Search Results for Series. - Narrowed by: Computer security. SirsiDynix Enterprise https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dSeries.$0026qf$003dSUBJECT$002509Subject$002509Computer$002bsecurity.$002509Computer$002bsecurity.$0026ps$003d300$0026isd$003dtrue? 2026-05-16T23:21:27Z Artificial Neural Networks and Machine Learning &ndash; ICANN 2019: Text and Time Series 28th International Conference on Artificial Neural Networks, Munich, Germany, September 17&ndash;19, 2019, Proceedings, Part IV ent://SD_ILS/0/SD_ILS:486959 2026-05-16T23:21:27Z 2026-05-16T23:21:27Z Author&#160;Tetko, Igor V. editor. (orcid)0000-0002-6855-0012&#160;K&#367;rkov&aacute;, V&#283;ra. editor. (orcid)0000-0002-8181-2128&#160;Karpov, Pavel. editor. (orcid)0000-0003-4786-9806&#160;Theis, Fabian. editor. (orcid)0000-0002-2419-1943&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-30490-4">https://doi.org/10.1007/978-3-030-30490-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Ransomware : penetration testing and contingency planning ent://SD_ILS/0/SD_ILS:584139 2026-05-16T23:21:27Z 2026-05-16T23:21:27Z Author&#160;Das, Ravindra, author.<br/>Preferred Shelf Number&#160;QA76.9 .A25<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003431633">https://www.taylorfrancis.com/books/9781003431633</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> On the Cognitive, Ethical, and Scientific Dimensions of Artificial Intelligence Themes from IACAP 2016 ent://SD_ILS/0/SD_ILS:485972 2026-05-16T23:21:27Z 2026-05-16T23:21:27Z Author&#160;Berkich, Don. editor.&#160;d'Alfonso, Matteo Vincenzo. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-01800-9">https://doi.org/10.1007/978-3-030-01800-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> The basics of hacking and penetration testing ethical hacking and penetration testing made easy ent://SD_ILS/0/SD_ILS:145199 2026-05-16T23:21:27Z 2026-05-16T23:21:27Z Author&#160;Engebretson, Pat (Patrick Henry), 1974-<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597496551">http://www.sciencedirect.com/science/book/9781597496551</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Practical embedded security building secure resource-constrained systems ent://SD_ILS/0/SD_ILS:147416 2026-05-16T23:21:27Z 2026-05-16T23:21:27Z Author&#160;Stapko, Timothy John.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780750682152">http://www.sciencedirect.com/science/book/9780750682152</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Trusted platform module basics using TPM in embedded systems ent://SD_ILS/0/SD_ILS:254421 2026-05-16T23:21:27Z 2026-05-16T23:21:27Z Author&#160;Kinney, Steven.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780750679602">http://www.sciencedirect.com/science/book/9780750679602</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> A Cybersecurity Leader's Journey : Speaking the Language of the Board ent://SD_ILS/0/SD_ILS:588198 2026-05-16T23:21:27Z 2026-05-16T23:21:27Z Author&#160;Marchewka, Edward, author.<br/>Preferred Shelf Number&#160;QA76.9 .A25<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003597407">https://www.taylorfrancis.com/books/9781003597407</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security Relationship Management : Leveraging Marketing Concepts to Advance a Cybersecurity Program ent://SD_ILS/0/SD_ILS:589139 2026-05-16T23:21:27Z 2026-05-16T23:21:27Z Author&#160;Parrish, Lee, author.<br/>Preferred Shelf Number&#160;QA76.9 .A25<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003597483">https://www.taylorfrancis.com/books/9781003597483</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cybersecurity operations and fusion centers : a comprehensive guide to SOC and TIC strategy ent://SD_ILS/0/SD_ILS:578079 2026-05-16T23:21:27Z 2026-05-16T23:21:27Z Author&#160;McLaughlin, Kevin (Kevin Lynn), author.<br/>Preferred Shelf Number&#160;QA76.9 .A25<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003259152">https://www.taylorfrancis.com/books/9781003259152</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> OFFENSIVE AND DEFENSIVE CYBER SECURITY STRATEGIES fundamentals, theory and practices. ent://SD_ILS/0/SD_ILS:590041 2026-05-16T23:21:27Z 2026-05-16T23:21:27Z Author&#160;Ouaissa, Mariya.