Search Results for Data and Information Security. SirsiDynix Enterprise https://bilge.isikun.edu.tr/client/tr_TR/default/default/qu$003dData$002band$002bInformation$002bSecurity.$0026ps$003d300?dt=list 2024-09-20T01:28:11Z Intelligence and Security Informatics for International Security Information Sharing and Data Mining ent://SD_ILS/0/SD_ILS:1879259 2024-09-20T01:28:11Z 2024-09-20T01:28:11Z Yazar&#160;Chen, Hsinchun. author.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;TK5105.5 -5105.9<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/0-387-30332-4">Full Text Available From Springer Nature Computer Science 2006 Packages</a><br/>Format:&#160;Electronic Resources<br/> Emerging Technologies in Data Mining and Information Security Proceedings of IEMIS 2018, Volume 3 ent://SD_ILS/0/SD_ILS:1852677 2024-09-20T01:28:11Z 2024-09-20T01:28:11Z Yazar&#160;Abraham, Ajith. editor.&#160;Dutta, Paramartha. editor.&#160;Mandal, Jyotsna Kumar. editor.&#160;Bhattacharya, Abhishek. editor.&#160;Dutta, Soumi. editor. (orcid)0000-0002-1052-7055<br/>Yer Numarası&#160;Q342<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-981-13-1501-5">Full Text Available From Springer Nature Intelligent Technologies and Robotics 2019 Packages</a><br/>Format:&#160;Electronic Resources<br/> Emerging Technologies in Data Mining and Information Security Proceedings of IEMIS 2018, Volume 1 ent://SD_ILS/0/SD_ILS:1852887 2024-09-20T01:28:11Z 2024-09-20T01:28:11Z Yazar&#160;Abraham, Ajith. editor.&#160;Dutta, Paramartha. editor.&#160;Mandal, Jyotsna Kumar. editor.&#160;Bhattacharya, Abhishek. editor.&#160;Dutta, Soumi. editor. (orcid)0000-0002-1052-7055<br/>Yer Numarası&#160;Q342<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-981-13-1951-8">Full Text Available From Springer Nature Intelligent Technologies and Robotics 2019 Packages</a><br/>Format:&#160;Electronic Resources<br/> Emerging Technologies in Data Mining and Information Security Proceedings of IEMIS 2018, Volume 2 ent://SD_ILS/0/SD_ILS:1852991 2024-09-20T01:28:11Z 2024-09-20T01:28:11Z Yazar&#160;Abraham, Ajith. editor.&#160;Dutta, Paramartha. editor.&#160;Mandal, Jyotsna Kumar. editor.&#160;Bhattacharya, Abhishek. editor.&#160;Dutta, Soumi. editor. (orcid)0000-0002-1052-7055<br/>Yer Numarası&#160;Q342<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-981-13-1498-8">Full Text Available From Springer Nature Intelligent Technologies and Robotics 2019 Packages</a><br/>Format:&#160;Electronic Resources<br/> Emerging Technologies in Data Mining and Information Security Proceedings of IEMIS 2020, Volume 1 ent://SD_ILS/0/SD_ILS:1854279 2024-09-20T01:28:11Z 2024-09-20T01:28:11Z Yazar&#160;Hassanien, Aboul Ella. editor.&#160;Bhattacharyya, Siddhartha. editor.&#160;Chakrabati, Satyajit. editor.&#160;Bhattacharya, Abhishek. editor.&#160;Dutta, Soumi. editor. (orcid)0000-0002-1052-7055<br/>Yer Numarası&#160;Q342<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-981-15-9927-9">Full Text Available From Springer Nature Intelligent Technologies and Robotics 2021 Packages</a><br/>Format:&#160;Electronic Resources<br/> Emerging Technologies in Data Mining and Information Security Proceedings of IEMIS 2020, Volume 2 ent://SD_ILS/0/SD_ILS:1854332 2024-09-20T01:28:11Z 2024-09-20T01:28:11Z Yazar&#160;Hassanien, Aboul Ella. editor.&#160;Bhattacharyya, Siddhartha. editor.&#160;Chakrabati, Satyajit. editor.&#160;Bhattacharya, Abhishek. editor.&#160;Dutta, Soumi. editor. (orcid)0000-0002-1052-7055<br/>Yer Numarası&#160;Q342<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-981-33-4367-2">Full Text Available From Springer Nature Intelligent Technologies and Robotics 2021 Packages</a><br/>Format:&#160;Electronic Resources<br/> Emerging Technologies in Data Mining and Information Security Proceedings of IEMIS 2020, Volume 3 ent://SD_ILS/0/SD_ILS:1853779 2024-09-20T01:28:11Z 2024-09-20T01:28:11Z Yazar&#160;Tavares, Jo&atilde;o Manuel R. S. editor.&#160;Chakrabarti, Satyajit. editor.&#160;Bhattacharya, Abhishek. editor.&#160;Ghatak, Sujata. editor.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;Q342<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-981-15-9774-9">Full Text Available From Springer Nature Intelligent Technologies and Robotics 2021 Packages</a><br/>Format:&#160;Electronic Resources<br/> Healthcare Information Privacy and Security Regulatory Compliance and Data Security in the Age of Electronic Health Records ent://SD_ILS/0/SD_ILS:1877237 2024-09-20T01:28:11Z 2024-09-20T01:28:11Z Yazar&#160;Robichau, Bernard Peter. author.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA76.9 .A25<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-1-4302-6677-8">Full Text Available From Springer Nature Professional and Applied Computing 2014 Packages</a><br/>Format:&#160;Electronic Resources<br/> Information Sharing and Data Protection in the Area of Freedom, Security and Justice Towards Harmonised Data Protection Principles for Information Exchange at EU-level ent://SD_ILS/0/SD_ILS:1848660 2024-09-20T01:28:11Z 2024-09-20T01:28:11Z Yazar&#160;Boehm, Franziska. author.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;KJE901 -9796<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-642-22392-1">Full Text Available From Springer Nature Humanities, Social Sciences and Law 2012 Packages</a><br/>Format:&#160;Electronic Resources<br/> Availability, Reliability, and Security in Information Systems IFIP WG 8.4, 8.9, TC 5 International Cross-Domain Conference, CD-ARES 2016, and Workshop on Privacy Aware Machine Learning for Health Data Science, PAML 2016, Salzburg, Austria, August 31 - September 2, 2016, Proceedings ent://SD_ILS/0/SD_ILS:1844743 2024-09-20T01:28:11Z 2024-09-20T01:28:11Z Yazar&#160;Buccafurri, Francesco. editor.&#160;Holzinger, Andreas. editor. (orcid)0000-0002-6786-5194&#160;Kieseberg, Peter. editor.&#160;Tjoa, A Min. editor. (orcid)0000-0002-8295-9252&#160;Weippl, Edgar. editor.<br/>Yer Numarası&#160;QA76.76 .A65<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-319-45507-5">Full Text Available From Springer Nature Computer Science 2016 Packages</a><br/>Format:&#160;Electronic Resources<br/> Data And Computer Security A Dictionary Of Terms And Concepts ent://SD_ILS/0/SD_ILS:1922303 2024-09-20T01:28:11Z 2024-09-20T01:28:11Z Yazar&#160;Longley, Dennis. author.&#160;Shain, Michael. author.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA76.9 .A25<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-1-349-11170-1">Full Text Available From Springer Nature Computer Science Archive Packages</a><br/>Format:&#160;Electronic Resources<br/> The 'Orange Book' Series ent://SD_ILS/0/SD_ILS:1922305 2024-09-20T01:28:11Z 2024-09-20T01:28:11Z Yazar&#160;Defense, US Department of. author.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA76.9 .A25<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-1-349-12020-8">Full Text Available From Springer Nature Computer Science Archive Packages</a><br/>Format:&#160;Electronic Resources<br/> Certified Ethical Hacker (CEH) Foundation Guide ent://SD_ILS/0/SD_ILS:1877542 2024-09-20T01:28:11Z 2024-09-20T01:28:11Z Yazar&#160;Rahalkar, Sagar Ajay. author.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA76.9 .A25<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-1-4842-2325-3">Full Text Available From Springer Nature Professional and Applied Computing 2016 Packages</a><br/>Format:&#160;Electronic Resources<br/> NTP Security A Quick-Start Guide ent://SD_ILS/0/SD_ILS:1877604 2024-09-20T01:28:11Z 2024-09-20T01:28:11Z Yazar&#160;Liska, Allan. author.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA76.9 .A25<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-1-4842-2412-0">Full Text Available From Springer Nature Professional and Applied Computing 2016 Packages</a><br/>Format:&#160;Electronic Resources<br/> Professional Red Teaming Conducting Successful Cybersecurity Engagements ent://SD_ILS/0/SD_ILS:1878324 2024-09-20T01:28:11Z 2024-09-20T01:28:11Z Yazar&#160;Oakley, Jacob G. author.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA76.9 .A25<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-1-4842-4309-1">Full Text Available From Springer Nature Professional and Applied Computing 2019 Packages</a><br/>Format:&#160;Electronic Resources<br/> ISSE 2014 Securing Electronic Business Processes Highlights of the Information Security Solutions Europe 2014 Conference ent://SD_ILS/0/SD_ILS:1882059 2024-09-20T01:28:11Z 2024-09-20T01:28:11Z Yazar&#160;Reimer, Helmut. editor.&#160;Pohlmann, Norbert. editor.&#160;Schneider, Wolfgang. editor.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA76.9 .A25<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-658-06708-3">Full Text Available From Springer Nature Computer Science 2014 Packages</a><br/>Format:&#160;Electronic Resources<br/> CompTIA Security+ Certification Study Guide Network Security Essentials ent://SD_ILS/0/SD_ILS:1878654 2024-09-20T01:28:11Z 2024-09-20T01:28:11Z Yazar&#160;Sheikh, Ahmed F. author.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA76.9 .A25<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-1-4842-6234-4">Full Text Available From Springer Nature Professional and Applied Computing 2020 Packages</a><br/>Format:&#160;Electronic Resources<br/> Trustworthy Computing and Services International Conference, ISCTCS 2013, Beijing, China, November 2013, Revised Selected Papers ent://SD_ILS/0/SD_ILS:1882041 2024-09-20T01:28:11Z 2024-09-20T01:28:11Z Yazar&#160;Yuan, Yuyu. editor.&#160;Wu, Xu. editor.&#160;Lu, Yueming. editor.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA76.9 .A25<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-662-43908-1">Full Text Available From Springer Nature Computer Science 2014 Packages</a><br/>Format:&#160;Electronic Resources<br/> Big Breaches Cybersecurity Lessons for Everyone ent://SD_ILS/0/SD_ILS:1878777 2024-09-20T01:28:11Z 2024-09-20T01:28:11Z Yazar&#160;Daswani, Neil. author.&#160;Elbayadi, Moudy. author.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA76.9 .A25<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-1-4842-6655-7">Full Text Available From Springer Nature Professional and Applied Computing 2021 Packages</a><br/>Format:&#160;Electronic Resources<br/> Authentication and Access Control Practical Cryptography Methods and Tools ent://SD_ILS/0/SD_ILS:1878854 2024-09-20T01:28:11Z 2024-09-20T01:28:11Z Yazar&#160;Boonkrong, Sirapat. author.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA76.9 .A25<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-1-4842-6570-3">Full Text Available From Springer Nature Professional and Applied Computing 2021 Packages</a><br/>Format:&#160;Electronic Resources<br/> 70 Tips and Tricks for Mastering the CISSP Exam ent://SD_ILS/0/SD_ILS:1878570 2024-09-20T01:28:11Z 2024-09-20T01:28:11Z Yazar&#160;Danturthi, R. Sarma. author.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA76.9 .A25<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-1-4842-6225-2">Full Text Available From Springer Nature Professional and Applied Computing 2020 Packages</a><br/>Format:&#160;Electronic Resources<br/> Digital Privacy and Security Using Windows A Practical Guide ent://SD_ILS/0/SD_ILS:1877744 2024-09-20T01:28:11Z 2024-09-20T01:28:11Z Yazar&#160;Hassan, Nihad. author.&#160;Hijazi, Rami. author.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA76.9 .A25<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-1-4842-2799-2">Full Text Available From Springer Nature Professional and Applied Computing 2017 Packages</a><br/>Format:&#160;Electronic Resources<br/> Digital Forensics Basics A Practical Guide Using Windows OS ent://SD_ILS/0/SD_ILS:1878233 2024-09-20T01:28:11Z 2024-09-20T01:28:11Z Yazar&#160;Hassan, Nihad A. author.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA76.9 .A25<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-1-4842-3838-7">Full Text Available From Springer Nature Professional and Applied Computing 2019 Packages</a><br/>Format:&#160;Electronic Resources<br/> Choose Your InfoSec Path An Interactive Cybersecurity Adventure for Beginners ent://SD_ILS/0/SD_ILS:1878979 2024-09-20T01:28:11Z 2024-09-20T01:28:11Z Yazar&#160;Roxon, Alexander J. author.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA76.9 .A25<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-1-4842-7036-3">Full Text Available From Springer Nature Professional and Applied Computing 2021 Packages</a><br/>Format:&#160;Electronic Resources<br/> ISSE 2015 Highlights of the Information Security Solutions Europe 2015 Conference ent://SD_ILS/0/SD_ILS:1882617 2024-09-20T01:28:11Z 2024-09-20T01:28:11Z Yazar&#160;Reimer, Helmut. editor.&#160;Pohlmann, Norbert. editor.&#160;Schneider, Wolfgang. editor.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA76.9 .A25<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-658-10934-9">Full Text Available From Springer Nature Computer Science 2015 Packages</a><br/>Format:&#160;Electronic Resources<br/> Protective Security Creating Military-Grade Defenses for Your Digital Business ent://SD_ILS/0/SD_ILS:1878906 2024-09-20T01:28:11Z 2024-09-20T01:28:11Z Yazar&#160;Seaman, Jim. author.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA76.9 .A25<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-1-4842-6908-4">Full Text Available From Springer Nature Professional and Applied Computing 2021 Packages</a><br/>Format:&#160;Electronic Resources<br/> Cybersecurity Incident Response How to Contain, Eradicate, and Recover from Incidents ent://SD_ILS/0/SD_ILS:1877987 2024-09-20T01:28:11Z 2024-09-20T01:28:11Z Yazar&#160;Thompson, Eric C. author.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA76.9 .A25<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-1-4842-3870-7">Full Text Available From Springer Nature Professional and Applied Computing 2018 Packages</a><br/>Format:&#160;Electronic Resources<br/> Waging Cyber War Technical Challenges and Operational Constraints ent://SD_ILS/0/SD_ILS:1878365 2024-09-20T01:28:11Z 2024-09-20T01:28:11Z Yazar&#160;Oakley, Jacob G. author.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA76.9 .A25<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-1-4842-4950-5">Full Text Available From Springer Nature Professional and Applied Computing 2019 Packages</a><br/>Format:&#160;Electronic Resources<br/> Science of Cyber Security Third International Conference, SciSec 2021, Virtual Event, August 13-15, 2021, Revised Selected Papers ent://SD_ILS/0/SD_ILS:1886800 2024-09-20T01:28:11Z 2024-09-20T01:28:11Z Yazar&#160;Lu, Wenlian. editor.&#160;Sun, Kun. editor.&#160;Yung, Moti. editor.&#160;Liu, Feng. editor. (orcid)0000-0002-4811-7828&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA76.9 .A25<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-030-89137-4">Full Text Available From Springer Nature Computer Science 2021 Packages</a><br/>Format:&#160;Electronic Resources<br/> Building Secure Firmware Armoring the Foundation of the Platform ent://SD_ILS/0/SD_ILS:1878666 2024-09-20T01:28:11Z 2024-09-20T01:28:11Z Yazar&#160;Yao, Jiewen. author.&#160;Zimmer, Vincent. author.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA76.9 .A25<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-1-4842-6106-4">Full Text Available From Springer Nature Professional and Applied Computing 2020 Packages</a><br/>Format:&#160;Electronic Resources<br/> Jump-start Your SOC Analyst Career A Roadmap to Cybersecurity Success ent://SD_ILS/0/SD_ILS:1878785 2024-09-20T01:28:11Z 2024-09-20T01:28:11Z Yazar&#160;Wall, Tyler. author.&#160;Rodrick, Jarrett. author.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA76.9 .A25<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-1-4842-6904-6">Full Text Available From Springer Nature Professional and Applied Computing 2021 Packages</a><br/>Format:&#160;Electronic Resources<br/> Information Security and Cryptology 16th International Conference, Inscrypt 2020, Guangzhou, China, December 11-14, 2020, Revised Selected Papers ent://SD_ILS/0/SD_ILS:1886185 2024-09-20T01:28:11Z 2024-09-20T01:28:11Z Yazar&#160;Wu, Yongdong. editor. (orcid)0000-0002-0850-724X&#160;Yung, Moti. editor.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA76.9 .A25<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-030-71852-7">Full Text Available From Springer Nature Computer Science 2021 Packages</a><br/>Format:&#160;Electronic Resources<br/> Cyber Operations Building, Defending, and Attacking Modern Computer Networks ent://SD_ILS/0/SD_ILS:1878323 2024-09-20T01:28:11Z 2024-09-20T01:28:11Z Yazar&#160;O'Leary, Mike. author.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA76.9 .A25<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-1-4842-4294-0">Full Text Available From Springer Nature Professional and Applied Computing 2019 Packages</a><br/>Format:&#160;Electronic Resources<br/> Information Security and Cryptology 17th International Conference, Inscrypt 2021, Virtual Event, August 12-14, 2021, Revised Selected Papers ent://SD_ILS/0/SD_ILS:1886823 2024-09-20T01:28:11Z 2024-09-20T01:28:11Z Yazar&#160;Yu, Yu. editor. (orcid)0000-0002-9278-4521&#160;Yung, Moti. editor. (orcid)0000-0003-0848-0873&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA76.9 .A25<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-030-88323-2">Full Text Available From Springer Nature Computer Science 2021 Packages</a><br/>Format:&#160;Electronic Resources<br/> Certified Ethical Hacker (CEH) Preparation Guide Lesson-Based Review of Ethical Hacking and Penetration Testing ent://SD_ILS/0/SD_ILS:1878828 2024-09-20T01:28:11Z 2024-09-20T01:28:11Z Yazar&#160;Sheikh, Ahmed. author.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA76.9 .A25<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-1-4842-7258-9">Full Text Available From Springer Nature Professional and Applied Computing 2021 Packages</a><br/>Format:&#160;Electronic Resources<br/> Rational Cybersecurity for Business The Security Leaders' Guide to Business Alignment ent://SD_ILS/0/SD_ILS:1878543 2024-09-20T01:28:11Z 2024-09-20T01:28:11Z Yazar&#160;Blum, Dan. author.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA76.9 .A25<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-1-4842-5952-8">Full Text Available From Springer Nature Professional and Applied Computing 2020 Packages</a><br/>Format:&#160;Electronic Resources<br/> Achieving and Sustaining Secured Business Operations An Executive's Guide to Planning and Management ent://SD_ILS/0/SD_ILS:1877804 2024-09-20T01:28:11Z 2024-09-20T01:28:11Z Yazar&#160;Ajmani, Neelesh. author.&#160;Kumar, Dinesh. author.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA76.9 .A25<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-1-4842-3099-2">Full Text Available From Springer Nature Professional and Applied Computing 2017 Packages</a><br/>Format:&#160;Electronic Resources<br/> ISSE 2008 Securing Electronic Business Processes Highlights of the Information Security Solutions Europe 2008 Conference ent://SD_ILS/0/SD_ILS:1880013 2024-09-20T01:28:11Z 2024-09-20T01:28:11Z Yazar&#160;Pohlmann, Norbert. editor.