Arama Sonuçları Information security. - Daraltılmış: Data protection.
SirsiDynix Enterprise
https://katalog.hacettepe.edu.tr/client/tr_TR/default_tr/default_tr/qu$003dInformation$002bsecurity.$0026qf$003dSUBJECT$002509Konu$002509Data$002bprotection.$002509Data$002bprotection.$0026ps$003d300$0026isd$003dtrue?dt=list
2026-01-18T05:21:55Z
Information security fundamentals
ent://SD_ILS/0/SD_ILS:539922
2026-01-18T05:21:55Z
2026-01-18T05:21:55Z
Yazar Peltier, Thomas R.<br/>Yer Numarası QA76.9 .A25<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9780429130281">Taylor & Francis eBooks</a>
Taylor & Francis <a href="https://www.taylorfrancis.com/books/9780429130281">https://www.taylorfrancis.com/books/9780429130281</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Information security fundamentals
ent://SD_ILS/0/SD_ILS:545226
2026-01-18T05:21:55Z
2026-01-18T05:21:55Z
Yazar Peltier, Thomas R., author. Peltier, Justin. Blackley, John A.<br/>Yer Numarası QA76.9 .A25 P427 2005<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9781135493738">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>
Electronic Healthcare Information Security
ent://SD_ILS/0/SD_ILS:167753
2026-01-18T05:21:55Z
2026-01-18T05:21:55Z
Yazar Shoniregun, Charles A. author. Dube, Kudakwashe. author. Mtenzi, Fredrick. author. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-0-387-84919-5">http://dx.doi.org/10.1007/978-0-387-84919-5</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Handbook of Information and Communication Security
ent://SD_ILS/0/SD_ILS:190841
2026-01-18T05:21:55Z
2026-01-18T05:21:55Z
Yazar Stavroulakis, Peter. editor. Stamp, Mark. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-04117-4">http://dx.doi.org/10.1007/978-3-642-04117-4</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Economics of Information Security and Privacy
ent://SD_ILS/0/SD_ILS:172736
2026-01-18T05:21:55Z
2026-01-18T05:21:55Z
Yazar Moore, Tyler. editor. Pym, David. editor. Ioannidis, Christos. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-1-4419-6967-5">http://dx.doi.org/10.1007/978-1-4419-6967-5</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
The executive MBA in information security
ent://SD_ILS/0/SD_ILS:539948
2026-01-18T05:21:55Z
2026-01-18T05:21:55Z
Yazar Trinckes, John J., author.<br/>Yer Numarası HF5548.37 .T75 2010<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9781439810088">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>
Economics of Information Security and Privacy III
ent://SD_ILS/0/SD_ILS:331294
2026-01-18T05:21:55Z
2026-01-18T05:21:55Z
Yazar Schneier, Bruce. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE(331294.1)<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-1-4614-1981-5">http://dx.doi.org/10.1007/978-1-4614-1981-5</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
The Economics of Information Security and Privacy
ent://SD_ILS/0/SD_ILS:334810
2026-01-18T05:21:55Z
2026-01-18T05:21:55Z
Yazar Böhme, Rainer. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE(334810.1)<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-39498-0">http://dx.doi.org/10.1007/978-3-642-39498-0</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Applied Information Security A Hands-on Approach
ent://SD_ILS/0/SD_ILS:195648
2026-01-18T05:21:55Z
2026-01-18T05:21:55Z
Yazar Basin, David. author. Schaller, Patrick. author. Schläpfer, Michael. author. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-24474-2">http://dx.doi.org/10.1007/978-3-642-24474-2</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Information security : design, implementation, measurement, and compliance
ent://SD_ILS/0/SD_ILS:545839
2026-01-18T05:21:55Z
2026-01-18T05:21:55Z
Yazar Layton, Timothy P., author.<br/>Yer Numarası HF5548.37 .L393 2007<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9781420013412">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>
A practical guide to security engineering and information assurance
ent://SD_ILS/0/SD_ILS:544973
2026-01-18T05:21:55Z
2026-01-18T05:21:55Z
Yazar Herrmann, Debra S., author.<br/>Yer Numarası QA76.9 .A25 H47 2002<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9781420031492">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>
Engineering information security the application of systems engineering concepts to achieve information assurance
ent://SD_ILS/0/SD_ILS:249916
2026-01-18T05:21:55Z
2026-01-18T05:21:55Z
Yazar Jacobs, Stuart.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim IEEE Xplore <a href="http://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=6047604">http://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=6047604</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Emerging Technologies in Data Mining and Information Security Proceedings of IEMIS 2022, Volume 3
ent://SD_ILS/0/SD_ILS:526885
2026-01-18T05:21:55Z
2026-01-18T05:21:55Z
Yazar Dutta, Paramartha. editor. Bhattacharya, Abhishek. editor. Dutta, Soumi. editor. Lai, Wen-Cheng. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-981-19-4676-9">https://doi.org/10.1007/978-981-19-4676-9</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Proceedings of the International Conference on Intelligent Computing, Communication and Information Security ICICCIS 2022
ent://SD_ILS/0/SD_ILS:528020
2026-01-18T05:21:55Z
2026-01-18T05:21:55Z
Yazar Devedzic, Vladan. editor. Agarwal, Basant. editor. Gupta, Mukesh Kumar. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-981-99-1373-2">https://doi.org/10.1007/978-981-99-1373-2</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
IT GOVERNANCE AND INFORMATION SECURITY : guides, standards and frameworks.
ent://SD_ILS/0/SD_ILS:549396
2026-01-18T05:21:55Z
2026-01-18T05:21:55Z
Yazar Maleh, Yassine, 1987- Sahid, Abdelkebir, 1983- Alazab, Mamoun, 1980- Belaissaoui, Mustapha, 1968-<br/>Yer Numarası ONLINE<br/>Elektronik Erişim Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003161998">https://www.taylorfrancis.com/books/9781003161998</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
IT GOVERNANCE AND INFORMATION SECURITY : guides, standards and frameworks.
ent://SD_ILS/0/SD_ILS:567328
2026-01-18T05:21:55Z
2026-01-18T05:21:55Z
Yazar Maleh, Yassine, 1987- Sahid, Abdelkebir, 1983- Alazab, Mamoun, 1980- Belaissaoui, Mustapha, 1968-<br/>Yer Numarası QA76.9 .A25<br/>Elektronik Erişim Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003161998">https://www.taylorfrancis.com/books/9781003161998</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Advanced methodologies and technologies in system security, information privacy, and forensics
ent://SD_ILS/0/SD_ILS:482009
2026-01-18T05:21:55Z
2026-01-18T05:21:55Z
Yazar Khosrow-Pour, Mehdi, 1951- editor. IGI Global, publisher.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-7492-7">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-7492-7</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Information Security Practice and Experience 15th International Conference, ISPEC 2019, Kuala Lumpur, Malaysia, November 26–28, 2019, Proceedings
ent://SD_ILS/0/SD_ILS:483099
2026-01-18T05:21:55Z
2026-01-18T05:21:55Z
Yazar Heng, Swee-Huay. editor. (orcid)0000-0003-3627-2131 Lopez, Javier. editor. (orcid)0000-0001-8066-9991 SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-030-34339-2">https://doi.org/10.1007/978-3-030-34339-2</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Handbook of Multimedia Information Security: Techniques and Applications
ent://SD_ILS/0/SD_ILS:483348
2026-01-18T05:21:55Z
2026-01-18T05:21:55Z
Yazar Singh, Amit Kumar. editor. Mohan, Anand. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-030-15887-3">https://doi.org/10.1007/978-3-030-15887-3</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Applications and Techniques in Information Security 10th International Conference, ATIS 2019, Thanjavur, India, November 22–24, 2019, Proceedings
ent://SD_ILS/0/SD_ILS:483576
2026-01-18T05:21:55Z
2026-01-18T05:21:55Z
Yazar Shankar Sriram, V. S. editor. (orcid)0000-0001-7870-7944 Subramaniyaswamy, V. editor. Sasikaladevi, N. editor. (orcid)0000-0002-0841-502X Zhang, Leo. editor. Batten, Lynn. editor. (orcid)0000-0003-4525-2423<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-981-15-0871-4">https://doi.org/10.1007/978-981-15-0871-4</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Information Security Education. Education in Proactive Information Security 12th IFIP WG 11.8 World Conference, WISE 12, Lisbon, Portugal, June 25–27, 2019, Proceedings
ent://SD_ILS/0/SD_ILS:483477
2026-01-18T05:21:55Z
2026-01-18T05:21:55Z
Yazar Drevin, Lynette. editor. (orcid)0000-0001-9370-8216 Theocharidou, Marianthi. editor. (orcid)0000-0002-8870-1746 SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-030-23451-5">https://doi.org/10.1007/978-3-030-23451-5</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Information Security 17th International Conference, ISSA 2018, Pretoria, South Africa, August 15–16, 2018, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:483660
2026-01-18T05:21:55Z
2026-01-18T05:21:55Z
Yazar Venter, Hein. editor. (orcid)0000-0002-3607-8630 Loock, Marianne. editor. (orcid)0000-0001-8005-716X Coetzee, Marijke. editor. (orcid)0000-0002-9157-3079 Eloff, Mariki. editor. (orcid)0000-0001-8997-7931 Eloff, Jan. editor. (orcid)0000-0003-4683-2198<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-030-11407-7">https://doi.org/10.1007/978-3-030-11407-7</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Information Systems Security 15th International Conference, ICISS 2019, Hyderabad, India, December 16–20, 2019, Proceedings
ent://SD_ILS/0/SD_ILS:484509
2026-01-18T05:21:55Z
2026-01-18T05:21:55Z
Yazar Garg, Deepak. editor. (orcid)0000-0002-0888-3093 Kumar, N. V. Narendra. editor. Shyamasundar, Rudrapatna K. editor. (orcid)0000-0001-6966-0507 SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-030-36945-3">https://doi.org/10.1007/978-3-030-36945-3</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Security in Computer and Information Sciences First International ISCIS Security Workshop 2018, Euro-CYBERSEC 2018, London, UK, February 26-27, 2018, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:402736
2026-01-18T05:21:55Z
2026-01-18T05:21:55Z
Yazar Gelenbe, Erol. editor. (orcid)0000-0001-9688-2201 Campegiani, Paolo. editor. Czachórski, Tadeusz. editor. Katsikas, Sokratis K. editor. (orcid)0000-0003-2966-9683 Komnios, Ioannis. editor.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-319-95189-8">https://doi.org/10.1007/978-3-319-95189-8</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Information Systems Security 14th International Conference, ICISS 2018, Bangalore, India, December 17-19, 2018, Proceedings
ent://SD_ILS/0/SD_ILS:400247
2026-01-18T05:21:55Z
2026-01-18T05:21:55Z
Yazar Ganapathy, Vinod. editor. Jaeger, Trent. editor. Shyamasundar, R.K. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-030-05171-6">https://doi.org/10.1007/978-3-030-05171-6</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Security leader insights for information protection : lessons and strategies from leading security professionals
ent://SD_ILS/0/SD_ILS:355760
2026-01-18T05:21:55Z
2026-01-18T05:21:55Z
Yazar Fahy, Bob, editor.<br/>Yer Numarası ONLINE(355760.1)<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128008430">http://www.sciencedirect.com/science/book/9780128008430</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Information and Communications Security 15th International Conference, ICICS 2013, Beijing, China, November 20-22, 2013. Proceedings
ent://SD_ILS/0/SD_ILS:332941
2026-01-18T05:21:55Z
2026-01-18T05:21:55Z
Yazar Qing, Sihan. editor. Zhou, Jianying. editor. Liu, Dongmei. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE(332941.1)<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-319-02726-5">http://dx.doi.org/10.1007/978-3-319-02726-5</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Information Security Practice and Experience 9th International Conference, ISPEC 2013, Lanzhou, China, May 12-14, 2013. Proceedings
ent://SD_ILS/0/SD_ILS:334519
2026-01-18T05:21:55Z
2026-01-18T05:21:55Z
Yazar Deng, Robert H. editor. Feng, Tao. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE(334519.1)<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-38033-4">http://dx.doi.org/10.1007/978-3-642-38033-4</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Availability, Reliability, and Security in Information Systems and HCI IFIP WG 8.4, 8.9, TC 5 International Cross-Domain Conference, CD-ARES 2013, Regensburg, Germany, September 2-6, 2013. Proceedings
ent://SD_ILS/0/SD_ILS:334958
2026-01-18T05:21:55Z
2026-01-18T05:21:55Z
Yazar Cuzzocrea, Alfredo. editor. Kittl, Christian. editor. Simos, Dimitris E. editor. Weippl, Edgar. editor. Xu, Lida. editor.<br/>Yer Numarası ONLINE(334958.1)<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-40511-2">http://dx.doi.org/10.1007/978-3-642-40511-2</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Critical Information Infrastructure Security 6th International Workshop, CRITIS 2011, Lucerne, Switzerland, September 8-9, 2011, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:335107
2026-01-18T05:21:55Z
2026-01-18T05:21:55Z
Yazar Bologna, Sandro. editor. Hämmerli, Bernhard. editor. Gritzalis, Dimitris. editor. Wolthusen, Stephen. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE(335107.1)<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-41476-3">http://dx.doi.org/10.1007/978-3-642-41476-3</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Critical Information Infrastructures Security 7th International Workshop, CRITIS 2012, Lillehammer, Norway, September 17-18, 2012, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:335110
2026-01-18T05:21:55Z
2026-01-18T05:21:55Z
