Arama Sonu&ccedil;lar&#305; Management systems. - Daralt&#305;lm&#305;&#351;: Security. SirsiDynix Enterprise https://katalog.hacettepe.edu.tr/client/tr_TR/default_tr/default_tr/qu$003dManagement$002bsystems.$0026qf$003dSUBJECT$002509Konu$002509Security.$002509Security.$0026ps$003d300$0026isd$003dtrue? 2026-02-19T15:48:35Z Stepping through cybersecurity risk management : a systems thinking approach ent://SD_ILS/0/SD_ILS:599021 2026-02-19T15:48:35Z 2026-02-19T15:48:35Z Yazar&#160;Bayuk, Jennifer L., author.<br/>Yer Numaras&#305;&#160;QA76.9 .A25 B39 2024<br/>Elektronik Eri&#351;im&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394213986">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394213986</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Principles and applications of blockchain systems : how to overcome the CAP trilemma in consortium blockchain ent://SD_ILS/0/SD_ILS:599650 2026-02-19T15:48:35Z 2026-02-19T15:48:35Z Yazar&#160;Li, Hu, author.&#160;Wang, Han, author.<br/>Yer Numaras&#305;&#160;QA76.9 .B56 L5 2025<br/>Elektronik Eri&#351;im&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394237258">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394237258</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Effective vulnerability management : managing risk in the vulnerable digital ecosystem ent://SD_ILS/0/SD_ILS:599047 2026-02-19T15:48:35Z 2026-02-19T15:48:35Z Yazar&#160;Hughes, Chris (Christopher Matthew), author.&#160;Robinson, Nikki, author.<br/>Yer Numaras&#305;&#160;QA76.9 .A25 H84 2024<br/>Elektronik Eri&#351;im&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394277155">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394277155</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> THE TECHNOLOGY DOESN'T MATTER : prioritizing the people in IT business alignment ent://SD_ILS/0/SD_ILS:598230 2026-02-19T15:48:35Z 2026-02-19T15:48:35Z Yazar&#160;Lockett, Rachel, author.<br/>Yer Numaras&#305;&#160;HF5548.2<br/>Elektronik Eri&#351;im&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394320653">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394320653</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> The CISO evolution : business knowledge for cybersecurity executives ent://SD_ILS/0/SD_ILS:597056 2026-02-19T15:48:35Z 2026-02-19T15:48:35Z Yazar&#160;Sharp, Matthew K., author.&#160;Lambros, Kyriakos P., author.<br/>Yer Numaras&#305;&#160;HD30.2 .S5325 2022<br/>Elektronik Eri&#351;im&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119782513">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119782513</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Executive's guide to cyber risk : securing the future today ent://SD_ILS/0/SD_ILS:597567 2026-02-19T15:48:35Z 2026-02-19T15:48:35Z Yazar&#160;Moyo, Siegfried, author.<br/>Yer Numaras&#305;&#160;HF5548.37 .M68 2022<br/>Elektronik Eri&#351;im&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394320578">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394320578</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Cyber security and network security ent://SD_ILS/0/SD_ILS:597484 2026-02-19T15:48:35Z 2026-02-19T15:48:35Z Yazar&#160;Pramanik, Sabyasachi, editor.&#160;Samanta, Debabrata, 1987- editor.&#160;Vinay, M., editor.&#160;Guha, Abhijit, editor.<br/>Yer Numaras&#305;&#160;QA76.9 .A25<br/>Elektronik Eri&#351;im&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119812555">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119812555</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Building secure cars : assuring the automotive software development lifecycle ent://SD_ILS/0/SD_ILS:596310 2026-02-19T15:48:35Z 2026-02-19T15:48:35Z Yazar&#160;Oka, Dennis Kengo, author.<br/>Yer Numaras&#305;&#160;TL272.53 .O42 2021<br/>Elektronik Eri&#351;im&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119710783">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119710783</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Security issues and privacy concerns in Industry 4.0 applications ent://SD_ILS/0/SD_ILS:596945 2026-02-19T15:48:35Z 2026-02-19T15:48:35Z Yazar&#160;David, Shiblin, author.&#160;Anand, R. S., author.&#160;Jeyakrishnan, V., author.&#160;Niranjanamurthy, M., author.<br/>Yer Numaras&#305;&#160;QA76.9 .A25 D38 2021<br/>Elektronik Eri&#351;im&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119776529">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119776529</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Cyber-vigilance and digital trust : cyber security in the era of cloud computing and IoT ent://SD_ILS/0/SD_ILS:595279 2026-02-19T15:48:35Z 2026-02-19T15:48:35Z Yazar&#160;Tounsi, Wiem, editor.<br/>Yer Numaras&#305;&#160;QA76.9 .A25 C93 2019 EB<br/>Elektronik Eri&#351;im&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119618393">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119618393</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> CompTIA PenTest+ Practice Test : Exam PT0-001 ent://SD_ILS/0/SD_ILS:595329 2026-02-19T15:48:35Z 2026-02-19T15:48:35Z Yazar&#160;Panek, Crystal, author.&#160;Tracy, Robb.<br/>Yer Numaras&#305;&#160;TK5105.59<br/>Elektronik Eri&#351;im&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119575931">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119575931</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Blockchain for distributed systems security ent://SD_ILS/0/SD_ILS:595146 2026-02-19T15:48:35Z 2026-02-19T15:48:35Z Yazar&#160;Shetty, Sachin, editor.&#160;Kamhoua, Charles A., edtior.&#160;Njilla, Laurent L., editor.<br/>Yer Numaras&#305;&#160;QA76.9 .B56 B56 2019 EB<br/>Elektronik Eri&#351;im&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119519621">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119519621</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Cybersecurity blue team toolkit ent://SD_ILS/0/SD_ILS:595209 2026-02-19T15:48:35Z 2026-02-19T15:48:35Z Yazar&#160;Tanner, Nadean H., author.<br/>Yer Numaras&#305;&#160;QA76.9 .A25 T36 2019 EB<br/>Elektronik Eri&#351;im&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119552963">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119552963</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Network forensics ent://SD_ILS/0/SD_ILS:593814 2026-02-19T15:48:35Z 2026-02-19T15:48:35Z Yazar&#160;Messier, Ric, author.<br/>Yer Numaras&#305;&#160;TK5105.59<br/>Elektronik Eri&#351;im&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119329190">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119329190</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/>