Search Results for Control. - Narrowed by: Computer security.SirsiDynix Enterprisehttp://katalog.baskent.edu.tr/client/en_US/default/default/qu$003dControl.$0026qf$003dSUBJECT$002509Subject$002509Computer$002bsecurity.$002509Computer$002bsecurity.$0026ps$003d300?dt=list2026-04-08T18:16:55ZRelation based access controlent://SD_ILS/0/SD_ILS:10251322026-04-08T18:16:55Z2026-04-08T18:16:55Zby Zhang, Rui.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1589007">Click to View</a><br/>Format: Electronic Resources<br/>Role-based access controlent://SD_ILS/0/SD_ILS:9309912026-04-08T18:16:55Z2026-04-08T18:16:55Zby Ferraiolo, David.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=227631">Click to View</a><br/>Format: Electronic Resources<br/>Role-based access controlent://SD_ILS/0/SD_ILS:9452212026-04-08T18:16:55Z2026-04-08T18:16:55Zby Ferraiolo, David.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=338751">Click to View</a><br/>Format: Electronic Resources<br/>IT audit, control, and securityent://SD_ILS/0/SD_ILS:9721352026-04-08T18:16:55Z2026-04-08T18:16:55Zby Moeller, Robert R.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=624573">Click to View</a><br/>Format: Electronic Resources<br/>Cybersecurity for industrial control systems SCADA, DCS, PLC, HMI, and SISent://SD_ILS/0/SD_ILS:9874492026-04-08T18:16:55Z2026-04-08T18:16:55Zby Macaulay, Tyson.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=826923">Click to View</a><br/>Format: Electronic Resources<br/>Industrial network security securing critical infrastructure networks for Smart Grid, SCADA, and other industrial control systemsent://SD_ILS/0/SD_ILS:1372082026-04-08T18:16:55Z2026-04-08T18:16:55Zby Knapp, Eric.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597496452">http://www.sciencedirect.com/science/book/9781597496452</a><br/>Format: Electronic Resources<br/>Industrial network security : securing critical infrastructure networks for Smart Grid, SCADA, and other industrial control systemsent://SD_ILS/0/SD_ILS:11840112026-04-08T18:16:55Z2026-04-08T18:16:55Zby Knapp, Eric.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597496452">https://www.sciencedirect.com/science/book/9781597496452</a><br/>Format: Electronic Resources<br/>Industrial network security : securing critical infrastructure networks for smart grid, SCADA, and other industrial control systemsent://SD_ILS/0/SD_ILS:10424692026-04-08T18:16:55Z2026-04-08T18:16:55Zby Knapp, Eric D., author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1887712">Click to View</a><br/>Format: Electronic Resources<br/>RIoT control : understanding and managing risks and the internet of thingsent://SD_ILS/0/SD_ILS:11182632026-04-08T18:16:55Z2026-04-08T18:16:55Zby Macaulay, Tyson, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4691335">Click to View</a><br/>Format: Electronic Resources<br/>Security and control in information systems a guide for business and accountingent://SD_ILS/0/SD_ILS:9324512026-04-08T18:16:55Z2026-04-08T18:16:55Zby Hawker, Andrew.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=240531">Click to View</a><br/>Format: Electronic Resources<br/>Ağ ve siber güvenlik temelleri : dijital dünyada güvende kalınent://SD_ILS/0/SD_ILS:12321712026-04-08T18:16:55Z2026-04-08T18:16:55Zby Hınçer, Görkem, yazar.<br/>Format: Books<br/>Kali Linux network scanning cookbook : take your penetration-testing skills to the next levelent://SD_ILS/0/SD_ILS:11267622026-04-08T18:16:55Z2026-04-08T18:16:55Zby Hixon, Michael, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4867412">Click to View</a><br/>Format: Electronic Resources<br/>The basics of digital privacy : simple tools to protect your personal information and your identity onlineent://SD_ILS/0/SD_ILS:10235692026-04-08T18:16:55Z2026-04-08T18:16:55Zby Cherry, Denny.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1573362">Click to View</a><br/>Format: Electronic Resources<br/>Oracle Identity and Access Manager 11g for administrators administer Oracle Identity and Access Management: installation, configuration, and day-to-day tasksent://SD_ILS/0/SD_ILS:9968352026-04-08T18:16:55Z2026-04-08T18:16:55Zby Kumar, Atul.