Search Results for Art. - Narrowed by: Computer security.SirsiDynix Enterprisehttps://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dArt.$0026qf$003dSUBJECT$002509Subject$002509Computer$002bsecurity.$002509Computer$002bsecurity.$0026ic$003dtrue$0026ps$003d300$0026isd$003dtrue?2026-02-22T21:11:48ZComputer security : art and scienceent://SD_ILS/0/SD_ILS:3140212026-02-22T21:11:48Z2026-02-22T21:11:48ZAuthor Bishop, Matt (Matthew A.)<br/>Preferred Shelf Number QA76.9.A25 B56 2003<br/>Format: Books<br/>Availability Beytepe Library~1<br/>Social engineering : the art of human hackingent://SD_ILS/0/SD_ILS:3779762026-02-22T21:11:48Z2026-02-22T21:11:48ZAuthor Hadnagy, Christopher.<br/>Preferred Shelf Number QA76.9.C66 H33 2011<br/>Format: Books<br/>Availability Beytepe Library~1<br/>Zen and the art of information securityent://SD_ILS/0/SD_ILS:1122142026-02-22T21:11:48Z2026-02-22T21:11:48ZAuthor Winkler, Ira. ScienceDirect (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491686">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Zen and the art of information securityent://SD_ILS/0/SD_ILS:1456802026-02-22T21:11:48Z2026-02-22T21:11:48ZAuthor Winkler, Ira.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491686">http://www.sciencedirect.com/science/book/9781597491686</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>The art of cyber defense : from risk assessment to threat intelligenceent://SD_ILS/0/SD_ILS:5863052026-02-22T21:11:48Z2026-02-22T21:11:48ZAuthor Baddi, Youssef, editor.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781032714806">https://www.taylorfrancis.com/books/9781032714806</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>The Art of Modelling Computational Systems: A Journey from Logic and Concurrency to Security and Privacy Essays Dedicated to Catuscia Palamidessi on the Occasion of Her 60th Birthdayent://SD_ILS/0/SD_ILS:4868592026-02-22T21:11:48Z2026-02-22T21:11:48ZAuthor Alvim, Mário S. editor. Chatzikokolakis, Kostas. editor. Olarte, Carlos. editor. Valencia, Frank. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-31175-9">https://doi.org/10.1007/978-3-030-31175-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>The state of the art in intrusion prevention and detectionent://SD_ILS/0/SD_ILS:5436762026-02-22T21:11:48Z2026-02-22T21:11:48ZAuthor Pathan, Al-Sakib Khan, editor.<br/>Preferred Shelf Number QA76.9 .A25 S7354 2014<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781482203523">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>Generative AI, cybersecurity, and ethicsent://SD_ILS/0/SD_ILS:5995972026-02-22T21:11:48Z2026-02-22T21:11:48ZAuthor Islam, Ray (Mohammad Rubyet), author.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394279326">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394279326</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Stepping through cybersecurity risk management : a systems thinking approachent://SD_ILS/0/SD_ILS:5990212026-02-22T21:11:48Z2026-02-22T21:11:48ZAuthor Bayuk, Jennifer L., author.<br/>Preferred Shelf Number QA76.9 .A25 B39 2024<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394213986">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394213986</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Cyber security and network securityent://SD_ILS/0/SD_ILS:5974842026-02-22T21:11:48Z2026-02-22T21:11:48ZAuthor Pramanik, Sabyasachi, editor. Samanta, Debabrata, 1987- editor. Vinay, M., editor. Guha, Abhijit, editor.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119812555">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119812555</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Artificial intelligence and data mining approaches in security frameworksent://SD_ILS/0/SD_ILS:5969572026-02-22T21:11:48Z2026-02-22T21:11:48ZAuthor Bhargava, Neeraj. Bhargava, Ritu. Rathore, Pramod Singh, 1988- Agrawal, Rashmi, 1978-<br/>Preferred Shelf Number Q335<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119760429">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119760429</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Hands on hackingent://SD_ILS/0/SD_ILS:5963162026-02-22T21:11:48Z2026-02-22T21:11:48ZAuthor Hickey, Matthew (Computer security expert), author. Arcuri, Jennifer, author.<br/>Preferred Shelf Number QA76.9 .A25 H53 2020 EB<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119561507">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119561507</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Transformational security awareness : what neuroscientists, storytellers, and marketers can teach us about driving secure behaviorsent://SD_ILS/0/SD_ILS:5953042026-02-22T21:11:48Z2026-02-22T21:11:48ZAuthor Carpenter, Perry, author.<br/>Preferred Shelf Number QA76.9 .A25 C37 2019 EB<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119566380">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119566380</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>PRAGMATIC security metrics : applying metametrics to information securityent://SD_ILS/0/SD_ILS:5417972026-02-22T21:11:48Z2026-02-22T21:11:48ZAuthor Brotby, W. Krag., author. Hinson, Gary. Kabay, Michel E.<br/>Preferred Shelf Number HD30.38 .B76 2013<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781439881538">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>Insider computer fraud : an in-depth framework for detecting and defending against insider IT attacksent://SD_ILS/0/SD_ILS:5443962026-02-22T21:11:48Z2026-02-22T21:11:48ZAuthor Brancik, Kenneth C., author.<br/>Preferred Shelf Number QA76.9 .A25 B725 2008<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781420046601">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>