Search Results for - Narrowed by: IGI Global - Computer security. SirsiDynix Enterprise https://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dLOCATION$002509Shelf$002bLocation$0025091$00253AIGI$002509IGI$002bGlobal$0026qf$003dSUBJECT$002509Subject$002509Computer$002bsecurity.$002509Computer$002bsecurity.$0026ps$003d300? 2024-06-06T15:40:28Z Handbook of research on computational forensics, digital crime, and investigation methods and solutions ent://SD_ILS/0/SD_ILS:2261483 2024-06-06T15:40:28Z 2024-06-06T15:40:28Z by&#160;Li, Chang-Tsun.<br/>Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-60566-836-9">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-60566-836-9</a><br/>Format:&#160;Electronic Resources<br/> Collaborative computer security and trust management ent://SD_ILS/0/SD_ILS:2261215 2024-06-06T15:40:28Z 2024-06-06T15:40:28Z by&#160;Seigneur, Jean-Marc.<br/>Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-60566-414-9">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-60566-414-9</a><br/>Format:&#160;Electronic Resources<br/> Web services research for emerging applications discoveries and trends ent://SD_ILS/0/SD_ILS:2262123 2024-06-06T15:40:28Z 2024-06-06T15:40:28Z by&#160;Zhang, Liang-Jie.<br/>Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-61520-684-1">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-61520-684-1</a><br/>Format:&#160;Electronic Resources<br/> Digital rights management for e-commerce systems ent://SD_ILS/0/SD_ILS:2261319 2024-06-06T15:40:28Z 2024-06-06T15:40:28Z by&#160;Tsolis, Dimitrios.<br/>Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-60566-118-6">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-60566-118-6</a><br/>Format:&#160;Electronic Resources<br/> Social and human elements of information security emerging trends and countermeasures ent://SD_ILS/0/SD_ILS:2261911 2024-06-06T15:40:28Z 2024-06-06T15:40:28Z by&#160;Gupta, Manish, 1978-<br/>Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-60566-036-3">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-60566-036-3</a><br/>Format:&#160;Electronic Resources<br/> Statistical techniques for network security modern statistically-based intrusion detection and protection ent://SD_ILS/0/SD_ILS:2261939 2024-06-06T15:40:28Z 2024-06-06T15:40:28Z by&#160;Wang, Yun.<br/>Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-59904-708-9">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-59904-708-9</a><br/>Format:&#160;Electronic Resources<br/> Techniques and applications for advanced information privacy and security emerging organizational, ethical, and human issues ent://SD_ILS/0/SD_ILS:2261969 2024-06-06T15:40:28Z 2024-06-06T15:40:28Z by&#160;Nemati, Hamid R., 1958-<br/>Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-60566-210-7">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-60566-210-7</a><br/>Format:&#160;Electronic Resources<br/> Computer security, privacy, and politics current issues, challenges, and solutions ent://SD_ILS/0/SD_ILS:2261235 2024-06-06T15:40:28Z 2024-06-06T15:40:28Z by&#160;Subramanian, Ramesh.<br/>Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-59904-804-8">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-59904-804-8</a><br/>Format:&#160;Electronic Resources<br/> Securing Web services practical usage of standards and specifications ent://SD_ILS/0/SD_ILS:2261882 2024-06-06T15:40:28Z 2024-06-06T15:40:28Z by&#160;Periorellis, Panos.<br/>Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-59904-639-6">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-59904-639-6</a><br/>Format:&#160;Electronic Resources<br/> Security and software for cybercaf&eacute;s ent://SD_ILS/0/SD_ILS:2261883 2024-06-06T15:40:28Z 2024-06-06T15:40:28Z by&#160;Adomi, Esharenana E.<br/>Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-59904-903-8">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-59904-903-8</a><br/>Format:&#160;Electronic Resources<br/> Advances in enterprise information technology security ent://SD_ILS/0/SD_ILS:2261103 2024-06-06T15:40:28Z 2024-06-06T15:40:28Z by&#160;Khadraoui, Djamel.