Search Results for Development. - Narrowed by: Computer security. SirsiDynix Enterprise https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dDevelopment.$0026qf$003dSUBJECT$002509Subject$002509Computer$002bsecurity.$002509Computer$002bsecurity.$0026ps$003d300$0026isd$003dtrue? 2026-01-21T18:39:07Z Secure and resilient software development ent://SD_ILS/0/SD_ILS:545097 2026-01-21T18:39:07Z 2026-01-21T18:39:07Z Author&#160;Merkow, Mark S., author.&#160;Raghavan, Lakshmikanth.<br/>Preferred Shelf Number&#160;QA76.76 .D47 M466 2010<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781439826973">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> EMBEDDED SOFTWARE DEVELOPMENT FOR SAFETY-CRITICAL SYSTEMS ent://SD_ILS/0/SD_ILS:563010 2026-01-21T18:39:07Z 2026-01-21T18:39:07Z Author&#160;Hobbs, Chris (Christopher W.)<br/>Preferred Shelf Number&#160;QA76.76 .D47<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003598145">https://www.taylorfrancis.com/books/9781003598145</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cybersecurity and data science innovations for sustainable development of HEICC : healthcare, education, industry, cities and communities ent://SD_ILS/0/SD_ILS:568917 2026-01-21T18:39:07Z 2026-01-21T18:39:07Z Author&#160;Murugan, Thangavel, 1989- editor.&#160;W., Jaisingh, 1978- editor.<br/>Preferred Shelf Number&#160;QA76.9 .A25<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781032711300">https://www.taylorfrancis.com/books/9781032711300</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Development of Transport by Telematics 19th International Conference on Transport System Telematics, TST 2019, Jaworze, Poland, February 27 &ndash; March 2, 2019, Selected Papers ent://SD_ILS/0/SD_ILS:482729 2026-01-21T18:39:07Z 2026-01-21T18:39:07Z Author&#160;Mikulski, Jerzy. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-27547-1">https://doi.org/10.1007/978-3-030-27547-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Future Business Software Current Trends in Business Software Development ent://SD_ILS/0/SD_ILS:489323 2026-01-21T18:39:07Z 2026-01-21T18:39:07Z Author&#160;Brunetti, Gino. editor.&#160;Feld, Thomas. editor.&#160;Heuser, Lutz. editor.&#160;Schnitter, Joachim. editor.&#160;Webel, Christian. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-04144-5">https://doi.org/10.1007/978-3-319-04144-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information security policy development for compliance : ISO/IEC 27001, NIST SP 800-53, HIPAA standard, PCI DSS V2.0, and AUP V5.0 ent://SD_ILS/0/SD_ILS:545128 2026-01-21T18:39:07Z 2026-01-21T18:39:07Z Author&#160;Williams, Barry L., author.<br/>Preferred Shelf Number&#160;QA76.9 .A25 .W5495 2013<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781466580596">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> Embedded systems security practical methods for safe and secure software and systems development ent://SD_ILS/0/SD_ILS:146451 2026-01-21T18:39:07Z 2026-01-21T18:39:07Z Author&#160;Kleidermacher, David.&#160;Kleidermacher, Mike.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780123868862">http://www.sciencedirect.com/science/book/9780123868862</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security software development : assessing and managing security risks ent://SD_ILS/0/SD_ILS:543836 2026-01-21T18:39:07Z 2026-01-21T18:39:07Z Author&#160;Ashbaugh, Douglas A., author.<br/>Preferred Shelf Number&#160;QA76.9 .A25 A8246 2009<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781420063813">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> Metasploit toolkit for penetration testing, exploit development, and vulnerability research ent://SD_ILS/0/SD_ILS:306469 2026-01-21T18:39:07Z 2026-01-21T18:39:07Z Author&#160;Maynor, David.&#160;Mookhey, K. K.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490740">http://www.sciencedirect.com/science/book/9781597490740</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Metasploit Toolkit for Penetration Testing, Exploit Development, And Vulnerabiity Research ent://SD_ILS/0/SD_ILS:112179 2026-01-21T18:39:07Z 2026-01-21T18:39:07Z Author&#160;ScienceDirect (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490740">An electronic book accessible through the World Wide Web; click for information</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Metasploit Toolkit for Penetration Testing, Exploit Development, And Vulnerabiity Research ent://SD_ILS/0/SD_ILS:147051 2026-01-21T18:39:07Z 2026-01-21T18:39:07Z Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490740">http://www.sciencedirect.com/science/book/9781597490740</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> FROM SMART CITIES TO THE METAVERSE a journey through cybersecurity, ai, and Urban Sustainability. ent://SD_ILS/0/SD_ILS:591060 2026-01-21T18:39:07Z 2026-01-21T18:39:07Z Preferred Shelf Number&#160;Q335<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003619819">https://www.taylorfrancis.com/books/9781003619819</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Software Vulnerability Discovery Process : Concepts and Applications ent://SD_ILS/0/SD_ILS:557374 2026-01-21T18:39:07Z 2026-01-21T18:39:07Z Author&#160;Anand, Adarsh, author.