Arama Sonuçları Work design. - Daraltılmış: Computer security.
SirsiDynix Enterprise
https://katalog.hacettepe.edu.tr/client/tr_TR/default_tr/default_tr/qu$003dWork$002bdesign.$0026qf$003dSUBJECT$002509Konu$002509Computer$002bsecurity.$002509Computer$002bsecurity.$0026ic$003dtrue$0026ps$003d300?
2026-02-21T19:57:50Z
Information security and privacy quick reference the essential handbook for every CISO, CSO, and Chief Privacy Officer
ent://SD_ILS/0/SD_ILS:599946
2026-02-21T19:57:50Z
2026-02-21T19:57:50Z
Yazar Chapple, Mike, author. Shelley, Joe. Stewart, James Michael.<br/>Yer Numarası QA76.9 .A25 C43 2025<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394353347">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394353347</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Quantum computing models for cybersecurity and wireless communications
ent://SD_ILS/0/SD_ILS:599707
2026-02-21T19:57:50Z
2026-02-21T19:57:50Z
Yazar Kumar, Budati Anil, edited. Kumar, Singamaneni Kranthi, edited. Li, Xingwang (Computer scientist), edited.<br/>Yer Numarası QA76.9 .A25 Q36 2025<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394271429">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394271429</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Quantum computing in cybersecurity
ent://SD_ILS/0/SD_ILS:598685
2026-02-21T19:57:50Z
2026-02-21T19:57:50Z
Yazar Rawat, Romil, editor.<br/>Yer Numarası QA76.9 .A25 Q83 2023<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394167401">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394167401</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Symmetric cryptography. Volume 1 : Design and security proofs
ent://SD_ILS/0/SD_ILS:598803
2026-02-21T19:57:50Z
2026-02-21T19:57:50Z
Yazar Boura, Christina, editor. Naya-Plasencia, Maria, editor.<br/>Yer Numarası Z104 .S966 2023<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394256358">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394256358</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Artificial intelligence and data mining approaches in security frameworks
ent://SD_ILS/0/SD_ILS:596957
2026-02-21T19:57:50Z
2026-02-21T19:57:50Z
Yazar Bhargava, Neeraj. Bhargava, Ritu. Rathore, Pramod Singh, 1988- Agrawal, Rashmi, 1978-<br/>Yer Numarası Q335<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119760429">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119760429</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>