Search Results for Threats. - Narrowed by: Computer architecture. SirsiDynix Enterprise https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dThreats.$0026qf$003dSUBJECT$002509Subject$002509Computer$002barchitecture.$002509Computer$002barchitecture.$0026ps$003d300?dt=list 2026-03-22T02:25:44Z Guide to Computer Network Security ent://SD_ILS/0/SD_ILS:602382 2026-03-22T02:25:44Z 2026-03-22T02:25:44Z Author&#160;Kizza, Joseph Migga. author. (orcid)0009-0001-1564-4277&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-47549-8">https://doi.org/10.1007/978-3-031-47549-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Hardware Protection through Obfuscation ent://SD_ILS/0/SD_ILS:613957 2026-03-22T02:25:44Z 2026-03-22T02:25:44Z Author&#160;Forte, Domenic. editor.&#160;Bhunia, Swarup. editor.&#160;Tehranipoor, Mark M. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-49019-9">https://doi.org/10.1007/978-3-319-49019-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Elements of Cloud Computing Security A Survey of Key Practicalities ent://SD_ILS/0/SD_ILS:617823 2026-03-22T02:25:44Z 2026-03-22T02:25:44Z Author&#160;Alani, Mohammed M. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-41411-9">https://doi.org/10.1007/978-3-319-41411-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/>