Arama Sonuçları Computer security - Daraltılmış: Data protection.SirsiDynix Enterprisehttps://katalog.hacettepe.edu.tr/client/tr_TR/default_tr/default_tr/qu$003dComputer$002bsecurity$0026qf$003dSUBJECT$002509Konu$002509Data$002bprotection.$002509Data$002bprotection.$0026ps$003d300$0026isd$003dtrue?dt=list2025-03-23T14:55:38ZElements of Computer Securityent://SD_ILS/0/SD_ILS:1683932025-03-23T14:55:38Z2025-03-23T14:55:38ZYazar Salomon, David. author. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-0-85729-006-9">http://dx.doi.org/10.1007/978-0-85729-006-9</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>The Art of War for Computer Securityent://SD_ILS/0/SD_ILS:4838082025-03-23T14:55:38Z2025-03-23T14:55:38ZYazar Madsen, Tom. author. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-030-28569-2">https://doi.org/10.1007/978-3-030-28569-2</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Big Data Technologies for Monitoring of Computer Security: A Case Study of the Russian Federationent://SD_ILS/0/SD_ILS:4019072025-03-23T14:55:38Z2025-03-23T14:55:38ZYazar Petrenko, Sergei. author. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-319-79036-7">https://doi.org/10.1007/978-3-319-79036-7</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Security in Computer and Information Sciences First International ISCIS Security Workshop 2018, Euro-CYBERSEC 2018, London, UK, February 26-27, 2018, Revised Selected Papersent://SD_ILS/0/SD_ILS:4027362025-03-23T14:55:38Z2025-03-23T14:55:38ZYazar Gelenbe, Erol. editor. (orcid)0000-0001-9688-2201 Campegiani, Paolo. editor. Czachórski, Tadeusz. editor. Katsikas, Sokratis K. editor. (orcid)0000-0003-2966-9683 Komnios, Ioannis. editor.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-319-95189-8">https://doi.org/10.1007/978-3-319-95189-8</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Computer Safety, Reliability, and Security 32nd International Conference, SAFECOMP 2013, Toulouse, France, September 24-27, 2013. Proceedingsent://SD_ILS/0/SD_ILS:3350052025-03-23T14:55:38Z2025-03-23T14:55:38ZYazar Bitsch, Friedemann. editor. Guiochet, Jérémie. editor. Kaâniche, Mohamed. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE(335005.1)<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-40793-2">http://dx.doi.org/10.1007/978-3-642-40793-2</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Advances in Information and Computer Security 8th International Workshop on Security, IWSEC 2013, Okinawa, Japan, November 18-20, 2013, Proceedingsent://SD_ILS/0/SD_ILS:3350982025-03-23T14:55:38Z2025-03-23T14:55:38ZYazar Sakiyama, Kazuo. editor. Terada, Masayuki. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE(335098.1)<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-41383-4">http://dx.doi.org/10.1007/978-3-642-41383-4</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Computer Security – ESORICS 2013 18th European Symposium on Research in Computer Security, Egham, UK, September 9-13, 2013. Proceedingsent://SD_ILS/0/SD_ILS:3349092025-03-23T14:55:38Z2025-03-23T14:55:38ZYazar Crampton, Jason. editor. Jajodia, Sushil. editor. Mayes, Keith. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE(334909.1)<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-40203-6">http://dx.doi.org/10.1007/978-3-642-40203-6</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Computer Safety, Reliability, and Security 31st International Conference, SAFECOMP 2012, Magdeburg, Germany, September 25-28, 2012. Proceedingsent://SD_ILS/0/SD_ILS:1974202025-03-23T14:55:38Z2025-03-23T14:55:38ZYazar Ortmeier, Frank. editor. Daniel, Peter. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-33678-2">http://dx.doi.org/10.1007/978-3-642-33678-2</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Computer Network Security 6th International Conference on Mathematical Methods, Models and Architectures for Computer Network Security, MMM-ACNS 2012, St. Petersburg, Russia, October 17-19, 2012. Proceedingsent://SD_ILS/0/SD_ILS:1974252025-03-23T14:55:38Z2025-03-23T14:55:38ZYazar Kotenko, Igor. editor. Skormin, Victor. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-33704-8">http://dx.doi.org/10.1007/978-3-642-33704-8</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Computer Security – ESORICS 2012 17th European Symposium on Research in Computer Security, Pisa, Italy, September 10-12, 2012. Proceedingsent://SD_ILS/0/SD_ILS:1973292025-03-23T14:55:38Z2025-03-23T14:55:38ZYazar Foresti, Sara. editor. Yung, Moti. editor. Martinelli, Fabio. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-33167-1">http://dx.doi.org/10.1007/978-3-642-33167-1</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Computer Safety, Reliability, and Security SAFECOMP 2012 Workshops: Sassur, ASCoMS, DESEC4LCCI, ERCIM/EWICS, IWDE, Magdeburg, Germany, September 25-28, 2012. Proceedingsent://SD_ILS/0/SD_ILS:1974192025-03-23T14:55:38Z2025-03-23T14:55:38ZYazar Ortmeier, Frank. editor. Daniel, Peter. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-33675-1">http://dx.doi.org/10.1007/978-3-642-33675-1</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Advances in Information and Computer Security 7th International Workshop on Security, IWSEC 2012, Fukuoka, Japan, November 7-9, 2012. Proceedingsent://SD_ILS/0/SD_ILS:1974752025-03-23T14:55:38Z2025-03-23T14:55:38ZYazar Hanaoka, Goichiro. editor. Yamauchi, Toshihiro. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-34117-5">http://dx.doi.org/10.1007/978-3-642-34117-5</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Recent Trends in Computer Networks and Distributed Systems Security International Conference, SNDS 2012, Trivandrum, India, October 11-12, 2012. Proceedingsent://SD_ILS/0/SD_ILS:1974792025-03-23T14:55:38Z2025-03-23T14:55:38ZYazar Thampi, Sabu M. editor. Zomaya, Albert Y. editor. Strufe, Thorsten. editor. Alcaraz Calero, Jose M. editor. Thomas, Tony , 1927-1977 editor.