Search Results for Data and Information Security.SirsiDynix Enterprisehttps://bilge.isikun.edu.tr/client/tr_TR/default/default/qu$003dData$002band$002bInformation$002bSecurity.$0026ps$003d300?dt=list2024-09-20T01:28:11ZIntelligence and Security Informatics for International Security Information Sharing and Data Miningent://SD_ILS/0/SD_ILS:18792592024-09-20T01:28:11Z2024-09-20T01:28:11ZYazar Chen, Hsinchun. author. SpringerLink (Online service)<br/>Yer Numarası TK5105.5 -5105.9<br/>Elektronik Erişim <a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/0-387-30332-4">Full Text Available From Springer Nature Computer Science 2006 Packages</a><br/>Format: Electronic Resources<br/>Emerging Technologies in Data Mining and Information Security Proceedings of IEMIS 2018, Volume 3ent://SD_ILS/0/SD_ILS:18526772024-09-20T01:28:11Z2024-09-20T01:28:11ZYazar Abraham, Ajith. editor. Dutta, Paramartha. editor. Mandal, Jyotsna Kumar. editor. Bhattacharya, Abhishek. editor. Dutta, Soumi. editor. (orcid)0000-0002-1052-7055<br/>Yer Numarası Q342<br/>Elektronik Erişim <a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-981-13-1501-5">Full Text Available From Springer Nature Intelligent Technologies and Robotics 2019 Packages</a><br/>Format: Electronic Resources<br/>Emerging Technologies in Data Mining and Information Security Proceedings of IEMIS 2018, Volume 1ent://SD_ILS/0/SD_ILS:18528872024-09-20T01:28:11Z2024-09-20T01:28:11ZYazar Abraham, Ajith. editor. Dutta, Paramartha. editor. Mandal, Jyotsna Kumar. editor. Bhattacharya, Abhishek. editor. Dutta, Soumi. editor. (orcid)0000-0002-1052-7055<br/>Yer Numarası Q342<br/>Elektronik Erişim <a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-981-13-1951-8">Full Text Available From Springer Nature Intelligent Technologies and Robotics 2019 Packages</a><br/>Format: Electronic Resources<br/>Emerging Technologies in Data Mining and Information Security Proceedings of IEMIS 2018, Volume 2ent://SD_ILS/0/SD_ILS:18529912024-09-20T01:28:11Z2024-09-20T01:28:11ZYazar Abraham, Ajith. editor. Dutta, Paramartha. editor. Mandal, Jyotsna Kumar. editor. Bhattacharya, Abhishek. editor. Dutta, Soumi. editor. (orcid)0000-0002-1052-7055<br/>Yer Numarası Q342<br/>Elektronik Erişim <a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-981-13-1498-8">Full Text Available From Springer Nature Intelligent Technologies and Robotics 2019 Packages</a><br/>Format: Electronic Resources<br/>Emerging Technologies in Data Mining and Information Security Proceedings of IEMIS 2020, Volume 1ent://SD_ILS/0/SD_ILS:18542792024-09-20T01:28:11Z2024-09-20T01:28:11ZYazar Hassanien, Aboul Ella. editor. Bhattacharyya, Siddhartha. editor. Chakrabati, Satyajit. editor. Bhattacharya, Abhishek. editor. Dutta, Soumi. editor. (orcid)0000-0002-1052-7055<br/>Yer Numarası Q342<br/>Elektronik Erişim <a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-981-15-9927-9">Full Text Available From Springer Nature Intelligent Technologies and Robotics 2021 Packages</a><br/>Format: Electronic Resources<br/>Emerging Technologies in Data Mining and Information Security Proceedings of IEMIS 2020, Volume 2ent://SD_ILS/0/SD_ILS:18543322024-09-20T01:28:11Z2024-09-20T01:28:11ZYazar Hassanien, Aboul Ella. editor. Bhattacharyya, Siddhartha. editor. Chakrabati, Satyajit. editor. Bhattacharya, Abhishek. editor. Dutta, Soumi. editor. (orcid)0000-0002-1052-7055<br/>Yer Numarası Q342<br/>Elektronik Erişim <a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-981-33-4367-2">Full Text Available From Springer Nature Intelligent Technologies and Robotics 2021 Packages</a><br/>Format: Electronic Resources<br/>Emerging Technologies in Data Mining and Information Security Proceedings of IEMIS 2020, Volume 3ent://SD_ILS/0/SD_ILS:18537792024-09-20T01:28:11Z2024-09-20T01:28:11ZYazar Tavares, João Manuel R. S. editor. Chakrabarti, Satyajit. editor. Bhattacharya, Abhishek. editor. Ghatak, Sujata. editor. SpringerLink (Online service)<br/>Yer Numarası Q342<br/>Elektronik Erişim <a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-981-15-9774-9">Full Text Available From Springer Nature Intelligent Technologies and Robotics 2021 Packages</a><br/>Format: Electronic Resources<br/>Healthcare Information Privacy and Security Regulatory Compliance and Data Security in the Age of Electronic Health Recordsent://SD_ILS/0/SD_ILS:18772372024-09-20T01:28:11Z2024-09-20T01:28:11ZYazar Robichau, Bernard Peter. author. SpringerLink (Online service)<br/>Yer Numarası QA76.9 .A25<br/>Elektronik Erişim <a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-1-4302-6677-8">Full Text Available From Springer Nature Professional and Applied Computing 2014 Packages</a><br/>Format: Electronic Resources<br/>Information Sharing and Data Protection in the Area of Freedom, Security and Justice Towards Harmonised Data Protection Principles for Information Exchange at EU-levelent://SD_ILS/0/SD_ILS:18486602024-09-20T01:28:11Z2024-09-20T01:28:11ZYazar Boehm, Franziska. author. SpringerLink (Online service)<br/>Yer Numarası KJE901 -9796<br/>Elektronik Erişim <a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-642-22392-1">Full Text Available From Springer Nature Humanities, Social Sciences and Law 2012 Packages</a><br/>Format: Electronic Resources<br/>Availability, Reliability, and Security in Information Systems IFIP WG 8.4, 8.9, TC 5 International Cross-Domain Conference, CD-ARES 2016, and Workshop on Privacy Aware Machine Learning for Health Data Science, PAML 2016, Salzburg, Austria, August 31 - September 2, 2016, Proceedingsent://SD_ILS/0/SD_ILS:18447432024-09-20T01:28:11Z2024-09-20T01:28:11ZYazar Buccafurri, Francesco. editor. Holzinger, Andreas. editor. (orcid)0000-0002-6786-5194 Kieseberg, Peter. editor. Tjoa, A Min. editor. (orcid)0000-0002-8295-9252 Weippl, Edgar. editor.<br/>Yer Numarası QA76.76 .A65<br/>Elektronik Erişim <a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-319-45507-5">Full Text Available From Springer Nature Computer Science 2016 Packages</a><br/>Format: Electronic Resources<br/>Data And Computer Security A Dictionary Of Terms And Conceptsent://SD_ILS/0/SD_ILS:19223032024-09-20T01:28:11Z2024-09-20T01:28:11ZYazar Longley, Dennis. author. Shain, Michael. author. SpringerLink (Online service)<br/>Yer Numarası QA76.9 .A25<br/>Elektronik Erişim <a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-1-349-11170-1">Full Text Available From Springer Nature Computer Science Archive Packages</a><br/>Format: Electronic Resources<br/>The 'Orange Book' Seriesent://SD_ILS/0/SD_ILS:19223052024-09-20T01:28:11Z2024-09-20T01:28:11ZYazar Defense, US Department of. author. SpringerLink (Online service)<br/>Yer Numarası QA76.9 .A25<br/>Elektronik Erişim <a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-1-349-12020-8">Full Text Available From Springer Nature Computer Science Archive Packages</a><br/>Format: Electronic Resources<br/>Certified Ethical Hacker (CEH) Foundation Guideent://SD_ILS/0/SD_ILS:18775422024-09-20T01:28:11Z2024-09-20T01:28:11ZYazar Rahalkar, Sagar Ajay. author. SpringerLink (Online service)<br/>Yer Numarası QA76.9 .A25<br/>Elektronik Erişim <a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-1-4842-2325-3">Full Text Available From Springer Nature Professional and Applied Computing 2016 Packages</a><br/>Format: Electronic Resources<br/>NTP Security A Quick-Start Guideent://SD_ILS/0/SD_ILS:18776042024-09-20T01:28:11Z2024-09-20T01:28:11ZYazar Liska, Allan. author. SpringerLink (Online service)<br/>Yer Numarası QA76.9 .A25<br/>Elektronik Erişim <a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-1-4842-2412-0">Full Text Available From Springer Nature Professional and Applied Computing 2016 Packages</a><br/>Format: Electronic Resources<br/>Professional Red Teaming Conducting Successful Cybersecurity Engagementsent://SD_ILS/0/SD_ILS:18783242024-09-20T01:28:11Z2024-09-20T01:28:11ZYazar Oakley, Jacob G. author. SpringerLink (Online service)<br/>Yer Numarası QA76.9 .A25<br/>Elektronik Erişim <a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-1-4842-4309-1">Full Text Available From Springer Nature Professional and Applied Computing 2019 Packages</a><br/>Format: Electronic Resources<br/>ISSE 2014 Securing Electronic Business Processes Highlights of the Information Security Solutions Europe 2014 Conferenceent://SD_ILS/0/SD_ILS:18820592024-09-20T01:28:11Z2024-09-20T01:28:11ZYazar Reimer, Helmut. editor. Pohlmann, Norbert. editor. Schneider, Wolfgang. editor. SpringerLink (Online service)<br/>Yer Numarası QA76.9 .A25<br/>Elektronik Erişim <a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-658-06708-3">Full Text Available From Springer Nature Computer Science 2014 Packages</a><br/>Format: Electronic Resources<br/>CompTIA Security+ Certification Study Guide Network Security Essentialsent://SD_ILS/0/SD_ILS:18786542024-09-20T01:28:11Z2024-09-20T01:28:11ZYazar Sheikh, Ahmed F. author. SpringerLink (Online service)<br/>Yer Numarası QA76.9 .A25<br/>Elektronik Erişim <a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-1-4842-6234-4">Full Text Available From Springer Nature Professional and Applied Computing 2020 Packages</a><br/>Format: Electronic Resources<br/>Trustworthy Computing and Services International Conference, ISCTCS 2013, Beijing, China, November 2013, Revised Selected Papersent://SD_ILS/0/SD_ILS:18820412024-09-20T01:28:11Z2024-09-20T01:28:11ZYazar Yuan, Yuyu. editor. Wu, Xu. editor. Lu, Yueming. editor. SpringerLink (Online service)<br/>Yer Numarası QA76.9 .A25<br/>Elektronik Erişim <a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-662-43908-1">Full Text Available From Springer Nature Computer Science 2014 Packages</a><br/>Format: Electronic Resources<br/>Big Breaches Cybersecurity Lessons for Everyoneent://SD_ILS/0/SD_ILS:18787772024-09-20T01:28:11Z2024-09-20T01:28:11ZYazar Daswani, Neil. author. Elbayadi, Moudy. author. SpringerLink (Online service)<br/>Yer Numarası QA76.9 .A25<br/>Elektronik Erişim <a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-1-4842-6655-7">Full Text Available From Springer Nature Professional and Applied Computing 2021 Packages</a><br/>Format: Electronic Resources<br/>Authentication and Access Control Practical Cryptography Methods and Toolsent://SD_ILS/0/SD_ILS:18788542024-09-20T01:28:11Z2024-09-20T01:28:11ZYazar Boonkrong, Sirapat. author. SpringerLink (Online service)<br/>Yer Numarası QA76.9 .A25<br/>Elektronik Erişim <a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-1-4842-6570-3">Full Text Available From Springer Nature Professional and Applied Computing 2021 Packages</a><br/>Format: Electronic Resources<br/>70 Tips and Tricks for Mastering the CISSP Exament://SD_ILS/0/SD_ILS:18785702024-09-20T01:28:11Z2024-09-20T01:28:11ZYazar Danturthi, R. Sarma. author. SpringerLink (Online service)<br/>Yer Numarası QA76.9 .A25<br/>Elektronik Erişim <a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-1-4842-6225-2">Full Text Available From Springer Nature Professional and Applied Computing 2020 Packages</a><br/>Format: Electronic Resources<br/>Digital Privacy and Security Using Windows A Practical Guideent://SD_ILS/0/SD_ILS:18777442024-09-20T01:28:11Z2024-09-20T01:28:11ZYazar Hassan, Nihad. author. Hijazi, Rami. author. SpringerLink (Online service)<br/>Yer Numarası QA76.9 .A25<br/>Elektronik Erişim <a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-1-4842-2799-2">Full Text Available From Springer Nature Professional and Applied Computing 2017 Packages</a><br/>Format: Electronic Resources<br/>Digital Forensics Basics A Practical Guide Using Windows OSent://SD_ILS/0/SD_ILS:18782332024-09-20T01:28:11Z2024-09-20T01:28:11ZYazar Hassan, Nihad A. author. SpringerLink (Online service)<br/>Yer Numarası QA76.9 .A25<br/>Elektronik Erişim <a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-1-4842-3838-7">Full Text Available From Springer Nature Professional and Applied Computing 2019 Packages</a><br/>Format: Electronic Resources<br/>Choose Your InfoSec Path An Interactive Cybersecurity Adventure for Beginnersent://SD_ILS/0/SD_ILS:18789792024-09-20T01:28:11Z2024-09-20T01:28:11ZYazar Roxon, Alexander J. author. SpringerLink (Online service)<br/>Yer Numarası QA76.9 .A25<br/>Elektronik Erişim <a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-1-4842-7036-3">Full Text Available From Springer Nature Professional and Applied Computing 2021 Packages</a><br/>Format: Electronic Resources<br/>ISSE 2015 Highlights of the Information Security Solutions Europe 2015 Conferenceent://SD_ILS/0/SD_ILS:18826172024-09-20T01:28:11Z2024-09-20T01:28:11ZYazar Reimer, Helmut. editor. Pohlmann, Norbert. editor. Schneider, Wolfgang. editor. SpringerLink (Online service)<br/>Yer Numarası QA76.9 .A25<br/>Elektronik Erişim <a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-658-10934-9">Full Text Available From Springer Nature Computer Science 2015 Packages</a><br/>Format: Electronic Resources<br/>Protective Security Creating Military-Grade Defenses for Your Digital Businessent://SD_ILS/0/SD_ILS:18789062024-09-20T01:28:11Z2024-09-20T01:28:11ZYazar Seaman, Jim. author. SpringerLink (Online service)<br/>Yer Numarası QA76.9 .A25<br/>Elektronik Erişim <a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-1-4842-6908-4">Full Text Available From Springer Nature Professional and Applied Computing 2021 Packages</a><br/>Format: Electronic Resources<br/>Cybersecurity Incident Response How to Contain, Eradicate, and Recover from Incidentsent://SD_ILS/0/SD_ILS:18779872024-09-20T01:28:11Z2024-09-20T01:28:11ZYazar Thompson, Eric C. author. SpringerLink (Online service)<br/>Yer Numarası QA76.9 .A25<br/>Elektronik Erişim <a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-1-4842-3870-7">Full Text Available From Springer Nature Professional and Applied Computing 2018 Packages</a><br/>Format: Electronic Resources<br/>Waging Cyber War Technical Challenges and Operational Constraintsent://SD_ILS/0/SD_ILS:18783652024-09-20T01:28:11Z2024-09-20T01:28:11ZYazar Oakley, Jacob G. author. SpringerLink (Online service)<br/>Yer Numarası QA76.9 .A25<br/>Elektronik Erişim <a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-1-4842-4950-5">Full Text Available From Springer Nature Professional and Applied Computing 2019 Packages</a><br/>Format: Electronic Resources<br/>Science of Cyber Security Third International Conference, SciSec 2021, Virtual Event, August 13-15, 2021, Revised Selected Papersent://SD_ILS/0/SD_ILS:18868002024-09-20T01:28:11Z2024-09-20T01:28:11ZYazar Lu, Wenlian. editor. Sun, Kun. editor. Yung, Moti. editor. Liu, Feng. editor. (orcid)0000-0002-4811-7828 SpringerLink (Online service)<br/>Yer Numarası QA76.9 .A25<br/>Elektronik Erişim <a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-030-89137-4">Full Text Available From Springer Nature Computer Science 2021 Packages</a><br/>Format: Electronic Resources<br/>Building Secure Firmware Armoring the Foundation of the Platforment://SD_ILS/0/SD_ILS:18786662024-09-20T01:28:11Z2024-09-20T01:28:11ZYazar Yao, Jiewen. author. Zimmer, Vincent. author. SpringerLink (Online service)<br/>Yer Numarası QA76.9 .A25<br/>Elektronik Erişim <a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-1-4842-6106-4">Full Text Available From Springer Nature Professional and Applied Computing 2020 Packages</a><br/>Format: Electronic Resources<br/>Jump-start Your SOC Analyst Career A Roadmap to Cybersecurity Successent://SD_ILS/0/SD_ILS:18787852024-09-20T01:28:11Z2024-09-20T01:28:11ZYazar Wall, Tyler. author. Rodrick, Jarrett. author. SpringerLink (Online service)<br/>Yer Numarası QA76.9 .A25<br/>Elektronik Erişim <a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-1-4842-6904-6">Full Text Available From Springer Nature Professional and Applied Computing 2021 Packages</a><br/>Format: Electronic Resources<br/>Information Security and Cryptology 16th International Conference, Inscrypt 2020, Guangzhou, China, December 11-14, 2020, Revised Selected Papersent://SD_ILS/0/SD_ILS:18861852024-09-20T01:28:11Z2024-09-20T01:28:11ZYazar Wu, Yongdong. editor. (orcid)0000-0002-0850-724X Yung, Moti. editor. SpringerLink (Online service)<br/>Yer Numarası QA76.9 .A25<br/>Elektronik Erişim <a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-030-71852-7">Full Text Available From Springer Nature Computer Science 2021 Packages</a><br/>Format: Electronic Resources<br/>Cyber Operations Building, Defending, and Attacking Modern Computer Networksent://SD_ILS/0/SD_ILS:18783232024-09-20T01:28:11Z2024-09-20T01:28:11ZYazar O'Leary, Mike. author. SpringerLink (Online service)<br/>Yer Numarası QA76.9 .A25<br/>Elektronik Erişim <a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-1-4842-4294-0">Full Text Available From Springer Nature Professional and Applied Computing 2019 Packages</a><br/>Format: Electronic Resources<br/>Information Security and Cryptology 17th International Conference, Inscrypt 2021, Virtual Event, August 12-14, 2021, Revised Selected Papersent://SD_ILS/0/SD_ILS:18868232024-09-20T01:28:11Z2024-09-20T01:28:11ZYazar Yu, Yu. editor. (orcid)0000-0002-9278-4521 Yung, Moti. editor. (orcid)0000-0003-0848-0873 SpringerLink (Online service)<br/>Yer Numarası QA76.9 .A25<br/>Elektronik Erişim <a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-030-88323-2">Full Text Available From Springer Nature Computer Science 2021 Packages</a><br/>Format: Electronic Resources<br/>Certified Ethical Hacker (CEH) Preparation Guide Lesson-Based Review of Ethical Hacking and Penetration Testingent://SD_ILS/0/SD_ILS:18788282024-09-20T01:28:11Z2024-09-20T01:28:11ZYazar Sheikh, Ahmed. author. SpringerLink (Online service)<br/>Yer Numarası QA76.9 .A25<br/>Elektronik Erişim <a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-1-4842-7258-9">Full Text Available From Springer Nature Professional and Applied Computing 2021 Packages</a><br/>Format: Electronic Resources<br/>Rational Cybersecurity for Business The Security Leaders' Guide to Business Alignmentent://SD_ILS/0/SD_ILS:18785432024-09-20T01:28:11Z2024-09-20T01:28:11ZYazar Blum, Dan. author. SpringerLink (Online service)<br/>Yer Numarası QA76.9 .A25<br/>Elektronik Erişim <a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-1-4842-5952-8">Full Text Available From Springer Nature Professional and Applied Computing 2020 Packages</a><br/>Format: Electronic Resources<br/>Achieving and Sustaining Secured Business Operations An Executive's Guide to Planning and Managementent://SD_ILS/0/SD_ILS:18778042024-09-20T01:28:11Z2024-09-20T01:28:11ZYazar Ajmani, Neelesh. author. Kumar, Dinesh. author. SpringerLink (Online service)<br/>Yer Numarası QA76.9 .A25<br/>Elektronik Erişim <a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-1-4842-3099-2">Full Text Available From Springer Nature Professional and Applied Computing 2017 Packages</a><br/>Format: Electronic Resources<br/>ISSE 2008 Securing Electronic Business Processes Highlights of the Information Security Solutions Europe 2008 Conferenceent://SD_ILS/0/SD_ILS:18800132024-09-20T01:28:11Z2024-09-20T01:28:11ZYazar Pohlmann, Norbert. editor. Reimer, Helmut. editor. Schneider, Wolfgang. editor. SpringerLink (Online service)<br/>Yer Numarası QA76.9 .A25<br/>Elektronik Erişim <a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-8348-9283-6">Full Text Available From Springer Nature Computer Science 2009 Packages</a><br/>Format: Electronic Resources<br/>Cyber Security 15th International Annual Conference, CNCERT 2018, Beijing, China, August 14-16, 2018, Revised Selected Papersent://SD_ILS/0/SD_ILS:18850722024-09-20T01:28:11Z2024-09-20T01:28:11ZYazar Yun, Xiaochun. editor. Wen, Weiping. editor. Lang, Bo. editor. Yan, Hanbing. editor. Ding, Li. editor.