Search Results for Commercial. - Narrowed by: Computer security.SirsiDynix Enterprisehttps://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dCommercial.$0026qf$003dSUBJECT$002509Subject$002509Computer$002bsecurity.$002509Computer$002bsecurity.$0026ic$003dtrue$0026ps$003d300?2026-01-21T08:18:58ZThe techno-legal dynamics of cyber crimes in Industry 5.0ent://SD_ILS/0/SD_ILS:5998012026-01-21T08:18:58Z2026-01-21T08:18:58ZAuthor Kaur, Gagandeep, editor Choudhury, Tanupriya editor Balamurugan, S. editor<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394242177">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394242177</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Open-source security operations center (SOC) : a complete guide to establishing, managing, and maintaining a modern SOCent://SD_ILS/0/SD_ILS:5994342026-01-21T08:18:58Z2026-01-21T08:18:58ZAuthor Basta, Alfred, author. Basta, Nadine, author. Anwar, Waqar, author. Essar, Mohammad Ilyas, author. John Wiley & Sons, publisher.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394201631">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394201631</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>What to do when you get hacked : a practitioner's guide to incident response in the 21st centuryent://SD_ILS/0/SD_ILS:5635992026-01-21T08:18:58Z2026-01-21T08:18:58ZAuthor Brathwaite, Shimon, author.<br/>Preferred Shelf Number HV8079 .C65 B73 2023<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003264293">https://www.taylorfrancis.com/books/9781003264293</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Applied incident responseent://SD_ILS/0/SD_ILS:5957442026-01-21T08:18:58Z2026-01-21T08:18:58ZAuthor Anson, Steve.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119560302">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119560302</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Digital forensicsent://SD_ILS/0/SD_ILS:5933462026-01-21T08:18:58Z2026-01-21T08:18:58ZAuthor Årnes, André, 1976- editor.<br/>Preferred Shelf Number HV8079 .C65<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119262442">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119262442</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Cyber threat! : how to manage the growing risk of cyber attacksent://SD_ILS/0/SD_ILS:3420202026-01-21T08:18:58Z2026-01-21T08:18:58ZAuthor Ulsch, N. MacDonnell, 1951-<br/>Preferred Shelf Number ONLINE(342020.1)<br/>Electronic Access ebrary <a href="http://alltitles.ebrary.com/Doc?id=10895757">An electronic book accessible through the World Wide Web; click to view</a>
Ebook Library <a href="http://public.eblib.com/choice/publicfullrecord.aspx?p=1742833">http://public.eblib.com/choice/publicfullrecord.aspx?p=1742833</a>
John Wiley <a href="http://dx.doi.org/10.1002/9781118915028">http://dx.doi.org/10.1002/9781118915028</a>
MyiLibrary <a href="http://www.myilibrary.com?id=629214">http://www.myilibrary.com?id=629214</a>
Cover <a href="http://swbplus.bsz-bw.de/bsz410564842cov.htm">http://swbplus.bsz-bw.de/bsz410564842cov.htm</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Secure and resilient software developmentent://SD_ILS/0/SD_ILS:5450972026-01-21T08:18:58Z2026-01-21T08:18:58ZAuthor Merkow, Mark S., author. Raghavan, Lakshmikanth.<br/>Preferred Shelf Number QA76.76 .D47 M466 2010<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781439826973">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>