Arama Sonuçları Data structures (Computer science) - Daraltılmış: Data Encryption.
SirsiDynix Enterprise
https://katalog.hacettepe.edu.tr/client/tr_TR/default_tr/default_tr/qu$003dData$002bstructures$002b$002528Computer$002bscience$002529$0026qf$003dSUBJECT$002509Konu$002509Data$002bEncryption.$002509Data$002bEncryption.$0026ps$003d300?
2025-02-18T08:52:50Z
Guide to Cloud Computing Principles and Practice
ent://SD_ILS/0/SD_ILS:331022
2025-02-18T08:52:50Z
2025-02-18T08:52:50Z
Yazar Hill, Richard. author. Hirsch, Laurie. author. Lake, Peter. author. Moshiri, Siavash. author. SpringerLink (Online service)<br/>Yer Numarası ONLINE(331022.1)<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-1-4471-4603-2">http://dx.doi.org/10.1007/978-1-4471-4603-2</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Moving Target Defense II Application of Game Theory and Adversarial Modeling
ent://SD_ILS/0/SD_ILS:331766
2025-02-18T08:52:50Z
2025-02-18T08:52:50Z
Yazar Jajodia, Sushil. editor. Ghosh, Anup K. editor. Subrahmanian, V.S. editor. Swarup, Vipin. editor. Wang, Cliff. editor.<br/>Yer Numarası ONLINE(331766.1)<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-1-4614-5416-8">http://dx.doi.org/10.1007/978-1-4614-5416-8</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Automatic Malware Analysis An Emulator Based Approach
ent://SD_ILS/0/SD_ILS:331796
2025-02-18T08:52:50Z
2025-02-18T08:52:50Z
Yazar Yin, Heng. author. Song, Dawn. author. SpringerLink (Online service)<br/>Yer Numarası ONLINE(331796.1)<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-1-4614-5523-3">http://dx.doi.org/10.1007/978-1-4614-5523-3</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Applied Cryptography and Network Security 11th International Conference, ACNS 2013, Banff, AB, Canada, June 25-28, 2013. Proceedings
ent://SD_ILS/0/SD_ILS:334707
2025-02-18T08:52:50Z
2025-02-18T08:52:50Z
Yazar Jacobson, Michael. editor. Locasto, Michael. editor. Mohassel, Payman. editor. Safavi-Naini, Reihaneh. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE(334707.1)<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-38980-1">http://dx.doi.org/10.1007/978-3-642-38980-1</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Quantum Attacks on Public-Key Cryptosystems
ent://SD_ILS/0/SD_ILS:330828
2025-02-18T08:52:50Z
2025-02-18T08:52:50Z
Yazar Yan, Song Y. author. SpringerLink (Online service)<br/>Yer Numarası ONLINE(330828.1)<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-1-4419-7722-9">http://dx.doi.org/10.1007/978-1-4419-7722-9</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Mobile Authentication Problems and Solutions
ent://SD_ILS/0/SD_ILS:331610
2025-02-18T08:52:50Z
2025-02-18T08:52:50Z
Yazar Jakobsson, Markus. author. SpringerLink (Online service)<br/>Yer Numarası ONLINE(331610.1)<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-1-4614-4878-5">http://dx.doi.org/10.1007/978-1-4614-4878-5</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Android Malware
ent://SD_ILS/0/SD_ILS:332276
2025-02-18T08:52:50Z
2025-02-18T08:52:50Z
Yazar Jiang, Xuxian. author. Zhou, Yajin. author. SpringerLink (Online service)<br/>Yer Numarası ONLINE(332276.1)<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-1-4614-7394-7">http://dx.doi.org/10.1007/978-1-4614-7394-7</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Location Privacy Protection in Mobile Networks
ent://SD_ILS/0/SD_ILS:332468
2025-02-18T08:52:50Z
2025-02-18T08:52:50Z
Yazar Liu, Xinxin. author. Li, Xiaolin. author. SpringerLink (Online service)<br/>Yer Numarası ONLINE(332468.1)<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-1-4614-9074-6">http://dx.doi.org/10.1007/978-1-4614-9074-6</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Cyber Security Deterrence and IT Protection for Critical Infrastructures
ent://SD_ILS/0/SD_ILS:332909
2025-02-18T08:52:50Z
2025-02-18T08:52:50Z
Yazar Martellini, Maurizio. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE(332909.1)<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-319-02279-6">http://dx.doi.org/10.1007/978-3-319-02279-6</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Cryptography and Coding 14th IMA International Conference, IMACC 2013, Oxford, UK, December 17-19, 2013. Proceedings
ent://SD_ILS/0/SD_ILS:335197
2025-02-18T08:52:50Z
2025-02-18T08:52:50Z
Yazar Stam, Martijn. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE(335197.1)<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-45239-0">http://dx.doi.org/10.1007/978-3-642-45239-0</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Engineering Secure Software and Systems 5th International Symposium, ESSoS 2013, Paris, France, February 27 - March 1, 2013. Proceedings
ent://SD_ILS/0/SD_ILS:334236
2025-02-18T08:52:50Z
2025-02-18T08:52:50Z
Yazar Jürjens, Jan. editor. Livshits, Benjamin. editor. Scandariato, Riccardo. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE(334236.1)<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-36563-8">http://dx.doi.org/10.1007/978-3-642-36563-8</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>