<br/>Yer Numarası QA76.9 .A25<br/>Elektronik Erişim <a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-981-13-6621-5">Full Text Available From Springer Nature Computer Science 2019 Packages</a><br/>Format: Electronic Resources<br/>Cyber Threat Intelligence The No-Nonsense Guide for CISOs and Security Managersent://SD_ILS/0/SD_ILS:18789372024-09-20T01:28:11Z2024-09-20T01:28:11ZYazar Roberts, Aaron. author. SpringerLink (Online service)<br/>Yer Numarası QA76.9 .A25<br/>Elektronik Erişim <a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-1-4842-7220-6">Full Text Available From Springer Nature Professional and Applied Computing 2021 Packages</a><br/>Format: Electronic Resources<br/>Ransomware Revealed A Beginner's Guide to Protecting and Recovering from Ransomware Attacksent://SD_ILS/0/SD_ILS:18784592024-09-20T01:28:11Z2024-09-20T01:28:11ZYazar Hassan, Nihad A. author. SpringerLink (Online service)<br/>Yer Numarası QA76.9 .A25<br/>Elektronik Erişim <a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-1-4842-4255-1">Full Text Available From Springer Nature Professional and Applied Computing 2019 Packages</a><br/>Format: Electronic Resources<br/>Asset Attack Vectors Building Effective Vulnerability Management Strategies to Protect Organizationsent://SD_ILS/0/SD_ILS:18781052024-09-20T01:28:11Z2024-09-20T01:28:11ZYazar Haber, Morey J. author. Hibbert, Brad. author. SpringerLink (Online service)<br/>Yer Numarası QA76.9 .A25<br/>Elektronik Erişim <a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-1-4842-3627-7">Full Text Available From Springer Nature Professional and Applied Computing 2018 Packages</a><br/>Format: Electronic Resources<br/>Privacy and Anonymity in Information Management Systems New Techniques for New Practical Problemsent://SD_ILS/0/SD_ILS:18804802024-09-20T01:28:11Z2024-09-20T01:28:11ZYazar Nin, Jordi. editor. Herranz, Javier. editor. SpringerLink (Online service)<br/>Yer Numarası QA76.9 .A25<br/>Elektronik Erişim <a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-1-84996-238-4">Full Text Available From Springer Nature Computer Science 2010 Packages</a><br/>Format: Electronic Resources<br/>Privileged Attack Vectors Building Effective Cyber-Defense Strategies to Protect Organizationsent://SD_ILS/0/SD_ILS:18786222024-09-20T01:28:11Z2024-09-20T01:28:11ZYazar Haber, Morey J. author. SpringerLink (Online service)<br/>Yer Numarası QA76.9 .A25<br/>Elektronik Erişim <a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-1-4842-5914-6">Full Text Available From Springer Nature Professional and Applied Computing 2020 Packages</a><br/>Format: Electronic Resources<br/>Identity Attack Vectors Implementing an Effective Identity and Access Management Solutionent://SD_ILS/0/SD_ILS:18784902024-09-20T01:28:11Z2024-09-20T01:28:11ZYazar Haber, Morey J. author. Rolls, Darran. author. SpringerLink (Online service)<br/>Yer Numarası QA76.9 .A25<br/>Elektronik Erişim <a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-1-4842-5165-2">Full Text Available From Springer Nature Professional and Applied Computing 2020 Packages</a><br/>Format: Electronic Resources<br/>Privileged Attack Vectors Building Effective Cyber-Defense Strategies to Protect Organizationsent://SD_ILS/0/SD_ILS:18780482024-09-20T01:28:11Z2024-09-20T01:28:11ZYazar Haber, Morey J. author. Hibbert, Brad. author. SpringerLink (Online service)<br/>Yer Numarası QA76.9 .A25<br/>Elektronik Erişim <a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-1-4842-3048-0">Full Text Available From Springer Nature Professional and Applied Computing 2018 Packages</a><br/>Format: Electronic Resources<br/>Information Security 23rd International Conference, ISC 2020, Bali, Indonesia, December 16-18, 2020, Proceedingsent://SD_ILS/0/SD_ILS:18463582024-09-20T01:28:11Z2024-09-20T01:28:11ZYazar Susilo, Willy. editor. (orcid)0000-0002-1562-5105 Deng, Robert H. editor. (orcid)0000-0003-3491-8146 Guo, Fuchun. editor. (orcid)0000-0001-6939-7710 Li, Yannan. editor. (orcid)0000-0002-4407-9027 Intan, Rolly. editor.<br/>Yer Numarası QA76.9 .A25<br/>Elektronik Erişim <a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-030-62974-8">Full Text Available From Springer Nature Computer Science 2020 Packages</a><br/>Format: Electronic Resources<br/>The Practice of Enterprise Modeling 12th IFIP Working Conference, PoEM 2019, Luxembourg, Luxembourg, November 27-29, 2019, Proceedingsent://SD_ILS/0/SD_ILS:18845422024-09-20T01:28:11Z2024-09-20T01:28:11ZYazar Gordijn, Jaap. editor. (orcid)0000-0002-6401-3850 Guédria, Wided. editor. Proper, Henderik A. editor. (orcid)0000-0002-7318-2496 SpringerLink (Online service)<br/>Yer Numarası QA76.9 .A25<br/>Elektronik Erişim <a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-030-35151-9">Full Text Available From Springer Nature Computer Science 2019 Packages</a><br/>Format: Electronic Resources<br/>Security Infrastructure Technology for Integrated Utilization of Big Data Applied to the Living Safety and Medical Fieldsent://SD_ILS/0/SD_ILS:18855032024-09-20T01:28:11Z2024-09-20T01:28:11ZYazar Miyaji, Atsuko. editor. Mimoto, Tomoaki. editor. SpringerLink (Online service)<br/>Yer Numarası QA76.9 .A25<br/>Elektronik Erişim <a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-981-15-3654-0">Full Text Available From Springer Nature Computer Science 2020 Packages</a><br/>Format: Electronic Resources<br/>Designing a HIPAA-Compliant Security Operations Center A Guide to Detecting and Responding to Healthcare Breaches and Eventsent://SD_ILS/0/SD_ILS:18785102024-09-20T01:28:11Z2024-09-20T01:28:11ZYazar Thompson, Eric C. author. SpringerLink (Online service)<br/>Yer Numarası QA76.9 .A25<br/>Elektronik Erişim <a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-1-4842-5608-4">Full Text Available From Springer Nature Professional and Applied Computing 2020 Packages</a><br/>Format: Electronic Resources<br/>Open Source Intelligence Methods and Tools A Practical Guide to Online Intelligenceent://SD_ILS/0/SD_ILS:18781912024-09-20T01:28:11Z2024-09-20T01:28:11ZYazar Hassan, Nihad A. author. Hijazi, Rami. author. SpringerLink (Online service)<br/>Yer Numarası QA76.9 .A25<br/>Elektronik Erişim <a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-1-4842-3213-2">Full Text Available From Springer Nature Professional and Applied Computing 2018 Packages</a><br/>Format: Electronic Resources<br/>Solving Identity Management in Modern Applications Demystifying OAuth 2.0, OpenID Connect, and SAML 2.0ent://SD_ILS/0/SD_ILS:18783992024-09-20T01:28:11Z2024-09-20T01:28:11ZYazar Wilson, Yvonne. author. Hingnikar, Abhishek. author. SpringerLink (Online service)<br/>Yer Numarası QA76.9 .A25<br/>Elektronik Erişim <a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-1-4842-5095-2">Full Text Available From Springer Nature Professional and Applied Computing 2019 Packages</a><br/>Format: Electronic Resources<br/>Firewalls Don't Stop Dragons A Step-by-Step Guide to Computer Security for Non-Techiesent://SD_ILS/0/SD_ILS:18781232024-09-20T01:28:11Z2024-09-20T01:28:11ZYazar Parker, Carey. author. SpringerLink (Online service)<br/>Yer Numarası QA76.9 .A25<br/>Elektronik Erişim <a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-1-4842-3852-3">Full Text Available From Springer Nature Professional and Applied Computing 2018 Packages</a><br/>Format: Electronic Resources<br/>International Conference on Security and Privacy in Communication Networks 10th International ICST Conference, SecureComm 2014, Beijing, China, September 24-26, 2014, Revised Selected Papers, Part Ient://SD_ILS/0/SD_ILS:18825442024-09-20T01:28:11Z2024-09-20T01:28:11ZYazar Tian, Jing. editor. Jing, Jiwu. editor. Srivatsa, Mudhakar. editor. SpringerLink (Online service)<br/>Yer Numarası QA76.9 .A25<br/>Elektronik Erişim <a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-319-23829-6">Full Text Available From Springer Nature Computer Science 2015 Packages</a><br/>Format: Electronic Resources<br/>International Conference on Security and Privacy in Communication Networks 10th International ICST Conference, SecureComm 2014, Beijing, China, September 24-26, 2014, Revised Selected Papers, Part IIent://SD_ILS/0/SD_ILS:18826082024-09-20T01:28:11Z2024-09-20T01:28:11ZYazar Tian, Jin. editor. Jing, Jiwu. editor. Srivatsa, Mudhakar. editor. SpringerLink (Online service)<br/>Yer Numarası QA76.9 .A25<br/>Elektronik Erişim <a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-319-23802-9">Full Text Available From Springer Nature Computer Science 2015 Packages</a><br/>Format: Electronic Resources<br/>Information Security Practice and Experience 16th International Conference, ISPEC 2021, Nanjing, China, December 17-19, 2021, Proceedingsent://SD_ILS/0/SD_ILS:18872572024-09-20T01:28:11Z2024-09-20T01:28:11ZYazar Deng, Robert. editor. (orcid)0000-0003-3491-8146 Bao, Feng. editor. Wang, Guilin. editor. Shen, Jian. editor. (orcid)0000-0003-0519-9058 Ryan, Mark. editor.<br/>Yer Numarası QA76.9 .A25<br/>Elektronik Erişim <a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-030-93206-0">Full Text Available From Springer Nature Computer Science 2021 Packages</a><br/>Format: Electronic Resources<br/>Firewalls Don't Stop Dragons A Step-by-Step Guide to Computer Security and Privacy for Non-Techiesent://SD_ILS/0/SD_ILS:18786522024-09-20T01:28:11Z2024-09-20T01:28:11ZYazar Parker, Carey. author. SpringerLink (Online service)<br/>Yer Numarası QA76.9 .A25<br/>Elektronik Erişim <a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-1-4842-6189-7">Full Text Available From Springer Nature Professional and Applied Computing 2020 Packages</a><br/>Format: Electronic Resources<br/>Building a HIPAA-Compliant Cybersecurity Program Using NIST 800-30 and CSF to Secure Protected Health Informationent://SD_ILS/0/SD_ILS:18777732024-09-20T01:28:11Z2024-09-20T01:28:11ZYazar Thompson, Eric C. author. SpringerLink (Online service)<br/>Yer Numarası QA76.9 .A25<br/>Elektronik Erişim <a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-1-4842-3060-2">Full Text Available From Springer Nature Professional and Applied Computing 2017 Packages</a><br/>Format: Electronic Resources<br/>Future of Trust in Computing Proceedings of the First International Conference Future of Trust in Computing 2008ent://SD_ILS/0/SD_ILS:18800862024-09-20T01:28:11Z2024-09-20T01:28:11ZYazar Grawrock, David. editor. Reimer, Helmut. editor. Sadeghi, Ahmad-Reza. editor. Vishik, Claire. editor. SpringerLink (Online service)<br/>Yer Numarası QA76.9 .A25<br/>Elektronik Erişim <a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-8348-9324-6">Full Text Available From Springer Nature Computer Science 2009 Packages</a><br/>Format: Electronic Resources<br/>Foundations and Practice of Security 13th International Symposium, FPS 2020, Montreal, QC, Canada, December 1-3, 2020, Revised Selected Papersent://SD_ILS/0/SD_ILS:18871792024-09-20T01:28:11Z2024-09-20T01:28:11ZYazar Nicolescu, Gabriela. editor. Tria, Assia. editor. Fernandez, José M. editor. (orcid)0000-0001-9836-3595 Marion, Jean-Yves. editor. Garcia-Alfaro, Joaquin. editor. (orcid)0000-0002-7453-4393<br/>Yer Numarası QA76.9 .A25<br/>Elektronik Erişim <a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-030-70881-8">Full Text Available From Springer Nature Computer Science 2021 Packages</a><br/>Format: Electronic Resources<br/>Cyberspace Safety and Security 12th International Symposium, CSS 2020, Haikou, China, December 1-3, 2020, Proceedingsent://SD_ILS/0/SD_ILS:18861342024-09-20T01:28:11Z2024-09-20T01:28:11ZYazar Cheng, Jieren. editor. Tang, Xiangyan. editor. Liu, Xiaozhang. editor. SpringerLink (Online service)<br/>Yer Numarası QA76.9 .A25<br/>Elektronik Erişim <a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-030-73671-2">Full Text Available From Springer Nature Computer Science 2021 Packages</a><br/>Format: Electronic Resources<br/>Data Privacy Management, Cryptocurrencies and Blockchain Technology ESORICS 2020 International Workshops, DPM 2020 and CBT 2020, Guildford, UK, September 17-18, 2020, Revised Selected Papersent://SD_ILS/0/SD_ILS:18465742024-09-20T01:28:11Z2024-09-20T01:28:11ZYazar Garcia-Alfaro, Joaquin. editor. (orcid)0000-0002-7453-4393 Navarro-Arribas, Guillermo. editor. (orcid)0000-0003-3535-942X Herrera-Joancomarti, Jordi. editor. (orcid)0000-0002-4935-4681 SpringerLink (Online service)<br/>Yer Numarası QA76.9 .A25<br/>Elektronik Erişim <a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-030-66172-4">Full Text Available From Springer Nature Computer Science 2020 Packages</a><br/>Format: Electronic Resources<br/>Information Security 24th International Conference, ISC 2021, Virtual Event, November 10-12, 2021, Proceedingsent://SD_ILS/0/SD_ILS:18869932024-09-20T01:28:11Z2024-09-20T01:28:11ZYazar Liu, Joseph K. editor. (orcid)0000-0001-6656-6240 Katsikas, Sokratis. editor. (orcid)0000-0003-2966-9683 Meng, Weizhi. editor. (orcid)0000-0003-4384-5786 Susilo, Willy. editor. (orcid)0000-0002-1562-5105 Intan, Rolly. editor.<br/>Yer Numarası QA76.9 .A25<br/>Elektronik Erişim <a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-030-91356-4">Full Text Available From Springer Nature Computer Science 2021 Packages</a><br/>Format: Electronic Resources<br/>Trust Management Proceedings of IFIPTM 2007: Joint iTrust and PST Conferences on Privacy, Trust Management and Security, July 30-August 2, 2007, New Brunswick, Canadaent://SD_ILS/0/SD_ILS:18795532024-09-20T01:28:11Z2024-09-20T01:28:11ZYazar Etalle, Sandro. editor. Marsh, Stephen. editor. SpringerLink (Online service)<br/>Yer Numarası QA76.9 .A25<br/>Elektronik Erişim <a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-0-387-73655-6">Full Text Available From Springer Nature Computer Science 2007 Packages</a><br/>Format: Electronic Resources<br/>Fifth World Conference on Information Security Education Proceedings of the IFIP TC 11 WG 11.8, WISE 5, 19 to 21 June 2007, United States Military Academy, West Point, NY, USAent://SD_ILS/0/SD_ILS:18795522024-09-20T01:28:11Z2024-09-20T01:28:11ZYazar Futcher, Lynn. editor. Dodge, Ronald. editor. SpringerLink (Online service)<br/>Yer Numarası QA76.9 .A25<br/>Elektronik Erişim <a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-0-387-73269-5">Full Text Available From Springer Nature Computer Science 2007 Packages</a><br/>Format: Electronic Resources<br/>Pancreatic Cytopathologyent://SD_ILS/0/SD_ILS:18551152024-09-20T01:28:11Z2024-09-20T01:28:11ZYazar Chhieng, David C. author. Stelow, Edward B. author. SpringerLink (Online service)<br/>Yer Numarası RB1 -214<br/>Elektronik Erişim <a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-0-387-68947-0">Full Text Available From Springer Nature Medicine 2007 Packages</a><br/>Format: Electronic Resources<br/>Securing SQL Server DBAs Defending the Databaseent://SD_ILS/0/SD_ILS:18775712024-09-20T01:28:11Z2024-09-20T01:28:11ZYazar Carter, Peter A. author. SpringerLink (Online service)<br/>Yer Numarası QA76.9 .D3<br/>Elektronik Erişim <a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-1-4842-2265-2">Full Text Available From Springer Nature Professional and Applied Computing 2016 Packages</a><br/>Format: Electronic Resources<br/>ISSE 2011 Securing Electronic Business Processes Highlights of the Information Security Solutions Europe 2011 Conferenceent://SD_ILS/0/SD_ILS:18807082024-09-20T01:28:11Z2024-09-20T01:28:11ZYazar Pohlmann, Norbert. editor. Reimer, Helmut. editor. Schneider, Wolfgang. editor. SpringerLink (Online service)<br/>Yer Numarası QA75.5 -76.95<br/>Elektronik Erişim <a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-8348-8652-1">Full Text Available From Springer Nature Computer Science 2011 Packages</a><br/>Format: Electronic Resources<br/>Computer Security for the Home and Small Officeent://SD_ILS/0/SD_ILS:19460832024-09-20T01:28:11Z2024-09-20T01:28:11ZYazar Greene, Thomas. author. SpringerLink (Online service)<br/>Yer Numarası QA76.9 .A25<br/>Elektronik Erişim <a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-1-4302-0711-5">Full Text Available From Springer Nature Professional and Applied Computing Archive Packages</a><br/>Format: Electronic Resources<br/>Black Hat Misfits, Criminals, and Scammers in the Internet Ageent://SD_ILS/0/SD_ILS:19458812024-09-20T01:28:11Z2024-09-20T01:28:11ZYazar Biggs, DUP John. author. SpringerLink (Online service)<br/>Yer Numarası QA76.9 .A25<br/>Elektronik Erişim <a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-1-4302-0692-7">Full Text Available From Springer Nature Professional and Applied Computing Archive Packages</a><br/>Format: Electronic Resources<br/>ISSE 2013 Securing Electronic Business Processes Highlights of the Information Security Solutions Europe 2013 Conferenceent://SD_ILS/0/SD_ILS:18816312024-09-20T01:28:11Z2024-09-20T01:28:11ZYazar Reimer, Helmut. editor. Pohlmann, Norbert. editor. Schneider, Wolfgang. editor. SpringerLink (Online service)<br/>Yer Numarası QA76.9 .A25<br/>Elektronik Erişim <a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-658-03371-2">Full Text Available From Springer Nature Computer Science 2013 Packages</a><br/>Format: Electronic Resources<br/>ISSE 2010 Securing Electronic Business Processes Highlights of the Information Security Solutions Europe 2010 Conferenceent://SD_ILS/0/SD_ILS:18183912024-09-20T01:28:11Z2024-09-20T01:28:11ZYazar Pohlmann, Norbert. editor. Reimer, Helmut. editor. Schneider, Wolfgang. editor. SpringerLink (Online service)<br/>Yer Numarası QA75.5 -76.95<br/>Elektronik Erişim <a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-8348-9788-6">Full Text Available From Springer Nature Engineering 2011 Packages</a><br/>Format: Electronic Resources<br/>Quick Start Guide to Penetration Testing With NMAP, OpenVAS and Metasploitent://SD_ILS/0/SD_ILS:18783012024-09-20T01:28:11Z2024-09-20T01:28:11ZYazar Rahalkar, Sagar. author. SpringerLink (Online service)<br/>Yer