Search Results for Data structures (Computer science) - Narrowed by: English - Online Library - Computer network architectures. - Data encryption (Computer science).
SirsiDynix Enterprise
https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dData$002bstructures$002b$002528Computer$002bscience$002529$0026qf$003dLANGUAGE$002509Language$002509ENG$002509English$0026qf$003dLIBRARY$002509Library$0025091$00253AONLINE$002509Online$002bLibrary$0026qf$003dSUBJECT$002509Subject$002509Computer$002bnetwork$002barchitectures.$002509Computer$002bnetwork$002barchitectures.$0026qf$003dSUBJECT$002509Subject$002509Data$002bencryption$002b$002528Computer$002bscience$002529.$002509Data$002bencryption$002b$002528Computer$002bscience$002529.$0026ic$003dtrue$0026te$003dILS$0026ps$003d300$0026isd$003dtrue?
2024-09-11T17:49:49Z
Guide to Cloud Computing Principles and Practice
ent://SD_ILS/0/SD_ILS:331022
2024-09-11T17:49:49Z
2024-09-11T17:49:49Z
Author Hill, Richard. author. Hirsch, Laurie. author. Lake, Peter. author. Moshiri, Siavash. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(331022.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-1-4471-4603-2">http://dx.doi.org/10.1007/978-1-4471-4603-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Spyware and Adware
ent://SD_ILS/0/SD_ILS:167516
2024-09-11T17:49:49Z
2024-09-11T17:49:49Z
Author Aycock, John. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-0-387-77741-2">http://dx.doi.org/10.1007/978-0-387-77741-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Security and Assurance International Conference, ISA 2011, Brno, Czech Republic, August 15-17, 2011. Proceedings
ent://SD_ILS/0/SD_ILS:195249
2024-09-11T17:49:49Z
2024-09-11T17:49:49Z
Author Kim, Tai-hoon. editor. Adeli, Hojjat. editor. Robles, Rosslin John. editor. Balitanas, Maricel. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-23141-4">http://dx.doi.org/10.1007/978-3-642-23141-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Digital Signatures
ent://SD_ILS/0/SD_ILS:165432
2024-09-11T17:49:49Z
2024-09-11T17:49:49Z
Author Katz, Jonathan. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-0-387-27712-7">http://dx.doi.org/10.1007/978-0-387-27712-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cyber Situational Awareness Issues and Research
ent://SD_ILS/0/SD_ILS:171874
2024-09-11T17:49:49Z
2024-09-11T17:49:49Z
Author Jajodia, Sushil. editor. Liu, Peng. editor. Swarup, Vipin. editor. Wang, Cliff. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-1-4419-0140-8">http://dx.doi.org/10.1007/978-1-4419-0140-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security in Emerging Wireless Communication and Networking Systems First International ICST Workshop, SEWCN 2009, Athens, Greece, September 14, 2009, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:191712
2024-09-11T17:49:49Z
2024-09-11T17:49:49Z
Author Gu, Qijun. editor. Zang, Wanyu. editor. Yu, Meng. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-11526-4">http://dx.doi.org/10.1007/978-3-642-11526-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Insider Threats in Cyber Security
ent://SD_ILS/0/SD_ILS:172782
2024-09-11T17:49:49Z
2024-09-11T17:49:49Z
Author Probst, Christian W. editor. Hunker, Jeffrey. editor. Gollmann, Dieter. editor. Bishop, Matt. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-1-4419-7133-3">http://dx.doi.org/10.1007/978-1-4419-7133-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Global Initiatives to Secure Cyberspace An Emerging Landscape
ent://SD_ILS/0/SD_ILS:164783
2024-09-11T17:49:49Z
2024-09-11T17:49:49Z
Author Portnoy, Michael. editor. Goodman, Seymour. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-0-387-09764-0">http://dx.doi.org/10.1007/978-0-387-09764-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Advances in Information Security and Assurance Third International Conference and Workshops, ISA 2009, Seoul, Korea, June 25-27, 2009. Proceedings
