Search Results for Honor. - Narrowed by: Computer security. SirsiDynix Enterprise https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dHonor.$0026qf$003dSUBJECT$002509Subject$002509Computer$002bsecurity.$002509Computer$002bsecurity.$0026ps$003d300$0026isd$003dtrue?dt=list 2026-03-18T22:26:57Z Codes, Cryptology and Information Security Third International Conference, C2SI 2019, Rabat, Morocco, April 22&ndash;24, 2019, Proceedings - In Honor of Said El Hajji ent://SD_ILS/0/SD_ILS:483462 2026-03-18T22:26:57Z 2026-03-18T22:26:57Z Author&#160;Carlet, Claude. editor.&#160;Guilley, Sylvain. editor. (orcid)0000-0002-5044-3534&#160;Nitaj, Abderrahmane. editor. (orcid)0000-0002-0372-1757&#160;Souidi, El Mamoun. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-16458-4">https://doi.org/10.1007/978-3-030-16458-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> The Art of Cyber Warfare Strategic and Tactical Approaches for Attack and Defense in the Digital Age ent://SD_ILS/0/SD_ILS:603456 2026-03-18T22:26:57Z 2026-03-18T22:26:57Z Author&#160;Kestner, Peter. author. (orcid)0009-0002-0437-9487&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-658-43879-1">https://doi.org/10.1007/978-3-658-43879-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/>