Search Results for -- UYGARLIK, ORTAÇAĞ, EDEBİYATTA. - Narrowed by: Computer security. - Information Systems.
SirsiDynix Enterprise
https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003d--$002bUYGARLIK$00252C$002bORTA$0025C3$002587A$0025C4$00259E$00252C$002bEDEB$0025C4$0025B0YATTA.$0026qf$003dSUBJECT$002509Subject$002509Computer$002bsecurity.$002509Computer$002bsecurity.$0026qf$003dSUBJECT$002509Subject$002509Information$002bSystems.$002509Information$002bSystems.$0026ic$003dtrue$0026te$003dILS$0026ps$003d300?dt=list
2024-08-11T03:50:10Z
Handbook of Mobile Data Privacy
ent://SD_ILS/0/SD_ILS:399883
2024-08-11T03:50:10Z
2024-08-11T03:50:10Z
Author Gkoulalas-Divanis, Aris. editor. Bettini, Claudio. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-98161-1">https://doi.org/10.1007/978-3-319-98161-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
The Huawei and Snowden Questions Can Electronic Equipment from Untrusted Vendors be Verified? Can an Untrusted Vendor Build Trust into Electronic Equipment?
ent://SD_ILS/0/SD_ILS:402451
2024-08-11T03:50:10Z
2024-08-11T03:50:10Z
Author Lysne, Olav. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-74950-1">https://doi.org/10.1007/978-3-319-74950-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Theory of Cryptography 16th International Conference, TCC 2018, Panaji, India, November 11–14, 2018, Proceedings, Part II
ent://SD_ILS/0/SD_ILS:400334
2024-08-11T03:50:10Z
2024-08-11T03:50:10Z
Author Beimel, Amos. editor. Dziembowski, Stefan. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-03810-6">https://doi.org/10.1007/978-3-030-03810-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Theory of Cryptography 16th International Conference, TCC 2018, Panaji, India, November 11–14, 2018, Proceedings, Part I
ent://SD_ILS/0/SD_ILS:400566
2024-08-11T03:50:10Z
2024-08-11T03:50:10Z
Author Beimel, Amos. editor. Dziembowski, Stefan. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-03807-6">https://doi.org/10.1007/978-3-030-03807-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cyber Security: Power and Technology
ent://SD_ILS/0/SD_ILS:401003
2024-08-11T03:50:10Z
2024-08-11T03:50:10Z
Author Lehto, Martti. editor. Neittaanmäki, Pekka. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-75307-2">https://doi.org/10.1007/978-3-319-75307-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Digital Forensics and Cyber Crime 9th International Conference, ICDF2C 2017, Prague, Czech Republic, October 9-11, 2017, Proceedings
ent://SD_ILS/0/SD_ILS:401948
2024-08-11T03:50:10Z
2024-08-11T03:50:10Z
Author Matoušek, Petr. editor. Schmiedecker, Martin. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-73697-6">https://doi.org/10.1007/978-3-319-73697-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>