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=948559">Click to View</a><br/>Format: Electronic Resources<br/>Digital privacy in the marketplace : perspectives on the information exchangeent://SD_ILS/0/SD_ILS:10449122026-04-08T18:16:55Z2026-04-08T18:16:55Zby Milne, George R., author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1920895">Click to View</a><br/>Format: Electronic Resources<br/>Managed code rootkits : hooking into runtime environmentsent://SD_ILS/0/SD_ILS:11818272026-04-08T18:16:55Z2026-04-08T18:16:55Zby Metula, Erez.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495745">http://www.sciencedirect.com/science/book/9781597495745</a><br/>Format: Electronic Resources<br/>Intrusion prevention and active response deploying network and host IPSent://SD_ILS/0/SD_ILS:9307142026-04-08T18:16:55Z2026-04-08T18:16:55Zby Henmi, Anne.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=226578">Click to View</a><br/>Format: Electronic Resources<br/>Security intelligence : a practitioner's guide to solving enterprise security challengesent://SD_ILS/0/SD_ILS:10427352026-04-08T18:16:55Z2026-04-08T18:16:55Zby Li, Qing, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1895130">Click to View</a><br/>Format: Electronic Resources<br/>OAuth 2.0 identity and access management patternsent://SD_ILS/0/SD_ILS:10234802026-04-08T18:16:55Z2026-04-08T18:16:55Zby Spasovski, Martin.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1572907">Click to View</a><br/>Format: Electronic Resources<br/>Instant Java password and authentication securityent://SD_ILS/0/SD_ILS:10234862026-04-08T18:16:55Z2026-04-08T18:16:55Zby Mayoral, Fernando.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1572913">Click to View</a><br/>Format: Electronic Resources<br/>Perfect passwords selection, protection, authenticationent://SD_ILS/0/SD_ILS:9338752026-04-08T18:16:55Z2026-04-08T18:16:55Zby Burnett, Mark.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=254851">Click to View</a><br/>Format: Electronic Resources<br/>Kali Linux wireless penetration testing : beginner's guide : master wireless testing techniques to survey and attack wireless networks with Kali Linux, including the KRACK attackent://SD_ILS/0/SD_ILS:11370502026-04-08T18:16:55Z2026-04-08T18:16:55Zby Buchanan, Cameron, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5340668">Click to View</a><br/>Format: Electronic Resources<br/>Kali Linux wireless penetration testing beginner's guide : master wireless testing techniques to survey and attack wireless networks with Kali Linuxent://SD_ILS/0/SD_ILS:10470892026-04-08T18:16:55Z2026-04-08T18:16:55Zby Ramachandran, Vivek, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=2005211">Click to View</a><br/>Format: Electronic Resources<br/>Check Point NG next generation security administrationent://SD_ILS/0/SD_ILS:9394472026-04-08T18:16:55Z2026-04-08T18:16:55Zby Simonis, Drew.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=294029">Click to View</a><br/>Format: Electronic Resources<br/>Network security : private communication in a public worldent://SD_ILS/0/SD_ILS:11693802026-04-08T18:16:55Z2026-04-08T18:16:55Zby Kaufman, Charlie.<br/>Format: Books<br/>Essential skills for hackersent://SD_ILS/0/SD_ILS:11045682026-04-08T18:16:55Z2026-04-08T18:16:55Zby Cardwell, Kevin, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4189281">Click to View</a><br/>Format: Electronic Resources<br/>Penetration tester's open source toolkitent://SD_ILS/0/SD_ILS:9338582026-04-08T18:16:55Z2026-04-08T18:16:55Zby Long, Johnny.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=254834">Click to View</a><br/>Format: Electronic Resources<br/>Kali Linux CTF Blueprints : build, test, and customize your own Capture the Flag challenges across multiple platforms designed to be attacked with Kali Linuxent://SD_ILS/0/SD_ILS:10317372026-04-08T18:16:55Z2026-04-08T18:16:55Zby Buchanan, Cameron, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1688607">Click to View</a><br/>Format: Electronic Resources<br/>Information protection playbookent://SD_ILS/0/SD_ILS:10199902026-04-08T18:16:55Z2026-04-08T18:16:55Zby Kane, Greg.