybersecurity 9th European Interdisciplinary Cybersecurity Conference, EICC 2025, Rennes, France, June 18-19, 2025, Proceedings ent://SD_ILS/0/SD_ILS:608908 2026-03-30T21:35:45Z 2026-03-30T21:35:45Z Author&#160;Pra&ccedil;a, Isabel. editor. (orcid)0000-0002-2519-9859&#160;Bernardi, Simona. editor. (orcid)0000-0002-2605-6243&#160;In&aacute;cio, Pedro R.M. editor. (orcid)0000-0001-8221-0666&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-94855-8">https://doi.org/10.1007/978-3-031-94855-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Future Industrial Internet Second Future Industrial Internet Symposium, FII 2024, Shenzhen, China, August 23, 2024, Proceedings ent://SD_ILS/0/SD_ILS:608974 2026-03-30T21:35:45Z 2026-03-30T21:35:45Z Author&#160;Yin, Hao. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-96-6736-9">https://doi.org/10.1007/978-981-96-6736-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Securing a Connected Future IoT Cybersecurity &amp; IP Security for Makers and Users of Medical Technology ent://SD_ILS/0/SD_ILS:610416 2026-03-30T21:35:45Z 2026-03-30T21:35:45Z Author&#160;Harding, William. author.&#160;Hartmann, Andreas. author.&#160;O'Brien, Shayla. author.&#160;Sinzig, Viktor. author.&#160;Break, Gabriel. author.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-032-07309-9">https://doi.org/10.1007/978-3-032-07309-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cyber Malware Offensive and Defensive Systems ent://SD_ILS/0/SD_ILS:602026 2026-03-30T21:35:45Z 2026-03-30T21:35:45Z Author&#160;Almomani, Iman. editor.&#160;Maglaras, Leandros A. editor.&#160;Ferrag, Mohamed Amine. editor.&#160;Ayres, Nick. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-34969-0">https://doi.org/10.1007/978-3-031-34969-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Digital Resilience: Navigating Disruption and Safeguarding Data Privacy ent://SD_ILS/0/SD_ILS:603395 2026-03-30T21:35:45Z 2026-03-30T21:35:45Z Author&#160;Shandilya, Shishir Kumar. author. (orcid)0000-0002-3308-4445&#160;Datta, Agni. author.&#160;Kartik, Yash. author.&#160;Nagar, Atulya. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-53290-0">https://doi.org/10.1007/978-3-031-53290-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cyberspace, Cyberterrorism and the International Security in the Fourth Industrial Revolution Threats, Assessment and Responses ent://SD_ILS/0/SD_ILS:602378 2026-03-30T21:35:45Z 2026-03-30T21:35:45Z Author&#160;Montasari, Reza. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-50454-9">https://doi.org/10.1007/978-3-031-50454-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Secure Edge and Fog Computing Enabled AI for IoT and Smart Cities Includes selected Papers from International Conference on Advanced Computing &amp; Next-Generation Communication (ICACNGC 2022) ent://SD_ILS/0/SD_ILS:602934 2026-03-30T21:35:45Z 2026-03-30T21:35:45Z Author&#160;Abd El-Latif, Ahmed A. editor.&#160;Tawalbeh, Lo'ai. editor.&#160;Maleh, Yassine. editor. (orcid)0000-0003-4704-5364&#160;Gupta, Brij B. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-51097-7">https://doi.org/10.1007/978-3-031-51097-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cyber Resilience Fundamentals ent://SD_ILS/0/SD_ILS:602876 2026-03-30T21:35:45Z 2026-03-30T21:35:45Z Author&#160;Tjoa, Simon. author.&#160;Gafi&#263;, Melisa. author.&#160;Kieseberg, Peter. author. (orcid)0000-0002-2847-2152&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-52064-8">https://doi.org/10.1007/978-3-031-52064-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Critical Infrastructure Protection in the Light of the Armed Conflicts ent://SD_ILS/0/SD_ILS:602887 2026-03-30T21:35:45Z 2026-03-30T21:35:45Z Author&#160;Kov&aacute;cs, T&uuml;nde Anna. editor. (orcid)0000-0002-5867-5882&#160;Nyikes, Zolt&aacute;n. editor.&#160;Berek, Tam&aacute;s. editor.&#160;Daruka, Norbert. editor. (orcid)0000-0002-7102-1787&#160;T&oacute;th, L&aacute;szl&oacute;. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-47990-8">https://doi.org/10.1007/978-3-031-47990-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> The NICE Cyber Security Framework Cyber Security Intelligence and Analytics ent://SD_ILS/0/SD_ILS:527712 2026-03-30T21:35:45Z 2026-03-30T21:35:45Z Author&#160;Alsmadi, Izzat. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-21651-0">https://doi.org/10.1007/978-3-031-21651-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Multimedia Forensics and Security Foundations, Innovations, and Applications ent://SD_ILS/0/SD_ILS:611692 2026-03-30T21:35:45Z 2026-03-30T21:35:45Z Author&#160;Hassanien, Aboul Ella. editor.&#160;Mostafa Fouad, Mohamed. editor.&#160;Manaf, Azizah Abdul. editor.&#160;Zamani, Mazdak. editor.&#160;Ahmad, Rabiah. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-44270-9">https://doi.org/10.1007/978-3-319-44270-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Biometric Security and Privacy Opportunities &amp; Challenges in The Big Data Era ent://SD_ILS/0/SD_ILS:611932 2026-03-30T21:35:45Z 2026-03-30T21:35:45Z Author&#160;Jiang, Richard. editor. (orcid)0000-0003-1721-9474&#160;Al-maadeed, Somaya. editor.&#160;Bouridane, Ahmed. editor.&#160;Crookes, Prof. Danny. editor.&#160;Beghdadi, Azeddine. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-47301-7">https://doi.org/10.1007/978-3-319-47301-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Resilience and Risk Methods and Application in Environment, Cyber and Social Domains ent://SD_ILS/0/SD_ILS:612480 2026-03-30T21:35:45Z 2026-03-30T21:35:45Z Author&#160;Linkov, Igor. editor. (orcid)0000-0002-0823-8107&#160;Palma-Oliveira, Jos&eacute; Manuel. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-94-024-1123-2">https://doi.org/10.1007/978-94-024-1123-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Secure and Trustworthy Transportation Cyber-Physical Systems ent://SD_ILS/0/SD_ILS:612754 2026-03-30T21:35:45Z 2026-03-30T21:35:45Z Author&#160;Sun, Yunchuan. editor.&#160;Song, Houbing. editor. (orcid)0000-0003-2631-9223&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-10-3892-1">https://doi.org/10.1007/978-981-10-3892-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Strategic Engineering for Cloud Computing and Big Data Analytics ent://SD_ILS/0/SD_ILS:618221 2026-03-30T21:35:45Z 2026-03-30T21:35:45Z Author&#160;Hosseinian-Far, Amin. editor.&#160;Ramachandran, Muthu. editor.&#160;Sarwar, Dilshad. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-52491-7">https://doi.org/10.1007/978-3-319-52491-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Open Source Intelligence Investigation From Strategy to Implementation ent://SD_ILS/0/SD_ILS:611588 2026-03-30T21:35:45Z 2026-03-30T21:35:45Z Author&#160;Akhgar, Babak. editor.&#160;Bayerl, P. Saskia. editor.&#160;Sampson, Fraser. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-47671-1">https://doi.org/10.1007/978-3-319-47671-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Industrial Espionage and Technical Surveillance Counter Measurers ent://SD_ILS/0/SD_ILS:615414 2026-03-30T21:35:45Z 2026-03-30T21:35:45Z Author&#160;Androulidakis, I.I. author.&#160;Kioupakis, Fragkiskos - Emmanouil. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-28666-2">https://doi.org/10.1007/978-3-319-28666-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> VoIP and PBX Security and Forensics A Practical Approach ent://SD_ILS/0/SD_ILS:614000 2026-03-30T21:35:45Z 2026-03-30T21:35:45Z Author&#160;Androulidakis, Iosif I. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-29721-7">https://doi.org/10.1007/978-3-319-29721-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Watermarking Security ent://SD_ILS/0/SD_ILS:616141 2026-03-30T21:35:45Z 2026-03-30T21:35:45Z Author&#160;Bas, Patrick. author.&#160;Furon, Teddy. author.&#160;Cayre, Fran&ccedil;ois. author.&#160;Do&euml;rr, Gwena&euml;l. author.&#160;Mathon, Benjamin. author.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-10-0506-0">https://doi.org/10.1007/978-981-10-0506-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cryptology Transmitted Message Protection From Deterministic Chaos up to Optical Vortices ent://SD_ILS/0/SD_ILS:616596 2026-03-30T21:35:45Z 2026-03-30T21:35:45Z Author&#160;Izmailov, Igor. author.&#160;Poizner, Boris. author.&#160;Romanov, Ilia. author.&#160;Smolskiy, Sergey. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-30125-9">https://doi.org/10.1007/978-3-319-30125-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Mobile Phone Security and Forensics A Practical Approach ent://SD_ILS/0/SD_ILS:615733 2026-03-30T21:35:45Z 2026-03-30T21:35:45Z Author&#160;Androulidakis, Iosif I. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-29742-2">https://doi.org/10.1007/978-3-319-29742-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Ten Laws for Security ent://SD_ILS/0/SD_ILS:617805 2026-03-30T21:35:45Z 2026-03-30T21:35:45Z Author&#160;Diehl, Eric. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-42641-9">https://doi.org/10.1007/978-3-319-42641-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Game Theoretic Analysis of Congestion, Safety and Security Traffic and Transportation Theory ent://SD_ILS/0/SD_ILS:529429 2026-03-30T21:35:45Z 2026-03-30T21:35:45Z Author&#160;Hausken, Kjell. editor.&#160;Zhuang, Jun. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-11674-7">https://doi.org/10.1007/978-3-319-11674-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security Issues in Mobile NFC Devices ent://SD_ILS/0/SD_ILS:529509 2026-03-30T21:35:45Z 2026-03-30T21:35:45Z Author&#160;Roland, Michael. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-15488-6">https://doi.org/10.1007/978-3-319-15488-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Game Theoretic Analysis of Congestion, Safety and Security Networks, Air Traffic and Emergency Departments ent://SD_ILS/0/SD_ILS:529568 2026-03-30T21:35:45Z 2026-03-30T21:35:45Z Author&#160;Hausken, Kjell. editor.&#160;Zhuang, Jun. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-13009-5">https://doi.org/10.1007/978-3-319-13009-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cyber Security: Analytics, Technology and Automation ent://SD_ILS/0/SD_ILS:529962 2026-03-30T21:35:45Z 2026-03-30T21:35:45Z Author&#160;Lehto, Martti. editor.&#160;Neittaanm&auml;ki, Pekka. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-18302-2">https://doi.org/10.1007/978-3-319-18302-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/>