Arama Sonu&ccedil;lar&#305; Time. - Daralt&#305;lm&#305;&#351;: Data protection. SirsiDynix Enterprise https://katalog.hacettepe.edu.tr/client/tr_TR/default_tr/default_tr/qu$003dTime.$0026qf$003dSUBJECT$002509Konu$002509Data$002bprotection.$002509Data$002bprotection.$0026ps$003d300? 2026-04-26T15:02:49Z Privacy and Identity Management. Time for a Revolution? 10th IFIP WG 9.2, 9.5, 9.6/11.7, 11.4, 11.6/SIG 9.2.2 International Summer School, Edinburgh, UK, August 16-21, 2015, Revised Selected Papers ent://SD_ILS/0/SD_ILS:618414 2026-04-26T15:02:49Z 2026-04-26T15:02:49Z Yazar&#160;Aspinall, David. editor.&#160;Camenisch, Jan. editor.&#160;Hansen, Marit. editor.&#160;Fischer-H&uuml;bner, Simone. editor.&#160;Raab, Charles. editor.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-3-319-41763-9">https://doi.org/10.1007/978-3-319-41763-9</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Building effective privacy programs : cybersecurity from principles to practice ent://SD_ILS/0/SD_ILS:600111 2026-04-26T15:02:49Z 2026-04-26T15:02:49Z Yazar&#160;Edwards, Jason (Cybersecurity expert), author.&#160;Weaver, Griffin, author.&#160;John Wiley &amp; Sons, publisher.<br/>Yer Numaras&#305;&#160;QA76.9 .P735 E34 2026<br/>Elektronik Eri&#351;im&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394342662">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394342662</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Practical Post-Quantum Signatures FALCON and SOLMAE with Python ent://SD_ILS/0/SD_ILS:607260 2026-04-26T15:02:49Z 2026-04-26T15:02:49Z Yazar&#160;Kim, Kwangjo. author.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-3-031-81250-7">https://doi.org/10.1007/978-3-031-81250-7</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Artificial Intelligence in Practice Theory and Application for Cyber Security and Forensics ent://SD_ILS/0/SD_ILS:608695 2026-04-26T15:02:49Z 2026-04-26T15:02:49Z Yazar&#160;Iyengar, S.S. author.&#160;Nabavirazavi, Seyedsina. author.&#160;Hariprasad, Yashas. author. (orcid)0000-0001-7185-8352&#160;HB, Prasad. author.&#160;Mohan, C. Krishna. author.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-3-031-89327-8">https://doi.org/10.1007/978-3-031-89327-8</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Proceedings of International Conference on Data Analytics and Insights ICDAI 2024, Volume 1 ent://SD_ILS/0/SD_ILS:609343 2026-04-26T15:02:49Z 2026-04-26T15:02:49Z Yazar&#160;Chaki, Nabendu. editor.&#160;Roy, Nilanjana Dutta. editor.&#160;Chakraborty, Sanjay. editor.&#160;Debnath, Papiya. editor.&#160;Yang, Xin-She. editor.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-981-96-3287-9">https://doi.org/10.1007/978-981-96-3287-9</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Financial Cryptography and Data Security 28th International Conference, FC 2024, Willemstad, Cura&ccedil;ao, March 4-8, 2024, Revised Selected Papers, Part II ent://SD_ILS/0/SD_ILS:607259 2026-04-26T15:02:49Z 2026-04-26T15:02:49Z Yazar&#160;Clark, Jeremy. editor. (orcid)0000-0002-3533-5965&#160;Shi, Elaine. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-3-031-78679-2">https://doi.org/10.1007/978-3-031-78679-2</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Financial Cryptography and Data Security 28th International Conference, FC 2024, Willemstad, Cura&ccedil;ao, March 4-8, 2024, Revised Selected Papers, Part I ent://SD_ILS/0/SD_ILS:607341 2026-04-26T15:02:49Z 2026-04-26T15:02:49Z Yazar&#160;Clark, Jeremy. editor. (orcid)0000-0002-3533-5965&#160;Shi, Elaine. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-3-031-78676-1">https://doi.org/10.1007/978-3-031-78676-1</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Unleashing the Power of Blockchain and IoT for Water Informatics ent://SD_ILS/0/SD_ILS:609189 2026-04-26T15:02:49Z 2026-04-26T15:02:49Z Yazar&#160;Rawat, Sur Singh. editor.