&#160;Reimer, Helmut. editor.&#160;Schneider, Wolfgang. editor.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA76.9 .A25<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-8348-9283-6">Full Text Available From Springer Nature Computer Science 2009 Packages</a><br/>Format:&#160;Electronic Resources<br/> Cyber Security 15th International Annual Conference, CNCERT 2018, Beijing, China, August 14-16, 2018, Revised Selected Papers ent://SD_ILS/0/SD_ILS:1885072 2024-09-20T01:28:11Z 2024-09-20T01:28:11Z Yazar&#160;Yun, Xiaochun. editor.&#160;Wen, Weiping. editor.&#160;Lang, Bo. editor.&#160;Yan, Hanbing. editor.&#160;Ding, Li. editor.<br/>Yer Numarası&#160;QA76.9 .A25<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-981-13-6621-5">Full Text Available From Springer Nature Computer Science 2019 Packages</a><br/>Format:&#160;Electronic Resources<br/> Cyber Threat Intelligence The No-Nonsense Guide for CISOs and Security Managers ent://SD_ILS/0/SD_ILS:1878937 2024-09-20T01:28:11Z 2024-09-20T01:28:11Z Yazar&#160;Roberts, Aaron. author.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA76.9 .A25<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-1-4842-7220-6">Full Text Available From Springer Nature Professional and Applied Computing 2021 Packages</a><br/>Format:&#160;Electronic Resources<br/> Ransomware Revealed A Beginner's Guide to Protecting and Recovering from Ransomware Attacks ent://SD_ILS/0/SD_ILS:1878459 2024-09-20T01:28:11Z 2024-09-20T01:28:11Z Yazar&#160;Hassan, Nihad A. author.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA76.9 .A25<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-1-4842-4255-1">Full Text Available From Springer Nature Professional and Applied Computing 2019 Packages</a><br/>Format:&#160;Electronic Resources<br/> Asset Attack Vectors Building Effective Vulnerability Management Strategies to Protect Organizations ent://SD_ILS/0/SD_ILS:1878105 2024-09-20T01:28:11Z 2024-09-20T01:28:11Z Yazar&#160;Haber, Morey J. author.&#160;Hibbert, Brad. author.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA76.9 .A25<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-1-4842-3627-7">Full Text Available From Springer Nature Professional and Applied Computing 2018 Packages</a><br/>Format:&#160;Electronic Resources<br/> Privacy and Anonymity in Information Management Systems New Techniques for New Practical Problems ent://SD_ILS/0/SD_ILS:1880480 2024-09-20T01:28:11Z 2024-09-20T01:28:11Z Yazar&#160;Nin, Jordi. editor.&#160;Herranz, Javier. editor.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA76.9 .A25<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-1-84996-238-4">Full Text Available From Springer Nature Computer Science 2010 Packages</a><br/>Format:&#160;Electronic Resources<br/> Privileged Attack Vectors Building Effective Cyber-Defense Strategies to Protect Organizations ent://SD_ILS/0/SD_ILS:1878622 2024-09-20T01:28:11Z 2024-09-20T01:28:11Z Yazar&#160;Haber, Morey J. author.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA76.9 .A25<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-1-4842-5914-6">Full Text Available From Springer Nature Professional and Applied Computing 2020 Packages</a><br/>Format:&#160;Electronic Resources<br/> Identity Attack Vectors Implementing an Effective Identity and Access Management Solution ent://SD_ILS/0/SD_ILS:1878490 2024-09-20T01:28:11Z 2024-09-20T01:28:11Z Yazar&#160;Haber, Morey J. author.&#160;Rolls, Darran. author.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA76.9 .A25<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-1-4842-5165-2">Full Text Available From Springer Nature Professional and Applied Computing 2020 Packages</a><br/>Format:&#160;Electronic Resources<br/> Privileged Attack Vectors Building Effective Cyber-Defense Strategies to Protect Organizations ent://SD_ILS/0/SD_ILS:1878048 2024-09-20T01:28:11Z 2024-09-20T01:28:11Z Yazar&#160;Haber, Morey J. author.&#160;Hibbert, Brad. author.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA76.9 .A25<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-1-4842-3048-0">Full Text Available From Springer Nature Professional and Applied Computing 2018 Packages</a><br/>Format:&#160;Electronic Resources<br/> Information Security 23rd International Conference, ISC 2020, Bali, Indonesia, December 16-18, 2020, Proceedings ent://SD_ILS/0/SD_ILS:1846358 2024-09-20T01:28:11Z 2024-09-20T01:28:11Z Yazar&#160;Susilo, Willy. editor. (orcid)0000-0002-1562-5105&#160;Deng, Robert H. editor. (orcid)0000-0003-3491-8146&#160;Guo, Fuchun. editor. (orcid)0000-0001-6939-7710&#160;Li, Yannan. editor. (orcid)0000-0002-4407-9027&#160;Intan, Rolly. editor.<br/>Yer Numarası&#160;QA76.9 .A25<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-030-62974-8">Full Text Available From Springer Nature Computer Science 2020 Packages</a><br/>Format:&#160;Electronic Resources<br/> The Practice of Enterprise Modeling 12th IFIP Working Conference, PoEM 2019, Luxembourg, Luxembourg, November 27-29, 2019, Proceedings ent://SD_ILS/0/SD_ILS:1884542 2024-09-20T01:28:11Z 2024-09-20T01:28:11Z Yazar&#160;Gordijn, Jaap. editor. (orcid)0000-0002-6401-3850&#160;Gu&eacute;dria, Wided. editor.&#160;Proper, Henderik A. editor. (orcid)0000-0002-7318-2496&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA76.9 .A25<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-030-35151-9">Full Text Available From Springer Nature Computer Science 2019 Packages</a><br/>Format:&#160;Electronic Resources<br/> Security Infrastructure Technology for Integrated Utilization of Big Data Applied to the Living Safety and Medical Fields ent://SD_ILS/0/SD_ILS:1885503 2024-09-20T01:28:11Z 2024-09-20T01:28:11Z Yazar&#160;Miyaji, Atsuko. editor.&#160;Mimoto, Tomoaki. editor.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA76.9 .A25<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-981-15-3654-0">Full Text Available From Springer Nature Computer Science 2020 Packages</a><br/>Format:&#160;Electronic Resources<br/> Designing a HIPAA-Compliant Security Operations Center A Guide to Detecting and Responding to Healthcare Breaches and Events ent://SD_ILS/0/SD_ILS:1878510 2024-09-20T01:28:11Z 2024-09-20T01:28:11Z Yazar&#160;Thompson, Eric C. author.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA76.9 .A25<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-1-4842-5608-4">Full Text Available From Springer Nature Professional and Applied Computing 2020 Packages</a><br/>Format:&#160;Electronic Resources<br/> Open Source Intelligence Methods and Tools A Practical Guide to Online Intelligence ent://SD_ILS/0/SD_ILS:1878191 2024-09-20T01:28:11Z 2024-09-20T01:28:11Z Yazar&#160;Hassan, Nihad A. author.&#160;Hijazi, Rami. author.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA76.9 .A25<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-1-4842-3213-2">Full Text Available From Springer Nature Professional and Applied Computing 2018 Packages</a><br/>Format:&#160;Electronic Resources<br/> Solving Identity Management in Modern Applications Demystifying OAuth 2.0, OpenID Connect, and SAML 2.0 ent://SD_ILS/0/SD_ILS:1878399 2024-09-20T01:28:11Z 2024-09-20T01:28:11Z Yazar&#160;Wilson, Yvonne. author.&#160;Hingnikar, Abhishek. author.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA76.9 .A25<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-1-4842-5095-2">Full Text Available From Springer Nature Professional and Applied Computing 2019 Packages</a><br/>Format:&#160;Electronic Resources<br/> Firewalls Don't Stop Dragons A Step-by-Step Guide to Computer Security for Non-Techies ent://SD_ILS/0/SD_ILS:1878123 2024-09-20T01:28:11Z 2024-09-20T01:28:11Z Yazar&#160;Parker, Carey. author.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA76.9 .A25<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-1-4842-3852-3">Full Text Available From Springer Nature Professional and Applied Computing 2018 Packages</a><br/>Format:&#160;Electronic Resources<br/> International Conference on Security and Privacy in Communication Networks 10th International ICST Conference, SecureComm 2014, Beijing, China, September 24-26, 2014, Revised Selected Papers, Part I ent://SD_ILS/0/SD_ILS:1882544 2024-09-20T01:28:11Z 2024-09-20T01:28:11Z Yazar&#160;Tian, Jing. editor.&#160;Jing, Jiwu. editor.&#160;Srivatsa, Mudhakar. editor.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA76.9 .A25<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-319-23829-6">Full Text Available From Springer Nature Computer Science 2015 Packages</a><br/>Format:&#160;Electronic Resources<br/> International Conference on Security and Privacy in Communication Networks 10th International ICST Conference, SecureComm 2014, Beijing, China, September 24-26, 2014, Revised Selected Papers, Part II ent://SD_ILS/0/SD_ILS:1882608 2024-09-20T01:28:11Z 2024-09-20T01:28:11Z Yazar&#160;Tian, Jin. editor.&#160;Jing, Jiwu. editor.&#160;Srivatsa, Mudhakar. editor.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA76.9 .A25<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-319-23802-9">Full Text Available From Springer Nature Computer Science 2015 Packages</a><br/>Format:&#160;Electronic Resources<br/> Information Security Practice and Experience 16th International Conference, ISPEC 2021, Nanjing, China, December 17-19, 2021, Proceedings ent://SD_ILS/0/SD_ILS:1887257 2024-09-20T01:28:11Z 2024-09-20T01:28:11Z Yazar&#160;Deng, Robert. editor. (orcid)0000-0003-3491-8146&#160;Bao, Feng. editor.&#160;Wang, Guilin. editor.&#160;Shen, Jian. editor. (orcid)0000-0003-0519-9058&#160;Ryan, Mark. editor.<br/>Yer Numarası&#160;QA76.9 .A25<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-030-93206-0">Full Text Available From Springer Nature Computer Science 2021 Packages</a><br/>Format:&#160;Electronic Resources<br/> Firewalls Don't Stop Dragons A Step-by-Step Guide to Computer Security and Privacy for Non-Techies ent://SD_ILS/0/SD_ILS:1878652 2024-09-20T01:28:11Z 2024-09-20T01:28:11Z Yazar&#160;Parker, Carey. author.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA76.9 .A25<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-1-4842-6189-7">Full Text Available From Springer Nature Professional and Applied Computing 2020 Packages</a><br/>Format:&#160;Electronic Resources<br/> Building a HIPAA-Compliant Cybersecurity Program Using NIST 800-30 and CSF to Secure Protected Health Information ent://SD_ILS/0/SD_ILS:1877773 2024-09-20T01:28:11Z 2024-09-20T01:28:11Z Yazar&#160;Thompson, Eric C. author.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA76.9 .A25<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-1-4842-3060-2">Full Text Available From Springer Nature Professional and Applied Computing 2017 Packages</a><br/>Format:&#160;Electronic Resources<br/> Future of Trust in Computing Proceedings of the First International Conference Future of Trust in Computing 2008 ent://SD_ILS/0/SD_ILS:1880086 2024-09-20T01:28:11Z 2024-09-20T01:28:11Z Yazar&#160;Grawrock, David. editor.&#160;Reimer, Helmut. editor.&#160;Sadeghi, Ahmad-Reza. editor.&#160;Vishik, Claire. editor.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA76.9 .A25<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-8348-9324-6">Full Text Available From Springer Nature Computer Science 2009 Packages</a><br/>Format:&#160;Electronic Resources<br/> Foundations and Practice of Security 13th International Symposium, FPS 2020, Montreal, QC, Canada, December 1-3, 2020, Revised Selected Papers ent://SD_ILS/0/SD_ILS:1887179 2024-09-20T01:28:11Z 2024-09-20T01:28:11Z Yazar&#160;Nicolescu, Gabriela. editor.&#160;Tria, Assia. editor.&#160;Fernandez, Jos&eacute; M. editor. (orcid)0000-0001-9836-3595&#160;Marion, Jean-Yves. editor.&#160;Garcia-Alfaro, Joaquin. editor. (orcid)0000-0002-7453-4393<br/>Yer Numarası&#160;QA76.9 .A25<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-030-70881-8">Full Text Available From Springer Nature Computer Science 2021 Packages</a><br/>Format:&#160;Electronic Resources<br/> Cyberspace Safety and Security 12th International Symposium, CSS 2020, Haikou, China, December 1-3, 2020, Proceedings ent://SD_ILS/0/SD_ILS:1886134 2024-09-20T01:28:11Z 2024-09-20T01:28:11Z Yazar&#160;Cheng, Jieren. editor.&#160;Tang, Xiangyan. editor.&#160;Liu, Xiaozhang. editor.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA76.9 .A25<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-030-73671-2">Full Text Available From Springer Nature Computer Science 2021 Packages</a><br/>Format:&#160;Electronic Resources<br/> Data Privacy Management, Cryptocurrencies and Blockchain Technology ESORICS 2020 International Workshops, DPM 2020 and CBT 2020, Guildford, UK, September 17-18, 2020, Revised Selected Papers ent://SD_ILS/0/SD_ILS:1846574 2024-09-20T01:28:11Z 2024-09-20T01:28:11Z Yazar&#160;Garcia-Alfaro, Joaquin. editor. (orcid)0000-0002-7453-4393&#160;Navarro-Arribas, Guillermo. editor. (orcid)0000-0003-3535-942X&#160;Herrera-Joancomarti, Jordi. editor. (orcid)0000-0002-4935-4681&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA76.9 .A25<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-030-66172-4">Full Text Available From Springer Nature Computer Science 2020 Packages</a><br/>Format:&#160;Electronic Resources<br/> Information Security 24th International Conference, ISC 2021, Virtual Event, November 10-12, 2021, Proceedings ent://SD_ILS/0/SD_ILS:1886993 2024-09-20T01:28:11Z 2024-09-20T01:28:11Z Yazar&#160;Liu, Joseph K. editor. (orcid)0000-0001-6656-6240&#160;Katsikas, Sokratis. editor. (orcid)0000-0003-2966-9683&#160;Meng, Weizhi. editor. (orcid)0000-0003-4384-5786&#160;Susilo, Willy. editor. (orcid)0000-0002-1562-5105&#160;Intan, Rolly. editor.<br/>Yer Numarası&#160;QA76.9 .A25<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-030-91356-4">Full Text Available From Springer Nature Computer Science 2021 Packages</a><br/>Format:&#160;Electronic Resources<br/> Trust Management Proceedings of IFIPTM 2007: Joint iTrust and PST Conferences on Privacy, Trust Management and Security, July 30-August 2, 2007, New Brunswick, Canada ent://SD_ILS/0/SD_ILS:1879553 2024-09-20T01:28:11Z 2024-09-20T01:28:11Z Yazar&#160;Etalle, Sandro. editor.&#160;Marsh, Stephen. editor.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA76.9 .A25<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-0-387-73655-6">Full Text Available From Springer Nature Computer Science 2007 Packages</a><br/>Format:&#160;Electronic Resources<br/> Fifth World Conference on Information Security Education Proceedings of the IFIP TC 11 WG 11.8, WISE 5, 19 to 21 June 2007, United States Military Academy, West Point, NY, USA ent://SD_ILS/0/SD_ILS:1879552 2024-09-20T01:28:11Z 2024-09-20T01:28:11Z Yazar&#160;Futcher, Lynn. editor.&#160;Dodge, Ronald. editor.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA76.9 .A25<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-0-387-73269-5">Full Text Available From Springer Nature Computer Science 2007 Packages</a><br/>Format:&#160;Electronic Resources<br/> Pancreatic Cytopathology ent://SD_ILS/0/SD_ILS:1855115 2024-09-20T01:28:11Z 2024-09-20T01:28:11Z Yazar&#160;Chhieng, David C. author.&#160;Stelow, Edward B. author.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;RB1 -214<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-0-387-68947-0">Full Text Available From Springer Nature Medicine 2007 Packages</a><br/>Format:&#160;Electronic Resources<br/> Securing SQL Server DBAs Defending the Database ent://SD_ILS/0/SD_ILS:1877571 2024-09-20T01:28:11Z 2024-09-20T01:28:11Z Yazar&#160;Carter, Peter A. author.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA76.9 .D3<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-1-4842-2265-2">Full Text Available From Springer Nature Professional and Applied Computing 2016 Packages</a><br/>Format:&#160;Electronic Resources<br/> ISSE 2011 Securing Electronic Business Processes Highlights of the Information Security Solutions Europe 2011 Conference ent://SD_ILS/0/SD_ILS:1880708 2024-09-20T01:28:11Z 2024-09-20T01:28:11Z Yazar&#160;Pohlmann, Norbert. editor.&#160;Reimer, Helmut. editor.&#160;Schneider, Wolfgang. editor.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA75.5 -76.95<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-8348-8652-1">Full Text Available From Springer Nature Computer Science 2011 Packages</a><br/>Format:&#160;Electronic Resources<br/> Computer Security for the Home and Small Office ent://SD_ILS/0/SD_ILS:1946083 2024-09-20T01:28:11Z 2024-09-20T01:28:11Z Yazar&#160;Greene, Thomas. author.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA76.9 .A25<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-1-4302-0711-5">Full Text Available From Springer Nature Professional and Applied Computing Archive Packages</a><br/>Format:&#160;Electronic Resources<br/> Black Hat Misfits, Criminals, and Scammers in the Internet Age ent://SD_ILS/0/SD_ILS:1945881 2024-09-20T01:28:11Z 2024-09-20T01:28:11Z Yazar&#160;Biggs, DUP John. author.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA76.9 .A25<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-1-4302-0692-7">Full Text Available From Springer Nature Professional and Applied Computing Archive Packages</a><br/>Format:&#160;Electronic Resources<br/> ISSE 2013 Securing Electronic Business Processes Highlights of the Information Security Solutions Europe 2013 Conference ent://SD_ILS/0/SD_ILS:1881631 2024-09-20T01:28:11Z 2024-09-20T01:28:11Z Yazar&#160;Reimer, Helmut. editor.&#160;Pohlmann, Norbert. editor.&#160;Schneider, Wolfgang. editor.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA76.9 .A25<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-658-03371-2">Full Text Available From Springer Nature Computer Science 2013 Packages</a><br/>Format:&#160;Electronic Resources<br/> ISSE 2010 Securing Electronic Business Processes Highlights of the Information Security Solutions Europe 2010 Conference ent://SD_ILS/0/SD_ILS:1818391 2024-09-20T01:28:11Z 2024-09-20T01:28:11Z Yazar&#160;Pohlmann, Norbert. editor.&#160;Reimer, Helmut. editor.&#160;Schneider, Wolfgang. editor.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA75.5 -76.95<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-8348-9788-6">Full Text Available From Springer Nature Engineering 2011 Packages</a><br/>Format:&#160;Electronic Resources<br/> Quick Start Guide to Penetration Testing With NMAP, OpenVAS and Metasploit ent://SD_ILS/0/SD_ILS:1878301 2024-09-20T01:28:11Z 2024-09-20T01:28:11Z Yazar&#160;Rahalkar, Sagar. author.