Log In
|
My Account
|
My Lists
|
|
Remember to clear the cache and close the browser window.
Search Limit
Everything
E-Kitap
Dergiler
Beytepe Kütüphanesi
Sağlık Bilimleri Kütüphanesi
Konservatuvar Kütüphanesi
Hukuk Kütüphanesi
Sosyal Bilimler Meslek Yüksek Okulu
DVD Koleksiyonu
Prof.Dr. Onur Bilge Kula Koleksiyonu
Rooms Restriction Values
All Fields
Title
Author
Subject
ISBN
ISSN
8
Search Field
All Fields
Target Value
Limit Value
Restriction Value
Search For:
Advanced Search
Limit Search Results
Narrowed by:
+
Subject: Cryptography.
Author
Include
Exclude
SpringerLink (Online service)
(7)
Arun, Jai Singh, author.
(1)
Bachrach, Daniel. author.
(1)
Carey, Marcus J. (Cybersecurity professional), author.
(1)
Castro-Leon, Enrique. author.
(1)
Chang, Victor. editor.
(1)
Couretas, Jerry M., 1966- author.
(1)
Dennedy, Michelle. author.
(1)
Diffie, Whitfield, writer of foreword.
(1)
Finneran, Tom. author.
(1)
Fischer, Wieland. editor.
(1)
Fox, Jonathan. author.
(1)
Harishankar, Ray, author.
(1)
Homma, Naofumi. editor.
(1)
Hughes, Chris (Christopher Matthew), author.
(1)
Jin, Jennifer.
(1)
Keren.
(1)
Kumar, Santosh. author.
(1)
Quade, Phil.
(1)
Ramachandran, Muthu. editor.
(1)
Rjaibi, Walid, author.
(1)
Robichau, Bernard Peter. author.
(1)
Robinson, Nikki, author.
(1)
Rzeszut, Eric. author.
(1)
Singh, Amit Kumar. author. (orcid)0000-0001-7359-2068
(1)
Singh, Rishav. author.
(1)
Singh, Sanjay Kumar. author.
(1)
Walters, Robert J. editor.
(1)
Wills, Gary. editor.
(1)
Yeluri, Raghuram. author.
(1)
More
View All
Fewer
Collapse All
Language
Include
Exclude
English
(13)
Publication Date
Include
Exclude
-
2014
(4)
2017
(3)
2024
(2)
2019
(1)
2020
(1)
2025
(1)
2026
(1)
More
View All
Fewer
Collapse All
Subject
Include
Exclude
Cryptology.
(7)
Data encryption (Computer science).
(7)
Data and Information Security.
(5)
Data protection.
(5)
Electronic books.
(5)
Security.
(5)
COMPUTERS.
(4)
Computer security.
(4)
Sécurité informatique.
(4)
Networking.
(3)
Computer Communication Networks.
(2)
Computer Security
(2)
Computer networks .
(2)
Computers.
(2)
Software engineering.
(2)
Algorithms.
(1)
Application software.
(1)
Automated Pattern Recognition.
(1)
BUSINESS & ECONOMICS.
(1)
Biometric identification.
(1)
Biometrics.
(1)
COMPUTERS -- Security -- Cryptography & Encryption.
(1)
COMPUTERS -- Security -- Cryptography.
(1)
Computer Hardware.
(1)
Computer System Implementation.
(1)
Computer and Information Systems Applications.
(1)
Computer networks -- Security measures
(1)
Computer networks -- Security measures.
(1)
Computer systems.
(1)
Computer vision.
(1)
Computers
(1)
Computers, Special purpose.
(1)
Cryptographie.
(1)
Cyberinfrastructure -- Security measures.
(1)
Cybernetics.
(1)
Electronic data processing -- Management.
(1)
IT Operations.
(1)
Information technology -- Security measures -- Management.
(1)
Informatique quantique.
(1)
Insurance.
(1)
Ordinateurs.
(1)
Pattern recognition systems.
(1)
Penetration testing (Computer security)
(1)
Quantum computing.
(1)
Risk Assessment & Management.
(1)
Réseaux d'ordinateurs -- Sécurité -- Mesures.
(1)
Special Purpose and Application-Based Systems.
(1)
Technologie de l'information -- Sécurité -- Mesures -- Gestion.
(1)
Technologie de l'information.
(1)
Tests d'intrusion.
(1)
Viruses & Malware.
(1)
information technology.
(1)
More
View All
Fewer
Collapse All
Material Type
Include
Exclude
E-Book
Shelf Location
Include
Exclude
1:SPRINGER
Wiley E-Book Collection
Library
Include
Exclude
Online Library
false
{sortLabel}
{alphabetical}
{relevance}
{include}
{exclude}
{facetName}
{results}
{displayName}
{count}
{error}
Select an Action
Place Hold(s)
Add to My Lists
Email
Print
13 Results Found
1
2
Sort By:
Relevance (Default)
Publication Date (Ascending)
Publication Date (Descending)
Title
Author
0
DEFAULT
Select a list
Temporary List
Make this your default list.
The following items were successfully added.
There was an error while adding the following items. Please try again.
One or more items could not be added because you are not logged in.
13.
Building the Infrastructure for Cloud Security A Solutions View
Building the Infrastructure for Cloud Security A Solutions View
Author
Yeluri, Raghuram. author. Castro-Leon, Enrique. author. SpringerLink (Online service)
Preferred Shelf Number
ONLINE
Electronic Access
https://doi.org/10.1007/978-1-4302-6146-9
Format:
Availability
Online Library~1
Available:
Copies:
Select an Action
Place Hold(s)
Add to My Lists
Email
Print
1
2