Arama Sonuçları S. - Daraltılmış: Computer security.
SirsiDynix Enterprise
https://katalog.hacettepe.edu.tr/client/tr_TR/default_tr/default_tr/qu$003dS.$0026qf$003dSUBJECT$002509Konu$002509Computer$002bsecurity.$002509Computer$002bsecurity.$0026ic$003dtrue$0026ps$003d300?
2026-02-22T19:07:44Z
Systematic security : a CISO's playbook
ent://SD_ILS/0/SD_ILS:552414
2026-02-22T19:07:44Z
2026-02-22T19:07:44Z
Yazar Qader, Timur author.<br/>Yer Numarası QA76.9 .A25<br/>Elektronik Erişim Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003616528">https://www.taylorfrancis.com/books/9781003616528</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
It's your digital life
ent://SD_ILS/0/SD_ILS:565418
2026-02-22T19:07:44Z
2026-02-22T19:07:44Z
Yazar Govindarajulu, Giri, author. Ramaswami, Shyam Sundar, author. Vasudevan, Shriram K., author.<br/>Yer Numarası QA76.9 .A25<br/>Elektronik Erişim Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003144199">https://www.taylorfrancis.com/books/9781003144199</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Penetration tester's open source toolkit
ent://SD_ILS/0/SD_ILS:253676
2026-02-22T19:07:44Z
2026-02-22T19:07:44Z
Yazar Long, Johnny.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490214">http://www.sciencedirect.com/science/book/9781597490214</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Investigator's guide to steganography
ent://SD_ILS/0/SD_ILS:541281
2026-02-22T19:07:44Z
2026-02-22T19:07:44Z
Yazar Kipper, Gregory., author.<br/>Yer Numarası QA76.9 .A25 K544 2004<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9780203504765">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>
Web application security a beginner's guide
ent://SD_ILS/0/SD_ILS:293241
2026-02-22T19:07:44Z
2026-02-22T19:07:44Z
Yazar Sullivan, Bryan, 1974- Liu, Vincent.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://mhebooklibrary.com/reader/web-application-security-beginners-guide">Subscription required</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Developer's guide to web application security
ent://SD_ILS/0/SD_ILS:306464
2026-02-22T19:07:44Z
2026-02-22T19:07:44Z
Yazar Cross, Michael, 1965-<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490610">http://www.sciencedirect.com/science/book/9781597490610</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Developer's guide to web application security
ent://SD_ILS/0/SD_ILS:147664
2026-02-22T19:07:44Z
2026-02-22T19:07:44Z
Yazar Cross, Michael, 1965-<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490610">http://www.sciencedirect.com/science/book/9781597490610</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
A Cybersecurity Leader's Journey : Speaking the Language of the Board
ent://SD_ILS/0/SD_ILS:588198
2026-02-22T19:07:44Z
2026-02-22T19:07:44Z
Yazar Marchewka, Edward, author.<br/>Yer Numarası QA76.9 .A25<br/>Elektronik Erişim Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003597407">https://www.taylorfrancis.com/books/9781003597407</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Practical Insecurity : the layman's guide to digital security and digital self-defense.
ent://SD_ILS/0/SD_ILS:584158
2026-02-22T19:07:44Z
2026-02-22T19:07:44Z
Yazar Marshall, Lyndon.<br/>Yer Numarası QA76.9 .A25<br/>Elektronik Erişim Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003453024">https://www.taylorfrancis.com/books/9781003453024</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
A practitioner's guide to cybersecurity and data protection : how to ensure client confidentiality
ent://SD_ILS/0/SD_ILS:550244
2026-02-22T19:07:44Z
2026-02-22T19:07:44Z
Yazar Knibbs, Catherine, editor. Hibberd, Gary, editor.<br/>Yer Numarası QA76.9 .A25<br/>Elektronik Erişim Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003364184">https://www.taylorfrancis.com/books/9781003364184</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
What to do when you get hacked : a practitioner's guide to incident response in the 21st century
ent://SD_ILS/0/SD_ILS:563599
2026-02-22T19:07:44Z
2026-02-22T19:07:44Z
Yazar Brathwaite, Shimon, author.<br/>Yer Numarası HV8079 .C65 B73 2023<br/>Elektronik Erişim Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003264293">https://www.taylorfrancis.com/books/9781003264293</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Executive's guide to cyber risk : securing the future today
ent://SD_ILS/0/SD_ILS:597567
2026-02-22T19:07:44Z
2026-02-22T19:07:44Z
Yazar Moyo, Siegfried, author.<br/>Yer Numarası HF5548.37 .M68 2022<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394320578">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394320578</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
A beginner's guide to Internet of things security : attacks, applications, authentication, and fundamentals
ent://SD_ILS/0/SD_ILS:591322
2026-02-22T19:07:44Z
2026-02-22T19:07:44Z
Yazar Gupta, B. B., 1982- author. Tewari, Aakanksha, author.<br/>Yer Numarası QA76.9 .A25 G86 2020 EB<br/>Elektronik Erişim Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003001126">https://www.taylorfrancis.com/books/9781003001126</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Applied Cryptography and Network Security Workshops ACNS 2019 Satellite Workshops, SiMLA, Cloud S&P, AIBlock, and AIoTS, Bogota, Colombia, June 5–7, 2019, Proceedings
ent://SD_ILS/0/SD_ILS:484047
2026-02-22T19:07:44Z
2026-02-22T19:07:44Z
Yazar Zhou, Jianying. editor. (orcid)0000-0003-0594-0432 Deng, Robert. editor. (orcid)0000-0003-3491-8146 Li, Zhou. editor. Majumdar, Suryadipta. editor. (orcid)0000-0002-6501-4214 Meng, Weizhi. editor. (orcid)0000-0003-4384-5786<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-030-29729-9">https://doi.org/10.1007/978-3-030-29729-9</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Topics in Cryptology -- CT-RSA 2014 The Cryptographer's Track at the RSA Conference 2014, San Francisco, CA, USA, February 25-28, 2014, Proceedings
ent://SD_ILS/0/SD_ILS:489005
2026-02-22T19:07:44Z
2026-02-22T19:07:44Z
Yazar Benaloh, Josh. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-319-04852-9">https://doi.org/10.1007/978-3-319-04852-9</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
The hacker's guide to OS X exploiting OS X from the root up
ent://SD_ILS/0/SD_ILS:148006
2026-02-22T19:07:44Z
2026-02-22T19:07:44Z
Yazar Bathurst, Robert. Rogers, Russ. Ghassemlouei, Alijohn.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597499507">http://www.sciencedirect.com/science/book/9781597499507</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Gray hat hacking the ethical hacker's handbook
ent://SD_ILS/0/SD_ILS:293255
2026-02-22T19:07:44Z
2026-02-22T19:07:44Z
Yazar Harris, Shon. Harper, Allen. Eagle, Chris. Ness, Jonathan. Lenkey, Gideon.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://mhebooklibrary.com/reader/gray-hat-hacking-ethical-hackers-handbook-3rd-edition">Subscription required</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Virtualization and forensics a digital forensic investigator's guide to virtual environments
ent://SD_ILS/0/SD_ILS:306330
2026-02-22T19:07:44Z
2026-02-22T19:07:44Z
Yazar Barrett, Diane. Kipper, Gregory.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495578">http://www.sciencedirect.com/science/book/9781597495578</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Virtualization and forensics a digital forensic investigator's guide to virtual environments
ent://SD_ILS/0/SD_ILS:146715
2026-02-22T19:07:44Z
2026-02-22T19:07:44Z
Yazar Barrett, Diane. Kipper, Gregory.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495578">http://www.sciencedirect.com/science/book/9781597495578</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Techno Security's guide to managing risks for IT managers, auditors, and investigators
ent://SD_ILS/0/SD_ILS:112203
2026-02-22T19:07:44Z
2026-02-22T19:07:44Z
