Arama Sonuçları Information securitySirsiDynix Enterprisehttps://katalog.hacettepe.edu.tr/client/tr_TR/default_tr/default_tr/qu$003dInformation$002bsecurity$0026te$003dILS$0026ps$003d300$0026isd$003dtrue?dt=list2024-12-28T12:52:03ZManaging information securityent://SD_ILS/0/SD_ILS:3066922024-12-28T12:52:03Z2024-12-28T12:52:03ZYazar Vacca, John R.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780124166882">http://www.sciencedirect.com/science/book/9780124166882</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Elementary information securityent://SD_ILS/0/SD_ILS:2712722024-12-28T12:52:03Z2024-12-28T12:52:03ZYazar Smith, Richard E.<br/>Yer Numarası QA76.9.A25 S652 2013<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>Information security fundamentalsent://SD_ILS/0/SD_ILS:2891552024-12-28T12:52:03Z2024-12-28T12:52:03ZYazar Peltier, Thomas R. Peltier, Justin. Blackley, John A.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://marc.crcnetbase.com/isbn/9780203488652">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Strategic information securityent://SD_ILS/0/SD_ILS:2845782024-12-28T12:52:03Z2024-12-28T12:52:03ZYazar Wylder, John.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://marc.crcnetbase.com/isbn/9780203497081">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Information security architectureent://SD_ILS/0/SD_ILS:2858152024-12-28T12:52:03Z2024-12-28T12:52:03ZYazar Tudor, Jan Killmeyer.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://marc.crcnetbase.com/isbn/9781420031034">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Information security fundamentalsent://SD_ILS/0/SD_ILS:3425842024-12-28T12:52:03Z2024-12-28T12:52:03ZYazar Peltier, Thomas R., author.<br/>Yer Numarası ONLINE(342584.1)<br/>Elektronik Erişim <a href="http://marc.crcnetbase.com/isbn/9781439810637">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Information Security Governanceent://SD_ILS/0/SD_ILS:1677092024-12-28T12:52:03Z2024-12-28T12:52:03ZYazar Solms, S.H. author. Solms, Rossouw. author. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-0-387-79984-1">http://dx.doi.org/10.1007/978-0-387-79984-1</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Information security management handbookent://SD_ILS/0/SD_ILS:3427762024-12-28T12:52:03Z2024-12-28T12:52:03ZYazar O'Hanley, Richard. Tiller, James S.<br/>Yer Numarası ONLINE(342776.1)<br/>Elektronik Erişim <a href="http://marc.crcnetbase.com/isbn/9781466567528">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Electronic Healthcare Information Securityent://SD_ILS/0/SD_ILS:1677532024-12-28T12:52:03Z2024-12-28T12:52:03ZYazar Shoniregun, Charles A. author. Dube, Kudakwashe. author. Mtenzi, Fredrick. author. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-0-387-84919-5">http://dx.doi.org/10.1007/978-0-387-84919-5</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Information security management handbookent://SD_ILS/0/SD_ILS:2891512024-12-28T12:52:03Z2024-12-28T12:52:03ZYazar Tipton, Harold F. Krause, Micki.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://marc.crcnetbase.com/isbn/9780203325438">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Information security management handbookent://SD_ILS/0/SD_ILS:2871232024-12-28T12:52:03Z2024-12-28T12:52:03ZYazar Tipton, Harold F. Nozaki, Micki Krause.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://marc.crcnetbase.com/isbn/9781439893159">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Information security management handbookent://SD_ILS/0/SD_ILS:2903202024-12-28T12:52:03Z2024-12-28T12:52:03ZYazar Tipton, Harold F. Krause, Micki.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://marc.crcnetbase.com/isbn/9781420003406">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Information security management handbookent://SD_ILS/0/SD_ILS:2907632024-12-28T12:52:03Z2024-12-28T12:52:03ZYazar Tipton, Harold F. Nozaki, Micki Krause.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://marc.crcnetbase.com/isbn/9781439853467">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Information security risk analysisent://SD_ILS/0/SD_ILS:2888562024-12-28T12:52:03Z2024-12-28T12:52:03ZYazar Peltier, Thomas R.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://marc.crcnetbase.com/isbn/9781439839577">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Information security management handbookent://SD_ILS/0/SD_ILS:2897342024-12-28T12:52:03Z2024-12-28T12:52:03ZYazar Tipton, Harold F. Krause, Micki.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://marc.crcnetbase.com/isbn/9781420090956">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Information security cost managementent://SD_ILS/0/SD_ILS:2865452024-12-28T12:52:03Z2024-12-28T12:52:03ZYazar Bazavan, Ioana V. Lim, Ian.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://marc.crcnetbase.com/isbn/9781420013832">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Information security management handbookent://SD_ILS/0/SD_ILS:2851612024-12-28T12:52:03Z2024-12-28T12:52:03ZYazar Tipton, Harold F. Krause, Micki.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://marc.crcnetbase.com/isbn/9781439833032">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Information security : contemporary casesent://SD_ILS/0/SD_ILS:1110212024-12-28T12:52:03Z2024-12-28T12:52:03ZYazar Wright, Marie A. Kakalik, John S.<br/>Yer Numarası QA76.9.A25 W75 2007<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>Handbook of information securityent://SD_ILS/0/SD_ILS:1089092024-12-28T12:52:03Z2024-12-28T12:52:03ZYazar Bidgoli, Hossein, ed.<br/>Yer Numarası TK5105.59 H35 2006 V.1<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~3<br/>Information security risk analysisent://SD_ILS/0/SD_ILS:2847642024-12-28T12:52:03Z2024-12-28T12:52:03ZYazar Peltier, Thomas R.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://marc.crcnetbase.com/isbn/9781420031195">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Information security for managersent://SD_ILS/0/SD_ILS:5165702024-12-28T12:52:03Z2024-12-28T12:52:03ZYazar Workman, Michael D., 1957-. Phelps, Daniel C. Gathegi, John N.<br/>Yer Numarası HF5548.37 W67 2013<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>Legal issues in information securityent://SD_ILS/0/SD_ILS:3654182024-12-28T12:52:03Z2024-12-28T12:52:03ZYazar Grama, Joanna Lyn, author.<br/>Yer Numarası KF1263.C65 G73 2011<br/>Format: Kitap<br/>Durum Hukuk Kütüphanesi~1<br/>Integration of Information for Environmental Securityent://SD_ILS/0/SD_ILS:1698592024-12-28T12:52:03Z2024-12-28T12:52:03ZYazar Coskun, H. Gonca. editor. Cigizoglu, H. Kerem. editor. Maktav, M. Derya. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-1-4020-6575-0">http://dx.doi.org/10.1007/978-1-4020-6575-0</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Information security principles and practiceent://SD_ILS/0/SD_ILS:2988782024-12-28T12:52:03Z2024-12-28T12:52:03ZYazar Stamp, Mark.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim Wiley InterScience <a href="http://dx.doi.org/10.1002/9781118027974">An electronic book accessible through the World Wide Web; click for information</a>
Ebook Library <a href="http://public.eblib.com/EBLPublic/PublicView.do?ptiID=738753">http://public.eblib.com/EBLPublic/PublicView.do?ptiID=738753</a>
<a href="http://site.ebrary.com/lib/alltitles/Doc?id=10478419">http://site.ebrary.com/lib/alltitles/Doc?id=10478419</a>
<a href="http://swb.eblib.com/patron/FullRecord.aspx?p=738753">http://swb.eblib.com/patron/FullRecord.aspx?p=738753</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Information security principles and practiceent://SD_ILS/0/SD_ILS:3018032024-12-28T12:52:03Z2024-12-28T12:52:03ZYazar Stamp, Mark.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://www.contentreserve.com/TitleInfo.asp?ID={310C0D18-7395-435E-BA71-41A0448F3D13}&Format=50">Click for information</a>
Ebook Library <a href="http://public.eblib.com/EBLPublic/PublicView.do?ptiID=240929">http://public.eblib.com/EBLPublic/PublicView.do?ptiID=240929</a>
John Wiley <a href="http://dx.doi.org/10.1002/0471744190">http://dx.doi.org/10.1002/0471744190</a>
<a href="http://www3.interscience.wiley.com/cgi-bin/bookhome/109933408">http://www3.interscience.wiley.com/cgi-bin/bookhome/109933408</a>
HathiTrust Digital Library, Limited view (search only) <a href="http://catalog.hathitrust.org/api/volumes/oclc/57754240.html">http://catalog.hathitrust.org/api/volumes/oclc/57754240.html</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Information security a strategic approachent://SD_ILS/0/SD_ILS:2498312024-12-28T12:52:03Z2024-12-28T12:52:03ZYazar LeVeque, Vincent.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim IEEE Xplore <a href="http://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=5989138">http://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=5989138</a>
IEEE Xplore <a href="http://ieeexplore.ieee.org/servlet/opac?bknumber=5989138">http://ieeexplore.ieee.org/servlet/opac?bknumber=5989138</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Information security : principles and practiceent://SD_ILS/0/SD_ILS:1094772024-12-28T12:52:03Z2024-12-28T12:52:03ZYazar Stamp, Mark.<br/>Yer Numarası QA76.9.A25 S69 2006<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>Building a practical information security programent://SD_ILS/0/SD_ILS:4591462024-12-28T12:52:03Z2024-12-28T12:52:03ZYazar Andress, Jason, author. Leary, Mark, author.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128020425">http://www.sciencedirect.com/science/book/9780128020425</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Computer and information security handbookent://SD_ILS/0/SD_ILS:4595182024-12-28T12:52:03Z2024-12-28T12:52:03ZYazar Vacca, John R., editor.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="https://www.sciencedirect.com/science/book/9780128038437">https://www.sciencedirect.com/science/book/9780128038437</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Information Security for Automatic Speaker Identificationent://SD_ILS/0/SD_ILS:1732812024-12-28T12:52:03Z2024-12-28T12:52:03ZYazar El-Samie, Fathi E. Abd. author. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-1-4419-9698-5">http://dx.doi.org/10.1007/978-1-4419-9698-5</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>The executive MBA in information securityent://SD_ILS/0/SD_ILS:2869312024-12-28T12:52:03Z2024-12-28T12:52:03ZYazar Trinckes, John J.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://marc.crcnetbase.com/isbn/9781439810088">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Information security management handbook. Volume 4ent://SD_ILS/0/SD_ILS:2897352024-12-28T12:52:03Z2024-12-28T12:52:03ZYazar Tipton, Harold F. Krause, Micki.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://marc.crcnetbase.com/isbn/9781439819036">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>CyberForensics Understanding Information Security Investigationsent://SD_ILS/0/SD_ILS:1750482024-12-28T12:52:03Z2024-12-28T12:52:03ZYazar Bayuk, Jennifer. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-1-60761-772-3">http://dx.doi.org/10.1007/978-1-60761-772-3</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Handbook of Information and Communication Securityent://SD_ILS/0/SD_ILS:1908412024-12-28T12:52:03Z2024-12-28T12:52:03ZYazar Stavroulakis, Peter. editor. Stamp, Mark. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-04117-4">http://dx.doi.org/10.1007/978-3-642-04117-4</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Economics of Information Security and Privacyent://SD_ILS/0/SD_ILS:1727362024-12-28T12:52:03Z2024-12-28T12:52:03ZYazar Moore, Tyler. editor. Pym, David. editor. Ioannidis, Christos. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-1-4419-6967-5">http://dx.doi.org/10.1007/978-1-4419-6967-5</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Computer and information security handbookent://SD_ILS/0/SD_ILS:1488842024-12-28T12:52:03Z2024-12-28T12:52:03ZYazar Vacca, John R.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780123743541">http://www.sciencedirect.com/science/book/9780123743541</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Information security management handbook. Vol. 2ent://SD_ILS/0/SD_ILS:2868162024-12-28T12:52:03Z2024-12-28T12:52:03ZYazar Tipton, Harold F. Krause, Micki.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://marc.crcnetbase.com/isbn/9781420067101">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Managing Information Systems Security and Privacyent://SD_ILS/0/SD_ILS:1816542024-12-28T12:52:03Z2024-12-28T12:52:03ZYazar Trček, Denis. author. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/3-540-28104-5">http://dx.doi.org/10.1007/3-540-28104-5</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Information security management handbook. Vol. 2ent://SD_ILS/0/SD_ILS:2854412024-12-28T12:52:03Z2024-12-28T12:52:03ZYazar Tipton, Harold F. Krause, Micki.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://marc.crcnetbase.com/isbn/9780203005552">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Information Processing and Security Systemsent://SD_ILS/0/SD_ILS:1652662024-12-28T12:52:03Z2024-12-28T12:52:03ZYazar Saeed, Khalid. editor. Pejaś, Jerzy. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/b137371">http://dx.doi.org/10.1007/b137371</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Information security management handbook. Vol. 4ent://SD_ILS/0/SD_ILS:2877762024-12-28T12:52:03Z2024-12-28T12:52:03ZYazar Tipton, Harold F. Krause, Micki.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://marc.crcnetbase.com/isbn/9781420072419">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>How to cheat at managing information securityent://SD_ILS/0/SD_ILS:2536772024-12-28T12:52:03Z2024-12-28T12:52:03ZYazar Osborne, Mark. Summitt, Paul M.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491105">http://www.sciencedirect.com/science/book/9781597491105</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Developments in information security and cybernetic warsent://SD_ILS/0/SD_ILS:4821872024-12-28T12:52:03Z2024-12-28T12:52:03ZYazar Sarfraz, Muhammad, editor. IGI Global, publisher.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-8304-2">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-8304-2</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Economics of Information Security and Privacy IIIent://SD_ILS/0/SD_ILS:3312942024-12-28T12:52:03Z2024-12-28T12:52:03ZYazar Schneier, Bruce. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE(331294.1)<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-1-4614-1981-5">http://dx.doi.org/10.1007/978-1-4614-1981-5</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>The Economics of Information Security and Privacyent://SD_ILS/0/SD_ILS:3348102024-12-28T12:52:03Z2024-12-28T12:52:03ZYazar Böhme, Rainer. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE(334810.1)<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-39498-0">http://dx.doi.org/10.1007/978-3-642-39498-0</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Security information and event management (SIEM) implementationent://SD_ILS/0/SD_ILS:2932792024-12-28T12:52:03Z2024-12-28T12:52:03ZYazar Miller, David, 1959 Nov. 5- Harris, Shon. Harper, Allen. VanDyke, Stephen. Blask, Chris.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://mhebooklibrary.com/reader/security-information-event-management-siem-implementation">Subscription required</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Applied Information Security A Hands-on Approachent://SD_ILS/0/SD_ILS:1956482024-12-28T12:52:03Z2024-12-28T12:52:03ZYazar Basin, David. author. Schaller, Patrick. author. Schläpfer, Michael. author. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-24474-2">http://dx.doi.org/10.1007/978-3-642-24474-2</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Honeypot a new paradigm to information securityent://SD_ILS/0/SD_ILS:2889612024-12-28T12:52:03Z2024-12-28T12:52:03ZYazar Joshi, R. C. Sardana, Anjali.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://marc.crcnetbase.com/isbn/9781439869994">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Building an effective information security policy architectureent://SD_ILS/0/SD_ILS:2905772024-12-28T12:52:03Z2024-12-28T12:52:03ZYazar Bacik, Sandy.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://marc.crcnetbase.com/isbn/9781420059069">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Information security design, implementation, measurement, and complianceent://SD_ILS/0/SD_ILS:2884902024-12-28T12:52:03Z2024-12-28T12:52:03ZYazar Layton, Timothy P.