Search Results for Systems Analysis. - Narrowed by: Computer security. SirsiDynix Enterprise https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dSystems$002bAnalysis.$0026qf$003dSUBJECT$002509Subject$002509Computer$002bsecurity.$002509Computer$002bsecurity.$0026ic$003dtrue$0026ps$003d300? 2025-12-17T02:42:01Z Guide to Vulnerability Analysis for Computer Networks and Systems An Artificial Intelligence Approach ent://SD_ILS/0/SD_ILS:400393 2025-12-17T02:42:01Z 2025-12-17T02:42:01Z Author&#160;Parkinson, Simon. editor. (orcid)0000-0002-1747-9914&#160;Crampton, Andrew. editor. (orcid)0000-0002-4635-9102&#160;Hill, Richard. editor. (orcid)0000-0003-0105-7730&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-92624-7">https://doi.org/10.1007/978-3-319-92624-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Handbook of system safety and security : cyber risk and risk management, cyber security, threat analysis, functional safety, software systems, and cyber physical systems ent://SD_ILS/0/SD_ILS:459145 2025-12-17T02:42:01Z 2025-12-17T02:42:01Z Author&#160;Griffor, Edward R., editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128037737">http://www.sciencedirect.com/science/book/9780128037737</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Secure computer and network systems modeling, analysis and design ent://SD_ILS/0/SD_ILS:296665 2025-12-17T02:42:01Z 2025-12-17T02:42:01Z Author&#160;Ye, Nong.&#160;Wiley InterScience (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;Contributor biographical information <a href="http://catdir.loc.gov/catdir/enhancements/fy0833/2007037133-b.html">http://catdir.loc.gov/catdir/enhancements/fy0833/2007037133-b.html</a> John Wiley <a href="http://dx.doi.org/10.1002/9780470023273">http://dx.doi.org/10.1002/9780470023273</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> The state of the art in intrusion prevention and detection ent://SD_ILS/0/SD_ILS:543676 2025-12-17T02:42:01Z 2025-12-17T02:42:01Z Author&#160;Pathan, Al-Sakib Khan, editor.<br/>Preferred Shelf Number&#160;QA76.9 .A25 S7354 2014<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781482203523">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> Digital privacy : theory, technologies, and practices ent://SD_ILS/0/SD_ILS:547774 2025-12-17T02:42:01Z 2025-12-17T02:42:01Z Author&#160;Acquisti, Alessandro.<br/>Preferred Shelf Number&#160;QA76.9 .A25 D528 2008<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781420052183">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> Information security : design, implementation, measurement, and compliance ent://SD_ILS/0/SD_ILS:545839 2025-12-17T02:42:01Z 2025-12-17T02:42:01Z Author&#160;Layton, Timothy P., author.<br/>Preferred Shelf Number&#160;HF5548.37 .L393 2007<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781420013412">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> Enhancing computer security with smart technology ent://SD_ILS/0/SD_ILS:544823 2025-12-17T02:42:01Z 2025-12-17T02:42:01Z Author&#160;Vemuri, V. Rao.<br/>Preferred Shelf Number&#160;TK5105.59 .E62 2005<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781420031225">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/>