Arama Sonu&ccedil;lar&#305; Computer architecture - Daralt&#305;lm&#305;&#351;: Computer security. SirsiDynix Enterprise https://katalog.hacettepe.edu.tr/client/tr_TR/default_tr/default_tr/qu$003dComputer$002barchitecture$0026qf$003dSUBJECT$002509Konu$002509Computer$002bsecurity.$002509Computer$002bsecurity.$0026ic$003dtrue$0026ps$003d300$0026isd$003dtrue? 2026-01-21T18:20:01Z Computer architecture and security : fundamentals of designing secure computer systems ent://SD_ILS/0/SD_ILS:248865 2026-01-21T18:20:01Z 2026-01-21T18:20:01Z Yazar&#160;Wang, Shuangbao Paul.&#160;Ledley, Robert Steven.<br/>Yer Numaras&#305;&#160;QA76.9.A73 W36 2012<br/>Format:&#160;Kitap<br/>Durum&#160;Beytepe K&uuml;t&uuml;phanesi~1<br/> Fully Homomorphic Encryption in Real World Applications ent://SD_ILS/0/SD_ILS:484546 2026-01-21T18:20:01Z 2026-01-21T18:20:01Z Yazar&#160;Chatterjee, Ayantika. author.&#160;Aung, Khin Mi Mi. author.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-981-13-6393-1">https://doi.org/10.1007/978-981-13-6393-1</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> AI-Enabled Threat Intelligence and Cyber Risk Assessment ent://SD_ILS/0/SD_ILS:582312 2026-01-21T18:20:01Z 2026-01-21T18:20:01Z Yazar&#160;Martiri, Edlira, editor&#160;Vajjhala, Narasimha, 1978- editor.&#160;Dalipi, Fisnik, editor<br/>Yer Numaras&#305;&#160;QA76.9 .A25<br/>Elektronik Eri&#351;im&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003504979">https://www.taylorfrancis.com/books/9781003504979</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Security technologies for law enforcement agencies ent://SD_ILS/0/SD_ILS:589138 2026-01-21T18:20:01Z 2026-01-21T18:20:01Z Yazar&#160;Duraklar, Kaz&#305;m author.<br/>Yer Numaras&#305;&#160;QA76.9 .A25<br/>Elektronik Eri&#351;im&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003597445">https://www.taylorfrancis.com/books/9781003597445</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> ENTERPRISE FORTRESS the ultimate handbook for enterprise security architecture. ent://SD_ILS/0/SD_ILS:591038 2026-01-21T18:20:01Z 2026-01-21T18:20:01Z Yazar&#160;Stevens, Alex.<br/>Yer Numaras&#305;&#160;QA76.9 .A25<br/>Elektronik Eri&#351;im&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003585923">https://www.taylorfrancis.com/books/9781003585923</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Quantum computing in cybersecurity ent://SD_ILS/0/SD_ILS:598685 2026-01-21T18:20:01Z 2026-01-21T18:20:01Z Yazar&#160;Rawat, Romil, editor.<br/>Yer Numaras&#305;&#160;QA76.9 .A25 Q83 2023<br/>Elektronik Eri&#351;im&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394167401">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394167401</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Trust in computer systems and the cloud ent://SD_ILS/0/SD_ILS:597142 2026-01-21T18:20:01Z 2026-01-21T18:20:01Z Yazar&#160;Bursell, Mike, author.<br/>Yer Numaras&#305;&#160;QA76.9 .A25<br/>Elektronik Eri&#351;im&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119695158">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119695158</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Secure searchable encryption and data management ent://SD_ILS/0/SD_ILS:564284 2026-01-21T18:20:01Z 2026-01-21T18:20:01Z Yazar&#160;Gupta, Brij, 1982- author.&#160;Mamta, author.<br/>Yer Numaras&#305;&#160;QA76.9 .A25 G87 2021<br/>Elektronik Eri&#351;im&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003107316">https://www.taylorfrancis.com/books/9781003107316</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Artificial intelligence and data mining approaches in security frameworks ent://SD_ILS/0/SD_ILS:596957 2026-01-21T18:20:01Z 2026-01-21T18:20:01Z Yazar&#160;Bhargava, Neeraj.&#160;Bhargava, Ritu.&#160;Rathore, Pramod Singh, 1988-&#160;Agrawal, Rashmi, 1978-<br/>Yer Numaras&#305;&#160;Q335<br/>Elektronik Eri&#351;im&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119760429">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119760429</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Smart City and Informatization 7th International Conference, iSCI 2019, Guangzhou, China, November 12&ndash;15, 2019, Proceedings ent://SD_ILS/0/SD_ILS:485810 2026-01-21T18:20:01Z 2026-01-21T18:20:01Z Yazar&#160;Wang, Guojun. editor. (orcid)0000-0001-9875-4182&#160;El Saddik, Abdulmotaleb. editor.&#160;Lai, Xuejia. editor. (orcid)0000-0001-5917-4783&#160;Martinez Perez, Gregorio. editor. (orcid)0000-0001-5532-6604&#160;Choo, Kim-Kwang Raymond. editor. (orcid)0000-0001-9208-5336<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-981-15-1301-5">https://doi.org/10.1007/978-981-15-1301-5</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Cyber security in parallel and distributed computing : concepts, techniques, applications and case studies ent://SD_ILS/0/SD_ILS:595099 2026-01-21T18:20:01Z 2026-01-21T18:20:01Z Yazar&#160;Le, Dac-Nhuong, 1983- editor.