Search Results for Risk. - Narrowed by: Cryptography. SirsiDynix Enterprise https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dRisk.$0026qf$003dSUBJECT$002509Subject$002509Cryptography.$002509Cryptography.$0026ps$003d300?dt=list 2026-04-03T22:56:26Z Effective vulnerability management : managing risk in the vulnerable digital ecosystem ent://SD_ILS/0/SD_ILS:599047 2026-04-03T22:56:26Z 2026-04-03T22:56:26Z Author&#160;Hughes, Chris (Christopher Matthew), author.&#160;Robinson, Nikki, author.<br/>Preferred Shelf Number&#160;QA76.9 .A25 H84 2024<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394277155">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394277155</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Risk Assessment and Risk-Driven Quality Assurance 4th International Workshop, RISK 2016, Held in Conjunction with ICTSS 2016, Graz, Austria, October 18, 2016, Revised Selected Papers ent://SD_ILS/0/SD_ILS:613620 2026-04-03T22:56:26Z 2026-04-03T22:56:26Z Author&#160;Gro&szlig;mann, J&uuml;rgen. editor.&#160;Felderer, Michael. editor.&#160;Seehusen, Fredrik. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-57858-3">https://doi.org/10.1007/978-3-319-57858-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> The cybersecurity control playbook : from fundamentals to advanced strategies ent://SD_ILS/0/SD_ILS:599789 2026-04-03T22:56:26Z 2026-04-03T22:56:26Z Author&#160;Edwards, Jason (Cybersecurity expert), author.&#160;John Wiley &amp; Sons, publisher.<br/>Preferred Shelf Number&#160;QA76.9 .A25 E3884 2025<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394331888">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394331888</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Introduction to Cybersecurity A Multidisciplinary Challenge ent://SD_ILS/0/SD_ILS:601841 2026-04-03T22:56:26Z 2026-04-03T22:56:26Z Author&#160;Sharp, Robin. author. (orcid)0000-0002-8593-267X&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-41463-3">https://doi.org/10.1007/978-3-031-41463-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> CYBERSECURITY IN THE TRANSPORTATION INDUSTRY. ent://SD_ILS/0/SD_ILS:599238 2026-04-03T22:56:26Z 2026-04-03T22:56:26Z Preferred Shelf Number&#160;HE194 .C93 2024<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394204472">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394204472</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> The CISO evolution : business knowledge for cybersecurity executives ent://SD_ILS/0/SD_ILS:597056 2026-04-03T22:56:26Z 2026-04-03T22:56:26Z Author&#160;Sharp, Matthew K., author.&#160;Lambros, Kyriakos P., author.<br/>Preferred Shelf Number&#160;HD30.2 .S5325 2022<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119782513">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119782513</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Privacy, regulations, and cybersecurity : the essential business guide ent://SD_ILS/0/SD_ILS:596472 2026-04-03T22:56:26Z 2026-04-03T22:56:26Z Author&#160;Moschovitis, Christos J. P., author.<br/>Preferred Shelf Number&#160;HD61.5 .M675 2021 EB<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119660156">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119660156</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Tribe of hackers security leaders : tribal knowledge from the best in cybersecurity leadership ent://SD_ILS/0/SD_ILS:595887 2026-04-03T22:56:26Z 2026-04-03T22:56:26Z Author&#160;Carey, Marcus J. (Cybersecurity professional), author.&#160;Jin, Jennifer.<br/>Preferred Shelf Number&#160;QA76.9 .A25 C37 2020<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119643784">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119643784</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cybersecurity and decision makers : data security and digital trust ent://SD_ILS/0/SD_ILS:595943 2026-04-03T22:56:26Z 2026-04-03T22:56:26Z Author&#160;Fr&eacute;minville, Marie de, author.