Search Results for COMPUTERS -- Information Technology. - Narrowed by: Computer security.
SirsiDynix Enterprise
https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dCOMPUTERS$002b--$002bInformation$002bTechnology.$0026qf$003dSUBJECT$002509Subject$002509Computer$002bsecurity.$002509Computer$002bsecurity.$0026ps$003d300?dt=list
2026-03-21T11:51:08Z
The techno-legal dynamics of cyber crimes in Industry 5.0
ent://SD_ILS/0/SD_ILS:599801
2026-03-21T11:51:08Z
2026-03-21T11:51:08Z
Author Kaur, Gagandeep, editor Choudhury, Tanupriya editor Balamurugan, S. editor<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394242177">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394242177</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Why CISOs fail
ent://SD_ILS/0/SD_ILS:577207
2026-03-21T11:51:08Z
2026-03-21T11:51:08Z
Author Engel, Barak, author.<br/>Preferred Shelf Number HD30.2<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003302759">https://www.taylorfrancis.com/books/9781003302759</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Quantum computing in cybersecurity
ent://SD_ILS/0/SD_ILS:598685
2026-03-21T11:51:08Z
2026-03-21T11:51:08Z
Author Rawat, Romil, editor.<br/>Preferred Shelf Number QA76.9 .A25 Q83 2023<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394167401">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394167401</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Software security : concepts & practices
ent://SD_ILS/0/SD_ILS:570473
2026-03-21T11:51:08Z
2026-03-21T11:51:08Z
Author Khan, Suhel Ahmad, author. Kumar, Rajeev, author. Khan, R. A. (Raees Ahmad), author.<br/>Preferred Shelf Number QA76.76 .D47<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003330516">https://www.taylorfrancis.com/books/9781003330516</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Practical Security for Agile and DevOps.
ent://SD_ILS/0/SD_ILS:584880
2026-03-21T11:51:08Z
2026-03-21T11:51:08Z
Author Merkow, Mark S.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003265566">https://www.taylorfrancis.com/books/9781003265566</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cyber security and digital forensics
ent://SD_ILS/0/SD_ILS:597326
2026-03-21T11:51:08Z
2026-03-21T11:51:08Z
Author Ghonge, Mangesh, 1984- editor.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119795667">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119795667</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Blockchain for information security and privacy
ent://SD_ILS/0/SD_ILS:580861
2026-03-21T11:51:08Z
2026-03-21T11:51:08Z
Author Rao, Udai Pratap, editor.<br/>Preferred Shelf Number QA76.9 .B56 B555 2022<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003129486">https://www.taylorfrancis.com/books/9781003129486</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cloud computing security foundations and challenges
ent://SD_ILS/0/SD_ILS:580601
2026-03-21T11:51:08Z
2026-03-21T11:51:08Z
Author Vacca, John R., editor.<br/>Preferred Shelf Number QA76.585<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9780429055126">https://www.taylorfrancis.com/books/9780429055126</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cybersecurity for information professionals : concepts and applications
ent://SD_ILS/0/SD_ILS:575977
2026-03-21T11:51:08Z
2026-03-21T11:51:08Z
Author Chang, Xiaqing, editor. Al-Hawamdeh, Suliman, editor.<br/>Preferred Shelf Number QA76.9 .A25 C93 2020 EB<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003042235">https://www.taylorfrancis.com/books/9781003042235</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security analytics for the internet of everything
ent://SD_ILS/0/SD_ILS:560404
2026-03-21T11:51:08Z
2026-03-21T11:51:08Z
Author Ahmed, Mohiuddin (Computer scientist) Abu Barkat, Abu. Pathan, Al-Sakib Khan.<br/>Preferred Shelf Number TK5105.8857<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003010463">https://www.taylorfrancis.com/books/9781003010463</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cyber smart : five habits to protect your family, money, and identity from cyber criminals
ent://SD_ILS/0/SD_ILS:594967
2026-03-21T11:51:08Z
2026-03-21T11:51:08Z
Author McDonough, Bart R., author.<br/>Preferred Shelf Number TK5105.59<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119559658">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119559658</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Transformational security awareness : what neuroscientists, storytellers, and marketers can teach us about driving secure behaviors
ent://SD_ILS/0/SD_ILS:595304
2026-03-21T11:51:08Z
2026-03-21T11:51:08Z
Author Carpenter, Perry, author.<br/>Preferred Shelf Number QA76.9 .A25 C37 2019 EB<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119566380">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119566380</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Large-Scale Data Analytics
ent://SD_ILS/0/SD_ILS:488092
2026-03-21T11:51:08Z
2026-03-21T11:51:08Z
Author Gkoulalas-Divanis, Aris. editor. Labbi, Abderrahim. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-1-4614-9242-9">https://doi.org/10.1007/978-1-4614-9242-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>