Search Results for Computer security. - Narrowed by: Computer System Implementation. - Computer system failures. SirsiDynix Enterprise https://catalog.tedu.edu.tr/client/tr_TR/defaulttr/defaulttr/qu$003dComputer$002bsecurity.$0026qf$003dSUBJECT$002509Konu$002509Computer$002bSystem$002bImplementation.$002509Computer$002bSystem$002bImplementation.$0026qf$003dSUBJECT$002509Konu$002509Computer$002bsystem$002bfailures.$002509Computer$002bsystem$002bfailures.$0026ps$003d300$0026isd$003dtrue? 2024-07-23T10:46:55Z Trustworthy Computing and Services International Conference, ISCTCS 2014, Beijing, China, November 28-29, 2014, Revised Selected papers ent://SD_ILS/0/SD_ILS:24825 2024-07-23T10:46:55Z 2024-07-23T10:46:55Z Yazar&#160;Yueming, Lu. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-47401-3">http://dx.doi.org/10.1007/978-3-662-47401-3</a><br/>Format:&#160;Electronic Resources<br/> Embedded Computer Systems: Architectures, Modeling, and Simulation 19th International Conference, SAMOS 2019, Samos, Greece, July 7&ndash;11, 2019, Proceedings ent://SD_ILS/0/SD_ILS:427713 2024-07-23T10:46:55Z 2024-07-23T10:46:55Z Yazar&#160;Pnevmatikatos, Dionisios N. editor.<br/><a href="https://doi.org/10.1007/978-3-030-27562-4">https://doi.org/10.1007/978-3-030-27562-4</a><br/>Format:&#160;Electronic Resources<br/>