Search Results for Security Measures. - Narrowed by: COMPUTERS. SirsiDynix Enterprise https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dSecurity$002bMeasures.$0026qf$003dSUBJECT$002509Subject$002509COMPUTERS.$002509COMPUTERS.$0026ps$003d300? 2026-02-24T04:51:04Z Data-driven energy management and tariff optimization in power systems : shaping the future of electricity distribution through analytics ent://SD_ILS/0/SD_ILS:600276 2026-02-24T04:51:04Z 2026-02-24T04:51:04Z Author&#160;Arasteh, Hamidreza, editor&#160;Siano, Pierluigi, editor&#160;Moslemi, Niki, editor&#160;Guerrero, Josep M., editor.<br/>Preferred Shelf Number&#160;TK3091 .D347 2026<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394290307">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394290307</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Safeguarding satellite communications : issues, challenges, and solutions ent://SD_ILS/0/SD_ILS:600245 2026-02-24T04:51:04Z 2026-02-24T04:51:04Z Author&#160;An, Jianpin, author.<br/>Preferred Shelf Number&#160;TK5104 .A53 2026<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394304325">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394304325</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Digital twins and cybersecurity : safeguarding the future of connected systems ent://SD_ILS/0/SD_ILS:599615 2026-02-24T04:51:04Z 2026-02-24T04:51:04Z Author&#160;Naveen, Palanichamy, author.&#160;Maheswar, R., author.&#160;Ragupathy, U.S., author.<br/>Preferred Shelf Number&#160;QA76.9 .C65 N38 2025<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394272501">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394272501</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Artificial intelligence and cybersecurity in healthcare ent://SD_ILS/0/SD_ILS:599741 2026-02-24T04:51:04Z 2026-02-24T04:51:04Z Author&#160;Agrawal, Rashmi, editor.<br/>Preferred Shelf Number&#160;R859.7 .A78 A78 2025 EB<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394229826">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394229826</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> The cybersecurity control playbook : from fundamentals to advanced strategies ent://SD_ILS/0/SD_ILS:599789 2026-02-24T04:51:04Z 2026-02-24T04:51:04Z Author&#160;Edwards, Jason (Cybersecurity expert), author.&#160;John Wiley &amp; Sons, publisher.<br/>Preferred Shelf Number&#160;QA76.9 .A25 E3884 2025<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394331888">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394331888</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Securing the AWS cloud : a guide for learning to secure AWS infrastructure ent://SD_ILS/0/SD_ILS:599875 2026-02-24T04:51:04Z 2026-02-24T04:51:04Z Author&#160;Carroll, Brandon, author.<br/>Preferred Shelf Number&#160;TK5105.88813 .C37 2025<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394352142">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394352142</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Protection of electrical power distribution systems : smart grid, microgrid, AI, and cyber security ent://SD_ILS/0/SD_ILS:600371 2026-02-24T04:51:04Z 2026-02-24T04:51:04Z Author&#160;Masood, Tariq, author.&#160;Abdo, Jamil, author.&#160;Iqbal, Atif, author.<br/>Preferred Shelf Number&#160;TK3001 .M37 2026<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394327676">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394327676</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Preventing bluetooth and wireless attacks in IoMT healthcare systems ent://SD_ILS/0/SD_ILS:600016 2026-02-24T04:51:04Z 2026-02-24T04:51:04Z Author&#160;Chirillo, John, 1970- author.<br/>Preferred Shelf Number&#160;R859.7 .S43 C45 2025<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394352401">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394352401</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Stepping through cybersecurity risk management : a systems thinking approach ent://SD_ILS/0/SD_ILS:599021 2026-02-24T04:51:04Z 2026-02-24T04:51:04Z Author&#160;Bayuk, Jennifer L., author.<br/>Preferred Shelf Number&#160;QA76.9 .A25 B39 2024<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394213986">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394213986</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Effective vulnerability management : managing risk in the vulnerable digital ecosystem ent://SD_ILS/0/SD_ILS:599047 2026-02-24T04:51:04Z 2026-02-24T04:51:04Z Author&#160;Hughes, Chris (Christopher Matthew), author.&#160;Robinson, Nikki, author.