Arama Sonuçları Protection. - Daraltılmış: Computer security.
SirsiDynix Enterprise
https://katalog.hacettepe.edu.tr/client/tr_TR/default_tr/default_tr/qu$003dProtection.$0026qf$003dSUBJECT$002509Konu$002509Computer$002bsecurity.$002509Computer$002bsecurity.$0026ps$003d300$0026isd$003dtrue?
2026-02-20T22:22:52Z
Information protection playbook
ent://SD_ILS/0/SD_ILS:306649
2026-02-20T22:22:52Z
2026-02-20T22:22:52Z
Yazar Kane, Greg, editor of compilation. Koppel, Lorna, editor of compilation.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780124172326">http://www.sciencedirect.com/science/book/9780124172326</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Internet of Things Security and Data Protection
ent://SD_ILS/0/SD_ILS:485847
2026-02-20T22:22:52Z
2026-02-20T22:22:52Z
Yazar Ziegler, Sébastien. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-030-04984-3">https://doi.org/10.1007/978-3-030-04984-3</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Data protection : governance, risk management, and compliance
ent://SD_ILS/0/SD_ILS:543918
2026-02-20T22:22:52Z
2026-02-20T22:22:52Z
Yazar Hill, David G. (David Gary), 1943, author.<br/>Yer Numarası QA76.9 .A25 H52 2009<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9781439806937">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>
Optimum spending on cybersecurity measures : digital privacy and data protection
ent://SD_ILS/0/SD_ILS:574605
2026-02-20T22:22:52Z
2026-02-20T22:22:52Z
Yazar Kissoon, Tara, author.<br/>Yer Numarası HF5548.37<br/>Elektronik Erişim Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003497523">https://www.taylorfrancis.com/books/9781003497523</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
GUARDIANS OF DATA a comprehensive guide to digital data protection.
ent://SD_ILS/0/SD_ILS:554346
2026-02-20T22:22:52Z
2026-02-20T22:22:52Z
Yazar Khidzir, Nik Zulkarnaen. Ahmed, Shekh Abdullah-Al-Musa.<br/>Yer Numarası QA76.9 .A25<br/>Elektronik Erişim Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003604679">https://www.taylorfrancis.com/books/9781003604679</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Optimal spending on cybersecurity measures : digital privacy and data protection
ent://SD_ILS/0/SD_ILS:572623
2026-02-20T22:22:52Z
2026-02-20T22:22:52Z
Yazar Kissoon, Tara, author.<br/>Yer Numarası HF5548.37<br/>Elektronik Erişim Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003507109">https://www.taylorfrancis.com/books/9781003507109</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Protection of electrical power distribution systems : smart grid, microgrid, AI, and cyber security
ent://SD_ILS/0/SD_ILS:600371
2026-02-20T22:22:52Z
2026-02-20T22:22:52Z
Yazar Masood, Tariq, author. Abdo, Jamil, author. Iqbal, Atif, author.<br/>Yer Numarası TK3001 .M37 2026<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394327676">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394327676</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
A practitioner's guide to cybersecurity and data protection : how to ensure client confidentiality
ent://SD_ILS/0/SD_ILS:550244
2026-02-20T22:22:52Z
2026-02-20T22:22:52Z
Yazar Knibbs, Catherine, editor. Hibberd, Gary, editor.<br/>Yer Numarası QA76.9 .A25<br/>Elektronik Erişim Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003364184">https://www.taylorfrancis.com/books/9781003364184</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Women Securing the Future with TIPPSS for IoT Trust, Identity, Privacy, Protection, Safety, Security for the Internet of Things
ent://SD_ILS/0/SD_ILS:484904
2026-02-20T22:22:52Z
2026-02-20T22:22:52Z
Yazar Hudson, Florence D. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-030-15705-0">https://doi.org/10.1007/978-3-030-15705-0</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
ICT Systems Security and Privacy Protection 34th IFIP TC 11 International Conference, SEC 2019, Lisbon, Portugal, June 25-27, 2019, Proceedings
ent://SD_ILS/0/SD_ILS:485997
2026-02-20T22:22:52Z
2026-02-20T22:22:52Z
Yazar Dhillon, Gurpreet. editor. Karlsson, Fredrik. editor. Hedström, Karin. editor. Zúquete, André. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-030-22312-0">https://doi.org/10.1007/978-3-030-22312-0</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Critical Infrastructure Protection XIII 13th IFIP WG 11.10 International Conference, ICCIP 2019, Arlington, VA, USA, March 11–12, 2019, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:486939
2026-02-20T22:22:52Z
2026-02-20T22:22:52Z
Yazar Staggs, Jason. editor. Shenoi, Sujeet. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-030-34647-8">https://doi.org/10.1007/978-3-030-34647-8</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
ICT Systems Security and Privacy Protection 33rd IFIP TC 11 International Conference, SEC 2018, Held at the 24th IFIP World Computer Congress, WCC 2018, Poznan, Poland, September 18-20, 2018, Proceedings
ent://SD_ILS/0/SD_ILS:400045
2026-02-20T22:22:52Z
2026-02-20T22:22:52Z
Yazar Janczewski, Lech Jan. editor. (orcid)0000-0003-3319-924X Kutyłowski, Mirosław. editor. (orcid)0000-0003-3192-2430 SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-319-99828-2">https://doi.org/10.1007/978-3-319-99828-2</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Critical Infrastructure Protection XII 12th IFIP WG 11.10 International Conference, ICCIP 2018, Arlington, VA, USA, March 12-14, 2018, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:400126
2026-02-20T22:22:52Z
2026-02-20T22:22:52Z
Yazar Staggs, Jason. editor. Shenoi, Sujeet. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-030-04537-1">https://doi.org/10.1007/978-3-030-04537-1</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Advanced persistent security : a cyberwarfare approach to implementing adaptive enterprise protection, detection, and reaction strategies
ent://SD_ILS/0/SD_ILS:459204
2026-02-20T22:22:52Z
2026-02-20T22:22:52Z
Yazar Winkler, Ira, author. Gomes, Araceli Treu, author. Shackleford, Dave, editor.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="https://www.sciencedirect.com/science/book/9780128093160">https://www.sciencedirect.com/science/book/9780128093160</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Cyber and electromagnetic threats in modern relay protection
ent://SD_ILS/0/SD_ILS:543446
2026-02-20T22:22:52Z
2026-02-20T22:22:52Z
Yazar Gurevich, Vladimir, 1956, author.<br/>Yer Numarası TK2861 .G87 2015<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9781482264326">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>
ICT Systems Security and Privacy Protection 29th IFIP TC 11 International Conference, SEC 2014, Marrakech, Morocco, June 2-4, 2014, Proceedings
ent://SD_ILS/0/SD_ILS:489201
2026-02-20T22:22:52Z
2026-02-20T22:22:52Z
Yazar Cuppens-Boulahia, Nora. editor. Cuppens, Frederic. editor. Jajodia, Sushil. editor. Abou El Kalam, Anas. editor. Sans, Thierry. editor.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-642-55415-5">https://doi.org/10.1007/978-3-642-55415-5</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Critical Infrastructure Protection VIII 8th IFIP WG 11.10 International Conference, ICCIP 2014, Arlington, VA, USA, March 17-19, 2014, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:489496
2026-02-20T22:22:52Z
2026-02-20T22:22:52Z