&#160;Malsa, Nitima. editor.&#160;Kumar, Gyanendra. editor.&#160;Gupta, Vimal. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-981-96-3886-4">https://doi.org/10.1007/978-981-96-3886-4</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Proceedings of International Conference on Data Analytics and Insights ICDAI 2024, Volume 2 ent://SD_ILS/0/SD_ILS:609795 2026-04-26T15:02:49Z 2026-04-26T15:02:49Z Yazar&#160;Chaki, Nabendu. editor.&#160;Roy, Nilanjana Dutta. editor.&#160;Chakraborty, Sanjay. editor.&#160;Debnath, Papiya. editor.&#160;Yang, Xin-She. editor.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-981-96-2329-7">https://doi.org/10.1007/978-981-96-2329-7</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> The Art of Cyber Warfare Strategic and Tactical Approaches for Attack and Defense in the Digital Age ent://SD_ILS/0/SD_ILS:603456 2026-04-26T15:02:49Z 2026-04-26T15:02:49Z Yazar&#160;Kestner, Peter. author. (orcid)0009-0002-0437-9487&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-3-658-43879-1">https://doi.org/10.1007/978-3-658-43879-1</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Cryptocoding Based on Quasigroups ent://SD_ILS/0/SD_ILS:602350 2026-04-26T15:02:49Z 2026-04-26T15:02:49Z Yazar&#160;Mechkaroska, Daniela. author.&#160;Popovska-Mitrovikj, Aleksandra. author. (orcid)0000-0002-1578-6275&#160;Bakeva, Verica. author.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-3-031-50125-8">https://doi.org/10.1007/978-3-031-50125-8</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Privacy Computing Theory and Technology ent://SD_ILS/0/SD_ILS:602562 2026-04-26T15:02:49Z 2026-04-26T15:02:49Z Yazar&#160;Li, Fenghua. author.&#160;Li, Hui. author.&#160;Niu, Ben. author.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-981-99-4943-4">https://doi.org/10.1007/978-981-99-4943-4</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Modern Approaches in IoT and Machine Learning for Cyber Security Latest Trends in AI ent://SD_ILS/0/SD_ILS:602103 2026-04-26T15:02:49Z 2026-04-26T15:02:49Z Yazar&#160;Gunjan, Vinit Kumar. editor. (orcid)0000-0002-3222-4186&#160;Ansari, Mohd Dilshad. editor.&#160;Usman, Mohammed. editor.&#160;Nguyen, ThiDieuLinh. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-3-031-09955-7">https://doi.org/10.1007/978-3-031-09955-7</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> CyberSecurity in a DevOps Environment From Requirements to Monitoring ent://SD_ILS/0/SD_ILS:602151 2026-04-26T15:02:49Z 2026-04-26T15:02:49Z Yazar&#160;Sadovykh, Andrey. editor.&#160;Truscan, Dragos. editor.&#160;Mallouli, Wissam. editor.&#160;Cavalli, Ana Rosa. editor.&#160;Seceleanu, Cristina. editor.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-3-031-42212-6">https://doi.org/10.1007/978-3-031-42212-6</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Advanced Techniques of Artificial Intelligence in IT Security Systems ent://SD_ILS/0/SD_ILS:602624 2026-04-26T15:02:49Z 2026-04-26T15:02:49Z Yazar&#160;Korytkowski, Marcin. author. (orcid)0000-0002-6002-2733&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-3-031-53854-4">https://doi.org/10.1007/978-3-031-53854-4</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Critical Infrastructure Protection in the Light of the Armed Conflicts ent://SD_ILS/0/SD_ILS:602887 2026-04-26T15:02:49Z 2026-04-26T15:02:49Z Yazar&#160;Kov&aacute;cs, T&uuml;nde Anna. editor. (orcid)0000-0002-5867-5882&#160;Nyikes, Zolt&aacute;n. editor.&#160;Berek, Tam&aacute;s. editor.&#160;Daruka, Norbert. editor. (orcid)0000-0002-7102-1787&#160;T&oacute;th, L&aacute;szl&oacute;. editor.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-3-031-47990-8">https://doi.org/10.1007/978-3-031-47990-8</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Data-Centric Security in Software Defined Networks (SDN) ent://SD_ILS/0/SD_ILS:603213 2026-04-26T15:02:49Z 2026-04-26T15:02:49Z Yazar&#160;Amanowicz, Marek. author.