<br/>Preferred Shelf Number&#160;HF5548.37 .F74 2020<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119720362">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119720362</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Hacking connected cars : tactics, techniques, and procedures ent://SD_ILS/0/SD_ILS:595843 2026-04-03T22:56:26Z 2026-04-03T22:56:26Z Author&#160;Knight, Alissa, author.<br/>Preferred Shelf Number&#160;TL152.8 .K65 2020<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119491774">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119491774</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cyber-vigilance and digital trust : cyber security in the era of cloud computing and IoT ent://SD_ILS/0/SD_ILS:595279 2026-04-03T22:56:26Z 2026-04-03T22:56:26Z Author&#160;Tounsi, Wiem, editor.<br/>Preferred Shelf Number&#160;QA76.9 .A25 C93 2019 EB<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119618393">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119618393</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Tribe of hackers : cybersecurity advice from the best hackers in the world ent://SD_ILS/0/SD_ILS:595418 2026-04-03T22:56:26Z 2026-04-03T22:56:26Z Author&#160;Carey, Marcus J. (Cybersecurity professional), author.&#160;Jin, Jennifer, author.<br/>Preferred Shelf Number&#160;QA76.9 .A25 C37 2019 EB<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119643395">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119643395</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> The Digital Big Bang : the Hard Stuff, the Soft Stuff, and the Future of Cybersecurity ent://SD_ILS/0/SD_ILS:595435 2026-04-03T22:56:26Z 2026-04-03T22:56:26Z Author&#160;Quade, Phil.<br/>Preferred Shelf Number&#160;QA76.9 .A25<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119617396">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119617396</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Risks and Security of Internet and Systems 11th International Conference, CRiSIS 2016, Roscoff, France, September 5-7, 2016, Revised Selected Papers ent://SD_ILS/0/SD_ILS:611536 2026-04-03T22:56:26Z 2026-04-03T22:56:26Z Author&#160;Cuppens, Fr&eacute;d&eacute;ric. editor.&#160;Cuppens, Nora. editor.&#160;Lanet, Jean-Louis. editor.&#160;Legay, Axel. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-54876-0">https://doi.org/10.1007/978-3-319-54876-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> ICT Systems Security and Privacy Protection 32nd IFIP TC 11 International Conference, SEC 2017, Rome, Italy, May 29-31, 2017, Proceedings ent://SD_ILS/0/SD_ILS:611573 2026-04-03T22:56:26Z 2026-04-03T22:56:26Z Author&#160;De Capitani di Vimercati, Sabrina. editor. (orcid)0000-0003-0793-3551&#160;Martinelli, Fabio. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-58469-0">https://doi.org/10.1007/978-3-319-58469-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Network Security Metrics ent://SD_ILS/0/SD_ILS:613251 2026-04-03T22:56:26Z 2026-04-03T22:56:26Z Author&#160;Wang, Lingyu. author. (orcid)0000-0002-7441-7541&#160;Jajodia, Sushil. author. (orcid)0000-0003-3210-558X&#160;Singhal, Anoop. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-66505-4">https://doi.org/10.1007/978-3-319-66505-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cyber Security Cryptography and Machine Learning First International Conference, CSCML 2017, Beer-Sheva, Israel, June 29-30, 2017, Proceedings ent://SD_ILS/0/SD_ILS:613097 2026-04-03T22:56:26Z 2026-04-03T22:56:26Z Author&#160;Dolev, Shlomi. editor.&#160;Lodha, Sachin. editor. (orcid)0000-0001-5771-4977&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-60080-2">https://doi.org/10.1007/978-3-319-60080-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cyber-security of SCADA and Other Industrial Control Systems ent://SD_ILS/0/SD_ILS:610788 2026-04-03T22:56:26Z 2026-04-03T22:56:26Z Author&#160;Colbert, Edward J. M. editor.&#160;Kott, Alexander. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-32125-7">https://doi.org/10.1007/978-3-319-32125-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security and Resiliency Analytics for Smart Grids Static and Dynamic Approaches ent://SD_ILS/0/SD_ILS:611086 2026-04-03T22:56:26Z 2026-04-03T22:56:26Z Author&#160;Al-Shaer, Ehab. author.