Log In
|
My Account
|
My Lists
|
|
Remember to clear the cache and close the browser window.
Search Limit
Everything
E-Book
Journals
Beytepe Library
Health Sciences Library
Conservatory Library
Law Library
Social Sciences Vocational High School
DVD Collection
Prof.Dr. Onur Bilge Kula Collection
Rooms Restriction Values
All Fields
Title
Author
Subject
ISBN
ISSN
8
Search Field
All Fields
Target Value
Limit Value
Restriction Value
Search For:
Advanced Search
Limit Search Results
Narrowed by:
+
Subject: Networking.
Author
Include
Exclude
Bhatt, Chintan M., 1988- editor.
(1)
Chapple, Mike, author.
(1)
Chen, Lei, 1978 July 28- editor.
(1)
Chirillo, John, 1970- author.
(1)
Clinton, David.
(1)
Couretas, Jerry M., 1966- author.
(1)
Guerrier, Claudine, author.
(1)
Hoang, Dinh Thai, 1986- author.
(1)
Jakobsen, Adam Tilmar, author.
(1)
Le, Dac-Nhuong, 1983- editor.
(1)
Le-Khac, Nhien-An, 1972- editor.
(1)
Liyanage, Madhusanka, author.
(1)
Mack, Sean D., author.
(1)
Madhukar, Mani, editor.
(1)
Mammeri, Zoubir, author.
(1)
Penttinen, Jyrki T. J., author.
(1)
Piper, Ben.
(1)
Porambage, Pawani, author.
(1)
Shelley, Joe.
(1)
Stewart, James Michael.
(1)
Takabi, Hassan, 1982- editor.
(1)
More
View All
Fewer
Collapse All
Language
Include
Exclude
English
(13)
Publication Date
Include
Exclude
-
2019
(4)
2024
(4)
2023
(2)
2025
(2)
2021
(1)
Subject
Include
Exclude
COMPUTERS.
(13)
Electronic books.
(12)
Security.
(10)
Computer security.
(4)
Sécurité informatique.
(4)
Cryptography.
(3)
Mobile & Wireless Communications.
(3)
TECHNOLOGY & ENGINEERING.
(3)
Certification Guides.
(2)
Cloud computing -- Security measures.
(2)
Infonuagique -- Sécurité -- Mesures.
(2)
Online Safety & Privacy.
(2)
Telecommunications.
(2)
Viruses & Malware.
(2)
6G mobile communication systems -- Security measures.
(1)
Artificial Intelligence
(1)
COMPUTERS -- Computer Literacy.
(1)
COMPUTERS -- Computer Science.
(1)
COMPUTERS -- Data Processing.
(1)
COMPUTERS -- Hardware -- General.
(1)
COMPUTERS -- Information Technology.
(1)
COMPUTERS -- Machine Theory.
(1)
COMPUTERS -- Reference.
(1)
COMPUTERS -- Security -- General.
(1)
Cloud Computing.
(1)
Cloud computing -- Examinations -- Study guides.
(1)
Cloud computing -- Security measures
(1)
Computer Networks
(1)
Computer crimes -- Investigation.
(1)
Computer networks -- Security measures -- Examinations
(1)
Computer networks -- Security measures -- Examinations -- Study guides.
(1)
Computer security
(1)
Computer security -- Examinations
(1)
Computer security -- Examinations -- Study guides.
(1)
Computers
(1)
Confidentialité des données.
(1)
Criminalité informatique -- Enquêtes.
(1)
Cryptographie.
(1)
Cyber intelligence (Computer security)
(1)
Cybernetics.
(1)
Data privacy
(1)
Data privacy.
(1)
Data protection
(1)
Data protection.
(1)
Digital forensic science
(1)
Digital forensic science.
(1)
Electronic data processing personnel -- Certification
(1)
Electronic data processing personnel -- Certification.
(1)
GSM (Radiotéléphonie) -- Sécurité -- Mesures.
(1)
Global system for mobile communications -- Security measures.
(1)
Global system for mobile communications -- Technological innovation.
(1)
Guides de l'étudiant.
(1)
Infonuagique -- Examens -- Guides de l'étudiant.
(1)
Information technology -- Security measures
(1)
Information technology -- Security measures.
(1)
Intelligence (AI) & Semantics.
(1)
Internet des objets -- Sécurité -- Mesures.
(1)
Internet of things
(1)
Internet of things -- Security measures.
(1)
Medical informatics
(1)
Medical informatics -- Security measures.
(1)
Micro-ordinateurs -- Accès -- Contrôle.
(1)
Microcomputers -- Access control
(1)
Microcomputers -- Access control.
(1)
Médecine -- Informatique -- Sécurité -- Mesures.
(1)
Médias sociaux -- Sécurité -- Mesures.
(1)
Protection de l'information (Informatique)
(1)
Réseaux d'ordinateurs -- Sécurité -- Mesures -- Examens -- Guides de l'étudiant.
(1)
Social media -- Security measures.
(1)
Study guides
(1)
Study guides.
(1)
Surveillance des menaces informatiques.
(1)
Sécurité informatique -- Examens -- Guides de l'étudiant.
(1)
TECHNOLOGY & ENGINEERING -- Mechanical.
(1)
Technologie de l'information -- Sécurité -- Mesures.
(1)
Technologie de l'information.
(1)
Transmission sans fil.
(1)
Wireless communication systems
(1)
Wireless communication systems -- Security measures
(1)
Wireless communication systems.
(1)
examination study guides.
(1)
information technology.
(1)
More
View All
Fewer
Collapse All
Material Type
Include
Exclude
E-Book
Shelf Location
Include
Exclude
Wiley E-Book Collection
Library
Include
Exclude
Online Library
false
{sortLabel}
{alphabetical}
{relevance}
{include}
{exclude}
{facetName}
{results}
{displayName}
{count}
{error}
Select an Action
Place Hold(s)
Add to My Lists
Email
Print
13 Results Found
1
2
Sort By:
Relevance (Default)
Publication Date (Ascending)
Publication Date (Descending)
Title
Author
0
DEFAULT
Select a list
Temporary List
Make this your default list.
The following items were successfully added.
There was an error while adding the following items. Please try again.
One or more items could not be added because you are not logged in.
13.
5G explained : security and deployment of advanced mobile communications
5G explained : security and deployment of advanced mobile communications
Author
Penttinen, Jyrki T. J., author.
Preferred Shelf Number
TK5103.483 .P46 2019
Electronic Access
https://onlinelibrary.wiley.com/doi/book/10.1002/9781119275695
Format:
Availability
Online Library~1
Available:
Copies:
Select an Action
Place Hold(s)
Add to My Lists
Email
Print
1
2