Arama Sonu&ccedil;lar&#305; Landscape - Daralt&#305;lm&#305;&#351;: Networking. SirsiDynix Enterprise https://katalog.hacettepe.edu.tr/client/tr_TR/default_tr/default_tr/qu$003dLandscape$0026qf$003dSUBJECT$002509Subject$002509Networking.$002509Networking.$0026ic$003dtrue$0026ps$003d300? 2026-02-26T22:54:24Z Deep learning for intrusion detection : techniques and applications ent://SD_ILS/0/SD_ILS:600319 2026-02-26T22:54:24Z 2026-02-26T22:54:24Z Yazar&#160;Masoodi, Faheem Syeed, editor.&#160;Bamhdi, Alwi, editor.<br/>Yer Numaras&#305;&#160;TK5105.59 .D44 2026<br/>Elektronik Eri&#351;im&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394285198">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394285198</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Cryptography : algorithms, protocols, and standards for computer security ent://SD_ILS/0/SD_ILS:598914 2026-02-26T22:54:24Z 2026-02-26T22:54:24Z Yazar&#160;Mammeri, Zoubir, author.<br/>Yer Numaras&#305;&#160;QA268 .M34 2024<br/>Elektronik Eri&#351;im&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394207510">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394207510</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> The cybersecurity guide to governance, risk, and compliance ent://SD_ILS/0/SD_ILS:598945 2026-02-26T22:54:24Z 2026-02-26T22:54:24Z Yazar&#160;Edwards, Jason (Cybersecurity expert), author.&#160;Weaver, Griffin, author.<br/>Yer Numaras&#305;&#160;HD30.38 .E34 2024<br/>Elektronik Eri&#351;im&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394250226">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394250226</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Security and Privacy for 6G Massive IoT. ent://SD_ILS/0/SD_ILS:599629 2026-02-26T22:54:24Z 2026-02-26T22:54:24Z Yazar&#160;Mantas, Georgios.&#160;Saghezchi, Firooz.&#160;Rodriguez, Jonathan.&#160;Sucasas, Victor.<br/>Yer Numaras&#305;&#160;TK5103.252<br/>Elektronik Eri&#351;im&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119988007">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119988007</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Cyber threat intelligence ent://SD_ILS/0/SD_ILS:598051 2026-02-26T22:54:24Z 2026-02-26T22:54:24Z Yazar&#160;Lee, Martin (Computer security expert), author.<br/>Yer Numaras&#305;&#160;TK5105.59 .L47 2023<br/>Elektronik Eri&#351;im&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119861775">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119861775</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Security and privacy vision in 6G : a comprehensive guide ent://SD_ILS/0/SD_ILS:598347 2026-02-26T22:54:24Z 2026-02-26T22:54:24Z Yazar&#160;Porambage, Pawani, author.&#160;Liyanage, Madhusanka, author.<br/>Yer Numaras&#305;&#160;TK5103.252 .P67 2023<br/>Elektronik Eri&#351;im&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119875437">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119875437</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Applied incident response ent://SD_ILS/0/SD_ILS:595744 2026-02-26T22:54:24Z 2026-02-26T22:54:24Z Yazar&#160;Anson, Steve.<br/>Yer Numaras&#305;&#160;QA76.9 .A25<br/>Elektronik Eri&#351;im&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119560302">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119560302</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/>