Search Results for Threats. - Narrowed by: Computer security.SirsiDynix Enterprisehttps://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dThreats.$0026qf$003dSUBJECT$002509Subject$002509Computer$002bsecurity.$002509Computer$002bsecurity.$0026ps$003d300?2026-01-02T09:12:33ZMobile data loss : threats and countermeasuresent://SD_ILS/0/SD_ILS:4587292026-01-02T09:12:33Z2026-01-02T09:12:33ZAuthor Raggo, Michael T.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="https://www.sciencedirect.com/science/book/9780128028643">https://www.sciencedirect.com/science/book/9780128028643</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Hardware security : design, threats, and safeguardsent://SD_ILS/0/SD_ILS:5436202026-01-02T09:12:33Z2026-01-02T09:12:33ZAuthor Mukhopadhyay, Debdeep, author. Subhra, Rajat, author.<br/>Preferred Shelf Number QA76.9 .A25 M85 2015<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781439895849">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>Cyber and electromagnetic threats in modern relay protectionent://SD_ILS/0/SD_ILS:5434462026-01-02T09:12:33Z2026-01-02T09:12:33ZAuthor Gurevich, Vladimir, 1956, author.<br/>Preferred Shelf Number TK2861 .G87 2015<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781482264326">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>Enemy at the water cooler real-life stories of insider threats and Enterprise Security Management countermeasuresent://SD_ILS/0/SD_ILS:1464752026-01-02T09:12:33Z2026-01-02T09:12:33ZAuthor Contos, Brian T.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491297">http://www.sciencedirect.com/science/book/9781597491297</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Unauthorized Access : The Crisis in Online Privacy and Security.ent://SD_ILS/0/SD_ILS:5436882026-01-02T09:12:33Z2026-01-02T09:12:33ZAuthor Sloan, Robert, author. CRC Press LLC.<br/>Preferred Shelf Number TK5105.878 .S59 2017<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9780429093791">https://www.taylorfrancis.com/books/9780429093791</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Information security fundamentalsent://SD_ILS/0/SD_ILS:5399222026-01-02T09:12:33Z2026-01-02T09:12:33ZAuthor Peltier, Thomas R.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9780429130281">Taylor & Francis eBooks</a>
Taylor & Francis <a href="https://www.taylorfrancis.com/books/9780429130281">https://www.taylorfrancis.com/books/9780429130281</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>What every engineer should know about cyber security and digital forensicsent://SD_ILS/0/SD_ILS:5397262026-01-02T09:12:33Z2026-01-02T09:12:33ZAuthor DeFranco, Joanna F., author.<br/>Preferred Shelf Number TK5105.59 .D44 2014<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781466564541">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>Cybersecurity for industrial control systems : SCADA, DCS, PLC, HMI, and SISent://SD_ILS/0/SD_ILS:5431192026-01-02T09:12:33Z2026-01-02T09:12:33ZAuthor Macaulay, Tyson., author. Singer, Bryan.<br/>Preferred Shelf Number TS156.8 .M328 2012<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781439801987">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>Security software development : assessing and managing security risksent://SD_ILS/0/SD_ILS:5438362026-01-02T09:12:33Z2026-01-02T09:12:33ZAuthor Ashbaugh, Douglas A., author.<br/>Preferred Shelf Number QA76.9 .A25 A8246 2009<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781420063813">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>Security in Distributed, Grid, Mobile, and Pervasive Computing.ent://SD_ILS/0/SD_ILS:5448472026-01-02T09:12:33Z2026-01-02T09:12:33ZPreferred Shelf Number QA76.9<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9780429119347">https://www.taylorfrancis.com/books/9780429119347</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Information security fundamentalsent://SD_ILS/0/SD_ILS:5452262026-01-02T09:12:33Z2026-01-02T09:12:33ZAuthor Peltier, Thomas R., author. Peltier, Justin. Blackley, John A.<br/>Preferred Shelf Number QA76.9 .A25 P427 2005<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781135493738">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>