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA76.9 .A25<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-1-4842-4270-4">Full Text Available From Springer Nature Professional and Applied Computing 2019 Packages</a><br/>Format:&#160;Electronic Resources<br/> Oracle Incident Response and Forensics Preparing for and Responding to Data Breaches ent://SD_ILS/0/SD_ILS:1877941 2024-09-20T01:28:11Z 2024-09-20T01:28:11Z Yazar&#160;Finnigan, Pete. author.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA76.9 .D3<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-1-4842-3264-4">Full Text Available From Springer Nature Professional and Applied Computing 2018 Packages</a><br/>Format:&#160;Electronic Resources<br/> Artificial Intelligence Tools for Cyber Attribution ent://SD_ILS/0/SD_ILS:1884056 2024-09-20T01:28:11Z 2024-09-20T01:28:11Z Yazar&#160;Nunes, Eric. author.&#160;Shakarian, Paulo. author.&#160;Simari, Gerardo I. author.&#160;Ruef, Andrew. author.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;Q334 -342<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-319-73788-1">Full Text Available From Springer Nature Computer Science 2018 Packages</a><br/>Format:&#160;Electronic Resources<br/> Securing the Perimeter Deploying Identity and Access Management with Free Open Source Software ent://SD_ILS/0/SD_ILS:1878138 2024-09-20T01:28:11Z 2024-09-20T01:28:11Z Yazar&#160;Schwartz, Michael. author.&#160;Machulak, Maciej. author.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA76.9 .A25<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-1-4842-2601-8">Full Text Available From Springer Nature Professional and Applied Computing 2018 Packages</a><br/>Format:&#160;Electronic Resources<br/> Zero Trust Security An Enterprise Guide ent://SD_ILS/0/SD_ILS:1878781 2024-09-20T01:28:11Z 2024-09-20T01:28:11Z Yazar&#160;Garbis, Jason. author.&#160;Chapman, Jerry W. author.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA75.5 -76.95<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-1-4842-6702-8">Full Text Available From Springer Nature Professional and Applied Computing 2021 Packages</a><br/>Format:&#160;Electronic Resources<br/> Adversary-Aware Learning Techniques and Trends in Cybersecurity ent://SD_ILS/0/SD_ILS:1886567 2024-09-20T01:28:11Z 2024-09-20T01:28:11Z Yazar&#160;Dasgupta, Prithviraj. editor.&#160;Collins, Joseph B. editor.&#160;Mittu, Ranjeev. editor.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;Q334 -342<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-030-55692-1">Full Text Available From Springer Nature Computer Science 2021 Packages</a><br/>Format:&#160;Electronic Resources<br/> Managing Risk and Information Security Protect to Enable ent://SD_ILS/0/SD_ILS:1877659 2024-09-20T01:28:11Z 2024-09-20T01:28:11Z Yazar&#160;Harkins, Malcolm W. author.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA76.9 .A25<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-1-4842-1455-8">Full Text Available From Springer Nature Professional and Applied Computing 2016 Packages</a><br/>Format:&#160;Electronic Resources<br/> Intelligence Management Knowledge Driven Frameworks for Combating Terrorism and Organized Crime ent://SD_ILS/0/SD_ILS:1880673 2024-09-20T01:28:11Z 2024-09-20T01:28:11Z Yazar&#160;Akhgar, Babak. editor.&#160;Yates, Simeon. editor.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;Q334 -342<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-1-4471-2140-4">Full Text Available From Springer Nature Computer Science 2011 Packages</a><br/>Format:&#160;Electronic Resources<br/> Foundations of Security What Every Programmer Needs to Know ent://SD_ILS/0/SD_ILS:1876064 2024-09-20T01:28:11Z 2024-09-20T01:28:11Z Yazar&#160;Kern, Christoph. author.&#160;Kesavan, Anita. author.&#160;Daswani, Neil. author.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA76.9 .A25<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-1-4302-0377-3">Full Text Available From Springer Nature Professional and Applied Computing 2007 Packages</a><br/>Format:&#160;Electronic Resources<br/> Always Use Protection A Teen's Guide to Safe Computing ent://SD_ILS/0/SD_ILS:1946142 2024-09-20T01:28:11Z 2024-09-20T01:28:11Z Yazar&#160;Appleman, Dan. author.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA76.9 .A25<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-1-4302-0904-1">Full Text Available From Springer Nature Professional and Applied Computing Archive Packages</a><br/>Format:&#160;Electronic Resources<br/> Biorthogonal Systems in Banach Spaces ent://SD_ILS/0/SD_ILS:1888277 2024-09-20T01:28:11Z 2024-09-20T01:28:11Z Yazar&#160;Hajek, Petr. author.&#160;Montesinos Santalucia, Vicente. author.&#160;Vanderwerff, Jon. author.&#160;Zizler, Vaclav. author.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA319 -329.9<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-0-387-68915-9">Full Text Available From Springer Nature Mathematics and Statistics 2008 Packages</a><br/>Format:&#160;Electronic Resources<br/> System Administration Ethics Ten Commandments for Security and Compliance in a Modern Cyber World ent://SD_ILS/0/SD_ILS:1878385 2024-09-20T01:28:11Z 2024-09-20T01:28:11Z Yazar&#160;Ljubuncic, Igor. author.&#160;Litterer, Tom. author.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA76.9 .A25<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-1-4842-4988-8">Full Text Available From Springer Nature Professional and Applied Computing 2019 Packages</a><br/>Format:&#160;Electronic Resources<br/> ISSE 2009 Securing Electronic Business Processes Highlights of the Information Security Solutions Europe 2009 Conference ent://SD_ILS/0/SD_ILS:1880417 2024-09-20T01:28:11Z 2024-09-20T01:28:11Z Yazar&#160;Pohlmann, Norbert. editor.&#160;Reimer, Helmut. editor.&#160;Schneider, Wolfgang. editor.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA75.5 -76.95<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-8348-9363-5">Full Text Available From Springer Nature Computer Science 2010 Packages</a><br/>Format:&#160;Electronic Resources<br/> Aspect-Oriented Security Hardening of UML Design Models ent://SD_ILS/0/SD_ILS:1882772 2024-09-20T01:28:11Z 2024-09-20T01:28:11Z Yazar&#160;Mouheb, Djedjiga. author.&#160;Debbabi, Mourad. author.&#160;Pourzandi, Makan. author.&#160;Wang, Lingyu. author.&#160;Nouh, Mariam. author.<br/>Yer Numarası&#160;QA76.758<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-319-16106-8">Full Text Available From Springer Nature Computer Science 2015 Packages</a><br/>Format:&#160;Electronic Resources<br/> Fundamentals of Sketch-Based Passwords A General Framework ent://SD_ILS/0/SD_ILS:1882069 2024-09-20T01:28:11Z 2024-09-20T01:28:11Z Yazar&#160;Riggan, Benjamin S. author.&#160;Snyder, Wesley E. author.&#160;Wang, Cliff. author.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;TK7882 .B56<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-319-13629-5">Full Text Available From Springer Nature Computer Science 2014 Packages</a><br/>Format:&#160;Electronic Resources<br/> Engineering Secure Software and Systems 10th International Symposium, ESSoS 2018, Paris, France, June 26-27, 2018, Proceedings ent://SD_ILS/0/SD_ILS:1845842 2024-09-20T01:28:11Z 2024-09-20T01:28:11Z Yazar&#160;Payer, Mathias. editor.&#160;Rashid, Awais. editor. (orcid)0000-0002-0109-1341&#160;Such, Jose M. editor.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA76.9 .A25<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-319-94496-8">Full Text Available From Springer Nature Computer Science 2018 Packages</a><br/>Format:&#160;Electronic Resources<br/> Personal Cybersecurity How to Avoid and Recover from Cybercrime ent://SD_ILS/0/SD_ILS:1877820 2024-09-20T01:28:11Z 2024-09-20T01:28:11Z Yazar&#160;Waschke, Marvin. author.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA76.9 .A25<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-1-4842-2430-4">Full Text Available From Springer Nature Professional and Applied Computing 2017 Packages</a><br/>Format:&#160;Electronic Resources<br/> AI in Cybersecurity ent://SD_ILS/0/SD_ILS:1852872 2024-09-20T01:28:11Z 2024-09-20T01:28:11Z Yazar&#160;Sikos, Leslie F. editor.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;Q342<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-319-98842-9">Full Text Available From Springer Nature Intelligent Technologies and Robotics 2019 Packages</a><br/>Format:&#160;Electronic Resources<br/> Bio-inspiring Cyber Security and Cloud Services: Trends and Innovations ent://SD_ILS/0/SD_ILS:1807382 2024-09-20T01:28:11Z 2024-09-20T01:28:11Z Yazar&#160;Hassanien, Aboul Ella. editor.&#160;Kim, Tai-Hoon. editor.&#160;Kacprzyk, Janusz. editor.&#160;Awad, Ali Ismail. editor.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;Q342<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-662-43616-5">Full Text Available From Springer Nature Engineering 2014 Packages</a><br/>Format:&#160;Electronic Resources<br/> Security Engineering for Vehicular IT Systems Improving the Trustworthiness and Dependability of Automotive IT Applications ent://SD_ILS/0/SD_ILS:1880076 2024-09-20T01:28:11Z 2024-09-20T01:28:11Z Yazar&#160;Wolf, Marko. author.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA76.9 .A25<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-8348-9581-3">Full Text Available From Springer Nature Computer Science 2009 Packages</a><br/>Format:&#160;Electronic Resources<br/> Reversible Steganography and Authentication via Transform Encoding ent://SD_ILS/0/SD_ILS:1853500 2024-09-20T01:28:11Z 2024-09-20T01:28:11Z Yazar&#160;Mandal, Jyotsna Kumar. author.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;Q342<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-981-15-4397-5">Full Text Available From Springer Nature Intelligent Technologies and Robotics 2020 Packages</a><br/>Format:&#160;Electronic Resources<br/> Emerging Trends in Expert Applications and Security Proceedings of ICETEAS 2018 ent://SD_ILS/0/SD_ILS:1852878 2024-09-20T01:28:11Z 2024-09-20T01:28:11Z Yazar&#160;Rathore, Vijay Singh. editor.&#160;Worring, Marcel. editor. (orcid)0000-0003-4097-4136&#160;Mishra, Durgesh Kumar. editor.&#160;Joshi, Amit. editor.&#160;Maheshwari, Shikha. editor.<br/>Yer Numarası&#160;Q342<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-981-13-2285-3">Full Text Available From Springer Nature Intelligent Technologies and Robotics 2019 Packages</a><br/>Format:&#160;Electronic Resources<br/> Computational Intelligence in Digital Forensics: Forensic Investigation and Applications ent://SD_ILS/0/SD_ILS:1807424 2024-09-20T01:28:11Z 2024-09-20T01:28:11Z Yazar&#160;Muda, Azah Kamilah. editor.&#160;Choo, Yun-Huoy. editor.&#160;Abraham, Ajith. editor.&#160;N. Srihari, Sargur. editor.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;Q342<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-319-05885-6">Full Text Available From Springer Nature Engineering 2014 Packages</a><br/>Format:&#160;Electronic Resources<br/> Security with Intelligent Computing and Big-data Services ent://SD_ILS/0/SD_ILS:1811338 2024-09-20T01:28:11Z 2024-09-20T01:28:11Z Yazar&#160;Peng, Sheng-Lung. editor.&#160;Wang, Shiuh-Jeng. editor.&#160;Balas, Valentina Emilia. editor. (orcid)0000-0003-0885-1283&#160;Zhao, Ming. editor.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;Q342<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-319-76451-1">Full Text Available From Springer Nature Engineering 2018 Packages</a><br/>Format:&#160;Electronic Resources<br/> ISSE 2006 Securing Electronic Business Processes Highlights of the Information Security Solutions Europe 2006 Conference ent://SD_ILS/0/SD_ILS:1879380 2024-09-20T01:28:11Z 2024-09-20T01:28:11Z Yazar&#160;Paulus, Sachar. editor.&#160;Pohlmann, Norbert. editor.&#160;Reimer, Helmut. editor.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA76.9 .M3<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-8348-9195-2">Full Text Available From Springer Nature Computer Science 2006 Packages</a><br/>Format:&#160;Electronic Resources<br/> Machine Learning and Systems Engineering ent://SD_ILS/0/SD_ILS:1817594 2024-09-20T01:28:11Z 2024-09-20T01:28:11Z Yazar&#160;Ao, Sio-Iong. editor.&#160;Rieger, Burghard B. editor.&#160;Amouzegar, Mahyar. editor.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;Q342<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-90-481-9419-3">Full Text Available From Springer Nature Engineering 2010 Packages</a><br/>Format:&#160;Electronic Resources<br/> ISSE/SECURE 2007 Securing Electronic Business Processes Highlights of the Information Security Solutions Europe/SECURE 2007 Conference ent://SD_ILS/0/SD_ILS:1879524 2024-09-20T01:28:11Z 2024-09-20T01:28:11Z Yazar&#160;Pohlmann, Norbert. editor.&#160;Reimer, Helmut. editor.&#160;Schneider, Wolfgang. editor.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA76.9 .M3<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-8348-9418-2">Full Text Available From Springer Nature Computer Science 2007 Packages</a><br/>Format:&#160;Electronic Resources<br/> PowerShell and Python Together Targeting Digital Investigations ent://SD_ILS/0/SD_ILS:1878334 2024-09-20T01:28:11Z 2024-09-20T01:28:11Z Yazar&#160;Hosmer, Chet. author.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA76.9 .A25<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-1-4842-4504-0">Full Text Available From Springer Nature Professional and Applied Computing 2019 Packages</a><br/>Format:&#160;Electronic Resources<br/> Pro Spring Security Securing Spring Framework 5 and Boot 2-based Java Applications ent://SD_ILS/0/SD_ILS:1878395 2024-09-20T01:28:11Z 2024-09-20T01:28:11Z Yazar&#160;Scarioni, Carlo. author.&#160;Nardone, Massimo. author.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA76.73 .J38<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-1-4842-5052-5">Full Text Available From Springer Nature Professional and Applied Computing 2019 Packages</a><br/>Format:&#160;Electronic Resources<br/> Big Data Concepts, Theories, and Applications ent://SD_ILS/0/SD_ILS:1882970 2024-09-20T01:28:11Z 2024-09-20T01:28:11Z Yazar&#160;Yu, Shui. editor.&#160;Guo, Song. editor.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;TK5105.5 -5105.9<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-319-27763-9">Full Text Available From Springer Nature Computer Science 2016 Packages</a><br/>Format:&#160;Electronic Resources<br/> Pro iOS Security and Forensics Enterprise iPhone and iPad Safety ent://SD_ILS/0/SD_ILS:1877957 2024-09-20T01:28:11Z 2024-09-20T01:28:11Z Yazar&#160;Butow, Eric. author.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA76.8 .M3<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-1-4842-3757-1">Full Text Available From Springer Nature Professional and Applied Computing 2018 Packages</a><br/>Format:&#160;Electronic Resources<br/> Information Security for Managers ent://SD_ILS/0/SD_ILS:1928072 2024-09-20T01:28:11Z 2024-09-20T01:28:11Z Yazar&#160;Caelli, William. author.&#160;Longley, Denis. author.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA76.9 .A25<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-1-349-10137-5">Full Text Available From Springer Nature Computer Science Archive Packages</a><br/>Format:&#160;Electronic Resources<br/> Dynamic Games for Network Security ent://SD_ILS/0/SD_ILS:1811429 2024-09-20T01:28:11Z 2024-09-20T01:28:11Z Yazar&#160;He, Xiaofan. author.&#160;Dai, Huaiyu. author.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;TK5101 -5105.9<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-319-75871-8">Full Text Available From Springer Nature Engineering 2018 Packages</a><br/>Format:&#160;Electronic Resources<br/> Mobile Device Management Mobility Evaluation in Small and Medium-Sized Enterprises ent://SD_ILS/0/SD_ILS:1883236 2024-09-20T01:28:11Z 2024-09-20T01:28:11Z Yazar&#160;Pierer, Markus. author.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;TK5105.5 -5105.9<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-658-15046-4">Full Text Available From Springer Nature Computer Science 2016 Packages</a><br/>Format:&#160;Electronic Resources<br/> Wireless Networks and Security Issues, Challenges and Research Trends ent://SD_ILS/0/SD_ILS:1819540 2024-09-20T01:28:11Z 2024-09-20T01:28:11Z Yazar&#160;Khan, Shafiullah. editor.&#160;Khan Pathan, Al-Sakib. editor.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;TK5101 -5105.9<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-642-36169-2">Full Text Available From Springer Nature Engineering 2013 Packages</a><br/>Format:&#160;Electronic Resources<br/> Security and Privacy in New Computing Environments Second EAI International Conference, SPNCE 2019, Tianjin, China, April 13-14, 2019, Proceedings ent://SD_ILS/0/SD_ILS:1885190 2024-09-20T01:28:11Z 2024-09-20T01:28:11Z Yazar&#160;Li, Jin. editor.&#160;Liu, Zheli. editor.&#160;Peng, Hao. editor.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA76.9 .A25<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-030-21373-2">Full Text Available From Springer Nature Computer Science 2019 Packages</a><br/>Format:&#160;Electronic Resources<br/> Computer Networks and Distributed Systems International Symposium, CNDS 2013, Tehran, Iran, December 25-26, 2013, Revised Selected Papers ent://SD_ILS/0/SD_ILS:1882078 2024-09-20T01:28:11Z 2024-09-20T01:28:11Z Yazar&#160;Jahangir, Amir Hossein. editor.&#160;Movaghar, Ali. editor.&#160;Asadi, Hossein. editor.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;TK5105.5 -5105.9<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-319-10903-9">Full Text Available From Springer Nature Computer Science 2014 Packages</a><br/>Format:&#160;Electronic Resources<br/> Deep Learning for Security and Privacy Preservation in IoT ent://SD_ILS/0/SD_ILS:1887165 2024-09-20T01:28:11Z 2024-09-20T01:28:11Z Yazar&#160;Makkar, Aaisha. editor.&#160;Kumar, Neeraj. editor.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA76.9 .A25<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-981-16-6186-0">Full Text Available From Springer Nature Computer Science 2021 Packages</a><br/>Format:&#160;Electronic Resources<br/> The IoT Hacker's Handbook A Practical Guide to Hacking the Internet of Things ent://SD_ILS/0/SD_ILS:1878333 2024-09-20T01:28:11Z 2024-09-20T01:28:11Z Yazar&#160;Gupta, Aditya. author.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;TK5105.5 -5105.9<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-1-4842-4300-8">Full Text Available From Springer Nature Professional and Applied Computing 2019 Packages</a><br/>Format:&#160;Electronic Resources<br/> Adversary Detection For Cognitive Radio Networks ent://SD_ILS/0/SD_ILS:1811541 2024-09-20T01:28:11Z 2024-09-20T01:28:11Z Yazar&#160;He, Xiaofan. author.&#160;Dai, Huaiyu. author.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;TK5101 -5105.9<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-319-75868-8">Full Text Available From Springer Nature Engineering 2018 Packages</a><br/>Format:&#160;Electronic Resources<br/> Fundamentals of Network Forensics A Research Perspective ent://SD_ILS/0/SD_ILS:1883260 2024-09-20T01:28:11Z 2024-09-20T01:28:11Z Yazar&#160;Joshi, R.C. author.