Search Results for Hunting - Narrowed by: COMPUTERS.
SirsiDynix Enterprise
https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dHunting$0026qf$003dSUBJECT$002509Subject$002509COMPUTERS.$002509COMPUTERS.$0026ps$003d300$0026isd$003dtrue?
2026-01-21T11:59:45Z
Modeling and optimization of signals using machine learning techniques
ent://SD_ILS/0/SD_ILS:599379
2026-01-21T11:59:45Z
2026-01-21T11:59:45Z
Preferred Shelf Number TK5102.9 .M63 2024<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119847717">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119847717</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cyber threat intelligence
ent://SD_ILS/0/SD_ILS:598051
2026-01-21T11:59:45Z
2026-01-21T11:59:45Z
Author Lee, Martin (Computer security expert), author.<br/>Preferred Shelf Number TK5105.59 .L47 2023<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119861775">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119861775</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Hacking connected cars : tactics, techniques, and procedures
ent://SD_ILS/0/SD_ILS:595843
2026-01-21T11:59:45Z
2026-01-21T11:59:45Z
Author Knight, Alissa, author.<br/>Preferred Shelf Number TL152.8 .K65 2020<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119491774">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119491774</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Applied incident response
ent://SD_ILS/0/SD_ILS:595744
2026-01-21T11:59:45Z
2026-01-21T11:59:45Z
Author Anson, Steve.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119560302">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119560302</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>