Search Results for Business enterprises -- Security measures.SirsiDynix Enterprisehttps://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dBusiness$002benterprises$002b--$002bSecurity$002bmeasures.$0026ic$003dtrue$0026ps$003d300?dt=list2026-03-16T16:10:13ZThe cybersecurity control playbook : from fundamentals to advanced strategiesent://SD_ILS/0/SD_ILS:5997892026-03-16T16:10:13Z2026-03-16T16:10:13ZAuthor Edwards, Jason (Cybersecurity expert), author. John Wiley & Sons, publisher.<br/>Preferred Shelf Number QA76.9 .A25 E3884 2025<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394331888">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394331888</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Rise of the machines : when AI and zero trust collide : a Project Zero Trust storyent://SD_ILS/0/SD_ILS:5999322026-03-16T16:10:13Z2026-03-16T16:10:13ZAuthor Finney, George, author. Vinduska, Zach, author.<br/>Preferred Shelf Number QA76.9 .A25 F56 2025<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394352517">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394352517</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>CYBER SECURITY MANAGEMENT AND STRATEGIC INTELLIGENCEent://SD_ILS/0/SD_ILS:5533312026-03-16T16:10:13Z2026-03-16T16:10:13ZAuthor Trim, Peter R. J., author. Lee, Yang-Im, author.<br/>Preferred Shelf Number HF5548.37<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003570905">https://www.taylorfrancis.com/books/9781003570905</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>The cybersecurity guide to governance, risk, and complianceent://SD_ILS/0/SD_ILS:5989452026-03-16T16:10:13Z2026-03-16T16:10:13ZAuthor Edwards, Jason (Cybersecurity expert), author. Weaver, Griffin, author.<br/>Preferred Shelf Number HD30.38 .E34 2024<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394250226">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394250226</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Physical security assessment handbook : an insider's guide to securing a businessent://SD_ILS/0/SD_ILS:5871252026-03-16T16:10:13Z2026-03-16T16:10:13ZAuthor Khairallah, Michael, author.<br/>Preferred Shelf Number HD61.5<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003490432">https://www.taylorfrancis.com/books/9781003490432</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Insider risk and personnel security : an introductionent://SD_ILS/0/SD_ILS:5665782026-03-16T16:10:13Z2026-03-16T16:10:13ZAuthor Martin, Paul, 1958 May 11- author.<br/>Preferred Shelf Number HD61<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003329022">https://www.taylorfrancis.com/books/9781003329022</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Strategic cyber security managementent://SD_ILS/0/SD_ILS:5500212026-03-16T16:10:13Z2026-03-16T16:10:13ZAuthor Trim, Peter R. J., author. Lee, Yang-Im, author.<br/>Preferred Shelf Number HF5548.37<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003244295">https://www.taylorfrancis.com/books/9781003244295</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>The security risk handbook : assess, survey, auditent://SD_ILS/0/SD_ILS:5741202026-03-16T16:10:13Z2026-03-16T16:10:13ZAuthor Swanson, Charles (Chartered Security Professional), author.<br/>Preferred Shelf Number HD61.5<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003186335">https://www.taylorfrancis.com/books/9781003186335</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>The security leader's communication playbook : bridging the gap between security and the businessent://SD_ILS/0/SD_ILS:5518692026-03-16T16:10:13Z2026-03-16T16:10:13ZAuthor Brown, Jeffrey W., author.<br/>Preferred Shelf Number HD30.38 .B76 2022<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003100294">https://www.taylorfrancis.com/books/9781003100294</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Creating an information security program from scratchent://SD_ILS/0/SD_ILS:5769632026-03-16T16:10:13Z2026-03-16T16:10:13ZAuthor Williams, Walter (Telecommunications engineer), author.<br/>Preferred Shelf Number QA76.9 .A25 W55 2022<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003093688">https://www.taylorfrancis.com/books/9781003093688</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Corporate cybersecurity : identifying risks and the bug bounty programent://SD_ILS/0/SD_ILS:5967852026-03-16T16:10:13Z2026-03-16T16:10:13ZAuthor Jackson, John (Cybersecurity professional), author.<br/>Preferred Shelf Number HD30.38 .J34 2022<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119782568">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119782568</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Enterprise cybersecurity in digital business : building a cyber resilient organizationent://SD_ILS/0/SD_ILS:5914062026-03-16T16:10:13Z2026-03-16T16:10:13ZAuthor Evans, Ariel, author.<br/>Preferred Shelf Number HD30.37<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003052616">https://www.taylorfrancis.com/books/9781003052616</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Information security and employee behaviour : how to reduce risk through employee education, training and awarenessent://SD_ILS/0/SD_ILS:5902942026-03-16T16:10:13Z2026-03-16T16:10:13ZAuthor McIlwraith, Angus, author.