Search Results for Telecommunication. - Narrowed by: E-Book - Electronic Library - Computer Communication Networks. - Data encryption (Computer science). - Data structures (Computer science).
SirsiDynix Enterprise
https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dTelecommunication.$0026qf$003dITYPE$002509Material$002bType$0025091$00253AE-KITAP$002509E-Book$0026qf$003dLOCATION$002509Shelf$002bLocation$0025091$00253AELEKKUTUPH$002509Electronic$002bLibrary$0026qf$003dSUBJECT$002509Subject$002509Computer$002bCommunication$002bNetworks.$002509Computer$002bCommunication$002bNetworks.$0026qf$003dSUBJECT$002509Subject$002509Data$002bencryption$002b$002528Computer$002bscience$002529.$002509Data$002bencryption$002b$002528Computer$002bscience$002529.$0026qf$003dSUBJECT$002509Subject$002509Data$002bstructures$002b$002528Computer$002bscience$002529.$002509Data$002bstructures$002b$002528Computer$002bscience$002529.$0026ps$003d300$0026isd$003dtrue?
2024-08-30T09:33:15Z
Moving Target Defense II Application of Game Theory and Adversarial Modeling
ent://SD_ILS/0/SD_ILS:331766
2024-08-30T09:33:15Z
2024-08-30T09:33:15Z
Author Jajodia, Sushil. editor. Ghosh, Anup K. editor. Subrahmanian, V.S. editor. Swarup, Vipin. editor. Wang, Cliff. editor.<br/>Preferred Shelf Number ONLINE(331766.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-1-4614-5416-8">http://dx.doi.org/10.1007/978-1-4614-5416-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Location Privacy Protection in Mobile Networks
ent://SD_ILS/0/SD_ILS:332468
2024-08-30T09:33:15Z
2024-08-30T09:33:15Z
Author Liu, Xinxin. author. Li, Xiaolin. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(332468.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-1-4614-9074-6">http://dx.doi.org/10.1007/978-1-4614-9074-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Digital Signatures
ent://SD_ILS/0/SD_ILS:165432
2024-08-30T09:33:15Z
2024-08-30T09:33:15Z
Author Katz, Jonathan. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-0-387-27712-7">http://dx.doi.org/10.1007/978-0-387-27712-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Identifying Malicious Code Through Reverse Engineering
ent://SD_ILS/0/SD_ILS:167947
2024-08-30T09:33:15Z
2024-08-30T09:33:15Z
Author Singh, Abhishek. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-0-387-89468-3">http://dx.doi.org/10.1007/978-0-387-89468-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Network-Aware Security for Group Communications
ent://SD_ILS/0/SD_ILS:166640
2024-08-30T09:33:15Z
2024-08-30T09:33:15Z
Author Sun, Yan. author. Trappe, Wade. author. Liu, K. J. R. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-0-387-68848-0">http://dx.doi.org/10.1007/978-0-387-68848-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Hop Integrity in the Internet
ent://SD_ILS/0/SD_ILS:165645
2024-08-30T09:33:15Z
2024-08-30T09:33:15Z
Author Huang, Chin-Tser. author. Gouda, Mohamed G. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/0-387-29444-9">http://dx.doi.org/10.1007/0-387-29444-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Trusted Computing Platforms: Design and Applications
ent://SD_ILS/0/SD_ILS:164994
2024-08-30T09:33:15Z
2024-08-30T09:33:15Z
Author Smith, Sean W. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/b103637">http://dx.doi.org/10.1007/b103637</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Computer Security in the 21st Century
ent://SD_ILS/0/SD_ILS:165001
2024-08-30T09:33:15Z
2024-08-30T09:33:15Z
Author Lee, D. T. editor. Shieh, S. P. editor. Tygar, J. D. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/b104203">http://dx.doi.org/10.1007/b104203</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Secure Group Communications over Data Networks
ent://SD_ILS/0/SD_ILS:164839
2024-08-30T09:33:15Z
2024-08-30T09:33:15Z
Author Zou, Xukai. author. Ramamurthy, Byrav. author. Magliveras, Spyros S. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/b100182">http://dx.doi.org/10.1007/b100182</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>