Search Results for Solutions. - Narrowed by: Data structures (Computer science). SirsiDynix Enterprise https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dSolutions.$0026qf$003dSUBJECT$002509Subject$002509Data$002bstructures$002b$002528Computer$002bscience$002529.$002509Data$002bstructures$002b$002528Computer$002bscience$002529.$0026ic$003dtrue$0026ps$003d300$0026isd$003dtrue?dt=list 2024-08-12T00:07:23Z Mobile Authentication Problems and Solutions ent://SD_ILS/0/SD_ILS:331610 2024-08-12T00:07:23Z 2024-08-12T00:07:23Z Author&#160;Jakobsson, Markus. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(331610.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-1-4614-4878-5">http://dx.doi.org/10.1007/978-1-4614-4878-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Grid Middleware and Services Challenges and Solutions ent://SD_ILS/0/SD_ILS:167585 2024-08-12T00:07:23Z 2024-08-12T00:07:23Z Author&#160;Talia, Domenico. author.&#160;Yahyapour, Ramin. author.&#160;Ziegler, Wolfgang. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-0-387-78446-5">http://dx.doi.org/10.1007/978-0-387-78446-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Intrusion Detection and Correlation Challenges and Solutions ent://SD_ILS/0/SD_ILS:164919 2024-08-12T00:07:23Z 2024-08-12T00:07:23Z Author&#160;Kruegel, Christopher. author.&#160;Valeur, Fredrik. author.&#160;Vigna, Giovanni. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/b101493">http://dx.doi.org/10.1007/b101493</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> A Survey of Data Leakage Detection and Prevention Solutions ent://SD_ILS/0/SD_ILS:174080 2024-08-12T00:07:23Z 2024-08-12T00:07:23Z Author&#160;Shabtai, Asaf. author.&#160;Elovici, Yuval. author.&#160;Rokach, Lior. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-1-4614-2053-8">http://dx.doi.org/10.1007/978-1-4614-2053-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> HTML and CSS Web Standards Solutions A Web Standardistas&rsquo; Approach ent://SD_ILS/0/SD_ILS:171172 2024-08-12T00:07:23Z 2024-08-12T00:07:23Z Author&#160;Murphy, Christopher. author.&#160;Persson, Nicklas. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-1-4302-1607-0">http://dx.doi.org/10.1007/978-1-4302-1607-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> ISSE/SECURE 2007 Securing Electronic Business Processes Highlights of the Information Security Solutions Europe/SECURE 2007 Conference ent://SD_ILS/0/SD_ILS:199537 2024-08-12T00:07:23Z 2024-08-12T00:07:23Z Author&#160;Pohlmann, Norbert. author.&#160;Reimer, Helmut. author.&#160;Schneider, Wolfgang. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-8348-9418-2">http://dx.doi.org/10.1007/978-3-8348-9418-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> ISSE 2006 &mdash; Securing Electronic Busines Processes Highlights of the Information Security Solutions Europe 2006 Conference ent://SD_ILS/0/SD_ILS:199337 2024-08-12T00:07:23Z 2024-08-12T00:07:23Z Author&#160;Paulus, Sachar. author.&#160;Pohlmann, Norbert. author.&#160;Reimer, Helmut. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-8348-9195-2">http://dx.doi.org/10.1007/978-3-8348-9195-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/>