&#160;Ouaissa, Mariyam.<br/>Preferred Shelf Number&#160;QA76.9 .A25<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003509080">https://www.taylorfrancis.com/books/9781003509080</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Why CISOs fail ent://SD_ILS/0/SD_ILS:577207 2026-05-16T23:21:27Z 2026-05-16T23:21:27Z Author&#160;Engel, Barak, author.<br/>Preferred Shelf Number&#160;HD30.2<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003302759">https://www.taylorfrancis.com/books/9781003302759</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Privacy in practice : establish and operationalize a holistic data privacy program ent://SD_ILS/0/SD_ILS:560699 2026-05-16T23:21:27Z 2026-05-16T23:21:27Z Author&#160;Tang, Alan, (Information Security), author.<br/>Preferred Shelf Number&#160;HF5548.37<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003225089">https://www.taylorfrancis.com/books/9781003225089</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Controlling Privacy and the Use of Data Assets. Volume 1, Who Owns the New Oil?. ent://SD_ILS/0/SD_ILS:555852 2026-05-16T23:21:27Z 2026-05-16T23:21:27Z Author&#160;Mattsson, Ulf.<br/>Preferred Shelf Number&#160;QA76.9 .A25<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/e/9781003189664">https://www.taylorfrancis.com/books/e/9781003189664</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Next-Generation Enterprise Security and Governance. ent://SD_ILS/0/SD_ILS:585672 2026-05-16T23:21:27Z 2026-05-16T23:21:27Z Author&#160;&#256;hameda, Mahiuddina, editor.&#160;Moustafa, Nour, editor.&#160;Barkat, Abu, editor.&#160;Dowland, Paul, editor.<br/>Preferred Shelf Number&#160;QA76.9 .A25<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003121541">https://www.taylorfrancis.com/books/9781003121541</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security management : a critical thinking approach ent://SD_ILS/0/SD_ILS:539725 2026-05-16T23:21:27Z 2026-05-16T23:21:27Z Author&#160;Land, Michael (Industrial engineer), author.&#160;Ricks, Truett A., author.&#160;Ricks, Bob, author.<br/>Preferred Shelf Number&#160;HD61.5 .L36 2014<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781466561786">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> The complete book of data anonymization : from planning to implementation ent://SD_ILS/0/SD_ILS:540169 2026-05-16T23:21:27Z 2026-05-16T23:21:27Z Author&#160;Raghunathan, Balaji., author.<br/>Preferred Shelf Number&#160;QA76.9 .A25 R338 2013<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781439877319">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> Hacker techniques, tools, and incident handling ent://SD_ILS/0/SD_ILS:271438 2026-05-16T23:21:27Z 2026-05-16T23:21:27Z Author&#160;Oriyano, Sean-Philip.&#160;Gregg, Michael (Michael C.)<br/>Preferred Shelf Number&#160;TK5105.59 O786 2011<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Seven deadliest USB attacks ent://SD_ILS/0/SD_ILS:306328 2026-05-16T23:21:27Z 2026-05-16T23:21:27Z Author&#160;Anderson, Brian (Brian James)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495530">http://www.sciencedirect.com/science/book/9781597495530</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Seven deadliest USB attacks ent://SD_ILS/0/SD_ILS:148953 2026-05-16T23:21:27Z 2026-05-16T23:21:27Z Author&#160;Anderson, Brian (Brian James)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495530">http://www.sciencedirect.com/science/book/9781597495530</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Seven deadliest Microsoft attacks ent://SD_ILS/0/SD_ILS:149018 2026-05-16T23:21:27Z 2026-05-16T23:21:27Z Author&#160;Kraus, Rob.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495516">http://www.sciencedirect.com/science/book/9781597495516</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Seven deadliest wireless technologies attacks ent://SD_ILS/0/SD_ILS:149033 2026-05-16T23:21:27Z 2026-05-16T23:21:27Z Author&#160;Haines, Brad.