Arama Sonu&ccedil;lar&#305; Kumar. - Daralt&#305;lm&#305;&#351;: Computer security. SirsiDynix Enterprise https://katalog.hacettepe.edu.tr/client/tr_TR/default_tr/default_tr/qu$003dKumar.$0026qf$003dSUBJECT$002509Konu$002509Computer$002bsecurity.$002509Computer$002bsecurity.$0026ps$003d300? 2025-12-25T17:24:48Z Ubiquitous Communications and Network Computing First International Conference, UBICNET 2017, Bangalore, India, August 3-5, 2017, Proceedings ent://SD_ILS/0/SD_ILS:402320 2025-12-25T17:24:48Z 2025-12-25T17:24:48Z Yazar&#160;Kumar, Navin. editor.&#160;Thakre, Arpita. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-3-319-73423-1">https://doi.org/10.1007/978-3-319-73423-1</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Advanced Informatics for Computing Research Third International Conference, ICAICR 2019, Shimla, India, June 15&ndash;16, 2019, Revised Selected Papers, Part I ent://SD_ILS/0/SD_ILS:483888 2025-12-25T17:24:48Z 2025-12-25T17:24:48Z Yazar&#160;Luhach, Ashish Kumar. editor.&#160;Jat, Dharm Singh. editor.&#160;Hawari, Kamarul Bin Ghazali. editor.&#160;Gao, Xiao-Zhi. editor.&#160;Lingras, Pawan. editor.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-981-15-0108-1">https://doi.org/10.1007/978-981-15-0108-1</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Advanced Informatics for Computing Research Third International Conference, ICAICR 2019, Shimla, India, June 15&ndash;16, 2019, Revised Selected Papers, Part II ent://SD_ILS/0/SD_ILS:486999 2025-12-25T17:24:48Z 2025-12-25T17:24:48Z Yazar&#160;Luhach, Ashish Kumar. editor.&#160;Jat, Dharm Singh. editor.&#160;Hawari, Kamarul Bin Ghazali. editor.&#160;Gao, Xiao-Zhi. editor.&#160;Lingras, Pawan. editor.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-981-15-0111-1">https://doi.org/10.1007/978-981-15-0111-1</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Information and Communication Technology Proceedings of ICICT 2016 ent://SD_ILS/0/SD_ILS:399048 2025-12-25T17:24:48Z 2025-12-25T17:24:48Z Yazar&#160;Mishra, Durgesh Kumar. editor.&#160;Azar, Ahmad Taher. editor.&#160;Joshi, Amit. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-981-10-5508-9">https://doi.org/10.1007/978-981-10-5508-9</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Big Data Processing Using Spark in Cloud ent://SD_ILS/0/SD_ILS:483400 2025-12-25T17:24:48Z 2025-12-25T17:24:48Z Yazar&#160;Mittal, Mamta. editor.&#160;Balas, Valentina E. editor.&#160;Goyal, Lalit Mohan. editor.&#160;Kumar, Raghvendra. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-981-13-0550-4">https://doi.org/10.1007/978-981-13-0550-4</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Computational Intelligence, Cyber Security and Computational Models Proceedings of ICC3, 2013 ent://SD_ILS/0/SD_ILS:488884 2025-12-25T17:24:48Z 2025-12-25T17:24:48Z Yazar&#160;Krishnan, G. Sai Sundara. editor.&#160;Anitha, R. editor.&#160;Lekshmi, R. S. editor.&#160;Kumar, M. Senthil. editor.&#160;Bonato, Anthony. editor.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-81-322-1680-3">https://doi.org/10.1007/978-81-322-1680-3</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/>