Search Results for - Narrowed by: 2005 - Information Systems. SirsiDynix Enterprise https://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dPUBDATE$002509Publication$002bDate$0025092005$0025092005$0026qf$003dSUBJECT$002509Subject$002509Information$002bSystems.$002509Information$002bSystems.$0026ps$003d300? 2024-06-06T21:08:26Z Computer Insecurity Risking the System ent://SD_ILS/0/SD_ILS:508488 2024-06-06T21:08:26Z 2024-06-06T21:08:26Z by&#160;Furnell, Steven. author.<br/><a href="http://dx.doi.org/10.1007/1-84628-270-5">http://dx.doi.org/10.1007/1-84628-270-5</a><br/>Format:&#160;Electronic Resources<br/> Digital Watermarking 4th International Workshop, IWDW 2005, Siena, Italy, September 15-17, 2005. Proceedings ent://SD_ILS/0/SD_ILS:510415 2024-06-06T21:08:26Z 2024-06-06T21:08:26Z by&#160;Barni, Mauro. editor.<br/><a href="http://dx.doi.org/10.1007/11551492">http://dx.doi.org/10.1007/11551492</a><br/>Format:&#160;Electronic Resources<br/> Advances in Cryptology &ndash; EUROCRYPT 2005 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Aarhus, Denmark, May 22-26, 2005. Proceedings ent://SD_ILS/0/SD_ILS:510418 2024-06-06T21:08:26Z 2024-06-06T21:08:26Z by&#160;Cramer, Ronald. editor.<br/><a href="http://dx.doi.org/10.1007/b136415">http://dx.doi.org/10.1007/b136415</a><br/>Format:&#160;Electronic Resources<br/> Model Driven Engineering Languages and Systems 8th International Conference, MoDELS 2005, Montego Bay, Jamaica, October 2-7, 2005. Proceedings ent://SD_ILS/0/SD_ILS:510420 2024-06-06T21:08:26Z 2024-06-06T21:08:26Z by&#160;Briand, Lionel. editor.<br/><a href="http://dx.doi.org/10.1007/11557432">http://dx.doi.org/10.1007/11557432</a><br/>Format:&#160;Electronic Resources<br/> Software Product Lines 9th International Conference, SPLC 2005, Rennes, France, September 26-29, 2005. Proceedings ent://SD_ILS/0/SD_ILS:510425 2024-06-06T21:08:26Z 2024-06-06T21:08:26Z by&#160;Obbink, Henk. editor.<br/><a href="http://dx.doi.org/10.1007/11554844">http://dx.doi.org/10.1007/11554844</a><br/>Format:&#160;Electronic Resources<br/> Progress in Cryptology &ndash; Mycrypt 2005 First International Conference on Cryptology in Malaysia, Kuala Lumpur, Malaysia, September 28-30, 2005. Proceedings ent://SD_ILS/0/SD_ILS:510427 2024-06-06T21:08:26Z 2024-06-06T21:08:26Z by&#160;Dawson, Ed. editor.<br/><a href="http://dx.doi.org/10.1007/11554868">http://dx.doi.org/10.1007/11554868</a><br/>Format:&#160;Electronic Resources<br/> Model Driven Architecture &ndash; Foundations and Applications First European Conference, ECMDA-FA 2005, Nuremberg, Germany, November 7-10, 2005. Proceedings ent://SD_ILS/0/SD_ILS:510453 2024-06-06T21:08:26Z 2024-06-06T21:08:26Z by&#160;Hartman, Alan. editor.<br/><a href="http://dx.doi.org/10.1007/11581741">http://dx.doi.org/10.1007/11581741</a><br/>Format:&#160;Electronic Resources<br/> Computational Intelligence and Security International Conference, CIS 2005, Xi&rsquo;an, China, December 15-19, 2005, Proceedings Part I ent://SD_ILS/0/SD_ILS:510076 2024-06-06T21:08:26Z 2024-06-06T21:08:26Z by&#160;Hao, Yue. editor.