Search Results for C. - Narrowed by: Computer security.
SirsiDynix Enterprise
https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dC.$0026qf$003dSUBJECT$002509Subject$002509Computer$002bsecurity.$002509Computer$002bsecurity.$0026ps$003d300?
2026-01-21T21:37:54Z
The cybersecurity handbook : a guide for board members and C-suite executives
ent://SD_ILS/0/SD_ILS:562071
2026-01-21T21:37:54Z
2026-01-21T21:37:54Z
Author Young, Richard Gwashy author.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003608059">https://www.taylorfrancis.com/books/9781003608059</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Codes, Cryptology and Information Security Third International Conference, C2SI 2019, Rabat, Morocco, April 22–24, 2019, Proceedings - In Honor of Said El Hajji
ent://SD_ILS/0/SD_ILS:483462
2026-01-21T21:37:54Z
2026-01-21T21:37:54Z
Author Carlet, Claude. editor. Guilley, Sylvain. editor. (orcid)0000-0002-5044-3534 Nitaj, Abderrahmane. editor. (orcid)0000-0002-0372-1757 Souidi, El Mamoun. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-16458-4">https://doi.org/10.1007/978-3-030-16458-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
On the Move to Meaningful Internet Systems. OTM 2018 Conferences Confederated International Conferences: CoopIS, C&TC, and ODBASE 2018, Valletta, Malta, October 22-26, 2018, Proceedings, Part I
ent://SD_ILS/0/SD_ILS:400053
2026-01-21T21:37:54Z
2026-01-21T21:37:54Z
Author Panetto, Hervé. editor. (orcid)0000-0002-5537-2261 Debruyne, Christophe. editor. Proper, Henderik A. editor. (orcid)0000-0002-7318-2496 Ardagna, Claudio Agostino. editor. Roman, Dumitru. editor.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-02610-3">https://doi.org/10.1007/978-3-030-02610-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Digital Forensics and Cyber Crime 9th International Conference, ICDF2C 2017, Prague, Czech Republic, October 9-11, 2017, Proceedings
ent://SD_ILS/0/SD_ILS:401948
2026-01-21T21:37:54Z
2026-01-21T21:37:54Z
Author Matoušek, Petr. editor. Schmiedecker, Martin. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-73697-6">https://doi.org/10.1007/978-3-319-73697-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Digital Forensics and Cyber Crime Fifth International Conference, ICDF2C 2013, Moscow, Russia, September 26-27, 2013, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:488522
2026-01-21T21:37:54Z
2026-01-21T21:37:54Z
Author Gladyshev, Pavel. editor. Marrington, Andrew. editor. Baggili, Ibrahim. editor. (orcid)0000-0002-9574-9537 SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-14289-0">https://doi.org/10.1007/978-3-319-14289-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Applied cryptography : protocols, algorithms, and source code in C
ent://SD_ILS/0/SD_ILS:108014
2026-01-21T21:37:54Z
2026-01-21T21:37:54Z
Author Schneier, Bruce.<br/>Preferred Shelf Number QA76.9.A25 S35 1996<br/>Format: Books<br/>Availability Beytepe Library~1<br/>
Buffer overflow attacks detect, exploit, prevent
ent://SD_ILS/0/SD_ILS:254023
2026-01-21T21:37:54Z
2026-01-21T21:37:54Z
Author Foster, James C.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781932266672">http://www.sciencedirect.com/science/book/9781932266672</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information technology security and risk management : inductive cases for information security
ent://SD_ILS/0/SD_ILS:562664
2026-01-21T21:37:54Z
2026-01-21T21:37:54Z
Author Wingreen, Stephen C., editor. Samandari, Amelia, editor.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003264415">https://www.taylorfrancis.com/books/9781003264415</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cybersecurity for ehealth : a simplified guide to practical cybersecurity for non-technical healthcare stakeholders & practitioners