Yazar Butts, Jonathan. editor. Shenoi, Sujeet. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-662-45355-1">https://doi.org/10.1007/978-3-662-45355-1</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Building effective privacy programs : cybersecurity from principles to practice
ent://SD_ILS/0/SD_ILS:600111
2026-02-20T22:22:52Z
2026-02-20T22:22:52Z
Yazar Edwards, Jason (Cybersecurity expert), author. Weaver, Griffin, author. John Wiley & Sons, publisher.<br/>Yer Numarası QA76.9 .P735 E34 2026<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394342662">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394342662</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Optimal spending on cybersecurity measures : AI and governance
ent://SD_ILS/0/SD_ILS:584311
2026-02-20T22:22:52Z
2026-02-20T22:22:52Z
Yazar Kissoon, Tara, author.<br/>Yer Numarası HF5548.37 .K57 2025 EB<br/>Elektronik Erişim Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003587569">https://www.taylorfrancis.com/books/9781003587569</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Optimal spending on cybersecurity measures : third party risk management
ent://SD_ILS/0/SD_ILS:584312
2026-02-20T22:22:52Z
2026-02-20T22:22:52Z
Yazar Kissoon, Tara, author.<br/>Yer Numarası HF5548.37 .K57 2025 EB<br/>Elektronik Erişim Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003587576">https://www.taylorfrancis.com/books/9781003587576</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
The cybersecurity control playbook : from fundamentals to advanced strategies
ent://SD_ILS/0/SD_ILS:599789
2026-02-20T22:22:52Z
2026-02-20T22:22:52Z
Yazar Edwards, Jason (Cybersecurity expert), author. John Wiley & Sons, publisher.<br/>Yer Numarası QA76.9 .A25 E3884 2025<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394331888">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394331888</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
The techno-legal dynamics of cyber crimes in Industry 5.0
ent://SD_ILS/0/SD_ILS:599801
2026-02-20T22:22:52Z
2026-02-20T22:22:52Z
Yazar Kaur, Gagandeep, editor Choudhury, Tanupriya editor Balamurugan, S. editor<br/>Yer Numarası QA76.9 .A25<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394242177">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394242177</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Information security and privacy quick reference the essential handbook for every CISO, CSO, and Chief Privacy Officer
ent://SD_ILS/0/SD_ILS:599946
2026-02-20T22:22:52Z
2026-02-20T22:22:52Z
Yazar Chapple, Mike, author. Shelley, Joe. Stewart, James Michael.<br/>Yer Numarası QA76.9 .A25 C43 2025<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394353347">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394353347</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Open-source security operations center (SOC) : a complete guide to establishing, managing, and maintaining a modern SOC
ent://SD_ILS/0/SD_ILS:599434
2026-02-20T22:22:52Z
2026-02-20T22:22:52Z
Yazar Basta, Alfred, author. Basta, Nadine, author. Anwar, Waqar, author. Essar, Mohammad Ilyas, author. John Wiley & Sons, publisher.<br/>Yer Numarası QA76.9 .A25<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394201631">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394201631</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Digital twins and cybersecurity : safeguarding the future of connected systems
ent://SD_ILS/0/SD_ILS:599615
2026-02-20T22:22:52Z
2026-02-20T22:22:52Z
Yazar Naveen, Palanichamy, author. Maheswar, R., author. Ragupathy, U.S., author.<br/>Yer Numarası QA76.9 .C65 N38 2025<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394272501">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394272501</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Next-generation systems and secure computing
ent://SD_ILS/0/SD_ILS:599779
2026-02-20T22:22:52Z
2026-02-20T22:22:52Z
Yazar Barman, Subhabrata, editor. Koley, Santanu, editor. Joardar, Subhankar, editor.<br/>Yer Numarası QA76.9 .A25 N49 2025<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394228522">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394228522</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Cyber defense : best practices for digital safety
ent://SD_ILS/0/SD_ILS:600003
2026-02-20T22:22:52Z
2026-02-20T22:22:52Z
Yazar Edwards, Jason, author.<br/>Yer Numarası QA76.9 .A25 E39 2025<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394337040">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394337040</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Why CISOs fail
ent://SD_ILS/0/SD_ILS:577207
2026-02-20T22:22:52Z
2026-02-20T22:22:52Z
Yazar Engel, Barak, author.<br/>Yer Numarası HD30.2<br/>Elektronik Erişim Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003302759">https://www.taylorfrancis.com/books/9781003302759</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Cryptography : algorithms, protocols, and standards for computer security
ent://SD_ILS/0/SD_ILS:598914
2026-02-20T22:22:52Z
2026-02-20T22:22:52Z
Yazar Mammeri, Zoubir, author.<br/>Yer Numarası QA268 .M34 2024<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394207510">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394207510</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Artificial intelligence technology in healthcare : security and privacy issues
ent://SD_ILS/0/SD_ILS:574411
2026-02-20T22:22:52Z
2026-02-20T22:22:52Z
Yazar Sharma, Neha (Computer scientist), editor. Srivastava, Durgesh (Computer scientist), editor. Sinwar, Deepak, editor.<br/>Yer Numarası R859.7 .A78<br/>Elektronik Erişim Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003377818">https://www.taylorfrancis.com/books/9781003377818</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Optimal spending on cybersecurity measures : risk management
ent://SD_ILS/0/SD_ILS:586024
2026-02-20T22:22:52Z
2026-02-20T22:22:52Z
Yazar Kissoon, Tara, author.<br/>Yer Numarası HF5548.37<br/>Elektronik Erişim Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003404354">https://www.taylorfrancis.com/books/9781003404354</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Privacy in practice : establish and operationalize a holistic data privacy program
ent://SD_ILS/0/SD_ILS:560699
2026-02-20T22:22:52Z
2026-02-20T22:22:52Z
Yazar Tang, Alan, (Information Security), author.<br/>Yer Numarası HF5548.37<br/>Elektronik Erişim Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003225089">https://www.taylorfrancis.com/books/9781003225089</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Software security : concepts & practices
ent://SD_ILS/0/SD_ILS:570473
2026-02-20T22:22:52Z
2026-02-20T22:22:52Z
Yazar Khan, Suhel Ahmad, author. Kumar, Rajeev, author. Khan, R. A. (Raees Ahmad), author.<br/>Yer Numarası QA76.76 .D47<br/>Elektronik Erişim Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003330516">https://www.taylorfrancis.com/books/9781003330516</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
A’dan Z’ye siber güvenlik
ent://SD_ILS/0/SD_ILS:524303
2026-02-20T22:22:52Z
2026-02-20T22:22:52Z
Yazar Polat, A. Can. Karakaş, Burak.<br/>Yer Numarası QA76.9 P65 2023<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>
Quantum computing in cybersecurity
ent://SD_ILS/0/SD_ILS:598685
2026-02-20T22:22:52Z
2026-02-20T22:22:52Z
Yazar Rawat, Romil, editor.<br/>Yer Numarası QA76.9 .A25 Q83 2023<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394167401">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394167401</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
The Security Hippie.
