Search Results for - Narrowed by: Engineering. - Computer security. SirsiDynix Enterprise https://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dSUBJECT$002509Subject$002509Engineering.$002509Engineering.$0026qf$003dSUBJECT$002509Subject$002509Computer$002bsecurity.$002509Computer$002bsecurity.$0026ps$003d300? 2024-05-23T13:00:07Z Advanced Computing and Systems for Security Volume Six ent://SD_ILS/0/SD_ILS:2086369 2024-05-23T13:00:07Z 2024-05-23T13:00:07Z by&#160;Chaki, Rituparna. editor.<br/><a href="https://doi.org/10.1007/978-981-10-8183-5">https://doi.org/10.1007/978-981-10-8183-5</a><br/>Format:&#160;Electronic Resources<br/> Computational Intelligence, Cyber Security and Computational Models. Models and Techniques for Intelligent Systems and Automation Third International Conference, ICC3 2017, Coimbatore, India, December 14-16, 2017, Proceedings ent://SD_ILS/0/SD_ILS:2084067 2024-05-23T13:00:07Z 2024-05-23T13:00:07Z by&#160;Ganapathi, Geetha. editor.<br/><a href="https://doi.org/10.1007/978-981-13-0716-4">https://doi.org/10.1007/978-981-13-0716-4</a><br/>Format:&#160;Electronic Resources<br/> Advances in Human Factors in Cybersecurity Proceedings of the AHFE 2017 International Conference on Human Factors in Cybersecurity, July 17&minus;21, 2017, The Westin Bonaventure Hotel, Los Angeles, California, USA ent://SD_ILS/0/SD_ILS:2086285 2024-05-23T13:00:07Z 2024-05-23T13:00:07Z by&#160;Nicholson, Denise. editor.<br/><a href="https://doi.org/10.1007/978-3-319-60585-2">https://doi.org/10.1007/978-3-319-60585-2</a><br/>Format:&#160;Electronic Resources<br/> IT Convergence and Security 2017 Volume 1 ent://SD_ILS/0/SD_ILS:2087596 2024-05-23T13:00:07Z 2024-05-23T13:00:07Z by&#160;Kim, Kuinam J. editor.<br/><a href="https://doi.org/10.1007/978-981-10-6451-7">https://doi.org/10.1007/978-981-10-6451-7</a><br/>Format:&#160;Electronic Resources<br/> Advanced Computing and Systems for Security Volume Five ent://SD_ILS/0/SD_ILS:2087030 2024-05-23T13:00:07Z 2024-05-23T13:00:07Z by&#160;Chaki, Rituparna. editor.<br/><a href="https://doi.org/10.1007/978-981-10-8180-4">https://doi.org/10.1007/978-981-10-8180-4</a><br/>Format:&#160;Electronic Resources<br/> IT Convergence and Security 2017 Volume 2 ent://SD_ILS/0/SD_ILS:2087931 2024-05-23T13:00:07Z 2024-05-23T13:00:07Z by&#160;Kim, Kuinam J. editor.<br/><a href="https://doi.org/10.1007/978-981-10-6454-8">https://doi.org/10.1007/978-981-10-6454-8</a><br/>Format:&#160;Electronic Resources<br/> Sustainable Interdependent Networks From Theory to Application ent://SD_ILS/0/SD_ILS:2088167 2024-05-23T13:00:07Z 2024-05-23T13:00:07Z by&#160;Amini, M. Hadi. editor.<br/><a href="https://doi.org/10.1007/978-3-319-74412-4">https://doi.org/10.1007/978-3-319-74412-4</a><br/>Format:&#160;Electronic Resources<br/> Women in Security Changing the Face of Technology and Innovation ent://SD_ILS/0/SD_ILS:2088052 2024-05-23T13:00:07Z 2024-05-23T13:00:07Z by&#160;Christofferson, Debra A. editor.<br/><a href="https://doi.org/10.1007/978-3-319-57795-1">https://doi.org/10.1007/978-3-319-57795-1</a><br/>Format:&#160;Electronic Resources<br/> Recent Trends in Computer Applications Best Studies from the 2017 International Conference on Computer and Applications, Dubai, UAE ent://SD_ILS/0/SD_ILS:2084233 2024-05-23T13:00:07Z 2024-05-23T13:00:07Z by&#160;Alja&rsquo;am, Jihad Mohamad. editor.