<br/><a href="http://dx.doi.org/10.1007/11596448">http://dx.doi.org/10.1007/11596448</a><br/>Format:&#160;Electronic Resources<br/> Audio- and Video-Based Biometric Person Authentication 5th International Conference, AVBPA 2005, Hilton Rye Town, NY, USA, July 20-22, 2005. Proceedings ent://SD_ILS/0/SD_ILS:510099 2024-06-06T21:08:26Z 2024-06-06T21:08:26Z by&#160;Kanade, Takeo. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-31638-1">http://dx.doi.org/10.1007/978-3-540-31638-1</a><br/>Format:&#160;Electronic Resources<br/> Detection of Intrusions and Malware, and Vulnerability Assessment Second International Conference, DIMVA 2005, Vienna, Austria, July 7-8, 2005. Proceedings ent://SD_ILS/0/SD_ILS:510103 2024-06-06T21:08:26Z 2024-06-06T21:08:26Z by&#160;Julisch, Klaus. editor.<br/><a href="http://dx.doi.org/10.1007/b137798">http://dx.doi.org/10.1007/b137798</a><br/>Format:&#160;Electronic Resources<br/> Self-Stabilizing Systems 7th International Symposium, SSS 2005, Barcelona, Spain, October 26-27, 2005. Proceedings ent://SD_ILS/0/SD_ILS:510479 2024-06-06T21:08:26Z 2024-06-06T21:08:26Z by&#160;Tixeuil, S&eacute;bastien. editor.<br/><a href="http://dx.doi.org/10.1007/11577327">http://dx.doi.org/10.1007/11577327</a><br/>Format:&#160;Electronic Resources<br/> FM 2005: Formal Methods International Symposium of Formal Methods Europe, Newcastle, UK, July 18-22, 2005. Proceedings ent://SD_ILS/0/SD_ILS:510147 2024-06-06T21:08:26Z 2024-06-06T21:08:26Z by&#160;Fitzgerald, John. editor.<br/><a href="http://dx.doi.org/10.1007/b27882">http://dx.doi.org/10.1007/b27882</a><br/>Format:&#160;Electronic Resources<br/> Digital Watermarking Third International Workshop, IWDW 2004, Seoul, South Korea, October 30 - November 1, 2004, Revised Selected Papers ent://SD_ILS/0/SD_ILS:510189 2024-06-06T21:08:26Z 2024-06-06T21:08:26Z by&#160;Cox, Ingemar J. editor.<br/><a href="http://dx.doi.org/10.1007/b106346">http://dx.doi.org/10.1007/b106346</a><br/>Format:&#160;Electronic Resources<br/> Security Protocols 11th International Workshop, Cambridge, UK, April 2-4, 2003, Revised Selected Papers ent://SD_ILS/0/SD_ILS:510219 2024-06-06T21:08:26Z 2024-06-06T21:08:26Z by&#160;Christianson, Bruce. editor.<br/><a href="http://dx.doi.org/10.1007/11542322">http://dx.doi.org/10.1007/11542322</a><br/>Format:&#160;Electronic Resources<br/> Reliable Software Technology &ndash; Ada-Europe 2005 10th Ada-Europe International Conference on Reliable Software Technologies, York, UK, June 20-24, 2005. Proceedings ent://SD_ILS/0/SD_ILS:510119 2024-06-06T21:08:26Z 2024-06-06T21:08:26Z by&#160;Vardanega, Tullio. editor.<br/><a href="http://dx.doi.org/10.1007/b137344">http://dx.doi.org/10.1007/b137344</a><br/>Format:&#160;Electronic Resources<br/> Information Security and Cryptology &ndash; ICISC 2004 7th International Conference, Seoul, Korea, December 2-3, 2004, Revised Selected Papers ent://SD_ILS/0/SD_ILS:510443 2024-06-06T21:08:26Z 2024-06-06T21:08:26Z by&#160;Park, Choon-sik. editor.