Search Results for Bluetooth technology. - Narrowed by: Computer security.SirsiDynix Enterprisehttp://katalog.baskent.edu.tr/client/en_US/default/default/qu$003dBluetooth$002btechnology.$0026qf$003dSUBJECT$002509Subject$002509Computer$002bsecurity.$002509Computer$002bsecurity.$0026ps$003d300?dt=list2026-04-30T10:55:13ZBluetooth securityent://SD_ILS/0/SD_ILS:9310092026-04-30T10:55:13Z2026-04-30T10:55:13Zby Gehrmann, Christian.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=227650">Click to View</a><br/>Format: Electronic Resources<br/>Meeting people via WiFi and Bluetoothent://SD_ILS/0/SD_ILS:11045672026-04-30T10:55:13Z2026-04-30T10:55:13Zby Schroeder, Joshua, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4189280">Click to View</a><br/>Format: Electronic Resources<br/>Proceedings of the International Conference on Data Engineering and Communication Technology ICDECT 2016, Volume 1ent://SD_ILS/0/SD_ILS:4815782026-04-30T10:55:13Z2026-04-30T10:55:13Zby Satapathy, Suresh Chandra. editor.<br/><a href="http://dx.doi.org/10.1007/978-981-10-1675-2">http://dx.doi.org/10.1007/978-981-10-1675-2</a><br/>Format: Electronic Resources<br/>Proceedings of the International Conference on Data Engineering and Communication Technology ICDECT 2016, Volume 2ent://SD_ILS/0/SD_ILS:4815792026-04-30T10:55:13Z2026-04-30T10:55:13Zby Satapathy, Suresh Chandra. editor.<br/><a href="http://dx.doi.org/10.1007/978-981-10-1678-3">http://dx.doi.org/10.1007/978-981-10-1678-3</a><br/>Format: Electronic Resources<br/>