Search Results for Computer Security. - Narrowed by: IGI Global, publisher. SirsiDynix Enterprise https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dComputer$002bSecurity.$0026qf$003dAUTHOR$002509Author$002509IGI$002bGlobal$00252C$002bpublisher.$002509IGI$002bGlobal$00252C$002bpublisher.$0026ps$003d300? 2024-10-26T22:40:17Z Exploring security in software architecture and design ent://SD_ILS/0/SD_ILS:481871 2024-10-26T22:40:17Z 2024-10-26T22:40:17Z Author&#160;Felderer, Michael, editor.&#160;Scandariato, Riccardo, editor.&#160;IGI Global, publisher.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-6313-6">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-6313-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Machine learning and cognitive science applications in cyber security ent://SD_ILS/0/SD_ILS:482151 2024-10-26T22:40:17Z 2024-10-26T22:40:17Z Author&#160;Khan, Muhammad Salman, author.&#160;IGI Global, publisher.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-8100-0">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-8100-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Countering cyber attacks and preserving the integrity and availability of critical systems ent://SD_ILS/0/SD_ILS:482177 2024-10-26T22:40:17Z 2024-10-26T22:40:17Z Author&#160;Geetha, S., 1979- editor.&#160;Phamila, Asnath Victy, 1978- editor.&#160;IGI Global, publisher.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-8241-0">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-8241-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Developments in information security and cybernetic wars ent://SD_ILS/0/SD_ILS:482187 2024-10-26T22:40:17Z 2024-10-26T22:40:17Z Author&#160;Sarfraz, Muhammad, editor.&#160;IGI Global, publisher.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-8304-2">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-8304-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cyber law, privacy, and security : concepts, methodologies, tools, and applications ent://SD_ILS/0/SD_ILS:482239 2024-10-26T22:40:17Z 2024-10-26T22:40:17Z Author&#160;IGI Global, publisher.&#160;Information Resources Management Association, editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-8897-9">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-8897-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Applying methods of scientific inquiry into intelligence, security, and counterterrorism ent://SD_ILS/0/SD_ILS:482248 2024-10-26T22:40:17Z 2024-10-26T22:40:17Z Author&#160;Sari, Arif, 1986- editor.&#160;IGI Global, publisher.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-8976-1">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-8976-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Network security and its impact on business strategy ent://SD_ILS/0/SD_ILS:482213 2024-10-26T22:40:17Z 2024-10-26T22:40:17Z Author&#160;Oncioiu, Ionica, 1972- editor.&#160;IGI Global, publisher.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-8455-1">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-8455-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Global cyber security labor shortage and international business risk ent://SD_ILS/0/SD_ILS:481810 2024-10-26T22:40:17Z 2024-10-26T22:40:17Z Author&#160;Christiansen, Bryan, 1960- editor.&#160;Piekarz, Agnieszka, 1990- editor.&#160;IGI Global, publisher.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-5927-6">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-5927-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Artificial intelligence and security challenges in emerging networks ent://SD_ILS/0/SD_ILS:481975 2024-10-26T22:40:17Z 2024-10-26T22:40:17Z Author&#160;Abassi, Ryma, 1980- editor.&#160;IGI Global, publisher.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-7353-1">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-7353-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Constructing an ethical hacking knowledge base for threat awareness and prevention ent://SD_ILS/0/SD_ILS:482044 2024-10-26T22:40:17Z 2024-10-26T22:40:17Z Author&#160;Dhavale, Sunita Vikrant, author.&#160;IGI Global, publisher.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-7628-0">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-7628-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advanced methodologies and technologies in system security, information privacy, and forensics ent://SD_ILS/0/SD_ILS:482009 2024-10-26T22:40:17Z 2024-10-26T22:40:17Z Author&#160;Khosrow-Pour, Mehdi, 1951- editor.&#160;IGI Global, publisher.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-7492-7">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-7492-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cybersecurity education for awareness and compliance ent://SD_ILS/0/SD_ILS:482092 2024-10-26T22:40:17Z 2024-10-26T22:40:17Z Author&#160;Vasileiou, Ismini, 1980- editor.&#160;Furnell, Steven, 1970- editor.&#160;IGI Global, publisher.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-7847-5">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-7847-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Detection and mitigation of insider attacks in a cloud infrastructure : emerging research and opportunities ent://SD_ILS/0/SD_ILS:482113 2024-10-26T22:40:17Z 2024-10-26T22:40:17Z Author&#160;Gunasekhar, T., 1990- author.&#160;Rao, K. Thirupathi, author.&#160;Kiran, P. Sai, author.&#160;Krishna Reddy, V., author.&#160;Rao, B. Thirumala, author.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-7924-3">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-7924-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Medical data security for bioengineers ent://SD_ILS/0/SD_ILS:482121 2024-10-26T22:40:17Z 2024-10-26T22:40:17Z Author&#160;Singh, Butta, 1981- editor.&#160;Saini, Barjinder Singh, 1970- editor.&#160;Singh, Dilbag, editor.&#160;Pandey, Anukul, editor.&#160;IGI Global, publisher.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-7952-6">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-7952-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security frameworks in contemporary electronic government ent://SD_ILS/0/SD_ILS:481820 2024-10-26T22:40:17Z 2024-10-26T22:40:17Z Author&#160;Abassi, Ryma, 1980- editor.&#160;Ben Chehida Douss, Aida, 1986- editor.&#160;IGI Global, publisher.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-5984-9">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-5984-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/>