Search Results for Computer science. - Narrowed by: SpringerLink (Online service) - E-Book - Electronic Library - 2008 - Computer network architectures. - Data protection. SirsiDynix Enterprise https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dComputer$002bscience.$0026qf$003dAUTHOR$002509Author$002509SpringerLink$002b$002528Online$002bservice$002529$002509SpringerLink$002b$002528Online$002bservice$002529$0026qf$003dITYPE$002509Material$002bType$0025091$00253AE-KITAP$002509E-Book$0026qf$003dLOCATION$002509Shelf$002bLocation$0025091$00253AELEKKUTUPH$002509Electronic$002bLibrary$0026qf$003dPUBDATE$002509Publication$002bDate$0025092008$0025092008$0026qf$003dSUBJECT$002509Subject$002509Computer$002bnetwork$002barchitectures.$002509Computer$002bnetwork$002barchitectures.$0026qf$003dSUBJECT$002509Subject$002509Data$002bprotection.$002509Data$002bprotection.$0026te$003dILS$0026ps$003d300? 2024-08-17T13:33:52Z E-Business and Telecommunication Networks Third International Conference, ICETE 2006, Set&uacute;bal, Portugal, August 7-10, 2006. Selected Papers ent://SD_ILS/0/SD_ILS:186034 2024-08-17T13:33:52Z 2024-08-17T13:33:52Z Author&#160;Filipe, Joaquim. editor.&#160;Obaidat, Mohammad S. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-70760-8">http://dx.doi.org/10.1007/978-3-540-70760-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Network-Based Information Systems 2nd International Conference, NBiS 2008, Turin, Italy, September 1-5, 2008. Proceedings ent://SD_ILS/0/SD_ILS:188752 2024-08-17T13:33:52Z 2024-08-17T13:33:52Z Author&#160;Takizawa, Makoto. editor.&#160;Barolli, Leonard. editor.&#160;Enokido, Tomoya. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-85693-1">http://dx.doi.org/10.1007/978-3-540-85693-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Research in Cryptology Second Western European Workshop, WEWoRC 2007, Bochum, Germany, July 4-6, 2007, Revised Selected Papers ent://SD_ILS/0/SD_ILS:189035 2024-08-17T13:33:52Z 2024-08-17T13:33:52Z Author&#160;Lucks, Stefan. editor.&#160;Sadeghi, Ahmad-Reza. editor.&#160;Wolf, Christopher. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-88353-1">http://dx.doi.org/10.1007/978-3-540-88353-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Botnet Detection Countering the Largest Security Threat ent://SD_ILS/0/SD_ILS:166626 2024-08-17T13:33:52Z 2024-08-17T13:33:52Z Author&#160;Lee, Wenke. editor.&#160;Wang, Cliff. editor.&#160;Dagon, David. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-0-387-68768-1">http://dx.doi.org/10.1007/978-0-387-68768-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Smart Cards, Tokens, Security and Applications ent://SD_ILS/0/SD_ILS:166922 2024-08-17T13:33:52Z 2024-08-17T13:33:52Z Author&#160;Mayes, Keith E. author.&#160;Markantonakis, Konstantinos. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-0-387-72198-9">http://dx.doi.org/10.1007/978-0-387-72198-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security for Telecommunications Networks ent://SD_ILS/0/SD_ILS:166945 2024-08-17T13:33:52Z 2024-08-17T13:33:52Z Author&#160;Traynor, Patrick. author.&#160;McDaniel, Patrick. author.&#160;Porta, Thomas La. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-0-387-72442-3">http://dx.doi.org/10.1007/978-0-387-72442-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Vulnerability Analysis and Defense for the Internet ent://SD_ILS/0/SD_ILS:167162 2024-08-17T13:33:52Z 2024-08-17T13:33:52Z Author&#160;Singh, Abhishek. editor.&#160;Singh, Baibhav. editor.&#160;Joseph, Hirosh. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-0-387-74390-5">http://dx.doi.org/10.1007/978-0-387-74390-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Intrusion Detection Systems ent://SD_ILS/0/SD_ILS:167451 2024-08-17T13:33:52Z 2024-08-17T13:33:52Z Author&#160;Mancini, Luigi V. editor.&#160;Pietro, Roberto. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-0-387-77265-3">http://dx.doi.org/10.1007/978-0-387-77265-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Insider Attack and Cyber Security Beyond the Hacker ent://SD_ILS/0/SD_ILS:167459 2024-08-17T13:33:52Z 2024-08-17T13:33:52Z Author&#160;Stolfo, Salvatore J. editor.&#160;Bellovin, Steven M. editor.&#160;Keromytis, Angelos D. editor.&#160;Hershkop, Shlomo. editor.&#160;Smith, Sean W. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-0-387-77322-3">http://dx.doi.org/10.1007/978-0-387-77322-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/>