Search Results for - Narrowed by: Data Structures, Cryptology and Information Theory. - Information systems. SirsiDynix Enterprise https://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dSUBJECT$002509Subject$002509Data$002bStructures$00252C$002bCryptology$002band$002bInformation$002bTheory.$002509Data$002bStructures$00252C$002bCryptology$002band$002bInformation$002bTheory.$0026qf$003dSUBJECT$002509Subject$002509Information$002bsystems.$002509Information$002bsystems.$0026ps$003d300$0026isd$003dtrue? 2024-09-27T03:25:37Z Advances in Ad Hoc Networking Proceedings of the Seventh Annual Mediterranean Ad Hoc Networking Workshop, Palma de Mallorca, Spain, June 25&ndash;27, 2008 ent://SD_ILS/0/SD_ILS:501523 2024-09-27T03:25:37Z 2024-09-27T03:25:37Z by&#160;Cuenca, Pedro. editor.<br/><a href="http://dx.doi.org/10.1007/978-0-387-09490-8">http://dx.doi.org/10.1007/978-0-387-09490-8</a><br/>Format:&#160;Electronic Resources<br/> Insider Attack and Cyber Security Beyond the Hacker ent://SD_ILS/0/SD_ILS:501913 2024-09-27T03:25:37Z 2024-09-27T03:25:37Z by&#160;Stolfo, Salvatore J. editor.<br/><a href="http://dx.doi.org/10.1007/978-0-387-77322-3">http://dx.doi.org/10.1007/978-0-387-77322-3</a><br/>Format:&#160;Electronic Resources<br/> Vulnerability Analysis and Defense for the Internet ent://SD_ILS/0/SD_ILS:501787 2024-09-27T03:25:37Z 2024-09-27T03:25:37Z by&#160;Singh, Abhishek. editor.<br/><a href="http://dx.doi.org/10.1007/978-0-387-74390-5">http://dx.doi.org/10.1007/978-0-387-74390-5</a><br/>Format:&#160;Electronic Resources<br/> Botnet Detection Countering the Largest Security Threat ent://SD_ILS/0/SD_ILS:501627 2024-09-27T03:25:37Z 2024-09-27T03:25:37Z by&#160;Lee, Wenke. editor.<br/><a href="http://dx.doi.org/10.1007/978-0-387-68768-1">http://dx.doi.org/10.1007/978-0-387-68768-1</a><br/>Format:&#160;Electronic Resources<br/> Intrusion Detection Systems ent://SD_ILS/0/SD_ILS:501910 2024-09-27T03:25:37Z 2024-09-27T03:25:37Z by&#160;Mancini, Luigi V. editor.<br/><a href="http://dx.doi.org/10.1007/978-0-387-77265-3">http://dx.doi.org/10.1007/978-0-387-77265-3</a><br/>Format:&#160;Electronic Resources<br/> Privacy-Respecting Intrusion Detection ent://SD_ILS/0/SD_ILS:505789 2024-09-27T03:25:37Z 2024-09-27T03:25:37Z by&#160;Flegel, Ulrich. author.<br/><a href="http://dx.doi.org/10.1007/978-0-387-68254-9">http://dx.doi.org/10.1007/978-0-387-68254-9</a><br/>Format:&#160;Electronic Resources<br/> Online Business Security Systems ent://SD_ILS/0/SD_ILS:505832 2024-09-27T03:25:37Z 2024-09-27T03:25:37Z by&#160;Williams, Godfried B. author.<br/><a href="http://dx.doi.org/10.1007/978-0-387-68850-3">http://dx.doi.org/10.1007/978-0-387-68850-3</a><br/>Format:&#160;Electronic Resources<br/> Secure Data Management in Decentralized Systems ent://SD_ILS/0/SD_ILS:504690 2024-09-27T03:25:37Z 2024-09-27T03:25:37Z by&#160;Yu, Ting. editor.<br/><a href="http://dx.doi.org/10.1007/978-0-387-27696-0">http://dx.doi.org/10.1007/978-0-387-27696-0</a><br/>Format:&#160;Electronic Resources<br/> Security, Privacy, and Trust in Modern Data Management ent://SD_ILS/0/SD_ILS:512193 2024-09-27T03:25:37Z 2024-09-27T03:25:37Z by&#160;Petković, Milan. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-69861-6">http://dx.doi.org/10.1007/978-3-540-69861-6</a><br/>Format:&#160;Electronic Resources<br/> Exploratory Data Analysis Using Fisher Information ent://SD_ILS/0/SD_ILS:508679 2024-09-27T03:25:37Z 2024-09-27T03:25:37Z by&#160;Frieden, B. Roy. editor.<br/><a href="http://dx.doi.org/10.1007/978-1-84628-777-0">http://dx.doi.org/10.1007/978-1-84628-777-0</a><br/>Format:&#160;Electronic Resources<br/> Synchronizing Internet Protocol Security (SIPSec) ent://SD_ILS/0/SD_ILS:505814 2024-09-27T03:25:37Z 2024-09-27T03:25:37Z by&#160;Shoniregun, Charles A. author.