&#160;Bhatt, Navneet, author.&#160;Alhazmi, Omar H., editor.<br/>Preferred Shelf Number&#160;QA76.9 .A25<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9788770046176">https://www.taylorfrancis.com/books/9788770046176</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Agile security in the digital era : challenges and cybersecurity trends ent://SD_ILS/0/SD_ILS:563898 2026-01-21T18:39:07Z 2026-01-21T18:39:07Z Author&#160;Zaydi, Mounia, editor.<br/>Preferred Shelf Number&#160;QA76.9 .A25 A414 2025<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003478676">https://www.taylorfrancis.com/books/9781003478676</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Generative AI, cybersecurity, and ethics ent://SD_ILS/0/SD_ILS:599597 2026-01-21T18:39:07Z 2026-01-21T18:39:07Z Author&#160;Islam, Ray (Mohammad Rubyet), author.<br/>Preferred Shelf Number&#160;QA76.9 .A25<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394279326">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394279326</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Alice and Bob learn secure coding ent://SD_ILS/0/SD_ILS:599664 2026-01-21T18:39:07Z 2026-01-21T18:39:07Z Author&#160;Janca, Tanya. author.<br/>Preferred Shelf Number&#160;QA76.76 .D47<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394277179">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394277179</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Taming the hacking storm : a framework for securing and defending networks ent://SD_ILS/0/SD_ILS:599858 2026-01-21T18:39:07Z 2026-01-21T18:39:07Z Author&#160;Grimes, Roger A., author.<br/>Preferred Shelf Number&#160;QA76.9 .A25 G75 2025<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394352289">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394352289</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Next-generation systems and secure computing ent://SD_ILS/0/SD_ILS:599779 2026-01-21T18:39:07Z 2026-01-21T18:39:07Z Author&#160;Barman, Subhabrata, editor.&#160;Koley, Santanu, editor.&#160;Joardar, Subhankar, editor.<br/>Preferred Shelf Number&#160;QA76.9 .A25 N49 2025<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394228522">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394228522</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> The techno-legal dynamics of cyber crimes in Industry 5.0 ent://SD_ILS/0/SD_ILS:599801 2026-01-21T18:39:07Z 2026-01-21T18:39:07Z Author&#160;Kaur, Gagandeep, editor&#160;Choudhury, Tanupriya editor&#160;Balamurugan, S. editor<br/>Preferred Shelf Number&#160;QA76.9 .A25<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394242177">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394242177</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Realizing the Metaverse : a communications and networking perspective ent://SD_ILS/0/SD_ILS:599057 2026-01-21T18:39:07Z 2026-01-21T18:39:07Z Author&#160;Lim, Wei Yang Bryan, editor.&#160;Xiong, Zehui, editor.&#160;Niyato, Dusit, editor.&#160;Zhang, Junshan (Electrical engineer), editor.&#160;Shen, X. (Xuemin), 1958- editor.<br/>Preferred Shelf Number&#160;TK5105.8864 .R43 2024<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394188932">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394188932</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cyber Operations : A Case Study Approach ent://SD_ILS/0/SD_ILS:599117 2026-01-21T18:39:07Z 2026-01-21T18:39:07Z Author&#160;Couretas, Jerry M., 1966- author.<br/>Preferred Shelf Number&#160;QA76.9 .A25<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119712121">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119712121</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> The DevSecOps playbook : deliver continuous security at speed ent://SD_ILS/0/SD_ILS:598634 2026-01-21T18:39:07Z 2026-01-21T18:39:07Z Author&#160;Mack, Sean D., author.