Search Results for Business. - Narrowed by: Data structures (Computer science). SirsiDynix Enterprise https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dBusiness.$0026qf$003dSUBJECT$002509Subject$002509Data$002bstructures$002b$002528Computer$002bscience$002529.$002509Data$002bstructures$002b$002528Computer$002bscience$002529.$0026ps$003d300? 2025-12-16T21:19:56Z Online Business Security Systems ent://SD_ILS/0/SD_ILS:166641 2025-12-16T21:19:56Z 2025-12-16T21:19:56Z Author&#160;Williams, Godfried B. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-0-387-68850-3">http://dx.doi.org/10.1007/978-0-387-68850-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Business Process Management Workshops BPM 2012 International Workshops, Tallinn, Estonia, September 3, 2012. Revised Papers ent://SD_ILS/0/SD_ILS:334166 2025-12-16T21:19:56Z 2025-12-16T21:19:56Z Author&#160;Rosa, Marcello. editor.&#160;Soffer, Pnina. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(334166.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-36285-9">http://dx.doi.org/10.1007/978-3-642-36285-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computational Intelligence, Communications, and Business Analytics Second International Conference, CICBA 2018, Kalyani, India, July 27&ndash;28, 2018, Revised Selected Papers, Part II ent://SD_ILS/0/SD_ILS:486838 2025-12-16T21:19:56Z 2025-12-16T21:19:56Z Author&#160;Mandal, Jyotsna Kumar. editor.&#160;Mukhopadhyay, Somnath. editor.&#160;Dutta, Paramartha. editor.&#160;Dasgupta, Kousik. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-13-8581-0">https://doi.org/10.1007/978-981-13-8581-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Business Process Management 17th International Conference, BPM 2019, Vienna, Austria, September 1&ndash;6, 2019, Proceedings ent://SD_ILS/0/SD_ILS:484869 2025-12-16T21:19:56Z 2025-12-16T21:19:56Z Author&#160;Hildebrandt, Thomas. editor. (orcid)0000-0002-7435-5563&#160;van Dongen, Boudewijn F. editor. (orcid)0000-0002-3978-6464&#160;R&ouml;glinger, Maximilian. editor. (orcid)0000-0003-4743-4511&#160;Mendling, Jan. editor. (orcid)0000-0002-7260-524X&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-26619-6">https://doi.org/10.1007/978-3-030-26619-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computational Intelligence, Communications, and Business Analytics Second International Conference, CICBA 2018, Kalyani, India, July 27&ndash;28, 2018, Revised Selected Papers, Part I ent://SD_ILS/0/SD_ILS:486015 2025-12-16T21:19:56Z 2025-12-16T21:19:56Z Author&#160;Mandal, Jyotsna Kumar. editor.&#160;Mukhopadhyay, Somnath. editor.&#160;Dutta, Paramartha. editor.&#160;Dasgupta, Kousik. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-13-8578-0">https://doi.org/10.1007/978-981-13-8578-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> E-Business and Telecommunications International Joint Conference, ICETE 2011, Seville, Spain, July 18-21, 2011, Revised Selected Papers ent://SD_ILS/0/SD_ILS:197636 2025-12-16T21:19:56Z 2025-12-16T21:19:56Z Author&#160;Obaidat, Mohammad S. editor.&#160;Sevillano, Jos&eacute; L. editor.&#160;Filipe, Joaquim. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-35755-8">http://dx.doi.org/10.1007/978-3-642-35755-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Flow Based Security Control Beyond RBAC How to enable fine-grained security policy enforcement in business processes beyond limitations of role-based access control (RBAC) ent://SD_ILS/0/SD_ILS:198953 2025-12-16T21:19:56Z 2025-12-16T21:19:56Z Author&#160;Fischer-Hellmann, Klaus-Peter. author.&#160;Bischoff, Rainer. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-8348-2618-3">http://dx.doi.org/10.1007/978-3-8348-2618-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> e-Business and Telecommunications 7th International Joint Conference, ICETE 2010, Athens, Greece, July 26-28, 2010, Revised Selected Papers ent://SD_ILS/0/SD_ILS:195876 2025-12-16T21:19:56Z 2025-12-16T21:19:56Z Author&#160;Obaidat, Mohammad S. editor.&#160;Tsihrintzis, George A. editor.&#160;Filipe, Joaquim. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-25206-8">http://dx.doi.org/10.1007/978-3-642-25206-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> e-Business and Telecommunications 6th International Joint Conference, ICETE 2009, Milan, Italy, July 7-10, 2009. Revised Selected Papers ent://SD_ILS/0/SD_ILS:194254 2025-12-16T21:19:56Z 2025-12-16T21:19:56Z Author&#160;Obaidat, Mohammad S. editor.&#160;Filipe, Joaquim. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-20077-9">http://dx.doi.org/10.1007/978-3-642-20077-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> The Business of iPhone App Development Making and Marketing Apps that Succeed ent://SD_ILS/0/SD_ILS:171362 2025-12-16T21:19:56Z 2025-12-16T21:19:56Z Author&#160;Wooldridge, Dave. author.