Arama Sonuçları Industry - Daraltılmış: Computer security.
SirsiDynix Enterprise
https://katalog.hacettepe.edu.tr/client/tr_TR/default_tr/default_tr/qu$003dIndustry$0026qf$003dSUBJECT$002509Konu$002509Computer$002bsecurity.$002509Computer$002bsecurity.$0026ps$003d300?
2026-02-20T14:54:55Z
CYBERSECURITY IN THE TRANSPORTATION INDUSTRY.
ent://SD_ILS/0/SD_ILS:599238
2026-02-20T14:54:55Z
2026-02-20T14:54:55Z
Yer Numarası HE194 .C93 2024<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394204472">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394204472</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
The techno-legal dynamics of cyber crimes in Industry 5.0
ent://SD_ILS/0/SD_ILS:599801
2026-02-20T14:54:55Z
2026-02-20T14:54:55Z
Yazar Kaur, Gagandeep, editor Choudhury, Tanupriya editor Balamurugan, S. editor<br/>Yer Numarası QA76.9 .A25<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394242177">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394242177</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Cybersecurity and data science innovations for sustainable development of HEICC : healthcare, education, industry, cities and communities
ent://SD_ILS/0/SD_ILS:568917
2026-02-20T14:54:55Z
2026-02-20T14:54:55Z
Yazar Murugan, Thangavel, 1989- editor. W., Jaisingh, 1978- editor.<br/>Yer Numarası QA76.9 .A25<br/>Elektronik Erişim Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781032711300">https://www.taylorfrancis.com/books/9781032711300</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Security issues and privacy concerns in Industry 4.0 applications
ent://SD_ILS/0/SD_ILS:596945
2026-02-20T14:54:55Z
2026-02-20T14:54:55Z
Yazar David, Shiblin, author. Anand, R. S., author. Jeyakrishnan, V., author. Niranjanamurthy, M., author.<br/>Yer Numarası QA76.9 .A25 D38 2021<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119776529">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119776529</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Developing a cybersecurity immune system for industry 4.0
ent://SD_ILS/0/SD_ILS:557932
2026-02-20T14:54:55Z
2026-02-20T14:54:55Z
Yazar Petrenko, Sergei, author.<br/>Yer Numarası QA76.9 .A25 P48 2020<br/>Elektronik Erişim Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003337874">https://www.taylorfrancis.com/books/9781003337874</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Cellular Automata 13th International Conference on Cellular Automata for Research and Industry, ACRI 2018, Como, Italy, September 17–21, 2018, Proceedings
ent://SD_ILS/0/SD_ILS:400172
2026-02-20T14:54:55Z
2026-02-20T14:54:55Z
Yazar Mauri, Giancarlo. editor. (orcid)0000-0003-3520-4022 El Yacoubi, Samira. editor. (orcid)0000-0002-8017-5286 Dennunzio, Alberto. editor. (orcid)0000-0003-1420-404X Nishinari, Katsuhiro. editor. Manzoni, Luca. editor. (orcid)0000-0001-6312-7728<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-319-99813-8">https://doi.org/10.1007/978-3-319-99813-8</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Information technology risk management in enterprise environments a review of industry practices and a practical guide to risk management teams
ent://SD_ILS/0/SD_ILS:297862
2026-02-20T14:54:55Z
2026-02-20T14:54:55Z
Yazar Kouns, Jake. Minoli, Daniel, 1952- Wiley InterScience (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim John Wiley <a href="http://dx.doi.org/10.1002/9780470558133">http://dx.doi.org/10.1002/9780470558133</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Mathematical Modelling for Next-Generation Cryptography CREST Crypto-Math Project
ent://SD_ILS/0/SD_ILS:401558
2026-02-20T14:54:55Z
2026-02-20T14:54:55Z
Yazar Takagi, Tsuyoshi. editor. Wakayama, Masato. editor. Tanaka, Keisuke. editor. Kunihiro, Noboru. editor. Kimoto, Kazufumi. editor.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-981-10-5065-7">https://doi.org/10.1007/978-981-10-5065-7</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Securing cyber-physical systems : fundamentals, applications and challenges
ent://SD_ILS/0/SD_ILS:600260
2026-02-20T14:54:55Z
2026-02-20T14:54:55Z
