Search Results for Risk analysis - Narrowed by: COMPUTERS.
SirsiDynix Enterprise
https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dRisk$002banalysis$0026qf$003dSUBJECT$002509Subject$002509COMPUTERS.$002509COMPUTERS.$0026ic$003dtrue$0026ps$003d300$0026isd$003dtrue?
2026-01-31T05:36:37Z
Protecting and mitigating against cyber threats : deploying artificial intelligence and machine learning
ent://SD_ILS/0/SD_ILS:599999
2026-01-31T05:36:37Z
2026-01-31T05:36:37Z
Author Mohanty, Sachi Nandan, editor.<br/>Preferred Shelf Number QA76.9 .A25 P76 2025<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394305216">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394305216</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Artificial intelligence in remote sensing for disaster management
ent://SD_ILS/0/SD_ILS:599953
2026-01-31T05:36:37Z
2026-01-31T05:36:37Z
Author Dahiya, Neelam, editor. Singh, Gurwinder, editor. Singh, Sartajvir, editor. Sharma, Apoorva, editor.<br/>Preferred Shelf Number HD49 .A78 2025<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394287222">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394287222</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Intelligent techniques for predictive data analytics
ent://SD_ILS/0/SD_ILS:599076
2026-01-31T05:36:37Z
2026-01-31T05:36:37Z
Author Singh, Neha (Electronic engineering professor), editor. Birla, Shilpi, editor. Ansari, Mohd Dilshad, editor. Shukla, Neeraj Kumar, editor. John Wiley & Sons, publisher.<br/>Preferred Shelf Number TA340 .I56 2024<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394227990">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394227990</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Stepping through cybersecurity risk management : a systems thinking approach
ent://SD_ILS/0/SD_ILS:599021
2026-01-31T05:36:37Z
2026-01-31T05:36:37Z
Author Bayuk, Jennifer L., author.<br/>Preferred Shelf Number QA76.9 .A25 B39 2024<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394213986">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394213986</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Systems science for engineers and scholars
ent://SD_ILS/0/SD_ILS:598693
2026-01-31T05:36:37Z
2026-01-31T05:36:37Z
Author Engel, Avner (Researcher), author.<br/>Preferred Shelf Number Q295 .E534 2024<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394211678">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394211678</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Genomics at the nexus of AI, computer vision, and machine learning
ent://SD_ILS/0/SD_ILS:599433
2026-01-31T05:36:37Z
2026-01-31T05:36:37Z
Author Choudhary, Shilpa, editor.<br/>Preferred Shelf Number QH447 .G46 2024<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394268832">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394268832</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Quantum computing in cybersecurity
ent://SD_ILS/0/SD_ILS:598685
2026-01-31T05:36:37Z
2026-01-31T05:36:37Z
Author Rawat, Romil, editor.<br/>Preferred Shelf Number QA76.9 .A25 Q83 2023<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394167401">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394167401</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Agile Software Development : trends, challenges and applications
ent://SD_ILS/0/SD_ILS:598189
2026-01-31T05:36:37Z
2026-01-31T05:36:37Z
Author Hooda, Susheela, editor. Sood, Vandana Mohindru, editor. Singh, Yashwant, editor. Dalal, Sandeep, editor. Sood, Manu, editor.<br/>Preferred Shelf Number QA76.76 .D47 A55 2023<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119896838">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119896838</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cyber threat intelligence
ent://SD_ILS/0/SD_ILS:598051
2026-01-31T05:36:37Z
2026-01-31T05:36:37Z
Author Lee, Martin (Computer security expert), author.<br/>Preferred Shelf Number TK5105.59 .L47 2023<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119861775">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119861775</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Gamification for resilience : resilient informed decision-making
ent://SD_ILS/0/SD_ILS:598293
2026-01-31T05:36:37Z
2026-01-31T05:36:37Z
Author Gheorghe, Adrian V., author. Katina, Polinpapilinho F., author.<br/>Preferred Shelf Number HT166 .G487 2023<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394157778">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394157778</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Data mining and machine learning applications
ent://SD_ILS/0/SD_ILS:597345
2026-01-31T05:36:37Z
2026-01-31T05:36:37Z
Author Raja, Rohit, editor.<br/>Preferred Shelf Number QA76.9 .D343<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119792529">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119792529</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Emerging technologies for healthcare : Internet of Things and deep learning models
ent://SD_ILS/0/SD_ILS:596925
2026-01-31T05:36:37Z
2026-01-31T05:36:37Z
Author Mangla, Monika. Sharma, Nonita. Garg, Poonam. Wadhwa, Vaishali. K, Thirunavukkarasu.<br/>Preferred Shelf Number R859.7 .A78<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119792345">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119792345</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cybersecurity and decision makers : data security and digital trust
ent://SD_ILS/0/SD_ILS:595943
2026-01-31T05:36:37Z
2026-01-31T05:36:37Z
Author Fréminville, Marie de, author.<br/>Preferred Shelf Number HF5548.37 .F74 2020<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119720362">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119720362</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Hacking connected cars : tactics, techniques, and procedures
ent://SD_ILS/0/SD_ILS:595843
2026-01-31T05:36:37Z
2026-01-31T05:36:37Z
Author Knight, Alissa, author.<br/>Preferred Shelf Number TL152.8 .K65 2020<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119491774">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119491774</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security, privacy and digital forensics in the cloud
ent://SD_ILS/0/SD_ILS:594934
2026-01-31T05:36:37Z
2026-01-31T05:36:37Z
Author Chen, Lei, 1978 July 28- editor. Takabi, Hassan, 1982- editor. Le-Khac, Nhien-An, 1972- editor.<br/>Preferred Shelf Number QA76.585 .S43 2019<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119053385">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119053385</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cyber-vigilance and digital trust : cyber security in the era of cloud computing and IoT
ent://SD_ILS/0/SD_ILS:595279
2026-01-31T05:36:37Z
2026-01-31T05:36:37Z
Author Tounsi, Wiem, editor.<br/>Preferred Shelf Number QA76.9 .A25 C93 2019 EB<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119618393">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119618393</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>