Search Results for Public key infrastructure (Computer security)SirsiDynix Enterprisehttps://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dPublic$002bkey$002binfrastructure$002b$002528Computer$002bsecurity$002529$0026ps$003d300?dt=list2024-11-23T21:25:28Z24 deadly sins of software security programming flaws and how to fix thement://SD_ILS/0/SD_ILS:2933192024-11-23T21:25:28Z2024-11-23T21:25:28ZAuthor Howard, Michael, 1965- LeBlanc, David, 1960- Viega, John.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://mhebooklibrary.com/reader/24-deadly-sins-software-security-programming-flaws-how-to-fix-them">Subscription required</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Beginning cryptography with Javaent://SD_ILS/0/SD_ILS:1442032024-11-23T21:25:28Z2024-11-23T21:25:28ZAuthor Hook, David, 1962-<br/>Preferred Shelf Number ONLINE<br/>Electronic Access EBSCOhost <a href="http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=142234">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=142234</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Public key infrastructure building trusted applications and Web servicesent://SD_ILS/0/SD_ILS:2901082024-11-23T21:25:28Z2024-11-23T21:25:28ZAuthor Vacca, John R.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9780203498156">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>