Yazar Wiles, Jack. ScienceDirect (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491389">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Techno security's guide to e-discovery and digital forensics
ent://SD_ILS/0/SD_ILS:148564
2026-02-22T19:07:44Z
2026-02-22T19:07:44Z
Yazar Wiles, Jack.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492232">http://www.sciencedirect.com/science/book/9781597492232</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Techno Security's guide to managing risks for IT managers, auditors, and investigators
ent://SD_ILS/0/SD_ILS:148641
2026-02-22T19:07:44Z
2026-02-22T19:07:44Z
Yazar Wiles, Jack.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491389">http://www.sciencedirect.com/science/book/9781597491389</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Essential computer security everyone's guide to e-mail, Internet, and wireless security
ent://SD_ILS/0/SD_ILS:145840
2026-02-22T19:07:44Z
2026-02-22T19:07:44Z
Yazar Bradley, Tony, 1969- Carvey, Harlan A.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491143">http://www.sciencedirect.com/science/book/9781597491143</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Cyber spying tracking your family's (sometimes) secret online lives
ent://SD_ILS/0/SD_ILS:253673
2026-02-22T19:07:44Z
2026-02-22T19:07:44Z
Yazar Fair, Ted. Nordfelt, Michael. Ring, Sandra. Cole, Eric.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836418">http://www.sciencedirect.com/science/book/9781931836418</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Information security policies and procedures : a practitioner's reference
ent://SD_ILS/0/SD_ILS:547228
2026-02-22T19:07:44Z
2026-02-22T19:07:44Z
Yazar Peltier, Thomas R., author.<br/>Yer Numarası QA76.9 .A25 P428 2004<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9780203488737">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>
Cisco security professional's guide to secure intrusion detection systems
ent://SD_ILS/0/SD_ILS:254024
2026-02-22T19:07:44Z
2026-02-22T19:07:44Z
Yazar Burton, James. Dubrawsky, Ida. Osipov, Vitaly. Baumrucker, C. Tate. Sweeney, Michael<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781932266696">http://www.sciencedirect.com/science/book/9781932266696</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
CYBERSECURITY IN HEALTHCARE APPLICATIONS
ent://SD_ILS/0/SD_ILS:568919
2026-02-22T19:07:44Z
2026-02-22T19:07:44Z
Yazar Poonkuntran, S., editor. Dhanaraj, Rajesh Kumar, editor. Aanjankumar, S., editor. Sathyamoorthy, Malathy, editor.<br/>Yer Numarası R859.7 .S43<br/>Elektronik Erişim Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781032711379">https://www.taylorfrancis.com/books/9781032711379</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Windows 7
ent://SD_ILS/0/SD_ILS:293477
2026-02-22T19:07:44Z
2026-02-22T19:07:44Z
Yazar Matthews, Martin S.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://mhebooklibrary.com/reader/windows-7-quicksteps">Subscription required</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Windows 7 SP1
ent://SD_ILS/0/SD_ILS:293421
2026-02-22T19:07:44Z
2026-02-22T19:07:44Z
Yazar Matthews, Martin S.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://mhebooklibrary.com/reader/windows-7-sp1-quicksteps">Subscription required</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Windows 7 for seniors
ent://SD_ILS/0/SD_ILS:293424
2026-02-22T19:07:44Z
2026-02-22T19:07:44Z
Yazar Matthews, Martin S.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://mhebooklibrary.com/reader/windows-7-for-seniors-quicksteps">Subscription required</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
CLOUD SECURITY concepts, applications and practices.
ent://SD_ILS/0/SD_ILS:582260
2026-02-22T19:07:44Z
2026-02-22T19:07:44Z
Yazar Murthy, Jamuna S. Siddesh, G. M., 1981- Srinivasa, K. G.<br/>Yer Numarası QA76.9 .A25<br/>Elektronik Erişim Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003455448">https://www.taylorfrancis.com/books/9781003455448</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Wireless communication in cyber security
ent://SD_ILS/0/SD_ILS:598705
2026-02-22T19:07:44Z
2026-02-22T19:07:44Z
Yazar Sountharrajan, S. editor Maheswar, R. editor Rathee, Geetanjali, editor Akila, M. editor<br/>Yer Numarası QA76.9 .A25 W57 2023<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119910619">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119910619</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Practical Security for Agile and DevOps.
ent://SD_ILS/0/SD_ILS:584880
2026-02-22T19:07:44Z
2026-02-22T19:07:44Z
Yazar Merkow, Mark S.<br/>Yer Numarası QA76.9 .A25<br/>Elektronik Erişim Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003265566">https://www.taylorfrancis.com/books/9781003265566</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
International Conference on Computer Networks and Communication Technologies ICCNCT 2018
ent://SD_ILS/0/SD_ILS:486813
2026-02-22T19:07:44Z
2026-02-22T19:07:44Z
Yazar Smys, S. editor. Bestak, Robert. editor. Chen, Joy Iong-Zong. editor. Kotuliak, Ivan. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-981-10-8681-6">https://doi.org/10.1007/978-981-10-8681-6</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Behavioral insights in cybersecurity : a guide to digital human factors
ent://SD_ILS/0/SD_ILS:567885
2026-02-22T19:07:44Z
2026-02-22T19:07:44Z
Yazar Sachs, Dustin S., author.<br/>Yer Numarası ZA3086.5 .C93<br/>Elektronik Erişim Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003606345">https://www.taylorfrancis.com/books/9781003606345</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Innovations in Computer Science and Engineering Proceedings of the Fifth ICICSE 2017
ent://SD_ILS/0/SD_ILS:487299
2026-02-22T19:07:44Z
2026-02-22T19:07:44Z
Yazar Saini, H. S. editor. Sayal, Rishi. editor. Govardhan, A. editor. Buyya, Rajkumar. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-981-10-8201-6">https://doi.org/10.1007/978-981-10-8201-6</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Biometric-Based Physical and Cybersecurity Systems
ent://SD_ILS/0/SD_ILS:484246
2026-02-22T19:07:44Z
2026-02-22T19:07:44Z
Yazar Obaidat, Mohammad S. editor. Traore, Issa. editor. (orcid)0000-0003-2987-8047 Woungang, Isaac. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-319-98734-7">https://doi.org/10.1007/978-3-319-98734-7</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
E-Business and Telecommunications 15th International Joint Conference, ICETE 2018, Porto, Portugal, July 26–28, 2018, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:483527
2026-02-22T19:07:44Z
2026-02-22T19:07:44Z
Yazar Obaidat, Mohammad S. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-030-34866-3">https://doi.org/10.1007/978-3-030-34866-3</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
E-Business and Telecommunications 14th International Joint Conference, ICETE 2017, Madrid, Spain, July 24-26, 2017, Revised Selected Paper
ent://SD_ILS/0/SD_ILS:484505
2026-02-22T19:07:44Z
2026-02-22T19:07:44Z
Yazar Obaidat, Mohammad S. editor. Cabello, Enrique. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-030-11039-0">https://doi.org/10.1007/978-3-030-11039-0</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Security and Data Storage Aspect in Cloud Computing
ent://SD_ILS/0/SD_ILS:484576
2026-02-22T19:07:44Z
2026-02-22T19:07:44Z
Yazar Deshpande, Prachi S. author. Sharma, Subhash C. author. Peddoju, Sateesh K. author. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-981-13-6089-3">https://doi.org/10.1007/978-981-13-6089-3</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Countering cyber attacks and preserving the integrity and availability of critical systems
ent://SD_ILS/0/SD_ILS:482177
2026-02-22T19:07:44Z
2026-02-22T19:07:44Z
