Search Results for - Narrowed by: 2007 - Computer network architectures. - Data Structures, Cryptology and Information Theory. SirsiDynix Enterprise https://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dPUBDATE$002509Publication$002bDate$0025092007$0025092007$0026qf$003dSUBJECT$002509Subject$002509Computer$002bnetwork$002barchitectures.$002509Computer$002bnetwork$002barchitectures.$0026qf$003dSUBJECT$002509Subject$002509Data$002bStructures$00252C$002bCryptology$002band$002bInformation$002bTheory.$002509Data$002bStructures$00252C$002bCryptology$002band$002bInformation$002bTheory.$0026ps$003d300? 2024-06-25T20:16:01Z Secure Localization and Time Synchronization for Wireless Sensor and Ad Hoc Networks ent://SD_ILS/0/SD_ILS:505612 2024-06-25T20:16:01Z 2024-06-25T20:16:01Z by&#160;Poovendran, Radha. editor.<br/><a href="http://dx.doi.org/10.1007/978-0-387-46276-9">http://dx.doi.org/10.1007/978-0-387-46276-9</a><br/>Format:&#160;Electronic Resources<br/> Security for Wireless Sensor Networks ent://SD_ILS/0/SD_ILS:505628 2024-06-25T20:16:01Z 2024-06-25T20:16:01Z by&#160;Liu, Donggang. author.<br/><a href="http://dx.doi.org/10.1007/978-0-387-46781-8">http://dx.doi.org/10.1007/978-0-387-46781-8</a><br/>Format:&#160;Electronic Resources<br/> Privacy-Respecting Intrusion Detection ent://SD_ILS/0/SD_ILS:505789 2024-06-25T20:16:01Z 2024-06-25T20:16:01Z by&#160;Flegel, Ulrich. author.<br/><a href="http://dx.doi.org/10.1007/978-0-387-68254-9">http://dx.doi.org/10.1007/978-0-387-68254-9</a><br/>Format:&#160;Electronic Resources<br/> Practical Internet Security ent://SD_ILS/0/SD_ILS:504952 2024-06-25T20:16:01Z 2024-06-25T20:16:01Z by&#160;Vacca, John R. author.<br/><a href="http://dx.doi.org/10.1007/978-0-387-29844-3">http://dx.doi.org/10.1007/978-0-387-29844-3</a><br/>Format:&#160;Electronic Resources<br/> Network Security Policies and Procedures ent://SD_ILS/0/SD_ILS:505659 2024-06-25T20:16:01Z 2024-06-25T20:16:01Z by&#160;Frye, Douglas W. author.<br/><a href="http://dx.doi.org/10.1007/978-0-387-47955-2">http://dx.doi.org/10.1007/978-0-387-47955-2</a><br/>Format:&#160;Electronic Resources<br/> Malware Detection ent://SD_ILS/0/SD_ILS:505569 2024-06-25T20:16:01Z 2024-06-25T20:16:01Z by&#160;Christodorescu, Mihai. editor.<br/><a href="http://dx.doi.org/10.1007/978-0-387-44599-1">http://dx.doi.org/10.1007/978-0-387-44599-1</a><br/>Format:&#160;Electronic Resources<br/> Synchronizing Internet Protocol Security (SIPSec) ent://SD_ILS/0/SD_ILS:505814 2024-06-25T20:16:01Z 2024-06-25T20:16:01Z by&#160;Shoniregun, Charles A. author.<br/><a href="http://dx.doi.org/10.1007/978-0-387-68569-4">http://dx.doi.org/10.1007/978-0-387-68569-4</a><br/>Format:&#160;Electronic Resources<br/> E-business and Telecommunication Networks Second International Conference, ICETE 2005, Reading, UK, October 3-7, 2005. Selected Papers ent://SD_ILS/0/SD_ILS:512950 2024-06-25T20:16:01Z 2024-06-25T20:16:01Z by&#160;Filipe, Joaquim. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-75993-5">http://dx.doi.org/10.1007/978-3-540-75993-5</a><br/>Format:&#160;Electronic Resources<br/>