Search Results for Knowledge. - Narrowed by: Computer security. SirsiDynix Enterprise https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dKnowledge.$0026qf$003dSUBJECT$002509Subject$002509Computer$002bsecurity.$002509Computer$002bsecurity.$0026ps$003d300$0026isd$003dtrue? 2026-02-20T22:46:59Z Cybersecurity in knowledge management : cyberthreats and solutions ent://SD_ILS/0/SD_ILS:567827 2026-02-20T22:46:59Z 2026-02-20T22:46:59Z Author&#160;Vajjhala, Narasimha, 1978- editor.&#160;Strang, Kenneth David, 1962- editor.<br/>Preferred Shelf Number&#160;QA76.9 .A25<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003498094">https://www.taylorfrancis.com/books/9781003498094</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Transactions on Large-Scale Data- and Knowledge-Centered Systems XLII ent://SD_ILS/0/SD_ILS:485990 2026-02-20T22:46:59Z 2026-02-20T22:46:59Z Author&#160;Hameurlain, Abdelkader. editor.&#160;Wagner, Roland. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-662-60531-8">https://doi.org/10.1007/978-3-662-60531-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Transactions on Large-Scale Data- and Knowledge-Centered Systems XXXVII ent://SD_ILS/0/SD_ILS:400564 2026-02-20T22:46:59Z 2026-02-20T22:46:59Z Author&#160;Hameurlain, Abdelkader. editor.&#160;Wagner, Roland. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-662-57932-9">https://doi.org/10.1007/978-3-662-57932-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Transactions on Large-Scale Data- and Knowledge-Centered Systems XVI Selected Papers from ACOMP 2013 ent://SD_ILS/0/SD_ILS:485061 2026-02-20T22:46:59Z 2026-02-20T22:46:59Z Author&#160;Hameurlain, Abdelkader. editor.&#160;K&uuml;ng, Josef. editor.&#160;Wagner, Roland. editor.&#160;Dang, Tran Khanh. editor. (orcid)0000-0002-7282-3589&#160;Thoai, Nam. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-662-45947-8">https://doi.org/10.1007/978-3-662-45947-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> The CISO evolution : business knowledge for cybersecurity executives ent://SD_ILS/0/SD_ILS:597056 2026-02-20T22:46:59Z 2026-02-20T22:46:59Z Author&#160;Sharp, Matthew K., author.&#160;Lambros, Kyriakos P., author.<br/>Preferred Shelf Number&#160;HD30.2 .S5325 2022<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119782513">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119782513</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Tribe of hackers blue team : tribal knowledge from the best in defensive cybersecurity ent://SD_ILS/0/SD_ILS:596276 2026-02-20T22:46:59Z 2026-02-20T22:46:59Z Author&#160;Carey, Marcus J. (Cybersecurity professional)&#160;Jin, Jennifer.<br/>Preferred Shelf Number&#160;QA76.9 .A25 C3673 2020<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119643432">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119643432</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Tribe of hackers security leaders : tribal knowledge from the best in cybersecurity leadership ent://SD_ILS/0/SD_ILS:595887 2026-02-20T22:46:59Z 2026-02-20T22:46:59Z Author&#160;Carey, Marcus J. (Cybersecurity professional), author.&#160;Jin, Jennifer.<br/>Preferred Shelf Number&#160;QA76.9 .A25 C37 2020<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119643784">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119643784</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Tribe of hackers red team : tribal knowledge from the best in offensive cybersecurity ent://SD_ILS/0/SD_ILS:595415 2026-02-20T22:46:59Z 2026-02-20T22:46:59Z Author&#160;Carey, Marcus J. (Cybersecurity professional), author.&#160;Jin, Jennifer, author.<br/>Preferred Shelf Number&#160;QA76.9 .A25 C368 2019<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119643357">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119643357</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Knowledge Discovery and Data Mining 23rd Pacific-Asia Conference, PAKDD 2019, Macau, China, April 14-17, 2019, Proceedings, Part I ent://SD_ILS/0/SD_ILS:484914 2026-02-20T22:46:59Z 2026-02-20T22:46:59Z Author&#160;Yang, Qiang. editor.&#160;Zhou, Zhi-Hua. editor.&#160;Gong, Zhiguo. editor.&#160;Zhang, Min-Ling. editor.&#160;Huang, Sheng-Jun. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-16148-4">https://doi.org/10.1007/978-3-030-16148-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Machine Learning and Knowledge Extraction Third IFIP TC 5, TC 12, WG 8.4, WG 8.9, WG 12.9 International Cross-Domain Conference, CD-MAKE 2019, Canterbury, UK, August 26&ndash;29, 2019, Proceedings ent://SD_ILS/0/SD_ILS:486179 2026-02-20T22:46:59Z 2026-02-20T22:46:59Z Author&#160;Holzinger, Andreas. editor. (orcid)0000-0002-6786-5194&#160;Kieseberg, Peter. editor. (orcid)0000-0002-2847-2152&#160;Tjoa, A Min. editor.