Search Results for Human - Narrowed by: Computer security. SirsiDynix Enterprise https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dHuman$0026qf$003dSUBJECT$002509Konu$002509Computer$002bsecurity.$002509Computer$002bsecurity.$0026ic$003dtrue$0026ps$003d300$0026isd$003dtrue? 2026-01-27T16:43:48Z Psybersecurity : human factors of cyber defence ent://SD_ILS/0/SD_ILS:570825 2026-01-27T16:43:48Z 2026-01-27T16:43:48Z Author&#160;Guidetti, Oliver, author, editor.&#160;&#256;hameda, Mahiuddina, author, editor.&#160;Speelman, Craig P., editor.<br/>Preferred Shelf Number&#160;QA76.9 .A25<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781032664859">https://www.taylorfrancis.com/books/9781032664859</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cybersecurity Systems for Human Cognition Augmentation ent://SD_ILS/0/SD_ILS:488504 2026-01-27T16:43:48Z 2026-01-27T16:43:48Z Author&#160;Pino, Robinson E. editor.&#160;Kott, Alexander. editor.&#160;Shevenell, Michael. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-10374-7">https://doi.org/10.1007/978-3-319-10374-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Social engineering : the science of human hacking ent://SD_ILS/0/SD_ILS:594635 2026-01-27T16:43:48Z 2026-01-27T16:43:48Z Author&#160;Hadnagy, Christopher, author.<br/>Preferred Shelf Number&#160;HM668 .H33 2018<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119433729">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119433729</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Social engineering : the art of human hacking ent://SD_ILS/0/SD_ILS:377976 2026-01-27T16:43:48Z 2026-01-27T16:43:48Z Author&#160;Hadnagy, Christopher.<br/>Preferred Shelf Number&#160;QA76.9.C66 H33 2011<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Behavioral insights in cybersecurity : a guide to digital human factors ent://SD_ILS/0/SD_ILS:567885 2026-01-27T16:43:48Z 2026-01-27T16:43:48Z Author&#160;Sachs, Dustin S., author.<br/>Preferred Shelf Number&#160;ZA3086.5 .C93<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003606345">https://www.taylorfrancis.com/books/9781003606345</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Forensic perspectives on cybercrime : human behaviour and cybersecurity ent://SD_ILS/0/SD_ILS:578172 2026-01-27T16:43:48Z 2026-01-27T16:43:48Z Author&#160;McAlaney, John, 1979- author.&#160;Hills, Peter J. (Lecturer), author.&#160;Cole, Terri, author.<br/>Preferred Shelf Number&#160;HV6773<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003300359">https://www.taylorfrancis.com/books/9781003300359</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cyber security threats and challenges facing human life ent://SD_ILS/0/SD_ILS:589706 2026-01-27T16:43:48Z 2026-01-27T16:43:48Z Author&#160;Shekokar, Narendra M., editor.&#160;Vasudevan, Hari (Engineer), editor.&#160;Durbha, Surya Srinivas, editor.&#160;Michalas, Antonis, editor.&#160;Nagarhalli, Tatwadarshi P., editor.<br/>Preferred Shelf Number&#160;QA76.9 .A25<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003218555">https://www.taylorfrancis.com/books/9781003218555</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Human Centered Computing 4th International Conference, HCC 2018, M&eacute;rida, Mexico, December, 5&ndash;7, 2018, Revised Selected Papers ent://SD_ILS/0/SD_ILS:484032 2026-01-27T16:43:48Z 2026-01-27T16:43:48Z Author&#160;Tang, Yong. editor.&#160;Zu, Qiaohong. editor.&#160;Rodr&iacute;guez Garc&iacute;a, Jos&eacute; G. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-15127-0">https://doi.org/10.1007/978-3-030-15127-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Human Aspects of IT for the Aged Population. Acceptance, Communication and Participation 4th International Conference, ITAP 2018, Held as Part of HCI International 2018, Las Vegas, NV, USA, July 15&ndash;20, 2018, Proceedings, Part I ent://SD_ILS/0/SD_ILS:400341 2026-01-27T16:43:48Z 2026-01-27T16:43:48Z Author&#160;Zhou, Jia. editor.&#160;Salvendy, Gavriel. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-92034-4">https://doi.org/10.1007/978-3-319-92034-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Human Aspects of IT for the Aged Population. Applications in Health, Assistance, and Entertainment 4th International Conference, ITAP 2018, Held as Part of HCI International 2018, Las Vegas, NV, USA, July 15&ndash;20, 2018, Proceedings, Part II ent://SD_ILS/0/SD_ILS:402673 2026-01-27T16:43:48Z 2026-01-27T16:43:48Z Author&#160;Zhou, Jia. editor.