Search Results for Science and technology. - Narrowed by: Data structures (Computer science). - Systems and Data Security.
SirsiDynix Enterprise
https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dScience$002band$002btechnology.$0026qf$003dSUBJECT$002509Subject$002509Data$002bstructures$002b$002528Computer$002bscience$002529.$002509Data$002bstructures$002b$002528Computer$002bscience$002529.$0026qf$003dSUBJECT$002509Subject$002509Systems$002band$002bData$002bSecurity.$002509Systems$002band$002bData$002bSecurity.$0026ps$003d300?
2024-09-09T09:45:00Z
Bluetooth Security Attacks Comparative Analysis, Attacks, and Countermeasures
ent://SD_ILS/0/SD_ILS:334982
2024-09-09T09:45:00Z
2024-09-09T09:45:00Z
Author Haataja, Keijo. author. Hyppönen, Konstantin. author. Pasanen, Sanna. author. Toivanen, Pekka. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(334982.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-40646-1">http://dx.doi.org/10.1007/978-3-642-40646-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Introduction to Public Key Infrastructures
ent://SD_ILS/0/SD_ILS:334984
2024-09-09T09:45:00Z
2024-09-09T09:45:00Z
Author Buchmann, Johannes A. author. Karatsiolis, Evangelos. author. Wiesmaier, Alexander. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(334984.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-40657-7">http://dx.doi.org/10.1007/978-3-642-40657-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>