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495417">http://www.sciencedirect.com/science/book/9781597495417</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Seven deadliest social network attacks ent://SD_ILS/0/SD_ILS:149145 2026-05-16T23:21:27Z 2026-05-16T23:21:27Z Author&#160;Timm, Carl.&#160;Perez, Richard, 1969 Oct. 17-&#160;Ely, Adam.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495455">http://www.sciencedirect.com/science/book/9781597495455</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Linux Patch Management : keeping Linux systems up to date ent://SD_ILS/0/SD_ILS:119550 2026-05-16T23:21:27Z 2026-05-16T23:21:27Z Author&#160;Jang, Michael H.<br/>Preferred Shelf Number&#160;QA76.76.O63 J368 2006<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Intelligence and security informatics for international security : information sharing and data mining ent://SD_ILS/0/SD_ILS:119786 2026-05-16T23:21:27Z 2026-05-16T23:21:27Z Author&#160;Chen, Hsinchun.<br/>Preferred Shelf Number&#160;QA76.76.E95 C44 2006<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Advances in Elliptic Curve Cryptography ent://SD_ILS/0/SD_ILS:236058 2026-05-16T23:21:27Z 2026-05-16T23:21:27Z Author&#160;Blake, Ian F..&#160;Seroussi, Gadiel.&#160;Smart, Nigel P..<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1017/CBO9780511546570">Access by subscription</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Snort 2.1 intrusion detection ent://SD_ILS/0/SD_ILS:253989 2026-05-16T23:21:27Z 2026-05-16T23:21:27Z Author&#160;Beale, Jay.&#160;Alder, Raven.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836043">http://www.sciencedirect.com/science/book/9781931836043</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Nessus network auditing ent://SD_ILS/0/SD_ILS:253991 2026-05-16T23:21:27Z 2026-05-16T23:21:27Z Author&#160;Deraison, Renaud.&#160;Syngress Media, Inc.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836081">http://www.sciencedirect.com/science/book/9781931836081</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Integrated assurance : unified risk strategy ent://SD_ILS/0/SD_ILS:562998 2026-05-16T23:21:27Z 2026-05-16T23:21:27Z Author&#160;Hayes, Patrick author.<br/>Preferred Shelf Number&#160;QA76.9 .A25<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003562153">https://www.taylorfrancis.com/books/9781003562153</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Behavioral insights in cybersecurity : a guide to digital human factors ent://SD_ILS/0/SD_ILS:567885 2026-05-16T23:21:27Z 2026-05-16T23:21:27Z Author&#160;Sachs, Dustin S., author.<br/>Preferred Shelf Number&#160;ZA3086.5 .C93<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003606345">https://www.taylorfrancis.com/books/9781003606345</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Intelligent cybersecurity and resilience for critical industries : challenges and applications ent://SD_ILS/0/SD_ILS:575736 2026-05-16T23:21:27Z 2026-05-16T23:21:27Z Author&#160;Zaydi, Mounia, editor.&#160;Maleh, Yassine, 1987- editor.&#160;Ch&ecirc;nevert, Gabriel, editor&#160;Zaydi, Hayat, editor&#160;El Yaagoubi, Amina, editor<br/>Preferred Shelf Number&#160;QA76.9 .A25 I58 2025 EB<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9788770047746">https://www.taylorfrancis.com/books/9788770047746</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cybersecurity Leadership for Healthcare Organizations and Institutions of Higher Education ent://SD_ILS/0/SD_ILS:575737 2026-05-16T23:21:27Z 2026-05-16T23:21:27Z Author&#160;Fowler, Bradley, 1968- author.&#160;Chaundy, Bruce G., author.<br/>Preferred Shelf Number&#160;QA76.9 .A25<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9788770047760">https://www.taylorfrancis.com/books/9788770047760</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Software Vulnerability Discovery Process : Concepts and Applications ent://SD_ILS/0/SD_ILS:557374 2026-05-16T23:21:27Z 2026-05-16T23:21:27Z Author&#160;Anand, Adarsh, author.&#160;Bhatt, Navneet, author.&#160;Alhazmi, Omar H., editor.