Search Results for Informatique. - Narrowed by: Computer security.
SirsiDynix Enterprise
https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dInformatique.$0026qf$003dSUBJECT$002509Subject$002509Computer$002bsecurity.$002509Computer$002bsecurity.$0026ps$003d300$0026isd$003dtrue?
2026-01-22T14:19:58Z
Digital immune system : principles and practices
ent://SD_ILS/0/SD_ILS:600243
2026-01-22T14:19:58Z
2026-01-22T14:19:58Z
Author Priyambada Dash, Sujata, editor. Mishra, Vaibhav. Shaw, Bijeta. Panda, Sandeep Kumar. Balamurugan, S.<br/>Preferred Shelf Number QA76.9 .A25 D54 2026<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394383788">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394383788</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Defense in depth : modern cybersecurity strategies and evolving threats
ent://SD_ILS/0/SD_ILS:600191
2026-01-22T14:19:58Z
2026-01-22T14:19:58Z
Author Zangana, Hewa Majeed, 1987- editor.<br/>Preferred Shelf Number QA76.9 .A25 D44 2026<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394340750">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394340750</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Building effective privacy programs : cybersecurity from principles to practice
ent://SD_ILS/0/SD_ILS:600111
2026-01-22T14:19:58Z
2026-01-22T14:19:58Z
Author Edwards, Jason (Cybersecurity expert), author. Weaver, Griffin, author. John Wiley & Sons, publisher.<br/>Preferred Shelf Number QA76.9 .P735 E34 2026<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394342662">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394342662</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Rise of the machines : when AI and zero trust collide : a Project Zero Trust story
ent://SD_ILS/0/SD_ILS:599932
2026-01-22T14:19:58Z
2026-01-22T14:19:58Z
Author Finney, George, author. Vinduska, Zach, author.<br/>Preferred Shelf Number QA76.9 .A25 F56 2025<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394352517">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394352517</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
The techno-legal dynamics of cyber crimes in Industry 5.0
ent://SD_ILS/0/SD_ILS:599801
2026-01-22T14:19:58Z
2026-01-22T14:19:58Z
Author Kaur, Gagandeep, editor Choudhury, Tanupriya editor Balamurugan, S. editor<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394242177">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394242177</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Next-generation systems and secure computing
ent://SD_ILS/0/SD_ILS:599779
2026-01-22T14:19:58Z
2026-01-22T14:19:58Z
Author Barman, Subhabrata, editor. Koley, Santanu, editor. Joardar, Subhankar, editor.<br/>Preferred Shelf Number QA76.9 .A25 N49 2025<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394228522">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394228522</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Quantum computing models for cybersecurity and wireless communications
ent://SD_ILS/0/SD_ILS:599707
2026-01-22T14:19:58Z
2026-01-22T14:19:58Z
Author Kumar, Budati Anil, edited. Kumar, Singamaneni Kranthi, edited. Li, Xingwang (Computer scientist), edited.<br/>Preferred Shelf Number QA76.9 .A25 Q36 2025<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394271429">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394271429</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Emerging threats and countermeasures in cybersecurity
ent://SD_ILS/0/SD_ILS:599561
2026-01-22T14:19:58Z
2026-01-22T14:19:58Z
Preferred Shelf Number QA76.9 .A25 E44 2025<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394230600">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394230600</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Inside cyber : how AI, 5G, IoT, and quantum computing will transform privacy and our security
ent://SD_ILS/0/SD_ILS:599222
2026-01-22T14:19:58Z
2026-01-22T14:19:58Z
Author Brooks, Chuck (Writer of Inside cyber), author.<br/>Preferred Shelf Number HC79 .T4 B735 2025<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394310562">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394310562</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Protection of electrical power distribution systems : smart grid, microgrid, AI, and cyber security
ent://SD_ILS/0/SD_ILS:600371
2026-01-22T14:19:58Z
2026-01-22T14:19:58Z
Author Masood, Tariq, author. Abdo, Jamil, author. Iqbal, Atif, author.<br/>Preferred Shelf Number TK3001 .M37 2026<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394327676">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394327676</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cyber defense : best practices for digital safety
