Search Results for ARCHITECTURE. - Narrowed by: Computer security. SirsiDynix Enterprise https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dARCHITECTURE.$0026qf$003dSUBJECT$002509Subject$002509Computer$002bsecurity.$002509Computer$002bsecurity.$0026ic$003dtrue$0026ps$003d300$0026isd$003dtrue? 2026-01-21T13:48:05Z Information assurance architecture ent://SD_ILS/0/SD_ILS:539830 2026-01-21T13:48:05Z 2026-01-21T13:48:05Z Author&#160;Willett, Keith D., author.<br/>Preferred Shelf Number&#160;QA76.9 .A25 W5487 2008<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9780849380686">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> Security architecture : how &amp; why ent://SD_ILS/0/SD_ILS:551177 2026-01-21T13:48:05Z 2026-01-21T13:48:05Z Author&#160;Madsen, Tom, author.<br/>Preferred Shelf Number&#160;QA76.9 .A25<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003339380">https://www.taylorfrancis.com/books/9781003339380</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Architecture for Blockchain Applications ent://SD_ILS/0/SD_ILS:485083 2026-01-21T13:48:05Z 2026-01-21T13:48:05Z Author&#160;Xu, Xiwei. author.&#160;Weber, Ingo. author. (orcid)0000-0002-4833-5921&#160;Staples, Mark. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-03035-3">https://doi.org/10.1007/978-3-030-03035-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Adaptive security management architecture ent://SD_ILS/0/SD_ILS:541852 2026-01-21T13:48:05Z 2026-01-21T13:48:05Z Author&#160;Tiller, James S., author.<br/>Preferred Shelf Number&#160;QA76.9 .A25 T55 2011<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781420013375">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> Exploring security in software architecture and design ent://SD_ILS/0/SD_ILS:481871 2026-01-21T13:48:05Z 2026-01-21T13:48:05Z Author&#160;Felderer, Michael, editor.&#160;Scandariato, Riccardo, editor.&#160;IGI Global, publisher.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-6313-6">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-6313-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Building an effective information security policy architecture ent://SD_ILS/0/SD_ILS:540985 2026-01-21T13:48:05Z 2026-01-21T13:48:05Z Author&#160;Bacik, Sandy., author.<br/>Preferred Shelf Number&#160;QA76.9 .A25 B335 2008<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781420059069">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> BIOMETRIC TECHNOLOGY AND AUTHENTICATION biocryptography, and cloud-based architecture. ent://SD_ILS/0/SD_ILS:562997 2026-01-21T13:48:05Z 2026-01-21T13:48:05Z Author&#160;Das, Ravindra.<br/>Preferred Shelf Number&#160;TK7882 .B56<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003562146">https://www.taylorfrancis.com/books/9781003562146</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> ENTERPRISE FORTRESS the ultimate handbook for enterprise security architecture. ent://SD_ILS/0/SD_ILS:591038 2026-01-21T13:48:05Z 2026-01-21T13:48:05Z Author&#160;Stevens, Alex.<br/>Preferred Shelf Number&#160;QA76.9 .A25<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003585923">https://www.taylorfrancis.com/books/9781003585923</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Implementing enterprise cybersecurity with open-source software and standard architecture. Volume II ent://SD_ILS/0/SD_ILS:588974 2026-01-21T13:48:05Z 2026-01-21T13:48:05Z Author&#160;Handa, Anand, editor.&#160;Negi, Rohit, editor.&#160;Venkatesan, S., editor.&#160;Shukla, Sandeep K., editor.<br/>Preferred Shelf Number&#160;QA76.9 .A25<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003426134">https://www.taylorfrancis.com/books/9781003426134</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Implementing enterprise cybersecurity with open-source software and standard architecture ent://SD_ILS/0/SD_ILS:576349 2026-01-21T13:48:05Z 2026-01-21T13:48:05Z Author&#160;Handa, Anand, editor.&#160;Negi, Rohit, editor.&#160;Shukla, Sandeep K., editor.<br/>Preferred Shelf Number&#160;QA76.9 .A25 I47 2021 EB<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003338512">https://www.taylorfrancis.com/books/9781003338512</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> ORACLE IDENTITY MANAGEMENT : governance, risk, and compliance architecture, third edition. ent://SD_ILS/0/SD_ILS:544833 2026-01-21T13:48:05Z 2026-01-21T13:48:05Z Author&#160;POHLMAN, MARLIN B.<br/>Preferred Shelf Number&#160;QA76.9 .A25<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9780429117688">Taylor & Francis eBooks</a> Taylor & Francis <a href="https://www.taylorfrancis.com/books/9780429117688">https://www.taylorfrancis.com/books/9780429117688</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer architecture and security : fundamentals of designing secure computer systems ent://SD_ILS/0/SD_ILS:248865 2026-01-21T13:48:05Z 2026-01-21T13:48:05Z Author&#160;Wang, Shuangbao Paul.