Numarası QA76.9 .A25<br/>Elektronik Erişim <a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-1-4842-4270-4">Full Text Available From Springer Nature Professional and Applied Computing 2019 Packages</a><br/>Format: Electronic Resources<br/>Oracle Incident Response and Forensics Preparing for and Responding to Data Breachesent://SD_ILS/0/SD_ILS:18779412024-09-20T01:28:11Z2024-09-20T01:28:11ZYazar Finnigan, Pete. author. SpringerLink (Online service)<br/>Yer Numarası QA76.9 .D3<br/>Elektronik Erişim <a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-1-4842-3264-4">Full Text Available From Springer Nature Professional and Applied Computing 2018 Packages</a><br/>Format: Electronic Resources<br/>Artificial Intelligence Tools for Cyber Attributionent://SD_ILS/0/SD_ILS:18840562024-09-20T01:28:11Z2024-09-20T01:28:11ZYazar Nunes, Eric. author. Shakarian, Paulo. author. Simari, Gerardo I. author. Ruef, Andrew. author. SpringerLink (Online service)<br/>Yer Numarası Q334 -342<br/>Elektronik Erişim <a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-319-73788-1">Full Text Available From Springer Nature Computer Science 2018 Packages</a><br/>Format: Electronic Resources<br/>Securing the Perimeter Deploying Identity and Access Management with Free Open Source Softwareent://SD_ILS/0/SD_ILS:18781382024-09-20T01:28:11Z2024-09-20T01:28:11ZYazar Schwartz, Michael. author. Machulak, Maciej. author. SpringerLink (Online service)<br/>Yer Numarası QA76.9 .A25<br/>Elektronik Erişim <a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-1-4842-2601-8">Full Text Available From Springer Nature Professional and Applied Computing 2018 Packages</a><br/>Format: Electronic Resources<br/>Zero Trust Security An Enterprise Guideent://SD_ILS/0/SD_ILS:18787812024-09-20T01:28:11Z2024-09-20T01:28:11ZYazar Garbis, Jason. author. Chapman, Jerry W. author. SpringerLink (Online service)<br/>Yer Numarası QA75.5 -76.95<br/>Elektronik Erişim <a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-1-4842-6702-8">Full Text Available From Springer Nature Professional and Applied Computing 2021 Packages</a><br/>Format: Electronic Resources<br/>Adversary-Aware Learning Techniques and Trends in Cybersecurityent://SD_ILS/0/SD_ILS:18865672024-09-20T01:28:11Z2024-09-20T01:28:11ZYazar Dasgupta, Prithviraj. editor. Collins, Joseph B. editor. Mittu, Ranjeev. editor. SpringerLink (Online service)<br/>Yer Numarası Q334 -342<br/>Elektronik Erişim <a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-030-55692-1">Full Text Available From Springer Nature Computer Science 2021 Packages</a><br/>Format: Electronic Resources<br/>Managing Risk and Information Security Protect to Enableent://SD_ILS/0/SD_ILS:18776592024-09-20T01:28:11Z2024-09-20T01:28:11ZYazar Harkins, Malcolm W. author. SpringerLink (Online service)<br/>Yer Numarası QA76.9 .A25<br/>Elektronik Erişim <a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-1-4842-1455-8">Full Text Available From Springer Nature Professional and Applied Computing 2016 Packages</a><br/>Format: Electronic Resources<br/>Intelligence Management Knowledge Driven Frameworks for Combating Terrorism and Organized Crimeent://SD_ILS/0/SD_ILS:18806732024-09-20T01:28:11Z2024-09-20T01:28:11ZYazar Akhgar, Babak. editor. Yates, Simeon. editor. SpringerLink (Online service)<br/>Yer Numarası Q334 -342<br/>Elektronik Erişim <a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-1-4471-2140-4">Full Text Available From Springer Nature Computer Science 2011 Packages</a><br/>Format: Electronic Resources<br/>Foundations of Security What Every Programmer Needs to Knowent://SD_ILS/0/SD_ILS:18760642024-09-20T01:28:11Z2024-09-20T01:28:11ZYazar Kern, Christoph. author. Kesavan, Anita. author. Daswani, Neil. author. SpringerLink (Online service)<br/>Yer Numarası QA76.9 .A25<br/>Elektronik Erişim <a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-1-4302-0377-3">Full Text Available From Springer Nature Professional and Applied Computing 2007 Packages</a><br/>Format: Electronic Resources<br/>Always Use Protection A Teen's Guide to Safe Computingent://SD_ILS/0/SD_ILS:19461422024-09-20T01:28:11Z2024-09-20T01:28:11ZYazar Appleman, Dan. author. SpringerLink (Online service)<br/>Yer Numarası QA76.9 .A25<br/>Elektronik Erişim <a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-1-4302-0904-1">Full Text Available From Springer Nature Professional and Applied Computing Archive Packages</a><br/>Format: Electronic Resources<br/>Biorthogonal Systems in Banach Spacesent://SD_ILS/0/SD_ILS:18882772024-09-20T01:28:11Z2024-09-20T01:28:11ZYazar Hajek, Petr. author. Montesinos Santalucia, Vicente. author. Vanderwerff, Jon. author. Zizler, Vaclav. author. SpringerLink (Online service)<br/>Yer Numarası QA319 -329.9<br/>Elektronik Erişim <a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-0-387-68915-9">Full Text Available From Springer Nature Mathematics and Statistics 2008 Packages</a><br/>Format: Electronic Resources<br/>System Administration Ethics Ten Commandments for Security and Compliance in a Modern Cyber Worldent://SD_ILS/0/SD_ILS:18783852024-09-20T01:28:11Z2024-09-20T01:28:11ZYazar Ljubuncic, Igor. author. Litterer, Tom. author. SpringerLink (Online service)<br/>Yer Numarası QA76.9 .A25<br/>Elektronik Erişim <a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-1-4842-4988-8">Full Text Available From Springer Nature Professional and Applied Computing 2019 Packages</a><br/>Format: Electronic Resources<br/>ISSE 2009 Securing Electronic Business Processes Highlights of the Information Security Solutions Europe 2009 Conferenceent://SD_ILS/0/SD_ILS:18804172024-09-20T01:28:11Z2024-09-20T01:28:11ZYazar Pohlmann, Norbert. editor. Reimer, Helmut. editor. Schneider, Wolfgang. editor. SpringerLink (Online service)<br/>Yer Numarası QA75.5 -76.95<br/>Elektronik Erişim <a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-8348-9363-5">Full Text Available From Springer Nature Computer Science 2010 Packages</a><br/>Format: Electronic Resources<br/>Aspect-Oriented Security Hardening of UML Design Modelsent://SD_ILS/0/SD_ILS:18827722024-09-20T01:28:11Z2024-09-20T01:28:11ZYazar Mouheb, Djedjiga. author. Debbabi, Mourad. author. Pourzandi, Makan. author. Wang, Lingyu. author. Nouh, Mariam. author.<br/>Yer Numarası QA76.758<br/>Elektronik Erişim <a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-319-16106-8">Full Text Available From Springer Nature Computer Science 2015 Packages</a><br/>Format: Electronic Resources<br/>Fundamentals of Sketch-Based Passwords A General Frameworkent://SD_ILS/0/SD_ILS:18820692024-09-20T01:28:11Z2024-09-20T01:28:11ZYazar Riggan, Benjamin S. author. Snyder, Wesley E. author. Wang, Cliff. author. SpringerLink (Online service)<br/>Yer Numarası TK7882 .B56<br/>Elektronik Erişim <a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-319-13629-5">Full Text Available From Springer Nature Computer Science 2014 Packages</a><br/>Format: Electronic Resources<br/>Engineering Secure Software and Systems 10th International Symposium, ESSoS 2018, Paris, France, June 26-27, 2018, Proceedingsent://SD_ILS/0/SD_ILS:18458422024-09-20T01:28:11Z2024-09-20T01:28:11ZYazar Payer, Mathias. editor. Rashid, Awais. editor. (orcid)0000-0002-0109-1341 Such, Jose M. editor. SpringerLink (Online service)<br/>Yer Numarası QA76.9 .A25<br/>Elektronik Erişim <a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-319-94496-8">Full Text Available From Springer Nature Computer Science 2018 Packages</a><br/>Format: Electronic Resources<br/>Personal Cybersecurity How to Avoid and Recover from Cybercrimeent://SD_ILS/0/SD_ILS:18778202024-09-20T01:28:11Z2024-09-20T01:28:11ZYazar Waschke, Marvin. author. SpringerLink (Online service)<br/>Yer Numarası QA76.9 .A25<br/>Elektronik Erişim <a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-1-4842-2430-4">Full Text Available From Springer Nature Professional and Applied Computing 2017 Packages</a><br/>Format: Electronic Resources<br/>AI in Cybersecurityent://SD_ILS/0/SD_ILS:18528722024-09-20T01:28:11Z2024-09-20T01:28:11ZYazar Sikos, Leslie F. editor. SpringerLink (Online service)<br/>Yer Numarası Q342<br/>Elektronik Erişim <a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-319-98842-9">Full Text Available From Springer Nature Intelligent Technologies and Robotics 2019 Packages</a><br/>Format: Electronic Resources<br/>Bio-inspiring Cyber Security and Cloud Services: Trends and Innovationsent://SD_ILS/0/SD_ILS:18073822024-09-20T01:28:11Z2024-09-20T01:28:11ZYazar Hassanien, Aboul Ella. editor. Kim, Tai-Hoon. editor. Kacprzyk, Janusz. editor. Awad, Ali Ismail. editor. SpringerLink (Online service)<br/>Yer Numarası Q342<br/>Elektronik Erişim <a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-662-43616-5">Full Text Available From Springer Nature Engineering 2014 Packages</a><br/>Format: Electronic Resources<br/>Security Engineering for Vehicular IT Systems Improving the Trustworthiness and Dependability of Automotive IT Applicationsent://SD_ILS/0/SD_ILS:18800762024-09-20T01:28:11Z2024-09-20T01:28:11ZYazar Wolf, Marko. author. SpringerLink (Online service)<br/>Yer Numarası QA76.9 .A25<br/>Elektronik Erişim <a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-8348-9581-3">Full Text Available From Springer Nature Computer Science 2009 Packages</a><br/>Format: Electronic Resources<br/>Reversible Steganography and Authentication via Transform Encodingent://SD_ILS/0/SD_ILS:18535002024-09-20T01:28:11Z2024-09-20T01:28:11ZYazar Mandal, Jyotsna Kumar. author. SpringerLink (Online service)<br/>Yer Numarası Q342<br/>Elektronik Erişim <a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-981-15-4397-5">Full Text Available From Springer Nature Intelligent Technologies and Robotics 2020 Packages</a><br/>Format: Electronic Resources<br/>Emerging Trends in Expert Applications and Security Proceedings of ICETEAS 2018ent://SD_ILS/0/SD_ILS:18528782024-09-20T01:28:11Z2024-09-20T01:28:11ZYazar Rathore, Vijay Singh. editor. Worring, Marcel. editor. (orcid)0000-0003-4097-4136 Mishra, Durgesh Kumar. editor. Joshi, Amit. editor. Maheshwari, Shikha. editor.<br/>Yer Numarası Q342<br/>Elektronik Erişim <a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-981-13-2285-3">Full Text Available From Springer Nature Intelligent Technologies and Robotics 2019 Packages</a><br/>Format: Electronic Resources<br/>Computational Intelligence in Digital Forensics: Forensic Investigation and Applicationsent://SD_ILS/0/SD_ILS:18074242024-09-20T01:28:11Z2024-09-20T01:28:11ZYazar Muda, Azah Kamilah. editor. Choo, Yun-Huoy. editor. Abraham, Ajith. editor. N. Srihari, Sargur. editor. SpringerLink (Online service)<br/>Yer Numarası Q342<br/>Elektronik Erişim <a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-319-05885-6">Full Text Available From Springer Nature Engineering 2014 Packages</a><br/>Format: Electronic Resources<br/>Security with Intelligent Computing and Big-data Servicesent://SD_ILS/0/SD_ILS:18113382024-09-20T01:28:11Z2024-09-20T01:28:11ZYazar Peng, Sheng-Lung. editor. Wang, Shiuh-Jeng. editor. Balas, Valentina Emilia. editor. (orcid)0000-0003-0885-1283 Zhao, Ming. editor. SpringerLink (Online service)<br/>Yer Numarası Q342<br/>Elektronik Erişim <a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-319-76451-1">Full Text Available From Springer Nature Engineering 2018 Packages</a><br/>Format: Electronic Resources<br/>ISSE 2006 Securing Electronic Business Processes Highlights of the Information Security Solutions Europe 2006 Conferenceent://SD_ILS/0/SD_ILS:18793802024-09-20T01:28:11Z2024-09-20T01:28:11ZYazar Paulus, Sachar. editor. Pohlmann, Norbert. editor. Reimer, Helmut. editor. SpringerLink (Online service)<br/>Yer Numarası QA76.9 .M3<br/>Elektronik Erişim <a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-8348-9195-2">Full Text Available From Springer Nature Computer Science 2006 Packages</a><br/>Format: Electronic Resources<br/>Machine Learning and Systems Engineeringent://SD_ILS/0/SD_ILS:18175942024-09-20T01:28:11Z2024-09-20T01:28:11ZYazar Ao, Sio-Iong. editor. Rieger, Burghard B. editor. Amouzegar, Mahyar. editor. SpringerLink (Online service)<br/>Yer Numarası Q342<br/>Elektronik Erişim <a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-90-481-9419-3">Full Text Available From Springer Nature Engineering 2010 Packages</a><br/>Format: Electronic Resources<br/>ISSE/SECURE 2007 Securing Electronic Business Processes Highlights of the Information Security Solutions Europe/SECURE 2007 Conferenceent://SD_ILS/0/SD_ILS:18795242024-09-20T01:28:11Z2024-09-20T01:28:11ZYazar Pohlmann, Norbert. editor. Reimer, Helmut. editor. Schneider, Wolfgang. editor. SpringerLink (Online service)<br/>Yer Numarası QA76.9 .M3<br/>Elektronik Erişim <a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-8348-9418-2">Full Text Available From Springer Nature Computer Science 2007 Packages</a><br/>Format: Electronic Resources<br/>PowerShell and Python Together Targeting Digital Investigationsent://SD_ILS/0/SD_ILS:18783342024-09-20T01:28:11Z2024-09-20T01:28:11ZYazar Hosmer, Chet. author. SpringerLink (Online service)<br/>Yer Numarası QA76.9 .A25<br/>Elektronik Erişim <a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-1-4842-4504-0">Full Text Available From Springer Nature Professional and Applied Computing 2019 Packages</a><br/>Format: Electronic Resources<br/>Pro Spring Security Securing Spring Framework 5 and Boot 2-based Java Applicationsent://SD_ILS/0/SD_ILS:18783952024-09-20T01:28:11Z2024-09-20T01:28:11ZYazar Scarioni, Carlo. author. Nardone, Massimo. author. SpringerLink (Online service)<br/>Yer Numarası QA76.73 .J38<br/>Elektronik Erişim <a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-1-4842-5052-5">Full Text Available From Springer Nature Professional and Applied Computing 2019 Packages</a><br/>Format: Electronic Resources<br/>Big Data Concepts, Theories, and Applicationsent://SD_ILS/0/SD_ILS:18829702024-09-20T01:28:11Z2024-09-20T01:28:11ZYazar Yu, Shui. editor. Guo, Song. editor. SpringerLink (Online service)<br/>Yer Numarası TK5105.5 -5105.9<br/>Elektronik Erişim <a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-319-27763-9">Full Text Available From Springer Nature Computer Science 2016 Packages</a><br/>Format: Electronic Resources<br/>Pro iOS Security and Forensics Enterprise iPhone and iPad Safetyent://SD_ILS/0/SD_ILS:18779572024-09-20T01:28:11Z2024-09-20T01:28:11ZYazar Butow, Eric. author. SpringerLink (Online service)<br/>Yer Numarası QA76.8 .M3<br/>Elektronik Erişim <a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-1-4842-3757-1">Full Text Available From Springer Nature Professional and Applied Computing 2018 Packages</a><br/>Format: Electronic Resources<br/>Information Security for Managersent://SD_ILS/0/SD_ILS:19280722024-09-20T01:28:11Z2024-09-20T01:28:11ZYazar Caelli, William. author. Longley, Denis. author. SpringerLink (Online service)<br/>Yer Numarası QA76.9 .A25<br/>Elektronik Erişim <a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-1-349-10137-5">Full Text Available From Springer Nature Computer Science Archive Packages</a><br/>Format: Electronic Resources<br/>Dynamic Games for Network Securityent://SD_ILS/0/SD_ILS:18114292024-09-20T01:28:11Z2024-09-20T01:28:11ZYazar He, Xiaofan. author. Dai, Huaiyu. author. SpringerLink (Online service)<br/>Yer Numarası TK5101 -5105.9<br/>Elektronik Erişim <a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-319-75871-8">Full Text Available From Springer Nature Engineering 2018 Packages</a><br/>Format: Electronic Resources<br/>Mobile Device Management Mobility Evaluation in Small and Medium-Sized Enterprisesent://SD_ILS/0/SD_ILS:18832362024-09-20T01:28:11Z2024-09-20T01:28:11ZYazar Pierer, Markus. author. SpringerLink (Online service)<br/>Yer Numarası TK5105.5 -5105.9<br/>Elektronik Erişim <a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-658-15046-4">Full Text Available From Springer Nature Computer Science 2016 Packages</a><br/>Format: Electronic Resources<br/>Wireless Networks and Security Issues, Challenges and Research Trendsent://SD_ILS/0/SD_ILS:18195402024-09-20T01:28:11Z2024-09-20T01:28:11ZYazar Khan, Shafiullah. editor. Khan Pathan, Al-Sakib. editor. SpringerLink (Online service)<br/>Yer Numarası TK5101 -5105.9<br/>Elektronik Erişim <a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-642-36169-2">Full Text Available From Springer Nature Engineering 2013 Packages</a><br/>Format: Electronic Resources<br/>Security and Privacy in New Computing Environments Second EAI International Conference, SPNCE 2019, Tianjin, China, April 13-14, 2019, Proceedingsent://SD_ILS/0/SD_ILS:18851902024-09-20T01:28:11Z2024-09-20T01:28:11ZYazar Li, Jin. editor. Liu, Zheli. editor. Peng, Hao. editor. SpringerLink (Online service)<br/>Yer Numarası QA76.9 .A25<br/>Elektronik Erişim <a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-030-21373-2">Full Text Available From Springer Nature Computer Science 2019 Packages</a><br/>Format: Electronic Resources<br/>Computer Networks and Distributed Systems International Symposium, CNDS 2013, Tehran, Iran, December 25-26, 2013, Revised Selected Papersent://SD_ILS/0/SD_ILS:18820782024-09-20T01:28:11Z2024-09-20T01:28:11ZYazar Jahangir, Amir Hossein. editor. Movaghar, Ali. editor. Asadi, Hossein. editor. SpringerLink (Online service)<br/>Yer Numarası TK5105.5 -5105.9<br/>Elektronik Erişim <a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-319-10903-9">Full Text Available From Springer Nature Computer Science 2014 Packages</a><br/>Format: Electronic Resources<br/>Deep Learning for Security and Privacy Preservation in IoTent://SD_ILS/0/SD_ILS:18871652024-09-20T01:28:11Z2024-09-20T01:28:11ZYazar Makkar, Aaisha. editor. Kumar, Neeraj. editor. SpringerLink (Online service)<br/>Yer Numarası QA76.9 .A25<br/>Elektronik Erişim <a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-981-16-6186-0">Full Text Available From Springer Nature Computer Science 2021 Packages</a><br/>Format: Electronic Resources<br/>The IoT Hacker's Handbook A Practical Guide to Hacking the Internet of Thingsent://SD_ILS/0/SD_ILS:18783332024-09-20T01:28:11Z2024-09-20T01:28:11ZYazar Gupta, Aditya. author. SpringerLink (Online service)<br/>Yer Numarası TK5105.5 -5105.9<br/>Elektronik Erişim <a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-1-4842-4300-8">Full Text Available From Springer Nature Professional and Applied Computing 2019 Packages</a><br/>Format: Electronic Resources<br/>Adversary Detection For Cognitive Radio Networksent://SD_ILS/0/SD_ILS:18115412024-09-20T01:28:11Z2024-09-20T01:28:11ZYazar He, Xiaofan. author. Dai, Huaiyu. author. SpringerLink (Online service)<br/>Yer Numarası TK5101 -5105.9<br/>Elektronik Erişim <a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-319-75868-8">Full Text Available From Springer Nature Engineering 2018 Packages</a><br/>Format: Electronic Resources<br/>Fundamentals of Network Forensics A Research Perspectiveent://SD_ILS/0/SD_ILS:18832602024-09-20T01:28:11Z2024-09-20T01:28:11ZYazar Joshi, R.C. author. Pilli, Emmanuel S. author. SpringerLink (Online service)<br/>Yer Numarası TK5105.5 -5105.9<br/>Elektronik Erişim <a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-1-4471-7299-4">Full Text Available From Springer Nature Computer Science 2016 Packages</a><br/>Format: Electronic Resources<br/>Karma-based API on Apple Platforms Building Privacy Into iOS and macOS Appsent://SD_ILS/0/SD_ILS:18782612024-09-20T01:28:11Z2024-09-20T01:28:11ZYazar Carrasco Molina, Manuel. author. SpringerLink (Online service)<br/>Yer Numarası QA76.8 .M3<br/>Elektronik Erişim <a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-1-4842-4291-9">Full Text Available From Springer Nature Professional and Applied Computing 2019 Packages</a><br/>Format: Electronic Resources<br/>Mathematics and Computing 4th International Conference, ICMC 2018, Varanasi, India, January 9-11, 2018, Revised Selected Papersent://SD_ILS/0/SD_ILS:18839642024-09-20T01:28:11Z2024-09-20T01:28:11ZYazar Ghosh, Debdas. editor. Giri, Debasis. editor. Mohapatra, Ram N. editor. Savas, Ekrem. editor. Sakurai, Kouichi. editor.