Search Results for Software architecture - Narrowed by: Computer security.
SirsiDynix Enterprise
https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dSoftware$002barchitecture$0026qf$003dSUBJECT$002509Subject$002509Computer$002bsecurity.$002509Computer$002bsecurity.$0026ic$003dtrue$0026ps$003d300$0026isd$003dtrue?
2026-01-21T07:27:27Z
Exploring security in software architecture and design
ent://SD_ILS/0/SD_ILS:481871
2026-01-21T07:27:27Z
2026-01-21T07:27:27Z
Author Felderer, Michael, editor. Scandariato, Riccardo, editor. IGI Global, publisher.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-6313-6">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-6313-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Implementing enterprise cybersecurity with open-source software and standard architecture. Volume II
ent://SD_ILS/0/SD_ILS:588974
2026-01-21T07:27:27Z
2026-01-21T07:27:27Z
Author Handa, Anand, editor. Negi, Rohit, editor. Venkatesan, S., editor. Shukla, Sandeep K., editor.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003426134">https://www.taylorfrancis.com/books/9781003426134</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Implementing enterprise cybersecurity with open-source software and standard architecture
ent://SD_ILS/0/SD_ILS:576349
2026-01-21T07:27:27Z
2026-01-21T07:27:27Z
Author Handa, Anand, editor. Negi, Rohit, editor. Shukla, Sandeep K., editor.<br/>Preferred Shelf Number QA76.9 .A25 I47 2021 EB<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003338512">https://www.taylorfrancis.com/books/9781003338512</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Quantum computing models for cybersecurity and wireless communications
ent://SD_ILS/0/SD_ILS:599707
2026-01-21T07:27:27Z
2026-01-21T07:27:27Z
Author Kumar, Budati Anil, edited. Kumar, Singamaneni Kranthi, edited. Li, Xingwang (Computer scientist), edited.<br/>Preferred Shelf Number QA76.9 .A25 Q36 2025<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394271429">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394271429</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
x86 software reverse-engineering, cracking, and counter-measures
ent://SD_ILS/0/SD_ILS:598920
2026-01-21T07:27:27Z
2026-01-21T07:27:27Z
Author Domas, Stephanie, author. Domas, Christopher, author.<br/>Preferred Shelf Number QA76.9 .A25 D66 2024<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394277131">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394277131</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Software security : concepts & practices
ent://SD_ILS/0/SD_ILS:570473
2026-01-21T07:27:27Z
2026-01-21T07:27:27Z
Author Khan, Suhel Ahmad, author. Kumar, Rajeev, author. Khan, R. A. (Raees Ahmad), author.<br/>Preferred Shelf Number QA76.76 .D47<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003330516">https://www.taylorfrancis.com/books/9781003330516</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Trust in computer systems and the cloud
ent://SD_ILS/0/SD_ILS:597142
2026-01-21T07:27:27Z
2026-01-21T07:27:27Z
Author Bursell, Mike, author.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119695158">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119695158</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cyber security in parallel and distributed computing : concepts, techniques, applications and case studies
ent://SD_ILS/0/SD_ILS:595099
2026-01-21T07:27:27Z
2026-01-21T07:27:27Z
Author Le, Dac-Nhuong, 1983- editor. Kumar, Raghvendra, 1987- editor. Mishra, Brojo Kishore, 1979- editor. Khari, Manju, editor. Chatterjee, Jyotir Moy, editor.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119488330">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119488330</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Insider computer fraud : an in-depth framework for detecting and defending against insider IT attacks
ent://SD_ILS/0/SD_ILS:544396
2026-01-21T07:27:27Z
2026-01-21T07:27:27Z
Author Brancik, Kenneth C., author.<br/>Preferred Shelf Number QA76.9 .A25 B725 2008<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781420046601">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>