Search Results for Information services. - Narrowed by: Computer security.SirsiDynix Enterprisehttps://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dInformation$002bservices.$0026qf$003dSUBJECT$002509Subject$002509Computer$002bsecurity.$002509Computer$002bsecurity.$0026ps$003d300$0026isd$003dtrue?2026-01-21T00:17:59ZHuman Interface and the Management of Information. Information in Applications and Services 20th International Conference, HIMI 2018, Held as Part of HCI International 2018, Las Vegas, NV, USA, July 15-20, 2018, Proceedings, Part IIent://SD_ILS/0/SD_ILS:3990922026-01-21T00:17:59Z2026-01-21T00:17:59ZAuthor Yamamoto, Sakae. editor. Mori, Hirohiko. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-92046-7">https://doi.org/10.1007/978-3-319-92046-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Cyber defense : best practices for digital safetyent://SD_ILS/0/SD_ILS:6000032026-01-21T00:17:59Z2026-01-21T00:17:59ZAuthor Edwards, Jason, author.<br/>Preferred Shelf Number QA76.9 .A25 E39 2025<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394337040">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394337040</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Open-source security operations center (SOC) : a complete guide to establishing, managing, and maintaining a modern SOCent://SD_ILS/0/SD_ILS:5994342026-01-21T00:17:59Z2026-01-21T00:17:59ZAuthor Basta, Alfred, author. Basta, Nadine, author. Anwar, Waqar, author. Essar, Mohammad Ilyas, author. John Wiley & Sons, publisher.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394201631">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394201631</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Zero trust journey across the digital estateent://SD_ILS/0/SD_ILS:5607002026-01-21T00:17:59Z2026-01-21T00:17:59ZAuthor Pillai, Binil, author. Kudrati, Abbas, author.<br/>Preferred Shelf Number TK5105.59<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003225096">https://www.taylorfrancis.com/books/9781003225096</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>The CISO evolution : business knowledge for cybersecurity executivesent://SD_ILS/0/SD_ILS:5970562026-01-21T00:17:59Z2026-01-21T00:17:59ZAuthor Sharp, Matthew K., author. Lambros, Kyriakos P., author.<br/>Preferred Shelf Number HD30.2 .S5325 2022<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119782513">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119782513</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Artificial intelligence and data mining approaches in security frameworksent://SD_ILS/0/SD_ILS:5969572026-01-21T00:17:59Z2026-01-21T00:17:59ZAuthor Bhargava, Neeraj. Bhargava, Ritu. Rathore, Pramod Singh, 1988- Agrawal, Rashmi, 1978-<br/>Preferred Shelf Number Q335<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119760429">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119760429</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Cybersecurity blue team toolkitent://SD_ILS/0/SD_ILS:5952092026-01-21T00:17:59Z2026-01-21T00:17:59ZAuthor Tanner, Nadean H., author.<br/>Preferred Shelf Number QA76.9 .A25 T36 2019 EB<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119552963">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119552963</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Digital forensicsent://SD_ILS/0/SD_ILS:5933462026-01-21T00:17:59Z2026-01-21T00:17:59ZAuthor Årnes, André, 1976- editor.<br/>Preferred Shelf Number HV8079 .C65<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119262442">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119262442</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Delivering London 2012 ICT implementation and operationsent://SD_ILS/0/SD_ILS:5098892026-01-21T00:17:59Z2026-01-21T00:17:59ZAuthor IET, ed.<br/>Preferred Shelf Number XX(509889.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1049/PERICP2E">http://dx.doi.org/10.1049/PERICP2E</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Information security policy development for compliance : ISO/IEC 27001, NIST SP 800-53, HIPAA standard, PCI DSS V2.0, and AUP V5.0ent://SD_ILS/0/SD_ILS:5451282026-01-21T00:17:59Z2026-01-21T00:17:59ZAuthor Williams, Barry L., author.<br/>Preferred Shelf Number QA76.9 .A25 .W5495 2013<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781466580596">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>Insider computer fraud : an in-depth framework for detecting and defending against insider IT attacksent://SD_ILS/0/SD_ILS:5443962026-01-21T00:17:59Z2026-01-21T00:17:59ZAuthor Brancik, Kenneth C., author.<br/>Preferred Shelf Number QA76.9 .A25 B725 2008<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781420046601">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>Digital privacy : theory, technologies, and practicesent://SD_ILS/0/SD_ILS:5477742026-01-21T00:17:59Z2026-01-21T00:17:59ZAuthor Acquisti, Alessandro.<br/>Preferred Shelf Number QA76.9 .A25 D528 2008<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781420052183">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>