<br/><a href="http://dx.doi.org/10.1007/b137120">http://dx.doi.org/10.1007/b137120</a><br/>Format:&#160;Electronic Resources<br/> Extreme Programming and Agile Processes in Software Engineering 6th International Conference, XP 2005, Sheffield, UK, June 18-23, 2005. Proceedings ent://SD_ILS/0/SD_ILS:509969 2024-06-06T21:08:26Z 2024-06-06T21:08:26Z by&#160;Baumeister, Hubert. editor.<br/><a href="http://dx.doi.org/10.1007/b137278">http://dx.doi.org/10.1007/b137278</a><br/>Format:&#160;Electronic Resources<br/> Information and Communications Security 7th International Conference, ICICS 2005, Beijing, China, December 10-13, 2005. Proceedings ent://SD_ILS/0/SD_ILS:510459 2024-06-06T21:08:26Z 2024-06-06T21:08:26Z by&#160;Qing, Sihan. editor.<br/><a href="http://dx.doi.org/10.1007/11602897">http://dx.doi.org/10.1007/11602897</a><br/>Format:&#160;Electronic Resources<br/> Advances in Cryptology - ASIACRYPT 2005 11th International Conference on the Theory and Application of Cryptology and Information Security, Chennai, India, December 4-8, 2005. Proceedings ent://SD_ILS/0/SD_ILS:510543 2024-06-06T21:08:26Z 2024-06-06T21:08:26Z by&#160;Roy, Bimal. editor.<br/><a href="http://dx.doi.org/10.1007/11593447">http://dx.doi.org/10.1007/11593447</a><br/>Format:&#160;Electronic Resources<br/> Software Process Improvement 12th European Conference, EuroSPI 2005, Budapest, Hungary, November 9-11, 2005. Proceedings ent://SD_ILS/0/SD_ILS:510547 2024-06-06T21:08:26Z 2024-06-06T21:08:26Z by&#160;Richardson, Ita. editor.<br/><a href="http://dx.doi.org/10.1007/11586012">http://dx.doi.org/10.1007/11586012</a><br/>Format:&#160;Electronic Resources<br/> Progress in Cryptology - INDOCRYPT 2005 6th International Conference on Cryptology in India, Bangalore, India, December 10-12, 2005. Proceedings ent://SD_ILS/0/SD_ILS:510554 2024-06-06T21:08:26Z 2024-06-06T21:08:26Z by&#160;Maitra, Subhamoy. editor.<br/><a href="http://dx.doi.org/10.1007/11596219">http://dx.doi.org/10.1007/11596219</a><br/>Format:&#160;Electronic Resources<br/> Trust, Privacy, and Security in Digital Business Second International Conference, TrustBus 2005, Copenhagen, Denmark, August 22-26, 2005. Proceedings ent://SD_ILS/0/SD_ILS:510186 2024-06-06T21:08:26Z 2024-06-06T21:08:26Z by&#160;Katsikas, Sokratis. editor.<br/><a href="http://dx.doi.org/10.1007/11537878">http://dx.doi.org/10.1007/11537878</a><br/>Format:&#160;Electronic Resources<br/> UML Modeling Languages and Applications &lt;&thinsp;&lt;UML&gt;&thinsp;&gt; 2004 Satellite Activities, Lisbon, Portugal, October 11-15, 2004, Revised Selected Papers ent://SD_ILS/0/SD_ILS:510187 2024-06-06T21:08:26Z 2024-06-06T21:08:26Z by&#160;Jardim Nunes, Nuno. editor.<br/><a href="http://dx.doi.org/10.1007/b106725">http://dx.doi.org/10.1007/b106725</a><br/>Format:&#160;Electronic Resources<br/> Information Systems Security First International Conference, ICISS 2005, Kolkata, India, December 19-21, 2005. Proceedings ent://SD_ILS/0/SD_ILS:510648 2024-06-06T21:08:26Z 2024-06-06T21:08:26Z by&#160;Jajodia, Sushil. editor.