Arama Sonuçları Multimedia systems. - Daraltılmış: Data protection.
SirsiDynix Enterprise
https://katalog.hacettepe.edu.tr/client/tr_TR/default_tr/default_tr/qu$003dMultimedia$002bsystems.$0026qf$003dSUBJECT$002509Konu$002509Data$002bprotection.$002509Data$002bprotection.$0026ps$003d300?dt=list
2024-11-22T08:43:54Z
Data hiding exposing concealed data in multimedia, operating systems, mobile devices and network protocols
ent://SD_ILS/0/SD_ILS:147602
2024-11-22T08:43:54Z
2024-11-22T08:43:54Z
Yazar Raggo, Michael T. Hosmer, Chet.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597497435">http://www.sciencedirect.com/science/book/9781597497435</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Digital watermarking and steganography
ent://SD_ILS/0/SD_ILS:146474
2024-11-22T08:43:54Z
2024-11-22T08:43:54Z
Yazar Cox, I. J. (Ingemar J.)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780123725851">http://www.sciencedirect.com/science/book/9780123725851</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Digital watermarking
ent://SD_ILS/0/SD_ILS:253889
2024-11-22T08:43:54Z
2024-11-22T08:43:54Z
Yazar Cox, I. J. (Ingemar J.) Miller, Matthew L. Bloom, Jeffrey A. (Jeffrey Adam), 1964-<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781558607149">http://www.sciencedirect.com/science/book/9781558607149</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Handbook of Multimedia Information Security: Techniques and Applications
ent://SD_ILS/0/SD_ILS:483348
2024-11-22T08:43:54Z
2024-11-22T08:43:54Z
Yazar Singh, Amit Kumar. editor. Mohan, Anand. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-030-15887-3">https://doi.org/10.1007/978-3-030-15887-3</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Introductory Computer Forensics A Hands-on Practical Approach
ent://SD_ILS/0/SD_ILS:398966
2024-11-22T08:43:54Z
2024-11-22T08:43:54Z
Yazar Lin, Xiaodong. author. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-030-00581-8">https://doi.org/10.1007/978-3-030-00581-8</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
E-Business and Telecommunications International Joint Conference, ICETE 2011, Seville, Spain, July 18-21, 2011, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:197636
2024-11-22T08:43:54Z
2024-11-22T08:43:54Z
Yazar Obaidat, Mohammad S. editor. Sevillano, José L. editor. Filipe, Joaquim. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-35755-8">http://dx.doi.org/10.1007/978-3-642-35755-8</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Smart Mobile Apps Mit Business-Apps ins Zeitalter mobiler Geschäftsprozesse
ent://SD_ILS/0/SD_ILS:194966
2024-11-22T08:43:54Z
2024-11-22T08:43:54Z
Yazar Verclas, Stephan. editor. Linnhoff-Popien, Claudia. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-22259-7">http://dx.doi.org/10.1007/978-3-642-22259-7</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Apple's iPad im Enterprise-Einsatz Einsatzmöglichkeiten, Programmierung, Betrieb und Sicherheit im Unternehmen
ent://SD_ILS/0/SD_ILS:192969
2024-11-22T08:43:54Z
2024-11-22T08:43:54Z
Yazar Oelmaier, Florian. author. Hörtreiter, Jochen. author. Seitz, Andreas. author. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-15437-9">http://dx.doi.org/10.1007/978-3-642-15437-9</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
I contenuti digitali tecnologie, diritti e libertà
ent://SD_ILS/0/SD_ILS:204402
2024-11-22T08:43:54Z
2024-11-22T08:43:54Z
Yazar Lucchi, Nicola. author. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-88-470-1399-5">http://dx.doi.org/10.1007/978-88-470-1399-5</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Transactions on Data Hiding and Multimedia Security IV
ent://SD_ILS/0/SD_ILS:190112
2024-11-22T08:43:54Z
2024-11-22T08:43:54Z
Yazar Shi, Yun Q. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-01757-5">http://dx.doi.org/10.1007/978-3-642-01757-5</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Transactions on Data Hiding and Multimedia Security III
ent://SD_ILS/0/SD_ILS:185689
2024-11-22T08:43:54Z
2024-11-22T08:43:54Z
Yazar Shi, Yun Q. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-540-69019-1">http://dx.doi.org/10.1007/978-3-540-69019-1</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Multimedia content encryption techniques and applications
ent://SD_ILS/0/SD_ILS:285952
2024-11-22T08:43:54Z
2024-11-22T08:43:54Z
Yazar Lian, Shiguo.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://marc.crcnetbase.com/isbn/9781420065282">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Transactions on Data Hiding and Multimedia Security II
ent://SD_ILS/0/SD_ILS:186739
2024-11-22T08:43:54Z
2024-11-22T08:43:54Z
Yazar Shi, Yun Q. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-540-73092-7">http://dx.doi.org/10.1007/978-3-540-73092-7</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>