Search Results for Architecture. - Narrowed by: Computer security.SirsiDynix Enterprisehttps://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dArchitecture.$0026qf$003dSUBJECT$002509Subject$002509Computer$002bsecurity.$002509Computer$002bsecurity.$0026te$003dILS$0026ps$003d300?2024-11-19T03:48:45ZInformation security architectureent://SD_ILS/0/SD_ILS:2858152024-11-19T03:48:45Z2024-11-19T03:48:45ZAuthor Tudor, Jan Killmeyer.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781420031034">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Information assurance architectureent://SD_ILS/0/SD_ILS:2911232024-11-19T03:48:45Z2024-11-19T03:48:45ZAuthor Willett, Keith D.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9780849380686">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Architecture for Blockchain Applicationsent://SD_ILS/0/SD_ILS:4850832024-11-19T03:48:45Z2024-11-19T03:48:45ZAuthor Xu, Xiwei. author. Weber, Ingo. author. (orcid)0000-0002-4833-5921 Staples, Mark. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-03035-3">https://doi.org/10.1007/978-3-030-03035-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Adaptive security management architectureent://SD_ILS/0/SD_ILS:2884512024-11-19T03:48:45Z2024-11-19T03:48:45ZAuthor Tiller, James S.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781420013375">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Exploring security in software architecture and designent://SD_ILS/0/SD_ILS:4818712024-11-19T03:48:45Z2024-11-19T03:48:45ZAuthor Felderer, Michael, editor. Scandariato, Riccardo, editor. IGI Global, publisher.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-6313-6">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-6313-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Building an effective information security policy architectureent://SD_ILS/0/SD_ILS:2905772024-11-19T03:48:45Z2024-11-19T03:48:45ZAuthor Bacik, Sandy.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781420059069">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Computer architecture and security : fundamentals of designing secure computer systemsent://SD_ILS/0/SD_ILS:2488652024-11-19T03:48:45Z2024-11-19T03:48:45ZAuthor Wang, Shuangbao Paul. Ledley, Robert Steven.<br/>Preferred Shelf Number QA76.9.A73 W36 2012<br/>Format: Books<br/>Availability Beytepe Library~1<br/>Oracle Fusion middleware 11g architecture and managementent://SD_ILS/0/SD_ILS:2932522024-11-19T03:48:45Z2024-11-19T03:48:45ZAuthor Shafii, Reza. Lee, Stephen, 1975 June 8- Konduri, Gangadhar.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://mhebooklibrary.com/reader/oracle-fusion-middleware-11g-architecture-management">Subscription required</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Oracle identity management governance, risk, and compliance architectureent://SD_ILS/0/SD_ILS:2877942024-11-19T03:48:45Z2024-11-19T03:48:45ZAuthor Pohlman, Marlin B.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781420072488">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Information security architecture : an integrated approach to security in the organizationent://SD_ILS/0/SD_ILS:1108652024-11-19T03:48:45Z2024-11-19T03:48:45ZAuthor Tudor, Jan Killmeyer.<br/>Preferred Shelf Number QA76.9.A25 T83 2006<br/>Format: Books<br/>Availability Beytepe Library~1<br/>Information security architecture an integrated approach to security in the organizationent://SD_ILS/0/SD_ILS:2901762024-11-19T03:48:45Z2024-11-19T03:48:45ZAuthor Tudor, Jan Killmeyer.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9780203488751">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Fully Homomorphic Encryption in Real World Applicationsent://SD_ILS/0/SD_ILS:4845462024-11-19T03:48:45Z2024-11-19T03:48:45ZAuthor Chatterjee, Ayantika. author. Aung, Khin Mi Mi. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-981-13-6393-1">https://doi.org/10.1007/978-981-13-6393-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Smart City and Informatization 7th International Conference, iSCI 2019, Guangzhou, China, November 12–15, 2019, Proceedingsent://SD_ILS/0/SD_ILS:4858102024-11-19T03:48:45Z2024-11-19T03:48:45ZAuthor Wang, Guojun. editor. (orcid)0000-0001-9875-4182 El Saddik, Abdulmotaleb. editor. Lai, Xuejia. editor. (orcid)0000-0001-5917-4783 Martinez Perez, Gregorio. editor. (orcid)0000-0001-5532-6604 Choo, Kim-Kwang Raymond. editor. (orcid)0000-0001-9208-5336<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-981-15-1301-5">https://doi.org/10.1007/978-981-15-1301-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Security for service oriented architecturesent://SD_ILS/0/SD_ILS:3565562024-11-19T03:48:45Z2024-11-19T03:48:45ZAuthor Williams, Walter (Telecommunications engineer), author.<br/>Preferred Shelf Number ONLINE(356556.1)<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781466584044">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Handbook of SCADA/control systems securityent://SD_ILS/0/SD_ILS:2881552024-11-19T03:48:45Z2024-11-19T03:48:45ZAuthor Radvanovsky, Robert. Brodsky, Jacob.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781466502277">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Safety of computer architecturesent://SD_ILS/0/SD_ILS:3041322024-11-19T03:48:45Z2024-11-19T03:48:45ZAuthor Boulanger, Jean-Louis.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://lib.myilibrary.com?id=450000">Connect to MyiLibrary resource.</a>
Wiley <a href="http://onlinelibrary.wiley.com/book/10.1002/9781118600696">http://onlinelibrary.wiley.com/book/10.1002/9781118600696</a>
John Wiley <a href="http://dx.doi.org/10.1002/9781118600696">http://dx.doi.org/10.1002/9781118600696</a>
ebrary <a href="http://site.ebrary.com/id/10657623">http://site.ebrary.com/id/10657623</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Architecting secure software systemsent://SD_ILS/0/SD_ILS:2887492024-11-19T03:48:45Z2024-11-19T03:48:45ZAuthor Talukder, Asoke K. Chaitanya, Manish.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781420087857">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Securing IM and P2P applications for the enterpriseent://SD_ILS/0/SD_ILS:2539392024-11-19T03:48:45Z2024-11-19T03:48:45ZAuthor Piccard, Paul L. Sachs, Marcus H.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490177">http://www.sciencedirect.com/science/book/9781597490177</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Trusted Computingent://SD_ILS/0/SD_ILS:2478712024-11-19T03:48:45Z2024-11-19T03:48:45ZAuthor Mitchell, Chris, ed.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1049/PBPC006E">http://dx.doi.org/10.1049/PBPC006E</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Secure architectures with OpenBSDent://SD_ILS/0/SD_ILS:1095062024-11-19T03:48:45Z2024-11-19T03:48:45ZAuthor Palmer, Brandon. Nazario, Jose, ort. yaz.<br/>Preferred Shelf Number QA76.76.O63 P335 2004<br/>Format: Books<br/>Availability Beytepe Library~1<br/>