Search Results for Reference. - Narrowed by: Computer security.
SirsiDynix Enterprise
https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dReference.$0026qf$003dSUBJECT$002509Subject$002509Computer$002bsecurity.$002509Computer$002bsecurity.$0026ps$003d300$0026isd$003dtrue?
2026-01-21T22:10:37Z
Practical Core Software Security A Reference Framework.
ent://SD_ILS/0/SD_ILS:562758
2026-01-21T22:10:37Z
2026-01-21T22:10:37Z
Author Ransome, James F. Misra, Anmol. Merkow, Mark S.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003319078">https://www.taylorfrancis.com/books/9781003319078</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information security and privacy quick reference the essential handbook for every CISO, CSO, and Chief Privacy Officer
ent://SD_ILS/0/SD_ILS:599946
2026-01-21T22:10:37Z
2026-01-21T22:10:37Z
Author Chapple, Mike, author. Shelley, Joe. Stewart, James Michael.<br/>Preferred Shelf Number QA76.9 .A25 C43 2025<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394353347">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394353347</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information security policies and procedures : a practitioner's reference
ent://SD_ILS/0/SD_ILS:547228
2026-01-21T22:10:37Z
2026-01-21T22:10:37Z
Author Peltier, Thomas R., author.<br/>Preferred Shelf Number QA76.9 .A25 P428 2004<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9780203488737">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>
Bio-inspiring Cyber Security and Cloud Services: Trends and Innovations
ent://SD_ILS/0/SD_ILS:487178
2026-01-21T22:10:37Z
2026-01-21T22:10:37Z
Author Hassanien, Aboul Ella. editor. Kim, Tai-Hoon. editor. Kacprzyk, Janusz. editor. Awad, Ali Ismail. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-662-43616-5">https://doi.org/10.1007/978-3-662-43616-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Protection of electrical power distribution systems : smart grid, microgrid, AI, and cyber security
ent://SD_ILS/0/SD_ILS:600371
2026-01-21T22:10:37Z
2026-01-21T22:10:37Z
Author Masood, Tariq, author. Abdo, Jamil, author. Iqbal, Atif, author.<br/>Preferred Shelf Number TK3001 .M37 2026<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394327676">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394327676</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Quantum computing models for cybersecurity and wireless communications
ent://SD_ILS/0/SD_ILS:599707
2026-01-21T22:10:37Z
2026-01-21T22:10:37Z
Author Kumar, Budati Anil, edited. Kumar, Singamaneni Kranthi, edited. Li, Xingwang (Computer scientist), edited.<br/>Preferred Shelf Number QA76.9 .A25 Q36 2025<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394271429">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394271429</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cryptography : algorithms, protocols, and standards for computer security
ent://SD_ILS/0/SD_ILS:598914
2026-01-21T22:10:37Z
2026-01-21T22:10:37Z
Author Mammeri, Zoubir, author.<br/>Preferred Shelf Number QA268 .M34 2024<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394207510">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394207510</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Trust-based communication systems for internet of things applications
ent://SD_ILS/0/SD_ILS:597744
2026-01-21T22:10:37Z
2026-01-21T22:10:37Z
Author Madaan, Vishu, editor. Agrawal, Prateek, editor. Sharma, Anand, editor. Sharma, Dilip Kumar, editor. Agrawal, Akshat, 1986- editor.<br/>Preferred Shelf Number TK5105.8857<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119896746">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119896746</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security issues and privacy concerns in Industry 4.0 applications
ent://SD_ILS/0/SD_ILS:596945
2026-01-21T22:10:37Z
2026-01-21T22:10:37Z
Author David, Shiblin, author. Anand, R. S., author. Jeyakrishnan, V., author. Niranjanamurthy, M., author.<br/>Preferred Shelf Number QA76.9 .A25 D38 2021<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119776529">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119776529</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Applied incident response
ent://SD_ILS/0/SD_ILS:595744
2026-01-21T22:10:37Z
2026-01-21T22:10:37Z
Author Anson, Steve.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119560302">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119560302</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cybersecurity blue team toolkit
ent://SD_ILS/0/SD_ILS:595209
2026-01-21T22:10:37Z
2026-01-21T22:10:37Z
Author Tanner, Nadean H., author.<br/>Preferred Shelf Number QA76.9 .A25 T36 2019 EB<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119552963">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119552963</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Digital forensics
ent://SD_ILS/0/SD_ILS:593346
2026-01-21T22:10:37Z
2026-01-21T22:10:37Z
Author Årnes, André, 1976- editor.<br/>Preferred Shelf Number HV8079 .C65<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119262442">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119262442</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
What every engineer should know about cyber security and digital forensics
ent://SD_ILS/0/SD_ILS:539726
2026-01-21T22:10:37Z
2026-01-21T22:10:37Z
Author DeFranco, Joanna F., author.<br/>Preferred Shelf Number TK5105.59 .D44 2014<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781466564541">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>
Security without obscurity : a guide to confidentiality, authentication, and integrity
ent://SD_ILS/0/SD_ILS:544118
2026-01-21T22:10:37Z
2026-01-21T22:10:37Z
Author Stapleton, Jeffrey James, author.<br/>Preferred Shelf Number QA76.9 .A25 S734 2014<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781466592155">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>
Data mining and machine learning in cybersecurity
ent://SD_ILS/0/SD_ILS:540614
2026-01-21T22:10:37Z
2026-01-21T22:10:37Z
Author Dua, Sumeet., author. Du, Xian.<br/>Preferred Shelf Number QA76.9 .D343 D825 2011<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781439839430">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>
Data protection : governance, risk management, and compliance
ent://SD_ILS/0/SD_ILS:543918
2026-01-21T22:10:37Z
2026-01-21T22:10:37Z
Author Hill, David G. (David Gary), 1943, author.<br/>Preferred Shelf Number QA76.9 .A25 H52 2009<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781439806937">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>