Search Results for - Narrowed by: Computer security. - Computer networks -- Security measures. SirsiDynix Enterprise https://catalog.tedu.edu.tr/client/tr_TR/defaulttr/defaulttr/qf$003dSUBJECT$002509Konu$002509Computer$002bsecurity.$002509Computer$002bsecurity.$0026qf$003dSUBJECT$002509Konu$002509Computer$002bnetworks$002b--$002bSecurity$002bmeasures.$002509Computer$002bnetworks$002b--$002bSecurity$002bmeasures.$0026ps$003d300? 2024-05-17T09:02:05Z Selected Areas in Cryptography &ndash; SAC 2018 25th International Conference, Calgary, AB, Canada, August 15&ndash;17, 2018, Revised Selected Papers ent://SD_ILS/0/SD_ILS:427899 2024-05-17T09:02:05Z 2024-05-17T09:02:05Z Yazar&#160;Cid, Carlos. editor. (orcid)0000-0001-5761-8694<br/><a href="https://doi.org/10.1007/978-3-030-10970-7">https://doi.org/10.1007/978-3-030-10970-7</a><br/>Format:&#160;Electronic Resources<br/> Information Security Theory and Practice 12th IFIP WG 11.2 International Conference, WISTP 2018, Brussels, Belgium, December 10&ndash;11, 2018, Revised Selected Papers ent://SD_ILS/0/SD_ILS:428414 2024-05-17T09:02:05Z 2024-05-17T09:02:05Z Yazar&#160;Blazy, Olivier. editor. (orcid)0000-0001-6205-8249<br/><a href="https://doi.org/10.1007/978-3-030-20074-9">https://doi.org/10.1007/978-3-030-20074-9</a><br/>Format:&#160;Electronic Resources<br/> E-Business and Telecommunications 14th International Joint Conference, ICETE 2017, Madrid, Spain, July 24-26, 2017, Revised Selected Paper ent://SD_ILS/0/SD_ILS:428400 2024-05-17T09:02:05Z 2024-05-17T09:02:05Z Yazar&#160;Obaidat, Mohammad S. editor.<br/><a href="https://doi.org/10.1007/978-3-030-11039-0">https://doi.org/10.1007/978-3-030-11039-0</a><br/>Format:&#160;Electronic Resources<br/> Security and Privacy in Social Networks and Big Data 5th International Symposium, SocialSec 2019, Copenhagen, Denmark, July 14-17, 2019, Revised Selected Papers ent://SD_ILS/0/SD_ILS:428207 2024-05-17T09:02:05Z 2024-05-17T09:02:05Z Yazar&#160;Meng, Weizhi. editor. (orcid)0000-0003-4384-5786<br/><a href="https://doi.org/10.1007/978-981-15-0758-8">https://doi.org/10.1007/978-981-15-0758-8</a><br/>Format:&#160;Electronic Resources<br/> Security and Privacy Second ISEA International Conference, ISEA-ISAP 2018, Jaipur, India, January, 9&ndash;11, 2019, Revised Selected Papers ent://SD_ILS/0/SD_ILS:427798 2024-05-17T09:02:05Z 2024-05-17T09:02:05Z Yazar&#160;Nandi, Sukumar. editor.<br/><a href="https://doi.org/10.1007/978-981-13-7561-3">https://doi.org/10.1007/978-981-13-7561-3</a><br/>Format:&#160;Electronic Resources<br/> Secure IT Systems 24th Nordic Conference, NordSec 2019, Aalborg, Denmark, November 18&ndash;20, 2019, Proceedings ent://SD_ILS/0/SD_ILS:428747 2024-05-17T09:02:05Z 2024-05-17T09:02:05Z Yazar&#160;Askarov, Aslan. editor.<br/><a href="https://doi.org/10.1007/978-3-030-35055-0">https://doi.org/10.1007/978-3-030-35055-0</a><br/>Format:&#160;Electronic Resources<br/> Information Security 22nd International Conference, ISC 2019, New York City, NY, USA, September 16&ndash;18, 2019, Proceedings ent://SD_ILS/0/SD_ILS:428513 2024-05-17T09:02:05Z 2024-05-17T09:02:05Z Yazar&#160;Lin, Zhiqiang. editor.<br/><a href="https://doi.org/10.1007/978-3-030-30215-3">https://doi.org/10.1007/978-3-030-30215-3</a><br/>Format:&#160;Electronic Resources<br/> Applied Cryptography and Network Security Workshops ACNS 2019 Satellite Workshops, SiMLA, Cloud S&amp;P, AIBlock, and AIoTS, Bogota, Colombia, June 5&ndash;7, 2019, Proceedings ent://SD_ILS/0/SD_ILS:428283 2024-05-17T09:02:05Z 2024-05-17T09:02:05Z Yazar&#160;Zhou, Jianying. editor. (orcid)0000-0003-0594-0432<br/><a href="https://doi.org/10.1007/978-3-030-29729-9">https://doi.org/10.1007/978-3-030-29729-9</a><br/>Format:&#160;Electronic Resources<br/> Security in Computing and Communications 6th International Symposium, SSCC 2018, Bangalore, India, September 19&ndash;22, 2018, Revised Selected Papers ent://SD_ILS/0/SD_ILS:428170 2024-05-17T09:02:05Z 2024-05-17T09:02:05Z Yazar&#160;Thampi, Sabu M. editor.