Search Results for Assessment. - Narrowed by: Data protection.
SirsiDynix Enterprise
https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dAssessment.$0026qf$003dSUBJECT$002509Subject$002509Data$002bprotection.$002509Data$002bprotection.$0026ic$003dtrue$0026ps$003d300?dt=list
2026-01-14T11:13:06Z
Security Assessment in Vehicular Networks
ent://SD_ILS/0/SD_ILS:332479
2026-01-14T11:13:06Z
2026-01-14T11:13:06Z
Author Du, Suguo. author. Zhu, Haojin. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(332479.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-1-4614-9357-0">http://dx.doi.org/10.1007/978-1-4614-9357-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Quantitative Security Risk Assessment of Enterprise Networks
ent://SD_ILS/0/SD_ILS:174032
2026-01-14T11:13:06Z
2026-01-14T11:13:06Z
Author Ou, Xinming. author. Singhal, Anoop. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-1-4614-1860-3">http://dx.doi.org/10.1007/978-1-4614-1860-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
The security risk assessment handbook : a complete guide for performing security risk assessments
ent://SD_ILS/0/SD_ILS:549829
2026-01-14T11:13:06Z
2026-01-14T11:13:06Z
Author Landoll, Douglas J., author.<br/>Preferred Shelf Number HF5548.37 .L358 2021 EB<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003090441">https://www.taylorfrancis.com/books/9781003090441</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Detection of Intrusions and Malware, and Vulnerability Assessment 10th International Conference, DIMVA 2013, Berlin, Germany, July 18-19, 2013. Proceedings
ent://SD_ILS/0/SD_ILS:334760
2026-01-14T11:13:06Z
2026-01-14T11:13:06Z
Author Rieck, Konrad. editor. Stewin, Patrick. editor. Seifert, Jean-Pierre. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(334760.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-39235-1">http://dx.doi.org/10.1007/978-3-642-39235-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Detection of Intrusions and Malware, and Vulnerability Assessment 9th International Conference, DIMVA 2012, Heraklion, Crete, Greece, July 26-27, 2012, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:334403
2026-01-14T11:13:06Z
2026-01-14T11:13:06Z
Author Flegel, Ulrich. editor. Markatos, Evangelos. editor. Robertson, William. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(334403.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-37300-8">http://dx.doi.org/10.1007/978-3-642-37300-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information security risk assessment toolkit practical assessments through data collection and data analysis
ent://SD_ILS/0/SD_ILS:145470
2026-01-14T11:13:06Z
2026-01-14T11:13:06Z
Author Talabis, Mark. Martin, Jason.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597497350">http://www.sciencedirect.com/science/book/9781597497350</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
The security risk assessment handbook : a complete guide for performing security risk assessments
ent://SD_ILS/0/SD_ILS:539743
2026-01-14T11:13:06Z
2026-01-14T11:13:06Z
Author Landoll, Douglas J., author.<br/>Preferred Shelf Number HF5548.37 .L358 2011<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781439821497">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>
Detection of Intrusions and Malware, and Vulnerability Assessment 6th International Conference, DIMVA 2009, Como, Italy, July 9-10, 2009. Proceedings
ent://SD_ILS/0/SD_ILS:190460
2026-01-14T11:13:06Z
2026-01-14T11:13:06Z
Author Flegel, Ulrich. editor. Bruschi, Danilo. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-02918-9">http://dx.doi.org/10.1007/978-3-642-02918-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Detection of Intrusions and Malware, and Vulnerability Assessment 5th International Conference, DIMVA 2008, Paris, France, July 10-11, 2008. Proceedings
ent://SD_ILS/0/SD_ILS:185981
2026-01-14T11:13:06Z
2026-01-14T11:13:06Z
Author Zamboni, Diego. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-540-70542-0">http://dx.doi.org/10.1007/978-3-540-70542-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Detection of Intrusions and Malware, and Vulnerability Assessment 4th International Conference, DIMVA 2007 Lucerne, Switzerland, July 12-13, 2007 Proceedings
ent://SD_ILS/0/SD_ILS:186912
2026-01-14T11:13:06Z
2026-01-14T11:13:06Z
Author Hämmerli, Bernhard. editor. Sommer, Robin. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-540-73614-1">http://dx.doi.org/10.1007/978-3-540-73614-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
The security risk assessment handbook : a complete guide for performing security risk assessments
ent://SD_ILS/0/SD_ILS:545167
2026-01-14T11:13:06Z
2026-01-14T11:13:06Z
Author Landoll, Douglas J., author.<br/>Preferred Shelf Number HF5548.37 .L358 2006<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781420031232">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>
Emerging Technologies in Data Mining and Information Security Proceedings of IEMIS 2022, Volume 3
ent://SD_ILS/0/SD_ILS:526885
2026-01-14T11:13:06Z
2026-01-14T11:13:06Z
Author Dutta, Paramartha. editor. Bhattacharya, Abhishek. editor. Dutta, Soumi. editor. Lai, Wen-Cheng. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-981-19-4676-9">https://doi.org/10.1007/978-981-19-4676-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Proceedings of International Conference on Frontiers in Computing and Systems COMSYS 2022
ent://SD_ILS/0/SD_ILS:527858
2026-01-14T11:13:06Z
2026-01-14T11:13:06Z
Author Sarkar, Ram. editor. Pal, Sujata. editor. Basu, Subhadip. editor. Plewczynski, Dariusz. editor. Bhattacharjee, Debotosh. editor.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-981-99-2680-0">https://doi.org/10.1007/978-981-99-2680-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Proceedings of 3rd International Conference on Recent Trends in Machine Learning, IoT, Smart Cities and Applications ICMISC 2022
ent://SD_ILS/0/SD_ILS:528784
2026-01-14T11:13:06Z
2026-01-14T11:13:06Z
Author Gunjan, Vinit Kumar. editor. Zurada, Jacek M. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-981-19-6088-8">https://doi.org/10.1007/978-981-19-6088-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information and Communication Technology for Competitive Strategies (ICTCS 2021) ICT: Applications and Social Interfaces
ent://SD_ILS/0/SD_ILS:527470
2026-01-14T11:13:06Z
2026-01-14T11:13:06Z
Author Joshi, Amit. editor. Mahmud, Mufti. editor. Ragel, Roshan G. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-981-19-0095-2">https://doi.org/10.1007/978-981-19-0095-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Optimal spending on cybersecurity measures : risk management
ent://SD_ILS/0/SD_ILS:553885
2026-01-14T11:13:06Z
2026-01-14T11:13:06Z
Author Kissoon, Tara, author.<br/>Preferred Shelf Number HF5548.37 .K57 2022<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003200895">https://www.taylorfrancis.com/books/9781003200895</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information security : design, implementation, measurement, and compliance
ent://SD_ILS/0/SD_ILS:545839
2026-01-14T11:13:06Z
2026-01-14T11:13:06Z
Author Layton, Timothy P., author.<br/>Preferred Shelf Number HF5548.37 .L393 2007<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781420013412">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>
Assessing and managing security risk in IT systems : a structured methodology
ent://SD_ILS/0/SD_ILS:542250
2026-01-14T11:13:06Z
2026-01-14T11:13:06Z
Author McCumber, John, 1956, author.<br/>Preferred Shelf Number QA76.9 .A25 M4284 2005<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781135488970">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>