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://marc.crcnetbase.com/isbn/9781420013412">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Zen and the art of information securityent://SD_ILS/0/SD_ILS:1456802024-12-28T12:52:03Z2024-12-28T12:52:03ZYazar Winkler, Ira.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491686">http://www.sciencedirect.com/science/book/9781597491686</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Zen and the art of information securityent://SD_ILS/0/SD_ILS:1122142024-12-28T12:52:03Z2024-12-28T12:52:03ZYazar Winkler, Ira. ScienceDirect (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491686">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Computational Intelligence in Information Assurance and Securityent://SD_ILS/0/SD_ILS:1861712024-12-28T12:52:03Z2024-12-28T12:52:03ZYazar Nedjah, Nadia. editor. Abraham, Ajith. editor. Mourelle, Luiza de Macedo. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-540-71078-3">http://dx.doi.org/10.1007/978-3-540-71078-3</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Information Assurance Security in the Information Environmentent://SD_ILS/0/SD_ILS:1754402024-12-28T12:52:03Z2024-12-28T12:52:03ZYazar Blyth, Andrew. author. Kovacich, Gerald L. author. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/1-84628-489-9">http://dx.doi.org/10.1007/1-84628-489-9</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Optical and Digital Techniques for Information Securityent://SD_ILS/0/SD_ILS:1650902024-12-28T12:52:03Z2024-12-28T12:52:03ZYazar Javidi, Bahram. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/b105098">http://dx.doi.org/10.1007/b105098</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Impacts and Risk Assessment of Technology for Internet Security Enabled Information Small-Medium Enterprises (TEISMES)ent://SD_ILS/0/SD_ILS:1652672024-12-28T12:52:03Z2024-12-28T12:52:03ZYazar Shoniregun, Charles A. author. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/b137376">http://dx.doi.org/10.1007/b137376</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Information security best practices 205 basic rulesent://SD_ILS/0/SD_ILS:2547792024-12-28T12:52:03Z2024-12-28T12:52:03ZYazar Stefanek, George L.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781878707963">http://www.sciencedirect.com/science/book/9781878707963</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>A practical guide to security engineering and information assuranceent://SD_ILS/0/SD_ILS:2904612024-12-28T12:52:03Z2024-12-28T12:52:03ZYazar Herrmann, Debra S.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://marc.crcnetbase.com/isbn/9781420031492">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Engineering information security the application of systems engineering concepts to achieve information assuranceent://SD_ILS/0/SD_ILS:2499162024-12-28T12:52:03Z2024-12-28T12:52:03ZYazar Jacobs, Stuart.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim IEEE Xplore <a href="http://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=6047604">http://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=6047604</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>GeoSpatial Visual Analytics Geographical Information Processing and Visual Analytics for Environmental Securityent://SD_ILS/0/SD_ILS:2049212024-12-28T12:52:03Z2024-12-28T12:52:03ZYazar Amicis, Raffaele De. editor. Stojanovic, Radovan. editor. Conti, Giuseppe. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-90-481-2899-0">http://dx.doi.org/10.1007/978-90-481-2899-0</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Integration of information for environmental security : environmental security, information security, disaster forecast and prevention, water resources managementent://SD_ILS/0/SD_ILS:1136182024-12-28T12:52:03Z2024-12-28T12:52:03ZYazar NATO Advanced Research Workshop on Integration of Information for Environmental Security (2006 : Istanbul, Turkey) Coskun, H. Gonca. Cigizoglu, H. Kerem. Maktav, M. Derya.<br/>Yer Numarası TD170.2 .N38 2008<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>Building an information security awareness program defending against social engineering and technical threatsent://SD_ILS/0/SD_ILS:3556182024-12-28T12:52:03Z2024-12-28T12:52:03ZYazar Gardner, Bill (Bill G.) Thomas, Valerie (Information security consultant)<br/>Yer Numarası ONLINE(355618.1)<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780124199675">http://www.sciencedirect.com/science/book/9780124199675</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Information Systems Security and Privacy 7th International Conference, ICISSP 2021, Virtual Event, February 11-13, 2021, and 8th International Conference, ICISSP 2022, Virtual Event, February 9-11, 2022, Revised Selected Papersent://SD_ILS/0/SD_ILS:5205012024-12-28T12:52:03Z2024-12-28T12:52:03ZYazar Mori, Paolo. editor. Lenzini, Gabriele. editor. Furnell, Steven. editor. SpringerLink (Online service)<br/>Yer Numarası XX(520501.1)<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-031-37807-2">https://doi.org/10.1007/978-3-031-37807-2</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Human Aspects of Information Security and Assurance 17th IFIP WG 11.12 International Symposium, HAISA 2023, Kent, UK, July 4-6, 2023, Proceedingsent://SD_ILS/0/SD_ILS:5205982024-12-28T12:52:03Z2024-12-28T12:52:03ZYazar Furnell, Steven. editor. Clarke, Nathan. editor. SpringerLink (Online service)<br/>Yer Numarası XX(520598.1)<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-031-38530-8">https://doi.org/10.1007/978-3-031-38530-8</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Applications and Techniques in Information Security 13th International Conference, ATIS 2022, Manipal, India, December 30-31, 2022, Revised Selected Papersent://SD_ILS/0/SD_ILS:5207652024-12-28T12:52:03Z2024-12-28T12:52:03ZYazar Prabhu, Srikanth. editor. Pokhrel, Shiva Raj. editor. (orcid) Li, Gang. editor. SpringerLink (Online service)<br/>Yer Numarası XX(520765.1)<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-981-99-2264-2">https://doi.org/10.1007/978-981-99-2264-2</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Information Security Applications 23rd International Conference, WISA 2022, Jeju Island, South Korea, August 24-26, 2022, Revised Selected Papersent://SD_ILS/0/SD_ILS:5208072024-12-28T12:52:03Z2024-12-28T12:52:03ZYazar You, Ilsun. editor. Youn, Taek-Young. editor. SpringerLink (Online service)<br/>Yer Numarası XX(520807.1)<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-031-25659-2">https://doi.org/10.1007/978-3-031-25659-2</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Information Security and Cryptology 18th International Conference, Inscrypt 2022, Beijing, China, December 11-13, 2022, Revised Selected Papersent://SD_ILS/0/SD_ILS:5208222024-12-28T12:52:03Z2024-12-28T12:52:03ZYazar Deng, Yi. editor. Yung, Moti. editor. (orcid) SpringerLink (Online service)<br/>Yer Numarası XX(520822.1)<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-031-26553-2">https://doi.org/10.1007/978-3-031-26553-2</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Progress in Cryptology - LATINCRYPT 2023 8th International Conference on Cryptology and Information Security in Latin America, LATINCRYPT 2023, Quito, Ecuador, October 3-6, 2023, Proceedingsent://SD_ILS/0/SD_ILS:5211792024-12-28T12:52:03Z2024-12-28T12:52:03ZYazar Aly, Abdelrahaman. editor. Tibouchi, Mehdi. editor. SpringerLink (Online service)<br/>Yer Numarası XX(521179.1)<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-031-44469-2">https://doi.org/10.1007/978-3-031-44469-2</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Information Security 26th International Conference, ISC 2023, Groningen, The Netherlands, November 15-17, 2023, Proceedingsent://SD_ILS/0/SD_ILS:5213562024-12-28T12:52:03Z2024-12-28T12:52:03ZYazar Athanasopoulos, Elias. editor. Mennink, Bart. editor. SpringerLink (Online service)<br/>Yer Numarası XX(521356.1)<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-031-49187-0">https://doi.org/10.1007/978-3-031-49187-0</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Information Systems Security 19th International Conference, ICISS 2023, Raipur, India, December 16-20, 2023, Proceedingsent://SD_ILS/0/SD_ILS:5213622024-12-28T12:52:03Z2024-12-28T12:52:03ZYazar Muthukkumarasamy, Vallipuram. editor. Sudarsan, Sithu D. editor. Shyamasundar, Rudrapatna K. editor. SpringerLink (Online service)<br/>Yer Numarası XX(521362.1)<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-031-49099-6">https://doi.org/10.1007/978-3-031-49099-6</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Advances in Cryptology - ASIACRYPT 2023 29th International Conference on the Theory and Application of Cryptology and Information Security, Guangzhou, China, December 4-8, 2023, Proceedings, Part Ient://SD_ILS/0/SD_ILS:5213662024-12-28T12:52:03Z2024-12-28T12:52:03ZYazar Guo, Jian. editor. Steinfeld, Ron. editor. SpringerLink (Online service)<br/>Yer Numarası XX(521366.1)<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-981-99-8721-4">https://doi.org/10.1007/978-981-99-8721-4</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Advances in Cryptology - ASIACRYPT 2023 29th International Conference on the Theory and Application of Cryptology and Information Security, Guangzhou, China, December 4-8, 2023, Proceedings, Part IIIent://SD_ILS/0/SD_ILS:5213672024-12-28T12:52:03Z2024-12-28T12:52:03ZYazar Guo, Jian. editor. Steinfeld, Ron. editor. SpringerLink (Online service)<br/>Yer Numarası XX(521367.1)<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-981-99-8727-6">https://doi.org/10.1007/978-981-99-8727-6</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Advances in Cryptology - ASIACRYPT 2023 29th International Conference on the Theory and Application of Cryptology and Information Security, Guangzhou, China, December 4-8, 2023, Proceedings, Part IVent://SD_ILS/0/SD_ILS:5213682024-12-28T12:52:03Z2024-12-28T12:52:03ZYazar Guo, Jian. editor. Steinfeld, Ron. editor. SpringerLink (Online service)<br/>Yer Numarası XX(521368.1)<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-981-99-8730-6">https://doi.org/10.1007/978-981-99-8730-6</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Advances in Cryptology - ASIACRYPT 2023 29th International Conference on the Theory and Application of Cryptology and Information Security, Guangzhou, China, December 4-8, 2023, Proceedings, Part Vent://SD_ILS/0/SD_ILS:5213692024-12-28T12:52:03Z2024-12-28T12:52:03ZYazar Guo, Jian. editor. Steinfeld, Ron. editor. SpringerLink (Online service)<br/>Yer Numarası XX(521369.1)<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-981-99-8733-7">https://doi.org/10.1007/978-981-99-8733-7</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Information and Communications Security 25th International Conference, ICICS 2023, Tianjin, China, November 18-20, 2023, Proceedingsent://SD_ILS/0/SD_ILS:5212502024-12-28T12:52:03Z2024-12-28T12:52:03ZYazar Wang, Ding. editor. Yung, Moti. editor. (orcid) Liu, Zheli. editor. Chen, Xiaofeng. editor. SpringerLink (Online service)<br/>Yer Numarası XX(521250.1)<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-981-99-7356-9">https://doi.org/10.1007/978-981-99-7356-9</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Innovative Security Solutions for Information Technology and Communications 15th International Conference, SecITC 2022, Virtual Event, December 8-9, 2022, Revised Selected Papers.ent://SD_ILS/0/SD_ILS:5208592024-12-28T12:52:03Z2024-12-28T12:52:03ZYazar Doinea, Mihai. editor. Janicke, Helge. editor. SpringerLink (Online service)<br/>Yer Numarası XX(520859.1)<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-031-32636-3">https://doi.org/10.1007/978-3-031-32636-3</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Codes, Cryptology and Information Security 4th International Conference, C2SI 2023, Rabat, Morocco, May 29-31, 2023, Proceedingsent://SD_ILS/0/SD_ILS:5208662024-12-28T12:52:03Z2024-12-28T12:52:03ZYazar El Hajji, Said. editor. Mesnager, Sihem. editor. Souidi, El Mamoun. editor. SpringerLink (Online service)<br/>Yer Numarası XX(520866.1)<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-031-33017-9">https://doi.org/10.1007/978-3-031-33017-9</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Critical Information Infrastructures Security 17th International Conference, CRITIS 2022, Munich, Germany, September 14-16, 2022, Revised Selected Papersent://SD_ILS/0/SD_ILS:5209902024-12-28T12:52:03Z2024-12-28T12:52:03ZYazar Hämmerli, Bernhard. editor. (orcid) Helmbrecht, Udo. editor. Hommel, Wolfgang. editor. Kunczik, Leonhard. editor. Pickl, Stefan. editor.<br/>Yer Numarası XX(520990.1)<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-031-35190-7">https://doi.org/10.1007/978-3-031-35190-7</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Information Security and Privacy 28th Australasian Conference, ACISP 2023, Brisbane, QLD, Australia, July 5-7, 2023, Proceedingsent://SD_ILS/0/SD_ILS:5209952024-12-28T12:52:03Z2024-12-28T12:52:03ZYazar Simpson, Leonie. editor. Rezazadeh Baee, Mir Ali. editor. SpringerLink (Online service)<br/>Yer Numarası XX(520995.1)<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-031-35486-1">https://doi.org/10.1007/978-3-031-35486-1</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Advances in Information and Computer Security 18th International Workshop on Security, IWSEC 2023, Yokohama, Japan, August 29-31, 2023, Proceedingsent://SD_ILS/0/SD_ILS:5211152024-12-28T12:52:03Z2024-12-28T12:52:03ZYazar Shikata, Junji. editor. Kuzuno, Hiroki. editor. SpringerLink (Online service)<br/>Yer Numarası XX(521115.1)<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-031-41326-1">https://doi.org/10.1007/978-3-031-41326-1</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Information Security Practice and Experience 18th International Conference, ISPEC 2023, Copenhagen, Denmark, August 24-25, 2023, Proceedingsent://SD_ILS/0/SD_ILS:5213232024-12-28T12:52:03Z2024-12-28T12:52:03ZYazar Meng, Weizhi. editor. Yan, Zheng. editor. Piuri, Vincenzo. editor. SpringerLink (Online service)<br/>Yer Numarası XX(521323.1)<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-981-99-7032-2">https://doi.org/10.1007/978-981-99-7032-2</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Information Security and Cryptology - ICISC 2022 25th International Conference, ICISC 2022, Seoul, South Korea, November 30 - December 2, 2022, Revised Selected Papersent://SD_ILS/0/SD_ILS:5209202024-12-28T12:52:03Z2024-12-28T12:52:03ZYazar Seo, Seung-Hyun. editor. Seo, Hwajeong. editor. SpringerLink (Online service)<br/>Yer Numarası XX(520920.1)<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-031-29371-9">https://doi.org/10.1007/978-3-031-29371-9</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Advances in Cryptology - ASIACRYPT 2023 29th International Conference on the Theory and Application of Cryptology and Information Security, Guangzhou, China, December 4-8, 2023, Proceedings, Part VIent://SD_ILS/0/SD_ILS:5213702024-12-28T12:52:03Z2024-12-28T12:52:03ZYazar Guo, Jian. editor. Steinfeld, Ron. editor. SpringerLink (Online service)<br/>Yer Numarası XX(521370.1)<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-981-99-8736-8">https://doi.org/10.1007/978-981-99-8736-8</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Advances in Cryptology - ASIACRYPT 2023 29th International Conference on the Theory and Application of Cryptology and Information Security, Guangzhou, China, December 4-8, 2023, Proceedings, Part VIIent://SD_ILS/0/SD_ILS:5213712024-12-28T12:52:03Z2024-12-28T12:52:03ZYazar Guo, Jian. editor. Steinfeld, Ron. editor. SpringerLink (Online service)<br/>Yer Numarası XX(521371.1)<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-981-99-8739-9">https://doi.org/10.1007/978-981-99-8739-9</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Advances in Cryptology - ASIACRYPT 2023 29th International Conference on the Theory and Application of Cryptology and Information Security, Guangzhou, China, December 4-8, 2023, Proceedings, Part IIent://SD_ILS/0/SD_ILS:5213722024-12-28T12:52:03Z2024-12-28T12:52:03ZYazar Guo, Jian. editor. Steinfeld, Ron. editor. SpringerLink (Online service)<br/>Yer Numarası XX(521372.1)<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-981-99-8724-5">https://doi.org/10.1007/978-981-99-8724-5</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Advances in Cryptology - ASIACRYPT 2023 29th International Conference on the Theory and Application of Cryptology and Information Security, Guangzhou, China, December 4-8, 2023, Proceedings, Part VIIIent://SD_ILS/0/SD_ILS:5213732024-12-28T12:52:03Z2024-12-28T12:52:03ZYazar Guo, Jian. editor. Steinfeld, Ron. editor. SpringerLink (Online service)<br/>Yer Numarası XX(521373.1)<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-981-99-8742-9">https://doi.org/10.1007/978-981-99-8742-9</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Critical Information Infrastructures Security 13th International Conference, CRITIS 2018, Kaunas, Lithuania, September 24-26, 2018, Revised Selected Papersent://SD_ILS/0/SD_ILS:4840612024-12-28T12:52:03Z2024-12-28T12:52:03ZYazar Luiijf, Eric. editor. (orcid)0000-0002-1821-9890 Žutautaitė, Inga. editor. (orcid)0000-0002-6073-2823 Hämmerli, Bernhard M. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-030-05849-4">https://doi.org/10.1007/978-3-030-05849-4</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Advances in Information and Computer Security 14th International Workshop on Security, IWSEC 2019, Tokyo, Japan, August 28–30, 2019, Proceedingsent://SD_ILS/0/SD_ILS:4846662024-12-28T12:52:03Z2024-12-28T12:52:03ZYazar Attrapadung, Nuttapong. editor. (orcid)0000-0003-4116-1751 Yagi, Takeshi. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-030-26834-3">https://doi.org/10.1007/978-3-030-26834-3</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Information Security 22nd International Conference, ISC 2019, New York City, NY, USA, September 16–18, 2019, Proceedingsent://SD_ILS/0/SD_ILS:4849082024-12-28T12:52:03Z2024-12-28T12:52:03ZYazar Lin, Zhiqiang. editor. Papamanthou, Charalampos. editor. Polychronakis, Michalis. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-030-30215-3">https://doi.org/10.1007/978-3-030-30215-3</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Innovative Security Solutions for Information Technology and Communications 11th International Conference, SecITC 2018, Bucharest, Romania, November 8–9, 2018, Revised Selected Papersent://SD_ILS/0/SD_ILS:4863522024-12-28T12:52:03Z2024-12-28T12:52:03ZYazar Lanet, Jean-Louis. editor. (orcid)0000-0002-4751-3941 Toma, Cristian. editor. (orcid)0000-0001-9316-7739 SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-030-12942-2">https://doi.org/10.1007/978-3-030-12942-2</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Advanced methodologies and technologies in system security, information privacy, and forensicsent://SD_ILS/0/SD_ILS:4820092024-12-28T12:52:03Z2024-12-28T12:52:03ZYazar Khosrow-Pour, Mehdi, 1951- editor. IGI Global, publisher.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-7492-7">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-7492-7</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Information Security Education. Education in Proactive Information Security 12th IFIP WG 11.8 World Conference, WISE 12, Lisbon, Portugal, June 25–27, 2019, Proceedingsent://SD_ILS/0/SD_ILS:4834772024-12-28T12:52:03Z2024-12-28T12:52:03ZYazar Drevin, Lynette. editor. (orcid)0000-0001-9370-8216 Theocharidou, Marianthi. editor. (orcid)0000-0002-8870-1746 SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-030-23451-5">https://doi.org/10.1007/978-3-030-23451-5</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Information Security 17th International Conference, ISSA 2018, Pretoria, South Africa, August 15–16, 2018, Revised Selected Papersent://SD_ILS/0/SD_ILS:4836602024-12-28T12:52:03Z2024-12-28T12:52:03ZYazar Venter, Hein. editor. (orcid)0000-0002-3607-8630 Loock, Marianne. editor. (orcid)0000-0001-8005-716X Coetzee, Marijke. editor. (orcid)0000-0002-9157-3079 Eloff, Mariki. editor. (orcid)0000-0001-8997-7931 Eloff, Jan. editor. (orcid)0000-0003-4683-2198<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-030-11407-7">https://doi.org/10.1007/978-3-030-11407-7</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Information Security and Cryptology – ICISC 2018 21st International Conference, Seoul, South Korea, November 28–30, 2018, Revised Selected Papersent://SD_ILS/0/SD_ILS:4838412024-12-28T12:52:03Z2024-12-28T12:52:03ZYazar Lee, Kwangsu. editor. (orcid)0000-0003-1910-8890 SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-030-12146-4">https://doi.org/10.1007/978-3-030-12146-4</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Information Security Theory and Practice 12th IFIP WG 11.2 International Conference, WISTP 2018, Brussels, Belgium, December 10–11, 2018, Revised Selected Papersent://SD_ILS/0/SD_ILS:4845182024-12-28T12:52:03Z2024-12-28T12:52:03ZYazar Blazy, Olivier. editor. (orcid)0000-0001-6205-8249 Yeun, Chan Yeob. editor. (orcid)0000-0002-1398-952X SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-030-20074-9">https://doi.org/10.1007/978-3-030-20074-9</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Progress in Cryptology – LATINCRYPT 2019 6th International Conference on Cryptology and Information Security in Latin America, Santiago de Chile, Chile, October 2–4, 2019, Proceedingsent://SD_ILS/0/SD_ILS:4849182024-12-28T12:52:03Z2024-12-28T12:52:03ZYazar Schwabe, Peter. editor. Thériault, Nicolas. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-030-30530-7">https://doi.org/10.1007/978-3-030-30530-7</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Advances in Cryptology – ASIACRYPT 2019 25th International Conference on the Theory and Application of Cryptology and Information Security, Kobe, Japan, December 8–12, 2019, Proceedings, Part IIIent://SD_ILS/0/SD_ILS:4849592024-12-28T12:52:03Z2024-12-28T12:52:03ZYazar Galbraith, Steven D. editor. (orcid)0000-0001-7114-8377 Moriai, Shiho. editor. (orcid)0000-0002-6072-6183 SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-030-34618-8">https://doi.org/10.1007/978-3-030-34618-8</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Advances in Cryptology – ASIACRYPT 2019 25th International Conference on the Theory and Application of Cryptology and Information Security, Kobe, Japan, December 8–12, 2019, Proceedings, Part IIent://SD_ILS/0/SD_ILS:4849602024-12-28T12:52:03Z2024-12-28T12:52:03ZYazar Galbraith, Steven D. editor. (orcid)0000-0001-7114-8377 Moriai, Shiho. editor. (orcid)0000-0002-6072-6183 SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-030-34621-8">https://doi.org/10.1007/978-3-030-34621-8</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Information Security Applications 19th International Conference, WISA 2018, Jeju Island, Korea, August 23–25, 2018, Revised Selected Papersent://SD_ILS/0/SD_ILS:4852832024-12-28T12:52:03Z2024-12-28T12:52:03ZYazar Kang, Brent ByungHoon. editor. (orcid)0000-0001-8984-1006 Jang, JinSoo. editor. (orcid)0000-0003-2070-2408 SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-030-17982-3">https://doi.org/10.1007/978-3-030-17982-3</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Progress in Cryptology – LATINCRYPT 2017 5th International Conference on Cryptology and Information Security in Latin America, Havana, Cuba, September 20–22, 2017, Revised Selected Papersent://SD_ILS/0/SD_ILS:4864182024-12-28T12:52:03Z2024-12-28T12:52:03ZYazar Lange, Tanja. editor. Dunkelman, Orr. editor. (orcid)0000-0001-5799-2635 SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-030-25283-0">https://doi.org/10.1007/978-3-030-25283-0</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Trusted Computing and Information Security 12th Chinese Conference, CTCIS 2018, Wuhan, China, October 18, 2018, Revised Selected Papersent://SD_ILS/0/SD_ILS:4829822024-12-28T12:52:03Z2024-12-28T12:52:03ZYazar Zhang, Huanguo. editor. Zhao, Bo. editor. Yan, Fei. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-981-13-5913-2">https://doi.org/10.1007/978-981-13-5913-2</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Information Security Practice and Experience 15th International Conference, ISPEC 2019, Kuala Lumpur, Malaysia, November 26–28, 2019, Proceedingsent://SD_ILS/0/SD_ILS:4830992024-12-28T12:52:03Z2024-12-28T12:52:03ZYazar Heng, Swee-Huay. editor. (orcid)0000-0003-3627-2131 Lopez, Javier. editor. (orcid)0000-0001-8066-9991 SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-030-34339-2">https://doi.org/10.1007/978-3-030-34339-2</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Handbook of Multimedia Information Security: Techniques and Applicationsent://SD_ILS/0/SD_ILS:4833482024-12-28T12:52:03Z2024-12-28T12:52:03ZYazar Singh, Amit Kumar. editor. Mohan, Anand. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-030-15887-3">https://doi.org/10.1007/978-3-030-15887-3</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Information Systems Security and Privacy 4th International Conference, ICISSP 2018, Funchal - Madeira, Portugal, January 22-24, 2018, Revised Selected Papersent://SD_ILS/0/SD_ILS:4834472024-12-28T12:52:03Z2024-12-28T12:52:03ZYazar Mori, Paolo. editor. (orcid)0000-0002-6618-0388 Furnell, Steven. editor. (orcid)0000-0003-0984-7542 Camp, Olivier. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-030-25109-3">https://doi.org/10.1007/978-3-030-25109-3</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Codes, Cryptology and Information Security Third International Conference, C2SI 2019, Rabat, Morocco, April 22–24, 2019, Proceedings - In Honor of Said El Hajjient://SD_ILS/0/SD_ILS:4834622024-12-28T12:52:03Z2024-12-28T12:52:03ZYazar Carlet, Claude. editor. Guilley, Sylvain. editor. (orcid)0000-0002-5044-3534 Nitaj, Abderrahmane. editor. (orcid)0000-0002-0372-1757 Souidi, El Mamoun. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-030-16458-4">https://doi.org/10.1007/978-3-030-16458-4</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Advances in Cryptology – ASIACRYPT 2019 25th International Conference on the Theory and Application of Cryptology and Information Security, Kobe, Japan, December 8–12, 2019, Proceedings, Part Ient://SD_ILS/0/SD_ILS:4835692024-12-28T12:52:03Z2024-12-28T12:52:03ZYazar Galbraith, Steven D. editor. (orcid)0000-0001-7114-8377 Moriai, Shiho. editor. (orcid)0000-0002-6072-6183 SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-030-34578-5">https://doi.org/10.1007/978-3-030-34578-5</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Applications and Techniques in Information Security 10th International Conference, ATIS 2019, Thanjavur, India, November 22–24, 2019, Proceedingsent://SD_ILS/0/SD_ILS:4835762024-12-28T12:52:03Z2024-12-28T12:52:03ZYazar Shankar Sriram, V. S. editor. (orcid)0000-0001-7870-7944 Subramaniyaswamy, V. editor. Sasikaladevi, N. editor. (orcid)0000-0002-0841-502X Zhang, Leo. editor. Batten, Lynn. editor. (orcid)0000-0003-4525-2423<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-981-15-0871-4">https://doi.org/10.1007/978-981-15-0871-4</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Information Systems Security 15th International Conference, ICISS 2019, Hyderabad, India, December 16–20, 2019, Proceedingsent://SD_ILS/0/SD_ILS:4845092024-12-28T12:52:03Z2024-12-28T12:52:03ZYazar Garg, Deepak. editor. (orcid)0000-0002-0888-3093 Kumar, N. V. Narendra. editor. Shyamasundar, Rudrapatna K. editor. (orcid)0000-0001-6966-0507 SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-030-36945-3">https://doi.org/10.1007/978-3-030-36945-3</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Information Security and Cryptology 14th International Conference, Inscrypt 2018, Fuzhou, China, December 14-17, 2018, Revised Selected Papersent://SD_ILS/0/SD_ILS:4858292024-12-28T12:52:03Z2024-12-28T12:52:03ZYazar Guo, Fuchun. editor. (orcid)0000-0001-6939-7710 Huang, Xinyi. editor. Yung, Moti. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-030-14234-6">https://doi.org/10.1007/978-3-030-14234-6</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Information and Operational Technology Security Systems First International Workshop, IOSec 2018, CIPSEC Project, Heraklion, Crete, Greece, September 13, 2018, Revised Selected Papersent://SD_ILS/0/SD_ILS:4869442024-12-28T12:52:03Z2024-12-28T12:52:03ZYazar Fournaris, Apostolos P. editor. (orcid)0000-0002-4758-2349 Lampropoulos, Konstantinos. editor. Marín Tordera, Eva. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-030-12085-6">https://doi.org/10.1007/978-3-030-12085-6</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Information Security and Privacy 24th Australasian Conference, ACISP 2019, Christchurch, New Zealand, July 3–5, 2019, Proceedingsent://SD_ILS/0/SD_ILS:4869562024-12-28T12:52:03Z2024-12-28T12:52:03ZYazar Jang-Jaccard, Julian. editor. (orcid)0000-0002-1002-057X Guo, Fuchun. editor. (orcid)0000-0001-6939-7710 SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-030-21548-4">https://doi.org/10.1007/978-3-030-21548-4</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Information Security Education – Towards a Cybersecure Society 11th IFIP WG 11.8 World Conference, WISE 11, Held at the 24th IFIP World Computer Congress, WCC 2018, Poznan, Poland, September 18–20, 2018, Proceedingsent://SD_ILS/0/SD_ILS:3990192024-12-28T12:52:03Z2024-12-28T12:52:03ZYazar Drevin, Lynette. editor. (orcid)0000-0001-9370-8216 Theocharidou, Marianthi. editor. (orcid)0000-0002-8870-1746 SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-319-99734-6">https://doi.org/10.1007/978-3-319-99734-6</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Advances in Cryptology – ASIACRYPT 2018 24th International Conference on the Theory and Application of Cryptology and Information Security, Brisbane, QLD, Australia, December 2–6, 2018, Proceedings, Part IIent://SD_ILS/0/SD_ILS:3990862024-12-28T12:52:03Z2024-12-28T12:52:03ZYazar Peyrin, Thomas. editor. (orcid)0000-0002-2690-9197 Galbraith, Steven. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-030-03329-3">https://doi.org/10.1007/978-3-030-03329-3</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Advances in Cryptology – ASIACRYPT 2018 24th International Conference on the Theory and Application of Cryptology and Information Security, Brisbane, QLD, Australia, December 2–6, 2018, Proceedings, Part IIIent://SD_ILS/0/SD_ILS:3995452024-12-28T12:52:03Z2024-12-28T12:52:03ZYazar Peyrin, Thomas. editor. (orcid)0000-0002-2690-9197 Galbraith, Steven. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-030-03332-3">https://doi.org/10.1007/978-3-030-03332-3</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Information Security Practice and Experience 14th International Conference, ISPEC 2018, Tokyo, Japan, September 25-27, 2018, Proceedingsent://SD_ILS/0/SD_ILS:3999722024-12-28T12:52:03Z2024-12-28T12:52:03ZYazar Su, Chunhua. editor. Kikuchi, Hiroaki. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-319-99807-7">https://doi.org/10.1007/978-3-319-99807-7</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Information Security 21st International Conference, ISC 2018, Guildford, UK, September 9–12, 2018, Proceedingsent://SD_ILS/0/SD_ILS:4001942024-12-28T12:52:03Z2024-12-28T12:52:03ZYazar Chen, Liqun. editor. (orcid)0000-0003-2680-4907 Manulis, Mark. editor. (orcid)0000-0002-1512-9670 Schneider, Steve. editor. (orcid)0000-0001-8365-6993 SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-319-99136-8">https://doi.org/10.1007/978-3-319-99136-8</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Applications and Techniques in Information Security 9th International Conference, ATIS 2018, Nanning, China, November 9–11, 2018, Proceedingsent://SD_ILS/0/SD_ILS:4003762024-12-28T12:52:03Z2024-12-28T12:52:03ZYazar Chen, Qingfeng. editor. Wu, Jia. editor. Zhang, Shichao. editor. Yuan, Changan. editor. Batten, Lynn. editor. (orcid)0000-0003-4525-2423<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-981-13-2907-4">https://doi.org/10.1007/978-981-13-2907-4</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Information Systems Security and Privacy Third International Conference, ICISSP 2017, Porto, Portugal, February 19-21, 2017, Revised Selected Papersent://SD_ILS/0/SD_ILS:4014862024-12-28T12:52:03Z2024-12-28T12:52:03ZYazar Mori, Paolo. editor. Furnell, Steven. editor. (orcid)0000-0003-0984-7542 Camp, Olivier. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-319-93354-2">https://doi.org/10.1007/978-3-319-93354-2</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Information Security and Cryptology – ICISC 2017 20th International Conference, Seoul, South Korea, November 29 - December 1, 2017, Revised Selected Papersent://SD_ILS/0/SD_ILS:4016142024-12-28T12:52:03Z2024-12-28T12:52:03ZYazar Kim, Howon. editor. Kim, Dong-Chan. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-319-78556-1">https://doi.org/10.1007/978-3-319-78556-1</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Information Security and Privacy 23rd Australasian Conference, ACISP 2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedingsent://SD_ILS/0/SD_ILS:4019922024-12-28T12:52:03Z2024-12-28T12:52:03ZYazar Susilo, Willy. editor. (orcid)0000-0002-1562-5105 Yang, Guomin. editor. (orcid)0000-0002-4949-7738 SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-319-93638-3">https://doi.org/10.1007/978-3-319-93638-3</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Information Security Theory and Practice 11th IFIP WG 11.2 International Conference, WISTP 2017, Heraklion, Crete, Greece, September 28–29, 2017, Proceedingsent://SD_ILS/0/SD_ILS:4022152024-12-28T12:52:03Z2024-12-28T12:52:03ZYazar Hancke, Gerhard P. editor. Damiani, Ernesto. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-319-93524-9">https://doi.org/10.1007/978-3-319-93524-9</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Security in Computer and Information Sciences First International ISCIS Security Workshop 2018, Euro-CYBERSEC 2018, London, UK, February 26-27, 2018, Revised Selected Papersent://SD_ILS/0/SD_ILS:4027362024-12-28T12:52:03Z2024-12-28T12:52:03ZYazar Gelenbe, Erol. editor. (orcid)0000-0001-9688-2201 Campegiani, Paolo. editor. Czachórski, Tadeusz. editor. Katsikas, Sokratis K. editor. (orcid)0000-0003-2966-9683 Komnios, Ioannis. editor.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-319-95189-8">https://doi.org/10.1007/978-3-319-95189-8</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Advances in Cryptology – ASIACRYPT 2018 24th International Conference on the Theory and Application of Cryptology and Information Security, Brisbane, QLD, Australia, December 2–6, 2018, Proceedings, Part Ient://SD_ILS/0/SD_ILS:3999232024-12-28T12:52:03Z2024-12-28T12:52:03ZYazar Peyrin, Thomas. editor. (orcid)0000-0002-2690-9197 Galbraith, Steven. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-030-03326-2">https://doi.org/10.1007/978-3-030-03326-2</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Critical Information Infrastructures Security 12th International Conference, CRITIS 2017, Lucca, Italy, October 8-13, 2017, Revised Selected Papersent://SD_ILS/0/SD_ILS:3999952024-12-28T12:52:03Z2024-12-28T12:52:03ZYazar D'Agostino, Gregorio. editor. (orcid)0000-0003-3657-5335 Scala, Antonio. editor. (orcid)0000-0002-3414-2686 SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-319-99843-5">https://doi.org/10.1007/978-3-319-99843-5</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Advances in Information and Computer Security 13th International Workshop on Security, IWSEC 2018, Sendai, Japan, September 3-5, 2018, Proceedingsent://SD_ILS/0/SD_ILS:4001112024-12-28T12:52:03Z2024-12-28T12:52:03ZYazar Inomata, Atsuo. editor. Yasuda, Kan. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-319-97916-8">https://doi.org/10.1007/978-3-319-97916-8</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Information Security Applications 18th International Conference, WISA 2017, Jeju Island, Korea, August 24-26, 2017, Revised Selected Papersent://SD_ILS/0/SD_ILS:4016822024-12-28T12:52:03Z2024-12-28T12:52:03ZYazar Kang, Brent ByungHoon. editor. (orcid)0000-0001-8984-1006 Kim, Taesoo. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-319-93563-8">https://doi.org/10.1007/978-3-319-93563-8</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Information and Communications Security 20th International Conference, ICICS 2018, Lille, France, October 29-31, 2018, Proceedingsent://SD_ILS/0/SD_ILS:4000522024-12-28T12:52:03Z2024-12-28T12:52:03ZYazar Naccache, David. editor. (orcid)0000-0002-8651-6555 Xu, Shouhuai. editor. (orcid)0000-0001-8034-0942 Qing, Sihan. editor. Samarati, Pierangela. editor. (orcid)0000-0001-7395-4620 Blanc, Gregory. editor. (orcid)0000-0001-8150-6617<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-030-01950-1">https://doi.org/10.1007/978-3-030-01950-1</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Information and Communications Security 19th International Conference, ICICS 2017, Beijing, China, December 6-8, 2017, Proceedingsent://SD_ILS/0/SD_ILS:4007862024-12-28T12:52:03Z2024-12-28T12:52:03ZYazar Qing, Sihan. editor. Mitchell, Chris. editor. Chen, Liqun. editor. Liu, Dongmei. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-319-89500-0">https://doi.org/10.1007/978-3-319-89500-0</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Information Security and Cryptology 13th International Conference, Inscrypt 2017, Xi'an, China, November 3–5, 2017, Revised Selected Papersent://SD_ILS/0/SD_ILS:4008302024-12-28T12:52:03Z2024-12-28T12:52:03ZYazar Chen, Xiaofeng. editor. Lin, Dongdai. editor. Yung, Moti. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-319-75160-3">https://doi.org/10.1007/978-3-319-75160-3</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Information Systems Security 14th International Conference, ICISS 2018, Bangalore, India, December 17-19, 2018, Proceedingsent://SD_ILS/0/SD_ILS:4002472024-12-28T12:52:03Z2024-12-28T12:52:03ZYazar Ganapathy, Vinod. editor. Jaeger, Trent. editor. Shyamasundar, R.K. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-030-05171-6">https://doi.org/10.1007/978-3-030-05171-6</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Practical Information Security A Competency-Based Education Courseent://SD_ILS/0/SD_ILS:4019412024-12-28T12:52:03Z2024-12-28T12:52:03ZYazar Alsmadi, Izzat. author. Burdwell, Robert. author. Aleroud , Ahmed. author. Wahbeh, Abdallah. author. Al-Qudah, Mahmoud. author.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-319-72119-4">https://doi.org/10.1007/978-3-319-72119-4</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Information security science : measuring the vulnerability to data compromisesent://SD_ILS/0/SD_ILS:4589682024-12-28T12:52:03Z2024-12-28T12:52:03ZYazar Young, Carl S., author.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128096437">http://www.sciencedirect.com/science/book/9780128096437</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Information security analytics finding security insights, patterns, and anomalies in big dataent://SD_ILS/0/SD_ILS:3553882024-12-28T12:52:03Z2024-12-28T12:52:03ZYazar Talabis, Mark, author. McPherson, Robert, author. Miyamoto, I, author. Martin, Jason L., author.<br/>Yer Numarası ONLINE(355388.1)<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128002070">http://www.sciencedirect.com/science/book/9780128002070</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Information Systems Security and Privacy First International Conference, ICISSP 2015, Angers, France, February 9-11, 2015, Revised Selected Papersent://SD_ILS/0/SD_ILS:5183552024-12-28T12:52:03Z2024-12-28T12:52:03ZYazar Camp, Olivier. editor. Weippl, Edgar. editor. Bidan, Christophe. editor. Aïmeur, Esma. editor. SpringerLink (Online service)<br/>Yer Numarası XX(518355.1)<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-319-27668-7">https://doi.org/10.1007/978-3-319-27668-7</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Information Security Education Across the Curriculum 9th IFIP WG 11.8 World Conference, WISE 9, Hamburg, Germany, May 26-28, 2015, Proceedingsent://SD_ILS/0/SD_ILS:5183862024-12-28T12:52:03Z2024-12-28T12:52:03ZYazar Bishop, Matt. editor. Miloslavskaya, Natalia. editor. Theocharidou, Marianthi. editor. SpringerLink (Online service)<br/>Yer Numarası XX(518386.1)<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-319-18500-2">https://doi.org/10.1007/978-3-319-18500-2</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Applications and Techniques in Information Security 6th International Conference, ATIS 2015, Beijing, China, November 4-6, 2015, Proceedingsent://SD_ILS/0/SD_ILS:5184752024-12-28T12:52:03Z2024-12-28T12:52:03ZYazar Niu, Wenjia. editor. Li, Gang. editor. Liu, Jiqiang. editor. Tan, Jianlong. editor. Guo, Li. editor.<br/>Yer Numarası XX(518475.1)<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-662-48683-2">https://doi.org/10.1007/978-3-662-48683-2</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Information Security and Cryptology 10th International Conference, Inscrypt 2014, Beijing, China, December 13-15, 2014, Revised Selected Papersent://SD_ILS/0/SD_ILS:5187852024-12-28T12:52:03Z2024-12-28T12:52:03ZYazar Lin, Dongdai. editor. Yung, Moti. editor. Zhou, Jianying. editor. SpringerLink (Online service)<br/>Yer Numarası XX(518785.1)<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-319-16745-9">https://doi.org/10.1007/978-3-319-16745-9</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Progress in Cryptology -- LATINCRYPT 2015 4th International Conference on Cryptology and Information Security in Latin America, Guadalajara, Mexico, August 23-26, 2015, Proceedingsent://SD_ILS/0/SD_ILS:5187902024-12-28T12:52:03Z2024-12-28T12:52:03ZYazar Lauter, Kristin. editor. Rodríguez-Henríquez, Francisco. editor. SpringerLink (Online service)<br/>Yer Numarası XX(518790.1)<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-319-22174-8">https://doi.org/10.1007/978-3-319-22174-8</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Advances in Cryptology -- ASIACRYPT 2015 21st International Conference on the Theory and Application of Cryptology and Information Security,Auckland, New Zealand, November 29 -- December 3, 2015, Proceedings, Part Ient://SD_ILS/0/SD_ILS:5188412024-12-28T12:52:03Z2024-12-28T12:52:03ZYazar Iwata, Tetsu. editor. Cheon, Jung Hee. editor. SpringerLink (Online service)<br/>Yer Numarası XX(518841.1)<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-662-48797-6">https://doi.org/10.1007/978-3-662-48797-6</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Advances in Information and Computer Security 10th International Workshop on Security, IWSEC 2015, Nara, Japan, August 26-28, 2015, Proceedingsent://SD_ILS/0/SD_ILS:5188432024-12-28T12:52:03Z2024-12-28T12:52:03ZYazar Tanaka, Keisuke. editor. Suga, Yuji. editor. SpringerLink (Online service)<br/>Yer Numarası XX(518843.1)<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-319-22425-1">https://doi.org/10.1007/978-3-319-22425-1</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Information Security 16th International Conference, ISC 2013, Dallas, Texas, November 13-15, 2013, Proceedingsent://SD_ILS/0/SD_ILS:5188452024-12-28T12:52:03Z2024-12-28T12:52:03ZYazar Desmedt, Yvo. editor. SpringerLink (Online service)<br/>Yer Numarası XX(518845.1)<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-319-27659-5">https://doi.org/10.1007/978-3-319-27659-5</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Information Systems Security 11th International Conference, ICISS 2015, Kolkata, India, December 16-20, 2015. Proceedingsent://SD_ILS/0/SD_ILS:5188542024-12-28T12:52:03Z2024-12-28T12:52:03ZYazar Jajoda, Sushil. editor. Mazumdar, Chandan. editor. SpringerLink (Online service)<br/>Yer Numarası XX(518854.1)<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-319-26961-0">https://doi.org/10.1007/978-3-319-26961-0</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Information and Communications Security 16th International Conference, ICICS 2014, Hong Kong, China, December 16-17, 2014, Revised Selected Papersent://SD_ILS/0/SD_ILS:5188562024-12-28T12:52:03Z2024-12-28T12:52:03ZYazar Hui, Lucas C. K. editor. Qing, S. H. editor. Shi, Elaine. editor. Yiu, S. M. editor. SpringerLink (Online service)<br/>Yer Numarası XX(518856.1)<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-319-21966-0">https://doi.org/10.1007/978-3-319-21966-0</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Information Security 18th International Conference, ISC 2015, Trondheim, Norway, September 9-11, 2015, Proceedingsent://SD_ILS/0/SD_ILS:5190692024-12-28T12:52:03Z2024-12-28T12:52:03ZYazar Lopez, Javier. editor. Mitchell, Chris J. editor. SpringerLink (Online service)<br/>Yer Numarası XX(519069.1)<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-319-23318-5">https://doi.org/10.1007/978-3-319-23318-5</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>ISSE 2015 Highlights of the Information Security Solutions Europe 2015 Conferenceent://SD_ILS/0/SD_ILS:5185652024-12-28T12:52:03Z2024-12-28T12:52:03ZYazar Reimer, Helmut. editor. Pohlmann, Norbert. editor. Schneider, Wolfgang. editor. SpringerLink (Online service)<br/>Yer Numarası XX(518565.1)<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-658-10934-9">https://doi.org/10.1007/978-3-658-10934-9</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Information Security and Cryptology - ICISC 2014 17th International Conference, Seoul, South Korea, December 3-5, 2014, Revised Selected Papersent://SD_ILS/0/SD_ILS:5192322024-12-28T12:52:03Z2024-12-28T12:52:03ZYazar Lee, Jooyoung. editor. Kim, Jongsung. editor. SpringerLink (Online service)<br/>Yer Numarası XX(519232.1)<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-319-15943-0">https://doi.org/10.1007/978-3-319-15943-0</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Information Security Applications 15th International Workshop, WISA 2014, Jeju Island, Korea, August 25-27, 2014. Revised Selected Papersent://SD_ILS/0/SD_ILS:5191072024-12-28T12:52:03Z2024-12-28T12:52:03ZYazar Rhee, Kyung-Hyune. editor. Yi, Jeong Hyun. editor. SpringerLink (Online service)<br/>Yer Numarası XX(519107.1)<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-319-15087-1">https://doi.org/10.1007/978-3-319-15087-1</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Information Security and Privacy 20th Australasian Conference, ACISP 2015, Brisbane, QLD, Australia, June 29 -- July 1, 2015, Proceedingsent://SD_ILS/0/SD_ILS:5187702024-12-28T12:52:03Z2024-12-28T12:52:03ZYazar Foo, Ernest. editor. Stebila, Douglas. editor. SpringerLink (Online service)<br/>Yer Numarası XX(518770.1)<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-319-19962-7">https://doi.org/10.1007/978-3-319-19962-7</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Progress in Cryptology - LATINCRYPT 2014 Third International Conference on Cryptology and Information Security in Latin America Florianópolis, Brazil, September 17-19, 2014 Revised Selected Papersent://SD_ILS/0/SD_ILS:5187962024-12-28T12:52:03Z2024-12-28T12:52:03ZYazar Aranha, Diego F. editor. Menezes, Alfred. editor. SpringerLink (Online service)<br/>Yer Numarası XX(518796.1)<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-319-16295-9">https://doi.org/10.1007/978-3-319-16295-9</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Cryptography and Information Security in the Balkans First International Conference, BalkanCryptSec 2014, Istanbul, Turkey, October 16-17, 2014, Revised Selected Papersent://SD_ILS/0/SD_ILS:5188722024-12-28T12:52:03Z2024-12-28T12:52:03ZYazar Ors, Berna. editor. Preneel, Bart. editor. SpringerLink (Online service)<br/>Yer Numarası XX(518872.1)<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-319-21356-9">https://doi.org/10.1007/978-3-319-21356-9</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Innovative Security Solutions for Information Technology and Communications 8th International Conference, SECITC 2015, Bucharest, Romania, June 11-12, 2015. Revised Selected Papersent://SD_ILS/0/SD_ILS:5189112024-12-28T12:52:03Z2024-12-28T12:52:03ZYazar Bica, Ion. editor. Naccache, David. editor. Simion, Emil. editor. SpringerLink (Online service)<br/>Yer Numarası XX(518911.1)<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-319-27179-8">https://doi.org/10.1007/978-3-319-27179-8</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Advances in Cryptology - ASIACRYPT 2015 21st International Conference on the Theory and Application of Cryptology and Information Security, Auckland, New Zealand, November 29 -- December 3, 2015, Proceedings, Part IIent://SD_ILS/0/SD_ILS:5189662024-12-28T12:52:03Z2024-12-28T12:52:03ZYazar Iwata, Tetsu. editor. Cheon, Jung Hee. editor. SpringerLink (Online service)<br/>Yer Numarası XX(518966.1)<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-662-48800-3">https://doi.org/10.1007/978-3-662-48800-3</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Information Theoretic Security 8th International Conference, ICITS 2015, Lugano, Switzerland, May 2-5, 