Search Results for Computer networks. - Narrowed by: E-Book - English - Computer science. - Computers -- Law and legislation. - Information Systems. SirsiDynix Enterprise https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dComputer$002bnetworks.$0026qf$003dITYPE$002509Material$002bType$0025091$00253AE-KITAP$002509E-Book$0026qf$003dLANGUAGE$002509Language$002509ENG$002509English$0026qf$003dSUBJECT$002509Subject$002509Computer$002bscience.$002509Computer$002bscience.$0026qf$003dSUBJECT$002509Subject$002509Computers$002b--$002bLaw$002band$002blegislation.$002509Computers$002b--$002bLaw$002band$002blegislation.$0026qf$003dSUBJECT$002509Subject$002509Information$002bSystems.$002509Information$002bSystems.$0026ic$003dtrue$0026te$003dILS$0026ps$003d300$0026isd$003dtrue? 2024-08-22T12:17:35Z Handbook of Mobile Data Privacy ent://SD_ILS/0/SD_ILS:399883 2024-08-22T12:17:35Z 2024-08-22T12:17:35Z Author&#160;Gkoulalas-Divanis, Aris. editor.&#160;Bettini, Claudio. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-98161-1">https://doi.org/10.1007/978-3-319-98161-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Theory of Cryptography 16th International Conference, TCC 2018, Panaji, India, November 11&ndash;14, 2018, Proceedings, Part II ent://SD_ILS/0/SD_ILS:400334 2024-08-22T12:17:35Z 2024-08-22T12:17:35Z Author&#160;Beimel, Amos. editor.&#160;Dziembowski, Stefan. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-03810-6">https://doi.org/10.1007/978-3-030-03810-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Theory of Cryptography 16th International Conference, TCC 2018, Panaji, India, November 11&ndash;14, 2018, Proceedings, Part I ent://SD_ILS/0/SD_ILS:400566 2024-08-22T12:17:35Z 2024-08-22T12:17:35Z Author&#160;Beimel, Amos. editor.&#160;Dziembowski, Stefan. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-03807-6">https://doi.org/10.1007/978-3-030-03807-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security Protocols XVII 17th International Workshop, Cambridge, UK, April 1-3, 2009. Revised Selected Papers ent://SD_ILS/0/SD_ILS:334145 2024-08-22T12:17:35Z 2024-08-22T12:17:35Z Author&#160;Christianson, Bruce. editor.&#160;Malcolm, James A. editor.&#160;Maty&aacute;&scaron;, Vashek. editor.&#160;Roe, Michael. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(334145.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-36213-2">http://dx.doi.org/10.1007/978-3-642-36213-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Intelligence and Security Informatics Pacific Asia Workshop, PAISI 2012, Kuala Lumpur, Malaysia, May 29, 2012. Proceedings ent://SD_ILS/0/SD_ILS:196884 2024-08-22T12:17:35Z 2024-08-22T12:17:35Z Author&#160;Chau, Michael. editor.&#160;Wang, G. Alan. editor.&#160;Yue, Wei Thoo. editor.&#160;Chen, Hsinchun. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-30428-6">http://dx.doi.org/10.1007/978-3-642-30428-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Forensics in Telecommunications, Information, and Multimedia Third International ICST Conference, e-Forensics 2010, Shanghai, China, November 11-12, 2010, Revised Selected Papers ent://SD_ILS/0/SD_ILS:195389 2024-08-22T12:17:35Z 2024-08-22T12:17:35Z Author&#160;Lai, Xuejia. editor.&#160;Gu, Dawu. editor.&#160;Jin, Bo. editor.&#160;Wang, Yongquan. editor.&#160;Li, Hui. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-23602-0">http://dx.doi.org/10.1007/978-3-642-23602-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Digital Forensics and Cyber Crime Second International ICST Conference, ICDF2C 2010, Abu Dhabi, United Arab Emirates, October 4-6, 2010, Revised Selected Papers ent://SD_ILS/0/SD_ILS:194068 2024-08-22T12:17:35Z 2024-08-22T12:17:35Z Author&#160;Baggili, Ibrahim. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-19513-6">http://dx.doi.org/10.1007/978-3-642-19513-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Data Privacy Management and Autonomous Spontaneous Security 4th International Workshop, DPM 2009 and Second International Workshop, SETOP 2009, St. Malo, France, September 24-25, 2009, Revised Selected Papers ent://SD_ILS/0/SD_ILS:191613 2024-08-22T12:17:35Z 2024-08-22T12:17:35Z Author&#160;Garcia-Alfaro, Joaquin. editor.&#160;Navarro-Arribas, Guillermo. editor.&#160;Cuppens-Boulahia, Nora. editor.&#160;Roudier, Yves. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-11207-2">http://dx.doi.org/10.1007/978-3-642-11207-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Digital Rights Management. Technologies, Issues, Challenges and Systems First International Conference, DRMTICS 2005, Sydney, Australia, October 31 - November 2, 2005. Revised Selected Papers ent://SD_ILS/0/SD_ILS:184331 2024-08-22T12:17:35Z 2024-08-22T12:17:35Z Author&#160;Safavi-Naini, Reihaneh. editor.&#160;Yung, Moti. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/11787952">http://dx.doi.org/10.1007/11787952</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/>