Search Results for Video. - Narrowed by: Computer security.
SirsiDynix Enterprise
https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dVideo.$0026qf$003dSUBJECT$002509Subject$002509Computer$002bsecurity.$002509Computer$002bsecurity.$0026ps$003d300?
2026-02-22T13:11:13Z
Image and Video Technology PSIVT 2017 International Workshops, Wuhan, China, November 20-24, 2017, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:401455
2026-02-22T13:11:13Z
2026-02-22T13:11:13Z
Author Satoh, Shin'ichi. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-92753-4">https://doi.org/10.1007/978-3-319-92753-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Generative AI, cybersecurity, and ethics
ent://SD_ILS/0/SD_ILS:599597
2026-02-22T13:11:13Z
2026-02-22T13:11:13Z
Author Islam, Ray (Mohammad Rubyet), author.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394279326">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394279326</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Next-generation systems and secure computing
ent://SD_ILS/0/SD_ILS:599779
2026-02-22T13:11:13Z
2026-02-22T13:11:13Z
Author Barman, Subhabrata, editor. Koley, Santanu, editor. Joardar, Subhankar, editor.<br/>Preferred Shelf Number QA76.9 .A25 N49 2025<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394228522">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394228522</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Quantum computing models for cybersecurity and wireless communications
ent://SD_ILS/0/SD_ILS:599707
2026-02-22T13:11:13Z
2026-02-22T13:11:13Z
Author Kumar, Budati Anil, edited. Kumar, Singamaneni Kranthi, edited. Li, Xingwang (Computer scientist), edited.<br/>Preferred Shelf Number QA76.9 .A25 Q36 2025<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394271429">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394271429</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cyber defense : best practices for digital safety
ent://SD_ILS/0/SD_ILS:600003
2026-02-22T13:11:13Z
2026-02-22T13:11:13Z
Author Edwards, Jason, author.<br/>Preferred Shelf Number QA76.9 .A25 E39 2025<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394337040">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394337040</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cybersecurity essentials
ent://SD_ILS/0/SD_ILS:594756
2026-02-22T13:11:13Z
2026-02-22T13:11:13Z
Author Brooks, Charles J., author. Grow, Christopher, author. Craig, Philip, author. Short, Donald, author.<br/>Preferred Shelf Number TK5105.59<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119369141">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119369141</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Discrete dynamical systems and chaotic machines : theory and applications
ent://SD_ILS/0/SD_ILS:545715
2026-02-22T13:11:13Z
2026-02-22T13:11:13Z
Author Bahi, Jacques Mohcine., author. Guyeux, Christophe.<br/>Preferred Shelf Number QA76.9 .A25 B344 2013<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781466554511">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>
The complete guide to physical security
ent://SD_ILS/0/SD_ILS:545960
2026-02-22T13:11:13Z
2026-02-22T13:11:13Z
Author Baker, Paul, 1958, author. Benny, Daniel J.<br/>Preferred Shelf Number HV8290 .B34 2013<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781420099645">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>