ent://SD_ILS/0/SD_ILS:600003
2026-01-22T14:19:58Z
2026-01-22T14:19:58Z
Author Edwards, Jason, author.<br/>Preferred Shelf Number QA76.9 .A25 E39 2025<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394337040">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394337040</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Protecting and mitigating against cyber threats : deploying artificial intelligence and machine learning
ent://SD_ILS/0/SD_ILS:599999
2026-01-22T14:19:58Z
2026-01-22T14:19:58Z
Author Mohanty, Sachi Nandan, editor.<br/>Preferred Shelf Number QA76.9 .A25 P76 2025<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394305216">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394305216</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information security and privacy quick reference the essential handbook for every CISO, CSO, and Chief Privacy Officer
ent://SD_ILS/0/SD_ILS:599946
2026-01-22T14:19:58Z
2026-01-22T14:19:58Z
Author Chapple, Mike, author. Shelley, Joe. Stewart, James Michael.<br/>Preferred Shelf Number QA76.9 .A25 C43 2025<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394353347">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394353347</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Taming the hacking storm : a framework for securing and defending networks
ent://SD_ILS/0/SD_ILS:599858
2026-01-22T14:19:58Z
2026-01-22T14:19:58Z
Author Grimes, Roger A., author.<br/>Preferred Shelf Number QA76.9 .A25 G75 2025<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394352289">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394352289</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
The cybersecurity control playbook : from fundamentals to advanced strategies
ent://SD_ILS/0/SD_ILS:599789
2026-01-22T14:19:58Z
2026-01-22T14:19:58Z
Author Edwards, Jason (Cybersecurity expert), author. John Wiley & Sons, publisher.<br/>Preferred Shelf Number QA76.9 .A25 E3884 2025<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394331888">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394331888</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Securing the digital frontier : threats and advanced techniques in security and forensics
ent://SD_ILS/0/SD_ILS:599732
2026-01-22T14:19:58Z
2026-01-22T14:19:58Z
Author Sharma, Kavita, 1985- editor.<br/>Preferred Shelf Number QA76.9 .A25 S43 2025<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394268917">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394268917</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Alice and Bob learn secure coding
ent://SD_ILS/0/SD_ILS:599664
2026-01-22T14:19:58Z
2026-01-22T14:19:58Z
Author Janca, Tanya. author.<br/>Preferred Shelf Number QA76.76 .D47<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394277179">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394277179</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Digital twins and cybersecurity : safeguarding the future of connected systems
ent://SD_ILS/0/SD_ILS:599615
2026-01-22T14:19:58Z
2026-01-22T14:19:58Z
Author Naveen, Palanichamy, author. Maheswar, R., author. Ragupathy, U.S., author.<br/>Preferred Shelf Number QA76.9 .C65 N38 2025<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394272501">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394272501</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Generative AI, cybersecurity, and ethics
ent://SD_ILS/0/SD_ILS:599597
2026-01-22T14:19:58Z
2026-01-22T14:19:58Z
Author Islam, Ray (Mohammad Rubyet), author.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394279326">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394279326</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Open-source security operations center (SOC) : a complete guide to establishing, managing, and maintaining a modern SOC
ent://SD_ILS/0/SD_ILS:599434
2026-01-22T14:19:58Z
2026-01-22T14:19:58Z
Author Basta, Alfred, author. Basta, Nadine, author. Anwar, Waqar, author. Essar, Mohammad Ilyas, author. John Wiley & Sons, publisher.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394201631">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394201631</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Securing cyber-physical systems : fundamentals, applications and challenges
ent://SD_ILS/0/SD_ILS:600260
2026-01-22T14:19:58Z
2026-01-22T14:19:58Z
Author Ananthajothi, K., editor.<br/>Preferred Shelf Number TK5105.59 .S43 2025<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394287765">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394287765</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
CYBERSECURITY IN THE TRANSPORTATION INDUSTRY.