&#160;Schneider, Michael. author.&#160;Andres, Clay. editor.&#160;Anglin, Steve. editor.&#160;Beckner, Mark. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-1-4302-2734-2">http://dx.doi.org/10.1007/978-1-4302-2734-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> e-Business and Telecommunications International Conference, ICETE 2008, Porto, Portugal, July 26-29, 2008, Revised Selected Papers ent://SD_ILS/0/SD_ILS:191190 2025-12-16T21:19:56Z 2025-12-16T21:19:56Z Author&#160;Filipe, Joaquim. editor.&#160;Obaidat, Mohammad S. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-05197-5">http://dx.doi.org/10.1007/978-3-642-05197-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> E-business and Telecommunications 4th International Conference, ICETE 2007, Barcelona, Spain, July 28-31, 2007, Revised Selected Papers ent://SD_ILS/0/SD_ILS:189098 2025-12-16T21:19:56Z 2025-12-16T21:19:56Z Author&#160;Filipe, Joaquim. editor.&#160;Obaidat, Mohammad S. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-88653-2">http://dx.doi.org/10.1007/978-3-540-88653-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> E-Business and Telecommunication Networks Third International Conference, ICETE 2006, Set&uacute;bal, Portugal, August 7-10, 2006. Selected Papers ent://SD_ILS/0/SD_ILS:186034 2025-12-16T21:19:56Z 2025-12-16T21:19:56Z Author&#160;Filipe, Joaquim. editor.&#160;Obaidat, Mohammad S. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-70760-8">http://dx.doi.org/10.1007/978-3-540-70760-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> ISSE/SECURE 2007 Securing Electronic Business Processes Highlights of the Information Security Solutions Europe/SECURE 2007 Conference ent://SD_ILS/0/SD_ILS:199537 2025-12-16T21:19:56Z 2025-12-16T21:19:56Z Author&#160;Pohlmann, Norbert. author.&#160;Reimer, Helmut. author.&#160;Schneider, Wolfgang. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-8348-9418-2">http://dx.doi.org/10.1007/978-3-8348-9418-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> E-business and Telecommunication Networks Second International Conference, ICETE 2005, Reading, UK, October 3-7, 2005. Selected Papers ent://SD_ILS/0/SD_ILS:187555 2025-12-16T21:19:56Z 2025-12-16T21:19:56Z Author&#160;Filipe, Joaquim. editor.&#160;Coelhas, Helder. editor.&#160;Saramago, Monica. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-75993-5">http://dx.doi.org/10.1007/978-3-540-75993-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Intelligent Knowledge-Based Systems Business and Technology in the New Millennium ent://SD_ILS/0/SD_ILS:170033 2025-12-16T21:19:56Z 2025-12-16T21:19:56Z Author&#160;Leondes, Cornelius T. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-1-4020-7829-3">http://dx.doi.org/10.1007/978-1-4020-7829-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cyber Technologies and Emerging Sciences ICCTES 2021 ent://SD_ILS/0/SD_ILS:526691 2025-12-16T21:19:56Z 2025-12-16T21:19:56Z Author&#160;Maurya, Sudhanshu. editor.&#160;Peddoju, Sateesh K. editor.&#160;Ahmad, Badlishah. editor.&#160;Chihi, Ines. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-19-2538-2">https://doi.org/10.1007/978-981-19-2538-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Modern Cryptography Primer Theoretical Foundations and Practical Applications ent://SD_ILS/0/SD_ILS:335099 2025-12-16T21:19:56Z 2025-12-16T21:19:56Z Author&#160;Ko&#347;cielny, Czes&#322;aw. author.&#160;Kurkowski, Miros&#322;aw. author.&#160;Srebrny, Marian. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(335099.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-41386-5">http://dx.doi.org/10.1007/978-3-642-41386-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> A Real-Time In-Memory Discovery Service Leveraging Hierarchical Packaging Information in a Unique Identifier Network to Retrieve Track and Trace Information ent://SD_ILS/0/SD_ILS:334366 2025-12-16T21:19:56Z 2025-12-16T21:19:56Z Author&#160;M&uuml;ller, J&uuml;rgen. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(334366.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-37128-8">http://dx.doi.org/10.1007/978-3-642-37128-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Introduction to Public Key Infrastructures ent://SD_ILS/0/SD_ILS:334984 2025-12-16T21:19:56Z 2025-12-16T21:19:56Z Author&#160;Buchmann, Johannes A. author.&#160;Karatsiolis, Evangelos. author.&#160;Wiesmaier, Alexander. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(334984.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-40657-7">http://dx.doi.org/10.1007/978-3-642-40657-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/>