Search Results for Intrusion detection systems (Computer security) - Narrowed by: English SirsiDynix Enterprise https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dIntrusion$002bdetection$002bsystems$002b$002528Computer$002bsecurity$002529$0026qf$003dLANGUAGE$002509Language$002509ENG$002509English$0026ps$003d300? 2025-12-20T03:58:54Z Data Protection in a Post-Pandemic Society Laws, Regulations, Best Practices and Recent Solutions ent://SD_ILS/0/SD_ILS:520503 2025-12-20T03:58:54Z 2025-12-20T03:58:54Z Author&#160;Hewage, Chaminda. editor.&#160;Rahulamathavan, Yogachandran. editor.&#160;Ratnayake, Deepthi. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-34006-2">https://doi.org/10.1007/978-3-031-34006-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Machine Learning and Optimization Techniques for Automotive Cyber-Physical Systems ent://SD_ILS/0/SD_ILS:528168 2025-12-20T03:58:54Z 2025-12-20T03:58:54Z Author&#160;Kukkala, Vipin Kumar. editor.&#160;Pasricha, Sudeep. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-28016-0">https://doi.org/10.1007/978-3-031-28016-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> OS X incident response : scripting and analysis ent://SD_ILS/0/SD_ILS:458869 2025-12-20T03:58:54Z 2025-12-20T03:58:54Z Author&#160;Bradley, Jaron, author.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128044568">http://www.sciencedirect.com/science/book/9780128044568</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Network anomaly detection : a machine learning perspective ent://SD_ILS/0/SD_ILS:547748 2025-12-20T03:58:54Z 2025-12-20T03:58:54Z Author&#160;Bhattacharyya, Dhruba K., author.&#160;Kalita, Jugal Kumar, author.<br/>Preferred Shelf Number&#160;TK5105.59 .B474 2014<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781466582095">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> Snort 2.0 intrusion detection ent://SD_ILS/0/SD_ILS:254005 2025-12-20T03:58:54Z 2025-12-20T03:58:54Z Author&#160;Beale, Jay.&#160;Foster, James C.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836746">http://www.sciencedirect.com/science/book/9781931836746</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information security management handbook on CD-ROM ent://SD_ILS/0/SD_ILS:547768 2025-12-20T03:58:54Z 2025-12-20T03:58:54Z Author&#160;Nozaki, Micki Krause.&#160;Tipton, Harold F.<br/>Preferred Shelf Number&#160;QA76.9 .A25 H36 2002<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781466515611">https://www.taylorfrancis.com/books/9781466515611</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Secure computers and networks : analysis, design, and implementation ent://SD_ILS/0/SD_ILS:540568 2025-12-20T03:58:54Z 2025-12-20T03:58:54Z Author&#160;Fisch, Eric A.&#160;White, Gregory B.<br/>Preferred Shelf Number&#160;QA76.9 .A25 F5334 2000<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9780367802127">https://www.taylorfrancis.com/books/9780367802127</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/>