Search Results for Computer security -- Management. SirsiDynix Enterprise https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dComputer$002bsecurity$002b--$002bManagement.$0026ps$003d300$0026isd$003dtrue? 2024-11-09T13:08:02Z Computer security risk management ent://SD_ILS/0/SD_ILS:32379 2024-11-09T13:08:02Z 2024-11-09T13:08:02Z Author&#160;Palmer, Ian C.&#160;Potter, G. A., ort. yaz.<br/>Preferred Shelf Number&#160;QA 76.9.A25 P182 1989<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Information security management handbook ent://SD_ILS/0/SD_ILS:289151 2024-11-09T13:08:02Z 2024-11-09T13:08:02Z Author&#160;Tipton, Harold F.&#160;Krause, Micki.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9780203325438">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information security management handbook ent://SD_ILS/0/SD_ILS:290320 2024-11-09T13:08:02Z 2024-11-09T13:08:02Z Author&#160;Tipton, Harold F.&#160;Krause, Micki.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781420003406">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information security management handbook ent://SD_ILS/0/SD_ILS:287123 2024-11-09T13:08:02Z 2024-11-09T13:08:02Z Author&#160;Tipton, Harold F.&#160;Nozaki, Micki Krause.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781439893159">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Application of Big Data, Blockchain, and Internet of Things for Education Informatization Second EAI International Conference, BigIoT-EDU 2022, Virtual Event, July 29-31, 2022, Proceedings, Part I ent://SD_ILS/0/SD_ILS:520194 2024-11-09T13:08:02Z 2024-11-09T13:08:02Z Author&#160;Jan, Mian Ahmad. editor.&#160;Khan, Fazlullah. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;XX(520194.1)<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-23950-2">https://doi.org/10.1007/978-3-031-23950-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer Information Systems and Industrial Management 22nd International Conference, CISIM 2023, Tokyo, Japan, September 22-24, 2023, Proceedings ent://SD_ILS/0/SD_ILS:521140 2024-11-09T13:08:02Z 2024-11-09T13:08:02Z Author&#160;Saeed, Khalid. editor. (orcid)&#160;Dvorsk&yacute;, Ji&#345;&iacute;. editor.&#160;Nishiuchi, Nobuyuki. editor.&#160;Fukumoto, Makoto. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;XX(521140.1)<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-42823-4">https://doi.org/10.1007/978-3-031-42823-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Application of Big Data, Blockchain, and Internet of Things for Education Informatization Second EAI International Conference, BigIoT-EDU 2022, Virtual Event, July 29-31, 2022, Proceedings, Part II ent://SD_ILS/0/SD_ILS:520264 2024-11-09T13:08:02Z 2024-11-09T13:08:02Z Author&#160;Jan, Mian Ahmad. editor.&#160;Khan, Fazlullah. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;XX(520264.1)<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-23947-2">https://doi.org/10.1007/978-3-031-23947-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> 6GN for Future Wireless Networks 5th EAI International Conference, 6GN 2022, Harbin, China, December 17-18, 2022, Proceedings, Part II ent://SD_ILS/0/SD_ILS:520491 2024-11-09T13:08:02Z 2024-11-09T13:08:02Z Author&#160;Li, Ao. editor.&#160;Shi, Yao. editor.&#160;Xi, Liang. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;XX(520491.1)<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-36014-5">https://doi.org/10.1007/978-3-031-36014-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Artificial Intelligence and Cyber Security in Industry 4.0 ent://SD_ILS/0/SD_ILS:520462 2024-11-09T13:08:02Z 2024-11-09T13:08:02Z Author&#160;Sarveshwaran, Velliangiri. editor.&#160;Chen, Joy Iong-Zong. editor.&#160;Pelusi, Danilo. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;XX(520462.1)<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-99-2115-7">https://doi.org/10.1007/978-981-99-2115-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Knowledge Management in Organisations 17th International Conference, KMO 2023, Bangkok, Thailand, July 24-27, 2023, Proceedings ent://SD_ILS/0/SD_ILS:520417 2024-11-09T13:08:02Z 2024-11-09T13:08:02Z Author&#160;Uden, Lorna. editor.