Search Results for - Narrowed by: Computer security. - Security Science and Technology. SirsiDynix Enterprise https://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dSUBJECT$002509Subject$002509Computer$002bsecurity.$002509Computer$002bsecurity.$0026qf$003dSUBJECT$002509Subject$002509Security$002bScience$002band$002bTechnology.$002509Security$002bScience$002band$002bTechnology.$0026ps$003d300? 2024-06-15T14:00:31Z Women in Security Changing the Face of Technology and Innovation ent://SD_ILS/0/SD_ILS:2088052 2024-06-15T14:00:31Z 2024-06-15T14:00:31Z by&#160;Christofferson, Debra A. editor.<br/><a href="https://doi.org/10.1007/978-3-319-57795-1">https://doi.org/10.1007/978-3-319-57795-1</a><br/>Format:&#160;Electronic Resources<br/> Practical Information Security A Competency-Based Education Course ent://SD_ILS/0/SD_ILS:2087814 2024-06-15T14:00:31Z 2024-06-15T14:00:31Z by&#160;Alsmadi, Izzat. author.<br/><a href="https://doi.org/10.1007/978-3-319-72119-4">https://doi.org/10.1007/978-3-319-72119-4</a><br/>Format:&#160;Electronic Resources<br/> Integration, Interconnection, and Interoperability of IoT Systems ent://SD_ILS/0/SD_ILS:2087421 2024-06-15T14:00:31Z 2024-06-15T14:00:31Z by&#160;Gravina, Raffaele. editor.<br/><a href="https://doi.org/10.1007/978-3-319-61300-0">https://doi.org/10.1007/978-3-319-61300-0</a><br/>Format:&#160;Electronic Resources<br/> Open Source Intelligence Investigation From Strategy to Implementation ent://SD_ILS/0/SD_ILS:2084294 2024-06-15T14:00:31Z 2024-06-15T14:00:31Z by&#160;Akhgar, Babak. editor.<br/><a href="https://doi.org/10.1007/978-3-319-47671-1">https://doi.org/10.1007/978-3-319-47671-1</a><br/>Format:&#160;Electronic Resources<br/> VoIP and PBX Security and Forensics A Practical Approach ent://SD_ILS/0/SD_ILS:2086381 2024-06-15T14:00:31Z 2024-06-15T14:00:31Z by&#160;Androulidakis, Iosif I. author.<br/><a href="https://doi.org/10.1007/978-3-319-29721-7">https://doi.org/10.1007/978-3-319-29721-7</a><br/>Format:&#160;Electronic Resources<br/> Mobile Phone Security and Forensics A Practical Approach ent://SD_ILS/0/SD_ILS:2086515 2024-06-15T14:00:31Z 2024-06-15T14:00:31Z by&#160;Androulidakis, Iosif I. author.<br/><a href="https://doi.org/10.1007/978-3-319-29742-2">https://doi.org/10.1007/978-3-319-29742-2</a><br/>Format:&#160;Electronic Resources<br/> Ten Laws for Security ent://SD_ILS/0/SD_ILS:2084527 2024-06-15T14:00:31Z 2024-06-15T14:00:31Z by&#160;Diehl, Eric. author.<br/><a href="https://doi.org/10.1007/978-3-319-42641-9">https://doi.org/10.1007/978-3-319-42641-9</a><br/>Format:&#160;Electronic Resources<br/> Watermarking Security ent://SD_ILS/0/SD_ILS:2087095 2024-06-15T14:00:31Z 2024-06-15T14:00:31Z by&#160;Bas, Patrick. author.<br/><a href="https://doi.org/10.1007/978-981-10-0506-0">https://doi.org/10.1007/978-981-10-0506-0</a><br/>Format:&#160;Electronic Resources<br/> Industrial Espionage and Technical Surveillance Counter Measurers ent://SD_ILS/0/SD_ILS:2087733 2024-06-15T14:00:31Z 2024-06-15T14:00:31Z by&#160;Androulidakis, Iosif. author.<br/><a href="https://doi.org/10.1007/978-3-319-28666-2">https://doi.org/10.1007/978-3-319-28666-2</a><br/>Format:&#160;Electronic Resources<br/>