Search Results for - Narrowed by: Data Structures and Information Theory. - Data protection. - Systems and Data Security. SirsiDynix Enterprise https://catalog.tedu.edu.tr/client/tr_TR/defaulttr/defaulttr/qf$003dSUBJECT$002509Konu$002509Data$002bStructures$002band$002bInformation$002bTheory.$002509Data$002bStructures$002band$002bInformation$002bTheory.$0026qf$003dSUBJECT$002509Konu$002509Data$002bprotection.$002509Data$002bprotection.$0026qf$003dSUBJECT$002509Konu$002509Systems$002band$002bData$002bSecurity.$002509Systems$002band$002bData$002bSecurity.$0026ps$003d300? 2024-06-25T20:35:16Z Introduction to Security Reduction ent://SD_ILS/0/SD_ILS:221398 2024-06-25T20:35:16Z 2024-06-25T20:35:16Z Yazar&#160;Guo, Fuchun. author.<br/><a href="https://doi.org/10.1007/978-3-319-93049-7">https://doi.org/10.1007/978-3-319-93049-7</a><br/>Format:&#160;Electronic Resources<br/> Foundations and Practice of Security 10th International Symposium, FPS 2017, Nancy, France, October 23-25, 2017, Revised Selected Papers ent://SD_ILS/0/SD_ILS:225604 2024-06-25T20:35:16Z 2024-06-25T20:35:16Z Yazar&#160;Imine, Abdessamad. editor.<br/><a href="https://doi.org/10.1007/978-3-319-75650-9">https://doi.org/10.1007/978-3-319-75650-9</a><br/>Format:&#160;Electronic Resources<br/> Smart Cards, Tokens, Security and Applications ent://SD_ILS/0/SD_ILS:225183 2024-06-25T20:35:16Z 2024-06-25T20:35:16Z Yazar&#160;Mayes, Keith. editor.<br/><a href="https://doi.org/10.1007/978-3-319-50500-8">https://doi.org/10.1007/978-3-319-50500-8</a><br/>Format:&#160;Electronic Resources<br/>