Search Results for Database security. - Narrowed by: Machine theory.
SirsiDynix Enterprise
https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dDatabase$002bsecurity.$0026qf$003dSUBJECT$002509Subject$002509Machine$002btheory.$002509Machine$002btheory.$0026ps$003d300$0026isd$003dtrue?dt=list
2026-04-03T15:08:57Z
Database and Expert Systems Applications 28th International Conference, DEXA 2017, Lyon, France, August 28-31, 2017, Proceedings, Part I
ent://SD_ILS/0/SD_ILS:618255
2026-04-03T15:08:57Z
2026-04-03T15:08:57Z
Author Benslimane, Djamal. editor. Damiani, Ernesto. editor. Grosky, William I. editor. Hameurlain, Abdelkader. editor. Sheth, Amit. editor.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-64468-4">https://doi.org/10.1007/978-3-319-64468-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Database and Expert Systems Applications 28th International Conference, DEXA 2017, Lyon, France, August 28-31, 2017, Proceedings, Part II
ent://SD_ILS/0/SD_ILS:618306
2026-04-03T15:08:57Z
2026-04-03T15:08:57Z
Author Benslimane, Djamal. editor. Damiani, Ernesto. editor. Grosky, William I. editor. Hameurlain, Abdelkader. editor. Sheth, Amit. editor.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-64471-4">https://doi.org/10.1007/978-3-319-64471-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
String Analysis for Software Verification and Security
ent://SD_ILS/0/SD_ILS:611157
2026-04-03T15:08:57Z
2026-04-03T15:08:57Z
Author Bultan, Tevfik. author. Yu, Fang. author. Alkhalaf, Muath. author. Aydin, Abdulbaki. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-68670-7">https://doi.org/10.1007/978-3-319-68670-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>