Arama Sonuçları Computer Networks. - Daraltılmış: Networking.
SirsiDynix Enterprise
https://katalog.hacettepe.edu.tr/client/tr_TR/default_tr/default_tr/qu$003dComputer$002bNetworks.$0026qf$003dSUBJECT$002509Konu$002509Networking.$002509Networking.$0026ps$003d300$0026isd$003dtrue?
2026-01-22T09:57:16Z
Network coding for engineers
ent://SD_ILS/0/SD_ILS:599745
2026-01-22T09:57:16Z
2026-01-22T09:57:16Z
Yazar Médard, Muriel, author. Vasudevan, Vipindev Adat, author. Pedersen, Morten Videbaek, author. Duffy, Ken R., author.<br/>Yer Numarası TK5102.92 .M43 2025<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394217304">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394217304</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Artificial Intelligence for Future Networks.
ent://SD_ILS/0/SD_ILS:599611
2026-01-22T09:57:16Z
2026-01-22T09:57:16Z
Yazar Matin, Mohammad A. Goudos, Sotirios K. Karagiannidis, George K.<br/>Yer Numarası TK5103.25<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394227952">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394227952</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Design and evaluation of ad hoc routing protocol
ent://SD_ILS/0/SD_ILS:599444
2026-01-22T09:57:16Z
2026-01-22T09:57:16Z
Yazar Wahl, Martine, author. Sondi, Patrick, author.<br/>Yer Numarası TK5105.77 .W34 2024<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394325726">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394325726</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
The cybersecurity guide to governance, risk, and compliance
ent://SD_ILS/0/SD_ILS:598945
2026-01-22T09:57:16Z
2026-01-22T09:57:16Z
Yazar Edwards, Jason (Cybersecurity expert), author. Weaver, Griffin, author.<br/>Yer Numarası HD30.38 .E34 2024<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394250226">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394250226</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Distributed systems : theory and applications
ent://SD_ILS/0/SD_ILS:598053
2026-01-22T09:57:16Z
2026-01-22T09:57:16Z
Yazar Ghosh, Ratan K., author. Ghosh, Hiranmay, author.<br/>Yer Numarası QA76.9 .D5 G486 2023<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119825968">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119825968</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Systems engineering neural networks
ent://SD_ILS/0/SD_ILS:598111
2026-01-22T09:57:16Z
2026-01-22T09:57:16Z
Yazar Migliaccio, Alessandro, author. Iannone, Giovanni, author.<br/>Yer Numarası QA76.87 .M537 2023<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119902027">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119902027</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Deep reinforcement learning for wireless communications and networking : theory, applications and implementation
ent://SD_ILS/0/SD_ILS:598462
2026-01-22T09:57:16Z
2026-01-22T09:57:16Z
Yazar Hoang, Dinh Thai, 1986- author.<br/>Yer Numarası TK5103.2 .H63 2023<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119873747">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119873747</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Data exfiltration threats and prevention techniques : machine learning and memory-based data security
ent://SD_ILS/0/SD_ILS:598245
2026-01-22T09:57:16Z
2026-01-22T09:57:16Z
Yazar Tari, Zahir, 1961- author. Sohrabi, Nasrin, 1982- author. Samadi, Yasaman, 1993- author. Suaboot, Jakapan, 1984- author.<br/>Yer Numarası TK5105.59 .T365 2023<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119898900">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119898900</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Intelligent network management and control : intelligent security, multi-criteria optimization, cloud computing, Internet of Vehicles, intelligent radio
ent://SD_ILS/0/SD_ILS:596652
2026-01-22T09:57:16Z
2026-01-22T09:57:16Z
Yazar Benmammar, Badr.<br/>Yer Numarası TK5105.59<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119817840">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119817840</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Cloud technologies : an overview of cloud computing technologies for managers
ent://SD_ILS/0/SD_ILS:596324
2026-01-22T09:57:16Z
2026-01-22T09:57:16Z
Yazar McHaney, Roger, author.<br/>Yer Numarası QA76.585<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119769514">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119769514</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Applied incident response
ent://SD_ILS/0/SD_ILS:595744
2026-01-22T09:57:16Z
2026-01-22T09:57:16Z
Yazar Anson, Steve.<br/>Yer Numarası QA76.9 .A25<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119560302">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119560302</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Transformational security awareness : what neuroscientists, storytellers, and marketers can teach us about driving secure behaviors
ent://SD_ILS/0/SD_ILS:595304
2026-01-22T09:57:16Z
2026-01-22T09:57:16Z
Yazar Carpenter, Perry, author.<br/>Yer Numarası QA76.9 .A25 C37 2019 EB<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119566380">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119566380</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
AWS Certified Cloud Practitioner Study Guide : CLF-C01 Exam
ent://SD_ILS/0/SD_ILS:595333
2026-01-22T09:57:16Z
2026-01-22T09:57:16Z
Yazar Piper, Ben. Clinton, David.<br/>Yer Numarası QA76.3 .P57 2019<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119574408">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119574408</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Cybersecurity program development for business : the essential planning guide
ent://SD_ILS/0/SD_ILS:594455
2026-01-22T09:57:16Z
2026-01-22T09:57:16Z
Yazar Moschovitis, Christos J. P., author.<br/>Yer Numarası HD30.2<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119430018">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119430018</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Advanced penetration testing : hacking the world's most secure networks
ent://SD_ILS/0/SD_ILS:593439
2026-01-22T09:57:16Z
2026-01-22T09:57:16Z
Yazar Allsopp, Wil, author.<br/>Yer Numarası QA76.9 .A25<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119367741">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119367741</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Content delivery networks : fundamentals, design, and evolution
ent://SD_ILS/0/SD_ILS:593580
2026-01-22T09:57:16Z
2026-01-22T09:57:16Z
Yazar Robinson, Dom, author.<br/>Yer Numarası TK5105.5<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119249924">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119249924</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Network forensics
ent://SD_ILS/0/SD_ILS:593814
2026-01-22T09:57:16Z
2026-01-22T09:57:16Z
Yazar Messier, Ric, author.<br/>Yer Numarası TK5105.59<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119329190">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119329190</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>