<br/><a href="http://dx.doi.org/10.1007/11593980">http://dx.doi.org/10.1007/11593980</a><br/>Format:&#160;Electronic Resources<br/> Information Security and Cryptology First SKLOIS Conference, CISC 2005, Beijing, China, December 15-17, 2005. Proceedings ent://SD_ILS/0/SD_ILS:510650 2024-06-06T21:08:26Z 2024-06-06T21:08:26Z by&#160;Feng, Dengguo. editor.<br/><a href="http://dx.doi.org/10.1007/11599548">http://dx.doi.org/10.1007/11599548</a><br/>Format:&#160;Electronic Resources<br/> Model Driven Architecture European MDA Workshops: Foundations and Applications, MDAFA 2003 and MDAFA 2004, Twente, The Netherlands, June 26-27, 2003 and Link&ouml;ping, Sweden, June 10-11, 2004. Revised Selected Papers ent://SD_ILS/0/SD_ILS:510203 2024-06-06T21:08:26Z 2024-06-06T21:08:26Z by&#160;A&szlig;mann, Uwe. editor.<br/><a href="http://dx.doi.org/10.1007/11538097">http://dx.doi.org/10.1007/11538097</a><br/>Format:&#160;Electronic Resources<br/> Secure Systems Development with UML ent://SD_ILS/0/SD_ILS:508895 2024-06-06T21:08:26Z 2024-06-06T21:08:26Z by&#160;J&uuml;rjens, Jan. author.<br/><a href="http://dx.doi.org/10.1007/b137706">http://dx.doi.org/10.1007/b137706</a><br/>Format:&#160;Electronic Resources<br/> Testing Commercial-off-the-Shelf Components and Systems ent://SD_ILS/0/SD_ILS:509106 2024-06-06T21:08:26Z 2024-06-06T21:08:26Z by&#160;Beydeda, Sami. editor.<br/><a href="http://dx.doi.org/10.1007/b138567">http://dx.doi.org/10.1007/b138567</a><br/>Format:&#160;Electronic Resources<br/> Information Security and Privacy 10th Australasian Conference, ACISP 2005, Brisbane, Australia, July 4-6, 2005. Proceedings ent://SD_ILS/0/SD_ILS:510135 2024-06-06T21:08:26Z 2024-06-06T21:08:26Z by&#160;Boyd, Colin. editor.<br/><a href="http://dx.doi.org/10.1007/b137750">http://dx.doi.org/10.1007/b137750</a><br/>Format:&#160;Electronic Resources<br/> Advances in Cryptology &ndash; CRYPTO 2005 25th Annual International Cryptology Conference, Santa Barbara, California, USA, August 14-18, 2005. Proceedings ent://SD_ILS/0/SD_ILS:510253 2024-06-06T21:08:26Z 2024-06-06T21:08:26Z by&#160;Shoup, Victor. editor.<br/><a href="http://dx.doi.org/10.1007/11535218">http://dx.doi.org/10.1007/11535218</a><br/>Format:&#160;Electronic Resources<br/> Ambient Networks 16th IFIP/IEEE International Workshop on Distributed Systems: Operations and Management, DSOM 2005, Barcelona, Spain, October 24-26, 2005. Proceedings ent://SD_ILS/0/SD_ILS:510520 2024-06-06T21:08:26Z 2024-06-06T21:08:26Z by&#160;Sch&ouml;nw&auml;lder, J&uuml;rgen. editor.<br/><a href="http://dx.doi.org/10.1007/11568285">http://dx.doi.org/10.1007/11568285</a><br/>Format:&#160;Electronic Resources<br/> Information Security Applications 5th International Workshop, WISA 2004, Jeju Island, Korea, August 23-25, 2004, Revised Selected Papers ent://SD_ILS/0/SD_ILS:510199 2024-06-06T21:08:26Z 2024-06-06T21:08:26Z by&#160;Lim, Chae Hoon. editor.