<br/>Preferred Shelf Number&#160;QA76.9 .A25 H84 2024<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394277155">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394277155</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> CYBERSECURITY IN THE TRANSPORTATION INDUSTRY. ent://SD_ILS/0/SD_ILS:599238 2026-02-24T04:51:04Z 2026-02-24T04:51:04Z Preferred Shelf Number&#160;HE194 .C93 2024<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394204472">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394204472</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security and Privacy for 6G Massive IoT. ent://SD_ILS/0/SD_ILS:599629 2026-02-24T04:51:04Z 2026-02-24T04:51:04Z Author&#160;Mantas, Georgios.&#160;Saghezchi, Firooz.&#160;Rodriguez, Jonathan.&#160;Sucasas, Victor.<br/>Preferred Shelf Number&#160;TK5103.252<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119988007">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119988007</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> x86 software reverse-engineering, cracking, and counter-measures ent://SD_ILS/0/SD_ILS:598920 2026-02-24T04:51:04Z 2026-02-24T04:51:04Z Author&#160;Domas, Stephanie, author.&#160;Domas, Christopher, author.<br/>Preferred Shelf Number&#160;QA76.9 .A25 D66 2024<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394277131">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394277131</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Conversational artificial intelligence ent://SD_ILS/0/SD_ILS:598905 2026-02-24T04:51:04Z 2026-02-24T04:51:04Z Author&#160;Rawat, Romil, 1986- editor.&#160;Chakrawarti, Rajesh Kumar, editor&#160;Sarangi, Sanjaya Kumar, editor&#160;Vyas, Piyush, editor&#160;Alamanda, Mary Sowjanya, editor<br/>Preferred Shelf Number&#160;Q335 .C66 2024<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394200801">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394200801</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> The cybersecurity guide to governance, risk, and compliance ent://SD_ILS/0/SD_ILS:598945 2026-02-24T04:51:04Z 2026-02-24T04:51:04Z Author&#160;Edwards, Jason (Cybersecurity expert), author.&#160;Weaver, Griffin, author.<br/>Preferred Shelf Number&#160;HD30.38 .E34 2024<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394250226">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394250226</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Data exfiltration threats and prevention techniques : machine learning and memory-based data security ent://SD_ILS/0/SD_ILS:598245 2026-02-24T04:51:04Z 2026-02-24T04:51:04Z Author&#160;Tari, Zahir, 1961- author.&#160;Sohrabi, Nasrin, 1982- author.&#160;Samadi, Yasaman, 1993- author.&#160;Suaboot, Jakapan, 1984- author.<br/>Preferred Shelf Number&#160;TK5105.59 .T365 2023<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119898900">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119898900</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security and privacy vision in 6G : a comprehensive guide ent://SD_ILS/0/SD_ILS:598347 2026-02-24T04:51:04Z 2026-02-24T04:51:04Z Author&#160;Porambage, Pawani, author.&#160;Liyanage, Madhusanka, author.<br/>Preferred Shelf Number&#160;TK5103.252 .P67 2023<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119875437">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119875437</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Executive's guide to cyber risk : securing the future today ent://SD_ILS/0/SD_ILS:597567 2026-02-24T04:51:04Z 2026-02-24T04:51:04Z Author&#160;Moyo, Siegfried, author.<br/>Preferred Shelf Number&#160;HF5548.37 .M68 2022<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394320578">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394320578</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> The CISO evolution : business knowledge for cybersecurity executives ent://SD_ILS/0/SD_ILS:597056 2026-02-24T04:51:04Z 2026-02-24T04:51:04Z Author&#160;Sharp, Matthew K., author.&#160;Lambros, Kyriakos P., author.<br/>Preferred Shelf Number&#160;HD30.2 .S5325 2022<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119782513">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119782513</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cybersecurity in smart homes : architectures, solutions and technologies ent://SD_ILS/0/SD_ILS:597626 2026-02-24T04:51:04Z 2026-02-24T04:51:04Z Author&#160;Khatoun, Rida, author.<br/>Preferred Shelf Number&#160;QA76.9 .A25<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119987451">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119987451</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security in vehicular networks : focus on location and identity privacy ent://SD_ILS/0/SD_ILS:597917 2026-02-24T04:51:04Z 2026-02-24T04:51:04Z Author&#160;Benarous, Leila.&#160;Bitam, Salim.&#160;Mellouk, Abdelhamid.<br/>Preferred Shelf Number&#160;TE228.37<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394172610">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394172610</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cyber security and network security ent://SD_ILS/0/SD_ILS:597484 2026-02-24T04:51:04Z 2026-02-24T04:51:04Z Author&#160;Pramanik, Sabyasachi, editor.