Arama Sonuçları Computers -- Access control. - Daraltılmış: Beytepe LibrarySirsiDynix Enterprisehttps://katalog.hacettepe.edu.tr/client/tr_TR/default_tr/default_tr/qu$003dComputers$002b--$002bAccess$002bcontrol.$0026qf$003dLIBRARY$002509Library$0025091$00253ABEYTEPE$002509Beytepe$002bLibrary$0026ps$003d300?2026-02-23T21:58:28ZAccess control, authentication, and public key infrastructureent://SD_ILS/0/SD_ILS:2712432026-02-23T21:58:28Z2026-02-23T21:58:28ZYazar Ballad, Bill. Ballad, Tricia. Banks, Erin K.<br/>Yer Numarası TK5105.59 B353 2011<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>Readings and cases in information security : law and ethicsent://SD_ILS/0/SD_ILS:2677432026-02-23T21:58:28Z2026-02-23T21:58:28ZYazar Whitman, Michael E. Mattord, Herbert J.<br/>Yer Numarası TK5105.878 W54 2011<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>Proceedings of Sixth ACM Symposium on Access Control Models and Technologies : SACMAT 2001 : Litton-TASC, Westfields II Conference Facility, May 3-4, 2001, Chantilly, Virginia, USAent://SD_ILS/0/SD_ILS:724522026-02-23T21:58:28Z2026-02-23T21:58:28ZYazar ACM Symposium on Access Control Models and Technologies (6th : 2001 : Chantilly, V.A.) Association for Computing Machinery. Special Interest Group on Security, Audit, and Control.<br/>Yer Numarası QA 76.9.A25 A292 2001<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>Handbook of applied cryptographyent://SD_ILS/0/SD_ILS:1095472026-02-23T21:58:28Z2026-02-23T21:58:28ZYazar Menezes, Alfred J. Van Oorschot, Paul C., ort. yaz. Vanstone, Scott A., ort. yaz.<br/>Yer Numarası QA76.9.A25 M46 1997<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>