Search Results for Computer Security. - Narrowed by: Computer architecture.SirsiDynix Enterprisehttps://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dComputer$002bSecurity.$0026qf$003dSUBJECT$002509Subject$002509Computer$002barchitecture.$002509Computer$002barchitecture.$0026ic$003dtrue$0026ps$003d300?2024-10-26T23:26:15ZComputer architecture and security : fundamentals of designing secure computer systemsent://SD_ILS/0/SD_ILS:2488652024-10-26T23:26:15Z2024-10-26T23:26:15ZAuthor Wang, Shuangbao Paul. Ledley, Robert Steven.<br/>Preferred Shelf Number QA76.9.A73 W36 2012<br/>Format: Books<br/>Availability Beytepe Library~1<br/>Citrix Access Suite 4 advanced concepts the official guideent://SD_ILS/0/SD_ILS:2933722024-10-26T23:26:15Z2024-10-26T23:26:15ZAuthor Kaplan, Steve, 1955- Jones, Andy.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://mhebooklibrary.com/reader/citrix-access-suite-4-advanced-concepts-official-guide-second-edition">Subscription required</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Safety of computer architecturesent://SD_ILS/0/SD_ILS:3041322024-10-26T23:26:15Z2024-10-26T23:26:15ZAuthor Boulanger, Jean-Louis.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://lib.myilibrary.com?id=450000">Connect to MyiLibrary resource.</a>
Wiley <a href="http://onlinelibrary.wiley.com/book/10.1002/9781118600696">http://onlinelibrary.wiley.com/book/10.1002/9781118600696</a>
John Wiley <a href="http://dx.doi.org/10.1002/9781118600696">http://dx.doi.org/10.1002/9781118600696</a>
ebrary <a href="http://site.ebrary.com/id/10657623">http://site.ebrary.com/id/10657623</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Architecting secure software systemsent://SD_ILS/0/SD_ILS:2887492024-10-26T23:26:15Z2024-10-26T23:26:15ZAuthor Talukder, Asoke K. Chaitanya, Manish.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781420087857">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Information security architecture an integrated approach to security in the organizationent://SD_ILS/0/SD_ILS:2901762024-10-26T23:26:15Z2024-10-26T23:26:15ZAuthor Tudor, Jan Killmeyer.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9780203488751">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Information security architecture : an integrated approach to security in the organizationent://SD_ILS/0/SD_ILS:1108652024-10-26T23:26:15Z2024-10-26T23:26:15ZAuthor Tudor, Jan Killmeyer.<br/>Preferred Shelf Number QA76.9.A25 T83 2006<br/>Format: Books<br/>Availability Beytepe Library~1<br/>Secure architectures with OpenBSDent://SD_ILS/0/SD_ILS:1095062024-10-26T23:26:15Z2024-10-26T23:26:15ZAuthor Palmer, Brandon. Nazario, Jose, ort. yaz.<br/>Preferred Shelf Number QA76.76.O63 P335 2004<br/>Format: Books<br/>Availability Beytepe Library~1<br/>Information security architectureent://SD_ILS/0/SD_ILS:2858152024-10-26T23:26:15Z2024-10-26T23:26:15ZAuthor Tudor, Jan Killmeyer.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781420031034">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>