<br/><a href="http://dx.doi.org/10.1007/b103174">http://dx.doi.org/10.1007/b103174</a><br/>Format:&#160;Electronic Resources<br/> Cryptology and Network Security 4th International Conference, CANS 2005, Xiamen, China, December 14-16, 2005. Proceedings ent://SD_ILS/0/SD_ILS:510572 2024-06-06T21:08:26Z 2024-06-06T21:08:26Z by&#160;Desmedt, Yvo G. editor.<br/><a href="http://dx.doi.org/10.1007/11599371">http://dx.doi.org/10.1007/11599371</a><br/>Format:&#160;Electronic Resources<br/> Advanced Studies in Biometrics Summer School on Biometrics, Alghero, Italy, June 2-6, 2003. Revised Selected Lectures and Papers ent://SD_ILS/0/SD_ILS:509472 2024-06-06T21:08:26Z 2024-06-06T21:08:26Z by&#160;Tistarelli, Massimo. editor.<br/><a href="http://dx.doi.org/10.1007/b136906">http://dx.doi.org/10.1007/b136906</a><br/>Format:&#160;Electronic Resources<br/> Engineering and Managing Software Requirements ent://SD_ILS/0/SD_ILS:509395 2024-06-06T21:08:26Z 2024-06-06T21:08:26Z by&#160;Aurum, Ayb&uuml;ke. editor.<br/><a href="http://dx.doi.org/10.1007/3-540-28244-0">http://dx.doi.org/10.1007/3-540-28244-0</a><br/>Format:&#160;Electronic Resources<br/> Progress in Cryptology - INDOCRYPT 2004 5th International Conference on Cryptology in India, Chennai, India, December 20-22, 2004. Proceedings ent://SD_ILS/0/SD_ILS:509738 2024-06-06T21:08:26Z 2024-06-06T21:08:26Z by&#160;Canteaut, Anne. editor.<br/><a href="http://dx.doi.org/10.1007/b104579">http://dx.doi.org/10.1007/b104579</a><br/>Format:&#160;Electronic Resources<br/> Topics in Cryptology &ndash; CT-RSA 2005 The Cryptographers&rsquo; Track at the RSA Conference 2005, San Francisco, CA, USA, February 14-18, 2005. Proceedings ent://SD_ILS/0/SD_ILS:509752 2024-06-06T21:08:26Z 2024-06-06T21:08:26Z by&#160;Menezes, Alfred. editor.<br/><a href="http://dx.doi.org/10.1007/b105222">http://dx.doi.org/10.1007/b105222</a><br/>Format:&#160;Electronic Resources<br/> Theory of Cryptography Second Theory of Cryptography Conference, TCC 2005, Cambridge, MA, USA, February 10-12, 2005. Proceedings ent://SD_ILS/0/SD_ILS:509753 2024-06-06T21:08:26Z 2024-06-06T21:08:26Z by&#160;Kilian, Joe. editor.<br/><a href="http://dx.doi.org/10.1007/b106171">http://dx.doi.org/10.1007/b106171</a><br/>Format:&#160;Electronic Resources<br/> Public Key Cryptography - PKC 2005 8th International Workshop on Theory and Practice in Public Key Cryptography, Les Diablerets, Switzerland, January 23-26, 2005. Proceedings ent://SD_ILS/0/SD_ILS:509757 2024-06-06T21:08:26Z 2024-06-06T21:08:26Z by&#160;Vaudenay, Serge. editor.<br/><a href="http://dx.doi.org/10.1007/b105124">http://dx.doi.org/10.1007/b105124</a><br/>Format:&#160;Electronic Resources<br/> Formal Approaches to Software Testing 4th International Workshop, FATES 2004, Linz, Austria, September 21, 2004, Revised Selected Papers ent://SD_ILS/0/SD_ILS:510231 2024-06-06T21:08:26Z 2024-06-06T21:08:26Z by&#160;Grabowski, Jens. editor.<br/><a href="http://dx.doi.org/10.1007/b106767">http://dx.doi.org/10.1007/b106767</a><br/>Format:&#160;Electronic Resources<br/> Security in Communication Networks 4th International Conference, SCN 2004, Amalfi, Italy, September 8-10, 2004, Revised Selected Papers ent://SD_ILS/0/SD_ILS:509770 2024-06-06T21:08:26Z 2024-06-06T21:08:26Z by&#160;Blundo, Carlo. editor.