Search Results for Language. - Narrowed by: Computer security.
SirsiDynix Enterprise
https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dLanguage.$0026qf$003dSUBJECT$002509Subject$002509Computer$002bsecurity.$002509Computer$002bsecurity.$0026ps$003d300$0026isd$003dtrue?
2026-01-23T20:55:20Z
A Cybersecurity Leader's Journey : Speaking the Language of the Board
ent://SD_ILS/0/SD_ILS:588198
2026-01-23T20:55:20Z
2026-01-23T20:55:20Z
Author Marchewka, Edward, author.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003597407">https://www.taylorfrancis.com/books/9781003597407</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Generative AI, cybersecurity, and ethics
ent://SD_ILS/0/SD_ILS:599597
2026-01-23T20:55:20Z
2026-01-23T20:55:20Z
Author Islam, Ray (Mohammad Rubyet), author.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394279326">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394279326</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Alice and Bob learn secure coding
ent://SD_ILS/0/SD_ILS:599664
2026-01-23T20:55:20Z
2026-01-23T20:55:20Z
Author Janca, Tanya. author.<br/>Preferred Shelf Number QA76.76 .D47<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394277179">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394277179</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Taming the hacking storm : a framework for securing and defending networks
ent://SD_ILS/0/SD_ILS:599858
2026-01-23T20:55:20Z
2026-01-23T20:55:20Z
Author Grimes, Roger A., author.<br/>Preferred Shelf Number QA76.9 .A25 G75 2025<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394352289">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394352289</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
x86 software reverse-engineering, cracking, and counter-measures
ent://SD_ILS/0/SD_ILS:598920
2026-01-23T20:55:20Z
2026-01-23T20:55:20Z
Author Domas, Stephanie, author. Domas, Christopher, author.<br/>Preferred Shelf Number QA76.9 .A25 D66 2024<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394277131">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394277131</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Semantic control for the cybersecurity domain : investigation on the representativeness of a domain-specific terminology referring to lexical variation
ent://SD_ILS/0/SD_ILS:570384
2026-01-23T20:55:20Z
2026-01-23T20:55:20Z
Author Lanza, Claudia, author.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003281450">https://www.taylorfrancis.com/books/9781003281450</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security issues and privacy concerns in Industry 4.0 applications
ent://SD_ILS/0/SD_ILS:596945
2026-01-23T20:55:20Z
2026-01-23T20:55:20Z
Author David, Shiblin, author. Anand, R. S., author. Jeyakrishnan, V., author. Niranjanamurthy, M., author.<br/>Preferred Shelf Number QA76.9 .A25 D38 2021<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119776529">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119776529</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Intelligent Technologies and Applications First International Conference, INTAP 2018, Bahawalpur, Pakistan, October 23-25, 2018, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:485882
2026-01-23T20:55:20Z
2026-01-23T20:55:20Z
Author Bajwa, Imran Sarwar. editor. Kamareddine, Fairouz. editor. Costa, Anna. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-981-13-6052-7">https://doi.org/10.1007/978-981-13-6052-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
ICT Systems Security and Privacy Protection 34th IFIP TC 11 International Conference, SEC 2019, Lisbon, Portugal, June 25-27, 2019, Proceedings
ent://SD_ILS/0/SD_ILS:485997
2026-01-23T20:55:20Z
2026-01-23T20:55:20Z
Author Dhillon, Gurpreet. editor. Karlsson, Fredrik. editor. Hedström, Karin. editor. Zúquete, André. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-22312-0">https://doi.org/10.1007/978-3-030-22312-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Progress in Artificial Intelligence and Pattern Recognition 6th International Workshop, IWAIPR 2018, Havana, Cuba, September 24–26, 2018, Proceedings
ent://SD_ILS/0/SD_ILS:400076
2026-01-23T20:55:20Z
2026-01-23T20:55:20Z
Author Hernández Heredia, Yanio. editor. (orcid)0000-0001-9433-5511 Milián Núñez, Vladimir. editor. (orcid)0000-0002-7741-7846 Ruiz Shulcloper, José. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-01132-1">https://doi.org/10.1007/978-3-030-01132-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Recent Trends and Future Technology in Applied Intelligence 31st International Conference on Industrial Engineering and Other Applications of Applied Intelligent Systems, IEA/AIE 2018, Montreal, QC, Canada, June 25-28, 2018, Proceedings