Yazar Geetha, S., 1979- editor. Phamila, Asnath Victy, 1978- editor. IGI Global, publisher.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-8241-0">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-8241-0</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Wireless Algorithms, Systems, and Applications 14th International Conference, WASA 2019, Honolulu, HI, USA, June 24–26, 2019, Proceedings
ent://SD_ILS/0/SD_ILS:483667
2026-02-22T19:07:44Z
2026-02-22T19:07:44Z
Yazar Biagioni, Edoardo S. editor. Zheng, Yao. editor. Cheng, Siyao. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-030-23597-0">https://doi.org/10.1007/978-3-030-23597-0</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Innovations in Computer Science and Engineering Proceedings of the Sixth ICICSE 2018
ent://SD_ILS/0/SD_ILS:486768
2026-02-22T19:07:44Z
2026-02-22T19:07:44Z
Yazar Saini, H. S. editor. Sayal, Rishi. editor. Govardhan, Aliseri. editor. Buyya, Rajkumar. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-981-13-7082-3">https://doi.org/10.1007/978-981-13-7082-3</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
The Art of Modelling Computational Systems: A Journey from Logic and Concurrency to Security and Privacy Essays Dedicated to Catuscia Palamidessi on the Occasion of Her 60th Birthday
ent://SD_ILS/0/SD_ILS:486859
2026-02-22T19:07:44Z
2026-02-22T19:07:44Z
Yazar Alvim, Mário S. editor. Chatzikokolakis, Kostas. editor. Olarte, Carlos. editor. Valencia, Frank. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-030-31175-9">https://doi.org/10.1007/978-3-030-31175-9</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Information security science : measuring the vulnerability to data compromises
ent://SD_ILS/0/SD_ILS:458968
2026-02-22T19:07:44Z
2026-02-22T19:07:44Z
Yazar Young, Carl S., author.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128096437">http://www.sciencedirect.com/science/book/9780128096437</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
E-Business and Telecommunications International Joint Conference, ICETE 2013, Reykjavik, Iceland, July 29-31, 2013, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:488647
2026-02-22T19:07:44Z
2026-02-22T19:07:44Z
Yazar Obaidat, Mohammad S. editor. Filipe, Joaquim. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-662-44788-8">https://doi.org/10.1007/978-3-662-44788-8</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
E-Business and Telecommunications International Joint Conference, ICETE 2012, Rome, Italy, July 24--27, 2012, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:482710
2026-02-22T19:07:44Z
2026-02-22T19:07:44Z
Yazar Obaidat, Mohammad S. editor. Filipe, Joaquim. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-662-44791-8">https://doi.org/10.1007/978-3-662-44791-8</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Fundamentals of Sketch-Based Passwords A General Framework
ent://SD_ILS/0/SD_ILS:487393
2026-02-22T19:07:44Z
2026-02-22T19:07:44Z
Yazar Riggan, Benjamin S. author. Snyder, Wesley E. author. Wang, Cliff. author. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-319-13629-5">https://doi.org/10.1007/978-3-319-13629-5</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Secure and resilient software : requirements, test cases, and testing methods
ent://SD_ILS/0/SD_ILS:540156
2026-02-22T19:07:44Z
2026-02-22T19:07:44Z
Yazar Merkow, Mark S., author. Raghavan, Lakshmikanth.<br/>Yer Numarası QA76.76 .T48 M47 2012<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9781439866221">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>
Adaptive security management architecture
ent://SD_ILS/0/SD_ILS:541852
2026-02-22T19:07:44Z
2026-02-22T19:07:44Z
Yazar Tiller, James S., author.<br/>Yer Numarası QA76.9 .A25 T55 2011<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9781420013375">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>
Secure and resilient software development
ent://SD_ILS/0/SD_ILS:545097
2026-02-22T19:07:44Z
2026-02-22T19:07:44Z
Yazar Merkow, Mark S., author. Raghavan, Lakshmikanth.<br/>Yer Numarası QA76.76 .D47 M466 2010<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9781439826973">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>
A practical guide to security engineering and information assurance
ent://SD_ILS/0/SD_ILS:544973
2026-02-22T19:07:44Z
2026-02-22T19:07:44Z
Yazar Herrmann, Debra S., author.<br/>Yer Numarası QA76.9 .A25 H47 2002<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9781420031492">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>
Securing e-business applications and communications
ent://SD_ILS/0/SD_ILS:545821
2026-02-22T19:07:44Z
2026-02-22T19:07:44Z
Yazar Held, Jonathan S., author. Bowers, John R.<br/>Yer Numarası QA76.9 .A25 H435 2001<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9781420031553">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>
Zen and the art of information security
ent://SD_ILS/0/SD_ILS:145680
2026-02-22T19:07:44Z
2026-02-22T19:07:44Z
Yazar Winkler, Ira.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491686">http://www.sciencedirect.com/science/book/9781597491686</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Snort 2.1 intrusion detection
ent://SD_ILS/0/SD_ILS:253989
2026-02-22T19:07:44Z
2026-02-22T19:07:44Z
Yazar Beale, Jay. Alder, Raven.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836043">http://www.sciencedirect.com/science/book/9781931836043</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Nessus network auditing
ent://SD_ILS/0/SD_ILS:253991
2026-02-22T19:07:44Z
2026-02-22T19:07:44Z
Yazar Deraison, Renaud. Syngress Media, Inc.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836081">http://www.sciencedirect.com/science/book/9781931836081</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Cybersecurity for coaches and therapists : a practical guide for protecting client data
ent://SD_ILS/0/SD_ILS:588664
2026-02-22T19:07:44Z
2026-02-22T19:07:44Z
Yazar Fouracres, Alexandra J. S., author.<br/>Yer Numarası RC455.2 .M38 F88 2022 EB<br/>Elektronik Erişim Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003184805">https://www.taylorfrancis.com/books/9781003184805</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Proceedings of International Symposium on Sensor Networks, Systems and Security Advances in Computing and Networking with Applications
ent://SD_ILS/0/SD_ILS:400016
2026-02-22T19:07:44Z
2026-02-22T19:07:44Z
Yazar Rao, Nageswara S.V. editor. Brooks, Richard R. editor. Wu, Chase Q. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-319-75683-7">https://doi.org/10.1007/978-3-319-75683-7</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Provable Security 8th International Conference, ProvSec 2014, Hong Kong, China, October 9-10, 2014. Proceedings
ent://SD_ILS/0/SD_ILS:488918
2026-02-22T19:07:44Z
2026-02-22T19:07:44Z
Yazar Chow, Sherman S.M. editor. Liu, Joseph K. editor. Hui, Lucas C.K. editor. Yiu, Siu Ming. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-319-12475-9">https://doi.org/10.1007/978-3-319-12475-9</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Information Security 17th International Conference, ISC 2014, Hong Kong, China, October 12-14, 2014, Proceedings
ent://SD_ILS/0/SD_ILS:485793
2026-02-22T19:07:44Z
2026-02-22T19:07:44Z
Yazar Chow, Sherman S.M. editor. Camenisch, Jan. editor. Hui, Lucas C.K. editor. Yiu, Siu Ming. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-319-13257-0">https://doi.org/10.1007/978-3-319-13257-0</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Applications and Techniques in Information Security 10th International Conference, ATIS 2019, Thanjavur, India, November 22–24, 2019, Proceedings
ent://SD_ILS/0/SD_ILS:483576
2026-02-22T19:07:44Z
2026-02-22T19:07:44Z
