Search Results for Light. - Narrowed by: Data protection. SirsiDynix Enterprise https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dLight.$0026qf$003dSUBJECT$002509Subject$002509Data$002bprotection.$002509Data$002bprotection.$0026ic$003dtrue$0026ps$003d300?dt=list 2026-03-29T06:38:19Z Critical Infrastructure Protection in the Light of the Armed Conflicts ent://SD_ILS/0/SD_ILS:602887 2026-03-29T06:38:19Z 2026-03-29T06:38:19Z Author&#160;Kov&aacute;cs, T&uuml;nde Anna. editor. (orcid)0000-0002-5867-5882&#160;Nyikes, Zolt&aacute;n. editor.&#160;Berek, Tam&aacute;s. editor.&#160;Daruka, Norbert. editor. (orcid)0000-0002-7102-1787&#160;T&oacute;th, L&aacute;szl&oacute;. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-47990-8">https://doi.org/10.1007/978-3-031-47990-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security and Privacy in Smart Environments ent://SD_ILS/0/SD_ILS:605758 2026-03-29T06:38:19Z 2026-03-29T06:38:19Z Author&#160;Pitropakis, Nikolaos. editor. (orcid)0000-0002-3392-9970&#160;Katsikas, Sokratis. editor. (orcid)0000-0003-2966-9683&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-66708-4">https://doi.org/10.1007/978-3-031-66708-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advanced Techniques of Artificial Intelligence in IT Security Systems ent://SD_ILS/0/SD_ILS:602624 2026-03-29T06:38:19Z 2026-03-29T06:38:19Z Author&#160;Korytkowski, Marcin. author. (orcid)0000-0002-6002-2733&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-53854-4">https://doi.org/10.1007/978-3-031-53854-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in User Authentication ent://SD_ILS/0/SD_ILS:611603 2026-03-29T06:38:19Z 2026-03-29T06:38:19Z Author&#160;Dasgupta, Dipankar. author.&#160;Roy, Arunava. author.&#160;Nag, Abhijit. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-58808-7">https://doi.org/10.1007/978-3-319-58808-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Reliability, Safety, and Security of Railway Systems. Modelling, Analysis, Verification, and Certification Second International Conference, RSSRail 2017, Pistoia, Italy, November 14-16, 2017, Proceedings ent://SD_ILS/0/SD_ILS:612044 2026-03-29T06:38:19Z 2026-03-29T06:38:19Z Author&#160;Fantechi, Alessandro. editor.&#160;Lecomte, Thierry. editor.&#160;Romanovsky, Alexander. editor. (orcid)0000-0002-4076-3331&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-68499-4">https://doi.org/10.1007/978-3-319-68499-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Preserving Privacy Against Side-Channel Leaks From Data Publishing to Web Applications ent://SD_ILS/0/SD_ILS:611407 2026-03-29T06:38:19Z 2026-03-29T06:38:19Z Author&#160;Liu, Wen Ming. author.&#160;Wang, Lingyu. author. (orcid)0000-0002-7441-7541&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-42644-0">https://doi.org/10.1007/978-3-319-42644-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Platform Embedded Security Technology Revealed Safeguarding the Future of Computing with Intel Embedded Security and Management Engine ent://SD_ILS/0/SD_ILS:618584 2026-03-29T06:38:19Z 2026-03-29T06:38:19Z Author&#160;Ruan, Xiaoyu. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-1-4302-6572-6">https://doi.org/10.1007/978-1-4302-6572-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> The Privacy Engineer's Manifesto Getting from Policy to Code to QA to Value ent://SD_ILS/0/SD_ILS:618599 2026-03-29T06:38:19Z 2026-03-29T06:38:19Z Author&#160;Dennedy, Michelle. author.&#160;Fox, Jonathan. author.&#160;Finneran, Tom. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-1-4302-6356-2">https://doi.org/10.1007/978-1-4302-6356-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/>