Search Results for - Narrowed by: Springer E-Book Collection - Chaki, Rituparna. editor. - Chaki, Nabendu. editor. - Electronic BookSirsiDynix Enterprisehttps://catalog.tedu.edu.tr/client/tr_TR/defaulttr/defaulttr/qf$003dLOCATION$002509Lokasyon$0025091$00253ASPRINGER$002509Springer$002bE-Book$002bCollection$0026qf$003dAUTHOR$002509Yazar$002509Chaki$00252C$002bRituparna.$002beditor.$002509Chaki$00252C$002bRituparna.$002beditor.$0026qf$003dAUTHOR$002509Yazar$002509Chaki$00252C$002bNabendu.$002beditor.$002509Chaki$00252C$002bNabendu.$002beditor.$0026qf$003dITYPE$002509Materyal$002bT$0025C3$0025BCr$0025C3$0025BC$0025091$00253AE-BOOKS$002509Electronic$002bBook$0026ps$003d300?2024-06-09T17:45:18ZAdvanced Computing and Systems for Security Volume Sixent://SD_ILS/0/SD_ILS:2223312024-06-09T17:45:18Z2024-06-09T17:45:18ZYazar Chaki, Rituparna. editor.<br/><a href="https://doi.org/10.1007/978-981-10-8183-5">https://doi.org/10.1007/978-981-10-8183-5</a><br/>Format: Electronic Resources<br/>Advanced Computing and Systems for Security Volume Fiveent://SD_ILS/0/SD_ILS:2237172024-06-09T17:45:18Z2024-06-09T17:45:18ZYazar Chaki, Rituparna. editor.<br/><a href="https://doi.org/10.1007/978-981-10-8180-4">https://doi.org/10.1007/978-981-10-8180-4</a><br/>Format: Electronic Resources<br/>Advanced Computing and Systems for Security Volume Threeent://SD_ILS/0/SD_ILS:2248192024-06-09T17:45:18Z2024-06-09T17:45:18ZYazar Chaki, Rituparna. editor.<br/><a href="https://doi.org/10.1007/978-981-10-3409-1">https://doi.org/10.1007/978-981-10-3409-1</a><br/>Format: Electronic Resources<br/>Advanced Computing and Systems for Security Volume Fourent://SD_ILS/0/SD_ILS:2269122024-06-09T17:45:18Z2024-06-09T17:45:18ZYazar Chaki, Rituparna. editor.<br/><a href="https://doi.org/10.1007/978-981-10-3391-9">https://doi.org/10.1007/978-981-10-3391-9</a><br/>Format: Electronic Resources<br/>Advanced Computing and Systems for Security Volume 1ent://SD_ILS/0/SD_ILS:187732024-06-09T17:45:18Z2024-06-09T17:45:18ZYazar Chaki, Rituparna. editor.<br/><a href="http://dx.doi.org/10.1007/978-81-322-2650-5">http://dx.doi.org/10.1007/978-81-322-2650-5</a><br/>Format: Electronic Resources<br/>Advanced Computing and Systems for Security Volume 2ent://SD_ILS/0/SD_ILS:187742024-06-09T17:45:18Z2024-06-09T17:45:18ZYazar Chaki, Rituparna. editor.<br/><a href="http://dx.doi.org/10.1007/978-81-322-2653-6">http://dx.doi.org/10.1007/978-81-322-2653-6</a><br/>Format: Electronic Resources<br/>Applied Computation and Security Systems Volume Oneent://SD_ILS/0/SD_ILS:250672024-06-09T17:45:18Z2024-06-09T17:45:18ZYazar Chaki, Rituparna. editor.<br/><a href="http://dx.doi.org/10.1007/978-81-322-1985-9">http://dx.doi.org/10.1007/978-81-322-1985-9</a><br/>Format: Electronic Resources<br/>Applied Computation and Security Systems Volume Twoent://SD_ILS/0/SD_ILS:250682024-06-09T17:45:18Z2024-06-09T17:45:18ZYazar Chaki, Rituparna. editor.<br/><a href="http://dx.doi.org/10.1007/978-81-322-1988-0">http://dx.doi.org/10.1007/978-81-322-1988-0</a><br/>Format: Electronic Resources<br/>