Search Results for Education. - Narrowed by: Springer E-Book Collection - Computer science. - Computer security.SirsiDynix Enterprisehttps://catalog.tedu.edu.tr/client/tr_TR/defaulttr/defaulttr/qu$003dEducation.$0026qf$003dLOCATION$002509Lokasyon$0025091$00253ASPRINGER$002509Springer$002bE-Book$002bCollection$0026qf$003dSUBJECT$002509Konu$002509Computer$002bscience.$002509Computer$002bscience.$0026qf$003dSUBJECT$002509Konu$002509Computer$002bsecurity.$002509Computer$002bsecurity.$0026ps$003d300$0026isd$003dtrue?2024-07-15T18:51:10ZInformation Security Education Across the Curriculum 9th IFIP WG 11.8 World Conference, WISE 9, Hamburg, Germany, May 26-28, 2015, Proceedingsent://SD_ILS/0/SD_ILS:228302024-07-15T18:51:10Z2024-07-15T18:51:10ZYazar Bishop, Matt. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-18500-2">http://dx.doi.org/10.1007/978-3-319-18500-2</a><br/>Format: Electronic Resources<br/>Human Interface and the Management of Information. Information in Applications and Services 20th International Conference, HIMI 2018, Held as Part of HCI International 2018, Las Vegas, NV, USA, July 15-20, 2018, Proceedings, Part IIent://SD_ILS/0/SD_ILS:2212212024-07-15T18:51:10Z2024-07-15T18:51:10ZYazar Yamamoto, Sakae. editor.<br/><a href="https://doi.org/10.1007/978-3-319-92046-7">https://doi.org/10.1007/978-3-319-92046-7</a><br/>Format: Electronic Resources<br/>The Global Cyber-Vulnerability Reportent://SD_ILS/0/SD_ILS:234802024-07-15T18:51:10Z2024-07-15T18:51:10ZYazar Subrahmanian, V.S. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-25760-0">http://dx.doi.org/10.1007/978-3-319-25760-0</a><br/>Format: Electronic Resources<br/>Image and Video Technology PSIVT 2017 International Workshops, Wuhan, China, November 20-24, 2017, Revised Selected Papersent://SD_ILS/0/SD_ILS:2245782024-07-15T18:51:10Z2024-07-15T18:51:10ZYazar Satoh, Shin'ichi. editor.<br/><a href="https://doi.org/10.1007/978-3-319-92753-4">https://doi.org/10.1007/978-3-319-92753-4</a><br/>Format: Electronic Resources<br/>Digital Forensics and Cyber Crime 7th International Conference, ICDF2C 2015, Seoul, South Korea, October 6-8, 2015. Revised Selected Papersent://SD_ILS/0/SD_ILS:234572024-07-15T18:51:10Z2024-07-15T18:51:10ZYazar James, Joshua I. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-25512-5">http://dx.doi.org/10.1007/978-3-319-25512-5</a><br/>Format: Electronic Resources<br/>Information and Communication Technology Third IFIP TC 5/8 International Conference, ICT-EurAsia 2015, and 9th IFIP WG 8.9 Working Conference, CONFENIS 2015, Held as Part of WCC 2015, Daejeon, Korea, October 4-7, 2015, Proceedingsent://SD_ILS/0/SD_ILS:233602024-07-15T18:51:10Z2024-07-15T18:51:10ZYazar Khalil, Ismail. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-24315-3">http://dx.doi.org/10.1007/978-3-319-24315-3</a><br/>Format: Electronic Resources<br/>Privacy Technologies and Policy First Annual Privacy Forum, APF 2012, Limassol, Cyprus, October 10-11, 2012, Revised Selected Papersent://SD_ILS/0/SD_ILS:239512024-07-15T18:51:10Z2024-07-15T18:51:10ZYazar Preneel, Bart. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-54069-1">http://dx.doi.org/10.1007/978-3-642-54069-1</a><br/>Format: Electronic Resources<br/>Security and Trust Management 10th International Workshop, STM 2014, Wroclaw, Poland, September 10-11, 2014. Proceedingsent://SD_ILS/0/SD_ILS:218032024-07-15T18:51:10Z2024-07-15T18:51:10ZYazar Mauw, Sjouke. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-11851-2">http://dx.doi.org/10.1007/978-3-319-11851-2</a><br/>Format: Electronic Resources<br/>Transactions on Computational Science XXVI Special Issue on Cyberworlds and Cybersecurityent://SD_ILS/0/SD_ILS:186312024-07-15T18:51:10Z2024-07-15T18:51:10ZYazar Gavrilova, Marina L. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-49247-5">http://dx.doi.org/10.1007/978-3-662-49247-5</a><br/>Format: Electronic Resources<br/>Advances in Human Factors in Cybersecurity Proceedings of the AHFE 2017 International Conference on Human Factors in Cybersecurity, July 17−21, 2017, The Westin Bonaventure Hotel, Los Angeles, California, USAent://SD_ILS/0/SD_ILS:2211562024-07-15T18:51:10Z2024-07-15T18:51:10ZYazar Nicholson, Denise. editor.<br/><a href="https://doi.org/10.1007/978-3-319-60585-2">https://doi.org/10.1007/978-3-319-60585-2</a><br/>Format: Electronic Resources<br/>BNAIC 2016: Artificial Intelligence 28th Benelux Conference on Artificial Intelligence, Amsterdam, The Netherlands, November 10-11, 2016, Revised Selected Papersent://SD_ILS/0/SD_ILS:2265522024-07-15T18:51:10Z2024-07-15T18:51:10ZYazar Bosse, Tibor. editor.