&#160;Pilli, Emmanuel S. author.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;TK5105.5 -5105.9<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-1-4471-7299-4">Full Text Available From Springer Nature Computer Science 2016 Packages</a><br/>Format:&#160;Electronic Resources<br/> Karma-based API on Apple Platforms Building Privacy Into iOS and macOS Apps ent://SD_ILS/0/SD_ILS:1878261 2024-09-20T01:28:11Z 2024-09-20T01:28:11Z Yazar&#160;Carrasco Molina, Manuel. author.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA76.8 .M3<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-1-4842-4291-9">Full Text Available From Springer Nature Professional and Applied Computing 2019 Packages</a><br/>Format:&#160;Electronic Resources<br/> Mathematics and Computing 4th International Conference, ICMC 2018, Varanasi, India, January 9-11, 2018, Revised Selected Papers ent://SD_ILS/0/SD_ILS:1883964 2024-09-20T01:28:11Z 2024-09-20T01:28:11Z Yazar&#160;Ghosh, Debdas. editor.&#160;Giri, Debasis. editor.&#160;Mohapatra, Ram N. editor.&#160;Savas, Ekrem. editor.&#160;Sakurai, Kouichi. editor.<br/>Yer Numarası&#160;QA76.9 .M35<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-981-13-0023-3">Full Text Available From Springer Nature Computer Science 2018 Packages</a><br/>Format:&#160;Electronic Resources<br/> Practical Cryptography in Python Learning Correct Cryptography by Example ent://SD_ILS/0/SD_ILS:1878449 2024-09-20T01:28:11Z 2024-09-20T01:28:11Z Yazar&#160;Nielson, Seth James. author.&#160;Monson, Christopher K. author.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA76.9 .A25<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-1-4842-4900-0">Full Text Available From Springer Nature Professional and Applied Computing 2019 Packages</a><br/>Format:&#160;Electronic Resources<br/> Future Network Systems and Security First International Conference, FNSS 2015, Paris, France, June 11-13, 2015, Proceedings ent://SD_ILS/0/SD_ILS:1882662 2024-09-20T01:28:11Z 2024-09-20T01:28:11Z Yazar&#160;Doss, Robin. editor. (orcid)0000-0001-6143-6850&#160;Piramuthu, Selwyn. editor.&#160;ZHOU, Wei. editor. (orcid)0000-0002-9965-9870&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;TK5105.5 -5105.9<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-319-19210-9">Full Text Available From Springer Nature Computer Science 2015 Packages</a><br/>Format:&#160;Electronic Resources<br/> Location Privacy in Mobile Applications ent://SD_ILS/0/SD_ILS:1884204 2024-09-20T01:28:11Z 2024-09-20T01:28:11Z Yazar&#160;Liu, Bo. author.&#160;Zhou, Wanlei. author.&#160;Zhu, Tianqing. author.&#160;Xiang, Yong. author. (orcid)0000-0001-5252-0831&#160;Wang, Kun. author.<br/>Yer Numarası&#160;QA76.9 .A25<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-981-13-1705-7">Full Text Available From Springer Nature Computer Science 2018 Packages</a><br/>Format:&#160;Electronic Resources<br/> Practical Information Security Management A Complete Guide to Planning and Implementation ent://SD_ILS/0/SD_ILS:1877525 2024-09-20T01:28:11Z 2024-09-20T01:28:11Z Yazar&#160;Campbell, Tony. author.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA76.9 .A25<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-1-4842-1685-9">Full Text Available From Springer Nature Professional and Applied Computing 2016 Packages</a><br/>Format:&#160;Electronic Resources<br/> Practical Security Properties on Commodity Computing Platforms The uber eXtensible Micro-Hypervisor Framework ent://SD_ILS/0/SD_ILS:1885424 2024-09-20T01:28:11Z 2024-09-20T01:28:11Z Yazar&#160;Vasudevan, Amit. author.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA76.9 .A25<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-030-25049-2">Full Text Available From Springer Nature Computer Science 2019 Packages</a><br/>Format:&#160;Electronic Resources<br/> Smart Trends in Information Technology and Computer Communications Second International Conference, SmartCom 2017, Pune, India, August 18-19, 2017, Revised Selected Papers ent://SD_ILS/0/SD_ILS:1884199 2024-09-20T01:28:11Z 2024-09-20T01:28:11Z Yazar&#160;Deshpande, A.V. editor.&#160;Unal, Aynur. editor.&#160;Passi, Kalpdrum. editor.&#160;Singh, Dharm. editor.&#160;Nayak, Malaya. editor.<br/>Yer Numarası&#160;TK5105.5 -5105.9<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-981-13-1423-0">Full Text Available From Springer Nature Computer Science 2018 Packages</a><br/>Format:&#160;Electronic Resources<br/> Cybersecurity for Hospitals and Healthcare Facilities A Guide to Detection and Prevention ent://SD_ILS/0/SD_ILS:1877702 2024-09-20T01:28:11Z 2024-09-20T01:28:11Z Yazar&#160;Ayala, Luis. author.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA76.9 .A25<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-1-4842-2155-6">Full Text Available From Springer Nature Professional and Applied Computing 2016 Packages</a><br/>Format:&#160;Electronic Resources<br/> Versatile Cybersecurity ent://SD_ILS/0/SD_ILS:1884027 2024-09-20T01:28:11Z 2024-09-20T01:28:11Z Yazar&#160;Conti, Mauro. editor. (orcid)0000-0002-3612-1934&#160;Somani, Gaurav. editor.&#160;Poovendran, Radha. editor. (orcid)0000-0003-0269-8097&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA76.9 .A25<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-319-97643-3">Full Text Available From Springer Nature Computer Science 2018 Packages</a><br/>Format:&#160;Electronic Resources<br/> Red Hat and IT Security With Red Hat Ansible, Red Hat OpenShift, and Red Hat Security Auditing ent://SD_ILS/0/SD_ILS:1878755 2024-09-20T01:28:11Z 2024-09-20T01:28:11Z Yazar&#160;Chatterjee, Rithik. author.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA76.9 .A25<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-1-4842-6434-8">Full Text Available From Springer Nature Professional and Applied Computing 2021 Packages</a><br/>Format:&#160;Electronic Resources<br/> Security in Computing and Communications 5th International Symposium, SSCC 2017, Manipal, India, September 13-16, 2017, Proceedings ent://SD_ILS/0/SD_ILS:1883436 2024-09-20T01:28:11Z 2024-09-20T01:28:11Z Yazar&#160;Thampi, Sabu M. editor.&#160;Mart&iacute;nez P&eacute;rez, Gregorio. editor.&#160;Westphall, Carlos Becker. editor.&#160;Hu, Jiankun. editor.&#160;Fan, Chun I. editor.<br/>Yer Numarası&#160;QA76.9 .A25<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-981-10-6898-0">Full Text Available From Springer Nature Computer Science 2017 Packages</a><br/>Format:&#160;Electronic Resources<br/> The Second Economy The Race for Trust, Treasure and Time in the Cybersecurity War ent://SD_ILS/0/SD_ILS:1877488 2024-09-20T01:28:11Z 2024-09-20T01:28:11Z Yazar&#160;Grobman, Steve. author.&#160;Cerra, Allison. author.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;TK5105.5 -5105.9<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-1-4842-2229-4">Full Text Available From Springer Nature Professional and Applied Computing 2016 Packages</a><br/>Format:&#160;Electronic Resources<br/> Continued Rise of the Cloud Advances and Trends in Cloud Computing ent://SD_ILS/0/SD_ILS:1882207 2024-09-20T01:28:11Z 2024-09-20T01:28:11Z Yazar&#160;Mahmood, Zaigham. editor.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;TK5105.5 -5105.9<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-1-4471-6452-4">Full Text Available From Springer Nature Computer Science 2014 Packages</a><br/>Format:&#160;Electronic Resources<br/> Financial Cybersecurity Risk Management Leadership Perspectives and Guidance for Systems and Institutions ent://SD_ILS/0/SD_ILS:1878406 2024-09-20T01:28:11Z 2024-09-20T01:28:11Z Yazar&#160;Rohmeyer, Paul. author.&#160;Bayuk, Jennifer L. author.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA76.9 .A25<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-1-4842-4194-3">Full Text Available From Springer Nature Professional and Applied Computing 2019 Packages</a><br/>Format:&#160;Electronic Resources<br/> Beginning Ethical Hacking with Kali Linux Computational Techniques for Resolving Security Issues ent://SD_ILS/0/SD_ILS:1878030 2024-09-20T01:28:11Z 2024-09-20T01:28:11Z Yazar&#160;Sinha, Sanjib. author.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA76.9 .A25<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-1-4842-3891-2">Full Text Available From Springer Nature Professional and Applied Computing 2018 Packages</a><br/>Format:&#160;Electronic Resources<br/> Cybersecurity in the Electricity Sector Managing Critical Infrastructure ent://SD_ILS/0/SD_ILS:1884702 2024-09-20T01:28:11Z 2024-09-20T01:28:11Z Yazar&#160;Leszczyna, Rafał. author.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA76.9 .A25<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-030-19538-0">Full Text Available From Springer Nature Computer Science 2019 Packages</a><br/>Format:&#160;Electronic Resources<br/> Serverless Security Understand, Assess, and Implement Secure and Reliable Applications in AWS, Microsoft Azure, and Google Cloud ent://SD_ILS/0/SD_ILS:1878714 2024-09-20T01:28:11Z 2024-09-20T01:28:11Z Yazar&#160;Calles, Miguel A. author.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA76.9 .A25<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-1-4842-6100-2">Full Text Available From Springer Nature Professional and Applied Computing 2020 Packages</a><br/>Format:&#160;Electronic Resources<br/> DevSecOps for .NET Core Securing Modern Software Applications ent://SD_ILS/0/SD_ILS:1878611 2024-09-20T01:28:11Z 2024-09-20T01:28:11Z Yazar&#160;Zeeshan, Afzaal Ahmad. author.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA76.76 .M52<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-1-4842-5850-7">Full Text Available From Springer Nature Professional and Applied Computing 2020 Packages</a><br/>Format:&#160;Electronic Resources<br/> Penetration Testing Basics A Quick-Start Guide to Breaking into Systems ent://SD_ILS/0/SD_ILS:1877684 2024-09-20T01:28:11Z 2024-09-20T01:28:11Z Yazar&#160;Messier, Ric. author.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA76.9 .A25<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-1-4842-1857-0">Full Text Available From Springer Nature Professional and Applied Computing 2016 Packages</a><br/>Format:&#160;Electronic Resources<br/> Information Systems Security and Privacy Third International Conference, ICISSP 2017, Porto, Portugal, February 19-21, 2017, Revised Selected Papers ent://SD_ILS/0/SD_ILS:1884095 2024-09-20T01:28:11Z 2024-09-20T01:28:11Z Yazar&#160;Mori, Paolo. editor. (orcid)0000-0002-6618-0388&#160;Furnell, Steven. editor. (orcid)0000-0003-0984-7542&#160;Camp, Olivier. editor.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA76.9 .A25<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-319-93354-2">Full Text Available From Springer Nature Computer Science 2018 Packages</a><br/>Format:&#160;Electronic Resources<br/> Critical Information Infrastructures Resilience and Protection ent://SD_ILS/0/SD_ILS:1879495 2024-09-20T01:28:11Z 2024-09-20T01:28:11Z Yazar&#160;Hyslop, Maitland. author.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA76.9 .A25<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-0-387-71862-0">Full Text Available From Springer Nature Computer Science 2007 Packages</a><br/>Format:&#160;Electronic Resources<br/> Fully Homomorphic Encryption in Real World Applications ent://SD_ILS/0/SD_ILS:1812589 2024-09-20T01:28:11Z 2024-09-20T01:28:11Z Yazar&#160;Chatterjee, Ayantika. author.&#160;Aung, Khin Mi Mi. author.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;TK7867 -7867.5<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-981-13-6393-1">Full Text Available From Springer Nature Engineering 2019 Packages</a><br/>Format:&#160;Electronic Resources<br/> Ubiquitous Computing and Computing Security of IoT ent://SD_ILS/0/SD_ILS:1812617 2024-09-20T01:28:11Z 2024-09-20T01:28:11Z Yazar&#160;Jeyanthi, N. editor.&#160;Abraham, Ajith. editor.&#160;Mcheick, Hamid. editor. (orcid)0000-0002-2589-8609&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;Q342<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-030-01566-4">Full Text Available From Springer Nature Engineering 2019 Packages</a><br/>Format:&#160;Electronic Resources<br/> Cyber Operations Building, Defending, and Attacking Modern Computer Networks ent://SD_ILS/0/SD_ILS:1877298 2024-09-20T01:28:11Z 2024-09-20T01:28:11Z Yazar&#160;O'Leary, Mike. author.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA76.9 .A25<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-1-4842-0457-3">Full Text Available From Springer Nature Professional and Applied Computing 2015 Packages</a><br/>Format:&#160;Electronic Resources<br/> Security for Cloud Storage Systems ent://SD_ILS/0/SD_ILS:1882011 2024-09-20T01:28:11Z 2024-09-20T01:28:11Z Yazar&#160;Yang, Kan. author.&#160;Jia, Xiaohua. author.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA76.9 .A25<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-1-4614-7873-7">Full Text Available From Springer Nature Computer Science 2014 Packages</a><br/>Format:&#160;Electronic Resources<br/> IT Convergence and Security Proceedings of ICITCS 2021 ent://SD_ILS/0/SD_ILS:1886745 2024-09-20T01:28:11Z 2024-09-20T01:28:11Z Yazar&#160;Kim, Hyuncheol. editor.&#160;Kim, Kuinam J. editor.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;Q342<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-981-16-4118-3">Full Text Available From Springer Nature Computer Science 2021 Packages</a><br/>Format:&#160;Electronic Resources<br/> Information Security Applications 14th International Workshop, WISA 2013, Jeju Island, Korea, August 19-21, 2013, Revised Selected Papers ent://SD_ILS/0/SD_ILS:1843149 2024-09-20T01:28:11Z 2024-09-20T01:28:11Z Yazar&#160;Kim, Yongdae. editor.&#160;Lee, Heejo. editor.&#160;Perrig, Adrian. editor.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA76.9 .A25<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-319-05149-9">Full Text Available From Springer Nature Computer Science 2014 Packages</a><br/>Format:&#160;Electronic Resources<br/> Cryptography and Security Systems Third International Conference, CSS 2014, Lublin, Poland, September 22-24, 2014. Proceedings ent://SD_ILS/0/SD_ILS:1882124 2024-09-20T01:28:11Z 2024-09-20T01:28:11Z Yazar&#160;Kotulski, Zbigniew. editor.&#160;Ksiezopolski, Bogdan. editor.&#160;Mazur, Katarzyna. editor.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA76.9 .A25<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-662-44893-9">Full Text Available From Springer Nature Computer Science 2014 Packages</a><br/>Format:&#160;Electronic Resources<br/> Principles of Data Security ent://SD_ILS/0/SD_ILS:1925893 2024-09-20T01:28:11Z 2024-09-20T01:28:11Z Yazar&#160;Leiss, Ernst L. author.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA76.9 .A25<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-1-4684-4316-5">Full Text Available From Springer Nature Computer Science Archive Packages</a><br/>Format:&#160;Electronic Resources<br/> QoS Routing Algorithms for Wireless Sensor Networks ent://SD_ILS/0/SD_ILS:1885674 2024-09-20T01:28:11Z 2024-09-20T01:28:11Z Yazar&#160;Venugopal, K. R. author.&#160;T., Shiv Prakash. author.&#160;Kumaraswamy, M. author.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;TK5105.5 -5105.9<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-981-15-2720-3">Full Text Available From Springer Nature Computer Science 2020 Packages</a><br/>Format:&#160;Electronic Resources<br/> Data Analytics and Management Proceedings of ICDAM ent://SD_ILS/0/SD_ILS:1854021 2024-09-20T01:28:11Z 2024-09-20T01:28:11Z Yazar&#160;Khanna, Ashish. editor.&#160;Gupta, Deepak. editor.&#160;P&oacute;lkowski, Zdzisław. editor.&#160;Bhattacharyya, Siddhartha. editor.&#160;Castillo, Oscar. editor.<br/>Yer Numarası&#160;Q342<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-981-15-8335-3">Full Text Available From Springer Nature Intelligent Technologies and Robotics 2021 Packages</a><br/>Format:&#160;Electronic Resources<br/> Cryptographic Obfuscation A Survey ent://SD_ILS/0/SD_ILS:1885823 2024-09-20T01:28:11Z 2024-09-20T01:28:11Z Yazar&#160;Horv&aacute;th, M&aacute;t&eacute;. author.&#160;Butty&aacute;n, Levente. author.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA268<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-319-98041-6">Full Text Available From Springer Nature Computer Science 2020 Packages</a><br/>Format:&#160;Electronic Resources<br/> Cyber Security on Azure An IT Professional's Guide to Microsoft Azure Security Center ent://SD_ILS/0/SD_ILS:1877832 2024-09-20T01:28:11Z 2024-09-20T01:28:11Z Yazar&#160;Copeland, Marshall. author.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA76.76 .M52<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-1-4842-2740-4">Full Text Available From Springer Nature Professional and Applied Computing 2017 Packages</a><br/>Format:&#160;Electronic Resources<br/> Beginning Security with Microsoft Technologies Protecting Office 365, Devices, and Data ent://SD_ILS/0/SD_ILS:1878265 2024-09-20T01:28:11Z 2024-09-20T01:28:11Z Yazar&#160;Lakshmi, Vasantha. author.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA76.76 .M52<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-1-4842-4853-9">Full Text Available From Springer Nature Professional and Applied Computing 2019 Packages</a><br/>Format:&#160;Electronic Resources<br/> Recent Advances in Systems Safety and Security ent://SD_ILS/0/SD_ILS:1809675 2024-09-20T01:28:11Z 2024-09-20T01:28:11Z Yazar&#160;Pricop, Emil. editor.&#160;Stamatescu, Grigore. editor.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;Q342<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-319-32525-5">Full Text Available From Springer Nature Engineering 2016 Packages</a><br/>Format:&#160;Electronic Resources<br/> Applications and Techniques in Information Security International Conference, ATIS 2014, Melbourne, Australia, November 26-28, 2014. Proceedings ent://SD_ILS/0/SD_ILS:1882027 2024-09-20T01:28:11Z 2024-09-20T01:28:11Z Yazar&#160;Batten, Lynn. editor.&#160;Li, Gang. editor. (orcid)0000-0003-1583-641X&#160;Niu, Wenjia. editor.&#160;Warren, Matthew. editor.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA76.9 .A25<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-662-45670-5">Full Text Available From Springer Nature Computer Science 2014 Packages</a><br/>Format:&#160;Electronic Resources<br/> Cyber Resilience of Systems and Networks ent://SD_ILS/0/SD_ILS:1813014 2024-09-20T01:28:11Z 2024-09-20T01:28:11Z Yazar&#160;Kott, Alexander. editor.&#160;Linkov, Igor. editor.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;TH9701 -9745<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-319-77492-3">Full Text Available From Springer Nature Engineering 2019 Packages</a><br/>Format:&#160;Electronic Resources<br/> Building the Infrastructure for Cloud Security A Solutions View ent://SD_ILS/0/SD_ILS:1877164 2024-09-20T01:28:11Z 2024-09-20T01:28:11Z Yazar&#160;Yeluri, Raghuram. author.