<br/><a href="https://doi.org/10.1007/978-981-13-5826-5">https://doi.org/10.1007/978-981-13-5826-5</a><br/>Format:&#160;Electronic Resources<br/> Information Systems Security and Privacy 4th International Conference, ICISSP 2018, Funchal - Madeira, Portugal, January 22-24, 2018, Revised Selected Papers ent://SD_ILS/0/SD_ILS:427943 2024-05-17T09:02:05Z 2024-05-17T09:02:05Z Yazar&#160;Mori, Paolo. editor. (orcid)0000-0002-6618-0388<br/><a href="https://doi.org/10.1007/978-3-030-25109-3">https://doi.org/10.1007/978-3-030-25109-3</a><br/>Format:&#160;Electronic Resources<br/> Cyber Security Cryptography and Machine Learning Third International Symposium, CSCML 2019, Beer-Sheva, Israel, June 27&ndash;28, 2019, Proceedings ent://SD_ILS/0/SD_ILS:428324 2024-05-17T09:02:05Z 2024-05-17T09:02:05Z Yazar&#160;Dolev, Shlomi. editor.<br/><a href="https://doi.org/10.1007/978-3-030-20951-3">https://doi.org/10.1007/978-3-030-20951-3</a><br/>Format:&#160;Electronic Resources<br/> Information and Operational Technology Security Systems First International Workshop, IOSec 2018, CIPSEC Project, Heraklion, Crete, Greece, September 13, 2018, Revised Selected Papers ent://SD_ILS/0/SD_ILS:428328 2024-05-17T09:02:05Z 2024-05-17T09:02:05Z Yazar&#160;Fournaris, Apostolos P. editor. (orcid)0000-0002-4758-2349<br/><a href="https://doi.org/10.1007/978-3-030-12085-6">https://doi.org/10.1007/978-3-030-12085-6</a><br/>Format:&#160;Electronic Resources<br/> Cyberdanger Understanding and Guarding Against Cybercrime ent://SD_ILS/0/SD_ILS:428809 2024-05-17T09:02:05Z 2024-05-17T09:02:05Z Yazar&#160;Willems, Eddy. author.<br/><a href="https://doi.org/10.1007/978-3-030-04531-9">https://doi.org/10.1007/978-3-030-04531-9</a><br/>Format:&#160;Electronic Resources<br/> Cryptography and network security : principles and practice ent://SD_ILS/0/SD_ILS:643544 2024-05-17T09:02:05Z 2024-05-17T09:02:05Z Yazar&#160;Stallings, William.<br/>Format:&#160;Kitap<br/> Engineering information security : the application of systems engineering concepts to achieve information assurance ent://SD_ILS/0/SD_ILS:15721 2024-05-17T09:02:05Z 2024-05-17T09:02:05Z Yazar&#160;Jacobs, Stuart, author.<br/>Abstract with links to resource <a href="http://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=7362912">http://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=7362912</a><br/>Format:&#160;Electronic Resources<br/> Artificial immune system : applications in computer security ent://SD_ILS/0/SD_ILS:15747 2024-05-17T09:02:05Z 2024-05-17T09:02:05Z Yazar&#160;Tan, Ying, 1964- author.<br/>Abstract with links to resource <a href="http://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=7547468">http://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=7547468</a><br/>Format:&#160;Electronic Resources<br/> Trust extension as a mechanism for secure code execution on commodity computers ent://SD_ILS/0/SD_ILS:186949 2024-05-17T09:02:05Z 2024-05-17T09:02:05Z Yazar&#160;Parno, Bryan., author.<br/>Abstract with links to full text <a href="http://dx.doi.org/10.1145/2611399">http://dx.doi.org/10.1145/2611399</a><br/>Format:&#160;Electronic Resources<br/> Engineering information security : the application of systems engineering concepts to achieve information assurance ent://SD_ILS/0/SD_ILS:15498 2024-05-17T09:02:05Z 2024-05-17T09:02:05Z Yazar&#160;Jacobs, Stuart, author.<br/>Abstract with links to resource <a href="http://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=6047604">http://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=6047604</a><br/>Format:&#160;Electronic Resources<br/>