Search Results for Features. - Narrowed by: Security.
SirsiDynix Enterprise
https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dFeatures.$0026qf$003dSUBJECT$002509Subject$002509Security.$002509Security.$0026ic$003dtrue$0026ps$003d300?
2026-02-20T18:49:35Z
Security and privacy vision in 6G : a comprehensive guide
ent://SD_ILS/0/SD_ILS:598347
2026-02-20T18:49:35Z
2026-02-20T18:49:35Z
Author Porambage, Pawani, author. Liyanage, Madhusanka, author.<br/>Preferred Shelf Number TK5103.252 .P67 2023<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119875437">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119875437</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
IoT security : advances in authentication
ent://SD_ILS/0/SD_ILS:595420
2026-02-20T18:49:35Z
2026-02-20T18:49:35Z
Author Liyanage, Madhusanka, editor. Braeken, An, 1970- editor. Kumar, Pardeep, 1976- editor. Ylianttila, Mika, editor.<br/>Preferred Shelf Number TK5105.8857 .I58 2019<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119527978">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119527978</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
The Digital Big Bang : the Hard Stuff, the Soft Stuff, and the Future of Cybersecurity
ent://SD_ILS/0/SD_ILS:595435
2026-02-20T18:49:35Z
2026-02-20T18:49:35Z
Author Quade, Phil.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119617396">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119617396</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
5G explained : security and deployment of advanced mobile communications
ent://SD_ILS/0/SD_ILS:594896
2026-02-20T18:49:35Z
2026-02-20T18:49:35Z
Author Penttinen, Jyrki T. J., author.<br/>Preferred Shelf Number TK5103.483 .P46 2019<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119275695">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119275695</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
5G for the connected world
ent://SD_ILS/0/SD_ILS:594939
2026-02-20T18:49:35Z
2026-02-20T18:49:35Z
Author Chandramouli, Devaki, editor. Liebhart, Rainer, editor. Pirskanen, Juho, editor.<br/>Preferred Shelf Number TK5103.2 .A147 2019<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119247111">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119247111</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Wireshark for security professionals : using Wireshark and the Metasploit Framework
ent://SD_ILS/0/SD_ILS:593472
2026-02-20T18:49:35Z
2026-02-20T18:49:35Z
Author Bullock, Jessey, author. Gordon, Adam, author.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119183457">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119183457</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>