Search Results for hardware. - Narrowed by: Computer security.
SirsiDynix Enterprise
https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dhardware.$0026qf$003dSUBJECT$002509Subject$002509Computer$002bsecurity.$002509Computer$002bsecurity.$0026ic$003dtrue$0026ps$003d300$0026isd$003dtrue?
2025-12-11T19:33:49Z
Hardware security : design, threats, and safeguards
ent://SD_ILS/0/SD_ILS:543620
2025-12-11T19:33:49Z
2025-12-11T19:33:49Z
Author Mukhopadhyay, Debdeep, author. Subhra, Rajat, author.<br/>Preferred Shelf Number QA76.9 .A25 M85 2015<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781439895849">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>
Hardware security : a hands-on learning approach
ent://SD_ILS/0/SD_ILS:460410
2025-12-11T19:33:49Z
2025-12-11T19:33:49Z
Author Bhunia, Swarup, author. Tehranipoor, Mohammad H., 1974- author.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="https://www.sciencedirect.com/science/book/9780128124772">https://www.sciencedirect.com/science/book/9780128124772</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
The Hardware Trojan War Attacks, Myths, and Defenses
ent://SD_ILS/0/SD_ILS:400849
2025-12-11T19:33:49Z
2025-12-11T19:33:49Z
Author Bhunia, Swarup. editor. Tehranipoor, Mark M. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-68511-3">https://doi.org/10.1007/978-3-319-68511-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Trusted Digital Circuits Hardware Trojan Vulnerabilities, Prevention and Detection
ent://SD_ILS/0/SD_ILS:400715
2025-12-11T19:33:49Z
2025-12-11T19:33:49Z
Author Salmani, Hassan. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-79081-7">https://doi.org/10.1007/978-3-319-79081-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cryptographic Hardware and Embedded Systems -- CHES 2014 16th International Workshop, Busan, South Korea, September 23-26, 2014, Proceedings
ent://SD_ILS/0/SD_ILS:489052
2025-12-11T19:33:49Z
2025-12-11T19:33:49Z
Author Batina, Lejla. editor. (orcid)0000-0003-0727-3573 Robshaw, Matthew. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-662-44709-3">https://doi.org/10.1007/978-3-662-44709-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Progress in Cryptology – AFRICACRYPT 2018 10th International Conference on Cryptology in Africa, Marrakesh, Morocco, May 7–9, 2018, Proceedings
ent://SD_ILS/0/SD_ILS:400845
2025-12-11T19:33:49Z
2025-12-11T19:33:49Z
Author Joux, Antoine. editor. Nitaj, Abderrahmane. editor. Rachidi, Tajjeeddine. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-89339-6">https://doi.org/10.1007/978-3-319-89339-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>