Arama Sonuçları National security - Daraltılmış: COMPUTERS.SirsiDynix Enterprisehttps://katalog.hacettepe.edu.tr/client/tr_TR/default_tr/default_tr/qu$003dNational$002bsecurity$0026qf$003dSUBJECT$002509Konu$002509COMPUTERS.$002509COMPUTERS.$0026ps$003d300?2026-01-20T23:27:21ZInformation security and privacy quick reference the essential handbook for every CISO, CSO, and Chief Privacy Officerent://SD_ILS/0/SD_ILS:5999462026-01-20T23:27:21Z2026-01-20T23:27:21ZYazar Chapple, Mike, author. Shelley, Joe. Stewart, James Michael.<br/>Yer Numarası QA76.9 .A25 C43 2025<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394353347">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394353347</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Quantum computing in cybersecurityent://SD_ILS/0/SD_ILS:5986852026-01-20T23:27:21Z2026-01-20T23:27:21ZYazar Rawat, Romil, editor.<br/>Yer Numarası QA76.9 .A25 Q83 2023<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394167401">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394167401</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Understanding infrastructure edge computing : concepts, technologies and considerationsent://SD_ILS/0/SD_ILS:5964482026-01-20T23:27:21Z2026-01-20T23:27:21ZYazar Marcham, Alex, author.<br/>Yer Numarası QA76.583 .M37 2021<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119763260">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119763260</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Conflicts, crimes and regulations in cyberspaceent://SD_ILS/0/SD_ILS:5972812026-01-20T23:27:21Z2026-01-20T23:27:21ZYazar Laurent, Sébastien, editor.<br/>Yer Numarası QA76.9 .A25<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119885092">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119885092</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Cybersecurity and decision makers : data security and digital trustent://SD_ILS/0/SD_ILS:5959432026-01-20T23:27:21Z2026-01-20T23:27:21ZYazar Fréminville, Marie de, author.<br/>Yer Numarası HF5548.37 .F74 2020<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119720362">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119720362</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>We have root : even more advice from Schneier on securityent://SD_ILS/0/SD_ILS:5954322026-01-20T23:27:21Z2026-01-20T23:27:21ZYazar Schneier, Bruce, 1963- author.<br/>Yer Numarası QA76.9 .A25 S36 2019<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119653554">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119653554</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Hacking the hacker : learn from the experts who take down hackersent://SD_ILS/0/SD_ILS:5936362026-01-20T23:27:21Z2026-01-20T23:27:21ZYazar Grimes, Roger A., author.<br/>Yer Numarası QA76.9 .A25<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119396260">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119396260</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>