Search Results for computing. - Narrowed by: S&eacute;curit&eacute; informatique. SirsiDynix Enterprise https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dcomputing.$0026qf$003dSUBJECT$002509Subject$002509S$0025C3$0025A9curit$0025C3$0025A9$002binformatique.$002509S$0025C3$0025A9curit$0025C3$0025A9$002binformatique.$0026ic$003dtrue$0026ps$003d300? 2026-01-24T21:47:45Z Quantum computing in cybersecurity ent://SD_ILS/0/SD_ILS:598685 2026-01-24T21:47:45Z 2026-01-24T21:47:45Z Author&#160;Rawat, Romil, editor.<br/>Preferred Shelf Number&#160;QA76.9 .A25 Q83 2023<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394167401">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394167401</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Next-generation systems and secure computing ent://SD_ILS/0/SD_ILS:599779 2026-01-24T21:47:45Z 2026-01-24T21:47:45Z Author&#160;Barman, Subhabrata, editor.&#160;Koley, Santanu, editor.&#160;Joardar, Subhankar, editor.<br/>Preferred Shelf Number&#160;QA76.9 .A25 N49 2025<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394228522">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394228522</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Automated secure computing for next-generation systems ent://SD_ILS/0/SD_ILS:598752 2026-01-24T21:47:45Z 2026-01-24T21:47:45Z Author&#160;Tyagi, Amit Kumar, editor.<br/>Preferred Shelf Number&#160;QA76.9 .A25 A98 2024<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394213948">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394213948</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Inside cyber : how AI, 5G, IoT, and quantum computing will transform privacy and our security ent://SD_ILS/0/SD_ILS:599222 2026-01-24T21:47:45Z 2026-01-24T21:47:45Z Author&#160;Brooks, Chuck (Writer of Inside cyber), author.<br/>Preferred Shelf Number&#160;HC79 .T4 B735 2025<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394310562">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394310562</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Quantum computing models for cybersecurity and wireless communications ent://SD_ILS/0/SD_ILS:599707 2026-01-24T21:47:45Z 2026-01-24T21:47:45Z Author&#160;Kumar, Budati Anil, edited.&#160;Kumar, Singamaneni Kranthi, edited.&#160;Li, Xingwang (Computer scientist), edited.<br/>Preferred Shelf Number&#160;QA76.9 .A25 Q36 2025<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394271429">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394271429</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cyber security in parallel and distributed computing : concepts, techniques, applications and case studies ent://SD_ILS/0/SD_ILS:595099 2026-01-24T21:47:45Z 2026-01-24T21:47:45Z Author&#160;Le, Dac-Nhuong, 1983- editor.&#160;Kumar, Raghvendra, 1987- editor.&#160;Mishra, Brojo Kishore, 1979- editor.&#160;Khari, Manju, editor.&#160;Chatterjee, Jyotir Moy, editor.<br/>Preferred Shelf Number&#160;QA76.9 .A25<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119488330">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119488330</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cyber-vigilance and digital trust : cyber security in the era of cloud computing and IoT ent://SD_ILS/0/SD_ILS:595279 2026-01-24T21:47:45Z 2026-01-24T21:47:45Z Author&#160;Tounsi, Wiem, editor.<br/>Preferred Shelf Number&#160;QA76.9 .A25 C93 2019 EB<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119618393">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119618393</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Digital twins and cybersecurity : safeguarding the future of connected systems ent://SD_ILS/0/SD_ILS:599615 2026-01-24T21:47:45Z 2026-01-24T21:47:45Z Author&#160;Naveen, Palanichamy, author.&#160;Maheswar, R., author.&#160;Ragupathy, U.S., author.<br/>Preferred Shelf Number&#160;QA76.9 .C65 N38 2025<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394272501">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394272501</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cybercrime during the SARS-CoV-2 pandemic (2019-2022) ent://SD_ILS/0/SD_ILS:598517 2026-01-24T21:47:45Z 2026-01-24T21:47:45Z Author&#160;Ventre, Daniel, editor.&#160;Loiseau, Hugo, 1974- editor.<br/>Preferred Shelf Number&#160;HV6773 .C93 2023<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394226344">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394226344</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cybersecurity and decision makers : data security and digital trust ent://SD_ILS/0/SD_ILS:595943 2026-01-24T21:47:45Z 2026-01-24T21:47:45Z Author&#160;Fr&eacute;minville, Marie de, author.<br/>Preferred Shelf Number&#160;HF5548.37 .F74 2020<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119720362">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119720362</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Artificial intelligence, cybersecurity and cyber defense ent://SD_ILS/0/SD_ILS:596423 2026-01-24T21:47:45Z 2026-01-24T21:47:45Z Author&#160;Ventre, Daniel, author.<br/>Preferred Shelf Number&#160;Q335 .V46 2020 EB<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119788195">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119788195</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Protection of electrical power distribution systems : smart grid, microgrid, AI, and cyber security ent://SD_ILS/0/SD_ILS:600371 2026-01-24T21:47:45Z 2026-01-24T21:47:45Z Author&#160;Masood, Tariq, author.&#160;Abdo, Jamil, author.&#160;Iqbal, Atif, author.<br/>Preferred Shelf Number&#160;TK3001 .M37 2026<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394327676">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394327676</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Generative AI, cybersecurity, and ethics ent://SD_ILS/0/SD_ILS:599597 2026-01-24T21:47:45Z 2026-01-24T21:47:45Z Author&#160;Islam, Ray (Mohammad Rubyet), author.