Search Results for Computer Networks. - Narrowed by: COMPUTERS. SirsiDynix Enterprise https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dComputer$002bNetworks.$0026qf$003dSUBJECT$002509Subject$002509COMPUTERS.$002509COMPUTERS.$0026ps$003d300$0026isd$003dtrue? 2026-01-24T09:05:57Z Artificial Intelligence for Future Networks. ent://SD_ILS/0/SD_ILS:599611 2026-01-24T09:05:57Z 2026-01-24T09:05:57Z Author&#160;Matin, Mohammad A.&#160;Goudos, Sotirios K.&#160;Karagiannidis, George K.<br/>Preferred Shelf Number&#160;TK5103.25<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394227952">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394227952</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Sustainable resource management in next-generation computational constrained networks ent://SD_ILS/0/SD_ILS:600100 2026-01-24T09:05:57Z 2026-01-24T09:05:57Z Author&#160;Dash, Subhasis, editor.<br/>Preferred Shelf Number&#160;TK5105.5 .S87 2025<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394212798">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394212798</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Network coding for engineers ent://SD_ILS/0/SD_ILS:599745 2026-01-24T09:05:57Z 2026-01-24T09:05:57Z Author&#160;M&eacute;dard, Muriel, author.&#160;Vasudevan, Vipindev Adat, author.&#160;Pedersen, Morten Videbaek, author.&#160;Duffy, Ken R., author.<br/>Preferred Shelf Number&#160;TK5102.92 .M43 2025<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394217304">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394217304</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Handbook of intelligent automation systems using computer vision and artificial intelligence ent://SD_ILS/0/SD_ILS:600064 2026-01-24T09:05:57Z 2026-01-24T09:05:57Z Preferred Shelf Number&#160;T59.5 .H36 2025<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394302734">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394302734</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Metaheuristics for machine learning : algorithms and applications ent://SD_ILS/0/SD_ILS:599034 2026-01-24T09:05:57Z 2026-01-24T09:05:57Z Author&#160;Kalita, Kanak, 1988- editor.&#160;Ganesh, Narayanan, editor.&#160;P&#257;lamurukan&#818;, Ca., editor.<br/>Preferred Shelf Number&#160;Q325.5 .M48 2024<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394233953">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394233953</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Realizing the Metaverse : a communications and networking perspective ent://SD_ILS/0/SD_ILS:599057 2026-01-24T09:05:57Z 2026-01-24T09:05:57Z Author&#160;Lim, Wei Yang Bryan, editor.&#160;Xiong, Zehui, editor.&#160;Niyato, Dusit, editor.&#160;Zhang, Junshan (Electrical engineer), editor.&#160;Shen, X. (Xuemin), 1958- editor.<br/>Preferred Shelf Number&#160;TK5105.8864 .R43 2024<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394188932">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394188932</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Design and evaluation of ad hoc routing protocol ent://SD_ILS/0/SD_ILS:599444 2026-01-24T09:05:57Z 2026-01-24T09:05:57Z Author&#160;Wahl, Martine, author.&#160;Sondi, Patrick, author.<br/>Preferred Shelf Number&#160;TK5105.77 .W34 2024<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394325726">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394325726</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Accelerators for convolutional neural networks ent://SD_ILS/0/SD_ILS:598663 2026-01-24T09:05:57Z 2026-01-24T09:05:57Z Author&#160;Munir, Arslan, author.&#160;Kong, Joonho, author.&#160;Qureshi, Mahmood Azhar, author.<br/>Preferred Shelf Number&#160;QA76.87 .M86 2024<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394171910">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394171910</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> The cybersecurity guide to governance, risk, and compliance ent://SD_ILS/0/SD_ILS:598945 2026-01-24T09:05:57Z 2026-01-24T09:05:57Z Author&#160;Edwards, Jason (Cybersecurity expert), author.&#160;Weaver, Griffin, author.<br/>Preferred Shelf Number&#160;HD30.38 .E34 2024<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394250226">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394250226</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Simulation techniques of digital twin in real-time applications : design modeling and implementation ent://SD_ILS/0/SD_ILS:599189 2026-01-24T09:05:57Z 2026-01-24T09:05:57Z Author&#160;Anand, Abhineet, editor.<br/>Preferred Shelf Number&#160;QA76.9 .C65 S56 2024<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394257003">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394257003</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Brain-computer interface : using deep learning applications ent://SD_ILS/0/SD_ILS:598211 2026-01-24T09:05:57Z 2026-01-24T09:05:57Z Author&#160;Sumithra, M. G., editor.&#160;Dhanaraj, Rajesh Kumar, editor.&#160;Milanova, Mariofanna, editor.&#160;Balusamy, Balamurugan, editor.&#160;Venkatesan, Chandran, editor.<br/>Preferred Shelf Number&#160;QP360.7 .B73 2023<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119857655">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119857655</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Systems engineering neural networks ent://SD_ILS/0/SD_ILS:598111 2026-01-24T09:05:57Z 2026-01-24T09:05:57Z Author&#160;Migliaccio, Alessandro, author.