Arama Sonu&ccedil;lar&#305; Information security SirsiDynix Enterprise https://katalog.hacettepe.edu.tr/client/tr_TR/default_tr/default_tr/qu$003dInformation$002bsecurity$0026ic$003dtrue$0026te$003dILS$0026ps$003d300?dt=list 2024-12-29T19:44:00Z Managing information security ent://SD_ILS/0/SD_ILS:306692 2024-12-29T19:44:00Z 2024-12-29T19:44:00Z Yazar&#160;Vacca, John R.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780124166882">http://www.sciencedirect.com/science/book/9780124166882</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Elementary information security ent://SD_ILS/0/SD_ILS:271272 2024-12-29T19:44:00Z 2024-12-29T19:44:00Z Yazar&#160;Smith, Richard E.<br/>Yer Numaras&#305;&#160;QA76.9.A25 S652 2013<br/>Format:&#160;Kitap<br/>Durum&#160;Beytepe K&uuml;t&uuml;phanesi~1<br/> Information security fundamentals ent://SD_ILS/0/SD_ILS:289155 2024-12-29T19:44:00Z 2024-12-29T19:44:00Z Yazar&#160;Peltier, Thomas R.&#160;Peltier, Justin.&#160;Blackley, John A.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://marc.crcnetbase.com/isbn/9780203488652">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Strategic information security ent://SD_ILS/0/SD_ILS:284578 2024-12-29T19:44:00Z 2024-12-29T19:44:00Z Yazar&#160;Wylder, John.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://marc.crcnetbase.com/isbn/9780203497081">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Information security architecture ent://SD_ILS/0/SD_ILS:285815 2024-12-29T19:44:00Z 2024-12-29T19:44:00Z Yazar&#160;Tudor, Jan Killmeyer.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://marc.crcnetbase.com/isbn/9781420031034">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Information security fundamentals ent://SD_ILS/0/SD_ILS:342584 2024-12-29T19:44:00Z 2024-12-29T19:44:00Z Yazar&#160;Peltier, Thomas R., author.<br/>Yer Numaras&#305;&#160;ONLINE(342584.1)<br/>Elektronik Eri&#351;im&#160;<a href="http://marc.crcnetbase.com/isbn/9781439810637">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Information Security Governance ent://SD_ILS/0/SD_ILS:167709 2024-12-29T19:44:00Z 2024-12-29T19:44:00Z Yazar&#160;Solms, S.H. author.&#160;Solms, Rossouw. author.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-0-387-79984-1">http://dx.doi.org/10.1007/978-0-387-79984-1</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Information security management handbook ent://SD_ILS/0/SD_ILS:342776 2024-12-29T19:44:00Z 2024-12-29T19:44:00Z Yazar&#160;O'Hanley, Richard.&#160;Tiller, James S.<br/>Yer Numaras&#305;&#160;ONLINE(342776.1)<br/>Elektronik Eri&#351;im&#160;<a href="http://marc.crcnetbase.com/isbn/9781466567528">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Electronic Healthcare Information Security ent://SD_ILS/0/SD_ILS:167753 2024-12-29T19:44:00Z 2024-12-29T19:44:00Z Yazar&#160;Shoniregun, Charles A. author.&#160;Dube, Kudakwashe. author.&#160;Mtenzi, Fredrick. author.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-0-387-84919-5">http://dx.doi.org/10.1007/978-0-387-84919-5</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Information security management handbook ent://SD_ILS/0/SD_ILS:289151 2024-12-29T19:44:00Z 2024-12-29T19:44:00Z Yazar&#160;Tipton, Harold F.&#160;Krause, Micki.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://marc.crcnetbase.com/isbn/9780203325438">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Information security management handbook ent://SD_ILS/0/SD_ILS:287123 2024-12-29T19:44:00Z 2024-12-29T19:44:00Z Yazar&#160;Tipton, Harold F.&#160;Nozaki, Micki Krause.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://marc.crcnetbase.com/isbn/9781439893159">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Information security management handbook ent://SD_ILS/0/SD_ILS:290320 2024-12-29T19:44:00Z 2024-12-29T19:44:00Z Yazar&#160;Tipton, Harold F.&#160;Krause, Micki.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://marc.crcnetbase.com/isbn/9781420003406">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Information security management handbook ent://SD_ILS/0/SD_ILS:290763 2024-12-29T19:44:00Z 2024-12-29T19:44:00Z Yazar&#160;Tipton, Harold F.&#160;Nozaki, Micki Krause.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://marc.crcnetbase.com/isbn/9781439853467">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Information security risk analysis ent://SD_ILS/0/SD_ILS:288856 2024-12-29T19:44:00Z 2024-12-29T19:44:00Z Yazar&#160;Peltier, Thomas R.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://marc.crcnetbase.com/isbn/9781439839577">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Information security management handbook ent://SD_ILS/0/SD_ILS:289734 2024-12-29T19:44:00Z 2024-12-29T19:44:00Z Yazar&#160;Tipton, Harold F.&#160;Krause, Micki.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://marc.crcnetbase.com/isbn/9781420090956">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Information security : contemporary cases ent://SD_ILS/0/SD_ILS:111021 2024-12-29T19:44:00Z 2024-12-29T19:44:00Z Yazar&#160;Wright, Marie A.&#160;Kakalik, John S.<br/>Yer Numaras&#305;&#160;QA76.9.A25 W75 2007<br/>Format:&#160;Kitap<br/>Durum&#160;Beytepe K&uuml;t&uuml;phanesi~1<br/> Information security management handbook ent://SD_ILS/0/SD_ILS:285161 2024-12-29T19:44:00Z 2024-12-29T19:44:00Z Yazar&#160;Tipton, Harold F.&#160;Krause, Micki.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://marc.crcnetbase.com/isbn/9781439833032">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Information security cost management ent://SD_ILS/0/SD_ILS:286545 2024-12-29T19:44:00Z 2024-12-29T19:44:00Z Yazar&#160;Bazavan, Ioana V.&#160;Lim, Ian.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://marc.crcnetbase.com/isbn/9781420013832">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Handbook of information security ent://SD_ILS/0/SD_ILS:108909 2024-12-29T19:44:00Z 2024-12-29T19:44:00Z Yazar&#160;Bidgoli, Hossein, ed.<br/>Yer Numaras&#305;&#160;TK5105.59 H35 2006 V.1<br/>Format:&#160;Kitap<br/>Durum&#160;Beytepe K&uuml;t&uuml;phanesi~3<br/> Information security risk analysis ent://SD_ILS/0/SD_ILS:284764 2024-12-29T19:44:00Z 2024-12-29T19:44:00Z Yazar&#160;Peltier, Thomas R.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://marc.crcnetbase.com/isbn/9781420031195">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Information security for managers ent://SD_ILS/0/SD_ILS:516570 2024-12-29T19:44:00Z 2024-12-29T19:44:00Z Yazar&#160;Workman, Michael D., 1957-.&#160;Phelps, Daniel C.&#160;Gathegi, John N.<br/>Yer Numaras&#305;&#160;HF5548.37 W67 2013<br/>Format:&#160;Kitap<br/>Durum&#160;Beytepe K&uuml;t&uuml;phanesi~1<br/> Legal issues in information security ent://SD_ILS/0/SD_ILS:365418 2024-12-29T19:44:00Z 2024-12-29T19:44:00Z Yazar&#160;Grama, Joanna Lyn, author.<br/>Yer Numaras&#305;&#160;KF1263.C65 G73 2011<br/>Format:&#160;Kitap<br/>Durum&#160;Hukuk K&uuml;t&uuml;phanesi~1<br/> Integration of Information for Environmental Security ent://SD_ILS/0/SD_ILS:169859 2024-12-29T19:44:00Z 2024-12-29T19:44:00Z Yazar&#160;Coskun, H. Gonca. editor.&#160;Cigizoglu, H. Kerem. editor.&#160;Maktav, M. Derya. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-1-4020-6575-0">http://dx.doi.org/10.1007/978-1-4020-6575-0</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Information security principles and practice ent://SD_ILS/0/SD_ILS:298878 2024-12-29T19:44:00Z 2024-12-29T19:44:00Z Yazar&#160;Stamp, Mark.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;Wiley InterScience <a href="http://dx.doi.org/10.1002/9781118027974">An electronic book accessible through the World Wide Web; click for information</a> Ebook Library <a href="http://public.eblib.com/EBLPublic/PublicView.do?ptiID=738753">http://public.eblib.com/EBLPublic/PublicView.do?ptiID=738753</a> <a href="http://site.ebrary.com/lib/alltitles/Doc?id=10478419">http://site.ebrary.com/lib/alltitles/Doc?id=10478419</a> <a href="http://swb.eblib.com/patron/FullRecord.aspx?p=738753">http://swb.eblib.com/patron/FullRecord.aspx?p=738753</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Information security : principles and practice ent://SD_ILS/0/SD_ILS:109477 2024-12-29T19:44:00Z 2024-12-29T19:44:00Z Yazar&#160;Stamp, Mark.<br/>Yer Numaras&#305;&#160;QA76.9.A25 S69 2006<br/>Format:&#160;Kitap<br/>Durum&#160;Beytepe K&uuml;t&uuml;phanesi~1<br/> Information security principles and practice ent://SD_ILS/0/SD_ILS:301803 2024-12-29T19:44:00Z 2024-12-29T19:44:00Z Yazar&#160;Stamp, Mark.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://www.contentreserve.com/TitleInfo.asp?ID={310C0D18-7395-435E-BA71-41A0448F3D13}&Format=50">Click for information</a> Ebook Library <a href="http://public.eblib.com/EBLPublic/PublicView.do?ptiID=240929">http://public.eblib.com/EBLPublic/PublicView.do?ptiID=240929</a> John Wiley <a href="http://dx.doi.org/10.1002/0471744190">http://dx.doi.org/10.1002/0471744190</a> <a href="http://www3.interscience.wiley.com/cgi-bin/bookhome/109933408">http://www3.interscience.wiley.com/cgi-bin/bookhome/109933408</a> HathiTrust Digital Library, Limited view (search only) <a href="http://catalog.hathitrust.org/api/volumes/oclc/57754240.html">http://catalog.hathitrust.org/api/volumes/oclc/57754240.html</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Information security a strategic approach ent://SD_ILS/0/SD_ILS:249831 2024-12-29T19:44:00Z 2024-12-29T19:44:00Z Yazar&#160;LeVeque, Vincent.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;IEEE Xplore <a href="http://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=5989138">http://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=5989138</a> IEEE Xplore <a href="http://ieeexplore.ieee.org/servlet/opac?bknumber=5989138">http://ieeexplore.ieee.org/servlet/opac?bknumber=5989138</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Building a practical information security program ent://SD_ILS/0/SD_ILS:459146 2024-12-29T19:44:00Z 2024-12-29T19:44:00Z Yazar&#160;Andress, Jason, author.&#160;Leary, Mark, author.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128020425">http://www.sciencedirect.com/science/book/9780128020425</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Computer and information security handbook ent://SD_ILS/0/SD_ILS:459518 2024-12-29T19:44:00Z 2024-12-29T19:44:00Z Yazar&#160;Vacca, John R., editor.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="https://www.sciencedirect.com/science/book/9780128038437">https://www.sciencedirect.com/science/book/9780128038437</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Information Security for Automatic Speaker Identification ent://SD_ILS/0/SD_ILS:173281 2024-12-29T19:44:00Z 2024-12-29T19:44:00Z Yazar&#160;El-Samie, Fathi E. Abd. author.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-1-4419-9698-5">http://dx.doi.org/10.1007/978-1-4419-9698-5</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Information security management handbook. Volume 4 ent://SD_ILS/0/SD_ILS:289735 2024-12-29T19:44:00Z 2024-12-29T19:44:00Z Yazar&#160;Tipton, Harold F.&#160;Krause, Micki.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://marc.crcnetbase.com/isbn/9781439819036">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> The executive MBA in information security ent://SD_ILS/0/SD_ILS:286931 2024-12-29T19:44:00Z 2024-12-29T19:44:00Z Yazar&#160;Trinckes, John J.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://marc.crcnetbase.com/isbn/9781439810088">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> CyberForensics Understanding Information Security Investigations ent://SD_ILS/0/SD_ILS:175048 2024-12-29T19:44:00Z 2024-12-29T19:44:00Z Yazar&#160;Bayuk, Jennifer. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-1-60761-772-3">http://dx.doi.org/10.1007/978-1-60761-772-3</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Economics of Information Security and Privacy ent://SD_ILS/0/SD_ILS:172736 2024-12-29T19:44:00Z 2024-12-29T19:44:00Z Yazar&#160;Moore, Tyler. editor.&#160;Pym, David. editor.&#160;Ioannidis, Christos. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-1-4419-6967-5">http://dx.doi.org/10.1007/978-1-4419-6967-5</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Handbook of Information and Communication Security ent://SD_ILS/0/SD_ILS:190841 2024-12-29T19:44:00Z 2024-12-29T19:44:00Z Yazar&#160;Stavroulakis, Peter. editor.&#160;Stamp, Mark. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-3-642-04117-4">http://dx.doi.org/10.1007/978-3-642-04117-4</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Computer and information security handbook ent://SD_ILS/0/SD_ILS:148884 2024-12-29T19:44:00Z 2024-12-29T19:44:00Z Yazar&#160;Vacca, John R.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780123743541">http://www.sciencedirect.com/science/book/9780123743541</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Information security management handbook. Vol. 2 ent://SD_ILS/0/SD_ILS:286816 2024-12-29T19:44:00Z 2024-12-29T19:44:00Z Yazar&#160;Tipton, Harold F.&#160;Krause, Micki.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://marc.crcnetbase.com/isbn/9781420067101">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Managing Information Systems Security and Privacy ent://SD_ILS/0/SD_ILS:181654 2024-12-29T19:44:00Z 2024-12-29T19:44:00Z Yazar&#160;Tr&#269;ek, Denis. author.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/3-540-28104-5">http://dx.doi.org/10.1007/3-540-28104-5</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Information security management handbook. Vol. 2 ent://SD_ILS/0/SD_ILS:285441 2024-12-29T19:44:00Z 2024-12-29T19:44:00Z Yazar&#160;Tipton, Harold F.&#160;Krause, Micki.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://marc.crcnetbase.com/isbn/9780203005552">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Information Processing and Security Systems ent://SD_ILS/0/SD_ILS:165266 2024-12-29T19:44:00Z 2024-12-29T19:44:00Z Yazar&#160;Saeed, Khalid. editor.&#160;Peja&#347;, Jerzy. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/b137371">http://dx.doi.org/10.1007/b137371</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Information security management handbook. Vol. 4 ent://SD_ILS/0/SD_ILS:287776 2024-12-29T19:44:00Z 2024-12-29T19:44:00Z Yazar&#160;Tipton, Harold F.&#160;Krause, Micki.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://marc.crcnetbase.com/isbn/9781420072419">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> How to cheat at managing information security ent://SD_ILS/0/SD_ILS:253677 2024-12-29T19:44:00Z 2024-12-29T19:44:00Z Yazar&#160;Osborne, Mark.&#160;Summitt, Paul M.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491105">http://www.sciencedirect.com/science/book/9781597491105</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Developments in information security and cybernetic wars ent://SD_ILS/0/SD_ILS:482187 2024-12-29T19:44:00Z 2024-12-29T19:44:00Z Yazar&#160;Sarfraz, Muhammad, editor.&#160;IGI Global, publisher.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-8304-2">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-8304-2</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Economics of Information Security and Privacy III ent://SD_ILS/0/SD_ILS:331294 2024-12-29T19:44:00Z 2024-12-29T19:44:00Z Yazar&#160;Schneier, Bruce. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE(331294.1)<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-1-4614-1981-5">http://dx.doi.org/10.1007/978-1-4614-1981-5</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> The Economics of Information Security and Privacy ent://SD_ILS/0/SD_ILS:334810 2024-12-29T19:44:00Z 2024-12-29T19:44:00Z Yazar&#160;B&ouml;hme, Rainer. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE(334810.1)<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-3-642-39498-0">http://dx.doi.org/10.1007/978-3-642-39498-0</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Security information and event management (SIEM) implementation ent://SD_ILS/0/SD_ILS:293279 2024-12-29T19:44:00Z 2024-12-29T19:44:00Z Yazar&#160;Miller, David, 1959 Nov. 5-&#160;Harris, Shon.&#160;Harper, Allen.&#160;VanDyke, Stephen.&#160;Blask, Chris.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://mhebooklibrary.com/reader/security-information-event-management-siem-implementation">Subscription required</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Applied Information Security A Hands-on Approach ent://SD_ILS/0/SD_ILS:195648 2024-12-29T19:44:00Z 2024-12-29T19:44:00Z Yazar&#160;Basin, David. author.&#160;Schaller, Patrick. author.&#160;Schl&auml;pfer, Michael. author.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-3-642-24474-2">http://dx.doi.org/10.1007/978-3-642-24474-2</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Honeypot a new paradigm to information security ent://SD_ILS/0/SD_ILS:288961 2024-12-29T19:44:00Z 2024-12-29T19:44:00Z Yazar&#160;Joshi, R. C.&#160;Sardana, Anjali.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://marc.crcnetbase.com/isbn/9781439869994">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Building an effective information security policy architecture ent://SD_ILS/0/SD_ILS:290577 2024-12-29T19:44:00Z 2024-12-29T19:44:00Z Yazar&#160;Bacik, Sandy.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://marc.crcnetbase.com/isbn/9781420059069">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Zen and the art of information security ent://SD_ILS/0/SD_ILS:112214 2024-12-29T19:44:00Z 2024-12-29T19:44:00Z Yazar&#160;Winkler, Ira.