Yazar Hämmerli, Bernhard M. editor. Kalstad Svendsen, Nils. editor. Lopez, Javier. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE(335110.1)<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-41485-5">http://dx.doi.org/10.1007/978-3-642-41485-5</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Advances in Cryptology - ASIACRYPT 2013 19th International Conference on the Theory and Application of Cryptology and Information Security, Bengaluru, India, December 1-5, 2013, Proceedings, Part II
ent://SD_ILS/0/SD_ILS:335160
2026-01-18T05:21:55Z
2026-01-18T05:21:55Z
Yazar Sako, Kazue. editor. Sarkar, Palash. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE(335160.1)<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-42045-0">http://dx.doi.org/10.1007/978-3-642-42045-0</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Information security policy development for compliance : ISO/IEC 27001, NIST SP 800-53, HIPAA standard, PCI DSS V2.0, and AUP V5.0
ent://SD_ILS/0/SD_ILS:545128
2026-01-18T05:21:55Z
2026-01-18T05:21:55Z
Yazar Williams, Barry L., author.<br/>Yer Numarası QA76.9 .A25 .W5495 2013<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9781466580596">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>
Critical Information Infrastructures Security 8th International Workshop, CRITIS 2013, Amsterdam, The Netherlands, September 16-18, 2013, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:333008
2026-01-18T05:21:55Z
2026-01-18T05:21:55Z
Yazar Luiijf, Eric. editor. Hartel, Pieter. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE(333008.1)<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-319-03964-0">http://dx.doi.org/10.1007/978-3-319-03964-0</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Human Aspects of Information Security, Privacy, and Trust First International Conference, HAS 2013, Held as Part of HCI International 2013, Las Vegas, NV, USA, July 21-26, 2013. Proceedings
ent://SD_ILS/0/SD_ILS:334786
2026-01-18T05:21:55Z
2026-01-18T05:21:55Z
Yazar Marinos, Louis. editor. Askoxylakis, Ioannis. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE(334786.1)<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-39345-7">http://dx.doi.org/10.1007/978-3-642-39345-7</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Information Assurance and Security Education and Training 8th IFIP WG 11.8 World Conference on Information Security Education, WISE 8, Auckland, New Zealand, July 8-10, 2013, Proceedings, WISE 7, Lucerne Switzerland, June 9-10, 2011, and WISE 6, Bento Gonçalves, RS, Brazil, July 27-31, 2009, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:334794
2026-01-18T05:21:55Z
2026-01-18T05:21:55Z
Yazar Dodge, Ronald C. editor. Futcher, Lynn. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE(334794.1)<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-39377-8">http://dx.doi.org/10.1007/978-3-642-39377-8</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Advances in Security of Information and Communication Networks First International Conference, SecNet 2013, Cairo, Egypt, September 3-5, 2013. Proceedings
ent://SD_ILS/0/SD_ILS:334976
2026-01-18T05:21:55Z
2026-01-18T05:21:55Z
Yazar Awad, Ali Ismail. editor. Hassanien, Aboul Ella. editor. Baba, Kensuke. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE(334976.1)<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-40597-6">http://dx.doi.org/10.1007/978-3-642-40597-6</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Advances in Cryptology - ASIACRYPT 2013 19th International Conference on the Theory and Application of Cryptology and Information Security, Bengaluru, India, December 1-5, 2013, Proceedings, Part I
ent://SD_ILS/0/SD_ILS:335157
2026-01-18T05:21:55Z
2026-01-18T05:21:55Z
Yazar Sako, Kazue. editor. Sarkar, Palash. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE(335157.1)<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-42033-7">http://dx.doi.org/10.1007/978-3-642-42033-7</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Advances in Information and Computer Security 8th International Workshop on Security, IWSEC 2013, Okinawa, Japan, November 18-20, 2013, Proceedings
ent://SD_ILS/0/SD_ILS:335098
2026-01-18T05:21:55Z
2026-01-18T05:21:55Z
Yazar Sakiyama, Kazuo. editor. Terada, Masayuki. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE(335098.1)<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-41383-4">http://dx.doi.org/10.1007/978-3-642-41383-4</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Information Security and Privacy 18th Australasian Conference, ACISP 2013, Brisbane, Australia, July 1-3, 2013. Proceedings
ent://SD_ILS/0/SD_ILS:334720
2026-01-18T05:21:55Z
2026-01-18T05:21:55Z
Yazar Boyd, Colin. editor. Simpson, Leonie. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE(334720.1)<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-39059-3">http://dx.doi.org/10.1007/978-3-642-39059-3</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
ISSE 2013 Securing Electronic Business Processes Highlights of the Information Security Solutions Europe 2013 Conference
ent://SD_ILS/0/SD_ILS:335292
2026-01-18T05:21:55Z
2026-01-18T05:21:55Z
Yazar Reimer, Helmut. editor. Pohlmann, Norbert. editor. Schneider, Wolfgang. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE(335292.1)<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-658-03371-2">http://dx.doi.org/10.1007/978-3-658-03371-2</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Information Security and Cryptology – ICISC 2012 15th International Conference, Seoul, Korea, November 28-30, 2012, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:334470
2026-01-18T05:21:55Z
2026-01-18T05:21:55Z
Yazar Kwon, Taekyoung. editor. Lee, Mun-Kyu. editor. Kwon, Daesung. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE(334470.1)<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-37682-5">http://dx.doi.org/10.1007/978-3-642-37682-5</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Information Security and Cryptology 8th International Conference, Inscrypt 2012, Beijing, China, November 28-30, 2012, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:334613
2026-01-18T05:21:55Z
2026-01-18T05:21:55Z
Yazar Kutyłowski, Mirosław. editor. Yung, Moti. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE(334613.1)<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-38519-3">http://dx.doi.org/10.1007/978-3-642-38519-3</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Information Security Theory and Practice. Security of Mobile and Cyber-Physical Systems 7th IFIP WG 11.2 International Workshop, WISTP 2013, Heraklion, Greece, May 28-30, 2013. Proceedings
ent://SD_ILS/0/SD_ILS:334616
2026-01-18T05:21:55Z
2026-01-18T05:21:55Z
Yazar Cavallaro, Lorenzo. editor. Gollmann, Dieter. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE(334616.1)<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-38530-8">http://dx.doi.org/10.1007/978-3-642-38530-8</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Information Systems Security 9th International Conference, ICISS 2013, Kolkata, India, December 16-20, 2013. Proceedings
ent://SD_ILS/0/SD_ILS:335194
2026-01-18T05:21:55Z
2026-01-18T05:21:55Z
Yazar Bagchi, Aditya. editor. Ray, Indrakshi. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE(335194.1)<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-45204-8">http://dx.doi.org/10.1007/978-3-642-45204-8</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
PRAGMATIC security metrics : applying metametrics to information security
ent://SD_ILS/0/SD_ILS:541797
2026-01-18T05:21:55Z
2026-01-18T05:21:55Z
Yazar Brotby, W. Krag., author. Hinson, Gary. Kabay, Michel E.<br/>Yer Numarası HD30.38 .B76 2013<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9781439881538">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>
Information Security Technology for Applications 16th Nordic Conference on Secure IT Systems, NordSec 2011, Tallinn, Estonia, October 26-28, 2011, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:196738
2026-01-18T05:21:55Z
2026-01-18T05:21:55Z
Yazar Laud, Peeter. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-29615-4">http://dx.doi.org/10.1007/978-3-642-29615-4</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Information Flow Based Security Control Beyond RBAC How to enable fine-grained security policy enforcement in business processes beyond limitations of role-based access control (RBAC)
ent://SD_ILS/0/SD_ILS:198953
2026-01-18T05:21:55Z
2026-01-18T05:21:55Z
Yazar Fischer-Hellmann, Klaus-Peter. author. Bischoff, Rainer. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-8348-2618-3">http://dx.doi.org/10.1007/978-3-8348-2618-3</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Information Security Technology for Applications 15th Nordic Conference on Secure IT Systems, NordSec 2010, Espoo, Finland, October 27-29, 2010, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:196303
2026-01-18T05:21:55Z
2026-01-18T05:21:55Z
Yazar Aura, Tuomas. editor. Järvinen, Kimmo. editor. Nyberg, Kaisa. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-27937-9">http://dx.doi.org/10.1007/978-3-642-27937-9</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Information Security Theory and Practice. Security, Privacy and Trust in Computing Systems and Ambient Intelligent Ecosystems 6th IFIP WG 11.2 International Workshop, WISTP 2012, Egham, UK, June 20-22, 2012. Proceedings
ent://SD_ILS/0/SD_ILS:196995
2026-01-18T05:21:55Z
2026-01-18T05:21:55Z
Yazar Askoxylakis, Ioannis. editor. Pöhls, Henrich C. editor. Posegga, Joachim. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-30955-7">http://dx.doi.org/10.1007/978-3-642-30955-7</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Information Security and Privacy 17th Australasian Conference, ACISP 2012, Wollongong, NSW, Australia, July 9-11, 2012. Proceedings
ent://SD_ILS/0/SD_ILS:197080
2026-01-18T05:21:55Z
2026-01-18T05:21:55Z
Yazar Susilo, Willy. editor. Mu, Yi. editor. Seberry, Jennifer. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-31448-3">http://dx.doi.org/10.1007/978-3-642-31448-3</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Information Security and Cryptology - ICISC 2011 14th International Conference, Seoul, Korea, November 30 - December 2, 2011. Revised Selected Papers
ent://SD_ILS/0/SD_ILS:197153
2026-01-18T05:21:55Z
2026-01-18T05:21:55Z
Yazar Kim, Howon. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-31912-9">http://dx.doi.org/10.1007/978-3-642-31912-9</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Information Theoretic Security 6th International Conference, ICITS 2012, Montreal, QC, Canada, August 15-17, 2012. Proceedings
ent://SD_ILS/0/SD_ILS:197201
2026-01-18T05:21:55Z
2026-01-18T05:21:55Z
Yazar Smith, Adam. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-32284-6">http://dx.doi.org/10.1007/978-3-642-32284-6</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Multidisciplinary Research and Practice for Information Systems IFIP WG 8.4, 8.9/TC 5 International Cross-Domain Conference and Workshop on Availability, Reliability, and Security, CD-ARES 2012, Prague, Czech Republic, August 20-24, 2012. Proceedings
ent://SD_ILS/0/SD_ILS:197227
2026-01-18T05:21:55Z
2026-01-18T05:21:55Z
Yazar Quirchmayr, Gerald. editor. Basl, Josef. editor. You, Ilsun. editor. Xu, Lida. editor. Weippl, Edgar. editor.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-32498-7">http://dx.doi.org/10.1007/978-3-642-32498-7</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Advances in Information and Computer Security 7th International Workshop on Security, IWSEC 2012, Fukuoka, Japan, November 7-9, 2012. Proceedings
ent://SD_ILS/0/SD_ILS:197475
2026-01-18T05:21:55Z
2026-01-18T05:21:55Z
Yazar Hanaoka, Goichiro. editor. Yamauchi, Toshihiro. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-34117-5">http://dx.doi.org/10.1007/978-3-642-34117-5</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Information and Communications Security 14th International Conference, ICICS 2012, Hong Kong, China, October 29-31, 2012. Proceedings
ent://SD_ILS/0/SD_ILS:197478
2026-01-18T05:21:55Z
2026-01-18T05:21:55Z
Yazar Chim, Tat Wing. editor. Yuen, Tsz Hon. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-34129-8">http://dx.doi.org/10.1007/978-3-642-34129-8</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Information Security and Cryptology 7th International Conference, Inscrypt 2011, Beijing, China, November 30 – December 3, 2011. Revised Selected Papers
ent://SD_ILS/0/SD_ILS:197541
2026-01-18T05:21:55Z
2026-01-18T05:21:55Z
Yazar Wu, Chuan-Kun. editor. Yung, Moti. editor. Lin, Dongdai. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-34704-7">http://dx.doi.org/10.1007/978-3-642-34704-7</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Advances in Cryptology – ASIACRYPT 2012 18th International Conference on the Theory and Application of Cryptology and Information Security, Beijing, China, December 2-6, 2012. Proceedings
ent://SD_ILS/0/SD_ILS:197559
2026-01-18T05:21:55Z
2026-01-18T05:21:55Z
Yazar Wang, Xiaoyun. editor. Sako, Kazue. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-34961-4">http://dx.doi.org/10.1007/978-3-642-34961-4</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Information Systems Security 8th International Conference, ICISS 2012, Guwahati, India, December 15-19, 2012. Proceedings
ent://SD_ILS/0/SD_ILS:197566
2026-01-18T05:21:55Z
2026-01-18T05:21:55Z
Yazar Venkatakrishnan, Venkat. editor. Goswami, Diganta. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-35130-3">http://dx.doi.org/10.1007/978-3-642-35130-3</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Information security risk assessment toolkit practical assessments through data collection and data analysis
ent://SD_ILS/0/SD_ILS:145470
2026-01-18T05:21:55Z
2026-01-18T05:21:55Z
Yazar Talabis, Mark. Martin, Jason.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597497350">http://www.sciencedirect.com/science/book/9781597497350</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Information Security Applications 12th International Workshop, WISA 2011, Jeju Island, Korea, August 22-24, 2011. Revised Selected Papers
