Search Results for Computer Security - Narrowed by: Telecommunications.
SirsiDynix Enterprise
https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dComputer$002bSecurity$0026qf$003dSUBJECT$002509Konu$002509Telecommunications.$002509Telecommunications.$0026ps$003d300?
2026-01-21T17:38:56Z
Deep learning approaches to cloud security
ent://SD_ILS/0/SD_ILS:597294
2026-01-21T17:38:56Z
2026-01-21T17:38:56Z
Author Rathore, Pramod Singh, 1988- editor.<br/>Preferred Shelf Number QA76.585<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119760542">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119760542</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Trust-based communication systems for internet of things applications
ent://SD_ILS/0/SD_ILS:597744
2026-01-21T17:38:56Z
2026-01-21T17:38:56Z
Author Madaan, Vishu, editor. Agrawal, Prateek, editor. Sharma, Anand, editor. Sharma, Dilip Kumar, editor. Agrawal, Akshat, 1986- editor.<br/>Preferred Shelf Number TK5105.8857<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119896746">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119896746</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Intelligent network management and control : intelligent security, multi-criteria optimization, cloud computing, Internet of Vehicles, intelligent radio
ent://SD_ILS/0/SD_ILS:596652
2026-01-21T17:38:56Z
2026-01-21T17:38:56Z
Author Benmammar, Badr.<br/>Preferred Shelf Number TK5105.59<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119817840">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119817840</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Artificial intelligence and data mining approaches in security frameworks
ent://SD_ILS/0/SD_ILS:596957
2026-01-21T17:38:56Z
2026-01-21T17:38:56Z
Author Bhargava, Neeraj. Bhargava, Ritu. Rathore, Pramod Singh, 1988- Agrawal, Rashmi, 1978-<br/>Preferred Shelf Number Q335<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119760429">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119760429</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Game theory and machine learning for cyber security
ent://SD_ILS/0/SD_ILS:597035
2026-01-21T17:38:56Z
2026-01-21T17:38:56Z
Author Kamhoua, Charles A., editor. Kiekintveld, Christopher D., editor. Fang, Fei, 1989- editor. Zhu, Quanyan, editor.<br/>Preferred Shelf Number TK5105.59 .G353 2021<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119723950">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119723950</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
DNS security management
ent://SD_ILS/0/SD_ILS:593802
2026-01-21T17:38:56Z
2026-01-21T17:38:56Z
Author Dooley, Michael, 1962- author. Rooney, Timothy, 1962- author.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119328292">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119328292</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>