Search Results for Data protection. - Narrowed by: SpringerLink (Online service) - 2007 - Computer network architectures. SirsiDynix Enterprise https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dData$002bprotection.$0026qf$003dAUTHOR$002509Author$002509SpringerLink$002b$002528Online$002bservice$002529$002509SpringerLink$002b$002528Online$002bservice$002529$0026qf$003dPUBDATE$002509Publication$002bDate$0025092007$0025092007$0026qf$003dSUBJECT$002509Subject$002509Computer$002bnetwork$002barchitectures.$002509Computer$002bnetwork$002barchitectures.$0026ps$003d300? 2024-09-01T08:04:21Z Computer Network Security Fourth International Conference on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2007 St. Petersburg, Russia, September 13&ndash;15, 2007 Proceedings ent://SD_ILS/0/SD_ILS:187023 2024-09-01T08:04:21Z 2024-09-01T08:04:21Z Author&#160;Gorodetsky, Vladimir. editor.&#160;Kotenko, Igor. editor.&#160;Skormin, Victor A. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-73986-9">http://dx.doi.org/10.1007/978-3-540-73986-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Network-Based Information Systems First International Conference, NBiS 2007, Regensburg, Germany, September 3-7, 2007. Proceedings ent://SD_ILS/0/SD_ILS:187200 2024-09-01T08:04:21Z 2024-09-01T08:04:21Z Author&#160;Enokido, Tomoya. editor.&#160;Barolli, Leonard. editor.&#160;Takizawa, Makoto. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-74573-0">http://dx.doi.org/10.1007/978-3-540-74573-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Intrusion Detection effektiv! Modellierung und Analyse von Angriffsmustern ent://SD_ILS/0/SD_ILS:185059 2024-09-01T08:04:21Z 2024-09-01T08:04:21Z Author&#160;Meier, Michael. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-48258-1">http://dx.doi.org/10.1007/978-3-540-48258-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> E-business and Telecommunication Networks Second International Conference, ICETE 2005, Reading, UK, October 3-7, 2005. Selected Papers ent://SD_ILS/0/SD_ILS:187555 2024-09-01T08:04:21Z 2024-09-01T08:04:21Z Author&#160;Filipe, Joaquim. editor.&#160;Coelhas, Helder. editor.&#160;Saramago, Monica. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-75993-5">http://dx.doi.org/10.1007/978-3-540-75993-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Privacy-Respecting Intrusion Detection ent://SD_ILS/0/SD_ILS:166560 2024-09-01T08:04:21Z 2024-09-01T08:04:21Z Author&#160;Flegel, Ulrich. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-0-387-68254-9">http://dx.doi.org/10.1007/978-0-387-68254-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/>