Search Results for Computer logic. - Narrowed by: Data protection. SirsiDynix Enterprise https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dComputer$002blogic.$0026qf$003dSUBJECT$002509Subject$002509Data$002bprotection.$002509Data$002bprotection.$0026ps$003d300$0026isd$003dtrue? 2025-12-12T19:25:43Z Soft Computing for Security Applications Proceedings of ICSCS 2023 ent://SD_ILS/0/SD_ILS:529021 2025-12-12T19:25:43Z 2025-12-12T19:25:43Z Author&#160;Ranganathan, G. editor.&#160;EL Allioui, Youssouf. editor.&#160;Piramuthu, Selwyn. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-99-3608-3">https://doi.org/10.1007/978-981-99-3608-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Foundations of Security, Protocols, and Equational Reasoning Essays Dedicated to Catherine A. Meadows ent://SD_ILS/0/SD_ILS:486057 2025-12-12T19:25:43Z 2025-12-12T19:25:43Z Author&#160;Guttman, Joshua D. editor.&#160;Landwehr, Carl E. editor.&#160;Meseguer, Jos&eacute;. editor.&#160;Pavlovic, Dusko. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-19052-1">https://doi.org/10.1007/978-3-030-19052-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/>