Arama Sonuçları Information security. - Daraltılmış: Networking.
SirsiDynix Enterprise
https://katalog.hacettepe.edu.tr/client/tr_TR/default_tr/default_tr/qu$003dInformation$002bsecurity.$0026qf$003dSUBJECT$002509Konu$002509Networking.$002509Networking.$0026ps$003d300$0026isd$003dtrue?
2026-01-30T12:35:09Z
Information security and privacy quick reference the essential handbook for every CISO, CSO, and Chief Privacy Officer
ent://SD_ILS/0/SD_ILS:599946
2026-01-30T12:35:09Z
2026-01-30T12:35:09Z
Yazar Chapple, Mike, author. Shelley, Joe. Stewart, James Michael.<br/>Yer Numarası QA76.9 .A25 C43 2025<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394353347">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394353347</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Lessons from the Frontlines : Insights from a Cybersecurity Career.
ent://SD_ILS/0/SD_ILS:600433
2026-01-30T12:35:09Z
2026-01-30T12:35:09Z
Yazar Keren.<br/>Yer Numarası XX(600433.1)<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394395439">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394395439</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Cyber defense : best practices for digital safety
ent://SD_ILS/0/SD_ILS:600003
2026-01-30T12:35:09Z
2026-01-30T12:35:09Z
Yazar Edwards, Jason, author.<br/>Yer Numarası QA76.9 .A25 E39 2025<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394337040">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394337040</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Cyber Operations : A Case Study Approach
ent://SD_ILS/0/SD_ILS:599117
2026-01-30T12:35:09Z
2026-01-30T12:35:09Z
Yazar Couretas, Jerry M., 1966- author.<br/>Yer Numarası QA76.9 .A25<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119712121">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119712121</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Cryptography : algorithms, protocols, and standards for computer security
ent://SD_ILS/0/SD_ILS:598914
2026-01-30T12:35:09Z
2026-01-30T12:35:09Z
Yazar Mammeri, Zoubir, author.<br/>Yer Numarası QA268 .M34 2024<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394207510">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394207510</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
The cybersecurity guide to governance, risk, and compliance
ent://SD_ILS/0/SD_ILS:598945
2026-01-30T12:35:09Z
2026-01-30T12:35:09Z
Yazar Edwards, Jason (Cybersecurity expert), author. Weaver, Griffin, author.<br/>Yer Numarası HD30.38 .E34 2024<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394250226">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394250226</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Stepping through cybersecurity risk management : a systems thinking approach
ent://SD_ILS/0/SD_ILS:599021
2026-01-30T12:35:09Z
2026-01-30T12:35:09Z
Yazar Bayuk, Jennifer L., author.<br/>Yer Numarası QA76.9 .A25 B39 2024<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394213986">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394213986</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Security and privacy vision in 6G : a comprehensive guide
ent://SD_ILS/0/SD_ILS:598347
2026-01-30T12:35:09Z
2026-01-30T12:35:09Z
Yazar Porambage, Pawani, author. Liyanage, Madhusanka, author.<br/>Yer Numarası TK5103.252 .P67 2023<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119875437">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119875437</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Security and its challenges in the 21st Century
ent://SD_ILS/0/SD_ILS:597077
2026-01-30T12:35:09Z
2026-01-30T12:35:09Z
Yazar Guerrier, Claudine, author.<br/>Yer Numarası QA76.9 .A25<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119854852">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119854852</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Security, privacy and digital forensics in the cloud
ent://SD_ILS/0/SD_ILS:594934
2026-01-30T12:35:09Z
2026-01-30T12:35:09Z
Yazar Chen, Lei, 1978 July 28- editor. Takabi, Hassan, 1982- editor. Le-Khac, Nhien-An, 1972- editor.<br/>Yer Numarası QA76.585 .S43 2019<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119053385">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119053385</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Security designs for the cloud, IoT, and social networking
ent://SD_ILS/0/SD_ILS:595493
2026-01-30T12:35:09Z
2026-01-30T12:35:09Z
Yazar Le, Dac-Nhuong, 1983- editor. Bhatt, Chintan M., 1988- editor. Madhukar, Mani, editor.<br/>Yer Numarası QA76.585<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119593171">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119593171</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
5G explained : security and deployment of advanced mobile communications
ent://SD_ILS/0/SD_ILS:594896
2026-01-30T12:35:09Z
2026-01-30T12:35:09Z
Yazar Penttinen, Jyrki T. J., author.<br/>Yer Numarası TK5103.483 .P46 2019<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119275695">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119275695</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Transformational security awareness : what neuroscientists, storytellers, and marketers can teach us about driving secure behaviors
ent://SD_ILS/0/SD_ILS:595304
2026-01-30T12:35:09Z
2026-01-30T12:35:09Z
Yazar Carpenter, Perry, author.<br/>Yer Numarası QA76.9 .A25 C37 2019 EB<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119566380">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119566380</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Wireshark for security professionals : using Wireshark and the Metasploit Framework
ent://SD_ILS/0/SD_ILS:593472
2026-01-30T12:35:09Z
2026-01-30T12:35:09Z
Yazar Bullock, Jessey, author. Gordon, Adam, author.<br/>Yer Numarası QA76.9 .A25<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119183457">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119183457</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Network forensics
ent://SD_ILS/0/SD_ILS:593814
2026-01-30T12:35:09Z
2026-01-30T12:35:09Z
Yazar Messier, Ric, author.<br/>Yer Numarası TK5105.59<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119329190">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119329190</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>