Search Results for Compliance. - Narrowed by: COMPUTERS. SirsiDynix Enterprise https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dCompliance.$0026qf$003dSUBJECT$002509Subject$002509COMPUTERS.$002509COMPUTERS.$0026ps$003d300? 2026-03-04T03:59:58Z The cybersecurity guide to governance, risk, and compliance ent://SD_ILS/0/SD_ILS:598945 2026-03-04T03:59:58Z 2026-03-04T03:59:58Z Author&#160;Edwards, Jason (Cybersecurity expert), author.&#160;Weaver, Griffin, author.<br/>Preferred Shelf Number&#160;HD30.38 .E34 2024<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394250226">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394250226</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Zero Trust Security A Hands-on Guide ent://SD_ILS/0/SD_ILS:600392 2026-03-04T03:59:58Z 2026-03-04T03:59:58Z Author&#160;Jakobsen, Adam Tilmar.<br/>Preferred Shelf Number&#160;XX(600392.1)<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394361120">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394361120</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Digital twins and cybersecurity : safeguarding the future of connected systems ent://SD_ILS/0/SD_ILS:599615 2026-03-04T03:59:58Z 2026-03-04T03:59:58Z Author&#160;Naveen, Palanichamy, author.&#160;Maheswar, R., author.&#160;Ragupathy, U.S., author.<br/>Preferred Shelf Number&#160;QA76.9 .C65 N38 2025<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394272501">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394272501</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Mobile communication systems for private networks ent://SD_ILS/0/SD_ILS:599652 2026-03-04T03:59:58Z 2026-03-04T03:59:58Z Author&#160;Balasubramanian, Srinivasan.<br/>Preferred Shelf Number&#160;TK5103.2 .B35 2025<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394201822">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394201822</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Explainable artificial intelligence in the healthcare industry ent://SD_ILS/0/SD_ILS:599742 2026-03-04T03:59:58Z 2026-03-04T03:59:58Z Preferred Shelf Number&#160;R859.7 .A78 E97 2025<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394249312">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394249312</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Handbook of intelligent automation systems using computer vision and artificial intelligence ent://SD_ILS/0/SD_ILS:600064 2026-03-04T03:59:58Z 2026-03-04T03:59:58Z Preferred Shelf Number&#160;T59.5 .H36 2025<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394302734">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394302734</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information security and privacy quick reference the essential handbook for every CISO, CSO, and Chief Privacy Officer ent://SD_ILS/0/SD_ILS:599946 2026-03-04T03:59:58Z 2026-03-04T03:59:58Z Author&#160;Chapple, Mike, author.&#160;Shelley, Joe.&#160;Stewart, James Michael.<br/>Preferred Shelf Number&#160;QA76.9 .A25 C43 2025<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394353347">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394353347</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> The DevSecOps playbook : deliver continuous security at speed ent://SD_ILS/0/SD_ILS:598634 2026-03-04T03:59:58Z 2026-03-04T03:59:58Z Author&#160;Mack, Sean D., author.<br/>Preferred Shelf Number&#160;QA76.9 .A25 M33 2024<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394189281">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394189281</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Fog computing for intelligent cloud IoT systems ent://SD_ILS/0/SD_ILS:599191 2026-03-04T03:59:58Z 2026-03-04T03:59:58Z Author&#160;Banerjee, Chandan, editor.&#160;Ghosh, Anupam, editor.&#160;Chakraborty, Rajdeep, editor.&#160;Elngar, Ahmed A., editor.<br/>Preferred Shelf Number&#160;TK5105.8857 .F64 2024<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394175345">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394175345</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Stepping through cybersecurity risk management : a systems thinking approach ent://SD_ILS/0/SD_ILS:599021 2026-03-04T03:59:58Z 2026-03-04T03:59:58Z Author&#160;Bayuk, Jennifer L., author.<br/>Preferred Shelf Number&#160;QA76.9 .A25 B39 2024<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394213986">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394213986</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Digital twin and blockchain for smart cities ent://SD_ILS/0/SD_ILS:599400 2026-03-04T03:59:58Z 2026-03-04T03:59:58Z Author&#160;Tyagi, Amit Kumar, 1988-<br/>Preferred Shelf Number&#160;TD159.4 .D54 2024<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394303564">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394303564</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Artificial intelligence-based system models in healthcare ent://SD_ILS/0/SD_ILS:599424 2026-03-04T03:59:58Z 2026-03-04T03:59:58Z Author&#160;Anand, A. Jose, editor.&#160;Kalaiccelvi, K&#257;., editor.&#160;Chatterje, Jyotir Moy, editor.