Search Results for Computer architecture - Narrowed by: 2006SirsiDynix Enterprisehttps://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dComputer$002barchitecture$0026qf$003dPUBDATE$002509Publication$002bDate$0025092006$0025092006$0026pe$003dd$00253A$0026ps$003d300?dt=list2025-01-01T01:17:42ZAdvances in Computer Systems Architecture 11th Asia-Pacific Conference, ACSAC 2006, Shanghai, China, September 6-8, 2006. Proceedingsent://SD_ILS/0/SD_ILS:1847582025-01-01T01:17:42Z2025-01-01T01:17:42ZAuthor Jesshope, Chris. editor. Egan, Colin. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/11859802">http://dx.doi.org/10.1007/11859802</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>System-on-Chip Next generation electronicsent://SD_ILS/0/SD_ILS:2477562025-01-01T01:17:42Z2025-01-01T01:17:42ZAuthor Al-Hashimi, Bashir M., ed.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1049/PBCS018E">http://dx.doi.org/10.1049/PBCS018E</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Information security architecture an integrated approach to security in the organizationent://SD_ILS/0/SD_ILS:2901762025-01-01T01:17:42Z2025-01-01T01:17:42ZAuthor Tudor, Jan Killmeyer.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9780203488751">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>QuickTime for .NET and COM developersent://SD_ILS/0/SD_ILS:2536982025-01-01T01:17:42Z2025-01-01T01:17:42ZAuthor Cromie, John, 1961-<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780127745756">http://www.sciencedirect.com/science/book/9780127745756</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Distributed systems architecture a middleware approachent://SD_ILS/0/SD_ILS:2538772025-01-01T01:17:42Z2025-01-01T01:17:42ZAuthor Puder, Arno. Römer, Kay. Pilhofer, Frank.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781558606487">http://www.sciencedirect.com/science/book/9781558606487</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Securing IM and P2P applications for the enterpriseent://SD_ILS/0/SD_ILS:2539392025-01-01T01:17:42Z2025-01-01T01:17:42ZAuthor Piccard, Paul L. Sachs, Marcus H.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490177">http://www.sciencedirect.com/science/book/9781597490177</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Information security architecture : an integrated approach to security in the organizationent://SD_ILS/0/SD_ILS:1108652025-01-01T01:17:42Z2025-01-01T01:17:42ZAuthor Tudor, Jan Killmeyer.<br/>Preferred Shelf Number QA76.9.A25 T83 2006<br/>Format: Books<br/>Availability Beytepe Library~1<br/>