Arama Sonu&ccedil;lar&#305; Computer security - Daralt&#305;lm&#305;&#351;: Mobile computing. SirsiDynix Enterprise https://katalog.hacettepe.edu.tr/client/tr_TR/default_tr/default_tr/qu$003dComputer$002bsecurity$0026qf$003dSUBJECT$002509Konu$002509Mobile$002bcomputing.$002509Mobile$002bcomputing.$0026ps$003d300$0026isd$003dtrue?dt=list 2025-04-21T02:37:06Z Mobile Computing and Sustainable Informatics Proceedings of ICMCSI 2023 ent://SD_ILS/0/SD_ILS:527730 2025-04-21T02:37:06Z 2025-04-21T02:37:06Z Yazar&#160;Shakya, Subarna. editor.&#160;Papakostas, George. editor.&#160;Kamel, Khaled A. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-981-99-0835-6">https://doi.org/10.1007/978-981-99-0835-6</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Location Privacy in Mobile Applications ent://SD_ILS/0/SD_ILS:400299 2025-04-21T02:37:06Z 2025-04-21T02:37:06Z Yazar&#160;Liu, Bo. author.&#160;Zhou, Wanlei. author.&#160;Zhu, Tianqing. author.&#160;Xiang, Yong. author.&#160;Wang, Kun. author.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-981-13-1705-7">https://doi.org/10.1007/978-981-13-1705-7</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Delivering London 2012 ICT implementation and operations ent://SD_ILS/0/SD_ILS:509889 2025-04-21T02:37:06Z 2025-04-21T02:37:06Z Yazar&#160;IET, ed.<br/>Yer Numaras&#305;&#160;XX(509889.1)<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1049/PERICP2E">http://dx.doi.org/10.1049/PERICP2E</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Security for Mobility ent://SD_ILS/0/SD_ILS:247990 2025-04-21T02:37:06Z 2025-04-21T02:37:06Z Yazar&#160;Mitchell, Chris J., ed.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1049/PBTE051E">http://dx.doi.org/10.1049/PBTE051E</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Internet and Wireless Security ent://SD_ILS/0/SD_ILS:247682 2025-04-21T02:37:06Z 2025-04-21T02:37:06Z Yazar&#160;Temple, Robert, ed.&#160;Regnault, John, ed.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1049/PBBT004E">http://dx.doi.org/10.1049/PBBT004E</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/>