Search Results for Business -- Computer networks. - Narrowed by: Data protection.
SirsiDynix Enterprise
https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dBusiness$002b--$002bComputer$002bnetworks.$0026qf$003dSUBJECT$002509Subject$002509Data$002bprotection.$002509Data$002bprotection.$0026ps$003d300?dt=list
2026-04-05T22:06:10Z
Information Security in a Connected World Celebrating the Life and Work of Ed Dawson
ent://SD_ILS/0/SD_ILS:607615
2026-04-05T22:06:10Z
2026-04-05T22:06:10Z
Author Boyd, Colin. editor. Safavi-Naini, Reihaneh. editor. (orcid)0000-0002-1697-3590 Simpson, Leonie. editor. (orcid)0000-0001-8434-9741 SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-031-83490-5">https://doi.org/10.1007/978-3-031-83490-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Data Processing and Networking Proceedings of ICDPN 2024, Volume 1
ent://SD_ILS/0/SD_ILS:609233
2026-04-05T22:06:10Z
2026-04-05T22:06:10Z
Author Swaroop, Abhishek. editor. Virdee, Bal. editor. (orcid)0000-0001-7203-0039 Correia, Sérgio Duarte. editor. Valicek, Jan. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-981-96-3102-5">https://doi.org/10.1007/978-981-96-3102-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Data Processing and Networking Proceedings of ICDPN 2024, Volume 2
ent://SD_ILS/0/SD_ILS:609939
2026-04-05T22:06:10Z
2026-04-05T22:06:10Z
Author Swaroop, Abhishek. editor. Virdee, Bal. editor. (orcid)0000-0001-7203-0039 Correia, Sérgio Duarte. editor. Valicek, Jan. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-981-96-5535-9">https://doi.org/10.1007/978-981-96-5535-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Network security and its impact on business strategy
ent://SD_ILS/0/SD_ILS:482213
2026-04-05T22:06:10Z
2026-04-05T22:06:10Z
Author Oncioiu, Ionica, 1972- editor. IGI Global, publisher.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-8455-1">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-8455-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
PRAGMATIC security metrics : applying metametrics to information security
ent://SD_ILS/0/SD_ILS:541797
2026-04-05T22:06:10Z
2026-04-05T22:06:10Z
Author Brotby, W. Krag., author. Hinson, Gary. Kabay, Michel E.<br/>Preferred Shelf Number HD30.38 .B76 2013<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781439881538">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>
Security de-engineering : solving the problems in information risk management
ent://SD_ILS/0/SD_ILS:545608
2026-04-05T22:06:10Z
2026-04-05T22:06:10Z
Author Tibble, Ian., author.<br/>Preferred Shelf Number HF5548.37 .T53 2011<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781439868355">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>
Auditing cloud computing a security and privacy guide
ent://SD_ILS/0/SD_ILS:299263
2026-04-05T22:06:10Z
2026-04-05T22:06:10Z
Author Halpert, Ben, 1986-<br/>Preferred Shelf Number ONLINE<br/>Electronic Access Image <a href="http://images.contentreserve.com/ImageType-100/0128-1/{F889EE2A-CF12-4647-85E0-03258F227FC1}Img100.jpg">http://images.contentreserve.com/ImageType-100/0128-1/{F889EE2A-CF12-4647-85E0-03258F227FC1}Img100.jpg</a>
Books24x7 <a href="http://www.books24x7.com/marc.asp?bookid=44303">http://www.books24x7.com/marc.asp?bookid=44303</a>
John Wiley <a href="http://dx.doi.org/10.1002/9781118269091">http://dx.doi.org/10.1002/9781118269091</a>
OverDrive (PDF) <a href="http://www.contentreserve.com/TitleInfo.asp?ID={F889EE2A-CF12-4647-85E0-03258F227FC1}&Format=50">http://www.contentreserve.com/TitleInfo.asp?ID={F889EE2A-CF12-4647-85E0-03258F227FC1}&Format=50</a>
OverDrive (EPUB) <a href="http://www.contentreserve.com/TitleInfo.asp?ID={F889EE2A-CF12-4647-85E0-03258F227FC1}&Format=410">http://www.contentreserve.com/TitleInfo.asp?ID={F889EE2A-CF12-4647-85E0-03258F227FC1}&Format=410</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information technology risk management in enterprise environments a review of industry practices and a practical guide to risk management teams
ent://SD_ILS/0/SD_ILS:297862
2026-04-05T22:06:10Z
2026-04-05T22:06:10Z
Author Kouns, Jake. Minoli, Daniel, 1952- Wiley InterScience (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access John Wiley <a href="http://dx.doi.org/10.1002/9780470558133">http://dx.doi.org/10.1002/9780470558133</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information security management metrics : a definitive guide to effective security monitoring and measurement
ent://SD_ILS/0/SD_ILS:546952
2026-04-05T22:06:10Z
2026-04-05T22:06:10Z
Author Brotby, W. Krag., author.<br/>Preferred Shelf Number HD30.2 .B78 2009<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781420052862">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>
Information security : design, implementation, measurement, and compliance
ent://SD_ILS/0/SD_ILS:545839
2026-04-05T22:06:10Z
2026-04-05T22:06:10Z
Author Layton, Timothy P., author.<br/>Preferred Shelf Number HF5548.37 .L393 2007<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781420013412">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>