Search Results for Computer networks. - Narrowed by: Information technology -- Security measures. SirsiDynix Enterprise https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dComputer$002bnetworks.$0026qf$003dSUBJECT$002509Subject$002509Information$002btechnology$002b--$002bSecurity$002bmeasures.$002509Information$002btechnology$002b--$002bSecurity$002bmeasures.$0026ic$003dtrue$0026ps$003d300? 2024-09-04T13:54:02Z Cybersecurity education for awareness and compliance ent://SD_ILS/0/SD_ILS:482092 2024-09-04T13:54:02Z 2024-09-04T13:54:02Z Author&#160;Vasileiou, Ismini, 1980- editor.&#160;Furnell, Steven, 1970- editor.&#160;IGI Global, publisher.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-7847-5">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-7847-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security without obscurity : a guide to confidentiality, authentication, and integrity ent://SD_ILS/0/SD_ILS:356681 2024-09-04T13:54:02Z 2024-09-04T13:54:02Z Author&#160;Stapleton, Jeffrey James, author.<br/>Preferred Shelf Number&#160;ONLINE(356681.1)<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781466592155">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> The basics of information security : understanding the fundamentals of InfoSec in theory and practice ent://SD_ILS/0/SD_ILS:355770 2024-09-04T13:54:02Z 2024-09-04T13:54:02Z Author&#160;Andress, Jason, author.<br/>Preferred Shelf Number&#160;ONLINE(355770.1)<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128007440">http://www.sciencedirect.com/science/book/9780128007440</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> The benefits and security risks of web-based applications for business trend report ent://SD_ILS/0/SD_ILS:306640 2024-09-04T13:54:02Z 2024-09-04T13:54:02Z Author&#160;Kotwica, Kathleen.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780124170018">http://www.sciencedirect.com/science/book/9780124170018</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Asset protection through security awareness ent://SD_ILS/0/SD_ILS:286136 2024-09-04T13:54:02Z 2024-09-04T13:54:02Z Author&#160;Speed, Tyler Justin.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781439809839">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Practical risk management for the CIO ent://SD_ILS/0/SD_ILS:291571 2024-09-04T13:54:02Z 2024-09-04T13:54:02Z Author&#160;Scherling, Mark.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781439856543">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Auditing cloud computing a security and privacy guide ent://SD_ILS/0/SD_ILS:299263 2024-09-04T13:54:02Z 2024-09-04T13:54:02Z Author&#160;Halpert, Ben, 1986-<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;Image <a href="http://images.contentreserve.com/ImageType-100/0128-1/{F889EE2A-CF12-4647-85E0-03258F227FC1}Img100.jpg">http://images.contentreserve.com/ImageType-100/0128-1/{F889EE2A-CF12-4647-85E0-03258F227FC1}Img100.jpg</a> Books24x7 <a href="http://www.books24x7.com/marc.asp?bookid=44303">http://www.books24x7.com/marc.asp?bookid=44303</a> John Wiley <a href="http://dx.doi.org/10.1002/9781118269091">http://dx.doi.org/10.1002/9781118269091</a> OverDrive (PDF) <a href="http://www.contentreserve.com/TitleInfo.asp?ID={F889EE2A-CF12-4647-85E0-03258F227FC1}&Format=50">http://www.contentreserve.com/TitleInfo.asp?ID={F889EE2A-CF12-4647-85E0-03258F227FC1}&Format=50</a> OverDrive (EPUB) <a href="http://www.contentreserve.com/TitleInfo.asp?ID={F889EE2A-CF12-4647-85E0-03258F227FC1}&Format=410">http://www.contentreserve.com/TitleInfo.asp?ID={F889EE2A-CF12-4647-85E0-03258F227FC1}&Format=410</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security de-engineering solving the problems in information risk management ent://SD_ILS/0/SD_ILS:286209 2024-09-04T13:54:02Z 2024-09-04T13:54:02Z Author&#160;Tibble, Ian.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781439868355">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> The basics of information security understanding the fundamentals of InfoSec in theory and practice ent://SD_ILS/0/SD_ILS:145371 2024-09-04T13:54:02Z 2024-09-04T13:54:02Z Author&#160;Andress, Jason.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597496537">http://www.sciencedirect.com/science/book/9781597496537</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Engineering information security the application of systems engineering concepts to achieve information assurance ent://SD_ILS/0/SD_ILS:249916 2024-09-04T13:54:02Z 2024-09-04T13:54:02Z Author&#160;Jacobs, Stuart.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;IEEE Xplore <a href="http://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=6047604">http://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=6047604</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information technology risk management in enterprise environments a review of industry practices and a practical guide to risk management teams ent://SD_ILS/0/SD_ILS:297862 2024-09-04T13:54:02Z 2024-09-04T13:54:02Z Author&#160;Kouns, Jake.&#160;Minoli, Daniel, 1952-&#160;Wiley InterScience (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;John Wiley <a href="http://dx.doi.org/10.1002/9780470558133">http://dx.doi.org/10.1002/9780470558133</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information security management metrics a definitive guide to effective security monitoring and measurement ent://SD_ILS/0/SD_ILS:291373 2024-09-04T13:54:02Z 2024-09-04T13:54:02Z Author&#160;Brotby, W. Krag.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781420052862">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/>