Search Results for Threats. - Narrowed by: COMPUTERS. SirsiDynix Enterprise https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dThreats.$0026qf$003dSUBJECT$002509Subject$002509COMPUTERS.$002509COMPUTERS.$0026ps$003d300?dt=list 2026-04-05T12:29:07Z Insider threats ent://SD_ILS/0/SD_ILS:594407 2026-04-05T12:29:07Z 2026-04-05T12:29:07Z Author&#160;Arduin, Pierre-Emmanuel, author.<br/>Preferred Shelf Number&#160;QA76.9 .A25<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119419785">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119419785</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Protecting and mitigating against cyber threats : deploying artificial intelligence and machine learning ent://SD_ILS/0/SD_ILS:599999 2026-04-05T12:29:07Z 2026-04-05T12:29:07Z Author&#160;Mohanty, Sachi Nandan, editor.<br/>Preferred Shelf Number&#160;QA76.9 .A25 P76 2025<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394305216">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394305216</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Data exfiltration threats and prevention techniques : machine learning and memory-based data security ent://SD_ILS/0/SD_ILS:598245 2026-04-05T12:29:07Z 2026-04-05T12:29:07Z Author&#160;Tari, Zahir, 1961- author.&#160;Sohrabi, Nasrin, 1982- author.&#160;Samadi, Yasaman, 1993- author.&#160;Suaboot, Jakapan, 1984- author.<br/>Preferred Shelf Number&#160;TK5105.59 .T365 2023<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119898900">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119898900</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Liars and outliers : enabling the trust that society needs to thrive ent://SD_ILS/0/SD_ILS:600235 2026-04-05T12:29:07Z 2026-04-05T12:29:07Z Author&#160;Schneier, Bruce, 1963- author.<br/>Preferred Shelf Number&#160;HM1204 .S35 2026<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394406715">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394406715</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Digital immune system : principles and practices ent://SD_ILS/0/SD_ILS:600243 2026-04-05T12:29:07Z 2026-04-05T12:29:07Z Author&#160;Priyambada Dash, Sujata, editor.&#160;Mishra, Vaibhav.&#160;Shaw, Bijeta.&#160;Panda, Sandeep Kumar.&#160;Balamurugan, S.<br/>Preferred Shelf Number&#160;QA76.9 .A25 D54 2026<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394383788">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394383788</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Data-driven energy management and tariff optimization in power systems : shaping the future of electricity distribution through analytics ent://SD_ILS/0/SD_ILS:600276 2026-04-05T12:29:07Z 2026-04-05T12:29:07Z Author&#160;Arasteh, Hamidreza, editor&#160;Siano, Pierluigi, editor&#160;Moslemi, Niki, editor&#160;Guerrero, Josep M., editor.<br/>Preferred Shelf Number&#160;TK3091 .D347 2026<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394290307">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394290307</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Artificial intelligence and cybersecurity in healthcare ent://SD_ILS/0/SD_ILS:599741 2026-04-05T12:29:07Z 2026-04-05T12:29:07Z Author&#160;Agrawal, Rashmi, editor.<br/>Preferred Shelf Number&#160;R859.7 .A78 A78 2025 EB<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394229826">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394229826</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information visualization for intelligent systems ent://SD_ILS/0/SD_ILS:599760 2026-04-05T12:29:07Z 2026-04-05T12:29:07Z Author&#160;Chauhan, Premanand Sing, editor.&#160;Chakrawarti, Rajesh Kumar.&#160;Chauhan, Premanand Singh/Arya, Rajes.<br/>Preferred Shelf Number&#160;QA76.9 .I52 I54 2025 EB<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394305810">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394305810</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Lessons from the Frontlines : Insights from a Cybersecurity Career. ent://SD_ILS/0/SD_ILS:600433 2026-04-05T12:29:07Z 2026-04-05T12:29:07Z Author&#160;Keren.<br/>Preferred Shelf Number&#160;XX(600433.1)<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394395439">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394395439</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> The cybersecurity control playbook : from fundamentals to advanced strategies ent://SD_ILS/0/SD_ILS:599789 2026-04-05T12:29:07Z 2026-04-05T12:29:07Z Author&#160;Edwards, Jason (Cybersecurity expert), author.&#160;John Wiley &amp; Sons, publisher.<br/>Preferred Shelf Number&#160;QA76.9 .A25 E3884 2025<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394331888">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394331888</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Preventing bluetooth and wireless attacks in IoMT healthcare systems ent://SD_ILS/0/SD_ILS:600016 2026-04-05T12:29:07Z 2026-04-05T12:29:07Z Author&#160;Chirillo, John, 1970- author.