Arama Sonu&ccedil;lar&#305; Identity. - Daralt&#305;lm&#305;&#351;: Computer security. SirsiDynix Enterprise https://katalog.hacettepe.edu.tr/client/tr_TR/default_tr/default_tr/qu$003dIdentity.$0026qf$003dSUBJECT$002509Konu$002509Computer$002bsecurity.$002509Computer$002bsecurity.$0026ps$003d300$0026isd$003dtrue? 2024-12-08T03:15:25Z Electronic Identity ent://SD_ILS/0/SD_ILS:484375 2024-12-08T03:15:25Z 2024-12-08T03:15:25Z Yazar&#160;de Andrade, Norberto Nuno Gomes. author.&#160;Chen-Wilson, Lisha. author.&#160;Argles, David. author.&#160;Wills, Gary. author.&#160;Schiano di Zenise, Michele. author.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-1-4471-6449-4">https://doi.org/10.1007/978-1-4471-6449-4</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Federated identity primer ent://SD_ILS/0/SD_ILS:306461 2024-12-08T03:15:25Z 2024-12-08T03:15:25Z Yazar&#160;Rountree, Derrick.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780124071896">http://www.sciencedirect.com/science/book/9780124071896</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Women Securing the Future with TIPPSS for IoT Trust, Identity, Privacy, Protection, Safety, Security for the Internet of Things ent://SD_ILS/0/SD_ILS:484904 2024-12-08T03:15:25Z 2024-12-08T03:15:25Z Yazar&#160;Hudson, Florence D. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-3-030-15705-0">https://doi.org/10.1007/978-3-030-15705-0</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Privacy and Identity Management. Fairness, Accountability, and Transparency in the Age of Big Data 13th IFIP WG 9.2, 9.6/11.7, 11.6/SIG 9.2.2 International Summer School, Vienna, Austria, August 20-24, 2018, Revised Selected Papers ent://SD_ILS/0/SD_ILS:486786 2024-12-08T03:15:25Z 2024-12-08T03:15:25Z Yazar&#160;Kosta, Eleni. editor.&#160;Pierson, Jo. editor.&#160;Slamanig, Daniel. editor. (orcid)0000-0002-4181-2561&#160;Fischer-H&uuml;bner, Simone. editor. (orcid)0000-0002-6938-4466&#160;Krenn, Stephan. editor.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-3-030-16744-8">https://doi.org/10.1007/978-3-030-16744-8</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Privacy and Identity Management. The Smart Revolution 12th IFIP WG 9.2, 9.5, 9.6/11.7, 11.6/SIG 9.2.2 International Summer School, Ispra, Italy, September 4-8, 2017, Revised Selected Papers ent://SD_ILS/0/SD_ILS:401491 2024-12-08T03:15:25Z 2024-12-08T03:15:25Z Yazar&#160;Hansen, Marit. editor.&#160;Kosta, Eleni. editor.&#160;Nai-Fovino, Igor. editor.&#160;Fischer-H&uuml;bner, Simone. editor. (orcid)0000-0002-6938-4466&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-3-319-92925-5">https://doi.org/10.1007/978-3-319-92925-5</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Architecting User-Centric Privacy-as-a-Set-of-Services Digital Identity-Related Privacy Framework ent://SD_ILS/0/SD_ILS:488478 2024-12-08T03:15:25Z 2024-12-08T03:15:25Z Yazar&#160;Ben Ayed, Ghazi. author.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-3-319-08231-8">https://doi.org/10.1007/978-3-319-08231-8</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Privacy and Identity Management for Emerging Services and Technologies 8th IFIP WG 9.2, 9.5, 9.6/11.7, 11.4, 11.6 International Summer School, Nijmegen, The Netherlands, June 17-21, 2013, Revised Selected Papers ent://SD_ILS/0/SD_ILS:489060 2024-12-08T03:15:25Z 2024-12-08T03:15:25Z Yazar&#160;Hansen, Marit. editor.&#160;Hoepman, Jaap-Henk. editor.&#160;Leenes, Ronald. editor.&#160;Whitehouse, Diane. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-3-642-55137-6">https://doi.org/10.1007/978-3-642-55137-6</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Security for wireless sensor networks using identity-based cryptography ent://SD_ILS/0/SD_ILS:286252 2024-12-08T03:15:25Z 2024-12-08T03:15:25Z Yazar&#160;Patil, Harsh Kupwade.&#160;Szygenda, Stephen A.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://marc.crcnetbase.com/isbn/9781439869024">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Oracle identity management governance, risk, and compliance architecture ent://SD_ILS/0/SD_ILS:287794 2024-12-08T03:15:25Z 2024-12-08T03:15:25Z Yazar&#160;Pohlman, Marlin B.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://marc.crcnetbase.com/isbn/9781420072488">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Mechanics of user identification and authentication fundamentals of identity management ent://SD_ILS/0/SD_ILS:286830 2024-12-08T03:15:25Z 2024-12-08T03:15:25Z Yazar&#160;Todorov, Dobromir.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://marc.crcnetbase.com/isbn/9781420052206">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Phishing and countermeasures understanding the increasing problem of electronic identity theft ent://SD_ILS/0/SD_ILS:296875 2024-12-08T03:15:25Z 2024-12-08T03:15:25Z Yazar&#160;Jakobsson, Markus.&#160;Myers, Steven, 1975-<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;Books24x7 <a href="http://www.books24x7.com/marc.asp?bookid=18418">http://www.books24x7.com/marc.asp?bookid=18418</a> John Wiley <a href="http://dx.doi.org/10.1002/0470086106">http://dx.doi.org/10.1002/0470086106</a> MyiLibrary, Table of contents <a href="http://www.myilibrary.com?id=82196&ref=toc">http://www.myilibrary.com?id=82196&ref=toc</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Stealing the network how to own an identity ent://SD_ILS/0/SD_ILS:253663 2024-12-08T03:15:25Z 2024-12-08T03:15:25Z Yazar&#160;Alder, Raven.&#160;Mullen, Timothy M.&#160;Long, Johnny.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490061">http://www.sciencedirect.com/science/book/9781597490061</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Hack proofing your identity in the information age protect your family on the internet! ent://SD_ILS/0/SD_ILS:253617 2024-12-08T03:15:25Z 2024-12-08T03:15:25Z Yazar&#160;Bidwell, Teri.&#160;Cross, Michael, 1965-&#160;Russell, Ryan, 1969-<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836517">http://www.sciencedirect.com/science/book/9781931836517</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/>