2015. Proceedingsent://SD_ILS/0/SD_ILS:5190032024-12-28T12:52:03Z2024-12-28T12:52:03ZYazar Lehmann, Anja. editor. Wolf, Stefan. editor. SpringerLink (Online service)<br/>Yer Numarası XX(519003.1)<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-319-17470-9">https://doi.org/10.1007/978-3-319-17470-9</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Information Security Practice and Experience 11th International Conference, ISPEC 2015, Beijing, China, May 5-8, 2015, Proceedingsent://SD_ILS/0/SD_ILS:5192532024-12-28T12:52:03Z2024-12-28T12:52:03ZYazar Lopez, Javier. editor. Wu, Yongdong. editor. SpringerLink (Online service)<br/>Yer Numarası XX(519253.1)<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-319-17533-1">https://doi.org/10.1007/978-3-319-17533-1</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Codes, Cryptology, and Information Security First International Conference, C2SI 2015, Rabat, Morocco, May 26-28, 2015, Proceedings - In Honor of Thierry Bergerent://SD_ILS/0/SD_ILS:5192572024-12-28T12:52:03Z2024-12-28T12:52:03ZYazar El Hajji, Said. editor. Nitaj, Abderrahmane. editor. Carlet, Claude. editor. Souidi, El Mamoun. editor. SpringerLink (Online service)<br/>Yer Numarası XX(519257.1)<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-319-18681-8">https://doi.org/10.1007/978-3-319-18681-8</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Human Aspects of Information Security, Privacy, and Trust Third International Conference, HAS 2015, Held as Part of HCI International 2015, Los Angeles, CA, USA, August 2-7, 2015. Proceedingsent://SD_ILS/0/SD_ILS:5192872024-12-28T12:52:03Z2024-12-28T12:52:03ZYazar Tryfonas, Theo. editor. Askoxylakis, Ioannis. editor. SpringerLink (Online service)<br/>Yer Numarası XX(519287.1)<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-319-20376-8">https://doi.org/10.1007/978-3-319-20376-8</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Information Security Theory and Practice 9th IFIP WG 11.2 International Conference, WISTP 2015, Heraklion, Crete, Greece, August 24-25, 2015. Proceedingsent://SD_ILS/0/SD_ILS:5193252024-12-28T12:52:03Z2024-12-28T12:52:03ZYazar Akram, Raja Naeem. editor. Jajodia, Sushil. editor. SpringerLink (Online service)<br/>Yer Numarası XX(519325.1)<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-319-24018-3">https://doi.org/10.1007/978-3-319-24018-3</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>The basics of information security : understanding the fundamentals of InfoSec in theory and practiceent://SD_ILS/0/SD_ILS:3557702024-12-28T12:52:03Z2024-12-28T12:52:03ZYazar Andress, Jason, author.<br/>Yer Numarası ONLINE(355770.1)<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128007440">http://www.sciencedirect.com/science/book/9780128007440</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Information Security Practice and Experience 10th International Conference, ISPEC 2014, Fuzhou, China, May 5-8, 2014, Proceedingsent://SD_ILS/0/SD_ILS:4855132024-12-28T12:52:03Z2024-12-28T12:52:03ZYazar Huang, Xinyi. editor. Zhou, Jianying. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-319-06320-1">https://doi.org/10.1007/978-3-319-06320-1</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Human Aspects of Information Security, Privacy, and Trust Second International Conference, HAS 2014, Held as Part of HCI International 2014, Heraklion, Crete, Greece, June 22-27, 2014, Proceedingsent://SD_ILS/0/SD_ILS:4889302024-12-28T12:52:03Z2024-12-28T12:52:03ZYazar Tryfonas, Theo. editor. Askoxylakis, Ioannis. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-319-07620-1">https://doi.org/10.1007/978-3-319-07620-1</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Advances in Cryptology -- ASIACRYPT 2014 20th International Conference on the Theory and Application of Cryptology and Information Security, Kaoshiung, Taiwan, China, December 7-11, 2014, Part IIent://SD_ILS/0/SD_ILS:4889562024-12-28T12:52:03Z2024-12-28T12:52:03ZYazar Sarkar, Palash. editor. Iwata, Tetsu. editor. (orcid)0000-0002-4729-0979 SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-662-45608-8">https://doi.org/10.1007/978-3-662-45608-8</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Advances in Cryptology -- ASIACRYPT 2014 20th International Conference on the Theory and Application of Cryptology and Information Security, Kaoshiung, Taiwan, China, December 7-11, 2014, Proceedings, Part Ient://SD_ILS/0/SD_ILS:4890162024-12-28T12:52:03Z2024-12-28T12:52:03ZYazar Sarkar, Palash. editor. Iwata, Tetsu. editor. (orcid)0000-0002-4729-0979 SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-662-45611-8">https://doi.org/10.1007/978-3-662-45611-8</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Availability, Reliability, and Security in Information Systems IFIP WG 8.4, 8.9, TC 5 International Cross-Domain Conference, CD-ARES 2014 and 4th InternationalWorkshop on Security and Cognitive Informatics for Homeland Defense, SeCIHD 2014, Fribourg, Switzerland, September 8-12, 2014. Proceedingsent://SD_ILS/0/SD_ILS:4890552024-12-28T12:52:03Z2024-12-28T12:52:03ZYazar Teufel, Stephanie. editor. A Min, Tjoa. editor. You, Illsun. editor. Weippl, Edgar. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-319-10975-6">https://doi.org/10.1007/978-3-319-10975-6</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Information Security and Cryptology 9th International Conference, Inscrypt 2013, Guangzhou, China, November 27-30, 2013, Revised Selected Papersent://SD_ILS/0/SD_ILS:4891082024-12-28T12:52:03Z2024-12-28T12:52:03ZYazar Lin, Dongdai. editor. Xu, Shouhuai. editor. (orcid)0000-0001-8034-0942 Yung, Moti. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-319-12087-4">https://doi.org/10.1007/978-3-319-12087-4</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Information Security 17th International Conference, ISC 2014, Hong Kong, China, October 12-14, 2014, Proceedingsent://SD_ILS/0/SD_ILS:4857932024-12-28T12:52:03Z2024-12-28T12:52:03ZYazar Chow, Sherman S.M. editor. Camenisch, Jan. editor. Hui, Lucas C.K. editor. Yiu, Siu Ming. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-319-13257-0">https://doi.org/10.1007/978-3-319-13257-0</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Information Security Applications 14th International Workshop, WISA 2013, Jeju Island, Korea, August 19-21, 2013, Revised Selected Papersent://SD_ILS/0/SD_ILS:4868872024-12-28T12:52:03Z2024-12-28T12:52:03ZYazar Kim, Yongdae. editor. Lee, Heejo. editor. Perrig, Adrian. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-319-05149-9">https://doi.org/10.1007/978-3-319-05149-9</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Information Security and Privacy 19th Australasian Conference, ACISP 2014, Wollongong, NSW, Australia, July 7-9, 2014. Proceedingsent://SD_ILS/0/SD_ILS:4872782024-12-28T12:52:03Z2024-12-28T12:52:03ZYazar Susilo, Willy. editor. (orcid)0000-0002-1562-5105 Mu, Yi. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-319-08344-5">https://doi.org/10.1007/978-3-319-08344-5</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Security leader insights for information protection : lessons and strategies from leading security professionalsent://SD_ILS/0/SD_ILS:3557602024-12-28T12:52:03Z2024-12-28T12:52:03ZYazar Fahy, Bob, editor.<br/>Yer Numarası ONLINE(355760.1)<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128008430">http://www.sciencedirect.com/science/book/9780128008430</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Communication Technologies, Information Security and Sustainable Development Third International Multi-topic Conference, IMTIC 2013, Jamshoro, Pakistan, December 18--20, 2013, Revised Selected Papersent://SD_ILS/0/SD_ILS:4869612024-12-28T12:52:03Z2024-12-28T12:52:03ZYazar Shaikh, Faisal Karim. editor. Chowdhry, Bhawani Shankar. editor. Zeadally, Sherali. editor. Hussain, Dil Muhammad Akbar. editor. Memon, Aftab Ahmed. editor.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-319-10987-9">https://doi.org/10.1007/978-3-319-10987-9</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>What Is Computer Science? An Information Security Perspectiveent://SD_ILS/0/SD_ILS:4885362024-12-28T12:52:03Z2024-12-28T12:52:03ZYazar Page, Daniel. author. Smart, Nigel. author. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-319-04042-4">https://doi.org/10.1007/978-3-319-04042-4</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Information Security and Cryptology -- ICISC 2013 16th International Conference, Seoul, Korea, November 27-29, 2013, Revised Selected Papersent://SD_ILS/0/SD_ILS:4889862024-12-28T12:52:03Z2024-12-28T12:52:03ZYazar Lee, Hyang-Sook. editor. Han, Dong-Guk. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-319-12160-4">https://doi.org/10.1007/978-3-319-12160-4</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Information Theoretic Security 7th International Conference, ICITS 2013, Singapore, November 28-30, 2013, Proceedingsent://SD_ILS/0/SD_ILS:4894202024-12-28T12:52:03Z2024-12-28T12:52:03ZYazar Padró, Carles. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-319-04268-8">https://doi.org/10.1007/978-3-319-04268-8</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Information Security Theory and Practice. Securing the Internet of Things 8th IFIP WG 11.2 International Workshop, WISTP 2014, Heraklion, Crete, Greece, June 30 - July 2, 2014, Proceedingsent://SD_ILS/0/SD_ILS:4895412024-12-28T12:52:03Z2024-12-28T12:52:03ZYazar Naccache, David. editor. Sauveron, Damien. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-662-43826-8">https://doi.org/10.1007/978-3-662-43826-8</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Information Systems Security 10th International Conference, ICISS 2014, Hyderabad, India, December 16-20, 2014. Proceedingsent://SD_ILS/0/SD_ILS:4895452024-12-28T12:52:03Z2024-12-28T12:52:03ZYazar Prakash, Atul. editor. Shyamasundar, Rudrapatna. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-319-13841-1">https://doi.org/10.1007/978-3-319-13841-1</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Advances in Information and Computer Security 9th International Workshop on Security, IWSEC 2014, Hirosaki, Japan, August 27-29, 2014. Proceedingsent://SD_ILS/0/SD_ILS:4873722024-12-28T12:52:03Z2024-12-28T12:52:03ZYazar Yoshida, Maki. editor. Mouri, Koichi. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-319-09843-2">https://doi.org/10.1007/978-3-319-09843-2</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Applications and Techniques in Information Security International Conference, ATIS 2014, Melbourne, Australia, November 26-28, 2014. Proceedingsent://SD_ILS/0/SD_ILS:4880112024-12-28T12:52:03Z2024-12-28T12:52:03ZYazar Batten, Lynn. editor. Li, Gang. editor. (orcid)0000-0003-1583-641X Niu, Wenjia. editor. Warren, Matthew. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-662-45670-5">https://doi.org/10.1007/978-3-662-45670-5</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>ISSE 2014 Securing Electronic Business Processes Highlights of the Information Security Solutions Europe 2014 Conferenceent://SD_ILS/0/SD_ILS:4872162024-12-28T12:52:03Z2024-12-28T12:52:03ZYazar Reimer, Helmut. editor. Pohlmann, Norbert. editor. Schneider, Wolfgang. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-658-06708-3">https://doi.org/10.1007/978-3-658-06708-3</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Information Security and Cryptology – ICISC 2012 15th International Conference, Seoul, Korea, November 28-30, 2012, Revised Selected Papersent://SD_ILS/0/SD_ILS:3344702024-12-28T12:52:03Z2024-12-28T12:52:03ZYazar Kwon, Taekyoung. editor. Lee, Mun-Kyu. editor. Kwon, Daesung. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE(334470.1)<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-37682-5">http://dx.doi.org/10.1007/978-3-642-37682-5</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Information Security Practice and Experience 9th International Conference, ISPEC 2013, Lanzhou, China, May 12-14, 2013. Proceedingsent://SD_ILS/0/SD_ILS:3345192024-12-28T12:52:03Z2024-12-28T12:52:03ZYazar Deng, Robert H. editor. Feng, Tao. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE(334519.1)<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-38033-4">http://dx.doi.org/10.1007/978-3-642-38033-4</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Information security policy development for compliance ISO/IEC 27001, NIST SP 800-53, HIPAA standard, PCI DSS V2.0, and AUP V5.0ent://SD_ILS/0/SD_ILS:2881732024-12-28T12:52:03Z2024-12-28T12:52:03ZYazar Williams, Barry L.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://marc.crcnetbase.com/isbn/9781466580596">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Managing Risk and Information Security Protect to Enableent://SD_ILS/0/SD_ILS:3306942024-12-28T12:52:03Z2024-12-28T12:52:03ZYazar Harkins, Malcolm. author. SpringerLink (Online service)<br/>Yer Numarası ONLINE(330694.1)<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-1-4302-5114-9">http://dx.doi.org/10.1007/978-1-4302-5114-9</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Information Security Theory and Practice. Security of Mobile and Cyber-Physical Systems 7th IFIP WG 11.2 International Workshop, WISTP 2013, Heraklion, Greece, May 28-30, 2013. Proceedingsent://SD_ILS/0/SD_ILS:3346162024-12-28T12:52:03Z2024-12-28T12:52:03ZYazar Cavallaro, Lorenzo. editor. Gollmann, Dieter. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE(334616.1)<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-38530-8">http://dx.doi.org/10.1007/978-3-642-38530-8</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Information Assurance and Security Education and Training 8th IFIP WG 11.8 World Conference on Information Security Education, WISE 8, Auckland, New Zealand, July 8-10, 2013, Proceedings, WISE 7, Lucerne Switzerland, June 9-10, 2011, and WISE 6, Bento Gonçalves, RS, Brazil, July 27-31, 2009, Revised Selected Papersent://SD_ILS/0/SD_ILS:3347942024-12-28T12:52:03Z2024-12-28T12:52:03ZYazar Dodge, Ronald C. editor. Futcher, Lynn. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE(334794.1)<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-39377-8">http://dx.doi.org/10.1007/978-3-642-39377-8</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Information Systems: Development, Learning, Security 6th SIGSAND/PLAIS EuroSymposium 2013, Gdańsk, Poland, September 26, 2013. Proceedingsent://SD_ILS/0/SD_ILS:3350202024-12-28T12:52:03Z2024-12-28T12:52:03ZYazar Wrycza, Stanisław. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE(335020.1)<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-40855-7">http://dx.doi.org/10.1007/978-3-642-40855-7</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Information Systems Security 9th International Conference, ICISS 2013, Kolkata, India, December 16-20, 2013. Proceedingsent://SD_ILS/0/SD_ILS:3351942024-12-28T12:52:03Z2024-12-28T12:52:03ZYazar Bagchi, Aditya. editor. Ray, Indrakshi. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE(335194.1)<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-45204-8">http://dx.doi.org/10.1007/978-3-642-45204-8</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Security and Privacy Protection in Information Processing Systems 28th IFIP TC 11 International Conference, SEC 2013, Auckland, New Zealand, July 8-10, 2013. Proceedingsent://SD_ILS/0/SD_ILS:3347552024-12-28T12:52:03Z2024-12-28T12:52:03ZYazar Janczewski, Lech J. editor. Wolfe, Henry B. editor. Shenoi, Sujeet. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE(334755.1)<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-39218-4">http://dx.doi.org/10.1007/978-3-642-39218-4</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Availability, Reliability, and Security in Information Systems and HCI IFIP WG 8.4, 8.9, TC 5 International Cross-Domain Conference, CD-ARES 2013, Regensburg, Germany, September 2-6, 2013. Proceedingsent://SD_ILS/0/SD_ILS:3349582024-12-28T12:52:03Z2024-12-28T12:52:03ZYazar Cuzzocrea, Alfredo. editor. Kittl, Christian. editor. Simos, Dimitris E. editor. Weippl, Edgar. editor. Xu, Lida. editor.<br/>Yer Numarası ONLINE(334958.1)<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-40511-2">http://dx.doi.org/10.1007/978-3-642-40511-2</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Advances in Security of Information and Communication Networks First International Conference, SecNet 2013, Cairo, Egypt, September 3-5, 2013. Proceedingsent://SD_ILS/0/SD_ILS:3349762024-12-28T12:52:03Z2024-12-28T12:52:03ZYazar Awad, Ali Ismail. editor. Hassanien, Aboul Ella. editor. Baba, Kensuke. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE(334976.1)<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-40597-6">http://dx.doi.org/10.1007/978-3-642-40597-6</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Advances in Cryptology - ASIACRYPT 2013 19th International Conference on the Theory and Application of Cryptology and Information Security, Bengaluru, India, December 1-5, 2013, Proceedings, Part Ient://SD_ILS/0/SD_ILS:3351572024-12-28T12:52:03Z2024-12-28T12:52:03ZYazar Sako, Kazue. editor. Sarkar, Palash. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE(335157.1)<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-42033-7">http://dx.doi.org/10.1007/978-3-642-42033-7</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Advances in Cryptology - ASIACRYPT 2013 19th International Conference on the Theory and Application of Cryptology and Information Security, Bengaluru, India, December 1-5, 2013, Proceedings, Part IIent://SD_ILS/0/SD_ILS:3351602024-12-28T12:52:03Z2024-12-28T12:52:03ZYazar Sako, Kazue. editor. Sarkar, Palash. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE(335160.1)<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-42045-0">http://dx.doi.org/10.1007/978-3-642-42045-0</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Advances in Information and Computer Security 8th International Workshop on Security, IWSEC 2013, Okinawa, Japan, November 18-20, 2013, Proceedingsent://SD_ILS/0/SD_ILS:3350982024-12-28T12:52:03Z2024-12-28T12:52:03ZYazar Sakiyama, Kazuo. editor. Terada, Masayuki. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE(335098.1)<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-41383-4">http://dx.doi.org/10.1007/978-3-642-41383-4</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Critical Information Infrastructure Security 6th International Workshop, CRITIS 2011, Lucerne, Switzerland, September 8-9, 2011, Revised Selected Papersent://SD_ILS/0/SD_ILS:3351072024-12-28T12:52:03Z2024-12-28T12:52:03ZYazar Bologna, Sandro. editor. Hämmerli, Bernhard. editor. Gritzalis, Dimitris. editor. Wolthusen, Stephen. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE(335107.1)<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-41476-3">http://dx.doi.org/10.1007/978-3-642-41476-3</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Critical Information Infrastructures Security 7th International Workshop, CRITIS 2012, Lillehammer, Norway, September 17-18, 2012, Revised Selected Papersent://SD_ILS/0/SD_ILS:3351102024-12-28T12:52:03Z2024-12-28T12:52:03ZYazar Hämmerli, Bernhard M. editor. Kalstad Svendsen, Nils. editor. Lopez, Javier. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE(335110.1)<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-41485-5">http://dx.doi.org/10.1007/978-3-642-41485-5</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>ISSE 2013 Securing Electronic Business Processes Highlights of the Information Security Solutions Europe 2013 Conferenceent://SD_ILS/0/SD_ILS:3352922024-12-28T12:52:03Z2024-12-28T12:52:03ZYazar Reimer, Helmut. editor. Pohlmann, Norbert. editor. Schneider, Wolfgang. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE(335292.1)<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-658-03371-2">http://dx.doi.org/10.1007/978-3-658-03371-2</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Strategic intelligence management : national security imperatives and information and communications technologiesent://SD_ILS/0/SD_ILS:2703632024-12-28T12:52:03Z2024-12-28T12:52:03ZYazar Akhgar, Babak. Yates, Simeon.<br/>Yer Numarası TK5102.85 A44 2013<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>PRAGMATIC security metrics applying metametrics to information securityent://SD_ILS/0/SD_ILS:2899742024-12-28T12:52:03Z2024-12-28T12:52:03ZYazar Brotby, W. Krag. Hinson, Gary. Kabay, Michel E.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://marc.crcnetbase.com/isbn/9781439881538">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Human Aspects of Information Security, Privacy, and Trust First International Conference, HAS 2013, Held as Part of HCI International 2013, Las Vegas, NV, USA, July 21-26, 2013. Proceedingsent://SD_ILS/0/SD_ILS:3347862024-12-28T12:52:03Z2024-12-28T12:52:03ZYazar Marinos, Louis. editor. Askoxylakis, Ioannis. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE(334786.1)<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-39345-7">http://dx.doi.org/10.1007/978-3-642-39345-7</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Information Security and Cryptology 8th International Conference, Inscrypt 2012, Beijing, China, November 28-30, 2012, Revised Selected Papersent://SD_ILS/0/SD_ILS:3346132024-12-28T12:52:03Z2024-12-28T12:52:03ZYazar Kutyłowski, Mirosław. editor. Yung, Moti. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE(334613.1)<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-38519-3">http://dx.doi.org/10.1007/978-3-642-38519-3</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Information Technology Convergence Security, Robotics, Automations and Communicationent://SD_ILS/0/SD_ILS:3363452024-12-28T12:52:03Z2024-12-28T12:52:03ZYazar Park, James J. (Jong Hyuk). editor. Barolli, Leonard. editor. Xhafa, Fatos. editor. Jeong, Hwa-Young. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE(336345.1)<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-94-007-6996-0">http://dx.doi.org/10.1007/978-94-007-6996-0</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Information and Communications Security 15th International Conference, ICICS 2013, Beijing, China, November 20-22, 2013. Proceedingsent://SD_ILS/0/SD_ILS:3329412024-12-28T12:52:03Z2024-12-28T12:52:03ZYazar Qing, Sihan. editor. Zhou, Jianying. editor. Liu, Dongmei. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE(332941.1)<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-319-02726-5">http://dx.doi.org/10.1007/978-3-319-02726-5</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Critical Information Infrastructures Security 8th International Workshop, CRITIS 2013, Amsterdam, The Netherlands, September 16-18, 2013, Revised Selected Papersent://SD_ILS/0/SD_ILS:3330082024-12-28T12:52:03Z2024-12-28T12:52:03ZYazar Luiijf, Eric. editor. Hartel, Pieter. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE(333008.1)<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-319-03964-0">http://dx.doi.org/10.1007/978-3-319-03964-0</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Information Security and Privacy 18th Australasian Conference, ACISP 2013, Brisbane, Australia, July 1-3, 2013. Proceedingsent://SD_ILS/0/SD_ILS:3347202024-12-28T12:52:03Z2024-12-28T12:52:03ZYazar Boyd, Colin. editor. Simpson, Leonie. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE(334720.1)<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-39059-3">http://dx.doi.org/10.1007/978-3-642-39059-3</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Information Sharing and Data Protection in the Area of Freedom, Security and Justice Towards Harmonised Data Protection Principles for Information Exchange at EU-levelent://SD_ILS/0/SD_ILS:1950112024-12-28T12:52:03Z2024-12-28T12:52:03ZYazar Boehm, Franziska. author. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-22392-1">http://dx.doi.org/10.1007/978-3-642-22392-1</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Information Security Applications 12th International Workshop, WISA 2011, Jeju Island, Korea, August 22-24, 2011. Revised Selected Papersent://SD_ILS/0/SD_ILS:1962912024-12-28T12:52:03Z2024-12-28T12:52:03ZYazar Jung, Souhwan. editor. Yung, Moti. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-27890-7">http://dx.doi.org/10.1007/978-3-642-27890-7</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Information Security Technology for Applications 15th Nordic Conference on Secure IT Systems, NordSec 2010, Espoo, Finland, October 27-29, 2010, Revised Selected Papersent://SD_ILS/0/SD_ILS:1963032024-12-28T12:52:03Z2024-12-28T12:52:03ZYazar Aura, Tuomas. editor. Järvinen, Kimmo. editor. Nyberg, Kaisa. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-27937-9">http://dx.doi.org/10.1007/978-3-642-27937-9</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Information Security Technology for Applications 16th Nordic Conference on Secure IT Systems, NordSec 2011, Tallinn, Estonia, October 26-28, 2011, Revised Selected Papersent://SD_ILS/0/SD_ILS:1967382024-12-28T12:52:03Z2024-12-28T12:52:03ZYazar Laud, Peeter. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-29615-4">http://dx.doi.org/10.1007/978-3-642-29615-4</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Security and Privacy in Mobile Information and Communication Systems Third International ICST Conference, MobiSec 2011, Aalborg, Denmark, May 17-19, 2011, Revised Selected Papersent://SD_ILS/0/SD_ILS:1968502024-12-28T12:52:03Z2024-12-28T12:52:03ZYazar Prasad, Ramjee. editor. Farkas, Károly. editor. Schmidt, Andreas U. editor. Lioy, Antonio. editor. Russello, Giovanni. editor.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-30244-2">http://dx.doi.org/10.1007/978-3-642-30244-2</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Information Security and Privacy Research 27th IFIP TC 11 Information Security and Privacy Conference, SEC 2012, Heraklion, Crete, Greece, June 4-6, 2012. Proceedingsent://SD_ILS/0/SD_ILS:1968862024-12-28T12:52:03Z2024-12-28T12:52:03ZYazar Gritzalis, Dimitris. editor. Furnell, Steven. editor. Theoharidou, Marianthi. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-30436-1">http://dx.doi.org/10.1007/978-3-642-30436-1</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Information Security Theory and Practice. Security, Privacy and Trust in Computing Systems and Ambient Intelligent Ecosystems 6th IFIP WG 11.2 International Workshop, WISTP 2012, Egham, UK, June 20-22, 2012. Proceedingsent://SD_ILS/0/SD_ILS:1969952024-12-28T12:52:03Z2024-12-28T12:52:03ZYazar Askoxylakis, Ioannis. editor. Pöhls, Henrich C. editor. Posegga, Joachim. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-30955-7">http://dx.doi.org/10.1007/978-3-642-30955-7</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Information Security and Cryptology - ICISC 2011 14th International Conference, Seoul, Korea, November 30 - December 2, 2011. Revised Selected Papersent://SD_ILS/0/SD_ILS:1971532024-12-28T12:52:03Z2024-12-28T12:52:03ZYazar Kim, Howon. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-31912-9">http://dx.doi.org/10.1007/978-3-642-31912-9</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Information Security Applications 13th International Workshop, WISA 2012, Jeju Island, Korea, August 16-18, 2012, Revised Selected Papersent://SD_ILS/0/SD_ILS:1976042024-12-28T12:52:03Z2024-12-28T12:52:03ZYazar Lee, Dong Hoon. editor. Yung, Moti. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-35416-8">http://dx.doi.org/10.1007/978-3-642-35416-8</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>ISSE 2012 Securing Electronic Business Processes Highlights of the Information Security Solutions Europe 2012 Conferenceent://SD_ILS/0/SD_ILS:1976622024-12-28T12:52:03Z2024-12-28T12:52:03ZYazar Reimer, Helmut. editor. Pohlmann, Norbert. editor. Schneider, Wolfgang. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-658-00333-3">http://dx.doi.org/10.1007/978-3-658-00333-3</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Information security governance simplified from the boardroom to the keyboardent://SD_ILS/0/SD_ILS:2906622024-12-28T12:52:03Z2024-12-28T12:52:03ZYazar Fitzgerald, Todd.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://marc.crcnetbase.com/isbn/9781439811658">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Security and Intelligent Information Systems International Joint Conferences, SIIS 2011, Warsaw, Poland, June 13-14, 2011, Revised Selected Papersent://SD_ILS/0/SD_ILS:1958942024-12-28T12:52:03Z2024-12-28T12:52:03ZYazar Bouvry, Pascal. editor. Kłopotek, Mieczysław A. editor. Leprévost, Franck. editor. Marciniak, Małgorzata. editor. Mykowiecka, Agnieszka. editor.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-25261-7">http://dx.doi.org/10.1007/978-3-642-25261-7</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Information Security Practice and Experience 8th International Conference, ISPEC 2012, Hangzhou, China, April 9-12, 2012. Proceedingsent://SD_ILS/0/SD_ILS:1966132024-12-28T12:52:03Z2024-12-28T12:52:03ZYazar Ryan, Mark D. editor. Smyth, Ben. editor. Wang, Guilin. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-29101-2">http://dx.doi.org/10.1007/978-3-642-29101-2</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Information Theoretic Security 6th International Conference, ICITS 2012, Montreal, QC, Canada, August 15-17, 2012. Proceedingsent://SD_ILS/0/SD_ILS:1972012024-12-28T12:52:03Z2024-12-28T12:52:03ZYazar Smith, Adam. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-32284-6">http://dx.doi.org/10.1007/978-3-642-32284-6</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Information Security 15th International Conference, ISC 2012, Passau, Germany, September 19-21, 2012. Proceedingsent://SD_ILS/0/SD_ILS:1973652024-12-28T12:52:03Z2024-12-28T12:52:03ZYazar Gollmann, Dieter. editor. Freiling, Felix C. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-33383-5">http://dx.doi.org/10.1007/978-3-642-33383-5</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Security and Privacy in Mobile Information and Communication Systems 4th International Conference, MobiSec 2012, Frankfurt am Main, Germany, June 25-26, 2012, Revised Selected Papersent://SD_ILS/0/SD_ILS:1973672024-12-28T12:52:03Z2024-12-28T12:52:03ZYazar Schmidt, Andreas U. editor. Russello, Giovanni. editor. Krontiris, Ioannis. editor. Lian, Shiguo. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-33392-7">http://dx.doi.org/10.1007/978-3-642-33392-7</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Progress in Cryptology – LATINCRYPT 2012 2nd International Conference on Cryptology and Information Security in Latin America, Santiago, Chile, October 7-10, 2012. Proceedingsent://SD_ILS/0/SD_ILS:1973842024-12-28T12:52:03Z2024-12-28T12:52:03ZYazar Hevia, Alejandro. editor. Neven, Gregory. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-33481-8">http://dx.doi.org/10.1007/978-3-642-33481-8</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Network Computing and Information Security Second International Conference, NCIS 2012, Shanghai, China, December 7-9, 2012. Proceedingsent://SD_ILS/0/SD_ILS:1975802024-12-28T12:52:03Z2024-12-28T12:52:03ZYazar Lei, Jingsheng. editor. Wang, Fu Lee. editor. Li, Mo. editor. Luo, Yuan. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-35211-9">http://dx.doi.org/10.1007/978-3-642-35211-9</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Information Security and Cryptology 7th International Conference, Inscrypt 2011, Beijing, China, November 30 – December 3, 2011. Revised Selected Papersent://SD_ILS/0/SD_ILS:1975412024-12-28T12:52:03Z2024-12-28T12:52:03ZYazar Wu, Chuan-Kun. editor. Yung, Moti. editor. Lin, Dongdai. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-34704-7">http://dx.doi.org/10.1007/978-3-642-34704-7</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Advances in Cryptology – ASIACRYPT 2012 18th International Conference on the Theory and Application of Cryptology and Information Security, Beijing, China, December 2-6, 2012. Proceedingsent://SD_ILS/0/SD_ILS:1975592024-12-28T12:52:03Z2024-12-28T12:52:03ZYazar Wang, Xiaoyun. editor. Sako, Kazue. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-34961-4">http://dx.doi.org/10.1007/978-3-642-34961-4</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Information Systems Security 8th International Conference, ICISS 2012, Guwahati, India, December 15-19, 2012. Proceedingsent://SD_ILS/0/SD_ILS:1975662024-12-28T12:52:03Z2024-12-28T12:52:03ZYazar Venkatakrishnan, Venkat. editor. Goswami, Diganta. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-35130-3">http://dx.doi.org/10.1007/978-3-642-35130-3</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Information Security and Privacy 17th Australasian Conference, ACISP 2012, Wollongong, NSW, Australia, July 9-11, 2012. Proceedingsent://SD_ILS/0/SD_ILS:1970802024-12-28T12:52:03Z2024-12-28T12:52:03ZYazar Susilo, Willy. editor. Mu, Yi. editor. Seberry, Jennifer. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-31448-3">http://dx.doi.org/10.1007/978-3-642-31448-3</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Multidisciplinary Research and Practice for Information Systems IFIP WG 8.4, 8.9/TC 5 International Cross-Domain Conference and Workshop on Availability, Reliability, and Security, CD-ARES 2012, Prague, Czech Republic, August 20-24, 2012. Proceedingsent://SD_ILS/0/SD_ILS:1972272024-12-28T12:52:03Z2024-12-28T12:52:03ZYazar Quirchmayr, Gerald. editor. Basl, Josef. editor. You, Ilsun. editor. Xu, Lida. editor. Weippl, Edgar. editor.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-32498-7">http://dx.doi.org/10.1007/978-3-642-32498-7</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Advances in Information and Computer Security 7th International Workshop on Security, IWSEC 2012, Fukuoka, Japan, November 7-9, 2012. Proceedingsent://SD_ILS/0/SD_ILS:1974752024-12-28T12:52:03Z2024-12-28T12:52:03ZYazar Hanaoka, Goichiro. editor. Yamauchi, Toshihiro. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-34117-5">http://dx.doi.org/10.1007/978-3-642-34117-5</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Information and Communications Security 14th International Conference, ICICS 2012, Hong Kong, China, October 29-31, 2012. Proceedingsent://SD_ILS/0/SD_ILS:1974782024-12-28T12:52:03Z2024-12-28T12:52:03ZYazar Chim, Tat Wing. editor. Yuen, Tsz Hon. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-34129-8">http://dx.doi.org/10.1007/978-3-642-34129-8</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Information Flow Based Security Control Beyond RBAC How to enable fine-grained security policy enforcement in business processes beyond limitations of role-based access control (RBAC)ent://SD_ILS/0/SD_ILS:1989532024-12-28T12:52:03Z2024-12-28T12:52:03ZYazar Fischer-Hellmann, Klaus-Peter. author. Bischoff, Rainer. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-8348-2618-3">http://dx.doi.org/10.1007/978-3-8348-2618-3</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Access contested security, identity, and resistance in Asian cyberspace information revolution and global politicsent://SD_ILS/0/SD_ILS:2475422024-12-28T12:52:03Z2024-12-28T12:52:03ZYazar Deibert, Ronald. Project Muse.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://muse.jhu.edu/books/9780262298919/">Full text available: </a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Information security risk assessment toolkit practical assessments through data collection and data analysisent://SD_ILS/0/SD_ILS:1454702024-12-28T12:52:03Z2024-12-28T12:52:03ZYazar Talabis, Mark. Martin, Jason.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597497350">http://www.sciencedirect.com/science/book/9781597497350</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Information Security and Cryptology 5th International Conference, Inscrypt 2009, Beijing, China, December 12-15, 2009. Revised Selected Papersent://SD_ILS/0/SD_ILS:1932652024-12-28T12:52:03Z2024-12-28T12:52:03ZYazar Bao, Feng. editor. Yung, Moti. editor. Lin, Dongdai. editor. Jing, Jiwu. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-16342-5">http://dx.doi.org/10.1007/978-3-642-16342-5</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Information Security Practice and Experience 7th International Conference, ISPEC 2011, Guangzhou, China, May 30 – June 1, 2011. Proceedingsent://SD_ILS/0/SD_ILS:1945682024-12-28T12:52:03Z2024-12-28T12:52:03ZYazar Bao, Feng. editor. Weng, Jian. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-21031-0">http://dx.doi.org/10.1007/978-3-642-21031-0</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Information Security Theory and Practice. Security and Privacy of Mobile Devices in Wireless Communication 5th IFIP WG 11.2 International Workshop, WISTP 2011, Heraklion, Crete, Greece, June 1-3, 2011. Proceedingsent://SD_ILS/0/SD_ILS:1945712024-12-28T12:52:03Z2024-12-28T12:52:03ZYazar Ardagna, Claudio A. editor. Zhou, Jianying. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-21040-2">http://dx.doi.org/10.1007/978-3-642-21040-2</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Information Theoretic Security 5th International Conference, ICITS 2011, Amsterdam, The Netherlands, May 21-24, 2011. Proceedingsent://SD_ILS/0/SD_ILS:1944662024-12-28T12:52:03Z2024-12-28T12:52:03ZYazar Fehr, Serge. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-20728-0">http://dx.doi.org/10.1007/978-3-642-20728-0</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Computational Intelligence in Security for Information Systems 4th International Conference, CISIS 2011, Held at IWANN 2011, Torremolinos-Málaga, Spain, June 8-10, 2011. Proceedingsent://SD_ILS/0/SD_ILS:1946632024-12-28T12:52:03Z2024-12-28T12:52:03ZYazar Herrero, Álvaro. editor. Corchado, Emilio. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-21323-6">http://dx.doi.org/10.1007/978-3-642-21323-6</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Future Challenges in Security and Privacy for Academia and Industry 26th IFIP TC 11 International Information Security Conference, SEC 2011, Lucerne, Switzerland, June 7-9, 2011. Proceedingsent://SD_ILS/0/SD_ILS:1946962024-12-28T12:52:03Z2024-12-28T12:52:03ZYazar Camenisch, Jan. editor. Fischer-Hübner, Simone. editor. Murayama, Yuko. editor. Portmann, Armand. editor. Rieder, Carlos. editor.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-21424-0">http://dx.doi.org/10.1007/978-3-642-21424-0</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Information Security and Cryptology 6th International Conference, Inscrypt 2010, Shanghai, China, October 20-24, 2010, Revised Selected Papersent://SD_ILS/0/SD_ILS:1947262024-12-28T12:52:03Z2024-12-28T12:52:03ZYazar Lai, Xuejia. editor. Yung, Moti. editor. Lin, Dongdai. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-21518-6">http://dx.doi.org/10.1007/978-3-642-21518-6</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Critical Information Infrastructures Security 5th International Workshop, CRITIS 2010, Athens, Greece, September 23-24, 2010. Revised Papersent://SD_ILS/0/SD_ILS:1947862024-12-28T12:52:03Z2024-12-28T12:52:03ZYazar Xenakis, Christos. editor. Wolthusen, Stephen. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-21694-7">http://dx.doi.org/10.1007/978-3-642-21694-7</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Information Security and Privacy 16th Australasian Conference, ACISP 2011, Melbourne, Australia, July 11-13, 2011. Proceedingsent://SD_ILS/0/SD_ILS:1950472024-12-28T12:52:03Z2024-12-28T12:52:03ZYazar Parampalli, Udaya. editor. Hawkes, Philip. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-22497-3">http://dx.doi.org/10.1007/978-3-642-22497-3</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Information Security and Assurance International Conference, ISA 2011, Brno, Czech Republic, August 15-17, 2011. Proceedingsent://SD_ILS/0/SD_ILS:1952492024-12-28T12:52:03Z2024-12-28T12:52:03ZYazar Kim, Tai-hoon. editor. Adeli, Hojjat. editor. Robles, Rosslin John. editor. Balitanas, Maricel. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-23141-4">http://dx.doi.org/10.1007/978-3-642-23141-4</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Availability, Reliability and Security for Business, Enterprise and Health Information Systems IFIP WG 8.4/8.9 International Cross Domain Conference and Workshop, ARES 2011, Vienna, Austria, August 22-26, 2011. Proceedingsent://SD_ILS/0/SD_ILS:1953022024-12-28T12:52:03Z2024-12-28T12:52:03ZYazar Tjoa, A Min. editor. Quirchmayr, Gerald. editor. You, Ilsun. editor. Xu, Lida. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-23300-5">http://dx.doi.org/10.1007/978-3-642-23300-5</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Readings and cases in information security : law and ethicsent://SD_ILS/0/SD_ILS:2677432024-12-28T12:52:03Z2024-12-28T12:52:03ZYazar Whitman, Michael E. Mattord, Herbert J.<br/>Yer Numarası TK5105.878 W54 2011<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>Security de-engineering solving the problems in information risk managementent://SD_ILS/0/SD_ILS:2862092024-12-28T12:52:03Z2024-12-28T12:52:03ZYazar Tibble, Ian.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://marc.crcnetbase.com/isbn/9781439868355">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Information Security and Cryptology - ICISC 2010 13th International Conference, Seoul, Korea, December 1-3, 2010, Revised Selected Papersent://SD_ILS/0/SD_ILS:1955782024-12-28T12:52:03Z2024-12-28T12:52:03ZYazar Rhee, Kyung-Hyune. editor. Nyang, DaeHun. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-24209-0">http://dx.doi.org/10.1007/978-3-642-24209-0</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Security Aspects in Information Technology First International Conference, InfoSecHiComNet 2011, Haldia, India, October 19-22, 2011. Proceedingsent://SD_ILS/0/SD_ILS:1956832024-12-28T12:52:03Z2024-12-28T12:52:03ZYazar Joye, Marc. editor. Mukhopadhyay, Debdeep. editor. Tunstall, Michael. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-24586-2">http://dx.doi.org/10.1007/978-3-642-24586-2</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Information Security 14th International Conference, ISC 2011, Xi’an, China, October 26-29, 2011. Proceedingsent://SD_ILS/0/SD_ILS:1957712024-12-28T12:52:03Z2024-12-28T12:52:03ZYazar Lai, Xuejia. editor. Zhou, Jianying. editor. Li, Hui. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-24861-0">http://dx.doi.org/10.1007/978-3-642-24861-0</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Advances in Information and Computer Security 6th International Workshop, IWSEC 2011, Tokyo, Japan, November 8-10, 2011. Proceedingsent://SD_ILS/0/SD_ILS:1958562024-12-28T12:52:03Z2024-12-28T12:52:03ZYazar Iwata, Tetsu. editor. Nishigaki, Masakatsu. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-25141-2">http://dx.doi.org/10.1007/978-3-642-25141-2</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Information and Communications Security 13th International Conference, ICICS 2011, Beijing, China, November 23-26, 2011. Proceedingsent://SD_ILS/0/SD_ILS:1958882024-12-28T12:52:03Z2024-12-28T12:52:03ZYazar Qing, Sihan. editor. Susilo, Willy. editor. Wang, Guilin. editor. Liu, Dongmei. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-25243-3">http://dx.doi.org/10.1007/978-3-642-25243-3</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Advances in Cryptology – ASIACRYPT 2011 17th International Conference on the Theory and Application of Cryptology and Information Security, Seoul, South Korea, December 4-8, 2011. Proceedingsent://SD_ILS/0/SD_ILS:1959312024-12-28T12:52:03Z2024-12-28T12:52:03ZYazar Lee, Dong Hoon. editor. Wang, Xiaoyun. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-25385-0">http://dx.doi.org/10.1007/978-3-642-25385-0</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Information Systems Security 7th International Conference, ICISS 2011, Kolkata, India, December 15-19, 2011, Procedingsent://SD_ILS/0/SD_ILS:1959822024-12-28T12:52:03Z2024-12-28T12:52:03ZYazar Jajodia, Sushil. editor. Mazumdar, Chandan. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-25560-1">http://dx.doi.org/10.1007/978-3-642-25560-1</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Security Technology International Conference, SecTech 2011, Held as Part of the Future Generation Information Technology Conference, FGIT 2011, in Conjunction with GDC 2011, Jeju Island, Korea, December 8-10, 2011. Proceedingsent://SD_ILS/0/SD_ILS:1961212024-12-28T12:52:03Z2024-12-28T12:52:03ZYazar Kim, Tai-hoon. editor. Adeli, Hojjat. editor. Fang, Wai-chi. editor. Villalba, Javier García. editor. Arnett, Kirk P. editor.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-27189-2">http://dx.doi.org/10.1007/978-3-642-27189-2</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>ISSE 2010 Securing Electronic Business Processes Highlights of the Information Security Solutions Europe 2010 Conferenceent://SD_ILS/0/SD_ILS:1998912024-12-28T12:52:03Z2024-12-28T12:52:03ZYazar Pohlmann, Norbert. editor. Reimer, Helmut. editor. Schneider, Wolfgang. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-8348-9788-6">http://dx.doi.org/10.1007/978-3-8348-9788-6</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Information Security Risk Management Risikomanagement mit ISO/IEC 27001, 27005 und 31010ent://SD_ILS/0/SD_ILS:1999322024-12-28T12:52:03Z2024-12-28T12:52:03ZYazar Klipper, Sebastian. author. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-8348-9870-8">http://dx.doi.org/10.1007/978-3-8348-9870-8</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Physical-Layer Security From Information Theory to Security Engineeringent://SD_ILS/0/SD_ILS:2384652024-12-28T12:52:03Z2024-12-28T12:52:03ZYazar Bloch, Matthieu. Barros, João.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1017/CBO9780511977985">Access by subscription</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Information Systems Security 6th International Conference, ICISS 2010, Gandhinagar, India, December 17-19, 2010. Proceedingsent://SD_ILS/0/SD_ILS:1936862024-12-28T12:52:03Z2024-12-28T12:52:03ZYazar Jha, Somesh. editor. Mathuria, Anish. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-17714-9">http://dx.doi.org/10.1007/978-3-642-17714-9</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Information Security Applications 11th International Workshop, WISA 2010, Jeju Island, Korea, August 24-26, 2010, Revised Selected Papersent://SD_ILS/0/SD_ILS:1937612024-12-28T12:52:03Z2024-12-28T12:52:03ZYazar Chung, Yongwha. editor. Yung, Moti. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-17955-6">http://dx.doi.org/10.1007/978-3-642-17955-6</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Information Security 13th International Conference, ISC 2010, Boca Raton, FL, USA, October 25-28, 2010, Revised Selected Papersent://SD_ILS/0/SD_ILS:1938232024-12-28T12:52:03Z2024-12-28T12:52:03ZYazar Burmester, Mike. editor. Tsudik, Gene. editor. Magliveras, Spyros. editor. Ilić, Ivana. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-18178-8">http://dx.doi.org/10.1007/978-3-642-18178-8</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>The basics of information security understanding the fundamentals of InfoSec in theory and practiceent://SD_ILS/0/SD_ILS:1453712024-12-28T12:52:03Z2024-12-28T12:52:03ZYazar Andress, Jason.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597496537">http://www.sciencedirect.com/science/book/9781597496537</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Security risk management building an information security risk management program from the ground upent://SD_ILS/0/SD_ILS:1491722024-12-28T12:52:03Z2024-12-28T12:52:03ZYazar Wheeler, Evan.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597496155">http://www.sciencedirect.com/science/book/9781597496155</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Information Security, Practice and Experience 6th International Conference, ISPEC 2010, Seoul, Korea, May 12-13, 2010. Proceedingsent://SD_ILS/0/SD_ILS:1921232024-12-28T12:52:03Z2024-12-28T12:52:03ZYazar Kwak, Jin. editor. Deng, Robert H. editor. Won, Yoojae. editor. Wang, Guilin. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-12827-1">http://dx.doi.org/10.1007/978-3-642-12827-1</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Critical Information Infrastructures Security 4th International Workshop, CRITIS 2009, Bonn, Germany, September 30 - October 2, 2009. Revised Papersent://SD_ILS/0/SD_ILS:1926342024-12-28T12:52:03Z2024-12-28T12:52:03ZYazar Rome, Erich. editor. Bloomfield, Robin. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-14379-3">http://dx.doi.org/10.1007/978-3-642-14379-3</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Computational Intelligence in Security for Information Systems 2010 Proceedings of the 3rd International Conference on Computational Intelligence in Security for Information Systems (CISIS’10)ent://SD_ILS/0/SD_ILS:1933592024-12-28T12:52:03Z2024-12-28T12:52:03ZYazar Herrero, Álvaro. editor. Corchado, Emilio. editor. Redondo, Carlos. editor. Alonso, Ángel. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-16626-6">http://dx.doi.org/10.1007/978-3-642-16626-6</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Advances in Cryptology - ASIACRYPT 2010 16th International Conference on the Theory and Application of Cryptology and Information Security, Singapore, December 5-9, 2010. Proceedingsent://SD_ILS/0/SD_ILS:1935822024-12-28T12:52:03Z2024-12-28T12:52:03ZYazar Abe, Masayuki. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-17373-8">http://dx.doi.org/10.1007/978-3-642-17373-8</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Managing an information security and privacy awareness and training programent://SD_ILS/0/SD_ILS:2870182024-12-28T12:52:03Z2024-12-28T12:52:03ZYazar Herold, Rebecca.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://marc.crcnetbase.com/isbn/9781439815465">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Information Security Theory and Practices. Security and Privacy of Pervasive Systems and Smart Devices 4th IFIP WG 11.2 International Workshop, WISTP 2010, Passau, Germany, April 12-14, 2010. Proceedingsent://SD_ILS/0/SD_ILS:1919732024-12-28T12:52:03Z2024-12-28T12:52:03ZYazar Samarati, Pierangela. editor. Tunstall, Michael. editor. Posegga, Joachim. editor. Markantonakis, Konstantinos. editor. Sauveron, Damien. editor.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-12368-9">http://dx.doi.org/10.1007/978-3-642-12368-9</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>ISSE 2009 Securing Electronic Business Processes Highlights of the Information Security Solutions Europe 2009 Conferenceent://SD_ILS/0/SD_ILS:1994832024-12-28T12:52:03Z2024-12-28T12:52:03ZYazar Pohlmann, Norbert. editor. Reimer, Helmut. editor. Schneider, Wolfgang. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-8348-9363-5">http://dx.doi.org/10.1007/978-3-8348-9363-5</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Information Security and Assurance 4th International Conference, ISA 2010, Miyazaki, Japan, June 23-25, 2010. Proceedingsent://SD_ILS/0/SD_ILS:1923122024-12-28T12:52:03Z2024-12-28T12:52:03ZYazar Bandyopadhyay, Samir Kumar. editor. Adi, Wael. editor. Kim, Tai-hoon. editor. Xiao, Yang. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-13365-7">http://dx.doi.org/10.1007/978-3-642-13365-7</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Information, Security and Cryptology – ICISC 2009 12th International Conference, Seoul, Korea, December 2-4, 2009, Revised Selected Papersent://SD_ILS/0/SD_ILS:1926492024-12-28T12:52:03Z2024-12-28T12:52:03ZYazar Lee, Donghoon. editor. Hong, Seokhie. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-14423-3">http://dx.doi.org/10.1007/978-3-642-14423-3</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Information Security and Digital Forensics First International Conference, ISDF 2009, London, United Kingdom, September 7-9, 2009, Revised Selected Papersent://SD_ILS/0/SD_ILS:1917142024-12-28T12:52:03Z2024-12-28T12:52:03ZYazar Weerasinghe, Dasun. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-11530-1">http://dx.doi.org/10.1007/978-3-642-11530-1</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Progress in Cryptology – LATINCRYPT 2010 First International Conference on Cryptology and Information Security in Latin America, Puebla, Mexico, August 8-11, 2010, proceedingsent://SD_ILS/0/SD_ILS:1927452024-12-28T12:52:03Z2024-12-28T12:52:03ZYazar Abdalla, Michel. editor. Barreto, Paulo S. L. M. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-14712-8">http://dx.doi.org/10.1007/978-3-642-14712-8</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Information Security and Privacy 15th Australasian Conference, ACISP 2010, Sydney, Australia, July 5-7, 2010. Proceedingsent://SD_ILS/0/SD_ILS:1925442024-12-28T12:52:03Z2024-12-28T12:52:03ZYazar Steinfeld, Ron. editor. Hawkes, Philip. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-14081-5">http://dx.doi.org/10.1007/978-3-642-14081-5</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Security Technology, Disaster Recovery and Business Continuity International Conferences, SecTech and DRBC 2010, Held as Part of the Future Generation Information Technology Conference, FGIT 2010, Jeju Island, Korea, December 13-15, 2010. Proceedingsent://SD_ILS/0/SD_ILS:1936532024-12-28T12:52:03Z2024-12-28T12:52:03ZYazar Kim, Tai-hoon. editor. Fang, Wai-chi. editor. Khan, Muhammad Khurram. editor. Arnett, Kirk P. editor. Kang, Heau-jo. editor.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-17610-4">http://dx.doi.org/10.1007/978-3-642-17610-4</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Information Theoretic Security 4th International Conference, ICITS 2009, Shizuoka, Japan, December 3-6, 2009. Revised Selected Papersent://SD_ILS/0/SD_ILS:1926732024-12-28T12:52:03Z2024-12-28T12:52:03ZYazar Kurosawa, Kaoru. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-14496-7">http://dx.doi.org/10.1007/978-3-642-14496-7</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Security and Privacy – Silver Linings in the Cloud 25th IFIP TC-11 International Information Security Conference, SEC 2010, Held as Part of WCC 2010, Brisbane, Australia, September 20-23, 2010. Proceedingsent://SD_ILS/0/SD_ILS:1929112024-12-28T12:52:03Z2024-12-28T12:52:03ZYazar Rannenberg, Kai. editor. Varadharajan, Vijay. editor. Weber, Christian. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-15257-3">http://dx.doi.org/10.1007/978-3-642-15257-3</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Advances in Information and Computer Security 5th International Workshop on Security, IWSEC 2010, Kobe, Japan, November 22-24, 2010. Proceedingsent://SD_ILS/0/SD_ILS:1934222024-12-28T12:52:03Z2024-12-28T12:52:03ZYazar Echizen, Isao. editor. Kunihiro, Noboru. editor. Sasaki, Ryoichi. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-16825-3">http://dx.doi.org/10.1007/978-3-642-16825-3</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Security and Privacy in Mobile Information and Communication Systems Second International ICST Conference, MobiSec 2010, Catania, Sicily, Italy, May 27-28, 2010, Revised Selected Papersent://SD_ILS/0/SD_ILS:1936202024-12-28T12:52:03Z2024-12-28T12:52:03ZYazar Schmidt, Andreas U. editor. Russello, Giovanni. editor. Lioy, Antonio. editor. Prasad, Neeli R. editor. Lian, Shiguo. editor.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-17502-2">http://dx.doi.org/10.1007/978-3-642-17502-2</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Information and Communications Security 12th International Conference, ICICS 2010, Barcelona, Spain, December 15-17, 2010. Proceedingsent://SD_ILS/0/SD_ILS:1936662024-12-28T12:52:03Z2024-12-28T12:52:03ZYazar Soriano, Miguel. editor. Qing, Sihan. editor. López, Javier. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-17650-0">http://dx.doi.org/10.1007/978-3-642-17650-0</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Security for Microsoft Windows System Administrators introduction to key information security conceptsent://SD_ILS/0/SD_ILS:1491222024-12-28T12:52:03Z2024-12-28T12:52:03ZYazar Rountree, Derrick.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495943">http://www.sciencedirect.com/science/book/9781597495943</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Information Security and Cryptology – ICISC 2008 11th International Conference, Seoul, Korea, December 3-5, 2008, Revised Selected Papersent://SD_ILS/0/SD_ILS:1897872024-12-28T12:52:03Z2024-12-28T12:52:03ZYazar Lee, Pil Joong. editor. Cheon, Jung Hee. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-00730-9">http://dx.doi.org/10.1007/978-3-642-00730-9</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Information Security Practice and Experience 5th International Conference, ISPEC 2009 Xi’an, China, April 13-15, 2009 Proceedingsent://SD_ILS/0/SD_ILS:1898102024-12-28T12:52:03Z2024-12-28T12:52:03ZYazar Bao, Feng. editor. Li, Hui. editor. Wang, Guilin. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-00843-6">http://dx.doi.org/10.1007/978-3-642-00843-6</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Emerging Challenges for Security, Privacy and Trust 24th IFIP TC 11 International Information Security Conference, SEC 2009, Pafos, Cyprus, May 18–20, 2009. Proceedingsent://SD_ILS/0/SD_ILS:1899282024-12-28T12:52:03Z2024-12-28T12:52:03ZYazar Gritzalis, Dimitris. editor. Lopez, Javier. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-01244-0">http://dx.doi.org/10.1007/978-3-642-01244-0</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Information Security and Cryptology 4th International Conference, Inscrypt 2008, Beijing, China, December 14-17, 2008, Revised Selected Papersent://SD_ILS/0/SD_ILS:1899962024-12-28T12:52:03Z2024-12-28T12:52:03ZYazar Yung, Moti. editor. Liu, Peng. editor. Lin, Dongdai. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-01440-6">http://dx.doi.org/10.1007/978-3-642-01440-6</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Information security management metrics a definitive guide to effective security monitoring and measurementent://SD_ILS/0/SD_ILS:2913732024-12-28T12:52:03Z2024-12-28T12:52:03ZYazar Brotby, W. Krag.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://marc.crcnetbase.com/isbn/9781420052862">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Information security governance a practical development and implementation approachent://SD_ILS/0/SD_ILS:2977432024-12-28T12:52:03Z2024-12-28T12:52:03ZYazar Brotby, W. Krag.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim Ebook Library <a href="http://public.eblib.com/EBLPublic/PublicView.do?ptiID=433807">http://public.eblib.com/EBLPublic/PublicView.do?ptiID=433807</a>
John Wiley <a href="http://dx.doi.org/10.1002/9780470476017">http://dx.doi.org/10.1002/9780470476017</a>
<a href="http://site.ebrary.com/lib/alltitles/Doc?id=10313652">http://site.ebrary.com/lib/alltitles/Doc?id=10313652</a>
<a href="http://swb.eblib.com/patron/FullRecord.aspx?p=433807">http://swb.eblib.com/patron/FullRecord.aspx?p=433807</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Security and Privacy in Mobile Information and Communication Systems First International ICST Conference, MobiSec 2009, Turin, Italy, June 3-5, 2009, Revised Selected Papersent://SD_ILS/0/SD_ILS:1909472024-12-28T12:52:03Z2024-12-28T12:52:03ZYazar Schmidt, Andreas U. editor. Lian, Shiguo. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-04434-2">http://dx.doi.org/10.1007/978-3-642-04434-2</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Computational Intelligence in Security for Information Systems CISIS’09, 2nd International Workshop Burgos, Spain, September 2009 Proceedingsent://SD_ILS/0/SD_ILS:1908342024-12-28T12:52:03Z2024-12-28T12:52:03ZYazar Herrero, Álvaro. editor. Gastaldo, Paolo. editor. Zunino, Rodolfo. editor. Corchado, Emilio. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-04091-7">http://dx.doi.org/10.1007/978-3-642-04091-7</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Advances in Information and Computer Security 4th International Workshop on Security, IWSEC 2009 Toyama, Japan, October 28-30, 2009 Proceedingsent://SD_ILS/0/SD_ILS:1910782024-12-28T12:52:03Z2024-12-28T12:52:03ZYazar Takagi, Tsuyoshi. editor. Mambo, Masahiro. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-04846-3">http://dx.doi.org/10.1007/978-3-642-04846-3</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Information Theoretic Security Second International Conference, ICITS 2007, Madrid, Spain, May 25-29, 2007, Revised Selected Papersent://SD_ILS/0/SD_ILS:1913072024-12-28T12:52:03Z2024-12-28T12:52:03ZYazar Desmedt, Yvo. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-10230-1">http://dx.doi.org/10.1007/978-3-642-10230-1</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Protecting Persons While Protecting the People Second Annual Workshop on Information Privacy and National Security, ISIPS 2008, New Brunswick, NJ, USA, May 12, 2008. Revised Selected Papersent://SD_ILS/0/SD_ILS:1913082024-12-28T12:52:03Z2024-12-28T12:52:03ZYazar Gal, Cecilia S. editor. Kantor, Paul B. editor. Lesk, Michael E. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-10233-2">http://dx.doi.org/10.1007/978-3-642-10233-2</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Information Security Applications 9th International Workshop, WISA 2008, Jeju Island, Korea, September 23-25, 2008, Revised Selected Papersent://SD_ILS/0/SD_ILS:1896482024-12-28T12:52:03Z2024-12-28T12:52:03ZYazar Chung, Kyo-Il. editor. Sohn, Kiwook. editor. Yung, Moti. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-00306-6">http://dx.doi.org/10.1007/978-3-642-00306-6</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Advances in Information Security and Assurance Third International Conference and Workshops, ISA 2009, Seoul, Korea, June 25-27, 2009. Proceedingsent://SD_ILS/0/SD_ILS:1903772024-12-28T12:52:03Z2024-12-28T12:52:03ZYazar Park, Jong Hyuk. editor. Chen, Hsiao-Hwa. editor. Atiquzzaman, Mohammed. editor. Lee, Changhoon. editor. Kim, Tai-hoon. editor.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-02617-1">http://dx.doi.org/10.1007/978-3-642-02617-1</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Information Security and Privacy 14th Australasian Conference, ACISP 2009 Brisbane, Australia, July 1-3, 2009 Proceedingsent://SD_ILS/0/SD_ILS:1903782024-12-28T12:52:03Z2024-12-28T12:52:03ZYazar Boyd, Colin. editor. González Nieto, Juan. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-02620-1">http://dx.doi.org/10.1007/978-3-642-02620-1</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Advances in Information Security and Its Application Third International Conference, ISA 2009, Seoul, Korea, June 25-27, 2009. Proceedingsent://SD_ILS/0/SD_ILS:1903822024-12-28T12:52:03Z2024-12-28T12:52:03ZYazar Park, Jong Hyuk. editor. Zhan, Justin. editor. Lee, Changhoon. editor. Wang, Guilin. editor. Kim, Tai-hoon. editor.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-02633-1">http://dx.doi.org/10.1007/978-3-642-02633-1</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Advances in Computer Science - ASIAN 2009. Information Security and Privacy 13th Asian Computing Science Conference, Seoul, Korea, December 14-16, 2009. Proceedingsent://SD_ILS/0/SD_ILS:1914252024-12-28T12:52:03Z2024-12-28T12:52:03ZYazar Datta, Anupam. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-10622-4">http://dx.doi.org/10.1007/978-3-642-10622-4</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Information Systems Security 5th International Conference, ICISS 2009 Kolkata, India, December 14-18, 2009 Proceedingsent://SD_ILS/0/SD_ILS:1914722024-12-28T12:52:03Z2024-12-28T12:52:03ZYazar Prakash, Atul. editor. Sen Gupta, Indranil. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-10772-6">http://dx.doi.org/10.1007/978-3-642-10772-6</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>ISSE 2008 Securing Electronic Business Processes Highlights of the Information Security Solutions Europe 2008 Conferenceent://SD_ILS/0/SD_ILS:1994112024-12-28T12:52:03Z2024-12-28T12:52:03ZYazar Pohlmann, Norbert. editor. Reimer, Helmut. editor. Schneider, Wolfgang. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-8348-9283-6">http://dx.doi.org/10.1007/978-3-8348-9283-6</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Managing Information Risk and the Economics of Securityent://SD_ILS/0/SD_ILS:1647822024-12-28T12:52:03Z2024-12-28T12:52:03ZYazar Johnson, M. Eric. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-0-387-09762-6">http://dx.doi.org/10.1007/978-0-387-09762-6</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Critical Information Infrastructure Security Third International Workshop, CRITIS 2008, Rome, Italy, October13-15, 2008. Revised Papersent://SD_ILS/0/SD_ILS:1906582024-12-28T12:52:03Z2024-12-28T12:52:03ZYazar Setola, Roberto. editor. Geretshuber, Stefan. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-03552-4">http://dx.doi.org/10.1007/978-3-642-03552-4</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Advances in Cryptology – ASIACRYPT 2009 15th International Conference on the Theory and Application of Cryptology and Information Security, Tokyo, Japan, December 6-10, 2009. Proceedingsent://SD_ILS/0/SD_ILS:1913462024-12-28T12:52:03Z2024-12-28T12:52:03ZYazar Matsui, Mitsuru. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-10366-7">http://dx.doi.org/10.1007/978-3-642-10366-7</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Information Security Applications 10th International Workshop, WISA 2009, Busan, Korea, August 25-27, 2009, Revised Selected Papersent://SD_ILS/0/SD_ILS:1914912024-12-28T12:52:03Z2024-12-28T12:52:03ZYazar Youm, Heung Youl. editor. Yung, Moti. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-10838-9">http://dx.doi.org/10.1007/978-3-642-10838-9</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>