Arama Sonuçları Computers -- Law and legislation. - Daraltılmış: Security.SirsiDynix Enterprisehttps://catalog.tedu.edu.tr/client/tr_TR/defaulttr/defaulttr/qu$003dComputers$002b--$002bLaw$002band$002blegislation.$0026qf$003dSUBJECT$002509Konu$002509Security.$002509Security.$0026ps$003d300?dt=list2024-11-04T15:21:44ZDigital Forensics and Cyber Crime 10th International EAI Conference, ICDF2C 2018, New Orleans, LA, USA, September 10–12, 2018, Proceedingsent://SD_ILS/0/SD_ILS:4292482024-11-04T15:21:44Z2024-11-04T15:21:44ZYazar Breitinger, Frank. editor. (orcid)0000-0001-5261-4600<br/><a href="https://doi.org/10.1007/978-3-030-05487-8">https://doi.org/10.1007/978-3-030-05487-8</a><br/>Format: Electronic Resources<br/>Information Security 17th International Conference, ISSA 2018, Pretoria, South Africa, August 15–16, 2018, Revised Selected Papersent://SD_ILS/0/SD_ILS:4280982024-11-04T15:21:44Z2024-11-04T15:21:44ZYazar Venter, Hein. editor. (orcid)0000-0002-3607-8630<br/><a href="https://doi.org/10.1007/978-3-030-11407-7">https://doi.org/10.1007/978-3-030-11407-7</a><br/>Format: Electronic Resources<br/>Future Network Systems and Security Third International Conference, FNSS 2017, Gainesville, FL, USA, August 31 - September 2, 2017, Proceedingsent://SD_ILS/0/SD_ILS:2237382024-11-04T15:21:44Z2024-11-04T15:21:44ZYazar Doss, Robin. editor. (orcid)0000-0001-6143-6850<br/><a href="https://doi.org/10.1007/978-3-319-65548-2">https://doi.org/10.1007/978-3-319-65548-2</a><br/>Format: Electronic Resources<br/>Critical Infrastructure Protection XII 12th IFIP WG 11.10 International Conference, ICCIP 2018, Arlington, VA, USA, March 12-14, 2018, Revised Selected Papersent://SD_ILS/0/SD_ILS:2223872024-11-04T15:21:44Z2024-11-04T15:21:44ZYazar Staggs, Jason. editor.<br/><a href="https://doi.org/10.1007/978-3-030-04537-1">https://doi.org/10.1007/978-3-030-04537-1</a><br/>Format: Electronic Resources<br/>Digital Forensics and Cyber Crime 9th International Conference, ICDF2C 2017, Prague, Czech Republic, October 9-11, 2017, Proceedingsent://SD_ILS/0/SD_ILS:2255152024-11-04T15:21:44Z2024-11-04T15:21:44ZYazar Matoušek, Petr. editor.<br/><a href="https://doi.org/10.1007/978-3-319-73697-6">https://doi.org/10.1007/978-3-319-73697-6</a><br/>Format: Electronic Resources<br/>Information Systems Security 13th International Conference, ICISS 2017, Mumbai, India, December 16-20, 2017, Proceedingsent://SD_ILS/0/SD_ILS:2266772024-11-04T15:21:44Z2024-11-04T15:21:44ZYazar Shyamasundar, Rudrapatna K. editor.<br/><a href="https://doi.org/10.1007/978-3-319-72598-7">https://doi.org/10.1007/978-3-319-72598-7</a><br/>Format: Electronic Resources<br/>Applications and Techniques in Information Security 10th International Conference, ATIS 2019, Thanjavur, India, November 22–24, 2019, Proceedingsent://SD_ILS/0/SD_ILS:4280222024-11-04T15:21:44Z2024-11-04T15:21:44ZYazar Shankar Sriram, V. S. editor. (orcid)0000-0001-7870-7944<br/><a href="https://doi.org/10.1007/978-981-15-0871-4">https://doi.org/10.1007/978-981-15-0871-4</a><br/>Format: Electronic Resources<br/>Critical Infrastructure Protection XIII 13th IFIP WG 11.10 International Conference, ICCIP 2019, Arlington, VA, USA, March 11–12, 2019, Revised Selected Papersent://SD_ILS/0/SD_ILS:4282662024-11-04T15:21:44Z2024-11-04T15:21:44ZYazar Staggs, Jason. editor.<br/><a href="https://doi.org/10.1007/978-3-030-34647-8">https://doi.org/10.1007/978-3-030-34647-8</a><br/>Format: Electronic Resources<br/>