Search Results for Data transmission systems. - Narrowed by: Data structures (Computer science).
SirsiDynix Enterprise
https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dData$002btransmission$002bsystems.$0026qf$003dSUBJECT$002509Subject$002509Data$002bstructures$002b$002528Computer$002bscience$002529.$002509Data$002bstructures$002b$002528Computer$002bscience$002529.$0026ic$003dtrue$0026ps$003d300?
2024-09-03T15:14:39Z
Trends in Interactive Visualization State-of-the-Art Survey
ent://SD_ILS/0/SD_ILS:175789
2024-09-03T15:14:39Z
2024-09-03T15:14:39Z
Author Liere, Robert. editor. Adriaansen, Tony. editor. Zudilova-Seinstra, Elena. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-1-84800-269-2">http://dx.doi.org/10.1007/978-1-84800-269-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
A Classical Introduction to Cryptography Exercise Book
ent://SD_ILS/0/SD_ILS:165571
2024-09-03T15:14:39Z
2024-09-03T15:14:39Z
Author Baigèneres, Thomas. author. Lu, Yi. author. Vaudenay, Serge. author. Junod, Pascal. author. Monnerat, Jean. author.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/0-387-28835-X">http://dx.doi.org/10.1007/0-387-28835-X</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Computer Viruses and Malware
ent://SD_ILS/0/SD_ILS:166010
2024-09-03T15:14:39Z
2024-09-03T15:14:39Z
Author Aycock, John. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/0-387-34188-9">http://dx.doi.org/10.1007/0-387-34188-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
A Classical Introduction to Cryptography Applications for Communications Security
ent://SD_ILS/0/SD_ILS:165205
2024-09-03T15:14:39Z
2024-09-03T15:14:39Z
Author Vaudenay, Serge. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/b136373">http://dx.doi.org/10.1007/b136373</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Multimedia Encryption and Watermarking
ent://SD_ILS/0/SD_ILS:165226
2024-09-03T15:14:39Z
2024-09-03T15:14:39Z
Author Furht, Borko. author. Muharemagic, Edin. author. Socek, Daniel. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/b136785">http://dx.doi.org/10.1007/b136785</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
The Austin Protocol Compiler
ent://SD_ILS/0/SD_ILS:164876
2024-09-03T15:14:39Z
2024-09-03T15:14:39Z
Author McGuire, Tommy M. author. Gouda, Mohamed G. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/b101038">http://dx.doi.org/10.1007/b101038</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>