Search Results for Impact. - Narrowed by: Computer security.
SirsiDynix Enterprise
https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dImpact.$0026qf$003dSUBJECT$002509Subject$002509Computer$002bsecurity.$002509Computer$002bsecurity.$0026te$003dILS$0026ps$003d300?
2026-02-20T19:03:37Z
ICT Unbounded, Social Impact of Bright ICT Adoption IFIP WG 8.6 International Conference on Transfer and Diffusion of IT, TDIT 2019, Accra, Ghana, June 21–22, 2019, Proceedings
ent://SD_ILS/0/SD_ILS:486868
2026-02-20T19:03:37Z
2026-02-20T19:03:37Z
Author Dwivedi, Yogesh. editor. (orcid)0000-0002-5547-9990 Ayaburi, Emmanuel. editor. Boateng, Richard. editor. Effah, John. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-20671-0">https://doi.org/10.1007/978-3-030-20671-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Network security and its impact on business strategy
ent://SD_ILS/0/SD_ILS:482213
2026-02-20T19:03:37Z
2026-02-20T19:03:37Z
Author Oncioiu, Ionica, 1972- editor. IGI Global, publisher.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-8455-1">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-8455-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Data breach preparation and response : breaches are certain, impact is not
ent://SD_ILS/0/SD_ILS:458926
2026-02-20T19:03:37Z
2026-02-20T19:03:37Z
Author Fowler, Kevvie, author.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="https://www.sciencedirect.com/science/book/9780128034514">https://www.sciencedirect.com/science/book/9780128034514</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Building effective privacy programs : cybersecurity from principles to practice
ent://SD_ILS/0/SD_ILS:600111
2026-02-20T19:03:37Z
2026-02-20T19:03:37Z
Author Edwards, Jason (Cybersecurity expert), author. Weaver, Griffin, author. John Wiley & Sons, publisher.<br/>Preferred Shelf Number QA76.9 .P735 E34 2026<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394342662">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394342662</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Social Cyber Engineering and Advanced Security Algorithms
ent://SD_ILS/0/SD_ILS:588161
2026-02-20T19:03:37Z
2026-02-20T19:03:37Z
Author Merat, Soorena, author. Almuhtadi, Wahab, author<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003500698">https://www.taylorfrancis.com/books/9781003500698</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Generative AI, cybersecurity, and ethics
ent://SD_ILS/0/SD_ILS:599597
2026-02-20T19:03:37Z
2026-02-20T19:03:37Z
Author Islam, Ray (Mohammad Rubyet), author.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394279326">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394279326</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
The techno-legal dynamics of cyber crimes in Industry 5.0
ent://SD_ILS/0/SD_ILS:599801
2026-02-20T19:03:37Z
2026-02-20T19:03:37Z
Author Kaur, Gagandeep, editor Choudhury, Tanupriya editor Balamurugan, S. editor<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394242177">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394242177</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Open-source security operations center (SOC) : a complete guide to establishing, managing, and maintaining a modern SOC
ent://SD_ILS/0/SD_ILS:599434
2026-02-20T19:03:37Z
2026-02-20T19:03:37Z
Author Basta, Alfred, author. Basta, Nadine, author. Anwar, Waqar, author. Essar, Mohammad Ilyas, author. John Wiley & Sons, publisher.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394201631">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394201631</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Digital twins and cybersecurity : safeguarding the future of connected systems
ent://SD_ILS/0/SD_ILS:599615
2026-02-20T19:03:37Z
2026-02-20T19:03:37Z
Author Naveen, Palanichamy, author. Maheswar, R., author. Ragupathy, U.S., author.<br/>Preferred Shelf Number QA76.9 .C65 N38 2025<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394272501">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394272501</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Quantum computing models for cybersecurity and wireless communications
ent://SD_ILS/0/SD_ILS:599707
2026-02-20T19:03:37Z
2026-02-20T19:03:37Z
Author Kumar, Budati Anil, edited. Kumar, Singamaneni Kranthi, edited. Li, Xingwang (Computer scientist), edited.<br/>Preferred Shelf Number QA76.9 .A25 Q36 2025<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394271429">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394271429</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
The DevSecOps playbook : deliver continuous security at speed
ent://SD_ILS/0/SD_ILS:598634
2026-02-20T19:03:37Z
2026-02-20T19:03:37Z
Author Mack, Sean D., author.<br/>Preferred Shelf Number QA76.9 .A25 M33 2024<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394189281">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394189281</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
CYBERSECURITY IN THE TRANSPORTATION INDUSTRY.
