Search Results for Human security - Narrowed by: COMPUTERS. SirsiDynix Enterprise https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dHuman$002bsecurity$0026qf$003dSUBJECT$002509Subject$002509COMPUTERS.$002509COMPUTERS.$0026ps$003d300$0026isd$003dtrue? 2026-01-21T15:27:00Z AI and ML Techniques in IoT-based Communication A Path to Sustainable Development Goals. ent://SD_ILS/0/SD_ILS:600338 2026-01-21T15:27:00Z 2026-01-21T15:27:00Z Author&#160;Mishra, Sumita.&#160;Gupta, Nishu.&#160;Goktas, Polat.<br/>Preferred Shelf Number&#160;XX(600338.1)<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394337262">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394337262</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> The impact of algorithmic technologies on healthcare ent://SD_ILS/0/SD_ILS:599726 2026-01-21T15:27:00Z 2026-01-21T15:27:00Z Author&#160;Dubey, Parul, editor&#160;Madankar, Mangala, editor&#160;Dubey, Pushkar, editor&#160;Hung, Bui Thanh, editor<br/>Preferred Shelf Number&#160;R859.7 .A78<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394305490">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394305490</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Reshaping intelligent business and industry : convergence of AI and IoT at the cutting edge ent://SD_ILS/0/SD_ILS:599399 2026-01-21T15:27:00Z 2026-01-21T15:27:00Z Author&#160;Dahiya, Neeraj, editor.&#160;Jaglan, Vivek.&#160;Koundal, Deepika.&#160;Le, Dac-Nhuong.<br/>Preferred Shelf Number&#160;HD45 .R47 2024<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119905202">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119905202</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Deep reinforcement learning and its industrial use cases : ai for real-world applications ent://SD_ILS/0/SD_ILS:599426 2026-01-21T15:27:00Z 2026-01-21T15:27:00Z Preferred Shelf Number&#160;TA347 .A78 D44 2024<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394272587">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394272587</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Digital agricultural ecosystem : revolutionary advancements in agriculture ent://SD_ILS/0/SD_ILS:599088 2026-01-21T15:27:00Z 2026-01-21T15:27:00Z Author&#160;Singh, Kuldeep, editor.&#160;Kolar, Prasanna, editor.<br/>Preferred Shelf Number&#160;S493 .D54 2024<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394242962">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394242962</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Stepping through cybersecurity risk management : a systems thinking approach ent://SD_ILS/0/SD_ILS:599021 2026-01-21T15:27:00Z 2026-01-21T15:27:00Z Author&#160;Bayuk, Jennifer L., author.<br/>Preferred Shelf Number&#160;QA76.9 .A25 B39 2024<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394213986">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394213986</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Effective vulnerability management : managing risk in the vulnerable digital ecosystem ent://SD_ILS/0/SD_ILS:599047 2026-01-21T15:27:00Z 2026-01-21T15:27:00Z Author&#160;Hughes, Chris (Christopher Matthew), author.&#160;Robinson, Nikki, author.<br/>Preferred Shelf Number&#160;QA76.9 .A25 H84 2024<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394277155">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394277155</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Conversational artificial intelligence ent://SD_ILS/0/SD_ILS:598905 2026-01-21T15:27:00Z 2026-01-21T15:27:00Z Author&#160;Rawat, Romil, 1986- editor.&#160;Chakrawarti, Rajesh Kumar, editor&#160;Sarangi, Sanjaya Kumar, editor&#160;Vyas, Piyush, editor&#160;Alamanda, Mary Sowjanya, editor<br/>Preferred Shelf Number&#160;Q335 .C66 2024<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394200801">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394200801</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Quantum computing in cybersecurity ent://SD_ILS/0/SD_ILS:598685 2026-01-21T15:27:00Z 2026-01-21T15:27:00Z Author&#160;Rawat, Romil, editor.<br/>Preferred Shelf Number&#160;QA76.9 .A25 Q83 2023<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394167401">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394167401</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Self-powered cyber physical systems ent://SD_ILS/0/SD_ILS:598585 2026-01-21T15:27:00Z 2026-01-21T15:27:00Z Author&#160;Gatti, Rathishchandra, 1980- editor.&#160;Singh, Chandra, editor.&#160;Agrawal, Rajeev, editor.&#160;Serrao, Felcy Jyothi, editor.<br/>Preferred Shelf Number&#160;TJ163.5 .D38 S45 2023<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119842026">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119842026</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Handbook of human-machine systems ent://SD_ILS/0/SD_ILS:598467 2026-01-21T15:27:00Z 2026-01-21T15:27:00Z Author&#160;Fortino, Giancarlo, 1971- editor.