Arama Sonuçları Computing Methodologies. - Daraltılmış: Computer security.
SirsiDynix Enterprise
https://katalog.hacettepe.edu.tr/client/tr_TR/default_tr/default_tr/qu$003dComputing$002bMethodologies.$0026qf$003dSUBJECT$002509Konu$002509Computer$002bsecurity.$002509Computer$002bsecurity.$0026ps$003d300?dt=list
2025-12-05T17:24:51Z
Intelligent Computing Methodologies 14th International Conference, ICIC 2018, Wuhan, China, August 15-18, 2018, Proceedings, Part III
ent://SD_ILS/0/SD_ILS:399690
2025-12-05T17:24:51Z
2025-12-05T17:24:51Z
Yazar Huang, De-Shuang. editor. Gromiha, M. Michael. editor. Han, Kyungsook. editor. Hussain, Abir. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-319-95957-3">https://doi.org/10.1007/978-3-319-95957-3</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Collaboration with cloud computing : security, social media, and unified communications
ent://SD_ILS/0/SD_ILS:355829
2025-12-05T17:24:51Z
2025-12-05T17:24:51Z
Yazar Messier, Ric, author.<br/>Yer Numarası ONLINE(355829.1)<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780124170407">http://www.sciencedirect.com/science/book/9780124170407</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>