ent://SD_ILS/0/SD_ILS:566470
2026-01-21T21:37:54Z
2026-01-21T21:37:54Z
Author Ogu, Emmanuel C., author.<br/>Preferred Shelf Number R859.7 .S43<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003254416">https://www.taylorfrancis.com/books/9781003254416</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Recent Trends in Image Processing and Pattern Recognition Second International Conference, RTIP2R 2018, Solapur, India, December 21–22, 2018, Revised Selected Papers, Part III
ent://SD_ILS/0/SD_ILS:483285
2026-01-21T21:37:54Z
2026-01-21T21:37:54Z
Author Santosh, K. C. editor. Hegadi, Ravindra S. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-981-13-9187-3">https://doi.org/10.1007/978-981-13-9187-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Applied Oracle security developing secure database and middleware environments
ent://SD_ILS/0/SD_ILS:293376
2026-01-21T21:37:54Z
2026-01-21T21:37:54Z
Author Knox, David (David C.) Gaetjen, Scott. Jahangir, Hamza. Muth, Tyler. Sack, Patrick.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://mhebooklibrary.com/reader/applied-oracle-security-developing-secure-database-middleware-environments">Subscription required</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Honeypot : a new paradigm to information security
ent://SD_ILS/0/SD_ILS:545590
2026-01-21T21:37:54Z
2026-01-21T21:37:54Z
Author Joshi, R. C., author. Sardana, Anjali.<br/>Preferred Shelf Number QA76.9 .A25 J66 2011<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781439869994">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>
Insider computer fraud : an in-depth framework for detecting and defending against insider IT attacks
ent://SD_ILS/0/SD_ILS:544396
2026-01-21T21:37:54Z
2026-01-21T21:37:54Z
Author Brancik, Kenneth C., author.<br/>Preferred Shelf Number QA76.9 .A25 B725 2008<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781420046601">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>
Hack the stack using snort and ethereal to master the 8 layers of an insecure network
ent://SD_ILS/0/SD_ILS:147954
2026-01-21T21:37:54Z
2026-01-21T21:37:54Z
Author Gregg, Michael (Michael C.) Watkins, Stephen.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491099">http://www.sciencedirect.com/science/book/9781597491099</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
PRICAI 2019: Trends in Artificial Intelligence 16th Pacific Rim International Conference on Artificial Intelligence, Cuvu, Yanuca Island, Fiji, August 26-30, 2019, Proceedings, Part III
ent://SD_ILS/0/SD_ILS:486958
2026-01-21T21:37:54Z
2026-01-21T21:37:54Z
Author Nayak, Abhaya C. editor. (orcid)0000-0003-0681-9570 Sharma, Alok. editor. (orcid)0000-0002-7668-3501 SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-29894-4">https://doi.org/10.1007/978-3-030-29894-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Snort 2.0 intrusion detection
ent://SD_ILS/0/SD_ILS:254005
2026-01-21T21:37:54Z
2026-01-21T21:37:54Z
Author Beale, Jay. Foster, James C.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836746">http://www.sciencedirect.com/science/book/9781931836746</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Hacker techniques, tools, and incident handling
ent://SD_ILS/0/SD_ILS:271438
2026-01-21T21:37:54Z
2026-01-21T21:37:54Z
Author Oriyano, Sean-Philip. Gregg, Michael (Michael C.)<br/>Preferred Shelf Number TK5105.59 O786 2011<br/>Format: Books<br/>Availability Beytepe Library~1<br/>
BLOCKCHAIN AND DIGITAL TWIN ENABLED IOT NETWORKS privacy and security.