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1418381">Click to View</a><br/>Format: Electronic Resources<br/>A multidisciplinary introduction to information securityent://SD_ILS/0/SD_ILS:10284162026-04-08T18:16:55Z2026-04-08T18:16:55Zby Mjølsnes, Stig F., author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1648315">Click to View</a><br/>Format: Electronic Resources<br/>Essential computer security everyone's guide to e-mail, internet, and wireless securityent://SD_ILS/0/SD_ILS:9433502026-04-08T18:16:55Z2026-04-08T18:16:55Zby Bradley, Tony.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=319200">Click to View</a><br/>Format: Electronic Resources<br/>User's guide to cryptography and standardsent://SD_ILS/0/SD_ILS:9310172026-04-08T18:16:55Z2026-04-08T18:16:55Zby Dent, Alexander W.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=227658">Click to View</a><br/>Format: Electronic Resources<br/>Analysis, design, and implementation of secure and interoperable distributed health information systemsent://SD_ILS/0/SD_ILS:9351012026-04-08T18:16:55Z2026-04-08T18:16:55Zby Blobel, Bernd.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=267473">Click to View</a><br/>Format: Electronic Resources<br/>Intrusion prevention and active response : deploying network and host IPSent://SD_ILS/0/SD_ILS:11884002026-04-08T18:16:55Z2026-04-08T18:16:55Zby Rash, Michael.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781932266474">http://www.sciencedirect.com/science/book/9781932266474</a><br/>Format: Electronic Resources<br/>Infosecurity 2008 threat analysisent://SD_ILS/0/SD_ILS:11900002026-04-08T18:16:55Z2026-04-08T18:16:55Zby Clark, Champ, III.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597492249">https://www.sciencedirect.com/science/book/9781597492249</a><br/>Format: Electronic Resources<br/>Penetration tester's open source toolkitent://SD_ILS/0/SD_ILS:11882482026-04-08T18:16:55Z2026-04-08T18:16:55Zby Long, Johnny.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597490214">https://www.sciencedirect.com/science/book/9781597490214</a><br/>Format: Electronic Resources<br/>Essential computer security : everyone's guide to e-mail, internet, and wireless securityent://SD_ILS/0/SD_ILS:11864192026-04-08T18:16:55Z2026-04-08T18:16:55Zby Bradley, Tony, 1969-<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597491143">https://www.sciencedirect.com/science/book/9781597491143</a><br/>Format: Electronic Resources<br/>Snort : IDS and IPS toolkitent://SD_ILS/0/SD_ILS:11882712026-04-08T18:16:55Z2026-04-08T18:16:55Zby Beale, Jay.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597490993">https://www.sciencedirect.com/science/book/9781597490993</a><br/>Format: Electronic Resources<br/>Core software security : security at the sourceent://SD_ILS/0/SD_ILS:10227052026-04-08T18:16:55Z2026-04-08T18:16:55Zby Ransome, James.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1547083">Click to View</a><br/>Format: Electronic Resources<br/>Advances in intelligence and security informaticsent://SD_ILS/0/SD_ILS:1333812026-04-08T18:16:55Z2026-04-08T18:16:55Zby Mao, Wenji.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780123972002">http://www.sciencedirect.com/science/book/9780123972002</a><br/>Format: Electronic Resources<br/>The basics of information security understanding the fundamentals of InfoSec in theory and practiceent://SD_ILS/0/SD_ILS:1335922026-04-08T18:16:55Z2026-04-08T18:16:55Zby Andress, Jason.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597496537">http://www.sciencedirect.com/science/book/9781597496537</a><br/>Format: Electronic Resources<br/>The basics of information security : understanding the fundamentals of InfoSec in theory and practiceent://SD_ILS/0/SD_ILS:11838152026-04-08T18:16:55Z2026-04-08T18:16:55Zby Andress, Jason.