Search Results for - Narrowed by: Computer security -- Congresses.SirsiDynix Enterprisehttps://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dSUBJECT$002509Subject$002509Computer$002bsecurity$002b--$002bCongresses.$002509Computer$002bsecurity$002b--$002bCongresses.$0026ps$003d300?2024-05-31T02:23:47ZSiber güvenlik ve savunma : problemler ve çözümlerent://SD_ILS/0/SD_ILS:22610432024-05-31T02:23:47Z2024-05-31T02:23:47Zby Sağıroğlu, Şeref, editor. author.<br/>Format: Books<br/>Next generation CERTsent://SD_ILS/0/SD_ILS:22417432024-05-31T02:23:47Z2024-05-31T02:23:47Zby Armando, Alessandro, editor.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5977181">Click to View</a><br/>Format: Electronic Resources<br/>Beyond spectre : confronting new technical and policy challenges : proceedings of a workshopent://SD_ILS/0/SD_ILS:22323162024-05-31T02:23:47Z2024-05-31T02:23:47Zby National Academies of Sciences, Engineering, Medicine, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5783794">Click to View</a><br/>Format: Electronic Resources<br/>Cyber defense - policies, operations and capacity building : CYDEF 2018ent://SD_ILS/0/SD_ILS:22330452024-05-31T02:23:47Z2024-05-31T02:23:47Zby Gaycken, Sandro, editor.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5977182">Click to View</a><br/>Format: Electronic Resources<br/>Siber güvenlik ve savunma : farkındalık ve caydırıcılıkent://SD_ILS/0/SD_ILS:22610412024-05-31T02:23:47Z2024-05-31T02:23:47Zby Sağıroğlu, Şeref, editor author.<br/>Format: Books<br/>Recoverability as a first-class security objective : proceedings of a workshop.ent://SD_ILS/0/SD_ILS:22312802024-05-31T02:23:47Z2024-05-31T02:23:47Z<a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5540418">Click to View</a><br/>Format: Electronic Resources<br/>Strata Data Conference : London, UK 2018ent://SD_ILS/0/SD_ILS:23193402024-05-31T02:23:47Z2024-05-31T02:23:47Zby Strata Conference (2018 : London, Great Britain) issuing body.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781492025993/?ar">https://go.oreilly.com/library-access/library/view/-/9781492025993/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9781492025993/?ar">https://learning.oreilly.com/videos/~/9781492025993/?ar</a><br/>Format: Electronic Resources<br/>Fluent Conference, San Jose, CA 2018.ent://SD_ILS/0/SD_ILS:23193412024-05-31T02:23:47Z2024-05-31T02:23:47Zby Fluent (2018 : San Jose, Calif.) issuing body.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781492026037/?ar">https://go.oreilly.com/library-access/library/view/-/9781492026037/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9781492026037/?ar">https://learning.oreilly.com/videos/~/9781492026037/?ar</a><br/>Format: Electronic Resources<br/>Cryptographic agility and interoperability : proceedings of a workshopent://SD_ILS/0/SD_ILS:22297312024-05-31T02:23:47Z2024-05-31T02:23:47Zby Johnson, Anne Frances, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4987115">Click to View</a><br/>Format: Electronic Resources<br/>O'Reilly Security Conference 2017, New York, NY.ent://SD_ILS/0/SD_ILS:23157102024-05-31T02:23:47Z2024-05-31T02:23:47Zby O'Reilly Security Conference (2017 : New York, N.Y.)<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781491985359/?ar">https://go.oreilly.com/library-access/library/view/-/9781491985359/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9781491985359/?ar">https://learning.oreilly.com/videos/~/9781491985359/?ar</a><br/>Format: Electronic Resources<br/>The O'Reilly Security Conference, New York, NY, 2016.ent://SD_ILS/0/SD_ILS:23118812024-05-31T02:23:47Z2024-05-31T02:23:47Zby Adkins, Heather, on-screen presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781491960035/?ar">https://go.oreilly.com/library-access/library/view/-/9781491960035/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9781491960035/?ar">https://learning.oreilly.com/videos/~/9781491960035/?ar</a><br/>Format: Electronic Resources<br/>O'Reilly Security