Search Results for Computer networks. - Narrowed by: E-Book - Online Library - 2013 - Computer science. - Data structures (Computer science). SirsiDynix Enterprise https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dComputer$002bnetworks.$0026qf$003dITYPE$002509Material$002bType$0025091$00253AE-KITAP$002509E-Book$0026qf$003dLIBRARY$002509Library$0025091$00253AONLINE$002509Online$002bLibrary$0026qf$003dPUBDATE$002509Publication$002bDate$0025092013$0025092013$0026qf$003dSUBJECT$002509Subject$002509Computer$002bscience.$002509Computer$002bscience.$0026qf$003dSUBJECT$002509Subject$002509Data$002bstructures$002b$002528Computer$002bscience$002529.$002509Data$002bstructures$002b$002528Computer$002bscience$002529.$0026ic$003dtrue$0026te$003dILS$0026ps$003d300?dt=list 2024-08-15T12:50:59Z Guide to Cloud Computing Principles and Practice ent://SD_ILS/0/SD_ILS:331022 2024-08-15T12:50:59Z 2024-08-15T12:50:59Z Author&#160;Hill, Richard. author.&#160;Hirsch, Laurie. author.&#160;Lake, Peter. author.&#160;Moshiri, Siavash. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(331022.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-1-4471-4603-2">http://dx.doi.org/10.1007/978-1-4471-4603-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Quantum Attacks on Public-Key Cryptosystems ent://SD_ILS/0/SD_ILS:330828 2024-08-15T12:50:59Z 2024-08-15T12:50:59Z Author&#160;Yan, Song Y. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(330828.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-1-4419-7722-9">http://dx.doi.org/10.1007/978-1-4419-7722-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Applied Cryptography and Network Security 11th International Conference, ACNS 2013, Banff, AB, Canada, June 25-28, 2013. Proceedings ent://SD_ILS/0/SD_ILS:334707 2024-08-15T12:50:59Z 2024-08-15T12:50:59Z Author&#160;Jacobson, Michael. editor.&#160;Locasto, Michael. editor.&#160;Mohassel, Payman. editor.&#160;Safavi-Naini, Reihaneh. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(334707.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-38980-1">http://dx.doi.org/10.1007/978-3-642-38980-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Algorithms and Data Structures 13th International Symposium, WADS 2013, London, ON, Canada, August 12-14, 2013. Proceedings ent://SD_ILS/0/SD_ILS:334893 2024-08-15T12:50:59Z 2024-08-15T12:50:59Z Author&#160;Dehne, Frank. editor.&#160;Solis-Oba, Roberto. editor.&#160;Sack, J&ouml;rg-R&uuml;diger. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(334893.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-40104-6">http://dx.doi.org/10.1007/978-3-642-40104-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cellular Automata and Discrete Complex Systems 19th International Workshop, AUTOMATA 2013, Gie&szlig;en, Germany, September 17-19, 2013. Proceedings ent://SD_ILS/0/SD_ILS:335022 2024-08-15T12:50:59Z 2024-08-15T12:50:59Z Author&#160;Kari, Jarkko. editor.&#160;Kutrib, Martin. editor.&#160;Malcher, Andreas. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(335022.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-40867-0">http://dx.doi.org/10.1007/978-3-642-40867-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Economics of Information Security and Privacy III ent://SD_ILS/0/SD_ILS:331294 2024-08-15T12:50:59Z 2024-08-15T12:50:59Z Author&#160;Schneier, Bruce. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(331294.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-1-4614-1981-5">http://dx.doi.org/10.1007/978-1-4614-1981-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Moving Target Defense II Application of Game Theory and Adversarial Modeling ent://SD_ILS/0/SD_ILS:331766 2024-08-15T12:50:59Z 2024-08-15T12:50:59Z Author&#160;Jajodia, Sushil. editor.&#160;Ghosh, Anup K. editor.&#160;Subrahmanian, V.S. editor.&#160;Swarup, Vipin. editor.&#160;Wang, Cliff. editor.<br/>Preferred Shelf Number&#160;ONLINE(331766.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-1-4614-5416-8">http://dx.doi.org/10.1007/978-1-4614-5416-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Android Malware ent://SD_ILS/0/SD_ILS:332276 2024-08-15T12:50:59Z 2024-08-15T12:50:59Z Author&#160;Jiang, Xuxian. author.&#160;Zhou, Yajin. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(332276.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-1-4614-7394-7">http://dx.doi.org/10.1007/978-1-4614-7394-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Location Privacy Protection in Mobile Networks ent://SD_ILS/0/SD_ILS:332468 2024-08-15T12:50:59Z 2024-08-15T12:50:59Z Author&#160;Liu, Xinxin. author.&#160;Li, Xiaolin. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(332468.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-1-4614-9074-6">http://dx.doi.org/10.1007/978-1-4614-9074-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cyber Security Deterrence and IT Protection for Critical Infrastructures ent://SD_ILS/0/SD_ILS:332909 2024-08-15T12:50:59Z 2024-08-15T12:50:59Z Author&#160;Martellini, Maurizio. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(332909.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-319-02279-6">http://dx.doi.org/10.1007/978-3-319-02279-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Languages and Compilers for Parallel Computing 24th International Workshop, LCPC 2011, Fort Collins, CO, USA, September 8-10, 2011. Revised Selected Papers ent://SD_ILS/0/SD_ILS:334104 2024-08-15T12:50:59Z 2024-08-15T12:50:59Z Author&#160;Rajopadhye, Sanjay. editor.&#160;Mills Strout, Michelle. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(334104.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-36036-7">http://dx.doi.org/10.1007/978-3-642-36036-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Algorithms and Complexity 8th International Conference, CIAC 2013, Barcelona, Spain, May 22-24, 2013. Proceedings ent://SD_ILS/0/SD_ILS:334563 2024-08-15T12:50:59Z 2024-08-15T12:50:59Z Author&#160;Spirakis, Paul G. editor.&#160;Serna, Maria. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(334563.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-38233-8">http://dx.doi.org/10.1007/978-3-642-38233-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Algorithms &ndash; ESA 2013 21st Annual European Symposium, Sophia Antipolis, France, September 2-4, 2013. Proceedings ent://SD_ILS/0/SD_ILS:334947 2024-08-15T12:50:59Z 2024-08-15T12:50:59Z Author&#160;Bodlaender, Hans L. editor.&#160;Italiano, Giuseppe F. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(334947.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-40450-4">http://dx.doi.org/10.1007/978-3-642-40450-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Mobile Authentication Problems and Solutions ent://SD_ILS/0/SD_ILS:331610 2024-08-15T12:50:59Z 2024-08-15T12:50:59Z Author&#160;Jakobsson, Markus. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(331610.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-1-4614-4878-5">http://dx.doi.org/10.1007/978-1-4614-4878-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Structural Information and Communication Complexity 20th International Colloquium, SIROCCO 2013, Ischia, Italy, July 1-3, 2013, Revised Selected Papers ent://SD_ILS/0/SD_ILS:332983 2024-08-15T12:50:59Z 2024-08-15T12:50:59Z Author&#160;Moscibroda, Thomas. editor.&#160;Rescigno, Adele A. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(332983.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-319-03578-9">http://dx.doi.org/10.1007/978-3-319-03578-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Engineering Secure Software and Systems 5th International Symposium, ESSoS 2013, Paris, France, February 27 - March 1, 2013. Proceedings ent://SD_ILS/0/SD_ILS:334236 2024-08-15T12:50:59Z 2024-08-15T12:50:59Z Author&#160;J&uuml;rjens, Jan. editor.&#160;Livshits, Benjamin. editor.&#160;Scandariato, Riccardo. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(334236.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-36563-8">http://dx.doi.org/10.1007/978-3-642-36563-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Space-Efficient Data Structures, Streams, and Algorithms Papers in Honor of J. Ian Munro on the Occasion of His 66th Birthday ent://SD_ILS/0/SD_ILS:334921 2024-08-15T12:50:59Z 2024-08-15T12:50:59Z Author&#160;Brodnik, Andrej. editor.&#160;L&oacute;pez-Ortiz, Alejandro. editor.&#160;Raman, Venkatesh. editor.&#160;Viola, Alfredo. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(334921.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-40273-9">http://dx.doi.org/10.1007/978-3-642-40273-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Bluetooth Security Attacks Comparative Analysis, Attacks, and Countermeasures ent://SD_ILS/0/SD_ILS:334982 2024-08-15T12:50:59Z 2024-08-15T12:50:59Z Author&#160;Haataja, Keijo. author.&#160;Hypp&ouml;nen, Konstantin. author.&#160;Pasanen, Sanna. author.&#160;Toivanen, Pekka. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(334982.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-40646-1">http://dx.doi.org/10.1007/978-3-642-40646-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Modern Cryptography Primer Theoretical Foundations and Practical Applications ent://SD_ILS/0/SD_ILS:335099 2024-08-15T12:50:59Z 2024-08-15T12:50:59Z Author&#160;Ko&#347;cielny, Czes&#322;aw. author.&#160;Kurkowski, Miros&#322;aw. author.&#160;Srebrny, Marian. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(335099.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-41386-5">http://dx.doi.org/10.1007/978-3-642-41386-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Distributed Computing 27th International Symposium, DISC 2013, Jerusalem, Israel, October 14-18, 2013. Proceedings ent://SD_ILS/0/SD_ILS:335119 2024-08-15T12:50:59Z 2024-08-15T12:50:59Z Author&#160;Afek, Yehuda. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(335119.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-41527-2">http://dx.doi.org/10.1007/978-3-642-41527-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/>