<br/>Preferred Shelf Number&#160;QA76.9 .A25 M33 2024<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394189281">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394189281</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> The cybersecurity guide to governance, risk, and compliance ent://SD_ILS/0/SD_ILS:598945 2026-01-21T18:39:07Z 2026-01-21T18:39:07Z Author&#160;Edwards, Jason (Cybersecurity expert), author.&#160;Weaver, Griffin, author.<br/>Preferred Shelf Number&#160;HD30.38 .E34 2024<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394250226">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394250226</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> CYBERSECURITY IN THE TRANSPORTATION INDUSTRY. ent://SD_ILS/0/SD_ILS:599238 2026-01-21T18:39:07Z 2026-01-21T18:39:07Z Preferred Shelf Number&#160;HE194 .C93 2024<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394204472">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394204472</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Software security : concepts &amp; practices ent://SD_ILS/0/SD_ILS:570473 2026-01-21T18:39:07Z 2026-01-21T18:39:07Z Author&#160;Khan, Suhel Ahmad, author.&#160;Kumar, Rajeev, author.&#160;Khan, R. A. (Raees Ahmad), author.<br/>Preferred Shelf Number&#160;QA76.76 .D47<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003330516">https://www.taylorfrancis.com/books/9781003330516</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Quantum computing in cybersecurity ent://SD_ILS/0/SD_ILS:598685 2026-01-21T18:39:07Z 2026-01-21T18:39:07Z Author&#160;Rawat, Romil, editor.<br/>Preferred Shelf Number&#160;QA76.9 .A25 Q83 2023<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394167401">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394167401</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Wireless communication in cyber security ent://SD_ILS/0/SD_ILS:598705 2026-01-21T18:39:07Z 2026-01-21T18:39:07Z Author&#160;Sountharrajan, S. editor&#160;Maheswar, R. editor&#160;Rathee, Geetanjali, editor&#160;Akila, M. editor<br/>Preferred Shelf Number&#160;QA76.9 .A25 W57 2023<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119910619">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119910619</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Practical Security for Agile and DevOps. ent://SD_ILS/0/SD_ILS:584880 2026-01-21T18:39:07Z 2026-01-21T18:39:07Z Author&#160;Merkow, Mark S.<br/>Preferred Shelf Number&#160;QA76.9 .A25<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003265566">https://www.taylorfrancis.com/books/9781003265566</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Managing cybersecurity in the process industries ent://SD_ILS/0/SD_ILS:597508 2026-01-21T18:39:07Z 2026-01-21T18:39:07Z Author&#160;American Institute of Chemical Engineers. Center for Chemical Process Safety.<br/>Preferred Shelf Number&#160;TP155.7<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119861812">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119861812</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Trust-based communication systems for internet of things applications ent://SD_ILS/0/SD_ILS:597744 2026-01-21T18:39:07Z 2026-01-21T18:39:07Z Author&#160;Madaan, Vishu, editor.&#160;Agrawal, Prateek, editor.&#160;Sharma, Anand, editor.&#160;Sharma, Dilip Kumar, editor.&#160;Agrawal, Akshat, 1986- editor.<br/>Preferred Shelf Number&#160;TK5105.8857<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119896746">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119896746</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cyber security and digital forensics ent://SD_ILS/0/SD_ILS:597326 2026-01-21T18:39:07Z 2026-01-21T18:39:07Z Author&#160;Ghonge, Mangesh, 1984- editor.<br/>Preferred Shelf Number&#160;QA76.9 .A25<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119795667">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119795667</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> NANOELECTRONIC DEVICES FOR HARDWARE AND SOFTWARE SECURITY ent://SD_ILS/0/SD_ILS:552865 2026-01-21T18:39:07Z 2026-01-21T18:39:07Z Author&#160;Raj, Balwinder.&#160;Singh, Arun Kumar.<br/>Preferred Shelf Number&#160;TK7874.84<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003126645">https://www.taylorfrancis.com/books/9781003126645</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Building in Security at Agile Speed ent://SD_ILS/0/SD_ILS:569102 2026-01-21T18:39:07Z 2026-01-21T18:39:07Z Author&#160;Ransome, James.&#160;Schoenfield, Brook S. E.