Search Results for - Narrowed by: Computer security -- Congresses. SirsiDynix Enterprise https://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dSUBJECT$002509Subject$002509Computer$002bsecurity$002b--$002bCongresses.$002509Computer$002bsecurity$002b--$002bCongresses.$0026ps$003d300? 2024-05-31T02:23:47Z Siber g&uuml;venlik ve savunma : problemler ve &ccedil;&ouml;z&uuml;mler ent://SD_ILS/0/SD_ILS:2261043 2024-05-31T02:23:47Z 2024-05-31T02:23:47Z by&#160;Sağıroğlu, Şeref, editor. author.<br/>Format:&#160;Books<br/> Next generation CERTs ent://SD_ILS/0/SD_ILS:2241743 2024-05-31T02:23:47Z 2024-05-31T02:23:47Z by&#160;Armando, Alessandro, editor.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5977181">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Beyond spectre : confronting new technical and policy challenges : proceedings of a workshop ent://SD_ILS/0/SD_ILS:2232316 2024-05-31T02:23:47Z 2024-05-31T02:23:47Z by&#160;National Academies of Sciences, Engineering, Medicine, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5783794">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Cyber defense - policies, operations and capacity building : CYDEF 2018 ent://SD_ILS/0/SD_ILS:2233045 2024-05-31T02:23:47Z 2024-05-31T02:23:47Z by&#160;Gaycken, Sandro, editor.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5977182">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Siber g&uuml;venlik ve savunma : farkındalık ve caydırıcılık ent://SD_ILS/0/SD_ILS:2261041 2024-05-31T02:23:47Z 2024-05-31T02:23:47Z by&#160;Sağıroğlu, Şeref, editor author.<br/>Format:&#160;Books<br/> Recoverability as a first-class security objective : proceedings of a workshop. ent://SD_ILS/0/SD_ILS:2231280 2024-05-31T02:23:47Z 2024-05-31T02:23:47Z <a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5540418">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Strata Data Conference : London, UK 2018 ent://SD_ILS/0/SD_ILS:2319340 2024-05-31T02:23:47Z 2024-05-31T02:23:47Z by&#160;Strata Conference (2018 : London, Great Britain) issuing body.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781492025993/?ar">https://go.oreilly.com/library-access/library/view/-/9781492025993/?ar</a> <a href="https://learning.oreilly.com/videos/~/9781492025993/?ar">https://learning.oreilly.com/videos/~/9781492025993/?ar</a><br/>Format:&#160;Electronic Resources<br/> Fluent Conference, San Jose, CA 2018. ent://SD_ILS/0/SD_ILS:2319341 2024-05-31T02:23:47Z 2024-05-31T02:23:47Z by&#160;Fluent (2018 : San Jose, Calif.) issuing body.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781492026037/?ar">https://go.oreilly.com/library-access/library/view/-/9781492026037/?ar</a> <a href="https://learning.oreilly.com/videos/~/9781492026037/?ar">https://learning.oreilly.com/videos/~/9781492026037/?ar</a><br/>Format:&#160;Electronic Resources<br/> Cryptographic agility and interoperability : proceedings of a workshop ent://SD_ILS/0/SD_ILS:2229731 2024-05-31T02:23:47Z 2024-05-31T02:23:47Z by&#160;Johnson, Anne Frances, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4987115">Click to View</a><br/>Format:&#160;Electronic Resources<br/> O'Reilly Security Conference 2017, New York, NY. ent://SD_ILS/0/SD_ILS:2315710 2024-05-31T02:23:47Z 2024-05-31T02:23:47Z by&#160;O'Reilly Security Conference (2017 : New York, N.Y.)<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781491985359/?ar">https://go.oreilly.com/library-access/library/view/-/9781491985359/?ar</a> <a href="https://learning.oreilly.com/videos/~/9781491985359/?ar">https://learning.oreilly.com/videos/~/9781491985359/?ar</a><br/>Format:&#160;Electronic Resources<br/> The O'Reilly Security Conference, New York, NY, 2016. ent://SD_ILS/0/SD_ILS:2311881 2024-05-31T02:23:47Z 2024-05-31T02:23:47Z by&#160;Adkins, Heather, on-screen presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781491960035/?ar">https://go.oreilly.com/library-access/library/view/-/9781491960035/?ar</a> <a href="https://learning.oreilly.com/videos/~/9781491960035/?ar">https://learning.oreilly.com/videos/~/9781491960035/?ar</a><br/>Format:&#160;Electronic