Arama Sonu&ccedil;lar&#305; Multimedia. - Daralt&#305;lm&#305;&#351;: Data protection. SirsiDynix Enterprise https://katalog.hacettepe.edu.tr/client/tr_TR/default_tr/default_tr/qu$003dMultimedia.$0026qf$003dSUBJECT$002509Konu$002509Data$002bprotection.$002509Data$002bprotection.$0026ps$003d300$0026isd$003dtrue?dt=list 2024-11-27T09:59:10Z Multimedia content encryption techniques and applications ent://SD_ILS/0/SD_ILS:285952 2024-11-27T09:59:10Z 2024-11-27T09:59:10Z Yazar&#160;Lian, Shiguo.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://marc.crcnetbase.com/isbn/9781420065282">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Handbook of Multimedia Information Security: Techniques and Applications ent://SD_ILS/0/SD_ILS:483348 2024-11-27T09:59:10Z 2024-11-27T09:59:10Z Yazar&#160;Singh, Amit Kumar. editor.&#160;Mohan, Anand. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-3-030-15887-3">https://doi.org/10.1007/978-3-030-15887-3</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Smart Multimedia First International Conference, ICSM 2018, Toulon, France, August 24&ndash;26, 2018, Revised Selected Papers ent://SD_ILS/0/SD_ILS:399927 2024-11-27T09:59:10Z 2024-11-27T09:59:10Z Yazar&#160;Basu, Anup. editor.&#160;Berretti, Stefano. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-3-030-04375-9">https://doi.org/10.1007/978-3-030-04375-9</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Intrusion Detection for IP-Based Multimedia Communications over Wireless Networks ent://SD_ILS/0/SD_ILS:332461 2024-11-27T09:59:10Z 2024-11-27T09:59:10Z Yazar&#160;Tang, Jin. author.&#160;Cheng, Yu. author.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE(332461.1)<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-1-4614-8996-2">http://dx.doi.org/10.1007/978-1-4614-8996-2</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Data hiding exposing concealed data in multimedia, operating systems, mobile devices and network protocols ent://SD_ILS/0/SD_ILS:147602 2024-11-27T09:59:10Z 2024-11-27T09:59:10Z Yazar&#160;Raggo, Michael T.&#160;Hosmer, Chet.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597497435">http://www.sciencedirect.com/science/book/9781597497435</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Communications and Multimedia Security 14th IFIP TC 6/TC 11 International Conference, CMS 2013, Magdeburg, Germany, September 25-26, 2013. Proceedings ent://SD_ILS/0/SD_ILS:335002 2024-11-27T09:59:10Z 2024-11-27T09:59:10Z Yazar&#160;Decker, Bart. editor.&#160;Dittmann, Jana. editor.&#160;Kraetzer, Christian. editor.&#160;Vielhauer, Claus. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE(335002.1)<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-3-642-40779-6">http://dx.doi.org/10.1007/978-3-642-40779-6</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Transactions on Data Hiding and Multimedia Security VII ent://SD_ILS/0/SD_ILS:196512 2024-11-27T09:59:10Z 2024-11-27T09:59:10Z Yazar&#160;Shi, Yun Q. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-3-642-28693-3">http://dx.doi.org/10.1007/978-3-642-28693-3</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Transactions on Data Hiding and Multimedia Security VIII Special Issue on Pattern Recognition for IT Security ent://SD_ILS/0/SD_ILS:197164 2024-11-27T09:59:10Z 2024-11-27T09:59:10Z Yazar&#160;Shi, Yun Q. editor.&#160;Katzenbeisser, Stefan. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-3-642-31971-6">http://dx.doi.org/10.1007/978-3-642-31971-6</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Communications and Multimedia Security 13th IFIP TC 6/TC 11 International Conference, CMS 2012, Canterbury, UK, September 3-5, 2012. Proceedings ent://SD_ILS/0/SD_ILS:197280 2024-11-27T09:59:10Z 2024-11-27T09:59:10Z Yazar&#160;Decker, Bart. editor.&#160;Chadwick, David W. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-3-642-32805-3">http://dx.doi.org/10.1007/978-3-642-32805-3</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Transactions on Data Hiding and Multimedia Security VI ent://SD_ILS/0/SD_ILS:195673 2024-11-27T09:59:10Z 2024-11-27T09:59:10Z Yazar&#160;Shi, Yun Q. editor.&#160;Emmanuel, Sabu. editor.