Search Results for Readers. - Narrowed by: Computer security. SirsiDynix Enterprise https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dReaders.$0026qf$003dSUBJECT$002509Subject$002509Computer$002bsecurity.$002509Computer$002bsecurity.$0026ps$003d300$0026isd$003dtrue? 2026-02-24T08:18:59Z Digital twins and cybersecurity : safeguarding the future of connected systems ent://SD_ILS/0/SD_ILS:599615 2026-02-24T08:18:59Z 2026-02-24T08:18:59Z Author&#160;Naveen, Palanichamy, author.&#160;Maheswar, R., author.&#160;Ragupathy, U.S., author.<br/>Preferred Shelf Number&#160;QA76.9 .C65 N38 2025<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394272501">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394272501</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Next-generation systems and secure computing ent://SD_ILS/0/SD_ILS:599779 2026-02-24T08:18:59Z 2026-02-24T08:18:59Z Author&#160;Barman, Subhabrata, editor.&#160;Koley, Santanu, editor.&#160;Joardar, Subhankar, editor.<br/>Preferred Shelf Number&#160;QA76.9 .A25 N49 2025<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394228522">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394228522</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> The cybersecurity control playbook : from fundamentals to advanced strategies ent://SD_ILS/0/SD_ILS:599789 2026-02-24T08:18:59Z 2026-02-24T08:18:59Z Author&#160;Edwards, Jason (Cybersecurity expert), author.&#160;John Wiley &amp; Sons, publisher.<br/>Preferred Shelf Number&#160;QA76.9 .A25 E3884 2025<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394331888">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394331888</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Emerging threats and countermeasures in cybersecurity ent://SD_ILS/0/SD_ILS:599561 2026-02-24T08:18:59Z 2026-02-24T08:18:59Z Preferred Shelf Number&#160;QA76.9 .A25 E44 2025<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394230600">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394230600</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Alice and Bob learn secure coding ent://SD_ILS/0/SD_ILS:599664 2026-02-24T08:18:59Z 2026-02-24T08:18:59Z Author&#160;Janca, Tanya. author.<br/>Preferred Shelf Number&#160;QA76.76 .D47<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394277179">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394277179</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Protecting and mitigating against cyber threats : deploying artificial intelligence and machine learning ent://SD_ILS/0/SD_ILS:599999 2026-02-24T08:18:59Z 2026-02-24T08:18:59Z Author&#160;Mohanty, Sachi Nandan, editor.<br/>Preferred Shelf Number&#160;QA76.9 .A25 P76 2025<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394305216">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394305216</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cyber defense : best practices for digital safety ent://SD_ILS/0/SD_ILS:600003 2026-02-24T08:18:59Z 2026-02-24T08:18:59Z Author&#160;Edwards, Jason, author.<br/>Preferred Shelf Number&#160;QA76.9 .A25 E39 2025<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394337040">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394337040</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Securing cyber-physical systems : fundamentals, applications and challenges ent://SD_ILS/0/SD_ILS:600260 2026-02-24T08:18:59Z 2026-02-24T08:18:59Z Author&#160;Ananthajothi, K., editor.<br/>Preferred Shelf Number&#160;TK5105.59 .S43 2025<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394287765">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394287765</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Effective vulnerability management : managing risk in the vulnerable digital ecosystem ent://SD_ILS/0/SD_ILS:599047 2026-02-24T08:18:59Z 2026-02-24T08:18:59Z Author&#160;Hughes, Chris (Christopher Matthew), author.&#160;Robinson, Nikki, author.<br/>Preferred Shelf Number&#160;QA76.9 .A25 H84 2024<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394277155">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394277155</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cryptography : algorithms, protocols, and standards for computer security ent://SD_ILS/0/SD_ILS:598914 2026-02-24T08:18:59Z 2026-02-24T08:18:59Z Author&#160;Mammeri, Zoubir, author.<br/>Preferred Shelf Number&#160;QA268 .M34 2024<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394207510">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394207510</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cyber Operations : A Case Study Approach ent://SD_ILS/0/SD_ILS:599117 2026-02-24T08:18:59Z 2026-02-24T08:18:59Z Author&#160;Couretas, Jerry M., 1966- author.<br/>Preferred Shelf Number&#160;QA76.9 .A25<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119712121">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119712121</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Wireless communication in cyber security ent://SD_ILS/0/SD_ILS:598705 2026-02-24T08:18:59Z 2026-02-24T08:18:59Z Author&#160;Sountharrajan, S. editor&#160;Maheswar, R. editor&#160;Rathee, Geetanjali, editor&#160;Akila, M. editor<br/>Preferred Shelf Number&#160;QA76.9 .A25 W57 2023<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119910619">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119910619</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Intelligent security systems : how artificial intelligence, machine learning and data science work for and against computer security ent://SD_ILS/0/SD_ILS:597085 2026-02-24T08:18:59Z 2026-02-24T08:18:59Z Author&#160;Reznik, Leonid, 1955- author.<br/>Preferred Shelf Number&#160;QA76.9 .A25 R438 2022<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119771579">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119771579</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security engineering : a guide to building dependable distributed systems ent://SD_ILS/0/SD_ILS:596480 2026-02-24T08:18:59Z 2026-02-24T08:18:59Z Author&#160;Anderson, Ross. http://viaf.org/viaf/sourceID/LC%7cnb2004300232<br/>Preferred Shelf Number&#160;QA76.9 .A25<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119644682">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119644682</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Hands on hacking ent://SD_ILS/0/SD_ILS:596316 2026-02-24T08:18:59Z 2026-02-24T08:18:59Z Author&#160;Hickey, Matthew (Computer security expert), author.&#160;Arcuri, Jennifer, author.<br/>Preferred Shelf Number&#160;QA76.9 .A25 H53 2020 EB<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119561507">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119561507</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cybersecurity blue team toolkit ent://SD_ILS/0/SD_ILS:595209 2026-02-24T08:18:59Z 2026-02-24T08:18:59Z Author&#160;Tanner, Nadean H., author.<br/>Preferred Shelf Number&#160;QA76.9 .A25 T36 2019 EB<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119552963">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119552963</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> The Digital Big Bang : the Hard Stuff, the Soft Stuff, and the Future of Cybersecurity ent://SD_ILS/0/SD_ILS:595435 2026-02-24T08:18:59Z 2026-02-24T08:18:59Z Author&#160;Quade, Phil.<br/>Preferred Shelf Number&#160;QA76.9 .A25<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119617396">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119617396</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> An introduction to cyber modeling and simulation ent://SD_ILS/0/SD_ILS:594699 2026-02-24T08:18:59Z 2026-02-24T08:18:59Z Author&#160;Couretas, Jerry M., 1966- author.<br/>Preferred Shelf Number&#160;QA76.9 .C65<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119420842">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119420842</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> The complete guide to physical security ent://SD_ILS/0/SD_ILS:545960 2026-02-24T08:18:59Z 2026-02-24T08:18:59Z Author&#160;Baker, Paul, 1958, author.&#160;Benny, Daniel J.<br/>Preferred Shelf Number&#160;HV8290 .B34 2013<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781420099645">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/>