Search Results for Computer System Implementation. - Narrowed by: IT Operations.SirsiDynix Enterprisehttp://librarycatalog.yyu.edu.tr/client/en_US/default/default/qu$003dComputer$002bSystem$002bImplementation.$0026qf$003dSUBJECT$002509Konu$002509IT$002bOperations.$002509IT$002bOperations.$0026ps$003d300?dt=list2025-02-15T05:19:19ZIT Quality Managementent://SD_ILS/0/SD_ILS:1467692025-02-15T05:19:19Z2025-02-15T05:19:19Zby Osterhage, Wolfgang W. author.<br/><a href="https://doi.org/10.1007/978-3-662-43767-4">https://doi.org/10.1007/978-3-662-43767-4</a><br/>Format: Electronic Resources<br/>Privacy and Security for Cloud Computingent://SD_ILS/0/SD_ILS:1390362025-02-15T05:19:19Z2025-02-15T05:19:19Zby Pearson, Siani. editor.<br/><a href="https://doi.org/10.1007/978-1-4471-4189-1">https://doi.org/10.1007/978-1-4471-4189-1</a><br/>Format: Electronic Resources<br/>Guide to Computer Network Securityent://SD_ILS/0/SD_ILS:1391352025-02-15T05:19:19Z2025-02-15T05:19:19Zby Kizza, Joseph Migga. author.<br/><a href="https://doi.org/10.1007/978-1-4471-4543-1">https://doi.org/10.1007/978-1-4471-4543-1</a><br/>Format: Electronic Resources<br/>Detection of Intrusions and Malware, and Vulnerability Assessment 10th International Conference, DIMVA 2013, Berlin, Germany, July 18-19, 2013. Proceedingsent://SD_ILS/0/SD_ILS:1430542025-02-15T05:19:19Z2025-02-15T05:19:19Zby Rieck, Konrad. editor.<br/><a href="https://doi.org/10.1007/978-3-642-39235-1">https://doi.org/10.1007/978-3-642-39235-1</a><br/>Format: Electronic Resources<br/>Security and Privacy in Mobile Information and Communication Systems 4th International Conference, MobiSec 2012, Frankfurt am Main, Germany, June 25-26, 2012, Pevised Selected Papersent://SD_ILS/0/SD_ILS:1352672025-02-15T05:19:19Z2025-02-15T05:19:19Zby Schmidt, Andreas U. editor.<br/><a href="https://doi.org/10.1007/978-3-642-33392-7">https://doi.org/10.1007/978-3-642-33392-7</a><br/>Format: Electronic Resources<br/>Guide to Software Development Designing and Managing the Life Cycleent://SD_ILS/0/SD_ILS:1420012025-02-15T05:19:19Z2025-02-15T05:19:19Zby Langer, Arthur M. author.<br/><a href="https://doi.org/10.1007/978-1-4471-2300-2">https://doi.org/10.1007/978-1-4471-2300-2</a><br/>Format: Electronic Resources<br/>Smart Mobile Apps Mit Business-Apps ins Zeitalter mobiler Geschäftsprozesseent://SD_ILS/0/SD_ILS:1903992025-02-15T05:19:19Z2025-02-15T05:19:19Zby Verclas, Stephan. editor.<br/><a href="https://doi.org/10.1007/978-3-642-22259-7">https://doi.org/10.1007/978-3-642-22259-7</a><br/>Format: Electronic Resources<br/>Digital Forensics and Cyber Crime Third International ICST Conference, ICDF2C 2011, Dublin, Ireland, October 26-28, 2011, Revised Selected Papersent://SD_ILS/0/SD_ILS:1775422025-02-15T05:19:19Z2025-02-15T05:19:19Zby Gladyshev, Pavel. editor.<br/><a href="https://doi.org/10.1007/978-3-642-35515-8">https://doi.org/10.1007/978-3-642-35515-8</a><br/>Format: Electronic Resources<br/>Model Driven Engineering Languages and Systems 14th International Conference, MODELS 2011, Wellington, New Zealand, October 16-21, 2011, Proceedingsent://SD_ILS/0/SD_ILS:1721012025-02-15T05:19:19Z2025-02-15T05:19:19Zby Whittle, Jon. editor.<br/><a href="https://doi.org/10.1007/978-3-642-24485-8">https://doi.org/10.1007/978-3-642-24485-8</a><br/>Format: Electronic Resources<br/>Apple's iPad im Enterprise-Einsatz Einsatzmöglichkeiten, Programmierung, Betrieb und Sicherheit im Unternehmenent://SD_ILS/0/SD_ILS:1805522025-02-15T05:19:19Z2025-02-15T05:19:19Zby Oelmaier, Florian. author.<br/><a href="https://doi.org/10.1007/978-3-642-15437-9">https://doi.org/10.1007/978-3-642-15437-9</a><br/>Format: Electronic Resources<br/>Knowledge Representation for Health-Care. Data, Processes and Guidelines AIME 2009 Workshop KR4HC 2009, Verona, Italy, July 19, 2009, Revised Selected Papersent://SD_ILS/0/SD_ILS:1473542025-02-15T05:19:19Z2025-02-15T05:19:19Zby Riano, David. editor. (orcid)0000-0002-1608-0215<br/><a href="https://doi.org/10.1007/978-3-642-11808-1">https://doi.org/10.1007/978-3-642-11808-1</a><br/>Format: Electronic Resources<br/>Knowledge Management and Organizational Learningent://SD_ILS/0/SD_ILS:1602202025-02-15T05:19:19Z2025-02-15T05:19:19Zby King, William R. editor.