ent://SD_ILS/0/SD_ILS:196291
2026-01-18T05:21:55Z
2026-01-18T05:21:55Z
Yazar Jung, Souhwan. editor. Yung, Moti. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-27890-7">http://dx.doi.org/10.1007/978-3-642-27890-7</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Security and Intelligent Information Systems International Joint Conferences, SIIS 2011, Warsaw, Poland, June 13-14, 2011, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:195894
2026-01-18T05:21:55Z
2026-01-18T05:21:55Z
Yazar Bouvry, Pascal. editor. Kłopotek, Mieczysław A. editor. Leprévost, Franck. editor. Marciniak, Małgorzata. editor. Mykowiecka, Agnieszka. editor.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-25261-7">http://dx.doi.org/10.1007/978-3-642-25261-7</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Information Security Practice and Experience 8th International Conference, ISPEC 2012, Hangzhou, China, April 9-12, 2012. Proceedings
ent://SD_ILS/0/SD_ILS:196613
2026-01-18T05:21:55Z
2026-01-18T05:21:55Z
Yazar Ryan, Mark D. editor. Smyth, Ben. editor. Wang, Guilin. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-29101-2">http://dx.doi.org/10.1007/978-3-642-29101-2</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Information Security 15th International Conference, ISC 2012, Passau, Germany, September 19-21, 2012. Proceedings
ent://SD_ILS/0/SD_ILS:197365
2026-01-18T05:21:55Z
2026-01-18T05:21:55Z
Yazar Gollmann, Dieter. editor. Freiling, Felix C. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-33383-5">http://dx.doi.org/10.1007/978-3-642-33383-5</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Security and Privacy in Mobile Information and Communication Systems 4th International Conference, MobiSec 2012, Frankfurt am Main, Germany, June 25-26, 2012, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:197367
2026-01-18T05:21:55Z
2026-01-18T05:21:55Z
Yazar Schmidt, Andreas U. editor. Russello, Giovanni. editor. Krontiris, Ioannis. editor. Lian, Shiguo. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-33392-7">http://dx.doi.org/10.1007/978-3-642-33392-7</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Progress in Cryptology – LATINCRYPT 2012 2nd International Conference on Cryptology and Information Security in Latin America, Santiago, Chile, October 7-10, 2012. Proceedings
ent://SD_ILS/0/SD_ILS:197384
2026-01-18T05:21:55Z
2026-01-18T05:21:55Z
Yazar Hevia, Alejandro. editor. Neven, Gregory. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-33481-8">http://dx.doi.org/10.1007/978-3-642-33481-8</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Network Computing and Information Security Second International Conference, NCIS 2012, Shanghai, China, December 7-9, 2012. Proceedings
ent://SD_ILS/0/SD_ILS:197580
2026-01-18T05:21:55Z
2026-01-18T05:21:55Z
Yazar Lei, Jingsheng. editor. Wang, Fu Lee. editor. Li, Mo. editor. Luo, Yuan. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-35211-9">http://dx.doi.org/10.1007/978-3-642-35211-9</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Information Security Applications 13th International Workshop, WISA 2012, Jeju Island, Korea, August 16-18, 2012, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:197604
2026-01-18T05:21:55Z
2026-01-18T05:21:55Z
Yazar Lee, Dong Hoon. editor. Yung, Moti. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-35416-8">http://dx.doi.org/10.1007/978-3-642-35416-8</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Information Systems Security 6th International Conference, ICISS 2010, Gandhinagar, India, December 17-19, 2010. Proceedings
ent://SD_ILS/0/SD_ILS:193686
2026-01-18T05:21:55Z
2026-01-18T05:21:55Z
Yazar Jha, Somesh. editor. Mathuria, Anish. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-17714-9">http://dx.doi.org/10.1007/978-3-642-17714-9</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Information Security 13th International Conference, ISC 2010, Boca Raton, FL, USA, October 25-28, 2010, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:193823
2026-01-18T05:21:55Z
2026-01-18T05:21:55Z
Yazar Burmester, Mike. editor. Tsudik, Gene. editor. Magliveras, Spyros. editor. Ilić, Ivana. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-18178-8">http://dx.doi.org/10.1007/978-3-642-18178-8</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Information Security 14th International Conference, ISC 2011, Xi’an, China, October 26-29, 2011. Proceedings
ent://SD_ILS/0/SD_ILS:195771
2026-01-18T05:21:55Z
2026-01-18T05:21:55Z
Yazar Lai, Xuejia. editor. Zhou, Jianying. editor. Li, Hui. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-24861-0">http://dx.doi.org/10.1007/978-3-642-24861-0</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Information and Communications Security 13th International Conference, ICICS 2011, Beijing, China, November 23-26, 2011. Proceedings
ent://SD_ILS/0/SD_ILS:195888
2026-01-18T05:21:55Z
2026-01-18T05:21:55Z
Yazar Qing, Sihan. editor. Susilo, Willy. editor. Wang, Guilin. editor. Liu, Dongmei. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-25243-3">http://dx.doi.org/10.1007/978-3-642-25243-3</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Information Theoretic Security 5th International Conference, ICITS 2011, Amsterdam, The Netherlands, May 21-24, 2011. Proceedings
ent://SD_ILS/0/SD_ILS:194466
2026-01-18T05:21:55Z
2026-01-18T05:21:55Z
Yazar Fehr, Serge. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-20728-0">http://dx.doi.org/10.1007/978-3-642-20728-0</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Information Security and Cryptology 6th International Conference, Inscrypt 2010, Shanghai, China, October 20-24, 2010, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:194726
2026-01-18T05:21:55Z
2026-01-18T05:21:55Z
Yazar Lai, Xuejia. editor. Yung, Moti. editor. Lin, Dongdai. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-21518-6">http://dx.doi.org/10.1007/978-3-642-21518-6</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Information Security Practice and Experience 7th International Conference, ISPEC 2011, Guangzhou, China, May 30 – June 1, 2011. Proceedings
ent://SD_ILS/0/SD_ILS:194568
2026-01-18T05:21:55Z
2026-01-18T05:21:55Z
Yazar Bao, Feng. editor. Weng, Jian. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-21031-0">http://dx.doi.org/10.1007/978-3-642-21031-0</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Information Security Theory and Practice. Security and Privacy of Mobile Devices in Wireless Communication 5th IFIP WG 11.2 International Workshop, WISTP 2011, Heraklion, Crete, Greece, June 1-3, 2011. Proceedings
ent://SD_ILS/0/SD_ILS:194571
2026-01-18T05:21:55Z
2026-01-18T05:21:55Z
Yazar Ardagna, Claudio A. editor. Zhou, Jianying. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-21040-2">http://dx.doi.org/10.1007/978-3-642-21040-2</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Information Security and Cryptology - ICISC 2010 13th International Conference, Seoul, Korea, December 1-3, 2010, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:195578
2026-01-18T05:21:55Z
2026-01-18T05:21:55Z
Yazar Rhee, Kyung-Hyune. editor. Nyang, DaeHun. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-24209-0">http://dx.doi.org/10.1007/978-3-642-24209-0</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Security Aspects in Information Technology First International Conference, InfoSecHiComNet 2011, Haldia, India, October 19-22, 2011. Proceedings
ent://SD_ILS/0/SD_ILS:195683
2026-01-18T05:21:55Z
2026-01-18T05:21:55Z
Yazar Joye, Marc. editor. Mukhopadhyay, Debdeep. editor. Tunstall, Michael. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-24586-2">http://dx.doi.org/10.1007/978-3-642-24586-2</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Advances in Cryptology – ASIACRYPT 2011 17th International Conference on the Theory and Application of Cryptology and Information Security, Seoul, South Korea, December 4-8, 2011. Proceedings
ent://SD_ILS/0/SD_ILS:195931
2026-01-18T05:21:55Z
2026-01-18T05:21:55Z
Yazar Lee, Dong Hoon. editor. Wang, Xiaoyun. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-25385-0">http://dx.doi.org/10.1007/978-3-642-25385-0</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Information Systems Security 7th International Conference, ICISS 2011, Kolkata, India, December 15-19, 2011, Procedings
ent://SD_ILS/0/SD_ILS:195982
2026-01-18T05:21:55Z
2026-01-18T05:21:55Z
Yazar Jajodia, Sushil. editor. Mazumdar, Chandan. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-25560-1">http://dx.doi.org/10.1007/978-3-642-25560-1</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Information Security Risk Management Risikomanagement mit ISO/IEC 27001, 27005 und 31010
ent://SD_ILS/0/SD_ILS:199932
2026-01-18T05:21:55Z
2026-01-18T05:21:55Z
Yazar Klipper, Sebastian. author. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-8348-9870-8">http://dx.doi.org/10.1007/978-3-8348-9870-8</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Information Security and Cryptology 5th International Conference, Inscrypt 2009, Beijing, China, December 12-15, 2009. Revised Selected Papers
ent://SD_ILS/0/SD_ILS:193265
2026-01-18T05:21:55Z
2026-01-18T05:21:55Z
Yazar Bao, Feng. editor. Yung, Moti. editor. Lin, Dongdai. editor. Jing, Jiwu. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-16342-5">http://dx.doi.org/10.1007/978-3-642-16342-5</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Information Security Applications 11th International Workshop, WISA 2010, Jeju Island, Korea, August 24-26, 2010, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:193761
2026-01-18T05:21:55Z
2026-01-18T05:21:55Z
Yazar Chung, Yongwha. editor. Yung, Moti. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-17955-6">http://dx.doi.org/10.1007/978-3-642-17955-6</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Computational Intelligence in Security for Information Systems 4th International Conference, CISIS 2011, Held at IWANN 2011, Torremolinos-Málaga, Spain, June 8-10, 2011. Proceedings
ent://SD_ILS/0/SD_ILS:194663
2026-01-18T05:21:55Z
2026-01-18T05:21:55Z
Yazar Herrero, Álvaro. editor. Corchado, Emilio. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-21323-6">http://dx.doi.org/10.1007/978-3-642-21323-6</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Advances in Information and Computer Security 6th International Workshop, IWSEC 2011, Tokyo, Japan, November 8-10, 2011. Proceedings
ent://SD_ILS/0/SD_ILS:195856
2026-01-18T05:21:55Z
2026-01-18T05:21:55Z
Yazar Iwata, Tetsu. editor. Nishigaki, Masakatsu. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-25141-2">http://dx.doi.org/10.1007/978-3-642-25141-2</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
ISSE 2010 Securing Electronic Business Processes Highlights of the Information Security Solutions Europe 2010 Conference
ent://SD_ILS/0/SD_ILS:199891
2026-01-18T05:21:55Z
2026-01-18T05:21:55Z
Yazar Pohlmann, Norbert. editor. Reimer, Helmut. editor. Schneider, Wolfgang. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-8348-9788-6">http://dx.doi.org/10.1007/978-3-8348-9788-6</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Security de-engineering : solving the problems in information risk management
ent://SD_ILS/0/SD_ILS:545608
2026-01-18T05:21:55Z
2026-01-18T05:21:55Z
Yazar Tibble, Ian., author.<br/>Yer Numarası HF5548.37 .T53 2011<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9781439868355">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>
Information Security and Digital Forensics First International Conference, ISDF 2009, London, United Kingdom, September 7-9, 2009, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:191714
2026-01-18T05:21:55Z
2026-01-18T05:21:55Z
Yazar Weerasinghe, Dasun. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-11530-1">http://dx.doi.org/10.1007/978-3-642-11530-1</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Information Security Theory and Practices. Security and Privacy of Pervasive Systems and Smart Devices 4th IFIP WG 11.2 International Workshop, WISTP 2010, Passau, Germany, April 12-14, 2010. Proceedings
ent://SD_ILS/0/SD_ILS:191973
2026-01-18T05:21:55Z
2026-01-18T05:21:55Z
Yazar Samarati, Pierangela. editor. Tunstall, Michael. editor. Posegga, Joachim. editor. Markantonakis, Konstantinos. editor. Sauveron, Damien. editor.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-12368-9">http://dx.doi.org/10.1007/978-3-642-12368-9</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Information Security, Practice and Experience 6th International Conference, ISPEC 2010, Seoul, Korea, May 12-13, 2010. Proceedings
ent://SD_ILS/0/SD_ILS:192123
2026-01-18T05:21:55Z
2026-01-18T05:21:55Z
Yazar Kwak, Jin. editor. Deng, Robert H. editor. Won, Yoojae. editor. Wang, Guilin. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-12827-1">http://dx.doi.org/10.1007/978-3-642-12827-1</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Information Security and Privacy 15th Australasian Conference, ACISP 2010, Sydney, Australia, July 5-7, 2010. Proceedings
ent://SD_ILS/0/SD_ILS:192544
2026-01-18T05:21:55Z
2026-01-18T05:21:55Z
Yazar Steinfeld, Ron. editor. Hawkes, Philip. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-14081-5">http://dx.doi.org/10.1007/978-3-642-14081-5</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Advances in Cryptology - ASIACRYPT 2010 16th International Conference on the Theory and Application of Cryptology and Information Security, Singapore, December 5-9, 2010. Proceedings
ent://SD_ILS/0/SD_ILS:193582
2026-01-18T05:21:55Z
2026-01-18T05:21:55Z
Yazar Abe, Masayuki. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-17373-8">http://dx.doi.org/10.1007/978-3-642-17373-8</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Information and Communications Security 12th International Conference, ICICS 2010, Barcelona, Spain, December 15-17, 2010. Proceedings
