Search Results for - Narrowed by: Electronic Book - TEDU library - Biometrics. - Data encryption (Computer science).SirsiDynix Enterprisehttps://catalog.tedu.edu.tr/client/tr_TR/defaulttr/defaulttr/qf$003dITYPE$002509Materyal$002bT$0025C3$0025BCr$0025C3$0025BC$0025091$00253AE-BOOKS$002509Electronic$002bBook$0026qf$003dLIBRARY$002509K$0025C3$0025BCt$0025C3$0025BCphane$0025091$00253ATEDU$002509TEDU$002blibrary$0026qf$003dSUBJECT$002509Konu$002509Biometrics.$002509Biometrics.$0026qf$003dSUBJECT$002509Konu$002509Data$002bencryption$002b$002528Computer$002bscience$002529.$002509Data$002bencryption$002b$002528Computer$002bscience$002529.$0026ps$003d300?2024-06-30T17:00:36ZFundamental Computing Forensics for Africa A Case Study of the Science in Nigeriaent://SD_ILS/0/SD_ILS:2249902024-06-30T17:00:36Z2024-06-30T17:00:36ZYazar Iorliam, Aamo. author.<br/><a href="https://doi.org/10.1007/978-3-319-94499-9">https://doi.org/10.1007/978-3-319-94499-9</a><br/>Format: Electronic Resources<br/>Animal Biometrics Techniques and Applicationsent://SD_ILS/0/SD_ILS:2248412024-06-30T17:00:36Z2024-06-30T17:00:36ZYazar Kumar, Santosh. author.<br/><a href="https://doi.org/10.1007/978-981-10-7956-6">https://doi.org/10.1007/978-981-10-7956-6</a><br/>Format: Electronic Resources<br/>Foundations and Practice of Security 9th International Symposium, FPS 2016, Québec City, QC, Canada, October 24-25, 2016, Revised Selected Papersent://SD_ILS/0/SD_ILS:2223892024-06-30T17:00:36Z2024-06-30T17:00:36ZYazar Cuppens, Frédéric. editor.<br/><a href="https://doi.org/10.1007/978-3-319-51966-1">https://doi.org/10.1007/978-3-319-51966-1</a><br/>Format: Electronic Resources<br/>Foundations and Practice of Security 8th International Symposium, FPS 2015, Clermont-Ferrand, France, October 26-28, 2015, Revised Selected Papersent://SD_ILS/0/SD_ILS:174892024-06-30T17:00:36Z2024-06-30T17:00:36ZYazar Garcia-Alfaro, Joaquin. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-30303-1">http://dx.doi.org/10.1007/978-3-319-30303-1</a><br/>Format: Electronic Resources<br/>Secure IT Systems 20th Nordic Conference, NordSec 2015, Stockholm, Sweden, October 19–21, 2015, Proceedingsent://SD_ILS/0/SD_ILS:235302024-06-30T17:00:36Z2024-06-30T17:00:36ZYazar Buchegger, Sonja. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-26502-5">http://dx.doi.org/10.1007/978-3-319-26502-5</a><br/>Format: Electronic Resources<br/>Digital-Forensics and Watermarking 13th International Workshop, IWDW 2014, Taipei, Taiwan, October 1-4, 2014. Revised Selected Papersent://SD_ILS/0/SD_ILS:229242024-06-30T17:00:36Z2024-06-30T17:00:36ZYazar Shi, Yun-Qing. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-19321-2">http://dx.doi.org/10.1007/978-3-319-19321-2</a><br/>Format: Electronic Resources<br/>Communications and Multimedia Security 15th IFIP TC 6/TC 11 International Conference, CMS 2014, Aveiro, Portugal, September 25-26, 2014. Proceedingsent://SD_ILS/0/SD_ILS:245732024-06-30T17:00:36Z2024-06-30T17:00:36ZYazar Decker, Bart De. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-44885-4">http://dx.doi.org/10.1007/978-3-662-44885-4</a><br/>Format: Electronic Resources<br/>Secure IT Systems 19th Nordic Conference, NordSec 2014, Tromsø, Norway, October 15-17, 2014, Proceedingsent://SD_ILS/0/SD_ILS:217422024-06-30T17:00:36Z2024-06-30T17:00:36ZYazar Bernsmed, Karin. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-11599-3">http://dx.doi.org/10.1007/978-3-319-11599-3</a><br/>Format: Electronic Resources<br/>