Search Results for - Narrowed by: Springer E-Book Collection - TEDU library - Data protection. - Systems and Data Security. SirsiDynix Enterprise https://catalog.tedu.edu.tr/client/tr_TR/defaulttr/defaulttr/qf$003dLOCATION$002509Lokasyon$0025091$00253ASPRINGER$002509Springer$002bE-Book$002bCollection$0026qf$003dLIBRARY$002509K$0025C3$0025BCt$0025C3$0025BCphane$0025091$00253ATEDU$002509TEDU$002blibrary$0026qf$003dSUBJECT$002509Konu$002509Data$002bprotection.$002509Data$002bprotection.$0026qf$003dSUBJECT$002509Konu$002509Systems$002band$002bData$002bSecurity.$002509Systems$002band$002bData$002bSecurity.$0026ps$003d300? 2024-06-03T20:15:57Z Critical Infrastructure Security and Resilience Theories, Methods, Tools and Technologies ent://SD_ILS/0/SD_ILS:428348 2024-06-03T20:15:57Z 2024-06-03T20:15:57Z Yazar&#160;Gritzalis, Dimitris. editor.<br/><a href="https://doi.org/10.1007/978-3-030-00024-0">https://doi.org/10.1007/978-3-030-00024-0</a><br/>Format:&#160;Electronic Resources<br/> Architecture for Blockchain Applications ent://SD_ILS/0/SD_ILS:428588 2024-06-03T20:15:57Z 2024-06-03T20:15:57Z Yazar&#160;Xu, Xiwei. author.<br/><a href="https://doi.org/10.1007/978-3-030-03035-3">https://doi.org/10.1007/978-3-030-03035-3</a><br/>Format:&#160;Electronic Resources<br/> Frontiers in Cyber Security Second International Conference, FCS 2019, Xi'an, China, November 15&ndash;17, 2019, Proceedings ent://SD_ILS/0/SD_ILS:428856 2024-06-03T20:15:57Z 2024-06-03T20:15:57Z Yazar&#160;Shen, Bazhong. editor.<br/><a href="https://doi.org/10.1007/978-981-15-0818-9">https://doi.org/10.1007/978-981-15-0818-9</a><br/>Format:&#160;Electronic Resources<br/> Resilience of Cyber-Physical Systems From Risk Modelling to Threat Counteraction ent://SD_ILS/0/SD_ILS:428039 2024-06-03T20:15:57Z 2024-06-03T20:15:57Z Yazar&#160;Flammini, Francesco. editor.<br/><a href="https://doi.org/10.1007/978-3-319-95597-1">https://doi.org/10.1007/978-3-319-95597-1</a><br/>Format:&#160;Electronic Resources<br/> Critical Infrastructure Protection XIII 13th IFIP WG 11.10 International Conference, ICCIP 2019, Arlington, VA, USA, March 11&ndash;12, 2019, Revised Selected Papers ent://SD_ILS/0/SD_ILS:428266 2024-06-03T20:15:57Z 2024-06-03T20:15:57Z Yazar&#160;Staggs, Jason. editor.<br/><a href="https://doi.org/10.1007/978-3-030-34647-8">https://doi.org/10.1007/978-3-030-34647-8</a><br/>Format:&#160;Electronic Resources<br/> Applications and Techniques in Information Security 10th International Conference, ATIS 2019, Thanjavur, India, November 22&ndash;24, 2019, Proceedings ent://SD_ILS/0/SD_ILS:428022 2024-06-03T20:15:57Z 2024-06-03T20:15:57Z Yazar&#160;Shankar Sriram, V. S. editor. (orcid)0000-0001-7870-7944<br/><a href="https://doi.org/10.1007/978-981-15-0871-4">https://doi.org/10.1007/978-981-15-0871-4</a><br/>Format:&#160;Electronic Resources<br/> Information Security Practice and Experience 15th