Search Results for - Narrowed by: Springer E-Book Collection - Data protection. - Software engineering. - Computer security. SirsiDynix Enterprise https://catalog.tedu.edu.tr/client/tr_TR/defaulttr/defaulttr/qf$003dLOCATION$002509Lokasyon$0025091$00253ASPRINGER$002509Springer$002bE-Book$002bCollection$0026qf$003dSUBJECT$002509Konu$002509Data$002bprotection.$002509Data$002bprotection.$0026qf$003dSUBJECT$002509Konu$002509Software$002bengineering.$002509Software$002bengineering.$0026qf$003dSUBJECT$002509Konu$002509Computer$002bsecurity.$002509Computer$002bsecurity.$0026ps$003d300? 2024-06-15T04:53:01Z Critical Infrastructure Protection XIII 13th IFIP WG 11.10 International Conference, ICCIP 2019, Arlington, VA, USA, March 11&ndash;12, 2019, Revised Selected Papers ent://SD_ILS/0/SD_ILS:428266 2024-06-15T04:53:01Z 2024-06-15T04:53:01Z Yazar&#160;Staggs, Jason. editor.<br/><a href="https://doi.org/10.1007/978-3-030-34647-8">https://doi.org/10.1007/978-3-030-34647-8</a><br/>Format:&#160;Electronic Resources<br/> Frontiers in Cyber Security Second International Conference, FCS 2019, Xi'an, China, November 15&ndash;17, 2019, Proceedings ent://SD_ILS/0/SD_ILS:428856 2024-06-15T04:53:01Z 2024-06-15T04:53:01Z Yazar&#160;Shen, Bazhong. editor.<br/><a href="https://doi.org/10.1007/978-981-15-0818-9">https://doi.org/10.1007/978-981-15-0818-9</a><br/>Format:&#160;Electronic Resources<br/> Architecture for Blockchain Applications ent://SD_ILS/0/SD_ILS:428588 2024-06-15T04:53:01Z 2024-06-15T04:53:01Z Yazar&#160;Xu, Xiwei. author.<br/><a href="https://doi.org/10.1007/978-3-030-03035-3">https://doi.org/10.1007/978-3-030-03035-3</a><br/>Format:&#160;Electronic Resources<br/> Mobile Networks and Management 8th International Conference, MONAMI 2016, Abu Dhabi, United Arab Emirates, October 23-24, 2016, Proceedings ent://SD_ILS/0/SD_ILS:223252 2024-06-15T04:53:01Z 2024-06-15T04:53:01Z Yazar&#160;Ag&uuml;ero, Ram&oacute;n. editor.<br/><a href="https://doi.org/10.1007/978-3-319-52712-3">https://doi.org/10.1007/978-3-319-52712-3</a><br/>Format:&#160;Electronic Resources<br/> Fundamentals of Secure System Modelling ent://SD_ILS/0/SD_ILS:225142 2024-06-15T04:53:01Z 2024-06-15T04:53:01Z Yazar&#160;Matulevičius, Raimundas. author.<br/><a href="https://doi.org/10.1007/978-3-319-61717-6">https://doi.org/10.1007/978-3-319-61717-6</a><br/>Format:&#160;Electronic Resources<br/> Ad Hoc Networks 8th International Conference, ADHOCNETS 2016, Ottawa, Canada, September 26-27, 2016, Revised Selected Papers ent://SD_ILS/0/SD_ILS:225339 2024-06-15T04:53:01Z 2024-06-15T04:53:01Z Yazar&#160;Zhou, Yifeng. editor.<br/><a href="https://doi.org/10.1007/978-3-319-51204-4">https://doi.org/10.1007/978-3-319-51204-4</a><br/>Format:&#160;Electronic Resources<br/> E-Business and Telecommunications 13th International Joint Conference, ICETE 2016, Lisbon, Portugal, July 26-28, 2016, Revised Selected Papers ent://SD_ILS/0/SD_ILS:226000 2024-06-15T04:53:01Z 2024-06-15T04:53:01Z Yazar&#160;Obaidat, Mohammad S. editor.<br/><a href="https://doi.org/10.1007/978-3-319-67876-4">https://doi.org/10.1007/978-3-319-67876-4</a><br/>Format:&#160;Electronic Resources<br/> Interoperability, Safety and Security in IoT Second International Conference, InterIoT 2016 and Third International Conference, SaSeIoT 2016, Paris, France, October 26-27, 2016, Revised Selected Papers ent://SD_ILS/0/SD_ILS:226672 2024-06-15T04:53:01Z 2024-06-15T04:53:01Z Yazar&#160;Mitton, Nathalie. editor.<br/><a href="https://doi.org/10.1007/978-3-319-52727-7">https://doi.org/10.1007/978-3-319-52727-7</a><br/>Format:&#160;Electronic Resources<br/> Critical Infrastructure Protection XI 11th IFIP WG 11.10 International Conference, ICCIP 2017, Arlington, VA, USA, March 13-15, 2017, Revised Selected Papers ent://SD_ILS/0/SD_ILS:222855 2024-06-15T04:53:01Z 2024-06-15T04:53:01Z Yazar&#160;Rice, Mason. editor.<br/><a href="https://doi.org/10.1007/978-3-319-70395-4">https://doi.org/10.1007/978-3-319-70395-4</a><br/>Format:&#160;Electronic Resources<br/> Trust Management XI 11th IFIP WG 11.11 International Conference, IFIPTM 2017, Gothenburg, Sweden, June 12-16, 2017, Proceedings ent://SD_ILS/0/SD_ILS:225277 2024-06-15T04:53:01Z 2024-06-15T04:53:01Z Yazar&#160;Stegh&ouml;fer, Jan-Philipp. editor. (orcid)0000-0003-1694-0972<br/><a href="https://doi.org/10.1007/978-3-319-59171-1">https://doi.org/10.1007/978-3-319-59171-1</a><br/>Format:&#160;Electronic Resources<br/> Applied Cryptography and Network Security 15th International Conference, ACNS 2017, Kanazawa, Japan, July 10-12, 2017, Proceedings ent://SD_ILS/0/SD_ILS:223105 2024-06-15T04:53:01Z 2024-06-15T04:53:01Z Yazar&#160;Gollmann, Dieter. editor.<br/><a href="https://doi.org/10.1007/978-3-319-61204-1">https://doi.org/10.1007/978-3-319-61204-1</a><br/>Format:&#160;Electronic Resources<br/> Industrial IoT Technologies and Applications Second EAI International Conference, Industrial IoT 2017, Wuhu, China, March 25&ndash;26, 2017, Proceedings ent://SD_ILS/0/SD_ILS:222196 2024-06-15T04:53:01Z 2024-06-15T04:53:01Z Yazar&#160;Chen, Fulong. editor.<br/><a href="https://doi.org/10.1007/978-3-319-60753-5">https://doi.org/10.1007/978-3-319-60753-5</a><br/>Format:&#160;Electronic Resources<br/>