Search Results for Computer security. - Narrowed by: Computer security
SirsiDynix Enterprise
https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dComputer$002bsecurity.$0026qf$003dSUBJECT$002509Subject$002509Computer$002bsecurity$002509Computer$002bsecurity$0026ic$003dtrue$0026ps$003d300?
2026-01-22T20:16:51Z
Computer science security : concepts and tools
ent://SD_ILS/0/SD_ILS:597739
2026-01-22T20:16:51Z
2026-01-22T20:16:51Z
Author Zaidoun, Ameur Salem, author.<br/>Preferred Shelf Number QA76.9 .A25 Z35 2022<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394163847">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394163847</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
AI-Enabled Threat Intelligence and Cyber Risk Assessment
ent://SD_ILS/0/SD_ILS:582312
2026-01-22T20:16:51Z
2026-01-22T20:16:51Z
Author Martiri, Edlira, editor Vajjhala, Narasimha, 1978- editor. Dalipi, Fisnik, editor<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003504979">https://www.taylorfrancis.com/books/9781003504979</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security technologies for law enforcement agencies
ent://SD_ILS/0/SD_ILS:589138
2026-01-22T20:16:51Z
2026-01-22T20:16:51Z
Author Duraklar, Kazım author.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003597445">https://www.taylorfrancis.com/books/9781003597445</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Protecting and mitigating against cyber threats : deploying artificial intelligence and machine learning
ent://SD_ILS/0/SD_ILS:599999
2026-01-22T20:16:51Z
2026-01-22T20:16:51Z
Author Mohanty, Sachi Nandan, editor.<br/>Preferred Shelf Number QA76.9 .A25 P76 2025<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394305216">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394305216</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cyber defense : best practices for digital safety
ent://SD_ILS/0/SD_ILS:600003
2026-01-22T20:16:51Z
2026-01-22T20:16:51Z
Author Edwards, Jason, author.<br/>Preferred Shelf Number QA76.9 .A25 E39 2025<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394337040">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394337040</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Protection of electrical power distribution systems : smart grid, microgrid, AI, and cyber security
ent://SD_ILS/0/SD_ILS:600371
2026-01-22T20:16:51Z
2026-01-22T20:16:51Z
Author Masood, Tariq, author. Abdo, Jamil, author. Iqbal, Atif, author.<br/>Preferred Shelf Number TK3001 .M37 2026<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394327676">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394327676</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Hacking Interface
ent://SD_ILS/0/SD_ILS:524308
2026-01-22T20:16:51Z
2026-01-22T20:16:51Z
Author Elbahadır, Hamza.<br/>Preferred Shelf Number QA76.9.A25 E43 2024<br/>Format: Books<br/>Availability Beytepe Library~1<br/>
The DevSecOps playbook : deliver continuous security at speed
ent://SD_ILS/0/SD_ILS:598634
2026-01-22T20:16:51Z
2026-01-22T20:16:51Z
Author Mack, Sean D., author.<br/>Preferred Shelf Number QA76.9 .A25 M33 2024<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394189281">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394189281</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Wireless communication in cyber security
ent://SD_ILS/0/SD_ILS:598705
2026-01-22T20:16:51Z
2026-01-22T20:16:51Z
Author Sountharrajan, S. editor Maheswar, R. editor Rathee, Geetanjali, editor Akila, M. editor<br/>Preferred Shelf Number QA76.9 .A25 W57 2023<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119910619">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119910619</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Sustainably investing in digital assets globally
ent://SD_ILS/0/SD_ILS:597764
2026-01-22T20:16:51Z
2026-01-22T20:16:51Z
Author Ozelli, Selva, author.<br/>Preferred Shelf Number HG4515.15 .O38 2023<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394320530">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394320530</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cybercrime during the SARS-CoV-2 pandemic (2019-2022)
ent://SD_ILS/0/SD_ILS:598517
2026-01-22T20:16:51Z
2026-01-22T20:16:51Z
Author Ventre, Daniel, editor. Loiseau, Hugo, 1974- editor.<br/>Preferred Shelf Number HV6773 .C93 2023<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394226344">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394226344</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Quantum computing in cybersecurity
