Search Results for Systems Analysis. - Narrowed by: Computer security.SirsiDynix Enterprisehttps://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dSystems$002bAnalysis.$0026qf$003dSUBJECT$002509Subject$002509Computer$002bsecurity.$002509Computer$002bsecurity.$0026ps$003d300?2025-12-17T03:07:23ZGuide to Vulnerability Analysis for Computer Networks and Systems An Artificial Intelligence Approachent://SD_ILS/0/SD_ILS:4003932025-12-17T03:07:23Z2025-12-17T03:07:23ZAuthor Parkinson, Simon. editor. (orcid)0000-0002-1747-9914 Crampton, Andrew. editor. (orcid)0000-0002-4635-9102 Hill, Richard. editor. (orcid)0000-0003-0105-7730 SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-92624-7">https://doi.org/10.1007/978-3-319-92624-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Handbook of system safety and security : cyber risk and risk management, cyber security, threat analysis, functional safety, software systems, and cyber physical systemsent://SD_ILS/0/SD_ILS:4591452025-12-17T03:07:23Z2025-12-17T03:07:23ZAuthor Griffor, Edward R., editor.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128037737">http://www.sciencedirect.com/science/book/9780128037737</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Secure computer and network systems modeling, analysis and designent://SD_ILS/0/SD_ILS:2966652025-12-17T03:07:23Z2025-12-17T03:07:23ZAuthor Ye, Nong. Wiley InterScience (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access Contributor biographical information <a href="http://catdir.loc.gov/catdir/enhancements/fy0833/2007037133-b.html">http://catdir.loc.gov/catdir/enhancements/fy0833/2007037133-b.html</a>
John Wiley <a href="http://dx.doi.org/10.1002/9780470023273">http://dx.doi.org/10.1002/9780470023273</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>The state of the art in intrusion prevention and detectionent://SD_ILS/0/SD_ILS:5436762025-12-17T03:07:23Z2025-12-17T03:07:23ZAuthor Pathan, Al-Sakib Khan, editor.<br/>Preferred Shelf Number QA76.9 .A25 S7354 2014<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781482203523">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>Digital privacy : theory, technologies, and practicesent://SD_ILS/0/SD_ILS:5477742025-12-17T03:07:23Z2025-12-17T03:07:23ZAuthor Acquisti, Alessandro.<br/>Preferred Shelf Number QA76.9 .A25 D528 2008<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781420052183">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>Information security : design, implementation, measurement, and complianceent://SD_ILS/0/SD_ILS:5458392025-12-17T03:07:23Z2025-12-17T03:07:23ZAuthor Layton, Timothy P., author.<br/>Preferred Shelf Number HF5548.37 .L393 2007<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781420013412">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>Enhancing computer security with smart technologyent://SD_ILS/0/SD_ILS:5448232025-12-17T03:07:23Z2025-12-17T03:07:23ZAuthor Vemuri, V. Rao.<br/>Preferred Shelf Number TK5105.59 .E62 2005<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781420031225">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>