Arama Sonu&ccedil;lar&#305; - Daralt&#305;lm&#305;&#351;: Engineering. - Security Science and Technology. - Computer security. SirsiDynix Enterprise http://katalog.baskent.edu.tr/client/tr_TR/defaulttr/defaulttr/qf$003dSUBJECT$002509Konu$002509Engineering.$002509Engineering.$0026qf$003dSUBJECT$002509Konu$002509Security$002bScience$002band$002bTechnology.$002509Security$002bScience$002band$002bTechnology.$0026qf$003dSUBJECT$002509Konu$002509Computer$002bsecurity.$002509Computer$002bsecurity.$0026ps$003d300;jsessionid=253DDE3BEFA352ACF9CA569A2364502B? 2024-06-01T10:34:13Z Multimedia Forensics and Security Foundations, Innovations, and Applications ent://SD_ILS/0/SD_ILS:480530 2024-06-01T10:34:13Z 2024-06-01T10:34:13Z by&#160;Hassanien, Aboul Ella. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-44270-9">http://dx.doi.org/10.1007/978-3-319-44270-9</a><br/>Format:&#160;Elektronik Kaynak<br/> Biometric Security and Privacy Opportunities &amp; Challenges in The Big Data Era ent://SD_ILS/0/SD_ILS:480719 2024-06-01T10:34:13Z 2024-06-01T10:34:13Z by&#160;Jiang, Richard. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-47301-7">http://dx.doi.org/10.1007/978-3-319-47301-7</a><br/>Format:&#160;Elektronik Kaynak<br/> Information Security Practices Emerging Threats and Perspectives ent://SD_ILS/0/SD_ILS:480820 2024-06-01T10:34:13Z 2024-06-01T10:34:13Z by&#160;Traor&eacute;, Issa. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-48947-6">http://dx.doi.org/10.1007/978-3-319-48947-6</a><br/>Format:&#160;Elektronik Kaynak<br/>