Search Results for Engineering. - Narrowed by: Chaki, Nabendu. editor. - Chaki, Rituparna. editor.SirsiDynix Enterprisehttps://catalog.tedu.edu.tr/client/tr_TR/defaulttr/defaulttr/qu$003dEngineering.$0026qf$003dAUTHOR$002509Yazar$002509Chaki$00252C$002bNabendu.$002beditor.$002509Chaki$00252C$002bNabendu.$002beditor.$0026qf$003dAUTHOR$002509Yazar$002509Chaki$00252C$002bRituparna.$002beditor.$002509Chaki$00252C$002bRituparna.$002beditor.$0026ps$003d300?2024-08-03T06:23:04ZApplied Computation and Security Systems Volume Twoent://SD_ILS/0/SD_ILS:250682024-08-03T06:23:04Z2024-08-03T06:23:04ZYazar Chaki, Rituparna. editor.<br/><a href="http://dx.doi.org/10.1007/978-81-322-1988-0">http://dx.doi.org/10.1007/978-81-322-1988-0</a><br/>Format: Electronic Resources<br/>Applied Computation and Security Systems Volume Oneent://SD_ILS/0/SD_ILS:250672024-08-03T06:23:04Z2024-08-03T06:23:04ZYazar Chaki, Rituparna. editor.<br/><a href="http://dx.doi.org/10.1007/978-81-322-1985-9">http://dx.doi.org/10.1007/978-81-322-1985-9</a><br/>Format: Electronic Resources<br/>Advanced Computing and Systems for Security Volume Sixent://SD_ILS/0/SD_ILS:2223312024-08-03T06:23:04Z2024-08-03T06:23:04ZYazar Chaki, Rituparna. editor.<br/><a href="https://doi.org/10.1007/978-981-10-8183-5">https://doi.org/10.1007/978-981-10-8183-5</a><br/>Format: Electronic Resources<br/>Advanced Computing and Systems for Security Volume Fiveent://SD_ILS/0/SD_ILS:2237172024-08-03T06:23:04Z2024-08-03T06:23:04ZYazar Chaki, Rituparna. editor.<br/><a href="https://doi.org/10.1007/978-981-10-8180-4">https://doi.org/10.1007/978-981-10-8180-4</a><br/>Format: Electronic Resources<br/>Advanced Computing and Systems for Security Volume Fourent://SD_ILS/0/SD_ILS:2269122024-08-03T06:23:04Z2024-08-03T06:23:04ZYazar Chaki, Rituparna. editor.<br/><a href="https://doi.org/10.1007/978-981-10-3391-9">https://doi.org/10.1007/978-981-10-3391-9</a><br/>Format: Electronic Resources<br/>Advanced Computing and Systems for Security Volume Threeent://SD_ILS/0/SD_ILS:2248192024-08-03T06:23:04Z2024-08-03T06:23:04ZYazar Chaki, Rituparna. editor.<br/><a href="https://doi.org/10.1007/978-981-10-3409-1">https://doi.org/10.1007/978-981-10-3409-1</a><br/>Format: Electronic Resources<br/>Advanced Computing and Systems for Security Volume 1ent://SD_ILS/0/SD_ILS:187732024-08-03T06:23:04Z2024-08-03T06:23:04ZYazar Chaki, Rituparna. editor.<br/><a href="http://dx.doi.org/10.1007/978-81-322-2650-5">http://dx.doi.org/10.1007/978-81-322-2650-5</a><br/>Format: Electronic Resources<br/>Advanced Computing and Systems for Security Volume 2ent://SD_ILS/0/SD_ILS:187742024-08-03T06:23:04Z2024-08-03T06:23:04ZYazar Chaki, Rituparna. editor.<br/><a href="http://dx.doi.org/10.1007/978-81-322-2653-6">http://dx.doi.org/10.1007/978-81-322-2653-6</a><br/>Format: Electronic Resources<br/>