<br/>Yer Numarası QA76.9 .M35<br/>Elektronik Erişim <a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-981-13-0023-3">Full Text Available From Springer Nature Computer Science 2018 Packages</a><br/>Format: Electronic Resources<br/>Practical Cryptography in Python Learning Correct Cryptography by Exampleent://SD_ILS/0/SD_ILS:18784492024-09-20T01:28:11Z2024-09-20T01:28:11ZYazar Nielson, Seth James. author. Monson, Christopher K. author. SpringerLink (Online service)<br/>Yer Numarası QA76.9 .A25<br/>Elektronik Erişim <a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-1-4842-4900-0">Full Text Available From Springer Nature Professional and Applied Computing 2019 Packages</a><br/>Format: Electronic Resources<br/>Future Network Systems and Security First International Conference, FNSS 2015, Paris, France, June 11-13, 2015, Proceedingsent://SD_ILS/0/SD_ILS:18826622024-09-20T01:28:11Z2024-09-20T01:28:11ZYazar Doss, Robin. editor. (orcid)0000-0001-6143-6850 Piramuthu, Selwyn. editor. ZHOU, Wei. editor. (orcid)0000-0002-9965-9870 SpringerLink (Online service)<br/>Yer Numarası TK5105.5 -5105.9<br/>Elektronik Erişim <a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-319-19210-9">Full Text Available From Springer Nature Computer Science 2015 Packages</a><br/>Format: Electronic Resources<br/>Location Privacy in Mobile Applicationsent://SD_ILS/0/SD_ILS:18842042024-09-20T01:28:11Z2024-09-20T01:28:11ZYazar Liu, Bo. author. Zhou, Wanlei. author. Zhu, Tianqing. author. Xiang, Yong. author. (orcid)0000-0001-5252-0831 Wang, Kun. author.<br/>Yer Numarası QA76.9 .A25<br/>Elektronik Erişim <a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-981-13-1705-7">Full Text Available From Springer Nature Computer Science 2018 Packages</a><br/>Format: Electronic Resources<br/>Practical Information Security Management A Complete Guide to Planning and Implementationent://SD_ILS/0/SD_ILS:18775252024-09-20T01:28:11Z2024-09-20T01:28:11ZYazar Campbell, Tony. author. SpringerLink (Online service)<br/>Yer Numarası QA76.9 .A25<br/>Elektronik Erişim <a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-1-4842-1685-9">Full Text Available From Springer Nature Professional and Applied Computing 2016 Packages</a><br/>Format: Electronic Resources<br/>Practical Security Properties on Commodity Computing Platforms The uber eXtensible Micro-Hypervisor Frameworkent://SD_ILS/0/SD_ILS:18854242024-09-20T01:28:11Z2024-09-20T01:28:11ZYazar Vasudevan, Amit. author. SpringerLink (Online service)<br/>Yer Numarası QA76.9 .A25<br/>Elektronik Erişim <a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-030-25049-2">Full Text Available From Springer Nature Computer Science 2019 Packages</a><br/>Format: Electronic Resources<br/>Smart Trends in Information Technology and Computer Communications Second International Conference, SmartCom 2017, Pune, India, August 18-19, 2017, Revised Selected Papersent://SD_ILS/0/SD_ILS:18841992024-09-20T01:28:11Z2024-09-20T01:28:11ZYazar Deshpande, A.V. editor. Unal, Aynur. editor. Passi, Kalpdrum. editor. Singh, Dharm. editor. Nayak, Malaya. editor.<br/>Yer Numarası TK5105.5 -5105.9<br/>Elektronik Erişim <a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-981-13-1423-0">Full Text Available From Springer Nature Computer Science 2018 Packages</a><br/>Format: Electronic Resources<br/>Cybersecurity for Hospitals and Healthcare Facilities A Guide to Detection and Preventionent://SD_ILS/0/SD_ILS:18777022024-09-20T01:28:11Z2024-09-20T01:28:11ZYazar Ayala, Luis. author. SpringerLink (Online service)<br/>Yer Numarası QA76.9 .A25<br/>Elektronik Erişim <a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-1-4842-2155-6">Full Text Available From Springer Nature Professional and Applied Computing 2016 Packages</a><br/>Format: Electronic Resources<br/>Versatile Cybersecurityent://SD_ILS/0/SD_ILS:18840272024-09-20T01:28:11Z2024-09-20T01:28:11ZYazar Conti, Mauro. editor. (orcid)0000-0002-3612-1934 Somani, Gaurav. editor. Poovendran, Radha. editor. (orcid)0000-0003-0269-8097 SpringerLink (Online service)<br/>Yer Numarası QA76.9 .A25<br/>Elektronik Erişim <a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-319-97643-3">Full Text Available From Springer Nature Computer Science 2018 Packages</a><br/>Format: Electronic Resources<br/>Red Hat and IT Security With Red Hat Ansible, Red Hat OpenShift, and Red Hat Security Auditingent://SD_ILS/0/SD_ILS:18787552024-09-20T01:28:11Z2024-09-20T01:28:11ZYazar Chatterjee, Rithik. author. SpringerLink (Online service)<br/>Yer Numarası QA76.9 .A25<br/>Elektronik Erişim <a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-1-4842-6434-8">Full Text Available From Springer Nature Professional and Applied Computing 2021 Packages</a><br/>Format: Electronic Resources<br/>Security in Computing and Communications 5th International Symposium, SSCC 2017, Manipal, India, September 13-16, 2017, Proceedingsent://SD_ILS/0/SD_ILS:18834362024-09-20T01:28:11Z2024-09-20T01:28:11ZYazar Thampi, Sabu M. editor. Martínez Pérez, Gregorio. editor. Westphall, Carlos Becker. editor. Hu, Jiankun. editor. Fan, Chun I. editor.<br/>Yer Numarası QA76.9 .A25<br/>Elektronik Erişim <a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-981-10-6898-0">Full Text Available From Springer Nature Computer Science 2017 Packages</a><br/>Format: Electronic Resources<br/>The Second Economy The Race for Trust, Treasure and Time in the Cybersecurity Warent://SD_ILS/0/SD_ILS:18774882024-09-20T01:28:11Z2024-09-20T01:28:11ZYazar Grobman, Steve. author. Cerra, Allison. author. SpringerLink (Online service)<br/>Yer Numarası TK5105.5 -5105.9<br/>Elektronik Erişim <a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-1-4842-2229-4">Full Text Available From Springer Nature Professional and Applied Computing 2016 Packages</a><br/>Format: Electronic Resources<br/>Continued Rise of the Cloud Advances and Trends in Cloud Computingent://SD_ILS/0/SD_ILS:18822072024-09-20T01:28:11Z2024-09-20T01:28:11ZYazar Mahmood, Zaigham. editor. SpringerLink (Online service)<br/>Yer Numarası TK5105.5 -5105.9<br/>Elektronik Erişim <a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-1-4471-6452-4">Full Text Available From Springer Nature Computer Science 2014 Packages</a><br/>Format: Electronic Resources<br/>Financial Cybersecurity Risk Management Leadership Perspectives and Guidance for Systems and Institutionsent://SD_ILS/0/SD_ILS:18784062024-09-20T01:28:11Z2024-09-20T01:28:11ZYazar Rohmeyer, Paul. author. Bayuk, Jennifer L. author. SpringerLink (Online service)<br/>Yer Numarası QA76.9 .A25<br/>Elektronik Erişim <a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-1-4842-4194-3">Full Text Available From Springer Nature Professional and Applied Computing 2019 Packages</a><br/>Format: Electronic Resources<br/>Beginning Ethical Hacking with Kali Linux Computational Techniques for Resolving Security Issuesent://SD_ILS/0/SD_ILS:18780302024-09-20T01:28:11Z2024-09-20T01:28:11ZYazar Sinha, Sanjib. author. SpringerLink (Online service)<br/>Yer Numarası QA76.9 .A25<br/>Elektronik Erişim <a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-1-4842-3891-2">Full Text Available From Springer Nature Professional and Applied Computing 2018 Packages</a><br/>Format: Electronic Resources<br/>Cybersecurity in the Electricity Sector Managing Critical Infrastructureent://SD_ILS/0/SD_ILS:18847022024-09-20T01:28:11Z2024-09-20T01:28:11ZYazar Leszczyna, Rafał. author. SpringerLink (Online service)<br/>Yer Numarası QA76.9 .A25<br/>Elektronik Erişim <a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-030-19538-0">Full Text Available From Springer Nature Computer Science 2019 Packages</a><br/>Format: Electronic Resources<br/>Serverless Security Understand, Assess, and Implement Secure and Reliable Applications in AWS, Microsoft Azure, and Google Cloudent://SD_ILS/0/SD_ILS:18787142024-09-20T01:28:11Z2024-09-20T01:28:11ZYazar Calles, Miguel A. author. SpringerLink (Online service)<br/>Yer Numarası QA76.9 .A25<br/>Elektronik Erişim <a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-1-4842-6100-2">Full Text Available From Springer Nature Professional and Applied Computing 2020 Packages</a><br/>Format: Electronic Resources<br/>DevSecOps for .NET Core Securing Modern Software Applicationsent://SD_ILS/0/SD_ILS:18786112024-09-20T01:28:11Z2024-09-20T01:28:11ZYazar Zeeshan, Afzaal Ahmad. author. SpringerLink (Online service)<br/>Yer Numarası QA76.76 .M52<br/>Elektronik Erişim <a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-1-4842-5850-7">Full Text Available From Springer Nature Professional and Applied Computing 2020 Packages</a><br/>Format: Electronic Resources<br/>Penetration Testing Basics A Quick-Start Guide to Breaking into Systemsent://SD_ILS/0/SD_ILS:18776842024-09-20T01:28:11Z2024-09-20T01:28:11ZYazar Messier, Ric. author. SpringerLink (Online service)<br/>Yer Numarası QA76.9 .A25<br/>Elektronik Erişim <a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-1-4842-1857-0">Full Text Available From Springer Nature Professional and Applied Computing 2016 Packages</a><br/>Format: Electronic Resources<br/>Information Systems Security and Privacy Third International Conference, ICISSP 2017, Porto, Portugal, February 19-21, 2017, Revised Selected Papersent://SD_ILS/0/SD_ILS:18840952024-09-20T01:28:11Z2024-09-20T01:28:11ZYazar Mori, Paolo. editor. (orcid)0000-0002-6618-0388 Furnell, Steven. editor. (orcid)0000-0003-0984-7542 Camp, Olivier. editor. SpringerLink (Online service)<br/>Yer Numarası QA76.9 .A25<br/>Elektronik Erişim <a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-319-93354-2">Full Text Available From Springer Nature Computer Science 2018 Packages</a><br/>Format: Electronic Resources<br/>Critical Information Infrastructures Resilience and Protectionent://SD_ILS/0/SD_ILS:18794952024-09-20T01:28:11Z2024-09-20T01:28:11ZYazar Hyslop, Maitland. author. SpringerLink (Online service)<br/>Yer Numarası QA76.9 .A25<br/>Elektronik Erişim <a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-0-387-71862-0">Full Text Available From Springer Nature Computer Science 2007 Packages</a><br/>Format: Electronic Resources<br/>Fully Homomorphic Encryption in Real World Applicationsent://SD_ILS/0/SD_ILS:18125892024-09-20T01:28:11Z2024-09-20T01:28:11ZYazar Chatterjee, Ayantika. author. Aung, Khin Mi Mi. author. SpringerLink (Online service)<br/>Yer Numarası TK7867 -7867.5<br/>Elektronik Erişim <a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-981-13-6393-1">Full Text Available From Springer Nature Engineering 2019 Packages</a><br/>Format: Electronic Resources<br/>Ubiquitous Computing and Computing Security of IoTent://SD_ILS/0/SD_ILS:18126172024-09-20T01:28:11Z2024-09-20T01:28:11ZYazar Jeyanthi, N. editor. Abraham, Ajith. editor. Mcheick, Hamid. editor. (orcid)0000-0002-2589-8609 SpringerLink (Online service)<br/>Yer Numarası Q342<br/>Elektronik Erişim <a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-030-01566-4">Full Text Available From Springer Nature Engineering 2019 Packages</a><br/>Format: Electronic Resources<br/>Cyber Operations Building, Defending, and Attacking Modern Computer Networksent://SD_ILS/0/SD_ILS:18772982024-09-20T01:28:11Z2024-09-20T01:28:11ZYazar O'Leary, Mike. author. SpringerLink (Online service)<br/>Yer Numarası QA76.9 .A25<br/>Elektronik Erişim <a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-1-4842-0457-3">Full Text Available From Springer Nature Professional and Applied Computing 2015 Packages</a><br/>Format: Electronic Resources<br/>Security for Cloud Storage Systemsent://SD_ILS/0/SD_ILS:18820112024-09-20T01:28:11Z2024-09-20T01:28:11ZYazar Yang, Kan. author. Jia, Xiaohua. author. SpringerLink (Online service)<br/>Yer Numarası QA76.9 .A25<br/>Elektronik Erişim <a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-1-4614-7873-7">Full Text Available From Springer Nature Computer Science 2014 Packages</a><br/>Format: Electronic Resources<br/>IT Convergence and Security Proceedings of ICITCS 2021ent://SD_ILS/0/SD_ILS:18867452024-09-20T01:28:11Z2024-09-20T01:28:11ZYazar Kim, Hyuncheol. editor. Kim, Kuinam J. editor. SpringerLink (Online service)<br/>Yer Numarası Q342<br/>Elektronik Erişim <a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-981-16-4118-3">Full Text Available From Springer Nature Computer Science 2021 Packages</a><br/>Format: Electronic Resources<br/>Information Security Applications 14th International Workshop, WISA 2013, Jeju Island, Korea, August 19-21, 2013, Revised Selected Papersent://SD_ILS/0/SD_ILS:18431492024-09-20T01:28:11Z2024-09-20T01:28:11ZYazar Kim, Yongdae. editor. Lee, Heejo. editor. Perrig, Adrian. editor. SpringerLink (Online service)<br/>Yer Numarası QA76.9 .A25<br/>Elektronik Erişim <a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-319-05149-9">Full Text Available From Springer Nature Computer Science 2014 Packages</a><br/>Format: Electronic Resources<br/>Cryptography and Security Systems Third International Conference, CSS 2014, Lublin, Poland, September 22-24, 2014. Proceedingsent://SD_ILS/0/SD_ILS:18821242024-09-20T01:28:11Z2024-09-20T01:28:11ZYazar Kotulski, Zbigniew. editor. Ksiezopolski, Bogdan. editor. Mazur, Katarzyna. editor. SpringerLink (Online service)<br/>Yer Numarası QA76.9 .A25<br/>Elektronik Erişim <a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-662-44893-9">Full Text Available From Springer Nature Computer Science 2014 Packages</a><br/>Format: Electronic Resources<br/>Principles of Data Securityent://SD_ILS/0/SD_ILS:19258932024-09-20T01:28:11Z2024-09-20T01:28:11ZYazar Leiss, Ernst L. author. SpringerLink (Online service)<br/>Yer Numarası QA76.9 .A25<br/>Elektronik Erişim <a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-1-4684-4316-5">Full Text Available From Springer Nature Computer Science Archive Packages</a><br/>Format: Electronic Resources<br/>QoS Routing Algorithms for Wireless Sensor Networksent://SD_ILS/0/SD_ILS:18856742024-09-20T01:28:11Z2024-09-20T01:28:11ZYazar Venugopal, K. R. author. T., Shiv Prakash. author. Kumaraswamy, M. author. SpringerLink (Online service)<br/>Yer Numarası TK5105.5 -5105.9<br/>Elektronik Erişim <a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-981-15-2720-3">Full Text Available From Springer Nature Computer Science 2020 Packages</a><br/>Format: Electronic Resources<br/>Data Analytics and Management Proceedings of ICDAMent://SD_ILS/0/SD_ILS:18540212024-09-20T01:28:11Z2024-09-20T01:28:11ZYazar Khanna, Ashish. editor. Gupta, Deepak. editor. Pólkowski, Zdzisław. editor. Bhattacharyya, Siddhartha. editor. Castillo, Oscar. editor.<br/>Yer Numarası Q342<br/>Elektronik Erişim <a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-981-15-8335-3">Full Text Available From Springer Nature Intelligent Technologies and Robotics 2021 Packages</a><br/>Format: Electronic Resources<br/>Cryptographic Obfuscation A Surveyent://SD_ILS/0/SD_ILS:18858232024-09-20T01:28:11Z2024-09-20T01:28:11ZYazar Horváth, Máté. author. Buttyán, Levente. author. SpringerLink (Online service)<br/>Yer Numarası QA268<br/>Elektronik Erişim <a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-319-98041-6">Full Text Available From Springer Nature Computer Science 2020 Packages</a><br/>Format: Electronic Resources<br/>Cyber Security on Azure An IT Professional's Guide to Microsoft Azure Security Centerent://SD_ILS/0/SD_ILS:18778322024-09-20T01:28:11Z2024-09-20T01:28:11ZYazar Copeland, Marshall. author. SpringerLink (Online service)<br/>Yer Numarası QA76.76 .M52<br/>Elektronik Erişim <a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-1-4842-2740-4">Full Text Available From Springer Nature Professional and Applied Computing 2017 Packages</a><br/>Format: Electronic Resources<br/>Beginning Security with Microsoft Technologies Protecting Office 365, Devices, and Dataent://SD_ILS/0/SD_ILS:18782652024-09-20T01:28:11Z2024-09-20T01:28:11ZYazar Lakshmi, Vasantha. author. SpringerLink (Online service)<br/>Yer Numarası QA76.76 .M52<br/>Elektronik Erişim <a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-1-4842-4853-9">Full Text Available From Springer Nature Professional and Applied Computing 2019 Packages</a><br/>Format: Electronic Resources<br/>Recent Advances in Systems Safety and Securityent://SD_ILS/0/SD_ILS:18096752024-09-20T01:28:11Z2024-09-20T01:28:11ZYazar Pricop, Emil. editor. Stamatescu, Grigore. editor. SpringerLink (Online service)<br/>Yer Numarası Q342<br/>Elektronik Erişim <a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-319-32525-5">Full Text Available From Springer Nature Engineering 2016 Packages</a><br/>Format: Electronic Resources<br/>Applications and Techniques in Information Security International Conference, ATIS 2014, Melbourne, Australia, November 26-28, 2014. Proceedingsent://SD_ILS/0/SD_ILS:18820272024-09-20T01:28:11Z2024-09-20T01:28:11ZYazar Batten, Lynn. editor. Li, Gang. editor. (orcid)0000-0003-1583-641X Niu, Wenjia. editor. Warren, Matthew. editor. SpringerLink (Online service)<br/>Yer Numarası QA76.9 .A25<br/>Elektronik Erişim <a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-662-45670-5">Full Text Available From Springer Nature Computer Science 2014 Packages</a><br/>Format: Electronic Resources<br/>Cyber Resilience of Systems and Networksent://SD_ILS/0/SD_ILS:18130142024-09-20T01:28:11Z2024-09-20T01:28:11ZYazar Kott, Alexander. editor. Linkov, Igor. editor. SpringerLink (Online service)<br/>Yer