&#160;Castro-Leon, Enrique. author.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA76.9 .A25<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-1-4302-6146-9">Full Text Available From Springer Nature Professional and Applied Computing 2014 Packages</a><br/>Format:&#160;Electronic Resources<br/> Computer Vision - ECCV 2018 15th European Conference, Munich, Germany, September 8-14, 2018, Proceedings, Part V ent://SD_ILS/0/SD_ILS:1845738 2024-09-20T01:28:11Z 2024-09-20T01:28:11Z Yazar&#160;Ferrari, Vittorio. editor.&#160;Hebert, Martial. editor.&#160;Sminchisescu, Cristian. editor.&#160;Weiss, Yair. editor.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;TA1634<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-030-01228-1">Full Text Available From Springer Nature Computer Science 2018 Packages</a><br/>Format:&#160;Electronic Resources<br/> From Hacking to Report Writing An Introduction to Security and Penetration Testing ent://SD_ILS/0/SD_ILS:1877577 2024-09-20T01:28:11Z 2024-09-20T01:28:11Z Yazar&#160;Svensson, Robert. author.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA76.9 .A25<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-1-4842-2283-6">Full Text Available From Springer Nature Professional and Applied Computing 2016 Packages</a><br/>Format:&#160;Electronic Resources<br/> Cloud Defense Strategies with Azure Sentinel Hands-on Threat Hunting in Cloud Logs and Services ent://SD_ILS/0/SD_ILS:1878942 2024-09-20T01:28:11Z 2024-09-20T01:28:11Z Yazar&#160;Copeland, Marshall. author.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA76.76 .M52<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-1-4842-7132-2">Full Text Available From Springer Nature Professional and Applied Computing 2021 Packages</a><br/>Format:&#160;Electronic Resources<br/> Developing Applications with Azure Active Directory Principles of Authentication and Authorization for Architects and Developers ent://SD_ILS/0/SD_ILS:1878373 2024-09-20T01:28:11Z 2024-09-20T01:28:11Z Yazar&#160;Mayank, Manas. author.&#160;Garg, Mohit. author.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA76.76 .M52<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-1-4842-5040-2">Full Text Available From Springer Nature Professional and Applied Computing 2019 Packages</a><br/>Format:&#160;Electronic Resources<br/> Enterprise Cybersecurity How to Build a Successful Cyberdefense Program Against Advanced Threats ent://SD_ILS/0/SD_ILS:1877259 2024-09-20T01:28:11Z 2024-09-20T01:28:11Z Yazar&#160;Donaldson, Scott. author.&#160;Siegel, Stanley. author.&#160;Williams, Chris K. author.&#160;Aslam, Abdul. author.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA76.9 .A25<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-1-4302-6083-7">Full Text Available From Springer Nature Professional and Applied Computing 2015 Packages</a><br/>Format:&#160;Electronic Resources<br/> Protocols, Strands, and Logic Essays Dedicated to Joshua Guttman on the Occasion of his 66.66th Birthday ent://SD_ILS/0/SD_ILS:1887252 2024-09-20T01:28:11Z 2024-09-20T01:28:11Z Yazar&#160;Dougherty, Daniel. editor.&#160;Meseguer, Jos&eacute;. editor.&#160;M&ouml;dersheim, Sebastian Alexander. editor. (orcid)0000-0002-6901-8319&#160;Rowe, Paul. editor.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA76.9 .A25<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-030-91631-2">Full Text Available From Springer Nature Computer Science 2021 Packages</a><br/>Format:&#160;Electronic Resources<br/> Smart Innovations in Communication and Computational Sciences Proceedings of ICSICCS 2017, Volume 1 ent://SD_ILS/0/SD_ILS:1852841 2024-09-20T01:28:11Z 2024-09-20T01:28:11Z Yazar&#160;Panigrahi, Bijaya Ketan. editor.&#160;Trivedi, Munesh C. editor.&#160;Mishra, Krishn K. editor.&#160;Tiwari, Shailesh. editor.&#160;Singh, Pradeep Kumar. editor. (orcid)0000-0002-7676-9014<br/>Yer Numarası&#160;Q342<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-981-10-8968-8">Full Text Available From Springer Nature Intelligent Technologies and Robotics 2019 Packages</a><br/>Format:&#160;Electronic Resources<br/> Smart Innovations in Communication and Computational Sciences Proceedings of ICSICCS 2017, Volume 2 ent://SD_ILS/0/SD_ILS:1853076 2024-09-20T01:28:11Z 2024-09-20T01:28:11Z Yazar&#160;Panigrahi, Bijaya Ketan. editor.&#160;Trivedi, Munesh C. editor.&#160;Mishra, Krishn K. editor.&#160;Tiwari, Shailesh. editor.&#160;Singh, Pradeep Kumar. editor. (orcid)0000-0002-7676-9014<br/>Yer Numarası&#160;Q342<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-981-10-8971-8">Full Text Available From Springer Nature Intelligent Technologies and Robotics 2019 Packages</a><br/>Format:&#160;Electronic Resources<br/> Rising Threats in Expert Applications and Solutions Proceedings of FICR-TEAS 2020 ent://SD_ILS/0/SD_ILS:1853920 2024-09-20T01:28:11Z 2024-09-20T01:28:11Z Yazar&#160;Rathore, Vijay Singh. editor.&#160;Dey, Nilanjan. editor.&#160;Piuri, Vincenzo. editor.&#160;Babo, Rosalina. editor.&#160;Polkowski, Zdzislaw. editor.<br/>Yer Numarası&#160;Q342<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-981-15-6014-9">Full Text Available From Springer Nature Intelligent Technologies and Robotics 2021 Packages</a><br/>Format:&#160;Electronic Resources<br/> Sustainable Logistics and Production in Industry 4.0 New Opportunities and Challenges ent://SD_ILS/0/SD_ILS:1800207 2024-09-20T01:28:11Z 2024-09-20T01:28:11Z Yazar&#160;Grzybowska, Katarzyna. editor.&#160;Awasthi, Anjali. editor.&#160;Sawhney, Rapinder. editor.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;HD28 -70<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-030-33369-0">Full Text Available From Springer Nature Earth and Environmental Science 2020 Packages</a><br/>Format:&#160;Electronic Resources<br/> Data Driven Approach Towards Disruptive Technologies Proceedings of MIDAS 2020 ent://SD_ILS/0/SD_ILS:1854326 2024-09-20T01:28:11Z 2024-09-20T01:28:11Z Yazar&#160;Singh, T P. editor.&#160;Tomar, Ravi. editor.&#160;Choudhury, Tanupriya. editor.&#160;Perumal, Thinagaran. editor.&#160;Mahdi, Hussain Falih. editor.<br/>Yer Numarası&#160;Q342<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-981-15-9873-9">Full Text Available From Springer Nature Intelligent Technologies and Robotics 2021 Packages</a><br/>Format:&#160;Electronic Resources<br/> Intelligent Computing and Innovation on Data Science Proceedings of ICTIDS 2019 ent://SD_ILS/0/SD_ILS:1853687 2024-09-20T01:28:11Z 2024-09-20T01:28:11Z Yazar&#160;Peng, Sheng-Lung. editor.&#160;Son, Le Hoang. editor.&#160;Suseendran, G. editor.&#160;Balaganesh, D. editor.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;Q342<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-981-15-3284-9">Full Text Available From Springer Nature Intelligent Technologies and Robotics 2020 Packages</a><br/>Format:&#160;Electronic Resources<br/> Fundamentals of Secure System Modelling ent://SD_ILS/0/SD_ILS:1883698 2024-09-20T01:28:11Z 2024-09-20T01:28:11Z Yazar&#160;Matulevičius, Raimundas. author.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA76.9 .A25<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-319-61717-6">Full Text Available From Springer Nature Computer Science 2017 Packages</a><br/>Format:&#160;Electronic Resources<br/> SAFECOMP '93 The 12th International Conference on Computer Safety, Reliability and Security ent://SD_ILS/0/SD_ILS:1922374 2024-09-20T01:28:11Z 2024-09-20T01:28:11Z Yazar&#160;Gorski, Janusz. editor.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA76.9 .A25<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-1-4471-2061-2">Full Text Available From Springer Nature Computer Science Archive Packages</a><br/>Format:&#160;Electronic Resources<br/> Secure ICT Service Provisioning for Cloud, Mobile and Beyond A Workable Architectural Approach Balancing Between Buyers and Providers ent://SD_ILS/0/SD_ILS:1881209 2024-09-20T01:28:11Z 2024-09-20T01:28:11Z Yazar&#160;Faber, Eberhard. author.&#160;Behnsen, Wolfgang. author.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA76.9 .A25<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-658-00069-1">Full Text Available From Springer Nature Computer Science 2012 Packages</a><br/>Format:&#160;Electronic Resources<br/> Advances in Information and Computer Security 9th International Workshop on Security, IWSEC 2014, Hirosaki, Japan, August 27-29, 2014. Proceedings ent://SD_ILS/0/SD_ILS:1843225 2024-09-20T01:28:11Z 2024-09-20T01:28:11Z Yazar&#160;Yoshida, Maki. editor.&#160;Mouri, Koichi. editor.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA76.9 .A25<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-319-09843-2">Full Text Available From Springer Nature Computer Science 2014 Packages</a><br/>Format:&#160;Electronic Resources<br/> Binary Code Fingerprinting for Cybersecurity Application to Malicious Code Fingerprinting ent://SD_ILS/0/SD_ILS:1885975 2024-09-20T01:28:11Z 2024-09-20T01:28:11Z Yazar&#160;Alrabaee, Saed. author.&#160;Debbabi, Mourad. author.&#160;Shirani, Paria. author.&#160;Wang, Lingyu. author.&#160;Youssef, Amr. author.<br/>Yer Numarası&#160;QA76.9 .A25<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-030-34238-8">Full Text Available From Springer Nature Computer Science 2020 Packages</a><br/>Format:&#160;Electronic Resources<br/> GDPR and Biobanking Individual Rights, Public Interest and Research Regulation across Europe ent://SD_ILS/0/SD_ILS:1852496 2024-09-20T01:28:11Z 2024-09-20T01:28:11Z Yazar&#160;Slokenberga, Santa. editor.&#160;Tzortzatou, Olga. editor.&#160;Reichel, Jane. editor.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;KJE901 -9796<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-030-49388-2">Full Text Available From Springer Nature Law and Criminology 2021 Packages</a><br/>Format:&#160;Electronic Resources<br/> Information Science and Applications 2017 ICISA 2017 ent://SD_ILS/0/SD_ILS:1810702 2024-09-20T01:28:11Z 2024-09-20T01:28:11Z Yazar&#160;Kim, Kuinam. editor.&#160;Joukov, Nikolai. editor.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;TK5101 -5105.9<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-981-10-4154-9">Full Text Available From Springer Nature Engineering 2017 Packages</a><br/>Format:&#160;Electronic Resources<br/> Securing PHP Apps ent://SD_ILS/0/SD_ILS:1877489 2024-09-20T01:28:11Z 2024-09-20T01:28:11Z Yazar&#160;Edmunds, Ben. author.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA76.625<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-1-4842-2120-4">Full Text Available From Springer Nature Professional and Applied Computing 2016 Packages</a><br/>Format:&#160;Electronic Resources<br/> Wireless Internet 11th EAI International Conference, WiCON 2018, Taipei, Taiwan, October 15-16, 2018, Proceedings ent://SD_ILS/0/SD_ILS:1885357 2024-09-20T01:28:11Z 2024-09-20T01:28:11Z Yazar&#160;Chen, Jiann-Liang. editor.&#160;Pang, Ai-Chun. editor.&#160;Deng, Der-Jiunn. editor.&#160;Lin, Chun-Cheng. editor.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;TK5105.5 -5105.9<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-030-06158-6">Full Text Available From Springer Nature Computer Science 2019 Packages</a><br/>Format:&#160;Electronic Resources<br/> Advanced ASP.NET Core 3 Security Understanding Hacks, Attacks, and Vulnerabilities to Secure Your Website ent://SD_ILS/0/SD_ILS:1878723 2024-09-20T01:28:11Z 2024-09-20T01:28:11Z Yazar&#160;Norberg, Scott. author.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA76.76 .M52<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-1-4842-6014-2">Full Text Available From Springer Nature Professional and Applied Computing 2020 Packages</a><br/>Format:&#160;Electronic Resources<br/> Enterprise Cybersecurity Study Guide How to Build a Successful Cyberdefense Program Against Advanced Threats ent://SD_ILS/0/SD_ILS:1878069 2024-09-20T01:28:11Z 2024-09-20T01:28:11Z Yazar&#160;Donaldson, Scott E. author.&#160;Siegel, Stanley G. author.&#160;Williams, Chris K. author.&#160;Aslam, Abdul. author.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA76.9 .A25<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-1-4842-3258-3">Full Text Available From Springer Nature Professional and Applied Computing 2018 Packages</a><br/>Format:&#160;Electronic Resources<br/> 10 Don'ts on Your Digital Devices The Non-Techie's Survival Guide to Cyber Security and Privacy ent://SD_ILS/0/SD_ILS:1877179 2024-09-20T01:28:11Z 2024-09-20T01:28:11Z Yazar&#160;Rzeszut, Eric. author.&#160;Bachrach, Daniel. author.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA76.9 .A25<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-1-4842-0367-5">Full Text Available From Springer Nature Professional and Applied Computing 2014 Packages</a><br/>Format:&#160;Electronic Resources<br/> Security and Data Storage Aspect in Cloud Computing ent://SD_ILS/0/SD_ILS:1812573 2024-09-20T01:28:11Z 2024-09-20T01:28:11Z Yazar&#160;Deshpande, Prachi S. author.&#160;Sharma, Subhash C. author.&#160;Peddoju, Sateesh K. author.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;TK5101 -5105.9<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-981-13-6089-3">Full Text Available From Springer Nature Engineering 2019 Packages</a><br/>Format:&#160;Electronic Resources<br/> Mathematics and Computing Third International Conference, ICMC 2017, Haldia, India, January 17-21, 2017, Proceedings ent://SD_ILS/0/SD_ILS:1883691 2024-09-20T01:28:11Z 2024-09-20T01:28:11Z Yazar&#160;Giri, Debasis. editor.&#160;Mohapatra, Ram N. editor.&#160;Begehr, Heinrich. editor.&#160;Obaidat, Mohammad S. editor.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA76.9 .A25<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-981-10-4642-1">Full Text Available From Springer Nature Computer Science 2017 Packages</a><br/>Format:&#160;Electronic Resources<br/> Secure IT Systems 18th Nordic Conference, NordSec 2013, Ilulissat, Greenland, October 18-21, 2013, Proceedings ent://SD_ILS/0/SD_ILS:1842703 2024-09-20T01:28:11Z 2024-09-20T01:28:11Z Yazar&#160;Riis Nielsen, Hanne. editor.&#160;Gollmann, Dieter. editor.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA76.9 .A25<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-642-41488-6">Full Text Available From Springer Nature Computer Science 2013 Packages</a><br/>Format:&#160;Electronic Resources<br/> Information Science and Applications ICISA 2019 ent://SD_ILS/0/SD_ILS:1814010 2024-09-20T01:28:11Z 2024-09-20T01:28:11Z Yazar&#160;Kim, Kuinam J. editor.&#160;Kim, Hye-Young. editor.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;TK5101 -5105.9<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-981-15-1465-4">Full Text Available From Springer Nature Engineering 2020 Packages</a><br/>Format:&#160;Electronic Resources<br/> Information Science and Applications 2018 ICISA 2018 ent://SD_ILS/0/SD_ILS:1812413 2024-09-20T01:28:11Z 2024-09-20T01:28:11Z Yazar&#160;Kim, Kuinam J. editor.&#160;Baek, Nakhoon. editor.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;TK5101 -5105.9<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-981-13-1056-0">Full Text Available From Springer Nature Engineering 2019 Packages</a><br/>Format:&#160;Electronic Resources<br/> Advanced Monitoring in P2P Botnets A Dual Perspective ent://SD_ILS/0/SD_ILS:1883982 2024-09-20T01:28:11Z 2024-09-20T01:28:11Z Yazar&#160;Karuppayah, Shankar. author.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA76.9 .A25<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-981-10-9050-9">Full Text Available From Springer Nature Computer Science 2018 Packages</a><br/>Format:&#160;Electronic Resources<br/> Ad Hoc Networks 10th EAI International Conference, ADHOCNETS 2018, Cairns, Australia, September 20-23, 2018, Proceedings ent://SD_ILS/0/SD_ILS:1884657 2024-09-20T01:28:11Z 2024-09-20T01:28:11Z Yazar&#160;Zheng, Jun. editor.&#160;Xiang, Wei. editor.&#160;Lorenz, Pascal. editor.&#160;Mao, Shiwen. editor.&#160;Yan, Feng. editor.<br/>Yer Numarası&#160;TK5105.5 -5105.9<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-030-05888-3">Full Text Available From Springer Nature Computer Science 2019 Packages</a><br/>Format:&#160;Electronic Resources<br/> Advanced Persistent Training Take Your Security Awareness Program to the Next Level ent://SD_ILS/0/SD_ILS:1877733 2024-09-20T01:28:11Z 2024-09-20T01:28:11Z Yazar&#160;Schroeder, Jordan. author.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA76.9 .A25<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-1-4842-2835-7">Full Text Available From Springer Nature Professional and Applied Computing 2017 Packages</a><br/>Format:&#160;Electronic Resources<br/> Innovations in Computer Science and Engineering Proceedings of the Fifth ICICSE 2017 ent://SD_ILS/0/SD_ILS:1812917 2024-09-20T01:28:11Z 2024-09-20T01:28:11Z Yazar&#160;Saini, H. S. editor.&#160;Sayal, Rishi. editor.&#160;Govardhan, A. editor.&#160;Buyya, Rajkumar. editor.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;TK5101 -5105.9<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-981-10-8201-6">Full Text Available From Springer Nature Engineering 2019 Packages</a><br/>Format:&#160;Electronic Resources<br/> Innovations in Computer Science and Engineering Proceedings of the Fourth ICICSE 2016 ent://SD_ILS/0/SD_ILS:1810667 2024-09-20T01:28:11Z 2024-09-20T01:28:11Z Yazar&#160;Saini, H. S. editor.&#160;Sayal, Rishi. editor.&#160;Rawat, Sandeep Singh. editor.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;TK5101 -5105.9<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-981-10-3818-1">Full Text Available From Springer Nature Engineering 2017 Packages</a><br/>Format:&#160;Electronic Resources<br/> Progress in Cryptology - INDOCRYPT 2013 14th International Conference on Cryptology in India, Mumbai, India, December 7-10, 2013. Proceedings ent://SD_ILS/0/SD_ILS:1842485 2024-09-20T01:28:11Z 2024-09-20T01:28:11Z Yazar&#160;Paul, Goutam. editor.&#160;Vaudenay, Paul. editor.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA268<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-319-03515-4">Full Text Available From Springer Nature Computer Science 2013 Packages</a><br/>Format:&#160;Electronic Resources<br/> Smart Card Research and Advanced Applications 16th International Conference, CARDIS 2017, Lugano, Switzerland, November 13-15, 2017, Revised Selected Papers ent://SD_ILS/0/SD_ILS:1845363 2024-09-20T01:28:11Z 2024-09-20T01:28:11Z Yazar&#160;Eisenbarth, Thomas. editor. (orcid)0000-0003-1116-6973&#160;Teglia, Yannick. editor.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA268<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-319-75208-2">Full Text Available From Springer Nature Computer Science 2018 Packages</a><br/>Format:&#160;Electronic Resources<br/> Cybersecurity for Space Protecting the Final Frontier ent://SD_ILS/0/SD_ILS:1878520 2024-09-20T01:28:11Z 2024-09-20T01:28:11Z Yazar&#160;Oakley, Jacob G. author.