Arama Sonuçları Standards. - Daraltılmış: Security.
SirsiDynix Enterprise
https://katalog.hacettepe.edu.tr/client/tr_TR/default_tr/default_tr/qu$003dStandards.$0026qf$003dSUBJECT$002509Konu$002509Security.$002509Security.$0026ps$003d300?
2026-02-10T09:45:28Z
Cryptography : algorithms, protocols, and standards for computer security
ent://SD_ILS/0/SD_ILS:598914
2026-02-10T09:45:28Z
2026-02-10T09:45:28Z
Yazar Mammeri, Zoubir, author.<br/>Yer Numarası QA268 .M34 2024<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394207510">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394207510</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Information security and privacy quick reference the essential handbook for every CISO, CSO, and Chief Privacy Officer
ent://SD_ILS/0/SD_ILS:599946
2026-02-10T09:45:28Z
2026-02-10T09:45:28Z
Yazar Chapple, Mike, author. Shelley, Joe. Stewart, James Michael.<br/>Yer Numarası QA76.9 .A25 C43 2025<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394353347">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394353347</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Stepping through cybersecurity risk management : a systems thinking approach
ent://SD_ILS/0/SD_ILS:599021
2026-02-10T09:45:28Z
2026-02-10T09:45:28Z
Yazar Bayuk, Jennifer L., author.<br/>Yer Numarası QA76.9 .A25 B39 2024<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394213986">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394213986</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
The cybersecurity guide to governance, risk, and compliance
ent://SD_ILS/0/SD_ILS:598945
2026-02-10T09:45:28Z
2026-02-10T09:45:28Z
Yazar Edwards, Jason (Cybersecurity expert), author. Weaver, Griffin, author.<br/>Yer Numarası HD30.38 .E34 2024<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394250226">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394250226</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Cyber threat intelligence
ent://SD_ILS/0/SD_ILS:598051
2026-02-10T09:45:28Z
2026-02-10T09:45:28Z
Yazar Lee, Martin (Computer security expert), author.<br/>Yer Numarası TK5105.59 .L47 2023<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119861775">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119861775</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Privacy, regulations, and cybersecurity : the essential business guide
ent://SD_ILS/0/SD_ILS:596472
2026-02-10T09:45:28Z
2026-02-10T09:45:28Z
Yazar Moschovitis, Christos J. P., author.<br/>Yer Numarası HD61.5 .M675 2021 EB<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119660156">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119660156</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Implementing cryptography using Python
ent://SD_ILS/0/SD_ILS:596198
2026-02-10T09:45:28Z
2026-02-10T09:45:28Z
Yazar Bray, Shannon, 1972-<br/>Yer Numarası QA76.9 .A25<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119612216">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119612216</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Cybersecurity program development for business : the essential planning guide
ent://SD_ILS/0/SD_ILS:594455
2026-02-10T09:45:28Z
2026-02-10T09:45:28Z
Yazar Moschovitis, Christos J. P., author.<br/>Yer Numarası HD30.2<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119430018">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119430018</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>