Search Results for Computing Methodologies - Narrowed by: Computer security.
SirsiDynix Enterprise
https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dComputing$002bMethodologies$0026qf$003dSUBJECT$002509Subject$002509Computer$002bsecurity.$002509Computer$002bsecurity.$0026te$003dILS$0026ps$003d300?dt=list
2024-12-29T00:42:49Z
Intelligent Computing Methodologies 14th International Conference, ICIC 2018, Wuhan, China, August 15-18, 2018, Proceedings, Part III
ent://SD_ILS/0/SD_ILS:399690
2024-12-29T00:42:49Z
2024-12-29T00:42:49Z
Author Huang, De-Shuang. editor. Gromiha, M. Michael. editor. Han, Kyungsook. editor. Hussain, Abir. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-95957-3">https://doi.org/10.1007/978-3-319-95957-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Collaboration with cloud computing : security, social media, and unified communications
ent://SD_ILS/0/SD_ILS:355829
2024-12-29T00:42:49Z
2024-12-29T00:42:49Z
Author Messier, Ric, author.<br/>Preferred Shelf Number ONLINE(355829.1)<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780124170407">http://www.sciencedirect.com/science/book/9780124170407</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>