Search Results for - Narrowed by: Computer security. - Biometrics. SirsiDynix Enterprise https://catalog.tedu.edu.tr/client/tr_TR/defaulttr/defaulttr/qf$003dSUBJECT$002509Konu$002509Computer$002bsecurity.$002509Computer$002bsecurity.$0026qf$003dSUBJECT$002509Konu$002509Biometrics.$002509Biometrics.$0026ps$003d300? 2024-05-17T11:55:12Z Introduction to Intelligent Surveillance Surveillance Data Capture, Transmission, and Analytics ent://SD_ILS/0/SD_ILS:428240 2024-05-17T11:55:12Z 2024-05-17T11:55:12Z Yazar&#160;Yan, Wei Qi. author.<br/><a href="https://doi.org/10.1007/978-3-030-10713-0">https://doi.org/10.1007/978-3-030-10713-0</a><br/>Format:&#160;Electronic Resources<br/> Biometric Recognition 14th Chinese Conference, CCBR 2019, Zhuzhou, China, October 12&ndash;13, 2019, Proceedings ent://SD_ILS/0/SD_ILS:428864 2024-05-17T11:55:12Z 2024-05-17T11:55:12Z Yazar&#160;Sun, Zhenan. editor.<br/><a href="https://doi.org/10.1007/978-3-030-31456-9">https://doi.org/10.1007/978-3-030-31456-9</a><br/>Format:&#160;Electronic Resources<br/> Biometric Recognition 13th Chinese Conference, CCBR 2018, Urumqi, China, August 11-12, 2018, Proceedings ent://SD_ILS/0/SD_ILS:222473 2024-05-17T11:55:12Z 2024-05-17T11:55:12Z Yazar&#160;Zhou, Jie. editor.<br/><a href="https://doi.org/10.1007/978-3-319-97909-0">https://doi.org/10.1007/978-3-319-97909-0</a><br/>Format:&#160;Electronic Resources<br/> Fundamental Computing Forensics for Africa A Case Study of the Science in Nigeria ent://SD_ILS/0/SD_ILS:224990 2024-05-17T11:55:12Z 2024-05-17T11:55:12Z Yazar&#160;Iorliam, Aamo. author.<br/><a href="https://doi.org/10.1007/978-3-319-94499-9">https://doi.org/10.1007/978-3-319-94499-9</a><br/>Format:&#160;Electronic Resources<br/> Information Security Practices Emerging Threats and Perspectives ent://SD_ILS/0/SD_ILS:225744 2024-05-17T11:55:12Z 2024-05-17T11:55:12Z Yazar&#160;Traor&eacute;, Issa. editor.<br/><a href="https://doi.org/10.1007/978-3-319-48947-6">https://doi.org/10.1007/978-3-319-48947-6</a><br/>Format:&#160;Electronic Resources<br/> Transactions on Computational Science XXX Special Issue on Cyberworlds and Cybersecurity ent://SD_ILS/0/SD_ILS:222783 2024-05-17T11:55:12Z 2024-05-17T11:55:12Z Yazar&#160;L. Gavrilova, Marina. editor.<br/><a href="https://doi.org/10.1007/978-3-662-56006-8">https://doi.org/10.1007/978-3-662-56006-8</a><br/>Format:&#160;Electronic Resources<br/> Advances in User Authentication ent://SD_ILS/0/SD_ILS:223574 2024-05-17T11:55:12Z 2024-05-17T11:55:12Z Yazar&#160;Dasgupta, Dipankar. author.<br/><a href="https://doi.org/10.1007/978-3-319-58808-7">https://doi.org/10.1007/978-3-319-58808-7</a><br/>Format:&#160;Electronic Resources<br/> Biometric Security and Privacy Opportunities &amp; Challenges in The Big Data Era ent://SD_ILS/0/SD_ILS:224261 2024-05-17T11:55:12Z 2024-05-17T11:55:12Z Yazar&#160;Jiang, Richard. editor.<br/><a href="https://doi.org/10.1007/978-3-319-47301-7">https://doi.org/10.1007/978-3-319-47301-7</a><br/>Format:&#160;Electronic Resources<br/> Transactions on Computational Science XXVIII Special Issue on Cyberworlds and Cybersecurity ent://SD_ILS/0/SD_ILS:18682 2024-05-17T11:55:12Z 2024-05-17T11:55:12Z Yazar&#160;Gavrilova, Marina L. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-53090-0">http://dx.doi.org/10.1007/978-3-662-53090-0</a><br/>Format:&#160;Electronic Resources<br/> Transactions on Computational Science XXVI Special Issue on Cyberworlds and Cybersecurity ent://SD_ILS/0/SD_ILS:18631 2024-05-17T11:55:12Z 2024-05-17T11:55:12Z Yazar&#160;Gavrilova, Marina L. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-49247-5">http://dx.doi.org/10.1007/978-3-662-49247-5</a><br/>Format:&#160;Electronic Resources<br/> Image Analysis and Recognition 13th International Conference, ICIAR 2016, in Memory of Mohamed Kamel, P&oacute;voa de Varzim, Portugal, July 13-15, 2016, Proceedings ent://SD_ILS/0/SD_ILS:18156 2024-05-17T11:55:12Z 2024-05-17T11:55:12Z Yazar&#160;Campilho, Aur&eacute;lio. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-41501-7">http://dx.doi.org/10.1007/978-3-319-41501-7</a><br/>Format:&#160;Electronic Resources<br/> Foundations and Practice of Security 8th International Symposium, FPS 2015, Clermont-Ferrand, France, October 26-28, 2015, Revised Selected Papers ent://SD_ILS/0/SD_ILS:17489 2024-05-17T11:55:12Z 2024-05-17T11:55:12Z Yazar&#160;Garcia-Alfaro, Joaquin. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-30303-1">http://dx.doi.org/10.1007/978-3-319-30303-1</a><br/>Format:&#160;Electronic Resources<br/> Secure IT Systems 20th Nordic Conference, NordSec 2015, Stockholm, Sweden, October 19&ndash;21, 2015, Proceedings ent://SD_ILS/0/SD_ILS:23530 2024-05-17T11:55:12Z 2024-05-17T11:55:12Z Yazar&#160;Buchegger, Sonja. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-26502-5">http://dx.doi.org/10.1007/978-3-319-26502-5</a><br/>Format:&#160;Electronic Resources<br/> Digital-Forensics and Watermarking 13th International Workshop, IWDW 2014, Taipei, Taiwan, October 1-4, 2014. Revised Selected Papers ent://SD_ILS/0/SD_ILS:22924 2024-05-17T11:55:12Z 2024-05-17T11:55:12Z Yazar&#160;Shi, Yun-Qing. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-19321-2">http://dx.doi.org/10.1007/978-3-319-19321-2</a><br/>Format:&#160;Electronic Resources<br/> Encyclopedia of Biometrics ent://SD_ILS/0/SD_ILS:19833 2024-05-17T11:55:12Z 2024-05-17T11:55:12Z Yazar&#160;Li, Stan Z. editor.<br/><a href="http://dx.doi.org/10.1007/978-1-4899-7488-4">http://dx.doi.org/10.1007/978-1-4899-7488-4</a><br/>Format:&#160;Electronic Resources<br/> Fundamentals of Sketch-Based Passwords A General Framework ent://SD_ILS/0/SD_ILS:22112 2024-05-17T11:55:12Z 2024-05-17T11:55:12Z Yazar&#160;Riggan, Benjamin S. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-13629-5">http://dx.doi.org/10.1007/978-3-319-13629-5</a><br/>Format:&#160;Electronic Resources<br/> Secure IT Systems 19th Nordic Conference, NordSec 2014, Troms&oslash;, Norway, October 15-17, 2014, Proceedings ent://SD_ILS/0/SD_ILS:21742 2024-05-17T11:55:12Z 2024-05-17T11:55:12Z Yazar&#160;Bernsmed, Karin. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-11599-3">http://dx.doi.org/10.1007/978-3-319-11599-3</a><br/>Format:&#160;Electronic Resources<br/> Availability, Reliability, and Security in Information Systems IFIP WG 8.4, 8.9, TC 5 International Cross-Domain Conference, CD-ARES 2014 and 4th International Workshop on Security and Cognitive Informatics for Homeland Defense, SeCIHD 2014, Fribourg, Switzerland, September 8-12, 2014. Proceedings ent://SD_ILS/0/SD_ILS:21620 2024-05-17T11:55:12Z 2024-05-17T11:55:12Z Yazar&#160;Teufel, Stephanie. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-10975-6">http://dx.doi.org/10.1007/978-3-319-10975-6</a><br/>Format:&#160;Electronic Resources<br/> Touchless Palmprint Recognition Systems ent://SD_ILS/0/SD_ILS:21497 2024-05-17T11:55:12Z 2024-05-17T11:55:12Z Yazar&#160;Genovese, Angelo. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-10365-5">http://dx.doi.org/10.1007/978-3-319-10365-5</a><br/>Format:&#160;Electronic Resources<br/> Communications and Multimedia Security 15th IFIP TC 6/TC 11 International Conference, CMS 2014, Aveiro, Portugal, September 25-26, 2014. Proceedings ent://SD_ILS/0/SD_ILS:24573 2024-05-17T11:55:12Z 2024-05-17T11:55:12Z Yazar&#160;Decker, Bart De. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-44885-4">http://dx.doi.org/10.1007/978-3-662-44885-4</a><br/>Format:&#160;Electronic Resources<br/>