Arama Sonuçları Computer architecture. - Daraltılmış: Cryptography.
SirsiDynix Enterprise
https://katalog.hacettepe.edu.tr/client/tr_TR/default_tr/default_tr/qu$003dComputer$002barchitecture.$0026qf$003dSUBJECT$002509Konu$002509Cryptography.$002509Cryptography.$0026ic$003dtrue$0026ps$003d300?dt=list
2026-03-20T22:08:35Z
Hardware Protection through Obfuscation
ent://SD_ILS/0/SD_ILS:613957
2026-03-20T22:08:35Z
2026-03-20T22:08:35Z
Yazar Forte, Domenic. editor. Bhunia, Swarup. editor. Tehranipoor, Mark M. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-319-49019-9">https://doi.org/10.1007/978-3-319-49019-9</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Hardware IP Security and Trust
ent://SD_ILS/0/SD_ILS:614176
2026-03-20T22:08:35Z
2026-03-20T22:08:35Z
Yazar Mishra, Prabhat. editor. Bhunia, Swarup. editor. Tehranipoor, Mark. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-319-49025-0">https://doi.org/10.1007/978-3-319-49025-0</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Elements of Cloud Computing Security A Survey of Key Practicalities
ent://SD_ILS/0/SD_ILS:617823
2026-03-20T22:08:35Z
2026-03-20T22:08:35Z
Yazar Alani, Mohammed M. author. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-319-41411-9">https://doi.org/10.1007/978-3-319-41411-9</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>