<br/>Preferred Shelf Number HD30.38<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9780429281785">https://www.taylorfrancis.com/books/9780429281785</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>CyRM? mastering the management of cybersecurityent://SD_ILS/0/SD_ILS:5895382026-03-16T16:10:13Z2026-03-16T16:10:13ZAuthor Martin, David X., author.<br/>Preferred Shelf Number HD30.38 .M37 2021<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003098232">https://www.taylorfrancis.com/books/9781003098232</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Cyber intelligence-driven risk : how to build and use cyber intelligence for business risk decisionsent://SD_ILS/0/SD_ILS:5962652026-03-16T16:10:13Z2026-03-16T16:10:13ZAuthor Moore, Richard O., III, 1971- author.<br/>Preferred Shelf Number HD61.5 .M66 2021<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119676942">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119676942</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Privacy, regulations, and cybersecurity : the essential business guideent://SD_ILS/0/SD_ILS:5964722026-03-16T16:10:13Z2026-03-16T16:10:13ZAuthor Moschovitis, Christos J. P., author.<br/>Preferred Shelf Number HD61.5 .M675 2021 EB<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119660156">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119660156</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>You can stop stupid : stopping losses from accidental and malicious actionsent://SD_ILS/0/SD_ILS:5965022026-03-16T16:10:13Z2026-03-16T16:10:13ZAuthor Winkler, Ira, author. Brown, Tracy Celaya, author.<br/>Preferred Shelf Number HD61.5 .W55 2021<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119623946">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119623946</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Network security and its impact on business strategyent://SD_ILS/0/SD_ILS:4822132026-03-16T16:10:13Z2026-03-16T16:10:13ZAuthor Oncioiu, Ionica, 1972- editor. IGI Global, publisher.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-8455-1">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-8455-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Global cyber security labor shortage and international business riskent://SD_ILS/0/SD_ILS:4818102026-03-16T16:10:13Z2026-03-16T16:10:13ZAuthor Christiansen, Bryan, 1960- editor. Piekarz, Agnieszka, 1990- editor. IGI Global, publisher.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-5927-6">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-5927-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Cybersecurity education for awareness and complianceent://SD_ILS/0/SD_ILS:4820922026-03-16T16:10:13Z2026-03-16T16:10:13ZAuthor Vasileiou, Ismini, 1980- editor. Furnell, Steven, 1970- editor. IGI Global, publisher.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-7847-5">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-7847-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Tribe of hackers : cybersecurity advice from the best hackers in the worldent://SD_ILS/0/SD_ILS:5954182026-03-16T16:10:13Z2026-03-16T16:10:13ZAuthor Carey, Marcus J. (Cybersecurity professional), author. Jin, Jennifer, author.<br/>Preferred Shelf Number QA76.9 .A25 C37 2019 EB<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119643395">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119643395</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>The cyber risk handbook : creating and measuring effective cybersecurity capabilitiesent://SD_ILS/0/SD_ILS:5936092026-03-16T16:10:13Z2026-03-16T16:10:13ZAuthor Antonucci, Domenic, author.<br/>Preferred Shelf Number HV6773 .A58 2017<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119309741">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119309741</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Cyber security awareness for CEOs and managementent://SD_ILS/0/SD_ILS:4586652026-03-16T16:10:13Z2026-03-16T16:10:13ZAuthor Willson, David (Lawyer), author. Dalziel, Henry, editor.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128047545">http://www.sciencedirect.com/science/book/9780128047545</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Cybervetting : Internet searches for vetting, investigations, and open-source intelligenceent://SD_ILS/0/SD_ILS:5394282026-03-16T16:10:13Z2026-03-16T16:10:13ZAuthor Appel, Edward J., author.<br/>Preferred Shelf Number HF5549.5 .E429 A67 2015<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781482238860">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>The manager's handbook for business securityent://SD_ILS/0/SD_ILS:3559082026-03-16T16:10:13Z2026-03-16T16:10:13ZAuthor Campbell, George, 1942-<br/>Preferred Shelf Number ONLINE(355908.1)<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128000625">http://www.sciencedirect.com/science/book/9780128000625</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Security careers skills, compensation, and career pathsent://SD_ILS/0/SD_ILS:3560432026-03-16T16:10:13Z2026-03-16T16:10:13ZAuthor Walker, Stephen W. Foushee, James E.