Search Results for Linux - Narrowed by: COMPUTERS. SirsiDynix Enterprise https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dLinux$0026qf$003dSUBJECT$002509Subject$002509COMPUTERS.$002509COMPUTERS.$0026ic$003dtrue$0026ps$003d300? 2026-01-21T07:09:15Z File system forensics ent://SD_ILS/0/SD_ILS:599730 2026-01-21T07:09:15Z 2026-01-21T07:09:15Z Author&#160;Toolan, Fergus.<br/>Preferred Shelf Number&#160;QA76.9 .D348 T66 2025<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394289820">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394289820</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Practical cyber intelligence : a hands-on guide to digital forensics ent://SD_ILS/0/SD_ILS:599262 2026-01-21T07:09:15Z 2026-01-21T07:09:15Z Author&#160;Jakobsen, Adam Tilmar, author.<br/>Preferred Shelf Number&#160;HV8079 .C65 J633 2024<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394256129">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394256129</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Data analytics in the AWS cloud : building a data platform for BI and predictive analytics on AWS ent://SD_ILS/0/SD_ILS:598298 2026-01-21T07:09:15Z 2026-01-21T07:09:15Z Author&#160;Minichino, Joe, author.<br/>Preferred Shelf Number&#160;QA76.585 .M56 2023<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394320677">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394320677</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Understanding infrastructure edge computing : concepts, technologies and considerations ent://SD_ILS/0/SD_ILS:596448 2026-01-21T07:09:15Z 2026-01-21T07:09:15Z Author&#160;Marcham, Alex, author.<br/>Preferred Shelf Number&#160;QA76.583 .M37 2021<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119763260">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119763260</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Hacking connected cars : tactics, techniques, and procedures ent://SD_ILS/0/SD_ILS:595843 2026-01-21T07:09:15Z 2026-01-21T07:09:15Z Author&#160;Knight, Alissa, author.<br/>Preferred Shelf Number&#160;TL152.8 .K65 2020<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119491774">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119491774</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cybersecurity blue team toolkit ent://SD_ILS/0/SD_ILS:595209 2026-01-21T07:09:15Z 2026-01-21T07:09:15Z Author&#160;Tanner, Nadean H., author.<br/>Preferred Shelf Number&#160;QA76.9 .A25 T36 2019 EB<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119552963">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119552963</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Wireshark for security professionals : using Wireshark and the Metasploit Framework ent://SD_ILS/0/SD_ILS:593472 2026-01-21T07:09:15Z 2026-01-21T07:09:15Z Author&#160;Bullock, Jessey, author.&#160;Gordon, Adam, author.<br/>Preferred Shelf Number&#160;QA76.9 .A25<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119183457">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119183457</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/>