Search Results for - Narrowed by: Springer E-Book Collection - Chaki, Rituparna. editor.SirsiDynix Enterprisehttps://catalog.tedu.edu.tr/client/tr_TR/defaulttr/defaulttr/qf$003dLOCATION$002509Lokasyon$0025091$00253ASPRINGER$002509Springer$002bE-Book$002bCollection$0026qf$003dAUTHOR$002509Yazar$002509Chaki$00252C$002bRituparna.$002beditor.$002509Chaki$00252C$002bRituparna.$002beditor.$0026ps$003d300?2024-04-29T04:05:11ZAdvanced Computing and Systems for Security Volume Fiveent://SD_ILS/0/SD_ILS:2237172024-04-29T04:05:11Z2024-04-29T04:05:11ZYazar Chaki, Rituparna. editor.<br/><a href="https://doi.org/10.1007/978-981-10-8180-4">https://doi.org/10.1007/978-981-10-8180-4</a><br/>Format: Electronic Resources<br/>Advanced Computing and Systems for Security Volume Sixent://SD_ILS/0/SD_ILS:2223312024-04-29T04:05:11Z2024-04-29T04:05:11ZYazar Chaki, Rituparna. editor.<br/><a href="https://doi.org/10.1007/978-981-10-8183-5">https://doi.org/10.1007/978-981-10-8183-5</a><br/>Format: Electronic Resources<br/>Advanced Computing and Systems for Security Volume Threeent://SD_ILS/0/SD_ILS:2248192024-04-29T04:05:11Z2024-04-29T04:05:11ZYazar Chaki, Rituparna. editor.<br/><a href="https://doi.org/10.1007/978-981-10-3409-1">https://doi.org/10.1007/978-981-10-3409-1</a><br/>Format: Electronic Resources<br/>Computer Information Systems and Industrial Management 16th IFIP TC8 International Conference, CISIM 2017, Bialystok, Poland, June 16-18, 2017, Proceedingsent://SD_ILS/0/SD_ILS:2261572024-04-29T04:05:11Z2024-04-29T04:05:11ZYazar Saeed, Khalid. editor.<br/><a href="https://doi.org/10.1007/978-3-319-59105-6">https://doi.org/10.1007/978-3-319-59105-6</a><br/>Format: Electronic Resources<br/>Advanced Computing and Systems for Security Volume Fourent://SD_ILS/0/SD_ILS:2269122024-04-29T04:05:11Z2024-04-29T04:05:11ZYazar Chaki, Rituparna. editor.<br/><a href="https://doi.org/10.1007/978-981-10-3391-9">https://doi.org/10.1007/978-981-10-3391-9</a><br/>Format: Electronic Resources<br/>Advanced Computing and Systems for Security Volume 1ent://SD_ILS/0/SD_ILS:187732024-04-29T04:05:11Z2024-04-29T04:05:11ZYazar Chaki, Rituparna. editor.<br/><a href="http://dx.doi.org/10.1007/978-81-322-2650-5">http://dx.doi.org/10.1007/978-81-322-2650-5</a><br/>Format: Electronic Resources<br/>Advanced Computing and Systems for Security Volume 2ent://SD_ILS/0/SD_ILS:187742024-04-29T04:05:11Z2024-04-29T04:05:11ZYazar Chaki, Rituparna. editor.<br/><a href="http://dx.doi.org/10.1007/978-81-322-2653-6">http://dx.doi.org/10.1007/978-81-322-2653-6</a><br/>Format: Electronic Resources<br/>Applied Computation and Security Systems Volume Oneent://SD_ILS/0/SD_ILS:250672024-04-29T04:05:11Z2024-04-29T04:05:11ZYazar Chaki, Rituparna. editor.<br/><a href="http://dx.doi.org/10.1007/978-81-322-1985-9">http://dx.doi.org/10.1007/978-81-322-1985-9</a><br/>Format: Electronic Resources<br/>Applied Computation and Security Systems Volume Twoent://SD_ILS/0/SD_ILS:250682024-04-29T04:05:11Z2024-04-29T04:05:11ZYazar Chaki, Rituparna. editor.<br/><a href="http://dx.doi.org/10.1007/978-81-322-1988-0">http://dx.doi.org/10.1007/978-81-322-1988-0</a><br/>Format: Electronic Resources<br/>