International Conference, ISPEC 2019, Kuala Lumpur, Malaysia, November 26&ndash;28, 2019, Proceedings ent://SD_ILS/0/SD_ILS:427797 2024-06-03T20:15:57Z 2024-06-03T20:15:57Z Yazar&#160;Heng, Swee-Huay. editor. (orcid)0000-0003-3627-2131<br/><a href="https://doi.org/10.1007/978-3-030-34339-2">https://doi.org/10.1007/978-3-030-34339-2</a><br/>Format:&#160;Electronic Resources<br/> Security and Privacy in Communication Networks 13th International Conference, SecureComm 2017, Niagara Falls, ON, Canada, October 22&ndash;25, 2017, Proceedings ent://SD_ILS/0/SD_ILS:223485 2024-06-03T20:15:57Z 2024-06-03T20:15:57Z Yazar&#160;Lin, Xiaodong. editor.<br/><a href="https://doi.org/10.1007/978-3-319-78813-5">https://doi.org/10.1007/978-3-319-78813-5</a><br/>Format:&#160;Electronic Resources<br/> Introductory Computer Forensics A Hands-on Practical Approach ent://SD_ILS/0/SD_ILS:221073 2024-06-03T20:15:57Z 2024-06-03T20:15:57Z Yazar&#160;Lin, Xiaodong. author.<br/><a href="https://doi.org/10.1007/978-3-030-00581-8">https://doi.org/10.1007/978-3-030-00581-8</a><br/>Format:&#160;Electronic Resources<br/> Introduction to Security Reduction ent://SD_ILS/0/SD_ILS:221398 2024-06-03T20:15:57Z 2024-06-03T20:15:57Z Yazar&#160;Guo, Fuchun. author.<br/><a href="https://doi.org/10.1007/978-3-319-93049-7">https://doi.org/10.1007/978-3-319-93049-7</a><br/>Format:&#160;Electronic Resources<br/> Research and Practical Issues of Enterprise Information Systems 12th IFIP WG 8.9 Working Conference, CONFENIS 2018, Held at the 24th IFIP World Computer Congress, WCC 2018, Poznan, Poland, September 18&ndash;19, 2018, Proceedings ent://SD_ILS/0/SD_ILS:221872 2024-06-03T20:15:57Z 2024-06-03T20:15:57Z Yazar&#160;Tjoa, A Min. editor. (orcid)0000-0002-8295-9252<br/><a href="https://doi.org/10.1007/978-3-319-99040-8">https://doi.org/10.1007/978-3-319-99040-8</a><br/>Format:&#160;Electronic Resources<br/> Honeypot Frameworks and Their Applications: A New Framework ent://SD_ILS/0/SD_ILS:221443 2024-06-03T20:15:57Z 2024-06-03T20:15:57Z Yazar&#160;NG, Chee Keong. author.<br/><a href="https://doi.org/10.1007/978-981-10-7739-5">https://doi.org/10.1007/978-981-10-7739-5</a><br/>Format:&#160;Electronic Resources<br/> Versatile Cybersecurity ent://SD_ILS/0/SD_ILS:222139 2024-06-03T20:15:57Z 2024-06-03T20:15:57Z Yazar&#160;Conti, Mauro. editor.<br/><a href="https://doi.org/10.1007/978-3-319-97643-3">https://doi.org/10.1007/978-3-319-97643-3</a><br/>Format:&#160;Electronic Resources<br/> Trust Management XII 12th IFIP WG 11.11 International Conference, IFIPTM 2018, Toronto, ON, Canada, July 10&ndash;13, 2018, Proceedings ent://SD_ILS/0/SD_ILS:225564 2024-06-03T20:15:57Z 2024-06-03T20:15:57Z Yazar&#160;Gal-Oz, Nurit. editor.<br/><a href="https://doi.org/10.1007/978-3-319-95276-5">https://doi.org/10.1007/978-3-319-95276-5</a><br/>Format:&#160;Electronic Resources<br/> Network Intrusion Detection using Deep Learning A Feature Learning Approach ent://SD_ILS/0/SD_ILS:222014 2024-06-03T20:15:57Z 2024-06-03T20:15:57Z Yazar&#160;Kim, Kwangjo. author.