&#160;Weippl, Edgar. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-29726-8">https://doi.org/10.1007/978-3-030-29726-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Machine Learning and Knowledge Discovery in Databases European Conference, ECML PKDD 2018, Dublin, Ireland, September 10&ndash;14, 2018, Proceedings, Part III ent://SD_ILS/0/SD_ILS:482971 2026-02-20T22:46:59Z 2026-02-20T22:46:59Z Author&#160;Brefeld, Ulf. editor.&#160;Curry, Edward. editor.&#160;Daly, Elizabeth. editor.&#160;MacNamee, Brian. editor. (orcid)0000-0003-2518-0274&#160;Marascu, Alice. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-10997-4">https://doi.org/10.1007/978-3-030-10997-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Knowledge Discovery and Data Mining 23rd Pacific-Asia Conference, PAKDD 2019, Macau, China, April 14-17, 2019, Proceedings, Part III ent://SD_ILS/0/SD_ILS:483034 2026-02-20T22:46:59Z 2026-02-20T22:46:59Z Author&#160;Yang, Qiang. editor.&#160;Zhou, Zhi-Hua. editor.&#160;Gong, Zhiguo. editor.&#160;Zhang, Min-Ling. editor.&#160;Huang, Sheng-Jun. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-16142-2">https://doi.org/10.1007/978-3-030-16142-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Knowledge Discovery and Data Mining 23rd Pacific-Asia Conference, PAKDD 2019, Macau, China, April 14-17, 2019, Proceedings, Part II ent://SD_ILS/0/SD_ILS:484615 2026-02-20T22:46:59Z 2026-02-20T22:46:59Z Author&#160;Yang, Qiang. editor.&#160;Zhou, Zhi-Hua. editor.&#160;Gong, Zhiguo. editor.&#160;Zhang, Min-Ling. editor.&#160;Huang, Sheng-Jun. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-16145-3">https://doi.org/10.1007/978-3-030-16145-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Knowledge Discovery and Data Mining 22nd Pacific-Asia Conference, PAKDD 2018, Melbourne, VIC, Australia, June 3-6, 2018, Proceedings, Part I ent://SD_ILS/0/SD_ILS:399609 2026-02-20T22:46:59Z 2026-02-20T22:46:59Z Author&#160;Phung, Dinh. editor.&#160;Tseng, Vincent S. editor.&#160;Webb, Geoffrey I. editor. (orcid)0000-0001-9963-5169&#160;Ho, Bao. editor.&#160;Ganji, Mohadeseh. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-93034-3">https://doi.org/10.1007/978-3-319-93034-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Knowledge Discovery and Data Mining 22nd Pacific-Asia Conference, PAKDD 2018, Melbourne, VIC, Australia, June 3-6, 2018, Proceedings, Part II ent://SD_ILS/0/SD_ILS:402214 2026-02-20T22:46:59Z 2026-02-20T22:46:59Z Author&#160;Phung, Dinh. editor.&#160;Tseng, Vincent S. editor.&#160;Webb, Geoffrey I. editor. (orcid)0000-0001-9963-5169&#160;Ho, Bao. editor.&#160;Ganji, Mohadeseh. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-93037-4">https://doi.org/10.1007/978-3-319-93037-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Geo-Spatial Knowledge and Intelligence 5th International Conference, GSKI 2017, Chiang Mai, Thailand, December 8-10, 2017, Revised Selected Papers, Part II ent://SD_ILS/0/SD_ILS:401496 2026-02-20T22:46:59Z 2026-02-20T22:46:59Z Author&#160;Yuan, Hanning. editor.&#160;Geng, Jing. editor.&#160;Liu, Chuanlu. editor.&#160;Bian, Fuling. editor.&#160;Surapunt, Tisinee. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-13-0896-3">https://doi.org/10.1007/978-981-13-0896-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Geo-Spatial Knowledge and Intelligence 5th International Conference, GSKI 2017, Chiang Mai, Thailand, December 8-10, 2017, Revised Selected Papers, Part I ent://SD_ILS/0/SD_ILS:401517 2026-02-20T22:46:59Z 2026-02-20T22:46:59Z Author&#160;Yuan, Hanning. editor.&#160;Geng, Jing. editor.&#160;Liu, Chuanlu. editor.&#160;Bian, Fuling. editor.&#160;Surapunt, Tisinee. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-13-0893-2">https://doi.org/10.1007/978-981-13-0893-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Trends and Applications in Knowledge Discovery and Data Mining PAKDD 2018 Workshops, BDASC, BDM, ML4Cyber, PAISI, DaMEMO, Melbourne, VIC, Australia, June 3, 2018, Revised Selected Papers ent://SD_ILS/0/SD_ILS:400047 2026-02-20T22:46:59Z 2026-02-20T22:46:59Z Author&#160;Ganji, Mohadeseh. editor.&#160;Rashidi, Lida. editor.&#160;Fung, Benjamin C. M. editor. (orcid)0000-0001-8423-2906&#160;Wang, Can. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-04503-6">https://doi.org/10.1007/978-3-030-04503-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Knowledge Discovery and Data Mining 22nd Pacific-Asia Conference, PAKDD 2018, Melbourne, VIC, Australia, June 3-6, 2018, Proceedings, Part III ent://SD_ILS/0/SD_ILS:400249 2026-02-20T22:46:59Z 2026-02-20T22:46:59Z Author&#160;Phung, Dinh. editor.&#160;Tseng, Vincent S. editor.&#160;Webb, Geoffrey I. editor. (orcid)0000-0001-9963-5169&#160;Ho, Bao. editor.