ent://SD_ILS/0/SD_ILS:599238
2026-01-22T14:19:58Z
2026-01-22T14:19:58Z
Preferred Shelf Number HE194 .C93 2024<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394204472">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394204472</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Realizing the Metaverse : a communications and networking perspective
ent://SD_ILS/0/SD_ILS:599057
2026-01-22T14:19:58Z
2026-01-22T14:19:58Z
Author Lim, Wei Yang Bryan, editor. Xiong, Zehui, editor. Niyato, Dusit, editor. Zhang, Junshan (Electrical engineer), editor. Shen, X. (Xuemin), 1958- editor.<br/>Preferred Shelf Number TK5105.8864 .R43 2024<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394188932">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394188932</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Effective vulnerability management : managing risk in the vulnerable digital ecosystem
ent://SD_ILS/0/SD_ILS:599047
2026-01-22T14:19:58Z
2026-01-22T14:19:58Z
Author Hughes, Chris (Christopher Matthew), author. Robinson, Nikki, author.<br/>Preferred Shelf Number QA76.9 .A25 H84 2024<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394277155">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394277155</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
x86 software reverse-engineering, cracking, and counter-measures
ent://SD_ILS/0/SD_ILS:598920
2026-01-22T14:19:58Z
2026-01-22T14:19:58Z
Author Domas, Stephanie, author. Domas, Christopher, author.<br/>Preferred Shelf Number QA76.9 .A25 D66 2024<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394277131">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394277131</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cryptography : algorithms, protocols, and standards for computer security
ent://SD_ILS/0/SD_ILS:598914
2026-01-22T14:19:58Z
2026-01-22T14:19:58Z
Author Mammeri, Zoubir, author.<br/>Preferred Shelf Number QA268 .M34 2024<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394207510">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394207510</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
The cybersecurity guide to governance, risk, and compliance
ent://SD_ILS/0/SD_ILS:598945
2026-01-22T14:19:58Z
2026-01-22T14:19:58Z
Author Edwards, Jason (Cybersecurity expert), author. Weaver, Griffin, author.<br/>Preferred Shelf Number HD30.38 .E34 2024<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394250226">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394250226</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Automated secure computing for next-generation systems
ent://SD_ILS/0/SD_ILS:598752
2026-01-22T14:19:58Z
2026-01-22T14:19:58Z
Author Tyagi, Amit Kumar, editor.<br/>Preferred Shelf Number QA76.9 .A25 A98 2024<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394213948">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394213948</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
The DevSecOps playbook : deliver continuous security at speed
ent://SD_ILS/0/SD_ILS:598634
2026-01-22T14:19:58Z
2026-01-22T14:19:58Z
Author Mack, Sean D., author.<br/>Preferred Shelf Number QA76.9 .A25 M33 2024<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394189281">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394189281</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Stepping through cybersecurity risk management : a systems thinking approach
ent://SD_ILS/0/SD_ILS:599021
2026-01-22T14:19:58Z
2026-01-22T14:19:58Z
Author Bayuk, Jennifer L., author.<br/>Preferred Shelf Number QA76.9 .A25 B39 2024<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394213986">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394213986</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cyber Operations : A Case Study Approach
ent://SD_ILS/0/SD_ILS:599117
2026-01-22T14:19:58Z
2026-01-22T14:19:58Z
Author Couretas, Jerry M., 1966- author.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119712121">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119712121</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Wireless communication in cyber security
ent://SD_ILS/0/SD_ILS:598705
2026-01-22T14:19:58Z
2026-01-22T14:19:58Z
Author Sountharrajan, S. editor Maheswar, R. editor Rathee, Geetanjali, editor Akila, M. editor<br/>Preferred Shelf Number QA76.9 .A25 W57 2023<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119910619">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119910619</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Quantum computing in cybersecurity
ent://SD_ILS/0/SD_ILS:598685
2026-01-22T14:19:58Z
2026-01-22T14:19:58Z
Author Rawat, Romil, editor.<br/>Preferred Shelf Number QA76.9 .A25 Q83 2023<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394167401">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394167401</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Sustainably investing in digital assets globally
ent://SD_ILS/0/SD_ILS:597764
2026-01-22T14:19:58Z
2026-01-22T14:19:58Z