Conference 2016, Amsterdam, Netherlands.ent://SD_ILS/0/SD_ILS:23120722024-05-31T02:23:47Z2024-05-31T02:23:47Zby O'Reilly Security Conference (2016 : Amsterdam, Netherlands)<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781491976128/?ar">https://go.oreilly.com/library-access/library/view/-/9781491976128/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9781491976128/?ar">https://learning.oreilly.com/videos/~/9781491976128/?ar</a><br/>Format: Electronic Resources<br/>Dependable software systems engineeringent://SD_ILS/0/SD_ILS:13880532024-05-31T02:23:47Z2024-05-31T02:23:47Zby Esparza, Javier, editor.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4528955">Click to View</a><br/>Format: Electronic Resources<br/>The future of cyber security and security innovation.ent://SD_ILS/0/SD_ILS:23088892024-05-31T02:23:47Z2024-05-31T02:23:47Zby Suits and spooks conference (2015 : New York, N.Y.)<br/><a href="https://learning.oreilly.com/videos/~/9781491937198/?ar">https://learning.oreilly.com/videos/~/9781491937198/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781491937198/?ar">https://go.oreilly.com/library-access/library/view/-/9781491937198/?ar</a><br/>Format: Electronic Resources<br/>Control engineering and information systems : proceedings of the 2014 International Conference on Control Engineering and Information System (ICCEIS2014), Yueyang, Hunan, China, 20-22 June 2014ent://SD_ILS/0/SD_ILS:23056072024-05-31T02:23:47Z2024-05-31T02:23:47Zby International Conference on Control Engineering and Information Systems (2014 : Yueyang, Hunan Sheng, China), author.<br/><a href="https://learning.oreilly.com/library/view/~/9781138026858/?ar">https://learning.oreilly.com/library/view/~/9781138026858/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781138026858">https://learning.oreilly.com/library/view/~/9781138026858</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781138026858/?ar">https://go.oreilly.com/library-access/library/view/-/9781138026858/?ar</a><br/>Format: Electronic Resources<br/>Comprehensive Approach as "Sine Qua Non" for Critical Infrastructure Protection.ent://SD_ILS/0/SD_ILS:12815922024-05-31T02:23:47Z2024-05-31T02:23:47Zby Caleta, D.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1920288">Click to View</a><br/>Format: Electronic Resources<br/>Software Systems Safety.ent://SD_ILS/0/SD_ILS:12841262024-05-31T02:23:47Z2024-05-31T02:23:47Zby Grumberg, O.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=2033821">Click to View</a><br/>Format: Electronic Resources<br/>Age Factors in Biometric Processingent://SD_ILS/0/SD_ILS:5284152024-05-31T02:23:47Z2024-05-31T02:23:47Zby Fairhurst, Michael.<br/>EBSCOhost <a href="http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=657923">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=657923</a><br/>Format: Electronic Resources<br/>Proceedings of the 7th International Conference on Information Warfare and Security : ICIW 2012.ent://SD_ILS/0/SD_ILS:12701252024-05-31T02:23:47Z2024-05-31T02:23:47Zby Lysenko, Dr. Volodymyr.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1667279">Click to View</a><br/>Format: Electronic Resources<br/>Software Safety and Security.ent://SD_ILS/0/SD_ILS:12456092024-05-31T02:23:47Z2024-05-31T02:23:47Zby Nipkow, T.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=948331">Click to View</a><br/>Format: Electronic Resources<br/>Software and Systems Safety : Specification and Verification.ent://SD_ILS/0/SD_ILS:12336492024-05-31T02:23:47Z2024-05-31T02:23:47Zby Broy, M.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=784589">Click to View</a><br/>Format: Electronic Resources<br/>Error-correcting codes, finite geometries, and cryptography : Conference on Error-control Codes, Information Theory, and Applied Cryptography, December 5-6, 2007, Fields Institute, Toronto, Ontario, Canada : Canadian Mathematical Society Special Session, Error Control Codes, Information Theory and Applied Cryptography, CMS Winter Meeting, Dec 8-10, 2007, London, Ontario, Canadaent://SD_ILS/0/SD_ILS:22261232024-05-31T02:23:47Z2024-05-31T02:23:47Zby Conference on Error-control Codes, Information Theory, and Applied Cryptography (2007 : Toronto, Ont.), issuing body.