Arama Sonuçları Surveillance des menaces informatiques.SirsiDynix Enterprisehttps://catalog.iyte.edu.tr/client/en_US/default/default/qu$003dSurveillance$002bdes$002bmenaces$002binformatiques.$0026ps$003d300?dt=list2025-09-08T16:53:20ZTo improve cybersecurity, think like a hackerent://SD_ILS/0/SD_ILS:23131252025-09-08T16:53:20Z2025-09-08T16:53:20Zby Esteves, José, 1970- author.<br/><a href="https://learning.oreilly.com/library/view/~/53863MIT58314">https://learning.oreilly.com/library/view/~/53863MIT58314</a>
<a href="https://go.oreilly.com/library-access/library/view/-/53863MIT58314/?ar">https://go.oreilly.com/library-access/library/view/-/53863MIT58314/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/53863MIT58314/?ar">https://learning.oreilly.com/library/view/~/53863MIT58314/?ar</a><br/>Format: Electronic Resources<br/>Understand, manage, and measure cyber risk : practical solutions for creating a sustainable cyber programent://SD_ILS/0/SD_ILS:23314282025-09-08T16:53:20Z2025-09-08T16:53:20Zby Leirvik, Ryan, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781484278215/?ar">https://go.oreilly.com/library-access/library/view/-/9781484278215/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484278215/?ar">https://learning.oreilly.com/library/view/~/9781484278215/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484278215">https://learning.oreilly.com/library/view/~/9781484278215</a><br/>Format: Electronic Resources<br/>The art of cyberwarfare : an investigator's guide to espionage, ransomware, and organized cybercrimeent://SD_ILS/0/SD_ILS:23308732025-09-08T16:53:20Z2025-09-08T16:53:20Zby DiMaggio, Jon, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781098130190/?ar">https://learning.oreilly.com/library/view/~/9781098130190/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781098130190/?ar">https://go.oreilly.com/library-access/library/view/-/9781098130190/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781098130190">https://learning.oreilly.com/library/view/~/9781098130190</a><br/>Format: Electronic Resources<br/>Cyber security : a practitioner's guideent://SD_ILS/0/SD_ILS:23137632025-09-08T16:53:20Z2025-09-08T16:53:20Zby Sutton, David (Information security practitioner), author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781780173405/?ar">https://go.oreilly.com/library-access/library/view/-/9781780173405/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781780173405/?ar">https://learning.oreilly.com/library/view/~/9781780173405/?ar</a><br/>Format: Electronic Resources<br/>Financial cybersecurity risk management : leadership perspectives and guidance for systems and institutionsent://SD_ILS/0/SD_ILS:23182612025-09-08T16:53:20Z2025-09-08T16:53:20Zby Rohmeyer, Paul, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781484241943">https://learning.oreilly.com/library/view/~/9781484241943</a>
<a href="https://learning.oreilly.com/library/view/~/9781484241943/?ar">https://learning.oreilly.com/library/view/~/9781484241943/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781484241943/?ar">https://go.oreilly.com/library-access/library/view/-/9781484241943/?ar</a><br/>Format: Electronic Resources<br/>Mastering cyber intelligence : gain comprehensive knowledge and skills to conduct threat intelligence for effective system defenseent://SD_ILS/0/SD_ILS:23326682025-09-08T16:53:20Z2025-09-08T16:53:20Zby Dahj, Jean Nestor M.<br/><a href="https://learning.oreilly.com/library/view/~/9781800209404">https://learning.oreilly.com/library/view/~/9781800209404</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781800209404/?ar">https://go.oreilly.com/library-access/library/view/-/9781800209404/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781800209404/?ar">https://learning.oreilly.com/library/view/~/9781800209404/?ar</a><br/>Format: Electronic Resources<br/>Handbook of system safety and security : cyber risk and risk management, cyber security, threat analysis, functional safety, software systems, and cyber physical systemsent://SD_ILS/0/SD_ILS:23116092025-09-08T16:53:20Z2025-09-08T16:53:20Zby Griffor, Edward R., editor.<br/><a href="https://learning.oreilly.com/library/view/~/9780128038383/?ar">https://learning.oreilly.com/library/view/~/9780128038383/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780128038383/?ar">https://go.oreilly.com/library-access/library/view/-/9780128038383/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780128038383">https://learning.oreilly.com/library/view/~/9780128038383</a><br/>Format: Electronic Resources<br/>Enhanced cyber security with IBM Spectrum Scale and IBM QRadar : accurately detecting and prioritizing threats to your dataent://SD_ILS/0/SD_ILS:23222042025-09-08T16:53:20Z2025-09-08T16:53:20Zby Chakrabarty, Boudhayan, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780738458014/?ar">https://learning.oreilly.com/library/view/~/9780738458014/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780738458014">https://learning.oreilly.com/library/view/~/9780738458014</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780738458014/?ar">https://go.oreilly.com/library-access/library/view/-/9780738458014/?ar</a><br/>Format: Electronic Resources<br/>Hands-on cybersecurity for finance : identify vulnerabilities and secure your financial services from security breachesent://SD_ILS/0/SD_ILS:23193302025-09-08T16:53:20Z2025-09-08T16:53:20Zby Ozkaya, Erdal, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781788836296/?ar">https://go.oreilly.com/library-access/library/view/-/9781788836296/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781788836296/?ar">https://learning.oreilly.com/library/view/~/9781788836296/?ar</a><br/>Format: Electronic Resources<br/>Cyber reconnaissance surveillance and defenseent://SD_ILS/0/SD_ILS:23049792025-09-08T16:53:20Z2025-09-08T16:53:20Zby Shimonski, Robert, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780128013083">https://learning.oreilly.com/library/view/~/9780128013083</a>
<a href="https://learning.oreilly.com/library/view/~/9780128013083/?ar">https://learning.oreilly.com/library/view/~/9780128013083/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780128013083/?ar">https://go.oreilly.com/library-access/library/view/-/9780128013083/?ar</a><br/>Format: Electronic Resources<br/>Practical cyber intelligence : how action-based intelligence can be an effective response to incidentsent://SD_ILS/0/SD_ILS:23163482025-09-08T16:53:20Z2025-09-08T16:53:20Zby Bautista, Wilson, Jr., author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781788625562/?ar">https://go.oreilly.com/library-access/library/view/-/9781788625562/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781788625562">https://learning.oreilly.com/library/view/~/9781788625562</a>
<a href="https://learning.oreilly.com/library/view/~/9781788625562/?ar">https://learning.oreilly.com/library/view/~/9781788625562/?ar</a><br/>Format: Electronic Resources<br/>The future of cyber security and security innovation.ent://SD_ILS/0/SD_ILS:23088892025-09-08T16:53:20Z2025-09-08T16:53:20Zby Suits and spooks conference (2015 : New York, N.Y.)<br/><a href="https://learning.oreilly.com/videos/~/9781491937198/?ar">https://learning.oreilly.com/videos/~/9781491937198/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781491937198/?ar">https://go.oreilly.com/library-access/library/view/-/9781491937198/?ar</a><br/>Format: Electronic Resources<br/>