Search Results for Monitoring. - Narrowed by: Computer security. SirsiDynix Enterprise https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dMonitoring.$0026qf$003dSUBJECT$002509Subject$002509Computer$002bsecurity.$002509Computer$002bsecurity.$0026ps$003d300? 2026-02-20T19:23:59Z Windows security monitoring : scenarios and patterns ent://SD_ILS/0/SD_ILS:594404 2026-02-20T19:23:59Z 2026-02-20T19:23:59Z Author&#160;Miroshnikov, Andrei, author.<br/>Preferred Shelf Number&#160;QA76.9 .A25<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119390909">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119390909</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advanced Monitoring in P2P Botnets A Dual Perspective ent://SD_ILS/0/SD_ILS:400767 2026-02-20T19:23:59Z 2026-02-20T19:23:59Z Author&#160;Karuppayah, Shankar. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-10-9050-9">https://doi.org/10.1007/978-981-10-9050-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Big Data Technologies for Monitoring of Computer Security: A Case Study of the Russian Federation ent://SD_ILS/0/SD_ILS:401907 2026-02-20T19:23:59Z 2026-02-20T19:23:59Z Author&#160;Petrenko, Sergei. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-79036-7">https://doi.org/10.1007/978-3-319-79036-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Monitoring and Securing Virtualized Networks and Services 8th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security, AIMS 2014, Brno, Czech Republic, June 30 -- July 3, 2014. Proceedings ent://SD_ILS/0/SD_ILS:488960 2026-02-20T19:23:59Z 2026-02-20T19:23:59Z Author&#160;Sperotto, Anna. editor.&#160;Doyen, Guillaume. editor.&#160;Latr&eacute;, Steven. editor.&#160;Charalambides, Marinos. editor.&#160;Stiller, Burkhard. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-662-43862-6">https://doi.org/10.1007/978-3-662-43862-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information security management metrics : a definitive guide to effective security monitoring and measurement ent://SD_ILS/0/SD_ILS:546952 2026-02-20T19:23:59Z 2026-02-20T19:23:59Z Author&#160;Brotby, W. Krag., author.<br/>Preferred Shelf Number&#160;HD30.2 .B78 2009<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781420052862">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> Rise of the machines : when AI and zero trust collide : a Project Zero Trust story ent://SD_ILS/0/SD_ILS:599932 2026-02-20T19:23:59Z 2026-02-20T19:23:59Z Author&#160;Finney, George, author.&#160;Vinduska, Zach, author.<br/>Preferred Shelf Number&#160;QA76.9 .A25 F56 2025<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394352517">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394352517</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Open-source security operations center (SOC) : a complete guide to establishing, managing, and maintaining a modern SOC ent://SD_ILS/0/SD_ILS:599434 2026-02-20T19:23:59Z 2026-02-20T19:23:59Z Author&#160;Basta, Alfred, author.&#160;Basta, Nadine, author.&#160;Anwar, Waqar, author.&#160;Essar, Mohammad Ilyas, author.&#160;John Wiley &amp; Sons, publisher.<br/>Preferred Shelf Number&#160;QA76.9 .A25<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394201631">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394201631</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Quantum computing models for cybersecurity and wireless communications ent://SD_ILS/0/SD_ILS:599707 2026-02-20T19:23:59Z 2026-02-20T19:23:59Z Author&#160;Kumar, Budati Anil, edited.&#160;Kumar, Singamaneni Kranthi, edited.&#160;Li, Xingwang (Computer scientist), edited.<br/>Preferred Shelf Number&#160;QA76.9 .A25 Q36 2025<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394271429">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394271429</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Next-generation systems and secure computing ent://SD_ILS/0/SD_ILS:599779 2026-02-20T19:23:59Z 2026-02-20T19:23:59Z Author&#160;Barman, Subhabrata, editor.&#160;Koley, Santanu, editor.&#160;Joardar, Subhankar, editor.<br/>Preferred Shelf Number&#160;QA76.9 .A25 N49 2025<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394228522">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394228522</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cyber defense : best practices for digital safety ent://SD_ILS/0/SD_ILS:600003 2026-02-20T19:23:59Z 2026-02-20T19:23:59Z Author&#160;Edwards, Jason, author.<br/>Preferred Shelf Number&#160;QA76.9 .A25 E39 2025<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394337040">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394337040</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Stepping through cybersecurity risk management : a systems thinking approach ent://SD_ILS/0/SD_ILS:599021 2026-02-20T19:23:59Z 2026-02-20T19:23:59Z Author&#160;Bayuk, Jennifer L., author.<br/>Preferred Shelf Number&#160;QA76.9 .A25 B39 2024<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394213986">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394213986</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> CYBERSECURITY IN THE TRANSPORTATION INDUSTRY. ent://SD_ILS/0/SD_ILS:599238 2026-02-20T19:23:59Z 2026-02-20T19:23:59Z Preferred Shelf Number&#160;HE194 .C93 2024<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394204472">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394204472</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> The cybersecurity guide to governance, risk, and compliance ent://SD_ILS/0/SD_ILS:598945 2026-02-20T19:23:59Z 2026-02-20T19:23:59Z Author&#160;Edwards, Jason (Cybersecurity expert), author.