Resources<br/> O'Reilly Security Conference 2016, Amsterdam, Netherlands. ent://SD_ILS/0/SD_ILS:2312072 2024-05-31T02:23:47Z 2024-05-31T02:23:47Z by&#160;O'Reilly Security Conference (2016 : Amsterdam, Netherlands)<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781491976128/?ar">https://go.oreilly.com/library-access/library/view/-/9781491976128/?ar</a> <a href="https://learning.oreilly.com/videos/~/9781491976128/?ar">https://learning.oreilly.com/videos/~/9781491976128/?ar</a><br/>Format:&#160;Electronic Resources<br/> Dependable software systems engineering ent://SD_ILS/0/SD_ILS:1388053 2024-05-31T02:23:47Z 2024-05-31T02:23:47Z by&#160;Esparza, Javier, editor.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4528955">Click to View</a><br/>Format:&#160;Electronic Resources<br/> The future of cyber security and security innovation. ent://SD_ILS/0/SD_ILS:2308889 2024-05-31T02:23:47Z 2024-05-31T02:23:47Z by&#160;Suits and spooks conference (2015 : New York, N.Y.)<br/><a href="https://learning.oreilly.com/videos/~/9781491937198/?ar">https://learning.oreilly.com/videos/~/9781491937198/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781491937198/?ar">https://go.oreilly.com/library-access/library/view/-/9781491937198/?ar</a><br/>Format:&#160;Electronic Resources<br/> Control engineering and information systems : proceedings of the 2014 International Conference on Control Engineering and Information System (ICCEIS2014), Yueyang, Hunan, China, 20-22 June 2014 ent://SD_ILS/0/SD_ILS:2305607 2024-05-31T02:23:47Z 2024-05-31T02:23:47Z by&#160;International Conference on Control Engineering and Information Systems (2014 : Yueyang, Hunan Sheng, China), author.<br/><a href="https://learning.oreilly.com/library/view/~/9781138026858/?ar">https://learning.oreilly.com/library/view/~/9781138026858/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781138026858">https://learning.oreilly.com/library/view/~/9781138026858</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781138026858/?ar">https://go.oreilly.com/library-access/library/view/-/9781138026858/?ar</a><br/>Format:&#160;Electronic Resources<br/> Comprehensive Approach as &quot;Sine Qua Non&quot; for Critical Infrastructure Protection. ent://SD_ILS/0/SD_ILS:1281592 2024-05-31T02:23:47Z 2024-05-31T02:23:47Z by&#160;Caleta, D.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1920288">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Software Systems Safety. ent://SD_ILS/0/SD_ILS:1284126 2024-05-31T02:23:47Z 2024-05-31T02:23:47Z by&#160;Grumberg, O.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=2033821">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Age Factors in Biometric Processing ent://SD_ILS/0/SD_ILS:528415 2024-05-31T02:23:47Z 2024-05-31T02:23:47Z by&#160;Fairhurst, Michael.<br/>EBSCOhost <a href="http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=657923">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=657923</a><br/>Format:&#160;Electronic Resources<br/> Proceedings of the 7th International Conference on Information Warfare and Security : ICIW 2012. ent://SD_ILS/0/SD_ILS:1270125 2024-05-31T02:23:47Z 2024-05-31T02:23:47Z by&#160;Lysenko, Dr. Volodymyr.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1667279">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Software Safety and Security. ent://SD_ILS/0/SD_ILS:1245609 2024-05-31T02:23:47Z 2024-05-31T02:23:47Z by&#160;Nipkow, T.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=948331">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Software and Systems Safety : Specification and Verification. ent://SD_ILS/0/SD_ILS:1233649 2024-05-31T02:23:47Z 2024-05-31T02:23:47Z by&#160;Broy, M.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=784589">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Error-correcting codes, finite geometries, and cryptography : Conference on Error-control Codes, Information Theory, and Applied Cryptography, December 5-6, 2007, Fields Institute, Toronto, Ontario, Canada : Canadian Mathematical Society Special Session, Error Control Codes, Information Theory and Applied Cryptography, CMS Winter Meeting, Dec 8-10, 2007, London, Ontario, Canada ent://SD_ILS/0/SD_ILS:2226123 2024-05-31T02:23:47Z 2024-05-31T02:23:47Z by&#160;Conference on Error-control Codes, Information Theory, and Applied Cryptography (2007 : Toronto, Ont.), issuing body.