<br/>Preferred Shelf Number&#160;R859.7 .S43 C45 2025<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394352401">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394352401</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Digital twins and cybersecurity : safeguarding the future of connected systems ent://SD_ILS/0/SD_ILS:599615 2026-04-05T12:29:07Z 2026-04-05T12:29:07Z Author&#160;Naveen, Palanichamy, author.&#160;Maheswar, R., author.&#160;Ragupathy, U.S., author.<br/>Preferred Shelf Number&#160;QA76.9 .C65 N38 2025<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394272501">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394272501</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Driving innovation through AI and digital twin for 6G powered sustainable ultra smart cities ent://SD_ILS/0/SD_ILS:600163 2026-04-05T12:29:07Z 2026-04-05T12:29:07Z Author&#160;Taneja, Ashu, editor.<br/>Preferred Shelf Number&#160;TD159.4 .D75 2025<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394411320">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394411320</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> AI for humanity : building a sustainable AI for the future ent://SD_ILS/0/SD_ILS:598895 2026-04-05T12:29:07Z 2026-04-05T12:29:07Z Author&#160;Ma, Andeed, author.&#160;Ong, James (Entrepreneur), author.&#160;Tan, Siok Siok, author.<br/>Preferred Shelf Number&#160;Q335 .M164 2024<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394310524">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394310524</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Conversational artificial intelligence ent://SD_ILS/0/SD_ILS:598905 2026-04-05T12:29:07Z 2026-04-05T12:29:07Z Author&#160;Rawat, Romil, 1986- editor.&#160;Chakrawarti, Rajesh Kumar, editor&#160;Sarangi, Sanjaya Kumar, editor&#160;Vyas, Piyush, editor&#160;Alamanda, Mary Sowjanya, editor<br/>Preferred Shelf Number&#160;Q335 .C66 2024<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394200801">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394200801</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Creative approaches towards development of computing and multidisciplinary IT solutions for society ent://SD_ILS/0/SD_ILS:599371 2026-04-05T12:29:07Z 2026-04-05T12:29:07Z Author&#160;Bijalwan, Anchit, editor.<br/>Preferred Shelf Number&#160;QA76 .C74 2024<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394272303">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394272303</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Smart edge computing : an operation research perspective ent://SD_ILS/0/SD_ILS:598978 2026-04-05T12:29:07Z 2026-04-05T12:29:07Z Author&#160;Chakraborty, Rajdeep, editor.&#160;Ghosh, Anupam, editor.&#160;Mandal, Jyotsna Kumar, editor.&#160;Choudhury, Tanupriya, editor.&#160;Chatterjee, Prasenjit, editor.<br/>Preferred Shelf Number&#160;QA76.583<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394277599">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394277599</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security and Privacy for 6G Massive IoT. ent://SD_ILS/0/SD_ILS:599629 2026-04-05T12:29:07Z 2026-04-05T12:29:07Z Author&#160;Mantas, Georgios.&#160;Saghezchi, Firooz.&#160;Rodriguez, Jonathan.&#160;Sucasas, Victor.<br/>Preferred Shelf Number&#160;TK5103.252<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119988007">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119988007</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cyber Operations : A Case Study Approach ent://SD_ILS/0/SD_ILS:599117 2026-04-05T12:29:07Z 2026-04-05T12:29:07Z Author&#160;Couretas, Jerry M., 1966- author.<br/>Preferred Shelf Number&#160;QA76.9 .A25<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119712121">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119712121</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Meta-heuristic algorithms for advanced distributed systems ent://SD_ILS/0/SD_ILS:598999 2026-04-05T12:29:07Z 2026-04-05T12:29:07Z Author&#160;Anand, Rohit, editor.&#160;Juneja, Abhinav, editor.&#160;Pandey, Digvijay, editor.&#160;Juneja, Sapna, editor.&#160;Sindhwani, Nidhi, editor.<br/>Preferred Shelf Number&#160;QA76.9 .D5 M497 2024<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394188093">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394188093</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Stepping through cybersecurity risk management : a systems thinking approach ent://SD_ILS/0/SD_ILS:599021 2026-04-05T12:29:07Z 2026-04-05T12:29:07Z Author&#160;Bayuk, Jennifer L., author.<br/>Preferred Shelf Number&#160;QA76.9 .A25 B39 2024<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394213986">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394213986</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cyber threat intelligence ent://SD_ILS/0/SD_ILS:598051 2026-04-05T12:29:07Z 2026-04-05T12:29:07Z Author&#160;Lee, Martin (Computer security expert), author.<br/>Preferred Shelf Number&#160;TK5105.59 .L47 2023<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119861775">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119861775</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Gamification for resilience : resilient informed decision-making ent://SD_ILS/0/SD_ILS:598293 2026-04-05T12:29:07Z 2026-04-05T12:29:07Z Author&#160;Gheorghe, Adrian V., author.