Search Results for Systems Theory - Narrowed by: Computer security. SirsiDynix Enterprise https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dSystems$002bTheory$0026qf$003dSUBJECT$002509Subject$002509Computer$002bsecurity.$002509Computer$002bsecurity.$0026ps$003d300? 2026-01-23T14:00:36Z Geographical Information Systems Theory, Applications and Management 4th International Conference, GISTAM 2018, Funchal, Madeira, Portugal, March 17&ndash;19, 2018, Revised Selected Papers ent://SD_ILS/0/SD_ILS:486645 2026-01-23T14:00:36Z 2026-01-23T14:00:36Z Author&#160;Ragia, Lemonia. editor.&#160;Grueau, C&eacute;dric. editor.&#160;Laurini, Robert. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-29948-4">https://doi.org/10.1007/978-3-030-29948-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Discrete dynamical systems and chaotic machines : theory and applications ent://SD_ILS/0/SD_ILS:545715 2026-01-23T14:00:36Z 2026-01-23T14:00:36Z Author&#160;Bahi, Jacques Mohcine., author.&#160;Guyeux, Christophe.<br/>Preferred Shelf Number&#160;QA76.9 .A25 B344 2013<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781466554511">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> Quantum computing models for cybersecurity and wireless communications ent://SD_ILS/0/SD_ILS:599707 2026-01-23T14:00:36Z 2026-01-23T14:00:36Z Author&#160;Kumar, Budati Anil, edited.&#160;Kumar, Singamaneni Kranthi, edited.&#160;Li, Xingwang (Computer scientist), edited.<br/>Preferred Shelf Number&#160;QA76.9 .A25 Q36 2025<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394271429">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394271429</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Emerging threats and countermeasures in cybersecurity ent://SD_ILS/0/SD_ILS:599561 2026-01-23T14:00:36Z 2026-01-23T14:00:36Z Preferred Shelf Number&#160;QA76.9 .A25 E44 2025<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394230600">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394230600</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Artificial intelligence and data mining approaches in security frameworks ent://SD_ILS/0/SD_ILS:596957 2026-01-23T14:00:36Z 2026-01-23T14:00:36Z Author&#160;Bhargava, Neeraj.&#160;Bhargava, Ritu.&#160;Rathore, Pramod Singh, 1988-&#160;Agrawal, Rashmi, 1978-<br/>Preferred Shelf Number&#160;Q335<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119760429">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119760429</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/>