ent://SD_ILS/0/SD_ILS:587563
2026-02-20T22:22:52Z
2026-02-20T22:22:52Z
Yazar Engel, Barak.<br/>Yer Numarası HD30.2<br/>Elektronik Erişim Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003133308">https://www.taylorfrancis.com/books/9781003133308</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Optimal spending on cybersecurity measures : risk management
ent://SD_ILS/0/SD_ILS:553885
2026-02-20T22:22:52Z
2026-02-20T22:22:52Z
Yazar Kissoon, Tara, author.<br/>Yer Numarası HF5548.37 .K57 2022<br/>Elektronik Erişim Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003200895">https://www.taylorfrancis.com/books/9781003200895</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Cybersecurity for coaches and therapists : a practical guide for protecting client data
ent://SD_ILS/0/SD_ILS:588664
2026-02-20T22:22:52Z
2026-02-20T22:22:52Z
Yazar Fouracres, Alexandra J. S., author.<br/>Yer Numarası RC455.2 .M38 F88 2022 EB<br/>Elektronik Erişim Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003184805">https://www.taylorfrancis.com/books/9781003184805</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Intelligent security systems : how artificial intelligence, machine learning and data science work for and against computer security
ent://SD_ILS/0/SD_ILS:597085
2026-02-20T22:22:52Z
2026-02-20T22:22:52Z
Yazar Reznik, Leonid, 1955- author.<br/>Yer Numarası QA76.9 .A25 R438 2022<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119771579">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119771579</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Cyber security and digital forensics
ent://SD_ILS/0/SD_ILS:597326
2026-02-20T22:22:52Z
2026-02-20T22:22:52Z
Yazar Ghonge, Mangesh, 1984- editor.<br/>Yer Numarası QA76.9 .A25<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119795667">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119795667</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Executive's guide to cyber risk : securing the future today
ent://SD_ILS/0/SD_ILS:597567
2026-02-20T22:22:52Z
2026-02-20T22:22:52Z
Yazar Moyo, Siegfried, author.<br/>Yer Numarası HF5548.37 .M68 2022<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394320578">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394320578</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
The CISO evolution : business knowledge for cybersecurity executives
ent://SD_ILS/0/SD_ILS:597056
2026-02-20T22:22:52Z
2026-02-20T22:22:52Z
Yazar Sharp, Matthew K., author. Lambros, Kyriakos P., author.<br/>Yer Numarası HD30.2 .S5325 2022<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119782513">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119782513</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Cybersecurity in smart homes : architectures, solutions and technologies
ent://SD_ILS/0/SD_ILS:597626
2026-02-20T22:22:52Z
2026-02-20T22:22:52Z
Yazar Khatoun, Rida, author.<br/>Yer Numarası QA76.9 .A25<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119987451">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119987451</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Trust-based communication systems for internet of things applications
ent://SD_ILS/0/SD_ILS:597744
2026-02-20T22:22:52Z
2026-02-20T22:22:52Z
Yazar Madaan, Vishu, editor. Agrawal, Prateek, editor. Sharma, Anand, editor. Sharma, Dilip Kumar, editor. Agrawal, Akshat, 1986- editor.<br/>Yer Numarası TK5105.8857<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119896746">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119896746</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
It's your digital life
ent://SD_ILS/0/SD_ILS:565418
2026-02-20T22:22:52Z
2026-02-20T22:22:52Z
Yazar Govindarajulu, Giri, author. Ramaswami, Shyam Sundar, author. Vasudevan, Shriram K., author.<br/>Yer Numarası QA76.9 .A25<br/>Elektronik Erişim Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003144199">https://www.taylorfrancis.com/books/9781003144199</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
IT GOVERNANCE AND INFORMATION SECURITY : guides, standards and frameworks.
ent://SD_ILS/0/SD_ILS:549396
2026-02-20T22:22:52Z
2026-02-20T22:22:52Z
Yazar Maleh, Yassine, 1987- Sahid, Abdelkebir, 1983- Alazab, Mamoun, 1980- Belaissaoui, Mustapha, 1968-<br/>Yer Numarası ONLINE<br/>Elektronik Erişim Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003161998">https://www.taylorfrancis.com/books/9781003161998</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
The security risk assessment handbook : a complete guide for performing security risk assessments
ent://SD_ILS/0/SD_ILS:549829
2026-02-20T22:22:52Z
2026-02-20T22:22:52Z
Yazar Landoll, Douglas J., author.<br/>Yer Numarası HF5548.37 .L358 2021 EB<br/>Elektronik Erişim Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003090441">https://www.taylorfrancis.com/books/9781003090441</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Security issues and privacy concerns in Industry 4.0 applications
ent://SD_ILS/0/SD_ILS:596945
2026-02-20T22:22:52Z
2026-02-20T22:22:52Z
Yazar David, Shiblin, author. Anand, R. S., author. Jeyakrishnan, V., author. Niranjanamurthy, M., author.<br/>Yer Numarası QA76.9 .A25 D38 2021<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119776529">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119776529</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Artificial intelligence and data mining approaches in security frameworks
ent://SD_ILS/0/SD_ILS:596957
2026-02-20T22:22:52Z
2026-02-20T22:22:52Z
Yazar Bhargava, Neeraj. Bhargava, Ritu. Rathore, Pramod Singh, 1988- Agrawal, Rashmi, 1978-<br/>Yer Numarası Q335<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119760429">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119760429</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
IT GOVERNANCE AND INFORMATION SECURITY : guides, standards and frameworks.
