Search Results for Computer Security. - Narrowed by: Wiley InterScience (Online service) SirsiDynix Enterprise https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dComputer$002bSecurity.$0026qf$003dAUTHOR$002509Author$002509Wiley$002bInterScience$002b$002528Online$002bservice$002529$002509Wiley$002bInterScience$002b$002528Online$002bservice$002529$0026ps$003d300$0026isd$003dtrue? 2024-09-19T06:53:04Z Hardware-based computer security techniques to defeat hackers from biometrics to quantum cryptography ent://SD_ILS/0/SD_ILS:297432 2024-09-19T06:53:04Z 2024-09-19T06:53:04Z Author&#160;Dube, Roger.&#160;Wiley InterScience (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://proquest.safaribooksonline.com/?fpi=9780470193396">Available by subscription from Safari Books Online</a> John Wiley <a href="http://dx.doi.org/10.1002/9780470425497">http://dx.doi.org/10.1002/9780470425497</a> MyiLibrary, Table of contents <a href="http://www.myilibrary.com?id=183706&ref=toc">http://www.myilibrary.com?id=183706&ref=toc</a> Volltext <a href="http://proquest.tech.safaribooksonline.de/9780470193396">http://proquest.tech.safaribooksonline.de/9780470193396</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Reliability and availability of cloud computing ent://SD_ILS/0/SD_ILS:249383 2024-09-19T06:53:04Z 2024-09-19T06:53:04Z Author&#160;Bauer, Eric.&#160;Adams, Randee.&#160;Wiley InterScience (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;IEEE Xplore <a href="http://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=6266788">http://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=6266788</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security 2020 reduce security risks this decade ent://SD_ILS/0/SD_ILS:303839 2024-09-19T06:53:04Z 2024-09-19T06:53:04Z Author&#160;Howard, Doug.&#160;Prince, Kevin.&#160;Wiley InterScience (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;Wiley InterScience <a href="http://dx.doi.org/10.1002/9781118255803">An electronic book accessible through the World Wide Web; click for information</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information technology risk management in enterprise environments a review of industry practices and a practical guide to risk management teams ent://SD_ILS/0/SD_ILS:297862 2024-09-19T06:53:04Z 2024-09-19T06:53:04Z Author&#160;Kouns, Jake.&#160;Minoli, Daniel, 1952-&#160;Wiley InterScience (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;John Wiley <a href="http://dx.doi.org/10.1002/9780470558133">http://dx.doi.org/10.1002/9780470558133</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security risk management body of knowledge ent://SD_ILS/0/SD_ILS:297759 2024-09-19T06:53:04Z 2024-09-19T06:53:04Z Author&#160;Talbot, Julian.&#160;Jakeman, Miles Gareth.&#160;Wiley InterScience (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;John Wiley <a href="http://dx.doi.org/10.1002/9780470494974">http://dx.doi.org/10.1002/9780470494974</a> Books24x7 <a href="http://www.books24x7.com/marc.asp?bookid=43285">http://www.books24x7.com/marc.asp?bookid=43285</a> MyiLibrary, Table of contents <a href="http://www.myilibrary.com?id=230340&ref=toc">http://www.myilibrary.com?id=230340&ref=toc</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> SIP security ent://SD_ILS/0/SD_ILS:297791 2024-09-19T06:53:04Z 2024-09-19T06:53:04Z Author&#160;Sisalem, Dorgham.&#160;Wiley InterScience (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://onlinelibrary.wiley.com/book/10.1002/9780470516997">http://onlinelibrary.wiley.com/book/10.1002/9780470516997</a> John Wiley <a href="http://dx.doi.org/10.1002/9780470516997">http://dx.doi.org/10.1002/9780470516997</a> <a href="http://site.ebrary.com/lib/alltitles/Doc?id=10298102">http://site.ebrary.com/lib/alltitles/Doc?id=10298102</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Secure computer and network systems modeling, analysis and design ent://SD_ILS/0/SD_ILS:296665 2024-09-19T06:53:04Z 2024-09-19T06:53:04Z Author&#160;Ye, Nong.&#160;Wiley InterScience (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;Contributor biographical information <a href="http://catdir.loc.gov/catdir/enhancements/fy0833/2007037133-b.html">http://catdir.loc.gov/catdir/enhancements/fy0833/2007037133-b.html</a> John Wiley <a href="http://dx.doi.org/10.1002/9780470023273">http://dx.doi.org/10.1002/9780470023273</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> ICT futures delivering pervasive, real-time and secure services ent://SD_ILS/0/SD_ILS:302768 2024-09-19T06:53:04Z 2024-09-19T06:53:04Z Author&#160;Warren, Paul (Paul W.)&#160;Davies, J. (N. John)&#160;Brown, David, 1954-&#160;Wiley InterScience (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;John Wiley <a href="http://dx.doi.org/10.1002/9780470758656">http://dx.doi.org/10.1002/9780470758656</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> IPTV security protecting high-value digital contents ent://SD_ILS/0/SD_ILS:302654 2024-09-19T06:53:04Z 2024-09-19T06:53:04Z Author&#160;Ramirez, David.&#160;Wiley InterScience (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;John Wiley <a href="http://dx.doi.org/10.1002/9780470727201">http://dx.doi.org/10.1002/9780470727201</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security in wireless ad hoc and sensor networks ent://SD_ILS/0/SD_ILS:297789 2024-09-19T06:53:04Z 2024-09-19T06:53:04Z Author&#160;&Ccedil;ayirci, E. (Erdal)&#160;Levi, Albert, 1969-&#160;Wiley InterScience (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;John Wiley <a href="http://dx.doi.org/10.1002/9780470516782">http://dx.doi.org/10.1002/9780470516782</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Trustworthy computing analytical and quantitative engineering evaluation ent://SD_ILS/0/SD_ILS:296957 2024-09-19T06:53:04Z 2024-09-19T06:53:04Z Author&#160;Sahinoglu, Mehmet, 1951-&#160;Wiley InterScience (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;Contributor biographical information <a href="http://catdir.loc.gov/catdir/enhancements/fy0739/2006033567-b.html">http://catdir.loc.gov/catdir/enhancements/fy0739/2006033567-b.html</a> John Wiley <a href="http://dx.doi.org/10.1002/9780470127872">http://dx.doi.org/10.1002/9780470127872</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cryptography, information theory, and error-correction a handbook for the 21st century ent://SD_ILS/0/SD_ILS:301860 2024-09-19T06:53:04Z 2024-09-19T06:53:04Z Author&#160;Bruen, Aiden A., 1941-&#160;Forcinito, Mario, 1962-&#160;Wiley InterScience (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;Wiley InterScience <a href="http://dx.doi.org/10.1002/9781118033296">An electronic book accessible through the World Wide Web; click for information</a> Contributor biographical information <a href="http://catdir.loc.gov/catdir/enhancements/fy0618/2004058044-b.html">http://catdir.loc.gov/catdir/enhancements/fy0618/2004058044-b.html</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security for ubiquitous computing ent://SD_ILS/0/SD_ILS:301039 2024-09-19T06:53:04Z 2024-09-19T06:53:04Z Author&#160;Stajano, Frank.&#160;Wiley InterScience (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;John Wiley <a href="http://dx.doi.org/10.1002/0470848693">http://dx.doi.org/10.1002/0470848693</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/>