Numarası TH9701 -9745<br/>Elektronik Erişim <a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-319-77492-3">Full Text Available From Springer Nature Engineering 2019 Packages</a><br/>Format: Electronic Resources<br/>Building the Infrastructure for Cloud Security A Solutions Viewent://SD_ILS/0/SD_ILS:18771642024-09-20T01:28:11Z2024-09-20T01:28:11ZYazar Yeluri, Raghuram. author. Castro-Leon, Enrique. author. SpringerLink (Online service)<br/>Yer Numarası QA76.9 .A25<br/>Elektronik Erişim <a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-1-4302-6146-9">Full Text Available From Springer Nature Professional and Applied Computing 2014 Packages</a><br/>Format: Electronic Resources<br/>Computer Vision - ECCV 2018 15th European Conference, Munich, Germany, September 8-14, 2018, Proceedings, Part Vent://SD_ILS/0/SD_ILS:18457382024-09-20T01:28:11Z2024-09-20T01:28:11ZYazar Ferrari, Vittorio. editor. Hebert, Martial. editor. Sminchisescu, Cristian. editor. Weiss, Yair. editor. SpringerLink (Online service)<br/>Yer Numarası TA1634<br/>Elektronik Erişim <a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-030-01228-1">Full Text Available From Springer Nature Computer Science 2018 Packages</a><br/>Format: Electronic Resources<br/>From Hacking to Report Writing An Introduction to Security and Penetration Testingent://SD_ILS/0/SD_ILS:18775772024-09-20T01:28:11Z2024-09-20T01:28:11ZYazar Svensson, Robert. author. SpringerLink (Online service)<br/>Yer Numarası QA76.9 .A25<br/>Elektronik Erişim <a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-1-4842-2283-6">Full Text Available From Springer Nature Professional and Applied Computing 2016 Packages</a><br/>Format: Electronic Resources<br/>Cloud Defense Strategies with Azure Sentinel Hands-on Threat Hunting in Cloud Logs and Servicesent://SD_ILS/0/SD_ILS:18789422024-09-20T01:28:11Z2024-09-20T01:28:11ZYazar Copeland, Marshall. author. SpringerLink (Online service)<br/>Yer Numarası QA76.76 .M52<br/>Elektronik Erişim <a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-1-4842-7132-2">Full Text Available From Springer Nature Professional and Applied Computing 2021 Packages</a><br/>Format: Electronic Resources<br/>Developing Applications with Azure Active Directory Principles of Authentication and Authorization for Architects and Developersent://SD_ILS/0/SD_ILS:18783732024-09-20T01:28:11Z2024-09-20T01:28:11ZYazar Mayank, Manas. author. Garg, Mohit. author. SpringerLink (Online service)<br/>Yer Numarası QA76.76 .M52<br/>Elektronik Erişim <a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-1-4842-5040-2">Full Text Available From Springer Nature Professional and Applied Computing 2019 Packages</a><br/>Format: Electronic Resources<br/>Enterprise Cybersecurity How to Build a Successful Cyberdefense Program Against Advanced Threatsent://SD_ILS/0/SD_ILS:18772592024-09-20T01:28:11Z2024-09-20T01:28:11ZYazar Donaldson, Scott. author. Siegel, Stanley. author. Williams, Chris K. author. Aslam, Abdul. author. SpringerLink (Online service)<br/>Yer Numarası QA76.9 .A25<br/>Elektronik Erişim <a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-1-4302-6083-7">Full Text Available From Springer Nature Professional and Applied Computing 2015 Packages</a><br/>Format: Electronic Resources<br/>Protocols, Strands, and Logic Essays Dedicated to Joshua Guttman on the Occasion of his 66.66th Birthdayent://SD_ILS/0/SD_ILS:18872522024-09-20T01:28:11Z2024-09-20T01:28:11ZYazar Dougherty, Daniel. editor. Meseguer, José. editor. Mödersheim, Sebastian Alexander. editor. (orcid)0000-0002-6901-8319 Rowe, Paul. editor. SpringerLink (Online service)<br/>Yer Numarası QA76.9 .A25<br/>Elektronik Erişim <a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-030-91631-2">Full Text Available From Springer Nature Computer Science 2021 Packages</a><br/>Format: Electronic Resources<br/>Smart Innovations in Communication and Computational Sciences Proceedings of ICSICCS 2017, Volume 1ent://SD_ILS/0/SD_ILS:18528412024-09-20T01:28:11Z2024-09-20T01:28:11ZYazar Panigrahi, Bijaya Ketan. editor. Trivedi, Munesh C. editor. Mishra, Krishn K. editor. Tiwari, Shailesh. editor. Singh, Pradeep Kumar. editor. (orcid)0000-0002-7676-9014<br/>Yer Numarası Q342<br/>Elektronik Erişim <a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-981-10-8968-8">Full Text Available From Springer Nature Intelligent Technologies and Robotics 2019 Packages</a><br/>Format: Electronic Resources<br/>Smart Innovations in Communication and Computational Sciences Proceedings of ICSICCS 2017, Volume 2ent://SD_ILS/0/SD_ILS:18530762024-09-20T01:28:11Z2024-09-20T01:28:11ZYazar Panigrahi, Bijaya Ketan. editor. Trivedi, Munesh C. editor. Mishra, Krishn K. editor. Tiwari, Shailesh. editor. Singh, Pradeep Kumar. editor. (orcid)0000-0002-7676-9014<br/>Yer Numarası Q342<br/>Elektronik Erişim <a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-981-10-8971-8">Full Text Available From Springer Nature Intelligent Technologies and Robotics 2019 Packages</a><br/>Format: Electronic Resources<br/>Rising Threats in Expert Applications and Solutions Proceedings of FICR-TEAS 2020ent://SD_ILS/0/SD_ILS:18539202024-09-20T01:28:11Z2024-09-20T01:28:11ZYazar Rathore, Vijay Singh. editor. Dey, Nilanjan. editor. Piuri, Vincenzo. editor. Babo, Rosalina. editor. Polkowski, Zdzislaw. editor.<br/>Yer Numarası Q342<br/>Elektronik Erişim <a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-981-15-6014-9">Full Text Available From Springer Nature Intelligent Technologies and Robotics 2021 Packages</a><br/>Format: Electronic Resources<br/>Sustainable Logistics and Production in Industry 4.0 New Opportunities and Challengesent://SD_ILS/0/SD_ILS:18002072024-09-20T01:28:11Z2024-09-20T01:28:11ZYazar Grzybowska, Katarzyna. editor. Awasthi, Anjali. editor. Sawhney, Rapinder. editor. SpringerLink (Online service)<br/>Yer Numarası HD28 -70<br/>Elektronik Erişim <a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-030-33369-0">Full Text Available From Springer Nature Earth and Environmental Science 2020 Packages</a><br/>Format: Electronic Resources<br/>Data Driven Approach Towards Disruptive Technologies Proceedings of MIDAS 2020ent://SD_ILS/0/SD_ILS:18543262024-09-20T01:28:11Z2024-09-20T01:28:11ZYazar Singh, T P. editor. Tomar, Ravi. editor. Choudhury, Tanupriya. editor. Perumal, Thinagaran. editor. Mahdi, Hussain Falih. editor.<br/>Yer Numarası Q342<br/>Elektronik Erişim <a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-981-15-9873-9">Full Text Available From Springer Nature Intelligent Technologies and Robotics 2021 Packages</a><br/>Format: Electronic Resources<br/>Intelligent Computing and Innovation on Data Science Proceedings of ICTIDS 2019ent://SD_ILS/0/SD_ILS:18536872024-09-20T01:28:11Z2024-09-20T01:28:11ZYazar Peng, Sheng-Lung. editor. Son, Le Hoang. editor. Suseendran, G. editor. Balaganesh, D. editor. SpringerLink (Online service)<br/>Yer Numarası Q342<br/>Elektronik Erişim <a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-981-15-3284-9">Full Text Available From Springer Nature Intelligent Technologies and Robotics 2020 Packages</a><br/>Format: Electronic Resources<br/>Fundamentals of Secure System Modellingent://SD_ILS/0/SD_ILS:18836982024-09-20T01:28:11Z2024-09-20T01:28:11ZYazar Matulevičius, Raimundas. author. SpringerLink (Online service)<br/>Yer Numarası QA76.9 .A25<br/>Elektronik Erişim <a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-319-61717-6">Full Text Available From Springer Nature Computer Science 2017 Packages</a><br/>Format: Electronic Resources<br/>SAFECOMP '93 The 12th International Conference on Computer Safety, Reliability and Securityent://SD_ILS/0/SD_ILS:19223742024-09-20T01:28:11Z2024-09-20T01:28:11ZYazar Gorski, Janusz. editor. SpringerLink (Online service)<br/>Yer Numarası QA76.9 .A25<br/>Elektronik Erişim <a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-1-4471-2061-2">Full Text Available From Springer Nature Computer Science Archive Packages</a><br/>Format: Electronic Resources<br/>Secure ICT Service Provisioning for Cloud, Mobile and Beyond A Workable Architectural Approach Balancing Between Buyers and Providersent://SD_ILS/0/SD_ILS:18812092024-09-20T01:28:11Z2024-09-20T01:28:11ZYazar Faber, Eberhard. author. Behnsen, Wolfgang. author. SpringerLink (Online service)<br/>Yer Numarası QA76.9 .A25<br/>Elektronik Erişim <a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-658-00069-1">Full Text Available From Springer Nature Computer Science 2012 Packages</a><br/>Format: Electronic Resources<br/>Advances in Information and Computer Security 9th International Workshop on Security, IWSEC 2014, Hirosaki, Japan, August 27-29, 2014. Proceedingsent://SD_ILS/0/SD_ILS:18432252024-09-20T01:28:11Z2024-09-20T01:28:11ZYazar Yoshida, Maki. editor. Mouri, Koichi. editor. SpringerLink (Online service)<br/>Yer Numarası QA76.9 .A25<br/>Elektronik Erişim <a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-319-09843-2">Full Text Available From Springer Nature Computer Science 2014 Packages</a><br/>Format: Electronic Resources<br/>Binary Code Fingerprinting for Cybersecurity Application to Malicious Code Fingerprintingent://SD_ILS/0/SD_ILS:18859752024-09-20T01:28:11Z2024-09-20T01:28:11ZYazar Alrabaee, Saed. author. Debbabi, Mourad. author. Shirani, Paria. author. Wang, Lingyu. author. Youssef, Amr. author.<br/>Yer Numarası QA76.9 .A25<br/>Elektronik Erişim <a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-030-34238-8">Full Text Available From Springer Nature Computer Science 2020 Packages</a><br/>Format: Electronic Resources<br/>GDPR and Biobanking Individual Rights, Public Interest and Research Regulation across Europeent://SD_ILS/0/SD_ILS:18524962024-09-20T01:28:11Z2024-09-20T01:28:11ZYazar Slokenberga, Santa. editor. Tzortzatou, Olga. editor. Reichel, Jane. editor. SpringerLink (Online service)<br/>Yer Numarası KJE901 -9796<br/>Elektronik Erişim <a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-030-49388-2">Full Text Available From Springer Nature Law and Criminology 2021 Packages</a><br/>Format: Electronic Resources<br/>Information Science and Applications 2017 ICISA 2017ent://SD_ILS/0/SD_ILS:18107022024-09-20T01:28:11Z2024-09-20T01:28:11ZYazar Kim, Kuinam. editor. Joukov, Nikolai. editor. SpringerLink (Online service)<br/>Yer Numarası TK5101 -5105.9<br/>Elektronik Erişim <a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-981-10-4154-9">Full Text Available From Springer Nature Engineering 2017 Packages</a><br/>Format: Electronic Resources<br/>Securing PHP Appsent://SD_ILS/0/SD_ILS:18774892024-09-20T01:28:11Z2024-09-20T01:28:11ZYazar Edmunds, Ben. author. SpringerLink (Online service)<br/>Yer Numarası QA76.625<br/>Elektronik Erişim <a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-1-4842-2120-4">Full Text Available From Springer Nature Professional and Applied Computing 2016 Packages</a><br/>Format: Electronic Resources<br/>Wireless Internet 11th EAI International Conference, WiCON 2018, Taipei, Taiwan, October 15-16, 2018, Proceedingsent://SD_ILS/0/SD_ILS:18853572024-09-20T01:28:11Z2024-09-20T01:28:11ZYazar Chen, Jiann-Liang. editor. Pang, Ai-Chun. editor. Deng, Der-Jiunn. editor. Lin, Chun-Cheng. editor. SpringerLink (Online service)<br/>Yer Numarası TK5105.5 -5105.9<br/>Elektronik Erişim <a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-030-06158-6">Full Text Available From Springer Nature Computer Science 2019 Packages</a><br/>Format: Electronic Resources<br/>Advanced ASP.NET Core 3 Security Understanding Hacks, Attacks, and Vulnerabilities to Secure Your Websiteent://SD_ILS/0/SD_ILS:18787232024-09-20T01:28:11Z2024-09-20T01:28:11ZYazar Norberg, Scott. author. SpringerLink (Online service)<br/>Yer Numarası QA76.76 .M52<br/>Elektronik Erişim <a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-1-4842-6014-2">Full Text Available From Springer Nature Professional and Applied Computing 2020 Packages</a><br/>Format: Electronic Resources<br/>Enterprise Cybersecurity Study Guide How to Build a Successful Cyberdefense Program Against Advanced Threatsent://SD_ILS/0/SD_ILS:18780692024-09-20T01:28:11Z2024-09-20T01:28:11ZYazar Donaldson, Scott E. author. Siegel, Stanley G. author. Williams, Chris K. author. Aslam, Abdul. author. SpringerLink (Online service)<br/>Yer Numarası QA76.9 .A25<br/>Elektronik Erişim <a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-1-4842-3258-3">Full Text Available From Springer Nature Professional and Applied Computing 2018 Packages</a><br/>Format: Electronic Resources<br/>10 Don'ts on Your Digital Devices The Non-Techie's Survival Guide to Cyber Security and Privacyent://SD_ILS/0/SD_ILS:18771792024-09-20T01:28:11Z2024-09-20T01:28:11ZYazar Rzeszut, Eric. author. Bachrach, Daniel. author. SpringerLink (Online service)<br/>Yer Numarası QA76.9 .A25<br/>Elektronik Erişim <a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-1-4842-0367-5">Full Text Available From Springer Nature Professional and Applied Computing 2014 Packages</a><br/>Format: Electronic Resources<br/>Security and Data Storage Aspect in Cloud Computingent://SD_ILS/0/SD_ILS:18125732024-09-20T01:28:11Z2024-09-20T01:28:11ZYazar Deshpande, Prachi S. author. Sharma, Subhash C. author. Peddoju, Sateesh K. author. SpringerLink (Online service)<br/>Yer Numarası TK5101 -5105.9<br/>Elektronik Erişim <a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-981-13-6089-3">Full Text Available From Springer Nature Engineering 2019 Packages</a><br/>Format: Electronic Resources<br/>Mathematics and Computing Third International Conference, ICMC 2017, Haldia, India, January 17-21, 2017, Proceedingsent://SD_ILS/0/SD_ILS:18836912024-09-20T01:28:11Z2024-09-20T01:28:11ZYazar Giri, Debasis. editor. Mohapatra, Ram N. editor. Begehr, Heinrich. editor. Obaidat, Mohammad S. editor. SpringerLink (Online service)<br/>Yer Numarası QA76.9 .A25<br/>Elektronik Erişim <a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-981-10-4642-1">Full Text Available From Springer Nature Computer Science 2017 Packages</a><br/>Format: Electronic Resources<br/>Secure IT Systems 18th Nordic Conference, NordSec 2013, Ilulissat, Greenland, October 18-21, 2013, Proceedingsent://SD_ILS/0/SD_ILS:18427032024-09-20T01:28:11Z2024-09-20T01:28:11ZYazar Riis Nielsen, Hanne. editor. Gollmann, Dieter. editor. SpringerLink (Online service)<br/>Yer Numarası QA76.9 .A25<br/>Elektronik Erişim <a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-642-41488-6">Full Text Available From Springer Nature Computer Science 2013 Packages</a><br/>Format: Electronic Resources<br/>Information Science and Applications ICISA 2019ent://SD_ILS/0/SD_ILS:18140102024-09-20T01:28:11Z2024-09-20T01:28:11ZYazar Kim, Kuinam J. editor. Kim, Hye-Young. editor. SpringerLink (Online service)<br/>Yer Numarası TK5101 -5105.9<br/>Elektronik Erişim <a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-981-15-1465-4">Full Text Available From Springer Nature Engineering 2020 Packages</a><br/>Format: Electronic Resources<br/>Information Science and Applications 2018 ICISA 2018ent://SD_ILS/0/SD_ILS:18124132024-09-20T01:28:11Z2024-09-20T01:28:11ZYazar Kim, Kuinam J. editor. Baek, Nakhoon. editor. SpringerLink (Online service)<br/>Yer Numarası TK5101 -5105.9<br/>Elektronik Erişim <a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-981-13-1056-0">Full Text Available From Springer Nature Engineering 2019 Packages</a><br/>Format: Electronic Resources<br/>Advanced Monitoring in P2P Botnets A Dual Perspectiveent://SD_ILS/0/SD_ILS:18839822024-09-20T01:28:11Z2024-09-20T01:28:11ZYazar Karuppayah, Shankar. author. SpringerLink (Online service)<br/>Yer Numarası QA76.9 .A25<br/>Elektronik Erişim <a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-981-10-9050-9">Full Text Available From Springer Nature Computer Science 2018 Packages</a><br/>Format: Electronic Resources<br/>Ad Hoc Networks 10th EAI International Conference, ADHOCNETS 2018, Cairns, Australia, September 20-23, 2018, Proceedingsent://SD_ILS/0/SD_ILS:18846572024-09-20T01:28:11Z2024-09-20T01:28:11ZYazar Zheng, Jun. editor. Xiang, Wei. editor. Lorenz, Pascal. editor. Mao, Shiwen. editor. Yan, Feng. editor.