<br/><a href="https://doi.org/10.1007/978-981-13-1444-5">https://doi.org/10.1007/978-981-13-1444-5</a><br/>Format:&#160;Electronic Resources<br/> Critical Infrastructure Protection XII 12th IFIP WG 11.10 International Conference, ICCIP 2018, Arlington, VA, USA, March 12-14, 2018, Revised Selected Papers ent://SD_ILS/0/SD_ILS:222387 2024-06-03T20:15:57Z 2024-06-03T20:15:57Z Yazar&#160;Staggs, Jason. editor.<br/><a href="https://doi.org/10.1007/978-3-030-04537-1">https://doi.org/10.1007/978-3-030-04537-1</a><br/>Format:&#160;Electronic Resources<br/> Foundations and Practice of Security 10th International Symposium, FPS 2017, Nancy, France, October 23-25, 2017, Revised Selected Papers ent://SD_ILS/0/SD_ILS:225604 2024-06-03T20:15:57Z 2024-06-03T20:15:57Z Yazar&#160;Imine, Abdessamad. editor.<br/><a href="https://doi.org/10.1007/978-3-319-75650-9">https://doi.org/10.1007/978-3-319-75650-9</a><br/>Format:&#160;Electronic Resources<br/> Cloud Computing, Security, Privacy in New Computing Environments 7th International Conference, CloudComp 2016, and First International Conference, SPNCE 2016, Guangzhou, China, November 25&ndash;26, and December 15&ndash;16, 2016, Proceedings ent://SD_ILS/0/SD_ILS:222755 2024-06-03T20:15:57Z 2024-06-03T20:15:57Z Yazar&#160;Wan, Jiafu. editor.<br/><a href="https://doi.org/10.1007/978-3-319-69605-8">https://doi.org/10.1007/978-3-319-69605-8</a><br/>Format:&#160;Electronic Resources<br/> Advanced Monitoring in P2P Botnets A Dual Perspective ent://SD_ILS/0/SD_ILS:223113 2024-06-03T20:15:57Z 2024-06-03T20:15:57Z Yazar&#160;Karuppayah, Shankar. author.<br/><a href="https://doi.org/10.1007/978-981-10-9050-9">https://doi.org/10.1007/978-981-10-9050-9</a><br/>Format:&#160;Electronic Resources<br/> Digital Forensics and Cyber Crime 9th International Conference, ICDF2C 2017, Prague, Czech Republic, October 9-11, 2017, Proceedings ent://SD_ILS/0/SD_ILS:225515 2024-06-03T20:15:57Z 2024-06-03T20:15:57Z Yazar&#160;Matou&scaron;ek, Petr. editor.<br/><a href="https://doi.org/10.1007/978-3-319-73697-6">https://doi.org/10.1007/978-3-319-73697-6</a><br/>Format:&#160;Electronic Resources<br/> Privacy and Identity Management. The Smart Revolution 12th IFIP WG 9.2, 9.5, 9.6/11.7, 11.6/SIG 9.2.2 International Summer School, Ispra, Italy, September 4-8, 2017, Revised Selected Papers ent://SD_ILS/0/SD_ILS:224645 2024-06-03T20:15:57Z 2024-06-03T20:15:57Z Yazar&#160;Hansen, Marit. editor.