&#160;ScienceDirect (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491686">An electronic book accessible through the World Wide Web; click for information</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Zen and the art of information security ent://SD_ILS/0/SD_ILS:145680 2024-12-29T19:44:00Z 2024-12-29T19:44:00Z Yazar&#160;Winkler, Ira.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491686">http://www.sciencedirect.com/science/book/9781597491686</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Information security design, implementation, measurement, and compliance ent://SD_ILS/0/SD_ILS:288490 2024-12-29T19:44:00Z 2024-12-29T19:44:00Z Yazar&#160;Layton, Timothy P.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://marc.crcnetbase.com/isbn/9781420013412">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Computational Intelligence in Information Assurance and Security ent://SD_ILS/0/SD_ILS:186171 2024-12-29T19:44:00Z 2024-12-29T19:44:00Z Yazar&#160;Nedjah, Nadia. editor.&#160;Abraham, Ajith. editor.&#160;Mourelle, Luiza de Macedo. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-3-540-71078-3">http://dx.doi.org/10.1007/978-3-540-71078-3</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Information Assurance Security in the Information Environment ent://SD_ILS/0/SD_ILS:175440 2024-12-29T19:44:00Z 2024-12-29T19:44:00Z Yazar&#160;Blyth, Andrew. author.&#160;Kovacich, Gerald L. author.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/1-84628-489-9">http://dx.doi.org/10.1007/1-84628-489-9</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Optical and Digital Techniques for Information Security ent://SD_ILS/0/SD_ILS:165090 2024-12-29T19:44:00Z 2024-12-29T19:44:00Z Yazar&#160;Javidi, Bahram. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/b105098">http://dx.doi.org/10.1007/b105098</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Impacts and Risk Assessment of Technology for Internet Security Enabled Information Small-Medium Enterprises (TEISMES) ent://SD_ILS/0/SD_ILS:165267 2024-12-29T19:44:00Z 2024-12-29T19:44:00Z Yazar&#160;Shoniregun, Charles A. author.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/b137376">http://dx.doi.org/10.1007/b137376</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Information security best practices 205 basic rules ent://SD_ILS/0/SD_ILS:254779 2024-12-29T19:44:00Z 2024-12-29T19:44:00Z Yazar&#160;Stefanek, George L.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781878707963">http://www.sciencedirect.com/science/book/9781878707963</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> A practical guide to security engineering and information assurance ent://SD_ILS/0/SD_ILS:290461 2024-12-29T19:44:00Z 2024-12-29T19:44:00Z Yazar&#160;Herrmann, Debra S.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://marc.crcnetbase.com/isbn/9781420031492">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Engineering information security the application of systems engineering concepts to achieve information assurance ent://SD_ILS/0/SD_ILS:249916 2024-12-29T19:44:00Z 2024-12-29T19:44:00Z Yazar&#160;Jacobs, Stuart.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;IEEE Xplore <a href="http://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=6047604">http://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=6047604</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> GeoSpatial Visual Analytics Geographical Information Processing and Visual Analytics for Environmental Security ent://SD_ILS/0/SD_ILS:204921 2024-12-29T19:44:00Z 2024-12-29T19:44:00Z Yazar&#160;Amicis, Raffaele De. editor.&#160;Stojanovic, Radovan. editor.&#160;Conti, Giuseppe. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-90-481-2899-0">http://dx.doi.org/10.1007/978-90-481-2899-0</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Integration of information for environmental security : environmental security, information security, disaster forecast and prevention, water resources management ent://SD_ILS/0/SD_ILS:113618 2024-12-29T19:44:00Z 2024-12-29T19:44:00Z Yazar&#160;NATO Advanced Research Workshop on Integration of Information for Environmental Security (2006 : Istanbul, Turkey)&#160;Coskun, H. Gonca.&#160;Cigizoglu, H. Kerem.&#160;Maktav, M. Derya.<br/>Yer Numaras&#305;&#160;TD170.2 .N38 2008<br/>Format:&#160;Kitap<br/>Durum&#160;Beytepe K&uuml;t&uuml;phanesi~1<br/> Building an information security awareness program defending against social engineering and technical threats ent://SD_ILS/0/SD_ILS:355618 2024-12-29T19:44:00Z 2024-12-29T19:44:00Z Yazar&#160;Gardner, Bill (Bill G.)&#160;Thomas, Valerie (Information security consultant)<br/>Yer Numaras&#305;&#160;ONLINE(355618.1)<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780124199675">http://www.sciencedirect.com/science/book/9780124199675</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Applications and Techniques in Information Security 13th International Conference, ATIS 2022, Manipal, India, December 30-31, 2022, Revised Selected Papers ent://SD_ILS/0/SD_ILS:520765 2024-12-29T19:44:00Z 2024-12-29T19:44:00Z Yazar&#160;Prabhu, Srikanth. editor.&#160;Pokhrel, Shiva Raj. editor. (orcid)&#160;Li, Gang. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;XX(520765.1)<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-981-99-2264-2">https://doi.org/10.1007/978-981-99-2264-2</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Critical Information Infrastructures Security 17th International Conference, CRITIS 2022, Munich, Germany, September 14-16, 2022, Revised Selected Papers ent://SD_ILS/0/SD_ILS:520990 2024-12-29T19:44:00Z 2024-12-29T19:44:00Z Yazar&#160;H&auml;mmerli, Bernhard. editor. (orcid)&#160;Helmbrecht, Udo. editor.&#160;Hommel, Wolfgang. editor.&#160;Kunczik, Leonhard. editor.&#160;Pickl, Stefan. editor.<br/>Yer Numaras&#305;&#160;XX(520990.1)<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-3-031-35190-7">https://doi.org/10.1007/978-3-031-35190-7</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Information Security and Privacy 28th Australasian Conference, ACISP 2023, Brisbane, QLD, Australia, July 5-7, 2023, Proceedings ent://SD_ILS/0/SD_ILS:520995 2024-12-29T19:44:00Z 2024-12-29T19:44:00Z Yazar&#160;Simpson, Leonie. editor.&#160;Rezazadeh Baee, Mir Ali. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;XX(520995.1)<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-3-031-35486-1">https://doi.org/10.1007/978-3-031-35486-1</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Information Security and Cryptology - ICISC 2022 25th International Conference, ICISC 2022, Seoul, South Korea, November 30 - December 2, 2022, Revised Selected Papers ent://SD_ILS/0/SD_ILS:520920 2024-12-29T19:44:00Z 2024-12-29T19:44:00Z Yazar&#160;Seo, Seung-Hyun. editor.&#160;Seo, Hwajeong. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;XX(520920.1)<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-3-031-29371-9">https://doi.org/10.1007/978-3-031-29371-9</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Information Security Practice and Experience 18th International Conference, ISPEC 2023, Copenhagen, Denmark, August 24-25, 2023, Proceedings ent://SD_ILS/0/SD_ILS:521323 2024-12-29T19:44:00Z 2024-12-29T19:44:00Z Yazar&#160;Meng, Weizhi. editor.&#160;Yan, Zheng. editor.&#160;Piuri, Vincenzo. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;XX(521323.1)<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-981-99-7032-2">https://doi.org/10.1007/978-981-99-7032-2</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Human Aspects of Information Security and Assurance 17th IFIP WG 11.12 International Symposium, HAISA 2023, Kent, UK, July 4-6, 2023, Proceedings ent://SD_ILS/0/SD_ILS:520598 2024-12-29T19:44:00Z 2024-12-29T19:44:00Z Yazar&#160;Furnell, Steven. editor.&#160;Clarke, Nathan. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;XX(520598.1)<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-3-031-38530-8">https://doi.org/10.1007/978-3-031-38530-8</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Information Security Applications 23rd International Conference, WISA 2022, Jeju Island, South Korea, August 24-26, 2022, Revised Selected Papers ent://SD_ILS/0/SD_ILS:520807 2024-12-29T19:44:00Z 2024-12-29T19:44:00Z Yazar&#160;You, Ilsun. editor.&#160;Youn, Taek-Young. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;XX(520807.1)<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-3-031-25659-2">https://doi.org/10.1007/978-3-031-25659-2</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Information Security and Cryptology 18th International Conference, Inscrypt 2022, Beijing, China, December 11-13, 2022, Revised Selected Papers ent://SD_ILS/0/SD_ILS:520822 2024-12-29T19:44:00Z 2024-12-29T19:44:00Z Yazar&#160;Deng, Yi. editor.&#160;Yung, Moti. editor. (orcid)&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;XX(520822.1)<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-3-031-26553-2">https://doi.org/10.1007/978-3-031-26553-2</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Information Systems Security and Privacy 7th International Conference, ICISSP 2021, Virtual Event, February 11-13, 2021, and 8th International Conference, ICISSP 2022, Virtual Event, February 9-11, 2022, Revised Selected Papers ent://SD_ILS/0/SD_ILS:520501 2024-12-29T19:44:00Z 2024-12-29T19:44:00Z Yazar&#160;Mori, Paolo. editor.&#160;Lenzini, Gabriele. editor.&#160;Furnell, Steven. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;XX(520501.1)<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-3-031-37807-2">https://doi.org/10.1007/978-3-031-37807-2</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Innovative Security Solutions for Information Technology and Communications 15th International Conference, SecITC 2022, Virtual Event, December 8-9, 2022, Revised Selected Papers. ent://SD_ILS/0/SD_ILS:520859 2024-12-29T19:44:00Z 2024-12-29T19:44:00Z Yazar&#160;Doinea, Mihai. editor.&#160;Janicke, Helge. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;XX(520859.1)<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-3-031-32636-3">https://doi.org/10.1007/978-3-031-32636-3</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Codes, Cryptology and Information Security 4th International Conference, C2SI 2023, Rabat, Morocco, May 29-31, 2023, Proceedings ent://SD_ILS/0/SD_ILS:520866 2024-12-29T19:44:00Z 2024-12-29T19:44:00Z Yazar&#160;El Hajji, Said. editor.&#160;Mesnager, Sihem. editor.&#160;Souidi, El Mamoun. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;XX(520866.1)<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-3-031-33017-9">https://doi.org/10.1007/978-3-031-33017-9</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Progress in Cryptology - LATINCRYPT 2023 8th International Conference on Cryptology and Information Security in Latin America, LATINCRYPT 2023, Quito, Ecuador, October 3-6, 2023, Proceedings ent://SD_ILS/0/SD_ILS:521179 2024-12-29T19:44:00Z 2024-12-29T19:44:00Z Yazar&#160;Aly, Abdelrahaman. editor.&#160;Tibouchi, Mehdi. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;XX(521179.1)<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-3-031-44469-2">https://doi.org/10.1007/978-3-031-44469-2</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Advances in Information and Computer Security 18th International Workshop on Security, IWSEC 2023, Yokohama, Japan, August 29-31, 2023, Proceedings ent://SD_ILS/0/SD_ILS:521115 2024-12-29T19:44:00Z 2024-12-29T19:44:00Z Yazar&#160;Shikata, Junji. editor.&#160;Kuzuno, Hiroki. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;XX(521115.1)<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-3-031-41326-1">https://doi.org/10.1007/978-3-031-41326-1</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Information and Communications Security 25th International Conference, ICICS 2023, Tianjin, China, November 18-20, 2023, Proceedings ent://SD_ILS/0/SD_ILS:521250 2024-12-29T19:44:00Z 2024-12-29T19:44:00Z Yazar&#160;Wang, Ding. editor.&#160;Yung, Moti. editor. (orcid)&#160;Liu, Zheli. editor.&#160;Chen, Xiaofeng. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;XX(521250.1)<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-981-99-7356-9">https://doi.org/10.1007/978-981-99-7356-9</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Information Security 26th International Conference, ISC 2023, Groningen, The Netherlands, November 15-17, 2023, Proceedings ent://SD_ILS/0/SD_ILS:521356 2024-12-29T19:44:00Z 2024-12-29T19:44:00Z Yazar&#160;Athanasopoulos, Elias. editor.&#160;Mennink, Bart. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;XX(521356.1)<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-3-031-49187-0">https://doi.org/10.1007/978-3-031-49187-0</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Information Systems Security 19th International Conference, ICISS 2023, Raipur, India, December 16-20, 2023, Proceedings ent://SD_ILS/0/SD_ILS:521362 2024-12-29T19:44:00Z 2024-12-29T19:44:00Z Yazar&#160;Muthukkumarasamy, Vallipuram. editor.&#160;Sudarsan, Sithu D. editor.&#160;Shyamasundar, Rudrapatna K. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;XX(521362.1)<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-3-031-49099-6">https://doi.org/10.1007/978-3-031-49099-6</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Advances in Cryptology - ASIACRYPT 2023 29th International Conference on the Theory and Application of Cryptology and Information Security, Guangzhou, China, December 4-8, 2023, Proceedings, Part I ent://SD_ILS/0/SD_ILS:521366 2024-12-29T19:44:00Z 2024-12-29T19:44:00Z Yazar&#160;Guo, Jian. editor.&#160;Steinfeld, Ron. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;XX(521366.1)<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-981-99-8721-4">https://doi.org/10.1007/978-981-99-8721-4</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Advances in Cryptology - ASIACRYPT 2023 29th International Conference on the Theory and Application of Cryptology and Information Security, Guangzhou, China, December 4-8, 2023, Proceedings, Part III ent://SD_ILS/0/SD_ILS:521367 2024-12-29T19:44:00Z 2024-12-29T19:44:00Z Yazar&#160;Guo, Jian. editor.&#160;Steinfeld, Ron. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;XX(521367.1)<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-981-99-8727-6">https://doi.org/10.1007/978-981-99-8727-6</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Advances in Cryptology - ASIACRYPT 2023 29th International Conference on the Theory and Application of Cryptology and Information Security, Guangzhou, China, December 4-8, 2023, Proceedings, Part IV ent://SD_ILS/0/SD_ILS:521368 2024-12-29T19:44:00Z 2024-12-29T19:44:00Z Yazar&#160;Guo, Jian. editor.&#160;Steinfeld, Ron. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;XX(521368.1)<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-981-99-8730-6">https://doi.org/10.1007/978-981-99-8730-6</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Advances in Cryptology - ASIACRYPT 2023 29th International Conference on the Theory and Application of Cryptology and Information Security, Guangzhou, China, December 4-8, 2023, Proceedings, Part V ent://SD_ILS/0/SD_ILS:521369 2024-12-29T19:44:00Z 2024-12-29T19:44:00Z Yazar&#160;Guo, Jian. editor.&#160;Steinfeld, Ron. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;XX(521369.1)<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-981-99-8733-7">https://doi.org/10.1007/978-981-99-8733-7</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Advances in Cryptology - ASIACRYPT 2023 29th International Conference on the Theory and Application of Cryptology and Information Security, Guangzhou, China, December 4-8, 2023, Proceedings, Part VI ent://SD_ILS/0/SD_ILS:521370 2024-12-29T19:44:00Z 2024-12-29T19:44:00Z Yazar&#160;Guo, Jian. editor.&#160;Steinfeld, Ron. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;XX(521370.1)<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-981-99-8736-8">https://doi.org/10.1007/978-981-99-8736-8</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Advances in Cryptology - ASIACRYPT 2023 29th International Conference on the Theory and Application of Cryptology and Information Security, Guangzhou, China, December 4-8, 2023, Proceedings, Part VII ent://SD_ILS/0/SD_ILS:521371 2024-12-29T19:44:00Z 2024-12-29T19:44:00Z Yazar&#160;Guo, Jian. editor.&#160;Steinfeld, Ron. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;XX(521371.1)<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-981-99-8739-9">https://doi.org/10.1007/978-981-99-8739-9</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Advances in Cryptology - ASIACRYPT 2023 29th International Conference on the Theory and Application of Cryptology and Information Security, Guangzhou, China, December 4-8, 2023, Proceedings, Part II ent://SD_ILS/0/SD_ILS:521372 2024-12-29T19:44:00Z 2024-12-29T19:44:00Z Yazar&#160;Guo, Jian. editor.&#160;Steinfeld, Ron. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;XX(521372.1)<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-981-99-8724-5">https://doi.org/10.1007/978-981-99-8724-5</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Advances in Cryptology - ASIACRYPT 2023 29th International Conference on the Theory and Application of Cryptology and Information Security, Guangzhou, China, December 4-8, 2023, Proceedings, Part VIII ent://SD_ILS/0/SD_ILS:521373 2024-12-29T19:44:00Z 2024-12-29T19:44:00Z Yazar&#160;Guo, Jian. editor.&#160;Steinfeld, Ron. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;XX(521373.1)<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-981-99-8742-9">https://doi.org/10.1007/978-981-99-8742-9</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Information Security Practice and Experience 15th International Conference, ISPEC 2019, Kuala Lumpur, Malaysia, November 26&ndash;28, 2019, Proceedings ent://SD_ILS/0/SD_ILS:483099 2024-12-29T19:44:00Z 2024-12-29T19:44:00Z Yazar&#160;Heng, Swee-Huay. editor. (orcid)0000-0003-3627-2131&#160;Lopez, Javier. editor. (orcid)0000-0001-8066-9991&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-3-030-34339-2">https://doi.org/10.1007/978-3-030-34339-2</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Information Systems Security and Privacy 4th International Conference, ICISSP 2018, Funchal - Madeira, Portugal, January 22-24, 2018, Revised Selected Papers ent://SD_ILS/0/SD_ILS:483447 2024-12-29T19:44:00Z 2024-12-29T19:44:00Z Yazar&#160;Mori, Paolo. editor. (orcid)0000-0002-6618-0388&#160;Furnell, Steven. editor. (orcid)0000-0003-0984-7542&#160;Camp, Olivier. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-3-030-25109-3">https://doi.org/10.1007/978-3-030-25109-3</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Codes, Cryptology and Information Security Third International Conference, C2SI 2019, Rabat, Morocco, April 22&ndash;24, 2019, Proceedings - In Honor of Said El Hajji ent://SD_ILS/0/SD_ILS:483462 2024-12-29T19:44:00Z 2024-12-29T19:44:00Z Yazar&#160;Carlet, Claude. editor.&#160;Guilley, Sylvain. editor. (orcid)0000-0002-5044-3534&#160;Nitaj, Abderrahmane. editor. (orcid)0000-0002-0372-1757&#160;Souidi, El Mamoun. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-3-030-16458-4">https://doi.org/10.1007/978-3-030-16458-4</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Information Security Education. Education in Proactive Information Security 12th IFIP WG 11.8 World Conference, WISE 12, Lisbon, Portugal, June 25&ndash;27, 2019, Proceedings ent://SD_ILS/0/SD_ILS:483477 2024-12-29T19:44:00Z 2024-12-29T19:44:00Z Yazar&#160;Drevin, Lynette. editor. (orcid)0000-0001-9370-8216&#160;Theocharidou, Marianthi. editor. (orcid)0000-0002-8870-1746&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-3-030-23451-5">https://doi.org/10.1007/978-3-030-23451-5</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Advances in Cryptology &ndash; ASIACRYPT 2019 25th International Conference on the Theory and Application of Cryptology and Information Security, Kobe, Japan, December 8&ndash;12, 2019, Proceedings, Part I ent://SD_ILS/0/SD_ILS:483569 2024-12-29T19:44:00Z 2024-12-29T19:44:00Z Yazar&#160;Galbraith, Steven D. editor. (orcid)0000-0001-7114-8377&#160;Moriai, Shiho. editor. (orcid)0000-0002-6072-6183&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-3-030-34578-5">https://doi.org/10.1007/978-3-030-34578-5</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Applications and Techniques in Information Security 10th International Conference, ATIS 2019, Thanjavur, India, November 22&ndash;24, 2019, Proceedings ent://SD_ILS/0/SD_ILS:483576 2024-12-29T19:44:00Z 2024-12-29T19:44:00Z Yazar&#160;Shankar Sriram, V. S. editor. (orcid)0000-0001-7870-7944&#160;Subramaniyaswamy, V. editor.&#160;Sasikaladevi, N. editor. (orcid)0000-0002-0841-502X&#160;Zhang, Leo. editor.&#160;Batten, Lynn. editor. (orcid)0000-0003-4525-2423<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-981-15-0871-4">https://doi.org/10.1007/978-981-15-0871-4</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Information Security 17th International Conference, ISSA 2018, Pretoria, South Africa, August 15&ndash;16, 2018, Revised Selected Papers ent://SD_ILS/0/SD_ILS:483660 2024-12-29T19:44:00Z 2024-12-29T19:44:00Z Yazar&#160;Venter, Hein. editor. (orcid)0000-0002-3607-8630&#160;Loock, Marianne. editor. (orcid)0000-0001-8005-716X&#160;Coetzee, Marijke. editor. (orcid)0000-0002-9157-3079&#160;Eloff, Mariki. editor. (orcid)0000-0001-8997-7931&#160;Eloff, Jan. editor. (orcid)0000-0003-4683-2198<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-3-030-11407-7">https://doi.org/10.1007/978-3-030-11407-7</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Critical Information Infrastructures Security 13th International Conference, CRITIS 2018, Kaunas, Lithuania, September 24-26, 2018, Revised Selected Papers ent://SD_ILS/0/SD_ILS:484061 2024-12-29T19:44:00Z 2024-12-29T19:44:00Z Yazar&#160;Luiijf, Eric. editor. (orcid)0000-0002-1821-9890&#160;&#381;utautait&#279;, Inga. editor. (orcid)0000-0002-6073-2823&#160;H&auml;mmerli, Bernhard M. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-3-030-05849-4">https://doi.org/10.1007/978-3-030-05849-4</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Information Systems Security 15th International Conference, ICISS 2019, Hyderabad, India, December 16&ndash;20, 2019, Proceedings ent://SD_ILS/0/SD_ILS:484509 2024-12-29T19:44:00Z 2024-12-29T19:44:00Z Yazar&#160;Garg, Deepak. editor. (orcid)0000-0002-0888-3093&#160;Kumar, N. V. Narendra. editor.&#160;Shyamasundar, Rudrapatna K. editor. (orcid)0000-0001-6966-0507&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-3-030-36945-3">https://doi.org/10.1007/978-3-030-36945-3</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Information Security Theory and Practice 12th IFIP WG 11.2 International Conference, WISTP 2018, Brussels, Belgium, December 10&ndash;11, 2018, Revised Selected Papers ent://SD_ILS/0/SD_ILS:484518 2024-12-29T19:44:00Z 2024-12-29T19:44:00Z Yazar&#160;Blazy, Olivier. editor. (orcid)0000-0001-6205-8249&#160;Yeun, Chan Yeob. editor. (orcid)0000-0002-1398-952X&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-3-030-20074-9">https://doi.org/10.1007/978-3-030-20074-9</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Advances in Information and Computer Security 14th International Workshop on Security, IWSEC 2019, Tokyo, Japan, August 28&ndash;30, 2019, Proceedings ent://SD_ILS/0/SD_ILS:484666 2024-12-29T19:44:00Z 2024-12-29T19:44:00Z Yazar&#160;Attrapadung, Nuttapong. editor. (orcid)0000-0003-4116-1751&#160;Yagi, Takeshi. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-3-030-26834-3">https://doi.org/10.1007/978-3-030-26834-3</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Progress in Cryptology &ndash; LATINCRYPT 2019 6th International Conference on Cryptology and Information Security in Latin America, Santiago de Chile, Chile, October 2&ndash;4, 2019, Proceedings ent://SD_ILS/0/SD_ILS:484918 2024-12-29T19:44:00Z 2024-12-29T19:44:00Z Yazar&#160;Schwabe, Peter. editor.&#160;Th&eacute;riault, Nicolas. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-3-030-30530-7">https://doi.org/10.1007/978-3-030-30530-7</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Advances in Cryptology &ndash; ASIACRYPT 2019 25th International Conference on the Theory and Application of Cryptology and Information Security, Kobe, Japan, December 8&ndash;12, 2019, Proceedings, Part III ent://SD_ILS/0/SD_ILS:484959 2024-12-29T19:44:00Z 2024-12-29T19:44:00Z Yazar&#160;Galbraith, Steven D. editor. (orcid)0000-0001-7114-8377&#160;Moriai, Shiho. editor. (orcid)0000-0002-6072-6183&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-3-030-34618-8">https://doi.org/10.1007/978-3-030-34618-8</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Advances in Cryptology &ndash; ASIACRYPT 2019 25th International Conference on the Theory and Application of Cryptology and Information Security, Kobe, Japan, December 8&ndash;12, 2019, Proceedings, Part II ent://SD_ILS/0/SD_ILS:484960 2024-12-29T19:44:00Z 2024-12-29T19:44:00Z Yazar&#160;Galbraith, Steven D. editor. (orcid)0000-0001-7114-8377&#160;Moriai, Shiho. editor. (orcid)0000-0002-6072-6183&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-3-030-34621-8">https://doi.org/10.1007/978-3-030-34621-8</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Information Security and Cryptology 14th International Conference, Inscrypt 2018, Fuzhou, China, December 14-17, 2018, Revised Selected Papers ent://SD_ILS/0/SD_ILS:485829 2024-12-29T19:44:00Z 2024-12-29T19:44:00Z Yazar&#160;Guo, Fuchun. editor. (orcid)0000-0001-6939-7710&#160;Huang, Xinyi. editor.&#160;Yung, Moti. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-3-030-14234-6">https://doi.org/10.1007/978-3-030-14234-6</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Innovative Security Solutions for Information Technology and Communications 11th International Conference, SecITC 2018, Bucharest, Romania, November 8&ndash;9, 2018, Revised Selected Papers ent://SD_ILS/0/SD_ILS:486352 2024-12-29T19:44:00Z 2024-12-29T19:44:00Z Yazar&#160;Lanet, Jean-Louis. editor. (orcid)0000-0002-4751-3941&#160;Toma, Cristian. editor. (orcid)0000-0001-9316-7739&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-3-030-12942-2">https://doi.org/10.1007/978-3-030-12942-2</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Information and Operational Technology Security Systems First International Workshop, IOSec 2018, CIPSEC Project, Heraklion, Crete, Greece, September 13, 2018, Revised Selected Papers ent://SD_ILS/0/SD_ILS:486944 2024-12-29T19:44:00Z 2024-12-29T19:44:00Z Yazar&#160;Fournaris, Apostolos P. editor. (orcid)0000-0002-4758-2349&#160;Lampropoulos, Konstantinos. editor.&#160;Mar&iacute;n Tordera, Eva. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-3-030-12085-6">https://doi.org/10.1007/978-3-030-12085-6</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Information Security and Privacy 24th Australasian Conference, ACISP 2019, Christchurch, New Zealand, July 3&ndash;5, 2019, Proceedings ent://SD_ILS/0/SD_ILS:486956 2024-12-29T19:44:00Z 2024-12-29T19:44:00Z Yazar&#160;Jang-Jaccard, Julian. editor. (orcid)0000-0002-1002-057X&#160;Guo, Fuchun. editor. (orcid)0000-0001-6939-7710&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-3-030-21548-4">https://doi.org/10.1007/978-3-030-21548-4</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Information Security 22nd International Conference, ISC 2019, New York City, NY, USA, September 16&ndash;18, 2019, Proceedings ent://SD_ILS/0/SD_ILS:484908 2024-12-29T19:44:00Z 2024-12-29T19:44:00Z Yazar&#160;Lin, Zhiqiang. editor.&#160;Papamanthou, Charalampos. editor.&#160;Polychronakis, Michalis. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-3-030-30215-3">https://doi.org/10.1007/978-3-030-30215-3</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Information Security Applications 19th International Conference, WISA 2018, Jeju Island, Korea, August 23&ndash;25, 2018, Revised Selected Papers ent://SD_ILS/0/SD_ILS:485283 2024-12-29T19:44:00Z 2024-12-29T19:44:00Z Yazar&#160;Kang, Brent ByungHoon. editor. (orcid)0000-0001-8984-1006&#160;Jang, JinSoo. editor. (orcid)0000-0003-2070-2408&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-3-030-17982-3">https://doi.org/10.1007/978-3-030-17982-3</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Advanced methodologies and technologies in system security, information privacy, and forensics ent://SD_ILS/0/SD_ILS:482009 2024-12-29T19:44:00Z 2024-12-29T19:44:00Z Yazar&#160;Khosrow-Pour, Mehdi, 1951- editor.&#160;IGI Global, publisher.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-7492-7">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-7492-7</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Handbook of Multimedia Information Security: Techniques and Applications ent://SD_ILS/0/SD_ILS:483348 2024-12-29T19:44:00Z 2024-12-29T19:44:00Z Yazar&#160;Singh, Amit Kumar. editor.&#160;Mohan, Anand. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-3-030-15887-3">https://doi.org/10.1007/978-3-030-15887-3</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Information Security and Cryptology &ndash; ICISC 2018 21st International Conference, Seoul, South Korea, November 28&ndash;30, 2018, Revised Selected Papers ent://SD_ILS/0/SD_ILS:483841 2024-12-29T19:44:00Z 2024-12-29T19:44:00Z Yazar&#160;Lee, Kwangsu. editor. (orcid)0000-0003-1910-8890&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-3-030-12146-4">https://doi.org/10.1007/978-3-030-12146-4</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Progress in Cryptology &ndash; LATINCRYPT 2017 5th International Conference on Cryptology and Information Security in Latin America, Havana, Cuba, September 20&ndash;22, 2017, Revised Selected Papers ent://SD_ILS/0/SD_ILS:486418 2024-12-29T19:44:00Z 2024-12-29T19:44:00Z Yazar&#160;Lange, Tanja. editor.&#160;Dunkelman, Orr. editor. (orcid)0000-0001-5799-2635&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-3-030-25283-0">https://doi.org/10.1007/978-3-030-25283-0</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Trusted Computing and Information Security 12th Chinese Conference, CTCIS 2018, Wuhan, China, October 18, 2018, Revised Selected Papers ent://SD_ILS/0/SD_ILS:482982 2024-12-29T19:44:00Z 2024-12-29T19:44:00Z Yazar&#160;Zhang, Huanguo. editor.&#160;Zhao, Bo. editor.&#160;Yan, Fei. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-981-13-5913-2">https://doi.org/10.1007/978-981-13-5913-2</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Advances in Cryptology &ndash; ASIACRYPT 2018 24th International Conference on the Theory and Application of Cryptology and Information Security, Brisbane, QLD, Australia, December 2&ndash;6, 2018, Proceedings, Part II ent://SD_ILS/0/SD_ILS:399086 2024-12-29T19:44:00Z 2024-12-29T19:44:00Z Yazar&#160;Peyrin, Thomas. editor. (orcid)0000-0002-2690-9197&#160;Galbraith, Steven. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-3-030-03329-3">https://doi.org/10.1007/978-3-030-03329-3</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Information Security Practice and Experience 14th International Conference, ISPEC 2018, Tokyo, Japan, September 25-27, 2018, Proceedings ent://SD_ILS/0/SD_ILS:399972 2024-12-29T19:44:00Z 2024-12-29T19:44:00Z Yazar&#160;Su, Chunhua. editor.&#160;Kikuchi, Hiroaki. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-3-319-99807-7">https://doi.org/10.1007/978-3-319-99807-7</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Critical Information Infrastructures Security 12th International Conference, CRITIS 2017, Lucca, Italy, October 8-13, 2017, Revised Selected Papers ent://SD_ILS/0/SD_ILS:399995 2024-12-29T19:44:00Z 2024-12-29T19:44:00Z Yazar&#160;D'Agostino, Gregorio. editor. (orcid)0000-0003-3657-5335&#160;Scala, Antonio. editor. (orcid)0000-0002-3414-2686&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-3-319-99843-5">https://doi.org/10.1007/978-3-319-99843-5</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Information and Communications Security 20th International Conference, ICICS 2018, Lille, France, October 29-31, 2018, Proceedings ent://SD_ILS/0/SD_ILS:400052 2024-12-29T19:44:00Z 2024-12-29T19:44:00Z Yazar&#160;Naccache, David. editor. (orcid)0000-0002-8651-6555&#160;Xu, Shouhuai. editor. (orcid)0000-0001-8034-0942&#160;Qing, Sihan. editor.&#160;Samarati, Pierangela. editor. (orcid)0000-0001-7395-4620&#160;Blanc, Gregory. editor. (orcid)0000-0001-8150-6617<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-3-030-01950-1">https://doi.org/10.1007/978-3-030-01950-1</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Information Security 21st International Conference, ISC 2018, Guildford, UK, September 9&ndash;12, 2018, Proceedings ent://SD_ILS/0/SD_ILS:400194 2024-12-29T19:44:00Z 2024-12-29T19:44:00Z Yazar&#160;Chen, Liqun. editor. (orcid)0000-0003-2680-4907&#160;Manulis, Mark. editor. (orcid)0000-0002-1512-9670&#160;Schneider, Steve. editor. (orcid)0000-0001-8365-6993&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-3-319-99136-8">https://doi.org/10.1007/978-3-319-99136-8</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Information Systems Security 14th International Conference, ICISS 2018, Bangalore, India, December 17-19, 2018, Proceedings ent://SD_ILS/0/SD_ILS:400247 2024-12-29T19:44:00Z 2024-12-29T19:44:00Z Yazar&#160;Ganapathy, Vinod. editor.&#160;Jaeger, Trent. editor.&#160;Shyamasundar, R.K. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-3-030-05171-6">https://doi.org/10.1007/978-3-030-05171-6</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Applications and Techniques in Information Security 9th International Conference, ATIS 2018, Nanning, China, November 9&ndash;11, 2018, Proceedings ent://SD_ILS/0/SD_ILS:400376 2024-12-29T19:44:00Z 2024-12-29T19:44:00Z Yazar&#160;Chen, Qingfeng. editor.&#160;Wu, Jia. editor.&#160;Zhang, Shichao. editor.&#160;Yuan, Changan. editor.&#160;Batten, Lynn. editor. (orcid)0000-0003-4525-2423<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-981-13-2907-4">https://doi.org/10.1007/978-981-13-2907-4</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Information and Communications Security 19th International Conference, ICICS 2017, Beijing, China, December 6-8, 2017, Proceedings ent://SD_ILS/0/SD_ILS:400786 2024-12-29T19:44:00Z 2024-12-29T19:44:00Z Yazar&#160;Qing, Sihan. editor.&#160;Mitchell, Chris. editor.&#160;Chen, Liqun. editor.&#160;Liu, Dongmei. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-3-319-89500-0">https://doi.org/10.1007/978-3-319-89500-0</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Information Security Applications 18th International Conference, WISA 2017, Jeju Island, Korea, August 24-26, 2017, Revised Selected Papers ent://SD_ILS/0/SD_ILS:401682 2024-12-29T19:44:00Z 2024-12-29T19:44:00Z Yazar&#160;Kang, Brent ByungHoon. editor. (orcid)0000-0001-8984-1006&#160;Kim, Taesoo. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-3-319-93563-8">https://doi.org/10.1007/978-3-319-93563-8</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Information Security and Cryptology &ndash; ICISC 2017 20th International Conference, Seoul, South Korea, November 29 - December 1, 2017, Revised Selected Papers ent://SD_ILS/0/SD_ILS:401614 2024-12-29T19:44:00Z 2024-12-29T19:44:00Z Yazar&#160;Kim, Howon. editor.&#160;Kim, Dong-Chan. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-3-319-78556-1">https://doi.org/10.1007/978-3-319-78556-1</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Information Security and Privacy 23rd Australasian Conference, ACISP 2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings ent://SD_ILS/0/SD_ILS:401992 2024-12-29T19:44:00Z 2024-12-29T19:44:00Z Yazar&#160;Susilo, Willy. editor. (orcid)0000-0002-1562-5105&#160;Yang, Guomin. editor. (orcid)0000-0002-4949-7738&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-3-319-93638-3">https://doi.org/10.1007/978-3-319-93638-3</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Information Security Theory and Practice 11th IFIP WG 11.2 International Conference, WISTP 2017, Heraklion, Crete, Greece, September 28&ndash;29, 2017, Proceedings ent://SD_ILS/0/SD_ILS:402215 2024-12-29T19:44:00Z 2024-12-29T19:44:00Z Yazar&#160;Hancke, Gerhard P. editor.&#160;Damiani, Ernesto. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-3-319-93524-9">https://doi.org/10.1007/978-3-319-93524-9</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Advances in Cryptology &ndash; ASIACRYPT 2018 24th International Conference on the Theory and Application of Cryptology and Information Security, Brisbane, QLD, Australia, December 2&ndash;6, 2018, Proceedings, Part III ent://SD_ILS/0/SD_ILS:399545 2024-12-29T19:44:00Z 2024-12-29T19:44:00Z Yazar&#160;Peyrin, Thomas. editor. (orcid)0000-0002-2690-9197&#160;Galbraith, Steven. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-3-030-03332-3">https://doi.org/10.1007/978-3-030-03332-3</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Security in Computer and Information Sciences First International ISCIS Security Workshop 2018, Euro-CYBERSEC 2018, London, UK, February 26-27, 2018, Revised Selected Papers ent://SD_ILS/0/SD_ILS:402736 2024-12-29T19:44:00Z 2024-12-29T19:44:00Z Yazar&#160;Gelenbe, Erol. editor. (orcid)0000-0001-9688-2201&#160;Campegiani, Paolo. editor.&#160;Czach&oacute;rski, Tadeusz. editor.&#160;Katsikas, Sokratis K. editor. (orcid)0000-0003-2966-9683&#160;Komnios, Ioannis. editor.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-3-319-95189-8">https://doi.org/10.1007/978-3-319-95189-8</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Information Security and Cryptology 13th International Conference, Inscrypt 2017, Xi'an, China, November 3&ndash;5, 2017, Revised Selected Papers ent://SD_ILS/0/SD_ILS:400830 2024-12-29T19:44:00Z 2024-12-29T19:44:00Z Yazar&#160;Chen, Xiaofeng. editor.&#160;Lin, Dongdai. editor.&#160;Yung, Moti. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-3-319-75160-3">https://doi.org/10.1007/978-3-319-75160-3</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Advances in Cryptology &ndash; ASIACRYPT 2018 24th International Conference on the Theory and Application of Cryptology and Information Security, Brisbane, QLD, Australia, December 2&ndash;6, 2018, Proceedings, Part I ent://SD_ILS/0/SD_ILS:399923 2024-12-29T19:44:00Z 2024-12-29T19:44:00Z Yazar&#160;Peyrin, Thomas. editor. (orcid)0000-0002-2690-9197&#160;Galbraith, Steven. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-3-030-03326-2">https://doi.org/10.1007/978-3-030-03326-2</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Advances in Information and Computer Security 13th International Workshop on Security, IWSEC 2018, Sendai, Japan, September 3-5, 2018, Proceedings ent://SD_ILS/0/SD_ILS:400111 2024-12-29T19:44:00Z 2024-12-29T19:44:00Z Yazar&#160;Inomata, Atsuo. editor.&#160;Yasuda, Kan. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-3-319-97916-8">https://doi.org/10.1007/978-3-319-97916-8</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Information Systems Security and Privacy Third International Conference, ICISSP 2017, Porto, Portugal, February 19-21, 2017, Revised Selected Papers ent://SD_ILS/0/SD_ILS:401486 2024-12-29T19:44:00Z 2024-12-29T19:44:00Z Yazar&#160;Mori, Paolo. editor.&#160;Furnell, Steven. editor. (orcid)0000-0003-0984-7542&#160;Camp, Olivier. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-3-319-93354-2">https://doi.org/10.1007/978-3-319-93354-2</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Practical Information Security A Competency-Based Education Course ent://SD_ILS/0/SD_ILS:401941 2024-12-29T19:44:00Z 2024-12-29T19:44:00Z Yazar&#160;Alsmadi, Izzat. author.&#160;Burdwell, Robert. author.&#160;Aleroud&nbsp;, Ahmed. author.&#160;Wahbeh, Abdallah. author.&#160;Al-Qudah, Mahmoud. author.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-3-319-72119-4">https://doi.org/10.1007/978-3-319-72119-4</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Information Security Education &ndash; Towards a Cybersecure Society 11th IFIP WG 11.8 World Conference, WISE 11, Held at the 24th IFIP World Computer Congress, WCC 2018, Poznan, Poland, September 18&ndash;20, 2018, Proceedings ent://SD_ILS/0/SD_ILS:399019 2024-12-29T19:44:00Z 2024-12-29T19:44:00Z Yazar&#160;Drevin, Lynette. editor. (orcid)0000-0001-9370-8216&#160;Theocharidou, Marianthi. editor. (orcid)0000-0002-8870-1746&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-3-319-99734-6">https://doi.org/10.1007/978-3-319-99734-6</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Information security science : measuring the vulnerability to data compromises ent://SD_ILS/0/SD_ILS:458968 2024-12-29T19:44:00Z 2024-12-29T19:44:00Z Yazar&#160;Young, Carl S., author.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128096437">http://www.sciencedirect.com/science/book/9780128096437</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Information Systems Security and Privacy First International Conference, ICISSP 2015, Angers, France, February 9-11, 2015, Revised Selected Papers ent://SD_ILS/0/SD_ILS:518355 2024-12-29T19:44:00Z 2024-12-29T19:44:00Z Yazar&#160;Camp, Olivier. editor.&#160;Weippl, Edgar. editor.&#160;Bidan, Christophe. editor.&#160;A&iuml;meur, Esma. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;XX(518355.1)<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-3-319-27668-7">https://doi.org/10.1007/978-3-319-27668-7</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Information Security Education Across the Curriculum 9th IFIP WG 11.8 World Conference, WISE 9, Hamburg, Germany, May 26-28, 2015, Proceedings ent://SD_ILS/0/SD_ILS:518386 2024-12-29T19:44:00Z 2024-12-29T19:44:00Z Yazar&#160;Bishop, Matt. editor.&#160;Miloslavskaya, Natalia. editor.&#160;Theocharidou, Marianthi. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;XX(518386.1)<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-3-319-18500-2">https://doi.org/10.1007/978-3-319-18500-2</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Applications and Techniques in Information Security 6th International Conference, ATIS 2015, Beijing, China, November 4-6, 2015, Proceedings ent://SD_ILS/0/SD_ILS:518475 2024-12-29T19:44:00Z 2024-12-29T19:44:00Z Yazar&#160;Niu, Wenjia. editor.&#160;Li, Gang. editor.&#160;Liu, Jiqiang. editor.&#160;Tan, Jianlong. editor.&#160;Guo, Li. editor.<br/>Yer Numaras&#305;&#160;XX(518475.1)<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-3-662-48683-2">https://doi.org/10.1007/978-3-662-48683-2</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> ISSE 2015 Highlights of the Information Security Solutions Europe 2015 Conference ent://SD_ILS/0/SD_ILS:518565 2024-12-29T19:44:00Z 2024-12-29T19:44:00Z Yazar&#160;Reimer, Helmut. editor.&#160;Pohlmann, Norbert. editor.&#160;Schneider, Wolfgang. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;XX(518565.1)<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-3-658-10934-9">https://doi.org/10.1007/978-3-658-10934-9</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Advances in Cryptology -- ASIACRYPT 2015 21st International Conference on the Theory and Application of Cryptology and Information Security,Auckland, New Zealand, November 29 -- December 3, 2015, Proceedings, Part I ent://SD_ILS/0/SD_ILS:518841 2024-12-29T19:44:00Z 2024-12-29T19:44:00Z Yazar&#160;Iwata, Tetsu. editor.&#160;Cheon, Jung Hee. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;XX(518841.1)<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-3-662-48797-6">https://doi.org/10.1007/978-3-662-48797-6</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Advances in Information and Computer Security 10th International Workshop on Security, IWSEC 2015, Nara, Japan, August 26-28, 2015, Proceedings ent://SD_ILS/0/SD_ILS:518843 2024-12-29T19:44:00Z 2024-12-29T19:44:00Z Yazar&#160;Tanaka, Keisuke. editor.&#160;Suga, Yuji. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;XX(518843.1)<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-3-319-22425-1">https://doi.org/10.1007/978-3-319-22425-1</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Information Security 16th International Conference, ISC 2013, Dallas, Texas, November 13-15, 2013, Proceedings ent://SD_ILS/0/SD_ILS:518845 2024-12-29T19:44:00Z 2024-12-29T19:44:00Z Yazar&#160;Desmedt, Yvo. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;XX(518845.1)<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-3-319-27659-5">https://doi.org/10.1007/978-3-319-27659-5</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Information Systems Security 11th International Conference, ICISS 2015, Kolkata, India, December 16-20, 2015. Proceedings ent://SD_ILS/0/SD_ILS:518854 2024-12-29T19:44:00Z 2024-12-29T19:44:00Z Yazar&#160;Jajoda, Sushil. editor.&#160;Mazumdar, Chandan. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;XX(518854.1)<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-3-319-26961-0">https://doi.org/10.1007/978-3-319-26961-0</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Information and Communications Security 16th International Conference, ICICS 2014, Hong Kong, China, December 16-17, 2014, Revised Selected Papers ent://SD_ILS/0/SD_ILS:518856 2024-12-29T19:44:00Z 2024-12-29T19:44:00Z Yazar&#160;Hui, Lucas C. K. editor.&#160;Qing, S. H. editor.&#160;Shi, Elaine. editor.&#160;Yiu, S. M. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;XX(518856.1)<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-3-319-21966-0">https://doi.org/10.1007/978-3-319-21966-0</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Cryptography and Information Security in the Balkans First International Conference, BalkanCryptSec 2014, Istanbul, Turkey, October 16-17, 2014, Revised Selected Papers ent://SD_ILS/0/SD_ILS:518872 2024-12-29T19:44:00Z 2024-12-29T19:44:00Z Yazar&#160;Ors, Berna. editor.&#160;Preneel, Bart. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;XX(518872.1)<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-3-319-21356-9">https://doi.org/10.1007/978-3-319-21356-9</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Information security analytics finding security insights, patterns, and anomalies in big data ent://SD_ILS/0/SD_ILS:355388 2024-12-29T19:44:00Z 2024-12-29T19:44:00Z Yazar&#160;Talabis, Mark, author.&#160;McPherson, Robert, author.&#160;Miyamoto, I, author.&#160;Martin, Jason L., author.<br/>Yer Numaras&#305;&#160;ONLINE(355388.1)<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128002070">http://www.sciencedirect.com/science/book/9780128002070</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Information Security and Cryptology - ICISC 2014 17th International Conference, Seoul, South Korea, December 3-5, 2014, Revised Selected Papers ent://SD_ILS/0/SD_ILS:519232 2024-12-29T19:44:00Z 2024-12-29T19:44:00Z Yazar&#160;Lee, Jooyoung. editor.&#160;Kim, Jongsung. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;XX(519232.1)<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-3-319-15943-0">https://doi.org/10.1007/978-3-319-15943-0</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Information Security Practice and Experience 11th International Conference, ISPEC 2015, Beijing, China, May 5-8, 2015, Proceedings ent://SD_ILS/0/SD_ILS:519253 2024-12-29T19:44:00Z 2024-12-29T19:44:00Z Yazar&#160;Lopez, Javier. editor.&#160;Wu, Yongdong. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;XX(519253.1)<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-3-319-17533-1">https://doi.org/10.1007/978-3-319-17533-1</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Codes, Cryptology, and Information Security First International Conference, C2SI 2015, Rabat, Morocco, May 26-28, 2015, Proceedings - In Honor of Thierry Berger ent://SD_ILS/0/SD_ILS:519257 2024-12-29T19:44:00Z 2024-12-29T19:44:00Z Yazar&#160;El Hajji, Said. editor.&#160;Nitaj, Abderrahmane. editor.&#160;Carlet, Claude. editor.&#160;Souidi, El Mamoun. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;XX(519257.1)<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-3-319-18681-8">https://doi.org/10.1007/978-3-319-18681-8</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Human Aspects of Information Security, Privacy, and Trust Third International Conference, HAS 2015, Held as Part of HCI International 2015, Los Angeles, CA, USA, August 2-7, 2015. Proceedings ent://SD_ILS/0/SD_ILS:519287 2024-12-29T19:44:00Z 2024-12-29T19:44:00Z Yazar&#160;Tryfonas, Theo. editor.&#160;Askoxylakis, Ioannis. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;XX(519287.1)<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-3-319-20376-8">https://doi.org/10.1007/978-3-319-20376-8</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Information Security Theory and Practice 9th IFIP WG 11.2 International Conference, WISTP 2015, Heraklion, Crete, Greece, August 24-25, 2015. Proceedings ent://SD_ILS/0/SD_ILS:519325 2024-12-29T19:44:00Z 2024-12-29T19:44:00Z Yazar&#160;Akram, Raja Naeem. editor.&#160;Jajodia, Sushil. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;XX(519325.1)<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-3-319-24018-3">https://doi.org/10.1007/978-3-319-24018-3</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Information Security 18th International Conference, ISC 2015, Trondheim, Norway, September 9-11, 2015, Proceedings ent://SD_ILS/0/SD_ILS:519069 2024-12-29T19:44:00Z 2024-12-29T19:44:00Z Yazar&#160;Lopez, Javier. editor.&#160;Mitchell, Chris J. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;XX(519069.1)<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-3-319-23318-5">https://doi.org/10.1007/978-3-319-23318-5</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Information Security Applications 15th International Workshop, WISA 2014, Jeju Island, Korea, August 25-27, 2014. Revised Selected Papers ent://SD_ILS/0/SD_ILS:519107 2024-12-29T19:44:00Z 2024-12-29T19:44:00Z Yazar&#160;Rhee, Kyung-Hyune. editor.&#160;Yi, Jeong Hyun. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;XX(519107.1)<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-3-319-15087-1">https://doi.org/10.1007/978-3-319-15087-1</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Information Security and Cryptology 10th International Conference, Inscrypt 2014, Beijing, China, December 13-15, 2014, Revised Selected Papers ent://SD_ILS/0/SD_ILS:518785 2024-12-29T19:44:00Z 2024-12-29T19:44:00Z Yazar&#160;Lin, Dongdai. editor.&#160;Yung, Moti. editor.&#160;Zhou, Jianying. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;XX(518785.1)<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-3-319-16745-9">https://doi.org/10.1007/978-3-319-16745-9</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Progress in Cryptology -- LATINCRYPT 2015 4th International Conference on Cryptology and Information Security in Latin America, Guadalajara, Mexico, August 23-26, 2015, Proceedings ent://SD_ILS/0/SD_ILS:518790 2024-12-29T19:44:00Z 2024-12-29T19:44:00Z Yazar&#160;Lauter, Kristin. editor.&#160;Rodr&iacute;guez-Henr&iacute;quez, Francisco. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;XX(518790.1)<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-3-319-22174-8">https://doi.org/10.1007/978-3-319-22174-8</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Progress in Cryptology - LATINCRYPT 2014 Third International Conference on Cryptology and Information Security in Latin America Florian&oacute;polis, Brazil, September 17-19, 2014 Revised Selected Papers ent://SD_ILS/0/SD_ILS:518796 2024-12-29T19:44:00Z 2024-12-29T19:44:00Z Yazar&#160;Aranha, Diego F. editor.&#160;Menezes, Alfred. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;XX(518796.1)<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-3-319-16295-9">https://doi.org/10.1007/978-3-319-16295-9</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Innovative Security Solutions for Information Technology and Communications 8th International Conference, SECITC 2015, Bucharest, Romania, June 11-12, 2015. Revised Selected Papers ent://SD_ILS/0/SD_ILS:518911 2024-12-29T19:44:00Z 2024-12-29T19:44:00Z Yazar&#160;Bica, Ion. editor.&#160;Naccache, David. editor.&#160;Simion, Emil. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;XX(518911.1)<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-3-319-27179-8">https://doi.org/10.1007/978-3-319-27179-8</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Advances in Cryptology - ASIACRYPT 2015 21st International Conference on the Theory and Application of Cryptology and Information Security, Auckland, New Zealand, November 29 -- December 3, 2015, Proceedings, Part II ent://SD_ILS/0/SD_ILS:518966 2024-12-29T19:44:00Z 2024-12-29T19:44:00Z Yazar&#160;Iwata, Tetsu. editor.&#160;Cheon, Jung Hee. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;XX(518966.1)<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-3-662-48800-3">https://doi.org/10.1007/978-3-662-48800-3</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Information Theoretic Security 8th International Conference, ICITS 2015, Lugano, Switzerland, May 2-5, 2015. Proceedings ent://SD_ILS/0/SD_ILS:519003 2024-12-29T19:44:00Z 2024-12-29T19:44:00Z Yazar&#160;Lehmann, Anja. editor.&#160;Wolf, Stefan. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;XX(519003.1)<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-3-319-17470-9">https://doi.org/10.1007/978-3-319-17470-9</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Information Security and Privacy 20th Australasian Conference, ACISP 2015, Brisbane, QLD, Australia, June 29 -- July 1, 2015, Proceedings ent://SD_ILS/0/SD_ILS:518770 2024-12-29T19:44:00Z 2024-12-29T19:44:00Z Yazar&#160;Foo, Ernest. editor.&#160;Stebila, Douglas. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;XX(518770.1)<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-3-319-19962-7">https://doi.org/10.1007/978-3-319-19962-7</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Information Security Practice and Experience 10th International Conference, ISPEC 2014, Fuzhou, China, May 5-8, 2014, Proceedings ent://SD_ILS/0/SD_ILS:485513 2024-12-29T19:44:00Z 2024-12-29T19:44:00Z Yazar&#160;Huang, Xinyi. editor.&#160;Zhou, Jianying. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-3-319-06320-1">https://doi.org/10.1007/978-3-319-06320-1</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Information Security 17th International Conference, ISC 2014, Hong Kong, China, October 12-14, 2014, Proceedings ent://SD_ILS/0/SD_ILS:485793 2024-12-29T19:44:00Z 2024-12-29T19:44:00Z Yazar&#160;Chow, Sherman S.M. editor.&#160;Camenisch, Jan. editor.&#160;Hui, Lucas C.K. editor.&#160;Yiu, Siu Ming. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-3-319-13257-0">https://doi.org/10.1007/978-3-319-13257-0</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Information Security Applications 14th International Workshop, WISA 2013, Jeju Island, Korea, August 19-21, 2013, Revised Selected Papers ent://SD_ILS/0/SD_ILS:486887 2024-12-29T19:44:00Z 2024-12-29T19:44:00Z Yazar&#160;Kim, Yongdae. editor.&#160;Lee, Heejo. editor.&#160;Perrig, Adrian. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-3-319-05149-9">https://doi.org/10.1007/978-3-319-05149-9</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Communication Technologies, Information Security and Sustainable Development Third International Multi-topic Conference, IMTIC 2013, Jamshoro, Pakistan, December 18--20, 2013, Revised Selected Papers ent://SD_ILS/0/SD_ILS:486961 2024-12-29T19:44:00Z 2024-12-29T19:44:00Z Yazar&#160;Shaikh, Faisal Karim. editor.&#160;Chowdhry, Bhawani Shankar. editor.&#160;Zeadally, Sherali. editor.&#160;Hussain, Dil Muhammad Akbar. editor.&#160;Memon, Aftab Ahmed. editor.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-3-319-10987-9">https://doi.org/10.1007/978-3-319-10987-9</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> ISSE 2014 Securing Electronic Business Processes Highlights of the Information Security Solutions Europe 2014 Conference ent://SD_ILS/0/SD_ILS:487216 2024-12-29T19:44:00Z 2024-12-29T19:44:00Z Yazar&#160;Reimer, Helmut. editor.&#160;Pohlmann, Norbert. editor.&#160;Schneider, Wolfgang. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-3-658-06708-3">https://doi.org/10.1007/978-3-658-06708-3</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Advances in Information and Computer Security 9th International Workshop on Security, IWSEC 2014, Hirosaki, Japan, August 27-29, 2014. Proceedings ent://SD_ILS/0/SD_ILS:487372 2024-12-29T19:44:00Z 2024-12-29T19:44:00Z Yazar&#160;Yoshida, Maki. editor.&#160;Mouri, Koichi. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-3-319-09843-2">https://doi.org/10.1007/978-3-319-09843-2</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Applications and Techniques in Information Security International Conference, ATIS 2014, Melbourne, Australia, November 26-28, 2014. Proceedings ent://SD_ILS/0/SD_ILS:488011 2024-12-29T19:44:00Z 2024-12-29T19:44:00Z Yazar&#160;Batten, Lynn. editor.&#160;Li, Gang. editor. (orcid)0000-0003-1583-641X&#160;Niu, Wenjia. editor.&#160;Warren, Matthew. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-3-662-45670-5">https://doi.org/10.1007/978-3-662-45670-5</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Advances in Cryptology -- ASIACRYPT 2014 20th International Conference on the Theory and Application of Cryptology and Information Security, Kaoshiung, Taiwan, China, December 7-11, 2014, Part II ent://SD_ILS/0/SD_ILS:488956 2024-12-29T19:44:00Z 2024-12-29T19:44:00Z Yazar&#160;Sarkar, Palash. editor.&#160;Iwata, Tetsu. editor. (orcid)0000-0002-4729-0979&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-3-662-45608-8">https://doi.org/10.1007/978-3-662-45608-8</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Information Security and Cryptology -- ICISC 2013 16th International Conference, Seoul, Korea, November 27-29, 2013, Revised Selected Papers ent://SD_ILS/0/SD_ILS:488986 2024-12-29T19:44:00Z 2024-12-29T19:44:00Z Yazar&#160;Lee, Hyang-Sook. editor.&#160;Han, Dong-Guk. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-3-319-12160-4">https://doi.org/10.1007/978-3-319-12160-4</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Advances in Cryptology -- ASIACRYPT 2014 20th International Conference on the Theory and Application of Cryptology and Information Security, Kaoshiung, Taiwan, China, December 7-11, 2014, Proceedings, Part I ent://SD_ILS/0/SD_ILS:489016 2024-12-29T19:44:00Z 2024-12-29T19:44:00Z Yazar&#160;Sarkar, Palash. editor.&#160;Iwata, Tetsu. editor. (orcid)0000-0002-4729-0979&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-3-662-45611-8">https://doi.org/10.1007/978-3-662-45611-8</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Availability, Reliability, and Security in Information Systems IFIP WG 8.4, 8.9, TC 5 International Cross-Domain Conference, CD-ARES 2014 and 4th InternationalWorkshop on Security and Cognitive Informatics for Homeland Defense, SeCIHD 2014, Fribourg, Switzerland, September 8-12, 2014. Proceedings ent://SD_ILS/0/SD_ILS:489055 2024-12-29T19:44:00Z 2024-12-29T19:44:00Z Yazar&#160;Teufel, Stephanie. editor.&#160;A Min, Tjoa. editor.&#160;You, Illsun. editor.&#160;Weippl, Edgar. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-3-319-10975-6">https://doi.org/10.1007/978-3-319-10975-6</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Information Security and Cryptology 9th International Conference, Inscrypt 2013, Guangzhou, China, November 27-30, 2013, Revised Selected Papers ent://SD_ILS/0/SD_ILS:489108 2024-12-29T19:44:00Z 2024-12-29T19:44:00Z Yazar&#160;Lin, Dongdai. editor.&#160;Xu, Shouhuai. editor. (orcid)0000-0001-8034-0942&#160;Yung, Moti. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-3-319-12087-4">https://doi.org/10.1007/978-3-319-12087-4</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Security leader insights for information protection : lessons and strategies from leading security professionals ent://SD_ILS/0/SD_ILS:355760 2024-12-29T19:44:00Z 2024-12-29T19:44:00Z Yazar&#160;Fahy, Bob, editor.<br/>Yer Numaras&#305;&#160;ONLINE(355760.1)<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128008430">http://www.sciencedirect.com/science/book/9780128008430</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> The basics of information security : understanding the fundamentals of InfoSec in theory and practice ent://SD_ILS/0/SD_ILS:355770 2024-12-29T19:44:00Z 2024-12-29T19:44:00Z Yazar&#160;Andress, Jason, author.<br/>Yer Numaras&#305;&#160;ONLINE(355770.1)<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128007440">http://www.sciencedirect.com/science/book/9780128007440</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Information Security and Privacy 19th Australasian Conference, ACISP 2014, Wollongong, NSW, Australia, July 7-9, 2014. Proceedings ent://SD_ILS/0/SD_ILS:487278 2024-12-29T19:44:00Z 2024-12-29T19:44:00Z Yazar&#160;Susilo, Willy. editor. (orcid)0000-0002-1562-5105&#160;Mu, Yi. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-3-319-08344-5">https://doi.org/10.1007/978-3-319-08344-5</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Information Theoretic Security 7th International Conference, ICITS 2013, Singapore, November 28-30, 2013, Proceedings ent://SD_ILS/0/SD_ILS:489420 2024-12-29T19:44:00Z 2024-12-29T19:44:00Z Yazar&#160;Padr&oacute;, Carles. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-3-319-04268-8">https://doi.org/10.1007/978-3-319-04268-8</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Information Security Theory and Practice. Securing the Internet of Things 8th IFIP WG 11.2 International Workshop, WISTP 2014, Heraklion, Crete, Greece, June 30 - July 2, 2014, Proceedings ent://SD_ILS/0/SD_ILS:489541 2024-12-29T19:44:00Z 2024-12-29T19:44:00Z Yazar&#160;Naccache, David. editor.&#160;Sauveron, Damien. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-3-662-43826-8">https://doi.org/10.1007/978-3-662-43826-8</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Information Systems Security 10th International Conference, ICISS 2014, Hyderabad, India, December 16-20, 2014. Proceedings ent://SD_ILS/0/SD_ILS:489545 2024-12-29T19:44:00Z 2024-12-29T19:44:00Z Yazar&#160;Prakash, Atul. editor.&#160;Shyamasundar, Rudrapatna. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-3-319-13841-1">https://doi.org/10.1007/978-3-319-13841-1</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> What Is Computer Science? An Information Security Perspective ent://SD_ILS/0/SD_ILS:488536 2024-12-29T19:44:00Z 2024-12-29T19:44:00Z Yazar&#160;Page, Daniel. author.&#160;Smart, Nigel. author.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-3-319-04042-4">https://doi.org/10.1007/978-3-319-04042-4</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Human Aspects of Information Security, Privacy, and Trust Second International Conference, HAS 2014, Held as Part of HCI International 2014, Heraklion, Crete, Greece, June 22-27, 2014, Proceedings ent://SD_ILS/0/SD_ILS:488930 2024-12-29T19:44:00Z 2024-12-29T19:44:00Z Yazar&#160;Tryfonas, Theo. editor.&#160;Askoxylakis, Ioannis. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-3-319-07620-1">https://doi.org/10.1007/978-3-319-07620-1</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Managing Risk and Information Security Protect to Enable ent://SD_ILS/0/SD_ILS:330694 2024-12-29T19:44:00Z 2024-12-29T19:44:00Z Yazar&#160;Harkins, Malcolm. author.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE(330694.1)<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-1-4302-5114-9">http://dx.doi.org/10.1007/978-1-4302-5114-9</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Advances in Cryptology - ASIACRYPT 2013 19th International Conference on the Theory and Application of Cryptology and Information Security, Bengaluru, India, December 1-5, 2013, Proceedings, Part I ent://SD_ILS/0/SD_ILS:335157 2024-12-29T19:44:00Z 2024-12-29T19:44:00Z Yazar&#160;Sako, Kazue. editor.&#160;Sarkar, Palash. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE(335157.1)<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-3-642-42033-7">http://dx.doi.org/10.1007/978-3-642-42033-7</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> ISSE 2013 Securing Electronic Business Processes Highlights of the Information Security Solutions Europe 2013 Conference ent://SD_ILS/0/SD_ILS:335292 2024-12-29T19:44:00Z 2024-12-29T19:44:00Z Yazar&#160;Reimer, Helmut. editor.&#160;Pohlmann, Norbert. editor.&#160;Schneider, Wolfgang. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE(335292.1)<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-3-658-03371-2">http://dx.doi.org/10.1007/978-3-658-03371-2</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Advances in Information and Computer Security 8th International Workshop on Security, IWSEC 2013, Okinawa, Japan, November 18-20, 2013, Proceedings ent://SD_ILS/0/SD_ILS:335098 2024-12-29T19:44:00Z 2024-12-29T19:44:00Z Yazar&#160;Sakiyama, Kazuo. editor.&#160;Terada, Masayuki. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE(335098.1)<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-3-642-41383-4">http://dx.doi.org/10.1007/978-3-642-41383-4</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Critical Information Infrastructure Security 6th International Workshop, CRITIS 2011, Lucerne, Switzerland, September 8-9, 2011, Revised Selected Papers ent://SD_ILS/0/SD_ILS:335107 2024-12-29T19:44:00Z 2024-12-29T19:44:00Z Yazar&#160;Bologna, Sandro. editor.&#160;H&auml;mmerli, Bernhard. editor.&#160;Gritzalis, Dimitris. editor.&#160;Wolthusen, Stephen. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE(335107.1)<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-3-642-41476-3">http://dx.doi.org/10.1007/978-3-642-41476-3</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Critical Information Infrastructures Security 7th International Workshop, CRITIS 2012, Lillehammer, Norway, September 17-18, 2012, Revised Selected Papers ent://SD_ILS/0/SD_ILS:335110 2024-12-29T19:44:00Z 2024-12-29T19:44:00Z Yazar&#160;H&auml;mmerli, Bernhard M. editor.&#160;Kalstad Svendsen, Nils. editor.&#160;Lopez, Javier. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE(335110.1)<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-3-642-41485-5">http://dx.doi.org/10.1007/978-3-642-41485-5</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Information Technology Convergence Security, Robotics, Automations and Communication ent://SD_ILS/0/SD_ILS:336345 2024-12-29T19:44:00Z 2024-12-29T19:44:00Z Yazar&#160;Park, James J. (Jong Hyuk). editor.&#160;Barolli, Leonard. editor.&#160;Xhafa, Fatos. editor.&#160;Jeong, Hwa-Young. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE(336345.1)<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-94-007-6996-0">http://dx.doi.org/10.1007/978-94-007-6996-0</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Information and Communications Security 15th International Conference, ICICS 2013, Beijing, China, November 20-22, 2013. Proceedings ent://SD_ILS/0/SD_ILS:332941 2024-12-29T19:44:00Z 2024-12-29T19:44:00Z Yazar&#160;Qing, Sihan. editor.&#160;Zhou, Jianying. editor.&#160;Liu, Dongmei. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE(332941.1)<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-3-319-02726-5">http://dx.doi.org/10.1007/978-3-319-02726-5</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Critical Information Infrastructures Security 8th International Workshop, CRITIS 2013, Amsterdam, The Netherlands, September 16-18, 2013, Revised Selected Papers ent://SD_ILS/0/SD_ILS:333008 2024-12-29T19:44:00Z 2024-12-29T19:44:00Z Yazar&#160;Luiijf, Eric. editor.&#160;Hartel, Pieter. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE(333008.1)<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-3-319-03964-0">http://dx.doi.org/10.1007/978-3-319-03964-0</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Advances in Cryptology - ASIACRYPT 2013 19th International Conference on the Theory and Application of Cryptology and Information Security, Bengaluru, India, December 1-5, 2013, Proceedings, Part II ent://SD_ILS/0/SD_ILS:335160 2024-12-29T19:44:00Z 2024-12-29T19:44:00Z Yazar&#160;Sako, Kazue. editor.&#160;Sarkar, Palash. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE(335160.1)<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-3-642-42045-0">http://dx.doi.org/10.1007/978-3-642-42045-0</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Strategic intelligence management : national security imperatives and information and communications technologies ent://SD_ILS/0/SD_ILS:270363 2024-12-29T19:44:00Z 2024-12-29T19:44:00Z Yazar&#160;Akhgar, Babak.&#160;Yates, Simeon.<br/>Yer Numaras&#305;&#160;TK5102.85 A44 2013<br/>Format:&#160;Kitap<br/>Durum&#160;Beytepe K&uuml;t&uuml;phanesi~1<br/> Information Security Practice and Experience 9th International Conference, ISPEC 2013, Lanzhou, China, May 12-14, 2013. Proceedings ent://SD_ILS/0/SD_ILS:334519 2024-12-29T19:44:00Z 2024-12-29T19:44:00Z Yazar&#160;Deng, Robert H. editor.&#160;Feng, Tao. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE(334519.1)<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-3-642-38033-4">http://dx.doi.org/10.1007/978-3-642-38033-4</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Information Security and Privacy 18th Australasian Conference, ACISP 2013, Brisbane, Australia, July 1-3, 2013. Proceedings ent://SD_ILS/0/SD_ILS:334720 2024-12-29T19:44:00Z 2024-12-29T19:44:00Z Yazar&#160;Boyd, Colin. editor.&#160;Simpson, Leonie. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE(334720.1)<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-3-642-39059-3">http://dx.doi.org/10.1007/978-3-642-39059-3</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Information Security and Cryptology 8th International Conference, Inscrypt 2012, Beijing, China, November 28-30, 2012, Revised Selected Papers ent://SD_ILS/0/SD_ILS:334613 2024-12-29T19:44:00Z 2024-12-29T19:44:00Z Yazar&#160;Kuty&#322;owski, Miros&#322;aw. editor.&#160;Yung, Moti. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE(334613.1)<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-3-642-38519-3">http://dx.doi.org/10.1007/978-3-642-38519-3</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Security and Privacy Protection in Information Processing Systems 28th IFIP TC 11 International Conference, SEC 2013, Auckland, New Zealand, July 8-10, 2013. Proceedings ent://SD_ILS/0/SD_ILS:334755 2024-12-29T19:44:00Z 2024-12-29T19:44:00Z Yazar&#160;Janczewski, Lech J. editor.&#160;Wolfe, Henry B. editor.&#160;Shenoi, Sujeet. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE(334755.1)<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-3-642-39218-4">http://dx.doi.org/10.1007/978-3-642-39218-4</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Information Systems Security 9th International Conference, ICISS 2013, Kolkata, India, December 16-20, 2013. Proceedings ent://SD_ILS/0/SD_ILS:335194 2024-12-29T19:44:00Z 2024-12-29T19:44:00Z Yazar&#160;Bagchi, Aditya. editor.&#160;Ray, Indrakshi. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE(335194.1)<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-3-642-45204-8">http://dx.doi.org/10.1007/978-3-642-45204-8</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Information Security and Cryptology &ndash; ICISC 2012 15th International Conference, Seoul, Korea, November 28-30, 2012, Revised Selected Papers ent://SD_ILS/0/SD_ILS:334470 2024-12-29T19:44:00Z 2024-12-29T19:44:00Z Yazar&#160;Kwon, Taekyoung. editor.&#160;Lee, Mun-Kyu. editor.&#160;Kwon, Daesung. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE(334470.1)<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-3-642-37682-5">http://dx.doi.org/10.1007/978-3-642-37682-5</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Information Security Theory and Practice. Security of Mobile and Cyber-Physical Systems 7th IFIP WG 11.2 International Workshop, WISTP 2013, Heraklion, Greece, May 28-30, 2013. Proceedings ent://SD_ILS/0/SD_ILS:334616 2024-12-29T19:44:00Z 2024-12-29T19:44:00Z Yazar&#160;Cavallaro, Lorenzo. editor.&#160;Gollmann, Dieter. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE(334616.1)<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-3-642-38530-8">http://dx.doi.org/10.1007/978-3-642-38530-8</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Human Aspects of Information Security, Privacy, and Trust First International Conference, HAS 2013, Held as Part of HCI International 2013, Las Vegas, NV, USA, July 21-26, 2013. Proceedings ent://SD_ILS/0/SD_ILS:334786 2024-12-29T19:44:00Z 2024-12-29T19:44:00Z Yazar&#160;Marinos, Louis. editor.&#160;Askoxylakis, Ioannis. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE(334786.1)<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-3-642-39345-7">http://dx.doi.org/10.1007/978-3-642-39345-7</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Information Assurance and Security Education and Training 8th IFIP WG 11.8 World Conference on Information Security Education, WISE 8, Auckland, New Zealand, July 8-10, 2013, Proceedings, WISE 7, Lucerne Switzerland, June 9-10, 2011, and WISE 6, Bento Gon&ccedil;alves, RS, Brazil, July 27-31, 2009, Revised Selected Papers ent://SD_ILS/0/SD_ILS:334794 2024-12-29T19:44:00Z 2024-12-29T19:44:00Z Yazar&#160;Dodge, Ronald C. editor.&#160;Futcher, Lynn. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE(334794.1)<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-3-642-39377-8">http://dx.doi.org/10.1007/978-3-642-39377-8</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Availability, Reliability, and Security in Information Systems and HCI IFIP WG 8.4, 8.9, TC 5 International Cross-Domain Conference, CD-ARES 2013, Regensburg, Germany, September 2-6, 2013. Proceedings ent://SD_ILS/0/SD_ILS:334958 2024-12-29T19:44:00Z 2024-12-29T19:44:00Z Yazar&#160;Cuzzocrea, Alfredo. editor.&#160;Kittl, Christian. editor.&#160;Simos, Dimitris E. editor.&#160;Weippl, Edgar. editor.&#160;Xu, Lida. editor.<br/>Yer Numaras&#305;&#160;ONLINE(334958.1)<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-3-642-40511-2">http://dx.doi.org/10.1007/978-3-642-40511-2</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Advances in Security of Information and Communication Networks First International Conference, SecNet 2013, Cairo, Egypt, September 3-5, 2013. Proceedings ent://SD_ILS/0/SD_ILS:334976 2024-12-29T19:44:00Z 2024-12-29T19:44:00Z Yazar&#160;Awad, Ali Ismail. editor.&#160;Hassanien, Aboul Ella. editor.&#160;Baba, Kensuke. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE(334976.1)<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-3-642-40597-6">http://dx.doi.org/10.1007/978-3-642-40597-6</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Information Systems: Development, Learning, Security 6th SIGSAND/PLAIS EuroSymposium 2013, Gda&#324;sk, Poland, September 26, 2013. Proceedings ent://SD_ILS/0/SD_ILS:335020 2024-12-29T19:44:00Z 2024-12-29T19:44:00Z Yazar&#160;Wrycza, Stanis&#322;aw. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE(335020.1)<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-3-642-40855-7">http://dx.doi.org/10.1007/978-3-642-40855-7</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Information security policy development for compliance ISO/IEC 27001, NIST SP 800-53, HIPAA standard, PCI DSS V2.0, and AUP V5.0 ent://SD_ILS/0/SD_ILS:288173 2024-12-29T19:44:00Z 2024-12-29T19:44:00Z Yazar&#160;Williams, Barry L.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://marc.crcnetbase.com/isbn/9781466580596">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> PRAGMATIC security metrics applying metametrics to information security ent://SD_ILS/0/SD_ILS:289974 2024-12-29T19:44:00Z 2024-12-29T19:44:00Z Yazar&#160;Brotby, W. Krag.&#160;Hinson, Gary.&#160;Kabay, Michel E.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://marc.crcnetbase.com/isbn/9781439881538">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Information Sharing and Data Protection in the Area of Freedom, Security and Justice Towards Harmonised Data Protection Principles for Information Exchange at EU-level ent://SD_ILS/0/SD_ILS:195011 2024-12-29T19:44:00Z 2024-12-29T19:44:00Z Yazar&#160;Boehm, Franziska. author.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-3-642-22392-1">http://dx.doi.org/10.1007/978-3-642-22392-1</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Security and Privacy in Mobile Information and Communication Systems Third International ICST Conference, MobiSec 2011, Aalborg, Denmark, May 17-19, 2011, Revised Selected Papers ent://SD_ILS/0/SD_ILS:196850 2024-12-29T19:44:00Z 2024-12-29T19:44:00Z Yazar&#160;Prasad, Ramjee. editor.&#160;Farkas, K&aacute;roly. editor.&#160;Schmidt, Andreas U. editor.&#160;Lioy, Antonio. editor.&#160;Russello, Giovanni. editor.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-3-642-30244-2">http://dx.doi.org/10.1007/978-3-642-30244-2</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Information Security Theory and Practice. Security, Privacy and Trust in Computing Systems and Ambient Intelligent Ecosystems 6th IFIP WG 11.2 International Workshop, WISTP 2012, Egham, UK, June 20-22, 2012. Proceedings ent://SD_ILS/0/SD_ILS:196995 2024-12-29T19:44:00Z 2024-12-29T19:44:00Z Yazar&#160;Askoxylakis, Ioannis. editor.&#160;P&ouml;hls, Henrich C. editor.&#160;Posegga, Joachim. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-3-642-30955-7">http://dx.doi.org/10.1007/978-3-642-30955-7</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Information Security and Privacy 17th Australasian Conference, ACISP 2012, Wollongong, NSW, Australia, July 9-11, 2012. Proceedings ent://SD_ILS/0/SD_ILS:197080 2024-12-29T19:44:00Z 2024-12-29T19:44:00Z Yazar&#160;Susilo, Willy. editor.&#160;Mu, Yi. editor.&#160;Seberry, Jennifer. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-3-642-31448-3">http://dx.doi.org/10.1007/978-3-642-31448-3</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Information Security and Cryptology - ICISC 2011 14th International Conference, Seoul, Korea, November 30 - December 2, 2011. Revised Selected Papers ent://SD_ILS/0/SD_ILS:197153 2024-12-29T19:44:00Z 2024-12-29T19:44:00Z Yazar&#160;Kim, Howon. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-3-642-31912-9">http://dx.doi.org/10.1007/978-3-642-31912-9</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Information Theoretic Security 6th International Conference, ICITS 2012, Montreal, QC, Canada, August 15-17, 2012. Proceedings ent://SD_ILS/0/SD_ILS:197201 2024-12-29T19:44:00Z 2024-12-29T19:44:00Z Yazar&#160;Smith, Adam. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-3-642-32284-6">http://dx.doi.org/10.1007/978-3-642-32284-6</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Multidisciplinary Research and Practice for Information Systems IFIP WG 8.4, 8.9/TC 5 International Cross-Domain Conference and Workshop on Availability, Reliability, and Security, CD-ARES 2012, Prague, Czech Republic, August 20-24, 2012. Proceedings ent://SD_ILS/0/SD_ILS:197227 2024-12-29T19:44:00Z 2024-12-29T19:44:00Z Yazar&#160;Quirchmayr, Gerald. editor.&#160;Basl, Josef. editor.&#160;You, Ilsun. editor.&#160;Xu, Lida. editor.&#160;Weippl, Edgar. editor.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-3-642-32498-7">http://dx.doi.org/10.1007/978-3-642-32498-7</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Progress in Cryptology &ndash; LATINCRYPT 2012 2nd International Conference on Cryptology and Information Security in Latin America, Santiago, Chile, October 7-10, 2012. Proceedings ent://SD_ILS/0/SD_ILS:197384 2024-12-29T19:44:00Z 2024-12-29T19:44:00Z Yazar&#160;Hevia, Alejandro. editor.&#160;Neven, Gregory. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-3-642-33481-8">http://dx.doi.org/10.1007/978-3-642-33481-8</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Information Security 15th International Conference, ISC 2012, Passau, Germany, September 19-21, 2012. Proceedings ent://SD_ILS/0/SD_ILS:197365 2024-12-29T19:44:00Z 2024-12-29T19:44:00Z Yazar&#160;Gollmann, Dieter. editor.&#160;Freiling, Felix C. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-3-642-33383-5">http://dx.doi.org/10.1007/978-3-642-33383-5</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Security and Privacy in Mobile Information and Communication Systems 4th International Conference, MobiSec 2012, Frankfurt am Main, Germany, June 25-26, 2012, Revised Selected Papers ent://SD_ILS/0/SD_ILS:197367 2024-12-29T19:44:00Z 2024-12-29T19:44:00Z Yazar&#160;Schmidt, Andreas U. editor.&#160;Russello, Giovanni. editor.&#160;Krontiris, Ioannis. editor.&#160;Lian, Shiguo. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-3-642-33392-7">http://dx.doi.org/10.1007/978-3-642-33392-7</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Network Computing and Information Security Second International Conference, NCIS 2012, Shanghai, China, December 7-9, 2012. Proceedings ent://SD_ILS/0/SD_ILS:197580 2024-12-29T19:44:00Z 2024-12-29T19:44:00Z Yazar&#160;Lei, Jingsheng. editor.&#160;Wang, Fu Lee. editor.&#160;Li, Mo. editor.&#160;Luo, Yuan. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-3-642-35211-9">http://dx.doi.org/10.1007/978-3-642-35211-9</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Information Security Applications 13th International Workshop, WISA 2012, Jeju Island, Korea, August 16-18, 2012, Revised Selected Papers ent://SD_ILS/0/SD_ILS:197604 2024-12-29T19:44:00Z 2024-12-29T19:44:00Z Yazar&#160;Lee, Dong Hoon. editor.&#160;Yung, Moti. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-3-642-35416-8">http://dx.doi.org/10.1007/978-3-642-35416-8</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> ISSE 2012 Securing Electronic Business Processes Highlights of the Information Security Solutions Europe 2012 Conference ent://SD_ILS/0/SD_ILS:197662 2024-12-29T19:44:00Z 2024-12-29T19:44:00Z Yazar&#160;Reimer, Helmut. editor.&#160;Pohlmann, Norbert. editor.&#160;Schneider, Wolfgang. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-3-658-00333-3">http://dx.doi.org/10.1007/978-3-658-00333-3</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Access contested security, identity, and resistance in Asian cyberspace information revolution and global politics ent://SD_ILS/0/SD_ILS:247542 2024-12-29T19:44:00Z 2024-12-29T19:44:00Z Yazar&#160;Deibert, Ronald.&#160;Project Muse.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://muse.jhu.edu/books/9780262298919/">Full text available: </a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Security and Intelligent Information Systems International Joint Conferences, SIIS 2011, Warsaw, Poland, June 13-14, 2011, Revised Selected Papers ent://SD_ILS/0/SD_ILS:195894 2024-12-29T19:44:00Z 2024-12-29T19:44:00Z Yazar&#160;Bouvry, Pascal. editor.&#160;K&#322;opotek, Mieczys&#322;aw A. editor.&#160;Lepr&eacute;vost, Franck. editor.&#160;Marciniak, Ma&#322;gorzata. editor.&#160;Mykowiecka, Agnieszka. editor.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-3-642-25261-7">http://dx.doi.org/10.1007/978-3-642-25261-7</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Information security risk assessment toolkit practical assessments through data collection and data analysis ent://SD_ILS/0/SD_ILS:145470 2024-12-29T19:44:00Z 2024-12-29T19:44:00Z Yazar&#160;Talabis, Mark.&#160;Martin, Jason.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597497350">http://www.sciencedirect.com/science/book/9781597497350</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Information Security Applications 12th International Workshop, WISA 2011, Jeju Island, Korea, August 22-24, 2011. Revised Selected Papers ent://SD_ILS/0/SD_ILS:196291 2024-12-29T19:44:00Z 2024-12-29T19:44:00Z Yazar&#160;Jung, Souhwan. editor.&#160;Yung, Moti. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-3-642-27890-7">http://dx.doi.org/10.1007/978-3-642-27890-7</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Information Security Technology for Applications 15th Nordic Conference on Secure IT Systems, NordSec 2010, Espoo, Finland, October 27-29, 2010, Revised Selected Papers ent://SD_ILS/0/SD_ILS:196303 2024-12-29T19:44:00Z 2024-12-29T19:44:00Z Yazar&#160;Aura, Tuomas. editor.&#160;J&auml;rvinen, Kimmo. editor.&#160;Nyberg, Kaisa. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-3-642-27937-9">http://dx.doi.org/10.1007/978-3-642-27937-9</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Information Security Practice and Experience 8th International Conference, ISPEC 2012, Hangzhou, China, April 9-12, 2012. Proceedings ent://SD_ILS/0/SD_ILS:196613 2024-12-29T19:44:00Z 2024-12-29T19:44:00Z Yazar&#160;Ryan, Mark D. editor.&#160;Smyth, Ben. editor.&#160;Wang, Guilin. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-3-642-29101-2">http://dx.doi.org/10.1007/978-3-642-29101-2</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Information Security Technology for Applications 16th Nordic Conference on Secure IT Systems, NordSec 2011, Tallinn, Estonia, October 26-28, 2011, Revised Selected Papers ent://SD_ILS/0/SD_ILS:196738 2024-12-29T19:44:00Z 2024-12-29T19:44:00Z Yazar&#160;Laud, Peeter. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-3-642-29615-4">http://dx.doi.org/10.1007/978-3-642-29615-4</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Information Security and Privacy Research 27th IFIP TC 11 Information Security and Privacy Conference, SEC 2012, Heraklion, Crete, Greece, June 4-6, 2012. Proceedings ent://SD_ILS/0/SD_ILS:196886 2024-12-29T19:44:00Z 2024-12-29T19:44:00Z Yazar&#160;Gritzalis, Dimitris. editor.&#160;Furnell, Steven. editor.&#160;Theoharidou, Marianthi. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-3-642-30436-1">http://dx.doi.org/10.1007/978-3-642-30436-1</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Advances in Information and Computer Security 7th International Workshop on Security, IWSEC 2012, Fukuoka, Japan, November 7-9, 2012. Proceedings ent://SD_ILS/0/SD_ILS:197475 2024-12-29T19:44:00Z 2024-12-29T19:44:00Z Yazar&#160;Hanaoka, Goichiro. editor.&#160;Yamauchi, Toshihiro. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-3-642-34117-5">http://dx.doi.org/10.1007/978-3-642-34117-5</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Information and Communications Security 14th International Conference, ICICS 2012, Hong Kong, China, October 29-31, 2012. Proceedings ent://SD_ILS/0/SD_ILS:197478 2024-12-29T19:44:00Z 2024-12-29T19:44:00Z Yazar&#160;Chim, Tat Wing. editor.