Search Results for Computer Security - Narrowed by: Risk assessment.
SirsiDynix Enterprise
https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dComputer$002bSecurity$0026qf$003dSUBJECT$002509Subject$002509Risk$002bassessment.$002509Risk$002bassessment.$0026ps$003d300$0026isd$003dtrue?
2025-12-09T12:17:04Z
Managing a network vulnerability assessment
ent://SD_ILS/0/SD_ILS:543286
2025-12-09T12:17:04Z
2025-12-09T12:17:04Z
Author PELTIER, THOMAS R.<br/>Preferred Shelf Number TK5105.59<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9780429210747">https://www.taylorfrancis.com/books/9780429210747</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Resilience, Security & Risk in Transport
ent://SD_ILS/0/SD_ILS:509892
2025-12-09T12:17:04Z
2025-12-09T12:17:04Z
Author IET, ed.<br/>Preferred Shelf Number XX(509892.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1049/PERRSR3E">http://dx.doi.org/10.1049/PERRSR3E</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
The security risk assessment handbook : a complete guide for performing security risk assessments
ent://SD_ILS/0/SD_ILS:539743
2025-12-09T12:17:04Z
2025-12-09T12:17:04Z
Author Landoll, Douglas J., author.<br/>Preferred Shelf Number HF5548.37 .L358 2011<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781439821497">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>
Information security risk analysis
ent://SD_ILS/0/SD_ILS:538713
2025-12-09T12:17:04Z
2025-12-09T12:17:04Z
Author Peltier, Thomas R., author.<br/>Preferred Shelf Number QA76.9 .A25 P429 2010<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781439839577">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>
Risk analysis and security countermeasure selection
ent://SD_ILS/0/SD_ILS:539402
2025-12-09T12:17:04Z
2025-12-09T12:17:04Z
Author Norman, Thomas L., author.<br/>Preferred Shelf Number HV8290 .N67 2010<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781420078718">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>
Information security : design, implementation, measurement, and compliance
ent://SD_ILS/0/SD_ILS:545839
2025-12-09T12:17:04Z
2025-12-09T12:17:04Z
Author Layton, Timothy P., author.<br/>Preferred Shelf Number HF5548.37 .L393 2007<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781420013412">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>
The security risk assessment handbook : a complete guide for performing security risk assessments
ent://SD_ILS/0/SD_ILS:545167
2025-12-09T12:17:04Z
2025-12-09T12:17:04Z
Author Landoll, Douglas J., author.<br/>Preferred Shelf Number HF5548.37 .L358 2006<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781420031232">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>
Assessing and managing security risk in IT systems : a structured methodology
ent://SD_ILS/0/SD_ILS:542250
2025-12-09T12:17:04Z
2025-12-09T12:17:04Z
Author McCumber, John, 1956, author.<br/>Preferred Shelf Number QA76.9 .A25 M4284 2005<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781135488970">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>
Information security risk analysis
ent://SD_ILS/0/SD_ILS:544821
2025-12-09T12:17:04Z
2025-12-09T12:17:04Z
Author Peltier, Thomas R., author.<br/>Preferred Shelf Number QA76.9 .A25 P429 2005<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781420031195">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>