ent://SD_ILS/0/SD_ILS:193666
2026-01-18T05:21:55Z
2026-01-18T05:21:55Z
Yazar Soriano, Miguel. editor. Qing, Sihan. editor. López, Javier. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-17650-0">http://dx.doi.org/10.1007/978-3-642-17650-0</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Information, Security and Cryptology – ICISC 2009 12th International Conference, Seoul, Korea, December 2-4, 2009, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:192649
2026-01-18T05:21:55Z
2026-01-18T05:21:55Z
Yazar Lee, Donghoon. editor. Hong, Seokhie. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-14423-3">http://dx.doi.org/10.1007/978-3-642-14423-3</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Information Theoretic Security 4th International Conference, ICITS 2009, Shizuoka, Japan, December 3-6, 2009. Revised Selected Papers
ent://SD_ILS/0/SD_ILS:192673
2026-01-18T05:21:55Z
2026-01-18T05:21:55Z
Yazar Kurosawa, Kaoru. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-14496-7">http://dx.doi.org/10.1007/978-3-642-14496-7</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Advances in Information and Computer Security 5th International Workshop on Security, IWSEC 2010, Kobe, Japan, November 22-24, 2010. Proceedings
ent://SD_ILS/0/SD_ILS:193422
2026-01-18T05:21:55Z
2026-01-18T05:21:55Z
Yazar Echizen, Isao. editor. Kunihiro, Noboru. editor. Sasaki, Ryoichi. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-16825-3">http://dx.doi.org/10.1007/978-3-642-16825-3</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
ISSE 2009 Securing Electronic Business Processes Highlights of the Information Security Solutions Europe 2009 Conference
ent://SD_ILS/0/SD_ILS:199483
2026-01-18T05:21:55Z
2026-01-18T05:21:55Z
Yazar Pohlmann, Norbert. editor. Reimer, Helmut. editor. Schneider, Wolfgang. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-8348-9363-5">http://dx.doi.org/10.1007/978-3-8348-9363-5</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Managing Information Risk and the Economics of Security
ent://SD_ILS/0/SD_ILS:164782
2026-01-18T05:21:55Z
2026-01-18T05:21:55Z
Yazar Johnson, M. Eric. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-0-387-09762-6">http://dx.doi.org/10.1007/978-0-387-09762-6</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Information Security Theory and Practice. Smart Devices, Pervasive Systems, and Ubiquitous Networks Third IFIP WG 11.2 International Workshop, WISTP 2009, Brussels, Belgium, September 1-4, 2009, Proceedings
ent://SD_ILS/0/SD_ILS:190785
2026-01-18T05:21:55Z
2026-01-18T05:21:55Z
Yazar Markowitch, Olivier. editor. Bilas, Angelos. editor. Hoepman, Jaap-Henk. editor. Mitchell, Chris J. editor. Quisquater, Jean-Jacques. editor.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-03944-7">http://dx.doi.org/10.1007/978-3-642-03944-7</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Advances in Information and Computer Security 4th International Workshop on Security, IWSEC 2009 Toyama, Japan, October 28-30, 2009 Proceedings
ent://SD_ILS/0/SD_ILS:191078
2026-01-18T05:21:55Z
2026-01-18T05:21:55Z
Yazar Takagi, Tsuyoshi. editor. Mambo, Masahiro. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-04846-3">http://dx.doi.org/10.1007/978-3-642-04846-3</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Advances in Computer Science - ASIAN 2009. Information Security and Privacy 13th Asian Computing Science Conference, Seoul, Korea, December 14-16, 2009. Proceedings
ent://SD_ILS/0/SD_ILS:191425
2026-01-18T05:21:55Z
2026-01-18T05:21:55Z
Yazar Datta, Anupam. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-10622-4">http://dx.doi.org/10.1007/978-3-642-10622-4</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Information Systems Security 5th International Conference, ICISS 2009 Kolkata, India, December 14-18, 2009 Proceedings
ent://SD_ILS/0/SD_ILS:191472
2026-01-18T05:21:55Z
2026-01-18T05:21:55Z
Yazar Prakash, Atul. editor. Sen Gupta, Indranil. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-10772-6">http://dx.doi.org/10.1007/978-3-642-10772-6</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Information Security Applications 9th International Workshop, WISA 2008, Jeju Island, Korea, September 23-25, 2008, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:189648
2026-01-18T05:21:55Z
2026-01-18T05:21:55Z
Yazar Chung, Kyo-Il. editor. Sohn, Kiwook. editor. Yung, Moti. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-00306-6">http://dx.doi.org/10.1007/978-3-642-00306-6</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Information Security Practice and Experience 5th International Conference, ISPEC 2009 Xi’an, China, April 13-15, 2009 Proceedings
ent://SD_ILS/0/SD_ILS:189810
2026-01-18T05:21:55Z
2026-01-18T05:21:55Z
Yazar Bao, Feng. editor. Li, Hui. editor. Wang, Guilin. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-00843-6">http://dx.doi.org/10.1007/978-3-642-00843-6</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Information and Communications Security 11th International Conference, ICICS 2009, Beijing, China, December 14-17, 2009. Proceedings
ent://SD_ILS/0/SD_ILS:191592
2026-01-18T05:21:55Z
2026-01-18T05:21:55Z
Yazar Qing, Sihan. editor. Mitchell, Chris J. editor. Wang, Guilin. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-11145-7">http://dx.doi.org/10.1007/978-3-642-11145-7</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Information Security Applications 10th International Workshop, WISA 2009, Busan, Korea, August 25-27, 2009, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:191491
2026-01-18T05:21:55Z
2026-01-18T05:21:55Z
Yazar Youm, Heung Youl. editor. Yung, Moti. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-10838-9">http://dx.doi.org/10.1007/978-3-642-10838-9</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Information Security and Cryptology – ICISC 2008 11th International Conference, Seoul, Korea, December 3-5, 2008, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:189787
2026-01-18T05:21:55Z
2026-01-18T05:21:55Z
Yazar Lee, Pil Joong. editor. Cheon, Jung Hee. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-00730-9">http://dx.doi.org/10.1007/978-3-642-00730-9</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Emerging Challenges for Security, Privacy and Trust 24th IFIP TC 11 International Information Security Conference, SEC 2009, Pafos, Cyprus, May 18–20, 2009. Proceedings
ent://SD_ILS/0/SD_ILS:189928
2026-01-18T05:21:55Z
2026-01-18T05:21:55Z
Yazar Gritzalis, Dimitris. editor. Lopez, Javier. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-01244-0">http://dx.doi.org/10.1007/978-3-642-01244-0</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Information Security and Cryptology 4th International Conference, Inscrypt 2008, Beijing, China, December 14-17, 2008, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:189996
2026-01-18T05:21:55Z
2026-01-18T05:21:55Z
Yazar Yung, Moti. editor. Liu, Peng. editor. Lin, Dongdai. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-01440-6">http://dx.doi.org/10.1007/978-3-642-01440-6</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Information Security and Privacy 14th Australasian Conference, ACISP 2009 Brisbane, Australia, July 1-3, 2009 Proceedings
ent://SD_ILS/0/SD_ILS:190378
2026-01-18T05:21:55Z
2026-01-18T05:21:55Z
Yazar Boyd, Colin. editor. González Nieto, Juan. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-02620-1">http://dx.doi.org/10.1007/978-3-642-02620-1</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Information Security 12th International Conference, ISC 2009, Pisa, Italy, September 7-9, 2009. Proceedings
ent://SD_ILS/0/SD_ILS:190962
2026-01-18T05:21:55Z
2026-01-18T05:21:55Z
Yazar Samarati, Pierangela. editor. Yung, Moti. editor. Martinelli, Fabio. editor. Ardagna, Claudio A. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-04474-8">http://dx.doi.org/10.1007/978-3-642-04474-8</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Information Theoretic Security Second International Conference, ICITS 2007, Madrid, Spain, May 25-29, 2007, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:191307
2026-01-18T05:21:55Z
2026-01-18T05:21:55Z
Yazar Desmedt, Yvo. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-10230-1">http://dx.doi.org/10.1007/978-3-642-10230-1</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Protecting Persons While Protecting the People Second Annual Workshop on Information Privacy and National Security, ISIPS 2008, New Brunswick, NJ, USA, May 12, 2008. Revised Selected Papers
ent://SD_ILS/0/SD_ILS:191308
2026-01-18T05:21:55Z
2026-01-18T05:21:55Z
Yazar Gal, Cecilia S. editor. Kantor, Paul B. editor. Lesk, Michael E. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-10233-2">http://dx.doi.org/10.1007/978-3-642-10233-2</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Advances in Cryptology – ASIACRYPT 2009 15th International Conference on the Theory and Application of Cryptology and Information Security, Tokyo, Japan, December 6-10, 2009. Proceedings
ent://SD_ILS/0/SD_ILS:191346
2026-01-18T05:21:55Z
2026-01-18T05:21:55Z
Yazar Matsui, Mitsuru. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-10366-7">http://dx.doi.org/10.1007/978-3-642-10366-7</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
ISSE 2008 Securing Electronic Business Processes Highlights of the Information Security Solutions Europe 2008 Conference
ent://SD_ILS/0/SD_ILS:199411
2026-01-18T05:21:55Z
2026-01-18T05:21:55Z
Yazar Pohlmann, Norbert. editor. Reimer, Helmut. editor. Schneider, Wolfgang. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-8348-9283-6">http://dx.doi.org/10.1007/978-3-8348-9283-6</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Information security governance a practical development and implementation approach
ent://SD_ILS/0/SD_ILS:297743
2026-01-18T05:21:55Z
2026-01-18T05:21:55Z
Yazar Brotby, W. Krag.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim Ebook Library <a href="http://public.eblib.com/EBLPublic/PublicView.do?ptiID=433807">http://public.eblib.com/EBLPublic/PublicView.do?ptiID=433807</a>
John Wiley <a href="http://dx.doi.org/10.1002/9780470476017">http://dx.doi.org/10.1002/9780470476017</a>
<a href="http://site.ebrary.com/lib/alltitles/Doc?id=10313652">http://site.ebrary.com/lib/alltitles/Doc?id=10313652</a>
<a href="http://swb.eblib.com/patron/FullRecord.aspx?p=433807">http://swb.eblib.com/patron/FullRecord.aspx?p=433807</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Information security management metrics : a definitive guide to effective security monitoring and measurement
ent://SD_ILS/0/SD_ILS:546952
2026-01-18T05:21:55Z
2026-01-18T05:21:55Z
Yazar Brotby, W. Krag., author.<br/>Yer Numarası HD30.2 .B78 2009<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9781420052862">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>
Proceedings of The Ifip Tc 11 23rd International Information Security Conference IFIP 20th World Computer Congress, IFIP SEC’08, September 7-10, 2008, Milano, Italy
ent://SD_ILS/0/SD_ILS:164757
2026-01-18T05:21:55Z
2026-01-18T05:21:55Z
Yazar Jajodia, Sushil. editor. Samarati, Pierangela. editor. Cimato, Stelvio. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-0-387-09699-5">http://dx.doi.org/10.1007/978-0-387-09699-5</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Information Security and Cryptology Third SKLOIS Conference, Inscrypt 2007, Xining, China, August 31 - September 5, 2007, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:188456
2026-01-18T05:21:55Z
2026-01-18T05:21:55Z
Yazar Pei, Dingyi. editor. Yung, Moti. editor. Lin, Dongdai. editor. Wu, Chuankun. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-540-79499-8">http://dx.doi.org/10.1007/978-3-540-79499-8</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Information Theoretic Security Third International Conference, ICITS 2008, Calgary, Canada, August 10-13, 2008. Proceedings
ent://SD_ILS/0/SD_ILS:188588
2026-01-18T05:21:55Z
2026-01-18T05:21:55Z
Yazar Safavi-Naini, Reihaneh. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-540-85093-9">http://dx.doi.org/10.1007/978-3-540-85093-9</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Advances in Information and Computer Security Third International Workshop on Security, IWSEC 2008, Kagawa, Japan, November 25-27, 2008. Proceedings
ent://SD_ILS/0/SD_ILS:189294
2026-01-18T05:21:55Z
2026-01-18T05:21:55Z
Yazar Matsuura, Kanta. editor. Fujisaki, Eiichiro. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-540-89598-5">http://dx.doi.org/10.1007/978-3-540-89598-5</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Information Systems Security 4th International Conference, ICISS 2008, Hyderabad, India, December 16-20, 2008. Proceedings
ent://SD_ILS/0/SD_ILS:189347
2026-01-18T05:21:55Z
2026-01-18T05:21:55Z
Yazar Sekar, R. editor. Pujari, Arun K. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-540-89862-7">http://dx.doi.org/10.1007/978-3-540-89862-7</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Information Security and Privacy 13th Australasian Conference, ACISP 2008, Wollongong, Australia, July 7-9, 2008. Proceedings
ent://SD_ILS/0/SD_ILS:185962
2026-01-18T05:21:55Z
2026-01-18T05:21:55Z
Yazar Mu, Yi. editor. Susilo, Willy. editor. Seberry, Jennifer. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-540-70500-0">http://dx.doi.org/10.1007/978-3-540-70500-0</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Information Security Practice and Experience 4th International Conference, ISPEC 2008 Sydney, Australia, April 21-23, 2008 Proceedings
ent://SD_ILS/0/SD_ILS:188336
2026-01-18T05:21:55Z
2026-01-18T05:21:55Z
