Search Results for Computer Applications. - Narrowed by: Security systems.
SirsiDynix Enterprise
https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dComputer$002bApplications.$0026qf$003dSUBJECT$002509Subject$002509Security$002bsystems.$002509Security$002bsystems.$0026ic$003dtrue$0026ps$003d300?
2025-12-11T21:09:28Z
Cybercrime, Digital Forensics and Jurisdiction
ent://SD_ILS/0/SD_ILS:529976
2025-12-11T21:09:28Z
2025-12-11T21:09:28Z
Author Chawki, Mohamed. author. Darwish, Ashraf. author. Khan, Mohammad Ayoub. author. Tyagi, Sapna. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-15150-2">https://doi.org/10.1007/978-3-319-15150-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security Issues in Mobile NFC Devices
ent://SD_ILS/0/SD_ILS:529509
2025-12-11T21:09:28Z
2025-12-11T21:09:28Z
Author Roland, Michael. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-15488-6">https://doi.org/10.1007/978-3-319-15488-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Why Cryptography Should Not Rely on Physical Attack Complexity
ent://SD_ILS/0/SD_ILS:529557
2025-12-11T21:09:28Z
2025-12-11T21:09:28Z
Author Krämer, Juliane. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-981-287-787-1">https://doi.org/10.1007/978-981-287-787-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>