Search Results for Computer Security. - Narrowed by: Wiley InterScience (Online service)
SirsiDynix Enterprise
https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dComputer$002bSecurity.$0026qf$003dAUTHOR$002509Author$002509Wiley$002bInterScience$002b$002528Online$002bservice$002529$002509Wiley$002bInterScience$002b$002528Online$002bservice$002529$0026ps$003d300$0026isd$003dtrue?
2024-09-19T06:53:04Z
Hardware-based computer security techniques to defeat hackers from biometrics to quantum cryptography
ent://SD_ILS/0/SD_ILS:297432
2024-09-19T06:53:04Z
2024-09-19T06:53:04Z
Author Dube, Roger. Wiley InterScience (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://proquest.safaribooksonline.com/?fpi=9780470193396">Available by subscription from Safari Books Online</a>
John Wiley <a href="http://dx.doi.org/10.1002/9780470425497">http://dx.doi.org/10.1002/9780470425497</a>
MyiLibrary, Table of contents <a href="http://www.myilibrary.com?id=183706&ref=toc">http://www.myilibrary.com?id=183706&ref=toc</a>
Volltext <a href="http://proquest.tech.safaribooksonline.de/9780470193396">http://proquest.tech.safaribooksonline.de/9780470193396</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Reliability and availability of cloud computing
ent://SD_ILS/0/SD_ILS:249383
2024-09-19T06:53:04Z
2024-09-19T06:53:04Z
Author Bauer, Eric. Adams, Randee. Wiley InterScience (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access IEEE Xplore <a href="http://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=6266788">http://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=6266788</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security 2020 reduce security risks this decade
ent://SD_ILS/0/SD_ILS:303839
2024-09-19T06:53:04Z
2024-09-19T06:53:04Z
Author Howard, Doug. Prince, Kevin. Wiley InterScience (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access Wiley InterScience <a href="http://dx.doi.org/10.1002/9781118255803">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information technology risk management in enterprise environments a review of industry practices and a practical guide to risk management teams
ent://SD_ILS/0/SD_ILS:297862
2024-09-19T06:53:04Z
2024-09-19T06:53:04Z
Author Kouns, Jake. Minoli, Daniel, 1952- Wiley InterScience (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access John Wiley <a href="http://dx.doi.org/10.1002/9780470558133">http://dx.doi.org/10.1002/9780470558133</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security risk management body of knowledge
ent://SD_ILS/0/SD_ILS:297759
2024-09-19T06:53:04Z
2024-09-19T06:53:04Z
Author Talbot, Julian. Jakeman, Miles Gareth. Wiley InterScience (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access John Wiley <a href="http://dx.doi.org/10.1002/9780470494974">http://dx.doi.org/10.1002/9780470494974</a>
Books24x7 <a href="http://www.books24x7.com/marc.asp?bookid=43285">http://www.books24x7.com/marc.asp?bookid=43285</a>
MyiLibrary, Table of contents <a href="http://www.myilibrary.com?id=230340&ref=toc">http://www.myilibrary.com?id=230340&ref=toc</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
SIP security
ent://SD_ILS/0/SD_ILS:297791
2024-09-19T06:53:04Z
2024-09-19T06:53:04Z
Author Sisalem, Dorgham. Wiley InterScience (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://onlinelibrary.wiley.com/book/10.1002/9780470516997">http://onlinelibrary.wiley.com/book/10.1002/9780470516997</a>
John Wiley <a href="http://dx.doi.org/10.1002/9780470516997">http://dx.doi.org/10.1002/9780470516997</a>
<a href="http://site.ebrary.com/lib/alltitles/Doc?id=10298102">http://site.ebrary.com/lib/alltitles/Doc?id=10298102</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Secure computer and network systems modeling, analysis and design
ent://SD_ILS/0/SD_ILS:296665
2024-09-19T06:53:04Z
2024-09-19T06:53:04Z
Author Ye, Nong. Wiley InterScience (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access Contributor biographical information <a href="http://catdir.loc.gov/catdir/enhancements/fy0833/2007037133-b.html">http://catdir.loc.gov/catdir/enhancements/fy0833/2007037133-b.html</a>
John Wiley <a href="http://dx.doi.org/10.1002/9780470023273">http://dx.doi.org/10.1002/9780470023273</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
ICT futures delivering pervasive, real-time and secure services
ent://SD_ILS/0/SD_ILS:302768
2024-09-19T06:53:04Z
2024-09-19T06:53:04Z
Author Warren, Paul (Paul W.) Davies, J. (N. John) Brown, David, 1954- Wiley InterScience (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access John Wiley <a href="http://dx.doi.org/10.1002/9780470758656">http://dx.doi.org/10.1002/9780470758656</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
IPTV security protecting high-value digital contents
ent://SD_ILS/0/SD_ILS:302654
2024-09-19T06:53:04Z
2024-09-19T06:53:04Z
Author Ramirez, David. Wiley InterScience (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access John Wiley <a href="http://dx.doi.org/10.1002/9780470727201">http://dx.doi.org/10.1002/9780470727201</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security in wireless ad hoc and sensor networks
ent://SD_ILS/0/SD_ILS:297789
2024-09-19T06:53:04Z
2024-09-19T06:53:04Z
Author Çayirci, E. (Erdal) Levi, Albert, 1969- Wiley InterScience (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access John Wiley <a href="http://dx.doi.org/10.1002/9780470516782">http://dx.doi.org/10.1002/9780470516782</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Trustworthy computing analytical and quantitative engineering evaluation
ent://SD_ILS/0/SD_ILS:296957
2024-09-19T06:53:04Z
2024-09-19T06:53:04Z
Author Sahinoglu, Mehmet, 1951- Wiley InterScience (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access Contributor biographical information <a href="http://catdir.loc.gov/catdir/enhancements/fy0739/2006033567-b.html">http://catdir.loc.gov/catdir/enhancements/fy0739/2006033567-b.html</a>
John Wiley <a href="http://dx.doi.org/10.1002/9780470127872">http://dx.doi.org/10.1002/9780470127872</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cryptography, information theory, and error-correction a handbook for the 21st century
ent://SD_ILS/0/SD_ILS:301860
2024-09-19T06:53:04Z
2024-09-19T06:53:04Z
Author Bruen, Aiden A., 1941- Forcinito, Mario, 1962- Wiley InterScience (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access Wiley InterScience <a href="http://dx.doi.org/10.1002/9781118033296">An electronic book accessible through the World Wide Web; click for information</a>
Contributor biographical information <a href="http://catdir.loc.gov/catdir/enhancements/fy0618/2004058044-b.html">http://catdir.loc.gov/catdir/enhancements/fy0618/2004058044-b.html</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security for ubiquitous computing
ent://SD_ILS/0/SD_ILS:301039
2024-09-19T06:53:04Z
2024-09-19T06:53:04Z
Author Stajano, Frank. Wiley InterScience (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access John Wiley <a href="http://dx.doi.org/10.1002/0470848693">http://dx.doi.org/10.1002/0470848693</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>