Arama Sonuçları information analysis. - Daraltılmış: Security.SirsiDynix Enterprisehttps://katalog.hacettepe.edu.tr/client/tr_TR/default_tr/default_tr/qu$003dinformation$002banalysis.$0026qf$003dSUBJECT$002509Konu$002509Security.$002509Security.$0026ic$003dtrue$0026ps$003d300?2026-01-21T08:05:40ZLiars and outliers : enabling the trust that society needs to thriveent://SD_ILS/0/SD_ILS:6002352026-01-21T08:05:40Z2026-01-21T08:05:40ZYazar Schneier, Bruce, 1963- author.<br/>Yer Numarası HM1204 .S35 2026<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394406715">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394406715</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Stepping through cybersecurity risk management : a systems thinking approachent://SD_ILS/0/SD_ILS:5990212026-01-21T08:05:40Z2026-01-21T08:05:40ZYazar Bayuk, Jennifer L., author.<br/>Yer Numarası QA76.9 .A25 B39 2024<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394213986">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394213986</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Technologies and African societies in pandemic times : using technology to survive and thrive during the Covid-19 eraent://SD_ILS/0/SD_ILS:5984892026-01-21T08:05:40Z2026-01-21T08:05:40ZYer Numarası T28 .A1 T43 2023<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394225903">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394225903</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Cyber security and network securityent://SD_ILS/0/SD_ILS:5974842026-01-21T08:05:40Z2026-01-21T08:05:40ZYazar Pramanik, Sabyasachi, editor. Samanta, Debabrata, 1987- editor. Vinay, M., editor. Guha, Abhijit, editor.<br/>Yer Numarası QA76.9 .A25<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119812555">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119812555</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Blockchain for distributed systems securityent://SD_ILS/0/SD_ILS:5951462026-01-21T08:05:40Z2026-01-21T08:05:40ZYazar Shetty, Sachin, editor. Kamhoua, Charles A., edtior. Njilla, Laurent L., editor.<br/>Yer Numarası QA76.9 .B56 B56 2019 EB<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119519621">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119519621</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Cyber-vigilance and digital trust : cyber security in the era of cloud computing and IoTent://SD_ILS/0/SD_ILS:5952792026-01-21T08:05:40Z2026-01-21T08:05:40ZYazar Tounsi, Wiem, editor.<br/>Yer Numarası QA76.9 .A25 C93 2019 EB<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119618393">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119618393</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Wireshark for security professionals : using Wireshark and the Metasploit Frameworkent://SD_ILS/0/SD_ILS:5934722026-01-21T08:05:40Z2026-01-21T08:05:40ZYazar Bullock, Jessey, author. Gordon, Adam, author.<br/>Yer Numarası QA76.9 .A25<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119183457">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119183457</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Network forensicsent://SD_ILS/0/SD_ILS:5938142026-01-21T08:05:40Z2026-01-21T08:05:40ZYazar Messier, Ric, author.<br/>Yer Numarası TK5105.59<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119329190">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119329190</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>