Search Results for Edge computing - Narrowed by: Sécurité informatique.
SirsiDynix Enterprise
https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dEdge$002bcomputing$0026qf$003dSUBJECT$002509Subject$002509S$0025C3$0025A9curit$0025C3$0025A9$002binformatique.$002509S$0025C3$0025A9curit$0025C3$0025A9$002binformatique.$0026ps$003d300?
2026-01-20T19:30:35Z
Quantum computing models for cybersecurity and wireless communications
ent://SD_ILS/0/SD_ILS:599707
2026-01-20T19:30:35Z
2026-01-20T19:30:35Z
Author Kumar, Budati Anil, edited. Kumar, Singamaneni Kranthi, edited. Li, Xingwang (Computer scientist), edited.<br/>Preferred Shelf Number QA76.9 .A25 Q36 2025<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394271429">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394271429</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Next-generation systems and secure computing
ent://SD_ILS/0/SD_ILS:599779
2026-01-20T19:30:35Z
2026-01-20T19:30:35Z
Author Barman, Subhabrata, editor. Koley, Santanu, editor. Joardar, Subhankar, editor.<br/>Preferred Shelf Number QA76.9 .A25 N49 2025<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394228522">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394228522</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Realizing the Metaverse : a communications and networking perspective
ent://SD_ILS/0/SD_ILS:599057
2026-01-20T19:30:35Z
2026-01-20T19:30:35Z
Author Lim, Wei Yang Bryan, editor. Xiong, Zehui, editor. Niyato, Dusit, editor. Zhang, Junshan (Electrical engineer), editor. Shen, X. (Xuemin), 1958- editor.<br/>Preferred Shelf Number TK5105.8864 .R43 2024<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394188932">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394188932</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Automated secure computing for next-generation systems
ent://SD_ILS/0/SD_ILS:598752
2026-01-20T19:30:35Z
2026-01-20T19:30:35Z
Author Tyagi, Amit Kumar, editor.<br/>Preferred Shelf Number QA76.9 .A25 A98 2024<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394213948">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394213948</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Quantum computing in cybersecurity
ent://SD_ILS/0/SD_ILS:598685
2026-01-20T19:30:35Z
2026-01-20T19:30:35Z
Author Rawat, Romil, editor.<br/>Preferred Shelf Number QA76.9 .A25 Q83 2023<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394167401">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394167401</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Trust in computer systems and the cloud
ent://SD_ILS/0/SD_ILS:597142
2026-01-20T19:30:35Z
2026-01-20T19:30:35Z
Author Bursell, Mike, author.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119695158">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119695158</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>