Search Results for Human - Narrowed by: Computer security.SirsiDynix Enterprisehttps://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dHuman$0026qf$003dSUBJECT$002509Subject$002509Computer$002bsecurity.$002509Computer$002bsecurity.$0026ps$003d300$0026isd$003dtrue?2026-01-30T23:05:18ZPsybersecurity : human factors of cyber defenceent://SD_ILS/0/SD_ILS:5708252026-01-30T23:05:18Z2026-01-30T23:05:18ZAuthor Guidetti, Oliver, author, editor. Āhameda, Mahiuddina, author, editor. Speelman, Craig P., editor.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781032664859">https://www.taylorfrancis.com/books/9781032664859</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Cybersecurity Systems for Human Cognition Augmentationent://SD_ILS/0/SD_ILS:4885042026-01-30T23:05:18Z2026-01-30T23:05:18ZAuthor Pino, Robinson E. editor. Kott, Alexander. editor. Shevenell, Michael. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-10374-7">https://doi.org/10.1007/978-3-319-10374-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Social engineering : the science of human hackingent://SD_ILS/0/SD_ILS:5946352026-01-30T23:05:18Z2026-01-30T23:05:18ZAuthor Hadnagy, Christopher, author.<br/>Preferred Shelf Number HM668 .H33 2018<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119433729">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119433729</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Social engineering : the art of human hackingent://SD_ILS/0/SD_ILS:3779762026-01-30T23:05:18Z2026-01-30T23:05:18ZAuthor Hadnagy, Christopher.<br/>Preferred Shelf Number QA76.9.C66 H33 2011<br/>Format: Books<br/>Availability Beytepe Library~1<br/>Behavioral insights in cybersecurity : a guide to digital human factorsent://SD_ILS/0/SD_ILS:5678852026-01-30T23:05:18Z2026-01-30T23:05:18ZAuthor Sachs, Dustin S., author.<br/>Preferred Shelf Number ZA3086.5 .C93<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003606345">https://www.taylorfrancis.com/books/9781003606345</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Forensic perspectives on cybercrime : human behaviour and cybersecurityent://SD_ILS/0/SD_ILS:5781722026-01-30T23:05:18Z2026-01-30T23:05:18ZAuthor McAlaney, John, 1979- author. Hills, Peter J. (Lecturer), author. Cole, Terri, author.<br/>Preferred Shelf Number HV6773<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003300359">https://www.taylorfrancis.com/books/9781003300359</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Cyber security threats and challenges facing human lifeent://SD_ILS/0/SD_ILS:5897062026-01-30T23:05:18Z2026-01-30T23:05:18ZAuthor Shekokar, Narendra M., editor. Vasudevan, Hari (Engineer), editor. Durbha, Surya Srinivas, editor. Michalas, Antonis, editor. Nagarhalli, Tatwadarshi P., editor.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003218555">https://www.taylorfrancis.com/books/9781003218555</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Human Centered Computing 4th International Conference, HCC 2018, Mérida, Mexico, December, 5–7, 2018, Revised Selected Papersent://SD_ILS/0/SD_ILS:4840322026-01-30T23:05:18Z2026-01-30T23:05:18ZAuthor Tang, Yong. editor. Zu, Qiaohong. editor. Rodríguez García, José G. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-15127-0">https://doi.org/10.1007/978-3-030-15127-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Human-Computer Interaction. Theories, Methods, and Human Issues 20th International Conference, HCI International 2018, Las Vegas, NV, USA, July 15–20, 2018, Proceedings, Part Ient://SD_ILS/0/SD_ILS:4001102026-01-30T23:05:18Z2026-01-30T23:05:18ZAuthor Kurosu, Masaaki. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-91238-7">https://doi.org/10.1007/978-3-319-91238-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Human Interface and the Management of Information. Information in Applications and Services 20th International Conference, HIMI 2018, Held as Part of HCI International 2018, Las Vegas, NV, USA, July 15-20, 2018, Proceedings, Part IIent://SD_ILS/0/SD_ILS:3990922026-01-30T23:05:18Z2026-01-30T23:05:18ZAuthor Yamamoto, Sakae. editor. Mori, Hirohiko. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-92046-7">https://doi.org/10.1007/978-3-319-92046-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Advances in Human Factors in Cybersecurity Proceedings of the AHFE 2017 International Conference on Human Factors in Cybersecurity, July 17−21, 2017, The Westin Bonaventure Hotel, Los Angeles, California, USAent://SD_ILS/0/SD_ILS:3990392026-01-30T23:05:18Z2026-01-30T23:05:18ZAuthor Nicholson, Denise. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-60585-2">https://doi.org/10.1007/978-3-319-60585-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Human-Computer Interaction. Interaction Technologies 20th International Conference, HCI International 2018, Las Vegas, NV, USA, July 15–20, 2018, Proceedings, Part IIIent://SD_ILS/0/SD_ILS:4000302026-01-30T23:05:18Z2026-01-30T23:05:18ZAuthor Kurosu, Masaaki. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-91250-9">https://doi.org/10.1007/978-3-319-91250-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Human Aspects of IT for the Aged Population. Applications in Health, Assistance, and Entertainment 4th International Conference, ITAP 2018, Held as Part of HCI International 2018, Las Vegas, NV, USA, July 15–20, 2018, Proceedings, Part IIent://SD_ILS/0/SD_ILS:4026732026-01-30T23:05:18Z2026-01-30T23:05:18ZAuthor Zhou, Jia. editor. Salvendy, Gavriel. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-92037-5">https://doi.org/10.1007/978-3-319-92037-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Human-Computer Interaction. Interaction in Context 20th International Conference, HCI International 2018, Las Vegas, NV, USA, July 15–20, 2018, Proceedings, Part IIent://SD_ILS/0/SD_ILS:3999102026-01-30T23:05:18Z2026-01-30T23:05:18ZAuthor Kurosu, Masaaki. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-91244-8">https://doi.org/10.1007/978-3-319-91244-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Human Aspects of IT for the Aged Population. Acceptance, Communication and Participation 4th International Conference, ITAP 2018, Held as Part of HCI International 2018, Las Vegas, NV, USA, July 15–20, 2018, Proceedings, Part Ient://SD_ILS/0/SD_ILS:4003412026-01-30T23:05:18Z2026-01-30T23:05:18ZAuthor Zhou, Jia. editor. Salvendy, Gavriel. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-92034-4">https://doi.org/10.1007/978-3-319-92034-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>ICT and Society 11th IFIP TC 9 International Conference on Human Choice and Computers, HCC11 2014, Turku, Finland, July 30 - August 1, 2014, Proceedingsent://SD_ILS/0/SD_ILS:4873822026-01-30T23:05:18Z2026-01-30T23:05:18ZAuthor Kimppa, Kai. editor. Whitehouse, Diane. editor. Kuusela, Tiina. editor. Phahlamohlaka, Jackie. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-662-44208-1">https://doi.org/10.1007/978-3-662-44208-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Human Aspects of Information Security, Privacy, and Trust Second International Conference, HAS 2014, Held as Part of HCI International 2014, Heraklion, Crete, Greece, June 22-27, 2014, Proceedingsent://SD_ILS/0/SD_ILS:4889302026-01-30T23:05:18Z2026-01-30T23:05:18ZAuthor Tryfonas, Theo. editor. Askoxylakis, Ioannis. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-07620-1">https://doi.org/10.1007/978-3-319-07620-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Understanding cybersecurity technologies : a guide to selecting the right cybersecurity toolsent://SD_ILS/0/SD_ILS:5681412026-01-30T23:05:18Z2026-01-30T23:05:18ZAuthor Moallem, Abbas, author.<br/>Preferred Shelf Number TK5105.59<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003038429">https://www.taylorfrancis.com/books/9781003038429</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Open-source security operations center (SOC) : a complete guide to establishing, managing, and maintaining a modern SOCent://SD_ILS/0/SD_ILS:5994342026-01-30T23:05:18Z2026-01-30T23:05:18ZAuthor Basta, Alfred, author. Basta, Nadine, author. Anwar, Waqar, author. Essar, Mohammad Ilyas, author. John Wiley & Sons, publisher.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394201631">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394201631</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Generative AI, cybersecurity, and ethicsent://SD_ILS/0/SD_ILS:5995972026-01-30T23:05:18Z2026-01-30T23:05:18ZAuthor Islam, Ray (Mohammad Rubyet), author.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394279326">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394279326</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Social engineering in cybersecurity : threats and defensesent://SD_ILS/0/SD_ILS:5850932026-01-30T23:05:18Z2026-01-30T23:05:18ZAuthor Gururaj, H. L., 1988- editor.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003406716">https://www.taylorfrancis.com/books/9781003406716</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Optimal spending on cybersecurity measures : risk managementent://SD_ILS/0/SD_ILS:5860242026-01-30T23:05:18Z2026-01-30T23:05:18ZAuthor Kissoon, Tara, author.<br/>Preferred Shelf Number HF5548.37<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003404354">https://www.taylorfrancis.com/books/9781003404354</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Stepping through cybersecurity risk management : a systems thinking approachent://SD_ILS/0/SD_ILS:5990212026-01-30T23:05:18Z2026-01-30T23:05:18ZAuthor Bayuk, Jennifer L., author.<br/>Preferred Shelf Number QA76.9 .A25 B39 2024<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394213986">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394213986</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Effective vulnerability management : managing risk in the vulnerable digital ecosystement://SD_ILS/0/SD_ILS:5990472026-01-30T23:05:18Z2026-01-30T23:05:18ZAuthor Hughes, Chris (Christopher Matthew), author. Robinson, Nikki, author.<br/>Preferred Shelf Number QA76.9 .A25 H84 2024<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394277155">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394277155</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>CYBERSECURITY IN THE TRANSPORTATION INDUSTRY.ent://SD_ILS/0/SD_ILS:5992382026-01-30T23:05:18Z2026-01-30T23:05:18ZPreferred Shelf Number HE194 .C93 2024<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394204472">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394204472</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Quantum computing in cybersecurityent://SD_ILS/0/SD_ILS:5986852026-01-30T23:05:18Z2026-01-30T23:05:18ZAuthor Rawat, Romil, editor.