Search Results for Model theory. - Narrowed by: Computer security. SirsiDynix Enterprise https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dModel$002btheory.$0026qf$003dSUBJECT$002509Subject$002509Computer$002bsecurity.$002509Computer$002bsecurity.$0026ic$003dtrue$0026ps$003d300?dt=list 2024-11-24T17:32:02Z Theory and Practice of Model Transformation 11th International Conference, ICMT 2018, Held as Part of STAF 2018, Toulouse, France, June 25&ndash;26, 2018, Proceedings ent://SD_ILS/0/SD_ILS:401991 2024-11-24T17:32:02Z 2024-11-24T17:32:02Z Author&#160;Rensink, Arend. editor. (orcid)0000-0002-1714-6319&#160;S&aacute;nchez Cuadrado, Jes&uacute;s. editor. (orcid)0000-0001-9755-5616&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-93317-7">https://doi.org/10.1007/978-3-319-93317-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer security literacy staying safe in a digital world ent://SD_ILS/0/SD_ILS:290839 2024-11-24T17:32:02Z 2024-11-24T17:32:02Z Author&#160;Jacobson, Douglas.&#160;Idziorek, Joseph.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781439856192">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/>