Yazar Shankar Sriram, V. S. editor. (orcid)0000-0001-7870-7944 Subramaniyaswamy, V. editor. Sasikaladevi, N. editor. (orcid)0000-0002-0841-502X Zhang, Leo. editor. Batten, Lynn. editor. (orcid)0000-0003-4525-2423<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-981-15-0871-4">https://doi.org/10.1007/978-981-15-0871-4</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Internet Science 5th International Conference, INSCI 2018, St. Petersburg, Russia, October 24–26, 2018, Proceedings
ent://SD_ILS/0/SD_ILS:400254
2026-02-22T19:07:44Z
2026-02-22T19:07:44Z
Yazar Bodrunova, Svetlana S. editor. (orcid)0000-0003-0740-561X SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-030-01437-7">https://doi.org/10.1007/978-3-030-01437-7</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Security policies and implementation issues
ent://SD_ILS/0/SD_ILS:271534
2026-02-22T19:07:44Z
2026-02-22T19:07:44Z
Yazar Johnson, Rob (Robert) Merkow, Mark S.<br/>Yer Numarası QA76.9.A25 J64 2011<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>
Building in Security at Agile Speed
ent://SD_ILS/0/SD_ILS:569102
2026-02-22T19:07:44Z
2026-02-22T19:07:44Z
Yazar Ransome, James. Schoenfield, Brook S. E.<br/>Yer Numarası QA76.9 .A25<br/>Elektronik Erişim Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003002451">https://www.taylorfrancis.com/books/9781003002451</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
The techno-legal dynamics of cyber crimes in Industry 5.0
ent://SD_ILS/0/SD_ILS:599801
2026-02-22T19:07:44Z
2026-02-22T19:07:44Z
Yazar Kaur, Gagandeep, editor Choudhury, Tanupriya editor Balamurugan, S. editor<br/>Yer Numarası QA76.9 .A25<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394242177">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394242177</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Practical Core Software Security A Reference Framework.
ent://SD_ILS/0/SD_ILS:562758
2026-02-22T19:07:44Z
2026-02-22T19:07:44Z
Yazar Ransome, James F. Misra, Anmol. Merkow, Mark S.<br/>Yer Numarası QA76.9 .A25<br/>Elektronik Erişim Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003319078">https://www.taylorfrancis.com/books/9781003319078</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Digital twins and cybersecurity : safeguarding the future of connected systems
ent://SD_ILS/0/SD_ILS:599615
2026-02-22T19:07:44Z
2026-02-22T19:07:44Z
Yazar Naveen, Palanichamy, author. Maheswar, R., author. Ragupathy, U.S., author.<br/>Yer Numarası QA76.9 .C65 N38 2025<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394272501">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394272501</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Recent Trends in Image Processing and Pattern Recognition Second International Conference, RTIP2R 2018, Solapur, India, December 21–22, 2018, Revised Selected Papers, Part III
ent://SD_ILS/0/SD_ILS:483285
2026-02-22T19:07:44Z
2026-02-22T19:07:44Z
Yazar Santosh, K. C. editor. Hegadi, Ravindra S. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-981-13-9187-3">https://doi.org/10.1007/978-981-13-9187-3</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Digital immune system : principles and practices
ent://SD_ILS/0/SD_ILS:600243
2026-02-22T19:07:44Z
2026-02-22T19:07:44Z
Yazar Priyambada Dash, Sujata, editor. Mishra, Vaibhav. Shaw, Bijeta. Panda, Sandeep Kumar. Balamurugan, S.<br/>Yer Numarası QA76.9 .A25 D54 2026<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394383788">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394383788</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Handbook of security and privacy of AI-enabled healthcare systems and internet of medical things
ent://SD_ILS/0/SD_ILS:585039
2026-02-22T19:07:44Z
2026-02-22T19:07:44Z
Yazar Imoize, Agbotiname Lucky, editor. Balas, Valentina Emilia, editor. Solanki, Vijender Kumar, 1980- editor. Lee, Cheng-Chi, editor. Obaidat, Mohammad S. (Mohammad Salameh), 1952- editor.<br/>Yer Numarası R859.7 .A78<br/>Elektronik Erişim Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003370321">https://www.taylorfrancis.com/books/9781003370321</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Implementing enterprise cybersecurity with open-source software and standard architecture. Volume II
ent://SD_ILS/0/SD_ILS:588974
2026-02-22T19:07:44Z
2026-02-22T19:07:44Z
Yazar Handa, Anand, editor. Negi, Rohit, editor. Venkatesan, S., editor. Shukla, Sandeep K., editor.<br/>Yer Numarası QA76.9 .A25<br/>Elektronik Erişim Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003426134">https://www.taylorfrancis.com/books/9781003426134</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Security issues and privacy concerns in Industry 4.0 applications
ent://SD_ILS/0/SD_ILS:596945
2026-02-22T19:07:44Z
2026-02-22T19:07:44Z
Yazar David, Shiblin, author. Anand, R. S., author. Jeyakrishnan, V., author. Niranjanamurthy, M., author.<br/>Yer Numarası QA76.9 .A25 D38 2021<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119776529">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119776529</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Speech Enhancement Techniques for Digital Hearing Aids
ent://SD_ILS/0/SD_ILS:482802
2026-02-22T19:07:44Z
2026-02-22T19:07:44Z
Yazar Borisagar, Komal R. author. Thanki, Rohit M. author. (orcid)0000-0002-0645-6266 Sedani, Bhavin S. author. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-319-96821-6">https://doi.org/10.1007/978-3-319-96821-6</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Sustainable Interdependent Networks II From Smart Power Grids to Intelligent Transportation Networks
ent://SD_ILS/0/SD_ILS:484747
2026-02-22T19:07:44Z
2026-02-22T19:07:44Z
Yazar Amini, M. Hadi. editor. Boroojeni, Kianoosh G. editor. Iyengar, S. S. editor. Pardalos, Panos M. editor. (orcid)0000-0003-2824-101X Blaabjerg, Frede. editor.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-319-98923-5">https://doi.org/10.1007/978-3-319-98923-5</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
International Conference on Advanced Computing Networking and Informatics ICANI-2018
ent://SD_ILS/0/SD_ILS:486202
2026-02-22T19:07:44Z
2026-02-22T19:07:44Z
Yazar Kamal, Raj. editor. Henshaw, Michael. editor. Nair, Pramod S. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-981-13-2673-8">https://doi.org/10.1007/978-981-13-2673-8</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Decision and Game Theory for Security 10th International Conference, GameSec 2019, Stockholm, Sweden, October 30 – November 1, 2019, Proceedings
ent://SD_ILS/0/SD_ILS:487069
2026-02-22T19:07:44Z
2026-02-22T19:07:44Z
Yazar Alpcan, Tansu. editor. (orcid)0000-0002-7434-3239 Vorobeychik, Yevgeniy. editor. (orcid)0000-0003-2471-5345 Baras, John S. editor. (orcid)0000-0002-4955-8561 Dán, György. editor. (orcid)0000-0002-4876-0223 SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-030-32430-8">https://doi.org/10.1007/978-3-030-32430-8</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Advances in Knowledge Discovery and Data Mining 22nd Pacific-Asia Conference, PAKDD 2018, Melbourne, VIC, Australia, June 3-6, 2018, Proceedings, Part I
ent://SD_ILS/0/SD_ILS:399609
2026-02-22T19:07:44Z
2026-02-22T19:07:44Z
Yazar Phung, Dinh. editor. Tseng, Vincent S. editor. Webb, Geoffrey I. editor. (orcid)0000-0001-9963-5169 Ho, Bao. editor. Ganji, Mohadeseh. editor.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-319-93034-3">https://doi.org/10.1007/978-3-319-93034-3</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Deep Learning in Medical Image Analysis and Multimodal Learning for Clinical Decision Support 4th International Workshop, DLMIA 2018, and 8th International Workshop, ML-CDS 2018, Held in Conjunction with MICCAI 2018, Granada, Spain, September 20, 2018, Proceedings
ent://SD_ILS/0/SD_ILS:400575
2026-02-22T19:07:44Z
2026-02-22T19:07:44Z
Yazar Stoyanov, Danail. editor. Taylor, Zeike. editor. Carneiro, Gustavo. editor. (orcid)0000-0002-5571-6220 Syeda-Mahmood, Tanveer. editor. Martel, Anne. editor.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-030-00889-5">https://doi.org/10.1007/978-3-030-00889-5</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Sustainable Interdependent Networks From Theory to Application
