Arama Sonu&ccedil;lar&#305; Cloud computing -- Security measures. - Daralt&#305;lm&#305;&#351;: &Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane SirsiDynix Enterprise https://katalog.hacettepe.edu.tr/client/tr_TR/default_tr/default_tr/qu$003dCloud$002bcomputing$002b--$002bSecurity$002bmeasures.$0026qf$003dLIBRARY$002509K$0025C3$0025BCt$0025C3$0025BCphane$0025091$00253AONLINE$002509$0025C3$002587evrimi$0025C3$0025A7i$002bK$0025C3$0025BCt$0025C3$0025BCphane$0026ps$003d300?dt=list 2025-12-08T13:05:24Z Green Sustainability: Towards Innovative Digital Transformation Proceedings of ITAF 2023 ent://SD_ILS/0/SD_ILS:528766 2025-12-08T13:05:24Z 2025-12-08T13:05:24Z Yazar&#160;Magdi, Dalia. editor.&#160;El-Fetouh, Ahmed Abou. editor.&#160;Mamdouh, Mohamed. editor.&#160;Joshi, Amit. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-981-99-4764-5">https://doi.org/10.1007/978-981-99-4764-5</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Trust and records in an open digital environment ent://SD_ILS/0/SD_ILS:549382 2025-12-08T13:05:24Z 2025-12-08T13:05:24Z Yazar&#160;Stan&#269;i&#263;, Hrvoje, editor.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003005117">https://www.taylorfrancis.com/books/9781003005117</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Cloud security : concepts, methodologies, tools, and applications ent://SD_ILS/0/SD_ILS:482163 2025-12-08T13:05:24Z 2025-12-08T13:05:24Z Yazar&#160;IGI Global, publisher.&#160;Information Resources Management Association.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-8176-5">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-8176-5</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Detection and mitigation of insider attacks in a cloud infrastructure : emerging research and opportunities ent://SD_ILS/0/SD_ILS:482113 2025-12-08T13:05:24Z 2025-12-08T13:05:24Z Yazar&#160;Gunasekhar, T., 1990- author.&#160;Rao, K. Thirupathi, author.&#160;Kiran, P. Sai, author.&#160;Krishna Reddy, V., author.&#160;Rao, B. Thirumala, author.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-7924-3">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-7924-3</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Federal cloud computing : the definitive guide for cloud service providers ent://SD_ILS/0/SD_ILS:459338 2025-12-08T13:05:24Z 2025-12-08T13:05:24Z Yazar&#160;Metheny, Matthew, author.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128097106">http://www.sciencedirect.com/science/book/9780128097106</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> CSA guide to cloud computing implementing cloud privacy and security ent://SD_ILS/0/SD_ILS:355449 2025-12-08T13:05:24Z 2025-12-08T13:05:24Z Yazar&#160;Samani, Raj, author.&#160;Honan, Brian, author.&#160;Reavis, Jim, author.&#160;Jirasek, Vladimir, editor.&#160;CSA (Organization), issuing body.<br/>Yer Numaras&#305;&#160;ONLINE(355449.1)<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780124201255">http://www.sciencedirect.com/science/book/9780124201255</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Artificial Intelligence and Evolutionary Algorithms in Engineering Systems Proceedings of ICAEES 2014, Volume 1 ent://SD_ILS/0/SD_ILS:529978 2025-12-08T13:05:24Z 2025-12-08T13:05:24Z Yazar&#160;Suresh, L. Padma. editor.&#160;Dash, Subhransu Sekhar. editor.&#160;Panigrahi, Bijaya Ketan. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-81-322-2126-5">https://doi.org/10.1007/978-81-322-2126-5</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Pattern Analysis, Intelligent Security and the Internet of Things ent://SD_ILS/0/SD_ILS:530158 2025-12-08T13:05:24Z 2025-12-08T13:05:24Z Yazar&#160;Abraham, Ajith. editor.&#160;Muda, Azah Kamilah. editor.&#160;Choo, Yun-Huoy. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-3-319-17398-6">https://doi.org/10.1007/978-3-319-17398-6</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Resource optimization and security for cloud services ent://SD_ILS/0/SD_ILS:341979 2025-12-08T13:05:24Z 2025-12-08T13:05:24Z Yazar&#160;Xiong, Kaiqi, author.<br/>Yer Numaras&#305;&#160;ONLINE(341979.1)<br/>Elektronik Eri&#351;im&#160;MyiLibrary <a href="http://www.myilibrary.com?id=578586">http://www.myilibrary.com?id=578586</a> John Wiley <a href="http://dx.doi.org/10.1002/9781118898598">http://dx.doi.org/10.1002/9781118898598</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Developing and securing the cloud ent://SD_ILS/0/SD_ILS:546130 2025-12-08T13:05:24Z 2025-12-08T13:05:24Z Yazar&#160;Thuraisingham, Bhavani M., author.<br/>Yer Numaras&#305;&#160;QA76.585 .T48 2013<br/>Elektronik Eri&#351;im&#160;<a href="https://www.taylorfrancis.com/books/9781439862926">Click here to view.</a><br/>Format:&#160;Kitap<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Securing cloud and mobility : a practitioner's guide ent://SD_ILS/0/SD_ILS:538797 2025-12-08T13:05:24Z 2025-12-08T13:05:24Z Yazar&#160;Lim, Ian., author.&#160;Hourani, Paul.&#160;Coolidge, E. Coleen.<br/>Yer Numaras&#305;&#160;QA76.585 .L56 2013<br/>Elektronik Eri&#351;im&#160;<a href="https://www.taylorfrancis.com/books/9781439850572">Click here to view.</a><br/>Format:&#160;Kitap<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Management strategies for the cloud revolution how cloud computing is transforming business and why you can't afford to be left behind ent://SD_ILS/0/SD_ILS:292969 2025-12-08T13:05:24Z 2025-12-08T13:05:24Z Yazar&#160;Babcock, Charles.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://mhebooklibrary.com/reader/management-strategies-for-cloud-revolution-how-computing-transforming-business-you-cant-afford-to-be-left-behind">Subscription required</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Auditing cloud computing a security and privacy guide ent://SD_ILS/0/SD_ILS:299263 2025-12-08T13:05:24Z 2025-12-08T13:05:24Z Yazar&#160;Halpert, Ben, 1986-<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;Image <a href="http://images.contentreserve.com/ImageType-100/0128-1/{F889EE2A-CF12-4647-85E0-03258F227FC1}Img100.jpg">http://images.contentreserve.com/ImageType-100/0128-1/{F889EE2A-CF12-4647-85E0-03258F227FC1}Img100.jpg</a> Books24x7 <a href="http://www.books24x7.com/marc.asp?bookid=44303">http://www.books24x7.com/marc.asp?bookid=44303</a> John Wiley <a href="http://dx.doi.org/10.1002/9781118269091">http://dx.doi.org/10.1002/9781118269091</a> OverDrive (PDF) <a href="http://www.contentreserve.com/TitleInfo.asp?ID={F889EE2A-CF12-4647-85E0-03258F227FC1}&Format=50">http://www.contentreserve.com/TitleInfo.asp?ID={F889EE2A-CF12-4647-85E0-03258F227FC1}&Format=50</a> OverDrive (EPUB) <a href="http://www.contentreserve.com/TitleInfo.asp?ID={F889EE2A-CF12-4647-85E0-03258F227FC1}&Format=410">http://www.contentreserve.com/TitleInfo.asp?ID={F889EE2A-CF12-4647-85E0-03258F227FC1}&Format=410</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Digital forensics for network, Internet, and cloud computing a forensic evidence guide for moving targets and data ent://SD_ILS/0/SD_ILS:146482 2025-12-08T13:05:24Z 2025-12-08T13:05:24Z Yazar&#160;Lillard, Terrence.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495370">http://www.sciencedirect.com/science/book/9781597495370</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Cloud security and privacy ent://SD_ILS/0/SD_ILS:144722 2025-12-08T13:05:24Z 2025-12-08T13:05:24Z Yazar&#160;Mather, Tim.&#160;Kumaraswamy, Subra.&#160;Latif, Shahed.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;EBSCOhost <a href="http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=414816">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=414816</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/>