ent://SD_ILS/0/SD_ILS:569607
2026-01-21T21:37:54Z
2026-01-21T21:37:54Z
Author Kumar, Randhir. Kumar, Prabhat. C C, Sobin.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003403791">https://www.taylorfrancis.com/books/9781003403791</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security and Data Storage Aspect in Cloud Computing
ent://SD_ILS/0/SD_ILS:484576
2026-01-21T21:37:54Z
2026-01-21T21:37:54Z
Author Deshpande, Prachi S. author. Sharma, Subhash C. author. Peddoju, Sateesh K. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-981-13-6089-3">https://doi.org/10.1007/978-981-13-6089-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Trends and Applications in Knowledge Discovery and Data Mining PAKDD 2018 Workshops, BDASC, BDM, ML4Cyber, PAISI, DaMEMO, Melbourne, VIC, Australia, June 3, 2018, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:400047
2026-01-21T21:37:54Z
2026-01-21T21:37:54Z
Author Ganji, Mohadeseh. editor. Rashidi, Lida. editor. Fung, Benjamin C. M. editor. (orcid)0000-0001-8423-2906 Wang, Can. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-04503-6">https://doi.org/10.1007/978-3-030-04503-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Deep Learning in Medical Image Analysis and Multimodal Learning for Clinical Decision Support 4th International Workshop, DLMIA 2018, and 8th International Workshop, ML-CDS 2018, Held in Conjunction with MICCAI 2018, Granada, Spain, September 20, 2018, Proceedings
ent://SD_ILS/0/SD_ILS:400575
2026-01-21T21:37:54Z
2026-01-21T21:37:54Z
Author Stoyanov, Danail. editor. Taylor, Zeike. editor. Carneiro, Gustavo. editor. (orcid)0000-0002-5571-6220 Syeda-Mahmood, Tanveer. editor. Martel, Anne. editor.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-00889-5">https://doi.org/10.1007/978-3-030-00889-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Network and System Security 8th International Conference, NSS 2014, Xi'an, China, October 15-17, 2014. Proceedings
ent://SD_ILS/0/SD_ILS:489091
2026-01-21T21:37:54Z
2026-01-21T21:37:54Z
Author Au, Man Ho. editor. Carminati, Barbara. editor. Kuo, C.-C. Jay. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-11698-3">https://doi.org/10.1007/978-3-319-11698-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Security 17th International Conference, ISC 2014, Hong Kong, China, October 12-14, 2014, Proceedings
ent://SD_ILS/0/SD_ILS:485793
2026-01-21T21:37:54Z
2026-01-21T21:37:54Z
Author Chow, Sherman S.M. editor. Camenisch, Jan. editor. Hui, Lucas C.K. editor. Yiu, Siu Ming. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-13257-0">https://doi.org/10.1007/978-3-319-13257-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
The Hash Function BLAKE
ent://SD_ILS/0/SD_ILS:488367
2026-01-21T21:37:54Z
2026-01-21T21:37:54Z
Author Aumasson, Jean-Philippe. author. Meier, Willi. author. Phan, Raphael C.-W. author. Henzen, Luca. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-662-44757-4">https://doi.org/10.1007/978-3-662-44757-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Provable Security 8th International Conference, ProvSec 2014, Hong Kong, China, October 9-10, 2014. Proceedings
ent://SD_ILS/0/SD_ILS:488918
2026-01-21T21:37:54Z
2026-01-21T21:37:54Z
Author Chow, Sherman S.M. editor. Liu, Joseph K. editor. Hui, Lucas C.K. editor. Yiu, Siu Ming. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-12475-9">https://doi.org/10.1007/978-3-319-12475-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
InfoSec career hacking sell your skillz, not your soul
ent://SD_ILS/0/SD_ILS:253681
2026-01-21T21:37:54Z
2026-01-21T21:37:54Z
Author Bayles, Aaron W. Brindley, Ed. Foster, James C. Hurley, Chris. Long, Johnny.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490115">http://www.sciencedirect.com/science/book/9781597490115</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cisco security professional's guide to secure intrusion detection systems
ent://SD_ILS/0/SD_ILS:254024
2026-01-21T21:37:54Z
2026-01-21T21:37:54Z
Author Burton, James. Dubrawsky, Ida. Osipov, Vitaly. Baumrucker, C. Tate. Sweeney, Michael<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781932266696">http://www.sciencedirect.com/science/book/9781932266696</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Behavioral insights in cybersecurity : a guide to digital human factors
ent://SD_ILS/0/SD_ILS:567885
2026-01-21T21:37:54Z
2026-01-21T21:37:54Z
Author Sachs, Dustin S., author.<br/>Preferred Shelf Number ZA3086.5 .C93<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003606345">https://www.taylorfrancis.com/books/9781003606345</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
A Cybersecurity Leader's Journey : Speaking the Language of the Board
