Search Results for Scope - Narrowed by: Computer security.
SirsiDynix Enterprise
https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dScope$0026qf$003dSUBJECT$002509Subject$002509Computer$002bsecurity.$002509Computer$002bsecurity.$0026ps$003d300$0026isd$003dtrue?
2026-02-21T22:42:44Z
Open-source security operations center (SOC) : a complete guide to establishing, managing, and maintaining a modern SOC
ent://SD_ILS/0/SD_ILS:599434
2026-02-21T22:42:44Z
2026-02-21T22:42:44Z
Author Basta, Alfred, author. Basta, Nadine, author. Anwar, Waqar, author. Essar, Mohammad Ilyas, author. John Wiley & Sons, publisher.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394201631">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394201631</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Quantum computing models for cybersecurity and wireless communications
ent://SD_ILS/0/SD_ILS:599707
2026-02-21T22:42:44Z
2026-02-21T22:42:44Z
Author Kumar, Budati Anil, edited. Kumar, Singamaneni Kranthi, edited. Li, Xingwang (Computer scientist), edited.<br/>Preferred Shelf Number QA76.9 .A25 Q36 2025<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394271429">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394271429</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Quantum computing in cybersecurity
ent://SD_ILS/0/SD_ILS:598685
2026-02-21T22:42:44Z
2026-02-21T22:42:44Z
Author Rawat, Romil, editor.<br/>Preferred Shelf Number QA76.9 .A25 Q83 2023<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394167401">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394167401</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Symmetric cryptography. Volume 1 : Design and security proofs
ent://SD_ILS/0/SD_ILS:598803
2026-02-21T22:42:44Z
2026-02-21T22:42:44Z
Author Boura, Christina, editor. Naya-Plasencia, Maria, editor.<br/>Preferred Shelf Number Z104 .S966 2023<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394256358">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394256358</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Trust-based communication systems for internet of things applications
ent://SD_ILS/0/SD_ILS:597744
2026-02-21T22:42:44Z
2026-02-21T22:42:44Z
Author Madaan, Vishu, editor. Agrawal, Prateek, editor. Sharma, Anand, editor. Sharma, Dilip Kumar, editor. Agrawal, Akshat, 1986- editor.<br/>Preferred Shelf Number TK5105.8857<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119896746">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119896746</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Artificial intelligence and data mining approaches in security frameworks
ent://SD_ILS/0/SD_ILS:596957
2026-02-21T22:42:44Z
2026-02-21T22:42:44Z
Author Bhargava, Neeraj. Bhargava, Ritu. Rathore, Pramod Singh, 1988- Agrawal, Rashmi, 1978-<br/>Preferred Shelf Number Q335<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119760429">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119760429</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security issues and privacy concerns in Industry 4.0 applications
ent://SD_ILS/0/SD_ILS:596945
2026-02-21T22:42:44Z
2026-02-21T22:42:44Z
Author David, Shiblin, author. Anand, R. S., author. Jeyakrishnan, V., author. Niranjanamurthy, M., author.<br/>Preferred Shelf Number QA76.9 .A25 D38 2021<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119776529">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119776529</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Digital forensics
ent://SD_ILS/0/SD_ILS:593346
2026-02-21T22:42:44Z
2026-02-21T22:42:44Z
Author Årnes, André, 1976- editor.<br/>Preferred Shelf Number HV8079 .C65<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119262442">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119262442</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
DNS security management
ent://SD_ILS/0/SD_ILS:593802
2026-02-21T22:42:44Z
2026-02-21T22:42:44Z
Author Dooley, Michael, 1962- author. Rooney, Timothy, 1962- author.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119328292">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119328292</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Data security, data mining and data management : technologies and challenges
ent://SD_ILS/0/SD_ILS:280914
2026-02-21T22:42:44Z
2026-02-21T22:42:44Z
Author O'Byrne, Serge, editor of compilation.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access EBSCOhost <a href="http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=570680">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=570680</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
The security risk assessment handbook : a complete guide for performing security risk assessments
ent://SD_ILS/0/SD_ILS:539743
2026-02-21T22:42:44Z
2026-02-21T22:42:44Z
Author Landoll, Douglas J., author.<br/>Preferred Shelf Number HF5548.37 .L358 2011<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781439821497">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>
Information security and ethics social and organizational issues
ent://SD_ILS/0/SD_ILS:152966
2026-02-21T22:42:44Z
2026-02-21T22:42:44Z
Author Quigley, Marian.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access EBSCOhost <a href="http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=108396">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=108396</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Beginning cryptography with Java
ent://SD_ILS/0/SD_ILS:144203
2026-02-21T22:42:44Z
2026-02-21T22:42:44Z
Author Hook, David, 1962-<br/>Preferred Shelf Number ONLINE<br/>Electronic Access EBSCOhost <a href="http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=142234">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=142234</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
A practical guide to security assessments
ent://SD_ILS/0/SD_ILS:545277
2026-02-21T22:42:44Z
2026-02-21T22:42:44Z
Author Kairab, Sudhanshu., author.<br/>Preferred Shelf Number HF5548.32 .K345 2005<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781135500313">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>