Search Results for Network Protocols. - Narrowed by: COMPUTERS. SirsiDynix Enterprise https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dNetwork$002bProtocols.$0026qf$003dSUBJECT$002509Subject$002509COMPUTERS.$002509COMPUTERS.$0026ps$003d300$0026isd$003dtrue? 2026-01-21T12:12:24Z Mobile communication systems for private networks ent://SD_ILS/0/SD_ILS:599652 2026-01-21T12:12:24Z 2026-01-21T12:12:24Z Author&#160;Balasubramanian, Srinivasan.<br/>Preferred Shelf Number&#160;TK5103.2 .B35 2025<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394201822">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394201822</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> A Volterra Approach to Digital Predistortion Sparse Identification and Estimation ent://SD_ILS/0/SD_ILS:599619 2026-01-21T12:12:24Z 2026-01-21T12:12:24Z Author&#160;Crespo-Cadenas, Carlos.&#160;Madero-Ayora, Maria Jose.&#160;Becerra, Juan A.<br/>Preferred Shelf Number&#160;TK5102.98<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394248155">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394248155</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Principles and applications of blockchain systems : how to overcome the CAP trilemma in consortium blockchain ent://SD_ILS/0/SD_ILS:599650 2026-01-21T12:12:24Z 2026-01-21T12:12:24Z Author&#160;Li, Hu, author.&#160;Wang, Han, author.<br/>Preferred Shelf Number&#160;QA76.9 .B56 L5 2025<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394237258">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394237258</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cryptography : algorithms, protocols, and standards for computer security ent://SD_ILS/0/SD_ILS:598914 2026-01-21T12:12:24Z 2026-01-21T12:12:24Z Author&#160;Mammeri, Zoubir, author.<br/>Preferred Shelf Number&#160;QA268 .M34 2024<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394207510">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394207510</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Quantum computing in cybersecurity ent://SD_ILS/0/SD_ILS:598685 2026-01-21T12:12:24Z 2026-01-21T12:12:24Z Author&#160;Rawat, Romil, editor.<br/>Preferred Shelf Number&#160;QA76.9 .A25 Q83 2023<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394167401">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394167401</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> The Internet of Medical Things (IoMT) : healthcare transformation ent://SD_ILS/0/SD_ILS:597423 2026-01-21T12:12:24Z 2026-01-21T12:12:24Z Author&#160;Hemalatha, R. J., editor.<br/>Preferred Shelf Number&#160;R859.7 .A78<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119769200">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119769200</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Understanding infrastructure edge computing : concepts, technologies and considerations ent://SD_ILS/0/SD_ILS:596448 2026-01-21T12:12:24Z 2026-01-21T12:12:24Z Author&#160;Marcham, Alex, author.<br/>Preferred Shelf Number&#160;QA76.583 .M37 2021<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119763260">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119763260</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Design and analysis of security protocol for communication ent://SD_ILS/0/SD_ILS:595798 2026-01-21T12:12:24Z 2026-01-21T12:12:24Z Author&#160;Goyal, Dinesh, 1976- editor.&#160;Balamurigan, A., editor.&#160;Peng, Sheng-Lung, editor.&#160;Verma, O. P. (Telecommunications engineer), editor.<br/>Preferred Shelf Number&#160;TK5105.59 .D468 2020 EB<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119555759">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119555759</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Enabling the internet of things : fundamentals, design, and applications ent://SD_ILS/0/SD_ILS:596302 2026-01-21T12:12:24Z 2026-01-21T12:12:24Z Author&#160;Iqbal, Muhammad Azhar, 1978- author.&#160;Hussain, Sajjad, (Lecturer in Electronics and Electrical Engineering), author.&#160;Huanlai, Xing, author.&#160;Imran, Muhammad A., author.<br/>Preferred Shelf Number&#160;TK5105.8857<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119701460">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119701460</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Blockchain for distributed systems security ent://SD_ILS/0/SD_ILS:595146 2026-01-21T12:12:24Z 2026-01-21T12:12:24Z Author&#160;Shetty, Sachin, editor.&#160;Kamhoua, Charles A., edtior.&#160;Njilla, Laurent L., editor.<br/>Preferred Shelf Number&#160;QA76.9 .B56 B56 2019 EB<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119519621">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119519621</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> 5G explained : security and deployment of advanced mobile communications ent://SD_ILS/0/SD_ILS:594896 2026-01-21T12:12:24Z 2026-01-21T12:12:24Z Author&#160;Penttinen, Jyrki T. J., author.<br/>Preferred Shelf Number&#160;TK5103.483 .P46 2019<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119275695">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119275695</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Secure connected objects ent://SD_ILS/0/SD_ILS:593709 2026-01-21T12:12:24Z 2026-01-21T12:12:24Z Author&#160;Paret, Dominique.&#160;Huon, Jean-Paul.<br/>Preferred Shelf Number&#160;TK5105.8857<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119426639">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119426639</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Network forensics ent://SD_ILS/0/SD_ILS:593814 2026-01-21T12:12:24Z 2026-01-21T12:12:24Z Author&#160;Messier, Ric, author.<br/>Preferred Shelf Number&#160;TK5105.59<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119329190">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119329190</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Content delivery networks : fundamentals, design, and evolution ent://SD_ILS/0/SD_ILS:593580 2026-01-21T12:12:24Z 2026-01-21T12:12:24Z Author&#160;Robinson, Dom, author.<br/>Preferred Shelf Number&#160;TK5105.5<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119249924">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119249924</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/>