Author Ozelli, Selva, author.<br/>Preferred Shelf Number HG4515.15 .O38 2023<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394320530">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394320530</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Symmetric cryptography. Volume 1 : Design and security proofs
ent://SD_ILS/0/SD_ILS:598803
2026-01-22T14:19:58Z
2026-01-22T14:19:58Z
Author Boura, Christina, editor. Naya-Plasencia, Maria, editor.<br/>Preferred Shelf Number Z104 .S966 2023<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394256358">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394256358</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cybercrime during the SARS-CoV-2 pandemic (2019-2022)
ent://SD_ILS/0/SD_ILS:598517
2026-01-22T14:19:58Z
2026-01-22T14:19:58Z
Author Ventre, Daniel, editor. Loiseau, Hugo, 1974- editor.<br/>Preferred Shelf Number HV6773 .C93 2023<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394226344">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394226344</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cyber investigations : a research based textbook for advanced studies
ent://SD_ILS/0/SD_ILS:597931
2026-01-22T14:19:58Z
2026-01-22T14:19:58Z
Author Årnes, André, 1976- editor.<br/>Preferred Shelf Number HV8079 .C65 C933 2023<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119582021">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119582021</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Perceptions and Analysis of Digital Risks
ent://SD_ILS/0/SD_ILS:597226
2026-01-22T14:19:58Z
2026-01-22T14:19:58Z
Author Capelle, Camille. Liquète, Vincent.<br/>Preferred Shelf Number QA76.575<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119887959">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119887959</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cybersecurity in smart homes : architectures, solutions and technologies
ent://SD_ILS/0/SD_ILS:597626
2026-01-22T14:19:58Z
2026-01-22T14:19:58Z
Author Khatoun, Rida, author.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119987451">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119987451</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Managing cybersecurity in the process industries
ent://SD_ILS/0/SD_ILS:597508
2026-01-22T14:19:58Z
2026-01-22T14:19:58Z
Author American Institute of Chemical Engineers. Center for Chemical Process Safety.<br/>Preferred Shelf Number TP155.7<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119861812">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119861812</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cyber security and network security
ent://SD_ILS/0/SD_ILS:597484
2026-01-22T14:19:58Z
2026-01-22T14:19:58Z
Author Pramanik, Sabyasachi, editor. Samanta, Debabrata, 1987- editor. Vinay, M., editor. Guha, Abhijit, editor.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119812555">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119812555</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cyber security and digital forensics
ent://SD_ILS/0/SD_ILS:597326
2026-01-22T14:19:58Z
2026-01-22T14:19:58Z
Author Ghonge, Mangesh, 1984- editor.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119795667">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119795667</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Intelligent security systems : how artificial intelligence, machine learning and data science work for and against computer security
ent://SD_ILS/0/SD_ILS:597085
2026-01-22T14:19:58Z
2026-01-22T14:19:58Z
Author Reznik, Leonid, 1955- author.<br/>Preferred Shelf Number QA76.9 .A25 R438 2022<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119771579">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119771579</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Trust in computer systems and the cloud
ent://SD_ILS/0/SD_ILS:597142
2026-01-22T14:19:58Z
2026-01-22T14:19:58Z
Author Bursell, Mike, author.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119695158">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119695158</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
The CISO evolution : business knowledge for cybersecurity executives
ent://SD_ILS/0/SD_ILS:597056
2026-01-22T14:19:58Z
2026-01-22T14:19:58Z
Author Sharp, Matthew K., author. Lambros, Kyriakos P., author.<br/>Preferred Shelf Number HD30.2 .S5325 2022<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119782513">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119782513</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Blockchain security from the bottom up : securing and preventing attacks on cryptocurrencies, decentralized applications, nfts, and smart contracts
ent://SD_ILS/0/SD_ILS:597703
2026-01-22T14:19:58Z
2026-01-22T14:19:58Z
Author Poston, Howard E., III, author.<br/>Preferred Shelf Number QA76.9 .B56 P67 2022<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394320691">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394320691</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Computer science security : concepts and tools
ent://SD_ILS/0/SD_ILS:597739