&#160;Szwaczyk, Sebastian. author. (orcid)0000-0002-3657-4685&#160;Wrona, Konrad. author. (orcid)0000-0002-3362-9820&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-3-031-55517-6">https://doi.org/10.1007/978-3-031-55517-6</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Information and Communication Technology for Competitive Strategies (ICTCS 2021) ICT: Applications and Social Interfaces ent://SD_ILS/0/SD_ILS:527470 2026-04-26T15:02:49Z 2026-04-26T15:02:49Z Yazar&#160;Joshi, Amit. editor.&#160;Mahmud, Mufti. editor.&#160;Ragel, Roshan G. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-981-19-0095-2">https://doi.org/10.1007/978-981-19-0095-2</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Advanced Computational and Communication Paradigms Proceedings of ICACCP 2023 ent://SD_ILS/0/SD_ILS:528431 2026-04-26T15:02:49Z 2026-04-26T15:02:49Z Yazar&#160;Borah, Samarjeet. editor.&#160;Gandhi, Tapan K. editor.&#160;Piuri, Vincenzo. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-981-99-4284-8">https://doi.org/10.1007/978-981-99-4284-8</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Proceedings of 3rd International Conference on Recent Trends in Machine Learning, IoT, Smart Cities and Applications ICMISC 2022 ent://SD_ILS/0/SD_ILS:528784 2026-04-26T15:02:49Z 2026-04-26T15:02:49Z Yazar&#160;Gunjan, Vinit Kumar. editor.&#160;Zurada, Jacek M. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-981-19-6088-8">https://doi.org/10.1007/978-981-19-6088-8</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Advances in Intelligent Information Hiding and Multimedia Signal Processing Proceeding of the 18th IIH-MSP 2022 Kitakyushu, Japan, Volume 2 ent://SD_ILS/0/SD_ILS:527448 2026-04-26T15:02:49Z 2026-04-26T15:02:49Z Yazar&#160;Kondo, Kazuhiro. editor.&#160;Horng, Mong-Fong. editor.&#160;Pan, Jeng-Shyang. editor.&#160;Hu, Pei. editor. (orcid)0000-0003-3711-4952&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-981-99-0105-0">https://doi.org/10.1007/978-981-99-0105-0</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Emerging Trends in Expert Applications and Security Proceedings of 2nd ICETEAS 2023, Volume 1 ent://SD_ILS/0/SD_ILS:529113 2026-04-26T15:02:49Z 2026-04-26T15:02:49Z Yazar&#160;Rathore, Vijay Singh. editor.&#160;Tavares, Jo&atilde;o Manuel R. S. editor.&#160;Piuri, Vincenzo. editor.&#160;Surendiran, B. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-981-99-1909-3">https://doi.org/10.1007/978-981-99-1909-3</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Information and Communication Technology for Competitive Strategies (ICTCS 2022) ICT: Applications and Social Interfaces ent://SD_ILS/0/SD_ILS:527746 2026-04-26T15:02:49Z 2026-04-26T15:02:49Z Yazar&#160;Joshi, Amit. editor.&#160;Mahmud, Mufti. editor.&#160;Ragel, Roshan G. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-981-19-9638-2">https://doi.org/10.1007/978-981-19-9638-2</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Proceedings of International Conference on Frontiers in Computing and Systems COMSYS 2022 ent://SD_ILS/0/SD_ILS:527858 2026-04-26T15:02:49Z 2026-04-26T15:02:49Z Yazar&#160;Sarkar, Ram. editor.&#160;Pal, Sujata. editor.&#160;Basu, Subhadip. editor.&#160;Plewczynski, Dariusz. editor.&#160;Bhattacharjee, Debotosh. editor.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-981-99-2680-0">https://doi.org/10.1007/978-981-99-2680-0</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Machine Learning and Knowledge Discovery in Databases European Conference, ECML PKDD 2017, Skopje, Macedonia, September 18-22, 2017, Proceedings, Part II ent://SD_ILS/0/SD_ILS:610761 2026-04-26T15:02:49Z 2026-04-26T15:02:49Z Yazar&#160;Ceci, Michelangelo. editor.&#160;Hollm&eacute;n, Jaakko. editor.&#160;Todorovski, Ljup&#269;o. editor.&#160;Vens, Celine. editor.