&#160;Rahman, Mohammad Ashiqur. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-32871-3">https://doi.org/10.1007/978-3-319-32871-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Data Privacy Management and Security Assurance 11th International Workshop, DPM 2016 and 5th International Workshop, QASA 2016, Heraklion, Crete, Greece, September 26-27, 2016, Proceedings ent://SD_ILS/0/SD_ILS:613262 2026-04-03T22:56:26Z 2026-04-03T22:56:26Z Author&#160;Livraga, Giovanni. editor.&#160;Torra, Vicen&ccedil;. editor.&#160;Aldini, Alessandro. editor. (orcid)0000-0002-7250-5011&#160;Martinelli, Fabio. editor.&#160;Suri, Neeraj. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-47072-6">https://doi.org/10.1007/978-3-319-47072-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information and Communications Security 18th International Conference, ICICS 2016, Singapore, Singapore, November 29 - December 2, 2016, Proceedings ent://SD_ILS/0/SD_ILS:616049 2026-04-03T22:56:26Z 2026-04-03T22:56:26Z Author&#160;Lam, Kwok-Yan. editor. (orcid)0000-0001-7479-7970&#160;Chi, Chi-Hung. editor.&#160;Qing, Sihan. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-50011-9">https://doi.org/10.1007/978-3-319-50011-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Privacy in Statistical Databases UNESCO Chair in Data Privacy, International Conference, PSD 2016, Dubrovnik, Croatia, September 14-16, 2016, Proceedings ent://SD_ILS/0/SD_ILS:618019 2026-04-03T22:56:26Z 2026-04-03T22:56:26Z Author&#160;Domingo-Ferrer, Josep. editor. (orcid)0000-0001-7213-4962&#160;Peji&#263;-Bach, Mirjana. editor. (orcid)0000-0003-3899-6707&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-45381-1">https://doi.org/10.1007/978-3-319-45381-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Risks and Security of Internet and Systems 10th International Conference, CRiSIS 2015, Mytilene, Lesbos Island, Greece, July 20-22, 2015, Revised Selected Papers ent://SD_ILS/0/SD_ILS:611128 2026-04-03T22:56:26Z 2026-04-03T22:56:26Z Author&#160;Lambrinoudakis, Costas. editor. (orcid)0000-0003-3101-5347&#160;Gabillon, Alban. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-31811-0">https://doi.org/10.1007/978-3-319-31811-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Secure IT Systems 21st Nordic Conference, NordSec 2016, Oulu, Finland, November 2-4, 2016. Proceedings ent://SD_ILS/0/SD_ILS:616019 2026-04-03T22:56:26Z 2026-04-03T22:56:26Z Author&#160;Brumley, Billy Bob. editor.&#160;R&ouml;ning, Juha. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-47560-8">https://doi.org/10.1007/978-3-319-47560-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Availability, Reliability, and Security in Information Systems IFIP WG 8.4, 8.9, TC 5 International Cross-Domain Conference, CD-ARES 2016, and Workshop on Privacy Aware Machine Learning for Health Data Science, PAML 2016, Salzburg, Austria, August 31 - September 2, 2016, Proceedings ent://SD_ILS/0/SD_ILS:618332 2026-04-03T22:56:26Z 2026-04-03T22:56:26Z Author&#160;Buccafurri, Francesco. editor. (orcid)0000-0003-0448-8464&#160;Holzinger, Andreas. editor.&#160;Kieseberg, Peter. editor.&#160;Tjoa, A Min. editor.&#160;Weippl, Edgar. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-45507-5">https://doi.org/10.1007/978-3-319-45507-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Healthcare Information Privacy and Security Regulatory Compliance and Data Security in the Age of Electronic Health Records ent://SD_ILS/0/SD_ILS:618605 2026-04-03T22:56:26Z 2026-04-03T22:56:26Z Author&#160;Robichau, Bernard Peter. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-1-4302-6677-8">https://doi.org/10.1007/978-1-4302-6677-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Protecting Oracle Database 12c ent://SD_ILS/0/SD_ILS:618628 2026-04-03T22:56:26Z 2026-04-03T22:56:26Z Author&#160;Wright, Paul. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-1-4302-6212-1">https://doi.org/10.1007/978-1-4302-6212-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/>