Search Results for Organizations - Narrowed by: Security.SirsiDynix Enterprisehttps://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dOrganizations$0026qf$003dSUBJECT$002509Subject$002509Security.$002509Security.$0026ic$003dtrue$0026ps$003d300?2026-02-26T06:32:48ZZero Trust Security A Hands-on Guideent://SD_ILS/0/SD_ILS:6003922026-02-26T06:32:48Z2026-02-26T06:32:48ZAuthor Jakobsen, Adam Tilmar.<br/>Preferred Shelf Number XX(600392.1)<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394361120">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394361120</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Locked Up Cybersecurity Threat Mitigation Lessons from A Real-World LockBit Ransomware Responseent://SD_ILS/0/SD_ILS:6004132026-02-26T06:32:48Z2026-02-26T06:32:48ZAuthor Lewis, Zachary.<br/>Preferred Shelf Number XX(600413.1)<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394357079">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394357079</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Lessons from the Frontlines : Insights from a Cybersecurity Career.ent://SD_ILS/0/SD_ILS:6004332026-02-26T06:32:48Z2026-02-26T06:32:48ZAuthor Keren.<br/>Preferred Shelf Number XX(600433.1)<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394395439">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394395439</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Information security and privacy quick reference the essential handbook for every CISO, CSO, and Chief Privacy Officerent://SD_ILS/0/SD_ILS:5999462026-02-26T06:32:48Z2026-02-26T06:32:48ZAuthor Chapple, Mike, author. Shelley, Joe. Stewart, James Michael.<br/>Preferred Shelf Number QA76.9 .A25 C43 2025<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394353347">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394353347</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Effective vulnerability management : managing risk in the vulnerable digital ecosystement://SD_ILS/0/SD_ILS:5990472026-02-26T06:32:48Z2026-02-26T06:32:48ZAuthor Hughes, Chris (Christopher Matthew), author. Robinson, Nikki, author.<br/>Preferred Shelf Number QA76.9 .A25 H84 2024<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394277155">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394277155</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Cyber Operations : A Case Study Approachent://SD_ILS/0/SD_ILS:5991172026-02-26T06:32:48Z2026-02-26T06:32:48ZAuthor Couretas, Jerry M., 1966- author.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119712121">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119712121</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Cybersecurity and local governmentent://SD_ILS/0/SD_ILS:5973922026-02-26T06:32:48Z2026-02-26T06:32:48ZAuthor Norris, Donald F., author. Mateczun, Laura, author. Forno, Richard, author.<br/>Preferred Shelf Number JS331 .N67 2022<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119788317">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119788317</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Tribe of hackers security leaders : tribal knowledge from the best in cybersecurity leadershipent://SD_ILS/0/SD_ILS:5958872026-02-26T06:32:48Z2026-02-26T06:32:48ZAuthor Carey, Marcus J. (Cybersecurity professional), author. Jin, Jennifer.<br/>Preferred Shelf Number QA76.9 .A25 C37 2020<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119643784">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119643784</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Cyber breach response that actually works : organizational approach to managing residual riskent://SD_ILS/0/SD_ILS:5961172026-02-26T06:32:48Z2026-02-26T06:32:48ZAuthor Gorecki, Andrew.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119679349">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119679349</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>IoT security : advances in authenticationent://SD_ILS/0/SD_ILS:5954202026-02-26T06:32:48Z2026-02-26T06:32:48ZAuthor Liyanage, Madhusanka, editor. Braeken, An, 1970- editor. Kumar, Pardeep, 1976- editor. Ylianttila, Mika, editor.<br/>Preferred Shelf Number TK5105.8857 .I58 2019<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119527978">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119527978</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>The Digital Big Bang : the Hard Stuff, the Soft Stuff, and the Future of Cybersecurityent://SD_ILS/0/SD_ILS:5954352026-02-26T06:32:48Z2026-02-26T06:32:48ZAuthor Quade, Phil.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119617396">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119617396</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>