Search Results for Reference. - Narrowed by: Networking.
SirsiDynix Enterprise
https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dReference.$0026qf$003dSUBJECT$002509Subject$002509Networking.$002509Networking.$0026ic$003dtrue$0026ps$003d300$0026isd$003dtrue?
2026-01-21T12:24:32Z
Information security and privacy quick reference the essential handbook for every CISO, CSO, and Chief Privacy Officer
ent://SD_ILS/0/SD_ILS:599946
2026-01-21T12:24:32Z
2026-01-21T12:24:32Z
Author Chapple, Mike, author. Shelley, Joe. Stewart, James Michael.<br/>Preferred Shelf Number QA76.9 .A25 C43 2025<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394353347">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394353347</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Mobile communication systems for private networks
ent://SD_ILS/0/SD_ILS:599652
2026-01-21T12:24:32Z
2026-01-21T12:24:32Z
Author Balasubramanian, Srinivasan.<br/>Preferred Shelf Number TK5103.2 .B35 2025<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394201822">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394201822</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
A Volterra Approach to Digital Predistortion Sparse Identification and Estimation
ent://SD_ILS/0/SD_ILS:599619
2026-01-21T12:24:32Z
2026-01-21T12:24:32Z
Author Crespo-Cadenas, Carlos. Madero-Ayora, Maria Jose. Becerra, Juan A.<br/>Preferred Shelf Number TK5102.98<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394248155">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394248155</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Principles and applications of blockchain systems : how to overcome the CAP trilemma in consortium blockchain
ent://SD_ILS/0/SD_ILS:599650
2026-01-21T12:24:32Z
2026-01-21T12:24:32Z
Author Li, Hu, author. Wang, Han, author.<br/>Preferred Shelf Number QA76.9 .B56 L5 2025<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394237258">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394237258</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Artificial Intelligence for Future Networks.
ent://SD_ILS/0/SD_ILS:599611
2026-01-21T12:24:32Z
2026-01-21T12:24:32Z
Author Matin, Mohammad A. Goudos, Sotirios K. Karagiannidis, George K.<br/>Preferred Shelf Number TK5103.25<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394227952">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394227952</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cryptography : algorithms, protocols, and standards for computer security
ent://SD_ILS/0/SD_ILS:598914
2026-01-21T12:24:32Z
2026-01-21T12:24:32Z
Author Mammeri, Zoubir, author.<br/>Preferred Shelf Number QA268 .M34 2024<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394207510">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394207510</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security and privacy vision in 6G : a comprehensive guide
ent://SD_ILS/0/SD_ILS:598347
2026-01-21T12:24:32Z
2026-01-21T12:24:32Z
Author Porambage, Pawani, author. Liyanage, Madhusanka, author.<br/>Preferred Shelf Number TK5103.252 .P67 2023<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119875437">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119875437</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cyber threat intelligence
ent://SD_ILS/0/SD_ILS:598051
2026-01-21T12:24:32Z
2026-01-21T12:24:32Z
Author Lee, Martin (Computer security expert), author.<br/>Preferred Shelf Number TK5105.59 .L47 2023<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119861775">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119861775</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Evolving software processes : trends and future directions
ent://SD_ILS/0/SD_ILS:597323
2026-01-21T12:24:32Z
2026-01-21T12:24:32Z
Author Khan, Arif Ali, editor. Le, Dac-Nhuong, 1983- editor.<br/>Preferred Shelf Number QA76.76 .D47<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119821779">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119821779</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Software defined networks : architecture and applications
ent://SD_ILS/0/SD_ILS:597588
2026-01-21T12:24:32Z
2026-01-21T12:24:32Z
Author Nayyar, Anand, editor. Nagrath, Preeti, editor. Singla, Bhawna, editor.<br/>Preferred Shelf Number TK5105.5833 .S64 2022<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119857921">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119857921</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Applied incident response
ent://SD_ILS/0/SD_ILS:595744
2026-01-21T12:24:32Z
2026-01-21T12:24:32Z
Author Anson, Steve.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119560302">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119560302</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
IoT security : advances in authentication
ent://SD_ILS/0/SD_ILS:595420
2026-01-21T12:24:32Z
2026-01-21T12:24:32Z
Author Liyanage, Madhusanka, editor. Braeken, An, 1970- editor. Kumar, Pardeep, 1976- editor. Ylianttila, Mika, editor.<br/>Preferred Shelf Number TK5105.8857 .I58 2019<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119527978">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119527978</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security, privacy and digital forensics in the cloud
ent://SD_ILS/0/SD_ILS:594934
2026-01-21T12:24:32Z
2026-01-21T12:24:32Z
Author Chen, Lei, 1978 July 28- editor. Takabi, Hassan, 1982- editor. Le-Khac, Nhien-An, 1972- editor.<br/>Preferred Shelf Number QA76.585 .S43 2019<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119053385">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119053385</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cybersecurity program development for business : the essential planning guide
ent://SD_ILS/0/SD_ILS:594455
2026-01-21T12:24:32Z
2026-01-21T12:24:32Z
Author Moschovitis, Christos J. P., author.<br/>Preferred Shelf Number HD30.2<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119430018">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119430018</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cloud computing and virtualization
ent://SD_ILS/0/SD_ILS:594386
2026-01-21T12:24:32Z
2026-01-21T12:24:32Z
Author Le, Dac-Nhuong, 1983- editor. Kumar, Raghvendra, 1987- editor. Nguyen, Nhu Gia, editor. Chatterjee, Jyotir Moy, editor.<br/>Preferred Shelf Number QA76.9 .V5<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119488149">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119488149</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Content delivery networks : fundamentals, design, and evolution
ent://SD_ILS/0/SD_ILS:593580
2026-01-21T12:24:32Z
2026-01-21T12:24:32Z
Author Robinson, Dom, author.<br/>Preferred Shelf Number TK5105.5<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119249924">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119249924</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>