<br/>Preferred Shelf Number&#160;QA76.9 .A25<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003002451">https://www.taylorfrancis.com/books/9781003002451</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security issues and privacy concerns in Industry 4.0 applications ent://SD_ILS/0/SD_ILS:596945 2026-01-21T18:39:07Z 2026-01-21T18:39:07Z Author&#160;David, Shiblin, author.&#160;Anand, R. S., author.&#160;Jeyakrishnan, V., author.&#160;Niranjanamurthy, M., author.<br/>Preferred Shelf Number&#160;QA76.9 .A25 D38 2021<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119776529">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119776529</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Artificial intelligence and data mining approaches in security frameworks ent://SD_ILS/0/SD_ILS:596957 2026-01-21T18:39:07Z 2026-01-21T18:39:07Z Author&#160;Bhargava, Neeraj.&#160;Bhargava, Ritu.&#160;Rathore, Pramod Singh, 1988-&#160;Agrawal, Rashmi, 1978-<br/>Preferred Shelf Number&#160;Q335<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119760429">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119760429</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Blockchain for cybersecurity and privacy : architectures, challenges, and applications ent://SD_ILS/0/SD_ILS:576800 2026-01-21T18:39:07Z 2026-01-21T18:39:07Z Author&#160;Maleh, Yassine, 1987- editor.<br/>Preferred Shelf Number&#160;QA76.9 .B56 B55 2020 EB<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9780429324932">https://www.taylorfrancis.com/books/9780429324932</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cybersecurity and decision makers : data security and digital trust ent://SD_ILS/0/SD_ILS:595943 2026-01-21T18:39:07Z 2026-01-21T18:39:07Z Author&#160;Fr&eacute;minville, Marie de, author.<br/>Preferred Shelf Number&#160;HF5548.37 .F74 2020<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119720362">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119720362</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Artificial intelligence, cybersecurity and cyber defense ent://SD_ILS/0/SD_ILS:596423 2026-01-21T18:39:07Z 2026-01-21T18:39:07Z Author&#160;Ventre, Daniel, author.<br/>Preferred Shelf Number&#160;Q335 .V46 2020 EB<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119788195">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119788195</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security engineering : a guide to building dependable distributed systems ent://SD_ILS/0/SD_ILS:596480 2026-01-21T18:39:07Z 2026-01-21T18:39:07Z Author&#160;Anderson, Ross. http://viaf.org/viaf/sourceID/LC%7cnb2004300232<br/>Preferred Shelf Number&#160;QA76.9 .A25<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119644682">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119644682</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cybersecurity blue team toolkit ent://SD_ILS/0/SD_ILS:595209 2026-01-21T18:39:07Z 2026-01-21T18:39:07Z Author&#160;Tanner, Nadean H., author.<br/>Preferred Shelf Number&#160;QA76.9 .A25 T36 2019 EB<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119552963">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119552963</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Digital forensics ent://SD_ILS/0/SD_ILS:593346 2026-01-21T18:39:07Z 2026-01-21T18:39:07Z Author&#160;&Aring;rnes, Andr&eacute;, 1976- editor.<br/>Preferred Shelf Number&#160;HV8079 .C65<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119262442">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119262442</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Social engineering : the science of human hacking ent://SD_ILS/0/SD_ILS:594635 2026-01-21T18:39:07Z 2026-01-21T18:39:07Z Author&#160;Hadnagy, Christopher, author.<br/>Preferred Shelf Number&#160;HM668 .H33 2018<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119433729">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119433729</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Hacking web apps detecting and preventing web application security problems ent://SD_ILS/0/SD_ILS:148161 2026-01-21T18:39:07Z 2026-01-21T18:39:07Z Author&#160;Shema, Mike.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597499514">http://www.sciencedirect.com/science/book/9781597499514</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Secure and resilient software : requirements, test cases, and testing methods ent://SD_ILS/0/SD_ILS:540156 2026-01-21T18:39:07Z 2026-01-21T18:39:07Z Author&#160;Merkow, Mark S., author.&#160;Raghavan, Lakshmikanth.