2026-01-22T14:19:58Z
2026-01-22T14:19:58Z
Author Zaidoun, Ameur Salem, author.<br/>Preferred Shelf Number QA76.9 .A25 Z35 2022<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394163847">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394163847</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Trust-based communication systems for internet of things applications
ent://SD_ILS/0/SD_ILS:597744
2026-01-22T14:19:58Z
2026-01-22T14:19:58Z
Author Madaan, Vishu, editor. Agrawal, Prateek, editor. Sharma, Anand, editor. Sharma, Dilip Kumar, editor. Agrawal, Akshat, 1986- editor.<br/>Preferred Shelf Number TK5105.8857<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119896746">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119896746</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Executive's guide to cyber risk : securing the future today
ent://SD_ILS/0/SD_ILS:597567
2026-01-22T14:19:58Z
2026-01-22T14:19:58Z
Author Moyo, Siegfried, author.<br/>Preferred Shelf Number HF5548.37 .M68 2022<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394320578">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394320578</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
You can stop stupid : stopping losses from accidental and malicious actions
ent://SD_ILS/0/SD_ILS:596502
2026-01-22T14:19:58Z
2026-01-22T14:19:58Z
Author Winkler, Ira, author. Brown, Tracy Celaya, author.<br/>Preferred Shelf Number HD61.5 .W55 2021<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119623946">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119623946</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Privacy, regulations, and cybersecurity : the essential business guide
ent://SD_ILS/0/SD_ILS:596472
2026-01-22T14:19:58Z
2026-01-22T14:19:58Z
Author Moschovitis, Christos J. P., author.<br/>Preferred Shelf Number HD61.5 .M675 2021 EB<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119660156">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119660156</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Hacking multifactor authentication
ent://SD_ILS/0/SD_ILS:596326
2026-01-22T14:19:58Z
2026-01-22T14:19:58Z
Author Grimes, Roger A., author.<br/>Preferred Shelf Number QA76.9 .A25 G75 2021<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119672357">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119672357</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
VMware® Certified Professional Data Center Virtualization on vSphere 6.7 Exam 2V0-21.19 : study guide
ent://SD_ILS/0/SD_ILS:596289
2026-01-22T14:19:58Z
2026-01-22T14:19:58Z
Author Hall, Jon, 1963- author. Andrews, Joshua, author.<br/>Preferred Shelf Number QA76.9 .V5<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119539698">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119539698</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Artificial intelligence and data mining approaches in security frameworks
ent://SD_ILS/0/SD_ILS:596957
2026-01-22T14:19:58Z
2026-01-22T14:19:58Z
Author Bhargava, Neeraj. Bhargava, Ritu. Rathore, Pramod Singh, 1988- Agrawal, Rashmi, 1978-<br/>Preferred Shelf Number Q335<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119760429">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119760429</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security issues and privacy concerns in Industry 4.0 applications
ent://SD_ILS/0/SD_ILS:596945
2026-01-22T14:19:58Z
2026-01-22T14:19:58Z
Author David, Shiblin, author. Anand, R. S., author. Jeyakrishnan, V., author. Niranjanamurthy, M., author.<br/>Preferred Shelf Number QA76.9 .A25 D38 2021<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119776529">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119776529</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Tribe of hackers security leaders : tribal knowledge from the best in cybersecurity leadership
ent://SD_ILS/0/SD_ILS:595887
2026-01-22T14:19:58Z
2026-01-22T14:19:58Z
Author Carey, Marcus J. (Cybersecurity professional), author. Jin, Jennifer.<br/>Preferred Shelf Number QA76.9 .A25 C37 2020<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119643784">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119643784</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Applied incident response
ent://SD_ILS/0/SD_ILS:595744
2026-01-22T14:19:58Z
2026-01-22T14:19:58Z
Author Anson, Steve.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119560302">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119560302</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cybersecurity in humanities and social sciences : a research methods approach
ent://SD_ILS/0/SD_ILS:596373
2026-01-22T14:19:58Z
2026-01-22T14:19:58Z
Author Loiseau, Hugo, editor. Ventre, Daniel, editor. Aden, Hartmut, editor.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119777588">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119777588</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Hands on hacking
ent://SD_ILS/0/SD_ILS:596316
2026-01-22T14:19:58Z
2026-01-22T14:19:58Z
