Search Results for Computer Engineering and Networks. - Narrowed by: Security systems. SirsiDynix Enterprise http://librarycatalog.yyu.edu.tr/client/en_US/default/default/qu$003dComputer$002bEngineering$002band$002bNetworks.$0026qf$003dSUBJECT$002509Konu$002509Security$002bsystems.$002509Security$002bsystems.$0026ps$003d300?dt=list 2025-02-14T18:02:29Z Trusted Computing Platforms TPM2.0 in Context ent://SD_ILS/0/SD_ILS:165964 2025-02-14T18:02:29Z 2025-02-14T18:02:29Z by&#160;Proudler, Graeme. author.<br/><a href="https://doi.org/10.1007/978-3-319-08744-3">https://doi.org/10.1007/978-3-319-08744-3</a><br/>Format:&#160;Electronic Resources<br/> An Evaluation Framework for Multimodal Interaction Determining Quality Aspects and Modality Choice ent://SD_ILS/0/SD_ILS:168495 2025-02-14T18:02:29Z 2025-02-14T18:02:29Z by&#160;Wechsung, Ina. author.<br/><a href="https://doi.org/10.1007/978-3-319-03810-0">https://doi.org/10.1007/978-3-319-03810-0</a><br/>Format:&#160;Electronic Resources<br/> Ternary Networks Reliability and Monte Carlo ent://SD_ILS/0/SD_ILS:140942 2025-02-14T18:02:29Z 2025-02-14T18:02:29Z by&#160;Gertsbakh, Ilya. author.<br/><a href="https://doi.org/10.1007/978-3-319-06440-6">https://doi.org/10.1007/978-3-319-06440-6</a><br/>Format:&#160;Electronic Resources<br/> PBX Security and Forensics A Practical Approach ent://SD_ILS/0/SD_ILS:145970 2025-02-14T18:02:29Z 2025-02-14T18:02:29Z by&#160;Androulidakis, I.I. author.<br/><a href="https://doi.org/10.1007/978-1-4614-1656-2">https://doi.org/10.1007/978-1-4614-1656-2</a><br/>Format:&#160;Electronic Resources<br/> Designing for Network and Service Continuity in Wireless Mesh Networks ent://SD_ILS/0/SD_ILS:138841 2025-02-14T18:02:29Z 2025-02-14T18:02:29Z by&#160;Pathak, Parth H. author.<br/><a href="https://doi.org/10.1007/978-1-4614-4627-9">https://doi.org/10.1007/978-1-4614-4627-9</a><br/>Format:&#160;Electronic Resources<br/> Mobile Phone Security and Forensics A Practical Approach ent://SD_ILS/0/SD_ILS:151009 2025-02-14T18:02:29Z 2025-02-14T18:02:29Z by&#160;Androulidakis, I.I. author.<br/><a href="https://doi.org/10.1007/978-1-4614-1650-0">https://doi.org/10.1007/978-1-4614-1650-0</a><br/>Format:&#160;Electronic Resources<br/> Maintenance Management in Network Utilities Framework and Practical Implementation ent://SD_ILS/0/SD_ILS:142120 2025-02-14T18:02:29Z 2025-02-14T18:02:29Z by&#160;G&oacute;mez Fern&aacute;ndez, Juan F. author.<br/><a href="https://doi.org/10.1007/978-1-4471-2757-4">https://doi.org/10.1007/978-1-4471-2757-4</a><br/>Format:&#160;Electronic Resources<br/> Network Reliability and Resilience ent://SD_ILS/0/SD_ILS:175682 2025-02-14T18:02:29Z 2025-02-14T18:02:29Z by&#160;Gertsbakh, Ilya. author.<br/><a href="https://doi.org/10.1007/978-3-642-22374-7">https://doi.org/10.1007/978-3-642-22374-7</a><br/>Format:&#160;Electronic Resources<br/> Reliability Engineering Basic Concepts and Applications in ICT ent://SD_ILS/0/SD_ILS:146629 2025-02-14T18:02:29Z 2025-02-14T18:02:29Z by&#160;Lazzaroni, Massimo. author.<br/><a href="https://doi.org/10.1007/978-3-642-20983-3">https://doi.org/10.1007/978-3-642-20983-3</a><br/>Format:&#160;Electronic Resources<br/> Dependability of Networked Computer-based Systems ent://SD_ILS/0/SD_ILS:136782 2025-02-14T18:02:29Z 2025-02-14T18:02:29Z by&#160;Verma, Ajit Kumar. author.<br/><a href="https://doi.org/10.1007/978-0-85729-318-3">https://doi.org/10.1007/978-0-85729-318-3</a><br/>Format:&#160;Electronic Resources<br/> Human Error, Safety and Systems Development 7th IFIP WG 13.5 Working Conference, HESSD 2009, Brussels, Belgium, September 23-25, 2009, Revised Selected Papers ent://SD_ILS/0/SD_ILS:170343 2025-02-14T18:02:29Z 2025-02-14T18:02:29Z by&#160;Palanque, Philippe. editor.<br/><a href="https://doi.org/10.1007/978-3-642-11750-3">https://doi.org/10.1007/978-3-642-11750-3</a><br/>Format:&#160;Electronic Resources<br/> Fault Location on Power Networks ent://SD_ILS/0/SD_ILS:161935 2025-02-14T18:02:29Z 2025-02-14T18:02:29Z by&#160;Saha, Murari Mohan. author.<br/><a href="https://doi.org/10.1007/978-1-84882-886-5">https://doi.org/10.1007/978-1-84882-886-5</a><br/>Format:&#160;Electronic Resources<br/> Constructive Computation in Stochastic Models with Applications The RG-Factorizations ent://SD_ILS/0/SD_ILS:163910 2025-02-14T18:02:29Z 2025-02-14T18:02:29Z by&#160;Li, Quan-Lin. author.<br/><a href="https://doi.org/10.1007/978-3-642-11492-2">https://doi.org/10.1007/978-3-642-11492-2</a><br/>Format:&#160;Electronic Resources<br/> Critical Information Infrastructure Security Third International Workshop, CRITIS 2008, Rome, Italy, October 13-15, 2008 ent://SD_ILS/0/SD_ILS:171359 2025-02-14T18:02:29Z 2025-02-14T18:02:29Z by&#160;Setola, Roberto. editor.<br/><a href="https://doi.org/10.1007/978-3-642-03552-4">https://doi.org/10.1007/978-3-642-03552-4</a><br/>Format:&#160;Electronic Resources<br/> Justifying the Dependability of Computer-based Systems With Applications in Nuclear Engineering ent://SD_ILS/0/SD_ILS:140372 2025-02-14T18:02:29Z 2025-02-14T18:02:29Z by&#160;Courtois, Pierre-Jacques. author.<br/><a href="https://doi.org/10.1007/978-1-84800-372-9">https://doi.org/10.1007/978-1-84800-372-9</a><br/>Format:&#160;Electronic Resources<br/> The Maintenance Management Framework Models and Methods for Complex Systems Maintenance ent://SD_ILS/0/SD_ILS:140394 2025-02-14T18:02:29Z 2025-02-14T18:02:29Z by&#160;Crespo M&aacute;rquez, Adolfo. author.<br/><a href="https://doi.org/10.1007/978-1-84628-821-0">https://doi.org/10.1007/978-1-84628-821-0</a><br/>Format:&#160;Electronic Resources<br/>