&#160;Ting, I-Hsien. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;XX(520417.1)<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-34045-1">https://doi.org/10.1007/978-3-031-34045-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Intelligent Human Computer Interaction 14th International Conference, IHCI 2022, Tashkent, Uzbekistan, October 20-22, 2022, Revised Selected Papers ent://SD_ILS/0/SD_ILS:520933 2024-11-09T13:08:02Z 2024-11-09T13:08:02Z Author&#160;Zaynidinov, Hakimjon. editor.&#160;Singh, Madhusudan. editor.&#160;Tiwary, Uma Shanker. editor.&#160;Singh, Dhananjay. editor. (orcid)&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;XX(520933.1)<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-27199-1">https://doi.org/10.1007/978-3-031-27199-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Transactions on Computational Collective Intelligence XIX ent://SD_ILS/0/SD_ILS:519152 2024-11-09T13:08:02Z 2024-11-09T13:08:02Z Author&#160;Nguyen, Ngoc Thanh. editor.&#160;Kowalczyk, Ryszard. editor.&#160;Xhafa, Fatos. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;XX(519152.1)<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-662-49017-4">https://doi.org/10.1007/978-3-662-49017-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Health Information Science 4th International Conference, HIS 2015, Melbourne, Australia, May 28-30, 2015, Proceedings ent://SD_ILS/0/SD_ILS:519292 2024-11-09T13:08:02Z 2024-11-09T13:08:02Z Author&#160;Yin, Xiaoxia. editor.&#160;Ho, Kendall. editor.&#160;Zeng, Daniel. editor.&#160;Aickelin, Uwe. editor.&#160;Zhou, Rui. editor.<br/>Preferred Shelf Number&#160;XX(519292.1)<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-19156-0">https://doi.org/10.1007/978-3-319-19156-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Managing information security ent://SD_ILS/0/SD_ILS:306692 2024-11-09T13:08:02Z 2024-11-09T13:08:02Z Author&#160;Vacca, John R.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780124166882">http://www.sciencedirect.com/science/book/9780124166882</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Research in Attacks, Intrusions and Defenses 17th International Symposium, RAID 2014, Gothenburg, Sweden, September 17-19, 2014, Proceedings ent://SD_ILS/0/SD_ILS:485702 2024-11-09T13:08:02Z 2024-11-09T13:08:02Z Author&#160;Stavrou, Angelos. editor.&#160;Bos, Herbert. editor.&#160;Portokalidis, Georgios. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-11379-1">https://doi.org/10.1007/978-3-319-11379-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> ICT and Society 11th IFIP TC 9 International Conference on Human Choice and Computers, HCC11 2014, Turku, Finland, July 30 - August 1, 2014, Proceedings ent://SD_ILS/0/SD_ILS:487382 2024-11-09T13:08:02Z 2024-11-09T13:08:02Z Author&#160;Kimppa, Kai. editor.&#160;Whitehouse, Diane. editor.&#160;Kuusela, Tiina. editor.&#160;Phahlamohlaka, Jackie. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-662-44208-1">https://doi.org/10.1007/978-3-662-44208-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Trust, Privacy, and Security in Digital Business 11th International Conference, TrustBus 2014, Munich, Germany, September 2-3, 2014. Proceedings ent://SD_ILS/0/SD_ILS:488947 2024-11-09T13:08:02Z 2024-11-09T13:08:02Z Author&#160;Eckert, Claudia. editor.&#160;Katsikas, Sokratis K. editor.&#160;Pernul, G&uuml;nther. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-09770-1">https://doi.org/10.1007/978-3-319-09770-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Monitoring and Securing Virtualized Networks and Services 8th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security, AIMS 2014, Brno, Czech Republic, June 30 -- July 3, 2014. Proceedings ent://SD_ILS/0/SD_ILS:488960 2024-11-09T13:08:02Z 2024-11-09T13:08:02Z Author&#160;Sperotto, Anna. editor.