Search Results for Computer security -- Management. - Narrowed by: 2010SirsiDynix Enterprisehttps://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dComputer$002bsecurity$002b--$002bManagement.$0026qf$003dPUBDATE$002509Publication$002bDate$0025092010$0025092010$0026ps$003d300?2024-11-01T14:36:35ZInformation security management handbookent://SD_ILS/0/SD_ILS:2871232024-11-01T14:36:35Z2024-11-01T14:36:35ZAuthor Tipton, Harold F. Nozaki, Micki Krause.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781439893159">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Information security management handbookent://SD_ILS/0/SD_ILS:2891512024-11-01T14:36:35Z2024-11-01T14:36:35ZAuthor Tipton, Harold F. Krause, Micki.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9780203325438">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Information security management handbookent://SD_ILS/0/SD_ILS:2903202024-11-01T14:36:35Z2024-11-01T14:36:35ZAuthor Tipton, Harold F. Krause, Micki.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781420003406">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Information security management handbookent://SD_ILS/0/SD_ILS:2907632024-11-01T14:36:35Z2024-11-01T14:36:35ZAuthor Tipton, Harold F. Nozaki, Micki Krause.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781439853467">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Security for Microsoft Windows System Administrators introduction to key information security conceptsent://SD_ILS/0/SD_ILS:1491222024-11-01T14:36:35Z2024-11-01T14:36:35ZAuthor Rountree, Derrick.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495943">http://www.sciencedirect.com/science/book/9781597495943</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Managing an information security and privacy awareness and training programent://SD_ILS/0/SD_ILS:2870182024-11-01T14:36:35Z2024-11-01T14:36:35ZAuthor Herold, Rebecca.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781439815465">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Information security management handbook. Volume 4ent://SD_ILS/0/SD_ILS:2897352024-11-01T14:36:35Z2024-11-01T14:36:35ZAuthor Tipton, Harold F. Krause, Micki.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781439819036">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>