&#160;Salvendy, Gavriel. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-92037-5">https://doi.org/10.1007/978-3-319-92037-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Human-Computer Interaction. Interaction in Context 20th International Conference, HCI International 2018, Las Vegas, NV, USA, July 15&ndash;20, 2018, Proceedings, Part II ent://SD_ILS/0/SD_ILS:399910 2026-01-27T16:43:48Z 2026-01-27T16:43:48Z Author&#160;Kurosu, Masaaki. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-91244-8">https://doi.org/10.1007/978-3-319-91244-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Human-Computer Interaction. Interaction Technologies 20th International Conference, HCI International 2018, Las Vegas, NV, USA, July 15&ndash;20, 2018, Proceedings, Part III ent://SD_ILS/0/SD_ILS:400030 2026-01-27T16:43:48Z 2026-01-27T16:43:48Z Author&#160;Kurosu, Masaaki. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-91250-9">https://doi.org/10.1007/978-3-319-91250-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Human-Computer Interaction. Theories, Methods, and Human Issues 20th International Conference, HCI International 2018, Las Vegas, NV, USA, July 15&ndash;20, 2018, Proceedings, Part I ent://SD_ILS/0/SD_ILS:400110 2026-01-27T16:43:48Z 2026-01-27T16:43:48Z Author&#160;Kurosu, Masaaki. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-91238-7">https://doi.org/10.1007/978-3-319-91238-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Human Factors in Cybersecurity Proceedings of the AHFE 2017 International Conference on Human Factors in Cybersecurity, July 17&minus;21, 2017, The Westin Bonaventure Hotel, Los Angeles, California, USA ent://SD_ILS/0/SD_ILS:399039 2026-01-27T16:43:48Z 2026-01-27T16:43:48Z Author&#160;Nicholson, Denise. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-60585-2">https://doi.org/10.1007/978-3-319-60585-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Human Interface and the Management of Information. Information in Applications and Services 20th International Conference, HIMI 2018, Held as Part of HCI International 2018, Las Vegas, NV, USA, July 15-20, 2018, Proceedings, Part II ent://SD_ILS/0/SD_ILS:399092 2026-01-27T16:43:48Z 2026-01-27T16:43:48Z Author&#160;Yamamoto, Sakae. editor.&#160;Mori, Hirohiko. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-92046-7">https://doi.org/10.1007/978-3-319-92046-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> ICT and Society 11th IFIP TC 9 International Conference on Human Choice and Computers, HCC11 2014, Turku, Finland, July 30 - August 1, 2014, Proceedings ent://SD_ILS/0/SD_ILS:487382 2026-01-27T16:43:48Z 2026-01-27T16:43:48Z Author&#160;Kimppa, Kai. editor.&#160;Whitehouse, Diane. editor.&#160;Kuusela, Tiina. editor.&#160;Phahlamohlaka, Jackie. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-662-44208-1">https://doi.org/10.1007/978-3-662-44208-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Human Aspects of Information Security, Privacy, and Trust Second International Conference, HAS 2014, Held as Part of HCI International 2014, Heraklion, Crete, Greece, June 22-27, 2014, Proceedings ent://SD_ILS/0/SD_ILS:488930 2026-01-27T16:43:48Z 2026-01-27T16:43:48Z Author&#160;Tryfonas, Theo. editor.&#160;Askoxylakis, Ioannis. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-07620-1">https://doi.org/10.1007/978-3-319-07620-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Understanding cybersecurity technologies : a guide to selecting the right cybersecurity tools ent://SD_ILS/0/SD_ILS:568141 2026-01-27T16:43:48Z 2026-01-27T16:43:48Z Author&#160;Moallem, Abbas, author.<br/>Preferred Shelf Number&#160;TK5105.59<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003038429">https://www.taylorfrancis.com/books/9781003038429</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Generative AI, cybersecurity, and ethics ent://SD_ILS/0/SD_ILS:599597 2026-01-27T16:43:48Z 2026-01-27T16:43:48Z Author&#160;Islam, Ray (Mohammad Rubyet), author.