<br/>Preferred Shelf Number&#160;QA76.9 .A25<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9788770046176">https://www.taylorfrancis.com/books/9788770046176</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> NAVIGATING THE CYBER MAZE insights and humor on the digital frontier. ent://SD_ILS/0/SD_ILS:563001 2026-05-16T23:21:27Z 2026-05-16T23:21:27Z Author&#160;Muhlert, Matthias.<br/>Preferred Shelf Number&#160;QA76.9 .A25<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003562184">https://www.taylorfrancis.com/books/9781003562184</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cyber insecurity : examining the past, defining the future ent://SD_ILS/0/SD_ILS:553423 2026-05-16T23:21:27Z 2026-05-16T23:21:27Z Author&#160;Leonas, Vladas, author.<br/>Preferred Shelf Number&#160;QA76.9 .A25<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781032672601">https://www.taylorfrancis.com/books/9781032672601</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Mastering deepfake technology : strategies for ethical management and security ent://SD_ILS/0/SD_ILS:582507 2026-05-16T23:21:27Z 2026-05-16T23:21:27Z Author&#160;Taneja, Sanjay, editor.&#160;Chitkara, Swati Gupta, editor.&#160;Kukreti, Mohit, editor.&#160;Chauan, Abhishek Singh, editor.<br/>Preferred Shelf Number&#160;Q335 .M37 2025<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9788743801146">https://www.taylorfrancis.com/books/9788743801146</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> IoT-enabled health care systems : applications, benefits, and challenges ent://SD_ILS/0/SD_ILS:576494 2026-05-16T23:21:27Z 2026-05-16T23:21:27Z Author&#160;Kumar, Yatindra (Lecturer in electrical engineering), editor.&#160;Verma, Shashi Kant, editor.&#160;Singh, Archana (Lecturer in radiotherapy), editor.&#160;Kumar, Krishna (Engineer), editor&#160;Gupta, Manoj (Lecturer in computer science and engineering), editor.<br/>Preferred Shelf Number&#160;R859.7 .A78<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003505235">https://www.taylorfrancis.com/books/9781003505235</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cybercrime during the SARS-CoV-2 pandemic (2019-2022) ent://SD_ILS/0/SD_ILS:598517 2026-05-16T23:21:27Z 2026-05-16T23:21:27Z Author&#160;Ventre, Daniel, editor.&#160;Loiseau, Hugo, 1974- editor.<br/>Preferred Shelf Number&#160;HV6773 .C93 2023<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394226344">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394226344</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Implementing enterprise cybersecurity with open-source software and standard architecture. Volume II ent://SD_ILS/0/SD_ILS:588974 2026-05-16T23:21:27Z 2026-05-16T23:21:27Z Author&#160;Handa, Anand, editor.&#160;Negi, Rohit, editor.&#160;Venkatesan, S., editor.&#160;Shukla, Sandeep K., editor.<br/>Preferred Shelf Number&#160;QA76.9 .A25<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003426134">https://www.taylorfrancis.com/books/9781003426134</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Applied quantum cryptanalysis ent://SD_ILS/0/SD_ILS:592716 2026-05-16T23:21:27Z 2026-05-16T23:21:27Z Author&#160;Petrenko, Alexei, author.&#160;Petrenko, Sergei, editor.<br/>Preferred Shelf Number&#160;QA76.889<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003392873">https://www.taylorfrancis.com/books/9781003392873</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Big data analytics and intelligent systems for cyber threat intelligence ent://SD_ILS/0/SD_ILS:579261 2026-05-16T23:21:27Z 2026-05-16T23:21:27Z Author&#160;Maleh, Yassine, 1987- editor.&#160;Alazab, Mamoun, 1980- editor.&#160;Tawalbeh, Lo'ai, editor.&#160;Romdhani, Imed, editor.<br/>Preferred Shelf Number&#160;QA76.9 .A25<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003373384">https://www.taylorfrancis.com/books/9781003373384</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security architecture : how &amp; why ent://SD_ILS/0/SD_ILS:551177 2026-05-16T23:21:27Z 2026-05-16T23:21:27Z Author&#160;Madsen, Tom, author.<br/>Preferred Shelf Number&#160;QA76.9 .A25<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003339380">https://www.taylorfrancis.com/books/9781003339380</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Implementing enterprise cybersecurity with open-source software and standard architecture ent://SD_ILS/0/SD_ILS:576349 2026-05-16T23:21:27Z 2026-05-16T23:21:27Z Author&#160;Handa, Anand, editor.