Search Results for Information security. - Narrowed by: COMPUTERS. SirsiDynix Enterprise https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dInformation$002bsecurity.$0026qf$003dSUBJECT$002509Subject$002509COMPUTERS.$002509COMPUTERS.$0026ps$003d300$0026isd$003dtrue? 2026-01-21T20:51:56Z Information security and privacy quick reference the essential handbook for every CISO, CSO, and Chief Privacy Officer ent://SD_ILS/0/SD_ILS:599946 2026-01-21T20:51:56Z 2026-01-21T20:51:56Z Author&#160;Chapple, Mike, author.&#160;Shelley, Joe.&#160;Stewart, James Michael.<br/>Preferred Shelf Number&#160;QA76.9 .A25 C43 2025<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394353347">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394353347</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Liars and outliers : enabling the trust that society needs to thrive ent://SD_ILS/0/SD_ILS:600235 2026-01-21T20:51:56Z 2026-01-21T20:51:56Z Author&#160;Schneier, Bruce, 1963- author.<br/>Preferred Shelf Number&#160;HM1204 .S35 2026<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394406715">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394406715</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer memories 1 : core concepts ent://SD_ILS/0/SD_ILS:600350 2026-01-21T20:51:56Z 2026-01-21T20:51:56Z Author&#160;Darche, Philippe, author.<br/>Preferred Shelf Number&#160;TK7895 .M4 D37 2026<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394427734">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394427734</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Protection of electrical power distribution systems : smart grid, microgrid, AI, and cyber security ent://SD_ILS/0/SD_ILS:600371 2026-01-21T20:51:56Z 2026-01-21T20:51:56Z Author&#160;Masood, Tariq, author.&#160;Abdo, Jamil, author.&#160;Iqbal, Atif, author.<br/>Preferred Shelf Number&#160;TK3001 .M37 2026<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394327676">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394327676</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Teach Yourself VISUALLY iPhone 17 and iPhone Air. ent://SD_ILS/0/SD_ILS:600407 2026-01-21T20:51:56Z 2026-01-21T20:51:56Z Author&#160;Hart-Davis, Guy.<br/>Preferred Shelf Number&#160;XX(600407.1)<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394387632">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394387632</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Lessons from the Frontlines : Insights from a Cybersecurity Career. ent://SD_ILS/0/SD_ILS:600433 2026-01-21T20:51:56Z 2026-01-21T20:51:56Z Author&#160;Keren.<br/>Preferred Shelf Number&#160;XX(600433.1)<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394395439">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394395439</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Massive MIMO for future wireless communication systems : technology and applications ent://SD_ILS/0/SD_ILS:599640 2026-01-21T20:51:56Z 2026-01-21T20:51:56Z Author&#160;Montlouis, Webert.&#160;Imoize, Agbotiname Lucky.<br/>Preferred Shelf Number&#160;TK5103.4836 .M37 2025<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394228331">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394228331</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cyber defense : best practices for digital safety ent://SD_ILS/0/SD_ILS:600003 2026-01-21T20:51:56Z 2026-01-21T20:51:56Z Author&#160;Edwards, Jason, author.<br/>Preferred Shelf Number&#160;QA76.9 .A25 E39 2025<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394337040">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394337040</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Conversational artificial intelligence ent://SD_ILS/0/SD_ILS:598905 2026-01-21T20:51:56Z 2026-01-21T20:51:56Z Author&#160;Rawat, Romil, 1986- editor.&#160;Chakrawarti, Rajesh Kumar, editor&#160;Sarangi, Sanjaya Kumar, editor&#160;Vyas, Piyush, editor&#160;Alamanda, Mary Sowjanya, editor<br/>Preferred Shelf Number&#160;Q335 .C66 2024<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394200801">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394200801</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cryptography : algorithms, protocols, and standards for computer security ent://SD_ILS/0/SD_ILS:598914 2026-01-21T20:51:56Z 2026-01-21T20:51:56Z Author&#160;Mammeri, Zoubir, author.<br/>Preferred Shelf Number&#160;QA268 .M34 2024<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394207510">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394207510</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Stepping through cybersecurity risk management : a systems thinking approach ent://SD_ILS/0/SD_ILS:599021 2026-01-21T20:51:56Z 2026-01-21T20:51:56Z Author&#160;Bayuk, Jennifer L., author.