Search Results for Security Science and Technology. - Narrowed by: COMPUTERS. SirsiDynix Enterprise https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dSecurity$002bScience$002band$002bTechnology.$0026qf$003dSUBJECT$002509Subject$002509COMPUTERS.$002509COMPUTERS.$0026ps$003d300$0026isd$003dtrue? 2026-01-24T14:50:42Z Protecting and mitigating against cyber threats : deploying artificial intelligence and machine learning ent://SD_ILS/0/SD_ILS:599999 2026-01-24T14:50:42Z 2026-01-24T14:50:42Z Author&#160;Mohanty, Sachi Nandan, editor.<br/>Preferred Shelf Number&#160;QA76.9 .A25 P76 2025<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394305216">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394305216</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Artificial intelligence-enabled blockchain technology and digital twin for smart hospitals ent://SD_ILS/0/SD_ILS:599395 2026-01-24T14:50:42Z 2026-01-24T14:50:42Z Author&#160;Tyagi, Amit Kumar, editor.<br/>Preferred Shelf Number&#160;RA976 .A78 2024<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394287420">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394287420</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Deep learning techniques for automation and industrial applications ent://SD_ILS/0/SD_ILS:599201 2026-01-24T14:50:42Z 2026-01-24T14:50:42Z Author&#160;Rathore, Pramod Singh, 1988- editor.&#160;Ahuja, Sachin.&#160;Burri, Srinivasa Rao.&#160;Khunteta, Ajay.&#160;Baliyan, Anupam.<br/>Preferred Shelf Number&#160;T59.5 .D44 2024<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394234271">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394234271</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Fog computing for intelligent cloud IoT systems ent://SD_ILS/0/SD_ILS:599191 2026-01-24T14:50:42Z 2026-01-24T14:50:42Z Author&#160;Banerjee, Chandan, editor.&#160;Ghosh, Anupam, editor.&#160;Chakraborty, Rajdeep, editor.&#160;Elngar, Ahmed A., editor.<br/>Preferred Shelf Number&#160;TK5105.8857 .F64 2024<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394175345">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394175345</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security, privacy and digital forensics in the cloud ent://SD_ILS/0/SD_ILS:594934 2026-01-24T14:50:42Z 2026-01-24T14:50:42Z Author&#160;Chen, Lei, 1978 July 28- editor.&#160;Takabi, Hassan, 1982- editor.&#160;Le-Khac, Nhien-An, 1972- editor.<br/>Preferred Shelf Number&#160;QA76.585 .S43 2019<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119053385">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119053385</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Blockchain for distributed systems security ent://SD_ILS/0/SD_ILS:595146 2026-01-24T14:50:42Z 2026-01-24T14:50:42Z Author&#160;Shetty, Sachin, editor.&#160;Kamhoua, Charles A., edtior.&#160;Njilla, Laurent L., editor.<br/>Preferred Shelf Number&#160;QA76.9 .B56 B56 2019 EB<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119519621">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119519621</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/>