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA76.9 .A25<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-1-4842-5732-6">Full Text Available From Springer Nature Professional and Applied Computing 2020 Packages</a><br/>Format:&#160;Electronic Resources<br/> IT Security Risk Control Management An Audit Preparation Plan ent://SD_ILS/0/SD_ILS:1877622 2024-09-20T01:28:11Z 2024-09-20T01:28:11Z Yazar&#160;Pompon, Raymond. author.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA76.9 .A25<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-1-4842-2140-2">Full Text Available From Springer Nature Professional and Applied Computing 2016 Packages</a><br/>Format:&#160;Electronic Resources<br/> Fundamentals of Digital Forensics Theory, Methods, and Real-Life Applications ent://SD_ILS/0/SD_ILS:1885701 2024-09-20T01:28:11Z 2024-09-20T01:28:11Z Yazar&#160;K&auml;vrestad, Joakim. author.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA76.9 .A25<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-030-38954-3">Full Text Available From Springer Nature Computer Science 2020 Packages</a><br/>Format:&#160;Electronic Resources<br/> PCI DSS An Integrated Data Security Standard Guide ent://SD_ILS/0/SD_ILS:1878604 2024-09-20T01:28:11Z 2024-09-20T01:28:11Z Yazar&#160;Seaman, Jim. author.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA76.9 .A25<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-1-4842-5808-8">Full Text Available From Springer Nature Professional and Applied Computing 2020 Packages</a><br/>Format:&#160;Electronic Resources<br/> Pro Google Cloud Automation With Google Cloud Deployment Manager, Spinnaker, Tekton, and Jenkins ent://SD_ILS/0/SD_ILS:1878846 2024-09-20T01:28:11Z 2024-09-20T01:28:11Z Yazar&#160;Sabharwal, Navin. author.&#160;Pandey, Piyush. author.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA76.76 .A65<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-1-4842-6573-4">Full Text Available From Springer Nature Professional and Applied Computing 2021 Packages</a><br/>Format:&#160;Electronic Resources<br/> Secure Systems Development with UML ent://SD_ILS/0/SD_ILS:1879189 2024-09-20T01:28:11Z 2024-09-20T01:28:11Z Yazar&#160;J&uuml;rjens, Jan. author.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA76.9 .A25<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/b137706">Full Text Available From Springer Nature Computer Science 2005 Packages</a><br/>Format:&#160;Electronic Resources<br/> Practical Hadoop Security ent://SD_ILS/0/SD_ILS:1877091 2024-09-20T01:28:11Z 2024-09-20T01:28:11Z Yazar&#160;Lakhe, Bhushan. author.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA76.9 .A25<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-1-4302-6545-0">Full Text Available From Springer Nature Professional and Applied Computing 2014 Packages</a><br/>Format:&#160;Electronic Resources<br/> Defending IoT Infrastructures with the Raspberry Pi Monitoring and Detecting Nefarious Behavior in Real Time ent://SD_ILS/0/SD_ILS:1878192 2024-09-20T01:28:11Z 2024-09-20T01:28:11Z Yazar&#160;Hosmer, Chet. author.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA76.9 .A25<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-1-4842-3700-7">Full Text Available From Springer Nature Professional and Applied Computing 2018 Packages</a><br/>Format:&#160;Electronic Resources<br/> Game Theory for Cyber Deception From Theory to Applications ent://SD_ILS/0/SD_ILS:1894509 2024-09-20T01:28:11Z 2024-09-20T01:28:11Z Yazar&#160;Pawlick, Jeffrey. author.&#160;Zhu, Quanyan. author.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA76.9 .M35<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-030-66065-9">Full Text Available From Springer Nature Mathematics and Statistics 2021 Packages</a><br/>Format:&#160;Electronic Resources<br/> Applications and Techniques in Information Security 6th International Conference, ATIS 2016, Cairns, QLD, Australia, October 26-28, 2016, Proceedings ent://SD_ILS/0/SD_ILS:1883092 2024-09-20T01:28:11Z 2024-09-20T01:28:11Z Yazar&#160;Batten, Lynn. editor. (orcid)0000-0003-4525-2423&#160;Li, Gang. editor. (orcid)0000-0003-1583-641X&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA76.9 .A25<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-981-10-2741-3">Full Text Available From Springer Nature Computer Science 2016 Packages</a><br/>Format:&#160;Electronic Resources<br/> Applications and Techniques in Information Security 6th International Conference, ATIS 2015, Beijing, China, November 4-6, 2015, Proceedings ent://SD_ILS/0/SD_ILS:1882527 2024-09-20T01:28:11Z 2024-09-20T01:28:11Z Yazar&#160;Niu, Wenjia. editor.&#160;Li, Gang. editor. (orcid)0000-0003-1583-641X&#160;Liu, Jiqiang. editor.&#160;Tan, Jianlong. editor.&#160;Guo, Li. editor.<br/>Yer Numarası&#160;QA76.9 .A25<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-662-48683-2">Full Text Available From Springer Nature Computer Science 2015 Packages</a><br/>Format:&#160;Electronic Resources<br/> Speech and Computer 20th International Conference, SPECOM 2018, Leipzig, Germany, September 18-22, 2018, Proceedings ent://SD_ILS/0/SD_ILS:1845498 2024-09-20T01:28:11Z 2024-09-20T01:28:11Z Yazar&#160;Karpov, Alexey. editor. (orcid)0000-0003-3424-652X&#160;Jokisch, Oliver. editor. (orcid)0000-0001-7411-4420&#160;Potapova, Rodmonga. editor. (orcid)0000-0002-7532-9156&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;Q334 -342<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-319-99579-3">Full Text Available From Springer Nature Computer Science 2018 Packages</a><br/>Format:&#160;Electronic Resources<br/> Innovations in Computer Science and Engineering Proceedings of the Sixth ICICSE 2018 ent://SD_ILS/0/SD_ILS:1812894 2024-09-20T01:28:11Z 2024-09-20T01:28:11Z Yazar&#160;Saini, H. S. editor.&#160;Sayal, Rishi. editor.&#160;Govardhan, Aliseri. editor.&#160;Buyya, Rajkumar. editor.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;TK5101 -5105.9<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-981-13-7082-3">Full Text Available From Springer Nature Engineering 2019 Packages</a><br/>Format:&#160;Electronic Resources<br/> Testbeds and Research Infrastructures for the Development of Networks and Communities 13th EAI International Conference, TridentCom 2018, Shanghai, China, December 1-3, 2018, Proceedings ent://SD_ILS/0/SD_ILS:1885365 2024-09-20T01:28:11Z 2024-09-20T01:28:11Z Yazar&#160;Gao, Honghao. editor.&#160;Yin, Yuyu. editor.&#160;Yang, Xiaoxian. editor.&#160;Miao, Huaikou. editor.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;TK5105.5 -5105.9<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-030-12971-2">Full Text Available From Springer Nature Computer Science 2019 Packages</a><br/>Format:&#160;Electronic Resources<br/> Cyber Security Intelligence and Analytics Proceedings of the 2020 International Conference on Cyber Security Intelligence and Analytics (CSIA 2020), Volume 1 ent://SD_ILS/0/SD_ILS:1853387 2024-09-20T01:28:11Z 2024-09-20T01:28:11Z Yazar&#160;Xu, Zheng. editor.&#160;Parizi, Reza M. editor. (orcid)0000-0002-0049-4296&#160;Hammoudeh, Mohammad. editor.&#160;Loyola-Gonz&aacute;lez, Octavio. editor.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;Q342<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-030-43306-2">Full Text Available From Springer Nature Intelligent Technologies and Robotics 2020 Packages</a><br/>Format:&#160;Electronic Resources<br/> Cryptography and Information Security in the Balkans Second International Conference, BalkanCryptSec 2015, Koper, Slovenia, September 3-4, 2015, Revised Selected Papers ent://SD_ILS/0/SD_ILS:1844374 2024-09-20T01:28:11Z 2024-09-20T01:28:11Z Yazar&#160;Pasalic, Enes. editor.&#160;Knudsen, Lars R. editor.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA268<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-319-29172-7">Full Text Available From Springer Nature Computer Science 2016 Packages</a><br/>Format:&#160;Electronic Resources<br/> Securing SQL Server DBAs Defending the Database ent://SD_ILS/0/SD_ILS:1878019 2024-09-20T01:28:11Z 2024-09-20T01:28:11Z Yazar&#160;Carter, Peter A. author.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA76.9 .D3<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-1-4842-4161-5">Full Text Available From Springer Nature Professional and Applied Computing 2018 Packages</a><br/>Format:&#160;Electronic Resources<br/> Multimedia Security Algorithm Development, Analysis and Applications ent://SD_ILS/0/SD_ILS:1854027 2024-09-20T01:28:11Z 2024-09-20T01:28:11Z Yazar&#160;Giri, Kaiser J. editor.&#160;Parah, Shabir Ahmad. editor.&#160;Bashir, Rumaan. editor.&#160;Muhammad, Khan. editor.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;Q342<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-981-15-8711-5">Full Text Available From Springer Nature Intelligent Technologies and Robotics 2021 Packages</a><br/>Format:&#160;Electronic Resources<br/> Computer Communication, Networking and Internet Security Proceedings of IC3T 2016 ent://SD_ILS/0/SD_ILS:1810301 2024-09-20T01:28:11Z 2024-09-20T01:28:11Z Yazar&#160;Satapathy, Suresh Chandra. editor.&#160;Bhateja, Vikrant. editor.&#160;Raju, K. Srujan. editor.&#160;Janakiramaiah, B. editor.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;TK5101 -5105.9<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-981-10-3226-4">Full Text Available From Springer Nature Engineering 2017 Packages</a><br/>Format:&#160;Electronic Resources<br/> Cyber Security Intelligence and Analytics Proceedings of the 2020 International Conference on Cyber Security Intelligence and Analytics (CSIA 2020), Volume 2 ent://SD_ILS/0/SD_ILS:1853292 2024-09-20T01:28:11Z 2024-09-20T01:28:11Z Yazar&#160;Xu, Zheng. editor.&#160;Parizi, Reza M. editor. (orcid)0000-0002-0049-4296&#160;Hammoudeh, Mohammad. editor.&#160;Loyola-Gonz&aacute;lez, Octavio. editor.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;Q342<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-030-43309-3">Full Text Available From Springer Nature Intelligent Technologies and Robotics 2020 Packages</a><br/>Format:&#160;Electronic Resources<br/> Adaptive Autonomous Secure Cyber Systems ent://SD_ILS/0/SD_ILS:1885756 2024-09-20T01:28:11Z 2024-09-20T01:28:11Z Yazar&#160;Jajodia, Sushil. editor.&#160;Cybenko, George. editor.&#160;Subrahmanian, V.S. editor.&#160;Swarup, Vipin. editor.&#160;Wang, Cliff. editor.<br/>Yer Numarası&#160;QA76.9 .A25<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-030-33432-1">Full Text Available From Springer Nature Computer Science 2020 Packages</a><br/>Format:&#160;Electronic Resources<br/> Computer Software and Intellectual Property ent://SD_ILS/0/SD_ILS:1924535 2024-09-20T01:28:11Z 2024-09-20T01:28:11Z Yazar&#160;Office of Technology Assessment. author.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA268<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-1-349-12443-5">Full Text Available From Springer Nature Computer Science Archive Packages</a><br/>Format:&#160;Electronic Resources<br/> Smart Card Research and Advanced Applications 17th International Conference, CARDIS 2018, Montpellier, France, November 12-14, 2018, Revised Selected Papers ent://SD_ILS/0/SD_ILS:1884583 2024-09-20T01:28:11Z 2024-09-20T01:28:11Z Yazar&#160;Bilgin, Beg&uuml;l. editor.&#160;Fischer, Jean-Bernard. editor.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA268<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-030-15462-2">Full Text Available From Springer Nature Computer Science 2019 Packages</a><br/>Format:&#160;Electronic Resources<br/> Cryptography and Information Security in the Balkans First International Conference, BalkanCryptSec 2014, Istanbul, Turkey, October 16-17, 2014, Revised Selected Papers ent://SD_ILS/0/SD_ILS:1843712 2024-09-20T01:28:11Z 2024-09-20T01:28:11Z Yazar&#160;Ors, Berna. editor.&#160;Preneel, Bart. editor.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA268<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-319-21356-9">Full Text Available From Springer Nature Computer Science 2015 Packages</a><br/>Format:&#160;Electronic Resources<br/> Geo-Spatial Knowledge and Intelligence 5th International Conference, GSKI 2017, Chiang Mai, Thailand, December 8-10, 2017, Revised Selected Papers, Part II ent://SD_ILS/0/SD_ILS:1884097 2024-09-20T01:28:11Z 2024-09-20T01:28:11Z Yazar&#160;Yuan, Hanning. editor.&#160;Geng, Jing. editor.&#160;Liu, Chuanlu. editor.&#160;Bian, Fuling. editor.&#160;Surapunt, Tisinee. editor.<br/>Yer Numarası&#160;Q334 -342<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-981-13-0896-3">Full Text Available From Springer Nature Computer Science 2018 Packages</a><br/>Format:&#160;Electronic Resources<br/> Geo-Spatial Knowledge and Intelligence 5th International Conference, GSKI 2017, Chiang Mai, Thailand, December 8-10, 2017, Revised Selected Papers, Part I ent://SD_ILS/0/SD_ILS:1884099 2024-09-20T01:28:11Z 2024-09-20T01:28:11Z Yazar&#160;Yuan, Hanning. editor.&#160;Geng, Jing. editor.&#160;Liu, Chuanlu. editor.&#160;Bian, Fuling. editor.&#160;Surapunt, Tisinee. editor.<br/>Yer Numarası&#160;Q334 -342<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-981-13-0893-2">Full Text Available From Springer Nature Computer Science 2018 Packages</a><br/>Format:&#160;Electronic Resources<br/> Dependability Metrics GI-Dagstuhl Research Seminar, Dagstuhl Castle, Germany, October 5 - November 1, 2005, Advanced Lectures ent://SD_ILS/0/SD_ILS:1839582 2024-09-20T01:28:11Z 2024-09-20T01:28:11Z Yazar&#160;Eusgeld, Irene. editor.&#160;Freiling, Felix. editor.&#160;Reussner, Ralf H. editor.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA76.758<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-540-68947-8">Full Text Available From Springer Nature Computer Science 2008 Packages</a><br/>Format:&#160;Electronic Resources<br/> Blockchain Hype or Innovation ent://SD_ILS/0/SD_ILS:1886374 2024-09-20T01:28:11Z 2024-09-20T01:28:11Z Yazar&#160;Gayvoronskaya, Tatiana. author.&#160;Meinel, Christoph. author.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA76.9 .A25<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-030-61559-8">Full Text Available From Springer Nature Computer Science 2021 Packages</a><br/>Format:&#160;Electronic Resources<br/> Quality, Reliability, Security and Robustness in Heterogeneous Systems 15th EAI International Conference, QShine 2019, Shenzhen, China, November 22-23, 2019, Proceedings ent://SD_ILS/0/SD_ILS:1885962 2024-09-20T01:28:11Z 2024-09-20T01:28:11Z Yazar&#160;Chu, Xiaowen. editor.&#160;Jiang, Hongbo. editor. (orcid)0000-0001-7372-2539&#160;Li, Bo. editor.&#160;Wang, Dan. editor.&#160;Wang, Wei. editor.<br/>Yer Numarası&#160;TK5105.5 -5105.9<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-030-38819-5">Full Text Available From Springer Nature Computer Science 2020 Packages</a><br/>Format:&#160;Electronic Resources<br/> Applications and Techniques in Information Security 8th International Conference, ATIS 2017, Auckland, New Zealand, July 6-7, 2017, Proceedings ent://SD_ILS/0/SD_ILS:1883670 2024-09-20T01:28:11Z 2024-09-20T01:28:11Z Yazar&#160;Batten, Lynn. editor. (orcid)0000-0003-4525-2423&#160;Kim, Dong Seong. editor. (orcid)0000-0003-2605-187X&#160;Zhang, Xuyun. editor. (orcid)0000-0001-7353-4159&#160;Li, Gang. editor. (orcid)0000-0003-1583-641X&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA76.9 .A25<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-981-10-5421-1">Full Text Available From Springer Nature Computer Science 2017 Packages</a><br/>Format:&#160;Electronic Resources<br/> Cyber and Chemical, Biological, Radiological, Nuclear, Explosives Challenges Threats and Counter Efforts ent://SD_ILS/0/SD_ILS:1883410 2024-09-20T01:28:11Z 2024-09-20T01:28:11Z Yazar&#160;Martellini, Maurizio. editor.&#160;Malizia, Andrea. editor.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA76.9 .A25<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-319-62108-1">Full Text Available From Springer Nature Computer Science 2017 Packages</a><br/>Format:&#160;Electronic Resources<br/> Securing Office 365 Masterminding MDM and Compliance in the Cloud ent://SD_ILS/0/SD_ILS:1878040 2024-09-20T01:28:11Z 2024-09-20T01:28:11Z Yazar&#160;Katzer, Matthew. author.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA76.76 .M52<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-1-4842-4230-8">Full Text Available From Springer Nature Professional and Applied Computing 2018 Packages</a><br/>Format:&#160;Electronic Resources<br/> Comprehensive VB .NET Debugging ent://SD_ILS/0/SD_ILS:1945908 2024-09-20T01:28:11Z 2024-09-20T01:28:11Z Yazar&#160;Pearce, Mark. author.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA76.76 .M52<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-1-4302-0778-8">Full Text Available From Springer Nature Professional and Applied Computing Archive Packages</a><br/>Format:&#160;Electronic Resources<br/> Cyber Threat Intelligence ent://SD_ILS/0/SD_ILS:1883975 2024-09-20T01:28:11Z 2024-09-20T01:28:11Z Yazar&#160;Dehghantanha, Ali. editor. (orcid)0000-0002-9294-7554&#160;Conti, Mauro. editor. (orcid)0000-0002-3612-1934&#160;Dargahi, Tooska. editor.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA76.9 .A25<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-319-73951-9">Full Text Available From Springer Nature Computer Science 2018 Packages</a><br/>Format:&#160;Electronic Resources<br/> Handbook of Big Data and IoT Security ent://SD_ILS/0/SD_ILS:1884775 2024-09-20T01:28:11Z 2024-09-20T01:28:11Z Yazar&#160;Dehghantanha, Ali. editor. (orcid)0000-0002-9294-7554&#160;Choo, Kim-Kwang Raymond. editor. (orcid)0000-0001-9208-5336&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA76.9 .A25<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-030-10543-3">Full Text Available From Springer Nature Computer Science 2019 Packages</a><br/>Format:&#160;Electronic Resources<br/> 13th International Conference on Computational Intelligence in Security for Information Systems (CISIS 2020) ent://SD_ILS/0/SD_ILS:1853728 2024-09-20T01:28:11Z 2024-09-20T01:28:11Z Yazar&#160;Herrero, &Aacute;lvaro. editor. (orcid)0000-0002-2444-5384&#160;Cambra, Carlos. editor.&#160;Urda, Daniel. editor.&#160;Sedano, Javier. editor.&#160;Quinti&aacute;n, H&eacute;ctor. editor.<br/>Yer Numarası&#160;Q342<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-030-57805-3">Full Text Available From Springer Nature Intelligent Technologies and Robotics 2021 Packages</a><br/>Format:&#160;Electronic Resources<br/> Blockchain Cybersecurity, Trust and Privacy ent://SD_ILS/0/SD_ILS:1885488 2024-09-20T01:28:11Z 2024-09-20T01:28:11Z Yazar&#160;Choo, Kim-Kwang Raymond. editor. (orcid)0000-0001-9208-5336&#160;Dehghantanha, Ali. editor.