ent://SD_ILS/0/SD_ILS:588198
2026-01-21T21:37:54Z
2026-01-21T21:37:54Z
Author Marchewka, Edward, author.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003597407">https://www.taylorfrancis.com/books/9781003597407</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Alice and Bob learn secure coding
ent://SD_ILS/0/SD_ILS:599664
2026-01-21T21:37:54Z
2026-01-21T21:37:54Z
Author Janca, Tanya. author.<br/>Preferred Shelf Number QA76.76 .D47<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394277179">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394277179</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Quantum computing models for cybersecurity and wireless communications
ent://SD_ILS/0/SD_ILS:599707
2026-01-21T21:37:54Z
2026-01-21T21:37:54Z
Author Kumar, Budati Anil, edited. Kumar, Singamaneni Kranthi, edited. Li, Xingwang (Computer scientist), edited.<br/>Preferred Shelf Number QA76.9 .A25 Q36 2025<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394271429">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394271429</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
The cybersecurity control playbook : from fundamentals to advanced strategies
ent://SD_ILS/0/SD_ILS:599789
2026-01-21T21:37:54Z
2026-01-21T21:37:54Z
Author Edwards, Jason (Cybersecurity expert), author. John Wiley & Sons, publisher.<br/>Preferred Shelf Number QA76.9 .A25 E3884 2025<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394331888">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394331888</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Digital twins and cybersecurity : safeguarding the future of connected systems
ent://SD_ILS/0/SD_ILS:599615
2026-01-21T21:37:54Z
2026-01-21T21:37:54Z
Author Naveen, Palanichamy, author. Maheswar, R., author. Ragupathy, U.S., author.<br/>Preferred Shelf Number QA76.9 .C65 N38 2025<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394272501">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394272501</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information security and privacy quick reference the essential handbook for every CISO, CSO, and Chief Privacy Officer
ent://SD_ILS/0/SD_ILS:599946
2026-01-21T21:37:54Z
2026-01-21T21:37:54Z
Author Chapple, Mike, author. Shelley, Joe. Stewart, James Michael.<br/>Preferred Shelf Number QA76.9 .A25 C43 2025<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394353347">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394353347</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Hybrid threats, cyberterrorism and cyberwarfare
ent://SD_ILS/0/SD_ILS:577221
2026-01-21T21:37:54Z
2026-01-21T21:37:54Z
Author Ferrag, Mohamed Amine, 1987- editor. Kantzavelou, Ioanna, editor. Maglaras, Leandros, editor. Janicke, Helge, editor.<br/>Preferred Shelf Number HV6773.15 .C97<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003314721">https://www.taylorfrancis.com/books/9781003314721</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Stepping through cybersecurity risk management : a systems thinking approach
ent://SD_ILS/0/SD_ILS:599021
2026-01-21T21:37:54Z
2026-01-21T21:37:54Z
Author Bayuk, Jennifer L., author.<br/>Preferred Shelf Number QA76.9 .A25 B39 2024<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394213986">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394213986</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cyber Operations : A Case Study Approach
ent://SD_ILS/0/SD_ILS:599117
2026-01-21T21:37:54Z
2026-01-21T21:37:54Z
Author Couretas, Jerry M., 1966- author.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119712121">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119712121</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
CYBERSECURITY IN THE TRANSPORTATION INDUSTRY.
ent://SD_ILS/0/SD_ILS:599238
2026-01-21T21:37:54Z
2026-01-21T21:37:54Z
Preferred Shelf Number HE194 .C93 2024<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394204472">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394204472</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
What to do when you get hacked : a practitioner's guide to incident response in the 21st century
ent://SD_ILS/0/SD_ILS:563599
2026-01-21T21:37:54Z
2026-01-21T21:37:54Z
Author Brathwaite, Shimon, author.<br/>Preferred Shelf Number HV8079 .C65 B73 2023<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003264293">https://www.taylorfrancis.com/books/9781003264293</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cyber investigations : a research based textbook for advanced studies
ent://SD_ILS/0/SD_ILS:597931
2026-01-21T21:37:54Z
2026-01-21T21:37:54Z
