Search Results for Architecture - Narrowed by: Computer security. SirsiDynix Enterprise https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dArchitecture$0026qf$003dSUBJECT$002509Subject$002509Computer$002bsecurity.$002509Computer$002bsecurity.$0026te$003dILS$0026ps$003d300? 2024-11-07T01:36:07Z Information security architecture ent://SD_ILS/0/SD_ILS:285815 2024-11-07T01:36:07Z 2024-11-07T01:36:07Z Author&#160;Tudor, Jan Killmeyer.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781420031034">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information assurance architecture ent://SD_ILS/0/SD_ILS:291123 2024-11-07T01:36:07Z 2024-11-07T01:36:07Z Author&#160;Willett, Keith D.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9780849380686">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Architecture for Blockchain Applications ent://SD_ILS/0/SD_ILS:485083 2024-11-07T01:36:07Z 2024-11-07T01:36:07Z Author&#160;Xu, Xiwei. author.&#160;Weber, Ingo. author. (orcid)0000-0002-4833-5921&#160;Staples, Mark. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-03035-3">https://doi.org/10.1007/978-3-030-03035-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Adaptive security management architecture ent://SD_ILS/0/SD_ILS:288451 2024-11-07T01:36:07Z 2024-11-07T01:36:07Z Author&#160;Tiller, James S.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781420013375">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Exploring security in software architecture and design ent://SD_ILS/0/SD_ILS:481871 2024-11-07T01:36:07Z 2024-11-07T01:36:07Z Author&#160;Felderer, Michael, editor.&#160;Scandariato, Riccardo, editor.&#160;IGI Global, publisher.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-6313-6">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-6313-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Building an effective information security policy architecture ent://SD_ILS/0/SD_ILS:290577 2024-11-07T01:36:07Z 2024-11-07T01:36:07Z Author&#160;Bacik, Sandy.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781420059069">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer architecture and security : fundamentals of designing secure computer systems ent://SD_ILS/0/SD_ILS:248865 2024-11-07T01:36:07Z 2024-11-07T01:36:07Z Author&#160;Wang, Shuangbao Paul.&#160;Ledley, Robert Steven.<br/>Preferred Shelf Number&#160;QA76.9.A73 W36 2012<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Oracle Fusion middleware 11g architecture and management ent://SD_ILS/0/SD_ILS:293252 2024-11-07T01:36:07Z 2024-11-07T01:36:07Z Author&#160;Shafii, Reza.&#160;Lee, Stephen, 1975 June 8-&#160;Konduri, Gangadhar.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://mhebooklibrary.com/reader/oracle-fusion-middleware-11g-architecture-management">Subscription required</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Oracle identity management governance, risk, and compliance architecture ent://SD_ILS/0/SD_ILS:287794 2024-11-07T01:36:07Z 2024-11-07T01:36:07Z Author&#160;Pohlman, Marlin B.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781420072488">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information security architecture an integrated approach to security in the organization ent://SD_ILS/0/SD_ILS:290176 2024-11-07T01:36:07Z 2024-11-07T01:36:07Z Author&#160;Tudor, Jan Killmeyer.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9780203488751">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information security architecture : an integrated approach to security in the organization ent://SD_ILS/0/SD_ILS:110865 2024-11-07T01:36:07Z 2024-11-07T01:36:07Z Author&#160;Tudor, Jan Killmeyer.<br/>Preferred Shelf Number&#160;QA76.9.A25 T83 2006<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Fully Homomorphic Encryption in Real World Applications ent://SD_ILS/0/SD_ILS:484546 2024-11-07T01:36:07Z 2024-11-07T01:36:07Z Author&#160;Chatterjee, Ayantika. author.&#160;Aung, Khin Mi Mi. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-13-6393-1">https://doi.org/10.1007/978-981-13-6393-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Smart City and Informatization 7th International Conference, iSCI 2019, Guangzhou, China, November 12&ndash;15, 2019, Proceedings ent://SD_ILS/0/SD_ILS:485810 2024-11-07T01:36:07Z 2024-11-07T01:36:07Z Author&#160;Wang, Guojun. editor. (orcid)0000-0001-9875-4182&#160;El Saddik, Abdulmotaleb. editor.&#160;Lai, Xuejia. editor. (orcid)0000-0001-5917-4783&#160;Martinez Perez, Gregorio. editor. (orcid)0000-0001-5532-6604&#160;Choo, Kim-Kwang Raymond. editor. (orcid)0000-0001-9208-5336<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-15-1301-5">https://doi.org/10.1007/978-981-15-1301-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security for service oriented architectures ent://SD_ILS/0/SD_ILS:356556 2024-11-07T01:36:07Z 2024-11-07T01:36:07Z Author&#160;Williams, Walter (Telecommunications engineer), author.<br/>Preferred Shelf Number&#160;ONLINE(356556.1)<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781466584044">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Handbook of SCADA/control systems security ent://SD_ILS/0/SD_ILS:288155 2024-11-07T01:36:07Z 2024-11-07T01:36:07Z Author&#160;Radvanovsky, Robert.&#160;Brodsky, Jacob.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781466502277">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Safety of computer architectures ent://SD_ILS/0/SD_ILS:304132 2024-11-07T01:36:07Z 2024-11-07T01:36:07Z Author&#160;Boulanger, Jean-Louis.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://lib.myilibrary.com?id=450000">Connect to MyiLibrary resource.</a> Wiley <a href="http://onlinelibrary.wiley.com/book/10.1002/9781118600696">http://onlinelibrary.wiley.com/book/10.1002/9781118600696</a> John Wiley <a href="http://dx.doi.org/10.1002/9781118600696">http://dx.doi.org/10.1002/9781118600696</a> ebrary <a href="http://site.ebrary.com/id/10657623">http://site.ebrary.com/id/10657623</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Architecting secure software systems ent://SD_ILS/0/SD_ILS:288749 2024-11-07T01:36:07Z 2024-11-07T01:36:07Z Author&#160;Talukder, Asoke K.&#160;Chaitanya, Manish.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781420087857">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Securing IM and P2P applications for the enterprise ent://SD_ILS/0/SD_ILS:253939 2024-11-07T01:36:07Z 2024-11-07T01:36:07Z Author&#160;Piccard, Paul L.&#160;Sachs, Marcus H.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490177">http://www.sciencedirect.com/science/book/9781597490177</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Trusted Computing ent://SD_ILS/0/SD_ILS:247871 2024-11-07T01:36:07Z 2024-11-07T01:36:07Z Author&#160;Mitchell, Chris, ed.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1049/PBPC006E">http://dx.doi.org/10.1049/PBPC006E</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Secure architectures with OpenBSD ent://SD_ILS/0/SD_ILS:109506 2024-11-07T01:36:07Z 2024-11-07T01:36:07Z Author&#160;Palmer, Brandon.&#160;Nazario, Jose, ort. yaz.<br/>Preferred Shelf Number&#160;QA76.76.O63 P335 2004<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/>