Search Results for Software Design. - Narrowed by: Data protection. SirsiDynix Enterprise https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dSoftware$002bDesign.$0026qf$003dSUBJECT$002509Subject$002509Data$002bprotection.$002509Data$002bprotection.$0026ps$003d300$0026isd$003dtrue? 2026-04-21T22:24:26Z Analysis and Design of Next-Generation Software Architectures Generative AI, Cybersecurity, and Cloud Computing ent://SD_ILS/0/SD_ILS:608484 2026-04-21T22:24:26Z 2026-04-21T22:24:26Z Author&#160;Langer, Arthur M. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-76212-3">https://doi.org/10.1007/978-3-031-76212-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Data Protection for Software Development and IT A Practical Introduction ent://SD_ILS/0/SD_ILS:607421 2026-04-21T22:24:26Z 2026-04-21T22:24:26Z Author&#160;Kneuper, Ralf. author. (orcid)0000-0003-3225-5895&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-662-70639-8">https://doi.org/10.1007/978-3-662-70639-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Large Language Models in Cybersecurity Threats, Exposure and Mitigation ent://SD_ILS/0/SD_ILS:603753 2026-04-21T22:24:26Z 2026-04-21T22:24:26Z Author&#160;Kucharavy, Andrei. editor.&#160;Plancherel, Octave. editor.&#160;Mulder, Valentin. editor.&#160;Mermoud, Alain. editor.&#160;Lenders, Vincent. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-54827-7">https://doi.org/10.1007/978-3-031-54827-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> CyberSecurity in a DevOps Environment From Requirements to Monitoring ent://SD_ILS/0/SD_ILS:602151 2026-04-21T22:24:26Z 2026-04-21T22:24:26Z Author&#160;Sadovykh, Andrey. editor.&#160;Truscan, Dragos. editor.&#160;Mallouli, Wissam. editor.&#160;Cavalli, Ana Rosa. editor.&#160;Seceleanu, Cristina. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-42212-6">https://doi.org/10.1007/978-3-031-42212-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Intelligent Computing and Applications Proceedings of ICDIC 2020 ent://SD_ILS/0/SD_ILS:528678 2026-04-21T22:24:26Z 2026-04-21T22:24:26Z Author&#160;Rao, B. Narendra Kumar. editor.&#160;Balasubramanian, R. editor.&#160;Wang, Shiuh-Jeng. editor.&#160;Nayak, Richi. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-19-4162-7">https://doi.org/10.1007/978-981-19-4162-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Emerging Trends in Expert Applications and Security Proceedings of 2nd ICETEAS 2023, Volume 1 ent://SD_ILS/0/SD_ILS:529113 2026-04-21T22:24:26Z 2026-04-21T22:24:26Z Author&#160;Rathore, Vijay Singh. editor.&#160;Tavares, Jo&atilde;o Manuel R. S. editor.&#160;Piuri, Vincenzo. editor.&#160;Surendiran, B. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-99-1909-3">https://doi.org/10.1007/978-981-99-1909-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cyber Security Intelligence and Analytics The 5th International Conference on Cyber Security Intelligence and Analytics (CSIA 2023), Volume 2 ent://SD_ILS/0/SD_ILS:526849 2026-04-21T22:24:26Z 2026-04-21T22:24:26Z Author&#160;Xu, Zheng. editor.&#160;Alrabaee, Saed. editor.&#160;Loyola-Gonz&aacute;lez, Octavio. editor.&#160;Cahyani, Niken Dwi Wahyu. editor.&#160;Ab Rahman, Nurul Hidayah. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-31775-0">https://doi.org/10.1007/978-3-031-31775-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Guide to Security in SDN and NFV Challenges, Opportunities, and Applications ent://SD_ILS/0/SD_ILS:613138 2026-04-21T22:24:26Z 2026-04-21T22:24:26Z Author&#160;Zhu, Shao Ying. editor.&#160;Scott-Hayward, Sandra. editor.&#160;Jacquin, Ludovic. editor.&#160;Hill, Richard. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-64653-4">https://doi.org/10.1007/978-3-319-64653-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Fusion for Cyber-Security Analytics ent://SD_ILS/0/SD_ILS:613268 2026-04-21T22:24:26Z 2026-04-21T22:24:26Z Author&#160;Alsmadi, Izzat M. editor. (orcid)0000-0001-7832-5081&#160;Karabatis, George. editor.&#160;Aleroud, Ahmed. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-44257-0">https://doi.org/10.1007/978-3-319-44257-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Testbeds and Research Infrastructures for the Development of Networks and Communities 11th International Conference, TRIDENTCOM 2016, Hangzhou, China, June 14-15, 2016, Revised Selected Papers ent://SD_ILS/0/SD_ILS:615035 2026-04-21T22:24:26Z 2026-04-21T22:24:26Z Author&#160;Guo, Song. editor.&#160;Wei, Guiyi. editor.&#160;Xiang, Yang. editor. (orcid)0000-0001-5252-0831&#160;Lin, Xiaodong. editor.&#160;Lorenz, Pascal. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-49580-4">https://doi.org/10.1007/978-3-319-49580-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Industrial Networks and Intelligent Systems Second International Conference, INISCOM 2016, Leicester, UK, October 31 - November 1, 2016, Proceedings ent://SD_ILS/0/SD_ILS:618235 2026-04-21T22:24:26Z 2026-04-21T22:24:26Z Author&#160;Maglaras, Leandros A. editor. (orcid)0000-0001-5360-9782&#160;Janicke, Helge. editor.&#160;Jones, Kevin. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-52569-3">https://doi.org/10.1007/978-3-319-52569-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> The Privacy Engineer's Manifesto Getting from Policy to Code to QA to Value ent://SD_ILS/0/SD_ILS:618599 2026-04-21T22:24:26Z 2026-04-21T22:24:26Z Author&#160;Dennedy, Michelle. author.&#160;Fox, Jonathan. author.&#160;Finneran, Tom. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-1-4302-6356-2">https://doi.org/10.1007/978-1-4302-6356-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Building the Infrastructure for Cloud Security A Solutions View ent://SD_ILS/0/SD_ILS:618624 2026-04-21T22:24:26Z 2026-04-21T22:24:26Z Author&#160;Yeluri, Raghuram. author.&#160;Castro-Leon, Enrique. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-1-4302-6146-9">https://doi.org/10.1007/978-1-4302-6146-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/>