ent://SD_ILS/0/SD_ILS:598685
2026-01-22T20:16:51Z
2026-01-22T20:16:51Z
Author Rawat, Romil, editor.<br/>Preferred Shelf Number QA76.9 .A25 Q83 2023<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394167401">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394167401</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cyber investigations : a research based textbook for advanced studies
ent://SD_ILS/0/SD_ILS:597931
2026-01-22T20:16:51Z
2026-01-22T20:16:51Z
Author Årnes, André, 1976- editor.<br/>Preferred Shelf Number HV8079 .C65 C933 2023<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119582021">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119582021</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Dijital güvenlik : dijital ortamlarda güvenle var olmak
ent://SD_ILS/0/SD_ILS:517179
2026-01-22T20:16:51Z
2026-01-22T20:16:51Z
Author Özer, Fatih. Şahin, Yusuf Levent, editör<br/>Preferred Shelf Number QA76.9.E74 O94 2022<br/>Format: Books<br/>Availability Beytepe Library~1<br/>
Cybersecurity and local government
ent://SD_ILS/0/SD_ILS:597392
2026-01-22T20:16:51Z
2026-01-22T20:16:51Z
Author Norris, Donald F., author. Mateczun, Laura, author. Forno, Richard, author.<br/>Preferred Shelf Number JS331 .N67 2022<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119788317">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119788317</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Blockchain security from the bottom up : securing and preventing attacks on cryptocurrencies, decentralized applications, nfts, and smart contracts
ent://SD_ILS/0/SD_ILS:597703
2026-01-22T20:16:51Z
2026-01-22T20:16:51Z
Author Poston, Howard E., III, author.<br/>Preferred Shelf Number QA76.9 .B56 P67 2022<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394320691">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394320691</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Trust-based communication systems for internet of things applications
ent://SD_ILS/0/SD_ILS:597744
2026-01-22T20:16:51Z
2026-01-22T20:16:51Z
Author Madaan, Vishu, editor. Agrawal, Prateek, editor. Sharma, Anand, editor. Sharma, Dilip Kumar, editor. Agrawal, Akshat, 1986- editor.<br/>Preferred Shelf Number TK5105.8857<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119896746">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119896746</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Executive's guide to cyber risk : securing the future today
ent://SD_ILS/0/SD_ILS:597567
2026-01-22T20:16:51Z
2026-01-22T20:16:51Z
Author Moyo, Siegfried, author.<br/>Preferred Shelf Number HF5548.37 .M68 2022<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394320578">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394320578</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cybersecurity in smart homes : architectures, solutions and technologies
ent://SD_ILS/0/SD_ILS:597626
2026-01-22T20:16:51Z
2026-01-22T20:16:51Z
Author Khatoun, Rida, author.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119987451">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119987451</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
The official (ISC)2 CCSP CBK reference
ent://SD_ILS/0/SD_ILS:596879
2026-01-22T20:16:51Z
2026-01-22T20:16:51Z
Author Fife, Leslie, author. Kraus, Aaron, author. Lewis, Bryan, author.<br/>Preferred Shelf Number QA76.585<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119603399">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119603399</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
You can stop stupid : stopping losses from accidental and malicious actions
ent://SD_ILS/0/SD_ILS:596502
2026-01-22T20:16:51Z
2026-01-22T20:16:51Z
Author Winkler, Ira, author. Brown, Tracy Celaya, author.<br/>Preferred Shelf Number HD61.5 .W55 2021<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119623946">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119623946</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security issues and privacy concerns in Industry 4.0 applications
ent://SD_ILS/0/SD_ILS:596945
2026-01-22T20:16:51Z
2026-01-22T20:16:51Z
Author David, Shiblin, author. Anand, R. S., author. Jeyakrishnan, V., author. Niranjanamurthy, M., author.<br/>Preferred Shelf Number QA76.9 .A25 D38 2021<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119776529">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119776529</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Data privacy and GDPR handbook