<br/>Preferred Shelf Number&#160;TA167 .H36 2023<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119863663">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119863663</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Evolving software processes : trends and future directions ent://SD_ILS/0/SD_ILS:597323 2026-01-21T15:27:00Z 2026-01-21T15:27:00Z Author&#160;Khan, Arif Ali, editor.&#160;Le, Dac-Nhuong, 1983- editor.<br/>Preferred Shelf Number&#160;QA76.76 .D47<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119821779">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119821779</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> The new advanced society : artificial intelligence and industrial Internet of Things paradigm ent://SD_ILS/0/SD_ILS:597456 2026-01-21T15:27:00Z 2026-01-21T15:27:00Z Author&#160;Panda, Sandeep Kumar, editor.<br/>Preferred Shelf Number&#160;TA347 .A78<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119884392">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119884392</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Data mining and machine learning applications ent://SD_ILS/0/SD_ILS:597345 2026-01-21T15:27:00Z 2026-01-21T15:27:00Z Author&#160;Raja, Rohit, editor.<br/>Preferred Shelf Number&#160;QA76.9 .D343<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119792529">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119792529</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Understanding artificial intelligence : fundamentals and applications ent://SD_ILS/0/SD_ILS:597672 2026-01-21T15:27:00Z 2026-01-21T15:27:00Z Author&#160;Liu, Albert Chun-Chen, author.&#160;Law, Oscar Ming Kin, author.&#160;Law, Iain, author.<br/>Preferred Shelf Number&#160;Q335 .L58 2022<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119858393">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119858393</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security issues and privacy concerns in Industry 4.0 applications ent://SD_ILS/0/SD_ILS:596945 2026-01-21T15:27:00Z 2026-01-21T15:27:00Z Author&#160;David, Shiblin, author.&#160;Anand, R. S., author.&#160;Jeyakrishnan, V., author.&#160;Niranjanamurthy, M., author.<br/>Preferred Shelf Number&#160;QA76.9 .A25 D38 2021<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119776529">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119776529</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Machine learning and big data : concepts, algorithms, tools and applications ent://SD_ILS/0/SD_ILS:596304 2026-01-21T15:27:00Z 2026-01-21T15:27:00Z Author&#160;Dulhare, Uma N., editor.&#160;Ahmad, Khaleel, editor.&#160;Khairol Amali Bin Ahmad, editor.<br/>Preferred Shelf Number&#160;Q325.5<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119654834">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119654834</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> We have root : even more advice from Schneier on security ent://SD_ILS/0/SD_ILS:595432 2026-01-21T15:27:00Z 2026-01-21T15:27:00Z Author&#160;Schneier, Bruce, 1963- author.<br/>Preferred Shelf Number&#160;QA76.9 .A25 S36 2019<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119653554">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119653554</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cyber security in parallel and distributed computing : concepts, techniques, applications and case studies ent://SD_ILS/0/SD_ILS:595099 2026-01-21T15:27:00Z 2026-01-21T15:27:00Z Author&#160;Le, Dac-Nhuong, 1983- editor.&#160;Kumar, Raghvendra, 1987- editor.&#160;Mishra, Brojo Kishore, 1979- editor.&#160;Khari, Manju, editor.&#160;Chatterjee, Jyotir Moy, editor.<br/>Preferred Shelf Number&#160;QA76.9 .A25<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119488330">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119488330</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Transformational security awareness : what neuroscientists, storytellers, and marketers can teach us about driving secure behaviors ent://SD_ILS/0/SD_ILS:595304 2026-01-21T15:27:00Z 2026-01-21T15:27:00Z Author&#160;Carpenter, Perry, author.<br/>Preferred Shelf Number&#160;QA76.9 .A25 C37 2019 EB<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119566380">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119566380</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cybersecurity blue team toolkit ent://SD_ILS/0/SD_ILS:595209 2026-01-21T15:27:00Z 2026-01-21T15:27:00Z Author&#160;Tanner, Nadean H., author.<br/>Preferred Shelf Number&#160;QA76.9 .A25 T36 2019 EB<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119552963">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119552963</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Insider threats ent://SD_ILS/0/SD_ILS:594407 2026-01-21T15:27:00Z 2026-01-21T15:27:00Z Author&#160;Arduin, Pierre-Emmanuel, author.<br/>Preferred Shelf Number&#160;QA76.9 .A25<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119419785">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119419785</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/>