Search Results for Architecture, Computer. - Narrowed by: Computer security.
SirsiDynix Enterprise
https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dArchitecture$00252C$002bComputer.$0026qf$003dSUBJECT$002509Subject$002509Computer$002bsecurity.$002509Computer$002bsecurity.$0026ps$003d300$0026isd$003dtrue?
2025-12-11T19:57:08Z
Computer architecture and security : fundamentals of designing secure computer systems
ent://SD_ILS/0/SD_ILS:248865
2025-12-11T19:57:08Z
2025-12-11T19:57:08Z
Author Wang, Shuangbao Paul. Ledley, Robert Steven.<br/>Preferred Shelf Number QA76.9.A73 W36 2012<br/>Format: Books<br/>Availability Beytepe Library~1<br/>
Fully Homomorphic Encryption in Real World Applications
ent://SD_ILS/0/SD_ILS:484546
2025-12-11T19:57:08Z
2025-12-11T19:57:08Z
Author Chatterjee, Ayantika. author. Aung, Khin Mi Mi. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-981-13-6393-1">https://doi.org/10.1007/978-981-13-6393-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Smart City and Informatization 7th International Conference, iSCI 2019, Guangzhou, China, November 12–15, 2019, Proceedings
ent://SD_ILS/0/SD_ILS:485810
2025-12-11T19:57:08Z
2025-12-11T19:57:08Z
Author Wang, Guojun. editor. (orcid)0000-0001-9875-4182 El Saddik, Abdulmotaleb. editor. Lai, Xuejia. editor. (orcid)0000-0001-5917-4783 Martinez Perez, Gregorio. editor. (orcid)0000-0001-5532-6604 Choo, Kim-Kwang Raymond. editor. (orcid)0000-0001-9208-5336<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-981-15-1301-5">https://doi.org/10.1007/978-981-15-1301-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security for Service Oriented Architectures.
ent://SD_ILS/0/SD_ILS:542633
2025-12-11T19:57:08Z
2025-12-11T19:57:08Z
Author Williams, Walter, author. CRC Press LLC.<br/>Preferred Shelf Number TK5105.5828 .W55 2017<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9780429072185">https://www.taylorfrancis.com/books/9780429072185</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Oracle Fusion middleware 11g architecture and management
ent://SD_ILS/0/SD_ILS:293252
2025-12-11T19:57:08Z
2025-12-11T19:57:08Z
Author Shafii, Reza. Lee, Stephen, 1975 June 8- Konduri, Gangadhar.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://mhebooklibrary.com/reader/oracle-fusion-middleware-11g-architecture-management">Subscription required</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Adaptive security management architecture
ent://SD_ILS/0/SD_ILS:541852
2025-12-11T19:57:08Z
2025-12-11T19:57:08Z
Author Tiller, James S., author.<br/>Preferred Shelf Number QA76.9 .A25 T55 2011<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781420013375">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>
Safety of computer architectures
ent://SD_ILS/0/SD_ILS:304132
2025-12-11T19:57:08Z
2025-12-11T19:57:08Z
Author Boulanger, Jean-Louis.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://lib.myilibrary.com?id=450000">Connect to MyiLibrary resource.</a>
Wiley <a href="http://onlinelibrary.wiley.com/book/10.1002/9781118600696">http://onlinelibrary.wiley.com/book/10.1002/9781118600696</a>
John Wiley <a href="http://dx.doi.org/10.1002/9781118600696">http://dx.doi.org/10.1002/9781118600696</a>
ebrary <a href="http://site.ebrary.com/id/10657623">http://site.ebrary.com/id/10657623</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Architecting secure software systems
ent://SD_ILS/0/SD_ILS:538962
2025-12-11T19:57:08Z
2025-12-11T19:57:08Z
Author Talukder, Asoke K., author. Chaitanya, Manish.<br/>Preferred Shelf Number QA76.9 .A25 T34 2009<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781420087857">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>
Building an effective information security policy architecture
ent://SD_ILS/0/SD_ILS:540985
2025-12-11T19:57:08Z
2025-12-11T19:57:08Z
Author Bacik, Sandy., author.<br/>Preferred Shelf Number QA76.9 .A25 B335 2008<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781420059069">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>
Insider computer fraud : an in-depth framework for detecting and defending against insider IT attacks
ent://SD_ILS/0/SD_ILS:544396
2025-12-11T19:57:08Z
2025-12-11T19:57:08Z
Author Brancik, Kenneth C., author.<br/>Preferred Shelf Number QA76.9 .A25 B725 2008<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781420046601">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>
Information assurance architecture
ent://SD_ILS/0/SD_ILS:539830
2025-12-11T19:57:08Z
2025-12-11T19:57:08Z
Author Willett, Keith D., author.<br/>Preferred Shelf Number QA76.9 .A25 W5487 2008<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9780849380686">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>
Information security architecture : an integrated approach to security in the organization
ent://SD_ILS/0/SD_ILS:110865
2025-12-11T19:57:08Z
2025-12-11T19:57:08Z
Author Tudor, Jan Killmeyer.<br/>Preferred Shelf Number QA76.9.A25 T83 2006<br/>Format: Books<br/>Availability Beytepe Library~1<br/>
Securing IM and P2P applications for the enterprise
ent://SD_ILS/0/SD_ILS:253939
2025-12-11T19:57:08Z
2025-12-11T19:57:08Z
Author Piccard, Paul L. Sachs, Marcus H.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490177">http://www.sciencedirect.com/science/book/9781597490177</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information security architecture : an integrated approach to security in the organization
ent://SD_ILS/0/SD_ILS:541238
2025-12-11T19:57:08Z
2025-12-11T19:57:08Z
Author Tudor, Jan Killmeyer., author.<br/>Preferred Shelf Number QA76.9 .A25 T83 2006<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9780203488751">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>
Trusted Computing
ent://SD_ILS/0/SD_ILS:247871
2025-12-11T19:57:08Z
2025-12-11T19:57:08Z
Author Mitchell, Chris, ed.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1049/PBPC006E">http://dx.doi.org/10.1049/PBPC006E</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Secure architectures with OpenBSD
ent://SD_ILS/0/SD_ILS:109506
2025-12-11T19:57:08Z
2025-12-11T19:57:08Z
Author Palmer, Brandon. Nazario, Jose, ort. yaz.<br/>Preferred Shelf Number QA76.76.O63 P335 2004<br/>Format: Books<br/>Availability Beytepe Library~1<br/>
Information security architecture : an integrated approach to security in the organization
ent://SD_ILS/0/SD_ILS:544953
2025-12-11T19:57:08Z
2025-12-11T19:57:08Z
Author Tudor, Jan Killmeyer.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9780429131790">https://www.taylorfrancis.com/books/9780429131790</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>