ent://SD_ILS/0/SD_ILS:402493
2026-02-22T19:07:44Z
2026-02-22T19:07:44Z
Yazar Amini, M. Hadi. editor. Boroojeni, Kianoosh G. editor. Iyengar, S.S. editor. Pardalos, Panos M. editor. Blaabjerg, Frede. editor.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-319-74412-4">https://doi.org/10.1007/978-3-319-74412-4</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Advances in Knowledge Discovery and Data Mining 22nd Pacific-Asia Conference, PAKDD 2018, Melbourne, VIC, Australia, June 3-6, 2018, Proceedings, Part II
ent://SD_ILS/0/SD_ILS:402214
2026-02-22T19:07:44Z
2026-02-22T19:07:44Z
Yazar Phung, Dinh. editor. Tseng, Vincent S. editor. Webb, Geoffrey I. editor. (orcid)0000-0001-9963-5169 Ho, Bao. editor. Ganji, Mohadeseh. editor.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-319-93037-4">https://doi.org/10.1007/978-3-319-93037-4</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Advances in Knowledge Discovery and Data Mining 22nd Pacific-Asia Conference, PAKDD 2018, Melbourne, VIC, Australia, June 3-6, 2018, Proceedings, Part III
ent://SD_ILS/0/SD_ILS:400249
2026-02-22T19:07:44Z
2026-02-22T19:07:44Z
Yazar Phung, Dinh. editor. Tseng, Vincent S. editor. Webb, Geoffrey I. editor. (orcid)0000-0001-9963-5169 Ho, Bao. editor. Ganji, Mohadeseh. editor.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-319-93040-4">https://doi.org/10.1007/978-3-319-93040-4</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Computational Intelligence, Cyber Security and Computational Models Proceedings of ICC3, 2013
ent://SD_ILS/0/SD_ILS:488884
2026-02-22T19:07:44Z
2026-02-22T19:07:44Z
Yazar Krishnan, G. Sai Sundara. editor. Anitha, R. editor. Lekshmi, R. S. editor. Kumar, M. Senthil. editor. Bonato, Anthony. editor.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-81-322-1680-3">https://doi.org/10.1007/978-81-322-1680-3</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Building effective privacy programs : cybersecurity from principles to practice
ent://SD_ILS/0/SD_ILS:600111
2026-02-22T19:07:44Z
2026-02-22T19:07:44Z
Yazar Edwards, Jason (Cybersecurity expert), author. Weaver, Griffin, author. John Wiley & Sons, publisher.<br/>Yer Numarası QA76.9 .P735 E34 2026<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394342662">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394342662</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Open-source security operations center (SOC) : a complete guide to establishing, managing, and maintaining a modern SOC
ent://SD_ILS/0/SD_ILS:599434
2026-02-22T19:07:44Z
2026-02-22T19:07:44Z
Yazar Basta, Alfred, author. Basta, Nadine, author. Anwar, Waqar, author. Essar, Mohammad Ilyas, author. John Wiley & Sons, publisher.<br/>Yer Numarası QA76.9 .A25<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394201631">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394201631</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Alice and Bob learn secure coding
ent://SD_ILS/0/SD_ILS:599664
2026-02-22T19:07:44Z
2026-02-22T19:07:44Z
Yazar Janca, Tanya. author.<br/>Yer Numarası QA76.76 .D47<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394277179">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394277179</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Quantum computing models for cybersecurity and wireless communications
ent://SD_ILS/0/SD_ILS:599707
2026-02-22T19:07:44Z
2026-02-22T19:07:44Z
Yazar Kumar, Budati Anil, edited. Kumar, Singamaneni Kranthi, edited. Li, Xingwang (Computer scientist), edited.<br/>Yer Numarası QA76.9 .A25 Q36 2025<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394271429">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394271429</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Protecting and mitigating against cyber threats : deploying artificial intelligence and machine learning
ent://SD_ILS/0/SD_ILS:599999
2026-02-22T19:07:44Z
2026-02-22T19:07:44Z
Yazar Mohanty, Sachi Nandan, editor.<br/>Yer Numarası QA76.9 .A25 P76 2025<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394305216">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394305216</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Securing cyber-physical systems : fundamentals, applications and challenges
ent://SD_ILS/0/SD_ILS:600260
2026-02-22T19:07:44Z
2026-02-22T19:07:44Z
Yazar Ananthajothi, K., editor.<br/>Yer Numarası TK5105.59 .S43 2025<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394287765">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394287765</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Protection of electrical power distribution systems : smart grid, microgrid, AI, and cyber security
ent://SD_ILS/0/SD_ILS:600371
2026-02-22T19:07:44Z
2026-02-22T19:07:44Z
Yazar Masood, Tariq, author. Abdo, Jamil, author. Iqbal, Atif, author.<br/>Yer Numarası TK3001 .M37 2026<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394327676">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394327676</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Emerging threats and countermeasures in cybersecurity
ent://SD_ILS/0/SD_ILS:599561
2026-02-22T19:07:44Z
2026-02-22T19:07:44Z
Yer Numarası QA76.9 .A25 E44 2025<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394230600">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394230600</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Generative AI, cybersecurity, and ethics
ent://SD_ILS/0/SD_ILS:599597
2026-02-22T19:07:44Z
2026-02-22T19:07:44Z
Yazar Islam, Ray (Mohammad Rubyet), author.<br/>Yer Numarası QA76.9 .A25<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394279326">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394279326</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Cyber defense : best practices for digital safety
ent://SD_ILS/0/SD_ILS:600003
2026-02-22T19:07:44Z
2026-02-22T19:07:44Z
Yazar Edwards, Jason, author.<br/>Yer Numarası QA76.9 .A25 E39 2025<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394337040">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394337040</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Next-generation systems and secure computing
ent://SD_ILS/0/SD_ILS:599779
2026-02-22T19:07:44Z
2026-02-22T19:07:44Z
Yazar Barman, Subhabrata, editor. Koley, Santanu, editor. Joardar, Subhankar, editor.<br/>Yer Numarası QA76.9 .A25 N49 2025<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394228522">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394228522</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Securing the digital frontier : threats and advanced techniques in security and forensics
ent://SD_ILS/0/SD_ILS:599732
2026-02-22T19:07:44Z
2026-02-22T19:07:44Z
Yazar Sharma, Kavita, 1985- editor.<br/>Yer Numarası QA76.9 .A25 S43 2025<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394268917">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394268917</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Automated secure computing for next-generation systems
ent://SD_ILS/0/SD_ILS:598752
2026-02-22T19:07:44Z
2026-02-22T19:07:44Z
Yazar Tyagi, Amit Kumar, editor.<br/>Yer Numarası QA76.9 .A25 A98 2024<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394213948">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394213948</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
The cybersecurity guide to governance, risk, and compliance
ent://SD_ILS/0/SD_ILS:598945
2026-02-22T19:07:44Z
2026-02-22T19:07:44Z
Yazar Edwards, Jason (Cybersecurity expert), author. Weaver, Griffin, author.<br/>Yer Numarası HD30.38 .E34 2024<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394250226">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394250226</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
CYBERSECURITY IN THE TRANSPORTATION INDUSTRY.