&#160;Samanta, Debabrata, 1987- editor.&#160;Vinay, M., editor.&#160;Guha, Abhijit, editor.<br/>Preferred Shelf Number&#160;QA76.9 .A25<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119812555">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119812555</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Blockchain security from the bottom up : securing and preventing attacks on cryptocurrencies, decentralized applications, nfts, and smart contracts ent://SD_ILS/0/SD_ILS:597703 2026-02-24T04:51:04Z 2026-02-24T04:51:04Z Author&#160;Poston, Howard E., III, author.<br/>Preferred Shelf Number&#160;QA76.9 .B56 P67 2022<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394320691">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394320691</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Privacy, regulations, and cybersecurity : the essential business guide ent://SD_ILS/0/SD_ILS:596472 2026-02-24T04:51:04Z 2026-02-24T04:51:04Z Author&#160;Moschovitis, Christos J. P., author.<br/>Preferred Shelf Number&#160;HD61.5 .M675 2021 EB<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119660156">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119660156</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Intelligent data analytics for terror threat prediction : architectures, methodologies, techniques and applications ent://SD_ILS/0/SD_ILS:596541 2026-02-24T04:51:04Z 2026-02-24T04:51:04Z Author&#160;Pani, Subhendu Kumar, 1980- editor.&#160;Singh, Sanjay Kumar, 1963- editor.&#160;Garg, Lalit, 1977- editor.<br/>Preferred Shelf Number&#160;HV6431 .I58 2021<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119711629">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119711629</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Building secure cars : assuring the automotive software development lifecycle ent://SD_ILS/0/SD_ILS:596310 2026-02-24T04:51:04Z 2026-02-24T04:51:04Z Author&#160;Oka, Dennis Kengo, author.<br/>Preferred Shelf Number&#160;TL272.53 .O42 2021<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119710783">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119710783</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Integration of cloud computing with Internet of things : foundations, analytics, and applications ent://SD_ILS/0/SD_ILS:596603 2026-02-24T04:51:04Z 2026-02-24T04:51:04Z Author&#160;Mangla, Monika, editor.&#160;Satpathy, Suneeta, editor.&#160;Nayak, Bhagirathi, 1963- editor.&#160;Mohanty, Sachi Nandan, editor.<br/>Preferred Shelf Number&#160;QA76.585 .I53 2021<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119769323">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119769323</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Intelligent network management and control : intelligent security, multi-criteria optimization, cloud computing, Internet of Vehicles, intelligent radio ent://SD_ILS/0/SD_ILS:596652 2026-02-24T04:51:04Z 2026-02-24T04:51:04Z Author&#160;Benmammar, Badr.<br/>Preferred Shelf Number&#160;TK5105.59<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119817840">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119817840</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Unmanned aerial vehicles for Internet of Things (IoT) : concepts, techniques, and applications ent://SD_ILS/0/SD_ILS:596898 2026-02-24T04:51:04Z 2026-02-24T04:51:04Z Author&#160;Mohindru, Vandana, editor.&#160;Singh, Yashwant, editor.&#160;Bhatt, Ravindara, editor.&#160;Gupta, Anuj Kumar, editor.<br/>Preferred Shelf Number&#160;TL589.4 .U55 2021<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119769170">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119769170</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security and its challenges in the 21st Century ent://SD_ILS/0/SD_ILS:597077 2026-02-24T04:51:04Z 2026-02-24T04:51:04Z Author&#160;Guerrier, Claudine, author.<br/>Preferred Shelf Number&#160;QA76.9 .A25<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119854852">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119854852</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Applied incident response ent://SD_ILS/0/SD_ILS:595744 2026-02-24T04:51:04Z 2026-02-24T04:51:04Z Author&#160;Anson, Steve.<br/>Preferred Shelf Number&#160;QA76.9 .A25<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119560302">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119560302</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Design and analysis of security protocol for communication ent://SD_ILS/0/SD_ILS:595798 2026-02-24T04:51:04Z 2026-02-24T04:51:04Z Author&#160;Goyal, Dinesh, 1976- editor.&#160;Balamurigan, A., editor.&#160;Peng, Sheng-Lung, editor.