Yazar Ananthajothi, K., editor.<br/>Yer Numarası TK5105.59 .S43 2025<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394287765">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394287765</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Taming the hacking storm : a framework for securing and defending networks
ent://SD_ILS/0/SD_ILS:599858
2026-02-20T14:54:55Z
2026-02-20T14:54:55Z
Yazar Grimes, Roger A., author.<br/>Yer Numarası QA76.9 .A25 G75 2025<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394352289">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394352289</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Information security and privacy quick reference the essential handbook for every CISO, CSO, and Chief Privacy Officer
ent://SD_ILS/0/SD_ILS:599946
2026-02-20T14:54:55Z
2026-02-20T14:54:55Z
Yazar Chapple, Mike, author. Shelley, Joe. Stewart, James Michael.<br/>Yer Numarası QA76.9 .A25 C43 2025<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394353347">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394353347</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Inside cyber : how AI, 5G, IoT, and quantum computing will transform privacy and our security
ent://SD_ILS/0/SD_ILS:599222
2026-02-20T14:54:55Z
2026-02-20T14:54:55Z
Yazar Brooks, Chuck (Writer of Inside cyber), author.<br/>Yer Numarası HC79 .T4 B735 2025<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394310562">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394310562</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Generative AI, cybersecurity, and ethics
ent://SD_ILS/0/SD_ILS:599597
2026-02-20T14:54:55Z
2026-02-20T14:54:55Z
Yazar Islam, Ray (Mohammad Rubyet), author.<br/>Yer Numarası QA76.9 .A25<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394279326">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394279326</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Digital twins and cybersecurity : safeguarding the future of connected systems
ent://SD_ILS/0/SD_ILS:599615
2026-02-20T14:54:55Z
2026-02-20T14:54:55Z
Yazar Naveen, Palanichamy, author. Maheswar, R., author. Ragupathy, U.S., author.<br/>Yer Numarası QA76.9 .C65 N38 2025<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394272501">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394272501</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Protecting and mitigating against cyber threats : deploying artificial intelligence and machine learning
ent://SD_ILS/0/SD_ILS:599999
2026-02-20T14:54:55Z
2026-02-20T14:54:55Z
Yazar Mohanty, Sachi Nandan, editor.<br/>Yer Numarası QA76.9 .A25 P76 2025<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394305216">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394305216</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Stepping through cybersecurity risk management : a systems thinking approach
ent://SD_ILS/0/SD_ILS:599021
2026-02-20T14:54:55Z
2026-02-20T14:54:55Z
Yazar Bayuk, Jennifer L., author.<br/>Yer Numarası QA76.9 .A25 B39 2024<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394213986">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394213986</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Automated secure computing for next-generation systems
ent://SD_ILS/0/SD_ILS:598752
2026-02-20T14:54:55Z
2026-02-20T14:54:55Z
Yazar Tyagi, Amit Kumar, editor.<br/>Yer Numarası QA76.9 .A25 A98 2024<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394213948">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394213948</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
x86 software reverse-engineering, cracking, and counter-measures
ent://SD_ILS/0/SD_ILS:598920
2026-02-20T14:54:55Z
2026-02-20T14:54:55Z
Yazar Domas, Stephanie, author. Domas, Christopher, author.<br/>Yer Numarası QA76.9 .A25 D66 2024<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394277131">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394277131</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
The cybersecurity guide to governance, risk, and compliance
ent://SD_ILS/0/SD_ILS:598945
2026-02-20T14:54:55Z
2026-02-20T14:54:55Z