ent://SD_ILS/0/SD_ILS:567328
2026-02-20T22:22:52Z
2026-02-20T22:22:52Z
Yazar Maleh, Yassine, 1987- Sahid, Abdelkebir, 1983- Alazab, Mamoun, 1980- Belaissaoui, Mustapha, 1968-<br/>Yer Numarası QA76.9 .A25<br/>Elektronik Erişim Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003161998">https://www.taylorfrancis.com/books/9781003161998</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Cloud computing security foundations and challenges
ent://SD_ILS/0/SD_ILS:580601
2026-02-20T22:22:52Z
2026-02-20T22:22:52Z
Yazar Vacca, John R., editor.<br/>Yer Numarası QA76.585<br/>Elektronik Erişim Taylor & Francis <a href="https://www.taylorfrancis.com/books/9780429055126">https://www.taylorfrancis.com/books/9780429055126</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Privacy, regulations, and cybersecurity : the essential business guide
ent://SD_ILS/0/SD_ILS:596472
2026-02-20T22:22:52Z
2026-02-20T22:22:52Z
Yazar Moschovitis, Christos J. P., author.<br/>Yer Numarası HD61.5 .M675 2021 EB<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119660156">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119660156</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Cybersecurity and decision makers : data security and digital trust
ent://SD_ILS/0/SD_ILS:595943
2026-02-20T22:22:52Z
2026-02-20T22:22:52Z
Yazar Fréminville, Marie de, author.<br/>Yer Numarası HF5548.37 .F74 2020<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119720362">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119720362</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Cybersecurity in humanities and social sciences : a research methods approach
ent://SD_ILS/0/SD_ILS:596373
2026-02-20T22:22:52Z
2026-02-20T22:22:52Z
Yazar Loiseau, Hugo, editor. Ventre, Daniel, editor. Aden, Hartmut, editor.<br/>Yer Numarası QA76.9 .A25<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119777588">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119777588</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Tribe of hackers : cybersecurity advice from the best hackers in the world
ent://SD_ILS/0/SD_ILS:595418
2026-02-20T22:22:52Z
2026-02-20T22:22:52Z
Yazar Carey, Marcus J. (Cybersecurity professional), author. Jin, Jennifer, author.<br/>Yer Numarası QA76.9 .A25 C37 2019 EB<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119643395">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119643395</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Resilience of Cyber-Physical Systems From Risk Modelling to Threat Counteraction
ent://SD_ILS/0/SD_ILS:483593
2026-02-20T22:22:52Z
2026-02-20T22:22:52Z
Yazar Flammini, Francesco. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-319-95597-1">https://doi.org/10.1007/978-3-319-95597-1</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Frontiers in Cyber Security Second International Conference, FCS 2019, Xi'an, China, November 15–17, 2019, Proceedings
ent://SD_ILS/0/SD_ILS:486019
2026-02-20T22:22:52Z
2026-02-20T22:22:52Z
Yazar Shen, Bazhong. editor. Wang, Baocang. editor. (orcid)0000-0002-2554-4464 Han, Jinguang. editor. (orcid)0000-0002-4993-9452 Yu, Yong. editor. (orcid)0000-0003-0667-077X SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-981-15-0818-9">https://doi.org/10.1007/978-981-15-0818-9</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Global cyber security labor shortage and international business risk
ent://SD_ILS/0/SD_ILS:481810
2026-02-20T22:22:52Z
2026-02-20T22:22:52Z
Yazar Christiansen, Bryan, 1960- editor. Piekarz, Agnieszka, 1990- editor. IGI Global, publisher.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-5927-6">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-5927-6</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Advanced methodologies and technologies in system security, information privacy, and forensics
ent://SD_ILS/0/SD_ILS:482009
2026-02-20T22:22:52Z
2026-02-20T22:22:52Z
Yazar Khosrow-Pour, Mehdi, 1951- editor. IGI Global, publisher.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-7492-7">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-7492-7</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Cyber law, privacy, and security : concepts, methodologies, tools, and applications
ent://SD_ILS/0/SD_ILS:482239
2026-02-20T22:22:52Z
2026-02-20T22:22:52Z
Yazar IGI Global, publisher. Information Resources Management Association, editor.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-8897-9">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-8897-9</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Applications and Techniques in Information Security 10th International Conference, ATIS 2019, Thanjavur, India, November 22–24, 2019, Proceedings
ent://SD_ILS/0/SD_ILS:483576
2026-02-20T22:22:52Z
2026-02-20T22:22:52Z
Yazar Shankar Sriram, V. S. editor. (orcid)0000-0001-7870-7944 Subramaniyaswamy, V. editor. Sasikaladevi, N. editor. (orcid)0000-0002-0841-502X Zhang, Leo. editor. Batten, Lynn. editor. (orcid)0000-0003-4525-2423<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-981-15-0871-4">https://doi.org/10.1007/978-981-15-0871-4</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Network security and its impact on business strategy
ent://SD_ILS/0/SD_ILS:482213
2026-02-20T22:22:52Z
2026-02-20T22:22:52Z
Yazar Oncioiu, Ionica, 1972- editor. IGI Global, publisher.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-8455-1">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-8455-1</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Information Security Practice and Experience 15th International Conference, ISPEC 2019, Kuala Lumpur, Malaysia, November 26–28, 2019, Proceedings
ent://SD_ILS/0/SD_ILS:483099
2026-02-20T22:22:52Z
2026-02-20T22:22:52Z
Yazar Heng, Swee-Huay. editor. (orcid)0000-0003-3627-2131 Lopez, Javier. editor. (orcid)0000-0001-8066-9991 SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-030-34339-2">https://doi.org/10.1007/978-3-030-34339-2</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Critical Infrastructure Security and Resilience Theories, Methods, Tools and Technologies
ent://SD_ILS/0/SD_ILS:484275
2026-02-20T22:22:52Z
2026-02-20T22:22:52Z
Yazar Gritzalis, Dimitris. editor. Theocharidou, Marianthi. editor. (orcid)0000-0002-8870-1746 Stergiopoulos, George. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-030-00024-0">https://doi.org/10.1007/978-3-030-00024-0</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Cyber security in parallel and distributed computing : concepts, techniques, applications and case studies
ent://SD_ILS/0/SD_ILS:595099
2026-02-20T22:22:52Z
2026-02-20T22:22:52Z