&#160;Parizi, Reza M. editor. (orcid)0000-0002-0049-4296&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA76.9 .A25<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-030-38181-3">Full Text Available From Springer Nature Computer Science 2020 Packages</a><br/>Format:&#160;Electronic Resources<br/> Handbook of Computer Networks and Cyber Security Principles and Paradigms ent://SD_ILS/0/SD_ILS:1885562 2024-09-20T01:28:11Z 2024-09-20T01:28:11Z Yazar&#160;Gupta, Brij B. editor.&#160;Perez, Gregorio Martinez. editor.&#160;Agrawal, Dharma P. editor.&#160;Gupta, Deepak. editor.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA76.9 .A25<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-030-22277-2">Full Text Available From Springer Nature Computer Science 2020 Packages</a><br/>Format:&#160;Electronic Resources<br/> Mobile Internet Security Second International Symposium, MobiSec 2017, Jeju Island, Republic of Korea, October 19-22, 2017, Revised Selected Papers ent://SD_ILS/0/SD_ILS:1885255 2024-09-20T01:28:11Z 2024-09-20T01:28:11Z Yazar&#160;You, Ilsun. editor. (orcid)0000-0002-0604-3445&#160;Chen, Hsing-Chung. editor.&#160;Sharma, Vishal. editor.&#160;Kotenko, Igor. editor. (orcid)0000-0001-6859-7120&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA76.9 .A25<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-981-13-3732-1">Full Text Available From Springer Nature Computer Science 2019 Packages</a><br/>Format:&#160;Electronic Resources<br/> Cisco Routers for the Small Business A Practical Guide for IT Professionals ent://SD_ILS/0/SD_ILS:1876335 2024-09-20T01:28:11Z 2024-09-20T01:28:11Z Yazar&#160;Neumann, Jason. author.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA76.9 .A25<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-1-4302-1852-4">Full Text Available From Springer Nature Professional and Applied Computing 2009 Packages</a><br/>Format:&#160;Electronic Resources<br/> Moving Target Defense for Distributed Systems ent://SD_ILS/0/SD_ILS:1882835 2024-09-20T01:28:11Z 2024-09-20T01:28:11Z Yazar&#160;Shetty, Sachin. author.&#160;Yuchi, Xuebiao. author.&#160;Song, Min. author.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;TK5105.5 -5105.9<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-319-31032-9">Full Text Available From Springer Nature Computer Science 2016 Packages</a><br/>Format:&#160;Electronic Resources<br/> Physical Layer Approaches for Securing Wireless Communication Systems ent://SD_ILS/0/SD_ILS:1881689 2024-09-20T01:28:11Z 2024-09-20T01:28:11Z Yazar&#160;Wen, Hong. author.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;TK5105.5 -5105.9<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-1-4614-6510-2">Full Text Available From Springer Nature Computer Science 2013 Packages</a><br/>Format:&#160;Electronic Resources<br/> Cryptographic Hardware and Embedded Systems -- CHES 2013 15th International Workshop, Santa Barbara, CA, USA, August 20-23, 2013, Proceedings ent://SD_ILS/0/SD_ILS:1842910 2024-09-20T01:28:11Z 2024-09-20T01:28:11Z Yazar&#160;Bertoni, Guido Marco. editor.&#160;Coron, Jean-S&eacute;bastien. editor.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA268<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-642-40349-1">Full Text Available From Springer Nature Computer Science 2013 Packages</a><br/>Format:&#160;Electronic Resources<br/> Information and Communications Security 15th International Conference, ICICS 2013, Beijing, China, November 20-22, 2013, Proceedings ent://SD_ILS/0/SD_ILS:1842892 2024-09-20T01:28:11Z 2024-09-20T01:28:11Z Yazar&#160;Qing, Sihan. editor.&#160;Zhou, Jianying. editor.&#160;Liu, Dongmei. editor.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA268<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-319-02726-5">Full Text Available From Springer Nature Computer Science 2013 Packages</a><br/>Format:&#160;Electronic Resources<br/> Automotive Cyber Security Introduction, Challenges, and Standardization ent://SD_ILS/0/SD_ILS:1813961 2024-09-20T01:28:11Z 2024-09-20T01:28:11Z Yazar&#160;Kim, Shiho. author.&#160;Shrestha, Rakesh. author.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;TL1 -483<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-981-15-8053-6">Full Text Available From Springer Nature Engineering 2020 Packages</a><br/>Format:&#160;Electronic Resources<br/> A Practical Guide to TPM 2.0 Using the Trusted Platform Module in the New Age of Security ent://SD_ILS/0/SD_ILS:1877310 2024-09-20T01:28:11Z 2024-09-20T01:28:11Z Yazar&#160;Arthur, Will. author.&#160;Challener, David. author.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA76.9 .A25<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-1-4302-6584-9">Full Text Available From Springer Nature Professional and Applied Computing 2015 Packages</a><br/>Format:&#160;Electronic Resources<br/> Proceedings of the First International Conference on Intelligent Computing and Communication ent://SD_ILS/0/SD_ILS:1810770 2024-09-20T01:28:11Z 2024-09-20T01:28:11Z Yazar&#160;Mandal, Jyotsna Kumar. editor.&#160;Satapathy, Suresh Chandra. editor.&#160;Sanyal, Manas Kumar. editor.&#160;Bhateja, Vikrant. editor.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;Q342<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-981-10-2035-3">Full Text Available From Springer Nature Engineering 2017 Packages</a><br/>Format:&#160;Electronic Resources<br/> Intel Trusted Execution Technology for Server Platforms A Guide to More Secure Datacenters ent://SD_ILS/0/SD_ILS:1877041 2024-09-20T01:28:11Z 2024-09-20T01:28:11Z Yazar&#160;Futral, William. author.&#160;Greene, James. author.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA76.9 .A25<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-1-4302-6149-0">Full Text Available From Springer Nature Professional and Applied Computing 2013 Packages</a><br/>Format:&#160;Electronic Resources<br/> Python Testing with Selenium Learn to Implement Different Testing Techniques Using the Selenium WebDriver ent://SD_ILS/0/SD_ILS:1878945 2024-09-20T01:28:11Z 2024-09-20T01:28:11Z Yazar&#160;Raghavendra, Sujay. author.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA76.73 .P98<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-1-4842-6249-8">Full Text Available From Springer Nature Professional and Applied Computing 2021 Packages</a><br/>Format:&#160;Electronic Resources<br/> Platform Embedded Security Technology Revealed Safeguarding the Future of Computing with Intel Embedded Security and Management Engine ent://SD_ILS/0/SD_ILS:1877126 2024-09-20T01:28:11Z 2024-09-20T01:28:11Z Yazar&#160;Ruan, Xiaoyu. author.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA76.9 .A25<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-1-4302-6572-6">Full Text Available From Springer Nature Professional and Applied Computing 2014 Packages</a><br/>Format:&#160;Electronic Resources<br/> Advances in Cryptology - EUROCRYPT 2014 33rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Copenhagen, Denmark, May 11-15, 2014, Proceedings ent://SD_ILS/0/SD_ILS:1843329 2024-09-20T01:28:11Z 2024-09-20T01:28:11Z Yazar&#160;Nguyen, Phong Q. editor.&#160;Oswald, Elisabeth. editor.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA268<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-642-55220-5">Full Text Available From Springer Nature Computer Science 2014 Packages</a><br/>Format:&#160;Electronic Resources<br/> Partially Homomorphic Encryption ent://SD_ILS/0/SD_ILS:1886655 2024-09-20T01:28:11Z 2024-09-20T01:28:11Z Yazar&#160;Ko&ccedil;, &Ccedil;etin Kaya. author.&#160;&Ouml;zdemir, Funda. author.&#160;&Ouml;demiş &Ouml;zger, Zeynep. author.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA268<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-030-87629-6">Full Text Available From Springer Nature Computer Science 2021 Packages</a><br/>Format:&#160;Electronic Resources<br/> Mathematical Theory of Advanced Computing ent://SD_ILS/0/SD_ILS:1885660 2024-09-20T01:28:11Z 2024-09-20T01:28:11Z Yazar&#160;Osterhage, Wolfgang W. author.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA76.9 .A25<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-662-60359-8">Full Text Available From Springer Nature Computer Science 2020 Packages</a><br/>Format:&#160;Electronic Resources<br/> Cyber-Physical Attack Recovery Procedures A Step-by-Step Preparation and Response Guide ent://SD_ILS/0/SD_ILS:1877695 2024-09-20T01:28:11Z 2024-09-20T01:28:11Z Yazar&#160;Ayala, Luis. author.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA76.9 .A25<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-1-4842-2065-8">Full Text Available From Springer Nature Professional and Applied Computing 2016 Packages</a><br/>Format:&#160;Electronic Resources<br/> Security in Network Coding ent://SD_ILS/0/SD_ILS:1883016 2024-09-20T01:28:11Z 2024-09-20T01:28:11Z Yazar&#160;Zhang, Peng. author.&#160;Lin, Chuang. author.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA76.9 .A25<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-319-31083-1">Full Text Available From Springer Nature Computer Science 2016 Packages</a><br/>Format:&#160;Electronic Resources<br/> Proceedings of 6th International Conference on Big Data and Cloud Computing Challenges ICBCC 2019, UMKC, Kansas City, USA ent://SD_ILS/0/SD_ILS:1853543 2024-09-20T01:28:11Z 2024-09-20T01:28:11Z Yazar&#160;Vijayakumar, V. editor.&#160;Neelanarayanan, V. editor.&#160;Rao, Praveen. editor.&#160;Light, Janet. editor.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;TA345 -345.5<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-981-32-9889-7">Full Text Available From Springer Nature Intelligent Technologies and Robotics 2020 Packages</a><br/>Format:&#160;Electronic Resources<br/> The Art of War for Computer Security ent://SD_ILS/0/SD_ILS:1884511 2024-09-20T01:28:11Z 2024-09-20T01:28:11Z Yazar&#160;Madsen, Tom. author.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA76.9 .A25<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-030-28569-2">Full Text Available From Springer Nature Computer Science 2019 Packages</a><br/>Format:&#160;Electronic Resources<br/> Advances in Information and Computer Security 16th International Workshop on Security, IWSEC 2021, Virtual Event, September 8-10, 2021, Proceedings ent://SD_ILS/0/SD_ILS:1886243 2024-09-20T01:28:11Z 2024-09-20T01:28:11Z Yazar&#160;Nakanishi, Toru. editor.&#160;Nojima, Ryo. editor.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA76.9 .A25<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-030-85987-9">Full Text Available From Springer Nature Computer Science 2021 Packages</a><br/>Format:&#160;Electronic Resources<br/> Proceedings of the 2nd International Conference on Data Engineering and Communication Technology ICDECT 2017 ent://SD_ILS/0/SD_ILS:1812838 2024-09-20T01:28:11Z 2024-09-20T01:28:11Z Yazar&#160;Kulkarni, Anand J. editor.&#160;Satapathy, Suresh Chandra. editor.&#160;Kang, Tai. editor.&#160;Kashan, Ali Husseinzadeh. editor.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;Q342<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-981-13-1610-4">Full Text Available From Springer Nature Engineering 2019 Packages</a><br/>Format:&#160;Electronic Resources<br/> Digital Fingerprinting ent://SD_ILS/0/SD_ILS:1882940 2024-09-20T01:28:11Z 2024-09-20T01:28:11Z Yazar&#160;Wang, Cliff. editor.&#160;Gerdes, Ryan M. editor.&#160;Guan, Yong. editor.&#160;Kasera, Sneha Kumar. editor.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA76.9 .A25<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-1-4939-6601-1">Full Text Available From Springer Nature Computer Science 2016 Packages</a><br/>Format:&#160;Electronic Resources<br/> Digital Defense A Cybersecurity Primer ent://SD_ILS/0/SD_ILS:1808869 2024-09-20T01:28:11Z 2024-09-20T01:28:11Z Yazar&#160;Pelton, Joseph. author.&#160;Singh, Indu B. author.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;T1 -995<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-319-19953-5">Full Text Available From Springer Nature Engineering 2015 Packages</a><br/>Format:&#160;Electronic Resources<br/> Mobility Data Management and Exploration ent://SD_ILS/0/SD_ILS:1882283 2024-09-20T01:28:11Z 2024-09-20T01:28:11Z Yazar&#160;Pelekis, Nikos. author.&#160;Theodoridis, Yannis. author.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA76.9 .D3<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-1-4939-0392-4">Full Text Available From Springer Nature Computer Science 2014 Packages</a><br/>Format:&#160;Electronic Resources<br/> Cryptography and Coding 16th IMA International Conference, IMACC 2017, Oxford, UK, December 12-14, 2017, Proceedings ent://SD_ILS/0/SD_ILS:1844964 2024-09-20T01:28:11Z 2024-09-20T01:28:11Z Yazar&#160;O'Neill, M&aacute;ire. editor.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA268<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-319-71045-7">Full Text Available From Springer Nature Computer Science 2017 Packages</a><br/>Format:&#160;Electronic Resources<br/> New Approaches for Security, Privacy and Trust in Complex Environments Proceedings of the IFIP TC 11 22nd International Information Security Conference (SEC 2007), 14-16 May 2007, Sandton, South Africa ent://SD_ILS/0/SD_ILS:1879648 2024-09-20T01:28:11Z 2024-09-20T01:28:11Z Yazar&#160;Venter, Hein. editor.&#160;Eloff, Mariki. editor.&#160;Labuschagne, Les. editor.&#160;Eloff, Jan. editor.&#160;Solms, Rossouw von. editor.<br/>Yer Numarası&#160;QA268<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-0-387-72367-9">Full Text Available From Springer Nature Computer Science 2007 Packages</a><br/>Format:&#160;Electronic Resources<br/> Security in Smart Cities: Models, Applications, and Challenges ent://SD_ILS/0/SD_ILS:1852978 2024-09-20T01:28:11Z 2024-09-20T01:28:11Z Yazar&#160;Hassanien, Aboul Ella. editor.&#160;Elhoseny, Mohamed. editor.&#160;Ahmed, Syed Hassan. editor.&#160;Singh, Amit Kumar. editor.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;Q342<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-030-01560-2">Full Text Available From Springer Nature Intelligent Technologies and Robotics 2019 Packages</a><br/>Format:&#160;Electronic Resources<br/> The Privacy Engineer's Manifesto Getting from Policy to Code to QA to Value ent://SD_ILS/0/SD_ILS:1877141 2024-09-20T01:28:11Z 2024-09-20T01:28:11Z Yazar&#160;Dennedy, Michelle. author.&#160;Fox, Jonathan. author.&#160;Finneran, Tom. author.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA76.9 .A25<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-1-4302-6356-2">Full Text Available From Springer Nature Professional and Applied Computing 2014 Packages</a><br/>Format:&#160;Electronic Resources<br/> Wireless Sensor Networks Security, Coverage, and Localization ent://SD_ILS/0/SD_ILS:1882829 2024-09-20T01:28:11Z 2024-09-20T01:28:11Z Yazar&#160;Selmic, Rastko R. author.&#160;Phoha, Vir V. author.&#160;Serwadda, Abdul. author.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;TK5105.5 -5105.9<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-319-46769-6">Full Text Available From Springer Nature Computer Science 2016 Packages</a><br/>Format:&#160;Electronic Resources<br/> Beginning Ethical Hacking with Python ent://SD_ILS/0/SD_ILS:1877751 2024-09-20T01:28:11Z 2024-09-20T01:28:11Z Yazar&#160;Sinha, Sanjib. author.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA76.73 .P98<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-1-4842-2541-7">Full Text Available From Springer Nature Professional and Applied Computing 2017 Packages</a><br/>Format:&#160;Electronic Resources<br/> Information Security and Cryptology - ICISC 2017 20th International Conference, Seoul, South Korea, November 29 - December 1, 2017, Revised Selected Papers ent://SD_ILS/0/SD_ILS:1845789 2024-09-20T01:28:11Z 2024-09-20T01:28:11Z Yazar&#160;Kim, Howon. editor.&#160;Kim, Dong-Chan. editor.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA76.9 .A25<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-319-78556-1">Full Text Available From Springer Nature Computer Science 2018 Packages</a><br/>Format:&#160;Electronic Resources<br/> Risk Assessment and Risk-Driven Testing First International Workshop, RISK 2013, Held in Conjunction with ICTSS 2013, Istanbul, Turkey, November 12, 2013. Revised Selected Papers ent://SD_ILS/0/SD_ILS:1843201 2024-09-20T01:28:11Z 2024-09-20T01:28:11Z Yazar&#160;Bauer, Thomas. editor.&#160;Gro&szlig;mann, J&uuml;rgen. editor.&#160;Seehusen, Fredrik. editor.&#160;St&oslash;len, Ketil. editor.&#160;Wendland, Marc-Florian. editor.<br/>Yer Numarası&#160;QA76.758<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-319-07076-6">Full Text Available From Springer Nature Computer Science 2014 Packages</a><br/>Format:&#160;Electronic Resources<br/> Introduction to Security Reduction ent://SD_ILS/0/SD_ILS:1883751 2024-09-20T01:28:11Z 2024-09-20T01:28:11Z Yazar&#160;Guo, Fuchun. author. (orcid)0000-0001-6939-7710&#160;Susilo, Willy. author. (orcid)0000-0002-1562-5105&#160;Mu, Yi. author.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA76.9 .D35<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-319-93049-7">Full Text Available From Springer Nature Computer Science 2018 Packages</a><br/>Format:&#160;Electronic Resources<br/> Challenges in the IoT and Smart Environments A Practitioners' Guide to Security, Ethics and Criminal Threats ent://SD_ILS/0/SD_ILS:1886992 2024-09-20T01:28:11Z 2024-09-20T01:28:11Z Yazar&#160;Montasari, Reza. editor.&#160;Jahankhani, Hamid. editor.&#160;Al-Khateeb, Haider. editor.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA76.9 .A25<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-030-87166-6">Full Text Available From Springer Nature Computer Science 2021 Packages</a><br/>Format:&#160;Electronic Resources<br/> Security Engineering for Service-Oriented Architectures ent://SD_ILS/0/SD_ILS:1880088 2024-09-20T01:28:11Z 2024-09-20T01:28:11Z Yazar&#160;Hafner, Michael. author.&#160;Breu, Ruth. author.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA76.758<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-540-79539-1">Full Text Available From Springer Nature Computer Science 2009 Packages</a><br/>Format:&#160;Electronic Resources<br/> Simulation and Synthesis in Medical Imaging Third International Workshop, SASHIMI 2018, Held in Conjunction with MICCAI 2018, Granada, Spain, September 16, 2018, Proceedings ent://SD_ILS/0/SD_ILS:1845610 2024-09-20T01:28:11Z 2024-09-20T01:28:11Z Yazar&#160;Gooya, Ali. editor. (orcid)0000-0001-5135-4800&#160;Goksel, Orcun. editor. (orcid)0000-0002-8639-7373&#160;Oguz, Ipek. editor. (orcid)0000-0002-1403-2420&#160;Burgos, Ninon. editor. (orcid)0000-0002-4668-2006&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;TA1634<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-030-00536-8">Full Text Available From Springer Nature Computer Science 2018 Packages</a><br/>Format:&#160;Electronic Resources<br/> Mobile Internet Security First International Symposium, MobiSec 2016, Taichung, Taiwan, July 14-15, 2016, Revised Selected Papers ent://SD_ILS/0/SD_ILS:1883940 2024-09-20T01:28:11Z 2024-09-20T01:28:11Z Yazar&#160;You, Ilsun. editor. (orcid)0000-0002-0604-3445&#160;Leu, Fang-Yie. editor.