Search Results for Computers. - Narrowed by: 2019 - Computer security. - Data protection. SirsiDynix Enterprise https://catalog.tedu.edu.tr/client/tr_TR/defaulttr/defaulttr/qu$003dComputers.$0026qf$003dPUBDATE$002509Bas$0025C4$0025B1m$002bY$0025C4$0025B1l$0025C4$0025B1$0025092019$0025092019$0026qf$003dSUBJECT$002509Konu$002509Computer$002bsecurity.$002509Computer$002bsecurity.$0026qf$003dSUBJECT$002509Konu$002509Data$002bprotection.$002509Data$002bprotection.$0026ps$003d300? 2024-06-29T20:13:09Z Information Security Practice and Experience 15th International Conference, ISPEC 2019, Kuala Lumpur, Malaysia, November 26&ndash;28, 2019, Proceedings ent://SD_ILS/0/SD_ILS:427797 2024-06-29T20:13:09Z 2024-06-29T20:13:09Z Yazar&#160;Heng, Swee-Huay. editor. (orcid)0000-0003-3627-2131<br/><a href="https://doi.org/10.1007/978-3-030-34339-2">https://doi.org/10.1007/978-3-030-34339-2</a><br/>Format:&#160;Electronic Resources<br/> Applications and Techniques in Information Security 10th International Conference, ATIS 2019, Thanjavur, India, November 22&ndash;24, 2019, Proceedings ent://SD_ILS/0/SD_ILS:428022 2024-06-29T20:13:09Z 2024-06-29T20:13:09Z Yazar&#160;Shankar Sriram, V. S. editor. (orcid)0000-0001-7870-7944<br/><a href="https://doi.org/10.1007/978-981-15-0871-4">https://doi.org/10.1007/978-981-15-0871-4</a><br/>Format:&#160;Electronic Resources<br/> Critical Infrastructure Protection XIII 13th IFIP WG 11.10 International Conference, ICCIP 2019, Arlington, VA, USA, March 11&ndash;12, 2019, Revised Selected Papers ent://SD_ILS/0/SD_ILS:428266 2024-06-29T20:13:09Z 2024-06-29T20:13:09Z Yazar&#160;Staggs, Jason. editor.<br/><a href="https://doi.org/10.1007/978-3-030-34647-8">https://doi.org/10.1007/978-3-030-34647-8</a><br/>Format:&#160;Electronic Resources<br/> Architecture for Blockchain Applications ent://SD_ILS/0/SD_ILS:428588 2024-06-29T20:13:09Z 2024-06-29T20:13:09Z Yazar&#160;Xu, Xiwei. author.<br/><a href="https://doi.org/10.1007/978-3-030-03035-3">https://doi.org/10.1007/978-3-030-03035-3</a><br/>Format:&#160;Electronic Resources<br/> Resilience of Cyber-Physical Systems From Risk Modelling to Threat Counteraction ent://SD_ILS/0/SD_ILS:428039 2024-06-29T20:13:09Z 2024-06-29T20:13:09Z Yazar&#160;Flammini, Francesco. editor.<br/><a href="https://doi.org/10.1007/978-3-319-95597-1">https://doi.org/10.1007/978-3-319-95597-1</a><br/>Format:&#160;Electronic Resources<br/> Critical Infrastructure Security and Resilience Theories, Methods, Tools and Technologies ent://SD_ILS/0/SD_ILS:428348 2024-06-29T20:13:09Z 2024-06-29T20:13:09Z Yazar&#160;Gritzalis, Dimitris. editor.<br/><a href="https://doi.org/10.1007/978-3-030-00024-0">https://doi.org/10.1007/978-3-030-00024-0</a><br/>Format:&#160;Electronic Resources<br/> Frontiers in Cyber Security Second International Conference, FCS 2019, Xi'an, China, November 15&ndash;17, 2019, Proceedings ent://SD_ILS/0/SD_ILS:428856 2024-06-29T20:13:09Z 2024-06-29T20:13:09Z Yazar&#160;Shen, Bazhong. editor.<br/><a href="https://doi.org/10.1007/978-981-15-0818-9">https://doi.org/10.1007/978-981-15-0818-9</a><br/>Format:&#160;Electronic Resources<br/>