&#160;Doyen, Guillaume. editor.&#160;Latr&eacute;, Steven. editor.&#160;Charalambides, Marinos. editor.&#160;Stiller, Burkhard. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-662-43862-6">https://doi.org/10.1007/978-3-662-43862-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Smart Card Research and Advanced Applications 12th International Conference, CARDIS 2013, Berlin, Germany, November 27-29, 2013. Revised Selected Papers ent://SD_ILS/0/SD_ILS:488978 2024-11-09T13:08:02Z 2024-11-09T13:08:02Z Author&#160;Francillon, Aur&eacute;lien. editor.&#160;Rohatgi, Pankaj. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-08302-5">https://doi.org/10.1007/978-3-319-08302-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> ICT Systems Security and Privacy Protection 29th IFIP TC 11 International Conference, SEC 2014, Marrakech, Morocco, June 2-4, 2014, Proceedings ent://SD_ILS/0/SD_ILS:489201 2024-11-09T13:08:02Z 2024-11-09T13:08:02Z Author&#160;Cuppens-Boulahia, Nora. editor.&#160;Cuppens, Frederic. editor.&#160;Jajodia, Sushil. editor.&#160;Abou El Kalam, Anas. editor.&#160;Sans, Thierry. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-642-55415-5">https://doi.org/10.1007/978-3-642-55415-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Fast Software Encryption 20th International Workshop, FSE 2013, Singapore, March 11-13, 2013. Revised Selected Papers ent://SD_ILS/0/SD_ILS:489223 2024-11-09T13:08:02Z 2024-11-09T13:08:02Z Author&#160;Moriai, Shiho. editor. (orcid)0000-0002-6072-6183&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-662-43933-3">https://doi.org/10.1007/978-3-662-43933-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Trust and Trustworthy Computing 7th International Conference, TRUST 2014, Heraklion, Crete, Greece, June 30 -- July 2, 2014, Proceedings ent://SD_ILS/0/SD_ILS:485594 2024-11-09T13:08:02Z 2024-11-09T13:08:02Z Author&#160;Holz, Thorsten. editor. (orcid)0000-0002-2783-1264&#160;Ioannidis, Sotiris. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-08593-7">https://doi.org/10.1007/978-3-319-08593-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> E-Democracy, Security, Privacy and Trust in a Digital World 5th International Conference, E-Democracy 2013, Athens, Greece, December 5-6, 2013, Revised Selected Papers ent://SD_ILS/0/SD_ILS:486701 2024-11-09T13:08:02Z 2024-11-09T13:08:02Z Author&#160;Sideridis, Alexander B. editor.&#160;Kardasiadou, Zoe. editor.&#160;Yialouris, Constantine P. editor.&#160;Zorkadis, Vasilios. editor. (orcid)0000-0003-4399-2495&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-11710-2">https://doi.org/10.1007/978-3-319-11710-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security and Cryptography for Networks 9th International Conference, SCN 2014, Amalfi, Italy, September 3-5, 2014. Proceedings ent://SD_ILS/0/SD_ILS:484564 2024-11-09T13:08:02Z 2024-11-09T13:08:02Z Author&#160;Abdalla, Michel. editor. (orcid)0000-0002-2447-4329&#160;De Prisco, Roberto. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-10879-7">https://doi.org/10.1007/978-3-319-10879-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security and Trust Management 10th International Workshop, STM 2014, Wroclaw, Poland, September 10-11, 2014, Proceedings ent://SD_ILS/0/SD_ILS:489026 2024-11-09T13:08:02Z 2024-11-09T13:08:02Z Author&#160;Mauw, Sjouke. editor.&#160;Damsgaard Jensen, Christian. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-11851-2">https://doi.org/10.1007/978-3-319-11851-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Decision and Game Theory for Security 5th International Conference, GameSec 2014, Los Angeles, CA, USA, November 6-7, 2014, Proceedings ent://SD_ILS/0/SD_ILS:489033 2024-11-09T13:08:02Z 2024-11-09T13:08:02Z Author&#160;Poovendran, Radha. editor. (orcid)0000-0003-0269-8097&#160;Saad, Walid. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-12601-2">https://doi.org/10.1007/978-3-319-12601-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Privacy and Identity Management for Emerging Services and Technologies 8th IFIP WG 9.2, 9.5, 9.6/11.7, 11.4, 11.6 International Summer School, Nijmegen, The Netherlands, June 17-21, 2013, Revised Selected Papers ent://SD_ILS/0/SD_ILS:489060 2024-11-09T13:08:02Z 2024-11-09T13:08:02Z Author&#160;Hansen, Marit. editor.&#160;Hoepman, Jaap-Henk. editor.&#160;Leenes, Ronald. editor.&#160;Whitehouse, Diane. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-642-55137-6">https://doi.org/10.1007/978-3-642-55137-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Data Privacy Management and Autonomous Spontaneous Security 8th International Workshop, DPM 2013, and 6th International Workshop, SETOP 2013, Egham, UK, September 12-13, 2013, Revised Selected Papers ent://SD_ILS/0/SD_ILS:489070 2024-11-09T13:08:02Z 2024-11-09T13:08:02Z Author&#160;Garcia-Alfaro, Joaquin. editor. (orcid)0000-0002-7453-4393&#160;Lioudakis, Georgios. editor.&#160;Cuppens-Boulahia, Nora. editor.&#160;Foley, Simon. editor.&#160;Fitzgerald, William M. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-642-54568-9">https://doi.org/10.1007/978-3-642-54568-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Critical Infrastructure Protection VIII 8th IFIP WG 11.10 International Conference, ICCIP 2014, Arlington, VA, USA, March 17-19, 2014, Revised Selected Papers ent://SD_ILS/0/SD_ILS:489496 2024-11-09T13:08:02Z 2024-11-09T13:08:02Z Author&#160;Butts, Jonathan. editor.&#160;Shenoi, Sujeet. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-662-45355-1">https://doi.org/10.1007/978-3-662-45355-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> The frugal CISO : using innovation and smart approaches to maximize your security posture ent://SD_ILS/0/SD_ILS:356624 2024-11-09T13:08:02Z 2024-11-09T13:08:02Z Author&#160;Anderson, Kerry Ann, author.<br/>Preferred Shelf Number&#160;ONLINE(356624.1)<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781482220087">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cloud Computing Challenges, Limitations and R&amp;D Solutions ent://SD_ILS/0/SD_ILS:487747 2024-11-09T13:08:02Z 2024-11-09T13:08:02Z Author&#160;Mahmood, Zaigham. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-10530-7">https://doi.org/10.1007/978-3-319-10530-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Handbook on mobile and ubiquitous computing status and perspective ent://SD_ILS/0/SD_ILS:286262 2024-11-09T13:08:02Z 2024-11-09T13:08:02Z Author&#160;Yang, Laurence Tianruo.&#160;Syukur, Evi.&#160;Loke, Seng.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781439848128">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information security for managers ent://SD_ILS/0/SD_ILS:516570 2024-11-09T13:08:02Z 2024-11-09T13:08:02Z Author&#160;Workman, Michael D., 1957-.&#160;Phelps, Daniel C.&#160;Gathegi, John N.<br/>Preferred Shelf Number&#160;HF5548.37 W67 2013<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Information security management handbook ent://SD_ILS/0/SD_ILS:290763 2024-11-09T13:08:02Z 2024-11-09T13:08:02Z Author&#160;Tipton, Harold F.&#160;Nozaki, Micki Krause.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781439853467">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Handbook on soft computing for video surveillance ent://SD_ILS/0/SD_ILS:290796 2024-11-09T13:08:02Z 2024-11-09T13:08:02Z Author&#160;Pal, Sankar K.&#160;Petrosino, Alfredo.&#160;Maddalena, Lucia.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781439856857">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Asset protection through security awareness ent://SD_ILS/0/SD_ILS:286136 2024-11-09T13:08:02Z 2024-11-09T13:08:02Z Author&#160;Speed, Tyler Justin.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781439809839">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Intelligent technologies for Web applications ent://SD_ILS/0/SD_ILS:289003 2024-11-09T13:08:02Z 2024-11-09T13:08:02Z Author&#160;Srinivas Sajja, Priti.&#160;Akerkar, Rajendra.