<br/>Preferred Shelf Number&#160;R859.7 .A78<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394242528">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394242528</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Fintech and cryptocurrency ent://SD_ILS/0/SD_ILS:598686 2026-03-04T03:59:58Z 2026-03-04T03:59:58Z Author&#160;Naved, Mohd, editor.&#160;Devi, V. Ajantha, editor.&#160;Gupta, Aditya Kumar, editor.<br/>Preferred Shelf Number&#160;HG1710 .F56 2023<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119905028">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119905028</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Smarter data science : succeeding with enterprise-grade data and AI projects ent://SD_ILS/0/SD_ILS:595959 2026-03-04T03:59:58Z 2026-03-04T03:59:58Z Author&#160;Fishman, Neal.&#160;Stryker, Cole.<br/>Preferred Shelf Number&#160;T58.6<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119697985">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119697985</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cyber breach response that actually works : organizational approach to managing residual risk ent://SD_ILS/0/SD_ILS:596117 2026-03-04T03:59:58Z 2026-03-04T03:59:58Z Author&#160;Gorecki, Andrew.<br/>Preferred Shelf Number&#160;QA76.9 .A25<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119679349">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119679349</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cybersecurity and decision makers : data security and digital trust ent://SD_ILS/0/SD_ILS:595943 2026-03-04T03:59:58Z 2026-03-04T03:59:58Z Author&#160;Fr&eacute;minville, Marie de, author.<br/>Preferred Shelf Number&#160;HF5548.37 .F74 2020<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119720362">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119720362</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> AWS Certified Cloud Practitioner Study Guide : CLF-C01 Exam ent://SD_ILS/0/SD_ILS:595333 2026-03-04T03:59:58Z 2026-03-04T03:59:58Z Author&#160;Piper, Ben.&#160;Clinton, David.<br/>Preferred Shelf Number&#160;QA76.3 .P57 2019<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119574408">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119574408</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> The regtech book : the financial technology handbook for investors, entrepreneurs and visionaries in regulation ent://SD_ILS/0/SD_ILS:594792 2026-03-04T03:59:58Z 2026-03-04T03:59:58Z Author&#160;Barberis, Janos, 1971- editor.&#160;Arner, Douglas W., editor.&#160;Buckley, Ross P., editor.<br/>Preferred Shelf Number&#160;HG173 .R395 2019<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119362197">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119362197</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security, privacy and digital forensics in the cloud ent://SD_ILS/0/SD_ILS:594934 2026-03-04T03:59:58Z 2026-03-04T03:59:58Z Author&#160;Chen, Lei, 1978 July 28- editor.&#160;Takabi, Hassan, 1982- editor.&#160;Le-Khac, Nhien-An, 1972- editor.<br/>Preferred Shelf Number&#160;QA76.585 .S43 2019<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119053385">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119053385</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Transformational security awareness : what neuroscientists, storytellers, and marketers can teach us about driving secure behaviors ent://SD_ILS/0/SD_ILS:595304 2026-03-04T03:59:58Z 2026-03-04T03:59:58Z Author&#160;Carpenter, Perry, author.<br/>Preferred Shelf Number&#160;QA76.9 .A25 C37 2019 EB<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119566380">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119566380</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> MDM : Fundamentals, Security, and the Modern Desktop: Using Intune, Autopilot, and Azure to Manage, Deploy, and Secure Windows 10 ent://SD_ILS/0/SD_ILS:595373 2026-03-04T03:59:58Z 2026-03-04T03:59:58Z Author&#160;Moskowitz, Jeremy.&#160;Rose, Stephen.<br/>Preferred Shelf Number&#160;TK5103.4883 .M67 2019<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119564362">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119564362</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cybersecurity program development for business : the essential planning guide ent://SD_ILS/0/SD_ILS:594455 2026-03-04T03:59:58Z 2026-03-04T03:59:58Z Author&#160;Moschovitis, Christos J. P., author.<br/>Preferred Shelf Number&#160;HD30.2<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119430018">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119430018</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Functional software size measurement methodology with effort estimation and performance indication ent://SD_ILS/0/SD_ILS:593623 2026-03-04T03:59:58Z 2026-03-04T03:59:58Z Author&#160;Singh, Jasveer, 1955- author.<br/>Preferred Shelf Number&#160;QA76.76 .S65 S56 2017 EB<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119238126">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119238126</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/>