ent://SD_ILS/0/SD_ILS:599238
2026-02-22T19:07:44Z
2026-02-22T19:07:44Z
Yer Numarası HE194 .C93 2024<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394204472">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394204472</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
x86 software reverse-engineering, cracking, and counter-measures
ent://SD_ILS/0/SD_ILS:598920
2026-02-22T19:07:44Z
2026-02-22T19:07:44Z
Yazar Domas, Stephanie, author. Domas, Christopher, author.<br/>Yer Numarası QA76.9 .A25 D66 2024<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394277131">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394277131</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Effective vulnerability management : managing risk in the vulnerable digital ecosystem
ent://SD_ILS/0/SD_ILS:599047
2026-02-22T19:07:44Z
2026-02-22T19:07:44Z
Yazar Hughes, Chris (Christopher Matthew), author. Robinson, Nikki, author.<br/>Yer Numarası QA76.9 .A25 H84 2024<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394277155">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394277155</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Cyber Operations : A Case Study Approach
ent://SD_ILS/0/SD_ILS:599117
2026-02-22T19:07:44Z
2026-02-22T19:07:44Z
Yazar Couretas, Jerry M., 1966- author.<br/>Yer Numarası QA76.9 .A25<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119712121">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119712121</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Symmetric cryptography. Volume 1 : Design and security proofs
ent://SD_ILS/0/SD_ILS:598803
2026-02-22T19:07:44Z
2026-02-22T19:07:44Z
Yazar Boura, Christina, editor. Naya-Plasencia, Maria, editor.<br/>Yer Numarası Z104 .S966 2023<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394256358">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394256358</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Quantum computing in cybersecurity
ent://SD_ILS/0/SD_ILS:598685
2026-02-22T19:07:44Z
2026-02-22T19:07:44Z
Yazar Rawat, Romil, editor.<br/>Yer Numarası QA76.9 .A25 Q83 2023<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394167401">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394167401</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Cybersecurity for ehealth : a simplified guide to practical cybersecurity for non-technical healthcare stakeholders & practitioners
ent://SD_ILS/0/SD_ILS:566470
2026-02-22T19:07:44Z
2026-02-22T19:07:44Z
Yazar Ogu, Emmanuel C., author.<br/>Yer Numarası R859.7 .S43<br/>Elektronik Erişim Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003254416">https://www.taylorfrancis.com/books/9781003254416</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Cyber security and network security
ent://SD_ILS/0/SD_ILS:597484
2026-02-22T19:07:44Z
2026-02-22T19:07:44Z
Yazar Pramanik, Sabyasachi, editor. Samanta, Debabrata, 1987- editor. Vinay, M., editor. Guha, Abhijit, editor.<br/>Yer Numarası QA76.9 .A25<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119812555">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119812555</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Trust in computer systems and the cloud
ent://SD_ILS/0/SD_ILS:597142
2026-02-22T19:07:44Z
2026-02-22T19:07:44Z
Yazar Bursell, Mike, author.<br/>Yer Numarası QA76.9 .A25<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119695158">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119695158</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Cyber security and digital forensics
ent://SD_ILS/0/SD_ILS:597326
2026-02-22T19:07:44Z
2026-02-22T19:07:44Z
Yazar Ghonge, Mangesh, 1984- editor.<br/>Yer Numarası QA76.9 .A25<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119795667">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119795667</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Managing cybersecurity in the process industries
ent://SD_ILS/0/SD_ILS:597508
2026-02-22T19:07:44Z
2026-02-22T19:07:44Z
Yazar American Institute of Chemical Engineers. Center for Chemical Process Safety.<br/>Yer Numarası TP155.7<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119861812">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119861812</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
The CISO evolution : business knowledge for cybersecurity executives
ent://SD_ILS/0/SD_ILS:597056
2026-02-22T19:07:44Z
2026-02-22T19:07:44Z
Yazar Sharp, Matthew K., author. Lambros, Kyriakos P., author.<br/>Yer Numarası HD30.2 .S5325 2022<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119782513">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119782513</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Secure edge computing : applications, techniques and challenges.
