Search Results for Security -- Technology. - Narrowed by: Computer science.SirsiDynix Enterprisehttps://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dSecurity$002b--$002bTechnology.$0026qf$003dSUBJECT$002509Subject$002509Computer$002bscience.$002509Computer$002bscience.$0026ps$003d300?2026-02-26T23:39:42ZCyber Security: Power and Technologyent://SD_ILS/0/SD_ILS:4010032026-02-26T23:39:42Z2026-02-26T23:39:42ZAuthor Lehto, Martti. editor. Neittaanmäki, Pekka. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-75307-2">https://doi.org/10.1007/978-3-319-75307-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Electronic Postage Systems Technology, Security, Economicsent://SD_ILS/0/SD_ILS:1662962026-02-26T23:39:42Z2026-02-26T23:39:42ZAuthor Bleumer, Gerrit. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-0-387-44606-6">http://dx.doi.org/10.1007/978-0-387-44606-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Information Security Technology for Applications 15th Nordic Conference on Secure IT Systems, NordSec 2010, Espoo, Finland, October 27-29, 2010, Revised Selected Papersent://SD_ILS/0/SD_ILS:1963032026-02-26T23:39:42Z2026-02-26T23:39:42ZAuthor Aura, Tuomas. editor. Järvinen, Kimmo. editor. Nyberg, Kaisa. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-27937-9">http://dx.doi.org/10.1007/978-3-642-27937-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Information Security Technology for Applications 16th Nordic Conference on Secure IT Systems, NordSec 2011, Tallinn, Estonia, October 26-28, 2011, Revised Selected Papersent://SD_ILS/0/SD_ILS:1967382026-02-26T23:39:42Z2026-02-26T23:39:42ZAuthor Laud, Peeter. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-29615-4">http://dx.doi.org/10.1007/978-3-642-29615-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Security Aspects in Information Technology First International Conference, InfoSecHiComNet 2011, Haldia, India, October 19-22, 2011. Proceedingsent://SD_ILS/0/SD_ILS:1956832026-02-26T23:39:42Z2026-02-26T23:39:42ZAuthor Joye, Marc. editor. Mukhopadhyay, Debdeep. editor. Tunstall, Michael. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-24586-2">http://dx.doi.org/10.1007/978-3-642-24586-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Security Technology International Conference, SecTech 2011, Held as Part of the Future Generation Information Technology Conference, FGIT 2011, in Conjunction with GDC 2011, Jeju Island, Korea, December 8-10, 2011. Proceedingsent://SD_ILS/0/SD_ILS:1961212026-02-26T23:39:42Z2026-02-26T23:39:42ZAuthor Kim, Tai-hoon. editor. Adeli, Hojjat. editor. Fang, Wai-chi. editor. Villalba, Javier García. editor. Arnett, Kirk P. editor.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-27189-2">http://dx.doi.org/10.1007/978-3-642-27189-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Security Technology, Disaster Recovery and Business Continuity International Conferences, SecTech and DRBC 2010, Held as Part of the Future Generation Information Technology Conference, FGIT 2010, Jeju Island, Korea, December 13-15, 2010. Proceedingsent://SD_ILS/0/SD_ILS:1936532026-02-26T23:39:42Z2026-02-26T23:39:42ZAuthor Kim, Tai-hoon. editor. Fang, Wai-chi. editor. Khan, Muhammad Khurram. editor. Arnett, Kirk P. editor. Kang, Heau-jo. editor.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-17610-4">http://dx.doi.org/10.1007/978-3-642-17610-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Advances in Security Technology International Conference, SecTech 2008, and Its Special Sessions, Sanya, Hainan Island, China, December 13-15, 2008. Revised Selected Papersent://SD_ILS/0/SD_ILS:1913112026-02-26T23:39:42Z2026-02-26T23:39:42ZAuthor Kim, Haeng-kon. editor. Kim, Tai-hoon. editor. Kiumi, Akingbehin. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-10240-0">http://dx.doi.org/10.1007/978-3-642-10240-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Security Technology International Conference, SecTech 2009, Held as Part of the Future Generation Information Technology Conference, FGIT 2009, Jeju Island, Korea, December 10-12, 2009. Proceedingsent://SD_ILS/0/SD_ILS:1914942026-02-26T23:39:42Z2026-02-26T23:39:42ZAuthor Ślęzak, Dominik. editor. Kim, Tai-hoon. editor. Fang, Wai-Chi. editor. Arnett, Kirk P. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-10847-1">http://dx.doi.org/10.1007/978-3-642-10847-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Fighting Terror Online The Convergence of Security, Technology, and the Lawent://SD_ILS/0/SD_ILS:1670632026-02-26T23:39:42Z2026-02-26T23:39:42ZAuthor Golumbic, Martin Charles. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-0-387-73578-8">http://dx.doi.org/10.1007/978-0-387-73578-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Impacts and Risk Assessment of Technology for Internet Security Enabled Information Small-Medium Enterprises (TEISMES)ent://SD_ILS/0/SD_ILS:1652672026-02-26T23:39:42Z2026-02-26T23:39:42ZAuthor Shoniregun, Charles A. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/b137376">http://dx.doi.org/10.1007/b137376</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Creative approaches towards development of computing and multidisciplinary IT solutions for societyent://SD_ILS/0/SD_ILS:5993712026-02-26T23:39:42Z2026-02-26T23:39:42ZAuthor Bijalwan, Anchit, editor.<br/>Preferred Shelf Number QA76 .C74 2024<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394272303">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394272303</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Soft Computing in Computer and Information Scienceent://SD_ILS/0/SD_ILS:5294152026-02-26T23:39:42Z2026-02-26T23:39:42ZAuthor Wiliński, Antoni. editor. Fray, Imed El. editor. Pejaś, Jerzy. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-15147-2">https://doi.org/10.1007/978-3-319-15147-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>The basics of information security : understanding the fundamentals of InfoSec in theory and practiceent://SD_ILS/0/SD_ILS:3557702026-02-26T23:39:42Z2026-02-26T23:39:42ZAuthor Andress, Jason, author.<br/>Preferred Shelf Number ONLINE(355770.1)<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128007440">http://www.sciencedirect.com/science/book/9780128007440</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Physically Unclonable Functions Constructions, Properties and Applicationsent://SD_ILS/0/SD_ILS:3351022026-02-26T23:39:42Z2026-02-26T23:39:42ZAuthor Maes, Roel. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(335102.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-41395-7">http://dx.doi.org/10.1007/978-3-642-41395-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Bluetooth Security Attacks Comparative Analysis, Attacks, and Countermeasuresent://SD_ILS/0/SD_ILS:3349822026-02-26T23:39:42Z2026-02-26T23:39:42ZAuthor Haataja, Keijo. author. Hyppönen, Konstantin. author. Pasanen, Sanna. author. Toivanen, Pekka. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(334982.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-40646-1">http://dx.doi.org/10.1007/978-3-642-40646-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Introduction to Public Key Infrastructuresent://SD_ILS/0/SD_ILS:3349842026-02-26T23:39:42Z2026-02-26T23:39:42ZAuthor Buchmann, Johannes A. author. Karatsiolis, Evangelos. author. Wiesmaier, Alexander. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(334984.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-40657-7">http://dx.doi.org/10.1007/978-3-642-40657-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>The basics of information security understanding the fundamentals of InfoSec in theory and practiceent://SD_ILS/0/SD_ILS:1453712026-02-26T23:39:42Z2026-02-26T23:39:42ZAuthor Andress, Jason.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597496537">http://www.sciencedirect.com/science/book/9781597496537</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>