Arama Sonuçları Landscape - Daraltılmış: Computer security.
SirsiDynix Enterprise
https://katalog.hacettepe.edu.tr/client/tr_TR/default_tr/default_tr/qu$003dLandscape$0026qf$003dSUBJECT$002509Konu$002509Computer$002bsecurity.$002509Computer$002bsecurity.$0026ic$003dtrue$0026ps$003d300$0026isd$003dtrue?
2026-02-26T14:32:05Z
Technology and privacy : the new landscape
ent://SD_ILS/0/SD_ILS:112999
2026-02-26T14:32:05Z
2026-02-26T14:32:05Z
Yazar Agre, Philip. Rotenberg, Marc.<br/>Yer Numarası QA76.9.A25 T43 2001<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>
INSECURE DIGITAL FRONTIERS : navigating the global cybersecurity landscape
ent://SD_ILS/0/SD_ILS:582322
2026-02-26T14:32:05Z
2026-02-26T14:32:05Z
Yazar Bhardwaj, Akashdeep, 1971-<br/>Yer Numarası QA76.9 .A25<br/>Elektronik Erişim Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003515395">https://www.taylorfrancis.com/books/9781003515395</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Social Cyber Engineering and Advanced Security Algorithms
ent://SD_ILS/0/SD_ILS:588161
2026-02-26T14:32:05Z
2026-02-26T14:32:05Z
Yazar Merat, Soorena, author. Almuhtadi, Wahab, author<br/>Yer Numarası QA76.9 .A25<br/>Elektronik Erişim Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003500698">https://www.taylorfrancis.com/books/9781003500698</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Emerging threats and countermeasures in cybersecurity
ent://SD_ILS/0/SD_ILS:599561
2026-02-26T14:32:05Z
2026-02-26T14:32:05Z
Yer Numarası QA76.9 .A25 E44 2025<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394230600">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394230600</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Generative AI, cybersecurity, and ethics
ent://SD_ILS/0/SD_ILS:599597
2026-02-26T14:32:05Z
2026-02-26T14:32:05Z
Yazar Islam, Ray (Mohammad Rubyet), author.<br/>Yer Numarası QA76.9 .A25<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394279326">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394279326</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Open-source security operations center (SOC) : a complete guide to establishing, managing, and maintaining a modern SOC
ent://SD_ILS/0/SD_ILS:599434
2026-02-26T14:32:05Z
2026-02-26T14:32:05Z
Yazar Basta, Alfred, author. Basta, Nadine, author. Anwar, Waqar, author. Essar, Mohammad Ilyas, author. John Wiley & Sons, publisher.<br/>Yer Numarası QA76.9 .A25<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394201631">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394201631</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Rise of the machines : when AI and zero trust collide : a Project Zero Trust story
ent://SD_ILS/0/SD_ILS:599932
2026-02-26T14:32:05Z
2026-02-26T14:32:05Z
Yazar Finney, George, author. Vinduska, Zach, author.<br/>Yer Numarası QA76.9 .A25 F56 2025<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394352517">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394352517</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Securing cyber-physical systems : fundamentals, applications and challenges
ent://SD_ILS/0/SD_ILS:600260
2026-02-26T14:32:05Z
2026-02-26T14:32:05Z
Yazar Ananthajothi, K., editor.<br/>Yer Numarası TK5105.59 .S43 2025<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394287765">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394287765</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Next-generation systems and secure computing
ent://SD_ILS/0/SD_ILS:599779
2026-02-26T14:32:05Z
2026-02-26T14:32:05Z
Yazar Barman, Subhabrata, editor. Koley, Santanu, editor. Joardar, Subhankar, editor.<br/>Yer Numarası QA76.9 .A25 N49 2025<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394228522">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394228522</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Protecting and mitigating against cyber threats : deploying artificial intelligence and machine learning
ent://SD_ILS/0/SD_ILS:599999
2026-02-26T14:32:05Z
2026-02-26T14:32:05Z
Yazar Mohanty, Sachi Nandan, editor.<br/>Yer Numarası QA76.9 .A25 P76 2025<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394305216">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394305216</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
The cybersecurity guide to governance, risk, and compliance
ent://SD_ILS/0/SD_ILS:598945
2026-02-26T14:32:05Z
2026-02-26T14:32:05Z
Yazar Edwards, Jason (Cybersecurity expert), author. Weaver, Griffin, author.<br/>Yer Numarası HD30.38 .E34 2024<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394250226">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394250226</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Cryptography : algorithms, protocols, and standards for computer security
ent://SD_ILS/0/SD_ILS:598914
2026-02-26T14:32:05Z
2026-02-26T14:32:05Z
Yazar Mammeri, Zoubir, author.<br/>Yer Numarası QA268 .M34 2024<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394207510">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394207510</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Quantum computing in cybersecurity
ent://SD_ILS/0/SD_ILS:598685
2026-02-26T14:32:05Z
2026-02-26T14:32:05Z
Yazar Rawat, Romil, editor.<br/>Yer Numarası QA76.9 .A25 Q83 2023<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394167401">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394167401</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Trust-based communication systems for internet of things applications
ent://SD_ILS/0/SD_ILS:597744
2026-02-26T14:32:05Z
2026-02-26T14:32:05Z
Yazar Madaan, Vishu, editor. Agrawal, Prateek, editor. Sharma, Anand, editor. Sharma, Dilip Kumar, editor. Agrawal, Akshat, 1986- editor.<br/>Yer Numarası TK5105.8857<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119896746">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119896746</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Applied incident response
ent://SD_ILS/0/SD_ILS:595744
2026-02-26T14:32:05Z
2026-02-26T14:32:05Z
Yazar Anson, Steve.<br/>Yer Numarası QA76.9 .A25<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119560302">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119560302</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Cyber fraud : tactics, techniques, and procedures
ent://SD_ILS/0/SD_ILS:540157
2026-02-26T14:32:05Z
2026-02-26T14:32:05Z
Yazar Graham, James. Howard, Rick.<br/>Yer Numarası HV6773 .H69 2009<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9781420091281">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>
Testing code security
ent://SD_ILS/0/SD_ILS:546167
2026-02-26T14:32:05Z
2026-02-26T14:32:05Z
Yazar Van der Linden, Maura A., author.<br/>Yer Numarası QA76.9 .A25 V359 2007<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9781420013795">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>