&#160;Ledley, Robert Steven.<br/>Preferred Shelf Number&#160;QA76.9.A73 W36 2012<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Oracle Fusion middleware 11g architecture and management ent://SD_ILS/0/SD_ILS:293252 2026-01-21T13:48:05Z 2026-01-21T13:48:05Z Author&#160;Shafii, Reza.&#160;Lee, Stephen, 1975 June 8-&#160;Konduri, Gangadhar.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://mhebooklibrary.com/reader/oracle-fusion-middleware-11g-architecture-management">Subscription required</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information security architecture : an integrated approach to security in the organization ent://SD_ILS/0/SD_ILS:110865 2026-01-21T13:48:05Z 2026-01-21T13:48:05Z Author&#160;Tudor, Jan Killmeyer.<br/>Preferred Shelf Number&#160;QA76.9.A25 T83 2006<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Information security architecture : an integrated approach to security in the organization ent://SD_ILS/0/SD_ILS:541238 2026-01-21T13:48:05Z 2026-01-21T13:48:05Z Author&#160;Tudor, Jan Killmeyer., author.<br/>Preferred Shelf Number&#160;QA76.9 .A25 T83 2006<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9780203488751">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> Information security architecture : an integrated approach to security in the organization ent://SD_ILS/0/SD_ILS:544953 2026-01-21T13:48:05Z 2026-01-21T13:48:05Z Author&#160;Tudor, Jan Killmeyer.<br/>Preferred Shelf Number&#160;QA76.9 .A25<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9780429131790">https://www.taylorfrancis.com/books/9780429131790</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Fully Homomorphic Encryption in Real World Applications ent://SD_ILS/0/SD_ILS:484546 2026-01-21T13:48:05Z 2026-01-21T13:48:05Z Author&#160;Chatterjee, Ayantika. author.&#160;Aung, Khin Mi Mi. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-13-6393-1">https://doi.org/10.1007/978-981-13-6393-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security technologies for law enforcement agencies ent://SD_ILS/0/SD_ILS:589138 2026-01-21T13:48:05Z 2026-01-21T13:48:05Z Author&#160;Duraklar, Kaz&#305;m author.<br/>Preferred Shelf Number&#160;QA76.9 .A25<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003597445">https://www.taylorfrancis.com/books/9781003597445</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> AI-Enabled Threat Intelligence and Cyber Risk Assessment ent://SD_ILS/0/SD_ILS:582312 2026-01-21T13:48:05Z 2026-01-21T13:48:05Z Author&#160;Martiri, Edlira, editor&#160;Vajjhala, Narasimha, 1978- editor.&#160;Dalipi, Fisnik, editor<br/>Preferred Shelf Number&#160;QA76.9 .A25<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003504979">https://www.taylorfrancis.com/books/9781003504979</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Quantum computing models for cybersecurity and wireless communications ent://SD_ILS/0/SD_ILS:599707 2026-01-21T13:48:05Z 2026-01-21T13:48:05Z Author&#160;Kumar, Budati Anil, edited.&#160;Kumar, Singamaneni Kranthi, edited.&#160;Li, Xingwang (Computer scientist), edited.<br/>Preferred Shelf Number&#160;QA76.9 .A25 Q36 2025<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394271429">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394271429</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information security and privacy quick reference the essential handbook for every CISO, CSO, and Chief Privacy Officer ent://SD_ILS/0/SD_ILS:599946 2026-01-21T13:48:05Z 2026-01-21T13:48:05Z Author&#160;Chapple, Mike, author.&#160;Shelley, Joe.&#160;Stewart, James Michael.<br/>Preferred Shelf Number&#160;QA76.9 .A25 C43 2025<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394353347">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394353347</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Protection of electrical power distribution systems : smart grid, microgrid, AI, and cyber security ent://SD_ILS/0/SD_ILS:600371 2026-01-21T13:48:05Z 2026-01-21T13:48:05Z Author&#160;Masood, Tariq, author.&#160;Abdo, Jamil, author.&#160;Iqbal, Atif, author.<br/>Preferred Shelf Number&#160;TK3001 .M37 2026<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394327676">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394327676</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> x86 software reverse-engineering, cracking, and counter-measures ent://SD_ILS/0/SD_ILS:598920 2026-01-21T13:48:05Z 2026-01-21T13:48:05Z Author&#160;Domas, Stephanie, author.&#160;Domas, Christopher, author.<br/>Preferred Shelf Number&#160;QA76.9 .A25 D66 2024<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394277131">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394277131</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Stepping through cybersecurity risk management : a systems thinking approach ent://SD_ILS/0/SD_ILS:599021 2026-01-21T13:48:05Z 2026-01-21T13:48:05Z Author&#160;Bayuk, Jennifer L., author.