Search Results for Computer security. - Narrowed by: Electronics and Microelectronics, Instrumentation.SirsiDynix Enterprisehttps://catalog.tedu.edu.tr/client/tr_TR/defaulttr/defaulttr/qu$003dComputer$002bsecurity.$0026qf$003dSUBJECT$002509Konu$002509Electronics$002band$002bMicroelectronics$00252C$002bInstrumentation.$002509Electronics$002band$002bMicroelectronics$00252C$002bInstrumentation.$0026ps$003d300?2024-06-16T18:41:01ZGroup-target Trackingent://SD_ILS/0/SD_ILS:2269612024-06-16T18:41:01Z2024-06-16T18:41:01ZYazar Geng, Wen-dong. author.<br/><a href="https://doi.org/10.1007/978-981-10-1888-6">https://doi.org/10.1007/978-981-10-1888-6</a><br/>Format: Electronic Resources<br/>Secure System Design and Trustable Computingent://SD_ILS/0/SD_ILS:165212024-06-16T18:41:01Z2024-06-16T18:41:01ZYazar Chang, Chip-Hong. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-14971-4">http://dx.doi.org/10.1007/978-3-319-14971-4</a><br/>Format: Electronic Resources<br/>Trusted Computing for Embedded Systemsent://SD_ILS/0/SD_ILS:213332024-06-16T18:41:01Z2024-06-16T18:41:01ZYazar Candaele, Bernard. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-09420-5">http://dx.doi.org/10.1007/978-3-319-09420-5</a><br/>Format: Electronic Resources<br/>The Hardware Trojan War Attacks, Myths, and Defensesent://SD_ILS/0/SD_ILS:2233192024-06-16T18:41:01Z2024-06-16T18:41:01ZYazar Bhunia, Swarup. editor.<br/><a href="https://doi.org/10.1007/978-3-319-68511-3">https://doi.org/10.1007/978-3-319-68511-3</a><br/>Format: Electronic Resources<br/>Hardware IP Security and Trustent://SD_ILS/0/SD_ILS:2221512024-06-16T18:41:01Z2024-06-16T18:41:01ZYazar Mishra, Prabhat. editor.<br/><a href="https://doi.org/10.1007/978-3-319-49025-0">https://doi.org/10.1007/978-3-319-49025-0</a><br/>Format: Electronic Resources<br/>Hardware Security and Trust Design and Deployment of Integrated Circuits in a Threatened Environmentent://SD_ILS/0/SD_ILS:2235252024-06-16T18:41:01Z2024-06-16T18:41:01ZYazar Sklavos, Nicolas. editor.<br/><a href="https://doi.org/10.1007/978-3-319-44318-8">https://doi.org/10.1007/978-3-319-44318-8</a><br/>Format: Electronic Resources<br/>Sensors and Image Processing Proceedings of CSI 2015ent://SD_ILS/0/SD_ILS:2212992024-06-16T18:41:01Z2024-06-16T18:41:01ZYazar Urooj, Shabana. editor.<br/><a href="https://doi.org/10.1007/978-981-10-6614-6">https://doi.org/10.1007/978-981-10-6614-6</a><br/>Format: Electronic Resources<br/>Innovations and Advances in Computing, Informatics, Systems Sciences, Networking and Engineeringent://SD_ILS/0/SD_ILS:208822024-06-16T18:41:01Z2024-06-16T18:41:01ZYazar Sobh, Tarek. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-06773-5">http://dx.doi.org/10.1007/978-3-319-06773-5</a><br/>Format: Electronic Resources<br/>