Search Results for Leaders. - Narrowed by: Security.SirsiDynix Enterprisehttps://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dLeaders.$0026qf$003dSUBJECT$002509Subject$002509Security.$002509Security.$0026ps$003d300?dt=list2026-03-26T19:56:41ZTribe of hackers security leaders : tribal knowledge from the best in cybersecurity leadershipent://SD_ILS/0/SD_ILS:5958872026-03-26T19:56:41Z2026-03-26T19:56:41ZAuthor Carey, Marcus J. (Cybersecurity professional), author. Jin, Jennifer.<br/>Preferred Shelf Number QA76.9 .A25 C37 2020<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119643784">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119643784</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Locked Up Cybersecurity Threat Mitigation Lessons from A Real-World LockBit Ransomware Responseent://SD_ILS/0/SD_ILS:6004132026-03-26T19:56:41Z2026-03-26T19:56:41ZAuthor Lewis, Zachary.<br/>Preferred Shelf Number XX(600413.1)<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394357079">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394357079</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Principles and applications of blockchain systems : how to overcome the CAP trilemma in consortium blockchainent://SD_ILS/0/SD_ILS:5996502026-03-26T19:56:41Z2026-03-26T19:56:41ZAuthor Li, Hu, author. Wang, Han, author.<br/>Preferred Shelf Number QA76.9 .B56 L5 2025<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394237258">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394237258</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>BEHIND THE AI MASK protecting your business from deepfakes.ent://SD_ILS/0/SD_ILS:6004112026-03-26T19:56:41Z2026-03-26T19:56:41ZAuthor BOGAN, CARL.<br/>Preferred Shelf Number XX(600411.1)<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394352616">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394352616</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>The cybersecurity guide to governance, risk, and complianceent://SD_ILS/0/SD_ILS:5989452026-03-26T19:56:41Z2026-03-26T19:56:41ZAuthor Edwards, Jason (Cybersecurity expert), author. Weaver, Griffin, author.<br/>Preferred Shelf Number HD30.38 .E34 2024<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394250226">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394250226</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Effective vulnerability management : managing risk in the vulnerable digital ecosystement://SD_ILS/0/SD_ILS:5990472026-03-26T19:56:41Z2026-03-26T19:56:41ZAuthor Hughes, Chris (Christopher Matthew), author. Robinson, Nikki, author.<br/>Preferred Shelf Number QA76.9 .A25 H84 2024<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394277155">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394277155</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>The DevSecOps playbook : deliver continuous security at speedent://SD_ILS/0/SD_ILS:5986342026-03-26T19:56:41Z2026-03-26T19:56:41ZAuthor Mack, Sean D., author.<br/>Preferred Shelf Number QA76.9 .A25 M33 2024<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394189281">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394189281</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Tribe of hackers blue team : tribal knowledge from the best in defensive cybersecurityent://SD_ILS/0/SD_ILS:5962762026-03-26T19:56:41Z2026-03-26T19:56:41ZAuthor Carey, Marcus J. (Cybersecurity professional) Jin, Jennifer.<br/>Preferred Shelf Number QA76.9 .A25 C3673 2020<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119643432">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119643432</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Transformational security awareness : what neuroscientists, storytellers, and marketers can teach us about driving secure behaviorsent://SD_ILS/0/SD_ILS:5953042026-03-26T19:56:41Z2026-03-26T19:56:41ZAuthor Carpenter, Perry, author.<br/>Preferred Shelf Number QA76.9 .A25 C37 2019 EB<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119566380">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119566380</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>We have root : even more advice from Schneier on securityent://SD_ILS/0/SD_ILS:5954322026-03-26T19:56:41Z2026-03-26T19:56:41ZAuthor Schneier, Bruce, 1963- author.<br/>Preferred Shelf Number QA76.9 .A25 S36 2019<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119653554">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119653554</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>The Digital Big Bang : the Hard Stuff, the Soft Stuff, and the Future of Cybersecurityent://SD_ILS/0/SD_ILS:5954352026-03-26T19:56:41Z2026-03-26T19:56:41ZAuthor Quade, Phil.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119617396">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119617396</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Hacking the hacker : learn from the experts who take down hackersent://SD_ILS/0/SD_ILS:5936362026-03-26T19:56:41Z2026-03-26T19:56:41ZAuthor Grimes, Roger A., author.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119396260">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119396260</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>