Arama Sonuçları Security -- Technology. - Daraltılmış: Computer science.SirsiDynix Enterprisehttps://katalog.hacettepe.edu.tr/client/tr_TR/default_tr/default_tr/qu$003dSecurity$002b--$002bTechnology.$0026qf$003dSUBJECT$002509Konu$002509Computer$002bscience.$002509Computer$002bscience.$0026ps$003d300?dt=list2026-04-14T11:00:52ZCyber Security: Power and Technologyent://SD_ILS/0/SD_ILS:4010032026-04-14T11:00:52Z2026-04-14T11:00:52ZYazar Lehto, Martti. editor. Neittaanmäki, Pekka. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-319-75307-2">https://doi.org/10.1007/978-3-319-75307-2</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Electronic Postage Systems Technology, Security, Economicsent://SD_ILS/0/SD_ILS:1662962026-04-14T11:00:52Z2026-04-14T11:00:52ZYazar Bleumer, Gerrit. author. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-0-387-44606-6">http://dx.doi.org/10.1007/978-0-387-44606-6</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Information Security Technology for Applications 15th Nordic Conference on Secure IT Systems, NordSec 2010, Espoo, Finland, October 27-29, 2010, Revised Selected Papersent://SD_ILS/0/SD_ILS:1963032026-04-14T11:00:52Z2026-04-14T11:00:52ZYazar Aura, Tuomas. editor. Järvinen, Kimmo. editor. Nyberg, Kaisa. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-27937-9">http://dx.doi.org/10.1007/978-3-642-27937-9</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Information Security Technology for Applications 16th Nordic Conference on Secure IT Systems, NordSec 2011, Tallinn, Estonia, October 26-28, 2011, Revised Selected Papersent://SD_ILS/0/SD_ILS:1967382026-04-14T11:00:52Z2026-04-14T11:00:52ZYazar Laud, Peeter. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-29615-4">http://dx.doi.org/10.1007/978-3-642-29615-4</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Security Technology International Conference, SecTech 2011, Held as Part of the Future Generation Information Technology Conference, FGIT 2011, in Conjunction with GDC 2011, Jeju Island, Korea, December 8-10, 2011. Proceedingsent://SD_ILS/0/SD_ILS:1961212026-04-14T11:00:52Z2026-04-14T11:00:52ZYazar Kim, Tai-hoon. editor. Adeli, Hojjat. editor. Fang, Wai-chi. editor. Villalba, Javier García. editor. Arnett, Kirk P. editor.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-27189-2">http://dx.doi.org/10.1007/978-3-642-27189-2</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Security Aspects in Information Technology First International Conference, InfoSecHiComNet 2011, Haldia, India, October 19-22, 2011. Proceedingsent://SD_ILS/0/SD_ILS:1956832026-04-14T11:00:52Z2026-04-14T11:00:52ZYazar Joye, Marc. editor. Mukhopadhyay, Debdeep. editor. Tunstall, Michael. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-24586-2">http://dx.doi.org/10.1007/978-3-642-24586-2</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Security Technology, Disaster Recovery and Business Continuity International Conferences, SecTech and DRBC 2010, Held as Part of the Future Generation Information Technology Conference, FGIT 2010, Jeju Island, Korea, December 13-15, 2010. Proceedingsent://SD_ILS/0/SD_ILS:1936532026-04-14T11:00:52Z2026-04-14T11:00:52ZYazar Kim, Tai-hoon. editor. Fang, Wai-chi. editor. Khan, Muhammad Khurram. editor. Arnett, Kirk P. editor. Kang, Heau-jo. editor.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-17610-4">http://dx.doi.org/10.1007/978-3-642-17610-4</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Advances in Security Technology International Conference, SecTech 2008, and Its Special Sessions, Sanya, Hainan Island, China, December 13-15, 2008. Revised Selected Papersent://SD_ILS/0/SD_ILS:1913112026-04-14T11:00:52Z2026-04-14T11:00:52ZYazar Kim, Haeng-kon. editor. Kim, Tai-hoon. editor. Kiumi, Akingbehin. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-10240-0">http://dx.doi.org/10.1007/978-3-642-10240-0</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Security Technology International Conference, SecTech 2009, Held as Part of the Future Generation Information Technology Conference, FGIT 2009, Jeju Island, Korea, December 10-12, 2009. Proceedingsent://SD_ILS/0/SD_ILS:1914942026-04-14T11:00:52Z2026-04-14T11:00:52ZYazar Ślęzak, Dominik. editor. Kim, Tai-hoon. editor. Fang, Wai-Chi. editor. Arnett, Kirk P. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-10847-1">http://dx.doi.org/10.1007/978-3-642-10847-1</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Fighting Terror Online The Convergence of Security, Technology, and the Lawent://SD_ILS/0/SD_ILS:1670632026-04-14T11:00:52Z2026-04-14T11:00:52ZYazar Golumbic, Martin Charles. author. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-0-387-73578-8">http://dx.doi.org/10.1007/978-0-387-73578-8</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Impacts and Risk Assessment of Technology for Internet Security Enabled Information Small-Medium Enterprises (TEISMES)ent://SD_ILS/0/SD_ILS:1652672026-04-14T11:00:52Z2026-04-14T11:00:52ZYazar Shoniregun, Charles A. author. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/b137376">http://dx.doi.org/10.1007/b137376</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Creative approaches towards development of computing and multidisciplinary IT solutions for societyent://SD_ILS/0/SD_ILS:5993712026-04-14T11:00:52Z2026-04-14T11:00:52ZYazar Bijalwan, Anchit, editor.<br/>Yer Numarası QA76 .C74 2024<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394272303">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394272303</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Software Engineering and Formal Methods 15th International Conference, SEFM 2017, Trento, Italy, September 4-8, 2017, Proceedingsent://SD_ILS/0/SD_ILS:6162702026-04-14T11:00:52Z2026-04-14T11:00:52ZYazar Cimatti, Alessandro. editor. (orcid)0000-0002-1315-6990 Sirjani, Marjan. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-319-66197-1">https://doi.org/10.1007/978-3-319-66197-1</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Intelligent Computing Theories and Application 13th International Conference, ICIC 2017, Liverpool, UK, August 7-10, 2017, Proceedings, Part Ient://SD_ILS/0/SD_ILS:6181102026-04-14T11:00:52Z2026-04-14T11:00:52ZYazar Huang, De-Shuang. editor. Bevilacqua, Vitoantonio. editor. (orcid)0000-0002-3088-0788 Premaratne, Prashan. editor. Gupta, Phalguni. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-319-63309-1">https://doi.org/10.1007/978-3-319-63309-1</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Deductive Software Verification - The KeY Book From Theory to Practiceent://SD_ILS/0/SD_ILS:6160092026-04-14T11:00:52Z2026-04-14T11:00:52ZYazar Ahrendt, Wolfgang. editor. Beckert, Bernhard. editor. (orcid)0000-0002-9672-3291 Bubel, Richard. editor. Hähnle, Reiner. editor. Schmitt, Peter H. editor.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-319-49812-6">https://doi.org/10.1007/978-3-319-49812-6</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Tackling Society's Grand Challenges with Design Science 11th International Conference, DESRIST 2016, St. John's, NL, Canada, May 23-25, 2016, Proceedingsent://SD_ILS/0/SD_ILS:6180022026-04-14T11:00:52Z2026-04-14T11:00:52ZYazar Parsons, Jeffrey. editor. Tuunanen, Tuure. editor. Venable, John. editor. Donnellan, Brian. editor. Helfert, Markus. editor.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-319-39294-3">https://doi.org/10.1007/978-3-319-39294-3</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Soft Computing in Computer and Information Scienceent://SD_ILS/0/SD_ILS:5294152026-04-14T11:00:52Z2026-04-14T11:00:52ZYazar Wiliński, Antoni. editor. Fray, Imed El. editor. Pejaś, Jerzy. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-319-15147-2">https://doi.org/10.1007/978-3-319-15147-2</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>The basics of information security : understanding the fundamentals of InfoSec in theory and practiceent://SD_ILS/0/SD_ILS:3557702026-04-14T11:00:52Z2026-04-14T11:00:52ZYazar Andress, Jason, author.<br/>Yer Numarası ONLINE(355770.1)<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128007440">http://www.sciencedirect.com/science/book/9780128007440</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Bluetooth Security Attacks Comparative Analysis, Attacks, and Countermeasuresent://SD_ILS/0/SD_ILS:3349822026-04-14T11:00:52Z2026-04-14T11:00:52ZYazar Haataja, Keijo. author. Hyppönen, Konstantin. author. Pasanen, Sanna. author. Toivanen, Pekka. author. SpringerLink (Online service)<br/>Yer Numarası ONLINE(334982.1)<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-40646-1">http://dx.doi.org/10.1007/978-3-642-40646-1</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Introduction to Public Key Infrastructuresent://SD_ILS/0/SD_ILS:3349842026-04-14T11:00:52Z2026-04-14T11:00:52ZYazar Buchmann, Johannes A. author. Karatsiolis, Evangelos. author. Wiesmaier, Alexander. author. SpringerLink (Online service)<br/>Yer Numarası ONLINE(334984.1)<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-40657-7">http://dx.doi.org/10.1007/978-3-642-40657-7</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Physically Unclonable Functions Constructions, Properties and Applicationsent://SD_ILS/0/SD_ILS:3351022026-04-14T11:00:52Z2026-04-14T11:00:52ZYazar Maes, Roel. author. SpringerLink (Online service)<br/>Yer Numarası ONLINE(335102.1)<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-41395-7">http://dx.doi.org/10.1007/978-3-642-41395-7</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>The basics of information security understanding the fundamentals of InfoSec in theory and practiceent://SD_ILS/0/SD_ILS:1453712026-04-14T11:00:52Z2026-04-14T11:00:52ZYazar Andress, Jason.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597496537">http://www.sciencedirect.com/science/book/9781597496537</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>