<br/><a href="https://doi.org/10.1007/978-3-319-89914-5">https://doi.org/10.1007/978-3-319-89914-5</a><br/>Format:&#160;Electronic Resources<br/> Computational Intelligence, Cyber Security and Computational Models Proceedings of ICC3 2015 ent://SD_ILS/0/SD_ILS:2086471 2024-05-23T13:00:07Z 2024-05-23T13:00:07Z by&#160;Senthilkumar, Muthukrishnan. editor.<br/><a href="https://doi.org/10.1007/978-981-10-0251-9">https://doi.org/10.1007/978-981-10-0251-9</a><br/>Format:&#160;Electronic Resources<br/> Advances in Parallel and Distributed Computing and Ubiquitous Services UCAWSN &amp; PDCAT 2015 ent://SD_ILS/0/SD_ILS:2084949 2024-05-23T13:00:07Z 2024-05-23T13:00:07Z by&#160;Park, James J. (Jong Hyuk). editor.<br/><a href="https://doi.org/10.1007/978-981-10-0068-3">https://doi.org/10.1007/978-981-10-0068-3</a><br/>Format:&#160;Electronic Resources<br/> Advanced Computing and Systems for Security Volume 1 ent://SD_ILS/0/SD_ILS:2087443 2024-05-23T13:00:07Z 2024-05-23T13:00:07Z by&#160;Chaki, Rituparna. editor.<br/><a href="https://doi.org/10.1007/978-81-322-2650-5">https://doi.org/10.1007/978-81-322-2650-5</a><br/>Format:&#160;Electronic Resources<br/> Recent Advances in Systems Safety and Security ent://SD_ILS/0/SD_ILS:2087705 2024-05-23T13:00:07Z 2024-05-23T13:00:07Z by&#160;Pricop, Emil. editor.<br/><a href="https://doi.org/10.1007/978-3-319-32525-5">https://doi.org/10.1007/978-3-319-32525-5</a><br/>Format:&#160;Electronic Resources<br/> Advanced Computing and Systems for Security Volume 2 ent://SD_ILS/0/SD_ILS:2088358 2024-05-23T13:00:07Z 2024-05-23T13:00:07Z by&#160;Chaki, Rituparna. editor.<br/><a href="https://doi.org/10.1007/978-81-322-2653-6">https://doi.org/10.1007/978-81-322-2653-6</a><br/>Format:&#160;Electronic Resources<br/> Trends and Applications in Software Engineering Proceedings of the 4th International Conference on Software Process Improvement CIMPS'2015 ent://SD_ILS/0/SD_ILS:2084647 2024-05-23T13:00:07Z 2024-05-23T13:00:07Z by&#160;Mejia, Jezreel. editor.<br/><a href="https://doi.org/10.1007/978-3-319-26285-7">https://doi.org/10.1007/978-3-319-26285-7</a><br/>Format:&#160;Electronic Resources<br/> Advances in Human Factors in Cybersecurity Proceedings of the AHFE 2016 International Conference on Human Factors in Cybersecurity, July 27-31, 2016, Walt Disney World&reg;, Florida, USA ent://SD_ILS/0/SD_ILS:2087245 2024-05-23T13:00:07Z 2024-05-23T13:00:07Z by&#160;Nicholson, Denise. editor.<br/><a href="https://doi.org/10.1007/978-3-319-41932-9">https://doi.org/10.1007/978-3-319-41932-9</a><br/>Format:&#160;Electronic Resources<br/> Information Science and Applications (ICISA) 2016 ent://SD_ILS/0/SD_ILS:2087608 2024-05-23T13:00:07Z 2024-05-23T13:00:07Z by&#160;Kim, Kuinam J. editor.<br/><a href="https://doi.org/10.1007/978-981-10-0557-2">https://doi.org/10.1007/978-981-10-0557-2</a><br/>Format:&#160;Electronic Resources<br/> Adaptive Security Management Architecture ent://SD_ILS/0/SD_ILS:2326064 2024-05-23T13:00:07Z 2024-05-23T13:00:07Z by&#160;Tiller, James S.<br/><a href="https://learning.oreilly.com/library/view/~/9781420013375">https://learning.oreilly.com/library/view/~/9781420013375</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781420013375/?ar">https://go.oreilly.com/library-access/library/view/-/9781420013375/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781420013375/?ar">https://learning.oreilly.com/library/view/~/9781420013375/?ar</a><br/>Format:&#160;Electronic Resources<br/>