Search Results for Business and management - Narrowed by: Computer security.
SirsiDynix Enterprise
https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dBusiness$002band$002bmanagement$0026qf$003dSUBJECT$002509Subject$002509Computer$002bsecurity.$002509Computer$002bsecurity.$0026ps$003d300?dt=list
2026-04-03T05:36:04Z
Cyber security and business intelligence : innovations and machine learning for cyber risk management
ent://SD_ILS/0/SD_ILS:553989
2026-04-03T05:36:04Z
2026-04-03T05:36:04Z
Author Abedin, Mohammad Zoynul, editor. Hájek, Petr, editor.<br/>Preferred Shelf Number HD38.7<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003285854">https://www.taylorfrancis.com/books/9781003285854</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Optimal spending on cybersecurity measures : risk management
ent://SD_ILS/0/SD_ILS:586024
2026-04-03T05:36:04Z
2026-04-03T05:36:04Z
Author Kissoon, Tara, author.<br/>Preferred Shelf Number HF5548.37<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003404354">https://www.taylorfrancis.com/books/9781003404354</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Optimal spending on cybersecurity measures : risk management
ent://SD_ILS/0/SD_ILS:553885
2026-04-03T05:36:04Z
2026-04-03T05:36:04Z
Author Kissoon, Tara, author.<br/>Preferred Shelf Number HF5548.37 .K57 2022<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003200895">https://www.taylorfrancis.com/books/9781003200895</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Open-source security operations center (SOC) : a complete guide to establishing, managing, and maintaining a modern SOC
ent://SD_ILS/0/SD_ILS:599434
2026-04-03T05:36:04Z
2026-04-03T05:36:04Z
Author Basta, Alfred, author. Basta, Nadine, author. Anwar, Waqar, author. Essar, Mohammad Ilyas, author. John Wiley & Sons, publisher.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394201631">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394201631</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Generative AI, cybersecurity, and ethics
ent://SD_ILS/0/SD_ILS:599597
2026-04-03T05:36:04Z
2026-04-03T05:36:04Z
Author Islam, Ray (Mohammad Rubyet), author.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394279326">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394279326</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
The cybersecurity control playbook : from fundamentals to advanced strategies
ent://SD_ILS/0/SD_ILS:599789
2026-04-03T05:36:04Z
2026-04-03T05:36:04Z
Author Edwards, Jason (Cybersecurity expert), author. John Wiley & Sons, publisher.<br/>Preferred Shelf Number QA76.9 .A25 E3884 2025<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394331888">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394331888</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information security and privacy quick reference the essential handbook for every CISO, CSO, and Chief Privacy Officer
ent://SD_ILS/0/SD_ILS:599946
2026-04-03T05:36:04Z
2026-04-03T05:36:04Z
Author Chapple, Mike, author. Shelley, Joe. Stewart, James Michael.<br/>Preferred Shelf Number QA76.9 .A25 C43 2025<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394353347">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394353347</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Effective vulnerability management : managing risk in the vulnerable digital ecosystem
ent://SD_ILS/0/SD_ILS:599047
2026-04-03T05:36:04Z
2026-04-03T05:36:04Z
Author Hughes, Chris (Christopher Matthew), author. Robinson, Nikki, author.<br/>Preferred Shelf Number QA76.9 .A25 H84 2024<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394277155">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394277155</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
The cybersecurity guide to governance, risk, and compliance
ent://SD_ILS/0/SD_ILS:598945
2026-04-03T05:36:04Z
2026-04-03T05:36:04Z
Author Edwards, Jason (Cybersecurity expert), author. Weaver, Griffin, author.<br/>Preferred Shelf Number HD30.38 .E34 2024<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394250226">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394250226</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Stepping through cybersecurity risk management : a systems thinking approach
ent://SD_ILS/0/SD_ILS:599021
2026-04-03T05:36:04Z
2026-04-03T05:36:04Z
