Search Results for Computer science. - Narrowed by: E-Book - Online Library - 2011 - Computer network architectures. - Data protection. - Information systems.
SirsiDynix Enterprise
https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dComputer$002bscience.$0026qf$003dITYPE$002509Material$002bType$0025091$00253AE-KITAP$002509E-Book$0026qf$003dLIBRARY$002509Library$0025091$00253AONLINE$002509Online$002bLibrary$0026qf$003dPUBDATE$002509Publication$002bDate$0025092011$0025092011$0026qf$003dSUBJECT$002509Subject$002509Computer$002bnetwork$002barchitectures.$002509Computer$002bnetwork$002barchitectures.$0026qf$003dSUBJECT$002509Subject$002509Data$002bprotection.$002509Data$002bprotection.$0026qf$003dSUBJECT$002509Subject$002509Information$002bsystems.$002509Information$002bsystems.$0026te$003dILS$0026ps$003d300$0026isd$003dtrue?dt=list
2024-08-08T16:30:21Z
Spyware and Adware
ent://SD_ILS/0/SD_ILS:167516
2024-08-08T16:30:21Z
2024-08-08T16:30:21Z
Author Aycock, John. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-0-387-77741-2">http://dx.doi.org/10.1007/978-0-387-77741-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Apple's iPad im Enterprise-Einsatz Einsatzmöglichkeiten, Programmierung, Betrieb und Sicherheit im Unternehmen
ent://SD_ILS/0/SD_ILS:192969
2024-08-08T16:30:21Z
2024-08-08T16:30:21Z
Author Oelmaier, Florian. author. Hörtreiter, Jochen. author. Seitz, Andreas. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-15437-9">http://dx.doi.org/10.1007/978-3-642-15437-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>