Search Results for Business -- Data processing -- Security measures. - Narrowed by: Information technology -- Security measures. - Business -- Data processing -- Security measures. SirsiDynix Enterprise https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dBusiness$002b--$002bData$002bprocessing$002b--$002bSecurity$002bmeasures.$0026qf$003dSUBJECT$002509Subject$002509Information$002btechnology$002b--$002bSecurity$002bmeasures.$002509Information$002btechnology$002b--$002bSecurity$002bmeasures.$0026qf$003dSUBJECT$002509Subject$002509Business$002b--$002bData$002bprocessing$002b--$002bSecurity$002bmeasures.$002509Business$002b--$002bData$002bprocessing$002b--$002bSecurity$002bmeasures.$0026ic$003dtrue$0026te$003dILS$0026ps$003d300?dt=list 2024-06-02T17:56:45Z Security strategy from requirements to reality ent://SD_ILS/0/SD_ILS:288851 2024-06-02T17:56:45Z 2024-06-02T17:56:45Z Author&#160;Stackpole, Bill.&#160;Oksendahl, Eric.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781439827345">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> CISO soft skills securing organizations impaired by employee politics, apathy, and intolerant perspectives ent://SD_ILS/0/SD_ILS:288744 2024-06-02T17:56:45Z 2024-06-02T17:56:45Z Author&#160;Collette, Ronald D.&#160;Gentile, Michael.&#160;Gentile, Skye.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781420089110">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/>