&#160;D&#382;eroski, Sa&scaron;o. editor. (orcid)0000-0003-2363-712X<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-3-319-71246-8">https://doi.org/10.1007/978-3-319-71246-8</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Machine Learning and Knowledge Discovery in Databases European Conference, ECML PKDD 2017, Skopje, Macedonia, September 18-22, 2017, Proceedings, Part I ent://SD_ILS/0/SD_ILS:618161 2026-04-26T15:02:49Z 2026-04-26T15:02:49Z Yazar&#160;Ceci, Michelangelo. editor.&#160;Hollm&eacute;n, Jaakko. editor.&#160;Todorovski, Ljup&#269;o. editor.&#160;Vens, Celine. editor.&#160;D&#382;eroski, Sa&scaron;o. editor. (orcid)0000-0003-2363-712X<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-3-319-71249-9">https://doi.org/10.1007/978-3-319-71249-9</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Group-target Tracking ent://SD_ILS/0/SD_ILS:618179 2026-04-26T15:02:49Z 2026-04-26T15:02:49Z Yazar&#160;Geng, Wen-dong. author.&#160;Wang, Yuan-qin. author.&#160;Dong, Zheng-hong. author.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-981-10-1888-6">https://doi.org/10.1007/978-981-10-1888-6</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Advances in User Authentication ent://SD_ILS/0/SD_ILS:611603 2026-04-26T15:02:49Z 2026-04-26T15:02:49Z Yazar&#160;Dasgupta, Dipankar. author.&#160;Roy, Arunava. author.&#160;Nag, Abhijit. author.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-3-319-58808-7">https://doi.org/10.1007/978-3-319-58808-7</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Neural Information Processing 24th International Conference, ICONIP 2017, Guangzhou, China, November 14-18, 2017, Proceedings, Part I ent://SD_ILS/0/SD_ILS:612047 2026-04-26T15:02:49Z 2026-04-26T15:02:49Z Yazar&#160;Liu, Derong. editor.&#160;Xie, Shengli. editor.&#160;Li, Yuanqing. editor.&#160;Zhao, Dongbin. editor.&#160;El-Alfy, El-Sayed M. editor.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-3-319-70087-8">https://doi.org/10.1007/978-3-319-70087-8</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Anomaly Detection Principles and Algorithms ent://SD_ILS/0/SD_ILS:613149 2026-04-26T15:02:49Z 2026-04-26T15:02:49Z Yazar&#160;Mehrotra, Kishan G. author.&#160;Mohan, Chilukuri K. author.&#160;Huang, HuaMing. author.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-3-319-67526-8">https://doi.org/10.1007/978-3-319-67526-8</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Neural Information Processing 24th International Conference, ICONIP 2017, Guangzhou, China, November 14-18, 2017, Proceedings, Part III ent://SD_ILS/0/SD_ILS:613301 2026-04-26T15:02:49Z 2026-04-26T15:02:49Z Yazar&#160;Liu, Derong. editor.&#160;Xie, Shengli. editor.&#160;Li, Yuanqing. editor.&#160;Zhao, Dongbin. editor.&#160;El-Alfy, El-Sayed M. editor.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-3-319-70090-8">https://doi.org/10.1007/978-3-319-70090-8</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Machine Learning and Knowledge Discovery in Databases European Conference, ECML PKDD 2017, Skopje, Macedonia, September 18-22, 2017, Proceedings, Part III ent://SD_ILS/0/SD_ILS:618461 2026-04-26T15:02:49Z 2026-04-26T15:02:49Z Yazar&#160;Altun, Yasemin. editor.&#160;Das, Kamalika. editor.&#160;Mielik&auml;inen, Taneli. editor.&#160;Malerba, Donato. editor. (orcid)0000-0001-8432-4608&#160;Stefanowski, Jerzy. editor.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-3-319-71273-4">https://doi.org/10.1007/978-3-319-71273-4</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Open Source Intelligence Investigation From Strategy to Implementation ent://SD_ILS/0/SD_ILS:611588 2026-04-26T15:02:49Z 2026-04-26T15:02:49Z Yazar&#160;Akhgar, Babak. editor.&#160;Bayerl, P. Saskia. editor.&#160;Sampson, Fraser. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-3-319-47671-1">https://doi.org/10.1007/978-3-319-47671-1</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Data Privacy Management, and Security Assurance 10th International Workshop, DPM 2015, and 4th International Workshop, QASA 2015, Vienna, Austria, September 21-22, 2015. Revised Selected Papers ent://SD_ILS/0/SD_ILS:611803 2026-04-26T15:02:49Z 2026-04-26T15:02:49Z Yazar&#160;Garcia-Alfaro, Joaquin. editor.&#160;Navarro-Arribas, Guillermo. editor.&#160;Aldini, Alessandro. editor. (orcid)0000-0002-7250-5011&#160;Martinelli, Fabio. editor.&#160;Suri, Neeraj. editor.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-3-319-29883-2">https://doi.org/10.1007/978-3-319-29883-2</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Theory of Cryptography 14th International Conference, TCC 2016-B, Beijing, China, October 31-November 3, 2016, Proceedings, Part II ent://SD_ILS/0/SD_ILS:613859 2026-04-26T15:02:49Z 2026-04-26T15:02:49Z Yazar&#160;Hirt, Martin. editor.&#160;Smith, Adam. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-3-662-53644-5">https://doi.org/10.1007/978-3-662-53644-5</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Theory of Cryptography 14th International Conference, TCC 2016-B, Beijing, China, October 31-November 3, 2016, Proceedings, Part I ent://SD_ILS/0/SD_ILS:615946 2026-04-26T15:02:49Z 2026-04-26T15:02:49Z Yazar&#160;Hirt, Martin. editor.&#160;Smith, Adam. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-3-662-53641-4">https://doi.org/10.1007/978-3-662-53641-4</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Physical-Layer Security for Cooperative Relay Networks ent://SD_ILS/0/SD_ILS:616874 2026-04-26T15:02:49Z 2026-04-26T15:02:49Z Yazar&#160;Zou, Yulong. author.&#160;Zhu, Jia. author.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-3-319-31174-6">https://doi.org/10.1007/978-3-319-31174-6</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Trusted Computing for Embedded Systems ent://SD_ILS/0/SD_ILS:530149 2026-04-26T15:02:49Z 2026-04-26T15:02:49Z Yazar&#160;Candaele, Bernard. editor.&#160;Soudris, Dimitrios. editor.&#160;Anagnostopoulos, Iraklis. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-3-319-09420-5">https://doi.org/10.1007/978-3-319-09420-5</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Enterprise architecture and information assurance : developing a secure foundation ent://SD_ILS/0/SD_ILS:538768 2026-04-26T15:02:49Z 2026-04-26T15:02:49Z Yazar&#160;Scholz, James A., author.<br/>Yer Numaras&#305;&#160;QA76.9 .D314 S34 2014<br/>Elektronik Eri&#351;im&#160;<a href="https://www.taylorfrancis.com/books/9781439841600">Click here to view.</a><br/>Format:&#160;Kitap<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Responsive Security ent://SD_ILS/0/SD_ILS:542438 2026-04-26T15:02:49Z 2026-04-26T15:02:49Z Yazar&#160;Kang, Meng-Chow, author.<br/>Yer Numaras&#305;&#160;HF5548.37<br/>Elektronik Eri&#351;im&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781315145907">https://www.taylorfrancis.com/books/9781315145907</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> The security risk assessment handbook : a complete guide for performing security risk assessments ent://SD_ILS/0/SD_ILS:539743 2026-04-26T15:02:49Z 2026-04-26T15:02:49Z Yazar&#160;Landoll, Douglas J., author.<br/>Yer Numaras&#305;&#160;HF5548.37 .L358 2011<br/>Elektronik Eri&#351;im&#160;<a href="https://www.taylorfrancis.com/books/9781439821497">Click here to view.</a><br/>Format:&#160;Kitap<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Data protection : governance, risk management, and compliance ent://SD_ILS/0/SD_ILS:543918 2026-04-26T15:02:49Z 2026-04-26T15:02:49Z Yazar&#160;Hill, David G. (David Gary), 1943, author.<br/>Yer Numaras&#305;&#160;QA76.9 .A25 H52 2009<br/>Elektronik Eri&#351;im&#160;<a href="https://www.taylorfrancis.com/books/9781439806937">Click here to view.</a><br/>Format:&#160;Kitap<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/>