&#160;Iannone, Giovanni, author.<br/>Preferred Shelf Number&#160;QA76.87 .M537 2023<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119902027">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119902027</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Data exfiltration threats and prevention techniques : machine learning and memory-based data security ent://SD_ILS/0/SD_ILS:598245 2026-01-24T09:05:57Z 2026-01-24T09:05:57Z Author&#160;Tari, Zahir, 1961- author.&#160;Sohrabi, Nasrin, 1982- author.&#160;Samadi, Yasaman, 1993- author.&#160;Suaboot, Jakapan, 1984- author.<br/>Preferred Shelf Number&#160;TK5105.59 .T365 2023<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119898900">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119898900</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Deep reinforcement learning for wireless communications and networking : theory, applications and implementation ent://SD_ILS/0/SD_ILS:598462 2026-01-24T09:05:57Z 2026-01-24T09:05:57Z Author&#160;Hoang, Dinh Thai, 1986- author.<br/>Preferred Shelf Number&#160;TK5103.2 .H63 2023<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119873747">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119873747</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Quantum computing in cybersecurity ent://SD_ILS/0/SD_ILS:598685 2026-01-24T09:05:57Z 2026-01-24T09:05:57Z Author&#160;Rawat, Romil, editor.<br/>Preferred Shelf Number&#160;QA76.9 .A25 Q83 2023<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394167401">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394167401</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Distributed systems : theory and applications ent://SD_ILS/0/SD_ILS:598053 2026-01-24T09:05:57Z 2026-01-24T09:05:57Z Author&#160;Ghosh, Ratan K., author.&#160;Ghosh, Hiranmay, author.<br/>Preferred Shelf Number&#160;QA76.9 .D5 G486 2023<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119825968">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119825968</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cyber security and network security ent://SD_ILS/0/SD_ILS:597484 2026-01-24T09:05:57Z 2026-01-24T09:05:57Z Author&#160;Pramanik, Sabyasachi, editor.&#160;Samanta, Debabrata, 1987- editor.&#160;Vinay, M., editor.&#160;Guha, Abhijit, editor.<br/>Preferred Shelf Number&#160;QA76.9 .A25<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119812555">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119812555</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Executive's guide to cyber risk : securing the future today ent://SD_ILS/0/SD_ILS:597567 2026-01-24T09:05:57Z 2026-01-24T09:05:57Z Author&#160;Moyo, Siegfried, author.<br/>Preferred Shelf Number&#160;HF5548.37 .M68 2022<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394320578">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394320578</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> The CISO evolution : business knowledge for cybersecurity executives ent://SD_ILS/0/SD_ILS:597056 2026-01-24T09:05:57Z 2026-01-24T09:05:57Z Author&#160;Sharp, Matthew K., author.&#160;Lambros, Kyriakos P., author.<br/>Preferred Shelf Number&#160;HD30.2 .S5325 2022<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119782513">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119782513</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Blockchain security from the bottom up : securing and preventing attacks on cryptocurrencies, decentralized applications, nfts, and smart contracts ent://SD_ILS/0/SD_ILS:597703 2026-01-24T09:05:57Z 2026-01-24T09:05:57Z Author&#160;Poston, Howard E., III, author.<br/>Preferred Shelf Number&#160;QA76.9 .B56 P67 2022<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394320691">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394320691</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Medical imaging and health informatics ent://SD_ILS/0/SD_ILS:597551 2026-01-24T09:05:57Z 2026-01-24T09:05:57Z Author&#160;Jaware, Tushar H., editor.<br/>Preferred Shelf Number&#160;RC78.7 .D53 M43 2022<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119819165">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119819165</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Deep learning for targeted treatments : transformation in healthcare ent://SD_ILS/0/SD_ILS:597838 2026-01-24T09:05:57Z 2026-01-24T09:05:57Z Author&#160;Malviya, Rishabha, editor.<br/>Preferred Shelf Number&#160;R859.7 .A78 D44 2022<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119857983">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119857983</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security in vehicular networks : focus on location and identity privacy ent://SD_ILS/0/SD_ILS:597917 2026-01-24T09:05:57Z 2026-01-24T09:05:57Z Author&#160;Benarous, Leila.&#160;Bitam, Salim.&#160;Mellouk, Abdelhamid.<br/>Preferred Shelf Number&#160;TE228.37<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394172610">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394172610</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Data mining and machine learning applications ent://SD_ILS/0/SD_ILS:597345 2026-01-24T09:05:57Z 2026-01-24T09:05:57Z Author&#160;Raja, Rohit, editor.<br/>Preferred Shelf Number&#160;QA76.9 .D343<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119792529">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119792529</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Emerging computing paradigms : principles, advances and applications ent://SD_ILS/0/SD_ILS:597357 2026-01-24T09:05:57Z 2026-01-24T09:05:57Z Author&#160;Singh, Umang, 1982-2021, editor.