<br/><a href="http://dx.doi.org/10.1007/b105083">http://dx.doi.org/10.1007/b105083</a><br/>Format:&#160;Electronic Resources<br/> Financial Cryptography and Data Security 9th International Conference, FC 2005, Roseau, The Commonwealth Of Dominica, February 28 &ndash; March 3, 2005. Revised Papers ent://SD_ILS/0/SD_ILS:510132 2024-06-06T21:08:26Z 2024-06-06T21:08:26Z by&#160;Patrick, Andrew S. editor.<br/><a href="http://dx.doi.org/10.1007/b137875">http://dx.doi.org/10.1007/b137875</a><br/>Format:&#160;Electronic Resources<br/> ECOOP 2005 - Object-Oriented Programming 19th European Conference, Glasgow, UK, July 25-29, 2005. Proceedings ent://SD_ILS/0/SD_ILS:510154 2024-06-06T21:08:26Z 2024-06-06T21:08:26Z by&#160;Black, Andrew P. editor.<br/><a href="http://dx.doi.org/10.1007/11531142">http://dx.doi.org/10.1007/11531142</a><br/>Format:&#160;Electronic Resources<br/> Computer Security &ndash; ESORICS 2005 10th European Symposium on Research in Computer Security, Milan, Italy, September 12-14, 2005. Proceedings ent://SD_ILS/0/SD_ILS:510351 2024-06-06T21:08:26Z 2024-06-06T21:08:26Z by&#160;Vimercati, Sabrina de Capitani. editor.<br/><a href="http://dx.doi.org/10.1007/11555827">http://dx.doi.org/10.1007/11555827</a><br/>Format:&#160;Electronic Resources<br/> Rapid Integration of Software Engineering Techniques First International Workshop, RISE 2004, Luxembourg-Kirchberg, Luxembourg, November 26, 2004. Revised Selected Papers ent://SD_ILS/0/SD_ILS:510402 2024-06-06T21:08:26Z 2024-06-06T21:08:26Z by&#160;Guelfi, Nicolas. editor.<br/><a href="http://dx.doi.org/10.1007/b136153">http://dx.doi.org/10.1007/b136153</a><br/>Format:&#160;Electronic Resources<br/> Perspectives and Policies on ICT in Society An IFIP TC9 (Computers and Society) Handbook ent://SD_ILS/0/SD_ILS:504416 2024-06-06T21:08:26Z 2024-06-06T21:08:26Z by&#160;Berleur, Jacques. editor.<br/><a href="http://dx.doi.org/10.1007/b135654">http://dx.doi.org/10.1007/b135654</a><br/>Format:&#160;Electronic Resources<br/> Foundations of Security Analysis and Design III FOSAD 2004/2005 Tutorial Lectures ent://SD_ILS/0/SD_ILS:510308 2024-06-06T21:08:26Z 2024-06-06T21:08:26Z by&#160;Aldini, Alessandro. editor.<br/><a href="http://dx.doi.org/10.1007/11554578">http://dx.doi.org/10.1007/11554578</a><br/>Format:&#160;Electronic Resources<br/> Data and Applications Security XIX 19th Annual IFIP WG 11.3 Working Conference on Data and Applications Security, Storrs, CT, USA, August 7-10, 2005. Proceedings ent://SD_ILS/0/SD_ILS:510309 2024-06-06T21:08:26Z 2024-06-06T21:08:26Z by&#160;Jajodia, Sushil. editor.<br/><a href="http://dx.doi.org/10.1007/11535706">http://dx.doi.org/10.1007/11535706</a><br/>Format:&#160;Electronic Resources<br/> Cryptographic Hardware and Embedded Systems &ndash; CHES 2005 7th International Workshop, Edinburgh, UK, August 29 &ndash; September 1, 2005. Proceedings ent://SD_ILS/0/SD_ILS:510312 2024-06-06T21:08:26Z 2024-06-06T21:08:26Z by&#160;Rao, Josyula R. editor.