Search Results for - Narrowed by: IGI Global - Computer security.SirsiDynix Enterprisehttps://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dLOCATION$002509Shelf$002bLocation$0025091$00253AIGI$002509IGI$002bGlobal$0026qf$003dSUBJECT$002509Subject$002509Computer$002bsecurity.$002509Computer$002bsecurity.$0026ps$003d300?2024-06-06T15:40:28ZHandbook of research on computational forensics, digital crime, and investigation methods and solutionsent://SD_ILS/0/SD_ILS:22614832024-06-06T15:40:28Z2024-06-06T15:40:28Zby Li, Chang-Tsun.<br/>Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-60566-836-9">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-60566-836-9</a><br/>Format: Electronic Resources<br/>Collaborative computer security and trust managementent://SD_ILS/0/SD_ILS:22612152024-06-06T15:40:28Z2024-06-06T15:40:28Zby Seigneur, Jean-Marc.<br/>Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-60566-414-9">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-60566-414-9</a><br/>Format: Electronic Resources<br/>Web services research for emerging applications discoveries and trendsent://SD_ILS/0/SD_ILS:22621232024-06-06T15:40:28Z2024-06-06T15:40:28Zby Zhang, Liang-Jie.<br/>Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-61520-684-1">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-61520-684-1</a><br/>Format: Electronic Resources<br/>Digital rights management for e-commerce systemsent://SD_ILS/0/SD_ILS:22613192024-06-06T15:40:28Z2024-06-06T15:40:28Zby Tsolis, Dimitrios.<br/>Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-60566-118-6">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-60566-118-6</a><br/>Format: Electronic Resources<br/>Social and human elements of information security emerging trends and countermeasuresent://SD_ILS/0/SD_ILS:22619112024-06-06T15:40:28Z2024-06-06T15:40:28Zby Gupta, Manish, 1978-<br/>Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-60566-036-3">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-60566-036-3</a><br/>Format: Electronic Resources<br/>Statistical techniques for network security modern statistically-based intrusion detection and protectionent://SD_ILS/0/SD_ILS:22619392024-06-06T15:40:28Z2024-06-06T15:40:28Zby Wang, Yun.<br/>Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-59904-708-9">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-59904-708-9</a><br/>Format: Electronic Resources<br/>Techniques and applications for advanced information privacy and security emerging organizational, ethical, and human issuesent://SD_ILS/0/SD_ILS:22619692024-06-06T15:40:28Z2024-06-06T15:40:28Zby Nemati, Hamid R., 1958-<br/>Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-60566-210-7">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-60566-210-7</a><br/>Format: Electronic Resources<br/>Computer security, privacy, and politics current issues, challenges, and solutionsent://SD_ILS/0/SD_ILS:22612352024-06-06T15:40:28Z2024-06-06T15:40:28Zby Subramanian, Ramesh.<br/>Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-59904-804-8">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-59904-804-8</a><br/>Format: Electronic Resources<br/>Securing Web services practical usage of standards and specificationsent://SD_ILS/0/SD_ILS:22618822024-06-06T15:40:28Z2024-06-06T15:40:28Zby Periorellis, Panos.<br/>Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-59904-639-6">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-59904-639-6</a><br/>Format: Electronic Resources<br/>Security and software for cybercafésent://SD_ILS/0/SD_ILS:22618832024-06-06T15:40:28Z2024-06-06T15:40:28Zby Adomi, Esharenana E.<br/>Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-59904-903-8">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-59904-903-8</a><br/>Format: Electronic Resources<br/>Advances in enterprise information technology securityent://SD_ILS/0/SD_ILS:22611032024-06-06T15:40:28Z2024-06-06T15:40:28Zby Khadraoui, Djamel.<br/>Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-59904-090-5">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-59904-090-5</a><br/>Format: Electronic Resources<br/>Integrating security and software engineering advances and future visionsent://SD_ILS/0/SD_ILS:22616412024-06-06T15:40:28Z2024-06-06T15:40:28Zby Mouratidis, Haralambos, 1977-<br/>Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-59904-147-6">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-59904-147-6</a><br/>Format: Electronic Resources<br/>Encyclopedia of information ethics and securityent://SD_ILS/0/SD_ILS:22614002024-06-06T15:40:28Z2024-06-06T15:40:28Zby Quigley, Marian.<br/>Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-59140-987-8">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-59140-987-8</a><br/>Format: Electronic Resources<br/>Managing information assurance in financial servicesent://SD_ILS/0/SD_ILS:22617382024-06-06T15:40:28Z2024-06-06T15:40:28Zby Rao, H. R. (H. Raghav)<br/>Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-59904-171-1">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-59904-171-1</a><br/>Format: Electronic Resources<br/>Web services security and e-businessent://SD_ILS/0/SD_ILS:22620452024-06-06T15:40:28Z2024-06-06T15:40:28Zby Radhamani, G., 1968-<br/>Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-59904-168-1">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-59904-168-1</a><br/>Format: Electronic Resources<br/>Privacy protection for e-servicesent://SD_ILS/0/SD_ILS:22618532024-06-06T15:40:28Z2024-06-06T15:40:28Zby Yee, George.<br/>Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-59140-914-4">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-59140-914-4</a><br/>Format: Electronic Resources<br/>Enterprise information systems assurance and system security managerial and technical issuesent://SD_ILS/0/SD_ILS:22614182024-06-06T15:40:28Z2024-06-06T15:40:28Zby Warkentin, Merrill.<br/>Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-59140-911-3">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-59140-911-3</a><br/>Format: Electronic Resources<br/>Web and information securityent://SD_ILS/0/SD_ILS:22620352024-06-06T15:40:28Z2024-06-06T15:40:28Zby Ferrari, Elena, 1968-<br/>Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-59140-588-7">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-59140-588-7</a><br/>Format: Electronic Resources<br/>Digital watermarking for digital mediaent://SD_ILS/0/SD_ILS:22613222024-06-06T15:40:28Z2024-06-06T15:40:28Zby Seitz, Juergen, 1968-<br/>Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-59140-518-4">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-59140-518-4</a><br/>Format: Electronic Resources<br/>Multimedia security steganography and digital watermarking techniques for protection of intellectual propertyent://SD_ILS/0/SD_ILS:22617952024-06-06T15:40:28Z2024-06-06T15:40:28Zby Lu, Chun-Shien.<br/>Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-59140-192-6">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-59140-192-6</a><br/>Format: Electronic Resources<br/>IT security advice from expertsent://SD_ILS/0/SD_ILS:22616852024-06-06T15:40:28Z2024-06-06T15:40:28Zby Oliva, Lawrence M.<br/>Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-59140-247-3">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-59140-247-3</a><br/>Format: Electronic Resources<br/>Information security policies and actions in modern integrated systemsent://SD_ILS/0/SD_ILS:22615992024-06-06T15:40:28Z2024-06-06T15:40:28Zby Fugini, Mariagrazia, 1957-<br/>Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-59140-186-5">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-59140-186-5</a><br/>Format: Electronic Resources<br/>Information security and ethics social and organizational issuesent://SD_ILS/0/SD_ILS:22615972024-06-06T15:40:28Z2024-06-06T15:40:28Zby Quigley, Marian.<br/>Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-59140-286-7">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-59140-286-7</a><br/>Format: Electronic Resources<br/>Current security management & ethical issues of information technologyent://SD_ILS/0/SD_ILS:22612702024-06-06T15:40:28Z2024-06-06T15:40:28Zby Azari, Rasool.<br/>Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-93177-743-8">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-93177-743-8</a><br/>Format: Electronic Resources<br/>