<br/>Preferred Shelf Number&#160;QA76.76 .T48 M47 2012<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781439866221">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> Network and application security fundamentals and practices ent://SD_ILS/0/SD_ILS:541627 2026-01-21T18:39:07Z 2026-01-21T18:39:07Z Author&#160;Ganguly, Debashis., author.&#160;Lahiri, Shibamouli.<br/>Preferred Shelf Number&#160;TK5105.59 .G36 2012<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781466502451">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> Oracle Fusion middleware 11g architecture and management ent://SD_ILS/0/SD_ILS:293252 2026-01-21T18:39:07Z 2026-01-21T18:39:07Z Author&#160;Shafii, Reza.&#160;Lee, Stephen, 1975 June 8-&#160;Konduri, Gangadhar.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://mhebooklibrary.com/reader/oracle-fusion-middleware-11g-architecture-management">Subscription required</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Hacking exposed Web 2.0 Web 2.0 security secrets and solutions ent://SD_ILS/0/SD_ILS:293352 2026-01-21T18:39:07Z 2026-01-21T18:39:07Z Author&#160;Cannings, Rich.&#160;Dwivedi, Himanshu.&#160;Lackey, Zane.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://mhebooklibrary.com/reader/hacking-exposed-web-20-security-secrets-solutions">Subscription required</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Web application obfuscation -/WAFs.. Evasion.. Filters//alert (/Obfuscation/)- ent://SD_ILS/0/SD_ILS:146922 2026-01-21T18:39:07Z 2026-01-21T18:39:07Z Author&#160;Heiderich, Mario.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597496049">http://www.sciencedirect.com/science/book/9781597496049</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> The security risk assessment handbook : a complete guide for performing security risk assessments ent://SD_ILS/0/SD_ILS:539743 2026-01-21T18:39:07Z 2026-01-21T18:39:07Z Author&#160;Landoll, Douglas J., author.<br/>Preferred Shelf Number&#160;HF5548.37 .L358 2011<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781439821497">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> Official (ISC)2 guide to the CSSLP ent://SD_ILS/0/SD_ILS:541754 2026-01-21T18:39:07Z 2026-01-21T18:39:07Z Author&#160;Paul, Mano., author.<br/>Preferred Shelf Number&#160;QA76.76 .D47 P3775 2011<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781439826065">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> Official (ISC)2 guide to the ISSMP CBK ent://SD_ILS/0/SD_ILS:544375 2026-01-21T18:39:07Z 2026-01-21T18:39:07Z Author&#160;Tipton, Harold F.<br/>Preferred Shelf Number&#160;QA76.9 .A25 O34 2011<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781420094442">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> Risk analysis and security countermeasure selection ent://SD_ILS/0/SD_ILS:539402 2026-01-21T18:39:07Z 2026-01-21T18:39:07Z Author&#160;Norman, Thomas L., author.<br/>Preferred Shelf Number&#160;HV8290 .N67 2010<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781420078718">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> Information security management metrics : a definitive guide to effective security monitoring and measurement ent://SD_ILS/0/SD_ILS:546952 2026-01-21T18:39:07Z 2026-01-21T18:39:07Z Author&#160;Brotby, W. Krag., author.<br/>Preferred Shelf Number&#160;HD30.2 .B78 2009<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781420052862">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> Information security : design, implementation, measurement, and compliance ent://SD_ILS/0/SD_ILS:545839 2026-01-21T18:39:07Z 2026-01-21T18:39:07Z Author&#160;Layton, Timothy P., author.<br/>Preferred Shelf Number&#160;HF5548.37 .L393 2007<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781420013412">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> Information security policies, procedures, and standards : guidelines for effective information security management ent://SD_ILS/0/SD_ILS:546817 2026-01-21T18:39:07Z 2026-01-21T18:39:07Z Author&#160;Peltier, Thomas R., author.<br/>Preferred Shelf Number&#160;QA76.9 .A25 P46 2002<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9780849390326">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> Securing e-business applications and communications ent://SD_ILS/0/SD_ILS:545821 2026-01-21T18:39:07Z 2026-01-21T18:39:07Z Author&#160;Held, Jonathan S., author.&#160;Bowers, John R.<br/>Preferred Shelf Number&#160;QA76.9 .A25 H435 2001<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781420031553">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/>