<br/><a href="https://doi.org/10.1007/978-3-319-92925-5">https://doi.org/10.1007/978-3-319-92925-5</a><br/>Format:&#160;Electronic Resources<br/> Future Network Systems and Security 4th International Conference, FNSS 2018, Paris, France, July 9&ndash;11, 2018, Proceedings ent://SD_ILS/0/SD_ILS:224989 2024-06-03T20:15:57Z 2024-06-03T20:15:57Z Yazar&#160;Doss, Robin. editor. (orcid)0000-0001-6143-6850<br/><a href="https://doi.org/10.1007/978-3-319-94421-0">https://doi.org/10.1007/978-3-319-94421-0</a><br/>Format:&#160;Electronic Resources<br/> Security and Privacy in Communication Networks SecureComm 2017 International Workshops, ATCS and SePrIoT, Niagara Falls, ON, Canada, October 22&ndash;25, 2017, Proceedings ent://SD_ILS/0/SD_ILS:223280 2024-06-03T20:15:57Z 2024-06-03T20:15:57Z Yazar&#160;Lin, Xiaodong. editor.<br/><a href="https://doi.org/10.1007/978-3-319-78816-6">https://doi.org/10.1007/978-3-319-78816-6</a><br/>Format:&#160;Electronic Resources<br/> Mobile Internet Security First International Symposium, MobiSec 2016, Taichung, Taiwan, July 14-15, 2016, Revised Selected Papers ent://SD_ILS/0/SD_ILS:223577 2024-06-03T20:15:57Z 2024-06-03T20:15:57Z Yazar&#160;You, Ilsun. editor.<br/><a href="https://doi.org/10.1007/978-981-10-7850-7">https://doi.org/10.1007/978-981-10-7850-7</a><br/>Format:&#160;Electronic Resources<br/> Big Data Technologies for Monitoring of Computer Security: A Case Study of the Russian Federation ent://SD_ILS/0/SD_ILS:225454 2024-06-03T20:15:57Z 2024-06-03T20:15:57Z Yazar&#160;Petrenko, Sergei. author.<br/><a href="https://doi.org/10.1007/978-3-319-79036-7">https://doi.org/10.1007/978-3-319-79036-7</a><br/>Format:&#160;Electronic Resources<br/> Advanced Hybrid Information Processing First International Conference, ADHIP 2017, Harbin, China, July 17&ndash;18, 2017, Proceedings ent://SD_ILS/0/SD_ILS:226015 2024-06-03T20:15:57Z 2024-06-03T20:15:57Z Yazar&#160;Sun, Guanglu. editor.<br/><a href="https://doi.org/10.1007/978-3-319-73317-3">https://doi.org/10.1007/978-3-319-73317-3</a><br/>Format:&#160;Electronic Resources<br/> Information Systems Security and Privacy Second International Conference, ICISSP 2016, Rome, Italy, February 19-21, 2016, Revised Selected Papers ent://SD_ILS/0/SD_ILS:225656 2024-06-03T20:15:57Z 2024-06-03T20:15:57Z Yazar&#160;Camp, Olivier. editor.<br/><a href="https://doi.org/10.1007/978-3-319-54433-5">https://doi.org/10.1007/978-3-319-54433-5</a><br/>Format:&#160;Electronic Resources<br/> Information Security and Cryptology &ndash; ICISC 2016 19th International Conference, Seoul, South Korea, November 30 &ndash; December 2, 2016, Revised Selected Papers ent://SD_ILS/0/SD_ILS:221296 2024-06-03T20:15:57Z 2024-06-03T20:15:57Z Yazar&#160;Hong, Seokhie. editor.<br/><a href="https://doi.org/10.1007/978-3-319-53177-9">https://doi.org/10.1007/978-3-319-53177-9</a><br/>Format:&#160;Electronic Resources<br/> Security, Privacy, and Anonymity in Computation, Communication, and Storage SpaCCS 2017 International Workshops, Guangzhou, China, December 12-15, 2017, Proceedings ent://SD_ILS/0/SD_ILS:221365 2024-06-03T20:15:57Z 2024-06-03T20:15:57Z Yazar&#160;Wang, Guojun. editor. (orcid)0000-0001-9875-4182<br/><a href="https://doi.org/10.1007/978-3-319-72395-2">https://doi.org/10.1007/978-3-319-72395-2</a><br/>Format:&#160;Electronic Resources<br/> Resilience and Risk Methods and Application in Environment, Cyber and Social Domains ent://SD_ILS/0/SD_ILS:224440 2024-06-03T20:15:57Z 2024-06-03T20:15:57Z Yazar&#160;Linkov, Igor. editor.