Author Bayuk, Jennifer L., author.<br/>Preferred Shelf Number QA76.9 .A25 B39 2024<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394213986">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394213986</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Executive's guide to cyber risk : securing the future today
ent://SD_ILS/0/SD_ILS:597567
2026-04-03T05:36:04Z
2026-04-03T05:36:04Z
Author Moyo, Siegfried, author.<br/>Preferred Shelf Number HF5548.37 .M68 2022<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394320578">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394320578</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
The CISO evolution : business knowledge for cybersecurity executives
ent://SD_ILS/0/SD_ILS:597056
2026-04-03T05:36:04Z
2026-04-03T05:36:04Z
Author Sharp, Matthew K., author. Lambros, Kyriakos P., author.<br/>Preferred Shelf Number HD30.2 .S5325 2022<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119782513">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119782513</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Privacy, regulations, and cybersecurity : the essential business guide
ent://SD_ILS/0/SD_ILS:596472
2026-04-03T05:36:04Z
2026-04-03T05:36:04Z
Author Moschovitis, Christos J. P., author.<br/>Preferred Shelf Number HD61.5 .M675 2021 EB<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119660156">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119660156</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cybersecurity blue team toolkit
ent://SD_ILS/0/SD_ILS:595209
2026-04-03T05:36:04Z
2026-04-03T05:36:04Z
Author Tanner, Nadean H., author.<br/>Preferred Shelf Number QA76.9 .A25 T36 2019 EB<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119552963">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119552963</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information security fundamentals
ent://SD_ILS/0/SD_ILS:539922
2026-04-03T05:36:04Z
2026-04-03T05:36:04Z
Author Peltier, Thomas R.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9780429130281">Taylor & Francis eBooks</a>
Taylor & Francis <a href="https://www.taylorfrancis.com/books/9780429130281">https://www.taylorfrancis.com/books/9780429130281</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
DNS security management
ent://SD_ILS/0/SD_ILS:593802
2026-04-03T05:36:04Z
2026-04-03T05:36:04Z
Author Dooley, Michael, 1962- author. Rooney, Timothy, 1962- author.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119328292">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119328292</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Adaptive security management architecture
ent://SD_ILS/0/SD_ILS:541852
2026-04-03T05:36:04Z
2026-04-03T05:36:04Z
Author Tiller, James S., author.<br/>Preferred Shelf Number QA76.9 .A25 T55 2011<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781420013375">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>
Official (ISC)2 guide to the ISSMP CBK
ent://SD_ILS/0/SD_ILS:544375
2026-04-03T05:36:04Z
2026-04-03T05:36:04Z
Author Tipton, Harold F.<br/>Preferred Shelf Number QA76.9 .A25 O34 2011<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781420094442">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>
Information security : design, implementation, measurement, and compliance
ent://SD_ILS/0/SD_ILS:545839
2026-04-03T05:36:04Z
2026-04-03T05:36:04Z
Author Layton, Timothy P., author.<br/>Preferred Shelf Number HF5548.37 .L393 2007<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781420013412">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>
Information security fundamentals
ent://SD_ILS/0/SD_ILS:545226
2026-04-03T05:36:04Z
2026-04-03T05:36:04Z
Author Peltier, Thomas R., author. Peltier, Justin. Blackley, John A.<br/>Preferred Shelf Number QA76.9 .A25 P427 2005<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781135493738">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>
Information security risk analysis
ent://SD_ILS/0/SD_ILS:544821
2026-04-03T05:36:04Z
2026-04-03T05:36:04Z
Author Peltier, Thomas R., author.<br/>Preferred Shelf Number QA76.9 .A25 P429 2005<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781420031195">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>
Securing e-business applications and communications
ent://SD_ILS/0/SD_ILS:545821
2026-04-03T05:36:04Z
2026-04-03T05:36:04Z
Author Held, Jonathan S., author. Bowers, John R.<br/>Preferred Shelf Number QA76.9 .A25 H435 2001<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781420031553">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>