Arama Sonuçları Security systems - Daraltılmış: Networking.
SirsiDynix Enterprise
https://katalog.hacettepe.edu.tr/client/tr_TR/default_tr/default_tr/qu$003dSecurity$002bsystems$0026qf$003dSUBJECT$002509Konu$002509Networking.$002509Networking.$0026ps$003d300$0026isd$003dtrue?
2026-01-21T12:27:54Z
Deep learning for intrusion detection : techniques and applications
ent://SD_ILS/0/SD_ILS:600319
2026-01-21T12:27:54Z
2026-01-21T12:27:54Z
Yazar Masoodi, Faheem Syeed, editor. Bamhdi, Alwi, editor.<br/>Yer Numarası TK5105.59 .D44 2026<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394285198">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394285198</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Preventing bluetooth and wireless attacks in IoMT healthcare systems
ent://SD_ILS/0/SD_ILS:600016
2026-01-21T12:27:54Z
2026-01-21T12:27:54Z
Yazar Chirillo, John, 1970- author.<br/>Yer Numarası R859.7 .S43 C45 2025<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394352401">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394352401</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
The DevSecOps playbook : deliver continuous security at speed
ent://SD_ILS/0/SD_ILS:598634
2026-01-21T12:27:54Z
2026-01-21T12:27:54Z
Yazar Mack, Sean D., author.<br/>Yer Numarası QA76.9 .A25 M33 2024<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394189281">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394189281</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Security and Privacy for 6G Massive IoT.
ent://SD_ILS/0/SD_ILS:599629
2026-01-21T12:27:54Z
2026-01-21T12:27:54Z
Yazar Mantas, Georgios. Saghezchi, Firooz. Rodriguez, Jonathan. Sucasas, Victor.<br/>Yer Numarası TK5103.252<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119988007">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119988007</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Practical cyber intelligence : a hands-on guide to digital forensics
ent://SD_ILS/0/SD_ILS:599262
2026-01-21T12:27:54Z
2026-01-21T12:27:54Z
Yazar Jakobsen, Adam Tilmar, author.<br/>Yer Numarası HV8079 .C65 J633 2024<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394256129">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394256129</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Cyber Operations : A Case Study Approach
ent://SD_ILS/0/SD_ILS:599117
2026-01-21T12:27:54Z
2026-01-21T12:27:54Z
Yazar Couretas, Jerry M., 1966- author.<br/>Yer Numarası QA76.9 .A25<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119712121">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119712121</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Cryptography : algorithms, protocols, and standards for computer security
ent://SD_ILS/0/SD_ILS:598914
2026-01-21T12:27:54Z
2026-01-21T12:27:54Z
Yazar Mammeri, Zoubir, author.<br/>Yer Numarası QA268 .M34 2024<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394207510">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394207510</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Effective vulnerability management : managing risk in the vulnerable digital ecosystem
ent://SD_ILS/0/SD_ILS:599047
2026-01-21T12:27:54Z
2026-01-21T12:27:54Z
Yazar Hughes, Chris (Christopher Matthew), author. Robinson, Nikki, author.<br/>Yer Numarası QA76.9 .A25 H84 2024<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394277155">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394277155</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Deep reinforcement learning for wireless communications and networking : theory, applications and implementation
ent://SD_ILS/0/SD_ILS:598462
2026-01-21T12:27:54Z
2026-01-21T12:27:54Z
Yazar Hoang, Dinh Thai, 1986- author.<br/>Yer Numarası TK5103.2 .H63 2023<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119873747">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119873747</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Security and privacy vision in 6G : a comprehensive guide
ent://SD_ILS/0/SD_ILS:598347
2026-01-21T12:27:54Z
2026-01-21T12:27:54Z
Yazar Porambage, Pawani, author. Liyanage, Madhusanka, author.<br/>Yer Numarası TK5103.252 .P67 2023<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119875437">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119875437</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Cloud technologies : an overview of cloud computing technologies for managers
ent://SD_ILS/0/SD_ILS:596324
2026-01-21T12:27:54Z
2026-01-21T12:27:54Z
Yazar McHaney, Roger, author.<br/>Yer Numarası QA76.585<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119769514">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119769514</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Applied incident response
ent://SD_ILS/0/SD_ILS:595744
2026-01-21T12:27:54Z
2026-01-21T12:27:54Z
Yazar Anson, Steve.<br/>Yer Numarası QA76.9 .A25<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119560302">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119560302</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Security, privacy and digital forensics in the cloud
ent://SD_ILS/0/SD_ILS:594934
2026-01-21T12:27:54Z
2026-01-21T12:27:54Z
Yazar Chen, Lei, 1978 July 28- editor. Takabi, Hassan, 1982- editor. Le-Khac, Nhien-An, 1972- editor.<br/>Yer Numarası QA76.585 .S43 2019<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119053385">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119053385</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Cloud computing and virtualization
ent://SD_ILS/0/SD_ILS:594386
2026-01-21T12:27:54Z
2026-01-21T12:27:54Z
Yazar Le, Dac-Nhuong, 1983- editor. Kumar, Raghvendra, 1987- editor. Nguyen, Nhu Gia, editor. Chatterjee, Jyotir Moy, editor.<br/>Yer Numarası QA76.9 .V5<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119488149">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119488149</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Network forensics
ent://SD_ILS/0/SD_ILS:593814
2026-01-21T12:27:54Z
2026-01-21T12:27:54Z
Yazar Messier, Ric, author.<br/>Yer Numarası TK5105.59<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119329190">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119329190</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Wireshark for security professionals : using Wireshark and the Metasploit Framework
ent://SD_ILS/0/SD_ILS:593472
2026-01-21T12:27:54Z
2026-01-21T12:27:54Z
Yazar Bullock, Jessey, author. Gordon, Adam, author.<br/>Yer Numarası QA76.9 .A25<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119183457">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119183457</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>