Search Results for Information technologies - Narrowed by: Computer security. SirsiDynix Enterprise https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dInformation$002btechnologies$0026qf$003dSUBJECT$002509Subject$002509Computer$002bsecurity.$002509Computer$002bsecurity.$0026ic$003dtrue$0026ps$003d300? 2026-02-20T17:42:07Z Information and Software Technologies 25th International Conference, ICIST 2019, Vilnius, Lithuania, October 10&ndash;12, 2019, Proceedings ent://SD_ILS/0/SD_ILS:485468 2026-02-20T17:42:07Z 2026-02-20T17:42:07Z Author&#160;Dama&scaron;evi&#269;ius, Robertas. editor.&#160;Vasiljevien&#279;, Giedr&#279;. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-30275-7">https://doi.org/10.1007/978-3-030-30275-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advanced methodologies and technologies in system security, information privacy, and forensics ent://SD_ILS/0/SD_ILS:482009 2026-02-20T17:42:07Z 2026-02-20T17:42:07Z Author&#160;Khosrow-Pour, Mehdi, 1951- editor.&#160;IGI Global, publisher.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-7492-7">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-7492-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Smart Secure Systems &ndash; IoT and Analytics Perspective Second International Conference on Intelligent Information Technologies. ICIIT 2017, Chennai, India, December 20-22, 2017, Proceedings ent://SD_ILS/0/SD_ILS:400428 2026-02-20T17:42:07Z 2026-02-20T17:42:07Z Author&#160;Venkataramani, Guru Prasadh. editor.&#160;Sankaranarayanan, Karthik. editor.&#160;Mukherjee, Saswati. editor.&#160;Arputharaj, Kannan. editor.&#160;Sankara Narayanan, Swamynathan. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-10-7635-0">https://doi.org/10.1007/978-981-10-7635-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cyber Operations : A Case Study Approach ent://SD_ILS/0/SD_ILS:599117 2026-02-20T17:42:07Z 2026-02-20T17:42:07Z Author&#160;Couretas, Jerry M., 1966- author.<br/>Preferred Shelf Number&#160;QA76.9 .A25<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119712121">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119712121</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Quantum computing in cybersecurity ent://SD_ILS/0/SD_ILS:598685 2026-02-20T17:42:07Z 2026-02-20T17:42:07Z Author&#160;Rawat, Romil, editor.<br/>Preferred Shelf Number&#160;QA76.9 .A25 Q83 2023<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394167401">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394167401</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cyber security and digital forensics ent://SD_ILS/0/SD_ILS:597326 2026-02-20T17:42:07Z 2026-02-20T17:42:07Z Author&#160;Ghonge, Mangesh, 1984- editor.<br/>Preferred Shelf Number&#160;QA76.9 .A25<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119795667">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119795667</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> The CISO evolution : business knowledge for cybersecurity executives ent://SD_ILS/0/SD_ILS:597056 2026-02-20T17:42:07Z 2026-02-20T17:42:07Z Author&#160;Sharp, Matthew K., author.&#160;Lambros, Kyriakos P., author.<br/>Preferred Shelf Number&#160;HD30.2 .S5325 2022<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119782513">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119782513</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cybersecurity in smart homes : architectures, solutions and technologies ent://SD_ILS/0/SD_ILS:597626 2026-02-20T17:42:07Z 2026-02-20T17:42:07Z Author&#160;Khatoun, Rida, author.<br/>Preferred Shelf Number&#160;QA76.9 .A25<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119987451">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119987451</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Trust-based communication systems for internet of things applications ent://SD_ILS/0/SD_ILS:597744 2026-02-20T17:42:07Z 2026-02-20T17:42:07Z Author&#160;Madaan, Vishu, editor.&#160;Agrawal, Prateek, editor.&#160;Sharma, Anand, editor.&#160;Sharma, Dilip Kumar, editor.&#160;Agrawal, Akshat, 1986- editor.<br/>Preferred Shelf Number&#160;TK5105.8857<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119896746">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119896746</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Transformational security awareness : what neuroscientists, storytellers, and marketers can teach us about driving secure behaviors ent://SD_ILS/0/SD_ILS:595304 2026-02-20T17:42:07Z 2026-02-20T17:42:07Z Author&#160;Carpenter, Perry, author.<br/>Preferred Shelf Number&#160;QA76.9 .A25 C37 2019 EB<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119566380">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119566380</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> An introduction to cyber modeling and simulation ent://SD_ILS/0/SD_ILS:594699 2026-02-20T17:42:07Z 2026-02-20T17:42:07Z Author&#160;Couretas, Jerry M., 1966- author.<br/>Preferred Shelf Number&#160;QA76.9 .C65<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119420842">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119420842</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Data protection : governance, risk management, and compliance ent://SD_ILS/0/SD_ILS:543918 2026-02-20T17:42:07Z 2026-02-20T17:42:07Z Author&#160;Hill, David G. (David Gary), 1943, author.<br/>Preferred Shelf Number&#160;QA76.9 .A25 H52 2009<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781439806937">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> Digital privacy : theory, technologies, and practices ent://SD_ILS/0/SD_ILS:547774 2026-02-20T17:42:07Z 2026-02-20T17:42:07Z Author&#160;Acquisti, Alessandro.<br/>Preferred Shelf Number&#160;QA76.9 .A25 D528 2008<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781420052183">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> Cryptography, information theory, and error-correction : a handbook for the 21st century ent://SD_ILS/0/SD_ILS:593044 2026-02-20T17:42:07Z 2026-02-20T17:42:07Z Author&#160;Bruen, Aiden A., 1941-&#160;Forcinito, Mario, 1962-<br/>Preferred Shelf Number&#160;QA76.9 .A25 B79 2005<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781118033296">https://onlinelibrary.wiley.com/doi/book/10.1002/9781118033296</a> <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119582397">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119582397</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Database and applications security : integrating information security and data management ent://SD_ILS/0/SD_ILS:540220 2026-02-20T17:42:07Z 2026-02-20T17:42:07Z Author&#160;Thuraisingham, Bhavani M., author.<br/>Preferred Shelf Number&#160;QA76.9 .D314 T47 2005<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9780203486061">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/>