Search Results for Threats. - Narrowed by: Data encryption (Computer science).
SirsiDynix Enterprise
https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dThreats.$0026qf$003dSUBJECT$002509Konu$002509Data$002bencryption$002b$002528Computer$002bscience$002529.$002509Data$002bencryption$002b$002528Computer$002bscience$002529.$0026ps$003d300?dt=list
2026-03-23T07:44:45Z
Insider Threats in Cyber Security
ent://SD_ILS/0/SD_ILS:172782
2026-03-23T07:44:45Z
2026-03-23T07:44:45Z
Author Probst, Christian W. editor. Hunker, Jeffrey. editor. Gollmann, Dieter. editor. Bishop, Matt. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-1-4419-7133-3">http://dx.doi.org/10.1007/978-1-4419-7133-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Moving Target Defense Creating Asymmetric Uncertainty for Cyber Threats
ent://SD_ILS/0/SD_ILS:173823
2026-03-23T07:44:45Z
2026-03-23T07:44:45Z
Author Jajodia, Sushil. editor. Ghosh, Anup K. editor. Swarup, Vipin. editor. Wang, Cliff. editor. Wang, X. Sean. editor.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-1-4614-0977-9">http://dx.doi.org/10.1007/978-1-4614-0977-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Introduction to Biometrics
ent://SD_ILS/0/SD_ILS:605790
2026-03-23T07:44:45Z
2026-03-23T07:44:45Z
Author Jain, Anil K. author. Ross, Arun A. author. (orcid)0000-0001-8850-3013 Nandakumar, Karthik. author. (orcid)0000-0002-6274-9725 Swearingen, Thomas. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-031-61675-4">https://doi.org/10.1007/978-3-031-61675-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Hardware Protection through Obfuscation
ent://SD_ILS/0/SD_ILS:613957
2026-03-23T07:44:45Z
2026-03-23T07:44:45Z
Author Forte, Domenic. editor. Bhunia, Swarup. editor. Tehranipoor, Mark M. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-49019-9">https://doi.org/10.1007/978-3-319-49019-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Data Analytics and Decision Support for Cybersecurity Trends, Methodologies and Applications
ent://SD_ILS/0/SD_ILS:615552
2026-03-23T07:44:45Z
2026-03-23T07:44:45Z
Author Palomares Carrascosa, Iván. editor. Kalutarage, Harsha Kumara. editor. Huang, Yan. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-59439-2">https://doi.org/10.1007/978-3-319-59439-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Guide to Security in SDN and NFV Challenges, Opportunities, and Applications
ent://SD_ILS/0/SD_ILS:613138
2026-03-23T07:44:45Z
2026-03-23T07:44:45Z
Author Zhu, Shao Ying. editor. Scott-Hayward, Sandra. editor. Jacquin, Ludovic. editor. Hill, Richard. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-64653-4">https://doi.org/10.1007/978-3-319-64653-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Digital Forensics and Watermarking 16th International Workshop , IWDW 2017, Magdeburg, Germany, August 23-25, 2017, Proceedings
ent://SD_ILS/0/SD_ILS:616228
2026-03-23T07:44:45Z
2026-03-23T07:44:45Z
Author Kraetzer, Christian. editor. Shi, Yun-Qing. editor. Dittmann, Jana. editor. Kim, Hyoung Joong. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-64185-0">https://doi.org/10.1007/978-3-319-64185-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cyber-security of SCADA and Other Industrial Control Systems
ent://SD_ILS/0/SD_ILS:610788
2026-03-23T07:44:45Z
2026-03-23T07:44:45Z
Author Colbert, Edward J. M. editor. Kott, Alexander. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-32125-7">https://doi.org/10.1007/978-3-319-32125-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Ten Laws for Security
ent://SD_ILS/0/SD_ILS:617805
2026-03-23T07:44:45Z
2026-03-23T07:44:45Z
Author Diehl, Eric. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-42641-9">https://doi.org/10.1007/978-3-319-42641-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Elements of Cloud Computing Security A Survey of Key Practicalities
ent://SD_ILS/0/SD_ILS:617823
2026-03-23T07:44:45Z
2026-03-23T07:44:45Z
Author Alani, Mohammed M. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-41411-9">https://doi.org/10.1007/978-3-319-41411-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
10 Don'ts on Your Digital Devices The Non-Techie's Survival Guide to Cyber Security and Privacy
ent://SD_ILS/0/SD_ILS:618639
2026-03-23T07:44:45Z
2026-03-23T07:44:45Z
Author Rzeszut, Eric. author. Bachrach, Daniel. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-1-4842-0367-5">https://doi.org/10.1007/978-1-4842-0367-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
The InfoSec Handbook An Introduction to Information Security
ent://SD_ILS/0/SD_ILS:618581
2026-03-23T07:44:45Z
2026-03-23T07:44:45Z
Author Nayak, Umesha. author. Rao, Umesh Hodeghatta. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-1-4302-6383-8">https://doi.org/10.1007/978-1-4302-6383-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Platform Embedded Security Technology Revealed Safeguarding the Future of Computing with Intel Embedded Security and Management Engine
ent://SD_ILS/0/SD_ILS:618584
2026-03-23T07:44:45Z
2026-03-23T07:44:45Z
Author Ruan, Xiaoyu. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-1-4302-6572-6">https://doi.org/10.1007/978-1-4302-6572-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>