<br/>Preferred Shelf Number ONLINE(356043.1)<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128001042">http://www.sciencedirect.com/science/book/9780128001042</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Industrial espionage : developing a counterespionage programent://SD_ILS/0/SD_ILS:5394172026-03-16T16:10:13Z2026-03-16T16:10:13ZAuthor Benny, Daniel J., author.<br/>Preferred Shelf Number HD38.7 .B4554 2014<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781466568150">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>Security management : a critical thinking approachent://SD_ILS/0/SD_ILS:5397252026-03-16T16:10:13Z2026-03-16T16:10:13ZAuthor Land, Michael (Industrial engineer), author. Ricks, Truett A., author. Ricks, Bob, author.<br/>Preferred Shelf Number HD61.5 .L36 2014<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781466561786">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>Cyber threat! : how to manage the growing risk of cyber attacksent://SD_ILS/0/SD_ILS:3420202026-03-16T16:10:13Z2026-03-16T16:10:13ZAuthor Ulsch, N. MacDonnell, 1951-<br/>Preferred Shelf Number ONLINE(342020.1)<br/>Electronic Access ebrary <a href="http://alltitles.ebrary.com/Doc?id=10895757">An electronic book accessible through the World Wide Web; click to view</a>
Ebook Library <a href="http://public.eblib.com/choice/publicfullrecord.aspx?p=1742833">http://public.eblib.com/choice/publicfullrecord.aspx?p=1742833</a>
John Wiley <a href="http://dx.doi.org/10.1002/9781118915028">http://dx.doi.org/10.1002/9781118915028</a>
MyiLibrary <a href="http://www.myilibrary.com?id=629214">http://www.myilibrary.com?id=629214</a>
Cover <a href="http://swbplus.bsz-bw.de/bsz410564842cov.htm">http://swbplus.bsz-bw.de/bsz410564842cov.htm</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Workplace security essentials a guide for helping organizations create safe work environmentsent://SD_ILS/0/SD_ILS:3558972026-03-16T16:10:13Z2026-03-16T16:10:13ZAuthor Smith, Eric N. (Eric Newell), 1967-<br/>Preferred Shelf Number ONLINE(355897.1)<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780124165571">http://www.sciencedirect.com/science/book/9780124165571</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>The complete guide to physical securityent://SD_ILS/0/SD_ILS:5459602026-03-16T16:10:13Z2026-03-16T16:10:13ZAuthor Baker, Paul, 1958, author. Benny, Daniel J.<br/>Preferred Shelf Number HV8290 .B34 2013<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781420099645">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>PRAGMATIC security metrics : applying metametrics to information securityent://SD_ILS/0/SD_ILS:5417972026-03-16T16:10:13Z2026-03-16T16:10:13ZAuthor Brotby, W. Krag., author. Hinson, Gary. Kabay, Michel E.<br/>Preferred Shelf Number HD30.38 .B76 2013<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781439881538">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>Asset protection through security awarenessent://SD_ILS/0/SD_ILS:5466872026-03-16T16:10:13Z2026-03-16T16:10:13ZAuthor Speed, Tyler Justin., author.<br/>Preferred Shelf Number TK5105.59 .S643 2012<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781439809839">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>Auditing cloud computing a security and privacy guideent://SD_ILS/0/SD_ILS:2992632026-03-16T16:10:13Z2026-03-16T16:10:13ZAuthor Halpert, Ben, 1986-<br/>Preferred Shelf Number ONLINE<br/>Electronic Access Image <a href="http://images.contentreserve.com/ImageType-100/0128-1/{F889EE2A-CF12-4647-85E0-03258F227FC1}Img100.jpg">http://images.contentreserve.com/ImageType-100/0128-1/{F889EE2A-CF12-4647-85E0-03258F227FC1}Img100.jpg</a>
Books24x7 <a href="http://www.books24x7.com/marc.asp?bookid=44303">http://www.books24x7.com/marc.asp?bookid=44303</a>
John Wiley <a href="http://dx.doi.org/10.1002/9781118269091">http://dx.doi.org/10.1002/9781118269091</a>
OverDrive (PDF) <a href="http://www.contentreserve.com/TitleInfo.asp?ID={F889EE2A-CF12-4647-85E0-03258F227FC1}&Format=50">http://www.contentreserve.com/TitleInfo.asp?ID={F889EE2A-CF12-4647-85E0-03258F227FC1}&Format=50</a>
OverDrive (EPUB) <a href="http://www.contentreserve.com/TitleInfo.asp?ID={F889EE2A-CF12-4647-85E0-03258F227FC1}&Format=410">http://www.contentreserve.com/TitleInfo.asp?ID={F889EE2A-CF12-4647-85E0-03258F227FC1}&Format=410</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Ninja hacking unconventional penetration testing tactics and techniquesent://SD_ILS/0/SD_ILS:1462632026-03-16T16:10:13Z2026-03-16T16:10:13ZAuthor Wilhelm, Thomas. Andress, Jason.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495882">http://www.sciencedirect.com/science/book/9781597495882</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Security de-engineering : solving the problems in information risk managementent://SD_ILS/0/SD_ILS:5456082026-03-16T16:10:13Z2026-03-16T16:10:13ZAuthor Tibble, Ian., author.