Search Results for Tools - Narrowed by: Security.SirsiDynix Enterprisehttps://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dTools$0026qf$003dSUBJECT$002509Subject$002509Security.$002509Security.$0026ps$003d300$0026isd$003dtrue?2026-01-22T08:25:26ZArchives in the digital age : preservation and the right to be forgottenent://SD_ILS/0/SD_ILS:5967192026-01-22T08:25:26Z2026-01-22T08:25:26ZAuthor Mkadmi, Abderrazak, author.<br/>Preferred Shelf Number CD973 .D53<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119825029">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119825029</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Locked Up Cybersecurity Threat Mitigation Lessons from A Real-World LockBit Ransomware Responseent://SD_ILS/0/SD_ILS:6004132026-01-22T08:25:26Z2026-01-22T08:25:26ZAuthor Lewis, Zachary.<br/>Preferred Shelf Number XX(600413.1)<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394357079">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394357079</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>BEHIND THE AI MASK protecting your business from deepfakes.ent://SD_ILS/0/SD_ILS:6004112026-01-22T08:25:26Z2026-01-22T08:25:26ZAuthor BOGAN, CARL.<br/>Preferred Shelf Number XX(600411.1)<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394352616">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394352616</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Securing the AWS cloud : a guide for learning to secure AWS infrastructureent://SD_ILS/0/SD_ILS:5998752026-01-22T08:25:26Z2026-01-22T08:25:26ZAuthor Carroll, Brandon, author.<br/>Preferred Shelf Number TK5105.88813 .C37 2025<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394352142">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394352142</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Next generation data science and blockchain technology for Industry 5.0 : concepts and paradigmsent://SD_ILS/0/SD_ILS:6000502026-01-22T08:25:26Z2026-01-22T08:25:26ZAuthor Tyagi, Amit Kumar, editor.<br/>Preferred Shelf Number T59.6 .N49 2025<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394245215">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394245215</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Cyber defense : best practices for digital safetyent://SD_ILS/0/SD_ILS:6000032026-01-22T08:25:26Z2026-01-22T08:25:26ZAuthor Edwards, Jason, author.<br/>Preferred Shelf Number QA76.9 .A25 E39 2025<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394337040">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394337040</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Preventing bluetooth and wireless attacks in IoMT healthcare systemsent://SD_ILS/0/SD_ILS:6000162026-01-22T08:25:26Z2026-01-22T08:25:26ZAuthor Chirillo, John, 1970- author.<br/>Preferred Shelf Number R859.7 .S43 C45 2025<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394352401">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394352401</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>x86 software reverse-engineering, cracking, and counter-measuresent://SD_ILS/0/SD_ILS:5989202026-01-22T08:25:26Z2026-01-22T08:25:26ZAuthor Domas, Stephanie, author. Domas, Christopher, author.<br/>Preferred Shelf Number QA76.9 .A25 D66 2024<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394277131">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394277131</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Effective vulnerability management : managing risk in the vulnerable digital ecosystement://SD_ILS/0/SD_ILS:5990472026-01-22T08:25:26Z2026-01-22T08:25:26ZAuthor Hughes, Chris (Christopher Matthew), author. Robinson, Nikki, author.<br/>Preferred Shelf Number QA76.9 .A25 H84 2024<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394277155">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394277155</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Cyber Operations : A Case Study Approachent://SD_ILS/0/SD_ILS:5991172026-01-22T08:25:26Z2026-01-22T08:25:26ZAuthor Couretas, Jerry M., 1966- author.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119712121">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119712121</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>The cybersecurity guide to governance, risk, and complianceent://SD_ILS/0/SD_ILS:5989452026-01-22T08:25:26Z2026-01-22T08:25:26ZAuthor Edwards, Jason (Cybersecurity expert), author. Weaver, Griffin, author.<br/>Preferred Shelf Number HD30.38 .E34 2024<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394250226">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394250226</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Cyber threat intelligenceent://SD_ILS/0/SD_ILS:5980512026-01-22T08:25:26Z2026-01-22T08:25:26ZAuthor Lee, Martin (Computer security expert), author.