Search Results for Landscape - Narrowed by: Computer security. SirsiDynix Enterprise https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dLandscape$0026qf$003dSUBJECT$002509Konu$002509Computer$002bsecurity.$002509Computer$002bsecurity.$0026ps$003d300$0026isd$003dtrue? 2026-02-26T16:25:42Z Technology and privacy : the new landscape ent://SD_ILS/0/SD_ILS:112999 2026-02-26T16:25:42Z 2026-02-26T16:25:42Z Author&#160;Agre, Philip.&#160;Rotenberg, Marc.<br/>Preferred Shelf Number&#160;QA76.9.A25 T43 2001<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> INSECURE DIGITAL FRONTIERS : navigating the global cybersecurity landscape ent://SD_ILS/0/SD_ILS:582322 2026-02-26T16:25:42Z 2026-02-26T16:25:42Z Author&#160;Bhardwaj, Akashdeep, 1971-<br/>Preferred Shelf Number&#160;QA76.9 .A25<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003515395">https://www.taylorfrancis.com/books/9781003515395</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Social Cyber Engineering and Advanced Security Algorithms ent://SD_ILS/0/SD_ILS:588161 2026-02-26T16:25:42Z 2026-02-26T16:25:42Z Author&#160;Merat, Soorena, author.&#160;Almuhtadi, Wahab, author<br/>Preferred Shelf Number&#160;QA76.9 .A25<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003500698">https://www.taylorfrancis.com/books/9781003500698</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Emerging threats and countermeasures in cybersecurity ent://SD_ILS/0/SD_ILS:599561 2026-02-26T16:25:42Z 2026-02-26T16:25:42Z Preferred Shelf Number&#160;QA76.9 .A25 E44 2025<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394230600">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394230600</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Generative AI, cybersecurity, and ethics ent://SD_ILS/0/SD_ILS:599597 2026-02-26T16:25:42Z 2026-02-26T16:25:42Z Author&#160;Islam, Ray (Mohammad Rubyet), author.<br/>Preferred Shelf Number&#160;QA76.9 .A25<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394279326">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394279326</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Open-source security operations center (SOC) : a complete guide to establishing, managing, and maintaining a modern SOC ent://SD_ILS/0/SD_ILS:599434 2026-02-26T16:25:42Z 2026-02-26T16:25:42Z Author&#160;Basta, Alfred, author.&#160;Basta, Nadine, author.&#160;Anwar, Waqar, author.&#160;Essar, Mohammad Ilyas, author.&#160;John Wiley &amp; Sons, publisher.<br/>Preferred Shelf Number&#160;QA76.9 .A25<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394201631">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394201631</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Rise of the machines : when AI and zero trust collide : a Project Zero Trust story ent://SD_ILS/0/SD_ILS:599932 2026-02-26T16:25:42Z 2026-02-26T16:25:42Z Author&#160;Finney, George, author.&#160;Vinduska, Zach, author.<br/>Preferred Shelf Number&#160;QA76.9 .A25 F56 2025<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394352517">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394352517</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Securing cyber-physical systems : fundamentals, applications and challenges ent://SD_ILS/0/SD_ILS:600260 2026-02-26T16:25:42Z 2026-02-26T16:25:42Z Author&#160;Ananthajothi, K., editor.<br/>Preferred Shelf Number&#160;TK5105.59 .S43 2025<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394287765">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394287765</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Next-generation systems and secure computing ent://SD_ILS/0/SD_ILS:599779 2026-02-26T16:25:42Z 2026-02-26T16:25:42Z Author&#160;Barman, Subhabrata, editor.&#160;Koley, Santanu, editor.&#160;Joardar, Subhankar, editor.<br/>Preferred Shelf Number&#160;QA76.9 .A25 N49 2025<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394228522">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394228522</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Protecting and mitigating against cyber threats : deploying artificial intelligence and machine learning ent://SD_ILS/0/SD_ILS:599999 2026-02-26T16:25:42Z 2026-02-26T16:25:42Z Author&#160;Mohanty, Sachi Nandan, editor.<br/>Preferred Shelf Number&#160;QA76.9 .A25 P76 2025<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394305216">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394305216</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> The cybersecurity guide to governance, risk, and compliance ent://SD_ILS/0/SD_ILS:598945 2026-02-26T16:25:42Z 2026-02-26T16:25:42Z Author&#160;Edwards, Jason (Cybersecurity expert), author.&#160;Weaver, Griffin, author.<br/>Preferred Shelf Number&#160;HD30.38 .E34 2024<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394250226">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394250226</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cryptography : algorithms, protocols, and standards for computer security ent://SD_ILS/0/SD_ILS:598914 2026-02-26T16:25:42Z 2026-02-26T16:25:42Z Author&#160;Mammeri, Zoubir, author.<br/>Preferred Shelf Number&#160;QA268 .M34 2024<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394207510">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394207510</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Quantum computing in cybersecurity ent://SD_ILS/0/SD_ILS:598685 2026-02-26T16:25:42Z 2026-02-26T16:25:42Z Author&#160;Rawat, Romil, editor.<br/>Preferred Shelf Number&#160;QA76.9 .A25 Q83 2023<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394167401">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394167401</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Trust-based communication systems for internet of things applications ent://SD_ILS/0/SD_ILS:597744 2026-02-26T16:25:42Z 2026-02-26T16:25:42Z Author&#160;Madaan, Vishu, editor.&#160;Agrawal, Prateek, editor.&#160;Sharma, Anand, editor.&#160;Sharma, Dilip Kumar, editor.&#160;Agrawal, Akshat, 1986- editor.<br/>Preferred Shelf Number&#160;TK5105.8857<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119896746">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119896746</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Applied incident response ent://SD_ILS/0/SD_ILS:595744 2026-02-26T16:25:42Z 2026-02-26T16:25:42Z Author&#160;Anson, Steve.<br/>Preferred Shelf Number&#160;QA76.9 .A25<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119560302">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119560302</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cyber fraud : tactics, techniques, and procedures ent://SD_ILS/0/SD_ILS:540157 2026-02-26T16:25:42Z 2026-02-26T16:25:42Z Author&#160;Graham, James.&#160;Howard, Rick.<br/>Preferred Shelf Number&#160;HV6773 .H69 2009<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781420091281">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> Testing code security ent://SD_ILS/0/SD_ILS:546167 2026-02-26T16:25:42Z 2026-02-26T16:25:42Z Author&#160;Van der Linden, Maura A., author.<br/>Preferred Shelf Number&#160;QA76.9 .A25 V359 2007<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781420013795">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/>