&#160;Verma, O. P. (Telecommunications engineer), editor.<br/>Preferred Shelf Number&#160;TK5105.59 .D468 2020 EB<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119555759">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119555759</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Hacking connected cars : tactics, techniques, and procedures ent://SD_ILS/0/SD_ILS:595843 2026-02-24T04:51:04Z 2026-02-24T04:51:04Z Author&#160;Knight, Alissa, author.<br/>Preferred Shelf Number&#160;TL152.8 .K65 2020<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119491774">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119491774</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Tribe of hackers security leaders : tribal knowledge from the best in cybersecurity leadership ent://SD_ILS/0/SD_ILS:595887 2026-02-24T04:51:04Z 2026-02-24T04:51:04Z Author&#160;Carey, Marcus J. (Cybersecurity professional), author.&#160;Jin, Jennifer.<br/>Preferred Shelf Number&#160;QA76.9 .A25 C37 2020<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119643784">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119643784</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cybersecurity and decision makers : data security and digital trust ent://SD_ILS/0/SD_ILS:595943 2026-02-24T04:51:04Z 2026-02-24T04:51:04Z Author&#160;Fr&eacute;minville, Marie de, author.<br/>Preferred Shelf Number&#160;HF5548.37 .F74 2020<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119720362">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119720362</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> 5G explained : security and deployment of advanced mobile communications ent://SD_ILS/0/SD_ILS:594896 2026-02-24T04:51:04Z 2026-02-24T04:51:04Z Author&#160;Penttinen, Jyrki T. J., author.<br/>Preferred Shelf Number&#160;TK5103.483 .P46 2019<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119275695">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119275695</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cyber security in parallel and distributed computing : concepts, techniques, applications and case studies ent://SD_ILS/0/SD_ILS:595099 2026-02-24T04:51:04Z 2026-02-24T04:51:04Z Author&#160;Le, Dac-Nhuong, 1983- editor.&#160;Kumar, Raghvendra, 1987- editor.&#160;Mishra, Brojo Kishore, 1979- editor.&#160;Khari, Manju, editor.&#160;Chatterjee, Jyotir Moy, editor.<br/>Preferred Shelf Number&#160;QA76.9 .A25<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119488330">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119488330</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Blockchain for distributed systems security ent://SD_ILS/0/SD_ILS:595146 2026-02-24T04:51:04Z 2026-02-24T04:51:04Z Author&#160;Shetty, Sachin, editor.&#160;Kamhoua, Charles A., edtior.&#160;Njilla, Laurent L., editor.<br/>Preferred Shelf Number&#160;QA76.9 .B56 B56 2019 EB<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119519621">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119519621</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> CompTIA PenTest+ Practice Test : Exam PT0-001 ent://SD_ILS/0/SD_ILS:595329 2026-02-24T04:51:04Z 2026-02-24T04:51:04Z Author&#160;Panek, Crystal, author.&#160;Tracy, Robb.<br/>Preferred Shelf Number&#160;TK5105.59<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119575931">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119575931</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> AWS Certified Cloud Practitioner Study Guide : CLF-C01 Exam ent://SD_ILS/0/SD_ILS:595333 2026-02-24T04:51:04Z 2026-02-24T04:51:04Z Author&#160;Piper, Ben.&#160;Clinton, David.<br/>Preferred Shelf Number&#160;QA76.3 .P57 2019<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119574408">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119574408</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security, privacy and digital forensics in the cloud ent://SD_ILS/0/SD_ILS:594934 2026-02-24T04:51:04Z 2026-02-24T04:51:04Z Author&#160;Chen, Lei, 1978 July 28- editor.&#160;Takabi, Hassan, 1982- editor.&#160;Le-Khac, Nhien-An, 1972- editor.<br/>Preferred Shelf Number&#160;QA76.585 .S43 2019<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119053385">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119053385</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security designs for the cloud, IoT, and social networking ent://SD_ILS/0/SD_ILS:595493 2026-02-24T04:51:04Z 2026-02-24T04:51:04Z Author&#160;Le, Dac-Nhuong, 1983- editor.&#160;Bhatt, Chintan M., 1988- editor.&#160;Madhukar, Mani, editor.<br/>Preferred Shelf Number&#160;QA76.585<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119593171">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119593171</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cybersecurity blue team toolkit ent://SD_ILS/0/SD_ILS:595209 2026-02-24T04:51:04Z 2026-02-24T04:51:04Z Author&#160;Tanner, Nadean H., author.