Search Results for Information Services - Narrowed by: Computer security.
SirsiDynix Enterprise
https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dInformation$002bServices$0026qf$003dSUBJECT$002509Subject$002509Computer$002bsecurity.$002509Computer$002bsecurity.$0026te$003dILS$0026ps$003d300?dt=list
2026-03-23T00:02:57Z
Human Interface and the Management of Information. Information in Applications and Services 20th International Conference, HIMI 2018, Held as Part of HCI International 2018, Las Vegas, NV, USA, July 15-20, 2018, Proceedings, Part II
ent://SD_ILS/0/SD_ILS:399092
2026-03-23T00:02:57Z
2026-03-23T00:02:57Z
Author Yamamoto, Sakae. editor. Mori, Hirohiko. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-92046-7">https://doi.org/10.1007/978-3-319-92046-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Open-source security operations center (SOC) : a complete guide to establishing, managing, and maintaining a modern SOC
ent://SD_ILS/0/SD_ILS:599434
2026-03-23T00:02:57Z
2026-03-23T00:02:57Z
Author Basta, Alfred, author. Basta, Nadine, author. Anwar, Waqar, author. Essar, Mohammad Ilyas, author. John Wiley & Sons, publisher.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394201631">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394201631</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cyber defense : best practices for digital safety
ent://SD_ILS/0/SD_ILS:600003
2026-03-23T00:02:57Z
2026-03-23T00:02:57Z
Author Edwards, Jason, author.<br/>Preferred Shelf Number QA76.9 .A25 E39 2025<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394337040">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394337040</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Systems 21st European, Mediterranean, and Middle Eastern Conference, EMCIS 2024, Athens, Greece, September 2-3, 2024, Proceedings, Part II
ent://SD_ILS/0/SD_ILS:607376
2026-03-23T00:02:57Z
2026-03-23T00:02:57Z
Author Themistocleous, Marinos. editor. (orcid)0000-0002-6904-9692 Bakas, Nikolaos. editor. (orcid)0000-0002-7297-0693 Kokosalakis, George. editor. (orcid)0000-0003-4161-7376 Papadaki, Maria. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-031-81325-2">https://doi.org/10.1007/978-3-031-81325-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Security Planning A Practical Approach
ent://SD_ILS/0/SD_ILS:602364
2026-03-23T00:02:57Z
2026-03-23T00:02:57Z
Author Lincke, Susan. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-031-43118-0">https://doi.org/10.1007/978-3-031-43118-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Systems 20th European, Mediterranean, and Middle Eastern Conference, EMCIS 2023, Dubai, United Arab Emirates, December 11-12, 2023, Proceedings, Part II
ent://SD_ILS/0/SD_ILS:603089
2026-03-23T00:02:57Z
2026-03-23T00:02:57Z
Author Papadaki, Maria. editor. Themistocleous, Marinos. editor. (orcid)0000-0002-6904-9692 Al Marri, Khalid. editor. Al Zarouni, Marwan. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-031-56481-9">https://doi.org/10.1007/978-3-031-56481-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Zero trust journey across the digital estate
ent://SD_ILS/0/SD_ILS:560700
2026-03-23T00:02:57Z
2026-03-23T00:02:57Z
Author Pillai, Binil, author. Kudrati, Abbas, author.<br/>Preferred Shelf Number TK5105.59<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003225096">https://www.taylorfrancis.com/books/9781003225096</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
The CISO evolution : business knowledge for cybersecurity executives
ent://SD_ILS/0/SD_ILS:597056
2026-03-23T00:02:57Z
2026-03-23T00:02:57Z
Author Sharp, Matthew K., author. Lambros, Kyriakos P., author.<br/>Preferred Shelf Number HD30.2 .S5325 2022<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119782513">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119782513</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Artificial intelligence and data mining approaches in security frameworks
ent://SD_ILS/0/SD_ILS:596957
2026-03-23T00:02:57Z
2026-03-23T00:02:57Z
Author Bhargava, Neeraj. Bhargava, Ritu. Rathore, Pramod Singh, 1988- Agrawal, Rashmi, 1978-<br/>Preferred Shelf Number Q335<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119760429">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119760429</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cybersecurity blue team toolkit
ent://SD_ILS/0/SD_ILS:595209
2026-03-23T00:02:57Z
2026-03-23T00:02:57Z
Author Tanner, Nadean H., author.<br/>Preferred Shelf Number QA76.9 .A25 T36 2019 EB<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119552963">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119552963</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Digital forensics
ent://SD_ILS/0/SD_ILS:593346
2026-03-23T00:02:57Z
2026-03-23T00:02:57Z
Author Årnes, André, 1976- editor.<br/>Preferred Shelf Number HV8079 .C65<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119262442">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119262442</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information security policy development for compliance : ISO/IEC 27001, NIST SP 800-53, HIPAA standard, PCI DSS V2.0, and AUP V5.0
ent://SD_ILS/0/SD_ILS:545128
2026-03-23T00:02:57Z
2026-03-23T00:02:57Z
Author Williams, Barry L., author.<br/>Preferred Shelf Number QA76.9 .A25 .W5495 2013<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781466580596">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>
Delivering London 2012 ICT implementation and operations
ent://SD_ILS/0/SD_ILS:509889
2026-03-23T00:02:57Z
2026-03-23T00:02:57Z
Author IET, ed.<br/>Preferred Shelf Number XX(509889.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1049/PERICP2E">http://dx.doi.org/10.1049/PERICP2E</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Insider computer fraud : an in-depth framework for detecting and defending against insider IT attacks
ent://SD_ILS/0/SD_ILS:544396
2026-03-23T00:02:57Z
2026-03-23T00:02:57Z
Author Brancik, Kenneth C., author.<br/>Preferred Shelf Number QA76.9 .A25 B725 2008<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781420046601">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>
Digital privacy : theory, technologies, and practices
ent://SD_ILS/0/SD_ILS:547774
2026-03-23T00:02:57Z
2026-03-23T00:02:57Z
Author Acquisti, Alessandro.<br/>Preferred Shelf Number QA76.9 .A25 D528 2008<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781420052183">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>