Search Results for Cyber intelligence (Computer security) - Narrowed by: Wiley E-Book Collection
SirsiDynix Enterprise
https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dCyber$002bintelligence$002b$002528Computer$002bsecurity$002529$0026qf$003dLOCATION$002509Shelf$002bLocation$0025091$00253AWILEY$002509Wiley$002bE-Book$002bCollection$0026ps$003d300?
2026-03-01T18:28:08Z
Cyber threat intelligence
ent://SD_ILS/0/SD_ILS:598051
2026-03-01T18:28:08Z
2026-03-01T18:28:08Z
Author Lee, Martin (Computer security expert), author.<br/>Preferred Shelf Number TK5105.59 .L47 2023<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119861775">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119861775</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cyber recon : my life in cyber espionage and ransomware negotiation
ent://SD_ILS/0/SD_ILS:600081
2026-03-01T18:28:08Z
2026-03-01T18:28:08Z
Author Minder, Kurtis, author.<br/>Preferred Shelf Number QA76.9 .A25 M56 2025<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394334643">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394334643</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Practical cyber intelligence : a hands-on guide to digital forensics
ent://SD_ILS/0/SD_ILS:599262
2026-03-01T18:28:08Z
2026-03-01T18:28:08Z
Author Jakobsen, Adam Tilmar, author.<br/>Preferred Shelf Number HV8079 .C65 J633 2024<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394256129">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394256129</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cyber investigations : a research based textbook for advanced studies
ent://SD_ILS/0/SD_ILS:597931
2026-03-01T18:28:08Z
2026-03-01T18:28:08Z
Author Årnes, André, 1976- editor.<br/>Preferred Shelf Number HV8079 .C65 C933 2023<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119582021">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119582021</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cyber intelligence-driven risk : how to build and use cyber intelligence for business risk decisions
ent://SD_ILS/0/SD_ILS:596265
2026-03-01T18:28:08Z
2026-03-01T18:28:08Z
Author Moore, Richard O., III, 1971- author.<br/>Preferred Shelf Number HD61.5 .M66 2021<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119676942">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119676942</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Artificial intelligence and data mining approaches in security frameworks
ent://SD_ILS/0/SD_ILS:596957
2026-03-01T18:28:08Z
2026-03-01T18:28:08Z
Author Bhargava, Neeraj. Bhargava, Ritu. Rathore, Pramod Singh, 1988- Agrawal, Rashmi, 1978-<br/>Preferred Shelf Number Q335<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119760429">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119760429</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>