&#160;Weaver, Griffin, author.<br/>Preferred Shelf Number&#160;HD30.38 .E34 2024<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394250226">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394250226</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Effective vulnerability management : managing risk in the vulnerable digital ecosystem ent://SD_ILS/0/SD_ILS:599047 2026-02-20T19:23:59Z 2026-02-20T19:23:59Z Author&#160;Hughes, Chris (Christopher Matthew), author.&#160;Robinson, Nikki, author.<br/>Preferred Shelf Number&#160;QA76.9 .A25 H84 2024<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394277155">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394277155</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Trust in computer systems and the cloud ent://SD_ILS/0/SD_ILS:597142 2026-02-20T19:23:59Z 2026-02-20T19:23:59Z Author&#160;Bursell, Mike, author.<br/>Preferred Shelf Number&#160;QA76.9 .A25<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119695158">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119695158</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Artificial intelligence and data mining approaches in security frameworks ent://SD_ILS/0/SD_ILS:596957 2026-02-20T19:23:59Z 2026-02-20T19:23:59Z Author&#160;Bhargava, Neeraj.&#160;Bhargava, Ritu.&#160;Rathore, Pramod Singh, 1988-&#160;Agrawal, Rashmi, 1978-<br/>Preferred Shelf Number&#160;Q335<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119760429">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119760429</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Applied incident response ent://SD_ILS/0/SD_ILS:595744 2026-02-20T19:23:59Z 2026-02-20T19:23:59Z Author&#160;Anson, Steve.<br/>Preferred Shelf Number&#160;QA76.9 .A25<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119560302">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119560302</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security engineering : a guide to building dependable distributed systems ent://SD_ILS/0/SD_ILS:596480 2026-02-20T19:23:59Z 2026-02-20T19:23:59Z Author&#160;Anderson, Ross. http://viaf.org/viaf/sourceID/LC%7cnb2004300232<br/>Preferred Shelf Number&#160;QA76.9 .A25<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119644682">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119644682</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cyber security in parallel and distributed computing : concepts, techniques, applications and case studies ent://SD_ILS/0/SD_ILS:595099 2026-02-20T19:23:59Z 2026-02-20T19:23:59Z Author&#160;Le, Dac-Nhuong, 1983- editor.&#160;Kumar, Raghvendra, 1987- editor.&#160;Mishra, Brojo Kishore, 1979- editor.&#160;Khari, Manju, editor.&#160;Chatterjee, Jyotir Moy, editor.<br/>Preferred Shelf Number&#160;QA76.9 .A25<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119488330">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119488330</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cybersecurity blue team toolkit ent://SD_ILS/0/SD_ILS:595209 2026-02-20T19:23:59Z 2026-02-20T19:23:59Z Author&#160;Tanner, Nadean H., author.<br/>Preferred Shelf Number&#160;QA76.9 .A25 T36 2019 EB<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119552963">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119552963</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cybersecurity essentials ent://SD_ILS/0/SD_ILS:594756 2026-02-20T19:23:59Z 2026-02-20T19:23:59Z Author&#160;Brooks, Charles J., author.&#160;Grow, Christopher, author.&#160;Craig, Philip, author.&#160;Short, Donald, author.<br/>Preferred Shelf Number&#160;TK5105.59<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119369141">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119369141</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> DNS security management ent://SD_ILS/0/SD_ILS:593802 2026-02-20T19:23:59Z 2026-02-20T19:23:59Z Author&#160;Dooley, Michael, 1962- author.&#160;Rooney, Timothy, 1962- author.<br/>Preferred Shelf Number&#160;QA76.9 .A25<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119328292">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119328292</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information security policy development for compliance : ISO/IEC 27001, NIST SP 800-53, HIPAA standard, PCI DSS V2.0, and AUP V5.0 ent://SD_ILS/0/SD_ILS:545128 2026-02-20T19:23:59Z 2026-02-20T19:23:59Z Author&#160;Williams, Barry L., author.<br/>Preferred Shelf Number&#160;QA76.9 .A25 .W5495 2013<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781466580596">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> Building an effective information security policy architecture ent://SD_ILS/0/SD_ILS:540985 2026-02-20T19:23:59Z 2026-02-20T19:23:59Z Author&#160;Bacik, Sandy., author.<br/>Preferred Shelf Number&#160;QA76.9 .A25 B335 2008<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781420059069">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/>