Arama Sonu&ccedil;lar&#305; Computer Applications. - Daralt&#305;lm&#305;&#351;: Security systems. SirsiDynix Enterprise https://katalog.hacettepe.edu.tr/client/tr_TR/default_tr/default_tr/qu$003dComputer$002bApplications.$0026qf$003dSUBJECT$002509Konu$002509Security$002bsystems.$002509Security$002bsystems.$0026ic$003dtrue$0026ps$003d300?dt=list 2025-12-08T05:34:20Z Why Cryptography Should Not Rely on Physical Attack Complexity ent://SD_ILS/0/SD_ILS:529557 2025-12-08T05:34:20Z 2025-12-08T05:34:20Z Yazar&#160;Kr&auml;mer, Juliane. author.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-981-287-787-1">https://doi.org/10.1007/978-981-287-787-1</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Cybercrime, Digital Forensics and Jurisdiction ent://SD_ILS/0/SD_ILS:529976 2025-12-08T05:34:20Z 2025-12-08T05:34:20Z Yazar&#160;Chawki, Mohamed. author.&#160;Darwish, Ashraf. author.&#160;Khan, Mohammad Ayoub. author.&#160;Tyagi, Sapna. author.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-3-319-15150-2">https://doi.org/10.1007/978-3-319-15150-2</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Security Issues in Mobile NFC Devices ent://SD_ILS/0/SD_ILS:529509 2025-12-08T05:34:20Z 2025-12-08T05:34:20Z Yazar&#160;Roland, Michael. author.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-3-319-15488-6">https://doi.org/10.1007/978-3-319-15488-6</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/>