Search Results for Business Process Management. - Narrowed by: Computer security.SirsiDynix Enterprisehttps://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dBusiness$002bProcess$002bManagement.$0026qf$003dSUBJECT$002509Subject$002509Computer$002bsecurity.$002509Computer$002bsecurity.$0026ps$003d300?2026-05-16T02:21:46ZThe cybersecurity control playbook : from fundamentals to advanced strategiesent://SD_ILS/0/SD_ILS:5997892026-05-16T02:21:46Z2026-05-16T02:21:46ZAuthor Edwards, Jason (Cybersecurity expert), author. John Wiley & Sons, publisher.<br/>Preferred Shelf Number QA76.9 .A25 E3884 2025<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394331888">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394331888</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Open-source security operations center (SOC) : a complete guide to establishing, managing, and maintaining a modern SOCent://SD_ILS/0/SD_ILS:5994342026-05-16T02:21:46Z2026-05-16T02:21:46ZAuthor Basta, Alfred, author. Basta, Nadine, author. Anwar, Waqar, author. Essar, Mohammad Ilyas, author. John Wiley & Sons, publisher.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394201631">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394201631</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Stepping through cybersecurity risk management : a systems thinking approachent://SD_ILS/0/SD_ILS:5990212026-05-16T02:21:46Z2026-05-16T02:21:46ZAuthor Bayuk, Jennifer L., author.<br/>Preferred Shelf Number QA76.9 .A25 B39 2024<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394213986">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394213986</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Effective vulnerability management : managing risk in the vulnerable digital ecosystement://SD_ILS/0/SD_ILS:5990472026-05-16T02:21:46Z2026-05-16T02:21:46ZAuthor Hughes, Chris (Christopher Matthew), author. Robinson, Nikki, author.<br/>Preferred Shelf Number QA76.9 .A25 H84 2024<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394277155">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394277155</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Information security risk analysisent://SD_ILS/0/SD_ILS:5448212026-05-16T02:21:46Z2026-05-16T02:21:46ZAuthor Peltier, Thomas R., author.<br/>Preferred Shelf Number QA76.9 .A25 P429 2005<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781420031195">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>