<br/>Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-59904-090-5">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-59904-090-5</a><br/>Format:&#160;Electronic Resources<br/> Integrating security and software engineering advances and future visions ent://SD_ILS/0/SD_ILS:2261641 2024-06-06T15:40:28Z 2024-06-06T15:40:28Z by&#160;Mouratidis, Haralambos, 1977-<br/>Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-59904-147-6">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-59904-147-6</a><br/>Format:&#160;Electronic Resources<br/> Encyclopedia of information ethics and security ent://SD_ILS/0/SD_ILS:2261400 2024-06-06T15:40:28Z 2024-06-06T15:40:28Z by&#160;Quigley, Marian.<br/>Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-59140-987-8">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-59140-987-8</a><br/>Format:&#160;Electronic Resources<br/> Managing information assurance in financial services ent://SD_ILS/0/SD_ILS:2261738 2024-06-06T15:40:28Z 2024-06-06T15:40:28Z by&#160;Rao, H. R. (H. Raghav)<br/>Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-59904-171-1">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-59904-171-1</a><br/>Format:&#160;Electronic Resources<br/> Web services security and e-business ent://SD_ILS/0/SD_ILS:2262045 2024-06-06T15:40:28Z 2024-06-06T15:40:28Z by&#160;Radhamani, G., 1968-<br/>Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-59904-168-1">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-59904-168-1</a><br/>Format:&#160;Electronic Resources<br/> Privacy protection for e-services ent://SD_ILS/0/SD_ILS:2261853 2024-06-06T15:40:28Z 2024-06-06T15:40:28Z by&#160;Yee, George.<br/>Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-59140-914-4">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-59140-914-4</a><br/>Format:&#160;Electronic Resources<br/> Enterprise information systems assurance and system security managerial and technical issues ent://SD_ILS/0/SD_ILS:2261418 2024-06-06T15:40:28Z 2024-06-06T15:40:28Z by&#160;Warkentin, Merrill.<br/>Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-59140-911-3">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-59140-911-3</a><br/>Format:&#160;Electronic Resources<br/> Web and information security ent://SD_ILS/0/SD_ILS:2262035 2024-06-06T15:40:28Z 2024-06-06T15:40:28Z by&#160;Ferrari, Elena, 1968-<br/>Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-59140-588-7">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-59140-588-7</a><br/>Format:&#160;Electronic Resources<br/> Digital watermarking for digital media ent://SD_ILS/0/SD_ILS:2261322 2024-06-06T15:40:28Z 2024-06-06T15:40:28Z by&#160;Seitz, Juergen, 1968-<br/>Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-59140-518-4">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-59140-518-4</a><br/>Format:&#160;Electronic Resources<br/> Multimedia security steganography and digital watermarking techniques for protection of intellectual property ent://SD_ILS/0/SD_ILS:2261795 2024-06-06T15:40:28Z 2024-06-06T15:40:28Z by&#160;Lu, Chun-Shien.<br/>Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-59140-192-6">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-59140-192-6</a><br/>Format:&#160;Electronic Resources<br/> IT security advice from experts ent://SD_ILS/0/SD_ILS:2261685 2024-06-06T15:40:28Z 2024-06-06T15:40:28Z by&#160;Oliva, Lawrence M.<br/>Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-59140-247-3">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-59140-247-3</a><br/>Format:&#160;Electronic Resources<br/> Information security policies and actions in modern integrated systems ent://SD_ILS/0/SD_ILS:2261599 2024-06-06T15:40:28Z 2024-06-06T15:40:28Z by&#160;Fugini, Mariagrazia, 1957-<br/>Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-59140-186-5">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-59140-186-5</a><br/>Format:&#160;Electronic Resources<br/> Information security and ethics social and organizational issues ent://SD_ILS/0/SD_ILS:2261597 2024-06-06T15:40:28Z 2024-06-06T15:40:28Z by&#160;Quigley, Marian.<br/>Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-59140-286-7">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-59140-286-7</a><br/>Format:&#160;Electronic Resources<br/> Current security management &amp; ethical issues of information technology ent://SD_ILS/0/SD_ILS:2261270 2024-06-06T15:40:28Z 2024-06-06T15:40:28Z by&#160;Azari, Rasool.<br/>Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-93177-743-8">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-93177-743-8</a><br/>Format:&#160;Electronic Resources<br/>