Arama Sonu&ccedil;ları Surveillance des menaces informatiques. SirsiDynix Enterprise https://catalog.iyte.edu.tr/client/en_US/default/default/qu$003dSurveillance$002bdes$002bmenaces$002binformatiques.$0026ps$003d300?dt=list 2025-09-08T16:53:20Z To improve cybersecurity, think like a hacker ent://SD_ILS/0/SD_ILS:2313125 2025-09-08T16:53:20Z 2025-09-08T16:53:20Z by&#160;Esteves, Jos&eacute;, 1970- author.<br/><a href="https://learning.oreilly.com/library/view/~/53863MIT58314">https://learning.oreilly.com/library/view/~/53863MIT58314</a> <a href="https://go.oreilly.com/library-access/library/view/-/53863MIT58314/?ar">https://go.oreilly.com/library-access/library/view/-/53863MIT58314/?ar</a> <a href="https://learning.oreilly.com/library/view/~/53863MIT58314/?ar">https://learning.oreilly.com/library/view/~/53863MIT58314/?ar</a><br/>Format:&#160;Electronic Resources<br/> Understand, manage, and measure cyber risk : practical solutions for creating a sustainable cyber program ent://SD_ILS/0/SD_ILS:2331428 2025-09-08T16:53:20Z 2025-09-08T16:53:20Z by&#160;Leirvik, Ryan, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781484278215/?ar">https://go.oreilly.com/library-access/library/view/-/9781484278215/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781484278215/?ar">https://learning.oreilly.com/library/view/~/9781484278215/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781484278215">https://learning.oreilly.com/library/view/~/9781484278215</a><br/>Format:&#160;Electronic Resources<br/> The art of cyberwarfare : an investigator's guide to espionage, ransomware, and organized cybercrime ent://SD_ILS/0/SD_ILS:2330873 2025-09-08T16:53:20Z 2025-09-08T16:53:20Z by&#160;DiMaggio, Jon, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781098130190/?ar">https://learning.oreilly.com/library/view/~/9781098130190/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781098130190/?ar">https://go.oreilly.com/library-access/library/view/-/9781098130190/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781098130190">https://learning.oreilly.com/library/view/~/9781098130190</a><br/>Format:&#160;Electronic Resources<br/> Cyber security : a practitioner's guide ent://SD_ILS/0/SD_ILS:2313763 2025-09-08T16:53:20Z 2025-09-08T16:53:20Z by&#160;Sutton, David (Information security practitioner), author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781780173405/?ar">https://go.oreilly.com/library-access/library/view/-/9781780173405/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781780173405/?ar">https://learning.oreilly.com/library/view/~/9781780173405/?ar</a><br/>Format:&#160;Electronic Resources<br/> Financial cybersecurity risk management : leadership perspectives and guidance for systems and institutions ent://SD_ILS/0/SD_ILS:2318261 2025-09-08T16:53:20Z 2025-09-08T16:53:20Z by&#160;Rohmeyer, Paul, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781484241943">https://learning.oreilly.com/library/view/~/9781484241943</a> <a href="https://learning.oreilly.com/library/view/~/9781484241943/?ar">https://learning.oreilly.com/library/view/~/9781484241943/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781484241943/?ar">https://go.oreilly.com/library-access/library/view/-/9781484241943/?ar</a><br/>Format:&#160;Electronic Resources<br/> Mastering cyber intelligence : gain comprehensive knowledge and skills to conduct threat intelligence for effective system defense ent://SD_ILS/0/SD_ILS:2332668 2025-09-08T16:53:20Z 2025-09-08T16:53:20Z by&#160;Dahj, Jean Nestor M.<br/><a href="https://learning.oreilly.com/library/view/~/9781800209404">https://learning.oreilly.com/library/view/~/9781800209404</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781800209404/?ar">https://go.oreilly.com/library-access/library/view/-/9781800209404/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781800209404/?ar">https://learning.oreilly.com/library/view/~/9781800209404/?ar</a><br/>Format:&#160;Electronic Resources<br/> Handbook of system safety and security : cyber risk and risk management, cyber security, threat analysis, functional safety, software systems, and cyber physical systems ent://SD_ILS/0/SD_ILS:2311609 2025-09-08T16:53:20Z 2025-09-08T16:53:20Z by&#160;Griffor, Edward R., editor.<br/><a href="https://learning.oreilly.com/library/view/~/9780128038383/?ar">https://learning.oreilly.com/library/view/~/9780128038383/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780128038383/?ar">https://go.oreilly.com/library-access/library/view/-/9780128038383/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780128038383">https://learning.oreilly.com/library/view/~/9780128038383</a><br/>Format:&#160;Electronic Resources<br/> Enhanced cyber security with IBM Spectrum Scale and IBM QRadar : accurately detecting and prioritizing threats to your data ent://SD_ILS/0/SD_ILS:2322204 2025-09-08T16:53:20Z 2025-09-08T16:53:20Z by&#160;Chakrabarty, Boudhayan, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780738458014/?ar">https://learning.oreilly.com/library/view/~/9780738458014/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780738458014">https://learning.oreilly.com/library/view/~/9780738458014</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780738458014/?ar">https://go.oreilly.com/library-access/library/view/-/9780738458014/?ar</a><br/>Format:&#160;Electronic Resources<br/> Hands-on cybersecurity for finance : identify vulnerabilities and secure your financial services from security breaches ent://SD_ILS/0/SD_ILS:2319330 2025-09-08T16:53:20Z 2025-09-08T16:53:20Z by&#160;Ozkaya, Erdal, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781788836296/?ar">https://go.oreilly.com/library-access/library/view/-/9781788836296/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781788836296/?ar">https://learning.oreilly.com/library/view/~/9781788836296/?ar</a><br/>Format:&#160;Electronic Resources<br/> Cyber reconnaissance surveillance and defense ent://SD_ILS/0/SD_ILS:2304979 2025-09-08T16:53:20Z 2025-09-08T16:53:20Z by&#160;Shimonski, Robert, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780128013083">https://learning.oreilly.com/library/view/~/9780128013083</a> <a href="https://learning.oreilly.com/library/view/~/9780128013083/?ar">https://learning.oreilly.com/library/view/~/9780128013083/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780128013083/?ar">https://go.oreilly.com/library-access/library/view/-/9780128013083/?ar</a><br/>Format:&#160;Electronic Resources<br/> Practical cyber intelligence : how action-based intelligence can be an effective response to incidents ent://SD_ILS/0/SD_ILS:2316348 2025-09-08T16:53:20Z 2025-09-08T16:53:20Z by&#160;Bautista, Wilson, Jr., author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781788625562/?ar">https://go.oreilly.com/library-access/library/view/-/9781788625562/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781788625562">https://learning.oreilly.com/library/view/~/9781788625562</a> <a href="https://learning.oreilly.com/library/view/~/9781788625562/?ar">https://learning.oreilly.com/library/view/~/9781788625562/?ar</a><br/>Format:&#160;Electronic Resources<br/> The future of cyber security and security innovation. ent://SD_ILS/0/SD_ILS:2308889 2025-09-08T16:53:20Z 2025-09-08T16:53:20Z by&#160;Suits and spooks conference (2015 : New York, N.Y.)<br/><a href="https://learning.oreilly.com/videos/~/9781491937198/?ar">https://learning.oreilly.com/videos/~/9781491937198/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781491937198/?ar">https://go.oreilly.com/library-access/library/view/-/9781491937198/?ar</a><br/>Format:&#160;Electronic Resources<br/>