<br/><a href="https://doi.org/10.1007/978-1-4419-0011-1">https://doi.org/10.1007/978-1-4419-0011-1</a><br/>Format: Electronic Resources<br/>Guide to Computer Network Securityent://SD_ILS/0/SD_ILS:1403992025-02-15T05:19:19Z2025-02-15T05:19:19Zby Kizza, Joseph Migga. author.<br/><a href="https://doi.org/10.1007/978-1-84800-917-2">https://doi.org/10.1007/978-1-84800-917-2</a><br/>Format: Electronic Resources<br/>Model Driven Architecture - Foundations and Applications 4th European Conference, ECMDA-FA 2008, Berlin, Germany, June 9-13, 2008, Proceedingsent://SD_ILS/0/SD_ILS:1700552025-02-15T05:19:19Z2025-02-15T05:19:19Zby Schieferdecker, Ina. editor.<br/><a href="https://doi.org/10.1007/978-3-540-69100-6">https://doi.org/10.1007/978-3-540-69100-6</a><br/>Format: Electronic Resources<br/>Managing Large-Scale Service Deployment 19th IFIP/IEEE International Workshop on Distributed Systems: Operations and Management, DSOM 2008, Samos Island, Greece, September 22-26, 2008, Proceedingsent://SD_ILS/0/SD_ILS:1728302025-02-15T05:19:19Z2025-02-15T05:19:19Zby De Turck, Filip. editor.<br/><a href="https://doi.org/10.1007/978-3-540-87353-2">https://doi.org/10.1007/978-3-540-87353-2</a><br/>Format: Electronic Resources<br/>Model Driven Architecture - Foundations and Applications Third European Conference, ECMDA-FA 2007, Haifa, Israel, June 11-15, 2007, Proceedingsent://SD_ILS/0/SD_ILS:1710402025-02-15T05:19:19Z2025-02-15T05:19:19Zby Akehurst, David. editor.<br/><a href="https://doi.org/10.1007/978-3-540-72901-3">https://doi.org/10.1007/978-3-540-72901-3</a><br/>Format: Electronic Resources<br/>Spatial Database Systems Design, Implementation and Project Managementent://SD_ILS/0/SD_ILS:1374712025-02-15T05:19:19Z2025-02-15T05:19:19Zby Yeung, Albert K.W. author.<br/><a href="https://doi.org/10.1007/1-4020-5392-4">https://doi.org/10.1007/1-4020-5392-4</a><br/>Format: Electronic Resources<br/>Handbook on Architectures of Information Systemsent://SD_ILS/0/SD_ILS:1506152025-02-15T05:19:19Z2025-02-15T05:19:19Zby Bernus, Peter. editor.<br/><a href="https://doi.org/10.1007/b137905">https://doi.org/10.1007/b137905</a><br/>Format: Electronic Resources<br/>Model-Driven Architecture - Foundations and Applications Second European Conference, ECMDA-FA 2006, Bilbao, Spain, July 10-13, 2006, Proceedingsent://SD_ILS/0/SD_ILS:1416512025-02-15T05:19:19Z2025-02-15T05:19:19Zby Warmer, Jos. editor.<br/><a href="https://doi.org/10.1007/11787044">https://doi.org/10.1007/11787044</a><br/>Format: Electronic Resources<br/>Model Driven Architecture - Foundations and Applications First European Conference, ECMDA-FA 2005, Nuremberg, Germany, November 7-10, 2005, Proceedingsent://SD_ILS/0/SD_ILS:1700782025-02-15T05:19:19Z2025-02-15T05:19:19Zby Hartman, Alan. editor.<br/><a href="https://doi.org/10.1007/11581741">https://doi.org/10.1007/11581741</a><br/>Format: Electronic Resources<br/>Model Driven Architecture European MDA Workshops: Foundations and Applications, MDAFA 2003 and MDAFA 2004, Twente, The Netherlands, June 26-27, 2003, and Linköping, Sweden, June 10-11, 2004, Revised Selected Papersent://SD_ILS/0/SD_ILS:1725562025-02-15T05:19:19Z2025-02-15T05:19:19Zby Aßmann, Uwe. editor.<br/><a href="https://doi.org/10.1007/11538097">https://doi.org/10.1007/11538097</a><br/>Format: Electronic Resources<br/>Computer Network Securityent://SD_ILS/0/SD_ILS:1522182025-02-15T05:19:19Z2025-02-15T05:19:19Zby Kizza, Joseph Migga. author.<br/><a href="https://doi.org/10.1007/b106962">https://doi.org/10.1007/b106962</a><br/>Format: Electronic Resources<br/>Manage IT! Organizing IT Demand and IT Supplyent://SD_ILS/0/SD_ILS:1371672025-02-15T05:19:19Z2025-02-15T05:19:19Zby Thiadens, Theo. author.<br/><a href="https://doi.org/10.1007/1-4020-3710-4">https://doi.org/10.1007/1-4020-3710-4</a><br/>Format: Electronic Resources<br/>