<br/>Preferred Shelf Number&#160;QA76.9 .A25 B39 2024<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394213986">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394213986</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Software security : concepts &amp; practices ent://SD_ILS/0/SD_ILS:570473 2026-01-21T13:48:05Z 2026-01-21T13:48:05Z Author&#160;Khan, Suhel Ahmad, author.&#160;Kumar, Rajeev, author.&#160;Khan, R. A. (Raees Ahmad), author.<br/>Preferred Shelf Number&#160;QA76.76 .D47<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003330516">https://www.taylorfrancis.com/books/9781003330516</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Quantum computing in cybersecurity ent://SD_ILS/0/SD_ILS:598685 2026-01-21T13:48:05Z 2026-01-21T13:48:05Z Author&#160;Rawat, Romil, editor.<br/>Preferred Shelf Number&#160;QA76.9 .A25 Q83 2023<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394167401">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394167401</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cyber security and network security ent://SD_ILS/0/SD_ILS:597484 2026-01-21T13:48:05Z 2026-01-21T13:48:05Z Author&#160;Pramanik, Sabyasachi, editor.&#160;Samanta, Debabrata, 1987- editor.&#160;Vinay, M., editor.&#160;Guha, Abhijit, editor.<br/>Preferred Shelf Number&#160;QA76.9 .A25<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119812555">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119812555</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cyber security and digital forensics ent://SD_ILS/0/SD_ILS:597326 2026-01-21T13:48:05Z 2026-01-21T13:48:05Z Author&#160;Ghonge, Mangesh, 1984- editor.<br/>Preferred Shelf Number&#160;QA76.9 .A25<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119795667">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119795667</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Trust in computer systems and the cloud ent://SD_ILS/0/SD_ILS:597142 2026-01-21T13:48:05Z 2026-01-21T13:48:05Z Author&#160;Bursell, Mike, author.<br/>Preferred Shelf Number&#160;QA76.9 .A25<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119695158">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119695158</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Trust-based communication systems for internet of things applications ent://SD_ILS/0/SD_ILS:597744 2026-01-21T13:48:05Z 2026-01-21T13:48:05Z Author&#160;Madaan, Vishu, editor.&#160;Agrawal, Prateek, editor.&#160;Sharma, Anand, editor.&#160;Sharma, Dilip Kumar, editor.&#160;Agrawal, Akshat, 1986- editor.<br/>Preferred Shelf Number&#160;TK5105.8857<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119896746">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119896746</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Secure searchable encryption and data management ent://SD_ILS/0/SD_ILS:564284 2026-01-21T13:48:05Z 2026-01-21T13:48:05Z Author&#160;Gupta, Brij, 1982- author.&#160;Mamta, author.<br/>Preferred Shelf Number&#160;QA76.9 .A25 G87 2021<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003107316">https://www.taylorfrancis.com/books/9781003107316</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security issues and privacy concerns in Industry 4.0 applications ent://SD_ILS/0/SD_ILS:596945 2026-01-21T13:48:05Z 2026-01-21T13:48:05Z Author&#160;David, Shiblin, author.&#160;Anand, R. S., author.&#160;Jeyakrishnan, V., author.&#160;Niranjanamurthy, M., author.<br/>Preferred Shelf Number&#160;QA76.9 .A25 D38 2021<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119776529">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119776529</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Artificial intelligence and data mining approaches in security frameworks ent://SD_ILS/0/SD_ILS:596957 2026-01-21T13:48:05Z 2026-01-21T13:48:05Z Author&#160;Bhargava, Neeraj.&#160;Bhargava, Ritu.&#160;Rathore, Pramod Singh, 1988-&#160;Agrawal, Rashmi, 1978-<br/>Preferred Shelf Number&#160;Q335<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119760429">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119760429</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> VMware&reg; Certified Professional Data Center Virtualization on vSphere 6.7 Exam 2V0-21.19 : study guide ent://SD_ILS/0/SD_ILS:596289 2026-01-21T13:48:05Z 2026-01-21T13:48:05Z Author&#160;Hall, Jon, 1963- author.&#160;Andrews, Joshua, author.<br/>Preferred Shelf Number&#160;QA76.9 .V5<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119539698">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119539698</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Smart City and Informatization 7th International Conference, iSCI 2019, Guangzhou, China, November 12&ndash;15, 2019, Proceedings ent://SD_ILS/0/SD_ILS:485810 2026-01-21T13:48:05Z 2026-01-21T13:48:05Z Author&#160;Wang, Guojun. editor. (orcid)0000-0001-9875-4182&#160;El Saddik, Abdulmotaleb. editor.