Search Results for Viruses - Narrowed by: Networking. SirsiDynix Enterprise https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dViruses$0026qf$003dSUBJECT$002509Subject$002509Networking.$002509Networking.$0026ic$003dtrue$0026ps$003d300? 2026-02-22T16:43:46Z Zero Trust Security A Hands-on Guide ent://SD_ILS/0/SD_ILS:600392 2026-02-22T16:43:46Z 2026-02-22T16:43:46Z Author&#160;Jakobsen, Adam Tilmar.<br/>Preferred Shelf Number&#160;XX(600392.1)<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394361120">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394361120</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Preventing bluetooth and wireless attacks in IoMT healthcare systems ent://SD_ILS/0/SD_ILS:600016 2026-02-22T16:43:46Z 2026-02-22T16:43:46Z Author&#160;Chirillo, John, 1970- author.<br/>Preferred Shelf Number&#160;R859.7 .S43 C45 2025<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394352401">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394352401</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Lessons from the Frontlines : Insights from a Cybersecurity Career. ent://SD_ILS/0/SD_ILS:600433 2026-02-22T16:43:46Z 2026-02-22T16:43:46Z Author&#160;Keren.<br/>Preferred Shelf Number&#160;XX(600433.1)<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394395439">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394395439</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Practical cyber intelligence : a hands-on guide to digital forensics ent://SD_ILS/0/SD_ILS:599262 2026-02-22T16:43:46Z 2026-02-22T16:43:46Z Author&#160;Jakobsen, Adam Tilmar, author.<br/>Preferred Shelf Number&#160;HV8079 .C65 J633 2024<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394256129">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394256129</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Stepping through cybersecurity risk management : a systems thinking approach ent://SD_ILS/0/SD_ILS:599021 2026-02-22T16:43:46Z 2026-02-22T16:43:46Z Author&#160;Bayuk, Jennifer L., author.<br/>Preferred Shelf Number&#160;QA76.9 .A25 B39 2024<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394213986">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394213986</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Data exfiltration threats and prevention techniques : machine learning and memory-based data security ent://SD_ILS/0/SD_ILS:598245 2026-02-22T16:43:46Z 2026-02-22T16:43:46Z Author&#160;Tari, Zahir, 1961- author.&#160;Sohrabi, Nasrin, 1982- author.&#160;Samadi, Yasaman, 1993- author.&#160;Suaboot, Jakapan, 1984- author.<br/>Preferred Shelf Number&#160;TK5105.59 .T365 2023<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119898900">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119898900</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cyber threat intelligence ent://SD_ILS/0/SD_ILS:598051 2026-02-22T16:43:46Z 2026-02-22T16:43:46Z Author&#160;Lee, Martin (Computer security expert), author.<br/>Preferred Shelf Number&#160;TK5105.59 .L47 2023<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119861775">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119861775</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Transformational security awareness : what neuroscientists, storytellers, and marketers can teach us about driving secure behaviors ent://SD_ILS/0/SD_ILS:595304 2026-02-22T16:43:46Z 2026-02-22T16:43:46Z Author&#160;Carpenter, Perry, author.<br/>Preferred Shelf Number&#160;QA76.9 .A25 C37 2019 EB<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119566380">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119566380</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cybersecurity program development for business : the essential planning guide ent://SD_ILS/0/SD_ILS:594455 2026-02-22T16:43:46Z 2026-02-22T16:43:46Z Author&#160;Moschovitis, Christos J. P., author.<br/>Preferred Shelf Number&#160;HD30.2<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119430018">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119430018</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Windows security monitoring : scenarios and patterns ent://SD_ILS/0/SD_ILS:594404 2026-02-22T16:43:46Z 2026-02-22T16:43:46Z Author&#160;Miroshnikov, Andrei, author.<br/>Preferred Shelf Number&#160;QA76.9 .A25<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119390909">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119390909</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advanced penetration testing : hacking the world's most secure networks ent://SD_ILS/0/SD_ILS:593439 2026-02-22T16:43:46Z 2026-02-22T16:43:46Z Author&#160;Allsopp, Wil, author.<br/>Preferred Shelf Number&#160;QA76.9 .A25<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119367741">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119367741</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/>