&#160;Murugesan, San, 1978- editor.&#160;Seth, Ashish, editor.<br/>Preferred Shelf Number&#160;QA76.24 .E43 2022<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119813439">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119813439</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cloud technologies : an overview of cloud computing technologies for managers ent://SD_ILS/0/SD_ILS:596324 2026-01-24T09:05:57Z 2026-01-24T09:05:57Z Author&#160;McHaney, Roger, author.<br/>Preferred Shelf Number&#160;QA76.585<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119769514">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119769514</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Intelligent data analytics for terror threat prediction : architectures, methodologies, techniques and applications ent://SD_ILS/0/SD_ILS:596541 2026-01-24T09:05:57Z 2026-01-24T09:05:57Z Author&#160;Pani, Subhendu Kumar, 1980- editor.&#160;Singh, Sanjay Kumar, 1963- editor.&#160;Garg, Lalit, 1977- editor.<br/>Preferred Shelf Number&#160;HV6431 .I58 2021<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119711629">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119711629</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Inside the world of computing : technologies, uses, challenges ent://SD_ILS/0/SD_ILS:596678 2026-01-24T09:05:57Z 2026-01-24T09:05:57Z Author&#160;Delhaye, J.-L. (Jean-Lo&iuml;c)<br/>Preferred Shelf Number&#160;QA76<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119821748">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119821748</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Unmanned aerial vehicles for Internet of Things (IoT) : concepts, techniques, and applications ent://SD_ILS/0/SD_ILS:596898 2026-01-24T09:05:57Z 2026-01-24T09:05:57Z Author&#160;Mohindru, Vandana, editor.&#160;Singh, Yashwant, editor.&#160;Bhatt, Ravindara, editor.&#160;Gupta, Anuj Kumar, editor.<br/>Preferred Shelf Number&#160;TL589.4 .U55 2021<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119769170">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119769170</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computational analysis and deep learning for medical care : principles, methods, and applications ent://SD_ILS/0/SD_ILS:596940 2026-01-24T09:05:57Z 2026-01-24T09:05:57Z Author&#160;Tyagi, Amit Kumar.<br/>Preferred Shelf Number&#160;R859.7 .A78<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119785750">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119785750</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Fuzzy intelligent systems : methodologies, techniques, and applications ent://SD_ILS/0/SD_ILS:596969 2026-01-24T09:05:57Z 2026-01-24T09:05:57Z Author&#160;Chandrasekaran, E.&#160;Anandan, R.&#160;Suseendran, G.&#160;Balamurugan, S. (Shanmugam), 1985-&#160;Hachimi, Hanaa.<br/>Preferred Shelf Number&#160;QA402<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119763437">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119763437</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Artificial intelligence hardware design : challenges and solutions ent://SD_ILS/0/SD_ILS:596987 2026-01-24T09:05:57Z 2026-01-24T09:05:57Z Author&#160;Liu, Albert Chun-Chen, author.&#160;Law, Oscar Ming Kin, author.<br/>Preferred Shelf Number&#160;QA76.87<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119810483">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119810483</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Machine learning algorithms and applications ent://SD_ILS/0/SD_ILS:597016 2026-01-24T09:05:57Z 2026-01-24T09:05:57Z Author&#160;Srinivas, Mettu, editor.&#160;Sucharitha, G., editor.&#160;Matta, Anjanna, editor.<br/>Preferred Shelf Number&#160;Q325.5<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119769262">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119769262</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Intelligent network management and control : intelligent security, multi-criteria optimization, cloud computing, Internet of Vehicles, intelligent radio ent://SD_ILS/0/SD_ILS:596652 2026-01-24T09:05:57Z 2026-01-24T09:05:57Z Author&#160;Benmammar, Badr.<br/>Preferred Shelf Number&#160;TK5105.59<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119817840">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119817840</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Applied incident response ent://SD_ILS/0/SD_ILS:595744 2026-01-24T09:05:57Z 2026-01-24T09:05:57Z Author&#160;Anson, Steve.<br/>Preferred Shelf Number&#160;QA76.9 .A25<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119560302">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119560302</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Interconnection network reliability evaluation : multistage layouts ent://SD_ILS/0/SD_ILS:596284 2026-01-24T09:05:57Z 2026-01-24T09:05:57Z Author&#160;Goyal, Neeraj Kumar, author.&#160;Rajkumar, S., author.<br/>Preferred Shelf Number&#160;TK5105.5 .G69 2020<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119620600">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119620600</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Design and analysis of security protocol for communication ent://SD_ILS/0/SD_ILS:595798 2026-01-24T09:05:57Z 2026-01-24T09:05:57Z Author&#160;Goyal, Dinesh, 1976- editor.