<br/>Preferred Shelf Number&#160;QA76.9 .A25 B39 2024<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394213986">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394213986</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cyber Operations : A Case Study Approach ent://SD_ILS/0/SD_ILS:599117 2026-01-21T20:51:56Z 2026-01-21T20:51:56Z Author&#160;Couretas, Jerry M., 1966- author.<br/>Preferred Shelf Number&#160;QA76.9 .A25<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119712121">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119712121</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Fog computing for intelligent cloud IoT systems ent://SD_ILS/0/SD_ILS:599191 2026-01-21T20:51:56Z 2026-01-21T20:51:56Z Author&#160;Banerjee, Chandan, editor.&#160;Ghosh, Anupam, editor.&#160;Chakraborty, Rajdeep, editor.&#160;Elngar, Ahmed A., editor.<br/>Preferred Shelf Number&#160;TK5105.8857 .F64 2024<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394175345">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394175345</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Deep learning techniques for automation and industrial applications ent://SD_ILS/0/SD_ILS:599201 2026-01-21T20:51:56Z 2026-01-21T20:51:56Z Author&#160;Rathore, Pramod Singh, 1988- editor.&#160;Ahuja, Sachin.&#160;Burri, Srinivasa Rao.&#160;Khunteta, Ajay.&#160;Baliyan, Anupam.<br/>Preferred Shelf Number&#160;T59.5 .D44 2024<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394234271">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394234271</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> The cybersecurity guide to governance, risk, and compliance ent://SD_ILS/0/SD_ILS:598945 2026-01-21T20:51:56Z 2026-01-21T20:51:56Z Author&#160;Edwards, Jason (Cybersecurity expert), author.&#160;Weaver, Griffin, author.<br/>Preferred Shelf Number&#160;HD30.38 .E34 2024<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394250226">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394250226</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Creative approaches towards development of computing and multidisciplinary IT solutions for society ent://SD_ILS/0/SD_ILS:599371 2026-01-21T20:51:56Z 2026-01-21T20:51:56Z Author&#160;Bijalwan, Anchit, editor.<br/>Preferred Shelf Number&#160;QA76 .C74 2024<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394272303">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394272303</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Intelligent techniques for predictive data analytics ent://SD_ILS/0/SD_ILS:599076 2026-01-21T20:51:56Z 2026-01-21T20:51:56Z Author&#160;Singh, Neha (Electronic engineering professor), editor.&#160;Birla, Shilpi, editor.&#160;Ansari, Mohd Dilshad, editor.&#160;Shukla, Neeraj Kumar, editor.&#160;John Wiley &amp; Sons, publisher.<br/>Preferred Shelf Number&#160;TA340 .I56 2024<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394227990">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394227990</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Digital agricultural ecosystem : revolutionary advancements in agriculture ent://SD_ILS/0/SD_ILS:599088 2026-01-21T20:51:56Z 2026-01-21T20:51:56Z Author&#160;Singh, Kuldeep, editor.&#160;Kolar, Prasanna, editor.<br/>Preferred Shelf Number&#160;S493 .D54 2024<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394242962">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394242962</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Artificial intelligence-enabled blockchain technology and digital twin for smart hospitals ent://SD_ILS/0/SD_ILS:599395 2026-01-21T20:51:56Z 2026-01-21T20:51:56Z Author&#160;Tyagi, Amit Kumar, editor.<br/>Preferred Shelf Number&#160;RA976 .A78 2024<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394287420">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394287420</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Reshaping intelligent business and industry : convergence of AI and IoT at the cutting edge ent://SD_ILS/0/SD_ILS:599399 2026-01-21T20:51:56Z 2026-01-21T20:51:56Z Author&#160;Dahiya, Neeraj, editor.&#160;Jaglan, Vivek.&#160;Koundal, Deepika.&#160;Le, Dac-Nhuong.<br/>Preferred Shelf Number&#160;HD45 .R47 2024<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119905202">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119905202</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Digital twin and blockchain for smart cities ent://SD_ILS/0/SD_ILS:599400 2026-01-21T20:51:56Z 2026-01-21T20:51:56Z Author&#160;Tyagi, Amit Kumar, 1988-<br/>Preferred Shelf Number&#160;TD159.4 .D54 2024<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394303564">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394303564</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security and privacy vision in 6G : a comprehensive guide ent://SD_ILS/0/SD_ILS:598347 2026-01-21T20:51:56Z 2026-01-21T20:51:56Z Author&#160;Porambage, Pawani, author.&#160;Liyanage, Madhusanka, author.