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781439871645">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security for Microsoft Windows System Administrators introduction to key information security concepts ent://SD_ILS/0/SD_ILS:149122 2024-11-09T13:08:02Z 2024-11-09T13:08:02Z Author&#160;Rountree, Derrick.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495943">http://www.sciencedirect.com/science/book/9781597495943</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information security management handbook. Volume 4 ent://SD_ILS/0/SD_ILS:289735 2024-11-09T13:08:02Z 2024-11-09T13:08:02Z Author&#160;Tipton, Harold F.&#160;Krause, Micki.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781439819036">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Managing an information security and privacy awareness and training program ent://SD_ILS/0/SD_ILS:287018 2024-11-09T13:08:02Z 2024-11-09T13:08:02Z Author&#160;Herold, Rebecca.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781439815465">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information security management handbook ent://SD_ILS/0/SD_ILS:289734 2024-11-09T13:08:02Z 2024-11-09T13:08:02Z Author&#160;Tipton, Harold F.&#160;Krause, Micki.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781420090956">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information warfare ent://SD_ILS/0/SD_ILS:304069 2024-11-09T13:08:02Z 2024-11-09T13:08:02Z Author&#160;Ventre, Daniel.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;John Wiley <a href="http://dx.doi.org/10.1002/9781118381533">http://dx.doi.org/10.1002/9781118381533</a> <a href="http://lib.myilibrary.com?id=477736">http://lib.myilibrary.com?id=477736</a> OverDrive (PDF) <a href="http://www.contentreserve.com/TitleInfo.asp?ID={02D73229-3728-4EE5-942B-28D4B82AED18}&Format=50">http://www.contentreserve.com/TitleInfo.asp?ID={02D73229-3728-4EE5-942B-28D4B82AED18}&Format=50</a> OverDrive (EPUB) <a href="http://www.contentreserve.com/TitleInfo.asp?ID={02D73229-3728-4EE5-942B-28D4B82AED18}&Format=410">http://www.contentreserve.com/TitleInfo.asp?ID={02D73229-3728-4EE5-942B-28D4B82AED18}&Format=410</a> OverDrive (READ) <a href="http://www.contentreserve.com/TitleInfo.asp?ID={02D73229-3728-4EE5-942B-28D4B82AED18}&Format=610">http://www.contentreserve.com/TitleInfo.asp?ID={02D73229-3728-4EE5-942B-28D4B82AED18}&Format=610</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information security governance a practical development and implementation approach ent://SD_ILS/0/SD_ILS:297743 2024-11-09T13:08:02Z 2024-11-09T13:08:02Z Author&#160;Brotby, W. Krag.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;Ebook Library <a href="http://public.eblib.com/EBLPublic/PublicView.do?ptiID=433807">http://public.eblib.com/EBLPublic/PublicView.do?ptiID=433807</a> John Wiley <a href="http://dx.doi.org/10.1002/9780470476017">http://dx.doi.org/10.1002/9780470476017</a> <a href="http://site.ebrary.com/lib/alltitles/Doc?id=10313652">http://site.ebrary.com/lib/alltitles/Doc?id=10313652</a> <a href="http://swb.eblib.com/patron/FullRecord.aspx?p=433807">http://swb.eblib.com/patron/FullRecord.aspx?p=433807</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security risk management body of knowledge ent://SD_ILS/0/SD_ILS:297759 2024-11-09T13:08:02Z 2024-11-09T13:08:02Z Author&#160;Talbot, Julian.&#160;Jakeman, Miles Gareth.&#160;Wiley InterScience (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;John Wiley <a href="http://dx.doi.org/10.1002/9780470494974">http://dx.doi.org/10.1002/9780470494974</a> Books24x7 <a href="http://www.books24x7.com/marc.asp?bookid=43285">http://www.books24x7.com/marc.asp?bookid=43285</a> MyiLibrary, Table of contents <a href="http://www.myilibrary.com?id=230340&ref=toc">http://www.myilibrary.com?id=230340&ref=toc</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Effective leadership skills for the CISO ent://SD_ILS/0/SD_ILS:286555 2024-11-09T13:08:02Z 2024-11-09T13:08:02Z Author&#160;Fitzgerald, Todd.