Search Results for Computer crimes -- Prevention. - Narrowed by: 2011SirsiDynix Enterprisehttps://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dComputer$002bcrimes$002b--$002bPrevention.$0026qf$003dPUBDATE$002509Publication$002bDate$0025092011$0025092011$0026ps$003d300?2024-11-19T00:13:23ZFISMA principles and best practices beyond complianceent://SD_ILS/0/SD_ILS:2906542024-11-19T00:13:23Z2024-11-19T00:13:23ZAuthor Howard, Patrick D.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781420078305">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Internet searches for vetting, investigations, and open-source intelligenceent://SD_ILS/0/SD_ILS:2916402024-11-19T00:13:23Z2024-11-19T00:13:23ZAuthor Appel, Edward J.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781439827529">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>IT security metrics a practical framework for measuring security & protecting dataent://SD_ILS/0/SD_ILS:2932942024-11-19T00:13:23Z2024-11-19T00:13:23ZAuthor Hayden, Lance.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://mhebooklibrary.com/reader/security-metrics-practical-framework-for-measuring-protecting-data">Subscription required</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>