Search Results for Computer Security. - Narrowed by: Electronics. SirsiDynix Enterprise https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dComputer$002bSecurity.$0026qf$003dSUBJECT$002509Subject$002509Electronics.$002509Electronics.$0026ps$003d300$0026isd$003dtrue? 2026-01-25T12:48:04Z Evolving networking technologies : developments and future directions ent://SD_ILS/0/SD_ILS:598339 2026-01-25T12:48:04Z 2026-01-25T12:48:04Z Author&#160;Gupta, Shaurya, editor.<br/>Preferred Shelf Number&#160;TK5105.5 .E96 2023<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119836667">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119836667</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Social-behavioral modeling for complex systems ent://SD_ILS/0/SD_ILS:594823 2026-01-25T12:48:04Z 2026-01-25T12:48:04Z Author&#160;Davis, Paul K., 1943- editor.&#160;O'Mahony, Angela, editor.&#160;Pfautz, Jonathan, editor.<br/>Preferred Shelf Number&#160;HA29 .S6736 2019<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119485001">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119485001</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> The Hardware Trojan War Attacks, Myths, and Defenses ent://SD_ILS/0/SD_ILS:400849 2026-01-25T12:48:04Z 2026-01-25T12:48:04Z Author&#160;Bhunia, Swarup. editor.&#160;Tehranipoor, Mark M. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-68511-3">https://doi.org/10.1007/978-3-319-68511-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Real-time embedded systems ent://SD_ILS/0/SD_ILS:593770 2026-01-25T12:48:04Z 2026-01-25T12:48:04Z Author&#160;Wang, Jiacun, 1963- author.<br/>Preferred Shelf Number&#160;TK7895 .E42<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119420712">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119420712</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Trusted Computing for Embedded Systems ent://SD_ILS/0/SD_ILS:530149 2026-01-25T12:48:04Z 2026-01-25T12:48:04Z Author&#160;Candaele, Bernard. editor.&#160;Soudris, Dimitrios. editor.&#160;Anagnostopoulos, Iraklis. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-09420-5">https://doi.org/10.1007/978-3-319-09420-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Innovations and Advances in Computing, Informatics, Systems Sciences, Networking and Engineering ent://SD_ILS/0/SD_ILS:530615 2026-01-25T12:48:04Z 2026-01-25T12:48:04Z Author&#160;Sobh, Tarek. editor.&#160;Elleithy, Khaled. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-06773-5">https://doi.org/10.1007/978-3-319-06773-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/>