Author Hickey, Matthew (Computer security expert), author. Arcuri, Jennifer, author.<br/>Preferred Shelf Number QA76.9 .A25 H53 2020 EB<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119561507">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119561507</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Tribe of hackers blue team : tribal knowledge from the best in defensive cybersecurity
ent://SD_ILS/0/SD_ILS:596276
2026-01-22T14:19:58Z
2026-01-22T14:19:58Z
Author Carey, Marcus J. (Cybersecurity professional) Jin, Jennifer.<br/>Preferred Shelf Number QA76.9 .A25 C3673 2020<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119643432">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119643432</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cybersecurity and decision makers : data security and digital trust
ent://SD_ILS/0/SD_ILS:595943
2026-01-22T14:19:58Z
2026-01-22T14:19:58Z
Author Fréminville, Marie de, author.<br/>Preferred Shelf Number HF5548.37 .F74 2020<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119720362">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119720362</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security engineering : a guide to building dependable distributed systems
ent://SD_ILS/0/SD_ILS:596480
2026-01-22T14:19:58Z
2026-01-22T14:19:58Z
Author Anderson, Ross. http://viaf.org/viaf/sourceID/LC%7cnb2004300232<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119644682">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119644682</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Artificial intelligence, cybersecurity and cyber defense
ent://SD_ILS/0/SD_ILS:596423
2026-01-22T14:19:58Z
2026-01-22T14:19:58Z
Author Ventre, Daniel, author.<br/>Preferred Shelf Number Q335 .V46 2020 EB<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119788195">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119788195</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cyber smart : five habits to protect your family, money, and identity from cyber criminals
ent://SD_ILS/0/SD_ILS:594967
2026-01-22T14:19:58Z
2026-01-22T14:19:58Z
Author McDonough, Bart R., author.<br/>Preferred Shelf Number TK5105.59<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119559658">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119559658</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Tribe of hackers red team : tribal knowledge from the best in offensive cybersecurity
ent://SD_ILS/0/SD_ILS:595415
2026-01-22T14:19:58Z
2026-01-22T14:19:58Z
Author Carey, Marcus J. (Cybersecurity professional), author. Jin, Jennifer, author.<br/>Preferred Shelf Number QA76.9 .A25 C368 2019<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119643357">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119643357</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cybersecurity blue team toolkit
ent://SD_ILS/0/SD_ILS:595209
2026-01-22T14:19:58Z
2026-01-22T14:19:58Z
Author Tanner, Nadean H., author.<br/>Preferred Shelf Number QA76.9 .A25 T36 2019 EB<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119552963">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119552963</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cyber security in parallel and distributed computing : concepts, techniques, applications and case studies
ent://SD_ILS/0/SD_ILS:595099
2026-01-22T14:19:58Z
2026-01-22T14:19:58Z
Author Le, Dac-Nhuong, 1983- editor. Kumar, Raghvendra, 1987- editor. Mishra, Brojo Kishore, 1979- editor. Khari, Manju, editor. Chatterjee, Jyotir Moy, editor.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119488330">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119488330</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
The Digital Big Bang : the Hard Stuff, the Soft Stuff, and the Future of Cybersecurity
ent://SD_ILS/0/SD_ILS:595435
2026-01-22T14:19:58Z
2026-01-22T14:19:58Z
Author Quade, Phil.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119617396">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119617396</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
We have root : even more advice from Schneier on security
ent://SD_ILS/0/SD_ILS:595432
2026-01-22T14:19:58Z
2026-01-22T14:19:58Z
Author Schneier, Bruce, 1963- author.<br/>Preferred Shelf Number QA76.9 .A25 S36 2019<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119653554">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119653554</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Tribe of hackers : cybersecurity advice from the best hackers in the world
ent://SD_ILS/0/SD_ILS:595418
2026-01-22T14:19:58Z
2026-01-22T14:19:58Z
Author Carey, Marcus J. (Cybersecurity professional), author. Jin, Jennifer, author.<br/>Preferred Shelf Number QA76.9 .A25 C37 2019 EB<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119643395">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119643395</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Transformational security awareness : what neuroscientists, storytellers, and marketers can teach us about driving secure behaviors