<br/><a href="https://doi.org/10.1007/978-94-024-1123-2">https://doi.org/10.1007/978-94-024-1123-2</a><br/>Format:&#160;Electronic Resources<br/> Ad Hoc Networks 8th International Conference, ADHOCNETS 2016, Ottawa, Canada, September 26-27, 2016, Revised Selected Papers ent://SD_ILS/0/SD_ILS:225339 2024-06-03T20:15:57Z 2024-06-03T20:15:57Z Yazar&#160;Zhou, Yifeng. editor.<br/><a href="https://doi.org/10.1007/978-3-319-51204-4">https://doi.org/10.1007/978-3-319-51204-4</a><br/>Format:&#160;Electronic Resources<br/> Cyber Security Cryptography and Machine Learning First International Conference, CSCML 2017, Beer-Sheva, Israel, June 29-30, 2017, Proceedings ent://SD_ILS/0/SD_ILS:225440 2024-06-03T20:15:57Z 2024-06-03T20:15:57Z Yazar&#160;Dolev, Shlomi. editor.<br/><a href="https://doi.org/10.1007/978-3-319-60080-2">https://doi.org/10.1007/978-3-319-60080-2</a><br/>Format:&#160;Electronic Resources<br/> Security, Privacy, and Anonymity in Computation, Communication, and Storage 10th International Conference, SpaCCS 2017, Guangzhou, China, December 12-15, 2017, Proceedings ent://SD_ILS/0/SD_ILS:222113 2024-06-03T20:15:57Z 2024-06-03T20:15:57Z Yazar&#160;Wang, Guojun. editor. (orcid)0000-0001-9875-4182<br/><a href="https://doi.org/10.1007/978-3-319-72389-1">https://doi.org/10.1007/978-3-319-72389-1</a><br/>Format:&#160;Electronic Resources<br/> Trusted Computing and Information Security 11th Chinese Conference, CTCIS 2017, Changsha, China, September 14-17, 2017, Proceedings ent://SD_ILS/0/SD_ILS:222885 2024-06-03T20:15:57Z 2024-06-03T20:15:57Z Yazar&#160;Xu, Ming. editor.<br/><a href="https://doi.org/10.1007/978-981-10-7080-8">https://doi.org/10.1007/978-981-10-7080-8</a><br/>Format:&#160;Electronic Resources<br/> Mobile Networks and Management 8th International Conference, MONAMI 2016, Abu Dhabi, United Arab Emirates, October 23-24, 2016, Proceedings ent://SD_ILS/0/SD_ILS:223252 2024-06-03T20:15:57Z 2024-06-03T20:15:57Z Yazar&#160;Ag&uuml;ero, Ram&oacute;n. editor.<br/><a href="https://doi.org/10.1007/978-3-319-52712-3">https://doi.org/10.1007/978-3-319-52712-3</a><br/>Format:&#160;Electronic Resources<br/> Applied Cryptography and Network Security 15th International Conference, ACNS 2017, Kanazawa, Japan, July 10-12, 2017, Proceedings ent://SD_ILS/0/SD_ILS:223105 2024-06-03T20:15:57Z 2024-06-03T20:15:57Z Yazar&#160;Gollmann, Dieter. editor.<br/><a href="https://doi.org/10.1007/978-3-319-61204-1">https://doi.org/10.1007/978-3-319-61204-1</a><br/>Format:&#160;Electronic Resources<br/> Security, Privacy, and Applied Cryptography Engineering 7th International Conference, SPACE 2017, Goa, India, December 13-17, 2017, Proceedings ent://SD_ILS/0/SD_ILS:223131 2024-06-03T20:15:57Z 2024-06-03T20:15:57Z Yazar&#160;Ali, Sk Subidh. editor.