Search Results for Computer logic. - Narrowed by: Data protection.
SirsiDynix Enterprise
https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dComputer$002blogic.$0026qf$003dSUBJECT$002509Subject$002509Data$002bprotection.$002509Data$002bprotection.$0026ps$003d300$0026isd$003dtrue?
2025-12-12T19:25:43Z
Soft Computing for Security Applications Proceedings of ICSCS 2023
ent://SD_ILS/0/SD_ILS:529021
2025-12-12T19:25:43Z
2025-12-12T19:25:43Z
Author Ranganathan, G. editor. EL Allioui, Youssouf. editor. Piramuthu, Selwyn. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-981-99-3608-3">https://doi.org/10.1007/978-981-99-3608-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Foundations of Security, Protocols, and Equational Reasoning Essays Dedicated to Catherine A. Meadows
ent://SD_ILS/0/SD_ILS:486057
2025-12-12T19:25:43Z
2025-12-12T19:25:43Z
Author Guttman, Joshua D. editor. Landwehr, Carl E. editor. Meseguer, José. editor. Pavlovic, Dusko. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-19052-1">https://doi.org/10.1007/978-3-030-19052-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>