<br/><a href="https://doi.org/10.1007/978-3-319-67468-1">https://doi.org/10.1007/978-3-319-67468-1</a><br/>Format: Electronic Resources<br/>Continued Rise of the Cloud Advances and Trends in Cloud Computingent://SD_ILS/0/SD_ILS:195392024-07-15T18:51:10Z2024-07-15T18:51:10ZYazar Mahmood, Zaigham. editor.<br/><a href="http://dx.doi.org/10.1007/978-1-4471-6452-4">http://dx.doi.org/10.1007/978-1-4471-6452-4</a><br/>Format: Electronic Resources<br/>Privacy and Identity Management for Emerging Services and Technologies 8th IFIP WG 9.2, 9.5, 9.6/11.7, 11.4, 11.6 International Summer School, Nijmegen, The Netherlands, June 17-21, 2013, Revised Selected Papersent://SD_ILS/0/SD_ILS:240972024-07-15T18:51:10Z2024-07-15T18:51:10ZYazar Hansen, Marit. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-55137-6">http://dx.doi.org/10.1007/978-3-642-55137-6</a><br/>Format: Electronic Resources<br/>Future Data and Security Engineering First International Conference, FDSE 2014, Ho Chi Minh City, Vietnam, November 19-21, 2014, Proceedingsent://SD_ILS/0/SD_ILS:219592024-07-15T18:51:10Z2024-07-15T18:51:10ZYazar Dang, Tran Khanh. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-12778-1">http://dx.doi.org/10.1007/978-3-319-12778-1</a><br/>Format: Electronic Resources<br/>Cyberpatterns Unifying Design Patterns with Security and Attack Patternsent://SD_ILS/0/SD_ILS:204772024-07-15T18:51:10Z2024-07-15T18:51:10ZYazar Blackwell, Clive. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-04447-7">http://dx.doi.org/10.1007/978-3-319-04447-7</a><br/>Format: Electronic Resources<br/>Recent Trends in Computer Applications Best Studies from the 2017 International Conference on Computer and Applications, Dubai, UAEent://SD_ILS/0/SD_ILS:2217822024-07-15T18:51:10Z2024-07-15T18:51:10ZYazar Alja’am, Jihad Mohamad. editor.<br/><a href="https://doi.org/10.1007/978-3-319-89914-5">https://doi.org/10.1007/978-3-319-89914-5</a><br/>Format: Electronic Resources<br/>ICT and Society 11th IFIP TC 9 International Conference on Human Choice and Computers, HCC11 2014, Turku, Finland, July 30 – August 1, 2014. Proceedingsent://SD_ILS/0/SD_ILS:244762024-07-15T18:51:10Z2024-07-15T18:51:10ZYazar Kimppa, Kai. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-44208-1">http://dx.doi.org/10.1007/978-3-662-44208-1</a><br/>Format: Electronic Resources<br/>Advances in Digital Forensics X 10th IFIP WG 11.9 International Conference, Vienna, Austria, January 8-10, 2014, Revised Selected Papersent://SD_ILS/0/SD_ILS:245822024-07-15T18:51:10Z2024-07-15T18:51:10ZYazar Peterson, Gilbert. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-44952-3">http://dx.doi.org/10.1007/978-3-662-44952-3</a><br/>Format: Electronic Resources<br/>Information Technology in Disaster Risk Reduction First IFIP TC 5 DCITDRR International Conference, ITDRR 2016, Sofia, Bulgaria, November 16–18, 2016, Revised Selected Papersent://SD_ILS/0/SD_ILS:2264602024-07-15T18:51:10Z2024-07-15T18:51:10ZYazar Murayama, Yuko. editor.<br/><a href="https://doi.org/10.1007/978-3-319-68486-4">https://doi.org/10.1007/978-3-319-68486-4</a><br/>Format: Electronic Resources<br/>Human Aspects of Information Security, Privacy, and Trust Second International Conference, HAS 2014, Held as Part of HCI International 2014, Heraklion, Crete, Greece, June 22-27, 2014. Proceedingsent://SD_ILS/0/SD_ILS:210432024-07-15T18:51:10Z2024-07-15T18:51:10ZYazar Tryfonas, Theo. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-07620-1">http://dx.doi.org/10.1007/978-3-319-07620-1</a><br/>Format: Electronic Resources<br/>Human-Computer Interaction. Interaction in Context 20th International Conference, HCI International 2018, Las Vegas, NV, USA, July 15–20, 2018, Proceedings, Part IIent://SD_ILS/0/SD_ILS:2220522024-07-15T18:51:10Z2024-07-15T18:51:10ZYazar Kurosu, Masaaki. editor.<br/><a href="https://doi.org/10.1007/978-3-319-91244-8">https://doi.org/10.1007/978-3-319-91244-8</a><br/>Format: Electronic Resources<br/>Human Aspects of IT for the Aged Population. Aging, Design and User Experience Third International Conference, ITAP 2017, Held as Part of HCI International 2017, Vancouver, BC, Canada, July 9-14, 2017, Proceedings, Part Ient://SD_ILS/0/SD_ILS:2266332024-07-15T18:51:10Z2024-07-15T18:51:10ZYazar Zhou, Jia. editor.<br/><a href="https://doi.org/10.1007/978-3-319-58530-7">https://doi.org/10.1007/978-3-319-58530-7</a><br/>Format: Electronic Resources<br/>