<br/>Preferred Shelf Number&#160;TK5103.252 .P67 2023<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119875437">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119875437</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Quantum computing in cybersecurity ent://SD_ILS/0/SD_ILS:598685 2026-01-21T20:51:56Z 2026-01-21T20:51:56Z Author&#160;Rawat, Romil, editor.<br/>Preferred Shelf Number&#160;QA76.9 .A25 Q83 2023<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394167401">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394167401</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Smart city infrastructure : the blockchain perspective ent://SD_ILS/0/SD_ILS:597413 2026-01-21T20:51:56Z 2026-01-21T20:51:56Z Author&#160;Kumar, Vishal, editor.<br/>Preferred Shelf Number&#160;QA76.9 .B56<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119785569">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119785569</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> The Internet of Medical Things (IoMT) : healthcare transformation ent://SD_ILS/0/SD_ILS:597423 2026-01-21T20:51:56Z 2026-01-21T20:51:56Z Author&#160;Hemalatha, R. J., editor.<br/>Preferred Shelf Number&#160;R859.7 .A78<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119769200">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119769200</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Bioinformatics and medical applications : big data using deep learning algorithms ent://SD_ILS/0/SD_ILS:597469 2026-01-21T20:51:56Z 2026-01-21T20:51:56Z Author&#160;Suresh, A.<br/>Preferred Shelf Number&#160;R858 .B56 2022<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119792673">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119792673</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cyber security and network security ent://SD_ILS/0/SD_ILS:597484 2026-01-21T20:51:56Z 2026-01-21T20:51:56Z Author&#160;Pramanik, Sabyasachi, editor.&#160;Samanta, Debabrata, 1987- editor.&#160;Vinay, M., editor.&#160;Guha, Abhijit, editor.<br/>Preferred Shelf Number&#160;QA76.9 .A25<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119812555">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119812555</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Executive's guide to cyber risk : securing the future today ent://SD_ILS/0/SD_ILS:597567 2026-01-21T20:51:56Z 2026-01-21T20:51:56Z Author&#160;Moyo, Siegfried, author.<br/>Preferred Shelf Number&#160;HF5548.37 .M68 2022<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394320578">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394320578</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Understanding artificial intelligence : fundamentals and applications ent://SD_ILS/0/SD_ILS:597672 2026-01-21T20:51:56Z 2026-01-21T20:51:56Z Author&#160;Liu, Albert Chun-Chen, author.&#160;Law, Oscar Ming Kin, author.&#160;Law, Iain, author.<br/>Preferred Shelf Number&#160;Q335 .L58 2022<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119858393">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119858393</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Quantum blockchain : an emerging cryptographic paradigm ent://SD_ILS/0/SD_ILS:597796 2026-01-21T20:51:56Z 2026-01-21T20:51:56Z Author&#160;Dhanaraj, Rajesh Kumar, editor.<br/>Preferred Shelf Number&#160;QA76.9 .B56<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119836728">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119836728</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> The CISO evolution : business knowledge for cybersecurity executives ent://SD_ILS/0/SD_ILS:597056 2026-01-21T20:51:56Z 2026-01-21T20:51:56Z Author&#160;Sharp, Matthew K., author.&#160;Lambros, Kyriakos P., author.<br/>Preferred Shelf Number&#160;HD30.2 .S5325 2022<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119782513">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119782513</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Digitization of healthcare data using blockchain ent://SD_ILS/0/SD_ILS:597646 2026-01-21T20:51:56Z 2026-01-21T20:51:56Z Author&#160;Poongodi, T., editor.&#160;Sumathi, D., editor.&#160;Balusamy, Balamurugan, editor.&#160;Savita, K. S., editor.<br/>Preferred Shelf Number&#160;R858 .D54 2022<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119792734">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119792734</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Object detection by stereo vision images ent://SD_ILS/0/SD_ILS:597789 2026-01-21T20:51:56Z 2026-01-21T20:51:56Z Author&#160;Priya, R. Arokia, editor.<br/>Preferred Shelf Number&#160;TK7882 .P3<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119842286">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119842286</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Understanding infrastructure edge computing : concepts, technologies and considerations ent://SD_ILS/0/SD_ILS:596448 2026-01-21T20:51:56Z 2026-01-21T20:51:56Z Author&#160;Marcham, Alex, author.