Search Results for Training. - Narrowed by: Computer security.
SirsiDynix Enterprise
https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dTraining.$0026qf$003dSUBJECT$002509Subject$002509Computer$002bsecurity.$002509Computer$002bsecurity.$0026ps$003d300$0026isd$003dtrue?
2026-02-20T12:25:06Z
Building effective privacy programs : cybersecurity from principles to practice
ent://SD_ILS/0/SD_ILS:600111
2026-02-20T12:25:06Z
2026-02-20T12:25:06Z
Author Edwards, Jason (Cybersecurity expert), author. Weaver, Griffin, author. John Wiley & Sons, publisher.<br/>Preferred Shelf Number QA76.9 .P735 E34 2026<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394342662">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394342662</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Generative AI, cybersecurity, and ethics
ent://SD_ILS/0/SD_ILS:599597
2026-02-20T12:25:06Z
2026-02-20T12:25:06Z
Author Islam, Ray (Mohammad Rubyet), author.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394279326">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394279326</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Automated secure computing for next-generation systems
ent://SD_ILS/0/SD_ILS:598752
2026-02-20T12:25:06Z
2026-02-20T12:25:06Z
Author Tyagi, Amit Kumar, editor.<br/>Preferred Shelf Number QA76.9 .A25 A98 2024<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394213948">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394213948</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
The cybersecurity guide to governance, risk, and compliance
ent://SD_ILS/0/SD_ILS:598945
2026-02-20T12:25:06Z
2026-02-20T12:25:06Z
Author Edwards, Jason (Cybersecurity expert), author. Weaver, Griffin, author.<br/>Preferred Shelf Number HD30.38 .E34 2024<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394250226">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394250226</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
A practitioner's guide to cybersecurity and data protection : how to ensure client confidentiality
ent://SD_ILS/0/SD_ILS:550244
2026-02-20T12:25:06Z
2026-02-20T12:25:06Z
Author Knibbs, Catherine, editor. Hibberd, Gary, editor.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003364184">https://www.taylorfrancis.com/books/9781003364184</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Perceptions and Analysis of Digital Risks
ent://SD_ILS/0/SD_ILS:597226
2026-02-20T12:25:06Z
2026-02-20T12:25:06Z
Author Capelle, Camille. Liquète, Vincent.<br/>Preferred Shelf Number QA76.575<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119887959">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119887959</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cybersecurity and decision makers : data security and digital trust
ent://SD_ILS/0/SD_ILS:595943
2026-02-20T12:25:06Z
2026-02-20T12:25:06Z
Author Fréminville, Marie de, author.<br/>Preferred Shelf Number HF5548.37 .F74 2020<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119720362">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119720362</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Hands on hacking
ent://SD_ILS/0/SD_ILS:596316
2026-02-20T12:25:06Z
2026-02-20T12:25:06Z
Author Hickey, Matthew (Computer security expert), author. Arcuri, Jennifer, author.<br/>Preferred Shelf Number QA76.9 .A25 H53 2020 EB<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119561507">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119561507</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cybersecurity blue team toolkit
ent://SD_ILS/0/SD_ILS:595209
2026-02-20T12:25:06Z
2026-02-20T12:25:06Z
Author Tanner, Nadean H., author.<br/>Preferred Shelf Number QA76.9 .A25 T36 2019 EB<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119552963">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119552963</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Transformational security awareness : what neuroscientists, storytellers, and marketers can teach us about driving secure behaviors
ent://SD_ILS/0/SD_ILS:595304
2026-02-20T12:25:06Z
2026-02-20T12:25:06Z
Author Carpenter, Perry, author.<br/>Preferred Shelf Number QA76.9 .A25 C37 2019 EB<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119566380">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119566380</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
The Digital Big Bang : the Hard Stuff, the Soft Stuff, and the Future of Cybersecurity
ent://SD_ILS/0/SD_ILS:595435
2026-02-20T12:25:06Z
2026-02-20T12:25:06Z
Author Quade, Phil.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119617396">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119617396</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Digital forensics
ent://SD_ILS/0/SD_ILS:593346
2026-02-20T12:25:06Z
2026-02-20T12:25:06Z
Author Årnes, André, 1976- editor.<br/>Preferred Shelf Number HV8079 .C65<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119262442">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119262442</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
An introduction to cyber modeling and simulation
ent://SD_ILS/0/SD_ILS:594699
2026-02-20T12:25:06Z
2026-02-20T12:25:06Z
Author Couretas, Jerry M., 1966- author.<br/>Preferred Shelf Number QA76.9 .C65<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119420842">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119420842</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
What every engineer should know about cyber security and digital forensics
ent://SD_ILS/0/SD_ILS:539726
2026-02-20T12:25:06Z
2026-02-20T12:25:06Z
Author DeFranco, Joanna F., author.<br/>Preferred Shelf Number TK5105.59 .D44 2014<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781466564541">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>
Information security architecture : an integrated approach to security in the organization
ent://SD_ILS/0/SD_ILS:541238
2026-02-20T12:25:06Z
2026-02-20T12:25:06Z
Author Tudor, Jan Killmeyer., author.<br/>Preferred Shelf Number QA76.9 .A25 T83 2006<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9780203488751">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>