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=3113390">Click to View</a><br/>Format: Electronic Resources<br/>Proceedings of the International Conference on Internet Technology and Security (ITS 2010) : Wuhan, China, December 27-28, 2010.ent://SD_ILS/0/SD_ILS:5958992024-05-31T02:23:47Z2024-05-31T02:23:47Zby International Conference on Internet Technology and Security (2010 : Wuhan, China)<br/>ASME <a href="http://ebooks.asmedigitalcollection.asme.org/book.aspx?bookid=324">http://ebooks.asmedigitalcollection.asme.org/book.aspx?bookid=324</a><br/>Format: Electronic Resources<br/>Modelling Cyber Security : Approaches, Methodology, Strategies.ent://SD_ILS/0/SD_ILS:12134852024-05-31T02:23:47Z2024-05-31T02:23:47Zby Gori, U.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=501456">Click to View</a><br/>Format: Electronic Resources<br/>Secure Telematic Applications for National Scale Projects.ent://SD_ILS/0/SD_ILS:12050952024-05-31T02:23:47Z2024-05-31T02:23:47Zby Fontaine, J.-G.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=433451">Click to View</a><br/>Format: Electronic Resources<br/>Boolean Functions in Cryptology and Information Security.ent://SD_ILS/0/SD_ILS:11992902024-05-31T02:23:47Z2024-05-31T02:23:47Zby Preneel, B.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=363218">Click to View</a><br/>Format: Electronic Resources<br/>Formal Logical Methods for System Security and Correctness.ent://SD_ILS/0/SD_ILS:11981912024-05-31T02:23:47Z2024-05-31T02:23:47Zby Grumberg, O.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=346214">Click to View</a><br/>Format: Electronic Resources<br/>Algorithms, Architectures and Information Systems Security.ent://SD_ILS/0/SD_ILS:12113952024-05-31T02:23:47Z2024-05-31T02:23:47Zby Bhattacharya, Bhargab B.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=477109">Click to View</a><br/>Format: Electronic Resources<br/>Identity, Security and Democracy : The Wider Social and Ethical Implications of Automated Systems for Human Identification.ent://SD_ILS/0/SD_ILS:12050922024-05-31T02:23:47Z2024-05-31T02:23:47Zby Mordini, E.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=433448">Click to View</a><br/>Format: Electronic Resources<br/>Coding and Cryptology : Proceedings of the First International Workshop.ent://SD_ILS/0/SD_ILS:12583472024-05-31T02:23:47Z2024-05-31T02:23:47Zby Li, Yongqing.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1193245">Click to View</a><br/>Format: Electronic Resources<br/>Software System Reliability and Security.ent://SD_ILS/0/SD_ILS:11932052024-05-31T02:23:47Z2024-05-31T02:23:47Zby Broy, M.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=305176">Click to View</a><br/>Format: Electronic Resources<br/>Security and Embedded Systems.ent://SD_ILS/0/SD_ILS:11868112024-05-31T02:23:47Z2024-05-31T02:23:47Zby Serpanos, D.N.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=265974">Click to View</a><br/>Format: Electronic Resources<br/>Verification of Infinite-State Systems with Applications to Security.ent://SD_ILS/0/SD_ILS:11868042024-05-31T02:23:47Z2024-05-31T02:23:47Zby Clarke, E.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=265966">Click to View</a><br/>Format: Electronic Resources<br/>Recent advances in intrusion detection: 4th international symposium, RAID 2001 Davis CA,USA october 10-12 2001: proceedingsent://SD_ILS/0/SD_ILS:122312024-05-31T02:23:47Z2024-05-31T02:23:47Zby RAID 2001 (2001: Davis, Calif.)<br/>Format: Books<br/>Recent advances in intrusion detection: third international workshop RAID 2000,Toulouse,France, October 2-4 2000 proceedingsent://SD_ILS/0/SD_ILS:82292024-05-31T02:23:47Z2024-05-31T02:23:47Zby RAID 2000 (2000 : Toulouse, France)<br/>Format: Books<br/>