ent://SD_ILS/0/SD_ILS:190377
2024-09-11T17:49:49Z
2024-09-11T17:49:49Z
Author Park, Jong Hyuk. editor. Chen, Hsiao-Hwa. editor. Atiquzzaman, Mohammed. editor. Lee, Changhoon. editor. Kim, Tai-hoon. editor.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-02617-1">http://dx.doi.org/10.1007/978-3-642-02617-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Advances in Information Security and Its Application Third International Conference, ISA 2009, Seoul, Korea, June 25-27, 2009. Proceedings
ent://SD_ILS/0/SD_ILS:190382
2024-09-11T17:49:49Z
2024-09-11T17:49:49Z
Author Park, Jong Hyuk. editor. Zhan, Justin. editor. Lee, Changhoon. editor. Wang, Guilin. editor. Kim, Tai-hoon. editor.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-02633-1">http://dx.doi.org/10.1007/978-3-642-02633-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Personal Satellite Services International Conference, PSATS 2009, Rome, Italy, March 18-19, 2009, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:190890
2024-09-11T17:49:49Z
2024-09-11T17:49:49Z
Author Sithamparanathan, Kandeepan. editor. Marchese, Mario. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-04260-7">http://dx.doi.org/10.1007/978-3-642-04260-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security and Privacy in Mobile Information and Communication Systems First International ICST Conference, MobiSec 2009, Turin, Italy, June 3-5, 2009, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:190947
2024-09-11T17:49:49Z
2024-09-11T17:49:49Z
Author Schmidt, Andreas U. editor. Lian, Shiguo. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-04434-2">http://dx.doi.org/10.1007/978-3-642-04434-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Secure Multi-Party Non-Repudiation Protocols and Applications
ent://SD_ILS/0/SD_ILS:167284
2024-09-11T17:49:49Z
2024-09-11T17:49:49Z
Author Onieva, José A. author. Lopez, Javier. author. Zhou, Jianying. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-0-387-75630-1">http://dx.doi.org/10.1007/978-0-387-75630-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Foundations and Applications of Security Analysis Joint Workshop on Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security, ARSPA-WITS 2009, York, UK, March 28-29, 2009, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:190634
2024-09-11T17:49:49Z
2024-09-11T17:49:49Z
Author Degano, Pierpaolo. editor. Viganò, Luca. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-03459-6">http://dx.doi.org/10.1007/978-3-642-03459-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Global Security, Safety, and Sustainability 5th International Conference, ICGS3 2009, London, UK, September 1-2, 2009. Proceedings
ent://SD_ILS/0/SD_ILS:190823
2024-09-11T17:49:49Z
2024-09-11T17:49:49Z
Author Jahankhani, Hamid. editor. Hessami, Ali G. editor. Hsu, Feng. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-04062-7">http://dx.doi.org/10.1007/978-3-642-04062-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security Technology International Conference, SecTech 2009, Held as Part of the Future Generation Information Technology Conference, FGIT 2009, Jeju Island, Korea, December 10-12, 2009. Proceedings
ent://SD_ILS/0/SD_ILS:191494
2024-09-11T17:49:49Z
2024-09-11T17:49:49Z
Author Ślęzak, Dominik. editor. Kim, Tai-hoon. editor. Fang, Wai-Chi. editor. Arnett, Kirk P. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-10847-1">http://dx.doi.org/10.1007/978-3-642-10847-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Botnet Detection Countering the Largest Security Threat
ent://SD_ILS/0/SD_ILS:166626
2024-09-11T17:49:49Z
2024-09-11T17:49:49Z
Author Lee, Wenke. editor. Wang, Cliff. editor. Dagon, David. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-0-387-68768-1">http://dx.doi.org/10.1007/978-0-387-68768-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Network-Aware Security for Group Communications