<br/>Preferred Shelf Number HF5548.37 .T53 2011<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781439868355">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>Risk analysis and security countermeasure selectionent://SD_ILS/0/SD_ILS:5394022026-03-16T16:10:13Z2026-03-16T16:10:13ZAuthor Norman, Thomas L., author.<br/>Preferred Shelf Number HV8290 .N67 2010<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781420078718">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>Managing security overseas : protecting employees and assets in volatile regionsent://SD_ILS/0/SD_ILS:5449392026-03-16T16:10:13Z2026-03-16T16:10:13ZAuthor Ast, Scott Alan., author.<br/>Preferred Shelf Number HD2785 .A88 2010<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781439804681">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>Information technology risk management in enterprise environments a review of industry practices and a practical guide to risk management teamsent://SD_ILS/0/SD_ILS:2978622026-03-16T16:10:13Z2026-03-16T16:10:13ZAuthor Kouns, Jake. Minoli, Daniel, 1952- Wiley InterScience (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access John Wiley <a href="http://dx.doi.org/10.1002/9780470558133">http://dx.doi.org/10.1002/9780470558133</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Homeland security and private sector business : corporations' role in critical infrastructure protectionent://SD_ILS/0/SD_ILS:5423972026-03-16T16:10:13Z2026-03-16T16:10:13ZAuthor Lee, Elsa., author.<br/>Preferred Shelf Number HC110 .C3 L44 2009<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781420070798">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>SAP security configuration and deployment the IT administrator's guide to best practicesent://SD_ILS/0/SD_ILS:1489942026-03-16T16:10:13Z2026-03-16T16:10:13ZAuthor Wun-Young, Leslie. Hirao, Joey.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492843">http://www.sciencedirect.com/science/book/9781597492843</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Information security management metrics : a definitive guide to effective security monitoring and measurementent://SD_ILS/0/SD_ILS:5469522026-03-16T16:10:13Z2026-03-16T16:10:13ZAuthor Brotby, W. Krag., author.<br/>Preferred Shelf Number HD30.2 .B78 2009<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781420052862">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>Electronic security systems a manager's guide to evaluating and selecting system solutionsent://SD_ILS/0/SD_ILS:3064672026-03-16T16:10:13Z2026-03-16T16:10:13ZAuthor Pearson, Robert L.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780750679992">http://www.sciencedirect.com/science/book/9780750679992</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Information security : design, implementation, measurement, and complianceent://SD_ILS/0/SD_ILS:5458392026-03-16T16:10:13Z2026-03-16T16:10:13ZAuthor Layton, Timothy P., author.<br/>Preferred Shelf Number HF5548.37 .L393 2007<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781420013412">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>Security convergence managing enterprise security riskent://SD_ILS/0/SD_ILS:1121982026-03-16T16:10:13Z2026-03-16T16:10:13ZAuthor Tyson, Dave. ScienceDirect (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780750684255">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Electronic security systems a manager's guide to evaluating and selecting system solutionsent://SD_ILS/0/SD_ILS:1464662026-03-16T16:10:13Z2026-03-16T16:10:13ZAuthor Pearson, Robert L.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780750679992">http://www.sciencedirect.com/science/book/9780750679992</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Security convergence managing enterprise security riskent://SD_ILS/0/SD_ILS:1490802026-03-16T16:10:13Z2026-03-16T16:10:13ZAuthor Tyson, Dave.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access Volltext <a href="http://www.sciencedirect.com/science/book/9780750684255">http://www.sciencedirect.com/science/book/9780750684255</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Trust and reputation for service-oriented environments technologies for building business intelligence and consumer confidenceent://SD_ILS/0/SD_ILS:2966792026-03-16T16:10:13Z2026-03-16T16:10:13ZAuthor Chang, Elizabeth. Dillon, Tharam S., 1943- Hussain, Farookh K.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://www3.interscience.wiley.com/cgi-bin/homepage/?isbn=9780470028261">Find on the Web</a>
John Wiley <a href="http://dx.doi.org/10.1002/9780470028261">http://dx.doi.org/10.1002/9780470028261</a>
<a href="http://www3.interscience.wiley.com/cgi-bin/bookhome/113488845">http://www3.interscience.wiley.com/cgi-bin/bookhome/113488845</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Hack proofing your e-commerce site the only way to stop a hacker is to think like oneent://SD_ILS/0/SD_ILS:2539682026-03-16T16:10:13Z2026-03-16T16:10:13ZAuthor Russell, Ryan. Syngress Media, Inc.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781928994275">http://www.sciencedirect.com/science/book/9781928994275</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>