<br/>Preferred Shelf Number&#160;QA76.9 .A25<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394279326">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394279326</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Open-source security operations center (SOC) : a complete guide to establishing, managing, and maintaining a modern SOC ent://SD_ILS/0/SD_ILS:599434 2026-01-27T16:43:48Z 2026-01-27T16:43:48Z Author&#160;Basta, Alfred, author.&#160;Basta, Nadine, author.&#160;Anwar, Waqar, author.&#160;Essar, Mohammad Ilyas, author.&#160;John Wiley &amp; Sons, publisher.<br/>Preferred Shelf Number&#160;QA76.9 .A25<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394201631">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394201631</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Social engineering in cybersecurity : threats and defenses ent://SD_ILS/0/SD_ILS:585093 2026-01-27T16:43:48Z 2026-01-27T16:43:48Z Author&#160;Gururaj, H. L., 1988- editor.<br/>Preferred Shelf Number&#160;QA76.9 .A25<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003406716">https://www.taylorfrancis.com/books/9781003406716</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Optimal spending on cybersecurity measures : risk management ent://SD_ILS/0/SD_ILS:586024 2026-01-27T16:43:48Z 2026-01-27T16:43:48Z Author&#160;Kissoon, Tara, author.<br/>Preferred Shelf Number&#160;HF5548.37<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003404354">https://www.taylorfrancis.com/books/9781003404354</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Stepping through cybersecurity risk management : a systems thinking approach ent://SD_ILS/0/SD_ILS:599021 2026-01-27T16:43:48Z 2026-01-27T16:43:48Z Author&#160;Bayuk, Jennifer L., author.<br/>Preferred Shelf Number&#160;QA76.9 .A25 B39 2024<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394213986">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394213986</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Effective vulnerability management : managing risk in the vulnerable digital ecosystem ent://SD_ILS/0/SD_ILS:599047 2026-01-27T16:43:48Z 2026-01-27T16:43:48Z Author&#160;Hughes, Chris (Christopher Matthew), author.&#160;Robinson, Nikki, author.<br/>Preferred Shelf Number&#160;QA76.9 .A25 H84 2024<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394277155">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394277155</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> CYBERSECURITY IN THE TRANSPORTATION INDUSTRY. ent://SD_ILS/0/SD_ILS:599238 2026-01-27T16:43:48Z 2026-01-27T16:43:48Z Preferred Shelf Number&#160;HE194 .C93 2024<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394204472">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394204472</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Quantum computing in cybersecurity ent://SD_ILS/0/SD_ILS:598685 2026-01-27T16:43:48Z 2026-01-27T16:43:48Z Author&#160;Rawat, Romil, editor.<br/>Preferred Shelf Number&#160;QA76.9 .A25 Q83 2023<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394167401">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394167401</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> The CISO evolution : business knowledge for cybersecurity executives ent://SD_ILS/0/SD_ILS:597056 2026-01-27T16:43:48Z 2026-01-27T16:43:48Z Author&#160;Sharp, Matthew K., author.&#160;Lambros, Kyriakos P., author.<br/>Preferred Shelf Number&#160;HD30.2 .S5325 2022<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119782513">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119782513</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security issues and privacy concerns in Industry 4.0 applications ent://SD_ILS/0/SD_ILS:596945 2026-01-27T16:43:48Z 2026-01-27T16:43:48Z Author&#160;David, Shiblin, author.&#160;Anand, R. S., author.&#160;Jeyakrishnan, V., author.&#160;Niranjanamurthy, M., author.<br/>Preferred Shelf Number&#160;QA76.9 .A25 D38 2021<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119776529">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119776529</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Hacking multifactor authentication ent://SD_ILS/0/SD_ILS:596326 2026-01-27T16:43:48Z 2026-01-27T16:43:48Z Author&#160;Grimes, Roger A., author.