Search Results for Internet of things. - Narrowed by: Security.SirsiDynix Enterprisehttps://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dInternet$002bof$002bthings.$0026qf$003dSUBJECT$002509Subject$002509Security.$002509Security.$0026ic$003dtrue$0026ps$003d300?2026-02-20T15:36:01ZPreventing bluetooth and wireless attacks in IoMT healthcare systemsent://SD_ILS/0/SD_ILS:6000162026-02-20T15:36:01Z2026-02-20T15:36:01ZAuthor Chirillo, John, 1970- author.<br/>Preferred Shelf Number R859.7 .S43 C45 2025<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394352401">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394352401</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Cyber Operations : A Case Study Approachent://SD_ILS/0/SD_ILS:5991172026-02-20T15:36:01Z2026-02-20T15:36:01ZAuthor Couretas, Jerry M., 1966- author.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119712121">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119712121</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Security and Privacy for 6G Massive IoT.ent://SD_ILS/0/SD_ILS:5996292026-02-20T15:36:01Z2026-02-20T15:36:01ZAuthor Mantas, Georgios. Saghezchi, Firooz. Rodriguez, Jonathan. Sucasas, Victor.<br/>Preferred Shelf Number TK5103.252<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119988007">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119988007</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Security issues and privacy concerns in Industry 4.0 applicationsent://SD_ILS/0/SD_ILS:5969452026-02-20T15:36:01Z2026-02-20T15:36:01ZAuthor David, Shiblin, author. Anand, R. S., author. Jeyakrishnan, V., author. Niranjanamurthy, M., author.<br/>Preferred Shelf Number QA76.9 .A25 D38 2021<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119776529">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119776529</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>5G explained : security and deployment of advanced mobile communicationsent://SD_ILS/0/SD_ILS:5948962026-02-20T15:36:01Z2026-02-20T15:36:01ZAuthor Penttinen, Jyrki T. J., author.<br/>Preferred Shelf Number TK5103.483 .P46 2019<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119275695">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119275695</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Blockchain for distributed systems securityent://SD_ILS/0/SD_ILS:5951462026-02-20T15:36:01Z2026-02-20T15:36:01ZAuthor Shetty, Sachin, editor. Kamhoua, Charles A., edtior. Njilla, Laurent L., editor.<br/>Preferred Shelf Number QA76.9 .B56 B56 2019 EB<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119519621">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119519621</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Cyber-vigilance and digital trust : cyber security in the era of cloud computing and IoTent://SD_ILS/0/SD_ILS:5952792026-02-20T15:36:01Z2026-02-20T15:36:01ZAuthor Tounsi, Wiem, editor.<br/>Preferred Shelf Number QA76.9 .A25 C93 2019 EB<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119618393">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119618393</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>IoT security : advances in authenticationent://SD_ILS/0/SD_ILS:5954202026-02-20T15:36:01Z2026-02-20T15:36:01ZAuthor Liyanage, Madhusanka, editor. Braeken, An, 1970- editor. Kumar, Pardeep, 1976- editor. Ylianttila, Mika, editor.<br/>Preferred Shelf Number TK5105.8857 .I58 2019<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119527978">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119527978</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>We have root : even more advice from Schneier on securityent://SD_ILS/0/SD_ILS:5954322026-02-20T15:36:01Z2026-02-20T15:36:01ZAuthor Schneier, Bruce, 1963- author.<br/>Preferred Shelf Number QA76.9 .A25 S36 2019<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119653554">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119653554</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Cybersecurity program development for business : the essential planning guideent://SD_ILS/0/SD_ILS:5944552026-02-20T15:36:01Z2026-02-20T15:36:01ZAuthor Moschovitis, Christos J. P., author.<br/>Preferred Shelf Number HD30.2<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119430018">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119430018</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>