Search Results for - Narrowed by: IYTE Library - Computer Communication Networks. - Computers -- Law and legislation.SirsiDynix Enterprisehttps://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dLIBRARY$002509Library$0025091$00253AIYTE$002509IYTE$002bLibrary$0026qf$003dSUBJECT$002509Subject$002509Computer$002bCommunication$002bNetworks.$002509Computer$002bCommunication$002bNetworks.$0026qf$003dSUBJECT$002509Subject$002509Computers$002b--$002bLaw$002band$002blegislation.$002509Computers$002b--$002bLaw$002band$002blegislation.$0026ps$003d300?2024-06-16T21:28:37ZFundamental Computing Forensics for Africa A Case Study of the Science in Nigeriaent://SD_ILS/0/SD_ILS:20847222024-06-16T21:28:37Z2024-06-16T21:28:37Zby Iorliam, Aamo. author.<br/><a href="https://doi.org/10.1007/978-3-319-94499-9">https://doi.org/10.1007/978-3-319-94499-9</a><br/>Format: Electronic Resources<br/>Theory of Cryptography 16th International Conference, TCC 2018, Panaji, India, November 11–14, 2018, Proceedings, Part Ient://SD_ILS/0/SD_ILS:20855382024-06-16T21:28:37Z2024-06-16T21:28:37Zby Beimel, Amos. editor.<br/><a href="https://doi.org/10.1007/978-3-030-03807-6">https://doi.org/10.1007/978-3-030-03807-6</a><br/>Format: Electronic Resources<br/>Smart Computing and Communication Third International Conference, SmartCom 2018, Tokyo, Japan, December 10–12, 2018, Proceedingsent://SD_ILS/0/SD_ILS:20853942024-06-16T21:28:37Z2024-06-16T21:28:37Zby Qiu, Meikang. editor. (orcid)0000-0002-1004-0140<br/><a href="https://doi.org/10.1007/978-3-030-05755-8">https://doi.org/10.1007/978-3-030-05755-8</a><br/>Format: Electronic Resources<br/>Theory of Cryptography 16th International Conference, TCC 2018, Panaji, India, November 11–14, 2018, Proceedings, Part IIent://SD_ILS/0/SD_ILS:20855232024-06-16T21:28:37Z2024-06-16T21:28:37Zby Beimel, Amos. editor.<br/><a href="https://doi.org/10.1007/978-3-030-03810-6">https://doi.org/10.1007/978-3-030-03810-6</a><br/>Format: Electronic Resources<br/>Critical Information Infrastructures Security 12th International Conference, CRITIS 2017, Lucca, Italy, October 8-13, 2017, Revised Selected Papersent://SD_ILS/0/SD_ILS:20854642024-06-16T21:28:37Z2024-06-16T21:28:37Zby D'Agostino, Gregorio. editor. (orcid)0000-0003-3657-5335<br/><a href="https://doi.org/10.1007/978-3-319-99843-5">https://doi.org/10.1007/978-3-319-99843-5</a><br/>Format: Electronic Resources<br/>Secure IT Systems 23rd Nordic Conference, NordSec 2018, Oslo, Norway, November 28-30, 2018, Proceedingsent://SD_ILS/0/SD_ILS:20852132024-06-16T21:28:37Z2024-06-16T21:28:37Zby Gruschka, Nils. editor. (orcid)0000-0001-7360-8314<br/><a href="https://doi.org/10.1007/978-3-030-03638-6">https://doi.org/10.1007/978-3-030-03638-6</a><br/>Format: Electronic Resources<br/>Advances in Digital Forensics XIV 14th IFIP WG 11.9 International Conference, New Delhi, India, January 3-5, 2018, Revised Selected Papersent://SD_ILS/0/SD_ILS:20842382024-06-16T21:28:37Z2024-06-16T21:28:37Zby Peterson, Gilbert. editor.<br/><a href="https://doi.org/10.1007/978-3-319-99277-8">https://doi.org/10.1007/978-3-319-99277-8</a><br/>Format: Electronic Resources<br/>Handbook of Mobile Data Privacyent://SD_ILS/0/SD_ILS:20843032024-06-16T21:28:37Z2024-06-16T21:28:37Zby Gkoulalas-Divanis, Aris. editor.<br/><a href="https://doi.org/10.1007/978-3-319-98161-1">https://doi.org/10.1007/978-3-319-98161-1</a><br/>Format: Electronic Resources<br/>Research in Attacks, Intrusions, and Defenses 21st International Symposium, RAID 2018, Heraklion, Crete, Greece, September 10-12, 2018, Proceedingsent://SD_ILS/0/SD_ILS:20852992024-06-16T21:28:37Z2024-06-16T21:28:37Zby Bailey, Michael. editor.