&#160;Kumar, Raghvendra, 1987- editor.&#160;Mishra, Brojo Kishore, 1979- editor.&#160;Khari, Manju, editor.&#160;Chatterjee, Jyotir Moy, editor.<br/>Yer Numaras&#305;&#160;QA76.9 .A25<br/>Elektronik Eri&#351;im&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119488330">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119488330</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Security for Service Oriented Architectures. ent://SD_ILS/0/SD_ILS:542633 2026-01-21T18:20:01Z 2026-01-21T18:20:01Z Yazar&#160;Williams, Walter, author.&#160;CRC Press LLC.<br/>Yer Numaras&#305;&#160;TK5105.5828 .W55 2017<br/>Elektronik Eri&#351;im&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9780429072185">https://www.taylorfrancis.com/books/9780429072185</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Oracle Fusion middleware 11g architecture and management ent://SD_ILS/0/SD_ILS:293252 2026-01-21T18:20:01Z 2026-01-21T18:20:01Z Yazar&#160;Shafii, Reza.&#160;Lee, Stephen, 1975 June 8-&#160;Konduri, Gangadhar.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://mhebooklibrary.com/reader/oracle-fusion-middleware-11g-architecture-management">Subscription required</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Safety of computer architectures ent://SD_ILS/0/SD_ILS:304132 2026-01-21T18:20:01Z 2026-01-21T18:20:01Z Yazar&#160;Boulanger, Jean-Louis.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://lib.myilibrary.com?id=450000">Connect to MyiLibrary resource.</a> Wiley <a href="http://onlinelibrary.wiley.com/book/10.1002/9781118600696">http://onlinelibrary.wiley.com/book/10.1002/9781118600696</a> John Wiley <a href="http://dx.doi.org/10.1002/9781118600696">http://dx.doi.org/10.1002/9781118600696</a> ebrary <a href="http://site.ebrary.com/id/10657623">http://site.ebrary.com/id/10657623</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Architecting secure software systems ent://SD_ILS/0/SD_ILS:538962 2026-01-21T18:20:01Z 2026-01-21T18:20:01Z Yazar&#160;Talukder, Asoke K., author.&#160;Chaitanya, Manish.<br/>Yer Numaras&#305;&#160;QA76.9 .A25 T34 2009<br/>Elektronik Eri&#351;im&#160;<a href="https://www.taylorfrancis.com/books/9781420087857">Click here to view.</a><br/>Format:&#160;Kitap<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Insider computer fraud : an in-depth framework for detecting and defending against insider IT attacks ent://SD_ILS/0/SD_ILS:544396 2026-01-21T18:20:01Z 2026-01-21T18:20:01Z Yazar&#160;Brancik, Kenneth C., author.<br/>Yer Numaras&#305;&#160;QA76.9 .A25 B725 2008<br/>Elektronik Eri&#351;im&#160;<a href="https://www.taylorfrancis.com/books/9781420046601">Click here to view.</a><br/>Format:&#160;Kitap<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Securing IM and P2P applications for the enterprise ent://SD_ILS/0/SD_ILS:253939 2026-01-21T18:20:01Z 2026-01-21T18:20:01Z Yazar&#160;Piccard, Paul L.&#160;Sachs, Marcus H.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490177">http://www.sciencedirect.com/science/book/9781597490177</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Information security architecture : an integrated approach to security in the organization ent://SD_ILS/0/SD_ILS:110865 2026-01-21T18:20:01Z 2026-01-21T18:20:01Z Yazar&#160;Tudor, Jan Killmeyer.<br/>Yer Numaras&#305;&#160;QA76.9.A25 T83 2006<br/>Format:&#160;Kitap<br/>Durum&#160;Beytepe K&uuml;t&uuml;phanesi~1<br/> Information security architecture : an integrated approach to security in the organization ent://SD_ILS/0/SD_ILS:541238 2026-01-21T18:20:01Z 2026-01-21T18:20:01Z Yazar&#160;Tudor, Jan Killmeyer., author.<br/>Yer Numaras&#305;&#160;QA76.9 .A25 T83 2006<br/>Elektronik Eri&#351;im&#160;<a href="https://www.taylorfrancis.com/books/9780203488751">Click here to view.</a><br/>Format:&#160;Kitap<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Trusted Computing ent://SD_ILS/0/SD_ILS:247871 2026-01-21T18:20:01Z 2026-01-21T18:20:01Z Yazar&#160;Mitchell, Chris, ed.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1049/PBPC006E">http://dx.doi.org/10.1049/PBPC006E</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Secure architectures with OpenBSD ent://SD_ILS/0/SD_ILS:109506 2026-01-21T18:20:01Z 2026-01-21T18:20:01Z Yazar&#160;Palmer, Brandon.&#160;Nazario, Jose, ort. yaz.<br/>Yer Numaras&#305;&#160;QA76.76.O63 P335 2004<br/>Format:&#160;Kitap<br/>Durum&#160;Beytepe K&uuml;t&uuml;phanesi~1<br/> Information security architecture : an integrated approach to security in the organization ent://SD_ILS/0/SD_ILS:544953 2026-01-21T18:20:01Z 2026-01-21T18:20:01Z Yazar&#160;Tudor, Jan Killmeyer.<br/>Yer Numaras&#305;&#160;QA76.9 .A25<br/>Elektronik Eri&#351;im&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9780429131790">https://www.taylorfrancis.com/books/9780429131790</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/>