Search Results for Computing Methodologies - Narrowed by: Computer security. SirsiDynix Enterprise https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dComputing$002bMethodologies$0026qf$003dSUBJECT$002509Subject$002509Computer$002bsecurity.$002509Computer$002bsecurity.$0026te$003dILS$0026ps$003d300?dt=list 2024-12-29T00:42:49Z Intelligent Computing Methodologies 14th International Conference, ICIC 2018, Wuhan, China, August 15-18, 2018, Proceedings, Part III ent://SD_ILS/0/SD_ILS:399690 2024-12-29T00:42:49Z 2024-12-29T00:42:49Z Author&#160;Huang, De-Shuang. editor.&#160;Gromiha, M. Michael. editor.&#160;Han, Kyungsook. editor.&#160;Hussain, Abir. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-95957-3">https://doi.org/10.1007/978-3-319-95957-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Collaboration with cloud computing : security, social media, and unified communications ent://SD_ILS/0/SD_ILS:355829 2024-12-29T00:42:49Z 2024-12-29T00:42:49Z Author&#160;Messier, Ric, author.<br/>Preferred Shelf Number&#160;ONLINE(355829.1)<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780124170407">http://www.sciencedirect.com/science/book/9780124170407</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/>