Search Results for Threats. - Narrowed by: Data protection.SirsiDynix Enterprisehttps://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dThreats.$0026qf$003dSUBJECT$002509Subject$002509Data$002bprotection.$002509Data$002bprotection.$0026ps$003d300?2026-03-03T23:57:14ZMobile data loss : threats and countermeasuresent://SD_ILS/0/SD_ILS:4587292026-03-03T23:57:14Z2026-03-03T23:57:14ZAuthor Raggo, Michael T.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="https://www.sciencedirect.com/science/book/9780128028643">https://www.sciencedirect.com/science/book/9780128028643</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Insider Threats in Cyber Securityent://SD_ILS/0/SD_ILS:1727822026-03-03T23:57:14Z2026-03-03T23:57:14ZAuthor Probst, Christian W. editor. Hunker, Jeffrey. editor. Gollmann, Dieter. editor. Bishop, Matt. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-1-4419-7133-3">http://dx.doi.org/10.1007/978-1-4419-7133-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Moving Target Defense Creating Asymmetric Uncertainty for Cyber Threatsent://SD_ILS/0/SD_ILS:1738232026-03-03T23:57:14Z2026-03-03T23:57:14ZAuthor Jajodia, Sushil. editor. Ghosh, Anup K. editor. Swarup, Vipin. editor. Wang, Cliff. editor. Wang, X. Sean. editor.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-1-4614-0977-9">http://dx.doi.org/10.1007/978-1-4614-0977-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>The cybersecurity control playbook : from fundamentals to advanced strategiesent://SD_ILS/0/SD_ILS:5997892026-03-03T23:57:14Z2026-03-03T23:57:14ZAuthor Edwards, Jason (Cybersecurity expert), author. John Wiley & Sons, publisher.<br/>Preferred Shelf Number QA76.9 .A25 E3884 2025<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394331888">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394331888</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Proceedings of 3rd International Conference on Recent Trends in Machine Learning, IoT, Smart Cities and Applications ICMISC 2022ent://SD_ILS/0/SD_ILS:5287842026-03-03T23:57:14Z2026-03-03T23:57:14ZAuthor Gunjan, Vinit Kumar. editor. Zurada, Jacek M. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-981-19-6088-8">https://doi.org/10.1007/978-981-19-6088-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Proceedings of Fourth International Conference on Computer and Communication Technologies IC3T 2022ent://SD_ILS/0/SD_ILS:5287862026-03-03T23:57:14Z2026-03-03T23:57:14ZAuthor Reddy, K. Ashoka. editor. Devi, B. Rama. editor. George, Boby. editor. Raju, K. Srujan. editor. Sellathurai, Mathini. editor.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-981-19-8563-8">https://doi.org/10.1007/978-981-19-8563-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Information and Communication Technology for Competitive Strategies (ICTCS 2022) ICT: Applications and Social Interfacesent://SD_ILS/0/SD_ILS:5277462026-03-03T23:57:14Z2026-03-03T23:57:14ZAuthor Joshi, Amit. editor. Mahmud, Mufti. editor. Ragel, Roshan G. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-981-19-9638-2">https://doi.org/10.1007/978-981-19-9638-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Emerging Trends in Expert Applications and Security Proceedings of 2nd ICETEAS 2023, Volume 1ent://SD_ILS/0/SD_ILS:5291132026-03-03T23:57:14Z2026-03-03T23:57:14ZAuthor Rathore, Vijay Singh. editor. Tavares, João Manuel R. S. editor. Piuri, Vincenzo. editor. Surendiran, B. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-981-99-1909-3">https://doi.org/10.1007/978-981-99-1909-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Security and privacy in the Internet of things : architectures, techniques, and applicationsent://SD_ILS/0/SD_ILS:5971842026-03-03T23:57:14Z2026-03-03T23:57:14ZAuthor Awad, Ali Ismail, editor. Abawajy, Jemal H., 1982- editor.<br/>Preferred Shelf Number TK5105.8857 .S444 2022<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119607755">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119607755</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Cyber intelligence-driven risk : how to build and use cyber intelligence for business risk decisionsent://SD_ILS/0/SD_ILS:5962652026-03-03T23:57:14Z2026-03-03T23:57:14ZAuthor Moore, Richard O., III, 1971- author.<br/>Preferred Shelf Number HD61.5 .M66 2021<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119676942">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119676942</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Privacy, regulations, and cybersecurity : the essential business guideent://SD_ILS/0/SD_ILS:5964722026-03-03T23:57:14Z2026-03-03T23:57:14ZAuthor Moschovitis, Christos J. P., author.<br/>Preferred Shelf Number HD61.5 .M675 2021 EB<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119660156">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119660156</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Unauthorized Access : The Crisis in Online Privacy and Security.ent://SD_ILS/0/SD_ILS:5436882026-03-03T23:57:14Z2026-03-03T23:57:14ZAuthor Sloan, Robert, author. CRC Press LLC.<br/>Preferred Shelf Number TK5105.878 .S59 2017<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9780429093791">https://www.taylorfrancis.com/books/9780429093791</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Information security fundamentalsent://SD_ILS/0/SD_ILS:5399222026-03-03T23:57:14Z2026-03-03T23:57:14ZAuthor Peltier, Thomas R.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9780429130281">Taylor & Francis eBooks</a>
Taylor & Francis <a href="https://www.taylorfrancis.com/books/9780429130281">https://www.taylorfrancis.com/books/9780429130281</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Cyber Security: Analytics, Technology and Automationent://SD_ILS/0/SD_ILS:5299622026-03-03T23:57:14Z2026-03-03T23:57:14ZAuthor Lehto, Martti. editor. Neittaanmäki, Pekka. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-18302-2">https://doi.org/10.1007/978-3-319-18302-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Information security fundamentalsent://SD_ILS/0/SD_ILS:5452262026-03-03T23:57:14Z2026-03-03T23:57:14ZAuthor Peltier, Thomas R., author. Peltier, Justin. Blackley, John A.<br/>Preferred Shelf Number QA76.9 .A25 P427 2005<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781135493738">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>