Search Results for - Narrowed by: E-Book - Online Library - Electronic Library - Computer hardware. - Data structures (Computer science). SirsiDynix Enterprise https://katalog.hacettepe.edu.tr/client/en_US/default/default/qf$003dITYPE$002509Material$002bType$0025091$00253AE-KITAP$002509E-Book$0026qf$003dLIBRARY$002509Library$0025091$00253AONLINE$002509Online$002bLibrary$0026qf$003dLOCATION$002509Shelf$002bLocation$0025091$00253AELEKKUTUPH$002509Electronic$002bLibrary$0026qf$003dSUBJECT$002509Subject$002509Computer$002bhardware.$002509Computer$002bhardware.$0026qf$003dSUBJECT$002509Subject$002509Data$002bstructures$002b$002528Computer$002bscience$002529.$002509Data$002bstructures$002b$002528Computer$002bscience$002529.$0026ps$003d300$0026isd$003dtrue?dt=list 2024-07-07T23:41:39Z Trustworthy Reconfigurable Systems Enhancing the Security Capabilities of Reconfigurable Hardware Architectures ent://SD_ILS/0/SD_ILS:488721 2024-07-07T23:41:39Z 2024-07-07T23:41:39Z Author&#160;Feller, Thomas. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-658-07005-2">https://doi.org/10.1007/978-3-658-07005-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Fault Analysis in Cryptography ent://SD_ILS/0/SD_ILS:196746 2024-07-07T23:41:39Z 2024-07-07T23:41:39Z Author&#160;Joye, Marc. editor.&#160;Tunstall, Michael. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-29656-7">http://dx.doi.org/10.1007/978-3-642-29656-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Towards Hardware-Intrinsic Security Foundations and Practice ent://SD_ILS/0/SD_ILS:192659 2024-07-07T23:41:39Z 2024-07-07T23:41:39Z Author&#160;Sadeghi, Ahmad-Reza. editor.&#160;Naccache, David. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-14452-3">http://dx.doi.org/10.1007/978-3-642-14452-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Les virus informatiques: th&eacute;orie, pratique et applications ent://SD_ILS/0/SD_ILS:176476 2024-07-07T23:41:39Z 2024-07-07T23:41:39Z Author&#160;Filiol, &Eacute;ric. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-2-287-98240-8">http://dx.doi.org/10.1007/978-2-287-98240-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Techniques virales avanc&eacute;es ent://SD_ILS/0/SD_ILS:176382 2024-07-07T23:41:39Z 2024-07-07T23:41:39Z Author&#160;Filiol, &Eacute;ric. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-2-287-33888-5">http://dx.doi.org/10.1007/978-2-287-33888-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cryptographic Algorithms on Reconfigurable Hardware ent://SD_ILS/0/SD_ILS:166167 2024-07-07T23:41:39Z 2024-07-07T23:41:39Z Author&#160;Rodr&iacute;guez-Henr&iacute;quez, Francisco. author.&#160;P&eacute;rez, Arturo D&iacute;az. author.&#160;Saqib, Nazar Abbas. author.&#160;Ko&ccedil;, &Ccedil;etin Kaya. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-0-387-36682-1">http://dx.doi.org/10.1007/978-0-387-36682-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/>