<br/><a href="http://dx.doi.org/10.1007/978-0-387-68569-4">http://dx.doi.org/10.1007/978-0-387-68569-4</a><br/>Format:&#160;Electronic Resources<br/> Network Security Policies and Procedures ent://SD_ILS/0/SD_ILS:505659 2024-09-27T03:25:37Z 2024-09-27T03:25:37Z by&#160;Frye, Douglas W. author.<br/><a href="http://dx.doi.org/10.1007/978-0-387-47955-2">http://dx.doi.org/10.1007/978-0-387-47955-2</a><br/>Format:&#160;Electronic Resources<br/> Electronic Postage Systems Technology, Security, Economics ent://SD_ILS/0/SD_ILS:505571 2024-09-27T03:25:37Z 2024-09-27T03:25:37Z by&#160;Bleumer, Gerrit. author.<br/><a href="http://dx.doi.org/10.1007/978-0-387-44606-6">http://dx.doi.org/10.1007/978-0-387-44606-6</a><br/>Format:&#160;Electronic Resources<br/> Practical Internet Security ent://SD_ILS/0/SD_ILS:504952 2024-09-27T03:25:37Z 2024-09-27T03:25:37Z by&#160;Vacca, John R. author.<br/><a href="http://dx.doi.org/10.1007/978-0-387-29844-3">http://dx.doi.org/10.1007/978-0-387-29844-3</a><br/>Format:&#160;Electronic Resources<br/> Preserving Privacy in On-Line Analytical Processing (OLAP) ent://SD_ILS/0/SD_ILS:505611 2024-09-27T03:25:37Z 2024-09-27T03:25:37Z by&#160;Wang, Lingyu. author.<br/><a href="http://dx.doi.org/10.1007/978-0-387-46274-5">http://dx.doi.org/10.1007/978-0-387-46274-5</a><br/>Format:&#160;Electronic Resources<br/> Access Control Systems Security, Identity Management and Trust Models ent://SD_ILS/0/SD_ILS:504692 2024-09-27T03:25:37Z 2024-09-27T03:25:37Z by&#160;Benantar, Messaoud. author.<br/><a href="http://dx.doi.org/10.1007/0-387-27716-1">http://dx.doi.org/10.1007/0-387-27716-1</a><br/>Format:&#160;Electronic Resources<br/> Intelligence and Security Informatics for International Security Information Sharing and Data Mining ent://SD_ILS/0/SD_ILS:504985 2024-09-27T03:25:37Z 2024-09-27T03:25:37Z by&#160;Chen, Hsinchun. author.<br/><a href="http://dx.doi.org/10.1007/0-387-30332-4">http://dx.doi.org/10.1007/0-387-30332-4</a><br/>Format:&#160;Electronic Resources<br/> Data Science and Classification ent://SD_ILS/0/SD_ILS:511118 2024-09-27T03:25:37Z 2024-09-27T03:25:37Z by&#160;Batagelj, Vladimir. editor.<br/><a href="http://dx.doi.org/10.1007/3-540-34416-0">http://dx.doi.org/10.1007/3-540-34416-0</a><br/>Format:&#160;Electronic Resources<br/> Parallel and Distributed Computing: Applications and Technologies 5th International Conference, PDCAT 2004, Singapore, December 8-10, 2004. Proceedings ent://SD_ILS/0/SD_ILS:509720 2024-09-27T03:25:37Z 2024-09-27T03:25:37Z by&#160;Liew, Kim-Meow. editor.<br/><a href="http://dx.doi.org/10.1007/b103538">http://dx.doi.org/10.1007/b103538</a><br/>Format:&#160;Electronic Resources<br/> Net-Centric Approaches to Intelligence and National Security ent://SD_ILS/0/SD_ILS:504499 2024-09-27T03:25:37Z 2024-09-27T03:25:37Z by&#160;Ladner, Roy. editor.<br/><a href="http://dx.doi.org/10.1007/b137009">http://dx.doi.org/10.1007/b137009</a><br/>Format:&#160;Electronic Resources<br/> Coding for Data and Computer Communications ent://SD_ILS/0/SD_ILS:504226 2024-09-27T03:25:37Z 2024-09-27T03:25:37Z by&#160;Salomon, David. author.<br/><a href="http://dx.doi.org/10.1007/b102531">http://dx.doi.org/10.1007/b102531</a><br/>Format:&#160;Electronic Resources<br/> Formal Aspects in Security and Trust IFIP TC1 WG1.7 Workshop on Formal Aspects in Security and Trust (FAST), World Computer Congress, August 22&ndash;27, 2004, Toulouse, France ent://SD_ILS/0/SD_ILS:504264 2024-09-27T03:25:37Z 2024-09-27T03:25:37Z by&#160;Dimitrakos, Theo. editor.