Search Results for Organization - Narrowed by: Cryptography.SirsiDynix Enterprisehttps://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dOrganization$0026qf$003dSUBJECT$002509Subject$002509Cryptography.$002509Cryptography.$0026ps$003d300?dt=list2026-03-22T15:48:38ZBecoming quantum safe protect your business and mitigate risks with post-quantum cryptography and crypto-agilityent://SD_ILS/0/SD_ILS:6001792026-03-22T15:48:38Z2026-03-22T15:48:38ZAuthor Arun, Jai Singh, author. Harishankar, Ray, author. Rjaibi, Walid, author. Diffie, Whitfield, writer of foreword.<br/>Preferred Shelf Number QA76.889<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394406784">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394406784</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>The cybersecurity control playbook : from fundamentals to advanced strategiesent://SD_ILS/0/SD_ILS:5997892026-03-22T15:48:38Z2026-03-22T15:48:38ZAuthor Edwards, Jason (Cybersecurity expert), author. John Wiley & Sons, publisher.<br/>Preferred Shelf Number QA76.9 .A25 E3884 2025<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394331888">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394331888</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Effective vulnerability management : managing risk in the vulnerable digital ecosystement://SD_ILS/0/SD_ILS:5990472026-03-22T15:48:38Z2026-03-22T15:48:38ZAuthor Hughes, Chris (Christopher Matthew), author. Robinson, Nikki, author.<br/>Preferred Shelf Number QA76.9 .A25 H84 2024<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394277155">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394277155</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Cyber Operations : A Case Study Approachent://SD_ILS/0/SD_ILS:5991172026-03-22T15:48:38Z2026-03-22T15:48:38ZAuthor Couretas, Jerry M., 1966- author.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119712121">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119712121</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>The CISO evolution : business knowledge for cybersecurity executivesent://SD_ILS/0/SD_ILS:5970562026-03-22T15:48:38Z2026-03-22T15:48:38ZAuthor Sharp, Matthew K., author. Lambros, Kyriakos P., author.<br/>Preferred Shelf Number HD30.2 .S5325 2022<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119782513">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119782513</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Tribe of hackers security leaders : tribal knowledge from the best in cybersecurity leadershipent://SD_ILS/0/SD_ILS:5958872026-03-22T15:48:38Z2026-03-22T15:48:38ZAuthor Carey, Marcus J. (Cybersecurity professional), author. Jin, Jennifer.<br/>Preferred Shelf Number QA76.9 .A25 C37 2020<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119643784">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119643784</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Cybersecurity and decision makers : data security and digital trustent://SD_ILS/0/SD_ILS:5959432026-03-22T15:48:38Z2026-03-22T15:48:38ZAuthor Fréminville, Marie de, author.<br/>Preferred Shelf Number HF5548.37 .F74 2020<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119720362">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119720362</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>The Digital Big Bang : the Hard Stuff, the Soft Stuff, and the Future of Cybersecurityent://SD_ILS/0/SD_ILS:5954352026-03-22T15:48:38Z2026-03-22T15:48:38ZAuthor Quade, Phil.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119617396">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119617396</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Healthcare Information Privacy and Security Regulatory Compliance and Data Security in the Age of Electronic Health Recordsent://SD_ILS/0/SD_ILS:6186052026-03-22T15:48:38Z2026-03-22T15:48:38ZAuthor Robichau, Bernard Peter. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-1-4302-6677-8">https://doi.org/10.1007/978-1-4302-6677-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>The Manager's Guide to Web Application Security A Concise Guide to the Weaker Side of the Webent://SD_ILS/0/SD_ILS:6186402026-03-22T15:48:38Z2026-03-22T15:48:38ZAuthor Lepofsky, Ron. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-1-4842-0148-0">https://doi.org/10.1007/978-1-4842-0148-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>The Privacy Engineer's Manifesto Getting from Policy to Code to QA to Valueent://SD_ILS/0/SD_ILS:6185992026-03-22T15:48:38Z2026-03-22T15:48:38ZAuthor Dennedy, Michelle. author. Fox, Jonathan. author. Finneran, Tom. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-1-4302-6356-2">https://doi.org/10.1007/978-1-4302-6356-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>