<br/>Preferred Shelf Number&#160;QA76.9 .A25<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394279326">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394279326</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Realizing the Metaverse : a communications and networking perspective ent://SD_ILS/0/SD_ILS:599057 2026-01-24T21:47:45Z 2026-01-24T21:47:45Z Author&#160;Lim, Wei Yang Bryan, editor.&#160;Xiong, Zehui, editor.&#160;Niyato, Dusit, editor.&#160;Zhang, Junshan (Electrical engineer), editor.&#160;Shen, X. (Xuemin), 1958- editor.<br/>Preferred Shelf Number&#160;TK5105.8864 .R43 2024<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394188932">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394188932</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cyber security and digital forensics ent://SD_ILS/0/SD_ILS:597326 2026-01-24T21:47:45Z 2026-01-24T21:47:45Z Author&#160;Ghonge, Mangesh, 1984- editor.<br/>Preferred Shelf Number&#160;QA76.9 .A25<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119795667">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119795667</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cybersecurity in smart homes : architectures, solutions and technologies ent://SD_ILS/0/SD_ILS:597626 2026-01-24T21:47:45Z 2026-01-24T21:47:45Z Author&#160;Khatoun, Rida, author.<br/>Preferred Shelf Number&#160;QA76.9 .A25<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119987451">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119987451</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Trust in computer systems and the cloud ent://SD_ILS/0/SD_ILS:597142 2026-01-24T21:47:45Z 2026-01-24T21:47:45Z Author&#160;Bursell, Mike, author.<br/>Preferred Shelf Number&#160;QA76.9 .A25<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119695158">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119695158</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cyber security and network security ent://SD_ILS/0/SD_ILS:597484 2026-01-24T21:47:45Z 2026-01-24T21:47:45Z Author&#160;Pramanik, Sabyasachi, editor.&#160;Samanta, Debabrata, 1987- editor.&#160;Vinay, M., editor.&#160;Guha, Abhijit, editor.<br/>Preferred Shelf Number&#160;QA76.9 .A25<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119812555">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119812555</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer science security : concepts and tools ent://SD_ILS/0/SD_ILS:597739 2026-01-24T21:47:45Z 2026-01-24T21:47:45Z Author&#160;Zaidoun, Ameur Salem, author.<br/>Preferred Shelf Number&#160;QA76.9 .A25 Z35 2022<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394163847">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394163847</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Trust-based communication systems for internet of things applications ent://SD_ILS/0/SD_ILS:597744 2026-01-24T21:47:45Z 2026-01-24T21:47:45Z Author&#160;Madaan, Vishu, editor.&#160;Agrawal, Prateek, editor.&#160;Sharma, Anand, editor.&#160;Sharma, Dilip Kumar, editor.&#160;Agrawal, Akshat, 1986- editor.<br/>Preferred Shelf Number&#160;TK5105.8857<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119896746">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119896746</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> VMware&reg; Certified Professional Data Center Virtualization on vSphere 6.7 Exam 2V0-21.19 : study guide ent://SD_ILS/0/SD_ILS:596289 2026-01-24T21:47:45Z 2026-01-24T21:47:45Z Author&#160;Hall, Jon, 1963- author.&#160;Andrews, Joshua, author.<br/>Preferred Shelf Number&#160;QA76.9 .V5<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119539698">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119539698</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security issues and privacy concerns in Industry 4.0 applications ent://SD_ILS/0/SD_ILS:596945 2026-01-24T21:47:45Z 2026-01-24T21:47:45Z Author&#160;David, Shiblin, author.&#160;Anand, R. S., author.&#160;Jeyakrishnan, V., author.&#160;Niranjanamurthy, M., author.<br/>Preferred Shelf Number&#160;QA76.9 .A25 D38 2021<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119776529">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119776529</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Artificial intelligence and data mining approaches in security frameworks ent://SD_ILS/0/SD_ILS:596957 2026-01-24T21:47:45Z 2026-01-24T21:47:45Z Author&#160;Bhargava, Neeraj.&#160;Bhargava, Ritu.&#160;Rathore, Pramod Singh, 1988-&#160;Agrawal, Rashmi, 1978-<br/>Preferred Shelf Number&#160;Q335<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119760429">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119760429</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> The Digital Big Bang : the Hard Stuff, the Soft Stuff, and the Future of Cybersecurity ent://SD_ILS/0/SD_ILS:595435 2026-01-24T21:47:45Z 2026-01-24T21:47:45Z Author&#160;Quade, Phil.<br/>Preferred Shelf Number&#160;QA76.9 .A25<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119617396">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119617396</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cybersecurity essentials ent://SD_ILS/0/SD_ILS:594756 2026-01-24T21:47:45Z 2026-01-24T21:47:45Z Author&#160;Brooks, Charles J., author.&#160;Grow, Christopher, author.&#160;Craig, Philip, author.&#160;Short, Donald, author.<br/>Preferred Shelf Number&#160;TK5105.59<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119369141">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119369141</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/>