Search Results for Lead. - Narrowed by: Computer security.
SirsiDynix Enterprise
https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dLead.$0026qf$003dSUBJECT$002509Konu$002509Computer$002bsecurity.$002509Computer$002bsecurity.$0026ps$003d300?
2026-05-15T11:50:03Z
Information Systems 21st European, Mediterranean, and Middle Eastern Conference, EMCIS 2024, Athens, Greece, September 2-3, 2024, Proceedings, Part II
ent://SD_ILS/0/SD_ILS:607376
2026-05-15T11:50:03Z
2026-05-15T11:50:03Z
Author Themistocleous, Marinos. editor. (orcid)0000-0002-6904-9692 Bakas, Nikolaos. editor. (orcid)0000-0002-7297-0693 Kokosalakis, George. editor. (orcid)0000-0003-4161-7376 Papadaki, Maria. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-031-81325-2">https://doi.org/10.1007/978-3-031-81325-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Systems 20th European, Mediterranean, and Middle Eastern Conference, EMCIS 2023, Dubai, United Arab Emirates, December 11-12, 2023, Proceedings, Part II
ent://SD_ILS/0/SD_ILS:603089
2026-05-15T11:50:03Z
2026-05-15T11:50:03Z
Author Papadaki, Maria. editor. Themistocleous, Marinos. editor. (orcid)0000-0002-6904-9692 Al Marri, Khalid. editor. Al Zarouni, Marwan. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-031-56481-9">https://doi.org/10.1007/978-3-031-56481-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Quantum computing in cybersecurity
ent://SD_ILS/0/SD_ILS:598685
2026-05-15T11:50:03Z
2026-05-15T11:50:03Z
Author Rawat, Romil, editor.<br/>Preferred Shelf Number QA76.9 .A25 Q83 2023<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394167401">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394167401</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Tribe of hackers security leaders : tribal knowledge from the best in cybersecurity leadership
ent://SD_ILS/0/SD_ILS:595887
2026-05-15T11:50:03Z
2026-05-15T11:50:03Z
Author Carey, Marcus J. (Cybersecurity professional), author. Jin, Jennifer.<br/>Preferred Shelf Number QA76.9 .A25 C37 2020<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119643784">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119643784</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Tribe of hackers red team : tribal knowledge from the best in offensive cybersecurity
ent://SD_ILS/0/SD_ILS:595415
2026-05-15T11:50:03Z
2026-05-15T11:50:03Z
Author Carey, Marcus J. (Cybersecurity professional), author. Jin, Jennifer, author.<br/>Preferred Shelf Number QA76.9 .A25 C368 2019<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119643357">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119643357</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Data protection : governance, risk management, and compliance
ent://SD_ILS/0/SD_ILS:543918
2026-05-15T11:50:03Z
2026-05-15T11:50:03Z
Author Hill, David G. (David Gary), 1943, author.<br/>Preferred Shelf Number QA76.9 .A25 H52 2009<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781439806937">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>