&#160;Negi, Rohit, editor.&#160;Shukla, Sandeep K., editor.<br/>Preferred Shelf Number&#160;QA76.9 .A25 I47 2021 EB<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003338512">https://www.taylorfrancis.com/books/9781003338512</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Blockchain technology and applications ent://SD_ILS/0/SD_ILS:556030 2026-05-16T23:21:27Z 2026-05-16T23:21:27Z Author&#160;Banafa, Ahmed, author.<br/>Preferred Shelf Number&#160;QA76.9 .B56 B36 2020<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003337393">https://www.taylorfrancis.com/books/9781003337393</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Artificial intelligence, cybersecurity and cyber defense ent://SD_ILS/0/SD_ILS:596423 2026-05-16T23:21:27Z 2026-05-16T23:21:27Z Author&#160;Ventre, Daniel, author.<br/>Preferred Shelf Number&#160;Q335 .V46 2020 EB<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119788195">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119788195</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Developing a cybersecurity immune system for industry 4.0 ent://SD_ILS/0/SD_ILS:557932 2026-05-16T23:21:27Z 2026-05-16T23:21:27Z Author&#160;Petrenko, Sergei, author.<br/>Preferred Shelf Number&#160;QA76.9 .A25 P48 2020<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003337874">https://www.taylorfrancis.com/books/9781003337874</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cybersecurity and decision makers : data security and digital trust ent://SD_ILS/0/SD_ILS:595943 2026-05-16T23:21:27Z 2026-05-16T23:21:27Z Author&#160;Fr&eacute;minville, Marie de, author.<br/>Preferred Shelf Number&#160;HF5548.37 .F74 2020<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119720362">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119720362</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cyber-vigilance and digital trust : cyber security in the era of cloud computing and IoT ent://SD_ILS/0/SD_ILS:595279 2026-05-16T23:21:27Z 2026-05-16T23:21:27Z Author&#160;Tounsi, Wiem, editor.<br/>Preferred Shelf Number&#160;QA76.9 .A25 C93 2019 EB<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119618393">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119618393</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> An introduction to cyber modeling and simulation ent://SD_ILS/0/SD_ILS:594699 2026-05-16T23:21:27Z 2026-05-16T23:21:27Z Author&#160;Couretas, Jerry M., 1966- author.<br/>Preferred Shelf Number&#160;QA76.9 .C65<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119420842">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119420842</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> DNS security management ent://SD_ILS/0/SD_ILS:593802 2026-05-16T23:21:27Z 2026-05-16T23:21:27Z Author&#160;Dooley, Michael, 1962- author.&#160;Rooney, Timothy, 1962- author.<br/>Preferred Shelf Number&#160;QA76.9 .A25<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119328292">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119328292</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Introduction to modern cryptography ent://SD_ILS/0/SD_ILS:364315 2026-05-16T23:21:27Z 2026-05-16T23:21:27Z Author&#160;Katz, Jonathan, 1974-&#160;Lindell, Yehuda.<br/>Preferred Shelf Number&#160;QA76.9.A25 K36 2015<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~2<br/> Cyber threat! : how to manage the growing risk of cyber attacks ent://SD_ILS/0/SD_ILS:342020 2026-05-16T23:21:27Z 2026-05-16T23:21:27Z Author&#160;Ulsch, N. MacDonnell, 1951-<br/>Preferred Shelf Number&#160;ONLINE(342020.1)<br/>Electronic Access&#160;ebrary <a href="http://alltitles.ebrary.com/Doc?id=10895757">An electronic book accessible through the World Wide Web; click to view</a> Ebook Library <a href="http://public.eblib.com/choice/publicfullrecord.aspx?p=1742833">http://public.eblib.com/choice/publicfullrecord.aspx?p=1742833</a> John Wiley <a href="http://dx.doi.org/10.1002/9781118915028">http://dx.doi.org/10.1002/9781118915028</a> MyiLibrary <a href="http://www.myilibrary.com?id=629214">http://www.myilibrary.com?id=629214</a> Cover <a href="http://swbplus.bsz-bw.de/bsz410564842cov.htm">http://swbplus.bsz-bw.de/bsz410564842cov.htm</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Operating systems demystified ent://SD_ILS/0/SD_ILS:294101 2026-05-16T23:21:27Z 2026-05-16T23:21:27Z Author&#160;McHoes, Ann McIver, 1950-&#160;Ballew, Joli.