<br/>Preferred Shelf Number&#160;QA76.583 .M37 2021<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119763260">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119763260</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Intelligent data analytics for terror threat prediction : architectures, methodologies, techniques and applications ent://SD_ILS/0/SD_ILS:596541 2026-01-21T20:51:56Z 2026-01-21T20:51:56Z Author&#160;Pani, Subhendu Kumar, 1980- editor.&#160;Singh, Sanjay Kumar, 1963- editor.&#160;Garg, Lalit, 1977- editor.<br/>Preferred Shelf Number&#160;HV6431 .I58 2021<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119711629">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119711629</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cognitive engineering for next generation computing : a practical analytical approach ent://SD_ILS/0/SD_ILS:596681 2026-01-21T20:51:56Z 2026-01-21T20:51:56Z Author&#160;Prakash, Kolla Bhanu, editor.&#160;Kanagachidambaresan, G. R., 1988- editor.&#160;Srikanth, V., editor.&#160;Vamsidhar, E., editor.<br/>Preferred Shelf Number&#160;QA76.9 .H85 C639 2021<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119711308">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119711308</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Machine learning approach for cloud data analytics in IoT ent://SD_ILS/0/SD_ILS:596919 2026-01-21T20:51:56Z 2026-01-21T20:51:56Z Author&#160;Mohanty, Sachi Nandan, editor.&#160;Chatterjee, Jyotir Moy, editor.&#160;Mangla, Monika, editor.&#160;Satpathy, Suneeta, editor.&#160;Potluri, Sirisha, editor.<br/>Preferred Shelf Number&#160;Q325.5 .M33 2021<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119785873">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119785873</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Machine learning approaches for convergence of IoT and Blockchain ent://SD_ILS/0/SD_ILS:596923 2026-01-21T20:51:56Z 2026-01-21T20:51:56Z Author&#160;Singh, Krishna Kant (Telecommunications professor)&#160;Singh, Akansha.&#160;Sharma, Sanjay K.<br/>Preferred Shelf Number&#160;Q325.5<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119761884">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119761884</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Machine learning algorithms and applications ent://SD_ILS/0/SD_ILS:597016 2026-01-21T20:51:56Z 2026-01-21T20:51:56Z Author&#160;Srinivas, Mettu, editor.&#160;Sucharitha, G., editor.&#160;Matta, Anjanna, editor.<br/>Preferred Shelf Number&#160;Q325.5<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119769262">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119769262</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security and its challenges in the 21st Century ent://SD_ILS/0/SD_ILS:597077 2026-01-21T20:51:56Z 2026-01-21T20:51:56Z Author&#160;Guerrier, Claudine, author.<br/>Preferred Shelf Number&#160;QA76.9 .A25<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119854852">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119854852</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Design and analysis of security protocol for communication ent://SD_ILS/0/SD_ILS:595798 2026-01-21T20:51:56Z 2026-01-21T20:51:56Z Author&#160;Goyal, Dinesh, 1976- editor.&#160;Balamurigan, A., editor.&#160;Peng, Sheng-Lung, editor.&#160;Verma, O. P. (Telecommunications engineer), editor.<br/>Preferred Shelf Number&#160;TK5105.59 .D468 2020 EB<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119555759">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119555759</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Tribe of hackers security leaders : tribal knowledge from the best in cybersecurity leadership ent://SD_ILS/0/SD_ILS:595887 2026-01-21T20:51:56Z 2026-01-21T20:51:56Z Author&#160;Carey, Marcus J. (Cybersecurity professional), author.&#160;Jin, Jennifer.<br/>Preferred Shelf Number&#160;QA76.9 .A25 C37 2020<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119643784">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119643784</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cyber breach response that actually works : organizational approach to managing residual risk ent://SD_ILS/0/SD_ILS:596117 2026-01-21T20:51:56Z 2026-01-21T20:51:56Z Author&#160;Gorecki, Andrew.<br/>Preferred Shelf Number&#160;QA76.9 .A25<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119679349">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119679349</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Tribe of hackers blue team : tribal knowledge from the best in defensive cybersecurity ent://SD_ILS/0/SD_ILS:596276 2026-01-21T20:51:56Z 2026-01-21T20:51:56Z Author&#160;Carey, Marcus J. (Cybersecurity professional)&#160;Jin, Jennifer.