&#160;Kankanhalli, Mohan S. editor.&#160;Chang, Shih-Fu. editor.&#160;Radhakrishnan, Regunathan. editor.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-3-642-24556-5">http://dx.doi.org/10.1007/978-3-642-24556-5</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Transactions on Data Hiding and Multimedia Security V ent://SD_ILS/0/SD_ILS:192607 2024-11-27T09:59:10Z 2024-11-27T09:59:10Z Yazar&#160;Shi, Yun Q. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-3-642-14298-7">http://dx.doi.org/10.1007/978-3-642-14298-7</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Transactions on Data Hiding and Multimedia Security IV ent://SD_ILS/0/SD_ILS:190112 2024-11-27T09:59:10Z 2024-11-27T09:59:10Z Yazar&#160;Shi, Yun Q. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-3-642-01757-5">http://dx.doi.org/10.1007/978-3-642-01757-5</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Transactions on Data Hiding and Multimedia Security III ent://SD_ILS/0/SD_ILS:185689 2024-11-27T09:59:10Z 2024-11-27T09:59:10Z Yazar&#160;Shi, Yun Q. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-3-540-69019-1">http://dx.doi.org/10.1007/978-3-540-69019-1</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Transactions on Data Hiding and Multimedia Security II ent://SD_ILS/0/SD_ILS:186739 2024-11-27T09:59:10Z 2024-11-27T09:59:10Z Yazar&#160;Shi, Yun Q. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-3-540-73092-7">http://dx.doi.org/10.1007/978-3-540-73092-7</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Digital watermarking and steganography ent://SD_ILS/0/SD_ILS:146474 2024-11-27T09:59:10Z 2024-11-27T09:59:10Z Yazar&#160;Cox, I. J. (Ingemar J.)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780123725851">http://www.sciencedirect.com/science/book/9780123725851</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Digital watermarking ent://SD_ILS/0/SD_ILS:253889 2024-11-27T09:59:10Z 2024-11-27T09:59:10Z Yazar&#160;Cox, I. J. (Ingemar J.)&#160;Miller, Matthew L.&#160;Bloom, Jeffrey A. (Jeffrey Adam), 1964-<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781558607149">http://www.sciencedirect.com/science/book/9781558607149</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Introductory Computer Forensics A Hands-on Practical Approach ent://SD_ILS/0/SD_ILS:398966 2024-11-27T09:59:10Z 2024-11-27T09:59:10Z Yazar&#160;Lin, Xiaodong. author.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-3-030-00581-8">https://doi.org/10.1007/978-3-030-00581-8</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Smart Mobile Apps Mit Business-Apps ins Zeitalter mobiler Gesch&auml;ftsprozesse ent://SD_ILS/0/SD_ILS:194966 2024-11-27T09:59:10Z 2024-11-27T09:59:10Z Yazar&#160;Verclas, Stephan. editor.&#160;Linnhoff-Popien, Claudia. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-3-642-22259-7">http://dx.doi.org/10.1007/978-3-642-22259-7</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> E-Business and Telecommunications International Joint Conference, ICETE 2011, Seville, Spain, July 18-21, 2011, Revised Selected Papers ent://SD_ILS/0/SD_ILS:197636 2024-11-27T09:59:10Z 2024-11-27T09:59:10Z Yazar&#160;Obaidat, Mohammad S. editor.&#160;Sevillano, Jos&eacute; L. editor.&#160;Filipe, Joaquim. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-3-642-35755-8">http://dx.doi.org/10.1007/978-3-642-35755-8</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Apple's iPad im Enterprise-Einsatz Einsatzm&ouml;glichkeiten, Programmierung, Betrieb und Sicherheit im Unternehmen ent://SD_ILS/0/SD_ILS:192969 2024-11-27T09:59:10Z 2024-11-27T09:59:10Z Yazar&#160;Oelmaier, Florian. author.&#160;H&ouml;rtreiter, Jochen. author.&#160;Seitz, Andreas. author.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-3-642-15437-9">http://dx.doi.org/10.1007/978-3-642-15437-9</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> I contenuti digitali tecnologie, diritti e libert&agrave; ent://SD_ILS/0/SD_ILS:204402 2024-11-27T09:59:10Z 2024-11-27T09:59:10Z Yazar&#160;Lucchi, Nicola. author.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-88-470-1399-5">http://dx.doi.org/10.1007/978-88-470-1399-5</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/>