Yazar Le, Dac-Nhuong, 1983- editor. Kumar, Raghvendra, 1987- editor. Mishra, Brojo Kishore, 1979- editor. Khari, Manju, editor. Chatterjee, Jyotir Moy, editor.<br/>Yer Numarası QA76.9 .A25<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119488330">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119488330</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Cybersecurity blue team toolkit
ent://SD_ILS/0/SD_ILS:595209
2026-02-20T22:22:52Z
2026-02-20T22:22:52Z
Yazar Tanner, Nadean H., author.<br/>Yer Numarası QA76.9 .A25 T36 2019 EB<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119552963">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119552963</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Versatile Cybersecurity
ent://SD_ILS/0/SD_ILS:399974
2026-02-20T22:22:52Z
2026-02-20T22:22:52Z
Yazar Conti, Mauro. editor. (orcid)0000-0002-3612-1934 Somani, Gaurav. editor. Poovendran, Radha. editor. (orcid)0000-0003-0269-8097 SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-319-97643-3">https://doi.org/10.1007/978-3-319-97643-3</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Introductory Computer Forensics A Hands-on Practical Approach
ent://SD_ILS/0/SD_ILS:398966
2026-02-20T22:22:52Z
2026-02-20T22:22:52Z
Yazar Lin, Xiaodong. author. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-030-00581-8">https://doi.org/10.1007/978-3-030-00581-8</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Introduction to Security Reduction
ent://SD_ILS/0/SD_ILS:399211
2026-02-20T22:22:52Z
2026-02-20T22:22:52Z
Yazar Guo, Fuchun. author. Susilo, Willy. author. (orcid)0000-0002-1562-5105 Mu, Yi. author. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-319-93049-7">https://doi.org/10.1007/978-3-319-93049-7</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Honeypot Frameworks and Their Applications: A New Framework
ent://SD_ILS/0/SD_ILS:399250
2026-02-20T22:22:52Z
2026-02-20T22:22:52Z
Yazar NG, Chee Keong. author. Pan, Lei. author. Xiang, Yang. author. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-981-10-7739-5">https://doi.org/10.1007/978-981-10-7739-5</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Research and Practical Issues of Enterprise Information Systems 12th IFIP WG 8.9 Working Conference, CONFENIS 2018, Held at the 24th IFIP World Computer Congress, WCC 2018, Poznan, Poland, September 18–19, 2018, Proceedings
ent://SD_ILS/0/SD_ILS:399694
2026-02-20T22:22:52Z
2026-02-20T22:22:52Z
Yazar Tjoa, A Min. editor. (orcid)0000-0002-8295-9252 Raffai, Maria. editor. (orcid)0000-0001-6934-6366 Doucek, Petr. editor. (orcid)0000-0002-5647-661X Novak, Niina Maarit. editor. (orcid)0000-0003-4352-7534 SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-319-99040-8">https://doi.org/10.1007/978-3-319-99040-8</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Security and Privacy in Communication Networks SecureComm 2017 International Workshops, ATCS and SePrIoT, Niagara Falls, ON, Canada, October 22–25, 2017, Proceedings
ent://SD_ILS/0/SD_ILS:400846
2026-02-20T22:22:52Z
2026-02-20T22:22:52Z
Yazar Lin, Xiaodong. editor. Ghorbani, Ali. editor. Ren, Kui. editor. Zhu, Sencun. editor. Zhang, Aiqing. editor.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-319-78816-6">https://doi.org/10.1007/978-3-319-78816-6</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Security and Privacy in Communication Networks 13th International Conference, SecureComm 2017, Niagara Falls, ON, Canada, October 22–25, 2017, Proceedings
ent://SD_ILS/0/SD_ILS:400949
2026-02-20T22:22:52Z
2026-02-20T22:22:52Z
Yazar Lin, Xiaodong. editor. Ghorbani, Ali. editor. Ren, Kui. editor. Zhu, Sencun. editor. Zhang, Aiqing. editor.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-319-78813-5">https://doi.org/10.1007/978-3-319-78813-5</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Trust Management XII 12th IFIP WG 11.11 International Conference, IFIPTM 2018, Toronto, ON, Canada, July 10–13, 2018, Proceedings
ent://SD_ILS/0/SD_ILS:402007
2026-02-20T22:22:52Z
2026-02-20T22:22:52Z
Yazar Gal-Oz, Nurit. editor. Lewis, Peter R. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-319-95276-5">https://doi.org/10.1007/978-3-319-95276-5</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Foundations and Practice of Security 10th International Symposium, FPS 2017, Nancy, France, October 23-25, 2017, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:402017
2026-02-20T22:22:52Z
2026-02-20T22:22:52Z
Yazar Imine, Abdessamad. editor. Fernandez, José M. editor. (orcid)0000-0001-9836-3595 Marion, Jean-Yves. editor. Logrippo, Luigi. editor. (orcid)0000-0001-8804-0450 Garcia-Alfaro, Joaquin. editor. (orcid)0000-0002-7453-4393<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-319-75650-9">https://doi.org/10.1007/978-3-319-75650-9</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Advanced Hybrid Information Processing First International Conference, ADHIP 2017, Harbin, China, July 17–18, 2017, Proceedings
ent://SD_ILS/0/SD_ILS:402205
2026-02-20T22:22:52Z
2026-02-20T22:22:52Z
Yazar Sun, Guanglu. editor. Liu, Shuai. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-319-73317-3">https://doi.org/10.1007/978-3-319-73317-3</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Cloud Computing, Security, Privacy in New Computing Environments 7th International Conference, CloudComp 2016, and First International Conference, SPNCE 2016, Guangzhou, China, November 25–26, and December 15–16, 2016, Proceedings
ent://SD_ILS/0/SD_ILS:400508
2026-02-20T22:22:52Z
2026-02-20T22:22:52Z
Yazar Wan, Jiafu. editor. Lin, Kai. editor. Zeng, Delu. editor. Li, Jin. editor. Xiang, Yang. editor.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-319-69605-8">https://doi.org/10.1007/978-3-319-69605-8</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Advanced Monitoring in P2P Botnets A Dual Perspective
ent://SD_ILS/0/SD_ILS:400767
2026-02-20T22:22:52Z
2026-02-20T22:22:52Z
Yazar Karuppayah, Shankar. author. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-981-10-9050-9">https://doi.org/10.1007/978-981-10-9050-9</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Mobile Internet Security First International Symposium, MobiSec 2016, Taichung, Taiwan, July 14-15, 2016, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:401000
2026-02-20T22:22:52Z
2026-02-20T22:22:52Z
Yazar You, Ilsun. editor. Leu, Fang-Yie. editor. Chen, Hsing-Chung. editor. Kotenko, Igor. editor. (orcid)0000-0001-6859-7120 SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-981-10-7850-7">https://doi.org/10.1007/978-981-10-7850-7</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Privacy and Identity Management. The Smart Revolution 12th IFIP WG 9.2, 9.5, 9.6/11.7, 11.6/SIG 9.2.2 International Summer School, Ispra, Italy, September 4-8, 2017, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:401491
