Search Results for Security. - Narrowed by: Computer architecture. SirsiDynix Enterprise https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dSecurity.$0026qf$003dSUBJECT$002509Subject$002509Computer$002barchitecture.$002509Computer$002barchitecture.$0026ps$003d300$0026isd$003dtrue? 2025-12-17T15:38:22Z Hardware Security Primitives ent://SD_ILS/0/SD_ILS:527285 2025-12-17T15:38:22Z 2025-12-17T15:38:22Z Author&#160;Tehranipoor, Mark. author.&#160;Pundir, Nitin. author.&#160;Vashistha, Nidish. author.&#160;Farahmandi, Farimah. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-19185-5">https://doi.org/10.1007/978-3-031-19185-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> CAD for Hardware Security ent://SD_ILS/0/SD_ILS:529015 2025-12-17T15:38:22Z 2025-12-17T15:38:22Z Author&#160;Farahmandi, Farimah. author.&#160;Rahman, M. Sazadur. author.&#160;Rajendran, Sree Ranjani. author.&#160;Tehranipoor, Mark. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-26896-0">https://doi.org/10.1007/978-3-031-26896-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer architecture and security : fundamentals of designing secure computer systems ent://SD_ILS/0/SD_ILS:248865 2025-12-17T15:38:22Z 2025-12-17T15:38:22Z Author&#160;Wang, Shuangbao Paul.&#160;Ledley, Robert Steven.<br/>Preferred Shelf Number&#160;QA76.9.A73 W36 2012<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Information security architecture : an integrated approach to security in the organization ent://SD_ILS/0/SD_ILS:110865 2025-12-17T15:38:22Z 2025-12-17T15:38:22Z Author&#160;Tudor, Jan Killmeyer.<br/>Preferred Shelf Number&#160;QA76.9.A25 T83 2006<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Information security architecture : an integrated approach to security in the organization ent://SD_ILS/0/SD_ILS:541238 2025-12-17T15:38:22Z 2025-12-17T15:38:22Z Author&#160;Tudor, Jan Killmeyer., author.<br/>Preferred Shelf Number&#160;QA76.9 .A25 T83 2006<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9780203488751">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> Information security architecture : an integrated approach to security in the organization ent://SD_ILS/0/SD_ILS:544953 2025-12-17T15:38:22Z 2025-12-17T15:38:22Z Author&#160;Tudor, Jan Killmeyer.<br/>Preferred Shelf Number&#160;QA76.9 .A25<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9780429131790">https://www.taylorfrancis.com/books/9780429131790</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Software Defined Chips Volume II ent://SD_ILS/0/SD_ILS:527085 2025-12-17T15:38:22Z 2025-12-17T15:38:22Z Author&#160;Liu, Leibo. author.&#160;Wei, Shaojun. author.&#160;Zhu, Jianfeng. author.&#160;Deng, Chenchen. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-19-7636-0">https://doi.org/10.1007/978-981-19-7636-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Big Data A Primer ent://SD_ILS/0/SD_ILS:529932 2025-12-17T15:38:22Z 2025-12-17T15:38:22Z Author&#160;Mohanty, Hrushikesha. editor.&#160;Bhuyan, Prachet. editor.&#160;Chenthati, Deepak. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-81-322-2494-5">https://doi.org/10.1007/978-81-322-2494-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Trusted Computing for Embedded Systems ent://SD_ILS/0/SD_ILS:530149 2025-12-17T15:38:22Z 2025-12-17T15:38:22Z Author&#160;Candaele, Bernard. editor.&#160;Soudris, Dimitrios. editor.&#160;Anagnostopoulos, Iraklis. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-09420-5">https://doi.org/10.1007/978-3-319-09420-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Citrix Access Suite 4 advanced concepts the official guide ent://SD_ILS/0/SD_ILS:293372 2025-12-17T15:38:22Z 2025-12-17T15:38:22Z Author&#160;Kaplan, Steve, 1955-&#160;Jones, Andy.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://mhebooklibrary.com/reader/citrix-access-suite-4-advanced-concepts-official-guide-second-edition">Subscription required</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Communication architectures for systems-on-chip ent://SD_ILS/0/SD_ILS:546461 2025-12-17T15:38:22Z 2025-12-17T15:38:22Z Author&#160;Ayala, Jose L.<br/>Preferred Shelf Number&#160;TK7895 .E42 C66 2011<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781439841716">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> Sustainable enterprise architecture ent://SD_ILS/0/SD_ILS:546748 2025-12-17T15:38:22Z 2025-12-17T15:38:22Z Author&#160;Hausman, Kalani Kirk., author.<br/>Preferred Shelf Number&#160;QA76.9 .A73 H38 2011<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781439821558">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> Safety of computer architectures ent://SD_ILS/0/SD_ILS:304132 2025-12-17T15:38:22Z 2025-12-17T15:38:22Z Author&#160;Boulanger, Jean-Louis.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://lib.myilibrary.com?id=450000">Connect to MyiLibrary resource.</a> Wiley <a href="http://onlinelibrary.wiley.com/book/10.1002/9781118600696">http://onlinelibrary.wiley.com/book/10.1002/9781118600696</a> John Wiley <a href="http://dx.doi.org/10.1002/9781118600696">http://dx.doi.org/10.1002/9781118600696</a> ebrary <a href="http://site.ebrary.com/id/10657623">http://site.ebrary.com/id/10657623</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Architecting secure software systems ent://SD_ILS/0/SD_ILS:538962 2025-12-17T15:38:22Z 2025-12-17T15:38:22Z Author&#160;Talukder, Asoke K., author.&#160;Chaitanya, Manish.<br/>Preferred Shelf Number&#160;QA76.9 .A25 T34 2009<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781420087857">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> Secure architectures with OpenBSD ent://SD_ILS/0/SD_ILS:109506 2025-12-17T15:38:22Z 2025-12-17T15:38:22Z Author&#160;Palmer, Brandon.&#160;Nazario, Jose, ort. yaz.<br/>Preferred Shelf Number&#160;QA76.76.O63 P335 2004<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Architectures for e-Business systems : building the foundation for tomorrow's success ent://SD_ILS/0/SD_ILS:544972 2025-12-17T15:38:22Z 2025-12-17T15:38:22Z Author&#160;Purba, Sanjiv.<br/>Preferred Shelf Number&#160;HF5548.32 .A73 2002<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781420031508">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/>