<br/>Preferred Shelf Number&#160;QA76.9 .A25 T36 2019 EB<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119552963">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119552963</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cyber-vigilance and digital trust : cyber security in the era of cloud computing and IoT ent://SD_ILS/0/SD_ILS:595279 2026-02-24T04:51:04Z 2026-02-24T04:51:04Z Author&#160;Tounsi, Wiem, editor.<br/>Preferred Shelf Number&#160;QA76.9 .A25 C93 2019 EB<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119618393">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119618393</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Transformational security awareness : what neuroscientists, storytellers, and marketers can teach us about driving secure behaviors ent://SD_ILS/0/SD_ILS:595304 2026-02-24T04:51:04Z 2026-02-24T04:51:04Z Author&#160;Carpenter, Perry, author.<br/>Preferred Shelf Number&#160;QA76.9 .A25 C37 2019 EB<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119566380">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119566380</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> IoT security : advances in authentication ent://SD_ILS/0/SD_ILS:595420 2026-02-24T04:51:04Z 2026-02-24T04:51:04Z Author&#160;Liyanage, Madhusanka, editor.&#160;Braeken, An, 1970- editor.&#160;Kumar, Pardeep, 1976- editor.&#160;Ylianttila, Mika, editor.<br/>Preferred Shelf Number&#160;TK5105.8857 .I58 2019<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119527978">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119527978</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> MCA Modern Desktop Administrator study guide : Exam MD-100 ent://SD_ILS/0/SD_ILS:595427 2026-02-24T04:51:04Z 2026-02-24T04:51:04Z Author&#160;Panek, William, 1970- author.<br/>Preferred Shelf Number&#160;QA76.774 .M435<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119605980">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119605980</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cloud computing and virtualization ent://SD_ILS/0/SD_ILS:594386 2026-02-24T04:51:04Z 2026-02-24T04:51:04Z Author&#160;Le, Dac-Nhuong, 1983- editor.&#160;Kumar, Raghvendra, 1987- editor.&#160;Nguyen, Nhu Gia, editor.&#160;Chatterjee, Jyotir Moy, editor.<br/>Preferred Shelf Number&#160;QA76.9 .V5<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119488149">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119488149</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Insider threats ent://SD_ILS/0/SD_ILS:594407 2026-02-24T04:51:04Z 2026-02-24T04:51:04Z Author&#160;Arduin, Pierre-Emmanuel, author.<br/>Preferred Shelf Number&#160;QA76.9 .A25<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119419785">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119419785</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cybersecurity program development for business : the essential planning guide ent://SD_ILS/0/SD_ILS:594455 2026-02-24T04:51:04Z 2026-02-24T04:51:04Z Author&#160;Moschovitis, Christos J. P., author.<br/>Preferred Shelf Number&#160;HD30.2<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119430018">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119430018</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> CCNA security study guide : exam 210-260 ent://SD_ILS/0/SD_ILS:594192 2026-02-24T04:51:04Z 2026-02-24T04:51:04Z Author&#160;McMillan, Troy, author.<br/>Preferred Shelf Number&#160;TK5105.59<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119549505">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119549505</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Secure connected objects ent://SD_ILS/0/SD_ILS:593709 2026-02-24T04:51:04Z 2026-02-24T04:51:04Z Author&#160;Paret, Dominique.&#160;Huon, Jean-Paul.<br/>Preferred Shelf Number&#160;TK5105.8857<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119426639">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119426639</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Network forensics ent://SD_ILS/0/SD_ILS:593814 2026-02-24T04:51:04Z 2026-02-24T04:51:04Z Author&#160;Messier, Ric, author.<br/>Preferred Shelf Number&#160;TK5105.59<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119329190">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119329190</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advanced penetration testing : hacking the world's most secure networks ent://SD_ILS/0/SD_ILS:593439 2026-02-24T04:51:04Z 2026-02-24T04:51:04Z Author&#160;Allsopp, Wil, author.<br/>Preferred Shelf Number&#160;QA76.9 .A25<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119367741">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119367741</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/>