2026-02-20T22:22:52Z
2026-02-20T22:22:52Z
Yazar Hansen, Marit. editor. Kosta, Eleni. editor. Nai-Fovino, Igor. editor. Fischer-Hübner, Simone. editor. (orcid)0000-0002-6938-4466 SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-319-92925-5">https://doi.org/10.1007/978-3-319-92925-5</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Future Network Systems and Security 4th International Conference, FNSS 2018, Paris, France, July 9–11, 2018, Proceedings
ent://SD_ILS/0/SD_ILS:401734
2026-02-20T22:22:52Z
2026-02-20T22:22:52Z
Yazar Doss, Robin. editor. (orcid)0000-0001-6143-6850 Piramuthu, Selwyn. editor. Zhou, Wei. editor. (orcid)0000-0002-9965-9870 SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-319-94421-0">https://doi.org/10.1007/978-3-319-94421-0</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Big Data Technologies for Monitoring of Computer Security: A Case Study of the Russian Federation
ent://SD_ILS/0/SD_ILS:401907
2026-02-20T22:22:52Z
2026-02-20T22:22:52Z
Yazar Petrenko, Sergei. author. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-319-79036-7">https://doi.org/10.1007/978-3-319-79036-7</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Digital Forensics and Cyber Crime 9th International Conference, ICDF2C 2017, Prague, Czech Republic, October 9-11, 2017, Proceedings
ent://SD_ILS/0/SD_ILS:401948
2026-02-20T22:22:52Z
2026-02-20T22:22:52Z
Yazar Matoušek, Petr. editor. Schmiedecker, Martin. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-319-73697-6">https://doi.org/10.1007/978-3-319-73697-6</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Network Intrusion Detection using Deep Learning A Feature Learning Approach
ent://SD_ILS/0/SD_ILS:399859
2026-02-20T22:22:52Z
2026-02-20T22:22:52Z
Yazar Kim, Kwangjo. author. Aminanto, Muhamad Erza. author. Tanuwidjaja, Harry Chandra. author. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-981-13-1444-5">https://doi.org/10.1007/978-981-13-1444-5</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Information security fundamentals
ent://SD_ILS/0/SD_ILS:539922
2026-02-20T22:22:52Z
2026-02-20T22:22:52Z
Yazar Peltier, Thomas R.<br/>Yer Numarası QA76.9 .A25<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9780429130281">Taylor & Francis eBooks</a>
Taylor & Francis <a href="https://www.taylorfrancis.com/books/9780429130281">https://www.taylorfrancis.com/books/9780429130281</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Unauthorized Access : The Crisis in Online Privacy and Security.
ent://SD_ILS/0/SD_ILS:543688
2026-02-20T22:22:52Z
2026-02-20T22:22:52Z
Yazar Sloan, Robert, author. CRC Press LLC.<br/>Yer Numarası TK5105.878 .S59 2017<br/>Elektronik Erişim Taylor & Francis <a href="https://www.taylorfrancis.com/books/9780429093791">https://www.taylorfrancis.com/books/9780429093791</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
SECURITY STRATEGY : from requirements to reality.
ent://SD_ILS/0/SD_ILS:545098
2026-02-20T22:22:52Z
2026-02-20T22:22:52Z
Yazar STACKPOLE, BILL.<br/>Yer Numarası QA76.9 .A25<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9780429152160">Taylor & Francis eBooks</a>
Taylor & Francis <a href="https://www.taylorfrancis.com/books/9780429152160">https://www.taylorfrancis.com/books/9780429152160</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
DNS security management
ent://SD_ILS/0/SD_ILS:593802
2026-02-20T22:22:52Z
2026-02-20T22:22:52Z
Yazar Dooley, Michael, 1962- author. Rooney, Timothy, 1962- author.<br/>Yer Numarası QA76.9 .A25<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119328292">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119328292</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Mobile data loss : threats and countermeasures
ent://SD_ILS/0/SD_ILS:458729
2026-02-20T22:22:52Z
2026-02-20T22:22:52Z
Yazar Raggo, Michael T.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="https://www.sciencedirect.com/science/book/9780128028643">https://www.sciencedirect.com/science/book/9780128028643</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Hardware security : design, threats, and safeguards
ent://SD_ILS/0/SD_ILS:543620
2026-02-20T22:22:52Z
2026-02-20T22:22:52Z
Yazar Mukhopadhyay, Debdeep, author. Subhra, Rajat, author.<br/>Yer Numarası QA76.9 .A25 M85 2015<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9781439895849">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>
Measuring and managing information risk : a FAIR approach
ent://SD_ILS/0/SD_ILS:355576
2026-02-20T22:22:52Z
2026-02-20T22:22:52Z
Yazar Freund, Jack, author. Jones, Jack, author.<br/>Yer Numarası ONLINE(355576.1)<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780124202313">http://www.sciencedirect.com/science/book/9780124202313</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Security without obscurity : a guide to confidentiality, authentication, and integrity
ent://SD_ILS/0/SD_ILS:544118
2026-02-20T22:22:52Z
2026-02-20T22:22:52Z
Yazar Stapleton, Jeffrey James, author.<br/>Yer Numarası QA76.9 .A25 S734 2014<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9781466592155">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>
PRAGMATIC security metrics : applying metametrics to information security
ent://SD_ILS/0/SD_ILS:541797
2026-02-20T22:22:52Z
2026-02-20T22:22:52Z
Yazar Brotby, W. Krag., author. Hinson, Gary. Kabay, Michel E.<br/>Yer Numarası HD30.38 .B76 2013<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9781439881538">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>
Information security policy development for compliance : ISO/IEC 27001, NIST SP 800-53, HIPAA standard, PCI DSS V2.0, and AUP V5.0
ent://SD_ILS/0/SD_ILS:545128
2026-02-20T22:22:52Z
2026-02-20T22:22:52Z
Yazar Williams, Barry L., author.<br/>Yer Numarası QA76.9 .A25 .W5495 2013<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9781466580596">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>
The complete guide to physical security
ent://SD_ILS/0/SD_ILS:545960
2026-02-20T22:22:52Z
2026-02-20T22:22:52Z
Yazar Baker, Paul, 1958, author. Benny, Daniel J.<br/>Yer Numarası HV8290 .B34 2013<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9781420099645">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>
The complete book of data anonymization : from planning to implementation
ent://SD_ILS/0/SD_ILS:540169
2026-02-20T22:22:52Z
2026-02-20T22:22:52Z
Yazar Raghunathan, Balaji., author.<br/>Yer Numarası QA76.9 .A25 R338 2013<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9781439877319">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>
