Search Results for Data Structures. - Narrowed by: Data transmission systems. SirsiDynix Enterprise https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dData$002bStructures.$0026qf$003dSUBJECT$002509Subject$002509Data$002btransmission$002bsystems.$002509Data$002btransmission$002bsystems.$0026ps$003d300$0026isd$003dtrue?dt=list 2024-11-23T16:49:23Z Trends in Interactive Visualization State-of-the-Art Survey ent://SD_ILS/0/SD_ILS:175789 2024-11-23T16:49:23Z 2024-11-23T16:49:23Z Author&#160;Liere, Robert. editor.&#160;Adriaansen, Tony. editor.&#160;Zudilova-Seinstra, Elena. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-1-84800-269-2">http://dx.doi.org/10.1007/978-1-84800-269-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> A Classical Introduction to Cryptography Applications for Communications Security ent://SD_ILS/0/SD_ILS:165205 2024-11-23T16:49:23Z 2024-11-23T16:49:23Z Author&#160;Vaudenay, Serge. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/b136373">http://dx.doi.org/10.1007/b136373</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer Viruses and Malware ent://SD_ILS/0/SD_ILS:166010 2024-11-23T16:49:23Z 2024-11-23T16:49:23Z Author&#160;Aycock, John. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/0-387-34188-9">http://dx.doi.org/10.1007/0-387-34188-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> A Classical Introduction to Cryptography Exercise Book ent://SD_ILS/0/SD_ILS:165571 2024-11-23T16:49:23Z 2024-11-23T16:49:23Z Author&#160;Baig&egrave;neres, Thomas. author.&#160;Lu, Yi. author.&#160;Vaudenay, Serge. author.&#160;Junod, Pascal. author.&#160;Monnerat, Jean. author.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/0-387-28835-X">http://dx.doi.org/10.1007/0-387-28835-X</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Multimedia Encryption and Watermarking ent://SD_ILS/0/SD_ILS:165226 2024-11-23T16:49:23Z 2024-11-23T16:49:23Z Author&#160;Furht, Borko. author.&#160;Muharemagic, Edin. author.&#160;Socek, Daniel. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/b136785">http://dx.doi.org/10.1007/b136785</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> The Austin Protocol Compiler ent://SD_ILS/0/SD_ILS:164876 2024-11-23T16:49:23Z 2024-11-23T16:49:23Z Author&#160;McGuire, Tommy M. author.&#160;Gouda, Mohamed G. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/b101038">http://dx.doi.org/10.1007/b101038</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/>