<br/>Preferred Shelf Number TK5105.59 .L47 2023<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119861775">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119861775</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Building secure cars : assuring the automotive software development lifecycleent://SD_ILS/0/SD_ILS:5963102026-01-22T08:25:26Z2026-01-22T08:25:26ZAuthor Oka, Dennis Kengo, author.<br/>Preferred Shelf Number TL272.53 .O42 2021<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119710783">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119710783</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Privacy, regulations, and cybersecurity : the essential business guideent://SD_ILS/0/SD_ILS:5964722026-01-22T08:25:26Z2026-01-22T08:25:26ZAuthor Moschovitis, Christos J. P., author.<br/>Preferred Shelf Number HD61.5 .M675 2021 EB<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119660156">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119660156</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Cyber breach response that actually works : organizational approach to managing residual riskent://SD_ILS/0/SD_ILS:5961172026-01-22T08:25:26Z2026-01-22T08:25:26ZAuthor Gorecki, Andrew.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119679349">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119679349</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Implementing cryptography using Pythonent://SD_ILS/0/SD_ILS:5961982026-01-22T08:25:26Z2026-01-22T08:25:26ZAuthor Bray, Shannon, 1972-<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119612216">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119612216</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Applied incident responseent://SD_ILS/0/SD_ILS:5957442026-01-22T08:25:26Z2026-01-22T08:25:26ZAuthor Anson, Steve.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119560302">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119560302</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Tribe of hackers blue team : tribal knowledge from the best in defensive cybersecurityent://SD_ILS/0/SD_ILS:5962762026-01-22T08:25:26Z2026-01-22T08:25:26ZAuthor Carey, Marcus J. (Cybersecurity professional) Jin, Jennifer.<br/>Preferred Shelf Number QA76.9 .A25 C3673 2020<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119643432">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119643432</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Tribe of hackers red team : tribal knowledge from the best in offensive cybersecurityent://SD_ILS/0/SD_ILS:5954152026-01-22T08:25:26Z2026-01-22T08:25:26ZAuthor Carey, Marcus J. (Cybersecurity professional), author. Jin, Jennifer, author.<br/>Preferred Shelf Number QA76.9 .A25 C368 2019<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119643357">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119643357</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Cybersecurity blue team toolkitent://SD_ILS/0/SD_ILS:5952092026-01-22T08:25:26Z2026-01-22T08:25:26ZAuthor Tanner, Nadean H., author.<br/>Preferred Shelf Number QA76.9 .A25 T36 2019 EB<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119552963">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119552963</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>CompTIA PenTest+ Practice Test : Exam PT0-001ent://SD_ILS/0/SD_ILS:5953292026-01-22T08:25:26Z2026-01-22T08:25:26ZAuthor Panek, Crystal, author. Tracy, Robb.<br/>Preferred Shelf Number TK5105.59<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119575931">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119575931</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Cybersecurity program development for business : the essential planning guideent://SD_ILS/0/SD_ILS:5944552026-01-22T08:25:26Z2026-01-22T08:25:26ZAuthor Moschovitis, Christos J. P., author.<br/>Preferred Shelf Number HD30.2<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119430018">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119430018</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Network forensicsent://SD_ILS/0/SD_ILS:5938142026-01-22T08:25:26Z2026-01-22T08:25:26ZAuthor Messier, Ric, author.<br/>Preferred Shelf Number TK5105.59<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119329190">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119329190</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Hacking the hacker : learn from the experts who take down hackersent://SD_ILS/0/SD_ILS:5936362026-01-22T08:25:26Z2026-01-22T08:25:26ZAuthor Grimes, Roger A., author.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119396260">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119396260</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>