Search Results for Distribution. - Narrowed by: Computer security. SirsiDynix Enterprise https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dDistribution.$0026qf$003dSUBJECT$002509Subject$002509Computer$002bsecurity.$002509Computer$002bsecurity.$0026ps$003d300$0026isd$003dtrue? 2026-01-22T10:07:43Z Protection of electrical power distribution systems : smart grid, microgrid, AI, and cyber security ent://SD_ILS/0/SD_ILS:600371 2026-01-22T10:07:43Z 2026-01-22T10:07:43Z Author&#160;Masood, Tariq, author.&#160;Abdo, Jamil, author.&#160;Iqbal, Atif, author.<br/>Preferred Shelf Number&#160;TK3001 .M37 2026<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394327676">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394327676</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Quantum computing models for cybersecurity and wireless communications ent://SD_ILS/0/SD_ILS:599707 2026-01-22T10:07:43Z 2026-01-22T10:07:43Z Author&#160;Kumar, Budati Anil, edited.&#160;Kumar, Singamaneni Kranthi, edited.&#160;Li, Xingwang (Computer scientist), edited.<br/>Preferred Shelf Number&#160;QA76.9 .A25 Q36 2025<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394271429">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394271429</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Automated secure computing for next-generation systems ent://SD_ILS/0/SD_ILS:598752 2026-01-22T10:07:43Z 2026-01-22T10:07:43Z Author&#160;Tyagi, Amit Kumar, editor.<br/>Preferred Shelf Number&#160;QA76.9 .A25 A98 2024<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394213948">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394213948</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Symmetric cryptography. Volume 1 : Design and security proofs ent://SD_ILS/0/SD_ILS:598803 2026-01-22T10:07:43Z 2026-01-22T10:07:43Z Author&#160;Boura, Christina, editor.&#160;Naya-Plasencia, Maria, editor.<br/>Preferred Shelf Number&#160;Z104 .S966 2023<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394256358">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394256358</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Quantum computing in cybersecurity ent://SD_ILS/0/SD_ILS:598685 2026-01-22T10:07:43Z 2026-01-22T10:07:43Z Author&#160;Rawat, Romil, editor.<br/>Preferred Shelf Number&#160;QA76.9 .A25 Q83 2023<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394167401">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394167401</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Trust-based communication systems for internet of things applications ent://SD_ILS/0/SD_ILS:597744 2026-01-22T10:07:43Z 2026-01-22T10:07:43Z Author&#160;Madaan, Vishu, editor.&#160;Agrawal, Prateek, editor.&#160;Sharma, Anand, editor.&#160;Sharma, Dilip Kumar, editor.&#160;Agrawal, Akshat, 1986- editor.<br/>Preferred Shelf Number&#160;TK5105.8857<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119896746">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119896746</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cybersecurity and decision makers : data security and digital trust ent://SD_ILS/0/SD_ILS:595943 2026-01-22T10:07:43Z 2026-01-22T10:07:43Z Author&#160;Fr&eacute;minville, Marie de, author.<br/>Preferred Shelf Number&#160;HF5548.37 .F74 2020<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119720362">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119720362</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cyber security in parallel and distributed computing : concepts, techniques, applications and case studies ent://SD_ILS/0/SD_ILS:595099 2026-01-22T10:07:43Z 2026-01-22T10:07:43Z Author&#160;Le, Dac-Nhuong, 1983- editor.&#160;Kumar, Raghvendra, 1987- editor.&#160;Mishra, Brojo Kishore, 1979- editor.&#160;Khari, Manju, editor.&#160;Chatterjee, Jyotir Moy, editor.<br/>Preferred Shelf Number&#160;QA76.9 .A25<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119488330">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119488330</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Unauthorized Access : The Crisis in Online Privacy and Security. ent://SD_ILS/0/SD_ILS:543688 2026-01-22T10:07:43Z 2026-01-22T10:07:43Z Author&#160;Sloan, Robert, author.&#160;CRC Press LLC.<br/>Preferred Shelf Number&#160;TK5105.878 .S59 2017<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9780429093791">https://www.taylorfrancis.com/books/9780429093791</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Wireshark for security professionals : using Wireshark and the Metasploit Framework ent://SD_ILS/0/SD_ILS:593472 2026-01-22T10:07:43Z 2026-01-22T10:07:43Z Author&#160;Bullock, Jessey, author.&#160;Gordon, Adam, author.<br/>Preferred Shelf Number&#160;QA76.9 .A25<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119183457">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119183457</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security for wireless sensor networks using identity-based cryptography ent://SD_ILS/0/SD_ILS:544612 2026-01-22T10:07:43Z 2026-01-22T10:07:43Z Author&#160;Patil, Harsh Kupwade., author.&#160;Szygenda, Stephen A.<br/>Preferred Shelf Number&#160;QA76.9 .A25 P38 2013<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781439869024">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> Cryptanalysis of RSA and its variants ent://SD_ILS/0/SD_ILS:542078 2026-01-22T10:07:43Z 2026-01-22T10:07:43Z Author&#160;Hinek, M. Jason., author.<br/>Preferred Shelf Number&#160;TK5102.94 .H56 2010<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781420075199">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> Security in Distributed, Grid, Mobile, and Pervasive Computing. ent://SD_ILS/0/SD_ILS:544847 2026-01-22T10:07:43Z 2026-01-22T10:07:43Z Preferred Shelf Number&#160;QA76.9<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9780429119347">https://www.taylorfrancis.com/books/9780429119347</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/>