ent://SD_ILS/0/SD_ILS:399589
2026-01-23T20:55:20Z
2026-01-23T20:55:20Z
Author Mouhoub, Malek. editor. Sadaoui, Samira. editor. Ait Mohamed, Otmane. editor. Ali, Moonis. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-92058-0">https://doi.org/10.1007/978-3-319-92058-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Wireshark for security professionals : using Wireshark and the Metasploit Framework
ent://SD_ILS/0/SD_ILS:593472
2026-01-23T20:55:20Z
2026-01-23T20:55:20Z
Author Bullock, Jessey, author. Gordon, Adam, author.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119183457">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119183457</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Violent Python a cookbook for hackers, forensic analysts, penetration testers and security engineers
ent://SD_ILS/0/SD_ILS:146917
2026-01-23T20:55:20Z
2026-01-23T20:55:20Z
Author O'Connor, T. J.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597499576">http://www.sciencedirect.com/science/book/9781597499576</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
SQL injection attacks and defense
ent://SD_ILS/0/SD_ILS:148516
2026-01-23T20:55:20Z
2026-01-23T20:55:20Z
Author Clarke, Justin.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597499637">http://www.sciencedirect.com/science/book/9781597499637</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Hacking exposed Linux Linux security secrets and solutions.
ent://SD_ILS/0/SD_ILS:293324
2026-01-23T20:55:20Z
2026-01-23T20:55:20Z
Author Hatch, Brian. Hacking Linux exposed. ISECOM (Organization)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://mhebooklibrary.com/reader/hacking-exposed-linux">Subscription required</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Gray hat hacking the ethical hacker's handbook
ent://SD_ILS/0/SD_ILS:293255
2026-01-23T20:55:20Z
2026-01-23T20:55:20Z
Author Harris, Shon. Harper, Allen. Eagle, Chris. Ness, Jonathan. Lenkey, Gideon.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://mhebooklibrary.com/reader/gray-hat-hacking-ethical-hackers-handbook-3rd-edition">Subscription required</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
24 deadly sins of software security programming flaws and how to fix them
ent://SD_ILS/0/SD_ILS:293319
2026-01-23T20:55:20Z
2026-01-23T20:55:20Z
Author Howard, Michael, 1965- LeBlanc, David, 1960- Viega, John.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://mhebooklibrary.com/reader/24-deadly-sins-software-security-programming-flaws-how-to-fix-them">Subscription required</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Managed code rootkits hooking into runtime environments
ent://SD_ILS/0/SD_ILS:147836
2026-01-23T20:55:20Z
2026-01-23T20:55:20Z
Author Metula, Erez.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495745">http://www.sciencedirect.com/science/book/9781597495745</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
SQL injection attacks and defense
ent://SD_ILS/0/SD_ILS:148576
2026-01-23T20:55:20Z
2026-01-23T20:55:20Z
Author Clarke, Justin.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597494243">http://www.sciencedirect.com/science/book/9781597494243</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Beginning cryptography with Java
ent://SD_ILS/0/SD_ILS:144203
2026-01-23T20:55:20Z
2026-01-23T20:55:20Z
Author Hook, David, 1962-<br/>Preferred Shelf Number ONLINE<br/>Electronic Access EBSCOhost <a href="http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=142234">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=142234</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cryptography, information theory, and error-correction : a handbook for the 21st century
ent://SD_ILS/0/SD_ILS:593044
2026-01-23T20:55:20Z
2026-01-23T20:55:20Z
Author Bruen, Aiden A., 1941- Forcinito, Mario, 1962-<br/>Preferred Shelf Number QA76.9 .A25 B79 2005<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781118033296">https://onlinelibrary.wiley.com/doi/book/10.1002/9781118033296</a>
<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119582397">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119582397</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Hack proofing XML
ent://SD_ILS/0/SD_ILS:254000
2026-01-23T20:55:20Z
2026-01-23T20:55:20Z
Author 'Ken'@ftu.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836500">http://www.sciencedirect.com/science/book/9781931836500</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>