Search Results for Information technologies - Narrowed by: Computer security. SirsiDynix Enterprise https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dInformation$002btechnologies$0026qf$003dSUBJECT$002509Subject$002509Computer$002bsecurity.$002509Computer$002bsecurity.$0026ps$003d300$0026isd$003dtrue? 2025-12-16T20:59:07Z Information and Software Technologies 25th International Conference, ICIST 2019, Vilnius, Lithuania, October 10&ndash;12, 2019, Proceedings ent://SD_ILS/0/SD_ILS:485468 2025-12-16T20:59:07Z 2025-12-16T20:59:07Z Author&#160;Dama&scaron;evi&#269;ius, Robertas. editor.&#160;Vasiljevien&#279;, Giedr&#279;. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-30275-7">https://doi.org/10.1007/978-3-030-30275-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advanced methodologies and technologies in system security, information privacy, and forensics ent://SD_ILS/0/SD_ILS:482009 2025-12-16T20:59:07Z 2025-12-16T20:59:07Z Author&#160;Khosrow-Pour, Mehdi, 1951- editor.&#160;IGI Global, publisher.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-7492-7">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-7492-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Smart Secure Systems &ndash; IoT and Analytics Perspective Second International Conference on Intelligent Information Technologies. ICIIT 2017, Chennai, India, December 20-22, 2017, Proceedings ent://SD_ILS/0/SD_ILS:400428 2025-12-16T20:59:07Z 2025-12-16T20:59:07Z Author&#160;Venkataramani, Guru Prasadh. editor.&#160;Sankaranarayanan, Karthik. editor.&#160;Mukherjee, Saswati. editor.&#160;Arputharaj, Kannan. editor.&#160;Sankara Narayanan, Swamynathan. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-10-7635-0">https://doi.org/10.1007/978-981-10-7635-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Data protection : governance, risk management, and compliance ent://SD_ILS/0/SD_ILS:543918 2025-12-16T20:59:07Z 2025-12-16T20:59:07Z Author&#160;Hill, David G. (David Gary), 1943, author.<br/>Preferred Shelf Number&#160;QA76.9 .A25 H52 2009<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781439806937">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> Digital privacy : theory, technologies, and practices ent://SD_ILS/0/SD_ILS:547774 2025-12-16T20:59:07Z 2025-12-16T20:59:07Z Author&#160;Acquisti, Alessandro.<br/>Preferred Shelf Number&#160;QA76.9 .A25 D528 2008<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781420052183">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> Database and applications security : integrating information security and data management ent://SD_ILS/0/SD_ILS:540220 2025-12-16T20:59:07Z 2025-12-16T20:59:07Z Author&#160;Thuraisingham, Bhavani M., author.<br/>Preferred Shelf Number&#160;QA76.9 .D314 T47 2005<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9780203486061">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/>