Search Results for Copyright. - Narrowed by: Networking. SirsiDynix Enterprise https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dCopyright.$0026qf$003dSUBJECT$002509Subject$002509Networking.$002509Networking.$0026ic$003dtrue$0026ps$003d300$0026isd$003dtrue? 2026-03-04T12:43:14Z Deep learning for intrusion detection : techniques and applications ent://SD_ILS/0/SD_ILS:600319 2026-03-04T12:43:14Z 2026-03-04T12:43:14Z Author&#160;Masoodi, Faheem Syeed, editor.&#160;Bamhdi, Alwi, editor.<br/>Preferred Shelf Number&#160;TK5105.59 .D44 2026<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394285198">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394285198</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Principles and applications of blockchain systems : how to overcome the CAP trilemma in consortium blockchain ent://SD_ILS/0/SD_ILS:599650 2026-03-04T12:43:14Z 2026-03-04T12:43:14Z Author&#160;Li, Hu, author.&#160;Wang, Han, author.<br/>Preferred Shelf Number&#160;QA76.9 .B56 L5 2025<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394237258">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394237258</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> The cybersecurity guide to governance, risk, and compliance ent://SD_ILS/0/SD_ILS:598945 2026-03-04T12:43:14Z 2026-03-04T12:43:14Z Author&#160;Edwards, Jason (Cybersecurity expert), author.&#160;Weaver, Griffin, author.<br/>Preferred Shelf Number&#160;HD30.38 .E34 2024<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394250226">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394250226</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security and Privacy for 6G Massive IoT. ent://SD_ILS/0/SD_ILS:599629 2026-03-04T12:43:14Z 2026-03-04T12:43:14Z Author&#160;Mantas, Georgios.&#160;Saghezchi, Firooz.&#160;Rodriguez, Jonathan.&#160;Sucasas, Victor.<br/>Preferred Shelf Number&#160;TK5103.252<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119988007">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119988007</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cyber Operations : A Case Study Approach ent://SD_ILS/0/SD_ILS:599117 2026-03-04T12:43:14Z 2026-03-04T12:43:14Z Author&#160;Couretas, Jerry M., 1966- author.<br/>Preferred Shelf Number&#160;QA76.9 .A25<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119712121">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119712121</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cyber threat intelligence ent://SD_ILS/0/SD_ILS:598051 2026-03-04T12:43:14Z 2026-03-04T12:43:14Z Author&#160;Lee, Martin (Computer security expert), author.<br/>Preferred Shelf Number&#160;TK5105.59 .L47 2023<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119861775">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119861775</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Technologies and African societies in pandemic times : using technology to survive and thrive during the Covid-19 era ent://SD_ILS/0/SD_ILS:598489 2026-03-04T12:43:14Z 2026-03-04T12:43:14Z Preferred Shelf Number&#160;T28 .A1 T43 2023<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394225903">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394225903</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Intelligent network management and control : intelligent security, multi-criteria optimization, cloud computing, Internet of Vehicles, intelligent radio ent://SD_ILS/0/SD_ILS:596652 2026-03-04T12:43:14Z 2026-03-04T12:43:14Z Author&#160;Benmammar, Badr.<br/>Preferred Shelf Number&#160;TK5105.59<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119817840">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119817840</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> 5G for the connected world ent://SD_ILS/0/SD_ILS:594939 2026-03-04T12:43:14Z 2026-03-04T12:43:14Z Author&#160;Chandramouli, Devaki, editor.&#160;Liebhart, Rainer, editor.&#160;Pirskanen, Juho, editor.<br/>Preferred Shelf Number&#160;TK5103.2 .A147 2019<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119247111">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119247111</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> IoT security : advances in authentication ent://SD_ILS/0/SD_ILS:595420 2026-03-04T12:43:14Z 2026-03-04T12:43:14Z Author&#160;Liyanage, Madhusanka, editor.&#160;Braeken, An, 1970- editor.&#160;Kumar, Pardeep, 1976- editor.&#160;Ylianttila, Mika, editor.<br/>Preferred Shelf Number&#160;TK5105.8857 .I58 2019<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119527978">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119527978</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security designs for the cloud, IoT, and social networking ent://SD_ILS/0/SD_ILS:595493 2026-03-04T12:43:14Z 2026-03-04T12:43:14Z Author&#160;Le, Dac-Nhuong, 1983- editor.&#160;Bhatt, Chintan M., 1988- editor.&#160;Madhukar, Mani, editor.<br/>Preferred Shelf Number&#160;QA76.585<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119593171">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119593171</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cloud computing and virtualization ent://SD_ILS/0/SD_ILS:594386 2026-03-04T12:43:14Z 2026-03-04T12:43:14Z Author&#160;Le, Dac-Nhuong, 1983- editor.&#160;Kumar, Raghvendra, 1987- editor.&#160;Nguyen, Nhu Gia, editor.&#160;Chatterjee, Jyotir Moy, editor.<br/>Preferred Shelf Number&#160;QA76.9 .V5<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119488149">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119488149</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Content delivery networks : fundamentals, design, and evolution ent://SD_ILS/0/SD_ILS:593580 2026-03-04T12:43:14Z 2026-03-04T12:43:14Z Author&#160;Robinson, Dom, author.<br/>Preferred Shelf Number&#160;TK5105.5<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119249924">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119249924</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Network forensics ent://SD_ILS/0/SD_ILS:593814 2026-03-04T12:43:14Z 2026-03-04T12:43:14Z Author&#160;Messier, Ric, author.<br/>Preferred Shelf Number&#160;TK5105.59<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119329190">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119329190</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/>