Search Results for State, The - Narrowed by: Computer security.SirsiDynix Enterprisehttps://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dState$00252C$002bThe$0026qf$003dSUBJECT$002509Subject$002509Computer$002bsecurity.$002509Computer$002bsecurity.$0026ps$003d300?2025-12-20T00:28:12ZThe state of the art in intrusion prevention and detectionent://SD_ILS/0/SD_ILS:5436762025-12-20T00:28:12Z2025-12-20T00:28:12ZAuthor Pathan, Al-Sakib Khan, editor.<br/>Preferred Shelf Number QA76.9 .A25 S7354 2014<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781482203523">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>Discrete dynamical systems and chaotic machines : theory and applicationsent://SD_ILS/0/SD_ILS:5457152025-12-20T00:28:12Z2025-12-20T00:28:12ZAuthor Bahi, Jacques Mohcine., author. Guyeux, Christophe.<br/>Preferred Shelf Number QA76.9 .A25 B344 2013<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781466554511">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>Information security management metrics : a definitive guide to effective security monitoring and measurementent://SD_ILS/0/SD_ILS:5469522025-12-20T00:28:12Z2025-12-20T00:28:12ZAuthor Brotby, W. Krag., author.<br/>Preferred Shelf Number HD30.2 .B78 2009<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781420052862">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>Assessing and managing security risk in IT systems : a structured methodologyent://SD_ILS/0/SD_ILS:5422502025-12-20T00:28:12Z2025-12-20T00:28:12ZAuthor McCumber, John, 1956, author.<br/>Preferred Shelf Number QA76.9 .A25 M4284 2005<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781135488970">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>