Arama Sonuçları Software development. - Daraltılmış: Cryptology.
SirsiDynix Enterprise
https://katalog.hacettepe.edu.tr/client/tr_TR/default_tr/default_tr/qu$003dSoftware$002bdevelopment.$0026qf$003dSUBJECT$002509Konu$002509Cryptology.$002509Cryptology.$0026ic$003dtrue$0026ps$003d300?dt=list
2026-03-22T16:57:47Z
Future Data and Security Engineering 4th International Conference, FDSE 2017, Ho Chi Minh City, Vietnam, November 29 - December 1, 2017, Proceedings
ent://SD_ILS/0/SD_ILS:612151
2026-03-22T16:57:47Z
2026-03-22T16:57:47Z
Yazar Dang, Tran Khanh. editor. Wagner, Roland. editor. Küng, Josef. editor. Thoai, Nam. editor. Takizawa, Makoto. editor.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-319-70004-5">https://doi.org/10.1007/978-3-319-70004-5</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Cyber Security Cryptography and Machine Learning First International Conference, CSCML 2017, Beer-Sheva, Israel, June 29-30, 2017, Proceedings
ent://SD_ILS/0/SD_ILS:613097
2026-03-22T16:57:47Z
2026-03-22T16:57:47Z
Yazar Dolev, Shlomi. editor. Lodha, Sachin. editor. (orcid)0000-0001-5771-4977 SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-319-60080-2">https://doi.org/10.1007/978-3-319-60080-2</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Guide to Security in SDN and NFV Challenges, Opportunities, and Applications
ent://SD_ILS/0/SD_ILS:613138
2026-03-22T16:57:47Z
2026-03-22T16:57:47Z
Yazar Zhu, Shao Ying. editor. Scott-Hayward, Sandra. editor. Jacquin, Ludovic. editor. Hill, Richard. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-319-64653-4">https://doi.org/10.1007/978-3-319-64653-4</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Mobile and Wireless Technologies 2016
ent://SD_ILS/0/SD_ILS:614789
2026-03-22T16:57:47Z
2026-03-22T16:57:47Z
Yazar Kim, Kuinam J. editor. Wattanapongsakorn, Naruemon. editor. Joukov, Nikolai. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-981-10-1409-3">https://doi.org/10.1007/978-981-10-1409-3</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Building the Infrastructure for Cloud Security A Solutions View
ent://SD_ILS/0/SD_ILS:618624
2026-03-22T16:57:47Z
2026-03-22T16:57:47Z
Yazar Yeluri, Raghuram. author. Castro-Leon, Enrique. author. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-1-4302-6146-9">https://doi.org/10.1007/978-1-4302-6146-9</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
The Privacy Engineer's Manifesto Getting from Policy to Code to QA to Value
ent://SD_ILS/0/SD_ILS:618599
2026-03-22T16:57:47Z
2026-03-22T16:57:47Z
Yazar Dennedy, Michelle. author. Fox, Jonathan. author. Finneran, Tom. author. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-1-4302-6356-2">https://doi.org/10.1007/978-1-4302-6356-2</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>