Search Results for Information systems. - Narrowed by: E-Book - English - Electronic Library - Coding theory. - Data structures (Computer science). SirsiDynix Enterprise https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dInformation$002bsystems.$0026qf$003dITYPE$002509Material$002bType$0025091$00253AE-KITAP$002509E-Book$0026qf$003dLANGUAGE$002509Language$002509ENG$002509English$0026qf$003dLOCATION$002509Shelf$002bLocation$0025091$00253AELEKKUTUPH$002509Electronic$002bLibrary$0026qf$003dSUBJECT$002509Subject$002509Coding$002btheory.$002509Coding$002btheory.$0026qf$003dSUBJECT$002509Subject$002509Data$002bstructures$002b$002528Computer$002bscience$002529.$002509Data$002bstructures$002b$002528Computer$002bscience$002529.$0026ps$003d300$0026isd$003dtrue? 2024-09-12T00:07:19Z Information Security Technology for Applications 15th Nordic Conference on Secure IT Systems, NordSec 2010, Espoo, Finland, October 27-29, 2010, Revised Selected Papers ent://SD_ILS/0/SD_ILS:196303 2024-09-12T00:07:19Z 2024-09-12T00:07:19Z Author&#160;Aura, Tuomas. editor.&#160;J&auml;rvinen, Kimmo. editor.&#160;Nyberg, Kaisa. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-27937-9">http://dx.doi.org/10.1007/978-3-642-27937-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security Technology for Applications 16th Nordic Conference on Secure IT Systems, NordSec 2011, Tallinn, Estonia, October 26-28, 2011, Revised Selected Papers ent://SD_ILS/0/SD_ILS:196738 2024-09-12T00:07:19Z 2024-09-12T00:07:19Z Author&#160;Laud, Peeter. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-29615-4">http://dx.doi.org/10.1007/978-3-642-29615-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security Theory and Practice. Smart Devices, Pervasive Systems, and Ubiquitous Networks Third IFIP WG 11.2 International Workshop, WISTP 2009, Brussels, Belgium, September 1-4, 2009, Proceedings ent://SD_ILS/0/SD_ILS:190785 2024-09-12T00:07:19Z 2024-09-12T00:07:19Z Author&#160;Markowitch, Olivier. editor.&#160;Bilas, Angelos. editor.&#160;Hoepman, Jaap-Henk. editor.&#160;Mitchell, Chris J. editor.&#160;Quisquater, Jean-Jacques. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-03944-7">http://dx.doi.org/10.1007/978-3-642-03944-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Applied Cryptography and Network Security 11th International Conference, ACNS 2013, Banff, AB, Canada, June 25-28, 2013. Proceedings ent://SD_ILS/0/SD_ILS:334707 2024-09-12T00:07:19Z 2024-09-12T00:07:19Z Author&#160;Jacobson, Michael. editor.&#160;Locasto, Michael. editor.&#160;Mohassel, Payman. editor.&#160;Safavi-Naini, Reihaneh. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(334707.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-38980-1">http://dx.doi.org/10.1007/978-3-642-38980-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Applied Cryptography and Network Security 10th International Conference, ACNS 2012, Singapore, June 26-29, 2012. Proceedings ent://SD_ILS/0/SD_ILS:197053 2024-09-12T00:07:19Z 2024-09-12T00:07:19Z Author&#160;Bao, Feng. editor.&#160;Samarati, Pierangela. editor.&#160;Zhou, Jianying. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-31284-7">http://dx.doi.org/10.1007/978-3-642-31284-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Progress in Cryptology - AFRICACRYPT 2012 5th International Conference on Cryptology in Africa, Ifrance, Morocco, July 10-12, 2012. Proceedings ent://SD_ILS/0/SD_ILS:197072 2024-09-12T00:07:19Z 2024-09-12T00:07:19Z Author&#160;Mitrokotsa, Aikaterini. editor.&#160;Vaudenay, Serge. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-31410-0">http://dx.doi.org/10.1007/978-3-642-31410-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Secure IT Systems 17th Nordic Conference, NordSec 2012, Karlskrona, Sweden, October 31 &ndash; November 2, 2012. Proceedings ent://SD_ILS/0/SD_ILS:197492 2024-09-12T00:07:19Z 2024-09-12T00:07:19Z Author&#160;J&oslash;sang, Audun. editor.&#160;Carlsson, Bengt. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-34210-3">http://dx.doi.org/10.1007/978-3-642-34210-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Digital Watermarking 9th International Workshop, IWDW 2010, Seoul, Korea, October 1-3, 2010, Revised Selected Papers ent://SD_ILS/0/SD_ILS:193883 2024-09-12T00:07:19Z 2024-09-12T00:07:19Z Author&#160;Kim, Hyoung-Joong. editor.&#160;Shi, Yun Qing. editor.&#160;Barni, Mauro. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-18405-5">http://dx.doi.org/10.1007/978-3-642-18405-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Critical Infrastructure Protection IV Fourth Annual IFIP WG 11.10 International Conference on Critical Infrastructure Protection, ICCIP 2010, Washington, DC, USA, March 15-17, 2010, Revised Selected Papers ent://SD_ILS/0/SD_ILS:193415 2024-09-12T00:07:19Z 2024-09-12T00:07:19Z Author&#160;Moore, Tyler. editor.&#160;Shenoi, Sujeet. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-16806-2">http://dx.doi.org/10.1007/978-3-642-16806-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Critical Infrastructure Protection II ent://SD_ILS/0/SD_ILS:167881 2024-09-12T00:07:19Z 2024-09-12T00:07:19Z Author&#160;Papa, Mauricio. editor.&#160;Shenoi, Sujeet. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-0-387-88523-0">http://dx.doi.org/10.1007/978-0-387-88523-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Applied Cryptography and Network Security 7th International Conference, ACNS 2009, Paris-Rocquencourt, France, June 2-5, 2009. Proceedings ent://SD_ILS/0/SD_ILS:190173 2024-09-12T00:07:19Z 2024-09-12T00:07:19Z Author&#160;Abdalla, Michel. editor.&#160;Pointcheval, David. editor.&#160;Fouque, Pierre-Alain. editor.&#160;Vergnaud, Damien. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-01957-9">http://dx.doi.org/10.1007/978-3-642-01957-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Digital Watermarking 8th International Workshop, IWDW 2009, Guildford, UK, August 24-26, 2009. Proceedings ent://SD_ILS/0/SD_ILS:190703 2024-09-12T00:07:19Z 2024-09-12T00:07:19Z Author&#160;Ho, Anthony T. S. editor.&#160;Shi, Yun Q. editor.&#160;Kim, H. J. editor.&#160;Barni, Mauro. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-03688-0">http://dx.doi.org/10.1007/978-3-642-03688-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Identity and Privacy in the Internet Age 14th Nordic Conference on Secure IT Systems, NordSec 2009, Oslo, Norway, 14-16 October 2009. Proceedings ent://SD_ILS/0/SD_ILS:191053 2024-09-12T00:07:19Z 2024-09-12T00:07:19Z Author&#160;J&oslash;sang, Audun. editor.&#160;Maseng, Torleiv. editor.&#160;Knapskog, Svein Johan. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-04766-4">http://dx.doi.org/10.1007/978-3-642-04766-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Critical Infrastructure Protection III Third Annual IFIP WG 11.10 International Conference on Critical Infrastructure Protection, Hanover, New Hampshire, USA, March 23-25, 2009, Revised Selected Papers ent://SD_ILS/0/SD_ILS:191062 2024-09-12T00:07:19Z 2024-09-12T00:07:19Z Author&#160;Palmer, Charles. editor.&#160;Shenoi, Sujeet. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-04798-5">http://dx.doi.org/10.1007/978-3-642-04798-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Electronic Postage Systems Technology, Security, Economics ent://SD_ILS/0/SD_ILS:166296 2024-09-12T00:07:19Z 2024-09-12T00:07:19Z Author&#160;Bleumer, Gerrit. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-0-387-44606-6">http://dx.doi.org/10.1007/978-0-387-44606-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Foundations of Computer Security ent://SD_ILS/0/SD_ILS:175390 2024-09-12T00:07:19Z 2024-09-12T00:07:19Z Author&#160;Salomon, David. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/1-84628-341-8">http://dx.doi.org/10.1007/1-84628-341-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> String Processing and Information Retrieval 13th International Conference, SPIRE 2006, Glasgow, UK, October 11-13, 2006. Proceedings ent://SD_ILS/0/SD_ILS:184864 2024-09-12T00:07:19Z 2024-09-12T00:07:19Z Author&#160;Crestani, Fabio. editor.&#160;Ferragina, Paolo. editor.&#160;Sanderson, Mark. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/11880561">http://dx.doi.org/10.1007/11880561</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Intrusion Detection and Correlation Challenges and Solutions ent://SD_ILS/0/SD_ILS:164919 2024-09-12T00:07:19Z 2024-09-12T00:07:19Z Author&#160;Kruegel, Christopher. author.&#160;Valeur, Fredrik. author.&#160;Vigna, Giovanni. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/b101493">http://dx.doi.org/10.1007/b101493</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Coding for Data and Computer Communications ent://SD_ILS/0/SD_ILS:164977 2024-09-12T00:07:19Z 2024-09-12T00:07:19Z Author&#160;Salomon, David. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/b102531">http://dx.doi.org/10.1007/b102531</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/>