ent://SD_ILS/0/SD_ILS:166640
2024-09-11T17:49:49Z
2024-09-11T17:49:49Z
Author Sun, Yan. author. Trappe, Wade. author. Liu, K. J. R. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-0-387-68848-0">http://dx.doi.org/10.1007/978-0-387-68848-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Intrusion Detection Systems
ent://SD_ILS/0/SD_ILS:167451
2024-09-11T17:49:49Z
2024-09-11T17:49:49Z
Author Mancini, Luigi V. editor. Pietro, Roberto. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-0-387-77265-3">http://dx.doi.org/10.1007/978-0-387-77265-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Insider Attack and Cyber Security Beyond the Hacker
ent://SD_ILS/0/SD_ILS:167459
2024-09-11T17:49:49Z
2024-09-11T17:49:49Z
Author Stolfo, Salvatore J. editor. Bellovin, Steven M. editor. Keromytis, Angelos D. editor. Hershkop, Shlomo. editor. Smith, Sean W. editor.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-0-387-77322-3">http://dx.doi.org/10.1007/978-0-387-77322-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Network and Parallel Computing IFIP International Conference, NPC 2008, Shanghai, China, October 18-20, 2008. Proceedings
ent://SD_ILS/0/SD_ILS:188995
2024-09-11T17:49:49Z
2024-09-11T17:49:49Z
Author Cao, Jian. editor. Li, Minglu. editor. Wu, Min-You. editor. Chen, Jinjun. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-540-88140-7">http://dx.doi.org/10.1007/978-3-540-88140-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Smart Cards, Tokens, Security and Applications
ent://SD_ILS/0/SD_ILS:166922
2024-09-11T17:49:49Z
2024-09-11T17:49:49Z
Author Mayes, Keith E. author. Markantonakis, Konstantinos. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-0-387-72198-9">http://dx.doi.org/10.1007/978-0-387-72198-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security for Telecommunications Networks
ent://SD_ILS/0/SD_ILS:166945
2024-09-11T17:49:49Z
2024-09-11T17:49:49Z
Author Traynor, Patrick. author. McDaniel, Patrick. author. Porta, Thomas La. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-0-387-72442-3">http://dx.doi.org/10.1007/978-0-387-72442-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Vulnerability Analysis and Defense for the Internet
ent://SD_ILS/0/SD_ILS:167162
2024-09-11T17:49:49Z
2024-09-11T17:49:49Z
Author Singh, Abhishek. editor. Singh, Baibhav. editor. Joseph, Hirosh. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-0-387-74390-5">http://dx.doi.org/10.1007/978-0-387-74390-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Network Security Policies and Procedures
ent://SD_ILS/0/SD_ILS:166393
2024-09-11T17:49:49Z
2024-09-11T17:49:49Z
Author Frye, Douglas W. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-0-387-47955-2">http://dx.doi.org/10.1007/978-0-387-47955-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Privacy-Respecting Intrusion Detection
ent://SD_ILS/0/SD_ILS:166560
2024-09-11T17:49:49Z
2024-09-11T17:49:49Z
Author Flegel, Ulrich. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-0-387-68254-9">http://dx.doi.org/10.1007/978-0-387-68254-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Synchronizing Internet Protocol Security (SIPSec)
ent://SD_ILS/0/SD_ILS:166600
2024-09-11T17:49:49Z
2024-09-11T17:49:49Z
Author Shoniregun, Charles A. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-0-387-68569-4">http://dx.doi.org/10.1007/978-0-387-68569-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Practical Internet Security
ent://SD_ILS/0/SD_ILS:165679
2024-09-11T17:49:49Z
2024-09-11T17:49:49Z
Author Vacca, John R. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-0-387-29844-3">http://dx.doi.org/10.1007/978-0-387-29844-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Malware Detection
ent://SD_ILS/0/SD_ILS:166294
2024-09-11T17:49:49Z
2024-09-11T17:49:49Z