&#160;Krause, Micki.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9780849379444">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information security management handbook. Vol. 2 ent://SD_ILS/0/SD_ILS:286816 2024-11-09T13:08:02Z 2024-11-09T13:08:02Z Author&#160;Tipton, Harold F.&#160;Krause, Micki.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781420067101">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> How to achieve 27001 certification an example of applied compliance management ent://SD_ILS/0/SD_ILS:289396 2024-11-09T13:08:02Z 2024-11-09T13:08:02Z Author&#160;Arnason, Sigurjon Thor.&#160;Willett, Keith D.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781420013139">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> AVIEN malware defense guide for the Enterprise ent://SD_ILS/0/SD_ILS:145183 2024-11-09T13:08:02Z 2024-11-09T13:08:02Z Author&#160;Harley, David.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491648">http://www.sciencedirect.com/science/book/9781597491648</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information security management handbook ent://SD_ILS/0/SD_ILS:285161 2024-11-09T13:08:02Z 2024-11-09T13:08:02Z Author&#160;Tipton, Harold F.&#160;Krause, Micki.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781439833032">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Complete guide to CISM certification ent://SD_ILS/0/SD_ILS:289397 2024-11-09T13:08:02Z 2024-11-09T13:08:02Z Author&#160;Peltier, Thomas R.&#160;Peltier, Justin.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781420013252">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information security cost management ent://SD_ILS/0/SD_ILS:286545 2024-11-09T13:08:02Z 2024-11-09T13:08:02Z Author&#160;Bazavan, Ioana V.&#160;Lim, Ian.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781420013832">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> How to cheat at managing information security ent://SD_ILS/0/SD_ILS:253677 2024-11-09T13:08:02Z 2024-11-09T13:08:02Z Author&#160;Osborne, Mark.&#160;Summitt, Paul M.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491105">http://www.sciencedirect.com/science/book/9781597491105</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Syngress IT security project management handbook ent://SD_ILS/0/SD_ILS:253949 2024-11-09T13:08:02Z 2024-11-09T13:08:02Z Author&#160;Snedaker, Susan.&#160;Rogers, Russ.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490764">http://www.sciencedirect.com/science/book/9781597490764</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information security management handbook. Vol. 2 ent://SD_ILS/0/SD_ILS:285441 2024-11-09T13:08:02Z 2024-11-09T13:08:02Z Author&#160;Tipton, Harold F.&#160;Krause, Micki.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9780203005552">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Managing an information security and privacy awareness and training program ent://SD_ILS/0/SD_ILS:284780 2024-11-09T13:08:02Z 2024-11-09T13:08:02Z Author&#160;Herold, Rebecca.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781420031256">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information security management handbook. Vol. 4 ent://SD_ILS/0/SD_ILS:287776 2024-11-09T13:08:02Z 2024-11-09T13:08:02Z Author&#160;Tipton, Harold F.&#160;Krause, Micki.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781420072419">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Surviving security how to integrate people, process, and technology ent://SD_ILS/0/SD_ILS:284583 2024-11-09T13:08:02Z 2024-11-09T13:08:02Z Author&#160;Andress, Amanda.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9780203501405">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Enterprise operations management ent://SD_ILS/0/SD_ILS:285003 2024-11-09T13:08:02Z 2024-11-09T13:08:02Z Author&#160;Blanding, Steven F.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781420048117">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/>