Yazar Chen, Liqun. editor. Mu, Yi. editor. Susilo, Willy. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-540-79104-1">http://dx.doi.org/10.1007/978-3-540-79104-1</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Information Security Theory and Practices. Smart Devices, Convergence and Next Generation Networks Second IFIP WG 11.2 International Workshop, WISTP 2008, Seville, Spain, May 13-16, 2008. Proceedings
ent://SD_ILS/0/SD_ILS:188543
2026-01-18T05:21:55Z
2026-01-18T05:21:55Z
Yazar Onieva, Jose A. editor. Sauveron, Damien. editor. Chaumette, Serge. editor. Gollmann, Dieter. editor. Markantonakis, Konstantinos. editor.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-540-79966-5">http://dx.doi.org/10.1007/978-3-540-79966-5</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Critical Information Infrastructures Security Second International Workshop, CRITIS 2007, Málaga, Spain, October 3-5, 2007. Revised Papers
ent://SD_ILS/0/SD_ILS:189212
2026-01-18T05:21:55Z
2026-01-18T05:21:55Z
Yazar Lopez, Javier. editor. Hämmerli, Bernhard M. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-540-89173-4">http://dx.doi.org/10.1007/978-3-540-89173-4</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Advances in Cryptology - ASIACRYPT 2008 14th International Conference on the Theory and Application of Cryptology and Information Security, Melbourne, Australia, December 7-11, 2008. Proceedings
ent://SD_ILS/0/SD_ILS:189234
2026-01-18T05:21:55Z
2026-01-18T05:21:55Z
Yazar Pieprzyk, Josef. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-540-89255-7">http://dx.doi.org/10.1007/978-3-540-89255-7</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Information Security 11th International Conference, ISC 2008, Taipei, Taiwan, September 15-18, 2008. Proceedings
ent://SD_ILS/0/SD_ILS:188801
2026-01-18T05:21:55Z
2026-01-18T05:21:55Z
Yazar Wu, Tzong-Chen. editor. Lei, Chin-Laung. editor. Rijmen, Vincent. editor. Lee, Der-Tsai. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-540-85886-7">http://dx.doi.org/10.1007/978-3-540-85886-7</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Information and Communications Security 10th International Conference, ICICS 2008 Birmingham, UK, October 20 - 22, 2008 Proceedings
ent://SD_ILS/0/SD_ILS:189090
2026-01-18T05:21:55Z
2026-01-18T05:21:55Z
Yazar Chen, Liqun. editor. Ryan, Mark D. editor. Wang, Guilin. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-540-88625-9">http://dx.doi.org/10.1007/978-3-540-88625-9</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Information Security Practice and Experience Third International Conference, ISPEC 2007, Hong Kong, China, May 7-9, 2007. Proceedings
ent://SD_ILS/0/SD_ILS:186461
2026-01-18T05:21:55Z
2026-01-18T05:21:55Z
Yazar Dawson, Ed. editor. Wong, Duncan S. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-540-72163-5">http://dx.doi.org/10.1007/978-3-540-72163-5</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Information Security and Privacy 12th Australasian Conference, ACISP 2007, Townsville, Australia, July 2-4, 2007. Proceedings
ent://SD_ILS/0/SD_ILS:186859
2026-01-18T05:21:55Z
2026-01-18T05:21:55Z
Yazar Pieprzyk, Josef. editor. Ghodosi, Hossein. editor. Dawson, Ed. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-540-73458-1">http://dx.doi.org/10.1007/978-3-540-73458-1</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Information Security and Cryptology - ICISC 2007 10th International Conference, Seoul, Korea, November 29-30, 2007. Proceedings
ent://SD_ILS/0/SD_ILS:187681
2026-01-18T05:21:55Z
2026-01-18T05:21:55Z
Yazar Nam, Kil-Hyun. editor. Rhee, Gwangsoo. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-540-76788-6">http://dx.doi.org/10.1007/978-3-540-76788-6</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
New Approaches for Security, Privacy and Trust in Complex Environments Proceedings of the IFIP TC-11 22nd International Information Security Conference (SEC 2007), 14–16 May 2007, Sandton, South Africa
ent://SD_ILS/0/SD_ILS:166940
2026-01-18T05:21:55Z
2026-01-18T05:21:55Z
Yazar Venter, Hein. editor. Eloff, Mariki. editor. Labuschagne, Les. editor. Eloff, Jan. editor. Solms, Rossouw. editor.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-0-387-72367-9">http://dx.doi.org/10.1007/978-0-387-72367-9</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Fifth World Conference on Information Security Education Proceedings of the IFIP TC11 WG 11.8, WISE 5, 19 to 21 June 2007, United States Military Academy, West Point, New York, USA
ent://SD_ILS/0/SD_ILS:167038
2026-01-18T05:21:55Z
2026-01-18T05:21:55Z
Yazar Futcher, Lynn. editor. Dodge, Ronald. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-0-387-73269-5">http://dx.doi.org/10.1007/978-0-387-73269-5</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Information Security Theory and Practices. Smart Cards, Mobile and Ubiquitous Computing Systems First IFIP TC6 / WG 8.8 / WG 11.2 International Workshop, WISTP 2007, Heraklion, Crete, Greece, May 9-11, 2007. Proceedings
ent://SD_ILS/0/SD_ILS:186513
2026-01-18T05:21:55Z
2026-01-18T05:21:55Z
Yazar Sauveron, Damien. editor. Markantonakis, Konstantinos. editor. Bilas, Angelos. editor. Quisquater, Jean-Jacques. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-540-72354-7">http://dx.doi.org/10.1007/978-3-540-72354-7</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Advances in Information and Computer Security Second International Workshop on Security, IWSEC 2007, Nara, Japan, October 29-31, 2007. Proceedings
ent://SD_ILS/0/SD_ILS:187467
2026-01-18T05:21:55Z
2026-01-18T05:21:55Z
Yazar Miyaji, Atsuko. editor. Kikuchi, Hiroaki. editor. Rannenberg, Kai. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-540-75651-4">http://dx.doi.org/10.1007/978-3-540-75651-4</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Advances in Cryptology – ASIACRYPT 2007 13th International Conference on the Theory and Application of Cryptology and Information Security, Kuching, Malaysia, December 2-6, 2007. Proceedings
ent://SD_ILS/0/SD_ILS:187720
2026-01-18T05:21:55Z
2026-01-18T05:21:55Z
Yazar Kurosawa, Kaoru. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-540-76900-2">http://dx.doi.org/10.1007/978-3-540-76900-2</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Information Systems Security Third International Conference, ICISS 2007, Delhi, India, December 16-20, 2007. Proceedings
ent://SD_ILS/0/SD_ILS:187790
2026-01-18T05:21:55Z
2026-01-18T05:21:55Z
Yazar McDaniel, Patrick. editor. Gupta, Shyam K. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-540-77086-2">http://dx.doi.org/10.1007/978-3-540-77086-2</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Information Security Applications 8th International Workshop, WISA 2007, Jeju Island, Korea, August 27-29, 2007, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:187904
2026-01-18T05:21:55Z
2026-01-18T05:21:55Z
Yazar Kim, Sehun. editor. Yung, Moti. editor. Lee, Hyung-Woo. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-540-77535-5">http://dx.doi.org/10.1007/978-3-540-77535-5</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Information Security Applications 7th International Workshop, WISA 2006, Jeju Island, Korea, August 28-30, 2006, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:186175
2026-01-18T05:21:55Z
2026-01-18T05:21:55Z
Yazar Lee, Jae Kwang. editor. Yi, Okyeon. editor. Yung, Moti. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-540-71093-6">http://dx.doi.org/10.1007/978-3-540-71093-6</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Information and Communications Security 9th International Conference, ICICS 2007, Zhengzhou, China, December 12-15, 2007. Proceedings
ent://SD_ILS/0/SD_ILS:187773
2026-01-18T05:21:55Z
2026-01-18T05:21:55Z
Yazar Qing, Sihan. editor. Imai, Hideki. editor. Wang, Guilin. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-540-77048-0">http://dx.doi.org/10.1007/978-3-540-77048-0</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Information Security and Cryptology – ICISC 2006 9th International Conference, Busan, Korea, November 30 - December 1, 2006. Proceedings
ent://SD_ILS/0/SD_ILS:185180
2026-01-18T05:21:55Z
2026-01-18T05:21:55Z
Yazar Rhee, Min Surp. editor. Lee, Byoungcheon. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/11927587">http://dx.doi.org/10.1007/11927587</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Advances in Cryptology – ASIACRYPT 2006 12th International Conference on the Theory and Application of Cryptology and Information Security, Shanghai, China, December 3-7, 2006. Proceedings
ent://SD_ILS/0/SD_ILS:185214
2026-01-18T05:21:55Z
2026-01-18T05:21:55Z
Yazar Lai, Xuejia. editor. Chen, Kefei. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/11935230">http://dx.doi.org/10.1007/11935230</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Information and Communications Security 8th International Conference, ICICS 2006, Raleigh, NC, USA, December 4-7, 2006. Proceedings
ent://SD_ILS/0/SD_ILS:185217
2026-01-18T05:21:55Z
2026-01-18T05:21:55Z
Yazar Ning, Peng. editor. Qing, Sihan. editor. Li, Ninghui. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/11935308">http://dx.doi.org/10.1007/11935308</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Information Security and Cryptology Second SKLOIS Conference, Inscrypt 2006, Beijing, China, November 29 - December 1, 2006. Proceedings
ent://SD_ILS/0/SD_ILS:185235
2026-01-18T05:21:55Z
2026-01-18T05:21:55Z
Yazar Lipmaa, Helger. editor. Yung, Moti. editor. Lin, Dongdai. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/11937807">http://dx.doi.org/10.1007/11937807</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Information Systems Security Second International Conference, ICISS 2006, Kolkata, India, December 19-21, 2006. Proceedings
ent://SD_ILS/0/SD_ILS:185666
2026-01-18T05:21:55Z
2026-01-18T05:21:55Z
Yazar Bagchi, Aditya. editor. Atluri, Vijayalakshmi. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/11961635">http://dx.doi.org/10.1007/11961635</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Critical Information Infrastructures Security First International Workshop, CRITIS 2006, Samos, Greece, August 31 - September 1, 2006. Revised Papers
ent://SD_ILS/0/SD_ILS:185707
2026-01-18T05:21:55Z
2026-01-18T05:21:55Z
Yazar Lopez, Javier. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/11962977">http://dx.doi.org/10.1007/11962977</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Implementing database security and auditing a guide for DBAs, information security administrators and auditors
ent://SD_ILS/0/SD_ILS:253860
2026-01-18T05:21:55Z
2026-01-18T05:21:55Z
Yazar Ben-Natan, Ron.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781555583347">http://www.sciencedirect.com/science/book/9781555583347</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Information security policies and procedures : a practitioner's reference
ent://SD_ILS/0/SD_ILS:547228
2026-01-18T05:21:55Z
2026-01-18T05:21:55Z
Yazar Peltier, Thomas R., author.<br/>Yer Numarası QA76.9 .A25 P428 2004<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9780203488737">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>
Information security policies, procedures, and standards : guidelines for effective information security management
ent://SD_ILS/0/SD_ILS:546817
2026-01-18T05:21:55Z
2026-01-18T05:21:55Z
Yazar Peltier, Thomas R., author.<br/>Yer Numarası QA76.9 .A25 P46 2002<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9780849390326">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>
Malicious Attack Propagation and Source Identification
ent://SD_ILS/0/SD_ILS:482633
2026-01-18T05:21:55Z
2026-01-18T05:21:55Z
Yazar Jiang, Jiaojiao. author. Wen, Sheng. author. Liu, Bo. author. Yu, Shui. author. Xiang, Yang. author.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-030-02179-5">https://doi.org/10.1007/978-3-030-02179-5</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Cloud Security Auditing
ent://SD_ILS/0/SD_ILS:483467
2026-01-18T05:21:55Z
2026-01-18T05:21:55Z
Yazar Majumdar, Suryadipta. author. (orcid)0000-0002-6501-4214 Madi, Taous. author. Wang, Yushun. author. Tabiban, Azadeh. author. Oqaily, Momen. author.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-030-23128-6">https://doi.org/10.1007/978-3-030-23128-6</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Industrial Control Systems Security and Resiliency Practice and Theory
ent://SD_ILS/0/SD_ILS:484767
2026-01-18T05:21:55Z
2026-01-18T05:21:55Z
Yazar Rieger, Craig. editor. Ray, Indrajit. editor. Zhu, Quanyan. editor. Haney, Michael A. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-030-18214-4">https://doi.org/10.1007/978-3-030-18214-4</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Proactive and Dynamic Network Defense
ent://SD_ILS/0/SD_ILS:486655
2026-01-18T05:21:55Z
2026-01-18T05:21:55Z
Yazar Wang, Cliff. editor. Lu, Zhuo. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-030-10597-6">https://doi.org/10.1007/978-3-030-10597-6</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Smart Micro-Grid Systems Security and Privacy
ent://SD_ILS/0/SD_ILS:399573
2026-01-18T05:21:55Z
2026-01-18T05:21:55Z
Yazar Kayem, Anne V. D. M. editor. Wolthusen, Stephen D. editor. Meinel, Christoph. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-319-91427-5">https://doi.org/10.1007/978-3-319-91427-5</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Versatile Cybersecurity
ent://SD_ILS/0/SD_ILS:399974
2026-01-18T05:21:55Z
2026-01-18T05:21:55Z
Yazar Conti, Mauro. editor. (orcid)0000-0002-3612-1934 Somani, Gaurav. editor. Poovendran, Radha. editor. (orcid)0000-0003-0269-8097 SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-319-97643-3">https://doi.org/10.1007/978-3-319-97643-3</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Cyber Threat Intelligence
ent://SD_ILS/0/SD_ILS:400906
2026-01-18T05:21:55Z
2026-01-18T05:21:55Z
Yazar Dehghantanha, Ali. editor. Conti, Mauro. editor. (orcid)0000-0002-3612-1934 Dargahi, Tooska. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-319-73951-9">https://doi.org/10.1007/978-3-319-73951-9</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Moving Target Defense II Application of Game Theory and Adversarial Modeling
