Search Results for - Narrowed by: Computer security. - Security Science and Technology.SirsiDynix Enterprisehttps://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dSUBJECT$002509Subject$002509Computer$002bsecurity.$002509Computer$002bsecurity.$0026qf$003dSUBJECT$002509Subject$002509Security$002bScience$002band$002bTechnology.$002509Security$002bScience$002band$002bTechnology.$0026ps$003d300?2024-06-15T14:00:31ZWomen in Security Changing the Face of Technology and Innovationent://SD_ILS/0/SD_ILS:20880522024-06-15T14:00:31Z2024-06-15T14:00:31Zby Christofferson, Debra A. editor.<br/><a href="https://doi.org/10.1007/978-3-319-57795-1">https://doi.org/10.1007/978-3-319-57795-1</a><br/>Format: Electronic Resources<br/>Practical Information Security A Competency-Based Education Courseent://SD_ILS/0/SD_ILS:20878142024-06-15T14:00:31Z2024-06-15T14:00:31Zby Alsmadi, Izzat. author.<br/><a href="https://doi.org/10.1007/978-3-319-72119-4">https://doi.org/10.1007/978-3-319-72119-4</a><br/>Format: Electronic Resources<br/>Integration, Interconnection, and Interoperability of IoT Systemsent://SD_ILS/0/SD_ILS:20874212024-06-15T14:00:31Z2024-06-15T14:00:31Zby Gravina, Raffaele. editor.<br/><a href="https://doi.org/10.1007/978-3-319-61300-0">https://doi.org/10.1007/978-3-319-61300-0</a><br/>Format: Electronic Resources<br/>Open Source Intelligence Investigation From Strategy to Implementationent://SD_ILS/0/SD_ILS:20842942024-06-15T14:00:31Z2024-06-15T14:00:31Zby Akhgar, Babak. editor.<br/><a href="https://doi.org/10.1007/978-3-319-47671-1">https://doi.org/10.1007/978-3-319-47671-1</a><br/>Format: Electronic Resources<br/>VoIP and PBX Security and Forensics A Practical Approachent://SD_ILS/0/SD_ILS:20863812024-06-15T14:00:31Z2024-06-15T14:00:31Zby Androulidakis, Iosif I. author.<br/><a href="https://doi.org/10.1007/978-3-319-29721-7">https://doi.org/10.1007/978-3-319-29721-7</a><br/>Format: Electronic Resources<br/>Mobile Phone Security and Forensics A Practical Approachent://SD_ILS/0/SD_ILS:20865152024-06-15T14:00:31Z2024-06-15T14:00:31Zby Androulidakis, Iosif I. author.<br/><a href="https://doi.org/10.1007/978-3-319-29742-2">https://doi.org/10.1007/978-3-319-29742-2</a><br/>Format: Electronic Resources<br/>Ten Laws for Securityent://SD_ILS/0/SD_ILS:20845272024-06-15T14:00:31Z2024-06-15T14:00:31Zby Diehl, Eric. author.<br/><a href="https://doi.org/10.1007/978-3-319-42641-9">https://doi.org/10.1007/978-3-319-42641-9</a><br/>Format: Electronic Resources<br/>Watermarking Securityent://SD_ILS/0/SD_ILS:20870952024-06-15T14:00:31Z2024-06-15T14:00:31Zby Bas, Patrick. author.<br/><a href="https://doi.org/10.1007/978-981-10-0506-0">https://doi.org/10.1007/978-981-10-0506-0</a><br/>Format: Electronic Resources<br/>Industrial Espionage and Technical Surveillance Counter Measurersent://SD_ILS/0/SD_ILS:20877332024-06-15T14:00:31Z2024-06-15T14:00:31Zby Androulidakis, Iosif. author.<br/><a href="https://doi.org/10.1007/978-3-319-28666-2">https://doi.org/10.1007/978-3-319-28666-2</a><br/>Format: Electronic Resources<br/>