Search Results for Testing. - Narrowed by: Data protection. SirsiDynix Enterprise https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dTesting.$0026qf$003dSUBJECT$002509Konu$002509Data$002bprotection.$002509Data$002bprotection.$0026ic$003dtrue$0026ps$003d300?dt=list 2026-03-29T17:54:29Z Primality Testing and Integer Factorization in Public-Key Cryptography ent://SD_ILS/0/SD_ILS:167452 2026-03-29T17:54:29Z 2026-03-29T17:54:29Z Author&#160;Yan, Song Y. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-0-387-77268-4">http://dx.doi.org/10.1007/978-0-387-77268-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Availability, Reliability and Security ARES 2025 EU Projects Symposium Workshops, Ghent, Belgium, August 11-14, 2025, Proceedings, Part II ent://SD_ILS/0/SD_ILS:609671 2026-03-29T17:54:29Z 2026-03-29T17:54:29Z Author&#160;Skopik, Florian. editor. (orcid)0000-0002-1922-7892&#160;Naessens, Vincent. editor. (orcid)0000-0002-9255-4902&#160;De Sutter, Bjorn. editor. (orcid)0000-0003-0317-2089&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-032-00644-8">https://doi.org/10.1007/978-3-032-00644-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> The cybersecurity control playbook : from fundamentals to advanced strategies ent://SD_ILS/0/SD_ILS:599789 2026-03-29T17:54:29Z 2026-03-29T17:54:29Z Author&#160;Edwards, Jason (Cybersecurity expert), author.&#160;John Wiley &amp; Sons, publisher.<br/>Preferred Shelf Number&#160;QA76.9 .A25 E3884 2025<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394331888">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394331888</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Availability, Reliability and Security ARES 2025 EU Projects Symposium Workshops, Ghent, Belgium, August 11-14, 2025, Proceedings, Part I ent://SD_ILS/0/SD_ILS:609684 2026-03-29T17:54:29Z 2026-03-29T17:54:29Z Author&#160;Skopik, Florian. editor. (orcid)0000-0002-1922-7892&#160;Naessens, Vincent. editor. (orcid)0000-0002-9255-4902&#160;De Sutter, Bjorn. editor. (orcid)0000-0003-0317-2089&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-032-00642-4">https://doi.org/10.1007/978-3-032-00642-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security, Privacy and Digital Forensics Select Proceedings of the International Conference, ICISPD 2022 ent://SD_ILS/0/SD_ILS:601918 2026-03-29T17:54:29Z 2026-03-29T17:54:29Z Author&#160;Patel, Sankita J. editor.&#160;Chaudhary, Naveen Kumar. editor.&#160;Gohil, Bhavesh N. editor.&#160;Iyengar, S. S. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-99-5091-1">https://doi.org/10.1007/978-981-99-5091-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cyber Resilience Fundamentals ent://SD_ILS/0/SD_ILS:602876 2026-03-29T17:54:29Z 2026-03-29T17:54:29Z Author&#160;Tjoa, Simon. author.&#160;Gafi&#263;, Melisa. author.&#160;Kieseberg, Peter. author. (orcid)0000-0002-2847-2152&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-52064-8">https://doi.org/10.1007/978-3-031-52064-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> CyberSecurity in a DevOps Environment From Requirements to Monitoring ent://SD_ILS/0/SD_ILS:602151 2026-03-29T17:54:29Z 2026-03-29T17:54:29Z Author&#160;Sadovykh, Andrey. editor.&#160;Truscan, Dragos. editor.&#160;Mallouli, Wissam. editor.&#160;Cavalli, Ana Rosa. editor.&#160;Seceleanu, Cristina. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-42212-6">https://doi.org/10.1007/978-3-031-42212-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Proceedings of Data Analytics and Management ICDAM 2022 ent://SD_ILS/0/SD_ILS:527638 2026-03-29T17:54:29Z 2026-03-29T17:54:29Z Author&#160;Khanna, Ashish. editor.&#160;Polkowski, Zdzislaw. editor.&#160;Castillo, Oscar. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-19-7615-5">https://doi.org/10.1007/978-981-19-7615-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cybersecurity and Identity Access Management ent://SD_ILS/0/SD_ILS:527374 2026-03-29T17:54:29Z 2026-03-29T17:54:29Z Author&#160;Rawal, Bharat S. author.&#160;Manogaran, Gunasekaran. author.&#160;Peter, Alexender. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-19-2658-7">https://doi.org/10.1007/978-981-19-2658-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer Safety, Reliability, and Security 36th International Conference, SAFECOMP 2017, Trento, Italy, September 13-15, 2017, Proceedings ent://SD_ILS/0/SD_ILS:612752 2026-03-29T17:54:29Z 2026-03-29T17:54:29Z Author&#160;Tonetta, Stefano. editor.&#160;Schoitsch, Erwin. editor.&#160;Bitsch, Friedemann. editor. (orcid)0000-0001-6152-4121&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-66266-4">https://doi.org/10.1007/978-3-319-66266-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Risk Assessment and Risk-Driven Quality Assurance 4th International Workshop, RISK 2016, Held in Conjunction with ICTSS 2016, Graz, Austria, October 18, 2016, Revised Selected Papers ent://SD_ILS/0/SD_ILS:613620 2026-03-29T17:54:29Z 2026-03-29T17:54:29Z Author&#160;Gro&szlig;mann, J&uuml;rgen. editor.&#160;Felderer, Michael. editor.&#160;Seehusen, Fredrik. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-57858-3">https://doi.org/10.1007/978-3-319-57858-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Runtime Verification 17th International Conference, RV 2017, Seattle, WA, USA, September 13-16, 2017, Proceedings ent://SD_ILS/0/SD_ILS:616126 2026-03-29T17:54:29Z 2026-03-29T17:54:29Z Author&#160;Lahiri, Shuvendu. editor.&#160;Reger, Giles. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-67531-2">https://doi.org/10.1007/978-3-319-67531-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security of Highly Critical Wireless Networks ent://SD_ILS/0/SD_ILS:612666 2026-03-29T17:54:29Z 2026-03-29T17:54:29Z Author&#160;Martellini, Maurizio. author.&#160;Abaimov, Stanislav. author.&#160;Gaycken, Sandro. author.&#160;Wilson, Clay. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-52905-9">https://doi.org/10.1007/978-3-319-52905-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cyber-security of SCADA and Other Industrial Control Systems ent://SD_ILS/0/SD_ILS:610788 2026-03-29T17:54:29Z 2026-03-29T17:54:29Z Author&#160;Colbert, Edward J. M. editor.&#160;Kott, Alexander. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-32125-7">https://doi.org/10.1007/978-3-319-32125-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Enterprise architecture and information assurance : developing a secure foundation ent://SD_ILS/0/SD_ILS:538768 2026-03-29T17:54:29Z 2026-03-29T17:54:29Z Author&#160;Scholz, James A., author.<br/>Preferred Shelf Number&#160;QA76.9 .D314 S34 2014<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781439841600">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> Surviving security : how to integrate people, process, and technology ent://SD_ILS/0/SD_ILS:547266 2026-03-29T17:54:29Z 2026-03-29T17:54:29Z Author&#160;Andress, Amanda., author.<br/>Preferred Shelf Number&#160;QA76.9 .A25 A545 2003<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9780203501405">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/>