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-34135-9">http://dx.doi.org/10.1007/978-3-642-34135-9</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Computer Safety, Reliability, and Security 30th International Conference,SAFECOMP 2011, Naples, Italy, September 19-22, 2011. Proceedingsent://SD_ILS/0/SD_ILS:1955862025-03-23T14:55:38Z2025-03-23T14:55:38ZYazar Flammini, Francesco. editor. Bologna, Sandro. editor. Vittorini, Valeria. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-24270-0">http://dx.doi.org/10.1007/978-3-642-24270-0</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Advances in Information and Computer Security 6th International Workshop, IWSEC 2011, Tokyo, Japan, November 8-10, 2011. Proceedingsent://SD_ILS/0/SD_ILS:1958562025-03-23T14:55:38Z2025-03-23T14:55:38ZYazar Iwata, Tetsu. editor. Nishigaki, Masakatsu. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-25141-2">http://dx.doi.org/10.1007/978-3-642-25141-2</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Advances in Information and Computer Security 5th International Workshop on Security, IWSEC 2010, Kobe, Japan, November 22-24, 2010. Proceedingsent://SD_ILS/0/SD_ILS:1934222025-03-23T14:55:38Z2025-03-23T14:55:38ZYazar Echizen, Isao. editor. Kunihiro, Noboru. editor. Sasaki, Ryoichi. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-16825-3">http://dx.doi.org/10.1007/978-3-642-16825-3</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Computer Safety, Reliability, and Security 29th International Conference, SAFECOMP 2010, Vienna, Austria, September 14-17, 2010. Proceedingsent://SD_ILS/0/SD_ILS:1930402025-03-23T14:55:38Z2025-03-23T14:55:38ZYazar Schoitsch, Erwin. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-15651-9">http://dx.doi.org/10.1007/978-3-642-15651-9</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Computer Security – ESORICS 2009 14th European Symposium on Research in Computer Security, Saint-Malo, France, September 21-23, 2009. Proceedingsent://SD_ILS/0/SD_ILS:1909502025-03-23T14:55:38Z2025-03-23T14:55:38ZYazar Backes, Michael. editor. Ning, Peng. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-04444-1">http://dx.doi.org/10.1007/978-3-642-04444-1</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Computer Safety, Reliability, and Security 28th International Conference, SAFECOMP 2009, Hamburg, Germany, September 15-18, 2009. Proceedingsent://SD_ILS/0/SD_ILS:1909602025-03-23T14:55:38Z2025-03-23T14:55:38ZYazar Buth, Bettina. editor. Rabe, Gerd. editor. Seyfarth, Till. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-04468-7">http://dx.doi.org/10.1007/978-3-642-04468-7</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Advances in Information and Computer Security 4th International Workshop on Security, IWSEC 2009 Toyama, Japan, October 28-30, 2009 Proceedingsent://SD_ILS/0/SD_ILS:1910782025-03-23T14:55:38Z2025-03-23T14:55:38ZYazar Takagi, Tsuyoshi. editor. Mambo, Masahiro. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-04846-3">http://dx.doi.org/10.1007/978-3-642-04846-3</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Advances in Computer Science - ASIAN 2009. Information Security and Privacy 13th Asian Computing Science Conference, Seoul, Korea, December 14-16, 2009. Proceedingsent://SD_ILS/0/SD_ILS:1914252025-03-23T14:55:38Z2025-03-23T14:55:38ZYazar Datta, Anupam. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-10622-4">http://dx.doi.org/10.1007/978-3-642-10622-4</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Computer Safety, Reliability, and Security 27th International Conference, SAFECOMP 2008 Newcastle upon Tyne, UK, September 22-25, 2008 Proceedingsent://SD_ILS/0/SD_ILS:1888942025-03-23T14:55:38Z2025-03-23T14:55:38ZYazar Harrison, Michael D. editor. Sujan, Mark-Alexander. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-540-87698-4">http://dx.doi.org/10.1007/978-3-540-87698-4</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Advances in Information and Computer Security Third International Workshop on Security, IWSEC 2008, Kagawa, Japan, November 25-27, 2008. Proceedingsent://SD_ILS/0/SD_ILS:1892942025-03-23T14:55:38Z2025-03-23T14:55:38ZYazar Matsuura, Kanta. editor. Fujisaki, Eiichiro. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-540-89598-5">http://dx.doi.org/10.1007/978-3-540-89598-5</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Proceedings of The Ifip Tc 11 23rd International Information Security Conference IFIP 20th World Computer Congress, IFIP SEC’08, September 7-10, 2008, Milano, Italyent://SD_ILS/0/SD_ILS:1647572025-03-23T14:55:38Z2025-03-23T14:55:38ZYazar Jajodia, Sushil. editor. Samarati, Pierangela. editor. Cimato, Stelvio. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-0-387-09699-5">http://dx.doi.org/10.1007/978-0-387-09699-5</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Computer Network Security Fourth International Conference on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2007 St. Petersburg, Russia, September 13–15, 2007 Proceedingsent://SD_ILS/0/SD_ILS:1870232025-03-23T14:55:38Z2025-03-23T14:55:38ZYazar Gorodetsky, Vladimir. editor. Kotenko, Igor. editor. Skormin, Victor A. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-540-73986-9">http://dx.doi.org/10.1007/978-3-540-73986-9</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Advances in Information and Computer Security Second International Workshop on Security, IWSEC 2007, Nara, Japan, October 29-31, 2007. Proceedingsent://SD_ILS/0/SD_ILS:1874672025-03-23T14:55:38Z2025-03-23T14:55:38ZYazar Miyaji, Atsuko. editor. Kikuchi, Hiroaki. editor. Rannenberg, Kai. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-540-75651-4">http://dx.doi.org/10.1007/978-3-540-75651-4</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Advances in Computer Science – ASIAN 2007. Computer and Network Security 12th Asian Computing Science Conference, Doha, Qatar, December 9-11, 2007. Proceedingsent://SD_ILS/0/SD_ILS:1877272025-03-23T14:55:38Z2025-03-23T14:55:38ZYazar Cervesato, Iliano. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-540-76929-3">http://dx.doi.org/10.1007/978-3-540-76929-3</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Digital watermarking and steganographyent://SD_ILS/0/SD_ILS:1464742025-03-23T14:55:38Z2025-03-23T14:55:38ZYazar Cox, I. J. (Ingemar J.)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780123725851">http://www.sciencedirect.com/science/book/9780123725851</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Cyber Security Intelligence and Analytics The 5th International Conference on Cyber Security Intelligence and Analytics (CSIA 2023), Volume 2ent://SD_ILS/0/SD_ILS:5268492025-03-23T14:55:38Z2025-03-23T14:55:38ZYazar Xu, Zheng. editor. Alrabaee, Saed. editor. Loyola-González, Octavio. editor. Cahyani, Niken Dwi Wahyu. editor. Ab Rahman, Nurul Hidayah. editor.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-031-31775-0">https://doi.org/10.1007/978-3-031-31775-0</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Soft Computing for Security Applications Proceedings of ICSCS 2022ent://SD_ILS/0/SD_ILS:5268832025-03-23T14:55:38Z2025-03-23T14:55:38ZYazar Ranganathan, G. editor. Fernando, Xavier. editor. Piramuthu, Selwyn. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-981-19-3590-9">https://doi.org/10.1007/978-981-19-3590-9</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Cybersecurity and Identity Access Managementent://SD_ILS/0/SD_ILS:5273742025-03-23T14:55:38Z2025-03-23T14:55:38ZYazar Rawal, Bharat S. author. Manogaran, Gunasekaran. author. Peter, Alexender. author. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-981-19-2658-7">https://doi.org/10.1007/978-981-19-2658-7</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Proceedings of International Conference on Recent Innovations in Computing ICRIC 2022, Volume 1ent://SD_ILS/0/SD_ILS:5290102025-03-23T14:55:38Z2025-03-23T14:55:38ZYazar Singh, Yashwant. editor. Singh, Pradeep Kumar. editor. Kolekar, Maheshkumar H. editor. Kar, Arpan Kumar. editor. Gonçalves, Paulo J. Sequeira. editor.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-981-19-9876-8">https://doi.org/10.1007/978-981-19-9876-8</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Soft Computing for Security Applications Proceedings of ICSCS 2023ent://SD_ILS/0/SD_ILS:5290212025-03-23T14:55:38Z2025-03-23T14:55:38ZYazar Ranganathan, G. editor. EL Allioui, Youssouf. editor. Piramuthu, Selwyn. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-981-99-3608-3">https://doi.org/10.1007/978-981-99-3608-3</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Privacy Symposium 2023 Data Protection Law International Convergence and Compliance with Innovative Technologies (DPLICIT)ent://SD_ILS/0/SD_ILS:5290552025-03-23T14:55:38Z2025-03-23T14:55:38ZYazar Schiffner, Stefan. editor. Ziegler, Sébastien. editor. (orcid)0000-0001-7255-4975 Jensen, Meiko. editor. (orcid)0009-0003-2397-9813 SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-031-44939-0">https://doi.org/10.1007/978-3-031-44939-0</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Proceedings of the Ninth International Conference on Mathematics and Computing ICMC 2023ent://SD_ILS/0/SD_ILS:5284152025-03-23T14:55:38Z2025-03-23T14:55:38ZYazar Giri, Debasis. editor. Gollmann, Dieter. editor. Ponnusamy, S. editor. Kouichi, Sakurai. editor. Stanimirović, Predrag S. editor.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-981-99-3080-7">https://doi.org/10.1007/978-981-99-3080-7</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Intelligent Computing and Applications Proceedings of ICDIC 2020ent://SD_ILS/0/SD_ILS:5286782025-03-23T14:55:38Z2025-03-23T14:55:38ZYazar Rao, B. Narendra Kumar. editor. Balasubramanian, R. editor. Wang, Shiuh-Jeng. editor. Nayak, Richi. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-981-19-4162-7">https://doi.org/10.1007/978-981-19-4162-7</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Emerging Trends in Expert Applications and Security Proceedings of 2nd ICETEAS 2023, Volume 1ent://SD_ILS/0/SD_ILS:5291132025-03-23T14:55:38Z2025-03-23T14:55:38ZYazar Rathore, Vijay Singh. editor. Tavares, João Manuel R. S. editor. Piuri, Vincenzo. editor. Surendiran, B. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-981-99-1909-3">https://doi.org/10.1007/978-981-99-1909-3</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Global cyber security labor shortage and international business riskent://SD_ILS/0/SD_ILS:4818102025-03-23T14:55:38Z2025-03-23T14:55:38ZYazar Christiansen, Bryan, 1960- editor. Piekarz, Agnieszka, 1990- editor. IGI Global, publisher.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-5927-6">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-5927-6</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Resilience of Cyber-Physical Systems From Risk Modelling to Threat Counteractionent://SD_ILS/0/SD_ILS:4835932025-03-23T14:55:38Z2025-03-23T14:55:38ZYazar Flammini, Francesco. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-319-95597-1">https://doi.org/10.1007/978-3-319-95597-1</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Frontiers in Cyber Security Second International Conference, FCS 2019, Xi'an, China, November 15–17, 2019, Proceedingsent://SD_ILS/0/SD_ILS:4860192025-03-23T14:55:38Z2025-03-23T14:55:38ZYazar Shen, Bazhong. editor. Wang, Baocang. editor. (orcid)0000-0002-2554-4464 Han, Jinguang. editor. (orcid)0000-0002-4993-9452 Yu, Yong. editor. (orcid)0000-0003-0667-077X SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-981-15-0818-9">https://doi.org/10.1007/978-981-15-0818-9</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Critical Infrastructure Protection XIII 13th IFIP WG 11.10 International Conference, ICCIP 2019, Arlington, VA, USA, March 11–12, 2019, Revised Selected Papersent://SD_ILS/0/SD_ILS:4869392025-03-23T14:55:38Z2025-03-23T14:55:38ZYazar Staggs, Jason. editor. Shenoi, Sujeet. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-030-34647-8">https://doi.org/10.1007/978-3-030-34647-8</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Advanced methodologies and technologies in system security, information privacy, and forensicsent://SD_ILS/0/SD_ILS:4820092025-03-23T14:55:38Z2025-03-23T14:55:38ZYazar Khosrow-Pour, Mehdi, 1951- editor. IGI Global, publisher.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-7492-7">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-7492-7</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Network security and its impact on business strategyent://SD_ILS/0/SD_ILS:4822132025-03-23T14:55:38Z2025-03-23T14:55:38ZYazar Oncioiu, Ionica, 1972- editor. IGI Global, publisher.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-8455-1">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-8455-1</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Cyber law, privacy, and security : concepts, methodologies, tools, and applicationsent://SD_ILS/0/SD_ILS:4822392025-03-23T14:55:38Z2025-03-23T14:55:38ZYazar IGI Global, publisher. Information Resources Management Association, editor.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-8897-9">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-8897-9</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Information Security Practice and Experience 15th International Conference, ISPEC 2019, Kuala Lumpur, Malaysia, November 26–28, 2019, Proceedingsent://SD_ILS/0/SD_ILS:4830992025-03-23T14:55:38Z2025-03-23T14:55:38ZYazar Heng, Swee-Huay. editor. (orcid)0000-0003-3627-2131 Lopez, Javier. editor. (orcid)0000-0001-8066-9991 SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-030-34339-2">https://doi.org/10.1007/978-3-030-34339-2</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Applications and Techniques in Information Security 10th International Conference, ATIS 2019, Thanjavur, India, November 22–24, 2019, Proceedingsent://SD_ILS/0/SD_ILS:4835762025-03-23T14:55:38Z2025-03-23T14:55:38ZYazar Shankar Sriram, V. S. editor. (orcid)0000-0001-7870-7944 Subramaniyaswamy, V. editor. Sasikaladevi, N. editor. (orcid)0000-0002-0841-502X Zhang, Leo. editor. Batten, Lynn. editor. (orcid)0000-0003-4525-2423<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-981-15-0871-4">https://doi.org/10.1007/978-981-15-0871-4</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Critical Infrastructure Security and Resilience Theories, Methods, Tools and Technologiesent://SD_ILS/0/SD_ILS:4842752025-03-23T14:55:38Z2025-03-23T14:55:38ZYazar Gritzalis, Dimitris. editor. Theocharidou, Marianthi. editor. (orcid)0000-0002-8870-1746 Stergiopoulos, George. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-030-00024-0">https://doi.org/10.1007/978-3-030-00024-0</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Research and Practical Issues of Enterprise Information Systems 12th IFIP WG 8.9 Working Conference, CONFENIS 2018, Held at the 24th IFIP World Computer Congress, WCC 2018, Poznan, Poland, September 18–19, 2018, Proceedingsent://SD_ILS/0/SD_ILS:3996942025-03-23T14:55:38Z2025-03-23T14:55:38ZYazar Tjoa, A Min. editor. (orcid)0000-0002-8295-9252 Raffai, Maria. editor. (orcid)0000-0001-6934-6366 Doucek, Petr. editor. (orcid)0000-0002-5647-661X Novak, Niina Maarit. editor. (orcid)0000-0003-4352-7534 SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-319-99040-8">https://doi.org/10.1007/978-3-319-99040-8</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Cloud Computing, Security, Privacy in New Computing Environments 7th International Conference, CloudComp 2016, and First International Conference, SPNCE 2016, Guangzhou, China, November 25–26, and December 15–16, 2016, Proceedingsent://SD_ILS/0/SD_ILS:4005082025-03-23T14:55:38Z2025-03-23T14:55:38ZYazar Wan, Jiafu. editor. Lin, Kai. editor. Zeng, Delu. editor. Li, Jin. editor. Xiang, Yang. editor.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-319-69605-8">https://doi.org/10.1007/978-3-319-69605-8</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Security and Privacy in Communication Networks 13th International Conference, SecureComm 2017, Niagara Falls, ON, Canada, October 22–25, 2017, Proceedingsent://SD_ILS/0/SD_ILS:4009492025-03-23T14:55:38Z2025-03-23T14:55:38ZYazar Lin, Xiaodong. editor. Ghorbani, Ali. editor. Ren, Kui. editor. Zhu, Sencun. editor. Zhang, Aiqing. editor.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-319-78813-5">https://doi.org/10.1007/978-3-319-78813-5</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Trust Management XII 12th IFIP WG 11.11 International Conference, IFIPTM 2018, Toronto, ON, Canada, July 10–13, 2018, Proceedingsent://SD_ILS/0/SD_ILS:4020072025-03-23T14:55:38Z2025-03-23T14:55:38ZYazar Gal-Oz, Nurit. editor. Lewis, Peter R. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-319-95276-5">https://doi.org/10.1007/978-3-319-95276-5</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Foundations and Practice of Security 10th International Symposium, FPS 2017, Nancy, France, October 23-25, 2017, Revised Selected Papersent://SD_ILS/0/SD_ILS:4020172025-03-23T14:55:38Z2025-03-23T14:55:38ZYazar Imine, Abdessamad. editor. Fernandez, José M. editor. (orcid)0000-0001-9836-3595 Marion, Jean-Yves. editor. Logrippo, Luigi. editor. (orcid)0000-0001-8804-0450 Garcia-Alfaro, Joaquin. editor. (orcid)0000-0002-7453-4393<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-319-75650-9">https://doi.org/10.1007/978-3-319-75650-9</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Introduction to Security Reductionent://SD_ILS/0/SD_ILS:3992112025-03-23T14:55:38Z2025-03-23T14:55:38ZYazar Guo, Fuchun. author. Susilo, Willy. author. (orcid)0000-0002-1562-5105 Mu, Yi. author. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-319-93049-7">https://doi.org/10.1007/978-3-319-93049-7</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Honeypot Frameworks and Their Applications: A New Frameworkent://SD_ILS/0/SD_ILS:3992502025-03-23T14:55:38Z2025-03-23T14:55:38ZYazar NG, Chee Keong. author. Pan, Lei. author. Xiang, Yang. author. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-981-10-7739-5">https://doi.org/10.1007/978-981-10-7739-5</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Advanced Monitoring in P2P Botnets A Dual Perspectiveent://SD_ILS/0/SD_ILS:4007672025-03-23T14:55:38Z2025-03-23T14:55:38ZYazar Karuppayah, Shankar. author. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-981-10-9050-9">https://doi.org/10.1007/978-981-10-9050-9</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Security and Privacy in Communication Networks SecureComm 2017 International Workshops, ATCS and SePrIoT, Niagara Falls, ON, Canada, October 22–25, 2017, Proceedingsent://SD_ILS/0/SD_ILS:4008462025-03-23T14:55:38Z2025-03-23T14:55:38ZYazar Lin, Xiaodong. editor. Ghorbani, Ali. editor. Ren, Kui. editor. Zhu, Sencun. editor. Zhang, Aiqing. editor.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-319-78816-6">https://doi.org/10.1007/978-3-319-78816-6</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Mobile Internet Security First International Symposium, MobiSec 2016, Taichung, Taiwan, July 14-15, 2016, Revised Selected Papersent://SD_ILS/0/SD_ILS:4010002025-03-23T14:55:38Z2025-03-23T14:55:38ZYazar You, Ilsun. editor. Leu, Fang-Yie. editor. Chen, Hsing-Chung. editor. Kotenko, Igor. editor. (orcid)0000-0001-6859-7120 SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-981-10-7850-7">https://doi.org/10.1007/978-981-10-7850-7</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Privacy and Identity Management. The Smart Revolution 12th IFIP WG 9.2, 9.5, 9.6/11.7, 11.6/SIG 9.2.2 International Summer School, Ispra, Italy, September 4-8, 2017, Revised Selected Papersent://SD_ILS/0/SD_ILS:4014912025-03-23T14:55:38Z2025-03-23T14:55:38ZYazar Hansen, Marit. editor. Kosta, Eleni. editor. Nai-Fovino, Igor. editor. Fischer-Hübner, Simone. editor. (orcid)0000-0002-6938-4466 SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-319-92925-5">https://doi.org/10.1007/978-3-319-92925-5</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Future Network Systems and Security 4th International Conference, FNSS 2018, Paris, France, July 9–11, 2018, Proceedingsent://SD_ILS/0/SD_ILS:4017342025-03-23T14:55:38Z2025-03-23T14:55:38ZYazar Doss, Robin. editor. (orcid)0000-0001-6143-6850 Piramuthu, Selwyn. editor. Zhou, Wei. editor. (orcid)0000-0002-9965-9870 SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-319-94421-0">https://doi.org/10.1007/978-3-319-94421-0</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Digital Forensics and Cyber Crime 9th International Conference, ICDF2C 2017, Prague, Czech Republic, October 9-11, 2017, Proceedingsent://SD_ILS/0/SD_ILS:4019482025-03-23T14:55:38Z2025-03-23T14:55:38ZYazar Matoušek, Petr. editor. Schmiedecker, Martin. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-319-73697-6">https://doi.org/10.1007/978-3-319-73697-6</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Advanced Hybrid Information Processing First International Conference, ADHIP 2017, Harbin, China, July 17–18, 2017, Proceedingsent://SD_ILS/0/SD_ILS:4022052025-03-23T14:55:38Z2025-03-23T14:55:38ZYazar Sun, Guanglu. editor. Liu, Shuai. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-319-73317-3">https://doi.org/10.1007/978-3-319-73317-3</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Introductory Computer Forensics A Hands-on Practical Approachent://SD_ILS/0/SD_ILS:3989662025-03-23T14:55:38Z2025-03-23T14:55:38ZYazar Lin, Xiaodong. author. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-030-00581-8">https://doi.org/10.1007/978-3-030-00581-8</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Network Intrusion Detection using Deep Learning A Feature Learning Approachent://SD_ILS/0/SD_ILS:3998592025-03-23T14:55:38Z2025-03-23T14:55:38ZYazar Kim, Kwangjo. author. Aminanto, Muhamad Erza. author. Tanuwidjaja, Harry Chandra. author. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-981-13-1444-5">https://doi.org/10.1007/978-981-13-1444-5</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Versatile Cybersecurityent://SD_ILS/0/SD_ILS:3999742025-03-23T14:55:38Z2025-03-23T14:55:38ZYazar Conti, Mauro. editor. (orcid)0000-0002-3612-1934 Somani, Gaurav. editor. Poovendran, Radha. editor. (orcid)0000-0003-0269-8097 SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-319-97643-3">https://doi.org/10.1007/978-3-319-97643-3</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Critical Infrastructure Protection XII 12th IFIP WG 11.10 International Conference, ICCIP 2018, Arlington, VA, USA, March 12-14, 2018, Revised Selected Papersent://SD_ILS/0/SD_ILS:4001262025-03-23T14:55:38Z2025-03-23T14:55:38ZYazar Staggs, Jason. editor. Shenoi, Sujeet. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-030-04537-1">https://doi.org/10.1007/978-3-030-04537-1</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Mobile data loss : threats and countermeasuresent://SD_ILS/0/SD_ILS:4587292025-03-23T14:55:38Z2025-03-23T14:55:38ZYazar Raggo, Michael T.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="https://www.sciencedirect.com/science/book/9780128028643">https://www.sciencedirect.com/science/book/9780128028643</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Measuring and managing information risk : a FAIR approachent://SD_ILS/0/SD_ILS:3555762025-03-23T14:55:38Z2025-03-23T14:55:38ZYazar Freund, Jack, author. Jones, Jack, author.<br/>Yer Numarası ONLINE(355576.1)<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780124202313">http://www.sciencedirect.com/science/book/9780124202313</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Trusted Computing for Embedded Systemsent://SD_ILS/0/SD_ILS:5301492025-03-23T14:55:38Z2025-03-23T14:55:38ZYazar Candaele, Bernard. editor. Soudris, Dimitrios. editor. Anagnostopoulos, Iraklis. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-319-09420-5">https://doi.org/10.1007/978-3-319-09420-5</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Unauthorized access the crisis in online privacy and securityent://SD_ILS/0/SD_ILS:2853212025-03-23T14:55:38Z2025-03-23T14:55:38ZYazar Sloan, Robert H. Warner, Richard, 1946-<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://marc.crcnetbase.com/isbn/9781439830147">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Information security fundamentalsent://SD_ILS/0/SD_ILS:3425842025-03-23T14:55:38Z2025-03-23T14:55:38ZYazar Peltier, Thomas R., author.<br/>Yer Numarası ONLINE(342584.1)<br/>Elektronik Erişim <a href="http://marc.crcnetbase.com/isbn/9781439810637">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Anonymous communication networks : protecting privacy on the webent://SD_ILS/0/SD_ILS:3566572025-03-23T14:55:38Z2025-03-23T14:55:38ZYazar Peng, Kun, author.<br/>Yer Numarası ONLINE(356657.1)<br/>Elektronik Erişim <a href="http://marc.crcnetbase.com/isbn/9781439881606">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Information protection playbookent://SD_ILS/0/SD_ILS:3066492025-03-23T14:55:38Z2025-03-23T14:55:38ZYazar Kane, Greg, editor of compilation. Koppel, Lorna, editor of compilation.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780124172326">http://www.sciencedirect.com/science/book/9780124172326</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>PRAGMATIC security metrics applying metametrics to information securityent://SD_ILS/0/SD_ILS:2899742025-03-23T14:55:38Z2025-03-23T14:55:38ZYazar Brotby, W. Krag. Hinson, Gary. Kabay, Michel E.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://marc.crcnetbase.com/isbn/9781439881538">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Information security policy development for compliance ISO/IEC 27001, NIST SP 800-53, HIPAA standard, PCI DSS V2.0, and AUP V5.0ent://SD_ILS/0/SD_ILS:2881732025-03-23T14:55:38Z2025-03-23T14:55:38ZYazar Williams, Barry L.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://marc.crcnetbase.com/isbn/9781466580596">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>The complete book of data anonymization from planning to implementationent://SD_ILS/0/SD_ILS:2890652025-03-23T14:55:38Z2025-03-23T14:55:38ZYazar Raghunathan, Balaji.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://marc.crcnetbase.com/isbn/9781439877319">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Data hiding exposing concealed data in multimedia, operating systems, mobile devices and network protocolsent://SD_ILS/0/SD_ILS:1476022025-03-23T14:55:38Z2025-03-23T14:55:38ZYazar Raggo, Michael T. Hosmer, Chet.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597497435">http://www.sciencedirect.com/science/book/9781597497435</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Information security risk assessment toolkit practical assessments through data collection and data analysisent://SD_ILS/0/SD_ILS:1454702025-03-23T14:55:38Z2025-03-23T14:55:38ZYazar Talabis, Mark. Martin, Jason.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597497350">http://www.sciencedirect.com/science/book/9781597497350</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>IT auditing using controls to protect information assetsent://SD_ILS/0/SD_ILS:2932622025-03-23T14:55:38Z2025-03-23T14:55:38ZYazar Davis, Chris (Christopher Michael) Schiller, Mike. Wheeler, Kevin.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://mhebooklibrary.com/reader/auditing-using-controls-to-protect-information-assets-2nd-edition">Subscription required</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Practical risk management for the CIOent://SD_ILS/0/SD_ILS:2915712025-03-23T14:55:38Z2025-03-23T14:55:38ZYazar Scherling, Mark.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://marc.crcnetbase.com/isbn/9781439856543">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Auditing cloud computing a security and privacy guideent://SD_ILS/0/SD_ILS:2992632025-03-23T14:55:38Z2025-03-23T14:55:38ZYazar Halpert, Ben, 1986-<br/>Yer Numarası ONLINE<br/>Elektronik Erişim Image <a href="http://images.contentreserve.com/ImageType-100/0128-1/{F889EE2A-CF12-4647-85E0-03258F227FC1}Img100.jpg">http://images.contentreserve.com/ImageType-100/0128-1/{F889EE2A-CF12-4647-85E0-03258F227FC1}Img100.jpg</a>
Books24x7 <a href="http://www.books24x7.com/marc.asp?bookid=44303">http://www.books24x7.com/marc.asp?bookid=44303</a>
John Wiley <a href="http://dx.doi.org/10.1002/9781118269091">http://dx.doi.org/10.1002/9781118269091</a>
OverDrive (PDF) <a href="http://www.contentreserve.com/TitleInfo.asp?ID={F889EE2A-CF12-4647-85E0-03258F227FC1}&Format=50">http://www.contentreserve.com/TitleInfo.asp?ID={F889EE2A-CF12-4647-85E0-03258F227FC1}&Format=50</a>
OverDrive (EPUB) <a href="http://www.contentreserve.com/TitleInfo.asp?ID={F889EE2A-CF12-4647-85E0-03258F227FC1}&Format=410">http://www.contentreserve.com/TitleInfo.asp?ID={F889EE2A-CF12-4647-85E0-03258F227FC1}&Format=410</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Engineering information security the application of systems engineering concepts to achieve information assuranceent://SD_ILS/0/SD_ILS:2499162025-03-23T14:55:38Z2025-03-23T14:55:38ZYazar Jacobs, Stuart.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim IEEE Xplore <a href="http://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=6047604">http://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=6047604</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Security de-engineering solving the problems in information risk managementent://SD_ILS/0/SD_ILS:2862092025-03-23T14:55:38Z2025-03-23T14:55:38ZYazar Tibble, Ian.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://marc.crcnetbase.com/isbn/9781439868355">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Security strategy from requirements to realityent://SD_ILS/0/SD_ILS:2888512025-03-23T14:55:38Z2025-03-23T14:55:38ZYazar Stackpole, Bill. Oksendahl, Eric.