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=3113390">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Proceedings of the International Conference on Internet Technology and Security (ITS 2010) : Wuhan, China, December 27-28, 2010. ent://SD_ILS/0/SD_ILS:595899 2024-05-31T02:23:47Z 2024-05-31T02:23:47Z by&#160;International Conference on Internet Technology and Security (2010 : Wuhan, China)<br/>ASME <a href="http://ebooks.asmedigitalcollection.asme.org/book.aspx?bookid=324">http://ebooks.asmedigitalcollection.asme.org/book.aspx?bookid=324</a><br/>Format:&#160;Electronic Resources<br/> Modelling Cyber Security : Approaches, Methodology, Strategies. ent://SD_ILS/0/SD_ILS:1213485 2024-05-31T02:23:47Z 2024-05-31T02:23:47Z by&#160;Gori, U.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=501456">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Secure Telematic Applications for National Scale Projects. ent://SD_ILS/0/SD_ILS:1205095 2024-05-31T02:23:47Z 2024-05-31T02:23:47Z by&#160;Fontaine, J.-G.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=433451">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Boolean Functions in Cryptology and Information Security. ent://SD_ILS/0/SD_ILS:1199290 2024-05-31T02:23:47Z 2024-05-31T02:23:47Z by&#160;Preneel, B.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=363218">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Formal Logical Methods for System Security and Correctness. ent://SD_ILS/0/SD_ILS:1198191 2024-05-31T02:23:47Z 2024-05-31T02:23:47Z by&#160;Grumberg, O.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=346214">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Algorithms, Architectures and Information Systems Security. ent://SD_ILS/0/SD_ILS:1211395 2024-05-31T02:23:47Z 2024-05-31T02:23:47Z by&#160;Bhattacharya, Bhargab B.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=477109">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Identity, Security and Democracy : The Wider Social and Ethical Implications of Automated Systems for Human Identification. ent://SD_ILS/0/SD_ILS:1205092 2024-05-31T02:23:47Z 2024-05-31T02:23:47Z by&#160;Mordini, E.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=433448">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Coding and Cryptology : Proceedings of the First International Workshop. ent://SD_ILS/0/SD_ILS:1258347 2024-05-31T02:23:47Z 2024-05-31T02:23:47Z by&#160;Li, Yongqing.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1193245">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Software System Reliability and Security. ent://SD_ILS/0/SD_ILS:1193205 2024-05-31T02:23:47Z 2024-05-31T02:23:47Z by&#160;Broy, M.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=305176">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Security and Embedded Systems. ent://SD_ILS/0/SD_ILS:1186811 2024-05-31T02:23:47Z 2024-05-31T02:23:47Z by&#160;Serpanos, D.N.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=265974">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Verification of Infinite-State Systems with Applications to Security. ent://SD_ILS/0/SD_ILS:1186804 2024-05-31T02:23:47Z 2024-05-31T02:23:47Z by&#160;Clarke, E.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=265966">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Recent advances in intrusion detection: 4th international symposium, RAID 2001 Davis CA,USA october 10-12 2001: proceedings ent://SD_ILS/0/SD_ILS:12231 2024-05-31T02:23:47Z 2024-05-31T02:23:47Z by&#160;RAID 2001 (2001: Davis, Calif.)<br/>Format:&#160;Books<br/> Recent advances in intrusion detection: third international workshop RAID 2000,Toulouse,France, October 2-4 2000 proceedings ent://SD_ILS/0/SD_ILS:8229 2024-05-31T02:23:47Z 2024-05-31T02:23:47Z by&#160;RAID 2000 (2000 : Toulouse, France)<br/>Format:&#160;Books<br/>