<br/>Yer Numarası TK5105.5 -5105.9<br/>Elektronik Erişim <a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-030-05888-3">Full Text Available From Springer Nature Computer Science 2019 Packages</a><br/>Format: Electronic Resources<br/>Advanced Persistent Training Take Your Security Awareness Program to the Next Levelent://SD_ILS/0/SD_ILS:18777332024-09-20T01:28:11Z2024-09-20T01:28:11ZYazar Schroeder, Jordan. author. SpringerLink (Online service)<br/>Yer Numarası QA76.9 .A25<br/>Elektronik Erişim <a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-1-4842-2835-7">Full Text Available From Springer Nature Professional and Applied Computing 2017 Packages</a><br/>Format: Electronic Resources<br/>Innovations in Computer Science and Engineering Proceedings of the Fifth ICICSE 2017ent://SD_ILS/0/SD_ILS:18129172024-09-20T01:28:11Z2024-09-20T01:28:11ZYazar Saini, H. S. editor. Sayal, Rishi. editor. Govardhan, A. editor. Buyya, Rajkumar. editor. SpringerLink (Online service)<br/>Yer Numarası TK5101 -5105.9<br/>Elektronik Erişim <a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-981-10-8201-6">Full Text Available From Springer Nature Engineering 2019 Packages</a><br/>Format: Electronic Resources<br/>Innovations in Computer Science and Engineering Proceedings of the Fourth ICICSE 2016ent://SD_ILS/0/SD_ILS:18106672024-09-20T01:28:11Z2024-09-20T01:28:11ZYazar Saini, H. S. editor. Sayal, Rishi. editor. Rawat, Sandeep Singh. editor. SpringerLink (Online service)<br/>Yer Numarası TK5101 -5105.9<br/>Elektronik Erişim <a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-981-10-3818-1">Full Text Available From Springer Nature Engineering 2017 Packages</a><br/>Format: Electronic Resources<br/>Progress in Cryptology - INDOCRYPT 2013 14th International Conference on Cryptology in India, Mumbai, India, December 7-10, 2013. Proceedingsent://SD_ILS/0/SD_ILS:18424852024-09-20T01:28:11Z2024-09-20T01:28:11ZYazar Paul, Goutam. editor. Vaudenay, Paul. editor. SpringerLink (Online service)<br/>Yer Numarası QA268<br/>Elektronik Erişim <a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-319-03515-4">Full Text Available From Springer Nature Computer Science 2013 Packages</a><br/>Format: Electronic Resources<br/>Smart Card Research and Advanced Applications 16th International Conference, CARDIS 2017, Lugano, Switzerland, November 13-15, 2017, Revised Selected Papersent://SD_ILS/0/SD_ILS:18453632024-09-20T01:28:11Z2024-09-20T01:28:11ZYazar Eisenbarth, Thomas. editor. (orcid)0000-0003-1116-6973 Teglia, Yannick. editor. SpringerLink (Online service)<br/>Yer Numarası QA268<br/>Elektronik Erişim <a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-319-75208-2">Full Text Available From Springer Nature Computer Science 2018 Packages</a><br/>Format: Electronic Resources<br/>Cybersecurity for Space Protecting the Final Frontierent://SD_ILS/0/SD_ILS:18785202024-09-20T01:28:11Z2024-09-20T01:28:11ZYazar Oakley, Jacob G. author. SpringerLink (Online service)<br/>Yer Numarası QA76.9 .A25<br/>Elektronik Erişim <a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-1-4842-5732-6">Full Text Available From Springer Nature Professional and Applied Computing 2020 Packages</a><br/>Format: Electronic Resources<br/>IT Security Risk Control Management An Audit Preparation Planent://SD_ILS/0/SD_ILS:18776222024-09-20T01:28:11Z2024-09-20T01:28:11ZYazar Pompon, Raymond. author. SpringerLink (Online service)<br/>Yer Numarası QA76.9 .A25<br/>Elektronik Erişim <a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-1-4842-2140-2">Full Text Available From Springer Nature Professional and Applied Computing 2016 Packages</a><br/>Format: Electronic Resources<br/>Fundamentals of Digital Forensics Theory, Methods, and Real-Life Applicationsent://SD_ILS/0/SD_ILS:18857012024-09-20T01:28:11Z2024-09-20T01:28:11ZYazar Kävrestad, Joakim. author. SpringerLink (Online service)<br/>Yer Numarası QA76.9 .A25<br/>Elektronik Erişim <a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-030-38954-3">Full Text Available From Springer Nature Computer Science 2020 Packages</a><br/>Format: Electronic Resources<br/>PCI DSS An Integrated Data Security Standard Guideent://SD_ILS/0/SD_ILS:18786042024-09-20T01:28:11Z2024-09-20T01:28:11ZYazar Seaman, Jim. author. SpringerLink (Online service)<br/>Yer Numarası QA76.9 .A25<br/>Elektronik Erişim <a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-1-4842-5808-8">Full Text Available From Springer Nature Professional and Applied Computing 2020 Packages</a><br/>Format: Electronic Resources<br/>Pro Google Cloud Automation With Google Cloud Deployment Manager, Spinnaker, Tekton, and Jenkinsent://SD_ILS/0/SD_ILS:18788462024-09-20T01:28:11Z2024-09-20T01:28:11ZYazar Sabharwal, Navin. author. Pandey, Piyush. author. SpringerLink (Online service)<br/>Yer Numarası QA76.76 .A65<br/>Elektronik Erişim <a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-1-4842-6573-4">Full Text Available From Springer Nature Professional and Applied Computing 2021 Packages</a><br/>Format: Electronic Resources<br/>Secure Systems Development with UMLent://SD_ILS/0/SD_ILS:18791892024-09-20T01:28:11Z2024-09-20T01:28:11ZYazar Jürjens, Jan. author. SpringerLink (Online service)<br/>Yer Numarası QA76.9 .A25<br/>Elektronik Erişim <a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/b137706">Full Text Available From Springer Nature Computer Science 2005 Packages</a><br/>Format: Electronic Resources<br/>Practical Hadoop Securityent://SD_ILS/0/SD_ILS:18770912024-09-20T01:28:11Z2024-09-20T01:28:11ZYazar Lakhe, Bhushan. author. SpringerLink (Online service)<br/>Yer Numarası QA76.9 .A25<br/>Elektronik Erişim <a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-1-4302-6545-0">Full Text Available From Springer Nature Professional and Applied Computing 2014 Packages</a><br/>Format: Electronic Resources<br/>Defending IoT Infrastructures with the Raspberry Pi Monitoring and Detecting Nefarious Behavior in Real Timeent://SD_ILS/0/SD_ILS:18781922024-09-20T01:28:11Z2024-09-20T01:28:11ZYazar Hosmer, Chet. author. SpringerLink (Online service)<br/>Yer Numarası QA76.9 .A25<br/>Elektronik Erişim <a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-1-4842-3700-7">Full Text Available From Springer Nature Professional and Applied Computing 2018 Packages</a><br/>Format: Electronic Resources<br/>Game Theory for Cyber Deception From Theory to Applicationsent://SD_ILS/0/SD_ILS:18945092024-09-20T01:28:11Z2024-09-20T01:28:11ZYazar Pawlick, Jeffrey. author. Zhu, Quanyan. author. SpringerLink (Online service)<br/>Yer Numarası QA76.9 .M35<br/>Elektronik Erişim <a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-030-66065-9">Full Text Available From Springer Nature Mathematics and Statistics 2021 Packages</a><br/>Format: Electronic Resources<br/>Applications and Techniques in Information Security 6th International Conference, ATIS 2016, Cairns, QLD, Australia, October 26-28, 2016, Proceedingsent://SD_ILS/0/SD_ILS:18830922024-09-20T01:28:11Z2024-09-20T01:28:11ZYazar Batten, Lynn. editor. (orcid)0000-0003-4525-2423 Li, Gang. editor. (orcid)0000-0003-1583-641X SpringerLink (Online service)<br/>Yer Numarası QA76.9 .A25<br/>Elektronik Erişim <a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-981-10-2741-3">Full Text Available From Springer Nature Computer Science 2016 Packages</a><br/>Format: Electronic Resources<br/>Applications and Techniques in Information Security 6th International Conference, ATIS 2015, Beijing, China, November 4-6, 2015, Proceedingsent://SD_ILS/0/SD_ILS:18825272024-09-20T01:28:11Z2024-09-20T01:28:11ZYazar Niu, Wenjia. editor. Li, Gang. editor. (orcid)0000-0003-1583-641X Liu, Jiqiang. editor. Tan, Jianlong. editor. Guo, Li. editor.<br/>Yer Numarası QA76.9 .A25<br/>Elektronik Erişim <a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-662-48683-2">Full Text Available From Springer Nature Computer Science 2015 Packages</a><br/>Format: Electronic Resources<br/>Speech and Computer 20th International Conference, SPECOM 2018, Leipzig, Germany, September 18-22, 2018, Proceedingsent://SD_ILS/0/SD_ILS:18454982024-09-20T01:28:11Z2024-09-20T01:28:11ZYazar Karpov, Alexey. editor. (orcid)0000-0003-3424-652X Jokisch, Oliver. editor. (orcid)0000-0001-7411-4420 Potapova, Rodmonga. editor. (orcid)0000-0002-7532-9156 SpringerLink (Online service)<br/>Yer Numarası Q334 -342<br/>Elektronik Erişim <a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-319-99579-3">Full Text Available From Springer Nature Computer Science 2018 Packages</a><br/>Format: Electronic Resources<br/>Innovations in Computer Science and Engineering Proceedings of the Sixth ICICSE 2018ent://SD_ILS/0/SD_ILS:18128942024-09-20T01:28:11Z2024-09-20T01:28:11ZYazar Saini, H. S. editor. Sayal, Rishi. editor. Govardhan, Aliseri. editor. Buyya, Rajkumar. editor. SpringerLink (Online service)<br/>Yer Numarası TK5101 -5105.9<br/>Elektronik Erişim <a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-981-13-7082-3">Full Text Available From Springer Nature Engineering 2019 Packages</a><br/>Format: Electronic Resources<br/>Testbeds and Research Infrastructures for the Development of Networks and Communities 13th EAI International Conference, TridentCom 2018, Shanghai, China, December 1-3, 2018, Proceedingsent://SD_ILS/0/SD_ILS:18853652024-09-20T01:28:11Z2024-09-20T01:28:11ZYazar Gao, Honghao. editor. Yin, Yuyu. editor. Yang, Xiaoxian. editor. Miao, Huaikou. editor. SpringerLink (Online service)<br/>Yer Numarası TK5105.5 -5105.9<br/>Elektronik Erişim <a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-030-12971-2">Full Text Available From Springer Nature Computer Science 2019 Packages</a><br/>Format: Electronic Resources<br/>Cyber Security Intelligence and Analytics Proceedings of the 2020 International Conference on Cyber Security Intelligence and Analytics (CSIA 2020), Volume 1ent://SD_ILS/0/SD_ILS:18533872024-09-20T01:28:11Z2024-09-20T01:28:11ZYazar Xu, Zheng. editor. Parizi, Reza M. editor. (orcid)0000-0002-0049-4296 Hammoudeh, Mohammad. editor. Loyola-González, Octavio. editor. SpringerLink (Online service)<br/>Yer Numarası Q342<br/>Elektronik Erişim <a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-030-43306-2">Full Text Available From Springer Nature Intelligent Technologies and Robotics 2020 Packages</a><br/>Format: Electronic Resources<br/>Cryptography and Information Security in the Balkans Second International Conference, BalkanCryptSec 2015, Koper, Slovenia, September 3-4, 2015, Revised Selected Papersent://SD_ILS/0/SD_ILS:18443742024-09-20T01:28:11Z2024-09-20T01:28:11ZYazar Pasalic, Enes. editor. Knudsen, Lars R. editor. SpringerLink (Online service)<br/>Yer Numarası QA268<br/>Elektronik Erişim <a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-319-29172-7">Full Text Available From Springer Nature Computer Science 2016 Packages</a><br/>Format: Electronic Resources<br/>Securing SQL Server DBAs Defending the Databaseent://SD_ILS/0/SD_ILS:18780192024-09-20T01:28:11Z2024-09-20T01:28:11ZYazar Carter, Peter A. author. SpringerLink (Online service)<br/>Yer Numarası QA76.9 .D3<br/>Elektronik Erişim <a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-1-4842-4161-5">Full Text Available From Springer Nature Professional and Applied Computing 2018 Packages</a><br/>Format: Electronic Resources<br/>Multimedia Security Algorithm Development, Analysis and Applicationsent://SD_ILS/0/SD_ILS:18540272024-09-20T01:28:11Z2024-09-20T01:28:11ZYazar Giri, Kaiser J. editor. Parah, Shabir Ahmad. editor. Bashir, Rumaan. editor. Muhammad, Khan. editor. SpringerLink (Online service)<br/>Yer Numarası Q342<br/>Elektronik Erişim <a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-981-15-8711-5">Full Text Available From Springer Nature Intelligent Technologies and Robotics 2021 Packages</a><br/>Format: Electronic Resources<br/>Computer Communication, Networking and Internet Security Proceedings of IC3T 2016ent://SD_ILS/0/SD_ILS:18103012024-09-20T01:28:11Z2024-09-20T01:28:11ZYazar Satapathy, Suresh Chandra. editor. Bhateja, Vikrant. editor. Raju, K. Srujan. editor. Janakiramaiah, B. editor. SpringerLink (Online service)<br/>Yer Numarası TK5101 -5105.9<br/>Elektronik Erişim <a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-981-10-3226-4">Full Text Available From Springer Nature Engineering 2017 Packages</a><br/>Format: Electronic Resources<br/>Cyber Security Intelligence and Analytics Proceedings of the 2020 International Conference on Cyber Security Intelligence and Analytics (CSIA 2020), Volume 2ent://SD_ILS/0/SD_ILS:18532922024-09-20T01:28:11Z2024-09-20T01:28:11ZYazar Xu, Zheng. editor. Parizi, Reza M. editor. (orcid)0000-0002-0049-4296 Hammoudeh, Mohammad. editor. Loyola-González, Octavio. editor. SpringerLink (Online service)<br/>Yer Numarası Q342<br/>Elektronik Erişim <a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-030-43309-3">Full Text Available From Springer Nature Intelligent Technologies and Robotics 2020 Packages</a><br/>Format: Electronic Resources<br/>Adaptive Autonomous Secure Cyber Systemsent://SD_ILS/0/SD_ILS:18857562024-09-20T01:28:11Z2024-09-20T01:28:11ZYazar Jajodia, Sushil. editor. Cybenko, George. editor. Subrahmanian, V.S. editor. Swarup, Vipin. editor. Wang, Cliff. editor.<br/>Yer Numarası QA76.9 .A25<br/>Elektronik Erişim <a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-030-33432-1">Full Text Available From Springer Nature Computer Science 2020 Packages</a><br/>Format: Electronic Resources<br/>Computer Software and Intellectual Propertyent://SD_ILS/0/SD_ILS:19245352024-09-20T01:28:11Z2024-09-20T01:28:11ZYazar Office of Technology Assessment. author. SpringerLink (Online service)<br/>Yer Numarası QA268<br/>Elektronik Erişim <a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-1-349-12443-5">Full Text Available From Springer Nature Computer Science Archive Packages</a><br/>Format: Electronic Resources<br/>Smart Card Research and Advanced Applications 17th International Conference, CARDIS 2018, Montpellier, France, November 12-14, 2018, Revised Selected Papersent://SD_ILS/0/SD_ILS:18845832024-09-20T01:28:11Z2024-09-20T01:28:11ZYazar Bilgin, Begül. editor. Fischer, Jean-Bernard. editor. SpringerLink (Online service)<br/>Yer Numarası QA268<br/>Elektronik Erişim <a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-030-15462-2">Full Text Available From Springer Nature Computer Science 2019 Packages</a><br/>Format: Electronic Resources<br/>Cryptography and Information Security in the Balkans First International Conference, BalkanCryptSec 2014, Istanbul, Turkey, October 16-17, 2014, Revised Selected Papersent://SD_ILS/0/SD_ILS:18437122024-09-20T01:28:11Z2024-09-20T01:28:11ZYazar Ors, Berna. editor. Preneel, Bart. editor. SpringerLink (Online service)<br/>Yer Numarası QA268<br/>Elektronik Erişim <a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-319-21356-9">Full Text Available From Springer Nature Computer Science 2015 Packages</a><br/>Format: Electronic Resources<br/>Geo-Spatial Knowledge and Intelligence 5th International Conference, GSKI 2017, Chiang Mai, Thailand, December 8-10, 2017, Revised Selected Papers, Part IIent://SD_ILS/0/SD_ILS:18840972024-09-20T01:28:11Z2024-09-20T01:28:11ZYazar Yuan, Hanning. editor. Geng, Jing. editor. Liu, Chuanlu. editor. Bian, Fuling. editor. Surapunt, Tisinee. editor.<br/>Yer Numarası Q334 -342<br/>Elektronik Erişim <a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-981-13-0896-3">Full Text Available From Springer Nature Computer Science 2018 Packages</a><br/>Format: Electronic Resources<br/>Geo-Spatial Knowledge and Intelligence 5th International Conference, GSKI 2017, Chiang Mai, Thailand, December 8-10, 2017, Revised Selected Papers, Part Ient://SD_ILS/0/SD_ILS:18840992024-09-20T01:28:11Z2024-09-20T01:28:11ZYazar Yuan, Hanning. editor. Geng, Jing. editor. Liu, Chuanlu. editor. Bian, Fuling. editor. Surapunt, Tisinee. editor.<br/>Yer Numarası Q334 -342<br/>Elektronik Erişim <a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-981-13-0893-2">Full Text Available From Springer Nature Computer Science 2018 Packages</a><br/>Format: Electronic Resources<br/>Dependability Metrics GI-Dagstuhl Research Seminar, Dagstuhl Castle, Germany, October 5 - November 1, 2005, Advanced Lecturesent://SD_ILS/0/SD_ILS:18395822024-09-20T01:28:11Z2024-09-20T01:28:11ZYazar Eusgeld, Irene. editor. Freiling, Felix. editor. Reussner, Ralf H. editor. SpringerLink (Online service)<br/>Yer Numarası QA76.758<br/>Elektronik Erişim <a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-540-68947-8">Full Text Available From Springer Nature Computer Science 2008 Packages</a><br/>Format: Electronic Resources<br/>Blockchain Hype or Innovationent://SD_ILS/0/SD_ILS:18863742024-09-20T01:28:11Z2024-09-20T01:28:11ZYazar Gayvoronskaya, Tatiana. author. Meinel, Christoph. author. SpringerLink (Online service)<br/>Yer Numarası QA76.9 .A25<br/>Elektronik Erişim <a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-030-61559-8">Full Text Available From Springer Nature Computer Science 2021 Packages</a><br/>Format: Electronic Resources<br/>Quality, Reliability, Security and Robustness in Heterogeneous Systems 15th EAI International Conference, QShine 2019, Shenzhen, China, November 22-23, 2019, Proceedingsent://SD_ILS/0/SD_ILS:18859622024-09-20T01:28:11Z2024-09-20T01:28:11ZYazar Chu, Xiaowen. editor. Jiang, Hongbo. editor. (orcid)0000-0001-7372-2539 Li, Bo. editor. Wang, Dan. editor. Wang, Wei. editor.<br/>Yer Numarası TK5105.5 -5105.9<br/>Elektronik Erişim <a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-030-38819-5">Full Text Available From Springer Nature Computer Science 2020 Packages</a><br/>Format: Electronic Resources<br/>Applications and Techniques in Information Security 8th International Conference, ATIS 2017, Auckland, New Zealand, July 6-7, 2017, Proceedingsent://SD_ILS/0/SD_ILS:18836702024-09-20T01:28:11Z2024-09-20T01:28:11ZYazar Batten, Lynn. editor. (orcid)0000-0003-4525-2423 Kim, Dong Seong. editor. (orcid)0000-0003-2605-187X Zhang, Xuyun. editor. (orcid)0000-0001-7353-4159 Li, Gang. editor. (orcid)0000-0003-1583-641X SpringerLink (Online service)<br/>Yer Numarası QA76.9 .A25<br/>Elektronik Erişim <a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-981-10-5421-1">Full Text Available From Springer Nature Computer Science 2017 Packages</a><br/>Format: Electronic Resources<br/>Cyber and Chemical, Biological, Radiological, Nuclear, Explosives Challenges Threats and Counter Effortsent://SD_ILS/0/SD_ILS:18834102024-09-20T01:28:11Z2024-09-20T01:28:11ZYazar Martellini, Maurizio. editor. Malizia, Andrea. editor. SpringerLink (Online service)<br/>Yer Numarası QA76.9 .A25<br/>Elektronik Erişim <a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-319-62108-1">Full Text Available From Springer Nature Computer Science 2017 Packages</a><br/>Format: Electronic Resources<br/>Securing Office 365 Masterminding MDM and Compliance in the Cloudent://SD_ILS/0/SD_ILS:18780402024-09-20T01:28:11Z2024-09-20T01:28:11ZYazar Katzer, Matthew. author. SpringerLink (Online service)<br/>Yer Numarası QA76.76 .M52<br/>Elektronik Erişim <a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-1-4842-4230-8">Full Text Available From Springer Nature Professional and Applied Computing 2018 Packages</a><br/>Format: Electronic Resources<br/>Comprehensive VB .NET Debuggingent://SD_ILS/0/SD_ILS:19459082024-09-20T01:28:11Z2024-09-20T01:28:11ZYazar Pearce, Mark. author. SpringerLink (Online service)<br/>Yer Numarası QA76.76 .M52<br/>Elektronik Erişim <a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-1-4302-0778-8">Full Text Available From Springer Nature Professional and Applied Computing Archive Packages</a><br/>Format: Electronic Resources<br/>Cyber Threat Intelligenceent://SD_ILS/0/SD_ILS:18839752024-09-20T01:28:11Z2024-09-20T01:28:11ZYazar Dehghantanha, Ali. editor. (orcid)0000-0002-9294-7554 Conti, Mauro. editor. (orcid)0000-0002-3612-1934 Dargahi, Tooska. editor. SpringerLink (Online service)<br/>Yer Numarası QA76.9 .A25<br/>Elektronik Erişim <a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-319-73951-9">Full Text Available From Springer Nature Computer Science 2018 Packages</a><br/>Format: Electronic Resources<br/>Handbook of Big Data and IoT Securityent://SD_ILS/0/SD_ILS:18847752024-09-20T01:28:11Z2024-09-20T01:28:11ZYazar Dehghantanha, Ali. editor. (orcid)0000-0002-9294-7554 Choo, Kim-Kwang Raymond. editor. (orcid)0000-0001-9208-5336 SpringerLink (Online service)<br/>Yer Numarası QA76.9 .A25<br/>Elektronik Erişim <a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-030-10543-3">Full Text Available From Springer Nature Computer Science 2019 Packages</a><br/>Format: Electronic Resources<br/>13th International Conference on Computational Intelligence in Security for Information Systems (CISIS 2020)ent://SD_ILS/0/SD_ILS:18537282024-09-20T01:28:11Z2024-09-20T01:28:11ZYazar Herrero, Álvaro. editor. (orcid)0000-0002-2444-5384 Cambra, Carlos. editor. Urda, Daniel. editor. Sedano, Javier. editor. Quintián, Héctor. editor.