Search Results for Impact. - Narrowed by: Security.SirsiDynix Enterprisehttps://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dImpact.$0026qf$003dSUBJECT$002509Subject$002509Security.$002509Security.$0026te$003dILS$0026ps$003d300?2026-03-07T07:07:33ZLiars and outliers : enabling the trust that society needs to thriveent://SD_ILS/0/SD_ILS:6002352026-03-07T07:07:33Z2026-03-07T07:07:33ZAuthor Schneier, Bruce, 1963- author.<br/>Preferred Shelf Number HM1204 .S35 2026<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394406715">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394406715</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>BEHIND THE AI MASK protecting your business from deepfakes.ent://SD_ILS/0/SD_ILS:6004112026-03-07T07:07:33Z2026-03-07T07:07:33ZAuthor BOGAN, CARL.<br/>Preferred Shelf Number XX(600411.1)<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394352616">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394352616</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Preventing bluetooth and wireless attacks in IoMT healthcare systemsent://SD_ILS/0/SD_ILS:6000162026-03-07T07:07:33Z2026-03-07T07:07:33ZAuthor Chirillo, John, 1970- author.<br/>Preferred Shelf Number R859.7 .S43 C45 2025<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394352401">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394352401</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>The DevSecOps playbook : deliver continuous security at speedent://SD_ILS/0/SD_ILS:5986342026-03-07T07:07:33Z2026-03-07T07:07:33ZAuthor Mack, Sean D., author.<br/>Preferred Shelf Number QA76.9 .A25 M33 2024<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394189281">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394189281</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>CYBERSECURITY IN THE TRANSPORTATION INDUSTRY.ent://SD_ILS/0/SD_ILS:5992382026-03-07T07:07:33Z2026-03-07T07:07:33ZPreferred Shelf Number HE194 .C93 2024<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394204472">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394204472</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Security and Privacy for 6G Massive IoT.ent://SD_ILS/0/SD_ILS:5996292026-03-07T07:07:33Z2026-03-07T07:07:33ZAuthor Mantas, Georgios. Saghezchi, Firooz. Rodriguez, Jonathan. Sucasas, Victor.<br/>Preferred Shelf Number TK5103.252<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119988007">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119988007</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Technologies and African societies in pandemic times : using technology to survive and thrive during the Covid-19 eraent://SD_ILS/0/SD_ILS:5984892026-03-07T07:07:33Z2026-03-07T07:07:33ZPreferred Shelf Number T28 .A1 T43 2023<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394225903">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394225903</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Security in vehicular networks : focus on location and identity privacyent://SD_ILS/0/SD_ILS:5979172026-03-07T07:07:33Z2026-03-07T07:07:33ZAuthor Benarous, Leila. Bitam, Salim. Mellouk, Abdelhamid.<br/>Preferred Shelf Number TE228.37<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394172610">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394172610</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Archives in the digital age : preservation and the right to be forgottenent://SD_ILS/0/SD_ILS:5967192026-03-07T07:07:33Z2026-03-07T07:07:33ZAuthor Mkadmi, Abderrazak, author.<br/>Preferred Shelf Number CD973 .D53<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119825029">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119825029</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Privacy, regulations, and cybersecurity : the essential business guideent://SD_ILS/0/SD_ILS:5964722026-03-07T07:07:33Z2026-03-07T07:07:33ZAuthor Moschovitis, Christos J. P., author.<br/>Preferred Shelf Number HD61.5 .M675 2021 EB<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119660156">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119660156</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Security issues and privacy concerns in Industry 4.0 applicationsent://SD_ILS/0/SD_ILS:5969452026-03-07T07:07:33Z2026-03-07T07:07:33ZAuthor David, Shiblin, author. Anand, R. S., author. Jeyakrishnan, V., author. Niranjanamurthy, M., author.<br/>Preferred Shelf Number QA76.9 .A25 D38 2021<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119776529">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119776529</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Tribe of hackers security leaders : tribal knowledge from the best in cybersecurity leadershipent://SD_ILS/0/SD_ILS:5958872026-03-07T07:07:33Z2026-03-07T07:07:33ZAuthor Carey, Marcus J. (Cybersecurity professional), author. Jin, Jennifer.<br/>Preferred Shelf Number QA76.9 .A25 C37 2020<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119643784">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119643784</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Hacking connected cars : tactics, techniques, and proceduresent://SD_ILS/0/SD_ILS:5958432026-03-07T07:07:33Z2026-03-07T07:07:33ZAuthor Knight, Alissa, author.<br/>Preferred Shelf Number TL152.8 .K65 2020<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119491774">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119491774</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Cyber breach response that actually works : organizational approach to managing residual riskent://SD_ILS/0/SD_ILS:5961172026-03-07T07:07:33Z2026-03-07T07:07:33ZAuthor Gorecki, Andrew.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119679349">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119679349</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>IoT security : advances in authenticationent://SD_ILS/0/SD_ILS:5954202026-03-07T07:07:33Z2026-03-07T07:07:33ZAuthor Liyanage, Madhusanka, editor. Braeken, An, 1970- editor. Kumar, Pardeep, 1976- editor. Ylianttila, Mika, editor.<br/>Preferred Shelf Number TK5105.8857 .I58 2019<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119527978">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119527978</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>We have root : even more advice from Schneier on securityent://SD_ILS/0/SD_ILS:5954322026-03-07T07:07:33Z2026-03-07T07:07:33ZAuthor Schneier, Bruce, 1963- author.<br/>Preferred Shelf Number QA76.9 .A25 S36 2019<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119653554">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119653554</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Blockchain for distributed systems securityent://SD_ILS/0/SD_ILS:5951462026-03-07T07:07:33Z2026-03-07T07:07:33ZAuthor Shetty, Sachin, editor. Kamhoua, Charles A., edtior. Njilla, Laurent L., editor.<br/>Preferred Shelf Number QA76.9 .B56 B56 2019 EB<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119519621">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119519621</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Transformational security awareness : what neuroscientists, storytellers, and marketers can teach us about driving secure behaviorsent://SD_ILS/0/SD_ILS:5953042026-03-07T07:07:33Z2026-03-07T07:07:33ZAuthor Carpenter, Perry, author.<br/>Preferred Shelf Number QA76.9 .A25 C37 2019 EB<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119566380">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119566380</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Cybersecurity program development for business : the essential planning guideent://SD_ILS/0/SD_ILS:5944552026-03-07T07:07:33Z2026-03-07T07:07:33ZAuthor Moschovitis, Christos J. P., author.<br/>Preferred Shelf Number HD30.2<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119430018">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119430018</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>