Search Results for COMPUTERS -- Security -- Network Security.
SirsiDynix Enterprise
https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dCOMPUTERS$002b--$002bSecurity$002b--$002bNetwork$002bSecurity.$0026ps$003d300?
2026-01-20T21:37:10Z
Security technologies for law enforcement agencies
ent://SD_ILS/0/SD_ILS:589138
2026-01-20T21:37:10Z
2026-01-20T21:37:10Z
Author Duraklar, Kazım author.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003597445">https://www.taylorfrancis.com/books/9781003597445</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
AI-Enabled Threat Intelligence and Cyber Risk Assessment
ent://SD_ILS/0/SD_ILS:582312
2026-01-20T21:37:10Z
2026-01-20T21:37:10Z
Author Martiri, Edlira, editor Vajjhala, Narasimha, 1978- editor. Dalipi, Fisnik, editor<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003504979">https://www.taylorfrancis.com/books/9781003504979</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Multimedia security : tools, techniques, and applications
ent://SD_ILS/0/SD_ILS:551348
2026-01-20T21:37:10Z
2026-01-20T21:37:10Z
Author Mondal, Bhaskar, editor. Rajput, Shyam Singh, editor.<br/>Preferred Shelf Number QA76.575<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003459040">https://www.taylorfrancis.com/books/9781003459040</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Deep learning approaches to cloud security
ent://SD_ILS/0/SD_ILS:597294
2026-01-20T21:37:10Z
2026-01-20T21:37:10Z
Author Rathore, Pramod Singh, 1988- editor.<br/>Preferred Shelf Number QA76.585<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119760542">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119760542</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
The pentester blueprint : starting a career as an ethical hacker
ent://SD_ILS/0/SD_ILS:596380
2026-01-20T21:37:10Z
2026-01-20T21:37:10Z
Author Wylie, Phillip L., author. Crawley, Kim.<br/>Preferred Shelf Number TK5105.59<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119684367">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119684367</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Hunting cyber criminals : a hacker's guide to online intelligence gathering tools and techniques
ent://SD_ILS/0/SD_ILS:595783
2026-01-20T21:37:10Z
2026-01-20T21:37:10Z
Author Troia, Vinny, author.<br/>Preferred Shelf Number HV8079 .C65 T76 2020<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119541004">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119541004</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Hands on hacking
ent://SD_ILS/0/SD_ILS:596316
2026-01-20T21:37:10Z
2026-01-20T21:37:10Z
Author Hickey, Matthew (Computer security expert), author. Arcuri, Jennifer, author.<br/>Preferred Shelf Number QA76.9 .A25 H53 2020 EB<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119561507">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119561507</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Windows 10 Anniversary update bible
ent://SD_ILS/0/SD_ILS:593543
2026-01-20T21:37:10Z
2026-01-20T21:37:10Z
Author Tidrow, Rob, author. Boyce, Jim, 1958- author. Shapiro, Jeffrey R., author.<br/>Preferred Shelf Number QA76.76 .O63<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119416999">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119416999</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security in Distributed, Grid, Mobile, and Pervasive Computing.
ent://SD_ILS/0/SD_ILS:544847
2026-01-20T21:37:10Z
2026-01-20T21:37:10Z
Preferred Shelf Number QA76.9<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9780429119347">https://www.taylorfrancis.com/books/9780429119347</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>