Search Results for Training. - Narrowed by: Networking. SirsiDynix Enterprise https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dTraining.$0026qf$003dSUBJECT$002509Subject$002509Networking.$002509Networking.$0026ps$003d300? 2026-02-23T23:01:43Z Deep learning for intrusion detection : techniques and applications ent://SD_ILS/0/SD_ILS:600319 2026-02-23T23:01:43Z 2026-02-23T23:01:43Z Author&#160;Masoodi, Faheem Syeed, editor.&#160;Bamhdi, Alwi, editor.<br/>Preferred Shelf Number&#160;TK5105.59 .D44 2026<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394285198">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394285198</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Artificial Intelligence for Future Networks. ent://SD_ILS/0/SD_ILS:599611 2026-02-23T23:01:43Z 2026-02-23T23:01:43Z Author&#160;Matin, Mohammad A.&#160;Goudos, Sotirios K.&#160;Karagiannidis, George K.<br/>Preferred Shelf Number&#160;TK5103.25<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394227952">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394227952</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> The cybersecurity guide to governance, risk, and compliance ent://SD_ILS/0/SD_ILS:598945 2026-02-23T23:01:43Z 2026-02-23T23:01:43Z Author&#160;Edwards, Jason (Cybersecurity expert), author.&#160;Weaver, Griffin, author.<br/>Preferred Shelf Number&#160;HD30.38 .E34 2024<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394250226">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394250226</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security and privacy vision in 6G : a comprehensive guide ent://SD_ILS/0/SD_ILS:598347 2026-02-23T23:01:43Z 2026-02-23T23:01:43Z Author&#160;Porambage, Pawani, author.&#160;Liyanage, Madhusanka, author.<br/>Preferred Shelf Number&#160;TK5103.252 .P67 2023<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119875437">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119875437</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Technologies and African societies in pandemic times : using technology to survive and thrive during the Covid-19 era ent://SD_ILS/0/SD_ILS:598489 2026-02-23T23:01:43Z 2026-02-23T23:01:43Z Preferred Shelf Number&#160;T28 .A1 T43 2023<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394225903">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394225903</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Systems engineering neural networks ent://SD_ILS/0/SD_ILS:598111 2026-02-23T23:01:43Z 2026-02-23T23:01:43Z Author&#160;Migliaccio, Alessandro, author.&#160;Iannone, Giovanni, author.<br/>Preferred Shelf Number&#160;QA76.87 .M537 2023<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119902027">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119902027</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Transformational security awareness : what neuroscientists, storytellers, and marketers can teach us about driving secure behaviors ent://SD_ILS/0/SD_ILS:595304 2026-02-23T23:01:43Z 2026-02-23T23:01:43Z Author&#160;Carpenter, Perry, author.<br/>Preferred Shelf Number&#160;QA76.9 .A25 C37 2019 EB<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119566380">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119566380</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cybersecurity program development for business : the essential planning guide ent://SD_ILS/0/SD_ILS:594455 2026-02-23T23:01:43Z 2026-02-23T23:01:43Z Author&#160;Moschovitis, Christos J. P., author.<br/>Preferred Shelf Number&#160;HD30.2<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119430018">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119430018</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Network forensics ent://SD_ILS/0/SD_ILS:593814 2026-02-23T23:01:43Z 2026-02-23T23:01:43Z Author&#160;Messier, Ric, author.<br/>Preferred Shelf Number&#160;TK5105.59<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119329190">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119329190</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/>