Arama Sonuçları Computer security -- Case studies. - Daraltılmış: Cryptology.
SirsiDynix Enterprise
https://katalog.hacettepe.edu.tr/client/tr_TR/default_tr/default_tr/qu$003dComputer$002bsecurity$002b--$002bCase$002bstudies.$0026qf$003dSUBJECT$002509Konu$002509Cryptology.$002509Cryptology.$0026ic$003dtrue$0026ps$003d300?dt=list
2026-03-28T12:19:44Z
Understanding Social Engineering Based Scams
ent://SD_ILS/0/SD_ILS:613967
2026-03-28T12:19:44Z
2026-03-28T12:19:44Z
Yazar Jakobsson, Markus. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-1-4939-6457-4">https://doi.org/10.1007/978-1-4939-6457-4</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Digital Fingerprinting
ent://SD_ILS/0/SD_ILS:614393
2026-03-28T12:19:44Z
2026-03-28T12:19:44Z
Yazar Wang, Cliff. editor. Gerdes, Ryan M. editor. Guan, Yong. editor. Kasera, Sneha Kumar. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-1-4939-6601-1">https://doi.org/10.1007/978-1-4939-6601-1</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>