Search Results for Example. - Narrowed by: Security.
SirsiDynix Enterprise
https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dExample.$0026qf$003dSUBJECT$002509Subject$002509Security.$002509Security.$0026ic$003dtrue$0026ps$003d300$0026isd$003dtrue?
2026-02-28T12:48:24Z
Deep learning for intrusion detection : techniques and applications
ent://SD_ILS/0/SD_ILS:600319
2026-02-28T12:48:24Z
2026-02-28T12:48:24Z
Author Masoodi, Faheem Syeed, editor. Bamhdi, Alwi, editor.<br/>Preferred Shelf Number TK5105.59 .D44 2026<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394285198">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394285198</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
The cybersecurity control playbook : from fundamentals to advanced strategies
ent://SD_ILS/0/SD_ILS:599789
2026-02-28T12:48:24Z
2026-02-28T12:48:24Z
Author Edwards, Jason (Cybersecurity expert), author. John Wiley & Sons, publisher.<br/>Preferred Shelf Number QA76.9 .A25 E3884 2025<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394331888">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394331888</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Stepping through cybersecurity risk management : a systems thinking approach
ent://SD_ILS/0/SD_ILS:599021
2026-02-28T12:48:24Z
2026-02-28T12:48:24Z
Author Bayuk, Jennifer L., author.<br/>Preferred Shelf Number QA76.9 .A25 B39 2024<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394213986">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394213986</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cyber Operations : A Case Study Approach
ent://SD_ILS/0/SD_ILS:599117
2026-02-28T12:48:24Z
2026-02-28T12:48:24Z
Author Couretas, Jerry M., 1966- author.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119712121">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119712121</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
CYBERSECURITY IN THE TRANSPORTATION INDUSTRY.
ent://SD_ILS/0/SD_ILS:599238
2026-02-28T12:48:24Z
2026-02-28T12:48:24Z
Preferred Shelf Number HE194 .C93 2024<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394204472">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394204472</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cyber threat intelligence
ent://SD_ILS/0/SD_ILS:598051
2026-02-28T12:48:24Z
2026-02-28T12:48:24Z
Author Lee, Martin (Computer security expert), author.<br/>Preferred Shelf Number TK5105.59 .L47 2023<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119861775">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119861775</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Hacking connected cars : tactics, techniques, and procedures
ent://SD_ILS/0/SD_ILS:595843
2026-02-28T12:48:24Z
2026-02-28T12:48:24Z
Author Knight, Alissa, author.<br/>Preferred Shelf Number TL152.8 .K65 2020<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119491774">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119491774</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
5G explained : security and deployment of advanced mobile communications
ent://SD_ILS/0/SD_ILS:594896
2026-02-28T12:48:24Z
2026-02-28T12:48:24Z
Author Penttinen, Jyrki T. J., author.<br/>Preferred Shelf Number TK5103.483 .P46 2019<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119275695">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119275695</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Blockchain for distributed systems security
ent://SD_ILS/0/SD_ILS:595146
2026-02-28T12:48:24Z
2026-02-28T12:48:24Z
Author Shetty, Sachin, editor. Kamhoua, Charles A., edtior. Njilla, Laurent L., editor.<br/>Preferred Shelf Number QA76.9 .B56 B56 2019 EB<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119519621">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119519621</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cybersecurity program development for business : the essential planning guide
ent://SD_ILS/0/SD_ILS:594455
2026-02-28T12:48:24Z
2026-02-28T12:48:24Z
Author Moschovitis, Christos J. P., author.<br/>Preferred Shelf Number HD30.2<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119430018">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119430018</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>