Author Årnes, André, 1976- editor.<br/>Preferred Shelf Number HV8079 .C65 C933 2023<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119582021">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119582021</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cybercrime during the SARS-CoV-2 pandemic (2019-2022)
ent://SD_ILS/0/SD_ILS:598517
2026-01-21T21:37:54Z
2026-01-21T21:37:54Z
Author Ventre, Daniel, editor. Loiseau, Hugo, 1974- editor.<br/>Preferred Shelf Number HV6773 .C93 2023<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394226344">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394226344</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Network forensics : privacy and security
ent://SD_ILS/0/SD_ILS:555626
2026-01-21T21:37:54Z
2026-01-21T21:37:54Z
Author Bijalwan, Anchit, author.<br/>Preferred Shelf Number HV8079 .C65<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003045908">https://www.taylorfrancis.com/books/9781003045908</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cyber security and digital forensics
ent://SD_ILS/0/SD_ILS:597326
2026-01-21T21:37:54Z
2026-01-21T21:37:54Z
Author Ghonge, Mangesh, 1984- editor.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119795667">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119795667</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Digital forensics explained
ent://SD_ILS/0/SD_ILS:589479
2026-01-21T21:37:54Z
2026-01-21T21:37:54Z
Author Gogolin, Greg, editor.<br/>Preferred Shelf Number HV8079 .C65<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003049357">https://www.taylorfrancis.com/books/9781003049357</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security issues and privacy concerns in Industry 4.0 applications
ent://SD_ILS/0/SD_ILS:596945
2026-01-21T21:37:54Z
2026-01-21T21:37:54Z
Author David, Shiblin, author. Anand, R. S., author. Jeyakrishnan, V., author. Niranjanamurthy, M., author.<br/>Preferred Shelf Number QA76.9 .A25 D38 2021<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119776529">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119776529</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Artificial intelligence and data mining approaches in security frameworks
ent://SD_ILS/0/SD_ILS:596957
2026-01-21T21:37:54Z
2026-01-21T21:37:54Z
Author Bhargava, Neeraj. Bhargava, Ritu. Rathore, Pramod Singh, 1988- Agrawal, Rashmi, 1978-<br/>Preferred Shelf Number Q335<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119760429">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119760429</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Türkiye’de ve dünyada siber güvenlik
ent://SD_ILS/0/SD_ILS:514958
2026-01-21T21:37:54Z
2026-01-21T21:37:54Z
Author Çeliktaş, Barış .<br/>Preferred Shelf Number UG485 C45 2020<br/>Format: Books<br/>Availability Beytepe Library~1<br/>
Cybersecurity for information professionals : concepts and applications
ent://SD_ILS/0/SD_ILS:575977
2026-01-21T21:37:54Z
2026-01-21T21:37:54Z
Author Chang, Xiaqing, editor. Al-Hawamdeh, Suliman, editor.<br/>Preferred Shelf Number QA76.9 .A25 C93 2020 EB<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003042235">https://www.taylorfrancis.com/books/9781003042235</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
National cyber emergencies : the return to civil defence
ent://SD_ILS/0/SD_ILS:553628
2026-01-21T21:37:54Z
2026-01-21T21:37:54Z
Author Austin, Greg, 1951- editor.<br/>Preferred Shelf Number HV6773.15 .C97<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9780429343438">https://www.taylorfrancis.com/books/9780429343438</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Tribe of hackers security leaders : tribal knowledge from the best in cybersecurity leadership
ent://SD_ILS/0/SD_ILS:595887
2026-01-21T21:37:54Z
2026-01-21T21:37:54Z
Author Carey, Marcus J. (Cybersecurity professional), author. Jin, Jennifer.<br/>Preferred Shelf Number QA76.9 .A25 C37 2020<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119643784">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119643784</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Tribe of hackers blue team : tribal knowledge from the best in defensive cybersecurity
ent://SD_ILS/0/SD_ILS:596276
2026-01-21T21:37:54Z
2026-01-21T21:37:54Z
Author Carey, Marcus J. (Cybersecurity professional) Jin, Jennifer.<br/>Preferred Shelf Number QA76.9 .A25 C3673 2020<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119643432">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119643432</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Transformational security awareness : what neuroscientists, storytellers, and marketers can teach us about driving secure behaviors
ent://SD_ILS/0/SD_ILS:595304
2026-01-21T21:37:54Z
2026-01-21T21:37:54Z
