Search Results for - Narrowed by: Computer security. - Wang, Lingyu. author. - Electronic Book SirsiDynix Enterprise https://catalog.tedu.edu.tr/client/tr_TR/defaulttr/defaulttr/qf$003dSUBJECT$002509Konu$002509Computer$002bsecurity.$002509Computer$002bsecurity.$0026qf$003dAUTHOR$002509Yazar$002509Wang$00252C$002bLingyu.$002bauthor.$002509Wang$00252C$002bLingyu.$002bauthor.$0026qf$003dITYPE$002509Materyal$002bT$0025C3$0025BCr$0025C3$0025BC$0025091$00253AE-BOOKS$002509Electronic$002bBook$0026ps$003d300? 2024-06-13T23:32:44Z Network Security Metrics ent://SD_ILS/0/SD_ILS:225710 2024-06-13T23:32:44Z 2024-06-13T23:32:44Z Yazar&#160;Wang, Lingyu. author.<br/><a href="https://doi.org/10.1007/978-3-319-66505-4">https://doi.org/10.1007/978-3-319-66505-4</a><br/>Format:&#160;Electronic Resources<br/> Preserving Privacy Against Side-Channel Leaks From Data Publishing to Web Applications ent://SD_ILS/0/SD_ILS:18217 2024-06-13T23:32:44Z 2024-06-13T23:32:44Z Yazar&#160;Liu, Wen Ming. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-42644-0">http://dx.doi.org/10.1007/978-3-319-42644-0</a><br/>Format:&#160;Electronic Resources<br/> Aspect-Oriented Security Hardening of UML Design Models ent://SD_ILS/0/SD_ILS:22493 2024-06-13T23:32:44Z 2024-06-13T23:32:44Z Yazar&#160;Mouheb, Djedjiga. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-16106-8">http://dx.doi.org/10.1007/978-3-319-16106-8</a><br/>Format:&#160;Electronic Resources<br/> Network Hardening An Automated Approach to Improving Network Security ent://SD_ILS/0/SD_ILS:20506 2024-06-13T23:32:44Z 2024-06-13T23:32:44Z Yazar&#160;Wang, Lingyu. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-04612-9">http://dx.doi.org/10.1007/978-3-319-04612-9</a><br/>Format:&#160;Electronic Resources<br/>