<br/><a href="https://doi.org/10.1007/978-3-319-71501-8">https://doi.org/10.1007/978-3-319-71501-8</a><br/>Format:&#160;Electronic Resources<br/> Progress in Cryptology &ndash; INDOCRYPT 2017 18th International Conference on Cryptology in India, Chennai, India, December 10-13, 2017, Proceedings ent://SD_ILS/0/SD_ILS:223132 2024-06-03T20:15:57Z 2024-06-03T20:15:57Z Yazar&#160;Patra, Arpita. editor.<br/><a href="https://doi.org/10.1007/978-3-319-71667-1">https://doi.org/10.1007/978-3-319-71667-1</a><br/>Format:&#160;Electronic Resources<br/> Critical Infrastructure Protection XI 11th IFIP WG 11.10 International Conference, ICCIP 2017, Arlington, VA, USA, March 13-15, 2017, Revised Selected Papers ent://SD_ILS/0/SD_ILS:222855 2024-06-03T20:15:57Z 2024-06-03T20:15:57Z Yazar&#160;Rice, Mason. editor.<br/><a href="https://doi.org/10.1007/978-3-319-70395-4">https://doi.org/10.1007/978-3-319-70395-4</a><br/>Format:&#160;Electronic Resources<br/> Security and Privacy in Communication Networks 12th International Conference, SecureComm 2016, Guangzhou, China, October 10-12, 2016, Proceedings ent://SD_ILS/0/SD_ILS:222763 2024-06-03T20:15:57Z 2024-06-03T20:15:57Z Yazar&#160;Deng, Robert. editor.<br/><a href="https://doi.org/10.1007/978-3-319-59608-2">https://doi.org/10.1007/978-3-319-59608-2</a><br/>Format:&#160;Electronic Resources<br/> Trust Management XI 11th IFIP WG 11.11 International Conference, IFIPTM 2017, Gothenburg, Sweden, June 12-16, 2017, Proceedings ent://SD_ILS/0/SD_ILS:225277 2024-06-03T20:15:57Z 2024-06-03T20:15:57Z Yazar&#160;Stegh&ouml;fer, Jan-Philipp. editor. (orcid)0000-0003-1694-0972<br/><a href="https://doi.org/10.1007/978-3-319-59171-1">https://doi.org/10.1007/978-3-319-59171-1</a><br/>Format:&#160;Electronic Resources<br/> Research in Attacks, Intrusions, and Defenses 20th International Symposium, RAID 2017, Atlanta, GA, USA, September 18&ndash;20, 2017, Proceedings ent://SD_ILS/0/SD_ILS:224543 2024-06-03T20:15:57Z 2024-06-03T20:15:57Z Yazar&#160;Dacier, Marc. editor.<br/><a href="https://doi.org/10.1007/978-3-319-66332-6">https://doi.org/10.1007/978-3-319-66332-6</a><br/>Format:&#160;Electronic Resources<br/> Smart Cards, Tokens, Security and Applications ent://SD_ILS/0/SD_ILS:225183 2024-06-03T20:15:57Z 2024-06-03T20:15:57Z Yazar&#160;Mayes, Keith. editor.<br/><a href="https://doi.org/10.1007/978-3-319-50500-8">https://doi.org/10.1007/978-3-319-50500-8</a><br/>Format:&#160;Electronic Resources<br/> Secure ICT Service Provisioning for Cloud, Mobile and Beyond ESARIS: The Answer to the Demands of Industrialized IT Production Balancing Between Buyers and Providers ent://SD_ILS/0/SD_ILS:226325 2024-06-03T20:15:57Z 2024-06-03T20:15:57Z Yazar&#160;von Faber, Eberhard. author.