Arama Sonuçları Web services. - Daraltılmış: Computer security.SirsiDynix Enterprisehttps://katalog.hacettepe.edu.tr/client/tr_TR/default_tr/default_tr/qu$003dWeb$002bservices.$0026qf$003dSUBJECT$002509Konu$002509Computer$002bsecurity.$002509Computer$002bsecurity.$0026ic$003dtrue$0026ps$003d300?dt=list2025-12-08T08:31:33ZWeb Services – ICWS 2019 26th International Conference, Held as Part of the Services Conference Federation, SCF 2019, San Diego, CA, USA, June 25–30, 2019, Proceedingsent://SD_ILS/0/SD_ILS:4863252025-12-08T08:31:33Z2025-12-08T08:31:33ZYazar Miller, John. editor. Stroulia, Eleni. editor. Lee, Kisung. editor. (orcid)0000-0003-4367-4374 Zhang, Liang-Jie. editor. (orcid)0000-0002-6219-0853 SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-030-23499-7">https://doi.org/10.1007/978-3-030-23499-7</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Web Services – ICWS 2018 25th International Conference, Held as Part of the Services Conference Federation, SCF 2018, Seattle, WA, USA, June 25-30, 2018, Proceedingsent://SD_ILS/0/SD_ILS:3996292025-12-08T08:31:33Z2025-12-08T08:31:33ZYazar Jin, Hai. editor. Wang, Qingyang. editor. (orcid)0000-0002-5729-2898 Zhang, Liang-Jie. editor. (orcid)0000-0002-6219-0853 SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-319-94289-6">https://doi.org/10.1007/978-3-319-94289-6</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Public key infrastructure : building trusted applications and Web servicesent://SD_ILS/0/SD_ILS:5432812025-12-08T08:31:33Z2025-12-08T08:31:33ZYazar Vacca, John R.<br/>Yer Numarası QA76.9 .A25 P85 2004<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9780203498156">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>Cloud management and securityent://SD_ILS/0/SD_ILS:3418162025-12-08T08:31:33Z2025-12-08T08:31:33ZYazar Abbadi, Imad M., author.<br/>Yer Numarası ONLINE(341816.1)<br/>Elektronik Erişim ebrary <a href="http://alltitles.ebrary.com/Doc?id=10881234">An electronic book accessible through the World Wide Web; click to view</a>
<a href="http://www.lib.uts.edu.au/sso/goto.php?url=http://www.UTS.eblib.com.AU/EBLWeb/patron/?target=patron&extendedid=P_1701403_0">Electronic version</a>
Cover image <a href="http://catalogimages.wiley.com/images/db/jimages/9781118817094.jpg">http://catalogimages.wiley.com/images/db/jimages/9781118817094.jpg</a>
John Wiley <a href="http://dx.doi.org/10.1002/9781118817087">http://dx.doi.org/10.1002/9781118817087</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Architecting secure software systemsent://SD_ILS/0/SD_ILS:5389622025-12-08T08:31:33Z2025-12-08T08:31:33ZYazar Talukder, Asoke K., author. Chaitanya, Manish.<br/>Yer Numarası QA76.9 .A25 T34 2009<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9781420087857">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>Insider computer fraud : an in-depth framework for detecting and defending against insider IT attacksent://SD_ILS/0/SD_ILS:5443962025-12-08T08:31:33Z2025-12-08T08:31:33ZYazar Brancik, Kenneth C., author.<br/>Yer Numarası QA76.9 .A25 B725 2008<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9781420046601">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>