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597496537">https://www.sciencedirect.com/science/book/9781597496537</a><br/>Format: Electronic Resources<br/>Insider threat : protecting the enterprise from sabotage, spying, and theftent://SD_ILS/0/SD_ILS:11882592026-04-08T18:16:55Z2026-04-08T18:16:55Zby Cole, Eric.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490481">http://www.sciencedirect.com/science/book/9781597490481</a><br/>Format: Electronic Resources<br/>Host integrity monitoring : using Osiris and Samhainent://SD_ILS/0/SD_ILS:11882452026-04-08T18:16:55Z2026-04-08T18:16:55Zby Wotring, Brian.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490184">http://www.sciencedirect.com/science/book/9781597490184</a><br/>Format: Electronic Resources<br/>Securing the cloud : cloud computer security techniques and tacticsent://SD_ILS/0/SD_ILS:11837432026-04-08T18:16:55Z2026-04-08T18:16:55Zby Winkler, J. R. (Joachim R.)<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495929">http://www.sciencedirect.com/science/book/9781597495929</a><br/>Format: Electronic Resources<br/>Cyber spying : tracking your family's (sometimes) secret online livesent://SD_ILS/0/SD_ILS:11883792026-04-08T18:16:55Z2026-04-08T18:16:55Zby Fair, Ted.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781931836418">https://www.sciencedirect.com/science/book/9781931836418</a><br/>Format: Electronic Resources<br/>Stealing the network : how to own a continentent://SD_ILS/0/SD_ILS:11883672026-04-08T18:16:55Z2026-04-08T18:16:55Zby 131ah.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836050">http://www.sciencedirect.com/science/book/9781931836050</a><br/>Format: Electronic Resources<br/>Zero day exploit : countdown to darknessent://SD_ILS/0/SD_ILS:11884892026-04-08T18:16:55Z2026-04-08T18:16:55Zby Shein, Rob.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836098">http://www.sciencedirect.com/science/book/9781931836098</a><br/>Format: Electronic Resources<br/>Cybersecurity for Industry 4.0 Analysis for Design and Manufacturingent://SD_ILS/0/SD_ILS:4809242026-04-08T18:16:55Z2026-04-08T18:16:55Zby Thames, Lane. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-50660-9">http://dx.doi.org/10.1007/978-3-319-50660-9</a><br/>Format: Electronic Resources<br/>Computer Communication, Networking and Internet Security Proceedings of IC3T 2016ent://SD_ILS/0/SD_ILS:4817142026-04-08T18:16:55Z2026-04-08T18:16:55Zby Satapathy, Suresh Chandra. editor.<br/><a href="http://dx.doi.org/10.1007/978-981-10-3226-4">http://dx.doi.org/10.1007/978-981-10-3226-4</a><br/>Format: Electronic Resources<br/>Advanced Computing and Systems for Security Volume Threeent://SD_ILS/0/SD_ILS:4817322026-04-08T18:16:55Z2026-04-08T18:16:55Zby Chaki, Rituparna. editor.<br/><a href="http://dx.doi.org/10.1007/978-981-10-3409-1">http://dx.doi.org/10.1007/978-981-10-3409-1</a><br/>Format: Electronic Resources<br/>Information Fusion for Cyber-Security Analyticsent://SD_ILS/0/SD_ILS:4805282026-04-08T18:16:55Z2026-04-08T18:16:55Zby Alsmadi, Izzat M. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-44257-0">http://dx.doi.org/10.1007/978-3-319-44257-0</a><br/>Format: Electronic Resources<br/>Securing the cloud cloud computer security techniques and tacticsent://SD_ILS/0/SD_ILS:1372012026-04-08T18:16:55Z2026-04-08T18:16:55Zby Winkler, J. R. (Joachim R.)<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495929">http://www.sciencedirect.com/science/book/9781597495929</a><br/>Format: Electronic Resources<br/>Physical and logical security convergence powered by enterprise security managementent://SD_ILS/0/SD_ILS:11890882026-04-08T18:16:55Z2026-04-08T18:16:55Zby Contos, Brian T.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597491228">https://www.sciencedirect.com/science/book/9781597491228</a><br/>Format: Electronic Resources<br/>How to cheat at securing your networkent://SD_ILS/0/SD_ILS:11899832026-04-08T18:16:55Z2026-04-08T18:16:55Zby Dubrawsky, Ido.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597492317">https://www.sciencedirect.com/science/book/9781597492317</a><br/>Format: Electronic Resources<br/>Securing IM and P2P applications for the enterpriseent://SD_ILS/0/SD_ILS:11842632026-04-08T18:16:55Z2026-04-08T18:16:55Zby Piccard, Paul L.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490177">http://www.sciencedirect.com/science/book/9781597490177</a>
ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597499965">http://www.sciencedirect.com/science/book/9781597499965</a><br/>Format: Electronic Resources<br/>Multimedia security technologies for digital rights managementent://SD_ILS/0/SD_ILS:11869942026-04-08T18:16:55Z2026-04-08T18:16:55Zby Zeng, Wenjun, 1967-<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780123694768">http://www.sciencedirect.com/science/book/9780123694768</a><br/>Format: Electronic Resources<br/>Implementing database security and auditing : a guide for DBAs, information security administrators and auditorsent://SD_ILS/0/SD_ILS:11881152026-04-08T18:16:55Z2026-04-08T18:16:55Zby Ben-Natan, Ron.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781555583347">http://www.sciencedirect.com/science/book/9781555583347</a><br/>Format: Electronic Resources<br/>Hacking a terror network : the silent threat of covert channelsent://SD_ILS/0/SD_ILS:11883632026-04-08T18:16:55Z2026-04-08T18:16:55Zby Rogers, Russ.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781928994985">https://www.sciencedirect.com/science/book/9781928994985</a><br/>Format: Electronic Resources<br/>Digital watermarkingent://SD_ILS/0/SD_ILS:11881542026-04-08T18:16:55Z2026-04-08T18:16:55Zby Cox, I. J. (Ingemar J.)<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781558607149">http://www.sciencedirect.com/science/book/9781558607149</a><br/>Format: Electronic Resources<br/>Hack proofing Windows 2000ent://SD_ILS/0/SD_ILS:11883812026-04-08T18:16:55Z2026-04-08T18:16:55Zby Todd, Chad.<br/><a href="http://www.sciencedirect.com/science/book/9781931836494">Available from ScienceDirect. Online version available for university members only. This requires an institutional login off-campus</a>
ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781931836494">https://www.sciencedirect.com/science/book/9781931836494</a><br/>Format: Electronic Resources<br/>A guide to kernel exploitation : attacking the coreent://SD_ILS/0/SD_ILS:11817702026-04-08T18:16:55Z2026-04-08T18:16:55Zby Perla, Enrico.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597494861">https://www.sciencedirect.com/science/book/9781597494861</a><br/>Format: Electronic Resources<br/>Securing Windows server 2008 : prevent attacks from outside and inside your organization.ent://SD_ILS/0/SD_ILS:11896212026-04-08T18:16:55Z2026-04-08T18:16:55ZScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597492805">https://www.sciencedirect.com/science/book/9781597492805</a><br/>Format: Electronic Resources<br/>Computer securityent://SD_ILS/0/SD_ILS:11759622026-04-08T18:16:55Z2026-04-08T18:16:55Zby Carroll, John M. (John Millar), 1925-<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9780409900323">https://www.sciencedirect.com/science/book/9780409900323</a><br/>Format: Electronic Resources<br/>HP Nonstop server security : a practical handbookent://SD_ILS/0/SD_ILS:11881012026-04-08T18:16:55Z2026-04-08T18:16:55Zby Hill, Terri.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781555583149">http://www.sciencedirect.com/science/book/9781555583149</a><br/>Format: Electronic Resources<br/>Proceedings of the International Conference on Data Engineering and Communication Technology ICDECT 2016, Volume 1ent://SD_ILS/0/SD_ILS:4815782026-04-08T18:16:55Z2026-04-08T18:16:55Zby Satapathy, Suresh Chandra. editor.<br/><a href="http://dx.doi.org/10.1007/978-981-10-1675-2">http://dx.doi.org/10.1007/978-981-10-1675-2</a><br/>Format: Electronic Resources<br/>Proceedings of the International Conference on Data Engineering and Communication Technology ICDECT 2016, Volume 2ent://SD_ILS/0/SD_ILS:4815792026-04-08T18:16:55Z2026-04-08T18:16:55Zby Satapathy, Suresh Chandra. editor.<br/><a href="http://dx.doi.org/10.1007/978-981-10-1678-3">http://dx.doi.org/10.1007/978-981-10-1678-3</a><br/>Format: Electronic Resources<br/>