Search Results for Security Science and Technology. - Narrowed by: Data protection.
SirsiDynix Enterprise
https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dSecurity$002bScience$002band$002bTechnology.$0026qf$003dSUBJECT$002509Subject$002509Data$002bprotection.$002509Data$002bprotection.$0026ps$003d300$0026isd$003dtrue?
2025-12-11T06:04:07Z
The NICE Cyber Security Framework Cyber Security Intelligence and Analytics
ent://SD_ILS/0/SD_ILS:527712
2025-12-11T06:04:07Z
2025-12-11T06:04:07Z
Author Alsmadi, Izzat. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-031-21651-0">https://doi.org/10.1007/978-3-031-21651-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Game Theoretic Analysis of Congestion, Safety and Security Traffic and Transportation Theory
ent://SD_ILS/0/SD_ILS:529429
2025-12-11T06:04:07Z
2025-12-11T06:04:07Z
Author Hausken, Kjell. editor. Zhuang, Jun. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-11674-7">https://doi.org/10.1007/978-3-319-11674-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security Issues in Mobile NFC Devices
ent://SD_ILS/0/SD_ILS:529509
2025-12-11T06:04:07Z
2025-12-11T06:04:07Z
Author Roland, Michael. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-15488-6">https://doi.org/10.1007/978-3-319-15488-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Game Theoretic Analysis of Congestion, Safety and Security Networks, Air Traffic and Emergency Departments
ent://SD_ILS/0/SD_ILS:529568
2025-12-11T06:04:07Z
2025-12-11T06:04:07Z
Author Hausken, Kjell. editor. Zhuang, Jun. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-13009-5">https://doi.org/10.1007/978-3-319-13009-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cyber Security: Analytics, Technology and Automation
ent://SD_ILS/0/SD_ILS:529962
2025-12-11T06:04:07Z
2025-12-11T06:04:07Z
Author Lehto, Martti. editor. Neittaanmäki, Pekka. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-18302-2">https://doi.org/10.1007/978-3-319-18302-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Bluetooth Security Attacks Comparative Analysis, Attacks, and Countermeasures
ent://SD_ILS/0/SD_ILS:334982
2025-12-11T06:04:07Z
2025-12-11T06:04:07Z
Author Haataja, Keijo. author. Hyppönen, Konstantin. author. Pasanen, Sanna. author. Toivanen, Pekka. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(334982.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-40646-1">http://dx.doi.org/10.1007/978-3-642-40646-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Introduction to Public Key Infrastructures
ent://SD_ILS/0/SD_ILS:334984
2025-12-11T06:04:07Z
2025-12-11T06:04:07Z
Author Buchmann, Johannes A. author. Karatsiolis, Evangelos. author. Wiesmaier, Alexander. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(334984.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-40657-7">http://dx.doi.org/10.1007/978-3-642-40657-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
PBX Security and Forensics A Practical Approach
ent://SD_ILS/0/SD_ILS:331279
2025-12-11T06:04:07Z
2025-12-11T06:04:07Z
Author Androulidakis, Iosif I. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(331279.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-1-4614-1656-2">http://dx.doi.org/10.1007/978-1-4614-1656-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>