Search Results for Intelligence - Narrowed by: Security.
SirsiDynix Enterprise
https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dIntelligence$0026qf$003dSUBJECT$002509Subject$002509Security.$002509Security.$0026ps$003d300$0026isd$003dtrue?
2026-01-22T15:08:57Z
Cyber threat intelligence
ent://SD_ILS/0/SD_ILS:598051
2026-01-22T15:08:57Z
2026-01-22T15:08:57Z
Author Lee, Martin (Computer security expert), author.<br/>Preferred Shelf Number TK5105.59 .L47 2023<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119861775">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119861775</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Practical cyber intelligence : a hands-on guide to digital forensics
ent://SD_ILS/0/SD_ILS:599262
2026-01-22T15:08:57Z
2026-01-22T15:08:57Z
Author Jakobsen, Adam Tilmar, author.<br/>Preferred Shelf Number HV8079 .C65 J633 2024<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394256129">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394256129</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Safeguarding satellite communications : issues, challenges, and solutions
ent://SD_ILS/0/SD_ILS:600245
2026-01-22T15:08:57Z
2026-01-22T15:08:57Z
Author An, Jianpin, author.<br/>Preferred Shelf Number TK5104 .A53 2026<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394304325">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394304325</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Preventing bluetooth and wireless attacks in IoMT healthcare systems
ent://SD_ILS/0/SD_ILS:600016
2026-01-22T15:08:57Z
2026-01-22T15:08:57Z
Author Chirillo, John, 1970- author.<br/>Preferred Shelf Number R859.7 .S43 C45 2025<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394352401">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394352401</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information security and privacy quick reference the essential handbook for every CISO, CSO, and Chief Privacy Officer
ent://SD_ILS/0/SD_ILS:599946
2026-01-22T15:08:57Z
2026-01-22T15:08:57Z
Author Chapple, Mike, author. Shelley, Joe. Stewart, James Michael.<br/>Preferred Shelf Number QA76.9 .A25 C43 2025<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394353347">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394353347</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
BEHIND THE AI MASK protecting your business from deepfakes.
ent://SD_ILS/0/SD_ILS:600411
2026-01-22T15:08:57Z
2026-01-22T15:08:57Z
Author BOGAN, CARL.<br/>Preferred Shelf Number XX(600411.1)<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394352616">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394352616</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security and Privacy for 6G Massive IoT.
ent://SD_ILS/0/SD_ILS:599629
2026-01-22T15:08:57Z
2026-01-22T15:08:57Z
Author Mantas, Georgios. Saghezchi, Firooz. Rodriguez, Jonathan. Sucasas, Victor.<br/>Preferred Shelf Number TK5103.252<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119988007">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119988007</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
CYBERSECURITY IN THE TRANSPORTATION INDUSTRY.
ent://SD_ILS/0/SD_ILS:599238
2026-01-22T15:08:57Z
2026-01-22T15:08:57Z
Preferred Shelf Number HE194 .C93 2024<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394204472">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394204472</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Effective vulnerability management : managing risk in the vulnerable digital ecosystem
ent://SD_ILS/0/SD_ILS:599047
2026-01-22T15:08:57Z
2026-01-22T15:08:57Z
Author Hughes, Chris (Christopher Matthew), author. Robinson, Nikki, author.<br/>Preferred Shelf Number QA76.9 .A25 H84 2024<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394277155">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394277155</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cyber Operations : A Case Study Approach
ent://SD_ILS/0/SD_ILS:599117
2026-01-22T15:08:57Z
2026-01-22T15:08:57Z
Author Couretas, Jerry M., 1966- author.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119712121">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119712121</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security and privacy vision in 6G : a comprehensive guide
ent://SD_ILS/0/SD_ILS:598347
2026-01-22T15:08:57Z
2026-01-22T15:08:57Z
Author Porambage, Pawani, author. Liyanage, Madhusanka, author.<br/>Preferred Shelf Number TK5103.252 .P67 2023<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119875437">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119875437</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Quantum computing : a new era of computing
ent://SD_ILS/0/SD_ILS:598188
2026-01-22T15:08:57Z
2026-01-22T15:08:57Z
Author Kaswan, Kuldeep Singh, author. Dhatterwal, Jagjit Singh, author. Baliyan, Anupam, 1976- author. Rani, Shalli, author.<br/>Preferred Shelf Number QA76.889 .K37 2023<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394157846">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394157846</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Deep reinforcement learning for wireless communications and networking : theory, applications and implementation