&#160;Katina, Polinpapilinho F., author.<br/>Preferred Shelf Number&#160;HT166 .G487 2023<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394157778">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394157778</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security and privacy vision in 6G : a comprehensive guide ent://SD_ILS/0/SD_ILS:598347 2026-04-05T12:29:07Z 2026-04-05T12:29:07Z Author&#160;Porambage, Pawani, author.&#160;Liyanage, Madhusanka, author.<br/>Preferred Shelf Number&#160;TK5103.252 .P67 2023<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119875437">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119875437</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Quantum computing in cybersecurity ent://SD_ILS/0/SD_ILS:598685 2026-04-05T12:29:07Z 2026-04-05T12:29:07Z Author&#160;Rawat, Romil, editor.<br/>Preferred Shelf Number&#160;QA76.9 .A25 Q83 2023<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394167401">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394167401</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Bioinformatics and medical applications : big data using deep learning algorithms ent://SD_ILS/0/SD_ILS:597469 2026-04-05T12:29:07Z 2026-04-05T12:29:07Z Author&#160;Suresh, A.<br/>Preferred Shelf Number&#160;R858 .B56 2022<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119792673">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119792673</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Quantum blockchain : an emerging cryptographic paradigm ent://SD_ILS/0/SD_ILS:597796 2026-04-05T12:29:07Z 2026-04-05T12:29:07Z Author&#160;Dhanaraj, Rajesh Kumar, editor.<br/>Preferred Shelf Number&#160;QA76.9 .B56<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119836728">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119836728</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cyber-physical systems : foundations and techniques ent://SD_ILS/0/SD_ILS:597592 2026-04-05T12:29:07Z 2026-04-05T12:29:07Z Author&#160;Sharma, Uzzal, editor.<br/>Preferred Shelf Number&#160;TJ213 .C93 2022<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119836636">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119836636</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cyber-physical systems : theory, methodology, and applications ent://SD_ILS/0/SD_ILS:597529 2026-04-05T12:29:07Z 2026-04-05T12:29:07Z Author&#160;Nardelli, Pedro H. J., author.<br/>Preferred Shelf Number&#160;TJ213 .N37 2022<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119785194">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119785194</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer science security : concepts and tools ent://SD_ILS/0/SD_ILS:597739 2026-04-05T12:29:07Z 2026-04-05T12:29:07Z Author&#160;Zaidoun, Ameur Salem, author.<br/>Preferred Shelf Number&#160;QA76.9 .A25 Z35 2022<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394163847">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394163847</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Privacy, regulations, and cybersecurity : the essential business guide ent://SD_ILS/0/SD_ILS:596472 2026-04-05T12:29:07Z 2026-04-05T12:29:07Z Author&#160;Moschovitis, Christos J. P., author.<br/>Preferred Shelf Number&#160;HD61.5 .M675 2021 EB<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119660156">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119660156</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Intelligent data analytics for terror threat prediction : architectures, methodologies, techniques and applications ent://SD_ILS/0/SD_ILS:596541 2026-04-05T12:29:07Z 2026-04-05T12:29:07Z Author&#160;Pani, Subhendu Kumar, 1980- editor.&#160;Singh, Sanjay Kumar, 1963- editor.&#160;Garg, Lalit, 1977- editor.<br/>Preferred Shelf Number&#160;HV6431 .I58 2021<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119711629">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119711629</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Intelligent network management and control : intelligent security, multi-criteria optimization, cloud computing, Internet of Vehicles, intelligent radio ent://SD_ILS/0/SD_ILS:596652 2026-04-05T12:29:07Z 2026-04-05T12:29:07Z Author&#160;Benmammar, Badr.<br/>Preferred Shelf Number&#160;TK5105.59<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119817840">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119817840</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Unmanned aerial vehicles for Internet of Things (IoT) : concepts, techniques, and applications ent://SD_ILS/0/SD_ILS:596898 2026-04-05T12:29:07Z 2026-04-05T12:29:07Z Author&#160;Mohindru, Vandana, editor.&#160;Singh, Yashwant, editor.&#160;Bhatt, Ravindara, editor.&#160;Gupta, Anuj Kumar, editor.<br/>Preferred Shelf Number&#160;TL589.4 .U55 2021<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119769170">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119769170</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security issues and privacy concerns in Industry 4.0 applications ent://SD_ILS/0/SD_ILS:596945 2026-04-05T12:29:07Z 2026-04-05T12:29:07Z Author&#160;David, Shiblin, author.