Data hiding exposing concealed data in multimedia, operating systems, mobile devices and network protocols
ent://SD_ILS/0/SD_ILS:147602
2026-02-20T22:22:52Z
2026-02-20T22:22:52Z
Yazar Raggo, Michael T. Hosmer, Chet.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597497435">http://www.sciencedirect.com/science/book/9781597497435</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Security de-engineering : solving the problems in information risk management
ent://SD_ILS/0/SD_ILS:545608
2026-02-20T22:22:52Z
2026-02-20T22:22:52Z
Yazar Tibble, Ian., author.<br/>Yer Numarası HF5548.37 .T53 2011<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9781439868355">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>
Security information and event management (SIEM) implementation
ent://SD_ILS/0/SD_ILS:293279
2026-02-20T22:22:52Z
2026-02-20T22:22:52Z
Yazar Miller, David, 1959 Nov. 5- Harris, Shon. Harper, Allen. VanDyke, Stephen. Blask, Chris.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://mhebooklibrary.com/reader/security-information-event-management-siem-implementation">Subscription required</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
The security risk assessment handbook : a complete guide for performing security risk assessments
ent://SD_ILS/0/SD_ILS:539743
2026-02-20T22:22:52Z
2026-02-20T22:22:52Z
Yazar Landoll, Douglas J., author.<br/>Yer Numarası HF5548.37 .L358 2011<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9781439821497">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>
Security and policy driven computing
ent://SD_ILS/0/SD_ILS:539761
2026-02-20T22:22:52Z
2026-02-20T22:22:52Z
Yazar Liu, Lei, 1968, author.<br/>Yer Numarası QA76.9 .A25 L587 2011<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9781439825808">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>
Engineering information security the application of systems engineering concepts to achieve information assurance
ent://SD_ILS/0/SD_ILS:249916
2026-02-20T22:22:52Z
2026-02-20T22:22:52Z
Yazar Jacobs, Stuart.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim IEEE Xplore <a href="http://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=6047604">http://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=6047604</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Security in computing
ent://SD_ILS/0/SD_ILS:313297
2026-02-20T22:22:52Z
2026-02-20T22:22:52Z
Yazar Pfleeger, Charles P., 1948-<br/>Yer Numarası QA76.9 A25 P45 2011<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>
Oracle Fusion middleware 11g architecture and management
ent://SD_ILS/0/SD_ILS:293252
2026-02-20T22:22:52Z
2026-02-20T22:22:52Z
Yazar Shafii, Reza. Lee, Stephen, 1975 June 8- Konduri, Gangadhar.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://mhebooklibrary.com/reader/oracle-fusion-middleware-11g-architecture-management">Subscription required</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
IT auditing using controls to protect information assets
ent://SD_ILS/0/SD_ILS:293262
2026-02-20T22:22:52Z
2026-02-20T22:22:52Z
Yazar Davis, Chris (Christopher Michael) Schiller, Mike. Wheeler, Kevin.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://mhebooklibrary.com/reader/auditing-using-controls-to-protect-information-assets-2nd-edition">Subscription required</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Information technology risk management in enterprise environments a review of industry practices and a practical guide to risk management teams
ent://SD_ILS/0/SD_ILS:297862
2026-02-20T22:22:52Z
2026-02-20T22:22:52Z
Yazar Kouns, Jake. Minoli, Daniel, 1952- Wiley InterScience (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim John Wiley <a href="http://dx.doi.org/10.1002/9780470558133">http://dx.doi.org/10.1002/9780470558133</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
The executive MBA in information security
ent://SD_ILS/0/SD_ILS:539948
2026-02-20T22:22:52Z
2026-02-20T22:22:52Z
Yazar Trinckes, John J., author.<br/>Yer Numarası HF5548.37 .T75 2010<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9781439810088">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>
CISO soft skills : securing organizations impaired by employee politics, apathy, and intolerant perspectives
ent://SD_ILS/0/SD_ILS:544153
2026-02-20T22:22:52Z
2026-02-20T22:22:52Z
Yazar Collette, Ronald D., author. Gentile, Michael. Gentile, Skye.<br/>Yer Numarası HF5548.37 .G462 2009<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9781420089110">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>
Information security management metrics : a definitive guide to effective security monitoring and measurement
ent://SD_ILS/0/SD_ILS:546952
2026-02-20T22:22:52Z
2026-02-20T22:22:52Z
Yazar Brotby, W. Krag., author.<br/>Yer Numarası HD30.2 .B78 2009<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9781420052862">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>
Information assurance architecture
ent://SD_ILS/0/SD_ILS:539830
2026-02-20T22:22:52Z
2026-02-20T22:22:52Z
Yazar Willett, Keith D., author.<br/>Yer Numarası QA76.9 .A25 W5487 2008<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9780849380686">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>
Insider computer fraud : an in-depth framework for detecting and defending against insider IT attacks
ent://SD_ILS/0/SD_ILS:544396
2026-02-20T22:22:52Z
2026-02-20T22:22:52Z
Yazar Brancik, Kenneth C., author.<br/>Yer Numarası QA76.9 .A25 B725 2008<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9781420046601">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>
Digital privacy : theory, technologies, and practices
ent://SD_ILS/0/SD_ILS:547774
2026-02-20T22:22:52Z
2026-02-20T22:22:52Z
Yazar Acquisti, Alessandro.<br/>Yer Numarası QA76.9 .A25 D528 2008<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9781420052183">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>
Infosecurity 2008 threat analysis
ent://SD_ILS/0/SD_ILS:145541
2026-02-20T22:22:52Z
2026-02-20T22:22:52Z
Yazar Clark, Champ, III.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492249">http://www.sciencedirect.com/science/book/9781597492249</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Digital watermarking and steganography
ent://SD_ILS/0/SD_ILS:146474
2026-02-20T22:22:52Z
2026-02-20T22:22:52Z
Yazar Cox, I. J. (Ingemar J.)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780123725851">http://www.sciencedirect.com/science/book/9780123725851</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Information security : design, implementation, measurement, and compliance
ent://SD_ILS/0/SD_ILS:545839
2026-02-20T22:22:52Z
2026-02-20T22:22:52Z
