Arama Sonuçları Students. - Daraltılmış: Security.
SirsiDynix Enterprise
https://katalog.hacettepe.edu.tr/client/tr_TR/default_tr/default_tr/qu$003dStudents.$0026qf$003dSUBJECT$002509Konu$002509Security.$002509Security.$0026ps$003d300$0026isd$003dtrue?
2026-02-13T06:35:17Z
Zero Trust Security A Hands-on Guide
ent://SD_ILS/0/SD_ILS:600392
2026-02-13T06:35:17Z
2026-02-13T06:35:17Z
Yazar Jakobsen, Adam Tilmar.<br/>Yer Numarası XX(600392.1)<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394361120">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394361120</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Safeguarding satellite communications : issues, challenges, and solutions
ent://SD_ILS/0/SD_ILS:600245
2026-02-13T06:35:17Z
2026-02-13T06:35:17Z
Yazar An, Jianpin, author.<br/>Yer Numarası TK5104 .A53 2026<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394304325">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394304325</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Embedded cryptography. 1
ent://SD_ILS/0/SD_ILS:599697
2026-02-13T06:35:17Z
2026-02-13T06:35:17Z
Yazar Prouff, Emmanuel, editor. Renault, Guenael. Rivain, Mattieu. O'Flynn, Colin.<br/>Yer Numarası QA76.9 .A25 E43 2025<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394351879">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394351879</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Embedded cryptography 2
ent://SD_ILS/0/SD_ILS:599724
2026-02-13T06:35:17Z
2026-02-13T06:35:17Z
Yazar Prouff, Emmanuel, editor. Renault, Guenael, editor. Rivain, Mattieu, editor. O'Flynn, Colin, editor.<br/>Yer Numarası QA76.9 .A25<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394351909">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394351909</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Cyber defense : best practices for digital safety
ent://SD_ILS/0/SD_ILS:600003
2026-02-13T06:35:17Z
2026-02-13T06:35:17Z
Yazar Edwards, Jason, author.<br/>Yer Numarası QA76.9 .A25 E39 2025<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394337040">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394337040</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Principles and applications of blockchain systems : how to overcome the CAP trilemma in consortium blockchain
ent://SD_ILS/0/SD_ILS:599650
2026-02-13T06:35:17Z
2026-02-13T06:35:17Z
Yazar Li, Hu, author. Wang, Han, author.<br/>Yer Numarası QA76.9 .B56 L5 2025<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394237258">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394237258</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Next generation data science and blockchain technology for Industry 5.0 : concepts and paradigms
ent://SD_ILS/0/SD_ILS:600050
2026-02-13T06:35:17Z
2026-02-13T06:35:17Z
Yazar Tyagi, Amit Kumar, editor.<br/>Yer Numarası T59.6 .N49 2025<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394245215">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394245215</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Cryptography : algorithms, protocols, and standards for computer security
ent://SD_ILS/0/SD_ILS:598914
2026-02-13T06:35:17Z
2026-02-13T06:35:17Z
Yazar Mammeri, Zoubir, author.<br/>Yer Numarası QA268 .M34 2024<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394207510">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394207510</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Data exfiltration threats and prevention techniques : machine learning and memory-based data security
ent://SD_ILS/0/SD_ILS:598245
2026-02-13T06:35:17Z
2026-02-13T06:35:17Z
Yazar Tari, Zahir, 1961- author. Sohrabi, Nasrin, 1982- author. Samadi, Yasaman, 1993- author. Suaboot, Jakapan, 1984- author.<br/>Yer Numarası TK5105.59 .T365 2023<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119898900">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119898900</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Technologies and African societies in pandemic times : using technology to survive and thrive during the Covid-19 era
ent://SD_ILS/0/SD_ILS:598489
2026-02-13T06:35:17Z
2026-02-13T06:35:17Z
Yer Numarası T28 .A1 T43 2023<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394225903">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394225903</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Cyber security and network security
ent://SD_ILS/0/SD_ILS:597484
2026-02-13T06:35:17Z
2026-02-13T06:35:17Z
Yazar Pramanik, Sabyasachi, editor. Samanta, Debabrata, 1987- editor. Vinay, M., editor. Guha, Abhijit, editor.<br/>Yer Numarası QA76.9 .A25<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119812555">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119812555</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Security in vehicular networks : focus on location and identity privacy
ent://SD_ILS/0/SD_ILS:597917
2026-02-13T06:35:17Z
2026-02-13T06:35:17Z
Yazar Benarous, Leila. Bitam, Salim. Mellouk, Abdelhamid.<br/>Yer Numarası TE228.37<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394172610">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394172610</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Security and its challenges in the 21st Century
ent://SD_ILS/0/SD_ILS:597077
2026-02-13T06:35:17Z
2026-02-13T06:35:17Z
Yazar Guerrier, Claudine, author.<br/>Yer Numarası QA76.9 .A25<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119854852">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119854852</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
5G explained : security and deployment of advanced mobile communications
ent://SD_ILS/0/SD_ILS:594896
2026-02-13T06:35:17Z
2026-02-13T06:35:17Z
Yazar Penttinen, Jyrki T. J., author.<br/>Yer Numarası TK5103.483 .P46 2019<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119275695">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119275695</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
The Digital Big Bang : the Hard Stuff, the Soft Stuff, and the Future of Cybersecurity
ent://SD_ILS/0/SD_ILS:595435
2026-02-13T06:35:17Z
2026-02-13T06:35:17Z
Yazar Quade, Phil.<br/>Yer Numarası QA76.9 .A25<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119617396">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119617396</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>