Search Results for - Narrowed by: Springer E-Book Collection - IT in Business. - Computer security. - Computer communication systems. SirsiDynix Enterprise https://catalog.tedu.edu.tr/client/tr_TR/defaulttr/defaulttr/qf$003dLOCATION$002509Lokasyon$0025091$00253ASPRINGER$002509Springer$002bE-Book$002bCollection$0026qf$003dSUBJECT$002509Konu$002509IT$002bin$002bBusiness.$002509IT$002bin$002bBusiness.$0026qf$003dSUBJECT$002509Konu$002509Computer$002bsecurity.$002509Computer$002bsecurity.$0026qf$003dSUBJECT$002509Konu$002509Computer$002bcommunication$002bsystems.$002509Computer$002bcommunication$002bsystems.$0026ps$003d300? 2024-05-25T13:55:28Z Information and Communication Technology Third IFIP TC 5/8 International Conference, ICT-EurAsia 2015, and 9th IFIP WG 8.9 Working Conference, CONFENIS 2015, Held as Part of WCC 2015, Daejeon, Korea, October 4-7, 2015, Proceedings ent://SD_ILS/0/SD_ILS:23360 2024-05-25T13:55:28Z 2024-05-25T13:55:28Z Yazar&#160;Khalil, Ismail. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-24315-3">http://dx.doi.org/10.1007/978-3-319-24315-3</a><br/>Format:&#160;Electronic Resources<br/> Secure and Trustworthy Service Composition The Aniketos Approach ent://SD_ILS/0/SD_ILS:22098 2024-05-25T13:55:28Z 2024-05-25T13:55:28Z Yazar&#160;Brucker, Achim D. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-13518-2">http://dx.doi.org/10.1007/978-3-319-13518-2</a><br/>Format:&#160;Electronic Resources<br/>