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://marc.crcnetbase.com/isbn/9781439827345">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>The security risk assessment handbook a complete guide for performing security risk assessmentsent://SD_ILS/0/SD_ILS:2888902025-03-23T14:55:38Z2025-03-23T14:55:38ZYazar Landoll, Douglas J.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://marc.crcnetbase.com/isbn/9781439821497">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Security in computingent://SD_ILS/0/SD_ILS:3132972025-03-23T14:55:38Z2025-03-23T14:55:38ZYazar Pfleeger, Charles P., 1948-<br/>Yer Numarası QA76.9 A25 P45 2011<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>The executive MBA in information securityent://SD_ILS/0/SD_ILS:2869312025-03-23T14:55:38Z2025-03-23T14:55:38ZYazar Trinckes, John J.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://marc.crcnetbase.com/isbn/9781439810088">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Information technology risk management in enterprise environments a review of industry practices and a practical guide to risk management teamsent://SD_ILS/0/SD_ILS:2978622025-03-23T14:55:38Z2025-03-23T14:55:38ZYazar Kouns, Jake. Minoli, Daniel, 1952- Wiley InterScience (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim John Wiley <a href="http://dx.doi.org/10.1002/9780470558133">http://dx.doi.org/10.1002/9780470558133</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Information security governance a practical development and implementation approachent://SD_ILS/0/SD_ILS:2977432025-03-23T14:55:38Z2025-03-23T14:55:38ZYazar Brotby, W. Krag.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim Ebook Library <a href="http://public.eblib.com/EBLPublic/PublicView.do?ptiID=433807">http://public.eblib.com/EBLPublic/PublicView.do?ptiID=433807</a>
John Wiley <a href="http://dx.doi.org/10.1002/9780470476017">http://dx.doi.org/10.1002/9780470476017</a>
<a href="http://site.ebrary.com/lib/alltitles/Doc?id=10313652">http://site.ebrary.com/lib/alltitles/Doc?id=10313652</a>
<a href="http://swb.eblib.com/patron/FullRecord.aspx?p=433807">http://swb.eblib.com/patron/FullRecord.aspx?p=433807</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Data protection governance, risk management, and complianceent://SD_ILS/0/SD_ILS:2897002025-03-23T14:55:38Z2025-03-23T14:55:38ZYazar Hill, David G. (David Gary), 1943-<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://marc.crcnetbase.com/isbn/9781439806937">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Information security management metrics a definitive guide to effective security monitoring and measurementent://SD_ILS/0/SD_ILS:2913732025-03-23T14:55:38Z2025-03-23T14:55:38ZYazar Brotby, W. Krag.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://marc.crcnetbase.com/isbn/9781420052862">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Information warfareent://SD_ILS/0/SD_ILS:3040692025-03-23T14:55:38Z2025-03-23T14:55:38ZYazar Ventre, Daniel.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim John Wiley <a href="http://dx.doi.org/10.1002/9781118381533">http://dx.doi.org/10.1002/9781118381533</a>
<a href="http://lib.myilibrary.com?id=477736">http://lib.myilibrary.com?id=477736</a>
OverDrive (PDF) <a href="http://www.contentreserve.com/TitleInfo.asp?ID={02D73229-3728-4EE5-942B-28D4B82AED18}&Format=50">http://www.contentreserve.com/TitleInfo.asp?ID={02D73229-3728-4EE5-942B-28D4B82AED18}&Format=50</a>
OverDrive (EPUB) <a href="http://www.contentreserve.com/TitleInfo.asp?ID={02D73229-3728-4EE5-942B-28D4B82AED18}&Format=410">http://www.contentreserve.com/TitleInfo.asp?ID={02D73229-3728-4EE5-942B-28D4B82AED18}&Format=410</a>
OverDrive (READ) <a href="http://www.contentreserve.com/TitleInfo.asp?ID={02D73229-3728-4EE5-942B-28D4B82AED18}&Format=610">http://www.contentreserve.com/TitleInfo.asp?ID={02D73229-3728-4EE5-942B-28D4B82AED18}&Format=610</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>CISO soft skills securing organizations impaired by employee politics, apathy, and intolerant perspectivesent://SD_ILS/0/SD_ILS:2887442025-03-23T14:55:38Z2025-03-23T14:55:38ZYazar Collette, Ronald D. Gentile, Michael. Gentile, Skye.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://marc.crcnetbase.com/isbn/9781420089110">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Information assurance architectureent://SD_ILS/0/SD_ILS:2911232025-03-23T14:55:38Z2025-03-23T14:55:38ZYazar Willett, Keith D.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://marc.crcnetbase.com/isbn/9780849380686">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Netcat power toolsent://SD_ILS/0/SD_ILS:1462772025-03-23T14:55:38Z2025-03-23T14:55:38ZYazar Kanclirz, Jan. Baskin, Brian.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492577">http://www.sciencedirect.com/science/book/9781597492577</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Infosecurity 2008 threat analysisent://SD_ILS/0/SD_ILS:1455412025-03-23T14:55:38Z2025-03-23T14:55:38ZYazar Clark, Champ, III.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492249">http://www.sciencedirect.com/science/book/9781597492249</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Information security design, implementation, measurement, and complianceent://SD_ILS/0/SD_ILS:2884902025-03-23T14:55:38Z2025-03-23T14:55:38ZYazar Layton, Timothy P.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://marc.crcnetbase.com/isbn/9781420013412">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>FISMA certification & accreditation handbookent://SD_ILS/0/SD_ILS:1458762025-03-23T14:55:38Z2025-03-23T14:55:38ZYazar Taylor, Laura. Shepherd, Matthew.