ent://SD_ILS/0/SD_ILS:595304
2026-01-22T14:19:58Z
2026-01-22T14:19:58Z
Author Carpenter, Perry, author.<br/>Preferred Shelf Number QA76.9 .A25 C37 2019 EB<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119566380">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119566380</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cyber-vigilance and digital trust : cyber security in the era of cloud computing and IoT
ent://SD_ILS/0/SD_ILS:595279
2026-01-22T14:19:58Z
2026-01-22T14:19:58Z
Author Tounsi, Wiem, editor.<br/>Preferred Shelf Number QA76.9 .A25 C93 2019 EB<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119618393">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119618393</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Social engineering : the science of human hacking
ent://SD_ILS/0/SD_ILS:594635
2026-01-22T14:19:58Z
2026-01-22T14:19:58Z
Author Hadnagy, Christopher, author.<br/>Preferred Shelf Number HM668 .H33 2018<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119433729">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119433729</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Digital forensics
ent://SD_ILS/0/SD_ILS:593346
2026-01-22T14:19:58Z
2026-01-22T14:19:58Z
Author Årnes, André, 1976- editor.<br/>Preferred Shelf Number HV8079 .C65<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119262442">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119262442</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Windows security monitoring : scenarios and patterns
ent://SD_ILS/0/SD_ILS:594404
2026-01-22T14:19:58Z
2026-01-22T14:19:58Z
Author Miroshnikov, Andrei, author.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119390909">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119390909</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Insider threats
ent://SD_ILS/0/SD_ILS:594407
2026-01-22T14:19:58Z
2026-01-22T14:19:58Z
Author Arduin, Pierre-Emmanuel, author.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119419785">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119419785</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
An introduction to cyber modeling and simulation
ent://SD_ILS/0/SD_ILS:594699
2026-01-22T14:19:58Z
2026-01-22T14:19:58Z
Author Couretas, Jerry M., 1966- author.<br/>Preferred Shelf Number QA76.9 .C65<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119420842">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119420842</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Hacking the hacker : learn from the experts who take down hackers
ent://SD_ILS/0/SD_ILS:593636
2026-01-22T14:19:58Z
2026-01-22T14:19:58Z
Author Grimes, Roger A., author.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119396260">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119396260</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Wireshark for security professionals : using Wireshark and the Metasploit Framework
ent://SD_ILS/0/SD_ILS:593472
2026-01-22T14:19:58Z
2026-01-22T14:19:58Z
Author Bullock, Jessey, author. Gordon, Adam, author.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119183457">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119183457</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
DNS security management
ent://SD_ILS/0/SD_ILS:593802
2026-01-22T14:19:58Z
2026-01-22T14:19:58Z
Author Dooley, Michael, 1962- author. Rooney, Timothy, 1962- author.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119328292">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119328292</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cybersecurity essentials
ent://SD_ILS/0/SD_ILS:594756
2026-01-22T14:19:58Z
2026-01-22T14:19:58Z
Author Brooks, Charles J., author. Grow, Christopher, author. Craig, Philip, author. Short, Donald, author.<br/>Preferred Shelf Number TK5105.59<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119369141">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119369141</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cryptography, information theory, and error-correction : a handbook for the 21st century
ent://SD_ILS/0/SD_ILS:593044
2026-01-22T14:19:58Z
2026-01-22T14:19:58Z
Author Bruen, Aiden A., 1941- Forcinito, Mario, 1962-<br/>Preferred Shelf Number QA76.9 .A25 B79 2005<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781118033296">https://onlinelibrary.wiley.com/doi/book/10.1002/9781118033296</a>
<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119582397">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119582397</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Contemporary cryptology the science of information integrity
ent://SD_ILS/0/SD_ILS:249661
2026-01-22T14:19:58Z
2026-01-22T14:19:58Z
Author Simmons, Gustavus J. Institute of Electrical and Electronics Engineers.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access IEEE Xplore <a href="http://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=5265879">http://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=5265879</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>