ent://SD_ILS/0/SD_ILS:549783
2026-02-22T19:07:44Z
2026-02-22T19:07:44Z
Yazar Ahmed, Mohiuddin (Computer scientist), editor. Dowland, Paul, editor.<br/>Yer Numarası QA76.583 .S43 2021<br/>Elektronik Erişim Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003028635">https://www.taylorfrancis.com/books/9781003028635</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Hacking multifactor authentication
ent://SD_ILS/0/SD_ILS:596326
2026-02-22T19:07:44Z
2026-02-22T19:07:44Z
Yazar Grimes, Roger A., author.<br/>Yer Numarası QA76.9 .A25 G75 2021<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119672357">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119672357</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Privacy, regulations, and cybersecurity : the essential business guide
ent://SD_ILS/0/SD_ILS:596472
2026-02-22T19:07:44Z
2026-02-22T19:07:44Z
Yazar Moschovitis, Christos J. P., author.<br/>Yer Numarası HD61.5 .M675 2021 EB<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119660156">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119660156</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
You can stop stupid : stopping losses from accidental and malicious actions
ent://SD_ILS/0/SD_ILS:596502
2026-02-22T19:07:44Z
2026-02-22T19:07:44Z
Yazar Winkler, Ira, author. Brown, Tracy Celaya, author.<br/>Yer Numarası HD61.5 .W55 2021<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119623946">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119623946</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
VMware® Certified Professional Data Center Virtualization on vSphere 6.7 Exam 2V0-21.19 : study guide
ent://SD_ILS/0/SD_ILS:596289
2026-02-22T19:07:44Z
2026-02-22T19:07:44Z
Yazar Hall, Jon, 1963- author. Andrews, Joshua, author.<br/>Yer Numarası QA76.9 .V5<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119539698">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119539698</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Artificial intelligence and data mining approaches in security frameworks
ent://SD_ILS/0/SD_ILS:596957
2026-02-22T19:07:44Z
2026-02-22T19:07:44Z
Yazar Bhargava, Neeraj. Bhargava, Ritu. Rathore, Pramod Singh, 1988- Agrawal, Rashmi, 1978-<br/>Yer Numarası Q335<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119760429">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119760429</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Cybersecurity in humanities and social sciences : a research methods approach
ent://SD_ILS/0/SD_ILS:596373
2026-02-22T19:07:44Z
2026-02-22T19:07:44Z
Yazar Loiseau, Hugo, editor. Ventre, Daniel, editor. Aden, Hartmut, editor.<br/>Yer Numarası QA76.9 .A25<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119777588">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119777588</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Artificial intelligence, cybersecurity and cyber defense
ent://SD_ILS/0/SD_ILS:596423
2026-02-22T19:07:44Z
2026-02-22T19:07:44Z
Yazar Ventre, Daniel, author.<br/>Yer Numarası Q335 .V46 2020 EB<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119788195">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119788195</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Hands on hacking
ent://SD_ILS/0/SD_ILS:596316
2026-02-22T19:07:44Z
2026-02-22T19:07:44Z
Yazar Hickey, Matthew (Computer security expert), author. Arcuri, Jennifer, author.<br/>Yer Numarası QA76.9 .A25 H53 2020 EB<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119561507">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119561507</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Tribe of hackers blue team : tribal knowledge from the best in defensive cybersecurity
ent://SD_ILS/0/SD_ILS:596276
2026-02-22T19:07:44Z
2026-02-22T19:07:44Z
Yazar Carey, Marcus J. (Cybersecurity professional) Jin, Jennifer.<br/>Yer Numarası QA76.9 .A25 C3673 2020<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119643432">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119643432</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Tribe of hackers security leaders : tribal knowledge from the best in cybersecurity leadership
ent://SD_ILS/0/SD_ILS:595887
2026-02-22T19:07:44Z
2026-02-22T19:07:44Z
Yazar Carey, Marcus J. (Cybersecurity professional), author. Jin, Jennifer.<br/>Yer Numarası QA76.9 .A25 C37 2020<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119643784">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119643784</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Transformational security awareness : what neuroscientists, storytellers, and marketers can teach us about driving secure behaviors
ent://SD_ILS/0/SD_ILS:595304
2026-02-22T19:07:44Z
2026-02-22T19:07:44Z
Yazar Carpenter, Perry, author.<br/>Yer Numarası QA76.9 .A25 C37 2019 EB<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119566380">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119566380</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Cybersecurity blue team toolkit
ent://SD_ILS/0/SD_ILS:595209
2026-02-22T19:07:44Z
2026-02-22T19:07:44Z
Yazar Tanner, Nadean H., author.<br/>Yer Numarası QA76.9 .A25 T36 2019 EB<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119552963">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119552963</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Tribe of hackers red team : tribal knowledge from the best in offensive cybersecurity
ent://SD_ILS/0/SD_ILS:595415
2026-02-22T19:07:44Z
2026-02-22T19:07:44Z
Yazar Carey, Marcus J. (Cybersecurity professional), author. Jin, Jennifer, author.<br/>Yer Numarası QA76.9 .A25 C368 2019<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119643357">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119643357</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
We have root : even more advice from Schneier on security
ent://SD_ILS/0/SD_ILS:595432
2026-02-22T19:07:44Z
2026-02-22T19:07:44Z
Yazar Schneier, Bruce, 1963- author.<br/>Yer Numarası QA76.9 .A25 S36 2019<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119653554">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119653554</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
The Digital Big Bang : the Hard Stuff, the Soft Stuff, and the Future of Cybersecurity
ent://SD_ILS/0/SD_ILS:595435
2026-02-22T19:07:44Z
2026-02-22T19:07:44Z
Yazar Quade, Phil.<br/>Yer Numarası QA76.9 .A25<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119617396">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119617396</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Cyber security in parallel and distributed computing : concepts, techniques, applications and case studies
ent://SD_ILS/0/SD_ILS:595099
2026-02-22T19:07:44Z
2026-02-22T19:07:44Z
Yazar Le, Dac-Nhuong, 1983- editor. Kumar, Raghvendra, 1987- editor. Mishra, Brojo Kishore, 1979- editor. Khari, Manju, editor. Chatterjee, Jyotir Moy, editor.<br/>Yer Numarası QA76.9 .A25<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119488330">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119488330</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
An introduction to cyber modeling and simulation
ent://SD_ILS/0/SD_ILS:594699
2026-02-22T19:07:44Z
2026-02-22T19:07:44Z
Yazar Couretas, Jerry M., 1966- author.<br/>Yer Numarası QA76.9 .C65<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119420842">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119420842</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Digital forensics
ent://SD_ILS/0/SD_ILS:593346
2026-02-22T19:07:44Z
2026-02-22T19:07:44Z
Yazar Årnes, André, 1976- editor.<br/>Yer Numarası HV8079 .C65<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119262442">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119262442</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Insider threats
ent://SD_ILS/0/SD_ILS:594407
2026-02-22T19:07:44Z
2026-02-22T19:07:44Z
Yazar Arduin, Pierre-Emmanuel, author.<br/>Yer Numarası QA76.9 .A25<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119419785">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119419785</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Social engineering : the science of human hacking
ent://SD_ILS/0/SD_ILS:594635
2026-02-22T19:07:44Z
2026-02-22T19:07:44Z
Yazar Hadnagy, Christopher, author.<br/>Yer Numarası HM668 .H33 2018<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119433729">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119433729</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Unauthorized Access : The Crisis in Online Privacy and Security.
