Search Results for - Narrowed by: Springer E-Book Collection - Computer science. - TEDU library - Pernul, G&uuml;nther. editor. SirsiDynix Enterprise https://catalog.tedu.edu.tr/client/tr_TR/defaulttr/defaulttr/qf$003dLOCATION$002509Lokasyon$0025091$00253ASPRINGER$002509Springer$002bE-Book$002bCollection$0026qf$003dSUBJECT$002509Konu$002509Computer$002bscience.$002509Computer$002bscience.$0026qf$003dLIBRARY$002509K$0025C3$0025BCt$0025C3$0025BCphane$0025091$00253ATEDU$002509TEDU$002blibrary$0026qf$003dAUTHOR$002509Yazar$002509Pernul$00252C$002bG$0025C3$0025BCnther.$002beditor.$002509Pernul$00252C$002bG$0025C3$0025BCnther.$002beditor.$0026ps$003d300? 2024-05-24T20:33:07Z Trust, Privacy and Security in Digital Business 15th International Conference, TrustBus 2018, Regensburg, Germany, September 5&ndash;6, 2018, Proceedings ent://SD_ILS/0/SD_ILS:222371 2024-05-24T20:33:07Z 2024-05-24T20:33:07Z Yazar&#160;Furnell, Steven. editor. (orcid)0000-0003-0984-7542<br/><a href="https://doi.org/10.1007/978-3-319-98385-1">https://doi.org/10.1007/978-3-319-98385-1</a><br/>Format:&#160;Electronic Resources<br/> Database and Expert Systems Applications 29th International Conference, DEXA 2018, Regensburg, Germany, September 3&ndash;6, 2018, Proceedings, Part II ent://SD_ILS/0/SD_ILS:222805 2024-05-24T20:33:07Z 2024-05-24T20:33:07Z Yazar&#160;Hartmann, Sven. editor.<br/><a href="https://doi.org/10.1007/978-3-319-98812-2">https://doi.org/10.1007/978-3-319-98812-2</a><br/>Format:&#160;Electronic Resources<br/> Computer Security -- ESORICS 2015 20th European Symposium on Research in Computer Security, Vienna, Austria, September 21-25, 2015, Proceedings, Part I ent://SD_ILS/0/SD_ILS:23342 2024-05-24T20:33:07Z 2024-05-24T20:33:07Z Yazar&#160;Pernul, G&uuml;nther. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-24174-6">http://dx.doi.org/10.1007/978-3-319-24174-6</a><br/>Format:&#160;Electronic Resources<br/> Computer Security -- ESORICS 2015 20th European Symposium on Research in Computer Security, Vienna, Austria, September 21-25, 2015, Proceedings, Part II ent://SD_ILS/0/SD_ILS:23343 2024-05-24T20:33:07Z 2024-05-24T20:33:07Z Yazar&#160;Pernul, G&uuml;nther. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-24177-7">http://dx.doi.org/10.1007/978-3-319-24177-7</a><br/>Format:&#160;Electronic Resources<br/> Trust, Privacy, and Security in Digital Business 11th International Conference, TrustBus 2014, Munich, Germany, September 2-3, 2014. Proceedings ent://SD_ILS/0/SD_ILS:21384 2024-05-24T20:33:07Z 2024-05-24T20:33:07Z Yazar&#160;Eckert, Claudia. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-09770-1">http://dx.doi.org/10.1007/978-3-319-09770-1</a><br/>Format:&#160;Electronic Resources<br/> Data and Applications Security and Privacy XXVIII 28th Annual IFIP WG 11.3 Working Conference, DBSec 2014, Vienna, Austria, July 14-16, 2014. Proceedings ent://SD_ILS/0/SD_ILS:24446 2024-05-24T20:33:07Z 2024-05-24T20:33:07Z Yazar&#160;Atluri, Vijay. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-43936-4">http://dx.doi.org/10.1007/978-3-662-43936-4</a><br/>Format:&#160;Electronic Resources<br/>