Arama Sonuçları Organizations. - Daraltılmış: Security.SirsiDynix Enterprisehttps://katalog.hacettepe.edu.tr/client/tr_TR/default_tr/default_tr/qu$003dOrganizations.$0026qf$003dSUBJECT$002509Subject$002509Security.$002509Security.$0026ic$003dtrue$0026ps$003d300?2026-03-11T01:15:38ZZero Trust Security A Hands-on Guideent://SD_ILS/0/SD_ILS:6003922026-03-11T01:15:38Z2026-03-11T01:15:38ZYazar Jakobsen, Adam Tilmar.<br/>Yer Numarası XX(600392.1)<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394361120">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394361120</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Locked Up Cybersecurity Threat Mitigation Lessons from A Real-World LockBit Ransomware Responseent://SD_ILS/0/SD_ILS:6004132026-03-11T01:15:38Z2026-03-11T01:15:38ZYazar Lewis, Zachary.<br/>Yer Numarası XX(600413.1)<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394357079">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394357079</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Information security and privacy quick reference the essential handbook for every CISO, CSO, and Chief Privacy Officerent://SD_ILS/0/SD_ILS:5999462026-03-11T01:15:38Z2026-03-11T01:15:38ZYazar Chapple, Mike, author. Shelley, Joe. Stewart, James Michael.<br/>Yer Numarası QA76.9 .A25 C43 2025<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394353347">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394353347</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Lessons from the Frontlines : Insights from a Cybersecurity Career.ent://SD_ILS/0/SD_ILS:6004332026-03-11T01:15:38Z2026-03-11T01:15:38ZYazar Keren.<br/>Yer Numarası XX(600433.1)<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394395439">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394395439</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Effective vulnerability management : managing risk in the vulnerable digital ecosystement://SD_ILS/0/SD_ILS:5990472026-03-11T01:15:38Z2026-03-11T01:15:38ZYazar Hughes, Chris (Christopher Matthew), author. Robinson, Nikki, author.<br/>Yer Numarası QA76.9 .A25 H84 2024<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394277155">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394277155</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Cyber Operations : A Case Study Approachent://SD_ILS/0/SD_ILS:5991172026-03-11T01:15:38Z2026-03-11T01:15:38ZYazar Couretas, Jerry M., 1966- author.<br/>Yer Numarası QA76.9 .A25<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119712121">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119712121</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Cybersecurity and local governmentent://SD_ILS/0/SD_ILS:5973922026-03-11T01:15:38Z2026-03-11T01:15:38ZYazar Norris, Donald F., author. Mateczun, Laura, author. Forno, Richard, author.<br/>Yer Numarası JS331 .N67 2022<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119788317">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119788317</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Cyber breach response that actually works : organizational approach to managing residual riskent://SD_ILS/0/SD_ILS:5961172026-03-11T01:15:38Z2026-03-11T01:15:38ZYazar Gorecki, Andrew.<br/>Yer Numarası QA76.9 .A25<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119679349">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119679349</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Tribe of hackers security leaders : tribal knowledge from the best in cybersecurity leadershipent://SD_ILS/0/SD_ILS:5958872026-03-11T01:15:38Z2026-03-11T01:15:38ZYazar Carey, Marcus J. (Cybersecurity professional), author. Jin, Jennifer.<br/>Yer Numarası QA76.9 .A25 C37 2020<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119643784">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119643784</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>IoT security : advances in authenticationent://SD_ILS/0/SD_ILS:5954202026-03-11T01:15:38Z2026-03-11T01:15:38ZYazar Liyanage, Madhusanka, editor. Braeken, An, 1970- editor. Kumar, Pardeep, 1976- editor. Ylianttila, Mika, editor.<br/>Yer Numarası TK5105.8857 .I58 2019<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119527978">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119527978</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>The Digital Big Bang : the Hard Stuff, the Soft Stuff, and the Future of Cybersecurityent://SD_ILS/0/SD_ILS:5954352026-03-11T01:15:38Z2026-03-11T01:15:38ZYazar Quade, Phil.<br/>Yer Numarası QA76.9 .A25<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119617396">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119617396</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>