<br/><a href="http://dx.doi.org/10.1007/11545262">http://dx.doi.org/10.1007/11545262</a><br/>Format:&#160;Electronic Resources<br/> Computer Network Security Third International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2005, St. Petersburg, Russia, September 24-28, 2005. Proceedings ent://SD_ILS/0/SD_ILS:510364 2024-06-06T21:08:26Z 2024-06-06T21:08:26Z by&#160;Gorodetsky, Vladimir. editor.<br/><a href="http://dx.doi.org/10.1007/11560326">http://dx.doi.org/10.1007/11560326</a><br/>Format:&#160;Electronic Resources<br/> Analyzing Computer System Performance with Perl::PDQ ent://SD_ILS/0/SD_ILS:509014 2024-06-06T21:08:26Z 2024-06-06T21:08:26Z by&#160;Gunther, Neil J. author.<br/><a href="http://dx.doi.org/10.1007/978-3-540-26860-4">http://dx.doi.org/10.1007/978-3-540-26860-4</a><br/>Format:&#160;Electronic Resources<br/> Security in Pervasive Computing Second International Conference, SPC 2005, Boppard, Germany, April 6-8, 2005. Proceedings ent://SD_ILS/0/SD_ILS:510370 2024-06-06T21:08:26Z 2024-06-06T21:08:26Z by&#160;Hutter, Dieter. editor.<br/><a href="http://dx.doi.org/10.1007/b135497">http://dx.doi.org/10.1007/b135497</a><br/>Format:&#160;Electronic Resources<br/> Logical Data Modeling What it is and How to do it ent://SD_ILS/0/SD_ILS:504081 2024-06-06T21:08:26Z 2024-06-06T21:08:26Z by&#160;Chmura, Alan. author.<br/><a href="http://dx.doi.org/10.1007/b100064">http://dx.doi.org/10.1007/b100064</a><br/>Format:&#160;Electronic Resources<br/> Manage IT! Organizing IT Demand and IT Supply ent://SD_ILS/0/SD_ILS:506584 2024-06-06T21:08:26Z 2024-06-06T21:08:26Z by&#160;Thiadens, Theo. author.<br/><a href="http://dx.doi.org/10.1007/1-4020-3710-4">http://dx.doi.org/10.1007/1-4020-3710-4</a><br/>Format:&#160;Electronic Resources<br/> Embedded Systems Design The ARTIST Roadmap for Research and Development ent://SD_ILS/0/SD_ILS:510343 2024-06-06T21:08:26Z 2024-06-06T21:08:26Z by&#160;Bouyssounouse, Bruno. author.<br/><a href="http://dx.doi.org/10.1007/b106761">http://dx.doi.org/10.1007/b106761</a><br/>Format:&#160;Electronic Resources<br/> Secure Data Management Second VLDB Workshop, SDM 2005, Trondheim, Norway, September 2-3, 2005. Proceedings ent://SD_ILS/0/SD_ILS:510344 2024-06-06T21:08:26Z 2024-06-06T21:08:26Z by&#160;Jonker, Willem. editor.<br/><a href="http://dx.doi.org/10.1007/11552338">http://dx.doi.org/10.1007/11552338</a><br/>Format:&#160;Electronic Resources<br/> Information Security Practice and Experience First International Conference, ISPEC 2005, Singapore, April 11-14, 2005. Proceedings ent://SD_ILS/0/SD_ILS:510349 2024-06-06T21:08:26Z 2024-06-06T21:08:26Z by&#160;Deng, Robert H. editor.<br/><a href="http://dx.doi.org/10.1007/b107167">http://dx.doi.org/10.1007/b107167</a><br/>Format:&#160;Electronic Resources<br/> Computer Safety, Reliability, and Security 24th International Conference, SAFECOMP 2005, Fredrikstad, Norway, September 28-30, 2005. Proceedings ent://SD_ILS/0/SD_ILS:510366 2024-06-06T21:08:26Z 2024-06-06T21:08:26Z by&#160;Winther, Rune. editor.