Search Results for Systems and Data Security. - Narrowed by: Computer security.SirsiDynix Enterprisehttp://katalog.baskent.edu.tr/client/en_US/default/default/qu$003dSystems$002band$002bData$002bSecurity.$0026qf$003dSUBJECT$002509Subject$002509Computer$002bsecurity.$002509Computer$002bsecurity.$0026ps$003d300?dt=list2026-04-08T04:52:00ZSecurity and resilience in intelligent data-centric systems and communication networksent://SD_ILS/0/SD_ILS:11301612026-04-08T04:52:00Z2026-04-08T04:52:00Zby Ficco, Massimo, editor.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5090270">Click to View</a><br/>Format: Electronic Resources<br/>Group-target Trackingent://SD_ILS/0/SD_ILS:4815922026-04-08T04:52:00Z2026-04-08T04:52:00Zby Geng, Wen-dong. author.<br/><a href="http://dx.doi.org/10.1007/978-981-10-1888-6">http://dx.doi.org/10.1007/978-981-10-1888-6</a><br/>Format: Electronic Resources<br/>Proceedings of the First International Conference on Intelligent Computing and Communicationent://SD_ILS/0/SD_ILS:4816062026-04-08T04:52:00Z2026-04-08T04:52:00Zby Mandal, Jyotsna Kumar. editor.<br/><a href="http://dx.doi.org/10.1007/978-981-10-2035-3">http://dx.doi.org/10.1007/978-981-10-2035-3</a><br/>Format: Electronic Resources<br/>Digital Watermarking Techniques and Trendsent://SD_ILS/0/SD_ILS:4816122026-04-08T04:52:00Z2026-04-08T04:52:00Zby Nematollahi, Mohammad Ali. author.<br/><a href="http://dx.doi.org/10.1007/978-981-10-2095-7">http://dx.doi.org/10.1007/978-981-10-2095-7</a><br/>Format: Electronic Resources<br/>Innovations in Computer Science and Engineering Proceedings of the Fourth ICICSE 2016ent://SD_ILS/0/SD_ILS:4817642026-04-08T04:52:00Z2026-04-08T04:52:00Zby Saini, H. S. editor.<br/><a href="http://dx.doi.org/10.1007/978-981-10-3818-1">http://dx.doi.org/10.1007/978-981-10-3818-1</a><br/>Format: Electronic Resources<br/>Computing and Network Sustainability Proceedings of IRSCNS 2016ent://SD_ILS/0/SD_ILS:4817722026-04-08T04:52:00Z2026-04-08T04:52:00Zby Vishwakarma, H.R . editor.<br/><a href="http://dx.doi.org/10.1007/978-981-10-3935-5">http://dx.doi.org/10.1007/978-981-10-3935-5</a><br/>Format: Electronic Resources<br/>Information Science and Applications 2017 ICISA 2017ent://SD_ILS/0/SD_ILS:4817842026-04-08T04:52:00Z2026-04-08T04:52:00Zby Kim, Kuinam. editor.<br/><a href="http://dx.doi.org/10.1007/978-981-10-4154-9">http://dx.doi.org/10.1007/978-981-10-4154-9</a><br/>Format: Electronic Resources<br/>On Privacy-Preserving Protocols for Smart Metering Systems Security and Privacy in Smart Gridsent://SD_ILS/0/SD_ILS:4802902026-04-08T04:52:00Z2026-04-08T04:52:00Zby Borges de Oliveira, Fábio. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-40718-0">http://dx.doi.org/10.1007/978-3-319-40718-0</a><br/>Format: Electronic Resources<br/>Smart Grids: Security and Privacy Issuesent://SD_ILS/0/SD_ILS:4805722026-04-08T04:52:00Z2026-04-08T04:52:00Zby Boroojeni, Kianoosh G. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-45050-6">http://dx.doi.org/10.1007/978-3-319-45050-6</a><br/>Format: Electronic Resources<br/>Security-Aware Design for Cyber-Physical Systems A Platform-Based Approachent://SD_ILS/0/SD_ILS:4809682026-04-08T04:52:00Z2026-04-08T04:52:00Zby Lin, Chung-Wei. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-51328-7">http://dx.doi.org/10.1007/978-3-319-51328-7</a><br/>Format: Electronic Resources<br/>Information Security Practices Emerging Threats and Perspectivesent://SD_ILS/0/SD_ILS:4808202026-04-08T04:52:00Z2026-04-08T04:52:00Zby Traoré, Issa. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-48947-6">http://dx.doi.org/10.1007/978-3-319-48947-6</a><br/>Format: Electronic Resources<br/>Security Challenges and Approaches in Internet of Thingsent://SD_ILS/0/SD_ILS:4805242026-04-08T04:52:00Z2026-04-08T04:52:00Zby Misra, Sridipta. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-44230-3">http://dx.doi.org/10.1007/978-3-319-44230-3</a><br/>Format: Electronic Resources<br/>Multimedia Forensics and Security Foundations, Innovations, and Applicationsent://SD_ILS/0/SD_ILS:4805302026-04-08T04:52:00Z2026-04-08T04:52:00Zby Hassanien, Aboul Ella. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-44270-9">http://dx.doi.org/10.1007/978-3-319-44270-9</a><br/>Format: Electronic Resources<br/>Vehicular Cyber Physical Systems Adaptive Connectivity and Securityent://SD_ILS/0/SD_ILS:4805402026-04-08T04:52:00Z2026-04-08T04:52:00Zby Rawat, Danda B. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-44494-9">http://dx.doi.org/10.1007/978-3-319-44494-9</a><br/>Format: Electronic Resources<br/>Biometric Security and Privacy Opportunities & Challenges in The Big Data Eraent://SD_ILS/0/SD_ILS:4807192026-04-08T04:52:00Z2026-04-08T04:52:00Zby Jiang, Richard. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-47301-7">http://dx.doi.org/10.1007/978-3-319-47301-7</a><br/>Format: Electronic Resources<br/>Hardware IP Security and Trustent://SD_ILS/0/SD_ILS:4808292026-04-08T04:52:00Z2026-04-08T04:52:00Zby Mishra, Prabhat. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-49025-0">http://dx.doi.org/10.1007/978-3-319-49025-0</a><br/>Format: Electronic Resources<br/>Cybersecurity for Industry 4.0 Analysis for Design and Manufacturingent://SD_ILS/0/SD_ILS:4809242026-04-08T04:52:00Z2026-04-08T04:52:00Zby Thames, Lane. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-50660-9">http://dx.doi.org/10.1007/978-3-319-50660-9</a><br/>Format: Electronic Resources<br/>Computer Communication, Networking and Internet Security Proceedings of IC3T 2016ent://SD_ILS/0/SD_ILS:4817142026-04-08T04:52:00Z2026-04-08T04:52:00Zby Satapathy, Suresh Chandra. editor.<br/><a href="http://dx.doi.org/10.1007/978-981-10-3226-4">http://dx.doi.org/10.1007/978-981-10-3226-4</a><br/>Format: Electronic Resources<br/>Advanced Computing and Systems for Security Volume Fourent://SD_ILS/0/SD_ILS:4817312026-04-08T04:52:00Z2026-04-08T04:52:00Zby Chaki, Rituparna. editor.<br/><a href="http://dx.doi.org/10.1007/978-981-10-3391-9">http://dx.doi.org/10.1007/978-981-10-3391-9</a><br/>Format: Electronic Resources<br/>Advanced Computing and Systems for Security Volume Threeent://SD_ILS/0/SD_ILS:4817322026-04-08T04:52:00Z2026-04-08T04:52:00Zby Chaki, Rituparna. editor.<br/><a href="http://dx.doi.org/10.1007/978-981-10-3409-1">http://dx.doi.org/10.1007/978-981-10-3409-1</a><br/>Format: Electronic Resources<br/>Information Fusion for Cyber-Security Analyticsent://SD_ILS/0/SD_ILS:4805282026-04-08T04:52:00Z2026-04-08T04:52:00Zby Alsmadi, Izzat M. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-44257-0">http://dx.doi.org/10.1007/978-3-319-44257-0</a><br/>Format: Electronic Resources<br/>Proceedings of the International Conference on Data Engineering and Communication Technology ICDECT 2016, Volume 1ent://SD_ILS/0/SD_ILS:4815782026-04-08T04:52:00Z2026-04-08T04:52:00Zby Satapathy, Suresh Chandra. editor.<br/><a href="http://dx.doi.org/10.1007/978-981-10-1675-2">http://dx.doi.org/10.1007/978-981-10-1675-2</a><br/>Format: Electronic Resources<br/>Proceedings of the International Conference on Data Engineering and Communication Technology ICDECT 2016, Volume 2ent://SD_ILS/0/SD_ILS:4815792026-04-08T04:52:00Z2026-04-08T04:52:00Zby Satapathy, Suresh Chandra. editor.<br/><a href="http://dx.doi.org/10.1007/978-981-10-1678-3">http://dx.doi.org/10.1007/978-981-10-1678-3</a><br/>Format: Electronic Resources<br/>Black Hat physical device security : exploiting hardware and softwareent://SD_ILS/0/SD_ILS:11884102026-04-08T04:52:00Z2026-04-08T04:52:00Zby Miller, Drew, 1978-<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781932266818">http://www.sciencedirect.com/science/book/9781932266818</a><br/>Format: Electronic Resources<br/>Web application obfuscation -/WAFs..Evasion..Filters//alert (/Obfuscation/)-ent://SD_ILS/0/SD_ILS:1372092026-04-08T04:52:00Z2026-04-08T04:52:00Zby Heiderich, Mario.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597496049">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Electronic Resources<br/>Securing HP NonStop servers in an open systems world : TCP/IP, OSS & SQLent://SD_ILS/0/SD_ILS:11881182026-04-08T04:52:00Z2026-04-08T04:52:00Zby XYPRO Technology Corporation.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781555583446">http://www.sciencedirect.com/science/book/9781555583446</a><br/>Format: Electronic Resources<br/>Practical embedded security : building secure resource-constrained systemsent://SD_ILS/0/SD_ILS:11891682026-04-08T04:52:00Z2026-04-08T04:52:00Zby Stapko, Timothy John.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9780750682152">https://www.sciencedirect.com/science/book/9780750682152</a><br/>Format: Electronic Resources<br/>Scene of the cybercrime.ent://SD_ILS/0/SD_ILS:11896652026-04-08T04:52:00Z2026-04-08T04:52:00Zby Cross, Michael, 1965-<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597492768">https://www.sciencedirect.com/science/book/9781597492768</a><br/>Format: Electronic Resources<br/>Computer securityent://SD_ILS/0/SD_ILS:11759622026-04-08T04:52:00Z2026-04-08T04:52:00Zby Carroll, John M. (John Millar), 1925-<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9780409900323">https://www.sciencedirect.com/science/book/9780409900323</a><br/>Format: Electronic Resources<br/>