ent://SD_ILS/0/SD_ILS:331766
2026-01-18T05:21:55Z
2026-01-18T05:21:55Z
Yazar Jajodia, Sushil. editor. Ghosh, Anup K. editor. Subrahmanian, V.S. editor. Swarup, Vipin. editor. Wang, Cliff. editor.<br/>Yer Numarası ONLINE(331766.1)<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-1-4614-5416-8">http://dx.doi.org/10.1007/978-1-4614-5416-8</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Iris Biometrics From Segmentation to Template Security
ent://SD_ILS/0/SD_ILS:331810
2026-01-18T05:21:55Z
2026-01-18T05:21:55Z
Yazar Rathgeb, Christian. author. Uhl, Andreas. author. Wild, Peter. author. SpringerLink (Online service)<br/>Yer Numarası ONLINE(331810.1)<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-1-4614-5571-4">http://dx.doi.org/10.1007/978-1-4614-5571-4</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Spyware and Adware
ent://SD_ILS/0/SD_ILS:167516
2026-01-18T05:21:55Z
2026-01-18T05:21:55Z
Yazar Aycock, John. author. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-0-387-77741-2">http://dx.doi.org/10.1007/978-0-387-77741-2</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Preserving Privacy in Data Outsourcing
ent://SD_ILS/0/SD_ILS:172941
2026-01-18T05:21:55Z
2026-01-18T05:21:55Z
Yazar Foresti, Sara. author. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-1-4419-7659-8">http://dx.doi.org/10.1007/978-1-4419-7659-8</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Moving Target Defense Creating Asymmetric Uncertainty for Cyber Threats
ent://SD_ILS/0/SD_ILS:173823
2026-01-18T05:21:55Z
2026-01-18T05:21:55Z
Yazar Jajodia, Sushil. editor. Ghosh, Anup K. editor. Swarup, Vipin. editor. Wang, Cliff. editor. Wang, X. Sean. editor.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-1-4614-0977-9">http://dx.doi.org/10.1007/978-1-4614-0977-9</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Network Intrusion Detection and Prevention Concepts and Techniques
ent://SD_ILS/0/SD_ILS:167906
2026-01-18T05:21:55Z
2026-01-18T05:21:55Z
Yazar Ghorbani, Ali A. author. Lu, Wei. author. Tavallaee, Mahbod. author. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-0-387-88771-5">http://dx.doi.org/10.1007/978-0-387-88771-5</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Encryption for Digital Content
ent://SD_ILS/0/SD_ILS:171850
2026-01-18T05:21:55Z
2026-01-18T05:21:55Z
Yazar Kiayias, Aggelos. author. Pehlivanoglu, Serdar. author. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-1-4419-0044-9">http://dx.doi.org/10.1007/978-1-4419-0044-9</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Cyber Situational Awareness Issues and Research
ent://SD_ILS/0/SD_ILS:171874
2026-01-18T05:21:55Z
2026-01-18T05:21:55Z
Yazar Jajodia, Sushil. editor. Liu, Peng. editor. Swarup, Vipin. editor. Wang, Cliff. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-1-4419-0140-8">http://dx.doi.org/10.1007/978-1-4419-0140-8</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Insider Threats in Cyber Security
ent://SD_ILS/0/SD_ILS:172782
2026-01-18T05:21:55Z
2026-01-18T05:21:55Z
Yazar Probst, Christian W. editor. Hunker, Jeffrey. editor. Gollmann, Dieter. editor. Bishop, Matt. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-1-4419-7133-3">http://dx.doi.org/10.1007/978-1-4419-7133-3</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Global Initiatives to Secure Cyberspace An Emerging Landscape
ent://SD_ILS/0/SD_ILS:164783
2026-01-18T05:21:55Z
2026-01-18T05:21:55Z
Yazar Portnoy, Michael. editor. Goodman, Seymour. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-0-387-09764-0">http://dx.doi.org/10.1007/978-0-387-09764-0</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Primality Testing and Integer Factorization in Public-Key Cryptography
ent://SD_ILS/0/SD_ILS:167452
2026-01-18T05:21:55Z
2026-01-18T05:21:55Z
Yazar Yan, Song Y. author. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-0-387-77268-4">http://dx.doi.org/10.1007/978-0-387-77268-4</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Security and Dependability for Ambient Intelligence
ent://SD_ILS/0/SD_ILS:167907
2026-01-18T05:21:55Z
2026-01-18T05:21:55Z
Yazar Kokolakis, Spyros. editor. Gómez, Antonio Maña. editor. Spanoudakis, George. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-0-387-88775-3">http://dx.doi.org/10.1007/978-0-387-88775-3</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Identifying Malicious Code Through Reverse Engineering
ent://SD_ILS/0/SD_ILS:167947
2026-01-18T05:21:55Z
2026-01-18T05:21:55Z
Yazar Singh, Abhishek. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-0-387-89468-3">http://dx.doi.org/10.1007/978-0-387-89468-3</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Secure Multi-Party Non-Repudiation Protocols and Applications
ent://SD_ILS/0/SD_ILS:167284
2026-01-18T05:21:55Z
2026-01-18T05:21:55Z
Yazar Onieva, José A. author. Lopez, Javier. author. Zhou, Jianying. author. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-0-387-75630-1">http://dx.doi.org/10.1007/978-0-387-75630-1</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Secure Key Establishment
ent://SD_ILS/0/SD_ILS:167859
2026-01-18T05:21:55Z
2026-01-18T05:21:55Z
Yazar Choo, Kim-Kwang Raymond. author. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-0-387-87969-7">http://dx.doi.org/10.1007/978-0-387-87969-7</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Intrusion Detection Systems
ent://SD_ILS/0/SD_ILS:167451
2026-01-18T05:21:55Z
2026-01-18T05:21:55Z
Yazar Mancini, Luigi V. editor. Pietro, Roberto. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-0-387-77265-3">http://dx.doi.org/10.1007/978-0-387-77265-3</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Insider Attack and Cyber Security Beyond the Hacker
ent://SD_ILS/0/SD_ILS:167459
2026-01-18T05:21:55Z
2026-01-18T05:21:55Z
Yazar Stolfo, Salvatore J. editor. Bellovin, Steven M. editor. Keromytis, Angelos D. editor. Hershkop, Shlomo. editor. Smith, Sean W. editor.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-0-387-77322-3">http://dx.doi.org/10.1007/978-0-387-77322-3</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Security for Telecommunications Networks
ent://SD_ILS/0/SD_ILS:166945
2026-01-18T05:21:55Z
2026-01-18T05:21:55Z
Yazar Traynor, Patrick. author. McDaniel, Patrick. author. Porta, Thomas La. author. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-0-387-72442-3">http://dx.doi.org/10.1007/978-0-387-72442-3</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Vulnerability Analysis and Defense for the Internet
ent://SD_ILS/0/SD_ILS:167162
2026-01-18T05:21:55Z
2026-01-18T05:21:55Z
Yazar Singh, Abhishek. editor. Singh, Baibhav. editor. Joseph, Hirosh. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-0-387-74390-5">http://dx.doi.org/10.1007/978-0-387-74390-5</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Botnet Detection Countering the Largest Security Threat
ent://SD_ILS/0/SD_ILS:166626
2026-01-18T05:21:55Z
2026-01-18T05:21:55Z
Yazar Lee, Wenke. editor. Wang, Cliff. editor. Dagon, David. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-0-387-68768-1">http://dx.doi.org/10.1007/978-0-387-68768-1</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Privacy-Respecting Intrusion Detection
ent://SD_ILS/0/SD_ILS:166560
2026-01-18T05:21:55Z
2026-01-18T05:21:55Z
Yazar Flegel, Ulrich. author. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-0-387-68254-9">http://dx.doi.org/10.1007/978-0-387-68254-9</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Data Warehousing and Data Mining Techniques for Cyber Security
ent://SD_ILS/0/SD_ILS:166379
2026-01-18T05:21:55Z
2026-01-18T05:21:55Z
Yazar Singhal, Anoop. author. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-0-387-47653-7">http://dx.doi.org/10.1007/978-0-387-47653-7</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Introduction to Cryptography Principles and Applications
ent://SD_ILS/0/SD_ILS:185185
2026-01-18T05:21:55Z
2026-01-18T05:21:55Z
Yazar Delfs, Hans. author. Knebl, Helmut. author. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/3-540-49244-5">http://dx.doi.org/10.1007/3-540-49244-5</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Formal Correctness of Security Protocols With 62 Figures and 4 Tables
ent://SD_ILS/0/SD_ILS:185368
2026-01-18T05:21:55Z
2026-01-18T05:21:55Z
Yazar Bella, Giampaolo. author. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-540-68136-6">http://dx.doi.org/10.1007/978-3-540-68136-6</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Privacy in practice : establish and operationalize a holistic data privacy program
ent://SD_ILS/0/SD_ILS:560699
2026-01-18T05:21:55Z
2026-01-18T05:21:55Z
Yazar Tang, Alan, (Information Security), author.<br/>Yer Numarası HF5548.37<br/>Elektronik Erişim Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003225089">https://www.taylorfrancis.com/books/9781003225089</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Artificial intelligence technology in healthcare : security and privacy issues
ent://SD_ILS/0/SD_ILS:574411
2026-01-18T05:21:55Z
2026-01-18T05:21:55Z
Yazar Sharma, Neha (Computer scientist), editor. Srivastava, Durgesh (Computer scientist), editor. Sinwar, Deepak, editor.<br/>Yer Numarası R859.7 .A78<br/>Elektronik Erişim Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003377818">https://www.taylorfrancis.com/books/9781003377818</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Cyber Security Intelligence and Analytics The 5th International Conference on Cyber Security Intelligence and Analytics (CSIA 2023), Volume 2
ent://SD_ILS/0/SD_ILS:526849
2026-01-18T05:21:55Z
2026-01-18T05:21:55Z
Yazar Xu, Zheng. editor. Alrabaee, Saed. editor. Loyola-González, Octavio. editor. Cahyani, Niken Dwi Wahyu. editor. Ab Rahman, Nurul Hidayah. editor.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-031-31775-0">https://doi.org/10.1007/978-3-031-31775-0</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Cyber Security Intelligence and Analytics The 5th International Conference on Cyber Security Intelligence and Analytics (CSIA 2023), Volume 1
ent://SD_ILS/0/SD_ILS:526850
2026-01-18T05:21:55Z
2026-01-18T05:21:55Z
Yazar Xu, Zheng. editor. Alrabaee, Saed. editor. Loyola-González, Octavio. editor. Cahyani, Niken Dwi Wahyu. editor. Ab Rahman, Nurul Hidayah. editor.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-031-31860-3">https://doi.org/10.1007/978-3-031-31860-3</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Next Generation of Internet of Things Proceedings of ICNGIoT 2022
ent://SD_ILS/0/SD_ILS:526873
2026-01-18T05:21:55Z
2026-01-18T05:21:55Z
Yazar Kumar, Raghvendra. editor. Pattnaik, Prasant Kumar. editor. R. S. Tavares, João Manuel. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-981-19-1412-6">https://doi.org/10.1007/978-981-19-1412-6</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Soft Computing for Security Applications Proceedings of ICSCS 2022
ent://SD_ILS/0/SD_ILS:526883
2026-01-18T05:21:55Z
2026-01-18T05:21:55Z
Yazar Ranganathan, G. editor. Fernando, Xavier. editor. Piramuthu, Selwyn. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-981-19-3590-9">https://doi.org/10.1007/978-981-19-3590-9</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Proceedings of Data Analytics and Management ICDAM 2022
ent://SD_ILS/0/SD_ILS:527638
2026-01-18T05:21:55Z
2026-01-18T05:21:55Z
Yazar Khanna, Ashish. editor. Polkowski, Zdzislaw. editor. Castillo, Oscar. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-981-19-7615-5">https://doi.org/10.1007/978-981-19-7615-5</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Technological Trends in the AI Economy International Review and Ways of Adaptation
ent://SD_ILS/0/SD_ILS:527596
2026-01-18T05:21:55Z
2026-01-18T05:21:55Z
Yazar Makarenko, Elena N. editor. Vovchenko, Natalia G. editor. Tishchenko, Evgeny N. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-981-19-7411-3">https://doi.org/10.1007/978-981-19-7411-3</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Information and Communication Technology for Competitive Strategies (ICTCS 2022) ICT: Applications and Social Interfaces
ent://SD_ILS/0/SD_ILS:527746
2026-01-18T05:21:55Z
2026-01-18T05:21:55Z
Yazar Joshi, Amit. editor. Mahmud, Mufti. editor. Ragel, Roshan G. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-981-19-9638-2">https://doi.org/10.1007/978-981-19-9638-2</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Big Data and Cloud Computing Select Proceedings of ICBCC 2022
ent://SD_ILS/0/SD_ILS:527845
2026-01-18T05:21:55Z
2026-01-18T05:21:55Z
Yazar Venkataraman, Neelanarayanan. editor. Wang, Lipo. editor. Fernando, Xavier. editor. Zobaa, Ahmed F. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-981-99-1051-9">https://doi.org/10.1007/978-981-99-1051-9</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Proceedings of International Conference on Frontiers in Computing and Systems COMSYS 2022
ent://SD_ILS/0/SD_ILS:527858
2026-01-18T05:21:55Z
2026-01-18T05:21:55Z
Yazar Sarkar, Ram. editor. Pal, Sujata. editor. Basu, Subhadip. editor. Plewczynski, Dariusz. editor. Bhattacharjee, Debotosh. editor.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-981-99-2680-0">https://doi.org/10.1007/978-981-99-2680-0</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Emerging Trends in Expert Applications and Security Proceedings of 2nd ICETEAS 2023, Volume 2
ent://SD_ILS/0/SD_ILS:527993
2026-01-18T05:21:55Z
2026-01-18T05:21:55Z
Yazar Rathore, Vijay Singh. editor. Piuri, Vincenzo. editor. Babo, Rosalina. editor. Ferreira, Marta Campos. editor. (orcid)0000-0001-9505-5730 SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-981-99-1946-8">https://doi.org/10.1007/978-981-99-1946-8</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Advances in Intelligent Information Hiding and Multimedia Signal Processing Proceeding of the 18th IIH-MSP 2022 Kitakyushu, Japan, Volume 1
