Search Results for Monitoring. - Narrowed by: Networking.
SirsiDynix Enterprise
https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dMonitoring.$0026qf$003dSUBJECT$002509Subject$002509Networking.$002509Networking.$0026ps$003d300?
2026-02-21T04:42:48Z
Windows security monitoring : scenarios and patterns
ent://SD_ILS/0/SD_ILS:594404
2026-02-21T04:42:48Z
2026-02-21T04:42:48Z
Author Miroshnikov, Andrei, author.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119390909">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119390909</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Zero Trust Security A Hands-on Guide
ent://SD_ILS/0/SD_ILS:600392
2026-02-21T04:42:48Z
2026-02-21T04:42:48Z
Author Jakobsen, Adam Tilmar.<br/>Preferred Shelf Number XX(600392.1)<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394361120">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394361120</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cyber defense : best practices for digital safety
ent://SD_ILS/0/SD_ILS:600003
2026-02-21T04:42:48Z
2026-02-21T04:42:48Z
Author Edwards, Jason, author.<br/>Preferred Shelf Number QA76.9 .A25 E39 2025<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394337040">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394337040</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Intelligent scheduling of tasks for cloud-edge-device computing systems
ent://SD_ILS/0/SD_ILS:600358
2026-02-21T04:42:48Z
2026-02-21T04:42:48Z
Author Hu, Biao, author.<br/>Preferred Shelf Number QA76.585 .H83 2025<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394361656">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394361656</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Stepping through cybersecurity risk management : a systems thinking approach
ent://SD_ILS/0/SD_ILS:599021
2026-02-21T04:42:48Z
2026-02-21T04:42:48Z
Author Bayuk, Jennifer L., author.<br/>Preferred Shelf Number QA76.9 .A25 B39 2024<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394213986">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394213986</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
The cybersecurity guide to governance, risk, and compliance
ent://SD_ILS/0/SD_ILS:598945
2026-02-21T04:42:48Z
2026-02-21T04:42:48Z
Author Edwards, Jason (Cybersecurity expert), author. Weaver, Griffin, author.<br/>Preferred Shelf Number HD30.38 .E34 2024<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394250226">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394250226</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Effective vulnerability management : managing risk in the vulnerable digital ecosystem
ent://SD_ILS/0/SD_ILS:599047
2026-02-21T04:42:48Z
2026-02-21T04:42:48Z
Author Hughes, Chris (Christopher Matthew), author. Robinson, Nikki, author.<br/>Preferred Shelf Number QA76.9 .A25 H84 2024<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394277155">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394277155</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Evolving software processes : trends and future directions
ent://SD_ILS/0/SD_ILS:597323
2026-02-21T04:42:48Z
2026-02-21T04:42:48Z
Author Khan, Arif Ali, editor. Le, Dac-Nhuong, 1983- editor.<br/>Preferred Shelf Number QA76.76 .D47<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119821779">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119821779</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Microsoft® Azure® Infrastructure services for architects : designing cloud solutions
ent://SD_ILS/0/SD_ILS:595542
2026-02-21T04:42:48Z
2026-02-21T04:42:48Z
Author Savill, John, 1975- author.<br/>Preferred Shelf Number QA76.585 .S38 2020<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119596608">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119596608</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Applied incident response
ent://SD_ILS/0/SD_ILS:595744
2026-02-21T04:42:48Z
2026-02-21T04:42:48Z
Author Anson, Steve.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119560302">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119560302</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>