Search Results for Threats. - Narrowed by: Computer security.SirsiDynix Enterprisehttps://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dThreats.$0026qf$003dSUBJECT$002509Subject$002509Computer$002bsecurity.$002509Computer$002bsecurity.$0026ps$003d300?2024-11-08T16:46:48ZMobile data loss : threats and countermeasuresent://SD_ILS/0/SD_ILS:4587292024-11-08T16:46:48Z2024-11-08T16:46:48ZAuthor Raggo, Michael T.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="https://www.sciencedirect.com/science/book/9780128028643">https://www.sciencedirect.com/science/book/9780128028643</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Hardware security : design, threats, and safeguardsent://SD_ILS/0/SD_ILS:3564032024-11-08T16:46:48Z2024-11-08T16:46:48ZAuthor Mukhopadhyay, Debdeep, author. Subhra, Rajat, author.<br/>Preferred Shelf Number ONLINE(356403.1)<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781439895849">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Cyber and electromagnetic threats in modern relay protectionent://SD_ILS/0/SD_ILS:3565352024-11-08T16:46:48Z2024-11-08T16:46:48ZAuthor Gurevich, Vladimir, 1956- author.<br/>Preferred Shelf Number ONLINE(356535.1)<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781482264326">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Enemy at the water cooler real-life stories of insider threats and Enterprise Security Management countermeasuresent://SD_ILS/0/SD_ILS:1464752024-11-08T16:46:48Z2024-11-08T16:46:48ZAuthor Contos, Brian T.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491297">http://www.sciencedirect.com/science/book/9781597491297</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Computer security literacy staying safe in a digital worldent://SD_ILS/0/SD_ILS:2908392024-11-08T16:46:48Z2024-11-08T16:46:48ZAuthor Jacobson, Douglas. Idziorek, Joseph.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781439856192">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Cybersecurity for industrial control systems SCADA, DCS, PLC, HMI, and SISent://SD_ILS/0/SD_ILS:2861402024-11-08T16:46:48Z2024-11-08T16:46:48ZAuthor Macaulay, Tyson. Singer, Bryan.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781439801987">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Cyber security essentialsent://SD_ILS/0/SD_ILS:2879802024-11-08T16:46:48Z2024-11-08T16:46:48ZAuthor Graham, James (James J.) Howard, Richard, 1959- Olson, Ryan, 1981-<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781439851265">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Security software development assessing and managing security risksent://SD_ILS/0/SD_ILS:2860162024-11-08T16:46:48Z2024-11-08T16:46:48ZAuthor Ashbaugh, Douglas A.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781420063813">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>