ent://SD_ILS/0/SD_ILS:528126
2026-01-18T05:21:55Z
2026-01-18T05:21:55Z
Yazar Weng, Shaowei. editor. Shieh, Chin-Shiuh. editor. (orcid)0000-0003-3187-458X Tsihrintzis, George A. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-981-99-0605-5">https://doi.org/10.1007/978-981-99-0605-5</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Challenges of Software Verification
ent://SD_ILS/0/SD_ILS:528145
2026-01-18T05:21:55Z
2026-01-18T05:21:55Z
Yazar Arceri, Vincenzo. editor. Cortesi, Agostino. editor. Ferrara, Pietro. editor. Olliaro, Martina. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-981-19-9601-6">https://doi.org/10.1007/978-981-19-9601-6</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Proceedings of the International Conference on Applied Cybersecurity (ACS) 2023
ent://SD_ILS/0/SD_ILS:528240
2026-01-18T05:21:55Z
2026-01-18T05:21:55Z
Yazar Zantout, Hind. editor. Ragab Hassen, Hani. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-031-40598-3">https://doi.org/10.1007/978-3-031-40598-3</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Proceedings of the Ninth International Conference on Mathematics and Computing ICMC 2023
ent://SD_ILS/0/SD_ILS:528415
2026-01-18T05:21:55Z
2026-01-18T05:21:55Z
Yazar Giri, Debasis. editor. Gollmann, Dieter. editor. Ponnusamy, S. editor. Kouichi, Sakurai. editor. Stanimirović, Predrag S. editor.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-981-99-3080-7">https://doi.org/10.1007/978-981-99-3080-7</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Advanced Computational and Communication Paradigms Proceedings of ICACCP 2023
ent://SD_ILS/0/SD_ILS:528431
2026-01-18T05:21:55Z
2026-01-18T05:21:55Z
Yazar Borah, Samarjeet. editor. Gandhi, Tapan K. editor. Piuri, Vincenzo. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-981-99-4284-8">https://doi.org/10.1007/978-981-99-4284-8</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Advances in IoT and Security with Computational Intelligence Proceedings of ICAISA 2023, Volume 2
ent://SD_ILS/0/SD_ILS:528433
2026-01-18T05:21:55Z
2026-01-18T05:21:55Z
Yazar Mishra, Anurag. editor. Gupta, Deepak. editor. Chetty, Girija. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-981-99-5088-1">https://doi.org/10.1007/978-981-99-5088-1</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Advances in IoT and Security with Computational Intelligence Proceedings of ICAISA 2023, Volume 1
ent://SD_ILS/0/SD_ILS:528440
2026-01-18T05:21:55Z
2026-01-18T05:21:55Z
Yazar Mishra, Anurag. editor. Gupta, Deepak. editor. Chetty, Girija. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-981-99-5085-0">https://doi.org/10.1007/978-981-99-5085-0</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Proceedings of International Conference on Recent Innovations in Computing ICRIC 2022, Volume 1
ent://SD_ILS/0/SD_ILS:529010
2026-01-18T05:21:55Z
2026-01-18T05:21:55Z
Yazar Singh, Yashwant. editor. Singh, Pradeep Kumar. editor. Kolekar, Maheshkumar H. editor. Kar, Arpan Kumar. editor. Gonçalves, Paulo J. Sequeira. editor.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-981-19-9876-8">https://doi.org/10.1007/978-981-19-9876-8</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Soft Computing for Security Applications Proceedings of ICSCS 2023
ent://SD_ILS/0/SD_ILS:529021
2026-01-18T05:21:55Z
2026-01-18T05:21:55Z
Yazar Ranganathan, G. editor. EL Allioui, Youssouf. editor. Piramuthu, Selwyn. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-981-99-3608-3">https://doi.org/10.1007/978-981-99-3608-3</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Proceedings of Data Analytics and Management ICDAM 2023, Volume 3
ent://SD_ILS/0/SD_ILS:529027
2026-01-18T05:21:55Z
2026-01-18T05:21:55Z
Yazar Swaroop, Abhishek. editor. Polkowski, Zdzislaw. editor. Correia, Sérgio Duarte. editor. Virdee, Bal. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-981-99-6550-2">https://doi.org/10.1007/978-981-99-6550-2</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Proceedings of Data Analytics and Management ICDAM 2023, Volume 4
ent://SD_ILS/0/SD_ILS:529039
2026-01-18T05:21:55Z
2026-01-18T05:21:55Z
Yazar Swaroop, Abhishek. editor. Polkowski, Zdzislaw. editor. Correia, Sérgio Duarte. editor. Virdee, Bal. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-981-99-6553-3">https://doi.org/10.1007/978-981-99-6553-3</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Privacy Symposium 2023 Data Protection Law International Convergence and Compliance with Innovative Technologies (DPLICIT)
ent://SD_ILS/0/SD_ILS:529055
2026-01-18T05:21:55Z
2026-01-18T05:21:55Z
Yazar Schiffner, Stefan. editor. Ziegler, Sébastien. editor. (orcid)0000-0001-7255-4975 Jensen, Meiko. editor. (orcid)0009-0003-2397-9813 SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-031-44939-0">https://doi.org/10.1007/978-3-031-44939-0</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Recent Advances in Blockchain Technology Real-World Applications
ent://SD_ILS/0/SD_ILS:529096
2026-01-18T05:21:55Z
2026-01-18T05:21:55Z
Yazar Panda, Sandeep Kumar. editor. Mishra, Vaibhav. editor. Dash, Sujata Priyambada. editor. Pani, Ashis Kumar. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-031-22835-3">https://doi.org/10.1007/978-3-031-22835-3</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Data Economy in the Digital Age
ent://SD_ILS/0/SD_ILS:528763
2026-01-18T05:21:55Z
2026-01-18T05:21:55Z
Yazar Shukla, Samiksha. author. Bisht, Kritica. author. Tiwari, Kapil. author. Bashir, Shahid. author. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-981-99-7677-5">https://doi.org/10.1007/978-981-99-7677-5</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Proceedings of 3rd International Conference on Recent Trends in Machine Learning, IoT, Smart Cities and Applications ICMISC 2022
ent://SD_ILS/0/SD_ILS:528784
2026-01-18T05:21:55Z
2026-01-18T05:21:55Z
Yazar Gunjan, Vinit Kumar. editor. Zurada, Jacek M. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-981-19-6088-8">https://doi.org/10.1007/978-981-19-6088-8</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Proceedings of Fourth International Conference on Computer and Communication Technologies IC3T 2022
ent://SD_ILS/0/SD_ILS:528786
2026-01-18T05:21:55Z
2026-01-18T05:21:55Z
Yazar Reddy, K. Ashoka. editor. Devi, B. Rama. editor. George, Boby. editor. Raju, K. Srujan. editor. Sellathurai, Mathini. editor.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-981-19-8563-8">https://doi.org/10.1007/978-981-19-8563-8</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Proceedings of International Conference on Data Analytics and Insights, ICDAI 2023
ent://SD_ILS/0/SD_ILS:528801
2026-01-18T05:21:55Z
2026-01-18T05:21:55Z
Yazar Chaki, Nabendu. editor. Roy, Nilanjana Dutta. editor. Debnath, Papiya. editor. Saeed, Khalid. editor. (orcid)0000-0002-7741-7045 SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-981-99-3878-0">https://doi.org/10.1007/978-981-99-3878-0</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Explainable AI for Cybersecurity
ent://SD_ILS/0/SD_ILS:528936
2026-01-18T05:21:55Z
2026-01-18T05:21:55Z
Yazar Pan, Zhixin. author. Mishra, Prabhat. author. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-031-46479-9">https://doi.org/10.1007/978-3-031-46479-9</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Security, Trust and Privacy Models, and Architectures in IoT Environments
ent://SD_ILS/0/SD_ILS:526748
2026-01-18T05:21:55Z
2026-01-18T05:21:55Z
Yazar Fotia, Lidia. editor. Messina, Fabrizio. editor. Rosaci, Domenico. editor. Sarné, Giuseppe M.L. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-031-21940-5">https://doi.org/10.1007/978-3-031-21940-5</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Fusion of Machine Learning Paradigms Theory and Applications
ent://SD_ILS/0/SD_ILS:526924
2026-01-18T05:21:55Z
2026-01-18T05:21:55Z
Yazar Hatzilygeroudis, Ioannis K. editor. Tsihrintzis, George A. editor. Jain, Lakhmi C. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-031-22371-6">https://doi.org/10.1007/978-3-031-22371-6</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Mobile Application Development: Practice and Experience 12th Industry Symposium in Conjunction with 18th ICDCIT 2022
ent://SD_ILS/0/SD_ILS:527017
2026-01-18T05:21:55Z
2026-01-18T05:21:55Z
Yazar Singh, Jagannath. editor. Das, Debasish. editor. Kumar, Lov. editor. Krishna, Aneesh. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-981-19-6893-8">https://doi.org/10.1007/978-981-19-6893-8</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Security in Smart Home Networks
ent://SD_ILS/0/SD_ILS:527231
2026-01-18T05:21:55Z
2026-01-18T05:21:55Z
Yazar Meng, Yan. author. Zhu, Haojin. author. Shen, Xuemin (Sherman). author. (orcid)0000-0002-4140-287X SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-031-24185-7">https://doi.org/10.1007/978-3-031-24185-7</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Cybersecurity and Identity Access Management
ent://SD_ILS/0/SD_ILS:527374
2026-01-18T05:21:55Z
2026-01-18T05:21:55Z
Yazar Rawal, Bharat S. author. Manogaran, Gunasekaran. author. Peter, Alexender. author. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-981-19-2658-7">https://doi.org/10.1007/978-981-19-2658-7</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Advances in Intelligent Information Hiding and Multimedia Signal Processing Proceeding of the 18th IIH-MSP 2022 Kitakyushu, Japan, Volume 2
ent://SD_ILS/0/SD_ILS:527448
2026-01-18T05:21:55Z
2026-01-18T05:21:55Z
Yazar Kondo, Kazuhiro. editor. Horng, Mong-Fong. editor. Pan, Jeng-Shyang. editor. Hu, Pei. editor. (orcid)0000-0003-3711-4952 SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-981-99-0105-0">https://doi.org/10.1007/978-981-99-0105-0</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Information and Communication Technology for Competitive Strategies (ICTCS 2021) ICT: Applications and Social Interfaces
ent://SD_ILS/0/SD_ILS:527470
2026-01-18T05:21:55Z
2026-01-18T05:21:55Z
Yazar Joshi, Amit. editor. Mahmud, Mufti. editor. Ragel, Roshan G. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-981-19-0095-2">https://doi.org/10.1007/978-981-19-0095-2</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Predictive Data Security using AI Insights and Issues of Blockchain, IoT, and DevOps
ent://SD_ILS/0/SD_ILS:527503
2026-01-18T05:21:55Z
2026-01-18T05:21:55Z
Yazar Thakkar, Hiren Kumar. editor. Swarnkar, Mayank. editor. Bhadoria, Robin Singh. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-981-19-6290-5">https://doi.org/10.1007/978-981-19-6290-5</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
The NICE Cyber Security Framework Cyber Security Intelligence and Analytics
ent://SD_ILS/0/SD_ILS:527712
2026-01-18T05:21:55Z
2026-01-18T05:21:55Z
Yazar Alsmadi, Izzat. author. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-031-21651-0">https://doi.org/10.1007/978-3-031-21651-0</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Innovations in Data Analytics Selected Papers of ICIDA 2022
ent://SD_ILS/0/SD_ILS:527787
2026-01-18T05:21:55Z
2026-01-18T05:21:55Z
Yazar Bhattacharya, Abhishek. editor. Dutta, Soumi. editor. (orcid)0000-0002-1052-7055 Dutta, Paramartha. editor. Piuri, Vincenzo. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-981-99-0550-8">https://doi.org/10.1007/978-981-99-0550-8</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Innovations in Information and Communication Technologies Proceedings of ICIICT 2022
ent://SD_ILS/0/SD_ILS:528373
2026-01-18T05:21:55Z
2026-01-18T05:21:55Z
Yazar Garg, Deepak. editor. Kumar, Neeraj. editor. Iqbal, Rahat. editor. Gupta, Suneet. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-981-19-3796-5">https://doi.org/10.1007/978-981-19-3796-5</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Artificial Intelligence in Cyber Security: Theories and Applications
ent://SD_ILS/0/SD_ILS:528553
2026-01-18T05:21:55Z
2026-01-18T05:21:55Z
Yazar Bhardwaj, Tushar. editor. Upadhyay, Himanshu. editor. Sharma, Tarun Kumar. editor. Fernandes, Steven Lawrence. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-031-28581-3">https://doi.org/10.1007/978-3-031-28581-3</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Intelligent Computing and Applications Proceedings of ICDIC 2020
ent://SD_ILS/0/SD_ILS:528678
2026-01-18T05:21:55Z
2026-01-18T05:21:55Z
Yazar Rao, B. Narendra Kumar. editor. Balasubramanian, R. editor. Wang, Shiuh-Jeng. editor. Nayak, Richi. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-981-19-4162-7">https://doi.org/10.1007/978-981-19-4162-7</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
International Conference on Cyber Security, Privacy and Networking (ICSPN 2022)
ent://SD_ILS/0/SD_ILS:528692
2026-01-18T05:21:55Z
2026-01-18T05:21:55Z
Yazar Nedjah, Nadia. editor. Martínez Pérez, Gregorio. editor. Gupta, B. B. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-031-22018-0">https://doi.org/10.1007/978-3-031-22018-0</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Emerging Trends in Expert Applications and Security Proceedings of 2nd ICETEAS 2023, Volume 1
ent://SD_ILS/0/SD_ILS:529113
2026-01-18T05:21:55Z
2026-01-18T05:21:55Z
Yazar Rathore, Vijay Singh. editor. Tavares, João Manuel R. S. editor. Piuri, Vincenzo. editor. Surendiran, B. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-981-99-1909-3">https://doi.org/10.1007/978-981-99-1909-3</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Global cyber security labor shortage and international business risk
ent://SD_ILS/0/SD_ILS:481810
2026-01-18T05:21:55Z
2026-01-18T05:21:55Z
Yazar Christiansen, Bryan, 1960- editor. Piekarz, Agnieszka, 1990- editor. IGI Global, publisher.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-5927-6">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-5927-6</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
SECURITY STRATEGY : from requirements to reality.