<br/><a href="https://doi.org/10.1007/978-3-030-00470-5">https://doi.org/10.1007/978-3-030-00470-5</a><br/>Format: Electronic Resources<br/>Information Security and Privacy 23rd Australasian Conference, ACISP 2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedingsent://SD_ILS/0/SD_ILS:20860402024-06-16T21:28:37Z2024-06-16T21:28:37Zby Susilo, Willy. editor. (orcid)0000-0002-1562-5105<br/><a href="https://doi.org/10.1007/978-3-319-93638-3">https://doi.org/10.1007/978-3-319-93638-3</a><br/>Format: Electronic Resources<br/>Information and Communications Security 19th International Conference, ICICS 2017, Beijing, China, December 6-8, 2017, Proceedingsent://SD_ILS/0/SD_ILS:20856232024-06-16T21:28:37Z2024-06-16T21:28:37Zby Qing, Sihan. editor.<br/><a href="https://doi.org/10.1007/978-3-319-89500-0">https://doi.org/10.1007/978-3-319-89500-0</a><br/>Format: Electronic Resources<br/>Information Security Applications 18th International Conference, WISA 2017, Jeju Island, Korea, August 24-26, 2017, Revised Selected Papersent://SD_ILS/0/SD_ILS:20859042024-06-16T21:28:37Z2024-06-16T21:28:37Zby Kang, Brent ByungHoon. editor. (orcid)0000-0001-8984-1006<br/><a href="https://doi.org/10.1007/978-3-319-93563-8">https://doi.org/10.1007/978-3-319-93563-8</a><br/>Format: Electronic Resources<br/>Privacy, Security, and Trust in KDD First ACM SIGKDD International Workshop, PinKDD 2007, San Jose, CA, USA, August 12, 2007, Revised Selected Papersent://SD_ILS/0/SD_ILS:5033752024-06-16T21:28:37Z2024-06-16T21:28:37Zby Bonchi, Francesco. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-78478-4">http://dx.doi.org/10.1007/978-3-540-78478-4</a><br/>Format: Electronic Resources<br/>Electronic Government 7th International Conference, EGOV 2008, Turin, Italy, August 31 - September 5, 2008. Proceedingsent://SD_ILS/0/SD_ILS:5036052024-06-16T21:28:37Z2024-06-16T21:28:37Zby Wimmer, Maria A. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-85204-9">http://dx.doi.org/10.1007/978-3-540-85204-9</a><br/>Format: Electronic Resources<br/>Intelligence and Security Informatics First European Conference, EuroISI 2008, Esbjerg, Denmark, December 3-5, 2008. Proceedingsent://SD_ILS/0/SD_ILS:5038432024-06-16T21:28:37Z2024-06-16T21:28:37Zby Ortiz-Arroyo, Daniel. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-89900-6">http://dx.doi.org/10.1007/978-3-540-89900-6</a><br/>Format: Electronic Resources<br/>EC2ND 2006 Proceedings of the Second European Conference on Computer Network Defence, in conjunction with the First Workshop on Digital Forensics and Incident Analysis Faculty of Advanced Technology, University of Glamorgan, Wales, UKent://SD_ILS/0/SD_ILS:5086642024-06-16T21:28:37Z2024-06-16T21:28:37Zby Blyth, Andrew. author.<br/><a href="http://dx.doi.org/10.1007/978-1-84628-750-3">http://dx.doi.org/10.1007/978-1-84628-750-3</a><br/>Format: Electronic Resources<br/>Online Communities and Social Computing Second International Conference, OCSC 2007, Held as Part of HCI International 2007, Beijing, China, July 22-27, 2007. Proceedingsent://SD_ILS/0/SD_ILS:5126232024-06-16T21:28:37Z2024-06-16T21:28:37Zby Schuler, Douglas. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-73257-0">http://dx.doi.org/10.1007/978-3-540-73257-0</a><br/>Format: Electronic Resources<br/>Intelligence and Security Informatics Pacific Asia Workshop, PAISI 2007, Chengdu, China, April 11-12, 2007. Proceedingsent://SD_ILS/0/SD_ILS:5123622024-06-16T21:28:37Z2024-06-16T21:28:37Zby Yang, Christopher C. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-71549-8">http://dx.doi.org/10.1007/978-3-540-71549-8</a><br/>Format: Electronic Resources<br/>Electronic Government 6th International Conference, EGOV 2007, Regensburg, Germany, September 3-7, 2007. Proceedingsent://SD_ILS/0/SD_ILS:5127882024-06-16T21:28:37Z2024-06-16T21:28:37Zby Wimmer, Maria A. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-74444-3">http://dx.doi.org/10.1007/978-3-540-74444-3</a><br/>Format: Electronic Resources<br/>Intelligence and Security Informatics IEEE International Conference on Intelligence and Security Informatics, ISI 2006, San Diego, CA, USA, May 23-24, 2006. Proceedingsent://SD_ILS/0/SD_ILS:5111372024-06-16T21:28:37Z2024-06-16T21:28:37Zby Mehrotra, Sharad. editor.<br/><a href="http://dx.doi.org/10.1007/11760146">http://dx.doi.org/10.1007/11760146</a><br/>Format: Electronic Resources<br/>Digital Rights Management. Technologies, Issues, Challenges and Systems First International Conference, DRMTICS 2005, Sydney, Australia, October 31 - November 2, 2005. Revised Selected Papersent://SD_ILS/0/SD_ILS:5113422024-06-16T21:28:37Z2024-06-16T21:28:37Zby Safavi-Naini, Reihaneh. editor.<br/><a href="http://dx.doi.org/10.1007/11787952">http://dx.doi.org/10.1007/11787952</a><br/>Format: Electronic Resources<br/>Intelligence and Security Informatics International Workshop, WISI 2006, Singapore, April 9, 2006. Proceedingsent://SD_ILS/0/SD_ILS:5109182024-06-16T21:28:37Z2024-06-16T21:28:37Zby Chen, Hsinchun. editor.<br/><a href="http://dx.doi.org/10.1007/11734628">http://dx.doi.org/10.1007/11734628</a><br/>Format: Electronic Resources<br/>EC2ND 2005 Proceedings of the First European Conference on Computer Network Defence School of Computing, University of Glamorgan, Wales, UKent://SD_ILS/0/SD_ILS:5085312024-06-16T21:28:37Z2024-06-16T21:28:37Zby Blyth, Andrew. editor.<br/><a href="http://dx.doi.org/10.1007/1-84628-352-3">http://dx.doi.org/10.1007/1-84628-352-3</a><br/>Format: Electronic Resources<br/>Electronic Government 5th International Conference, EGOV 2006, Kraków, Poland, September 4-8, 2006. Proceedingsent://SD_ILS/0/SD_ILS:5115442024-06-16T21:28:37Z2024-06-16T21:28:37Zby Wimmer, Maria A. editor.<br/><a href="http://dx.doi.org/10.1007/11823100">http://dx.doi.org/10.1007/11823100</a><br/>Format: Electronic Resources<br/>Intelligence and Security Informatics IEEE International Conference on Intelligence and Security Informatics, ISI 2005, Atlanta, GA, USA, May 19-20, 2005. Proceedingsent://SD_ILS/0/SD_ILS:5104242024-06-16T21:28:37Z2024-06-16T21:28:37Zby Kantor, Paul. editor.<br/><a href="http://dx.doi.org/10.1007/b136511">http://dx.doi.org/10.1007/b136511</a><br/>Format: Electronic Resources<br/>Electronic Government 4th International Conference, EGOV 2005, Copenhagen, Denmark, August 22-26, 2005. Proceedingsent://SD_ILS/0/SD_ILS:5101632024-06-16T21:28:37Z2024-06-16T21:28:37Zby Wimmer, Maria A. editor.<br/><a href="http://dx.doi.org/10.1007/11545156">http://dx.doi.org/10.1007/11545156</a><br/>Format: Electronic Resources<br/>Web and Communication Technologies and Internet-Related Social Issues - HSI 2005 3rd International Conference on Human.Society@Internet, Tokyo, Japan, July 27-29, 2005. Proceedingsent://SD_ILS/0/SD_ILS:5101922024-06-16T21:28:37Z2024-06-16T21:28:37Zby Shimojo, Shinji. editor.<br/><a href="http://dx.doi.org/10.1007/11527725">http://dx.doi.org/10.1007/11527725</a><br/>Format: Electronic Resources<br/>Virtual Organizations Systems and Practicesent://SD_ILS/0/SD_ILS:5042182024-06-16T21:28:37Z2024-06-16T21:28:37Zby Camarinha-Matos, Luis M. editor.<br/><a href="http://dx.doi.org/10.1007/b102339">http://dx.doi.org/10.1007/b102339</a><br/>Format: Electronic Resources<br/>