Search Results for - Narrowed by: Springer E-Book Collection - Theory of Computation. - Security. - Information theory. SirsiDynix Enterprise https://catalog.tedu.edu.tr/client/tr_TR/defaulttr/defaulttr/qf$003dLOCATION$002509Lokasyon$0025091$00253ASPRINGER$002509Springer$002bE-Book$002bCollection$0026qf$003dSUBJECT$002509Konu$002509Theory$002bof$002bComputation.$002509Theory$002bof$002bComputation.$0026qf$003dSUBJECT$002509Konu$002509Security.$002509Security.$0026qf$003dSUBJECT$002509Konu$002509Information$002btheory.$002509Information$002btheory.$0026ps$003d300? 2024-06-13T10:14:34Z Principles of Security and Trust 6th International Conference, POST 2017, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2017, Uppsala, Sweden, April 22-29, 2017, Proceedings ent://SD_ILS/0/SD_ILS:223963 2024-06-13T10:14:34Z 2024-06-13T10:14:34Z Yazar&#160;Maffei, Matteo. editor.<br/><a href="https://doi.org/10.1007/978-3-662-54455-6">https://doi.org/10.1007/978-3-662-54455-6</a><br/>Format:&#160;Electronic Resources<br/> Risks and Security of Internet and Systems 11th International Conference, CRiSIS 2016, Roscoff, France, September 5-7, 2016, Revised Selected Papers ent://SD_ILS/0/SD_ILS:226655 2024-06-13T10:14:34Z 2024-06-13T10:14:34Z Yazar&#160;Cuppens, Fr&eacute;d&eacute;ric. editor.<br/><a href="https://doi.org/10.1007/978-3-319-54876-0">https://doi.org/10.1007/978-3-319-54876-0</a><br/>Format:&#160;Electronic Resources<br/>