Search Results for - Narrowed by: Springer E-Book Collection - IT in Business. - Computer security. - Computer communication systems.SirsiDynix Enterprisehttps://catalog.tedu.edu.tr/client/tr_TR/defaulttr/defaulttr/qf$003dLOCATION$002509Lokasyon$0025091$00253ASPRINGER$002509Springer$002bE-Book$002bCollection$0026qf$003dSUBJECT$002509Konu$002509IT$002bin$002bBusiness.$002509IT$002bin$002bBusiness.$0026qf$003dSUBJECT$002509Konu$002509Computer$002bsecurity.$002509Computer$002bsecurity.$0026qf$003dSUBJECT$002509Konu$002509Computer$002bcommunication$002bsystems.$002509Computer$002bcommunication$002bsystems.$0026ps$003d300?2024-05-25T13:55:28ZInformation and Communication Technology Third IFIP TC 5/8 International Conference, ICT-EurAsia 2015, and 9th IFIP WG 8.9 Working Conference, CONFENIS 2015, Held as Part of WCC 2015, Daejeon, Korea, October 4-7, 2015, Proceedingsent://SD_ILS/0/SD_ILS:233602024-05-25T13:55:28Z2024-05-25T13:55:28ZYazar Khalil, Ismail. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-24315-3">http://dx.doi.org/10.1007/978-3-319-24315-3</a><br/>Format: Electronic Resources<br/>Secure and Trustworthy Service Composition The Aniketos Approachent://SD_ILS/0/SD_ILS:220982024-05-25T13:55:28Z2024-05-25T13:55:28ZYazar Brucker, Achim D. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-13518-2">http://dx.doi.org/10.1007/978-3-319-13518-2</a><br/>Format: Electronic Resources<br/>