Author Christodorescu, Mihai. editor. Jha, Somesh. editor. Maughan, Douglas. editor. Song, Dawn. editor. Wang, Cliff. editor.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-0-387-44599-1">http://dx.doi.org/10.1007/978-0-387-44599-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Secure Localization and Time Synchronization for Wireless Sensor and Ad Hoc Networks
ent://SD_ILS/0/SD_ILS:166337
2024-09-11T17:49:49Z
2024-09-11T17:49:49Z
Author Poovendran, Radha. editor. Roy, Sumit. editor. Wang, Cliff. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-0-387-46276-9">http://dx.doi.org/10.1007/978-0-387-46276-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security for Wireless Sensor Networks
ent://SD_ILS/0/SD_ILS:166353
2024-09-11T17:49:49Z
2024-09-11T17:49:49Z
Author Liu, Donggang. author. Ning, Peng. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-0-387-46781-8">http://dx.doi.org/10.1007/978-0-387-46781-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Guide to Wireless Network Security
ent://SD_ILS/0/SD_ILS:165680
2024-09-11T17:49:49Z
2024-09-11T17:49:49Z
Author Vacca, John R. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-0-387-29845-0">http://dx.doi.org/10.1007/978-0-387-29845-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Hop Integrity in the Internet
ent://SD_ILS/0/SD_ILS:165645
2024-09-11T17:49:49Z
2024-09-11T17:49:49Z
Author Huang, Chin-Tser. author. Gouda, Mohamed G. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/0-387-29444-9">http://dx.doi.org/10.1007/0-387-29444-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
CryptoGraphics Exploiting Graphics Cards for Security
ent://SD_ILS/0/SD_ILS:166011
2024-09-11T17:49:49Z
2024-09-11T17:49:49Z
Author Cook, Debra L. author. Keromytis, Angelos D. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/0-387-34189-7">http://dx.doi.org/10.1007/0-387-34189-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
A Classical Introduction to Cryptography Applications for Communications Security
ent://SD_ILS/0/SD_ILS:165205
2024-09-11T17:49:49Z
2024-09-11T17:49:49Z
Author Vaudenay, Serge. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/b136373">http://dx.doi.org/10.1007/b136373</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
A Classical Introduction to Cryptography Exercise Book
ent://SD_ILS/0/SD_ILS:165571
2024-09-11T17:49:49Z
2024-09-11T17:49:49Z
Author Baigèneres, Thomas. author. Lu, Yi. author. Vaudenay, Serge. author. Junod, Pascal. author. Monnerat, Jean. author.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/0-387-28835-X">http://dx.doi.org/10.1007/0-387-28835-X</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Secure Group Communications over Data Networks
ent://SD_ILS/0/SD_ILS:164839
2024-09-11T17:49:49Z
2024-09-11T17:49:49Z
Author Zou, Xukai. author. Ramamurthy, Byrav. author. Magliveras, Spyros S. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/b100182">http://dx.doi.org/10.1007/b100182</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Certification and Security in Inter-Organizational E-Service
ent://SD_ILS/0/SD_ILS:165086
2024-09-11T17:49:49Z
2024-09-11T17:49:49Z
Author Nardelli, Enrico. editor. Talamo, Maurizio. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/11397427">http://dx.doi.org/10.1007/11397427</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Multimedia Encryption and Watermarking
ent://SD_ILS/0/SD_ILS:165226
2024-09-11T17:49:49Z
2024-09-11T17:49:49Z
Author Furht, Borko. author. Muharemagic, Edin. author. Socek, Daniel. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/b136785">http://dx.doi.org/10.1007/b136785</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Impacts and Risk Assessment of Technology for Internet Security Enabled Information Small-Medium Enterprises (TEISMES)
ent://SD_ILS/0/SD_ILS:165267
2024-09-11T17:49:49Z
2024-09-11T17:49:49Z
Author Shoniregun, Charles A. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/b137376">http://dx.doi.org/10.1007/b137376</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>