&#160;Ganji, Mohadeseh. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-93040-4">https://doi.org/10.1007/978-3-319-93040-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Perceptions and Analysis of Digital Risks ent://SD_ILS/0/SD_ILS:597226 2026-02-20T22:46:59Z 2026-02-20T22:46:59Z Author&#160;Capelle, Camille.&#160;Liqu&egrave;te, Vincent.<br/>Preferred Shelf Number&#160;QA76.575<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119887959">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119887959</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Digital immune system : principles and practices ent://SD_ILS/0/SD_ILS:600243 2026-02-20T22:46:59Z 2026-02-20T22:46:59Z Author&#160;Priyambada Dash, Sujata, editor.&#160;Mishra, Vaibhav.&#160;Shaw, Bijeta.&#160;Panda, Sandeep Kumar.&#160;Balamurugan, S.<br/>Preferred Shelf Number&#160;QA76.9 .A25 D54 2026<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394383788">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394383788</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information security and privacy quick reference the essential handbook for every CISO, CSO, and Chief Privacy Officer ent://SD_ILS/0/SD_ILS:599946 2026-02-20T22:46:59Z 2026-02-20T22:46:59Z Author&#160;Chapple, Mike, author.&#160;Shelley, Joe.&#160;Stewart, James Michael.<br/>Preferred Shelf Number&#160;QA76.9 .A25 C43 2025<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394353347">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394353347</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Alice and Bob learn secure coding ent://SD_ILS/0/SD_ILS:599664 2026-02-20T22:46:59Z 2026-02-20T22:46:59Z Author&#160;Janca, Tanya. author.<br/>Preferred Shelf Number&#160;QA76.76 .D47<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394277179">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394277179</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Securing the digital frontier : threats and advanced techniques in security and forensics ent://SD_ILS/0/SD_ILS:599732 2026-02-20T22:46:59Z 2026-02-20T22:46:59Z Author&#160;Sharma, Kavita, 1985- editor.<br/>Preferred Shelf Number&#160;QA76.9 .A25 S43 2025<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394268917">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394268917</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Next-generation systems and secure computing ent://SD_ILS/0/SD_ILS:599779 2026-02-20T22:46:59Z 2026-02-20T22:46:59Z Author&#160;Barman, Subhabrata, editor.&#160;Koley, Santanu, editor.&#160;Joardar, Subhankar, editor.<br/>Preferred Shelf Number&#160;QA76.9 .A25 N49 2025<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394228522">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394228522</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Protecting and mitigating against cyber threats : deploying artificial intelligence and machine learning ent://SD_ILS/0/SD_ILS:599999 2026-02-20T22:46:59Z 2026-02-20T22:46:59Z Author&#160;Mohanty, Sachi Nandan, editor.<br/>Preferred Shelf Number&#160;QA76.9 .A25 P76 2025<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394305216">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394305216</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Securing cyber-physical systems : fundamentals, applications and challenges ent://SD_ILS/0/SD_ILS:600260 2026-02-20T22:46:59Z 2026-02-20T22:46:59Z Author&#160;Ananthajothi, K., editor.<br/>Preferred Shelf Number&#160;TK5105.59 .S43 2025<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394287765">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394287765</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> x86 software reverse-engineering, cracking, and counter-measures ent://SD_ILS/0/SD_ILS:598920 2026-02-20T22:46:59Z 2026-02-20T22:46:59Z Author&#160;Domas, Stephanie, author.&#160;Domas, Christopher, author.<br/>Preferred Shelf Number&#160;QA76.9 .A25 D66 2024<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394277131">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394277131</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Intelligent security systems : how artificial intelligence, machine learning and data science work for and against computer security ent://SD_ILS/0/SD_ILS:597085 2026-02-20T22:46:59Z 2026-02-20T22:46:59Z Author&#160;Reznik, Leonid, 1955- author.<br/>Preferred Shelf Number&#160;QA76.9 .A25 R438 2022<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119771579">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119771579</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cyber security and digital forensics ent://SD_ILS/0/SD_ILS:597326 2026-02-20T22:46:59Z 2026-02-20T22:46:59Z Author&#160;Ghonge, Mangesh, 1984- editor.