Search Results for - Narrowed by: Springer E-Book Collection - Data protection. - Software engineering. - Computer security.SirsiDynix Enterprisehttps://catalog.tedu.edu.tr/client/tr_TR/defaulttr/defaulttr/qf$003dLOCATION$002509Lokasyon$0025091$00253ASPRINGER$002509Springer$002bE-Book$002bCollection$0026qf$003dSUBJECT$002509Konu$002509Data$002bprotection.$002509Data$002bprotection.$0026qf$003dSUBJECT$002509Konu$002509Software$002bengineering.$002509Software$002bengineering.$0026qf$003dSUBJECT$002509Konu$002509Computer$002bsecurity.$002509Computer$002bsecurity.$0026ps$003d300?2024-06-15T04:53:01ZCritical Infrastructure Protection XIII 13th IFIP WG 11.10 International Conference, ICCIP 2019, Arlington, VA, USA, March 11–12, 2019, Revised Selected Papersent://SD_ILS/0/SD_ILS:4282662024-06-15T04:53:01Z2024-06-15T04:53:01ZYazar Staggs, Jason. editor.<br/><a href="https://doi.org/10.1007/978-3-030-34647-8">https://doi.org/10.1007/978-3-030-34647-8</a><br/>Format: Electronic Resources<br/>Frontiers in Cyber Security Second International Conference, FCS 2019, Xi'an, China, November 15–17, 2019, Proceedingsent://SD_ILS/0/SD_ILS:4288562024-06-15T04:53:01Z2024-06-15T04:53:01ZYazar Shen, Bazhong. editor.<br/><a href="https://doi.org/10.1007/978-981-15-0818-9">https://doi.org/10.1007/978-981-15-0818-9</a><br/>Format: Electronic Resources<br/>Architecture for Blockchain Applicationsent://SD_ILS/0/SD_ILS:4285882024-06-15T04:53:01Z2024-06-15T04:53:01ZYazar Xu, Xiwei. author.<br/><a href="https://doi.org/10.1007/978-3-030-03035-3">https://doi.org/10.1007/978-3-030-03035-3</a><br/>Format: Electronic Resources<br/>Mobile Networks and Management 8th International Conference, MONAMI 2016, Abu Dhabi, United Arab Emirates, October 23-24, 2016, Proceedingsent://SD_ILS/0/SD_ILS:2232522024-06-15T04:53:01Z2024-06-15T04:53:01ZYazar Agüero, Ramón. editor.<br/><a href="https://doi.org/10.1007/978-3-319-52712-3">https://doi.org/10.1007/978-3-319-52712-3</a><br/>Format: Electronic Resources<br/>Fundamentals of Secure System Modellingent://SD_ILS/0/SD_ILS:2251422024-06-15T04:53:01Z2024-06-15T04:53:01ZYazar Matulevičius, Raimundas. author.<br/><a href="https://doi.org/10.1007/978-3-319-61717-6">https://doi.org/10.1007/978-3-319-61717-6</a><br/>Format: Electronic Resources<br/>Ad Hoc Networks 8th International Conference, ADHOCNETS 2016, Ottawa, Canada, September 26-27, 2016, Revised Selected Papersent://SD_ILS/0/SD_ILS:2253392024-06-15T04:53:01Z2024-06-15T04:53:01ZYazar Zhou, Yifeng. editor.<br/><a href="https://doi.org/10.1007/978-3-319-51204-4">https://doi.org/10.1007/978-3-319-51204-4</a><br/>Format: Electronic Resources<br/>E-Business and Telecommunications 13th International Joint Conference, ICETE 2016, Lisbon, Portugal, July 26-28, 2016, Revised Selected Papersent://SD_ILS/0/SD_ILS:2260002024-06-15T04:53:01Z2024-06-15T04:53:01ZYazar Obaidat, Mohammad S. editor.<br/><a href="https://doi.org/10.1007/978-3-319-67876-4">https://doi.org/10.1007/978-3-319-67876-4</a><br/>Format: Electronic Resources<br/>Interoperability, Safety and Security in IoT Second International Conference, InterIoT 2016 and Third International Conference, SaSeIoT 2016, Paris, France, October 26-27, 2016, Revised Selected Papersent://SD_ILS/0/SD_ILS:2266722024-06-15T04:53:01Z2024-06-15T04:53:01ZYazar Mitton, Nathalie. editor.<br/><a href="https://doi.org/10.1007/978-3-319-52727-7">https://doi.org/10.1007/978-3-319-52727-7</a><br/>Format: Electronic Resources<br/>Critical Infrastructure Protection XI 11th IFIP WG 11.10 International Conference, ICCIP 2017, Arlington, VA, USA, March 13-15, 2017, Revised Selected Papersent://SD_ILS/0/SD_ILS:2228552024-06-15T04:53:01Z2024-06-15T04:53:01ZYazar Rice, Mason. editor.<br/><a href="https://doi.org/10.1007/978-3-319-70395-4">https://doi.org/10.1007/978-3-319-70395-4</a><br/>Format: Electronic Resources<br/>Trust Management XI 11th IFIP WG 11.11 International Conference, IFIPTM 2017, Gothenburg, Sweden, June 12-16, 2017, Proceedingsent://SD_ILS/0/SD_ILS:2252772024-06-15T04:53:01Z2024-06-15T04:53:01ZYazar Steghöfer, Jan-Philipp. editor. (orcid)0000-0003-1694-0972<br/><a href="https://doi.org/10.1007/978-3-319-59171-1">https://doi.org/10.1007/978-3-319-59171-1</a><br/>Format: Electronic Resources<br/>Applied Cryptography and Network Security 15th International Conference, ACNS 2017, Kanazawa, Japan, July 10-12, 2017, Proceedingsent://SD_ILS/0/SD_ILS:2231052024-06-15T04:53:01Z2024-06-15T04:53:01ZYazar Gollmann, Dieter. editor.<br/><a href="https://doi.org/10.1007/978-3-319-61204-1">https://doi.org/10.1007/978-3-319-61204-1</a><br/>Format: Electronic Resources<br/>Industrial IoT Technologies and Applications Second EAI International Conference, Industrial IoT 2017, Wuhu, China, March 25–26, 2017, Proceedingsent://SD_ILS/0/SD_ILS:2221962024-06-15T04:53:01Z2024-06-15T04:53:01ZYazar Chen, Fulong. editor.<br/><a href="https://doi.org/10.1007/978-3-319-60753-5">https://doi.org/10.1007/978-3-319-60753-5</a><br/>Format: Electronic Resources<br/>