ent://SD_ILS/0/SD_ILS:543688
2026-02-22T19:07:44Z
2026-02-22T19:07:44Z
Yazar Sloan, Robert, author. CRC Press LLC.<br/>Yer Numarası TK5105.878 .S59 2017<br/>Elektronik Erişim Taylor & Francis <a href="https://www.taylorfrancis.com/books/9780429093791">https://www.taylorfrancis.com/books/9780429093791</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Hacking the hacker : learn from the experts who take down hackers
ent://SD_ILS/0/SD_ILS:593636
2026-02-22T19:07:44Z
2026-02-22T19:07:44Z
Yazar Grimes, Roger A., author.<br/>Yer Numarası QA76.9 .A25<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119396260">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119396260</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Wireshark for security professionals : using Wireshark and the Metasploit Framework
ent://SD_ILS/0/SD_ILS:593472
2026-02-22T19:07:44Z
2026-02-22T19:07:44Z
Yazar Bullock, Jessey, author. Gordon, Adam, author.<br/>Yer Numarası QA76.9 .A25<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119183457">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119183457</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Cyber threat! : how to manage the growing risk of cyber attacks
ent://SD_ILS/0/SD_ILS:342020
2026-02-22T19:07:44Z
2026-02-22T19:07:44Z
Yazar Ulsch, N. MacDonnell, 1951-<br/>Yer Numarası ONLINE(342020.1)<br/>Elektronik Erişim ebrary <a href="http://alltitles.ebrary.com/Doc?id=10895757">An electronic book accessible through the World Wide Web; click to view</a>
Ebook Library <a href="http://public.eblib.com/choice/publicfullrecord.aspx?p=1742833">http://public.eblib.com/choice/publicfullrecord.aspx?p=1742833</a>
John Wiley <a href="http://dx.doi.org/10.1002/9781118915028">http://dx.doi.org/10.1002/9781118915028</a>
MyiLibrary <a href="http://www.myilibrary.com?id=629214">http://www.myilibrary.com?id=629214</a>
Cover <a href="http://swbplus.bsz-bw.de/bsz410564842cov.htm">http://swbplus.bsz-bw.de/bsz410564842cov.htm</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Network security essentials : applications and standards
ent://SD_ILS/0/SD_ILS:354232
2026-02-22T19:07:44Z
2026-02-22T19:07:44Z
Yazar Stallings, William.<br/>Yer Numarası TK5105.59 S725 2014<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>
Security without obscurity : a guide to confidentiality, authentication, and integrity
ent://SD_ILS/0/SD_ILS:544118
2026-02-22T19:07:44Z
2026-02-22T19:07:44Z
Yazar Stapleton, Jeffrey James, author.<br/>Yer Numarası QA76.9 .A25 S734 2014<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9781466592155">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>
Cryptography and network security : principles and practice
ent://SD_ILS/0/SD_ILS:371288
2026-02-22T19:07:44Z
2026-02-22T19:07:44Z
Yazar Stallings, William.<br/>Yer Numarası TK5105.59 S713 2014<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>
The state of the art in intrusion prevention and detection
ent://SD_ILS/0/SD_ILS:543676
2026-02-22T19:07:44Z
2026-02-22T19:07:44Z
Yazar Pathan, Al-Sakib Khan, editor.<br/>Yer Numarası QA76.9 .A25 S7354 2014<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9781482203523">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>
Elementary information security
ent://SD_ILS/0/SD_ILS:271272
2026-02-22T19:07:44Z
2026-02-22T19:07:44Z
Yazar Smith, Richard E.<br/>Yer Numarası QA76.9.A25 S652 2013<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>
The complete guide to physical security
ent://SD_ILS/0/SD_ILS:545960
2026-02-22T19:07:44Z
2026-02-22T19:07:44Z
Yazar Baker, Paul, 1958, author. Benny, Daniel J.<br/>Yer Numarası HV8290 .B34 2013<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9781420099645">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>
The complete book of data anonymization : from planning to implementation
ent://SD_ILS/0/SD_ILS:540169
2026-02-22T19:07:44Z
2026-02-22T19:07:44Z
Yazar Raghunathan, Balaji., author.<br/>Yer Numarası QA76.9 .A25 R338 2013<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9781439877319">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>
Computer security : principles and practice
ent://SD_ILS/0/SD_ILS:313473
2026-02-22T19:07:44Z
2026-02-22T19:07:44Z
Yazar Stallings, William. Brown, Lawrie<br/>Yer Numarası QA76.9 S73 2012<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>
Security strategies in Windows platforms and applications
ent://SD_ILS/0/SD_ILS:271537
2026-02-22T19:07:44Z
2026-02-22T19:07:44Z
Yazar Solomon, Michael.<br/>Yer Numarası QA76.76.O63 S64 2011<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>
Security 2020 reduce security risks this decade
ent://SD_ILS/0/SD_ILS:318966
2026-02-22T19:07:44Z
2026-02-22T19:07:44Z
Yazar Howard, Doug. Prince, Kevin.<br/>Yer Numarası ONLINE(318966.1)<br/>Elektronik Erişim Wiley InterScience <a href="http://dx.doi.org/10.1002/9781118255803">An electronic book accessible through the World Wide Web; click for information</a>
Books24x7 <a href="http://www.books24x7.com/marc.asp?bookid=40805">http://www.books24x7.com/marc.asp?bookid=40805</a>
Ebook Library <a href="http://public.eblib.com/choice/publicfullrecord.aspx?p=694289">http://public.eblib.com/choice/publicfullrecord.aspx?p=694289</a>
ebrary <a href="http://site.ebrary.com/id/10469690">http://site.ebrary.com/id/10469690</a>
MyiLibrary <a href="http://www.myilibrary.com?id=294413">http://www.myilibrary.com?id=294413</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
CISO soft skills : securing organizations impaired by employee politics, apathy, and intolerant perspectives
ent://SD_ILS/0/SD_ILS:544153
2026-02-22T19:07:44Z
2026-02-22T19:07:44Z
Yazar Collette, Ronald D., author. Gentile, Michael. Gentile, Skye.<br/>Yer Numarası HF5548.37 .G462 2009<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9781420089110">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>
Digital privacy : theory, technologies, and practices
ent://SD_ILS/0/SD_ILS:547774
2026-02-22T19:07:44Z
2026-02-22T19:07:44Z
Yazar Acquisti, Alessandro.<br/>Yer Numarası QA76.9 .A25 D528 2008<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9781420052183">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>
Data warehousing and data mining techniques for cyber security
ent://SD_ILS/0/SD_ILS:110434
2026-02-22T19:07:44Z
2026-02-22T19:07:44Z
Yazar Singhal, Anoop, 1958-<br/>Yer Numarası QA76.9.A25 S563 2007<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>
Software deployment, updating, and patching
ent://SD_ILS/0/SD_ILS:544966
2026-02-22T19:07:44Z
2026-02-22T19:07:44Z
Yazar Stackpole, Bill., author. Hanrion, Patrick.<br/>Yer Numarası QA76.76 .C69 S74 2007<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9781420013290">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>
Information security : principles and practice
ent://SD_ILS/0/SD_ILS:109477
2026-02-22T19:07:44Z
2026-02-22T19:07:44Z
Yazar Stamp, Mark.<br/>Yer Numarası QA76.9.A25 S69 2006<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>
Cryptography, information theory, and error-correction : a handbook for the 21st century
ent://SD_ILS/0/SD_ILS:593044
2026-02-22T19:07:44Z
2026-02-22T19:07:44Z
Yazar Bruen, Aiden A., 1941- Forcinito, Mario, 1962-<br/>Yer Numarası QA76.9 .A25 B79 2005<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781118033296">https://onlinelibrary.wiley.com/doi/book/10.1002/9781118033296</a>
<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119582397">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119582397</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Malware : fighting malicious code
ent://SD_ILS/0/SD_ILS:267737
2026-02-22T19:07:44Z
2026-02-22T19:07:44Z
Yazar Skoudis, Ed. Zeltser, Lenny.<br/>Yer Numarası QA76.9.A25 S58 2004<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>
Public key infrastructure : building trusted applications and Web services
ent://SD_ILS/0/SD_ILS:543281
2026-02-22T19:07:44Z
2026-02-22T19:07:44Z
Yazar Vacca, John R.<br/>Yer Numarası QA76.9 .A25 P85 2004<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9780203498156">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>
Applied cryptography : protocols, algorithms, and source code in C
ent://SD_ILS/0/SD_ILS:108014
2026-02-22T19:07:44Z
2026-02-22T19:07:44Z
Yazar Schneier, Bruce.<br/>Yer Numarası QA76.9.A25 S35 1996<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>