Search Results for Computer Engineering and Networks. - Narrowed by: Security systems.SirsiDynix Enterprisehttp://librarycatalog.yyu.edu.tr/client/en_US/default/default/qu$003dComputer$002bEngineering$002band$002bNetworks.$0026qf$003dSUBJECT$002509Konu$002509Security$002bsystems.$002509Security$002bsystems.$0026ps$003d300?dt=list2025-02-14T18:02:29ZTrusted Computing Platforms TPM2.0 in Contextent://SD_ILS/0/SD_ILS:1659642025-02-14T18:02:29Z2025-02-14T18:02:29Zby Proudler, Graeme. author.<br/><a href="https://doi.org/10.1007/978-3-319-08744-3">https://doi.org/10.1007/978-3-319-08744-3</a><br/>Format: Electronic Resources<br/>An Evaluation Framework for Multimodal Interaction Determining Quality Aspects and Modality Choiceent://SD_ILS/0/SD_ILS:1684952025-02-14T18:02:29Z2025-02-14T18:02:29Zby Wechsung, Ina. author.<br/><a href="https://doi.org/10.1007/978-3-319-03810-0">https://doi.org/10.1007/978-3-319-03810-0</a><br/>Format: Electronic Resources<br/>Ternary Networks Reliability and Monte Carloent://SD_ILS/0/SD_ILS:1409422025-02-14T18:02:29Z2025-02-14T18:02:29Zby Gertsbakh, Ilya. author.<br/><a href="https://doi.org/10.1007/978-3-319-06440-6">https://doi.org/10.1007/978-3-319-06440-6</a><br/>Format: Electronic Resources<br/>PBX Security and Forensics A Practical Approachent://SD_ILS/0/SD_ILS:1459702025-02-14T18:02:29Z2025-02-14T18:02:29Zby Androulidakis, I.I. author.<br/><a href="https://doi.org/10.1007/978-1-4614-1656-2">https://doi.org/10.1007/978-1-4614-1656-2</a><br/>Format: Electronic Resources<br/>Designing for Network and Service Continuity in Wireless Mesh Networksent://SD_ILS/0/SD_ILS:1388412025-02-14T18:02:29Z2025-02-14T18:02:29Zby Pathak, Parth H. author.<br/><a href="https://doi.org/10.1007/978-1-4614-4627-9">https://doi.org/10.1007/978-1-4614-4627-9</a><br/>Format: Electronic Resources<br/>Mobile Phone Security and Forensics A Practical Approachent://SD_ILS/0/SD_ILS:1510092025-02-14T18:02:29Z2025-02-14T18:02:29Zby Androulidakis, I.I. author.<br/><a href="https://doi.org/10.1007/978-1-4614-1650-0">https://doi.org/10.1007/978-1-4614-1650-0</a><br/>Format: Electronic Resources<br/>Maintenance Management in Network Utilities Framework and Practical Implementationent://SD_ILS/0/SD_ILS:1421202025-02-14T18:02:29Z2025-02-14T18:02:29Zby Gómez Fernández, Juan F. author.<br/><a href="https://doi.org/10.1007/978-1-4471-2757-4">https://doi.org/10.1007/978-1-4471-2757-4</a><br/>Format: Electronic Resources<br/>Network Reliability and Resilienceent://SD_ILS/0/SD_ILS:1756822025-02-14T18:02:29Z2025-02-14T18:02:29Zby Gertsbakh, Ilya. author.<br/><a href="https://doi.org/10.1007/978-3-642-22374-7">https://doi.org/10.1007/978-3-642-22374-7</a><br/>Format: Electronic Resources<br/>Reliability Engineering Basic Concepts and Applications in ICTent://SD_ILS/0/SD_ILS:1466292025-02-14T18:02:29Z2025-02-14T18:02:29Zby Lazzaroni, Massimo. author.<br/><a href="https://doi.org/10.1007/978-3-642-20983-3">https://doi.org/10.1007/978-3-642-20983-3</a><br/>Format: Electronic Resources<br/>Dependability of Networked Computer-based Systemsent://SD_ILS/0/SD_ILS:1367822025-02-14T18:02:29Z2025-02-14T18:02:29Zby Verma, Ajit Kumar. author.<br/><a href="https://doi.org/10.1007/978-0-85729-318-3">https://doi.org/10.1007/978-0-85729-318-3</a><br/>Format: Electronic Resources<br/>Human Error, Safety and Systems Development 7th IFIP WG 13.5 Working Conference, HESSD 2009, Brussels, Belgium, September 23-25, 2009, Revised Selected Papersent://SD_ILS/0/SD_ILS:1703432025-02-14T18:02:29Z2025-02-14T18:02:29Zby Palanque, Philippe. editor.<br/><a href="https://doi.org/10.1007/978-3-642-11750-3">https://doi.org/10.1007/978-3-642-11750-3</a><br/>Format: Electronic Resources<br/>Fault Location on Power Networksent://SD_ILS/0/SD_ILS:1619352025-02-14T18:02:29Z2025-02-14T18:02:29Zby Saha, Murari Mohan. author.<br/><a href="https://doi.org/10.1007/978-1-84882-886-5">https://doi.org/10.1007/978-1-84882-886-5</a><br/>Format: Electronic Resources<br/>Constructive Computation in Stochastic Models with Applications The RG-Factorizationsent://SD_ILS/0/SD_ILS:1639102025-02-14T18:02:29Z2025-02-14T18:02:29Zby Li, Quan-Lin. author.<br/><a href="https://doi.org/10.1007/978-3-642-11492-2">https://doi.org/10.1007/978-3-642-11492-2</a><br/>Format: Electronic Resources<br/>Critical Information Infrastructure Security Third International Workshop, CRITIS 2008, Rome, Italy, October 13-15, 2008ent://SD_ILS/0/SD_ILS:1713592025-02-14T18:02:29Z2025-02-14T18:02:29Zby Setola, Roberto. editor.<br/><a href="https://doi.org/10.1007/978-3-642-03552-4">https://doi.org/10.1007/978-3-642-03552-4</a><br/>Format: Electronic Resources<br/>Justifying the Dependability of Computer-based Systems With Applications in Nuclear Engineeringent://SD_ILS/0/SD_ILS:1403722025-02-14T18:02:29Z2025-02-14T18:02:29Zby Courtois, Pierre-Jacques. author.<br/><a href="https://doi.org/10.1007/978-1-84800-372-9">https://doi.org/10.1007/978-1-84800-372-9</a><br/>Format: Electronic Resources<br/>The Maintenance Management Framework Models and Methods for Complex Systems Maintenanceent://SD_ILS/0/SD_ILS:1403942025-02-14T18:02:29Z2025-02-14T18:02:29Zby Crespo Márquez, Adolfo. author.<br/><a href="https://doi.org/10.1007/978-1-84628-821-0">https://doi.org/10.1007/978-1-84628-821-0</a><br/>Format: Electronic Resources<br/>