<br/><a href="http://dx.doi.org/10.1007/b104303">http://dx.doi.org/10.1007/b104303</a><br/>Format:&#160;Electronic Resources<br/> Privacy, Security and Trust within the Context of Pervasive Computing ent://SD_ILS/0/SD_ILS:504171 2024-09-27T03:25:37Z 2024-09-27T03:25:37Z by&#160;Robinson, Philip. editor.<br/><a href="http://dx.doi.org/10.1007/b101573">http://dx.doi.org/10.1007/b101573</a><br/>Format:&#160;Electronic Resources<br/> Security in E-Learning ent://SD_ILS/0/SD_ILS:504480 2024-09-27T03:25:37Z 2024-09-27T03:25:37Z by&#160;Weippl, Edgar. author.<br/><a href="http://dx.doi.org/10.1007/b136702">http://dx.doi.org/10.1007/b136702</a><br/>Format:&#160;Electronic Resources<br/> Impacts and Risk Assessment of Technology for Internet Security Enabled Information Small-Medium Enterprises (TEISMES) ent://SD_ILS/0/SD_ILS:504524 2024-09-27T03:25:37Z 2024-09-27T03:25:37Z by&#160;Shoniregun, Charles A. author.<br/><a href="http://dx.doi.org/10.1007/b137376">http://dx.doi.org/10.1007/b137376</a><br/>Format:&#160;Electronic Resources<br/> Evolutionary Multiobjective Optimization Theoretical Advances and Applications ent://SD_ILS/0/SD_ILS:508392 2024-09-27T03:25:37Z 2024-09-27T03:25:37Z by&#160;Abraham, Ajith. editor.<br/><a href="http://dx.doi.org/10.1007/1-84628-137-7">http://dx.doi.org/10.1007/1-84628-137-7</a><br/>Format:&#160;Electronic Resources<br/> Intelligent Knowledge-Based Systems Business and Technology in the New Millennium ent://SD_ILS/0/SD_ILS:507682 2024-09-27T03:25:37Z 2024-09-27T03:25:37Z by&#160;Leondes, Cornelius T. editor.<br/><a href="http://dx.doi.org/10.1007/978-1-4020-7829-3">http://dx.doi.org/10.1007/978-1-4020-7829-3</a><br/>Format:&#160;Electronic Resources<br/> Intrusion Detection and Correlation Challenges and Solutions ent://SD_ILS/0/SD_ILS:504165 2024-09-27T03:25:37Z 2024-09-27T03:25:37Z by&#160;Kruegel, Christopher. author.<br/><a href="http://dx.doi.org/10.1007/b101493">http://dx.doi.org/10.1007/b101493</a><br/>Format:&#160;Electronic Resources<br/> Enterprise Information Systems V ent://SD_ILS/0/SD_ILS:506262 2024-09-27T03:25:37Z 2024-09-27T03:25:37Z by&#160;Camp, Olivier. editor.<br/><a href="http://dx.doi.org/10.1007/1-4020-2673-0">http://dx.doi.org/10.1007/1-4020-2673-0</a><br/>Format:&#160;Electronic Resources<br/> Cyberspace Security and Defense: Research Issues Proceedings of the NATO Advanced Research Workshop on Cyberspace Security and Defense: Research Issues Gdansk, Poland 6&ndash;9 September 2004 ent://SD_ILS/0/SD_ILS:506450 2024-09-27T03:25:37Z 2024-09-27T03:25:37Z by&#160;Kowalik, Janusz S. editor.<br/><a href="http://dx.doi.org/10.1007/1-4020-3381-8">http://dx.doi.org/10.1007/1-4020-3381-8</a><br/>Format:&#160;Electronic Resources<br/> The Austin Protocol Compiler ent://SD_ILS/0/SD_ILS:504121 2024-09-27T03:25:37Z 2024-09-27T03:25:37Z by&#160;McGuire, Tommy M. author.<br/><a href="http://dx.doi.org/10.1007/b101038">http://dx.doi.org/10.1007/b101038</a><br/>Format:&#160;Electronic Resources<br/> Security and Privacy in the Age of Ubiquitous Computing IFIP TC11 20th International Information Security Conference May 30 &ndash; June 1, 2005, Chiba, Japan ent://SD_ILS/0/SD_ILS:504425 2024-09-27T03:25:37Z 2024-09-27T03:25:37Z by&#160;Sasaki, Ryoichi. editor.<br/><a href="http://dx.doi.org/10.1007/b135818">http://dx.doi.org/10.1007/b135818</a><br/>Format:&#160;Electronic Resources<br/> Advanced Techniques in Knowledge Discovery and Data Mining ent://SD_ILS/0/SD_ILS:508427 2024-09-27T03:25:37Z 2024-09-27T03:25:37Z by&#160;Pal, Nikhil R. editor.<br/><a href="http://dx.doi.org/10.1007/1-84628-183-0">http://dx.doi.org/10.1007/1-84628-183-0</a><br/>Format:&#160;Electronic Resources<br/>