&#160;Yuen, Tsz Hon. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-3-642-34129-8">http://dx.doi.org/10.1007/978-3-642-34129-8</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Information Security and Cryptology 7th International Conference, Inscrypt 2011, Beijing, China, November 30 &ndash; December 3, 2011. Revised Selected Papers ent://SD_ILS/0/SD_ILS:197541 2024-12-29T19:44:00Z 2024-12-29T19:44:00Z Yazar&#160;Wu, Chuan-Kun. editor.&#160;Yung, Moti. editor.&#160;Lin, Dongdai. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-3-642-34704-7">http://dx.doi.org/10.1007/978-3-642-34704-7</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Advances in Cryptology &ndash; ASIACRYPT 2012 18th International Conference on the Theory and Application of Cryptology and Information Security, Beijing, China, December 2-6, 2012. Proceedings ent://SD_ILS/0/SD_ILS:197559 2024-12-29T19:44:00Z 2024-12-29T19:44:00Z Yazar&#160;Wang, Xiaoyun. editor.&#160;Sako, Kazue. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-3-642-34961-4">http://dx.doi.org/10.1007/978-3-642-34961-4</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Information Systems Security 8th International Conference, ICISS 2012, Guwahati, India, December 15-19, 2012. Proceedings ent://SD_ILS/0/SD_ILS:197566 2024-12-29T19:44:00Z 2024-12-29T19:44:00Z Yazar&#160;Venkatakrishnan, Venkat. editor.&#160;Goswami, Diganta. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-3-642-35130-3">http://dx.doi.org/10.1007/978-3-642-35130-3</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Information Flow Based Security Control Beyond RBAC How to enable fine-grained security policy enforcement in business processes beyond limitations of role-based access control (RBAC) ent://SD_ILS/0/SD_ILS:198953 2024-12-29T19:44:00Z 2024-12-29T19:44:00Z Yazar&#160;Fischer-Hellmann, Klaus-Peter. author.&#160;Bischoff, Rainer. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-3-8348-2618-3">http://dx.doi.org/10.1007/978-3-8348-2618-3</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Information security governance simplified from the boardroom to the keyboard ent://SD_ILS/0/SD_ILS:290662 2024-12-29T19:44:00Z 2024-12-29T19:44:00Z Yazar&#160;Fitzgerald, Todd.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://marc.crcnetbase.com/isbn/9781439811658">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> The basics of information security understanding the fundamentals of InfoSec in theory and practice ent://SD_ILS/0/SD_ILS:145371 2024-12-29T19:44:00Z 2024-12-29T19:44:00Z Yazar&#160;Andress, Jason.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597496537">http://www.sciencedirect.com/science/book/9781597496537</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Security de-engineering solving the problems in information risk management ent://SD_ILS/0/SD_ILS:286209 2024-12-29T19:44:00Z 2024-12-29T19:44:00Z Yazar&#160;Tibble, Ian.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://marc.crcnetbase.com/isbn/9781439868355">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Readings and cases in information security : law and ethics ent://SD_ILS/0/SD_ILS:267743 2024-12-29T19:44:00Z 2024-12-29T19:44:00Z Yazar&#160;Whitman, Michael E.&#160;Mattord, Herbert J.<br/>Yer Numaras&#305;&#160;TK5105.878 W54 2011<br/>Format:&#160;Kitap<br/>Durum&#160;Beytepe K&uuml;t&uuml;phanesi~1<br/> Information Security Practice and Experience 7th International Conference, ISPEC 2011, Guangzhou, China, May 30 &ndash; June 1, 2011. Proceedings ent://SD_ILS/0/SD_ILS:194568 2024-12-29T19:44:00Z 2024-12-29T19:44:00Z Yazar&#160;Bao, Feng. editor.&#160;Weng, Jian. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-3-642-21031-0">http://dx.doi.org/10.1007/978-3-642-21031-0</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Information Security Theory and Practice. Security and Privacy of Mobile Devices in Wireless Communication 5th IFIP WG 11.2 International Workshop, WISTP 2011, Heraklion, Crete, Greece, June 1-3, 2011. Proceedings ent://SD_ILS/0/SD_ILS:194571 2024-12-29T19:44:00Z 2024-12-29T19:44:00Z Yazar&#160;Ardagna, Claudio A. editor.&#160;Zhou, Jianying. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-3-642-21040-2">http://dx.doi.org/10.1007/978-3-642-21040-2</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Computational Intelligence in Security for Information Systems 4th International Conference, CISIS 2011, Held at IWANN 2011, Torremolinos-M&aacute;laga, Spain, June 8-10, 2011. Proceedings ent://SD_ILS/0/SD_ILS:194663 2024-12-29T19:44:00Z 2024-12-29T19:44:00Z Yazar&#160;Herrero, &Aacute;lvaro. editor.&#160;Corchado, Emilio. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-3-642-21323-6">http://dx.doi.org/10.1007/978-3-642-21323-6</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Future Challenges in Security and Privacy for Academia and Industry 26th IFIP TC 11 International Information Security Conference, SEC 2011, Lucerne, Switzerland, June 7-9, 2011. Proceedings ent://SD_ILS/0/SD_ILS:194696 2024-12-29T19:44:00Z 2024-12-29T19:44:00Z Yazar&#160;Camenisch, Jan. editor.&#160;Fischer-H&uuml;bner, Simone. editor.&#160;Murayama, Yuko. editor.&#160;Portmann, Armand. editor.&#160;Rieder, Carlos. editor.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-3-642-21424-0">http://dx.doi.org/10.1007/978-3-642-21424-0</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Information Security and Cryptology 6th International Conference, Inscrypt 2010, Shanghai, China, October 20-24, 2010, Revised Selected Papers ent://SD_ILS/0/SD_ILS:194726 2024-12-29T19:44:00Z 2024-12-29T19:44:00Z Yazar&#160;Lai, Xuejia. editor.&#160;Yung, Moti. editor.&#160;Lin, Dongdai. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-3-642-21518-6">http://dx.doi.org/10.1007/978-3-642-21518-6</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Information Security and Privacy 16th Australasian Conference, ACISP 2011, Melbourne, Australia, July 11-13, 2011. Proceedings ent://SD_ILS/0/SD_ILS:195047 2024-12-29T19:44:00Z 2024-12-29T19:44:00Z Yazar&#160;Parampalli, Udaya. editor.&#160;Hawkes, Philip. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-3-642-22497-3">http://dx.doi.org/10.1007/978-3-642-22497-3</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Advances in Cryptology &ndash; ASIACRYPT 2011 17th International Conference on the Theory and Application of Cryptology and Information Security, Seoul, South Korea, December 4-8, 2011. Proceedings ent://SD_ILS/0/SD_ILS:195931 2024-12-29T19:44:00Z 2024-12-29T19:44:00Z Yazar&#160;Lee, Dong Hoon. editor.&#160;Wang, Xiaoyun. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-3-642-25385-0">http://dx.doi.org/10.1007/978-3-642-25385-0</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Security risk management building an information security risk management program from the ground up ent://SD_ILS/0/SD_ILS:149172 2024-12-29T19:44:00Z 2024-12-29T19:44:00Z Yazar&#160;Wheeler, Evan.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597496155">http://www.sciencedirect.com/science/book/9781597496155</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Information Systems Security 6th International Conference, ICISS 2010, Gandhinagar, India, December 17-19, 2010. Proceedings ent://SD_ILS/0/SD_ILS:193686 2024-12-29T19:44:00Z 2024-12-29T19:44:00Z Yazar&#160;Jha, Somesh. editor.&#160;Mathuria, Anish. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-3-642-17714-9">http://dx.doi.org/10.1007/978-3-642-17714-9</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Information Security Applications 11th International Workshop, WISA 2010, Jeju Island, Korea, August 24-26, 2010, Revised Selected Papers ent://SD_ILS/0/SD_ILS:193761 2024-12-29T19:44:00Z 2024-12-29T19:44:00Z Yazar&#160;Chung, Yongwha. editor.&#160;Yung, Moti. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-3-642-17955-6">http://dx.doi.org/10.1007/978-3-642-17955-6</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Information Security 13th International Conference, ISC 2010, Boca Raton, FL, USA, October 25-28, 2010, Revised Selected Papers ent://SD_ILS/0/SD_ILS:193823 2024-12-29T19:44:00Z 2024-12-29T19:44:00Z Yazar&#160;Burmester, Mike. editor.&#160;Tsudik, Gene. editor.&#160;Magliveras, Spyros. editor.&#160;Ili&#263;, Ivana. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-3-642-18178-8">http://dx.doi.org/10.1007/978-3-642-18178-8</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Critical Information Infrastructures Security 5th International Workshop, CRITIS 2010, Athens, Greece, September 23-24, 2010. Revised Papers ent://SD_ILS/0/SD_ILS:194786 2024-12-29T19:44:00Z 2024-12-29T19:44:00Z Yazar&#160;Xenakis, Christos. editor.&#160;Wolthusen, Stephen. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-3-642-21694-7">http://dx.doi.org/10.1007/978-3-642-21694-7</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Availability, Reliability and Security for Business, Enterprise and Health Information Systems IFIP WG 8.4/8.9 International Cross Domain Conference and Workshop, ARES 2011, Vienna, Austria, August 22-26, 2011. Proceedings ent://SD_ILS/0/SD_ILS:195302 2024-12-29T19:44:00Z 2024-12-29T19:44:00Z Yazar&#160;Tjoa, A Min. editor.&#160;Quirchmayr, Gerald. editor.&#160;You, Ilsun. editor.&#160;Xu, Lida. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-3-642-23300-5">http://dx.doi.org/10.1007/978-3-642-23300-5</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Information Security and Assurance International Conference, ISA 2011, Brno, Czech Republic, August 15-17, 2011. Proceedings ent://SD_ILS/0/SD_ILS:195249 2024-12-29T19:44:00Z 2024-12-29T19:44:00Z Yazar&#160;Kim, Tai-hoon. editor.&#160;Adeli, Hojjat. editor.&#160;Robles, Rosslin John. editor.&#160;Balitanas, Maricel. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-3-642-23141-4">http://dx.doi.org/10.1007/978-3-642-23141-4</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Security Aspects in Information Technology First International Conference, InfoSecHiComNet 2011, Haldia, India, October 19-22, 2011. Proceedings ent://SD_ILS/0/SD_ILS:195683 2024-12-29T19:44:00Z 2024-12-29T19:44:00Z Yazar&#160;Joye, Marc. editor.&#160;Mukhopadhyay, Debdeep. editor.&#160;Tunstall, Michael. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-3-642-24586-2">http://dx.doi.org/10.1007/978-3-642-24586-2</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Information Security 14th International Conference, ISC 2011, Xi&rsquo;an, China, October 26-29, 2011. Proceedings ent://SD_ILS/0/SD_ILS:195771 2024-12-29T19:44:00Z 2024-12-29T19:44:00Z Yazar&#160;Lai, Xuejia. editor.&#160;Zhou, Jianying. editor.&#160;Li, Hui. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-3-642-24861-0">http://dx.doi.org/10.1007/978-3-642-24861-0</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Information Systems Security 7th International Conference, ICISS 2011, Kolkata, India, December 15-19, 2011, Procedings ent://SD_ILS/0/SD_ILS:195982 2024-12-29T19:44:00Z 2024-12-29T19:44:00Z Yazar&#160;Jajodia, Sushil. editor.&#160;Mazumdar, Chandan. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-3-642-25560-1">http://dx.doi.org/10.1007/978-3-642-25560-1</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Security Technology International Conference, SecTech 2011, Held as Part of the Future Generation Information Technology Conference, FGIT 2011, in Conjunction with GDC 2011, Jeju Island, Korea, December 8-10, 2011. Proceedings ent://SD_ILS/0/SD_ILS:196121 2024-12-29T19:44:00Z 2024-12-29T19:44:00Z Yazar&#160;Kim, Tai-hoon. editor.&#160;Adeli, Hojjat. editor.&#160;Fang, Wai-chi. editor.&#160;Villalba, Javier Garc&iacute;a. editor.&#160;Arnett, Kirk P. editor.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-3-642-27189-2">http://dx.doi.org/10.1007/978-3-642-27189-2</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> ISSE 2010 Securing Electronic Business Processes Highlights of the Information Security Solutions Europe 2010 Conference ent://SD_ILS/0/SD_ILS:199891 2024-12-29T19:44:00Z 2024-12-29T19:44:00Z Yazar&#160;Pohlmann, Norbert. editor.&#160;Reimer, Helmut. editor.&#160;Schneider, Wolfgang. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-3-8348-9788-6">http://dx.doi.org/10.1007/978-3-8348-9788-6</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Information Security Risk Management Risikomanagement mit ISO/IEC 27001, 27005 und 31010 ent://SD_ILS/0/SD_ILS:199932 2024-12-29T19:44:00Z 2024-12-29T19:44:00Z Yazar&#160;Klipper, Sebastian. author.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-3-8348-9870-8">http://dx.doi.org/10.1007/978-3-8348-9870-8</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Information and Communications Security 13th International Conference, ICICS 2011, Beijing, China, November 23-26, 2011. Proceedings ent://SD_ILS/0/SD_ILS:195888 2024-12-29T19:44:00Z 2024-12-29T19:44:00Z Yazar&#160;Qing, Sihan. editor.&#160;Susilo, Willy. editor.&#160;Wang, Guilin. editor.&#160;Liu, Dongmei. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-3-642-25243-3">http://dx.doi.org/10.1007/978-3-642-25243-3</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Advances in Information and Computer Security 6th International Workshop, IWSEC 2011, Tokyo, Japan, November 8-10, 2011. Proceedings ent://SD_ILS/0/SD_ILS:195856 2024-12-29T19:44:00Z 2024-12-29T19:44:00Z Yazar&#160;Iwata, Tetsu. editor.&#160;Nishigaki, Masakatsu. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-3-642-25141-2">http://dx.doi.org/10.1007/978-3-642-25141-2</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Physical-Layer Security From Information Theory to Security Engineering ent://SD_ILS/0/SD_ILS:238465 2024-12-29T19:44:00Z 2024-12-29T19:44:00Z Yazar&#160;Bloch, Matthieu.&#160;Barros, Jo&atilde;o.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1017/CBO9780511977985">Access by subscription</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Information Security and Cryptology 5th International Conference, Inscrypt 2009, Beijing, China, December 12-15, 2009. Revised Selected Papers ent://SD_ILS/0/SD_ILS:193265 2024-12-29T19:44:00Z 2024-12-29T19:44:00Z Yazar&#160;Bao, Feng. editor.&#160;Yung, Moti. editor.&#160;Lin, Dongdai. editor.&#160;Jing, Jiwu. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-3-642-16342-5">http://dx.doi.org/10.1007/978-3-642-16342-5</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Information Theoretic Security 5th International Conference, ICITS 2011, Amsterdam, The Netherlands, May 21-24, 2011. Proceedings ent://SD_ILS/0/SD_ILS:194466 2024-12-29T19:44:00Z 2024-12-29T19:44:00Z Yazar&#160;Fehr, Serge. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-3-642-20728-0">http://dx.doi.org/10.1007/978-3-642-20728-0</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Information Security and Cryptology - ICISC 2010 13th International Conference, Seoul, Korea, December 1-3, 2010, Revised Selected Papers ent://SD_ILS/0/SD_ILS:195578 2024-12-29T19:44:00Z 2024-12-29T19:44:00Z Yazar&#160;Rhee, Kyung-Hyune. editor.&#160;Nyang, DaeHun. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-3-642-24209-0">http://dx.doi.org/10.1007/978-3-642-24209-0</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Managing an information security and privacy awareness and training program ent://SD_ILS/0/SD_ILS:287018 2024-12-29T19:44:00Z 2024-12-29T19:44:00Z Yazar&#160;Herold, Rebecca.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://marc.crcnetbase.com/isbn/9781439815465">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Security for Microsoft Windows System Administrators introduction to key information security concepts ent://SD_ILS/0/SD_ILS:149122 2024-12-29T19:44:00Z 2024-12-29T19:44:00Z Yazar&#160;Rountree, Derrick.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495943">http://www.sciencedirect.com/science/book/9781597495943</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Critical Information Infrastructures Security 4th International Workshop, CRITIS 2009, Bonn, Germany, September 30 - October 2, 2009. Revised Papers ent://SD_ILS/0/SD_ILS:192634 2024-12-29T19:44:00Z 2024-12-29T19:44:00Z Yazar&#160;Rome, Erich. editor.&#160;Bloomfield, Robin. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-3-642-14379-3">http://dx.doi.org/10.1007/978-3-642-14379-3</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Progress in Cryptology &ndash; LATINCRYPT 2010 First International Conference on Cryptology and Information Security in Latin America, Puebla, Mexico, August 8-11, 2010, proceedings ent://SD_ILS/0/SD_ILS:192745 2024-12-29T19:44:00Z 2024-12-29T19:44:00Z Yazar&#160;Abdalla, Michel. editor.&#160;Barreto, Paulo S. L. M. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-3-642-14712-8">http://dx.doi.org/10.1007/978-3-642-14712-8</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Security and Privacy &ndash; Silver Linings in the Cloud 25th IFIP TC-11 International Information Security Conference, SEC 2010, Held as Part of WCC 2010, Brisbane, Australia, September 20-23, 2010. Proceedings ent://SD_ILS/0/SD_ILS:192911 2024-12-29T19:44:00Z 2024-12-29T19:44:00Z Yazar&#160;Rannenberg, Kai. editor.&#160;Varadharajan, Vijay. editor.&#160;Weber, Christian. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-3-642-15257-3">http://dx.doi.org/10.1007/978-3-642-15257-3</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Computational Intelligence in Security for Information Systems 2010 Proceedings of the 3rd International Conference on Computational Intelligence in Security for Information Systems (CISIS&rsquo;10) ent://SD_ILS/0/SD_ILS:193359 2024-12-29T19:44:00Z 2024-12-29T19:44:00Z Yazar&#160;Herrero, &Aacute;lvaro. editor.&#160;Corchado, Emilio. editor.&#160;Redondo, Carlos. editor.&#160;Alonso, &Aacute;ngel. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-3-642-16626-6">http://dx.doi.org/10.1007/978-3-642-16626-6</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Advances in Information and Computer Security 5th International Workshop on Security, IWSEC 2010, Kobe, Japan, November 22-24, 2010. Proceedings ent://SD_ILS/0/SD_ILS:193422 2024-12-29T19:44:00Z 2024-12-29T19:44:00Z Yazar&#160;Echizen, Isao. editor.&#160;Kunihiro, Noboru. editor.&#160;Sasaki, Ryoichi. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-3-642-16825-3">http://dx.doi.org/10.1007/978-3-642-16825-3</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Information Security and Digital Forensics First International Conference, ISDF 2009, London, United Kingdom, September 7-9, 2009, Revised Selected Papers ent://SD_ILS/0/SD_ILS:191714 2024-12-29T19:44:00Z 2024-12-29T19:44:00Z Yazar&#160;Weerasinghe, Dasun. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-3-642-11530-1">http://dx.doi.org/10.1007/978-3-642-11530-1</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Information Security Theory and Practices. Security and Privacy of Pervasive Systems and Smart Devices 4th IFIP WG 11.2 International Workshop, WISTP 2010, Passau, Germany, April 12-14, 2010. Proceedings ent://SD_ILS/0/SD_ILS:191973 2024-12-29T19:44:00Z 2024-12-29T19:44:00Z Yazar&#160;Samarati, Pierangela. editor.&#160;Tunstall, Michael. editor.&#160;Posegga, Joachim. editor.&#160;Markantonakis, Konstantinos. editor.&#160;Sauveron, Damien. editor.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-3-642-12368-9">http://dx.doi.org/10.1007/978-3-642-12368-9</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Information Theoretic Security 4th International Conference, ICITS 2009, Shizuoka, Japan, December 3-6, 2009. Revised Selected Papers ent://SD_ILS/0/SD_ILS:192673 2024-12-29T19:44:00Z 2024-12-29T19:44:00Z Yazar&#160;Kurosawa, Kaoru. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-3-642-14496-7">http://dx.doi.org/10.1007/978-3-642-14496-7</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Information, Security and Cryptology &ndash; ICISC 2009 12th International Conference, Seoul, Korea, December 2-4, 2009, Revised Selected Papers ent://SD_ILS/0/SD_ILS:192649 2024-12-29T19:44:00Z 2024-12-29T19:44:00Z Yazar&#160;Lee, Donghoon. editor.&#160;Hong, Seokhie. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-3-642-14423-3">http://dx.doi.org/10.1007/978-3-642-14423-3</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> ISSE 2009 Securing Electronic Business Processes Highlights of the Information Security Solutions Europe 2009 Conference ent://SD_ILS/0/SD_ILS:199483 2024-12-29T19:44:00Z 2024-12-29T19:44:00Z Yazar&#160;Pohlmann, Norbert. editor.&#160;Reimer, Helmut. editor.&#160;Schneider, Wolfgang. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-3-8348-9363-5">http://dx.doi.org/10.1007/978-3-8348-9363-5</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Information Security, Practice and Experience 6th International Conference, ISPEC 2010, Seoul, Korea, May 12-13, 2010. Proceedings ent://SD_ILS/0/SD_ILS:192123 2024-12-29T19:44:00Z 2024-12-29T19:44:00Z Yazar&#160;Kwak, Jin. editor.&#160;Deng, Robert H. editor.&#160;Won, Yoojae. editor.&#160;Wang, Guilin. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-3-642-12827-1">http://dx.doi.org/10.1007/978-3-642-12827-1</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Information Security and Assurance 4th International Conference, ISA 2010, Miyazaki, Japan, June 23-25, 2010. Proceedings ent://SD_ILS/0/SD_ILS:192312 2024-12-29T19:44:00Z 2024-12-29T19:44:00Z Yazar&#160;Bandyopadhyay, Samir Kumar. editor.&#160;Adi, Wael. editor.&#160;Kim, Tai-hoon. editor.&#160;Xiao, Yang. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-3-642-13365-7">http://dx.doi.org/10.1007/978-3-642-13365-7</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Information Security and Privacy 15th Australasian Conference, ACISP 2010, Sydney, Australia, July 5-7, 2010. Proceedings ent://SD_ILS/0/SD_ILS:192544 2024-12-29T19:44:00Z 2024-12-29T19:44:00Z Yazar&#160;Steinfeld, Ron. editor.&#160;Hawkes, Philip. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-3-642-14081-5">http://dx.doi.org/10.1007/978-3-642-14081-5</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Advances in Cryptology - ASIACRYPT 2010 16th International Conference on the Theory and Application of Cryptology and Information Security, Singapore, December 5-9, 2010. Proceedings ent://SD_ILS/0/SD_ILS:193582 2024-12-29T19:44:00Z 2024-12-29T19:44:00Z Yazar&#160;Abe, Masayuki. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-3-642-17373-8">http://dx.doi.org/10.1007/978-3-642-17373-8</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Security and Privacy in Mobile Information and Communication Systems Second International ICST Conference, MobiSec 2010, Catania, Sicily, Italy, May 27-28, 2010, Revised Selected Papers ent://SD_ILS/0/SD_ILS:193620 2024-12-29T19:44:00Z 2024-12-29T19:44:00Z Yazar&#160;Schmidt, Andreas U. editor.&#160;Russello, Giovanni. editor.&#160;Lioy, Antonio. editor.&#160;Prasad, Neeli R. editor.&#160;Lian, Shiguo. editor.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-3-642-17502-2">http://dx.doi.org/10.1007/978-3-642-17502-2</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Security Technology, Disaster Recovery and Business Continuity International Conferences, SecTech and DRBC 2010, Held as Part of the Future Generation Information Technology Conference, FGIT 2010, Jeju Island, Korea, December 13-15, 2010. Proceedings ent://SD_ILS/0/SD_ILS:193653 2024-12-29T19:44:00Z 2024-12-29T19:44:00Z Yazar&#160;Kim, Tai-hoon. editor.&#160;Fang, Wai-chi. editor.&#160;Khan, Muhammad Khurram. editor.&#160;Arnett, Kirk P. editor.&#160;Kang, Heau-jo. editor.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-3-642-17610-4">http://dx.doi.org/10.1007/978-3-642-17610-4</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Information and Communications Security 12th International Conference, ICICS 2010, Barcelona, Spain, December 15-17, 2010. Proceedings ent://SD_ILS/0/SD_ILS:193666 2024-12-29T19:44:00Z 2024-12-29T19:44:00Z Yazar&#160;Soriano, Miguel. editor.&#160;Qing, Sihan. editor.&#160;L&oacute;pez, Javier. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-3-642-17650-0">http://dx.doi.org/10.1007/978-3-642-17650-0</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Managing Information Risk and the Economics of Security ent://SD_ILS/0/SD_ILS:164782 2024-12-29T19:44:00Z 2024-12-29T19:44:00Z Yazar&#160;Johnson, M. Eric. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-0-387-09762-6">http://dx.doi.org/10.1007/978-0-387-09762-6</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Information security governance a practical development and implementation approach ent://SD_ILS/0/SD_ILS:297743 2024-12-29T19:44:00Z 2024-12-29T19:44:00Z Yazar&#160;Brotby, W. Krag.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;Ebook Library <a href="http://public.eblib.com/EBLPublic/PublicView.do?ptiID=433807">http://public.eblib.com/EBLPublic/PublicView.do?ptiID=433807</a> John Wiley <a href="http://dx.doi.org/10.1002/9780470476017">http://dx.doi.org/10.1002/9780470476017</a> <a href="http://site.ebrary.com/lib/alltitles/Doc?id=10313652">http://site.ebrary.com/lib/alltitles/Doc?id=10313652</a> <a href="http://swb.eblib.com/patron/FullRecord.aspx?p=433807">http://swb.eblib.com/patron/FullRecord.aspx?p=433807</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Security and Privacy in Mobile Information and Communication Systems First International ICST Conference, MobiSec 2009, Turin, Italy, June 3-5, 2009, Revised Selected Papers ent://SD_ILS/0/SD_ILS:190947 2024-12-29T19:44:00Z 2024-12-29T19:44:00Z Yazar&#160;Schmidt, Andreas U. editor.&#160;Lian, Shiguo. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-3-642-04434-2">http://dx.doi.org/10.1007/978-3-642-04434-2</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> ISSE 2008 Securing Electronic Business Processes Highlights of the Information Security Solutions Europe 2008 Conference ent://SD_ILS/0/SD_ILS:199411 2024-12-29T19:44:00Z 2024-12-29T19:44:00Z Yazar&#160;Pohlmann, Norbert. editor.&#160;Reimer, Helmut. editor.&#160;Schneider, Wolfgang. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-3-8348-9283-6">http://dx.doi.org/10.1007/978-3-8348-9283-6</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Information Security Applications 9th International Workshop, WISA 2008, Jeju Island, Korea, September 23-25, 2008, Revised Selected Papers ent://SD_ILS/0/SD_ILS:189648 2024-12-29T19:44:00Z 2024-12-29T19:44:00Z Yazar&#160;Chung, Kyo-Il. editor.&#160;Sohn, Kiwook. editor.&#160;Yung, Moti. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-3-642-00306-6">http://dx.doi.org/10.1007/978-3-642-00306-6</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Information Security and Privacy 14th Australasian Conference, ACISP 2009 Brisbane, Australia, July 1-3, 2009 Proceedings ent://SD_ILS/0/SD_ILS:190378 2024-12-29T19:44:00Z 2024-12-29T19:44:00Z Yazar&#160;Boyd, Colin. editor.&#160;Gonz&aacute;lez Nieto, Juan. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-3-642-02620-1">http://dx.doi.org/10.1007/978-3-642-02620-1</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Critical Information Infrastructure Security Third International Workshop, CRITIS 2008, Rome, Italy, October13-15, 2008. Revised Papers ent://SD_ILS/0/SD_ILS:190658 2024-12-29T19:44:00Z 2024-12-29T19:44:00Z Yazar&#160;Setola, Roberto. editor.&#160;Geretshuber, Stefan. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-3-642-03552-4">http://dx.doi.org/10.1007/978-3-642-03552-4</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Advances in Computer Science - ASIAN 2009. Information Security and Privacy 13th Asian Computing Science Conference, Seoul, Korea, December 14-16, 2009. Proceedings ent://SD_ILS/0/SD_ILS:191425 2024-12-29T19:44:00Z 2024-12-29T19:44:00Z Yazar&#160;Datta, Anupam. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-3-642-10622-4">http://dx.doi.org/10.1007/978-3-642-10622-4</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Information Systems Security 5th International Conference, ICISS 2009 Kolkata, India, December 14-18, 2009 Proceedings ent://SD_ILS/0/SD_ILS:191472 2024-12-29T19:44:00Z 2024-12-29T19:44:00Z Yazar&#160;Prakash, Atul. editor.&#160;Sen Gupta, Indranil. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-3-642-10772-6">http://dx.doi.org/10.1007/978-3-642-10772-6</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Information and Communications Security 11th International Conference, ICICS 2009, Beijing, China, December 14-17, 2009. Proceedings ent://SD_ILS/0/SD_ILS:191592 2024-12-29T19:44:00Z 2024-12-29T19:44:00Z Yazar&#160;Qing, Sihan. editor.&#160;Mitchell, Chris J. editor.&#160;Wang, Guilin. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-3-642-11145-7">http://dx.doi.org/10.1007/978-3-642-11145-7</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Proceedings of the International Workshop on Computational Intelligence in Security for Information Systems CISIS&rsquo;08 ent://SD_ILS/0/SD_ILS:189000 2024-12-29T19:44:00Z 2024-12-29T19:44:00Z Yazar&#160;Corchado, Emilio. editor.&#160;Zunino, Rodolfo. editor.&#160;Gastaldo, Paolo. editor.&#160;Herrero, &Aacute;lvaro. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-3-540-88181-0">http://dx.doi.org/10.1007/978-3-540-88181-0</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Information Security and Cryptology &ndash; ICISC 2008 11th International Conference, Seoul, Korea, December 3-5, 2008, Revised Selected Papers ent://SD_ILS/0/SD_ILS:189787 2024-12-29T19:44:00Z 2024-12-29T19:44:00Z Yazar&#160;Lee, Pil Joong. editor.&#160;Cheon, Jung Hee. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-3-642-00730-9">http://dx.doi.org/10.1007/978-3-642-00730-9</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Information Security Practice and Experience 5th International Conference, ISPEC 2009 Xi&rsquo;an, China, April 13-15, 2009 Proceedings ent://SD_ILS/0/SD_ILS:189810 2024-12-29T19:44:00Z 2024-12-29T19:44:00Z Yazar&#160;Bao, Feng. editor.&#160;Li, Hui. editor.&#160;Wang, Guilin. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-3-642-00843-6">http://dx.doi.org/10.1007/978-3-642-00843-6</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Emerging Challenges for Security, Privacy and Trust 24th IFIP TC 11 International Information Security Conference, SEC 2009, Pafos, Cyprus, May 18&ndash;20, 2009. Proceedings ent://SD_ILS/0/SD_ILS:189928 2024-12-29T19:44:00Z 2024-12-29T19:44:00Z Yazar&#160;Gritzalis, Dimitris. editor.&#160;Lopez, Javier. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-3-642-01244-0">http://dx.doi.org/10.1007/978-3-642-01244-0</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Information Security and Cryptology 4th International Conference, Inscrypt 2008, Beijing, China, December 14-17, 2008, Revised Selected Papers ent://SD_ILS/0/SD_ILS:189996 2024-12-29T19:44:00Z 2024-12-29T19:44:00Z Yazar&#160;Yung, Moti. editor.&#160;Liu, Peng. editor.&#160;Lin, Dongdai. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-3-642-01440-6">http://dx.doi.org/10.1007/978-3-642-01440-6</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Advances in Information Security and Assurance Third International Conference and Workshops, ISA 2009, Seoul, Korea, June 25-27, 2009. Proceedings ent://SD_ILS/0/SD_ILS:190377 2024-12-29T19:44:00Z 2024-12-29T19:44:00Z Yazar&#160;Park, Jong Hyuk. editor.&#160;Chen, Hsiao-Hwa. editor.&#160;Atiquzzaman, Mohammed. editor.&#160;Lee, Changhoon. editor.&#160;Kim, Tai-hoon. editor.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-3-642-02617-1">http://dx.doi.org/10.1007/978-3-642-02617-1</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Advances in Information Security and Its Application Third International Conference, ISA 2009, Seoul, Korea, June 25-27, 2009. Proceedings ent://SD_ILS/0/SD_ILS:190382 2024-12-29T19:44:00Z 2024-12-29T19:44:00Z Yazar&#160;Park, Jong Hyuk. editor.&#160;Zhan, Justin. editor.&#160;Lee, Changhoon. editor.&#160;Wang, Guilin. editor.&#160;Kim, Tai-hoon. editor.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-3-642-02633-1">http://dx.doi.org/10.1007/978-3-642-02633-1</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Information Security Theory and Practice. Smart Devices, Pervasive Systems, and Ubiquitous Networks Third IFIP WG 11.2 International Workshop, WISTP 2009, Brussels, Belgium, September 1-4, 2009, Proceedings ent://SD_ILS/0/SD_ILS:190785 2024-12-29T19:44:00Z 2024-12-29T19:44:00Z Yazar&#160;Markowitch, Olivier. editor.&#160;Bilas, Angelos. editor.&#160;Hoepman, Jaap-Henk. editor.&#160;Mitchell, Chris J. editor.&#160;Quisquater, Jean-Jacques. editor.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-3-642-03944-7">http://dx.doi.org/10.1007/978-3-642-03944-7</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Computational Intelligence in Security for Information Systems CISIS&rsquo;09, 2nd International Workshop Burgos, Spain, September 2009 Proceedings ent://SD_ILS/0/SD_ILS:190834 2024-12-29T19:44:00Z 2024-12-29T19:44:00Z Yazar&#160;Herrero, &Aacute;lvaro. editor.&#160;Gastaldo, Paolo. editor.&#160;Zunino, Rodolfo. editor.&#160;Corchado, Emilio. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-3-642-04091-7">http://dx.doi.org/10.1007/978-3-642-04091-7</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Information Security 12th International Conference, ISC 2009, Pisa, Italy, September 7-9, 2009. Proceedings ent://SD_ILS/0/SD_ILS:190962 2024-12-29T19:44:00Z 2024-12-29T19:44:00Z Yazar&#160;Samarati, Pierangela. editor.&#160;Yung, Moti. editor.&#160;Martinelli, Fabio. editor.&#160;Ardagna, Claudio A. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-3-642-04474-8">http://dx.doi.org/10.1007/978-3-642-04474-8</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Advances in Information and Computer Security 4th International Workshop on Security, IWSEC 2009 Toyama, Japan, October 28-30, 2009 Proceedings ent://SD_ILS/0/SD_ILS:191078 2024-12-29T19:44:00Z 2024-12-29T19:44:00Z Yazar&#160;Takagi, Tsuyoshi. editor.&#160;Mambo, Masahiro. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-3-642-04846-3">http://dx.doi.org/10.1007/978-3-642-04846-3</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Information Theoretic Security Second International Conference, ICITS 2007, Madrid, Spain, May 25-29, 2007, Revised Selected Papers ent://SD_ILS/0/SD_ILS:191307 2024-12-29T19:44:00Z 2024-12-29T19:44:00Z Yazar&#160;Desmedt, Yvo. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-3-642-10230-1">http://dx.doi.org/10.1007/978-3-642-10230-1</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/>