Arama Sonuçları Data protection. - Daraltılmış: 2007SirsiDynix Enterprisehttps://katalog.hacettepe.edu.tr/client/tr_TR/default_tr/default_tr/qu$003dData$002bprotection.$0026qf$003dPUBDATE$002509Yay$0025C4$0025B1n$002bY$0025C4$0025B1l$0025C4$0025B1$0025092007$0025092007$0026ic$003dtrue$0026ps$003d300$0026isd$003dtrue?2024-11-07T16:14:58ZE-privacy and online data protection : special reportent://SD_ILS/0/SD_ILS:3177262024-11-07T16:14:58Z2024-11-07T16:14:58ZYazar Singleton, Susan. Carey, Peter, LL. M. E-privacy and online data protection. Ustaran, Eduardo.<br/>Yer Numarası KD3756 C367 2007<br/>Format: Kitap<br/>Durum Hukuk Kütüphanesi~1<br/>European data protection law : corporate compliance and regulationent://SD_ILS/0/SD_ILS:1138102024-11-07T16:14:58Z2024-11-07T16:14:58ZYazar Kuner, Christopher. Kuner, Christopher. European data privacy law and online business.<br/>Yer Numarası KJE6071 .K86 2007<br/>Format: Kitap<br/>Durum Hukuk Kütüphanesi~2<br/>Digital data integrity the evolution from passive protection to active managementent://SD_ILS/0/SD_ILS:2967322024-11-07T16:14:58Z2024-11-07T16:14:58ZYazar Little, David B. Farmer, Skip. El-Hilali, Oussama.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim Books24x7 <a href="http://www.books24x7.com/marc.asp?bookid=20460">http://www.books24x7.com/marc.asp?bookid=20460</a>
John Wiley <a href="http://dx.doi.org/10.1002/9780470035184">http://dx.doi.org/10.1002/9780470035184</a>
MyiLibrary, Table of contents <a href="http://www.myilibrary.com?id=83896&ref=toc">http://www.myilibrary.com?id=83896&ref=toc</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Information security management handbookent://SD_ILS/0/SD_ILS:2891512024-11-07T16:14:58Z2024-11-07T16:14:58ZYazar Tipton, Harold F. Krause, Micki.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://marc.crcnetbase.com/isbn/9780203325438">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Information security management handbookent://SD_ILS/0/SD_ILS:2903202024-11-07T16:14:58Z2024-11-07T16:14:58ZYazar Tipton, Harold F. Krause, Micki.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://marc.crcnetbase.com/isbn/9781420003406">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Information security management handbookent://SD_ILS/0/SD_ILS:2871232024-11-07T16:14:58Z2024-11-07T16:14:58ZYazar Tipton, Harold F. Nozaki, Micki Krause.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://marc.crcnetbase.com/isbn/9781439893159">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Information security management handbookent://SD_ILS/0/SD_ILS:2907632024-11-07T16:14:58Z2024-11-07T16:14:58ZYazar Tipton, Harold F. Nozaki, Micki Krause.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://marc.crcnetbase.com/isbn/9781439853467">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Information security management handbookent://SD_ILS/0/SD_ILS:2897342024-11-07T16:14:58Z2024-11-07T16:14:58ZYazar Tipton, Harold F. Krause, Micki.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://marc.crcnetbase.com/isbn/9781420090956">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Power Analysis Attacks Revealing the Secrets of Smart Cardsent://SD_ILS/0/SD_ILS:1662302024-11-07T16:14:58Z2024-11-07T16:14:58ZYazar Mangard, Stefan. author. Oswald, Elisabeth. author. Popp, Thomas. author. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-0-387-38162-6">http://dx.doi.org/10.1007/978-0-387-38162-6</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Economics of Identity Theft: Avoidance, Causes and Possible Curesent://SD_ILS/0/SD_ILS:1666062024-11-07T16:14:58Z2024-11-07T16:14:58ZYazar Camp, L. Jean. author. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-0-387-68614-1">http://dx.doi.org/10.1007/978-0-387-68614-1</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Online Business Security Systemsent://SD_ILS/0/SD_ILS:1666412024-11-07T16:14:58Z2024-11-07T16:14:58ZYazar Williams, Godfried B. author. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-0-387-68850-3">http://dx.doi.org/10.1007/978-0-387-68850-3</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Critical Information Infrastructures Resilience and Protectionent://SD_ILS/0/SD_ILS:1668912024-11-07T16:14:58Z2024-11-07T16:14:58ZYazar Hyslop, Maitland. author. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-0-387-71862-0">http://dx.doi.org/10.1007/978-0-387-71862-0</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Trust Management Proceedings of IFIPTM 2007: Joint iTrust and PST Conferences on Privacy, Trust Management and Security, July 30– August 2, 2007, New Brunswick, Canadaent://SD_ILS/0/SD_ILS:1670722024-11-07T16:14:58Z2024-11-07T16:14:58ZYazar Etalle, Sandro. editor. Marsh, Stephen. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-0-387-73655-6">http://dx.doi.org/10.1007/978-0-387-73655-6</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Grid Computing Securityent://SD_ILS/0/SD_ILS:1847732024-11-07T16:14:58Z2024-11-07T16:14:58ZYazar Chakrabarti, Anirban. author. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-540-44493-0">http://dx.doi.org/10.1007/978-3-540-44493-0</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Intrusion Detection effektiv! Modellierung und Analyse von Angriffsmusternent://SD_ILS/0/SD_ILS:1850592024-11-07T16:14:58Z2024-11-07T16:14:58ZYazar Meier, Michael. author. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-540-48258-1">http://dx.doi.org/10.1007/978-3-540-48258-1</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Information Security Applications 7th International Workshop, WISA 2006, Jeju Island, Korea, August 28-30, 2006, Revised Selected Papersent://SD_ILS/0/SD_ILS:1861752024-11-07T16:14:58Z2024-11-07T16:14:58ZYazar Lee, Jae Kwang. editor. Yi, Okyeon. editor. Yung, Moti. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-540-71093-6">http://dx.doi.org/10.1007/978-3-540-71093-6</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Pervasive Computing 5th International Conference, PERVASIVE 2007, Toronto, Canada, May 13-16, 2007. Proceedingsent://SD_ILS/0/SD_ILS:1864372024-11-07T16:14:58Z2024-11-07T16:14:58ZYazar LaMarca, Anthony. editor. Langheinrich, Marc. editor. Truong, Khai N. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-540-72037-9">http://dx.doi.org/10.1007/978-3-540-72037-9</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Information Security Practice and Experience Third International Conference, ISPEC 2007, Hong Kong, China, May 7-9, 2007. Proceedingsent://SD_ILS/0/SD_ILS:1864612024-11-07T16:14:58Z2024-11-07T16:14:58ZYazar Dawson, Ed. editor. Wong, Duncan S. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-540-72163-5">http://dx.doi.org/10.1007/978-3-540-72163-5</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Trust, Privacy and Security in Digital Business 4th International Conference, TrustBus 2007, Regensburg, Germany, September 3-7, 2007. Proceedingsent://SD_ILS/0/SD_ILS:1871462024-11-07T16:14:58Z2024-11-07T16:14:58ZYazar Lambrinoudakis, Costas. editor. Pernul, Günther. editor. Tjoa, A Min. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-540-74409-2">http://dx.doi.org/10.1007/978-3-540-74409-2</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Selected Areas in Cryptography 13th International Workshop, SAC 2006, Montreal, Canada, August 17-18, 2006 Revised Selected Papersent://SD_ILS/0/SD_ILS:1871652024-11-07T16:14:58Z2024-11-07T16:14:58ZYazar Biham, Eli. editor. Youssef, Amr M. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-540-74462-7">http://dx.doi.org/10.1007/978-3-540-74462-7</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Network-Based Information Systems First International Conference, NBiS 2007, Regensburg, Germany, September 3-7, 2007. Proceedingsent://SD_ILS/0/SD_ILS:1872002024-11-07T16:14:58Z2024-11-07T16:14:58ZYazar Enokido, Tomoya. editor. Barolli, Leonard. editor. Takizawa, Makoto. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-540-74573-0">http://dx.doi.org/10.1007/978-3-540-74573-0</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>UbiComp 2007: Ubiquitous Computing 9th International Conference, UbiComp 2007, Innsbruck, Austria, September 16-19, 2007. Proceedingsent://SD_ILS/0/SD_ILS:1872892024-11-07T16:14:58Z2024-11-07T16:14:58ZYazar Krumm, John. editor. Abowd, Gregory D. editor. Seneviratne, Aruna. editor. Strang, Thomas. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-540-74853-3">http://dx.doi.org/10.1007/978-3-540-74853-3</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Dependable Computing Third Latin-American Symposium, LADC 2007, Morella, Mexico, September 26-28, 2007. Proceedingsent://SD_ILS/0/SD_ILS:1873892024-11-07T16:14:58Z2024-11-07T16:14:58ZYazar Bondavalli, Andrea. editor. Brasileiro, Francisco. editor. Rajsbaum, Sergio. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-540-75294-3">http://dx.doi.org/10.1007/978-3-540-75294-3</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Trustworthy Global Computing Second Symposium, TGC 2006, Lucca, Italy, November 7-9, 2006, Revised Selected Papersent://SD_ILS/0/SD_ILS:1873922024-11-07T16:14:58Z2024-11-07T16:14:58ZYazar Montanari, Ugo. editor. Sannella, Donald. editor. Bruni, Roberto. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-540-75336-0">http://dx.doi.org/10.1007/978-3-540-75336-0</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Privacy Enhancing Technologies 7th International Symposium, PET 2007 Ottawa, Canada, June 20-22, 2007 Revised Selected Papersent://SD_ILS/0/SD_ILS:1874462024-11-07T16:14:58Z2024-11-07T16:14:58ZYazar Borisov, Nikita. editor. Golle, Philippe. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-540-75551-7">http://dx.doi.org/10.1007/978-3-540-75551-7</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Advances in Information and Computer Security Second International Workshop on Security, IWSEC 2007, Nara, Japan, October 29-31, 2007. Proceedingsent://SD_ILS/0/SD_ILS:1874672024-11-07T16:14:58Z2024-11-07T16:14:58ZYazar Miyaji, Atsuko. editor. Kikuchi, Hiroaki. editor. Rannenberg, Kai. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-540-75651-4">http://dx.doi.org/10.1007/978-3-540-75651-4</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>E-business and Telecommunication Networks Second International Conference, ICETE 2005, Reading, UK, October 3-7, 2005. Selected Papersent://SD_ILS/0/SD_ILS:1875552024-11-07T16:14:58Z2024-11-07T16:14:58ZYazar Filipe, Joaquim. editor. Coelhas, Helder. editor. Saramago, Monica. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-540-75993-5">http://dx.doi.org/10.1007/978-3-540-75993-5</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Information Security and Cryptology - ICISC 2007 10th International Conference, Seoul, Korea, November 29-30, 2007. Proceedingsent://SD_ILS/0/SD_ILS:1876812024-11-07T16:14:58Z2024-11-07T16:14:58ZYazar Nam, Kil-Hyun. editor. Rhee, Gwangsoo. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-540-76788-6">http://dx.doi.org/10.1007/978-3-540-76788-6</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>On the Move to Meaningful Internet Systems 2007: CoopIS, DOA, ODBASE, GADA, and IS OTM Confederated International Conferences CoopIS, DOA, ODBASE, GADA, and IS 2007, Vilamoura, Portugal, November 25-30, 2007, Proceedings, Part IIent://SD_ILS/0/SD_ILS:1876992024-11-07T16:14:58Z2024-11-07T16:14:58ZYazar Meersman, Robert. editor. Tari, Zahir. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-540-76843-2">http://dx.doi.org/10.1007/978-3-540-76843-2</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>On the Move to Meaningful Internet Systems 2007: CoopIS, DOA, ODBASE, GADA, and IS OTM Confederated International Conferences CoopIS, DOA, ODBASE, GADA, and IS 2007, Vilamoura, Portugal, November 25-30, 2007, Proceedings, Part Ient://SD_ILS/0/SD_ILS:1877012024-11-07T16:14:58Z2024-11-07T16:14:58ZYazar Meersman, Robert. editor. Tari, Zahir. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-540-76848-7">http://dx.doi.org/10.1007/978-3-540-76848-7</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Advances in Cryptology – ASIACRYPT 2007 13th International Conference on the Theory and Application of Cryptology and Information Security, Kuching, Malaysia, December 2-6, 2007. Proceedingsent://SD_ILS/0/SD_ILS:1877202024-11-07T16:14:58Z2024-11-07T16:14:58ZYazar Kurosawa, Kaoru. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-540-76900-2">http://dx.doi.org/10.1007/978-3-540-76900-2</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Advances in Computer Science – ASIAN 2007. Computer and Network Security 12th Asian Computing Science Conference, Doha, Qatar, December 9-11, 2007. Proceedingsent://SD_ILS/0/SD_ILS:1877272024-11-07T16:14:58Z2024-11-07T16:14:58ZYazar Cervesato, Iliano. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-540-76929-3">http://dx.doi.org/10.1007/978-3-540-76929-3</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Cryptology and Network Security 6th International Conference, CANS 2007, Singapore, December 8-10, 2007. Proceedingsent://SD_ILS/0/SD_ILS:1877442024-11-07T16:14:58Z2024-11-07T16:14:58ZYazar Bao, Feng. editor. Ling, San. editor. Okamoto, Tatsuaki. editor. Wang, Huaxiong. editor. Xing, Chaoping. editor.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-540-76969-9">http://dx.doi.org/10.1007/978-3-540-76969-9</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Mobile Ad-Hoc and Sensor Networks Third International Conference, MSN 2007 Beijing, China, December 12-14, 2007 Proceedingsent://SD_ILS/0/SD_ILS:1877662024-11-07T16:14:58Z2024-11-07T16:14:58ZYazar Zhang, Hongke. editor. Olariu, Stephan. editor. Cao, Jiannong. editor. Johnson, David B. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-540-77024-4">http://dx.doi.org/10.1007/978-3-540-77024-4</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Progress in Cryptology – INDOCRYPT 2007 8th International Conference on Cryptology in India, Chennai, India, December 9-13, 2007. Proceedingsent://SD_ILS/0/SD_ILS:1877672024-11-07T16:14:58Z2024-11-07T16:14:58ZYazar Srinathan, K. editor. Rangan, C. Pandu. editor. Yung, Moti. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-540-77026-8">http://dx.doi.org/10.1007/978-3-540-77026-8</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Cryptography and Coding 11th IMA International Conference, Cirencester, UK, December 18-20, 2007. Proceedingsent://SD_ILS/0/SD_ILS:1878272024-11-07T16:14:58Z2024-11-07T16:14:58ZYazar Galbraith, Steven D. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-540-77272-9">http://dx.doi.org/10.1007/978-3-540-77272-9</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Selected Areas in Cryptography 14th International Workshop, SAC 2007, Ottawa, Canada, August 16-17, 2007, Revised Selected Papersent://SD_ILS/0/SD_ILS:1878512024-11-07T16:14:58Z2024-11-07T16:14:58ZYazar Adams, Carlisle. editor. Miri, Ali. editor. Wiener, Michael. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-540-77360-3">http://dx.doi.org/10.1007/978-3-540-77360-3</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Financial Cryptography and Data Security 11th International Conference, FC 2007, and 1st International Workshop on Usable Security, USEC 2007, Scarborough, Trinidad and Tobago, February 12-16, 2007. Revised Selected Papersent://SD_ILS/0/SD_ILS:1878542024-11-07T16:14:58Z2024-11-07T16:14:58ZYazar Dietrich, Sven. editor. Dhamija, Rachna. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-540-77366-5">http://dx.doi.org/10.1007/978-3-540-77366-5</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Information Hiding 9th International Workshop, IH 2007, Saint Malo, France, June 11-13, 2007, Revised Selected Papersent://SD_ILS/0/SD_ILS:1878562024-11-07T16:14:58Z2024-11-07T16:14:58ZYazar Furon, Teddy. editor. Cayre, François. editor. Doërr, Gwenaël. editor. Bas, Patrick. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-540-77370-2">http://dx.doi.org/10.1007/978-3-540-77370-2</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>PCI compliance implementing effective PCI data security standardsent://SD_ILS/0/SD_ILS:1481952024-11-07T16:14:58Z2024-11-07T16:14:58ZYazar Bradley, Tony, 1969-<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491655">http://www.sciencedirect.com/science/book/9781597491655</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Data Warehousing and Data Mining Techniques for Cyber Securityent://SD_ILS/0/SD_ILS:1663792024-11-07T16:14:58Z2024-11-07T16:14:58ZYazar Singhal, Anoop. author. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-0-387-47653-7">http://dx.doi.org/10.1007/978-0-387-47653-7</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Security, Privacy, and Trust in Modern Data Managementent://SD_ILS/0/SD_ILS:1859142024-11-07T16:14:58Z2024-11-07T16:14:58ZYazar Petković, Milan. editor. Jonker, Willem. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-540-69861-6">http://dx.doi.org/10.1007/978-3-540-69861-6</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Theory of Cryptography 4th Theory of Cryptography Conference, TCC 2007, Amsterdam, The Netherlands, February 21-24, 2007. Proceedingsent://SD_ILS/0/SD_ILS:1861072024-11-07T16:14:58Z2024-11-07T16:14:58ZYazar Vadhan, Salil P. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-540-70936-7">http://dx.doi.org/10.1007/978-3-540-70936-7</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Information security management handbookent://SD_ILS/0/SD_ILS:2851612024-11-07T16:14:58Z2024-11-07T16:14:58ZYazar Tipton, Harold F. Krause, Micki.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://marc.crcnetbase.com/isbn/9781439833032">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>AC power systems handbookent://SD_ILS/0/SD_ILS:2866012024-11-07T16:14:58Z2024-11-07T16:14:58ZYazar Whitaker, Jerry C.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://marc.crcnetbase.com/isbn/9781420005813">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Anti-Spam Measures Analysis and Designent://SD_ILS/0/SD_ILS:1863582024-11-07T16:14:58Z2024-11-07T16:14:58ZYazar Schryen, Guido. author. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-540-71750-8">http://dx.doi.org/10.1007/978-3-540-71750-8</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Introduction to Cryptography Principles and Applicationsent://SD_ILS/0/SD_ILS:1851852024-11-07T16:14:58Z2024-11-07T16:14:58ZYazar Delfs, Hans. author. Knebl, Helmut. author. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/3-540-49244-5">http://dx.doi.org/10.1007/3-540-49244-5</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Formal Correctness of Security Protocols With 62 Figures and 4 Tablesent://SD_ILS/0/SD_ILS:1853682024-11-07T16:14:58Z2024-11-07T16:14:58ZYazar Bella, Giampaolo. author. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-540-68136-6">http://dx.doi.org/10.1007/978-3-540-68136-6</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Information Security Theory and Practices. Smart Cards, Mobile and Ubiquitous Computing Systems First IFIP TC6 / WG 8.8 / WG 11.2 International Workshop, WISTP 2007, Heraklion, Crete, Greece, May 9-11, 2007. Proceedingsent://SD_ILS/0/SD_ILS:1865132024-11-07T16:14:58Z2024-11-07T16:14:58ZYazar Sauveron, Damien. editor. Markantonakis, Konstantinos. editor. Bilas, Angelos. editor. Quisquater, Jean-Jacques. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-540-72354-7">http://dx.doi.org/10.1007/978-3-540-72354-7</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Advances in Cryptology - EUROCRYPT 2007 26th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Barcelona, Spain, May 20-24, 2007. Proceedingsent://SD_ILS/0/SD_ILS:1865732024-11-07T16:14:58Z2024-11-07T16:14:58ZYazar Naor, Moni. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-540-72540-4">http://dx.doi.org/10.1007/978-3-540-72540-4</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Wired/Wireless Internet Communications 5th International Conference, WWIC 2007, Coimbra, Portugal, May 23-25, 2007. Proceedingsent://SD_ILS/0/SD_ILS:1866252024-11-07T16:14:58Z2024-11-07T16:14:58ZYazar Boavida, Fernando. editor. Monteiro, Edmundo. editor. Mascolo, Saverio. editor. Koucheryavy, Yevgeni. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-540-72697-5">http://dx.doi.org/10.1007/978-3-540-72697-5</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Applied Cryptography and Network Security 5th International Conference, ACNS 2007, Zhuhai, China, June 5-8, 2007. Proceedingsent://SD_ILS/0/SD_ILS:1866402024-11-07T16:14:58Z2024-11-07T16:14:58ZYazar Katz, Jonathan. editor. Yung, Moti. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-540-72738-5">http://dx.doi.org/10.1007/978-3-540-72738-5</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Transactions on Data Hiding and Multimedia Security IIent://SD_ILS/0/SD_ILS:1867392024-11-07T16:14:58Z2024-11-07T16:14:58ZYazar Shi, Yun Q. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-540-73092-7">http://dx.doi.org/10.1007/978-3-540-73092-7</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Security and Privacy in Ad-hoc and Sensor Networks 4th European Workshop, ESAS 2007, Cambridge, UK, July 2-3, 2007. Proceedingsent://SD_ILS/0/SD_ILS:1867982024-11-07T16:14:58Z2024-11-07T16:14:58ZYazar Stajano, Frank. editor. Meadows, Catherine. editor. Capkun, Srdjan. editor. Moore, Tyler. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-540-73275-4">http://dx.doi.org/10.1007/978-3-540-73275-4</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Information Security and Privacy 12th Australasian Conference, ACISP 2007, Townsville, Australia, July 2-4, 2007. Proceedingsent://SD_ILS/0/SD_ILS:1868592024-11-07T16:14:58Z2024-11-07T16:14:58ZYazar Pieprzyk, Josef. editor. Ghodosi, Hossein. editor. Dawson, Ed. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-540-73458-1">http://dx.doi.org/10.1007/978-3-540-73458-1</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Data and Applications Security XXI 21st Annual IFIP WG 11.3 Working Conference on Data and Applications Security, Redondo Beach, CA, USA, July 8-11, 2007. Proceedingsent://SD_ILS/0/SD_ILS:1868862024-11-07T16:14:58Z2024-11-07T16:14:58ZYazar Barker, Steve. editor. Ahn, Gail-Joon. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-540-73538-0">http://dx.doi.org/10.1007/978-3-540-73538-0</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Autonomic and Trusted Computing 4th International Conference, ATC 2007, Hong Kong, China, July 11-13, 2007. Proceedingsent://SD_ILS/0/SD_ILS:1868902024-11-07T16:14:58Z2024-11-07T16:14:58ZYazar Xiao, Bin. editor. Yang, Laurence T. editor. Ma, Jianhua. editor. Muller-Schloer, Christian. editor. Hua, Yu. editor.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-540-73547-2">http://dx.doi.org/10.1007/978-3-540-73547-2</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Ubiquitous Intelligence and Computing 4th International Conference, UIC 2007, Hong Kong, China, July 11-13, 2007. Proceedingsent://SD_ILS/0/SD_ILS:1868912024-11-07T16:14:58Z2024-11-07T16:14:58ZYazar Indulska, Jadwiga. editor. Ma, Jianhua. editor. Yang, Laurence T. editor. Ungerer, Theo. editor. Cao, Jiannong. editor.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-540-73549-6">http://dx.doi.org/10.1007/978-3-540-73549-6</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Detection of Intrusions and Malware, and Vulnerability Assessment 4th International Conference, DIMVA 2007 Lucerne, Switzerland, July 12-13, 2007 Proceedingsent://SD_ILS/0/SD_ILS:1869122024-11-07T16:14:58Z2024-11-07T16:14:58ZYazar Hämmerli, Bernhard. editor. Sommer, Robin. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-540-73614-1">http://dx.doi.org/10.1007/978-3-540-73614-1</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Computer Network Security Fourth International Conference on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2007 St. Petersburg, Russia, September 13–15, 2007 Proceedingsent://SD_ILS/0/SD_ILS:1870232024-11-07T16:14:58Z2024-11-07T16:14:58ZYazar Gorodetsky, Vladimir. editor. Kotenko, Igor. editor. Skormin, Victor A. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-540-73986-9">http://dx.doi.org/10.1007/978-3-540-73986-9</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Information Hiding 8th International Workshop, IH 2006, Alexandria, VA, USA, July 10-12, 2006. Revised Selcted Papersent://SD_ILS/0/SD_ILS:1870612024-11-07T16:14:58Z2024-11-07T16:14:58ZYazar Camenisch, Jan L. editor. Collberg, Christian S. editor. Johnson, Neil F. editor. Sallee, Phil. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-540-74124-4">http://dx.doi.org/10.1007/978-3-540-74124-4</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Advances in Cryptology - CRYPTO 2007 27th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2007. Proceedingsent://SD_ILS/0/SD_ILS:1870682024-11-07T16:14:58Z2024-11-07T16:14:58ZYazar Menezes, Alfred. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-540-74143-5">http://dx.doi.org/10.1007/978-3-540-74143-5</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Provable Security First International Conference, ProvSec 2007, Wollongong, Australia, November 1-2, 2007. Proceedingsent://SD_ILS/0/SD_ILS:1874732024-11-07T16:14:58Z2024-11-07T16:14:58ZYazar Susilo, Willy. editor. Liu, Joseph K. editor. Mu, Yi. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-540-75670-5">http://dx.doi.org/10.1007/978-3-540-75670-5</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Managing Virtualization of Networks and Services 18th IFIP/IEEE International Workshop on Distributed Systems: Operations and Management, DSOM 2007, San José, CA, USA, October 29-31, 2007. Proceedingsent://SD_ILS/0/SD_ILS:1874772024-11-07T16:14:58Z2024-11-07T16:14:58ZYazar Clemm, Alexander. editor. Granville, Lisandro Zambenedetti. editor. Stadler, Rolf. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-540-75694-1">http://dx.doi.org/10.1007/978-3-540-75694-1</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Information and Communications Security 9th International Conference, ICICS 2007, Zhengzhou, China, December 12-15, 2007. Proceedingsent://SD_ILS/0/SD_ILS:1877732024-11-07T16:14:58Z2024-11-07T16:14:58ZYazar Qing, Sihan. editor. Imai, Hideki. editor. Wang, Guilin. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-540-77048-0">http://dx.doi.org/10.1007/978-3-540-77048-0</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Information Systems Security Third International Conference, ICISS 2007, Delhi, India, December 16-20, 2007. Proceedingsent://SD_ILS/0/SD_ILS:1877902024-11-07T16:14:58Z2024-11-07T16:14:58ZYazar McDaniel, Patrick. editor. Gupta, Shyam K. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-540-77086-2">http://dx.doi.org/10.1007/978-3-540-77086-2</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Security Protocols 13th International Workshop, Cambridge, UK, April 20-22, 2005, Revised Selected Papersent://SD_ILS/0/SD_ILS:1878092024-11-07T16:14:58Z2024-11-07T16:14:58ZYazar Christianson, Bruce. editor. Crispo, Bruno. editor. Malcolm, James A. editor. Roe, Michael. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-540-77156-2">http://dx.doi.org/10.1007/978-3-540-77156-2</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>E-Voting and Identity First International Conference, VOTE-ID 2007, Bochum, Germany, October 4-5, 2007, Revised Selected Papersent://SD_ILS/0/SD_ILS:1878922024-11-07T16:14:58Z2024-11-07T16:14:58ZYazar Alkassar, Ammar. editor. Volkamer, Melanie. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-540-77493-8">http://dx.doi.org/10.1007/978-3-540-77493-8</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Advances in Computer Science - ASIAN 2006. Secure Software and Related Issues 11th Asian Computing Science Conference, Tokyo, Japan, December 6-8, 2006, Revised Selected Papersent://SD_ILS/0/SD_ILS:1878962024-11-07T16:14:58Z2024-11-07T16:14:58ZYazar Okada, Mitsu. editor. Satoh, Ichiro. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-540-77505-8">http://dx.doi.org/10.1007/978-3-540-77505-8</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Information Security Applications 8th International Workshop, WISA 2007, Jeju Island, Korea, August 27-29, 2007, Revised Selected Papersent://SD_ILS/0/SD_ILS:1879042024-11-07T16:14:58Z2024-11-07T16:14:58ZYazar Kim, Sehun. editor. Yung, Moti. editor. Lee, Hyung-Woo. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-540-77535-5">http://dx.doi.org/10.1007/978-3-540-77535-5</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Security in computingent://SD_ILS/0/SD_ILS:1106822024-11-07T16:14:58Z2024-11-07T16:14:58ZYazar Pfleeger, Charles P., 1948-<br/>Yer Numarası QA76.9.A25 P45 2007<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>FISMA certification & accreditation handbookent://SD_ILS/0/SD_ILS:1121692024-11-07T16:14:58Z2024-11-07T16:14:58ZYazar Taylor, Laura. Shepherd, Matthew. ScienceDirect (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491167">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>PCI compliance implementing effective PCI data security standardsent://SD_ILS/0/SD_ILS:1121892024-11-07T16:14:58Z2024-11-07T16:14:58ZYazar Bradley, Tony, 1969- ScienceDirect (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491655">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Surveillance studies : an overviewent://SD_ILS/0/SD_ILS:1344942024-11-07T16:14:58Z2024-11-07T16:14:58ZYazar Lyon, David.<br/>Yer Numarası JC596 .L96 2007<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>FISMA certification & accreditation handbookent://SD_ILS/0/SD_ILS:1458762024-11-07T16:14:58Z2024-11-07T16:14:58ZYazar Taylor, Laura. Shepherd, Matthew.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491167">http://www.sciencedirect.com/science/book/9781597491167</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Privacy-Respecting Intrusion Detectionent://SD_ILS/0/SD_ILS:1665602024-11-07T16:14:58Z2024-11-07T16:14:58ZYazar Flegel, Ulrich. author. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-0-387-68254-9">http://dx.doi.org/10.1007/978-0-387-68254-9</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>New Approaches for Security, Privacy and Trust in Complex Environments Proceedings of the IFIP TC-11 22nd International Information Security Conference (SEC 2007), 14–16 May 2007, Sandton, South Africaent://SD_ILS/0/SD_ILS:1669402024-11-07T16:14:58Z2024-11-07T16:14:58ZYazar Venter, Hein. editor. Eloff, Mariki. editor. Labuschagne, Les. editor. Eloff, Jan. editor. Solms, Rossouw. editor.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-0-387-72367-9">http://dx.doi.org/10.1007/978-0-387-72367-9</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Fifth World Conference on Information Security Education Proceedings of the IFIP TC11 WG 11.8, WISE 5, 19 to 21 June 2007, United States Military Academy, West Point, New York, USAent://SD_ILS/0/SD_ILS:1670382024-11-07T16:14:58Z2024-11-07T16:14:58ZYazar Futcher, Lynn. editor. Dodge, Ronald. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-0-387-73269-5">http://dx.doi.org/10.1007/978-0-387-73269-5</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Digital rights management : an introductionent://SD_ILS/0/SD_ILS:3655872024-11-07T16:14:58Z2024-11-07T16:14:58ZYazar Satish, D., 1977-<br/>Yer Numarası KK2655.6 D54 2007<br/>Format: Kitap<br/>Durum Hukuk Kütüphanesi~1<br/>Information security design, implementation, measurement, and complianceent://SD_ILS/0/SD_ILS:2884902024-11-07T16:14:58Z2024-11-07T16:14:58ZYazar Layton, Timothy P.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://marc.crcnetbase.com/isbn/9781420013412">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>