Search Results for Wireless. - Narrowed by: Computer security.
SirsiDynix Enterprise
https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dWireless.$0026qf$003dSUBJECT$002509Subject$002509Computer$002bsecurity.$002509Computer$002bsecurity.$0026ps$003d300$0026isd$003dtrue?
2025-12-16T18:12:26Z
Wireless operational security
ent://SD_ILS/0/SD_ILS:254059
2025-12-16T18:12:26Z
2025-12-16T18:12:26Z
Author Rittinghouse, John W. Ransome, James F.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781555583170">http://www.sciencedirect.com/science/book/9781555583170</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
WarDriving & wireless penetration testing
ent://SD_ILS/0/SD_ILS:146805
2025-12-16T18:12:26Z
2025-12-16T18:12:26Z
Author Hurley, Chris.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491112">http://www.sciencedirect.com/science/book/9781597491112</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
WarDriving & wireless penetration testing
ent://SD_ILS/0/SD_ILS:112210
2025-12-16T18:12:26Z
2025-12-16T18:12:26Z
Author Hurley, Chris. ScienceDirect (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491112">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Physical Layer Security in Wireless Cooperative Networks
ent://SD_ILS/0/SD_ILS:398980
2025-12-16T18:12:26Z
2025-12-16T18:12:26Z
Author Wang, Li. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-61863-0">https://doi.org/10.1007/978-3-319-61863-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Seven deadliest wireless technologies attacks
ent://SD_ILS/0/SD_ILS:149033
2025-12-16T18:12:26Z
2025-12-16T18:12:26Z
Author Haines, Brad.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495417">http://www.sciencedirect.com/science/book/9781597495417</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Hacking exposed wireless wireless security secrets & solutions
ent://SD_ILS/0/SD_ILS:293300
2025-12-16T18:12:26Z
2025-12-16T18:12:26Z
Author Cache, Johnny. Wright, Joshua. Liu, Vincent.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://mhebooklibrary.com/reader/hacking-exposed-wireless-second-edition">Subscription required</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
WarDriving drive, detect, defend : a guide to wireless security
ent://SD_ILS/0/SD_ILS:253988
2025-12-16T18:12:26Z
2025-12-16T18:12:26Z
Author Hurley, Chris.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836036">http://www.sciencedirect.com/science/book/9781931836036</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Wireless Algorithms, Systems, and Applications 14th International Conference, WASA 2019, Honolulu, HI, USA, June 24–26, 2019, Proceedings
ent://SD_ILS/0/SD_ILS:483667
2025-12-16T18:12:26Z
2025-12-16T18:12:26Z
Author Biagioni, Edoardo S. editor. Zheng, Yao. editor. Cheng, Siyao. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-23597-0">https://doi.org/10.1007/978-3-030-23597-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Wireless Communications under Hostile Jamming: Security and Efficiency
ent://SD_ILS/0/SD_ILS:399157
2025-12-16T18:12:26Z
2025-12-16T18:12:26Z
Author Li, Tongtong. author. Song, Tianlong. author. Liang, Yuan. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-981-13-0821-5">https://doi.org/10.1007/978-981-13-0821-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Ad-hoc, Mobile, and Wireless Networks 17th International Conference on Ad Hoc Networks and Wireless, ADHOC-NOW 2018, Saint-Malo, France, September 5-7, 2018. Proceedings
ent://SD_ILS/0/SD_ILS:399919
2025-12-16T18:12:26Z
2025-12-16T18:12:26Z
Author Montavont, Nicolas. editor. Papadopoulos, Georgios Z. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-00247-3">https://doi.org/10.1007/978-3-030-00247-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Wireless Algorithms, Systems, and Applications 13th International Conference, WASA 2018, Tianjin, China, June 20-22, 2018, Proceedings
ent://SD_ILS/0/SD_ILS:401531
2025-12-16T18:12:26Z
2025-12-16T18:12:26Z
Author Chellappan, Sriram. editor. Cheng, Wei. editor. Li, Wei. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-94268-1">https://doi.org/10.1007/978-3-319-94268-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Pervasive Wireless Environments: Detecting and Localizing User Spoofing
ent://SD_ILS/0/SD_ILS:488438
2025-12-16T18:12:26Z
2025-12-16T18:12:26Z
Author Yang, Jie. author. Chen, Yingying. author. Trappe, Wade. author. Cheng, Jerry. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-07356-9">https://doi.org/10.1007/978-3-319-07356-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Wired/Wireless Internet Communications 12th International Conference, WWIC 2014, Paris, France, May 26-28, 2014, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:485784
2025-12-16T18:12:26Z
2025-12-16T18:12:26Z
Author Mellouk, Abdelhamid. editor. Fowler, Scott. editor. Daachi, Boubaker. editor. Hoceini, Said. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-13174-0">https://doi.org/10.1007/978-3-319-13174-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security for wireless sensor networks using identity-based cryptography
ent://SD_ILS/0/SD_ILS:544612
2025-12-16T18:12:26Z
2025-12-16T18:12:26Z
Author Patil, Harsh Kupwade., author. Szygenda, Stephen A.<br/>Preferred Shelf Number QA76.9 .A25 P38 2013<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781439869024">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>
Security in wireless ad hoc and sensor networks