ent://SD_ILS/0/SD_ILS:545098
2026-01-18T05:21:55Z
2026-01-18T05:21:55Z
Yazar STACKPOLE, BILL.<br/>Yer Numarası QA76.9 .A25<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9780429152160">Taylor & Francis eBooks</a>
Taylor & Francis <a href="https://www.taylorfrancis.com/books/9780429152160">https://www.taylorfrancis.com/books/9780429152160</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Cyber Security: Analytics, Technology and Automation
ent://SD_ILS/0/SD_ILS:529962
2026-01-18T05:21:55Z
2026-01-18T05:21:55Z
Yazar Lehto, Martti. editor. Neittaanmäki, Pekka. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-319-18302-2">https://doi.org/10.1007/978-3-319-18302-2</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Trusted Computing for Embedded Systems
ent://SD_ILS/0/SD_ILS:530149
2026-01-18T05:21:55Z
2026-01-18T05:21:55Z
Yazar Candaele, Bernard. editor. Soudris, Dimitrios. editor. Anagnostopoulos, Iraklis. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-319-09420-5">https://doi.org/10.1007/978-3-319-09420-5</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Detecting Peripheral-based Attacks on the Host Memory
ent://SD_ILS/0/SD_ILS:529268
2026-01-18T05:21:55Z
2026-01-18T05:21:55Z
Yazar Stewin, Patrick. author. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-319-13515-1">https://doi.org/10.1007/978-3-319-13515-1</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Game Theoretic Analysis of Congestion, Safety and Security Traffic and Transportation Theory
ent://SD_ILS/0/SD_ILS:529429
2026-01-18T05:21:55Z
2026-01-18T05:21:55Z
Yazar Hausken, Kjell. editor. Zhuang, Jun. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-319-11674-7">https://doi.org/10.1007/978-3-319-11674-7</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Game Theoretic Analysis of Congestion, Safety and Security Networks, Air Traffic and Emergency Departments
ent://SD_ILS/0/SD_ILS:529568
2026-01-18T05:21:55Z
2026-01-18T05:21:55Z
Yazar Hausken, Kjell. editor. Zhuang, Jun. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-319-13009-5">https://doi.org/10.1007/978-3-319-13009-5</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Digital Defense A Cybersecurity Primer
ent://SD_ILS/0/SD_ILS:530403
2026-01-18T05:21:55Z
2026-01-18T05:21:55Z
Yazar Pelton, Joseph. author. Singh, Indu B. author. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-319-19953-5">https://doi.org/10.1007/978-3-319-19953-5</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Understanding Network Hacks Attack and Defense with Python
ent://SD_ILS/0/SD_ILS:530100
2026-01-18T05:21:55Z
2026-01-18T05:21:55Z
Yazar Ballmann, Bastian. author. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-662-44437-5">https://doi.org/10.1007/978-3-662-44437-5</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Security Issues in Mobile NFC Devices
ent://SD_ILS/0/SD_ILS:529509
2026-01-18T05:21:55Z
2026-01-18T05:21:55Z
Yazar Roland, Michael. author. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-319-15488-6">https://doi.org/10.1007/978-3-319-15488-6</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Total information risk management maximizing the value of data and information assets
ent://SD_ILS/0/SD_ILS:306693
2026-01-18T05:21:55Z
2026-01-18T05:21:55Z
Yazar Borek, Alexander.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780124055476">http://www.sciencedirect.com/science/book/9780124055476</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Enterprise architecture and information assurance : developing a secure foundation
ent://SD_ILS/0/SD_ILS:538768
2026-01-18T05:21:55Z
2026-01-18T05:21:55Z
Yazar Scholz, James A., author.<br/>Yer Numarası QA76.9 .D314 S34 2014<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9781439841600">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>
Responsive Security
ent://SD_ILS/0/SD_ILS:542438
2026-01-18T05:21:55Z
2026-01-18T05:21:55Z
Yazar Kang, Meng-Chow, author.<br/>Yer Numarası HF5548.37<br/>Elektronik Erişim Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781315145907">https://www.taylorfrancis.com/books/9781315145907</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Auditing cloud computing a security and privacy guide
ent://SD_ILS/0/SD_ILS:299263
2026-01-18T05:21:55Z
2026-01-18T05:21:55Z
Yazar Halpert, Ben, 1986-<br/>Yer Numarası ONLINE<br/>Elektronik Erişim Image <a href="http://images.contentreserve.com/ImageType-100/0128-1/{F889EE2A-CF12-4647-85E0-03258F227FC1}Img100.jpg">http://images.contentreserve.com/ImageType-100/0128-1/{F889EE2A-CF12-4647-85E0-03258F227FC1}Img100.jpg</a>
Books24x7 <a href="http://www.books24x7.com/marc.asp?bookid=44303">http://www.books24x7.com/marc.asp?bookid=44303</a>
John Wiley <a href="http://dx.doi.org/10.1002/9781118269091">http://dx.doi.org/10.1002/9781118269091</a>
OverDrive (PDF) <a href="http://www.contentreserve.com/TitleInfo.asp?ID={F889EE2A-CF12-4647-85E0-03258F227FC1}&Format=50">http://www.contentreserve.com/TitleInfo.asp?ID={F889EE2A-CF12-4647-85E0-03258F227FC1}&Format=50</a>
OverDrive (EPUB) <a href="http://www.contentreserve.com/TitleInfo.asp?ID={F889EE2A-CF12-4647-85E0-03258F227FC1}&Format=410">http://www.contentreserve.com/TitleInfo.asp?ID={F889EE2A-CF12-4647-85E0-03258F227FC1}&Format=410</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Practical risk management for the CIO
ent://SD_ILS/0/SD_ILS:541595
2026-01-18T05:21:55Z
2026-01-18T05:21:55Z
Yazar Scherling, Mark., author.<br/>Yer Numarası HF5548.37 .S34 2011<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9781439856543">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>
The security risk assessment handbook : a complete guide for performing security risk assessments
ent://SD_ILS/0/SD_ILS:539743
2026-01-18T05:21:55Z
2026-01-18T05:21:55Z
Yazar Landoll, Douglas J., author.<br/>Yer Numarası HF5548.37 .L358 2011<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9781439821497">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>
Information technology risk management in enterprise environments a review of industry practices and a practical guide to risk management teams
ent://SD_ILS/0/SD_ILS:297862
2026-01-18T05:21:55Z
2026-01-18T05:21:55Z
Yazar Kouns, Jake. Minoli, Daniel, 1952- Wiley InterScience (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim John Wiley <a href="http://dx.doi.org/10.1002/9780470558133">http://dx.doi.org/10.1002/9780470558133</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Information warfare
ent://SD_ILS/0/SD_ILS:304069
2026-01-18T05:21:55Z
2026-01-18T05:21:55Z
Yazar Ventre, Daniel.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim John Wiley <a href="http://dx.doi.org/10.1002/9781118381533">http://dx.doi.org/10.1002/9781118381533</a>
<a href="http://lib.myilibrary.com?id=477736">http://lib.myilibrary.com?id=477736</a>
OverDrive (PDF) <a href="http://www.contentreserve.com/TitleInfo.asp?ID={02D73229-3728-4EE5-942B-28D4B82AED18}&Format=50">http://www.contentreserve.com/TitleInfo.asp?ID={02D73229-3728-4EE5-942B-28D4B82AED18}&Format=50</a>
OverDrive (EPUB) <a href="http://www.contentreserve.com/TitleInfo.asp?ID={02D73229-3728-4EE5-942B-28D4B82AED18}&Format=410">http://www.contentreserve.com/TitleInfo.asp?ID={02D73229-3728-4EE5-942B-28D4B82AED18}&Format=410</a>
OverDrive (READ) <a href="http://www.contentreserve.com/TitleInfo.asp?ID={02D73229-3728-4EE5-942B-28D4B82AED18}&Format=610">http://www.contentreserve.com/TitleInfo.asp?ID={02D73229-3728-4EE5-942B-28D4B82AED18}&Format=610</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Data protection : governance, risk management, and compliance
ent://SD_ILS/0/SD_ILS:543918
2026-01-18T05:21:55Z
2026-01-18T05:21:55Z
Yazar Hill, David G. (David Gary), 1943, author.<br/>Yer Numarası QA76.9 .A25 H52 2009<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9781439806937">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>
CISO soft skills : securing organizations impaired by employee politics, apathy, and intolerant perspectives
ent://SD_ILS/0/SD_ILS:544153
2026-01-18T05:21:55Z
2026-01-18T05:21:55Z
Yazar Collette, Ronald D., author. Gentile, Michael. Gentile, Skye.<br/>Yer Numarası HF5548.37 .G462 2009<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9781420089110">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>
The security risk assessment handbook : a complete guide for performing security risk assessments
ent://SD_ILS/0/SD_ILS:545167
2026-01-18T05:21:55Z
2026-01-18T05:21:55Z
Yazar Landoll, Douglas J., author.<br/>Yer Numarası HF5548.37 .L358 2006<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9781420031232">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>
Assessing and managing security risk in IT systems : a structured methodology
ent://SD_ILS/0/SD_ILS:542250
2026-01-18T05:21:55Z
2026-01-18T05:21:55Z
Yazar McCumber, John, 1956, author.<br/>Yer Numarası QA76.9 .A25 M4284 2005<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9781135488970">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>
A practical guide to security assessments
ent://SD_ILS/0/SD_ILS:545277
2026-01-18T05:21:55Z
2026-01-18T05:21:55Z
Yazar Kairab, Sudhanshu., author.<br/>Yer Numarası HF5548.32 .K345 2005<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9781135500313">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>