Search Results for İNTERNET. - Narrowed by: SpringerLink (Online service) - English - Data Structures, Cryptology and Information Theory. - Data protection. - Information Systems Applications (incl. Internet).SirsiDynix Enterprisehttps://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003d$0025C4$0025B0NTERNET.$0026qf$003dAUTHOR$002509Author$002509SpringerLink$002b$002528Online$002bservice$002529$002509SpringerLink$002b$002528Online$002bservice$002529$0026qf$003dLANGUAGE$002509Language$002509ENG$002509English$0026qf$003dSUBJECT$002509Subject$002509Data$002bStructures$00252C$002bCryptology$002band$002bInformation$002bTheory.$002509Data$002bStructures$00252C$002bCryptology$002band$002bInformation$002bTheory.$0026qf$003dSUBJECT$002509Subject$002509Data$002bprotection.$002509Data$002bprotection.$0026qf$003dSUBJECT$002509Subject$002509Information$002bSystems$002bApplications$002b$002528incl.$002bInternet$002529.$002509Information$002bSystems$002bApplications$002b$002528incl.$002bInternet$002529.$0026te$003dILS$0026ps$003d300$0026isd$003dtrue?2024-09-10T06:00:08ZAutomatic Malware Analysis An Emulator Based Approachent://SD_ILS/0/SD_ILS:3317962024-09-10T06:00:08Z2024-09-10T06:00:08ZAuthor Yin, Heng. author. Song, Dawn. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(331796.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-1-4614-5523-3">http://dx.doi.org/10.1007/978-1-4614-5523-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Cyber Security Deterrence and IT Protection for Critical Infrastructuresent://SD_ILS/0/SD_ILS:3329092024-09-10T06:00:08Z2024-09-10T06:00:08ZAuthor Martellini, Maurizio. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(332909.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-319-02279-6">http://dx.doi.org/10.1007/978-3-319-02279-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>