Yazar Layton, Timothy P., author.<br/>Yer Numarası HF5548.37 .L393 2007<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9781420013412">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>
Security in computing
ent://SD_ILS/0/SD_ILS:110682
2026-02-20T22:22:52Z
2026-02-20T22:22:52Z
Yazar Pfleeger, Charles P., 1948-<br/>Yer Numarası QA76.9.A25 P45 2007<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>
FISMA certification & accreditation handbook
ent://SD_ILS/0/SD_ILS:112169
2026-02-20T22:22:52Z
2026-02-20T22:22:52Z
Yazar Taylor, Laura. Shepherd, Matthew. ScienceDirect (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491167">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
FISMA certification & accreditation handbook
ent://SD_ILS/0/SD_ILS:145876
2026-02-20T22:22:52Z
2026-02-20T22:22:52Z
Yazar Taylor, Laura. Shepherd, Matthew.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491167">http://www.sciencedirect.com/science/book/9781597491167</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
The security risk assessment handbook : a complete guide for performing security risk assessments
ent://SD_ILS/0/SD_ILS:545167
2026-02-20T22:22:52Z
2026-02-20T22:22:52Z
Yazar Landoll, Douglas J., author.<br/>Yer Numarası HF5548.37 .L358 2006<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9781420031232">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>
The CISO handbook : a practical guide to securing your company
ent://SD_ILS/0/SD_ILS:539204
2026-02-20T22:22:52Z
2026-02-20T22:22:52Z
Yazar Gentile, Michael., author. Collette, Ronald D. August, Thomas D.<br/>Yer Numarası HF5548.37 .G46 2006<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9781420031379">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>
Insider threat protecting the enterprise from sabotage, spying, and theft
ent://SD_ILS/0/SD_ILS:253661
2026-02-20T22:22:52Z
2026-02-20T22:22:52Z
Yazar Cole, Eric. Ring, Sandra.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim Volltext <a href="http://www.sciencedirect.com/science/book/9781597490481">http://www.sciencedirect.com/science/book/9781597490481</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Assessing and managing security risk in IT systems : a structured methodology
ent://SD_ILS/0/SD_ILS:542250
2026-02-20T22:22:52Z
2026-02-20T22:22:52Z
Yazar McCumber, John, 1956, author.<br/>Yer Numarası QA76.9 .A25 M4284 2005<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9781135488970">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>
Information security fundamentals
ent://SD_ILS/0/SD_ILS:545226
2026-02-20T22:22:52Z
2026-02-20T22:22:52Z
Yazar Peltier, Thomas R., author. Peltier, Justin. Blackley, John A.<br/>Yer Numarası QA76.9 .A25 P427 2005<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9781135493738">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>
A practical guide to security assessments
ent://SD_ILS/0/SD_ILS:545277
2026-02-20T22:22:52Z
2026-02-20T22:22:52Z
Yazar Kairab, Sudhanshu., author.<br/>Yer Numarası HF5548.32 .K345 2005<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9781135500313">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>
Cryptography, information theory, and error-correction : a handbook for the 21st century
ent://SD_ILS/0/SD_ILS:593044
2026-02-20T22:22:52Z
2026-02-20T22:22:52Z
Yazar Bruen, Aiden A., 1941- Forcinito, Mario, 1962-<br/>Yer Numarası QA76.9 .A25 B79 2005<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781118033296">https://onlinelibrary.wiley.com/doi/book/10.1002/9781118033296</a>
<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119582397">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119582397</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Building a global information assurance program
ent://SD_ILS/0/SD_ILS:543357
2026-02-20T22:22:52Z
2026-02-20T22:22:52Z
Yazar Curts, Raymond J., author. Campbell, Douglas E., 1954- author.<br/>Yer Numarası QA76.9 .A25<br/>Elektronik Erişim Taylor & Francis <a href="https://www.taylorfrancis.com/books/9780429225215">https://www.taylorfrancis.com/books/9780429225215</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Implementing database security and auditing a guide for DBAs, information security administrators and auditors
ent://SD_ILS/0/SD_ILS:253860
2026-02-20T22:22:52Z
2026-02-20T22:22:52Z
Yazar Ben-Natan, Ron.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781555583347">http://www.sciencedirect.com/science/book/9781555583347</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Investigator's guide to steganography
ent://SD_ILS/0/SD_ILS:541281
2026-02-20T22:22:52Z
2026-02-20T22:22:52Z
Yazar Kipper, Gregory., author.<br/>Yer Numarası QA76.9 .A25 K544 2004<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9780203504765">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>
Information security policies and procedures : a practitioner's reference
ent://SD_ILS/0/SD_ILS:547228
2026-02-20T22:22:52Z
2026-02-20T22:22:52Z
Yazar Peltier, Thomas R., author.<br/>Yer Numarası QA76.9 .A25 P428 2004<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9780203488737">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>
A practical guide to security engineering and information assurance
ent://SD_ILS/0/SD_ILS:544973
2026-02-20T22:22:52Z
2026-02-20T22:22:52Z
Yazar Herrmann, Debra S., author.<br/>Yer Numarası QA76.9 .A25 H47 2002<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9781420031492">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>
Information security policies, procedures, and standards : guidelines for effective information security management
ent://SD_ILS/0/SD_ILS:546817
2026-02-20T22:22:52Z
2026-02-20T22:22:52Z
Yazar Peltier, Thomas R., author.<br/>Yer Numarası QA76.9 .A25 P46 2002<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9780849390326">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>
Technology and privacy : the new landscape
ent://SD_ILS/0/SD_ILS:112999
2026-02-20T22:22:52Z
2026-02-20T22:22:52Z
Yazar Agre, Philip. Rotenberg, Marc.<br/>Yer Numarası QA76.9.A25 T43 2001<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>
Digital watermarking
ent://SD_ILS/0/SD_ILS:253889
2026-02-20T22:22:52Z
2026-02-20T22:22:52Z
Yazar Cox, I. J. (Ingemar J.) Miller, Matthew L. Bloom, Jeffrey A. (Jeffrey Adam), 1964-<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781558607149">http://www.sciencedirect.com/science/book/9781558607149</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Data privacy in the information age
ent://SD_ILS/0/SD_ILS:135125
2026-02-20T22:22:52Z
2026-02-20T22:22:52Z
Yazar Klosek, Jacqueline.<br/>Yer Numarası QA76.9.A25 K57 2000<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>