<br/>Preferred Shelf Number&#160;QA76.9 .A25<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119795667">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119795667</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer science security : concepts and tools ent://SD_ILS/0/SD_ILS:597739 2026-02-20T22:46:59Z 2026-02-20T22:46:59Z Author&#160;Zaidoun, Ameur Salem, author.<br/>Preferred Shelf Number&#160;QA76.9 .A25 Z35 2022<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394163847">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394163847</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Hacking multifactor authentication ent://SD_ILS/0/SD_ILS:596326 2026-02-20T22:46:59Z 2026-02-20T22:46:59Z Author&#160;Grimes, Roger A., author.<br/>Preferred Shelf Number&#160;QA76.9 .A25 G75 2021<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119672357">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119672357</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Transformational security awareness : what neuroscientists, storytellers, and marketers can teach us about driving secure behaviors ent://SD_ILS/0/SD_ILS:595304 2026-02-20T22:46:59Z 2026-02-20T22:46:59Z Author&#160;Carpenter, Perry, author.<br/>Preferred Shelf Number&#160;QA76.9 .A25 C37 2019 EB<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119566380">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119566380</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> The Digital Big Bang : the Hard Stuff, the Soft Stuff, and the Future of Cybersecurity ent://SD_ILS/0/SD_ILS:595435 2026-02-20T22:46:59Z 2026-02-20T22:46:59Z Author&#160;Quade, Phil.<br/>Preferred Shelf Number&#160;QA76.9 .A25<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119617396">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119617396</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> An introduction to cyber modeling and simulation ent://SD_ILS/0/SD_ILS:594699 2026-02-20T22:46:59Z 2026-02-20T22:46:59Z Author&#160;Couretas, Jerry M., 1966- author.<br/>Preferred Shelf Number&#160;QA76.9 .C65<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119420842">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119420842</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Social engineering : the science of human hacking ent://SD_ILS/0/SD_ILS:594635 2026-02-20T22:46:59Z 2026-02-20T22:46:59Z Author&#160;Hadnagy, Christopher, author.<br/>Preferred Shelf Number&#160;HM668 .H33 2018<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119433729">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119433729</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cybersecurity essentials ent://SD_ILS/0/SD_ILS:594756 2026-02-20T22:46:59Z 2026-02-20T22:46:59Z Author&#160;Brooks, Charles J., author.&#160;Grow, Christopher, author.&#160;Craig, Philip, author.&#160;Short, Donald, author.<br/>Preferred Shelf Number&#160;TK5105.59<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119369141">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119369141</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security and policy driven computing ent://SD_ILS/0/SD_ILS:539761 2026-02-20T22:46:59Z 2026-02-20T22:46:59Z Author&#160;Liu, Lei, 1968, author.<br/>Preferred Shelf Number&#160;QA76.9 .A25 L587 2011<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781439825808">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> Security 2020 reduce security risks this decade ent://SD_ILS/0/SD_ILS:318966 2026-02-20T22:46:59Z 2026-02-20T22:46:59Z Author&#160;Howard, Doug.&#160;Prince, Kevin.<br/>Preferred Shelf Number&#160;ONLINE(318966.1)<br/>Electronic Access&#160;Wiley InterScience <a href="http://dx.doi.org/10.1002/9781118255803">An electronic book accessible through the World Wide Web; click for information</a> Books24x7 <a href="http://www.books24x7.com/marc.asp?bookid=40805">http://www.books24x7.com/marc.asp?bookid=40805</a> Ebook Library <a href="http://public.eblib.com/choice/publicfullrecord.aspx?p=694289">http://public.eblib.com/choice/publicfullrecord.aspx?p=694289</a> ebrary <a href="http://site.ebrary.com/id/10469690">http://site.ebrary.com/id/10469690</a> MyiLibrary <a href="http://www.myilibrary.com?id=294413">http://www.myilibrary.com?id=294413</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Database and applications security : integrating information security and data management ent://SD_ILS/0/SD_ILS:540220 2026-02-20T22:46:59Z 2026-02-20T22:46:59Z Author&#160;Thuraisingham, Bhavani M., author.<br/>Preferred Shelf Number&#160;QA76.9 .D314 T47 2005<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9780203486061">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/>