Search Results for COMPUTERS -- General. - Narrowed by: Networking.
SirsiDynix Enterprise
https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dCOMPUTERS$002b--$002bGeneral.$0026qf$003dSUBJECT$002509Subject$002509Networking.$002509Networking.$0026ps$003d300?
2026-05-16T13:58:48Z
Security, privacy and digital forensics in the cloud
ent://SD_ILS/0/SD_ILS:594934
2026-05-16T13:58:48Z
2026-05-16T13:58:48Z
Author Chen, Lei, 1978 July 28- editor. Takabi, Hassan, 1982- editor. Le-Khac, Nhien-An, 1972- editor.<br/>Preferred Shelf Number QA76.585 .S43 2019<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119053385">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119053385</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Network modeling, simulation and analysis in Matlab : theory and practices
ent://SD_ILS/0/SD_ILS:595392
2026-05-16T13:58:48Z
2026-05-16T13:58:48Z
Author Le, Dac-Nhuong, 1983- author. Pandey, Abhishek, 1984- author. Tadepalli, Sairam, author. Rāṭhauṛa, Pradīpa Siṃha, 1978- author. Chatterjee, Jyotirmoy, author.<br/>Preferred Shelf Number TK5103.2<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119631477">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119631477</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Transformational security awareness : what neuroscientists, storytellers, and marketers can teach us about driving secure behaviors
ent://SD_ILS/0/SD_ILS:595304
2026-05-16T13:58:48Z
2026-05-16T13:58:48Z
Author Carpenter, Perry, author.<br/>Preferred Shelf Number QA76.9 .A25 C37 2019 EB<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119566380">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119566380</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
AWS Certified Cloud Practitioner Study Guide : CLF-C01 Exam
ent://SD_ILS/0/SD_ILS:595333
2026-05-16T13:58:48Z
2026-05-16T13:58:48Z
Author Piper, Ben. Clinton, David.<br/>Preferred Shelf Number QA76.3 .P57 2019<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119574408">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119574408</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cloud computing and virtualization
ent://SD_ILS/0/SD_ILS:594386
2026-05-16T13:58:48Z
2026-05-16T13:58:48Z
Author Le, Dac-Nhuong, 1983- editor. Kumar, Raghvendra, 1987- editor. Nguyen, Nhu Gia, editor. Chatterjee, Jyotir Moy, editor.<br/>Preferred Shelf Number QA76.9 .V5<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119488149">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119488149</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Windows security monitoring : scenarios and patterns
ent://SD_ILS/0/SD_ILS:594404
2026-05-16T13:58:48Z
2026-05-16T13:58:48Z
Author Miroshnikov, Andrei, author.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119390909">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119390909</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Content delivery networks : fundamentals, design, and evolution
ent://SD_ILS/0/SD_ILS:593580
2026-05-16T13:58:48Z
2026-05-16T13:58:48Z
Author Robinson, Dom, author.<br/>Preferred Shelf Number TK5105.5<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119249924">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119249924</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Advanced penetration testing : hacking the world's most secure networks
ent://SD_ILS/0/SD_ILS:593439
2026-05-16T13:58:48Z
2026-05-16T13:58:48Z
Author Allsopp, Wil, author.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119367741">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119367741</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Wireshark for security professionals : using Wireshark and the Metasploit Framework
ent://SD_ILS/0/SD_ILS:593472
2026-05-16T13:58:48Z
2026-05-16T13:58:48Z
Author Bullock, Jessey, author. Gordon, Adam, author.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119183457">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119183457</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Network forensics
ent://SD_ILS/0/SD_ILS:593814
2026-05-16T13:58:48Z
2026-05-16T13:58:48Z
Author Messier, Ric, author.<br/>Preferred Shelf Number TK5105.59<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119329190">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119329190</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>