ent://SD_ILS/0/SD_ILS:297789
2025-12-16T18:12:26Z
2025-12-16T18:12:26Z
Author Çayirci, E. (Erdal) Levi, Albert, 1969- Wiley InterScience (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access John Wiley <a href="http://dx.doi.org/10.1002/9780470516782">http://dx.doi.org/10.1002/9780470516782</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Essential computer security everyone's guide to e-mail, Internet, and wireless security
ent://SD_ILS/0/SD_ILS:145840
2025-12-16T18:12:26Z
2025-12-16T18:12:26Z
Author Bradley, Tony, 1969- Carvey, Harlan A.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491143">http://www.sciencedirect.com/science/book/9781597491143</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security in fixed and wireless networks an introduction to securing data communications
ent://SD_ILS/0/SD_ILS:301122
2025-12-16T18:12:26Z
2025-12-16T18:12:26Z
Author Schäfer, Günter, Dr.-Ing. John Wiley & Sons.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access John Wiley <a href="http://dx.doi.org/10.1002/0470863722">http://dx.doi.org/10.1002/0470863722</a>
<a href="http://www3.interscience.wiley.com/cgi-bin/bookhome/112477198">http://www3.interscience.wiley.com/cgi-bin/bookhome/112477198</a>
Contributor biographical information <a href="http://catdir.loc.gov/catdir/bios/wiley047/2004299184.html">http://catdir.loc.gov/catdir/bios/wiley047/2004299184.html</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Network Intrusion Detection using Deep Learning A Feature Learning Approach
ent://SD_ILS/0/SD_ILS:399859
2025-12-16T18:12:26Z
2025-12-16T18:12:26Z
Author Kim, Kwangjo. author. Aminanto, Muhamad Erza. author. Tanuwidjaja, Harry Chandra. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-981-13-1444-5">https://doi.org/10.1007/978-981-13-1444-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Handbook of Mobile Data Privacy
ent://SD_ILS/0/SD_ILS:399883
2025-12-16T18:12:26Z
2025-12-16T18:12:26Z
Author Gkoulalas-Divanis, Aris. editor. Bettini, Claudio. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-98161-1">https://doi.org/10.1007/978-3-319-98161-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
The state of the art in intrusion prevention and detection
ent://SD_ILS/0/SD_ILS:543676
2025-12-16T18:12:26Z
2025-12-16T18:12:26Z
Author Pathan, Al-Sakib Khan, editor.<br/>Preferred Shelf Number QA76.9 .A25 S7354 2014<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781482203523">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>
Violent Python a cookbook for hackers, forensic analysts, penetration testers and security engineers
ent://SD_ILS/0/SD_ILS:146917
2025-12-16T18:12:26Z
2025-12-16T18:12:26Z
Author O'Connor, T. J.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597499576">http://www.sciencedirect.com/science/book/9781597499576</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Discrete dynamical systems and chaotic machines : theory and applications
ent://SD_ILS/0/SD_ILS:545715
2025-12-16T18:12:26Z
2025-12-16T18:12:26Z
Author Bahi, Jacques Mohcine., author. Guyeux, Christophe.<br/>Preferred Shelf Number QA76.9 .A25 B344 2013<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781466554511">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>
Machine learning forensics for law enforcement, security, and intelligence
ent://SD_ILS/0/SD_ILS:544765
2025-12-16T18:12:26Z
2025-12-16T18:12:26Z
Author Mena, Jesus., author.<br/>Preferred Shelf Number HV8073 .M395 2011<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781439860700">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>
Honeypot : a new paradigm to information security
ent://SD_ILS/0/SD_ILS:545590
2025-12-16T18:12:26Z
2025-12-16T18:12:26Z
Author Joshi, R. C., author. Sardana, Anjali.<br/>Preferred Shelf Number QA76.9 .A25 J66 2011<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781439869994">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>
Security in Distributed, Grid, Mobile, and Pervasive Computing.
ent://SD_ILS/0/SD_ILS:544847
2025-12-16T18:12:26Z
2025-12-16T18:12:26Z
Preferred Shelf Number QA76.9<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9780429119347">https://www.taylorfrancis.com/books/9780429119347</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Database and applications security : integrating information security and data management
ent://SD_ILS/0/SD_ILS:540220
2025-12-16T18:12:26Z
2025-12-16T18:12:26Z
Author Thuraisingham, Bhavani M., author.<br/>Preferred Shelf Number QA76.9 .D314 T47 2005<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9780203486061">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>
UMTS security
ent://SD_ILS/0/SD_ILS:295861
2025-12-16T18:12:26Z
2025-12-16T18:12:26Z
Author Niemi, Valtteri. Nyberg, Kaisa, 1948-<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://www.contentreserve.com/TitleInfo.asp?ID={465C10B2-1465-4D2B-AAAD-DED651D62D3D}&Format=50">Click for information</a>
Wiley InterScience - Full text online <a href="http://onlinelibrary.wiley.com/book/10.1002/0470091584">http://onlinelibrary.wiley.com/book/10.1002/0470091584</a>
John Wiley <a href="http://dx.doi.org/10.1002/0470091584">http://dx.doi.org/10.1002/0470091584</a>
HathiTrust Digital Library, Limited view (search only) <a href="http://catalog.hathitrust.org/api/volumes/oclc/53183293.html">http://catalog.hathitrust.org/api/volumes/oclc/53183293.html</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>