Arama Sonuçları Mobile computing. - Daraltılmış: Computer security.SirsiDynix Enterprisehttps://katalog.hacettepe.edu.tr/client/tr_TR/default_tr/default_tr/qu$003dMobile$002bcomputing.$0026qf$003dSUBJECT$002509Konu$002509Computer$002bsecurity.$002509Computer$002bsecurity.$0026ps$003d300?dt=list2025-12-05T23:15:06ZSecurity in Distributed, Grid, Mobile, and Pervasive Computing.ent://SD_ILS/0/SD_ILS:5448472025-12-05T23:15:06Z2025-12-05T23:15:06ZYer Numarası QA76.9<br/>Elektronik Erişim Taylor & Francis <a href="https://www.taylorfrancis.com/books/9780429119347">https://www.taylorfrancis.com/books/9780429119347</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Location Privacy in Mobile Applicationsent://SD_ILS/0/SD_ILS:4002992025-12-05T23:15:06Z2025-12-05T23:15:06ZYazar Liu, Bo. author. Zhou, Wanlei. author. Zhu, Tianqing. author. Xiang, Yong. author. Wang, Kun. author.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-981-13-1705-7">https://doi.org/10.1007/978-981-13-1705-7</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Mobile data loss : threats and countermeasuresent://SD_ILS/0/SD_ILS:4587292025-12-05T23:15:06Z2025-12-05T23:15:06ZYazar Raggo, Michael T.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="https://www.sciencedirect.com/science/book/9780128028643">https://www.sciencedirect.com/science/book/9780128028643</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>What every engineer should know about cyber security and digital forensicsent://SD_ILS/0/SD_ILS:5397262025-12-05T23:15:06Z2025-12-05T23:15:06ZYazar DeFranco, Joanna F., author.<br/>Yer Numarası TK5105.59 .D44 2014<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9781466564541">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>Delivering London 2012 ICT implementation and operationsent://SD_ILS/0/SD_ILS:5098892025-12-05T23:15:06Z2025-12-05T23:15:06ZYazar IET, ed.<br/>Yer Numarası XX(509889.1)<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1049/PERICP2E">http://dx.doi.org/10.1049/PERICP2E</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Secure and resilient software developmentent://SD_ILS/0/SD_ILS:5450972025-12-05T23:15:06Z2025-12-05T23:15:06ZYazar Merkow, Mark S., author. Raghavan, Lakshmikanth.<br/>Yer Numarası QA76.76 .D47 M466 2010<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9781439826973">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>Security for Mobilityent://SD_ILS/0/SD_ILS:2479902025-12-05T23:15:06Z2025-12-05T23:15:06ZYazar Mitchell, Chris J., ed.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1049/PBTE051E">http://dx.doi.org/10.1049/PBTE051E</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>