<br/>Preferred Shelf Number&#160;QA76.9 .A25 G75 2021<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119672357">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119672357</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security engineering : a guide to building dependable distributed systems ent://SD_ILS/0/SD_ILS:596480 2026-01-27T16:43:48Z 2026-01-27T16:43:48Z Author&#160;Anderson, Ross. http://viaf.org/viaf/sourceID/LC%7cnb2004300232<br/>Preferred Shelf Number&#160;QA76.9 .A25<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119644682">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119644682</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cybersecurity in humanities and social sciences : a research methods approach ent://SD_ILS/0/SD_ILS:596373 2026-01-27T16:43:48Z 2026-01-27T16:43:48Z Author&#160;Loiseau, Hugo, editor.&#160;Ventre, Daniel, editor.&#160;Aden, Hartmut, editor.<br/>Preferred Shelf Number&#160;QA76.9 .A25<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119777588">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119777588</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cyber security in parallel and distributed computing : concepts, techniques, applications and case studies ent://SD_ILS/0/SD_ILS:595099 2026-01-27T16:43:48Z 2026-01-27T16:43:48Z Author&#160;Le, Dac-Nhuong, 1983- editor.&#160;Kumar, Raghvendra, 1987- editor.&#160;Mishra, Brojo Kishore, 1979- editor.&#160;Khari, Manju, editor.&#160;Chatterjee, Jyotir Moy, editor.<br/>Preferred Shelf Number&#160;QA76.9 .A25<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119488330">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119488330</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cybersecurity blue team toolkit ent://SD_ILS/0/SD_ILS:595209 2026-01-27T16:43:48Z 2026-01-27T16:43:48Z Author&#160;Tanner, Nadean H., author.<br/>Preferred Shelf Number&#160;QA76.9 .A25 T36 2019 EB<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119552963">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119552963</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Transformational security awareness : what neuroscientists, storytellers, and marketers can teach us about driving secure behaviors ent://SD_ILS/0/SD_ILS:595304 2026-01-27T16:43:48Z 2026-01-27T16:43:48Z Author&#160;Carpenter, Perry, author.<br/>Preferred Shelf Number&#160;QA76.9 .A25 C37 2019 EB<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119566380">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119566380</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> We have root : even more advice from Schneier on security ent://SD_ILS/0/SD_ILS:595432 2026-01-27T16:43:48Z 2026-01-27T16:43:48Z Author&#160;Schneier, Bruce, 1963- author.<br/>Preferred Shelf Number&#160;QA76.9 .A25 S36 2019<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119653554">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119653554</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> The Digital Big Bang : the Hard Stuff, the Soft Stuff, and the Future of Cybersecurity ent://SD_ILS/0/SD_ILS:595435 2026-01-27T16:43:48Z 2026-01-27T16:43:48Z Author&#160;Quade, Phil.<br/>Preferred Shelf Number&#160;QA76.9 .A25<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119617396">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119617396</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Digital forensics ent://SD_ILS/0/SD_ILS:593346 2026-01-27T16:43:48Z 2026-01-27T16:43:48Z Author&#160;&Aring;rnes, Andr&eacute;, 1976- editor.<br/>Preferred Shelf Number&#160;HV8079 .C65<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119262442">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119262442</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Insider threats ent://SD_ILS/0/SD_ILS:594407 2026-01-27T16:43:48Z 2026-01-27T16:43:48Z Author&#160;Arduin, Pierre-Emmanuel, author.<br/>Preferred Shelf Number&#160;QA76.9 .A25<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119419785">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119419785</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information security : design, implementation, measurement, and compliance ent://SD_ILS/0/SD_ILS:545839 2026-01-27T16:43:48Z 2026-01-27T16:43:48Z Author&#160;Layton, Timothy P., author.<br/>Preferred Shelf Number&#160;HF5548.37 .L393 2007<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781420013412">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/>