<br/>Preferred Shelf Number QA76.9 .A25 Q83 2023<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394167401">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394167401</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>The CISO evolution : business knowledge for cybersecurity executivesent://SD_ILS/0/SD_ILS:5970562026-01-30T23:05:18Z2026-01-30T23:05:18ZAuthor Sharp, Matthew K., author. Lambros, Kyriakos P., author.<br/>Preferred Shelf Number HD30.2 .S5325 2022<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119782513">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119782513</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Hacking multifactor authenticationent://SD_ILS/0/SD_ILS:5963262026-01-30T23:05:18Z2026-01-30T23:05:18ZAuthor Grimes, Roger A., author.<br/>Preferred Shelf Number QA76.9 .A25 G75 2021<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119672357">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119672357</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Security issues and privacy concerns in Industry 4.0 applicationsent://SD_ILS/0/SD_ILS:5969452026-01-30T23:05:18Z2026-01-30T23:05:18ZAuthor David, Shiblin, author. Anand, R. S., author. Jeyakrishnan, V., author. Niranjanamurthy, M., author.<br/>Preferred Shelf Number QA76.9 .A25 D38 2021<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119776529">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119776529</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Cybersecurity in humanities and social sciences : a research methods approachent://SD_ILS/0/SD_ILS:5963732026-01-30T23:05:18Z2026-01-30T23:05:18ZAuthor Loiseau, Hugo, editor. Ventre, Daniel, editor. Aden, Hartmut, editor.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119777588">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119777588</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Security engineering : a guide to building dependable distributed systemsent://SD_ILS/0/SD_ILS:5964802026-01-30T23:05:18Z2026-01-30T23:05:18ZAuthor Anderson, Ross. http://viaf.org/viaf/sourceID/LC%7cnb2004300232<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119644682">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119644682</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Cyber security in parallel and distributed computing : concepts, techniques, applications and case studiesent://SD_ILS/0/SD_ILS:5950992026-01-30T23:05:18Z2026-01-30T23:05:18ZAuthor Le, Dac-Nhuong, 1983- editor. Kumar, Raghvendra, 1987- editor. Mishra, Brojo Kishore, 1979- editor. Khari, Manju, editor. Chatterjee, Jyotir Moy, editor.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119488330">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119488330</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Cybersecurity blue team toolkitent://SD_ILS/0/SD_ILS:5952092026-01-30T23:05:18Z2026-01-30T23:05:18ZAuthor Tanner, Nadean H., author.<br/>Preferred Shelf Number QA76.9 .A25 T36 2019 EB<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119552963">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119552963</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Transformational security awareness : what neuroscientists, storytellers, and marketers can teach us about driving secure behaviorsent://SD_ILS/0/SD_ILS:5953042026-01-30T23:05:18Z2026-01-30T23:05:18ZAuthor Carpenter, Perry, author.<br/>Preferred Shelf Number QA76.9 .A25 C37 2019 EB<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119566380">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119566380</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>We have root : even more advice from Schneier on securityent://SD_ILS/0/SD_ILS:5954322026-01-30T23:05:18Z2026-01-30T23:05:18ZAuthor Schneier, Bruce, 1963- author.<br/>Preferred Shelf Number QA76.9 .A25 S36 2019<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119653554">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119653554</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>The Digital Big Bang : the Hard Stuff, the Soft Stuff, and the Future of Cybersecurityent://SD_ILS/0/SD_ILS:5954352026-01-30T23:05:18Z2026-01-30T23:05:18ZAuthor Quade, Phil.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119617396">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119617396</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Digital forensicsent://SD_ILS/0/SD_ILS:5933462026-01-30T23:05:18Z2026-01-30T23:05:18ZAuthor Årnes, André, 1976- editor.<br/>Preferred Shelf Number HV8079 .C65<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119262442">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119262442</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Insider threatsent://SD_ILS/0/SD_ILS:5944072026-01-30T23:05:18Z2026-01-30T23:05:18ZAuthor Arduin, Pierre-Emmanuel, author.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119419785">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119419785</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Information security : design, implementation, measurement, and complianceent://SD_ILS/0/SD_ILS:5458392026-01-30T23:05:18Z2026-01-30T23:05:18ZAuthor Layton, Timothy P., author.<br/>Preferred Shelf Number HF5548.37 .L393 2007<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781420013412">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>