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://mhebooklibrary.com/reader/operating-systems-demystified">Subscription required</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in intelligence and security informatics ent://SD_ILS/0/SD_ILS:146055 2026-05-16T23:21:27Z 2026-05-16T23:21:27Z Author&#160;Mao, Wenji.&#160;Wang, Fei-Yue.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780123972002">http://www.sciencedirect.com/science/book/9780123972002</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Official (ISC)2 guide to the CSSLP ent://SD_ILS/0/SD_ILS:541754 2026-05-16T23:21:27Z 2026-05-16T23:21:27Z Author&#160;Paul, Mano., author.<br/>Preferred Shelf Number&#160;QA76.76 .D47 P3775 2011<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781439826065">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> Official (ISC)2 guide to the ISSMP CBK ent://SD_ILS/0/SD_ILS:544375 2026-05-16T23:21:27Z 2026-05-16T23:21:27Z Author&#160;Tipton, Harold F.<br/>Preferred Shelf Number&#160;QA76.9 .A25 O34 2011<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781420094442">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> Auditing IT infrastructures for compliance ent://SD_ILS/0/SD_ILS:271151 2026-05-16T23:21:27Z 2026-05-16T23:21:27Z Author&#160;Weiss, Martin M.&#160;Solomon, Michael G.<br/>Preferred Shelf Number&#160;QA76.9.A25 W428 2011<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Security policies and implementation issues ent://SD_ILS/0/SD_ILS:271534 2026-05-16T23:21:27Z 2026-05-16T23:21:27Z Author&#160;Johnson, Rob (Robert)&#160;Merkow, Mark S.<br/>Preferred Shelf Number&#160;QA76.9.A25 J64 2011<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Security strategies in Windows platforms and applications ent://SD_ILS/0/SD_ILS:271537 2026-05-16T23:21:27Z 2026-05-16T23:21:27Z Author&#160;Solomon, Michael.<br/>Preferred Shelf Number&#160;QA76.76.O63 S64 2011<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Security strategies in Linux platforms and applications ent://SD_ILS/0/SD_ILS:271539 2026-05-16T23:21:27Z 2026-05-16T23:21:27Z Author&#160;Jang, Michael H.<br/>Preferred Shelf Number&#160;QA76.76.O63 J3638 2011<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Engineering information security the application of systems engineering concepts to achieve information assurance ent://SD_ILS/0/SD_ILS:249916 2026-05-16T23:21:27Z 2026-05-16T23:21:27Z Author&#160;Jacobs, Stuart.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;IEEE Xplore <a href="http://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=6047604">http://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=6047604</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Digital watermarking and steganography ent://SD_ILS/0/SD_ILS:146474 2026-05-16T23:21:27Z 2026-05-16T23:21:27Z Author&#160;Cox, I. J. (Ingemar J.)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780123725851">http://www.sciencedirect.com/science/book/9780123725851</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information assurance dependability and security in networked systems ent://SD_ILS/0/SD_ILS:145553 2026-05-16T23:21:27Z 2026-05-16T23:21:27Z Author&#160;Qian, Yi, 1962-<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780123735669">http://www.sciencedirect.com/science/book/9780123735669</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cryptography, information theory, and error-correction a handbook for the 21st century ent://SD_ILS/0/SD_ILS:301860 2026-05-16T23:21:27Z 2026-05-16T23:21:27Z Author&#160;Bruen, Aiden A., 1941-&#160;Forcinito, Mario, 1962-&#160;Wiley InterScience (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;Wiley InterScience <a href="http://dx.doi.org/10.1002/9781118033296">An