Search Results for - Narrowed by: Jajodia, Sushil. editor. - E-Book - Electronic Library - Computer science. - Data structures (Computer science).
SirsiDynix Enterprise
https://katalog.hacettepe.edu.tr/client/en_US/default/default/qf$003dAUTHOR$002509Author$002509Jajodia$00252C$002bSushil.$002beditor.$002509Jajodia$00252C$002bSushil.$002beditor.$0026qf$003dITYPE$002509Material$002bType$0025091$00253AE-KITAP$002509E-Book$0026qf$003dLOCATION$002509Shelf$002bLocation$0025091$00253AELEKKUTUPH$002509Electronic$002bLibrary$0026qf$003dSUBJECT$002509Subject$002509Computer$002bscience.$002509Computer$002bscience.$0026qf$003dSUBJECT$002509Subject$002509Data$002bstructures$002b$002528Computer$002bscience$002529.$002509Data$002bstructures$002b$002528Computer$002bscience$002529.$0026te$003dILS$0026rt$003dfalse$00257C$00257C$00257CISBN$00257C$00257C$00257CISBN$0026ps$003d300$0026isd$003dtrue?
2024-08-28T05:32:50Z
Moving Target Defense II Application of Game Theory and Adversarial Modeling
ent://SD_ILS/0/SD_ILS:331766
2024-08-28T05:32:50Z
2024-08-28T05:32:50Z
Author Jajodia, Sushil. editor. Ghosh, Anup K. editor. Subrahmanian, V.S. editor. Swarup, Vipin. editor. Wang, Cliff. editor.<br/>Preferred Shelf Number ONLINE(331766.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-1-4614-5416-8">http://dx.doi.org/10.1007/978-1-4614-5416-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Encyclopedia of Cryptography and Security
ent://SD_ILS/0/SD_ILS:172455
2024-08-28T05:32:50Z
2024-08-28T05:32:50Z
Author van Tilborg, Henk C. A. editor. Jajodia, Sushil. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-1-4419-5906-5">http://dx.doi.org/10.1007/978-1-4419-5906-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cyber Situational Awareness Issues and Research
ent://SD_ILS/0/SD_ILS:171874
2024-08-28T05:32:50Z
2024-08-28T05:32:50Z
Author Jajodia, Sushil. editor. Liu, Peng. editor. Swarup, Vipin. editor. Wang, Cliff. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-1-4419-0140-8">http://dx.doi.org/10.1007/978-1-4419-0140-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Handbook of Database Security Applications and Trends
ent://SD_ILS/0/SD_ILS:166409
2024-08-28T05:32:50Z
2024-08-28T05:32:50Z
Author Gertz, Michael. editor. Jajodia, Sushil. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-0-387-48533-1">http://dx.doi.org/10.1007/978-0-387-48533-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Secure Data Management in Decentralized Systems
ent://SD_ILS/0/SD_ILS:165430
2024-08-28T05:32:50Z
2024-08-28T05:32:50Z
Author Yu, Ting. editor. Jajodia, Sushil. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-0-387-27696-0">http://dx.doi.org/10.1007/978-0-387-27696-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Image and Video Encryption From Digital Rights Management to Secured Personal Communication
ent://SD_ILS/0/SD_ILS:164920
2024-08-28T05:32:50Z
2024-08-28T05:32:50Z
Author Jajodia, Sushil. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/b101495">http://dx.doi.org/10.1007/b101495</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>