<br/>Yer Numarası Q342<br/>Elektronik Erişim <a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-030-57805-3">Full Text Available From Springer Nature Intelligent Technologies and Robotics 2021 Packages</a><br/>Format: Electronic Resources<br/>Blockchain Cybersecurity, Trust and Privacyent://SD_ILS/0/SD_ILS:18854882024-09-20T01:28:11Z2024-09-20T01:28:11ZYazar Choo, Kim-Kwang Raymond. editor. (orcid)0000-0001-9208-5336 Dehghantanha, Ali. editor. Parizi, Reza M. editor. (orcid)0000-0002-0049-4296 SpringerLink (Online service)<br/>Yer Numarası QA76.9 .A25<br/>Elektronik Erişim <a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-030-38181-3">Full Text Available From Springer Nature Computer Science 2020 Packages</a><br/>Format: Electronic Resources<br/>Handbook of Computer Networks and Cyber Security Principles and Paradigmsent://SD_ILS/0/SD_ILS:18855622024-09-20T01:28:11Z2024-09-20T01:28:11ZYazar Gupta, Brij B. editor. Perez, Gregorio Martinez. editor. Agrawal, Dharma P. editor. Gupta, Deepak. editor. SpringerLink (Online service)<br/>Yer Numarası QA76.9 .A25<br/>Elektronik Erişim <a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-030-22277-2">Full Text Available From Springer Nature Computer Science 2020 Packages</a><br/>Format: Electronic Resources<br/>Mobile Internet Security Second International Symposium, MobiSec 2017, Jeju Island, Republic of Korea, October 19-22, 2017, Revised Selected Papersent://SD_ILS/0/SD_ILS:18852552024-09-20T01:28:11Z2024-09-20T01:28:11ZYazar You, Ilsun. editor. (orcid)0000-0002-0604-3445 Chen, Hsing-Chung. editor. Sharma, Vishal. editor. Kotenko, Igor. editor. (orcid)0000-0001-6859-7120 SpringerLink (Online service)<br/>Yer Numarası QA76.9 .A25<br/>Elektronik Erişim <a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-981-13-3732-1">Full Text Available From Springer Nature Computer Science 2019 Packages</a><br/>Format: Electronic Resources<br/>Cisco Routers for the Small Business A Practical Guide for IT Professionalsent://SD_ILS/0/SD_ILS:18763352024-09-20T01:28:11Z2024-09-20T01:28:11ZYazar Neumann, Jason. author. SpringerLink (Online service)<br/>Yer Numarası QA76.9 .A25<br/>Elektronik Erişim <a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-1-4302-1852-4">Full Text Available From Springer Nature Professional and Applied Computing 2009 Packages</a><br/>Format: Electronic Resources<br/>Moving Target Defense for Distributed Systemsent://SD_ILS/0/SD_ILS:18828352024-09-20T01:28:11Z2024-09-20T01:28:11ZYazar Shetty, Sachin. author. Yuchi, Xuebiao. author. Song, Min. author. SpringerLink (Online service)<br/>Yer Numarası TK5105.5 -5105.9<br/>Elektronik Erişim <a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-319-31032-9">Full Text Available From Springer Nature Computer Science 2016 Packages</a><br/>Format: Electronic Resources<br/>Physical Layer Approaches for Securing Wireless Communication Systemsent://SD_ILS/0/SD_ILS:18816892024-09-20T01:28:11Z2024-09-20T01:28:11ZYazar Wen, Hong. author. SpringerLink (Online service)<br/>Yer Numarası TK5105.5 -5105.9<br/>Elektronik Erişim <a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-1-4614-6510-2">Full Text Available From Springer Nature Computer Science 2013 Packages</a><br/>Format: Electronic Resources<br/>Cryptographic Hardware and Embedded Systems -- CHES 2013 15th International Workshop, Santa Barbara, CA, USA, August 20-23, 2013, Proceedingsent://SD_ILS/0/SD_ILS:18429102024-09-20T01:28:11Z2024-09-20T01:28:11ZYazar Bertoni, Guido Marco. editor. Coron, Jean-Sébastien. editor. SpringerLink (Online service)<br/>Yer Numarası QA268<br/>Elektronik Erişim <a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-642-40349-1">Full Text Available From Springer Nature Computer Science 2013 Packages</a><br/>Format: Electronic Resources<br/>Information and Communications Security 15th International Conference, ICICS 2013, Beijing, China, November 20-22, 2013, Proceedingsent://SD_ILS/0/SD_ILS:18428922024-09-20T01:28:11Z2024-09-20T01:28:11ZYazar Qing, Sihan. editor. Zhou, Jianying. editor. Liu, Dongmei. editor. SpringerLink (Online service)<br/>Yer Numarası QA268<br/>Elektronik Erişim <a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-319-02726-5">Full Text Available From Springer Nature Computer Science 2013 Packages</a><br/>Format: Electronic Resources<br/>Automotive Cyber Security Introduction, Challenges, and Standardizationent://SD_ILS/0/SD_ILS:18139612024-09-20T01:28:11Z2024-09-20T01:28:11ZYazar Kim, Shiho. author. Shrestha, Rakesh. author. SpringerLink (Online service)<br/>Yer Numarası TL1 -483<br/>Elektronik Erişim <a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-981-15-8053-6">Full Text Available From Springer Nature Engineering 2020 Packages</a><br/>Format: Electronic Resources<br/>A Practical Guide to TPM 2.0 Using the Trusted Platform Module in the New Age of Securityent://SD_ILS/0/SD_ILS:18773102024-09-20T01:28:11Z2024-09-20T01:28:11ZYazar Arthur, Will. author. Challener, David. author. SpringerLink (Online service)<br/>Yer Numarası QA76.9 .A25<br/>Elektronik Erişim <a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-1-4302-6584-9">Full Text Available From Springer Nature Professional and Applied Computing 2015 Packages</a><br/>Format: Electronic Resources<br/>Proceedings of the First International Conference on Intelligent Computing and Communicationent://SD_ILS/0/SD_ILS:18107702024-09-20T01:28:11Z2024-09-20T01:28:11ZYazar Mandal, Jyotsna Kumar. editor. Satapathy, Suresh Chandra. editor. Sanyal, Manas Kumar. editor. Bhateja, Vikrant. editor. SpringerLink (Online service)<br/>Yer Numarası Q342<br/>Elektronik Erişim <a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-981-10-2035-3">Full Text Available From Springer Nature Engineering 2017 Packages</a><br/>Format: Electronic Resources<br/>Intel Trusted Execution Technology for Server Platforms A Guide to More Secure Datacentersent://SD_ILS/0/SD_ILS:18770412024-09-20T01:28:11Z2024-09-20T01:28:11ZYazar Futral, William. author. Greene, James. author. SpringerLink (Online service)<br/>Yer Numarası QA76.9 .A25<br/>Elektronik Erişim <a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-1-4302-6149-0">Full Text Available From Springer Nature Professional and Applied Computing 2013 Packages</a><br/>Format: Electronic Resources<br/>Python Testing with Selenium Learn to Implement Different Testing Techniques Using the Selenium WebDriverent://SD_ILS/0/SD_ILS:18789452024-09-20T01:28:11Z2024-09-20T01:28:11ZYazar Raghavendra, Sujay. author. SpringerLink (Online service)<br/>Yer Numarası QA76.73 .P98<br/>Elektronik Erişim <a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-1-4842-6249-8">Full Text Available From Springer Nature Professional and Applied Computing 2021 Packages</a><br/>Format: Electronic Resources<br/>Platform Embedded Security Technology Revealed Safeguarding the Future of Computing with Intel Embedded Security and Management Engineent://SD_ILS/0/SD_ILS:18771262024-09-20T01:28:11Z2024-09-20T01:28:11ZYazar Ruan, Xiaoyu. author. SpringerLink (Online service)<br/>Yer Numarası QA76.9 .A25<br/>Elektronik Erişim <a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-1-4302-6572-6">Full Text Available From Springer Nature Professional and Applied Computing 2014 Packages</a><br/>Format: Electronic Resources<br/>Advances in Cryptology - EUROCRYPT 2014 33rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Copenhagen, Denmark, May 11-15, 2014, Proceedingsent://SD_ILS/0/SD_ILS:18433292024-09-20T01:28:11Z2024-09-20T01:28:11ZYazar Nguyen, Phong Q. editor. Oswald, Elisabeth. editor. SpringerLink (Online service)<br/>Yer Numarası QA268<br/>Elektronik Erişim <a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-642-55220-5">Full Text Available From Springer Nature Computer Science 2014 Packages</a><br/>Format: Electronic Resources<br/>Partially Homomorphic Encryptionent://SD_ILS/0/SD_ILS:18866552024-09-20T01:28:11Z2024-09-20T01:28:11ZYazar Koç, Çetin Kaya. author. Özdemir, Funda. author. Ödemiş Özger, Zeynep. author. SpringerLink (Online service)<br/>Yer Numarası QA268<br/>Elektronik Erişim <a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-030-87629-6">Full Text Available From Springer Nature Computer Science 2021 Packages</a><br/>Format: Electronic Resources<br/>Mathematical Theory of Advanced Computingent://SD_ILS/0/SD_ILS:18856602024-09-20T01:28:11Z2024-09-20T01:28:11ZYazar Osterhage, Wolfgang W. author. SpringerLink (Online service)<br/>Yer Numarası QA76.9 .A25<br/>Elektronik Erişim <a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-662-60359-8">Full Text Available From Springer Nature Computer Science 2020 Packages</a><br/>Format: Electronic Resources<br/>Cyber-Physical Attack Recovery Procedures A Step-by-Step Preparation and Response Guideent://SD_ILS/0/SD_ILS:18776952024-09-20T01:28:11Z2024-09-20T01:28:11ZYazar Ayala, Luis. author. SpringerLink (Online service)<br/>Yer Numarası QA76.9 .A25<br/>Elektronik Erişim <a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-1-4842-2065-8">Full Text Available From Springer Nature Professional and Applied Computing 2016 Packages</a><br/>Format: Electronic Resources<br/>Security in Network Codingent://SD_ILS/0/SD_ILS:18830162024-09-20T01:28:11Z2024-09-20T01:28:11ZYazar Zhang, Peng. author. Lin, Chuang. author. SpringerLink (Online service)<br/>Yer Numarası QA76.9 .A25<br/>Elektronik Erişim <a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-319-31083-1">Full Text Available From Springer Nature Computer Science 2016 Packages</a><br/>Format: Electronic Resources<br/>Proceedings of 6th International Conference on Big Data and Cloud Computing Challenges ICBCC 2019, UMKC, Kansas City, USAent://SD_ILS/0/SD_ILS:18535432024-09-20T01:28:11Z2024-09-20T01:28:11ZYazar Vijayakumar, V. editor. Neelanarayanan, V. editor. Rao, Praveen. editor. Light, Janet. editor. SpringerLink (Online service)<br/>Yer Numarası TA345 -345.5<br/>Elektronik Erişim <a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-981-32-9889-7">Full Text Available From Springer Nature Intelligent Technologies and Robotics 2020 Packages</a><br/>Format: Electronic Resources<br/>The Art of War for Computer Securityent://SD_ILS/0/SD_ILS:18845112024-09-20T01:28:11Z2024-09-20T01:28:11ZYazar Madsen, Tom. author. SpringerLink (Online service)<br/>Yer Numarası QA76.9 .A25<br/>Elektronik Erişim <a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-030-28569-2">Full Text Available From Springer Nature Computer Science 2019 Packages</a><br/>Format: Electronic Resources<br/>Advances in Information and Computer Security 16th International Workshop on Security, IWSEC 2021, Virtual Event, September 8-10, 2021, Proceedingsent://SD_ILS/0/SD_ILS:18862432024-09-20T01:28:11Z2024-09-20T01:28:11ZYazar Nakanishi, Toru. editor. Nojima, Ryo. editor. SpringerLink (Online service)<br/>Yer Numarası QA76.9 .A25<br/>Elektronik Erişim <a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-030-85987-9">Full Text Available From Springer Nature Computer Science 2021 Packages</a><br/>Format: Electronic Resources<br/>Proceedings of the 2nd International Conference on Data Engineering and Communication Technology ICDECT 2017ent://SD_ILS/0/SD_ILS:18128382024-09-20T01:28:11Z2024-09-20T01:28:11ZYazar Kulkarni, Anand J. editor. Satapathy, Suresh Chandra. editor. Kang, Tai. editor. Kashan, Ali Husseinzadeh. editor. SpringerLink (Online service)<br/>Yer Numarası Q342<br/>Elektronik Erişim <a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-981-13-1610-4">Full Text Available From Springer Nature Engineering 2019 Packages</a><br/>Format: Electronic Resources<br/>Digital Fingerprintingent://SD_ILS/0/SD_ILS:18829402024-09-20T01:28:11Z2024-09-20T01:28:11ZYazar Wang, Cliff. editor. Gerdes, Ryan M. editor. Guan, Yong. editor. Kasera, Sneha Kumar. editor. SpringerLink (Online service)<br/>Yer Numarası QA76.9 .A25<br/>Elektronik Erişim <a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-1-4939-6601-1">Full Text Available From Springer Nature Computer Science 2016 Packages</a><br/>Format: Electronic Resources<br/>Digital Defense A Cybersecurity Primerent://SD_ILS/0/SD_ILS:18088692024-09-20T01:28:11Z2024-09-20T01:28:11ZYazar Pelton, Joseph. author. Singh, Indu B. author. SpringerLink (Online service)<br/>Yer Numarası T1 -995<br/>Elektronik Erişim <a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-319-19953-5">Full Text Available From Springer Nature Engineering 2015 Packages</a><br/>Format: Electronic Resources<br/>Mobility Data Management and Explorationent://SD_ILS/0/SD_ILS:18822832024-09-20T01:28:11Z2024-09-20T01:28:11ZYazar Pelekis, Nikos. author. Theodoridis, Yannis. author. SpringerLink (Online service)<br/>Yer Numarası QA76.9 .D3<br/>Elektronik Erişim <a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-1-4939-0392-4">Full Text Available From Springer Nature Computer Science 2014 Packages</a><br/>Format: Electronic Resources<br/>Cryptography and Coding 16th IMA International Conference, IMACC 2017, Oxford, UK, December 12-14, 2017, Proceedingsent://SD_ILS/0/SD_ILS:18449642024-09-20T01:28:11Z2024-09-20T01:28:11ZYazar O'Neill, Máire. editor. SpringerLink (Online service)<br/>Yer Numarası QA268<br/>Elektronik Erişim <a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-319-71045-7">Full Text Available From Springer Nature Computer Science 2017 Packages</a><br/>Format: Electronic Resources<br/>New Approaches for Security, Privacy and Trust in Complex Environments Proceedings of the IFIP TC 11 22nd International Information Security Conference (SEC 2007), 14-16 May 2007, Sandton, South Africaent://SD_ILS/0/SD_ILS:18796482024-09-20T01:28:11Z2024-09-20T01:28:11ZYazar Venter, Hein. editor. Eloff, Mariki. editor. Labuschagne, Les. editor. Eloff, Jan. editor. Solms, Rossouw von. editor.<br/>Yer Numarası QA268<br/>Elektronik Erişim <a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-0-387-72367-9">Full Text Available From Springer Nature Computer Science 2007 Packages</a><br/>Format: Electronic Resources<br/>Security in Smart Cities: Models, Applications, and Challengesent://SD_ILS/0/SD_ILS:18529782024-09-20T01:28:11Z2024-09-20T01:28:11ZYazar Hassanien, Aboul Ella. editor. Elhoseny, Mohamed. editor. Ahmed, Syed Hassan. editor. Singh, Amit Kumar. editor. SpringerLink (Online service)<br/>Yer Numarası Q342<br/>Elektronik Erişim <a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-030-01560-2">Full Text Available From Springer Nature Intelligent Technologies and Robotics 2019 Packages</a><br/>Format: Electronic Resources<br/>The Privacy Engineer's Manifesto Getting from Policy to Code to QA to Valueent://SD_ILS/0/SD_ILS:18771412024-09-20T01:28:11Z2024-09-20T01:28:11ZYazar Dennedy, Michelle. author. Fox, Jonathan. author. Finneran, Tom. author. SpringerLink (Online service)<br/>Yer Numarası QA76.9 .A25<br/>Elektronik Erişim <a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-1-4302-6356-2">Full Text Available From Springer Nature Professional and Applied Computing 2014 Packages</a><br/>Format: Electronic Resources<br/>Wireless Sensor Networks Security, Coverage, and Localizationent://SD_ILS/0/SD_ILS:18828292024-09-20T01:28:11Z2024-09-20T01:28:11ZYazar Selmic, Rastko R. author. Phoha, Vir V. author. Serwadda, Abdul. author. SpringerLink (Online service)<br/>Yer Numarası TK5105.5 -5105.9<br/>Elektronik Erişim <a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-319-46769-6">Full Text Available From Springer Nature Computer Science 2016 Packages</a><br/>Format: Electronic Resources<br/>Beginning Ethical Hacking with Pythonent://SD_ILS/0/SD_ILS:18777512024-09-20T01:28:11Z2024-09-20T01:28:11ZYazar Sinha, Sanjib. author. SpringerLink (Online service)<br/>Yer Numarası QA76.73 .P98<br/>Elektronik Erişim <a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-1-4842-2541-7">Full Text Available From Springer Nature Professional and Applied Computing 2017 Packages</a><br/>Format: Electronic Resources<br/>Information Security and Cryptology - ICISC 2017 20th International Conference, Seoul, South Korea, November 29 - December 1, 2017, Revised Selected Papersent://SD_ILS/0/SD_ILS:18457892024-09-20T01:28:11Z2024-09-20T01:28:11ZYazar Kim, Howon. editor. Kim, Dong-Chan. editor. SpringerLink (Online service)<br/>Yer Numarası QA76.9 .A25<br/>Elektronik Erişim <a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-319-78556-1">Full Text Available From Springer Nature Computer Science 2018 Packages</a><br/>Format: Electronic Resources<br/>Risk Assessment and Risk-Driven Testing First International Workshop, RISK 2013, Held in Conjunction with ICTSS 2013, Istanbul, Turkey, November 12, 2013. Revised Selected Papersent://SD_ILS/0/SD_ILS:18432012024-09-20T01:28:11Z2024-09-20T01:28:11ZYazar Bauer, Thomas. editor. Großmann, Jürgen. editor. Seehusen, Fredrik. editor. Stølen, Ketil. editor. Wendland, Marc-Florian. editor.