electronic book accessible through the World Wide Web; click for information</a> Contributor biographical information <a href="http://catdir.loc.gov/catdir/enhancements/fy0618/2004058044-b.html">http://catdir.loc.gov/catdir/enhancements/fy0618/2004058044-b.html</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cryptography, information theory, and error-correction : a handbook for the 21st century ent://SD_ILS/0/SD_ILS:593044 2026-05-16T23:21:27Z 2026-05-16T23:21:27Z Author&#160;Bruen, Aiden A., 1941-&#160;Forcinito, Mario, 1962-<br/>Preferred Shelf Number&#160;QA76.9 .A25 B79 2005<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781118033296">https://onlinelibrary.wiley.com/doi/book/10.1002/9781118033296</a> <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119582397">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119582397</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Malware : fighting malicious code ent://SD_ILS/0/SD_ILS:267737 2026-05-16T23:21:27Z 2026-05-16T23:21:27Z Author&#160;Skoudis, Ed.&#160;Zeltser, Lenny.<br/>Preferred Shelf Number&#160;QA76.9.A25 S58 2004<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Digital watermarking ent://SD_ILS/0/SD_ILS:253889 2026-05-16T23:21:27Z 2026-05-16T23:21:27Z Author&#160;Cox, I. J. (Ingemar J.)&#160;Miller, Matthew L.&#160;Bloom, Jeffrey A. (Jeffrey Adam), 1964-<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781558607149">http://www.sciencedirect.com/science/book/9781558607149</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Mathematical Foundations for Side-Channel Analysis of Cryptographic Systems ent://SD_ILS/0/SD_ILS:605727 2026-05-16T23:21:27Z 2026-05-16T23:21:27Z Author&#160;Cheng, Wei. author. (orcid)0000-0001-9433-7576&#160;Guilley, Sylvain. author. (orcid)0000-0002-5044-3534&#160;Rioul, Olivier. author. (orcid)0000-0002-8681-8916&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-64399-6">https://doi.org/10.1007/978-3-031-64399-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Next-generation systems and secure computing ent://SD_ILS/0/SD_ILS:599779 2026-05-16T23:21:27Z 2026-05-16T23:21:27Z Author&#160;Barman, Subhabrata, editor.&#160;Koley, Santanu, editor.&#160;Joardar, Subhankar, editor.<br/>Preferred Shelf Number&#160;QA76.9 .A25 N49 2025<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394228522">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394228522</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> CYBERSECURITY IN THE TRANSPORTATION INDUSTRY. ent://SD_ILS/0/SD_ILS:599238 2026-05-16T23:21:27Z 2026-05-16T23:21:27Z Preferred Shelf Number&#160;HE194 .C93 2024<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394204472">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394204472</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Quantum computing in cybersecurity ent://SD_ILS/0/SD_ILS:598685 2026-05-16T23:21:27Z 2026-05-16T23:21:27Z Author&#160;Rawat, Romil, editor.<br/>Preferred Shelf Number&#160;QA76.9 .A25 Q83 2023<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394167401">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394167401</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Tribe of hackers security leaders : tribal knowledge from the best in cybersecurity leadership ent://SD_ILS/0/SD_ILS:595887 2026-05-16T23:21:27Z 2026-05-16T23:21:27Z Author&#160;Carey, Marcus J. (Cybersecurity professional), author.&#160;Jin, Jennifer.<br/>Preferred Shelf Number&#160;QA76.9 .A25 C37 2020<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119643784">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119643784</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Tribe of hackers blue team : tribal knowledge from the best in defensive cybersecurity ent://SD_ILS/0/SD_ILS:596276 2026-05-16T23:21:27Z 2026-05-16T23:21:27Z Author&#160;Carey, Marcus J. (Cybersecurity professional)&#160;Jin, Jennifer.<br/>Preferred Shelf Number&#160;QA76.9 .A25 C3673 2020<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119643432">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119643432</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/>