Search Results for Software development. - Narrowed by: Data protection. SirsiDynix Enterprise https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dSoftware$002bdevelopment.$0026qf$003dSUBJECT$002509Subject$002509Data$002bprotection.$002509Data$002bprotection.$0026ps$003d300$0026isd$003dtrue?dt=list 2026-04-02T09:44:51Z Data Protection for Software Development and IT A Practical Introduction ent://SD_ILS/0/SD_ILS:607421 2026-04-02T09:44:51Z 2026-04-02T09:44:51Z Author&#160;Kneuper, Ralf. author. (orcid)0000-0003-3225-5895&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-662-70639-8">https://doi.org/10.1007/978-3-662-70639-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Analysis and Design of Next-Generation Software Architectures Generative AI, Cybersecurity, and Cloud Computing ent://SD_ILS/0/SD_ILS:608484 2026-04-02T09:44:51Z 2026-04-02T09:44:51Z Author&#160;Langer, Arthur M. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-76212-3">https://doi.org/10.1007/978-3-031-76212-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> The AI Act and The Agile Safety Plan ent://SD_ILS/0/SD_ILS:607067 2026-04-02T09:44:51Z 2026-04-02T09:44:51Z Author&#160;Myklebust, Thor. author. (orcid)0000-0002-9283-092X&#160;St&aring;lhane, Tor. author.&#160;Vatn, Dorthea Mathilde Kristin. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-80504-2">https://doi.org/10.1007/978-3-031-80504-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cybersecurity 9th European Interdisciplinary Cybersecurity Conference, EICC 2025, Rennes, France, June 18-19, 2025, Proceedings ent://SD_ILS/0/SD_ILS:608908 2026-04-02T09:44:51Z 2026-04-02T09:44:51Z Author&#160;Pra&ccedil;a, Isabel. editor. (orcid)0000-0002-2519-9859&#160;Bernardi, Simona. editor. (orcid)0000-0002-2605-6243&#160;In&aacute;cio, Pedro R.M. editor. (orcid)0000-0001-8221-0666&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-94855-8">https://doi.org/10.1007/978-3-031-94855-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> AISMA-2024: International Workshop on Advanced Information Security Management and Applications ent://SD_ILS/0/SD_ILS:605556 2026-04-02T09:44:51Z 2026-04-02T09:44:51Z Author&#160;Lapina, Maria. editor. (orcid)0000-0001-8117-9142&#160;Raza, Zahid. editor. (orcid)0000-0003-1906-6774&#160;Tchernykh, Andrei. editor. (orcid)0000-0001-5029-5212&#160;Sajid, Mohammad. editor. (orcid)0000-0001-8822-5332&#160;Zolotarev, Vyacheslav. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-72171-7">https://doi.org/10.1007/978-3-031-72171-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Reliability Engineering for Industrial Processes An Analytics Perspective ent://SD_ILS/0/SD_ILS:603298 2026-04-02T09:44:51Z 2026-04-02T09:44:51Z Author&#160;Kapur, P. K. editor. (orcid)0000-0001-8006-5952&#160;Pham, Hoang. editor.&#160;Singh, Gurinder. editor. (orcid)0000-0002-7827-1578&#160;Kumar, Vivek. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-55048-5">https://doi.org/10.1007/978-3-031-55048-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security Planning A Practical Approach ent://SD_ILS/0/SD_ILS:602364 2026-04-02T09:44:51Z 2026-04-02T09:44:51Z Author&#160;Lincke, Susan. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-43118-0">https://doi.org/10.1007/978-3-031-43118-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Android Malware Detection and Adversarial Methods ent://SD_ILS/0/SD_ILS:603645 2026-04-02T09:44:51Z 2026-04-02T09:44:51Z Author&#160;Niu, Weina. author.&#160;Zhang, Xiaosong. author.&#160;Yan, Ran. author.&#160;Gong, Jiacheng. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-97-1459-9">https://doi.org/10.1007/978-981-97-1459-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Large Language Models in Cybersecurity Threats, Exposure and Mitigation ent://SD_ILS/0/SD_ILS:603753 2026-04-02T09:44:51Z 2026-04-02T09:44:51Z Author&#160;Kucharavy, Andrei. editor.&#160;Plancherel, Octave. editor.&#160;Mulder, Valentin. editor.&#160;Mermoud, Alain. editor.&#160;Lenders, Vincent. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-54827-7">https://doi.org/10.1007/978-3-031-54827-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Software security : concepts &amp; practices ent://SD_ILS/0/SD_ILS:570473 2026-04-02T09:44:51Z 2026-04-02T09:44:51Z Author&#160;Khan, Suhel Ahmad, author.&#160;Kumar, Rajeev, author.&#160;Khan, R. A. (Raees Ahmad), author.<br/>Preferred Shelf Number&#160;QA76.76 .D47<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003330516">https://www.taylorfrancis.com/books/9781003330516</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cyber Security Intelligence and Analytics The 5th International Conference on Cyber Security Intelligence and Analytics (CSIA 2023), Volume 2 ent://SD_ILS/0/SD_ILS:526849 2026-04-02T09:44:51Z 2026-04-02T09:44:51Z Author&#160;Xu, Zheng. editor.&#160;Alrabaee, Saed. editor.&#160;Loyola-Gonz&aacute;lez, Octavio. editor.&#160;Cahyani, Niken Dwi Wahyu. editor.&#160;Ab Rahman, Nurul Hidayah. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-31775-0">https://doi.org/10.1007/978-3-031-31775-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Emerging Technologies in Data Mining and Information Security Proceedings of IEMIS 2022, Volume 3 ent://SD_ILS/0/SD_ILS:526885 2026-04-02T09:44:51Z 2026-04-02T09:44:51Z Author&#160;Dutta, Paramartha. editor.&#160;Bhattacharya, Abhishek. editor.&#160;Dutta, Soumi. editor.&#160;Lai, Wen-Cheng. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-19-4676-9">https://doi.org/10.1007/978-981-19-4676-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Emerging Trends in Expert Applications and Security Proceedings of 2nd ICETEAS 2023, Volume 1 ent://SD_ILS/0/SD_ILS:529113 2026-04-02T09:44:51Z 2026-04-02T09:44:51Z Author&#160;Rathore, Vijay Singh. editor.&#160;Tavares, Jo&atilde;o Manuel R. S. editor.&#160;Piuri, Vincenzo. editor.&#160;Surendiran, B. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-99-1909-3">https://doi.org/10.1007/978-981-99-1909-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Future Data and Security Engineering 4th International Conference, FDSE 2017, Ho Chi Minh City, Vietnam, November 29 - December 1, 2017, Proceedings ent://SD_ILS/0/SD_ILS:612151 2026-04-02T09:44:51Z 2026-04-02T09:44:51Z Author&#160;Dang, Tran Khanh. editor.&#160;Wagner, Roland. editor.&#160;K&uuml;ng, Josef. editor.&#160;Thoai, Nam. editor.&#160;Takizawa, Makoto. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-70004-5">https://doi.org/10.1007/978-3-319-70004-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Connected Environments for the Internet of Things Challenges and Solutions ent://SD_ILS/0/SD_ILS:612157 2026-04-02T09:44:51Z 2026-04-02T09:44:51Z Author&#160;Mahmood, Zaigham. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-70102-8">https://doi.org/10.1007/978-3-319-70102-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Guide to Security in SDN and NFV Challenges, Opportunities, and Applications ent://SD_ILS/0/SD_ILS:613138 2026-04-02T09:44:51Z 2026-04-02T09:44:51Z Author&#160;Zhu, Shao Ying. editor.&#160;Scott-Hayward, Sandra. editor.&#160;Jacquin, Ludovic. editor.&#160;Hill, Richard. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-64653-4">https://doi.org/10.1007/978-3-319-64653-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Testbeds and Research Infrastructures for the Development of Networks and Communities 11th International Conference, TRIDENTCOM 2016, Hangzhou, China, June 14-15, 2016, Revised Selected Papers ent://SD_ILS/0/SD_ILS:615035 2026-04-02T09:44:51Z 2026-04-02T09:44:51Z Author&#160;Guo, Song. editor.&#160;Wei, Guiyi. editor.&#160;Xiang, Yang. editor. (orcid)0000-0001-5252-0831&#160;Lin, Xiaodong. editor.&#160;Lorenz, Pascal. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-49580-4">https://doi.org/10.1007/978-3-319-49580-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Industrial Networks and Intelligent Systems Second International Conference, INISCOM 2016, Leicester, UK, October 31 - November 1, 2016, Proceedings ent://SD_ILS/0/SD_ILS:618235 2026-04-02T09:44:51Z 2026-04-02T09:44:51Z Author&#160;Maglaras, Leandros A. editor. (orcid)0000-0001-5360-9782&#160;Janicke, Helge. editor.&#160;Jones, Kevin. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-52569-3">https://doi.org/10.1007/978-3-319-52569-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cyber Security Cryptography and Machine Learning First International Conference, CSCML 2017, Beer-Sheva, Israel, June 29-30, 2017, Proceedings ent://SD_ILS/0/SD_ILS:613097 2026-04-02T09:44:51Z 2026-04-02T09:44:51Z Author&#160;Dolev, Shlomi. editor.&#160;Lodha, Sachin. editor. (orcid)0000-0001-5771-4977&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-60080-2">https://doi.org/10.1007/978-3-319-60080-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Fundamentals of Secure System Modelling ent://SD_ILS/0/SD_ILS:617827 2026-04-02T09:44:51Z 2026-04-02T09:44:51Z Author&#160;Matulevi&#269;ius, Raimundas. author. (orcid)0000-0002-1829-4794&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-61717-6">https://doi.org/10.1007/978-3-319-61717-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Mobile and Wireless Technologies 2016 ent://SD_ILS/0/SD_ILS:614789 2026-04-02T09:44:51Z 2026-04-02T09:44:51Z Author&#160;Kim, Kuinam J. editor.&#160;Wattanapongsakorn, Naruemon. editor.&#160;Joukov, Nikolai. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-10-1409-3">https://doi.org/10.1007/978-981-10-1409-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> The Privacy Engineer's Manifesto Getting from Policy to Code to QA to Value ent://SD_ILS/0/SD_ILS:618599 2026-04-02T09:44:51Z 2026-04-02T09:44:51Z Author&#160;Dennedy, Michelle. author.&#160;Fox, Jonathan. author.&#160;Finneran, Tom. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-1-4302-6356-2">https://doi.org/10.1007/978-1-4302-6356-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Building the Infrastructure for Cloud Security A Solutions View ent://SD_ILS/0/SD_ILS:618624 2026-04-02T09:44:51Z 2026-04-02T09:44:51Z Author&#160;Yeluri, Raghuram. author.&#160;Castro-Leon, Enrique. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-1-4302-6146-9">https://doi.org/10.1007/978-1-4302-6146-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/>