Search Results for Risk Assessment - Narrowed by: COMPUTERS. SirsiDynix Enterprise https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dRisk$002bAssessment$0026qf$003dSUBJECT$002509Subject$002509COMPUTERS.$002509COMPUTERS.$0026ic$003dtrue$0026ps$003d300? 2026-02-25T03:47:05Z Information security and privacy quick reference the essential handbook for every CISO, CSO, and Chief Privacy Officer ent://SD_ILS/0/SD_ILS:599946 2026-02-25T03:47:05Z 2026-02-25T03:47:05Z Author&#160;Chapple, Mike, author.&#160;Shelley, Joe.&#160;Stewart, James Michael.<br/>Preferred Shelf Number&#160;QA76.9 .A25 C43 2025<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394353347">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394353347</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Artificial intelligence in remote sensing for disaster management ent://SD_ILS/0/SD_ILS:599953 2026-02-25T03:47:05Z 2026-02-25T03:47:05Z Author&#160;Dahiya, Neelam, editor.&#160;Singh, Gurwinder, editor.&#160;Singh, Sartajvir, editor.&#160;Sharma, Apoorva, editor.<br/>Preferred Shelf Number&#160;HD49 .A78 2025<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394287222">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394287222</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Stepping through cybersecurity risk management : a systems thinking approach ent://SD_ILS/0/SD_ILS:599021 2026-02-25T03:47:05Z 2026-02-25T03:47:05Z Author&#160;Bayuk, Jennifer L., author.<br/>Preferred Shelf Number&#160;QA76.9 .A25 B39 2024<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394213986">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394213986</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Effective vulnerability management : managing risk in the vulnerable digital ecosystem ent://SD_ILS/0/SD_ILS:599047 2026-02-25T03:47:05Z 2026-02-25T03:47:05Z Author&#160;Hughes, Chris (Christopher Matthew), author.&#160;Robinson, Nikki, author.<br/>Preferred Shelf Number&#160;QA76.9 .A25 H84 2024<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394277155">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394277155</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Genomics at the nexus of AI, computer vision, and machine learning ent://SD_ILS/0/SD_ILS:599433 2026-02-25T03:47:05Z 2026-02-25T03:47:05Z Author&#160;Choudhary, Shilpa, editor.<br/>Preferred Shelf Number&#160;QH447 .G46 2024<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394268832">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394268832</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Artificial intelligence for risk mitigation in the financial industry ent://SD_ILS/0/SD_ILS:599190 2026-02-25T03:47:05Z 2026-02-25T03:47:05Z Preferred Shelf Number&#160;HG173 .A78 2024<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394175574">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394175574</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Artificial intelligence for bone disorder : diagnosis and treatment ent://SD_ILS/0/SD_ILS:598907 2026-02-25T03:47:05Z 2026-02-25T03:47:05Z Author&#160;Malviya, Rishabha, author.&#160;Rajput, Shivam, author.&#160;Vaidya, Makarand, author.<br/>Preferred Shelf Number&#160;RC930<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394230914">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394230914</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> The cybersecurity guide to governance, risk, and compliance ent://SD_ILS/0/SD_ILS:598945 2026-02-25T03:47:05Z 2026-02-25T03:47:05Z Author&#160;Edwards, Jason (Cybersecurity expert), author.&#160;Weaver, Griffin, author.<br/>Preferred Shelf Number&#160;HD30.38 .E34 2024<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394250226">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394250226</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Gamification for resilience : resilient informed decision-making ent://SD_ILS/0/SD_ILS:598293 2026-02-25T03:47:05Z 2026-02-25T03:47:05Z Author&#160;Gheorghe, Adrian V., author.&#160;Katina, Polinpapilinho F., author.<br/>Preferred Shelf Number&#160;HT166 .G487 2023<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394157778">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394157778</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Executive's guide to cyber risk : securing the future today ent://SD_ILS/0/SD_ILS:597567 2026-02-25T03:47:05Z 2026-02-25T03:47:05Z Author&#160;Moyo, Siegfried, author.<br/>Preferred Shelf Number&#160;HF5548.37 .M68 2022<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394320578">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394320578</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cyber-physical systems : foundations and techniques ent://SD_ILS/0/SD_ILS:597592 2026-02-25T03:47:05Z 2026-02-25T03:47:05Z Author&#160;Sharma, Uzzal, editor.<br/>Preferred Shelf Number&#160;TJ213 .C93 2022<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119836636">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119836636</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cybersecurity and decision makers : data security and digital trust ent://SD_ILS/0/SD_ILS:595943 2026-02-25T03:47:05Z 2026-02-25T03:47:05Z Author&#160;Fr&eacute;minville, Marie de, author.<br/>Preferred Shelf Number&#160;HF5548.37 .F74 2020<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119720362">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119720362</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Hacking connected cars : tactics, techniques, and procedures ent://SD_ILS/0/SD_ILS:595843 2026-02-25T03:47:05Z 2026-02-25T03:47:05Z Author&#160;Knight, Alissa, author.<br/>Preferred Shelf Number&#160;TL152.8 .K65 2020<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119491774">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119491774</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cybersecurity program development for business : the essential planning guide ent://SD_ILS/0/SD_ILS:594455 2026-02-25T03:47:05Z 2026-02-25T03:47:05Z Author&#160;Moschovitis, Christos J. P., author.<br/>Preferred Shelf Number&#160;HD30.2<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119430018">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119430018</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/>