Search Results for - Narrowed by: Springer E-Book Collection - Theory of Computation. - Information theory. - Security. SirsiDynix Enterprise https://catalog.tedu.edu.tr/client/tr_TR/defaulttr/defaulttr/qf$003dLOCATION$002509Lokasyon$0025091$00253ASPRINGER$002509Springer$002bE-Book$002bCollection$0026qf$003dSUBJECT$002509Konu$002509Theory$002bof$002bComputation.$002509Theory$002bof$002bComputation.$0026qf$003dSUBJECT$002509Konu$002509Information$002btheory.$002509Information$002btheory.$0026qf$003dSUBJECT$002509Konu$002509Security.$002509Security.$0026ps$003d300? 2024-06-08T23:35:16Z Risks and Security of Internet and Systems 11th International Conference, CRiSIS 2016, Roscoff, France, September 5-7, 2016, Revised Selected Papers ent://SD_ILS/0/SD_ILS:226655 2024-06-08T23:35:16Z 2024-06-08T23:35:16Z Yazar&#160;Cuppens, Fr&eacute;d&eacute;ric. editor.<br/><a href="https://doi.org/10.1007/978-3-319-54876-0">https://doi.org/10.1007/978-3-319-54876-0</a><br/>Format:&#160;Electronic Resources<br/> Principles of Security and Trust 6th International Conference, POST 2017, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2017, Uppsala, Sweden, April 22-29, 2017, Proceedings ent://SD_ILS/0/SD_ILS:223963 2024-06-08T23:35:16Z 2024-06-08T23:35:16Z Yazar&#160;Maffei, Matteo. editor.<br/><a href="https://doi.org/10.1007/978-3-662-54455-6">https://doi.org/10.1007/978-3-662-54455-6</a><br/>Format:&#160;Electronic Resources<br/>