Search Results for Information Technology. - Narrowed by: Security.SirsiDynix Enterprisehttps://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dInformation$002bTechnology.$0026qf$003dSUBJECT$002509Subject$002509Security.$002509Security.$0026ps$003d300$0026isd$003dtrue?2026-01-21T10:21:19ZCyber defense : best practices for digital safetyent://SD_ILS/0/SD_ILS:6000032026-01-21T10:21:19Z2026-01-21T10:21:19ZAuthor Edwards, Jason, author.<br/>Preferred Shelf Number QA76.9 .A25 E39 2025<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394337040">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394337040</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Information security and privacy quick reference the essential handbook for every CISO, CSO, and Chief Privacy Officerent://SD_ILS/0/SD_ILS:5999462026-01-21T10:21:19Z2026-01-21T10:21:19ZAuthor Chapple, Mike, author. Shelley, Joe. Stewart, James Michael.<br/>Preferred Shelf Number QA76.9 .A25 C43 2025<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394353347">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394353347</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Practical cyber intelligence : a hands-on guide to digital forensicsent://SD_ILS/0/SD_ILS:5992622026-01-21T10:21:19Z2026-01-21T10:21:19ZAuthor Jakobsen, Adam Tilmar, author.<br/>Preferred Shelf Number HV8079 .C65 J633 2024<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394256129">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394256129</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Cyber Operations : A Case Study Approachent://SD_ILS/0/SD_ILS:5991172026-01-21T10:21:19Z2026-01-21T10:21:19ZAuthor Couretas, Jerry M., 1966- author.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119712121">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119712121</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Cryptography : algorithms, protocols, and standards for computer securityent://SD_ILS/0/SD_ILS:5989142026-01-21T10:21:19Z2026-01-21T10:21:19ZAuthor Mammeri, Zoubir, author.<br/>Preferred Shelf Number QA268 .M34 2024<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394207510">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394207510</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Stepping through cybersecurity risk management : a systems thinking approachent://SD_ILS/0/SD_ILS:5990212026-01-21T10:21:19Z2026-01-21T10:21:19ZAuthor Bayuk, Jennifer L., author.<br/>Preferred Shelf Number QA76.9 .A25 B39 2024<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394213986">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394213986</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Technologies and African societies in pandemic times : using technology to survive and thrive during the Covid-19 eraent://SD_ILS/0/SD_ILS:5984892026-01-21T10:21:19Z2026-01-21T10:21:19ZPreferred Shelf Number T28 .A1 T43 2023<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394225903">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394225903</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Security and privacy vision in 6G : a comprehensive guideent://SD_ILS/0/SD_ILS:5983472026-01-21T10:21:19Z2026-01-21T10:21:19ZAuthor Porambage, Pawani, author. Liyanage, Madhusanka, author.<br/>Preferred Shelf Number TK5103.252 .P67 2023<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119875437">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119875437</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>THE TECHNOLOGY DOESN'T MATTER : prioritizing the people in IT business alignmentent://SD_ILS/0/SD_ILS:5982302026-01-21T10:21:19Z2026-01-21T10:21:19ZAuthor Lockett, Rachel, author.<br/>Preferred Shelf Number HF5548.2<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394320653">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394320653</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Cyber security and network securityent://SD_ILS/0/SD_ILS:5974842026-01-21T10:21:19Z2026-01-21T10:21:19ZAuthor Pramanik, Sabyasachi, editor. Samanta, Debabrata, 1987- editor. Vinay, M., editor. Guha, Abhijit, editor.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119812555">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119812555</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Security and its challenges in the 21st Centuryent://SD_ILS/0/SD_ILS:5970772026-01-21T10:21:19Z2026-01-21T10:21:19ZAuthor Guerrier, Claudine, author.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119854852">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119854852</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Conflicts, crimes and regulations in cyberspaceent://SD_ILS/0/SD_ILS:5972812026-01-21T10:21:19Z2026-01-21T10:21:19ZAuthor Laurent, Sébastien, editor.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119885092">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119885092</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Cyber breach response that actually works : organizational approach to managing residual riskent://SD_ILS/0/SD_ILS:5961172026-01-21T10:21:19Z2026-01-21T10:21:19ZAuthor Gorecki, Andrew.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119679349">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119679349</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Tribe of hackers security leaders : tribal knowledge from the best in cybersecurity leadershipent://SD_ILS/0/SD_ILS:5958872026-01-21T10:21:19Z2026-01-21T10:21:19ZAuthor Carey, Marcus J. (Cybersecurity professional), author. Jin, Jennifer.<br/>Preferred Shelf Number QA76.9 .A25 C37 2020<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119643784">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119643784</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Blockchain for distributed systems securityent://SD_ILS/0/SD_ILS:5951462026-01-21T10:21:19Z2026-01-21T10:21:19ZAuthor Shetty, Sachin, editor. Kamhoua, Charles A., edtior. Njilla, Laurent L., editor.<br/>Preferred Shelf Number QA76.9 .B56 B56 2019 EB<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119519621">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119519621</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>5G explained : security and deployment of advanced mobile communicationsent://SD_ILS/0/SD_ILS:5948962026-01-21T10:21:19Z2026-01-21T10:21:19ZAuthor Penttinen, Jyrki T. J., author.<br/>Preferred Shelf Number TK5103.483 .P46 2019<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119275695">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119275695</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Transformational security awareness : what neuroscientists, storytellers, and marketers can teach us about driving secure behaviorsent://SD_ILS/0/SD_ILS:5953042026-01-21T10:21:19Z2026-01-21T10:21:19ZAuthor Carpenter, Perry, author.<br/>Preferred Shelf Number QA76.9 .A25 C37 2019 EB<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119566380">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119566380</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Cybersecurity blue team toolkitent://SD_ILS/0/SD_ILS:5952092026-01-21T10:21:19Z2026-01-21T10:21:19ZAuthor Tanner, Nadean H., author.<br/>Preferred Shelf Number QA76.9 .A25 T36 2019 EB<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119552963">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119552963</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Cybersecurity program development for business : the essential planning guideent://SD_ILS/0/SD_ILS:5944552026-01-21T10:21:19Z2026-01-21T10:21:19ZAuthor Moschovitis, Christos J. P., author.<br/>Preferred Shelf Number HD30.2<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119430018">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119430018</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>