Search Results for Computers -- Access control. - Narrowed by: Beytepe Library SirsiDynix Enterprise https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dComputers$002b--$002bAccess$002bcontrol.$0026qf$003dLIBRARY$002509Library$0025091$00253ABEYTEPE$002509Beytepe$002bLibrary$0026ps$003d300? 2025-12-26T14:28:02Z Access control, authentication, and public key infrastructure ent://SD_ILS/0/SD_ILS:271243 2025-12-26T14:28:02Z 2025-12-26T14:28:02Z Author&#160;Ballad, Bill.&#160;Ballad, Tricia.&#160;Banks, Erin K.<br/>Preferred Shelf Number&#160;TK5105.59 B353 2011<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Readings and cases in information security : law and ethics ent://SD_ILS/0/SD_ILS:267743 2025-12-26T14:28:02Z 2025-12-26T14:28:02Z Author&#160;Whitman, Michael E.&#160;Mattord, Herbert J.<br/>Preferred Shelf Number&#160;TK5105.878 W54 2011<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Proceedings of Sixth ACM Symposium on Access Control Models and Technologies : SACMAT 2001 : Litton-TASC, Westfields II Conference Facility, May 3-4, 2001, Chantilly, Virginia, USA ent://SD_ILS/0/SD_ILS:72452 2025-12-26T14:28:02Z 2025-12-26T14:28:02Z Author&#160;ACM Symposium on Access Control Models and Technologies (6th : 2001 : Chantilly, V.A.)&#160;Association for Computing Machinery. Special Interest Group on Security, Audit, and Control.<br/>Preferred Shelf Number&#160;QA 76.9.A25 A292 2001<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Handbook of applied cryptography ent://SD_ILS/0/SD_ILS:109547 2025-12-26T14:28:02Z 2025-12-26T14:28:02Z Author&#160;Menezes, Alfred J.&#160;Van Oorschot, Paul C., ort. yaz.&#160;Vanstone, Scott A., ort. yaz.<br/>Preferred Shelf Number&#160;QA76.9.A25 M46 1997<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/>