Yazar Edwards, Jason (Cybersecurity expert), author. Weaver, Griffin, author.<br/>Yer Numarası HD30.38 .E34 2024<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394250226">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394250226</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Cyber investigations : a research based textbook for advanced studies
ent://SD_ILS/0/SD_ILS:597931
2026-02-20T14:54:55Z
2026-02-20T14:54:55Z
Yazar Årnes, André, 1976- editor.<br/>Yer Numarası HV8079 .C65 C933 2023<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119582021">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119582021</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Wireless communication in cyber security
ent://SD_ILS/0/SD_ILS:598705
2026-02-20T14:54:55Z
2026-02-20T14:54:55Z
Yazar Sountharrajan, S. editor Maheswar, R. editor Rathee, Geetanjali, editor Akila, M. editor<br/>Yer Numarası QA76.9 .A25 W57 2023<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119910619">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119910619</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Trust-based communication systems for internet of things applications
ent://SD_ILS/0/SD_ILS:597744
2026-02-20T14:54:55Z
2026-02-20T14:54:55Z
Yazar Madaan, Vishu, editor. Agrawal, Prateek, editor. Sharma, Anand, editor. Sharma, Dilip Kumar, editor. Agrawal, Akshat, 1986- editor.<br/>Yer Numarası TK5105.8857<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119896746">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119896746</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Tribe of hackers red team : tribal knowledge from the best in offensive cybersecurity
ent://SD_ILS/0/SD_ILS:595415
2026-02-20T14:54:55Z
2026-02-20T14:54:55Z
Yazar Carey, Marcus J. (Cybersecurity professional), author. Jin, Jennifer, author.<br/>Yer Numarası QA76.9 .A25 C368 2019<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119643357">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119643357</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Tribe of hackers : cybersecurity advice from the best hackers in the world
ent://SD_ILS/0/SD_ILS:595418
2026-02-20T14:54:55Z
2026-02-20T14:54:55Z
Yazar Carey, Marcus J. (Cybersecurity professional), author. Jin, Jennifer, author.<br/>Yer Numarası QA76.9 .A25 C37 2019 EB<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119643395">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119643395</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Tests and Proofs 12th International Conference, TAP 2018, Held as Part of STAF 2018, Toulouse, France, June 27-29, 2018, Proceedings
ent://SD_ILS/0/SD_ILS:401698
2026-02-20T14:54:55Z
2026-02-20T14:54:55Z
Yazar Dubois, Catherine. editor. Wolff, Burkhart. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-319-92994-1">https://doi.org/10.1007/978-3-319-92994-1</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Digital forensics
ent://SD_ILS/0/SD_ILS:593346
2026-02-20T14:54:55Z
2026-02-20T14:54:55Z
Yazar Årnes, André, 1976- editor.<br/>Yer Numarası HV8079 .C65<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119262442">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119262442</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Cyber threat! : how to manage the growing risk of cyber attacks
ent://SD_ILS/0/SD_ILS:342020
2026-02-20T14:54:55Z
2026-02-20T14:54:55Z
Yazar Ulsch, N. MacDonnell, 1951-<br/>Yer Numarası ONLINE(342020.1)<br/>Elektronik Erişim ebrary <a href="http://alltitles.ebrary.com/Doc?id=10895757">An electronic book accessible through the World Wide Web; click to view</a>
Ebook Library <a href="http://public.eblib.com/choice/publicfullrecord.aspx?p=1742833">http://public.eblib.com/choice/publicfullrecord.aspx?p=1742833</a>
John Wiley <a href="http://dx.doi.org/10.1002/9781118915028">http://dx.doi.org/10.1002/9781118915028</a>
MyiLibrary <a href="http://www.myilibrary.com?id=629214">http://www.myilibrary.com?id=629214</a>
Cover <a href="http://swbplus.bsz-bw.de/bsz410564842cov.htm">http://swbplus.bsz-bw.de/bsz410564842cov.htm</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>