&#160;Anand, R. S., author.&#160;Jeyakrishnan, V., author.&#160;Niranjanamurthy, M., author.<br/>Preferred Shelf Number&#160;QA76.9 .A25 D38 2021<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119776529">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119776529</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cybersecurity and decision makers : data security and digital trust ent://SD_ILS/0/SD_ILS:595943 2026-04-05T12:29:07Z 2026-04-05T12:29:07Z Author&#160;Fr&eacute;minville, Marie de, author.<br/>Preferred Shelf Number&#160;HF5548.37 .F74 2020<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119720362">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119720362</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> TORUS 1 -- toward an open resource using services : cloud computing for environmental data ent://SD_ILS/0/SD_ILS:595948 2026-04-05T12:29:07Z 2026-04-05T12:29:07Z Author&#160;Laffly, Dominique.<br/>Preferred Shelf Number&#160;QA76.585<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119720492">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119720492</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> TORUS 3 -- Toward an open resource using services : cloud computing for environmental data ent://SD_ILS/0/SD_ILS:595949 2026-04-05T12:29:07Z 2026-04-05T12:29:07Z Author&#160;Laffly, Dominique.<br/>Preferred Shelf Number&#160;QA76.585<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119720522">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119720522</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Applied incident response ent://SD_ILS/0/SD_ILS:595744 2026-04-05T12:29:07Z 2026-04-05T12:29:07Z Author&#160;Anson, Steve.<br/>Preferred Shelf Number&#160;QA76.9 .A25<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119560302">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119560302</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> 5G explained : security and deployment of advanced mobile communications ent://SD_ILS/0/SD_ILS:594896 2026-04-05T12:29:07Z 2026-04-05T12:29:07Z Author&#160;Penttinen, Jyrki T. J., author.<br/>Preferred Shelf Number&#160;TK5103.483 .P46 2019<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119275695">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119275695</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cyber security in parallel and distributed computing : concepts, techniques, applications and case studies ent://SD_ILS/0/SD_ILS:595099 2026-04-05T12:29:07Z 2026-04-05T12:29:07Z Author&#160;Le, Dac-Nhuong, 1983- editor.&#160;Kumar, Raghvendra, 1987- editor.&#160;Mishra, Brojo Kishore, 1979- editor.&#160;Khari, Manju, editor.&#160;Chatterjee, Jyotir Moy, editor.<br/>Preferred Shelf Number&#160;QA76.9 .A25<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119488330">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119488330</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security designs for the cloud, IoT, and social networking ent://SD_ILS/0/SD_ILS:595493 2026-04-05T12:29:07Z 2026-04-05T12:29:07Z Author&#160;Le, Dac-Nhuong, 1983- editor.&#160;Bhatt, Chintan M., 1988- editor.&#160;Madhukar, Mani, editor.<br/>Preferred Shelf Number&#160;QA76.585<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119593171">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119593171</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> CCNA security study guide : exam 210-260 ent://SD_ILS/0/SD_ILS:594192 2026-04-05T12:29:07Z 2026-04-05T12:29:07Z Author&#160;McMillan, Troy, author.<br/>Preferred Shelf Number&#160;TK5105.59<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119549505">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119549505</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cybersecurity program development for business : the essential planning guide ent://SD_ILS/0/SD_ILS:594455 2026-04-05T12:29:07Z 2026-04-05T12:29:07Z Author&#160;Moschovitis, Christos J. P., author.<br/>Preferred Shelf Number&#160;HD30.2<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119430018">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119430018</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Hacking the hacker : learn from the experts who take down hackers ent://SD_ILS/0/SD_ILS:593636 2026-04-05T12:29:07Z 2026-04-05T12:29:07Z Author&#160;Grimes, Roger A., author.<br/>Preferred Shelf Number&#160;QA76.9 .A25<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119396260">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119396260</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Network forensics ent://SD_ILS/0/SD_ILS:593814 2026-04-05T12:29:07Z 2026-04-05T12:29:07Z Author&#160;Messier, Ric, author.<br/>Preferred Shelf Number&#160;TK5105.59<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119329190">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119329190</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/>