<br/>Preferred Shelf Number&#160;QA76.9 .A25 C3673 2020<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119643432">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119643432</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security, privacy and digital forensics in the cloud ent://SD_ILS/0/SD_ILS:594934 2026-01-21T20:51:56Z 2026-01-21T20:51:56Z Author&#160;Chen, Lei, 1978 July 28- editor.&#160;Takabi, Hassan, 1982- editor.&#160;Le-Khac, Nhien-An, 1972- editor.<br/>Preferred Shelf Number&#160;QA76.585 .S43 2019<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119053385">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119053385</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cyber security in parallel and distributed computing : concepts, techniques, applications and case studies ent://SD_ILS/0/SD_ILS:595099 2026-01-21T20:51:56Z 2026-01-21T20:51:56Z Author&#160;Le, Dac-Nhuong, 1983- editor.&#160;Kumar, Raghvendra, 1987- editor.&#160;Mishra, Brojo Kishore, 1979- editor.&#160;Khari, Manju, editor.&#160;Chatterjee, Jyotir Moy, editor.<br/>Preferred Shelf Number&#160;QA76.9 .A25<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119488330">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119488330</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Transformational security awareness : what neuroscientists, storytellers, and marketers can teach us about driving secure behaviors ent://SD_ILS/0/SD_ILS:595304 2026-01-21T20:51:56Z 2026-01-21T20:51:56Z Author&#160;Carpenter, Perry, author.<br/>Preferred Shelf Number&#160;QA76.9 .A25 C37 2019 EB<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119566380">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119566380</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security designs for the cloud, IoT, and social networking ent://SD_ILS/0/SD_ILS:595493 2026-01-21T20:51:56Z 2026-01-21T20:51:56Z Author&#160;Le, Dac-Nhuong, 1983- editor.&#160;Bhatt, Chintan M., 1988- editor.&#160;Madhukar, Mani, editor.<br/>Preferred Shelf Number&#160;QA76.585<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119593171">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119593171</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cybersecurity blue team toolkit ent://SD_ILS/0/SD_ILS:595209 2026-01-21T20:51:56Z 2026-01-21T20:51:56Z Author&#160;Tanner, Nadean H., author.<br/>Preferred Shelf Number&#160;QA76.9 .A25 T36 2019 EB<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119552963">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119552963</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> 5G explained : security and deployment of advanced mobile communications ent://SD_ILS/0/SD_ILS:594896 2026-01-21T20:51:56Z 2026-01-21T20:51:56Z Author&#160;Penttinen, Jyrki T. J., author.<br/>Preferred Shelf Number&#160;TK5103.483 .P46 2019<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119275695">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119275695</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Blockchain for distributed systems security ent://SD_ILS/0/SD_ILS:595146 2026-01-21T20:51:56Z 2026-01-21T20:51:56Z Author&#160;Shetty, Sachin, editor.&#160;Kamhoua, Charles A., edtior.&#160;Njilla, Laurent L., editor.<br/>Preferred Shelf Number&#160;QA76.9 .B56 B56 2019 EB<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119519621">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119519621</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Unstructured data analytics : how to improve customer acquisition, customer retention, and fraud detection and prevention ent://SD_ILS/0/SD_ILS:594382 2026-01-21T20:51:56Z 2026-01-21T20:51:56Z Author&#160;Isson, Jean Paul, 1971-<br/>Preferred Shelf Number&#160;HD30.215<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119378846">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119378846</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Insider threats ent://SD_ILS/0/SD_ILS:594407 2026-01-21T20:51:56Z 2026-01-21T20:51:56Z Author&#160;Arduin, Pierre-Emmanuel, author.<br/>Preferred Shelf Number&#160;QA76.9 .A25<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119419785">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119419785</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Wireshark for security professionals : using Wireshark and the Metasploit Framework ent://SD_ILS/0/SD_ILS:593472 2026-01-21T20:51:56Z 2026-01-21T20:51:56Z Author&#160;Bullock, Jessey, author.&#160;Gordon, Adam, author.<br/>Preferred Shelf Number&#160;QA76.9 .A25<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119183457">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119183457</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Network forensics ent://SD_ILS/0/SD_ILS:593814 2026-01-21T20:51:56Z 2026-01-21T20:51:56Z Author&#160;Messier, Ric, author.<br/>Preferred Shelf Number&#160;TK5105.59<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119329190">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119329190</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/>