ent://SD_ILS/0/SD_ILS:599238
2026-02-20T19:03:37Z
2026-02-20T19:03:37Z
Preferred Shelf Number HE194 .C93 2024<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394204472">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394204472</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cybercrime during the SARS-CoV-2 pandemic (2019-2022)
ent://SD_ILS/0/SD_ILS:598517
2026-02-20T19:03:37Z
2026-02-20T19:03:37Z
Author Ventre, Daniel, editor. Loiseau, Hugo, 1974- editor.<br/>Preferred Shelf Number HV6773 .C93 2023<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394226344">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394226344</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Quantum computing in cybersecurity
ent://SD_ILS/0/SD_ILS:598685
2026-02-20T19:03:37Z
2026-02-20T19:03:37Z
Author Rawat, Romil, editor.<br/>Preferred Shelf Number QA76.9 .A25 Q83 2023<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394167401">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394167401</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Wireless communication in cyber security
ent://SD_ILS/0/SD_ILS:598705
2026-02-20T19:03:37Z
2026-02-20T19:03:37Z
Author Sountharrajan, S. editor Maheswar, R. editor Rathee, Geetanjali, editor Akila, M. editor<br/>Preferred Shelf Number QA76.9 .A25 W57 2023<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119910619">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119910619</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Trust in computer systems and the cloud
ent://SD_ILS/0/SD_ILS:597142
2026-02-20T19:03:37Z
2026-02-20T19:03:37Z
Author Bursell, Mike, author.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119695158">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119695158</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Trust-based communication systems for internet of things applications
ent://SD_ILS/0/SD_ILS:597744
2026-02-20T19:03:37Z
2026-02-20T19:03:37Z
Author Madaan, Vishu, editor. Agrawal, Prateek, editor. Sharma, Anand, editor. Sharma, Dilip Kumar, editor. Agrawal, Akshat, 1986- editor.<br/>Preferred Shelf Number TK5105.8857<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119896746">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119896746</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security issues and privacy concerns in Industry 4.0 applications
ent://SD_ILS/0/SD_ILS:596945
2026-02-20T19:03:37Z
2026-02-20T19:03:37Z
Author David, Shiblin, author. Anand, R. S., author. Jeyakrishnan, V., author. Niranjanamurthy, M., author.<br/>Preferred Shelf Number QA76.9 .A25 D38 2021<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119776529">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119776529</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Privacy, regulations, and cybersecurity : the essential business guide
ent://SD_ILS/0/SD_ILS:596472
2026-02-20T19:03:37Z
2026-02-20T19:03:37Z
Author Moschovitis, Christos J. P., author.<br/>Preferred Shelf Number HD61.5 .M675 2021 EB<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119660156">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119660156</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Tribe of hackers security leaders : tribal knowledge from the best in cybersecurity leadership
ent://SD_ILS/0/SD_ILS:595887
2026-02-20T19:03:37Z
2026-02-20T19:03:37Z
Author Carey, Marcus J. (Cybersecurity professional), author. Jin, Jennifer.<br/>Preferred Shelf Number QA76.9 .A25 C37 2020<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119643784">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119643784</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cybersecurity in humanities and social sciences : a research methods approach
ent://SD_ILS/0/SD_ILS:596373
2026-02-20T19:03:37Z
2026-02-20T19:03:37Z
Author Loiseau, Hugo, editor. Ventre, Daniel, editor. Aden, Hartmut, editor.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119777588">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119777588</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Transformational security awareness : what neuroscientists, storytellers, and marketers can teach us about driving secure behaviors
ent://SD_ILS/0/SD_ILS:595304
2026-02-20T19:03:37Z
2026-02-20T19:03:37Z
Author Carpenter, Perry, author.<br/>Preferred Shelf Number QA76.9 .A25 C37 2019 EB<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119566380">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119566380</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
We have root : even more advice from Schneier on security
ent://SD_ILS/0/SD_ILS:595432
2026-02-20T19:03:37Z
2026-02-20T19:03:37Z
Author Schneier, Bruce, 1963- author.<br/>Preferred Shelf Number QA76.9 .A25 S36 2019<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119653554">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119653554</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information security fundamentals
ent://SD_ILS/0/SD_ILS:539922
2026-02-20T19:03:37Z
2026-02-20T19:03:37Z
Author Peltier, Thomas R.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9780429130281">Taylor & Francis eBooks</a>
Taylor & Francis <a href="https://www.taylorfrancis.com/books/9780429130281">https://www.taylorfrancis.com/books/9780429130281</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
What every engineer should know about cyber security and digital forensics
ent://SD_ILS/0/SD_ILS:539726
2026-02-20T19:03:37Z
2026-02-20T19:03:37Z
Author DeFranco, Joanna F., author.<br/>Preferred Shelf Number TK5105.59 .D44 2014<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781466564541">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>
Information security risk analysis
ent://SD_ILS/0/SD_ILS:538713
2026-02-20T19:03:37Z
2026-02-20T19:03:37Z
Author Peltier, Thomas R., author.<br/>Preferred Shelf Number QA76.9 .A25 P429 2010<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781439839577">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>
Information security risk analysis
ent://SD_ILS/0/SD_ILS:544821
2026-02-20T19:03:37Z
2026-02-20T19:03:37Z
Author Peltier, Thomas R., author.<br/>Preferred Shelf Number QA76.9 .A25 P429 2005<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781420031195">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>
Database and applications security : integrating information security and data management
ent://SD_ILS/0/SD_ILS:540220
2026-02-20T19:03:37Z
2026-02-20T19:03:37Z
Author Thuraisingham, Bhavani M., author.<br/>Preferred Shelf Number QA76.9 .D314 T47 2005<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9780203486061">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>