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491167">http://www.sciencedirect.com/science/book/9781597491167</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>FISMA certification & accreditation handbookent://SD_ILS/0/SD_ILS:1121692025-03-23T14:55:38Z2025-03-23T14:55:38ZYazar Taylor, Laura. Shepherd, Matthew. ScienceDirect (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491167">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Security in computingent://SD_ILS/0/SD_ILS:1106822025-03-23T14:55:38Z2025-03-23T14:55:38ZYazar Pfleeger, Charles P., 1948-<br/>Yer Numarası QA76.9.A25 P45 2007<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>The security risk assessment handbook a complete guide for performing security risk assessmentsent://SD_ILS/0/SD_ILS:2847902025-03-23T14:55:38Z2025-03-23T14:55:38ZYazar Landoll, Douglas J.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://marc.crcnetbase.com/isbn/9781420031232">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Insider threat protecting the enterprise from sabotage, spying, and theftent://SD_ILS/0/SD_ILS:2536612025-03-23T14:55:38Z2025-03-23T14:55:38ZYazar Cole, Eric. Ring, Sandra.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim Volltext <a href="http://www.sciencedirect.com/science/book/9781597490481">http://www.sciencedirect.com/science/book/9781597490481</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>The CISO handbook a practical guide to securing your companyent://SD_ILS/0/SD_ILS:2904162025-03-23T14:55:38Z2025-03-23T14:55:38ZYazar Gentile, Michael. Collette, Ronald D. August, Thomas D.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://marc.crcnetbase.com/isbn/9781420031379">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Intrusion prevention and active response deploying network and host IPSent://SD_ILS/0/SD_ILS:2540172025-03-23T14:55:38Z2025-03-23T14:55:38ZYazar Rash, Michael (Michael Brandon)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781932266474">http://www.sciencedirect.com/science/book/9781932266474</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Assessing and managing security risk in IT systems a structured methodologyent://SD_ILS/0/SD_ILS:2854882025-03-23T14:55:38Z2025-03-23T14:55:38ZYazar McCumber, John, 1956-<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://marc.crcnetbase.com/isbn/9780203490426">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Information security fundamentalsent://SD_ILS/0/SD_ILS:2891552025-03-23T14:55:38Z2025-03-23T14:55:38ZYazar Peltier, Thomas R. Peltier, Justin. Blackley, John A.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://marc.crcnetbase.com/isbn/9780203488652">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Implementing database security and auditing a guide for DBAs, information security administrators and auditorsent://SD_ILS/0/SD_ILS:2538602025-03-23T14:55:38Z2025-03-23T14:55:38ZYazar Ben-Natan, Ron.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781555583347">http://www.sciencedirect.com/science/book/9781555583347</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>A practical guide to security assessmentsent://SD_ILS/0/SD_ILS:2883062025-03-23T14:55:38Z2025-03-23T14:55:38ZYazar Kairab, Sudhanshu.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://marc.crcnetbase.com/isbn/9780203507230">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Information security policies and procedures a practitioner's referenceent://SD_ILS/0/SD_ILS:2901372025-03-23T14:55:38Z2025-03-23T14:55:38ZYazar Peltier, Thomas R.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://marc.crcnetbase.com/isbn/9780203488737">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Investigator's guide to steganographyent://SD_ILS/0/SD_ILS:2864022025-03-23T14:55:38Z2025-03-23T14:55:38ZYazar Kipper, Gregory.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://marc.crcnetbase.com/isbn/9780203504765">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Surviving security how to integrate people, process, and technologyent://SD_ILS/0/SD_ILS:2845832025-03-23T14:55:38Z2025-03-23T14:55:38ZYazar Andress, Amanda.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://marc.crcnetbase.com/isbn/9780203501405">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Building a global information assurance programent://SD_ILS/0/SD_ILS:2874732025-03-23T14:55:38Z2025-03-23T14:55:38ZYazar Curts, Raymond J. Campbell, Douglas E., 1954-<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://marc.crcnetbase.com/isbn/9780203997550">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Information security policies, procedures, and standards guidelines for effective information security managementent://SD_ILS/0/SD_ILS:2902092025-03-23T14:55:38Z2025-03-23T14:55:38ZYazar Peltier, Thomas R.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://marc.crcnetbase.com/isbn/9780849390326">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>A practical guide to security engineering and information assuranceent://SD_ILS/0/SD_ILS:2904612025-03-23T14:55:38Z2025-03-23T14:55:38ZYazar Herrmann, Debra S.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://marc.crcnetbase.com/isbn/9781420031492">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Digital watermarkingent://SD_ILS/0/SD_ILS:2538892025-03-23T14:55:38Z2025-03-23T14:55:38ZYazar Cox, I. J. (Ingemar J.) Miller, Matthew L. Bloom, Jeffrey A. (Jeffrey Adam), 1964-<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781558607149">http://www.sciencedirect.com/science/book/9781558607149</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Technology and privacy : the new landscapeent://SD_ILS/0/SD_ILS:1129992025-03-23T14:55:38Z2025-03-23T14:55:38ZYazar Agre, Philip. Rotenberg, Marc.<br/>Yer Numarası QA76.9.A25 T43 2001<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>Data privacy in the information ageent://SD_ILS/0/SD_ILS:1351252025-03-23T14:55:38Z2025-03-23T14:55:38ZYazar Klosek, Jacqueline.<br/>Yer Numarası QA76.9.A25 K57 2000<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>