Author Carpenter, Perry, author.<br/>Preferred Shelf Number QA76.9 .A25 C37 2019 EB<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119566380">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119566380</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Tribe of hackers red team : tribal knowledge from the best in offensive cybersecurity
ent://SD_ILS/0/SD_ILS:595415
2026-01-21T21:37:54Z
2026-01-21T21:37:54Z
Author Carey, Marcus J. (Cybersecurity professional), author. Jin, Jennifer, author.<br/>Preferred Shelf Number QA76.9 .A25 C368 2019<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119643357">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119643357</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Tribe of hackers : cybersecurity advice from the best hackers in the world
ent://SD_ILS/0/SD_ILS:595418
2026-01-21T21:37:54Z
2026-01-21T21:37:54Z
Author Carey, Marcus J. (Cybersecurity professional), author. Jin, Jennifer, author.<br/>Preferred Shelf Number QA76.9 .A25 C37 2019 EB<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119643395">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119643395</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cyber-vigilance and digital trust : cyber security in the era of cloud computing and IoT
ent://SD_ILS/0/SD_ILS:595279
2026-01-21T21:37:54Z
2026-01-21T21:37:54Z
Author Tounsi, Wiem, editor.<br/>Preferred Shelf Number QA76.9 .A25 C93 2019 EB<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119618393">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119618393</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Digital forensics
ent://SD_ILS/0/SD_ILS:593346
2026-01-21T21:37:54Z
2026-01-21T21:37:54Z
Author Årnes, André, 1976- editor.<br/>Preferred Shelf Number HV8079 .C65<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119262442">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119262442</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
An introduction to cyber modeling and simulation
ent://SD_ILS/0/SD_ILS:594699
2026-01-21T21:37:54Z
2026-01-21T21:37:54Z
Author Couretas, Jerry M., 1966- author.<br/>Preferred Shelf Number QA76.9 .C65<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119420842">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119420842</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cybersecurity essentials
ent://SD_ILS/0/SD_ILS:594756
2026-01-21T21:37:54Z
2026-01-21T21:37:54Z
Author Brooks, Charles J., author. Grow, Christopher, author. Craig, Philip, author. Short, Donald, author.<br/>Preferred Shelf Number TK5105.59<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119369141">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119369141</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Digital forensics for handheld devices
ent://SD_ILS/0/SD_ILS:541429
2026-01-21T21:37:54Z
2026-01-21T21:37:54Z
Author Doherty, Eamon P., author.<br/>Preferred Shelf Number HV8079 .C65 D64 2013<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781439898789">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>
Hacking exposed Linux Linux security secrets and solutions.
ent://SD_ILS/0/SD_ILS:293324
2026-01-21T21:37:54Z
2026-01-21T21:37:54Z
Author Hatch, Brian. Hacking Linux exposed. ISECOM (Organization)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://mhebooklibrary.com/reader/hacking-exposed-linux">Subscription required</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Social engineering : the art of human hacking
ent://SD_ILS/0/SD_ILS:377976
2026-01-21T21:37:54Z
2026-01-21T21:37:54Z
Author Hadnagy, Christopher.<br/>Preferred Shelf Number QA76.9.C66 H33 2011<br/>Format: Books<br/>Availability Beytepe Library~1<br/>
Cryptanalysis of RSA and its variants
ent://SD_ILS/0/SD_ILS:542078
2026-01-21T21:37:54Z
2026-01-21T21:37:54Z
Author Hinek, M. Jason., author.<br/>Preferred Shelf Number TK5102.94 .H56 2010<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781420075199">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>
Profiling hackers : the science of criminal profiling as applied to the world of hacking
ent://SD_ILS/0/SD_ILS:545973
2026-01-21T21:37:54Z
2026-01-21T21:37:54Z
Author Chiesa, Raoul, 1973, author. Ducci, Stefania. Ciappi, Silvio, 1965-<br/>Preferred Shelf Number HV6773 .C477 2009<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781420086942">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>
Architecting secure software systems
ent://SD_ILS/0/SD_ILS:538962
2026-01-21T21:37:54Z
2026-01-21T21:37:54Z
Author Talukder, Asoke K., author. Chaitanya, Manish.<br/>Preferred Shelf Number QA76.9 .A25 T34 2009<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781420087857">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>
