Search Results for Web services - Narrowed by: Computer security.
SirsiDynix Enterprise
https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dWeb$002bservices$0026qf$003dSUBJECT$002509Subject$002509Computer$002bsecurity.$002509Computer$002bsecurity.$0026ic$003dtrue$0026ps$003d300$0026isd$003dtrue?
2026-01-21T17:50:12Z
Web Services – ICWS 2019 26th International Conference, Held as Part of the Services Conference Federation, SCF 2019, San Diego, CA, USA, June 25–30, 2019, Proceedings
ent://SD_ILS/0/SD_ILS:486325
2026-01-21T17:50:12Z
2026-01-21T17:50:12Z
Author Miller, John. editor. Stroulia, Eleni. editor. Lee, Kisung. editor. (orcid)0000-0003-4367-4374 Zhang, Liang-Jie. editor. (orcid)0000-0002-6219-0853 SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-23499-7">https://doi.org/10.1007/978-3-030-23499-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Web Services – ICWS 2018 25th International Conference, Held as Part of the Services Conference Federation, SCF 2018, Seattle, WA, USA, June 25-30, 2018, Proceedings
ent://SD_ILS/0/SD_ILS:399629
2026-01-21T17:50:12Z
2026-01-21T17:50:12Z
Author Jin, Hai. editor. Wang, Qingyang. editor. (orcid)0000-0002-5729-2898 Zhang, Liang-Jie. editor. (orcid)0000-0002-6219-0853 SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-94289-6">https://doi.org/10.1007/978-3-319-94289-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Public key infrastructure : building trusted applications and Web services
ent://SD_ILS/0/SD_ILS:543281
2026-01-21T17:50:12Z
2026-01-21T17:50:12Z
Author Vacca, John R.<br/>Preferred Shelf Number QA76.9 .A25 P85 2004<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9780203498156">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>
Cyber defense : best practices for digital safety
ent://SD_ILS/0/SD_ILS:600003
2026-01-21T17:50:12Z
2026-01-21T17:50:12Z
Author Edwards, Jason, author.<br/>Preferred Shelf Number QA76.9 .A25 E39 2025<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394337040">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394337040</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cyber security in parallel and distributed computing : concepts, techniques, applications and case studies
ent://SD_ILS/0/SD_ILS:595099
2026-01-21T17:50:12Z
2026-01-21T17:50:12Z
Author Le, Dac-Nhuong, 1983- editor. Kumar, Raghvendra, 1987- editor. Mishra, Brojo Kishore, 1979- editor. Khari, Manju, editor. Chatterjee, Jyotir Moy, editor.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119488330">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119488330</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cybersecurity blue team toolkit
ent://SD_ILS/0/SD_ILS:595209
2026-01-21T17:50:12Z
2026-01-21T17:50:12Z
Author Tanner, Nadean H., author.<br/>Preferred Shelf Number QA76.9 .A25 T36 2019 EB<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119552963">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119552963</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Digital forensics
ent://SD_ILS/0/SD_ILS:593346
2026-01-21T17:50:12Z
2026-01-21T17:50:12Z
Author Årnes, André, 1976- editor.<br/>Preferred Shelf Number HV8079 .C65<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119262442">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119262442</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cloud management and security
ent://SD_ILS/0/SD_ILS:341816
2026-01-21T17:50:12Z
2026-01-21T17:50:12Z
Author Abbadi, Imad M., author.<br/>Preferred Shelf Number ONLINE(341816.1)<br/>Electronic Access ebrary <a href="http://alltitles.ebrary.com/Doc?id=10881234">An electronic book accessible through the World Wide Web; click to view</a>
<a href="http://www.lib.uts.edu.au/sso/goto.php?url=http://www.UTS.eblib.com.AU/EBLWeb/patron/?target=patron&extendedid=P_1701403_0">Electronic version</a>
Cover image <a href="http://catalogimages.wiley.com/images/db/jimages/9781118817094.jpg">http://catalogimages.wiley.com/images/db/jimages/9781118817094.jpg</a>
John Wiley <a href="http://dx.doi.org/10.1002/9781118817087">http://dx.doi.org/10.1002/9781118817087</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Architecting secure software systems
ent://SD_ILS/0/SD_ILS:538962
2026-01-21T17:50:12Z
2026-01-21T17:50:12Z
Author Talukder, Asoke K., author. Chaitanya, Manish.<br/>Preferred Shelf Number QA76.9 .A25 T34 2009<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781420087857">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>
Insider computer fraud : an in-depth framework for detecting and defending against insider IT attacks
ent://SD_ILS/0/SD_ILS:544396
2026-01-21T17:50:12Z
2026-01-21T17:50:12Z
Author Brancik, Kenneth C., author.<br/>Preferred Shelf Number QA76.9 .A25 B725 2008<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781420046601">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>