Search Results for - Narrowed by: Springer E-Book Collection - Data protection. - Computer Systems Organization and Communication Networks. - Computers and civilization.SirsiDynix Enterprisehttps://catalog.tedu.edu.tr/client/tr_TR/defaulttr/defaulttr/qf$003dLOCATION$002509Lokasyon$0025091$00253ASPRINGER$002509Springer$002bE-Book$002bCollection$0026qf$003dSUBJECT$002509Konu$002509Data$002bprotection.$002509Data$002bprotection.$0026qf$003dSUBJECT$002509Konu$002509Computer$002bSystems$002bOrganization$002band$002bCommunication$002bNetworks.$002509Computer$002bSystems$002bOrganization$002band$002bCommunication$002bNetworks.$0026qf$003dSUBJECT$002509Konu$002509Computers$002band$002bcivilization.$002509Computers$002band$002bcivilization.$0026ps$003d300?2024-06-14T19:09:03ZFoundations of Security, Protocols, and Equational Reasoning Essays Dedicated to Catherine A. Meadowsent://SD_ILS/0/SD_ILS:4288602024-06-14T19:09:03Z2024-06-14T19:09:03ZYazar Guttman, Joshua D. editor.<br/><a href="https://doi.org/10.1007/978-3-030-19052-1">https://doi.org/10.1007/978-3-030-19052-1</a><br/>Format: Electronic Resources<br/>Information Security Practice and Experience 15th International Conference, ISPEC 2019, Kuala Lumpur, Malaysia, November 26–28, 2019, Proceedingsent://SD_ILS/0/SD_ILS:4277972024-06-14T19:09:03Z2024-06-14T19:09:03ZYazar Heng, Swee-Huay. editor. (orcid)0000-0003-3627-2131<br/><a href="https://doi.org/10.1007/978-3-030-34339-2">https://doi.org/10.1007/978-3-030-34339-2</a><br/>Format: Electronic Resources<br/>