Computer security and cryptography
ent://SD_ILS/0/SD_ILS:296865
2026-01-21T21:37:54Z
2026-01-21T21:37:54Z
Author Konheim, Alan G., 1934-<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://www.contentreserve.com/TitleInfo.asp?ID={24307C36-99BB-4A76-9317-7D1A7CC786FB}&Format=50">Click for information</a>
<a href="http://proquest.safaribooksonline.com/?fpi=9780471947837">Available by subscription from Safari Books Online</a>
Ebook Library <a href="http://public.eblib.com/EBLPublic/PublicView.do?ptiID=288170">http://public.eblib.com/EBLPublic/PublicView.do?ptiID=288170</a>
John Wiley <a href="http://dx.doi.org/10.1002/0470083980">http://dx.doi.org/10.1002/0470083980</a>
Volltext <a href="http://proquest.tech.safaribooksonline.de/9780471947837">http://proquest.tech.safaribooksonline.de/9780471947837</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Grid computing security
ent://SD_ILS/0/SD_ILS:248747
2026-01-21T21:37:54Z
2026-01-21T21:37:54Z
Author Chakrabarti, Anirban.<br/>Preferred Shelf Number QA76.9.C58 C53 2007<br/>Format: Books<br/>Availability Beytepe Library~1<br/>
Software deployment, updating, and patching
ent://SD_ILS/0/SD_ILS:544966
2026-01-21T21:37:54Z
2026-01-21T21:37:54Z
Author Stackpole, Bill., author. Hanrion, Patrick.<br/>Preferred Shelf Number QA76.76 .C69 S74 2007<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781420013290">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>
Information security principles and practice
ent://SD_ILS/0/SD_ILS:301803
2026-01-21T21:37:54Z
2026-01-21T21:37:54Z
Author Stamp, Mark.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://www.contentreserve.com/TitleInfo.asp?ID={310C0D18-7395-435E-BA71-41A0448F3D13}&Format=50">Click for information</a>
Ebook Library <a href="http://public.eblib.com/EBLPublic/PublicView.do?ptiID=240929">http://public.eblib.com/EBLPublic/PublicView.do?ptiID=240929</a>
John Wiley <a href="http://dx.doi.org/10.1002/0471744190">http://dx.doi.org/10.1002/0471744190</a>
<a href="http://www3.interscience.wiley.com/cgi-bin/bookhome/109933408">http://www3.interscience.wiley.com/cgi-bin/bookhome/109933408</a>
HathiTrust Digital Library, Limited view (search only) <a href="http://catalog.hathitrust.org/api/volumes/oclc/57754240.html">http://catalog.hathitrust.org/api/volumes/oclc/57754240.html</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Intelligence and security informatics for international security : information sharing and data mining
ent://SD_ILS/0/SD_ILS:119786
2026-01-21T21:37:54Z
2026-01-21T21:37:54Z
Author Chen, Hsinchun.<br/>Preferred Shelf Number QA76.76.E95 C44 2006<br/>Format: Books<br/>Availability Beytepe Library~1<br/>
Bilgi ve bilgisayar güvenliği : casus yazılımlar ve korunma yöntemleri
ent://SD_ILS/0/SD_ILS:515469
2026-01-21T21:37:54Z
2026-01-21T21:37:54Z
Author Canbek, Gürol. Sağıroğlu, Şeref.<br/>Preferred Shelf Number QA76.9.A25 C36 2006<br/>Format: Books<br/>Availability Beytepe Library~1<br/>
How to break software security : effective technigues for security testing
ent://SD_ILS/0/SD_ILS:105584
2026-01-21T21:37:54Z
2026-01-21T21:37:54Z
Author Whittaker, James A., 1965- Thomson, Herbert H., ort. yaz.<br/>Preferred Shelf Number QA 76.9.A25 W48 2004<br/>Format: Books<br/>Availability Beytepe Library~2<br/>
Information security policies and procedures : a practitioner's reference
ent://SD_ILS/0/SD_ILS:547228
2026-01-21T21:37:54Z
2026-01-21T21:37:54Z
Author Peltier, Thomas R., author.<br/>Preferred Shelf Number QA76.9 .A25 P428 2004<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9780203488737">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>
UMTS security
ent://SD_ILS/0/SD_ILS:295861
2026-01-21T21:37:54Z
2026-01-21T21:37:54Z
Author Niemi, Valtteri. Nyberg, Kaisa, 1948-<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://www.contentreserve.com/TitleInfo.asp?ID={465C10B2-1465-4D2B-AAAD-DED651D62D3D}&Format=50">Click for information</a>
Wiley InterScience - Full text online <a href="http://onlinelibrary.wiley.com/book/10.1002/0470091584">http://onlinelibrary.wiley.com/book/10.1002/0470091584</a>
John Wiley <a href="http://dx.doi.org/10.1002/0470091584">http://dx.doi.org/10.1002/0470091584</a>
HathiTrust Digital Library, Limited view (search only) <a href="http://catalog.hathitrust.org/api/volumes/oclc/53183293.html">http://catalog.hathitrust.org/api/volumes/oclc/53183293.html</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Computer security sourcebook
ent://SD_ILS/0/SD_ILS:94615
2026-01-21T21:37:54Z
2026-01-21T21:37:54Z
Author Caldwell, Wilma, ed.<br/>Preferred Shelf Number QA 76.9.A25 C658 2003<br/>Format: Books<br/>Availability Beytepe Library~1<br/>