Search Results for Computer science. - Narrowed by: E-Book - 2007 - Data encryption (Computer science). - Data protection. - Data structures (Computer science).
SirsiDynix Enterprise
https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dComputer$002bscience.$0026qf$003dITYPE$002509Material$002bType$0025091$00253AE-KITAP$002509E-Book$0026qf$003dPUBDATE$002509Publication$002bDate$0025092007$0025092007$0026qf$003dSUBJECT$002509Subject$002509Data$002bencryption$002b$002528Computer$002bscience$002529.$002509Data$002bencryption$002b$002528Computer$002bscience$002529.$0026qf$003dSUBJECT$002509Subject$002509Data$002bprotection.$002509Data$002bprotection.$0026qf$003dSUBJECT$002509Subject$002509Data$002bstructures$002b$002528Computer$002bscience$002529.$002509Data$002bstructures$002b$002528Computer$002bscience$002529.$0026te$003dILS$0026ps$003d300$0026isd$003dtrue?
2024-09-05T03:04:24Z
Provable Security First International Conference, ProvSec 2007, Wollongong, Australia, November 1-2, 2007. Proceedings
ent://SD_ILS/0/SD_ILS:187473
2024-09-05T03:04:24Z
2024-09-05T03:04:24Z
Author Susilo, Willy. editor. Liu, Joseph K. editor. Mu, Yi. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-540-75670-5">http://dx.doi.org/10.1007/978-3-540-75670-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Power Analysis Attacks Revealing the Secrets of Smart Cards
ent://SD_ILS/0/SD_ILS:166230
2024-09-05T03:04:24Z
2024-09-05T03:04:24Z
Author Mangard, Stefan. author. Oswald, Elisabeth. author. Popp, Thomas. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-0-387-38162-6">http://dx.doi.org/10.1007/978-0-387-38162-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Privacy-Respecting Intrusion Detection
ent://SD_ILS/0/SD_ILS:166560
2024-09-05T03:04:24Z
2024-09-05T03:04:24Z
Author Flegel, Ulrich. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-0-387-68254-9">http://dx.doi.org/10.1007/978-0-387-68254-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Online Business Security Systems
ent://SD_ILS/0/SD_ILS:166641
2024-09-05T03:04:24Z
2024-09-05T03:04:24Z
Author Williams, Godfried B. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-0-387-68850-3">http://dx.doi.org/10.1007/978-0-387-68850-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Data Warehousing and Data Mining Techniques for Cyber Security
ent://SD_ILS/0/SD_ILS:166379
2024-09-05T03:04:24Z
2024-09-05T03:04:24Z
Author Singhal, Anoop. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-0-387-47653-7">http://dx.doi.org/10.1007/978-0-387-47653-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Introduction to Cryptography Principles and Applications
ent://SD_ILS/0/SD_ILS:185185
2024-09-05T03:04:24Z
2024-09-05T03:04:24Z
Author Delfs, Hans. author. Knebl, Helmut. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/3-540-49244-5">http://dx.doi.org/10.1007/3-540-49244-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>