&#160;Balamurigan, A., editor.&#160;Peng, Sheng-Lung, editor.&#160;Verma, O. P. (Telecommunications engineer), editor.<br/>Preferred Shelf Number&#160;TK5105.59 .D468 2020 EB<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119555759">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119555759</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Tribe of hackers security leaders : tribal knowledge from the best in cybersecurity leadership ent://SD_ILS/0/SD_ILS:595887 2026-01-24T09:05:57Z 2026-01-24T09:05:57Z Author&#160;Carey, Marcus J. (Cybersecurity professional), author.&#160;Jin, Jennifer.<br/>Preferred Shelf Number&#160;QA76.9 .A25 C37 2020<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119643784">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119643784</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Transformational security awareness : what neuroscientists, storytellers, and marketers can teach us about driving secure behaviors ent://SD_ILS/0/SD_ILS:595304 2026-01-24T09:05:57Z 2026-01-24T09:05:57Z Author&#160;Carpenter, Perry, author.<br/>Preferred Shelf Number&#160;QA76.9 .A25 C37 2019 EB<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119566380">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119566380</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> CompTIA PenTest+ Practice Test : Exam PT0-001 ent://SD_ILS/0/SD_ILS:595329 2026-01-24T09:05:57Z 2026-01-24T09:05:57Z Author&#160;Panek, Crystal, author.&#160;Tracy, Robb.<br/>Preferred Shelf Number&#160;TK5105.59<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119575931">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119575931</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> AWS Certified Cloud Practitioner Study Guide : CLF-C01 Exam ent://SD_ILS/0/SD_ILS:595333 2026-01-24T09:05:57Z 2026-01-24T09:05:57Z Author&#160;Piper, Ben.&#160;Clinton, David.<br/>Preferred Shelf Number&#160;QA76.3 .P57 2019<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119574408">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119574408</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cyber security in parallel and distributed computing : concepts, techniques, applications and case studies ent://SD_ILS/0/SD_ILS:595099 2026-01-24T09:05:57Z 2026-01-24T09:05:57Z Author&#160;Le, Dac-Nhuong, 1983- editor.&#160;Kumar, Raghvendra, 1987- editor.&#160;Mishra, Brojo Kishore, 1979- editor.&#160;Khari, Manju, editor.&#160;Chatterjee, Jyotir Moy, editor.<br/>Preferred Shelf Number&#160;QA76.9 .A25<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119488330">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119488330</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> CCNA security study guide : exam 210-260 ent://SD_ILS/0/SD_ILS:594192 2026-01-24T09:05:57Z 2026-01-24T09:05:57Z Author&#160;McMillan, Troy, author.<br/>Preferred Shelf Number&#160;TK5105.59<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119549505">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119549505</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cybersecurity program development for business : the essential planning guide ent://SD_ILS/0/SD_ILS:594455 2026-01-24T09:05:57Z 2026-01-24T09:05:57Z Author&#160;Moschovitis, Christos J. P., author.<br/>Preferred Shelf Number&#160;HD30.2<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119430018">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119430018</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Insider threats ent://SD_ILS/0/SD_ILS:594407 2026-01-24T09:05:57Z 2026-01-24T09:05:57Z Author&#160;Arduin, Pierre-Emmanuel, author.<br/>Preferred Shelf Number&#160;QA76.9 .A25<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119419785">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119419785</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Deterministic network calculus : from theory to practical implementation ent://SD_ILS/0/SD_ILS:594880 2026-01-24T09:05:57Z 2026-01-24T09:05:57Z Author&#160;Bouillard, Anne, author.&#160;Boyer, Marc, author.&#160;Corronc, Euriell, author.<br/>Preferred Shelf Number&#160;QA274.8<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119440284">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119440284</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Network forensics ent://SD_ILS/0/SD_ILS:593814 2026-01-24T09:05:57Z 2026-01-24T09:05:57Z Author&#160;Messier, Ric, author.<br/>Preferred Shelf Number&#160;TK5105.59<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119329190">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119329190</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Content delivery networks : fundamentals, design, and evolution ent://SD_ILS/0/SD_ILS:593580 2026-01-24T09:05:57Z 2026-01-24T09:05:57Z Author&#160;Robinson, Dom, author.<br/>Preferred Shelf Number&#160;TK5105.5<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119249924">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119249924</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advanced penetration testing : hacking the world's most secure networks ent://SD_ILS/0/SD_ILS:593439 2026-01-24T09:05:57Z 2026-01-24T09:05:57Z Author&#160;Allsopp, Wil, author.<br/>Preferred Shelf Number&#160;QA76.9 .A25<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119367741">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119367741</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/>