<br/><a href="https://doi.org/10.1007/978-3-658-16482-9">https://doi.org/10.1007/978-3-658-16482-9</a><br/>Format:&#160;Electronic Resources<br/> Industrial IoT Technologies and Applications Second EAI International Conference, Industrial IoT 2017, Wuhu, China, March 25&ndash;26, 2017, Proceedings ent://SD_ILS/0/SD_ILS:222196 2024-06-03T20:15:57Z 2024-06-03T20:15:57Z Yazar&#160;Chen, Fulong. editor.<br/><a href="https://doi.org/10.1007/978-3-319-60753-5">https://doi.org/10.1007/978-3-319-60753-5</a><br/>Format:&#160;Electronic Resources<br/> Principles of Security and Trust 6th International Conference, POST 2017, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2017, Uppsala, Sweden, April 22-29, 2017, Proceedings ent://SD_ILS/0/SD_ILS:223963 2024-06-03T20:15:57Z 2024-06-03T20:15:57Z Yazar&#160;Maffei, Matteo. editor.<br/><a href="https://doi.org/10.1007/978-3-662-54455-6">https://doi.org/10.1007/978-3-662-54455-6</a><br/>Format:&#160;Electronic Resources<br/> Fundamentals of Secure System Modelling ent://SD_ILS/0/SD_ILS:225142 2024-06-03T20:15:57Z 2024-06-03T20:15:57Z Yazar&#160;Matulevičius, Raimundas. author.<br/><a href="https://doi.org/10.1007/978-3-319-61717-6">https://doi.org/10.1007/978-3-319-61717-6</a><br/>Format:&#160;Electronic Resources<br/> Advances in Digital Forensics XIII 13th IFIP WG 11.9 International Conference, Orlando, FL, USA, January 30 - February 1, 2017, Revised Selected Papers ent://SD_ILS/0/SD_ILS:225996 2024-06-03T20:15:57Z 2024-06-03T20:15:57Z Yazar&#160;Peterson, Gilbert. editor.<br/><a href="https://doi.org/10.1007/978-3-319-67208-3">https://doi.org/10.1007/978-3-319-67208-3</a><br/>Format:&#160;Electronic Resources<br/> E-Business and Telecommunications 13th International Joint Conference, ICETE 2016, Lisbon, Portugal, July 26-28, 2016, Revised Selected Papers ent://SD_ILS/0/SD_ILS:226000 2024-06-03T20:15:57Z 2024-06-03T20:15:57Z Yazar&#160;Obaidat, Mohammad S. editor.<br/><a href="https://doi.org/10.1007/978-3-319-67876-4">https://doi.org/10.1007/978-3-319-67876-4</a><br/>Format:&#160;Electronic Resources<br/> Interoperability, Safety and Security in IoT Second International Conference, InterIoT 2016 and Third International Conference, SaSeIoT 2016, Paris, France, October 26-27, 2016, Revised Selected Papers ent://SD_ILS/0/SD_ILS:226672 2024-06-03T20:15:57Z 2024-06-03T20:15:57Z Yazar&#160;Mitton, Nathalie. editor.<br/><a href="https://doi.org/10.1007/978-3-319-52727-7">https://doi.org/10.1007/978-3-319-52727-7</a><br/>Format:&#160;Electronic Resources<br/> Enterprise Identity Management Towards an Investment Decision Support Approach ent://SD_ILS/0/SD_ILS:2623 2024-06-03T20:15:57Z 2024-06-03T20:15:57Z Yazar&#160;Royer, Denis. author.<br/><a href="http://dx.doi.org/10.1007/978-3-642-35040-5">http://dx.doi.org/10.1007/978-3-642-35040-5</a><br/>Format:&#160;Electronic Resources<br/>