&#160;Chen, Hsing-Chung. editor.&#160;Kotenko, Igor. editor. (orcid)0000-0001-6859-7120&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA76.9 .A25<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-981-10-7850-7">Full Text Available From Springer Nature Computer Science 2018 Packages</a><br/>Format:&#160;Electronic Resources<br/> Information Security of Highly Critical Wireless Networks ent://SD_ILS/0/SD_ILS:1883377 2024-09-20T01:28:11Z 2024-09-20T01:28:11Z Yazar&#160;Martellini, Maurizio. author.&#160;Abaimov, Stanislav. author.&#160;Gaycken, Sandro. author.&#160;Wilson, Clay. author.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA76.9 .A25<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-319-52905-9">Full Text Available From Springer Nature Computer Science 2017 Packages</a><br/>Format:&#160;Electronic Resources<br/> Emerging Technology in Modelling and Graphics Proceedings of IEM Graph 2018 ent://SD_ILS/0/SD_ILS:1813692 2024-09-20T01:28:11Z 2024-09-20T01:28:11Z Yazar&#160;Mandal, Jyotsna Kumar. editor.&#160;Bhattacharya, Debika. editor.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;TK5102.9<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-981-13-7403-6">Full Text Available From Springer Nature Engineering 2020 Packages</a><br/>Format:&#160;Electronic Resources<br/> Android Application Security A Semantics and Context-Aware Approach ent://SD_ILS/0/SD_ILS:1883065 2024-09-20T01:28:11Z 2024-09-20T01:28:11Z Yazar&#160;Zhang, Mu. author.&#160;Yin, Heng. author.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA76.9 .A25<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-319-47812-8">Full Text Available From Springer Nature Computer Science 2016 Packages</a><br/>Format:&#160;Electronic Resources<br/> Cybersecurity Systems for Human Cognition Augmentation ent://SD_ILS/0/SD_ILS:1882175 2024-09-20T01:28:11Z 2024-09-20T01:28:11Z Yazar&#160;Pino, Robinson E. editor.&#160;Kott, Alexander. editor.&#160;Shevenell, Michael. editor.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA76.9 .A25<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-319-10374-7">Full Text Available From Springer Nature Computer Science 2014 Packages</a><br/>Format:&#160;Electronic Resources<br/> Iris Biometrics From Segmentation to Template Security ent://SD_ILS/0/SD_ILS:1881657 2024-09-20T01:28:11Z 2024-09-20T01:28:11Z Yazar&#160;Rathgeb, Christian. author.&#160;Uhl, Andreas. author. (orcid)0000-0002-5921-8755&#160;Wild, Peter. author.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;TK7882 .B56<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-1-4614-5571-4">Full Text Available From Springer Nature Computer Science 2013 Packages</a><br/>Format:&#160;Electronic Resources<br/> Cognitive Radio Oriented Wireless Networks 13th EAI International Conference, CROWNCOM 2018, Ghent, Belgium, September 18-20, 2018, Proceedings ent://SD_ILS/0/SD_ILS:1885059 2024-09-20T01:28:11Z 2024-09-20T01:28:11Z Yazar&#160;Moerman, Ingrid. editor. (orcid)0000-0003-2377-3674&#160;Marquez-Barja, Johann. editor. (orcid)0000-0001-5660-3597&#160;Shahid, Adnan. editor. (orcid)0000-0003-1943-6261&#160;Liu, Wei. editor.&#160;Giannoulis, Spilios. editor. (orcid)0000-0002-3190-8770<br/>Yer Numarası&#160;TK5105.5 -5105.9<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-030-05490-8">Full Text Available From Springer Nature Computer Science 2019 Packages</a><br/>Format:&#160;Electronic Resources<br/> Internet of Things Security: Principles and Practice ent://SD_ILS/0/SD_ILS:1886486 2024-09-20T01:28:11Z 2024-09-20T01:28:11Z Yazar&#160;Tang, Qinghao. author.&#160;Du, Fan. author.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;TK5105.59<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-981-15-9942-2">Full Text Available From Springer Nature Computer Science 2021 Packages</a><br/>Format:&#160;Electronic Resources<br/> Security and Privacy for Mobile Healthcare Networks ent://SD_ILS/0/SD_ILS:1882570 2024-09-20T01:28:11Z 2024-09-20T01:28:11Z Yazar&#160;Zhang, Kuan. author.&#160;Shen, Xuemin (Sherman). author. (orcid)0000-0002-4140-287X&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;TK5105.5 -5105.9<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-319-24717-5">Full Text Available From Springer Nature Computer Science 2015 Packages</a><br/>Format:&#160;Electronic Resources<br/> Proceedings of First International Conference on Computing, Communications, and Cyber-Security (IC4S 2019) ent://SD_ILS/0/SD_ILS:1853682 2024-09-20T01:28:11Z 2024-09-20T01:28:11Z Yazar&#160;Singh, Pradeep Kumar. editor. (orcid)0000-0002-7676-9014&#160;Pawłowski, Wiesław. editor.&#160;Tanwar, Sudeep. editor.&#160;Kumar, Neeraj. editor.&#160;Rodrigues, Joel J. P. C. editor. (orcid)0000-0001-8657-3800<br/>Yer Numarası&#160;Q342<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-981-15-3369-3">Full Text Available From Springer Nature Intelligent Technologies and Robotics 2020 Packages</a><br/>Format:&#160;Electronic Resources<br/> Architecture for Blockchain Applications ent://SD_ILS/0/SD_ILS:1884666 2024-09-20T01:28:11Z 2024-09-20T01:28:11Z Yazar&#160;Xu, Xiwei. author.&#160;Weber, Ingo. author. (orcid)0000-0002-4833-5921&#160;Staples, Mark. author.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA76.758<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-030-03035-3">Full Text Available From Springer Nature Computer Science 2019 Packages</a><br/>Format:&#160;Electronic Resources<br/> Secure ICT Service Provisioning for Cloud, Mobile and Beyond ESARIS: The Answer to the Demands of Industrialized IT Production Balancing Between Buyers and Providers ent://SD_ILS/0/SD_ILS:1883532 2024-09-20T01:28:11Z 2024-09-20T01:28:11Z Yazar&#160;von Faber, Eberhard. author.&#160;Behnsen, Wolfgang. author.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA76.9 .A25<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-658-16482-9">Full Text Available From Springer Nature Computer Science 2017 Packages</a><br/>Format:&#160;Electronic Resources<br/> Combatting Cybercrime and Cyberterrorism Challenges, Trends and Priorities ent://SD_ILS/0/SD_ILS:1851226 2024-09-20T01:28:11Z 2024-09-20T01:28:11Z Yazar&#160;Akhgar, Babak. editor.&#160;Brewster, Ben. editor.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;HV6772 -6773.3<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-319-38930-1">Full Text Available From Springer Nature Law and Criminology 2016 Packages</a><br/>Format:&#160;Electronic Resources<br/> Proactive and Dynamic Network Defense ent://SD_ILS/0/SD_ILS:1884971 2024-09-20T01:28:11Z 2024-09-20T01:28:11Z Yazar&#160;Wang, Cliff. editor.&#160;Lu, Zhuo. editor.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA76.9 .A25<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-030-10597-6">Full Text Available From Springer Nature Computer Science 2019 Packages</a><br/>Format:&#160;Electronic Resources<br/> Cybersecurity Lexicon ent://SD_ILS/0/SD_ILS:1877600 2024-09-20T01:28:11Z 2024-09-20T01:28:11Z Yazar&#160;Ayala, Luis. author.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA76.9 .A25<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-1-4842-2068-9">Full Text Available From Springer Nature Professional and Applied Computing 2016 Packages</a><br/>Format:&#160;Electronic Resources<br/> Advanced Computing and Systems for Security Volume Four ent://SD_ILS/0/SD_ILS:1810077 2024-09-20T01:28:11Z 2024-09-20T01:28:11Z Yazar&#160;Chaki, Rituparna. editor.&#160;Saeed, Khalid. editor.&#160;Cortesi, Agostino. editor.&#160;Chaki, Nabendu. editor.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;Q342<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-981-10-3391-9">Full Text Available From Springer Nature Engineering 2017 Packages</a><br/>Format:&#160;Electronic Resources<br/> Security-Aware Device-to-Device Communications Underlaying Cellular Networks ent://SD_ILS/0/SD_ILS:1883098 2024-09-20T01:28:11Z 2024-09-20T01:28:11Z Yazar&#160;Zhang, Aiqing. author.&#160;Zhou, Liang. author.&#160;Wang, Lei. author.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;TK5105.5 -5105.9<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-319-32458-6">Full Text Available From Springer Nature Computer Science 2016 Packages</a><br/>Format:&#160;Electronic Resources<br/> Big Data and Social Media Analytics Trending Applications ent://SD_ILS/0/SD_ILS:1894360 2024-09-20T01:28:11Z 2024-09-20T01:28:11Z Yazar&#160;&Ccedil;akırtaş, Mehmet. editor.&#160;Ozdemir, Mehmet Kemal. editor.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA76.9 .Q36<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-030-67044-3">Full Text Available From Springer Nature Mathematics and Statistics 2021 Packages</a><br/>Format:&#160;Electronic Resources<br/> SmartData Privacy Meets Evolutionary Robotics ent://SD_ILS/0/SD_ILS:1881452 2024-09-20T01:28:11Z 2024-09-20T01:28:11Z Yazar&#160;Harvey, Inman. editor.&#160;Cavoukian, Ann. editor.&#160;Tomko, George. editor.&#160;Borrett, Don. editor.&#160;Kwan, Hon. editor.<br/>Yer Numarası&#160;QA76.9 .A25<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-1-4614-6409-9">Full Text Available From Springer Nature Computer Science 2013 Packages</a><br/>Format:&#160;Electronic Resources<br/> Intelligent Information Processing IX 10th IFIP TC 12 International Conference, IIP 2018, Nanning, China, October 19-22, 2018, Proceedings ent://SD_ILS/0/SD_ILS:1884215 2024-09-20T01:28:11Z 2024-09-20T01:28:11Z Yazar&#160;Shi, Zhongzhi. editor.&#160;Mercier-Laurent, Eunika. editor. (orcid)0000-0003-2303-7263&#160;Li, Jiuyong. editor.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;Q334 -342<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-030-00828-4">Full Text Available From Springer Nature Computer Science 2018 Packages</a><br/>Format:&#160;Electronic Resources<br/> Access Control Management in Cloud Environments ent://SD_ILS/0/SD_ILS:1885817 2024-09-20T01:28:11Z 2024-09-20T01:28:11Z Yazar&#160;Wang, Hua. author.&#160;Cao, Jinli. author.&#160;Zhang, Yanchun. author. (orcid)0000-0002-5094-5980&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA76.9 .A25<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-030-31729-4">Full Text Available From Springer Nature Computer Science 2020 Packages</a><br/>Format:&#160;Electronic Resources<br/> Security of Cyber-Physical Systems Vulnerability and Impact ent://SD_ILS/0/SD_ILS:1885724 2024-09-20T01:28:11Z 2024-09-20T01:28:11Z Yazar&#160;Karimipour, Hadis. editor.&#160;Srikantha, Pirathayini. editor.&#160;Farag, Hany. editor.&#160;Wei-Kocsis, Jin. editor.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA76.9 .A25<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-030-45541-5">Full Text Available From Springer Nature Computer Science 2020 Packages</a><br/>Format:&#160;Electronic Resources<br/> Computing and Network Sustainability Proceedings of IRSCNS 2016 ent://SD_ILS/0/SD_ILS:1810418 2024-09-20T01:28:11Z 2024-09-20T01:28:11Z Yazar&#160;Vishwakarma, H.R . editor.&#160;Akashe, Shyam. editor.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;TK5101 -5105.9<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-981-10-3935-5">Full Text Available From Springer Nature Engineering 2017 Packages</a><br/>Format:&#160;Electronic Resources<br/> Advanced Applications of Blockchain Technology ent://SD_ILS/0/SD_ILS:1853346 2024-09-20T01:28:11Z 2024-09-20T01:28:11Z Yazar&#160;Kim, Shiho. editor.&#160;Deka, Ganesh Chandra. editor.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;Q342<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-981-13-8775-3">Full Text Available From Springer Nature Intelligent Technologies and Robotics 2020 Packages</a><br/>Format:&#160;Electronic Resources<br/> Advanced Computing and Systems for Security Volume Three ent://SD_ILS/0/SD_ILS:1810281 2024-09-20T01:28:11Z 2024-09-20T01:28:11Z Yazar&#160;Chaki, Rituparna. editor.&#160;Saeed, Khalid. editor.&#160;Cortesi, Agostino. editor.&#160;Chaki, Nabendu. editor.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;Q342<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-981-10-3409-1">Full Text Available From Springer Nature Engineering 2017 Packages</a><br/>Format:&#160;Electronic Resources<br/> Oracle Database Application Security With Oracle Internet Directory, Oracle Access Manager, and Oracle Identity Manager ent://SD_ILS/0/SD_ILS:1878457 2024-09-20T01:28:11Z 2024-09-20T01:28:11Z Yazar&#160;Mustafa, Osama. author.&#160;Lockard, Robert P. author.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA76.9 .A25<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-1-4842-5367-0">Full Text Available From Springer Nature Professional and Applied Computing 2019 Packages</a><br/>Format:&#160;Electronic Resources<br/> Cyberspace Risks and Benefits for Society, Security and Development ent://SD_ILS/0/SD_ILS:1851403 2024-09-20T01:28:11Z 2024-09-20T01:28:11Z Yazar&#160;Ram&iacute;rez, J. Mart&iacute;n. editor.&#160;Garc&iacute;a-Segura, Luis A. editor.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;HV6772 -6773.3<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-319-54975-0">Full Text Available From Springer Nature Law and Criminology 2017 Packages</a><br/>Format:&#160;Electronic Resources<br/> Cybersecurity in Germany ent://SD_ILS/0/SD_ILS:1883755 2024-09-20T01:28:11Z 2024-09-20T01:28:11Z Yazar&#160;Schallbruch, Martin. author.&#160;Skierka, Isabel. author.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA76.9 .A25<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-319-90014-8">Full Text Available From Springer Nature Computer Science 2018 Packages</a><br/>Format:&#160;Electronic Resources<br/> Advanced Computing and Systems for Security Volume 1 ent://SD_ILS/0/SD_ILS:1809732 2024-09-20T01:28:11Z 2024-09-20T01:28:11Z Yazar&#160;Chaki, Rituparna. editor.&#160;Cortesi, Agostino. editor.&#160;Saeed, Khalid. editor.&#160;Chaki, Nabendu. editor.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;Q342<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-81-322-2650-5">Full Text Available From Springer Nature Engineering 2016 Packages</a><br/>Format:&#160;Electronic Resources<br/> Physical Layer Security in Wireless Cooperative Networks ent://SD_ILS/0/SD_ILS:1812008 2024-09-20T01:28:11Z 2024-09-20T01:28:11Z Yazar&#160;Wang, Li. author.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;TK5101 -5105.9<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-319-61863-0">Full Text Available From Springer Nature Engineering 2018 Packages</a><br/>Format:&#160;Electronic Resources<br/> Proceedings of the International Conference on Data Engineering and Communication Technology ICDECT 2016, Volume 2 ent://SD_ILS/0/SD_ILS:1810896 2024-09-20T01:28:11Z 2024-09-20T01:28:11Z Yazar&#160;Satapathy, Suresh Chandra. editor.&#160;Bhateja, Vikrant. editor.&#160;Joshi, Amit. editor.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;Q342<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-981-10-1678-3">Full Text Available From Springer Nature Engineering 2017 Packages</a><br/>Format:&#160;Electronic Resources<br/> Proceedings of the International Conference on Data Engineering and Communication Technology ICDECT 2016, Volume 1 ent://SD_ILS/0/SD_ILS:1810352 2024-09-20T01:28:11Z 2024-09-20T01:28:11Z Yazar&#160;Satapathy, Suresh Chandra. editor.&#160;Bhateja, Vikrant. editor.&#160;Joshi, Amit. editor.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;Q342<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-981-10-1675-2">Full Text Available From Springer Nature Engineering 2017 Packages</a><br/>Format:&#160;Electronic Resources<br/> Big Data Processing Using Spark in Cloud ent://SD_ILS/0/SD_ILS:1812304 2024-09-20T01:28:11Z 2024-09-20T01:28:11Z Yazar&#160;Mittal, Mamta. editor. (orcid)0000-0003-0490-4413&#160;Balas, Valentina E. editor.&#160;Goyal, Lalit Mohan. editor.&#160;Kumar, Raghvendra. editor.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA76.9 .B45<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-981-13-0550-4">Full Text Available From Springer Nature Engineering 2019 Packages</a><br/>Format:&#160;Electronic Resources<br/> Advanced Computing and Systems for Security Volume 2 ent://SD_ILS/0/SD_ILS:1809395 2024-09-20T01:28:11Z 2024-09-20T01:28:11Z Yazar&#160;Chaki, Rituparna. editor.&#160;Cortesi, Agostino. editor.&#160;Saeed, Khalid. editor.&#160;Chaki, Nabendu. editor.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;Q342<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-81-322-2653-6">Full Text Available From Springer Nature Engineering 2016 Packages</a><br/>Format:&#160;Electronic Resources<br/> Structured Peer-to-Peer Systems Fundamentals of Hierarchical Organization, Routing, Scaling, and Security ent://SD_ILS/0/SD_ILS:1881666 2024-09-20T01:28:11Z 2024-09-20T01:28:11Z Yazar&#160;Korzun, Dmitry. author.&#160;Gurtov, Andrei. author.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;TK5105.5 -5105.9<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-1-4614-5483-0">Full Text Available From Springer Nature Computer Science 2013 Packages</a><br/>Format:&#160;Electronic Resources<br/> Encryption for Organizations and Individuals Basics of Contemporary and Quantum Cryptography ent://SD_ILS/0/SD_ILS:1878547 2024-09-20T01:28:11Z 2024-09-20T01:28:11Z Yazar&#160;Ciesla, Robert. author. (orcid)0000-0002-8305-448X&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA76.9 .A25<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-1-4842-6056-2">Full Text Available From Springer Nature Professional and Applied Computing 2020 Packages</a><br/>Format:&#160;Electronic Resources<br/> Secure IT Systems 19th Nordic Conference, NordSec 2014, Troms&oslash;, Norway, October 15-17, 2014, Proceedings ent://SD_ILS/0/SD_ILS:1843142 2024-09-20T01:28:11Z 2024-09-20T01:28:11Z Yazar&#160;Bernsmed, Karin. editor.&#160;Fischer-H&uuml;bner, Simone. editor.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA76.9 .A25<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-3-319-11599-3">Full Text Available From Springer Nature Computer Science 2014 Packages</a><br/>Format:&#160;Electronic Resources<br/> Machine Learning in Cyber Trust Security, Privacy, and Reliability ent://SD_ILS/0/SD_ILS:1880044 2024-09-20T01:28:11Z 2024-09-20T01:28:11Z Yazar&#160;Tsai, Jeffrey J. P. editor.&#160;Yu, Philip S. editor.&#160;SpringerLink (Online service)<br/>Yer Numarası&#160;QA76.9 .A25<br/>Elektronik Erişim&#160;<a href="https://ezp.isikun.edu.tr/login?url=https://doi.org/10.1007/978-0-387-88735-7">Full Text Available From Springer Nature Computer Science 2009 Packages</a><br/>Format:&#160;Electronic Resources<br/>