ent://SD_ILS/0/SD_ILS:598462
2026-01-22T15:08:57Z
2026-01-22T15:08:57Z
Author Hoang, Dinh Thai, 1986- author.<br/>Preferred Shelf Number TK5103.2 .H63 2023<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119873747">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119873747</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cybersecurity in smart homes : architectures, solutions and technologies
ent://SD_ILS/0/SD_ILS:597626
2026-01-22T15:08:57Z
2026-01-22T15:08:57Z
Author Khatoun, Rida, author.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119987451">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119987451</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Conflicts, crimes and regulations in cyberspace
ent://SD_ILS/0/SD_ILS:597281
2026-01-22T15:08:57Z
2026-01-22T15:08:57Z
Author Laurent, Sébastien, editor.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119885092">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119885092</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security and its challenges in the 21st Century
ent://SD_ILS/0/SD_ILS:597077
2026-01-22T15:08:57Z
2026-01-22T15:08:57Z
Author Guerrier, Claudine, author.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119854852">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119854852</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security issues and privacy concerns in Industry 4.0 applications
ent://SD_ILS/0/SD_ILS:596945
2026-01-22T15:08:57Z
2026-01-22T15:08:57Z
Author David, Shiblin, author. Anand, R. S., author. Jeyakrishnan, V., author. Niranjanamurthy, M., author.<br/>Preferred Shelf Number QA76.9 .A25 D38 2021<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119776529">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119776529</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Applied incident response
ent://SD_ILS/0/SD_ILS:595744
2026-01-22T15:08:57Z
2026-01-22T15:08:57Z
Author Anson, Steve.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119560302">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119560302</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cyber breach response that actually works : organizational approach to managing residual risk
ent://SD_ILS/0/SD_ILS:596117
2026-01-22T15:08:57Z
2026-01-22T15:08:57Z
Author Gorecki, Andrew.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119679349">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119679349</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Hacking connected cars : tactics, techniques, and procedures
ent://SD_ILS/0/SD_ILS:595843
2026-01-22T15:08:57Z
2026-01-22T15:08:57Z
Author Knight, Alissa, author.<br/>Preferred Shelf Number TL152.8 .K65 2020<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119491774">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119491774</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
5G explained : security and deployment of advanced mobile communications
ent://SD_ILS/0/SD_ILS:594896
2026-01-22T15:08:57Z
2026-01-22T15:08:57Z
Author Penttinen, Jyrki T. J., author.<br/>Preferred Shelf Number TK5103.483 .P46 2019<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119275695">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119275695</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
The Digital Big Bang : the Hard Stuff, the Soft Stuff, and the Future of Cybersecurity
ent://SD_ILS/0/SD_ILS:595435
2026-01-22T15:08:57Z
2026-01-22T15:08:57Z
Author Quade, Phil.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119617396">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119617396</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cyber-vigilance and digital trust : cyber security in the era of cloud computing and IoT
ent://SD_ILS/0/SD_ILS:595279
2026-01-22T15:08:57Z
2026-01-22T15:08:57Z
Author Tounsi, Wiem, editor.<br/>Preferred Shelf Number QA76.9 .A25 C93 2019 EB<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119618393">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119618393</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cybersecurity program development for business : the essential planning guide
ent://SD_ILS/0/SD_ILS:594455
2026-01-22T15:08:57Z
2026-01-22T15:08:57Z
Author Moschovitis, Christos J. P., author.<br/>Preferred Shelf Number HD30.2<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119430018">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119430018</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Advanced penetration testing : hacking the world's most secure networks
ent://SD_ILS/0/SD_ILS:593439
2026-01-22T15:08:57Z
2026-01-22T15:08:57Z
Author Allsopp, Wil, author.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119367741">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119367741</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>