Search Results for Building -- Planning. - Narrowed by: COMPUTERS. SirsiDynix Enterprise https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dBuilding$002b--$002bPlanning.$0026qf$003dSUBJECT$002509Subject$002509COMPUTERS.$002509COMPUTERS.$0026ps$003d300? 2026-03-01T03:09:06Z Artificial intelligence in remote sensing for disaster management ent://SD_ILS/0/SD_ILS:599953 2026-03-01T03:09:06Z 2026-03-01T03:09:06Z Author&#160;Dahiya, Neelam, editor.&#160;Singh, Gurwinder, editor.&#160;Singh, Sartajvir, editor.&#160;Sharma, Apoorva, editor.<br/>Preferred Shelf Number&#160;HD49 .A78 2025<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394287222">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394287222</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Driving innovation through AI and digital twin for 6G powered sustainable ultra smart cities ent://SD_ILS/0/SD_ILS:600163 2026-03-01T03:09:06Z 2026-03-01T03:09:06Z Author&#160;Taneja, Ashu, editor.<br/>Preferred Shelf Number&#160;TD159.4 .D75 2025<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394411320">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394411320</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> The cybersecurity guide to governance, risk, and compliance ent://SD_ILS/0/SD_ILS:598945 2026-03-01T03:09:06Z 2026-03-01T03:09:06Z Author&#160;Edwards, Jason (Cybersecurity expert), author.&#160;Weaver, Griffin, author.<br/>Preferred Shelf Number&#160;HD30.38 .E34 2024<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394250226">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394250226</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Engineering autonomous vehicles and robots : the DragonFly modular-based approach ent://SD_ILS/0/SD_ILS:595838 2026-03-01T03:09:06Z 2026-03-01T03:09:06Z Author&#160;Liu, Shaoshan, author.<br/>Preferred Shelf Number&#160;TL152.8 .L585 2020<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119570516">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119570516</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cyber breach response that actually works : organizational approach to managing residual risk ent://SD_ILS/0/SD_ILS:596117 2026-03-01T03:09:06Z 2026-03-01T03:09:06Z Author&#160;Gorecki, Andrew.<br/>Preferred Shelf Number&#160;QA76.9 .A25<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119679349">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119679349</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Big Data : Understanding How Data Powers Big Business. ent://SD_ILS/0/SD_ILS:593065 2026-03-01T03:09:06Z 2026-03-01T03:09:06Z Author&#160;Schmarzo, Bill.<br/>Preferred Shelf Number&#160;QA76.9 .D343 EB<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119701859">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119701859</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/>