<br/>Yer Numarası QA76.758<br/>Elektronik Erişim <a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-319-07076-6">Full Text Available From Springer Nature Computer Science 2014 Packages</a><br/>Format: Electronic Resources<br/>Introduction to Security Reductionent://SD_ILS/0/SD_ILS:18837512024-09-20T01:28:11Z2024-09-20T01:28:11ZYazar Guo, Fuchun. author. (orcid)0000-0001-6939-7710 Susilo, Willy. author. (orcid)0000-0002-1562-5105 Mu, Yi. author. SpringerLink (Online service)<br/>Yer Numarası QA76.9 .D35<br/>Elektronik Erişim <a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-319-93049-7">Full Text Available From Springer Nature Computer Science 2018 Packages</a><br/>Format: Electronic Resources<br/>Challenges in the IoT and Smart Environments A Practitioners' Guide to Security, Ethics and Criminal Threatsent://SD_ILS/0/SD_ILS:18869922024-09-20T01:28:11Z2024-09-20T01:28:11ZYazar Montasari, Reza. editor. Jahankhani, Hamid. editor. Al-Khateeb, Haider. editor. SpringerLink (Online service)<br/>Yer Numarası QA76.9 .A25<br/>Elektronik Erişim <a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-030-87166-6">Full Text Available From Springer Nature Computer Science 2021 Packages</a><br/>Format: Electronic Resources<br/>Security Engineering for Service-Oriented Architecturesent://SD_ILS/0/SD_ILS:18800882024-09-20T01:28:11Z2024-09-20T01:28:11ZYazar Hafner, Michael. author. Breu, Ruth. author. SpringerLink (Online service)<br/>Yer Numarası QA76.758<br/>Elektronik Erişim <a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-540-79539-1">Full Text Available From Springer Nature Computer Science 2009 Packages</a><br/>Format: Electronic Resources<br/>Simulation and Synthesis in Medical Imaging Third International Workshop, SASHIMI 2018, Held in Conjunction with MICCAI 2018, Granada, Spain, September 16, 2018, Proceedingsent://SD_ILS/0/SD_ILS:18456102024-09-20T01:28:11Z2024-09-20T01:28:11ZYazar Gooya, Ali. editor. (orcid)0000-0001-5135-4800 Goksel, Orcun. editor. (orcid)0000-0002-8639-7373 Oguz, Ipek. editor. (orcid)0000-0002-1403-2420 Burgos, Ninon. editor. (orcid)0000-0002-4668-2006 SpringerLink (Online service)<br/>Yer Numarası TA1634<br/>Elektronik Erişim <a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-030-00536-8">Full Text Available From Springer Nature Computer Science 2018 Packages</a><br/>Format: Electronic Resources<br/>Mobile Internet Security First International Symposium, MobiSec 2016, Taichung, Taiwan, July 14-15, 2016, Revised Selected Papersent://SD_ILS/0/SD_ILS:18839402024-09-20T01:28:11Z2024-09-20T01:28:11ZYazar You, Ilsun. editor. (orcid)0000-0002-0604-3445 Leu, Fang-Yie. editor. Chen, Hsing-Chung. editor. Kotenko, Igor. editor. (orcid)0000-0001-6859-7120 SpringerLink (Online service)<br/>Yer Numarası QA76.9 .A25<br/>Elektronik Erişim <a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-981-10-7850-7">Full Text Available From Springer Nature Computer Science 2018 Packages</a><br/>Format: Electronic Resources<br/>Information Security of Highly Critical Wireless Networksent://SD_ILS/0/SD_ILS:18833772024-09-20T01:28:11Z2024-09-20T01:28:11ZYazar Martellini, Maurizio. author. Abaimov, Stanislav. author. Gaycken, Sandro. author. Wilson, Clay. author. SpringerLink (Online service)<br/>Yer Numarası QA76.9 .A25<br/>Elektronik Erişim <a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-319-52905-9">Full Text Available From Springer Nature Computer Science 2017 Packages</a><br/>Format: Electronic Resources<br/>Emerging Technology in Modelling and Graphics Proceedings of IEM Graph 2018ent://SD_ILS/0/SD_ILS:18136922024-09-20T01:28:11Z2024-09-20T01:28:11ZYazar Mandal, Jyotsna Kumar. editor. Bhattacharya, Debika. editor. SpringerLink (Online service)<br/>Yer Numarası TK5102.9<br/>Elektronik Erişim <a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-981-13-7403-6">Full Text Available From Springer Nature Engineering 2020 Packages</a><br/>Format: Electronic Resources<br/>Android Application Security A Semantics and Context-Aware Approachent://SD_ILS/0/SD_ILS:18830652024-09-20T01:28:11Z2024-09-20T01:28:11ZYazar Zhang, Mu. author. Yin, Heng. author. SpringerLink (Online service)<br/>Yer Numarası QA76.9 .A25<br/>Elektronik Erişim <a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-319-47812-8">Full Text Available From Springer Nature Computer Science 2016 Packages</a><br/>Format: Electronic Resources<br/>Cybersecurity Systems for Human Cognition Augmentationent://SD_ILS/0/SD_ILS:18821752024-09-20T01:28:11Z2024-09-20T01:28:11ZYazar Pino, Robinson E. editor. Kott, Alexander. editor. Shevenell, Michael. editor. SpringerLink (Online service)<br/>Yer Numarası QA76.9 .A25<br/>Elektronik Erişim <a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-319-10374-7">Full Text Available From Springer Nature Computer Science 2014 Packages</a><br/>Format: Electronic Resources<br/>Iris Biometrics From Segmentation to Template Securityent://SD_ILS/0/SD_ILS:18816572024-09-20T01:28:11Z2024-09-20T01:28:11ZYazar Rathgeb, Christian. author. Uhl, Andreas. author. (orcid)0000-0002-5921-8755 Wild, Peter. author. SpringerLink (Online service)<br/>Yer Numarası TK7882 .B56<br/>Elektronik Erişim <a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-1-4614-5571-4">Full Text Available From Springer Nature Computer Science 2013 Packages</a><br/>Format: Electronic Resources<br/>Cognitive Radio Oriented Wireless Networks 13th EAI International Conference, CROWNCOM 2018, Ghent, Belgium, September 18-20, 2018, Proceedingsent://SD_ILS/0/SD_ILS:18850592024-09-20T01:28:11Z2024-09-20T01:28:11ZYazar Moerman, Ingrid. editor. (orcid)0000-0003-2377-3674 Marquez-Barja, Johann. editor. (orcid)0000-0001-5660-3597 Shahid, Adnan. editor. (orcid)0000-0003-1943-6261 Liu, Wei. editor. Giannoulis, Spilios. editor. (orcid)0000-0002-3190-8770<br/>Yer Numarası TK5105.5 -5105.9<br/>Elektronik Erişim <a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-030-05490-8">Full Text Available From Springer Nature Computer Science 2019 Packages</a><br/>Format: Electronic Resources<br/>Internet of Things Security: Principles and Practiceent://SD_ILS/0/SD_ILS:18864862024-09-20T01:28:11Z2024-09-20T01:28:11ZYazar Tang, Qinghao. author. Du, Fan. author. SpringerLink (Online service)<br/>Yer Numarası TK5105.59<br/>Elektronik Erişim <a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-981-15-9942-2">Full Text Available From Springer Nature Computer Science 2021 Packages</a><br/>Format: Electronic Resources<br/>Security and Privacy for Mobile Healthcare Networksent://SD_ILS/0/SD_ILS:18825702024-09-20T01:28:11Z2024-09-20T01:28:11ZYazar Zhang, Kuan. author. Shen, Xuemin (Sherman). author. (orcid)0000-0002-4140-287X SpringerLink (Online service)<br/>Yer Numarası TK5105.5 -5105.9<br/>Elektronik Erişim <a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-319-24717-5">Full Text Available From Springer Nature Computer Science 2015 Packages</a><br/>Format: Electronic Resources<br/>Proceedings of First International Conference on Computing, Communications, and Cyber-Security (IC4S 2019)ent://SD_ILS/0/SD_ILS:18536822024-09-20T01:28:11Z2024-09-20T01:28:11ZYazar Singh, Pradeep Kumar. editor. (orcid)0000-0002-7676-9014 Pawłowski, Wiesław. editor. Tanwar, Sudeep. editor. Kumar, Neeraj. editor. Rodrigues, Joel J. P. C. editor. (orcid)0000-0001-8657-3800<br/>Yer Numarası Q342<br/>Elektronik Erişim <a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-981-15-3369-3">Full Text Available From Springer Nature Intelligent Technologies and Robotics 2020 Packages</a><br/>Format: Electronic Resources<br/>Architecture for Blockchain Applicationsent://SD_ILS/0/SD_ILS:18846662024-09-20T01:28:11Z2024-09-20T01:28:11ZYazar Xu, Xiwei. author. Weber, Ingo. author. (orcid)0000-0002-4833-5921 Staples, Mark. author. SpringerLink (Online service)<br/>Yer Numarası QA76.758<br/>Elektronik Erişim <a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-030-03035-3">Full Text Available From Springer Nature Computer Science 2019 Packages</a><br/>Format: Electronic Resources<br/>Secure ICT Service Provisioning for Cloud, Mobile and Beyond ESARIS: The Answer to the Demands of Industrialized IT Production Balancing Between Buyers and Providersent://SD_ILS/0/SD_ILS:18835322024-09-20T01:28:11Z2024-09-20T01:28:11ZYazar von Faber, Eberhard. author. Behnsen, Wolfgang. author. SpringerLink (Online service)<br/>Yer Numarası QA76.9 .A25<br/>Elektronik Erişim <a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-658-16482-9">Full Text Available From Springer Nature Computer Science 2017 Packages</a><br/>Format: Electronic Resources<br/>Combatting Cybercrime and Cyberterrorism Challenges, Trends and Prioritiesent://SD_ILS/0/SD_ILS:18512262024-09-20T01:28:11Z2024-09-20T01:28:11ZYazar Akhgar, Babak. editor. Brewster, Ben. editor. SpringerLink (Online service)<br/>Yer Numarası HV6772 -6773.3<br/>Elektronik Erişim <a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-319-38930-1">Full Text Available From Springer Nature Law and Criminology 2016 Packages</a><br/>Format: Electronic Resources<br/>Proactive and Dynamic Network Defenseent://SD_ILS/0/SD_ILS:18849712024-09-20T01:28:11Z2024-09-20T01:28:11ZYazar Wang, Cliff. editor. Lu, Zhuo. editor. SpringerLink (Online service)<br/>Yer Numarası QA76.9 .A25<br/>Elektronik Erişim <a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-030-10597-6">Full Text Available From Springer Nature Computer Science 2019 Packages</a><br/>Format: Electronic Resources<br/>Cybersecurity Lexiconent://SD_ILS/0/SD_ILS:18776002024-09-20T01:28:11Z2024-09-20T01:28:11ZYazar Ayala, Luis. author. SpringerLink (Online service)<br/>Yer Numarası QA76.9 .A25<br/>Elektronik Erişim <a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-1-4842-2068-9">Full Text Available From Springer Nature Professional and Applied Computing 2016 Packages</a><br/>Format: Electronic Resources<br/>Advanced Computing and Systems for Security Volume Fourent://SD_ILS/0/SD_ILS:18100772024-09-20T01:28:11Z2024-09-20T01:28:11ZYazar Chaki, Rituparna. editor. Saeed, Khalid. editor. Cortesi, Agostino. editor. Chaki, Nabendu. editor. SpringerLink (Online service)<br/>Yer Numarası Q342<br/>Elektronik Erişim <a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-981-10-3391-9">Full Text Available From Springer Nature Engineering 2017 Packages</a><br/>Format: Electronic Resources<br/>Security-Aware Device-to-Device Communications Underlaying Cellular Networksent://SD_ILS/0/SD_ILS:18830982024-09-20T01:28:11Z2024-09-20T01:28:11ZYazar Zhang, Aiqing. author. Zhou, Liang. author. Wang, Lei. author. SpringerLink (Online service)<br/>Yer Numarası TK5105.5 -5105.9<br/>Elektronik Erişim <a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-319-32458-6">Full Text Available From Springer Nature Computer Science 2016 Packages</a><br/>Format: Electronic Resources<br/>Big Data and Social Media Analytics Trending Applicationsent://SD_ILS/0/SD_ILS:18943602024-09-20T01:28:11Z2024-09-20T01:28:11ZYazar Çakırtaş, Mehmet. editor. Ozdemir, Mehmet Kemal. editor. SpringerLink (Online service)<br/>Yer Numarası QA76.9 .Q36<br/>Elektronik Erişim <a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-030-67044-3">Full Text Available From Springer Nature Mathematics and Statistics 2021 Packages</a><br/>Format: Electronic Resources<br/>SmartData Privacy Meets Evolutionary Roboticsent://SD_ILS/0/SD_ILS:18814522024-09-20T01:28:11Z2024-09-20T01:28:11ZYazar Harvey, Inman. editor. Cavoukian, Ann. editor. Tomko, George. editor. Borrett, Don. editor. Kwan, Hon. editor.<br/>Yer Numarası QA76.9 .A25<br/>Elektronik Erişim <a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-1-4614-6409-9">Full Text Available From Springer Nature Computer Science 2013 Packages</a><br/>Format: Electronic Resources<br/>Intelligent Information Processing IX 10th IFIP TC 12 International Conference, IIP 2018, Nanning, China, October 19-22, 2018, Proceedingsent://SD_ILS/0/SD_ILS:18842152024-09-20T01:28:11Z2024-09-20T01:28:11ZYazar Shi, Zhongzhi. editor. Mercier-Laurent, Eunika. editor. (orcid)0000-0003-2303-7263 Li, Jiuyong. editor. SpringerLink (Online service)<br/>Yer Numarası Q334 -342<br/>Elektronik Erişim <a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-030-00828-4">Full Text Available From Springer Nature Computer Science 2018 Packages</a><br/>Format: Electronic Resources<br/>Access Control Management in Cloud Environmentsent://SD_ILS/0/SD_ILS:18858172024-09-20T01:28:11Z2024-09-20T01:28:11ZYazar Wang, Hua. author. Cao, Jinli. author. Zhang, Yanchun. author. (orcid)0000-0002-5094-5980 SpringerLink (Online service)<br/>Yer Numarası QA76.9 .A25<br/>Elektronik Erişim <a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-030-31729-4">Full Text Available From Springer Nature Computer Science 2020 Packages</a><br/>Format: Electronic Resources<br/>Security of Cyber-Physical Systems Vulnerability and Impactent://SD_ILS/0/SD_ILS:18857242024-09-20T01:28:11Z2024-09-20T01:28:11ZYazar Karimipour, Hadis. editor. Srikantha, Pirathayini. editor. Farag, Hany. editor. Wei-Kocsis, Jin. editor. SpringerLink (Online service)<br/>Yer Numarası QA76.9 .A25<br/>Elektronik Erişim <a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-030-45541-5">Full Text Available From Springer Nature Computer Science 2020 Packages</a><br/>Format: Electronic Resources<br/>Computing and Network Sustainability Proceedings of IRSCNS 2016ent://SD_ILS/0/SD_ILS:18104182024-09-20T01:28:11Z2024-09-20T01:28:11ZYazar Vishwakarma, H.R . editor. Akashe, Shyam. editor. SpringerLink (Online service)<br/>Yer Numarası TK5101 -5105.9<br/>Elektronik Erişim <a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-981-10-3935-5">Full Text Available From Springer Nature Engineering 2017 Packages</a><br/>Format: Electronic Resources<br/>Advanced Applications of Blockchain Technologyent://SD_ILS/0/SD_ILS:18533462024-09-20T01:28:11Z2024-09-20T01:28:11ZYazar Kim, Shiho. editor. Deka, Ganesh Chandra. editor. SpringerLink (Online service)<br/>Yer Numarası Q342<br/>Elektronik Erişim <a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-981-13-8775-3">Full Text Available From Springer Nature Intelligent Technologies and Robotics 2020 Packages</a><br/>Format: Electronic Resources<br/>Advanced Computing and Systems for Security Volume Threeent://SD_ILS/0/SD_ILS:18102812024-09-20T01:28:11Z2024-09-20T01:28:11ZYazar Chaki, Rituparna. editor. Saeed, Khalid. editor. Cortesi, Agostino. editor. Chaki, Nabendu. editor. SpringerLink (Online service)<br/>Yer Numarası Q342<br/>Elektronik Erişim <a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-981-10-3409-1">Full Text Available From Springer Nature Engineering 2017 Packages</a><br/>Format: Electronic Resources<br/>Oracle Database Application Security With Oracle Internet Directory, Oracle Access Manager, and Oracle Identity Managerent://SD_ILS/0/SD_ILS:18784572024-09-20T01:28:11Z2024-09-20T01:28:11ZYazar Mustafa, Osama. author. Lockard, Robert P. author. SpringerLink (Online service)<br/>Yer Numarası QA76.9 .A25<br/>Elektronik Erişim <a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-1-4842-5367-0">Full Text Available From Springer Nature Professional and Applied Computing 2019 Packages</a><br/>Format: Electronic Resources<br/>Cyberspace Risks and Benefits for Society, Security and Developmentent://SD_ILS/0/SD_ILS:18514032024-09-20T01:28:11Z2024-09-20T01:28:11ZYazar Ramírez, J. Martín. editor. García-Segura, Luis A. editor. SpringerLink (Online service)<br/>Yer Numarası HV6772 -6773.3<br/>Elektronik Erişim <a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-319-54975-0">Full Text Available From Springer Nature Law and Criminology 2017 Packages</a><br/>Format: Electronic Resources<br/>Cybersecurity in Germanyent://SD_ILS/0/SD_ILS:18837552024-09-20T01:28:11Z2024-09-20T01:28:11ZYazar Schallbruch, Martin. author. Skierka, Isabel. author. SpringerLink (Online service)<br/>Yer Numarası QA76.9 .A25<br/>Elektronik Erişim <a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-319-90014-8">Full Text Available From Springer Nature Computer Science 2018 Packages</a><br/>Format: Electronic Resources<br/>Advanced Computing and Systems for Security Volume 1ent://SD_ILS/0/SD_ILS:18097322024-09-20T01:28:11Z2024-09-20T01:28:11ZYazar Chaki, Rituparna. editor. Cortesi, Agostino. editor. Saeed, Khalid. editor. Chaki, Nabendu. editor. SpringerLink (Online service)<br/>Yer Numarası Q342<br/>Elektronik Erişim <a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-81-322-2650-5">Full Text Available From Springer Nature Engineering 2016 Packages</a><br/>Format: Electronic Resources<br/>Physical Layer Security in Wireless Cooperative Networksent://SD_ILS/0/SD_ILS:18120082024-09-20T01:28:11Z2024-09-20T01:28:11ZYazar Wang, Li. author. SpringerLink (Online service)<br/>Yer Numarası TK5101 -5105.9<br/>Elektronik Erişim <a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-319-61863-0">Full Text Available From Springer Nature Engineering 2018 Packages</a><br/>Format: Electronic Resources<br/>Proceedings of the International Conference on Data Engineering and Communication Technology ICDECT 2016, Volume 2ent://SD_ILS/0/SD_ILS:18108962024-09-20T01:28:11Z2024-09-20T01:28:11ZYazar Satapathy, Suresh Chandra. editor. Bhateja, Vikrant. editor. Joshi, Amit. editor. SpringerLink (Online service)<br/>Yer Numarası Q342<br/>Elektronik Erişim <a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-981-10-1678-3">Full Text Available From Springer Nature Engineering 2017 Packages</a><br/>Format: Electronic Resources<br/>Proceedings of the International Conference on Data Engineering and Communication Technology ICDECT 2016, Volume 1ent://SD_ILS/0/SD_ILS:18103522024-09-20T01:28:11Z2024-09-20T01:28:11ZYazar Satapathy, Suresh Chandra. editor. Bhateja, Vikrant. editor. Joshi, Amit. editor. SpringerLink (Online service)<br/>Yer Numarası Q342<br/>Elektronik Erişim <a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-981-10-1675-2">Full Text Available From Springer Nature Engineering 2017 Packages</a><br/>Format: Electronic Resources<br/>Big Data Processing Using Spark in Cloudent://SD_ILS/0/SD_ILS:18123042024-09-20T01:28:11Z2024-09-20T01:28:11ZYazar Mittal, Mamta. editor. (orcid)0000-0003-0490-4413 Balas, Valentina E. editor. Goyal, Lalit Mohan. editor. Kumar, Raghvendra. editor. SpringerLink (Online service)<br/>Yer Numarası QA76.9 .B45<br/>Elektronik Erişim <a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-981-13-0550-4">Full Text Available From Springer Nature Engineering 2019 Packages</a><br/>Format: Electronic Resources<br/>Advanced Computing and Systems for Security Volume 2ent://SD_ILS/0/SD_ILS:18093952024-09-20T01:28:11Z2024-09-20T01:28:11ZYazar Chaki, Rituparna. editor. Cortesi, Agostino. editor. Saeed, Khalid. editor. Chaki, Nabendu. editor. SpringerLink (Online service)<br/>Yer Numarası Q342<br/>Elektronik Erişim <a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-81-322-2653-6">Full Text Available From Springer Nature Engineering 2016 Packages</a><br/>Format: Electronic Resources<br/>Structured Peer-to-Peer Systems Fundamentals of Hierarchical Organization, Routing, Scaling, and Securityent://SD_ILS/0/SD_ILS:18816662024-09-20T01:28:11Z2024-09-20T01:28:11ZYazar Korzun, Dmitry. author. Gurtov, Andrei. author. SpringerLink (Online service)<br/>Yer Numarası TK5105.5 -5105.9<br/>Elektronik Erişim <a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-1-4614-5483-0">Full Text Available From Springer Nature Computer Science 2013 Packages</a><br/>Format: Electronic Resources<br/>Encryption for Organizations and Individuals Basics of Contemporary and Quantum Cryptographyent://SD_ILS/0/SD_ILS:18785472024-09-20T01:28:11Z2024-09-20T01:28:11ZYazar Ciesla, Robert. author. (orcid)0000-0002-8305-448X SpringerLink (Online service)<br/>Yer Numarası QA76.9 .A25<br/>Elektronik Erişim <a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-1-4842-6056-2">Full Text Available From Springer Nature Professional and Applied Computing 2020 Packages</a><br/>Format: Electronic Resources<br/>Secure IT Systems 19th Nordic Conference, NordSec 2014, Tromsø, Norway, October 15-17, 2014, Proceedingsent://SD_ILS/0/SD_ILS:18431422024-09-20T01:28:11Z2024-09-20T01:28:11ZYazar Bernsmed, Karin. editor. Fischer-Hübner, Simone. editor. SpringerLink (Online service)<br/>Yer Numarası QA76.9 .A25<br/>Elektronik Erişim <a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-319-11599-3">Full Text Available From Springer Nature Computer Science 2014 Packages</a><br/>Format: Electronic Resources<br/>Machine Learning in Cyber Trust Security, Privacy, and Reliabilityent://SD_ILS/0/SD_ILS:18800442024-09-20T01:28:11Z2024-09-20T01:28:11ZYazar Tsai, Jeffrey J. P. editor. Yu, Philip S. editor. SpringerLink (Online service)<br/>Yer Numarası QA76.9 .A25<br/>Elektronik Erişim <a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-0-387-88735-7">Full Text Available From Springer Nature Computer Science 2009 Packages</a><br/>Format: Electronic Resources<br/>