Search Results for Actors. - Narrowed by: Computer security.
SirsiDynix Enterprise
https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dActors.$0026qf$003dSUBJECT$002509Subject$002509Computer$002bsecurity.$002509Computer$002bsecurity.$0026ps$003d300$0026isd$003dtrue?
2026-02-11T07:42:27Z
Cyber-security threats, actors, and dynamic mitigation
ent://SD_ILS/0/SD_ILS:556535
2026-02-11T07:42:27Z
2026-02-11T07:42:27Z
Author Kolokotronis, Nicholas, editor. Shiaeles, Stavros, editor.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003006145">https://www.taylorfrancis.com/books/9781003006145</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Stepping through cybersecurity risk management : a systems thinking approach
ent://SD_ILS/0/SD_ILS:599021
2026-02-11T07:42:27Z
2026-02-11T07:42:27Z
Author Bayuk, Jennifer L., author.<br/>Preferred Shelf Number QA76.9 .A25 B39 2024<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394213986">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394213986</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Trust-based communication systems for internet of things applications
ent://SD_ILS/0/SD_ILS:597744
2026-02-11T07:42:27Z
2026-02-11T07:42:27Z
Author Madaan, Vishu, editor. Agrawal, Prateek, editor. Sharma, Anand, editor. Sharma, Dilip Kumar, editor. Agrawal, Akshat, 1986- editor.<br/>Preferred Shelf Number TK5105.8857<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119896746">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119896746</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cybersecurity and decision makers : data security and digital trust
ent://SD_ILS/0/SD_ILS:595943
2026-02-11T07:42:27Z
2026-02-11T07:42:27Z
Author Fréminville, Marie de, author.<br/>Preferred Shelf Number HF5548.37 .F74 2020<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119720362">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119720362</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Hands on hacking
ent://SD_ILS/0/SD_ILS:596316
2026-02-11T07:42:27Z
2026-02-11T07:42:27Z
Author Hickey, Matthew (Computer security expert), author. Arcuri, Jennifer, author.<br/>Preferred Shelf Number QA76.9 .A25 H53 2020 EB<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119561507">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119561507</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Data protection : governance, risk management, and compliance
ent://SD_ILS/0/SD_ILS:543918
2026-02-11T07:42:27Z
2026-02-11T07:42:27Z
Author Hill, David G. (David Gary), 1943, author.<br/>Preferred Shelf Number QA76.9 .A25 H52 2009<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781439806937">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>