&#160;Lai, Xuejia. editor. (orcid)0000-0001-5917-4783&#160;Martinez Perez, Gregorio. editor. (orcid)0000-0001-5532-6604&#160;Choo, Kim-Kwang Raymond. editor. (orcid)0000-0001-9208-5336<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-15-1301-5">https://doi.org/10.1007/978-981-15-1301-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cyber security in parallel and distributed computing : concepts, techniques, applications and case studies ent://SD_ILS/0/SD_ILS:595099 2026-01-21T13:48:05Z 2026-01-21T13:48:05Z Author&#160;Le, Dac-Nhuong, 1983- editor.&#160;Kumar, Raghvendra, 1987- editor.&#160;Mishra, Brojo Kishore, 1979- editor.&#160;Khari, Manju, editor.&#160;Chatterjee, Jyotir Moy, editor.<br/>Preferred Shelf Number&#160;QA76.9 .A25<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119488330">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119488330</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security for Service Oriented Architectures. ent://SD_ILS/0/SD_ILS:542633 2026-01-21T13:48:05Z 2026-01-21T13:48:05Z Author&#160;Williams, Walter, author.&#160;CRC Press LLC.<br/>Preferred Shelf Number&#160;TK5105.5828 .W55 2017<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9780429072185">https://www.taylorfrancis.com/books/9780429072185</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Handbook of SCADA/control systems security ent://SD_ILS/0/SD_ILS:547855 2026-01-21T13:48:05Z 2026-01-21T13:48:05Z Author&#160;Radvanovsky, Robert.&#160;Brodsky, Jacob.<br/>Preferred Shelf Number&#160;TK5105.59 .H3532 2013<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781466502277">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> Safety of computer architectures ent://SD_ILS/0/SD_ILS:304132 2026-01-21T13:48:05Z 2026-01-21T13:48:05Z Author&#160;Boulanger, Jean-Louis.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://lib.myilibrary.com?id=450000">Connect to MyiLibrary resource.</a> Wiley <a href="http://onlinelibrary.wiley.com/book/10.1002/9781118600696">http://onlinelibrary.wiley.com/book/10.1002/9781118600696</a> John Wiley <a href="http://dx.doi.org/10.1002/9781118600696">http://dx.doi.org/10.1002/9781118600696</a> ebrary <a href="http://site.ebrary.com/id/10657623">http://site.ebrary.com/id/10657623</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Architecting secure software systems ent://SD_ILS/0/SD_ILS:538962 2026-01-21T13:48:05Z 2026-01-21T13:48:05Z Author&#160;Talukder, Asoke K., author.&#160;Chaitanya, Manish.<br/>Preferred Shelf Number&#160;QA76.9 .A25 T34 2009<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781420087857">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> Insider computer fraud : an in-depth framework for detecting and defending against insider IT attacks ent://SD_ILS/0/SD_ILS:544396 2026-01-21T13:48:05Z 2026-01-21T13:48:05Z Author&#160;Brancik, Kenneth C., author.<br/>Preferred Shelf Number&#160;QA76.9 .A25 B725 2008<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781420046601">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> Mechanics of user identification and authentication : fundamentals of identity management ent://SD_ILS/0/SD_ILS:539940 2026-01-21T13:48:05Z 2026-01-21T13:48:05Z Author&#160;Todorov, Dobromir., author.<br/>Preferred Shelf Number&#160;TK5105.59 .T575 2007<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781420052206">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> Securing IM and P2P applications for the enterprise ent://SD_ILS/0/SD_ILS:253939 2026-01-21T13:48:05Z 2026-01-21T13:48:05Z Author&#160;Piccard, Paul L.&#160;Sachs, Marcus H.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490177">http://www.sciencedirect.com/science/book/9781597490177</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Trusted Computing ent://SD_ILS/0/SD_ILS:247871 2026-01-21T13:48:05Z 2026-01-21T13:48:05Z Author&#160;Mitchell, Chris, ed.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1049/PBPC006E">http://dx.doi.org/10.1049/PBPC006E</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Secure architectures with OpenBSD ent://SD_ILS/0/SD_ILS:109506 2026-01-21T13:48:05Z 2026-01-21T13:48:05Z Author&#160;Palmer, Brandon.&#160;Nazario, Jose, ort. yaz.<br/>Preferred Shelf Number&#160;QA76.76.O63 P335 2004<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Public key infrastructure : building trusted applications and Web services ent://SD_ILS/0/SD_ILS:543281 2026-01-21T13:48:05Z 2026-01-21T13:48:05Z Author&#160;Vacca, John R.<br/>Preferred Shelf Number&#160;QA76.9 .A25 P85 2004<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9780203498156">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/>