Search Results for Light - Narrowed by: COMPUTERS.
SirsiDynix Enterprise
https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dLight$0026qf$003dSUBJECT$002509Konu$002509COMPUTERS.$002509COMPUTERS.$0026ps$003d300?
2026-02-17T07:59:15Z
Short-reach optical wireless communication : by directed narrow beams
ent://SD_ILS/0/SD_ILS:599919
2026-02-17T07:59:15Z
2026-02-17T07:59:15Z
Author Koonen, Ton.<br/>Preferred Shelf Number TK5103.59 .K66 2025<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394300419">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394300419</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
BEHIND THE AI MASK protecting your business from deepfakes.
ent://SD_ILS/0/SD_ILS:600411
2026-02-17T07:59:15Z
2026-02-17T07:59:15Z
Author BOGAN, CARL.<br/>Preferred Shelf Number XX(600411.1)<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394352616">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394352616</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Explainable artificial intelligence in the healthcare industry
ent://SD_ILS/0/SD_ILS:599742
2026-02-17T07:59:15Z
2026-02-17T07:59:15Z
Preferred Shelf Number R859.7 .A78 E97 2025<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394249312">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394249312</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Quantum dot display science and technology
ent://SD_ILS/0/SD_ILS:599752
2026-02-17T07:59:15Z
2026-02-17T07:59:15Z
Author Alivisatos, P., editor. Jang, Eunjoo, (Professor), editor. Ma, Ruiqing, editor.<br/>Preferred Shelf Number TK7874.88 .Q3625 2025<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394181889">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394181889</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Advanced Mathematics in Computing, Communication and Security.
ent://SD_ILS/0/SD_ILS:600324
2026-02-17T07:59:15Z
2026-02-17T07:59:15Z
Author Jadhav, Dipt. Dasre, Narendrakumar. Jadhav, Dipti/Wani, Prita.<br/>Preferred Shelf Number XX(600324.1)<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394307302">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394307302</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Simulation techniques of digital twin in real-time applications : design modeling and implementation
ent://SD_ILS/0/SD_ILS:599189
2026-02-17T07:59:15Z
2026-02-17T07:59:15Z
Author Anand, Abhineet, editor.<br/>Preferred Shelf Number QA76.9 .C65 S56 2024<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394257003">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394257003</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Agile Software Development : trends, challenges and applications
ent://SD_ILS/0/SD_ILS:598189
2026-02-17T07:59:15Z
2026-02-17T07:59:15Z
Author Hooda, Susheela, editor. Sood, Vandana Mohindru, editor. Singh, Yashwant, editor. Dalal, Sandeep, editor. Sood, Manu, editor.<br/>Preferred Shelf Number QA76.76 .D47 A55 2023<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119896838">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119896838</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security and privacy vision in 6G : a comprehensive guide
ent://SD_ILS/0/SD_ILS:598347
2026-02-17T07:59:15Z
2026-02-17T07:59:15Z
Author Porambage, Pawani, author. Liyanage, Madhusanka, author.<br/>Preferred Shelf Number TK5103.252 .P67 2023<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119875437">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119875437</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Analyzing websites
ent://SD_ILS/0/SD_ILS:598856
2026-02-17T07:59:15Z
2026-02-17T07:59:15Z
Author Massou, Luc, editor Mpondo-Dicka, Patrick, editor. Pinède, Nathalie, editor<br/>Preferred Shelf Number TK5105.888<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394264964">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394264964</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cyber security and network security
ent://SD_ILS/0/SD_ILS:597484
2026-02-17T07:59:15Z
2026-02-17T07:59:15Z
Author Pramanik, Sabyasachi, editor. Samanta, Debabrata, 1987- editor. Vinay, M., editor. Guha, Abhijit, editor.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119812555">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119812555</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cognitive intelligence and big data in healthcare
ent://SD_ILS/0/SD_ILS:597861
2026-02-17T07:59:15Z
2026-02-17T07:59:15Z
Author Sumathi, D., editor.<br/>Preferred Shelf Number R859.7 .A78<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119771982">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119771982</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Conflicts, crimes and regulations in cyberspace
ent://SD_ILS/0/SD_ILS:597281
2026-02-17T07:59:15Z
2026-02-17T07:59:15Z
Author Laurent, Sébastien, editor.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119885092">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119885092</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Concepts and semantics of programming languages 2 : modular and object-oriented constructs with Ocaml, Python, C++, Ada and Java
ent://SD_ILS/0/SD_ILS:597082
2026-02-17T07:59:15Z
2026-02-17T07:59:15Z
Author Hardin, Thérèse, author. Jaume, Mathieu, author. Pessaux, Francois, author. Donzeau-Gouge, Véronique, author.<br/>Preferred Shelf Number QA76.7<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119851196">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119851196</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
AI and IoT-based intelligent automation in robotics
ent://SD_ILS/0/SD_ILS:596690
2026-02-17T07:59:15Z
2026-02-17T07:59:15Z
Author Dubey, Ashutosh Kumar, editor.<br/>Preferred Shelf Number TJ211.495 .A24 2021<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119711230">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119711230</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Graph spectral image processing
ent://SD_ILS/0/SD_ILS:597165
2026-02-17T07:59:15Z
2026-02-17T07:59:15Z
Author Cheung, Gene, editor. Magli, Enrico, editor.<br/>Preferred Shelf Number TA1632 .G73 2021<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119850830">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119850830</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Excel® 2019 power programming with VBA
ent://SD_ILS/0/SD_ILS:595282
2026-02-17T07:59:15Z
2026-02-17T07:59:15Z
Author Alexander, Michael, author. Kusleika, Dick, author.<br/>Preferred Shelf Number HF5548.4 .M523<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119583790">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119583790</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Hacking the hacker : learn from the experts who take down hackers
ent://SD_ILS/0/SD_ILS:593636
2026-02-17T07:59:15Z
2026-02-17T07:59:15Z
Author Grimes, Roger A., author.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119396260">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119396260</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Wireshark for security professionals : using Wireshark and the Metasploit Framework
ent://SD_ILS/0/SD_ILS:593472
2026-02-17T07:59:15Z
2026-02-17T07:59:15Z
Author Bullock, Jessey, author. Gordon, Adam, author.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119183457">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119183457</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Network forensics
ent://SD_ILS/0/SD_ILS:593814
2026-02-17T07:59:15Z
2026-02-17T07:59:15Z
Author Messier, Ric, author.<br/>Preferred Shelf Number TK5105.59<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119329190">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119329190</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>