ent://SD_ILS/0/SD_ILS:595643
2026-01-22T20:16:51Z
2026-01-22T20:16:51Z
Author Sharma, Sanjay (Financial executive), author. Menon, Pranav, contributor.<br/>Preferred Shelf Number KJE6071<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119594307">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119594307</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Tribe of hackers red team : tribal knowledge from the best in offensive cybersecurity
ent://SD_ILS/0/SD_ILS:595415
2026-01-22T20:16:51Z
2026-01-22T20:16:51Z
Author Carey, Marcus J. (Cybersecurity professional), author. Jin, Jennifer, author.<br/>Preferred Shelf Number QA76.9 .A25 C368 2019<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119643357">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119643357</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Tribe of hackers : cybersecurity advice from the best hackers in the world
ent://SD_ILS/0/SD_ILS:595418
2026-01-22T20:16:51Z
2026-01-22T20:16:51Z
Author Carey, Marcus J. (Cybersecurity professional), author. Jin, Jennifer, author.<br/>Preferred Shelf Number QA76.9 .A25 C37 2019 EB<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119643395">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119643395</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Digital forensics
ent://SD_ILS/0/SD_ILS:593346
2026-01-22T20:16:51Z
2026-01-22T20:16:51Z
Author Årnes, André, 1976- editor.<br/>Preferred Shelf Number HV8079 .C65<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119262442">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119262442</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Insider threats
ent://SD_ILS/0/SD_ILS:594407
2026-01-22T20:16:51Z
2026-01-22T20:16:51Z
Author Arduin, Pierre-Emmanuel, author.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119419785">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119419785</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Wireshark for security professionals : using Wireshark and the Metasploit Framework
ent://SD_ILS/0/SD_ILS:593472
2026-01-22T20:16:51Z
2026-01-22T20:16:51Z
Author Bullock, Jessey, author. Gordon, Adam, author.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119183457">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119183457</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Hacking the hacker : learn from the experts who take down hackers
ent://SD_ILS/0/SD_ILS:593636
2026-01-22T20:16:51Z
2026-01-22T20:16:51Z
Author Grimes, Roger A., author.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119396260">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119396260</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cybersecurity essentials
ent://SD_ILS/0/SD_ILS:594756
2026-01-22T20:16:51Z
2026-01-22T20:16:51Z
Author Brooks, Charles J., author. Grow, Christopher, author. Craig, Philip, author. Short, Donald, author.<br/>Preferred Shelf Number TK5105.59<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119369141">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119369141</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Ethical hacking : offensive & defensive
ent://SD_ILS/0/SD_ILS:513450
2026-01-22T20:16:51Z
2026-01-22T20:16:51Z
Author Çıtak, Ömer.<br/>Preferred Shelf Number QA76.9.A25 C58 2016<br/>Format: Books<br/>Availability Beytepe Library~1<br/>
Hacking Interface
ent://SD_ILS/0/SD_ILS:513452
2026-01-22T20:16:51Z
2026-01-22T20:16:51Z
Author Elbahadır, Hamza.<br/>Preferred Shelf Number QA76.9.A25 E43 2016<br/>Format: Books<br/>Availability Beytepe Library~1<br/>
Java programlama diliyle kriptoloji uygulamaları
ent://SD_ILS/0/SD_ILS:380319
2026-01-22T20:16:51Z
2026-01-22T20:16:51Z
Author Bodur, Hüseyin<br/>Preferred Shelf Number QA76.9.A25 B63 2016<br/>Format: Books<br/>Availability Beytepe Library~1<br/>
Siber güvenlik ve elektronik bileşenleri
ent://SD_ILS/0/SD_ILS:380281
2026-01-22T20:16:51Z
2026-01-22T20:16:51Z
Author Ünal, Ahmet Naci<br/>Preferred Shelf Number UG485 U53 2015<br/>Format: Books<br/>Availability Beytepe Library~1<br/>
Hacking Interface
ent://SD_ILS/0/SD_ILS:317847
2026-01-22T20:16:51Z
2026-01-22T20:16:51Z
Author Elbahadır, Hamza.<br/>Preferred Shelf Number QA 76.9 A25 E43 2014<br/>Format: Books<br/>Availability Beytepe Library~2<br/>