<br/><a href="http://dx.doi.org/10.1007/11563228">http://dx.doi.org/10.1007/11563228</a><br/>Format:&#160;Electronic Resources<br/> Outsourcing to India The Offshore Advantage ent://SD_ILS/0/SD_ILS:508826 2024-06-06T21:08:26Z 2024-06-06T21:08:26Z by&#160;Kobayashi-Hillary, Mark. author.<br/><a href="http://dx.doi.org/10.1007/b106280">http://dx.doi.org/10.1007/b106280</a><br/>Format:&#160;Electronic Resources<br/> Computer Network Security ent://SD_ILS/0/SD_ILS:504373 2024-06-06T21:08:26Z 2024-06-06T21:08:26Z by&#160;Kizza, Joseph Migga. author.<br/><a href="http://dx.doi.org/10.1007/b106962">http://dx.doi.org/10.1007/b106962</a><br/>Format:&#160;Electronic Resources<br/> Privacy Enhancing Technologies 4th International Workshop, PET 2004, Toronto, Canada, May 26-28, 2004. Revised Selected Papers ent://SD_ILS/0/SD_ILS:510331 2024-06-06T21:08:26Z 2024-06-06T21:08:26Z by&#160;Martin, David. editor.<br/><a href="http://dx.doi.org/10.1007/b136164">http://dx.doi.org/10.1007/b136164</a><br/>Format:&#160;Electronic Resources<br/> E-government and Public Sector Process Rebuilding Dilettantes, Wheel Barrows, and Diamonds ent://SD_ILS/0/SD_ILS:507688 2024-06-06T21:08:26Z 2024-06-06T21:08:26Z by&#160;Andersen, Kim Viborg. author.<br/><a href="http://dx.doi.org/10.1007/b116842">http://dx.doi.org/10.1007/b116842</a><br/>Format:&#160;Electronic Resources<br/> Scenarios: Models, Transformations and Tools International Workshop, Dagstuhl Castle, Germany, September 7-12, 2003, Revised Selected Papers ent://SD_ILS/0/SD_ILS:510395 2024-06-06T21:08:26Z 2024-06-06T21:08:26Z by&#160;Leue, Stefan. editor.<br/><a href="http://dx.doi.org/10.1007/b137052">http://dx.doi.org/10.1007/b137052</a><br/>Format:&#160;Electronic Resources<br/> Software Product Line Engineering Foundations, Principles, and Techniques ent://SD_ILS/0/SD_ILS:509517 2024-06-06T21:08:26Z 2024-06-06T21:08:26Z by&#160;Pohl, Klaus. author.<br/><a href="http://dx.doi.org/10.1007/3-540-28901-1">http://dx.doi.org/10.1007/3-540-28901-1</a><br/>Format:&#160;Electronic Resources<br/> Best Practices in Software Measurement How to use metrics to improve project and process performance ent://SD_ILS/0/SD_ILS:508972 2024-06-06T21:08:26Z 2024-06-06T21:08:26Z by&#160;Ebert, Christof. author.<br/><a href="http://dx.doi.org/10.1007/b138013">http://dx.doi.org/10.1007/b138013</a><br/>Format:&#160;Electronic Resources<br/> SDL 2005: Model Driven 12th International SDL Forum, Grimstad, Norway, June 20-23, 2005. Proceedings ent://SD_ILS/0/SD_ILS:510017 2024-06-06T21:08:26Z 2024-06-06T21:08:26Z by&#160;Prinz, Andreas. editor.<br/><a href="http://dx.doi.org/10.1007/b137793">http://dx.doi.org/10.1007/b137793</a><br/>Format:&#160;Electronic Resources<br/> Information Security 8th International Conference, ISC 2005, Singapore, September 20-23, 2005. Proceedings ent://SD_ILS/0/SD_ILS:510302 2024-06-06T21:08:26Z 2024-06-06T21:08:26Z by&#160;Zhou, Jianying. editor.<br/><a href="http://dx.doi.org/10.1007/11556992">http://dx.doi.org/10.1007/11556992</a><br/>Format:&#160;Electronic Resources<br/>