Search Results for Machines. - Narrowed by: Computer security.
SirsiDynix Enterprise
https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dMachines.$0026qf$003dSUBJECT$002509Subject$002509Computer$002bsecurity.$002509Computer$002bsecurity.$0026ic$003dtrue$0026ps$003d300?
2026-02-25T04:59:34Z
Rise of the machines : when AI and zero trust collide : a Project Zero Trust story
ent://SD_ILS/0/SD_ILS:599932
2026-02-25T04:59:34Z
2026-02-25T04:59:34Z
Author Finney, George, author. Vinduska, Zach, author.<br/>Preferred Shelf Number QA76.9 .A25 F56 2025<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394352517">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394352517</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Discrete dynamical systems and chaotic machines : theory and applications
ent://SD_ILS/0/SD_ILS:545715
2026-02-25T04:59:34Z
2026-02-25T04:59:34Z
Author Bahi, Jacques Mohcine., author. Guyeux, Christophe.<br/>Preferred Shelf Number QA76.9 .A25 B344 2013<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781466554511">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>
Generative AI, cybersecurity, and ethics
ent://SD_ILS/0/SD_ILS:599597
2026-02-25T04:59:34Z
2026-02-25T04:59:34Z
Author Islam, Ray (Mohammad Rubyet), author.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394279326">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394279326</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Quantum computing models for cybersecurity and wireless communications
ent://SD_ILS/0/SD_ILS:599707
2026-02-25T04:59:34Z
2026-02-25T04:59:34Z
Author Kumar, Budati Anil, edited. Kumar, Singamaneni Kranthi, edited. Li, Xingwang (Computer scientist), edited.<br/>Preferred Shelf Number QA76.9 .A25 Q36 2025<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394271429">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394271429</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Artificial intelligence and data mining approaches in security frameworks
ent://SD_ILS/0/SD_ILS:596957
2026-02-25T04:59:34Z
2026-02-25T04:59:34Z
Author Bhargava, Neeraj. Bhargava, Ritu. Rathore, Pramod Singh, 1988- Agrawal, Rashmi, 1978-<br/>Preferred Shelf Number Q335<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119760429">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119760429</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
VMware® Certified Professional Data Center Virtualization on vSphere 6.7 Exam 2V0-21.19 : study guide
ent://SD_ILS/0/SD_ILS:596289
2026-02-25T04:59:34Z
2026-02-25T04:59:34Z
Author Hall, Jon, 1963- author. Andrews, Joshua, author.<br/>Preferred Shelf Number QA76.9 .V5<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119539698">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119539698</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>