Search Results for Computer security -- Standards. SirsiDynix Enterprise https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dComputer$002bsecurity$002b--$002bStandards.$0026ic$003dtrue$0026ps$003d300? 2026-01-22T16:00:51Z Cryptography : algorithms, protocols, and standards for computer security ent://SD_ILS/0/SD_ILS:598914 2026-01-22T16:00:51Z 2026-01-22T16:00:51Z Author&#160;Mammeri, Zoubir, author.<br/>Preferred Shelf Number&#160;QA268 .M34 2024<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394207510">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394207510</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> A comprehensive guide to the NIST cybersecurity framework 2.0 : strategies, implementation, and best practice ent://SD_ILS/0/SD_ILS:599377 2026-01-22T16:00:51Z 2026-01-22T16:00:51Z Author&#160;Edwards, Jason (Cybersecurity expert), author.<br/>Preferred Shelf Number&#160;QA76.9 .A25 E39 2025<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394280391">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394280391</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Privacy preservation of genomic and medical data ent://SD_ILS/0/SD_ILS:598731 2026-01-22T16:00:51Z 2026-01-22T16:00:51Z Author&#160;Tyagi, Amit Kumar, editor.<br/>Preferred Shelf Number&#160;R859.7 .S43 P75 2024<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394213726">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394213726</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> An introduction to cyber modeling and simulation ent://SD_ILS/0/SD_ILS:594699 2026-01-22T16:00:51Z 2026-01-22T16:00:51Z Author&#160;Couretas, Jerry M., 1966- author.<br/>Preferred Shelf Number&#160;QA76.9 .C65<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119420842">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119420842</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> CWTS, CWS, and CWT complete study guide : Exams PW0-071, CWS-2017, CWT-2017 ent://SD_ILS/0/SD_ILS:594000 2026-01-22T16:00:51Z 2026-01-22T16:00:51Z Author&#160;Bartz, Robert J., 1959- author.<br/>Preferred Shelf Number&#160;TK5103.2<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119419426">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119419426</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Health Information Science 4th International Conference, HIS 2015, Melbourne, Australia, May 28-30, 2015, Proceedings ent://SD_ILS/0/SD_ILS:519292 2026-01-22T16:00:51Z 2026-01-22T16:00:51Z Author&#160;Yin, Xiaoxia. editor.&#160;Ho, Kendall. editor.&#160;Zeng, Daniel. editor.&#160;Aickelin, Uwe. editor.&#160;Zhou, Rui. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-19156-0">https://doi.org/10.1007/978-3-319-19156-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security management : a critical thinking approach ent://SD_ILS/0/SD_ILS:539725 2026-01-22T16:00:51Z 2026-01-22T16:00:51Z Author&#160;Land, Michael (Industrial engineer), author.&#160;Ricks, Truett A., author.&#160;Ricks, Bob, author.<br/>Preferred Shelf Number&#160;HD61.5 .L36 2014<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781466561786">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> Information security management handbook. Volume 2 ent://SD_ILS/0/SD_ILS:543942 2026-01-22T16:00:51Z 2026-01-22T16:00:51Z Author&#160;Tipton, Harold F.&#160;Krause, Micki.<br/>Preferred Shelf Number&#160;QA76.9 .A25 I54 2008<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781420067101">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> 802.1X port-based authentication ent://SD_ILS/0/SD_ILS:544830 2026-01-22T16:00:51Z 2026-01-22T16:00:51Z Author&#160;Brown, Edwin Lyle., author.<br/>Preferred Shelf Number&#160;TK5105.59 .B765 2007<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781420044652">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> Information security architecture : an integrated approach to security in the organization ent://SD_ILS/0/SD_ILS:541238 2026-01-22T16:00:51Z 2026-01-22T16:00:51Z Author&#160;Tudor, Jan Killmeyer., author.<br/>Preferred Shelf Number&#160;QA76.9 .A25 T83 2006<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9780203488751">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> Computer science handbook ent://SD_ILS/0/SD_ILS:542261 2026-01-22T16:00:51Z 2026-01-22T16:00:51Z Author&#160;Tucker, Allen B.<br/>Preferred Shelf Number&#160;QA76 .C54755 2004<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9780203494455">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> Using the common criteria for IT security evaluation ent://SD_ILS/0/SD_ILS:538965 2026-01-22T16:00:51Z 2026-01-22T16:00:51Z Author&#160;Herrmann, Debra S., author.<br/>Preferred Shelf Number&#160;TK5102.85 .H47 2003<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781420031423">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> The privacy papers : managing technology, consumer, employee, and legislative action ent://SD_ILS/0/SD_ILS:539954 2026-01-22T16:00:51Z 2026-01-22T16:00:51Z Author&#160;Herold, Rebecca.<br/>Preferred Shelf Number&#160;KF1262 .P754 2002<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781420000177">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> Information security management handbook on CD-ROM ent://SD_ILS/0/SD_ILS:547768 2026-01-22T16:00:51Z 2026-01-22T16:00:51Z Author&#160;Nozaki, Micki Krause.&#160;Tipton, Harold F.<br/>Preferred Shelf Number&#160;QA76.9 .A25 H36 2002<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781466515611">https://www.taylorfrancis.com/books/9781466515611</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Secure computers and networks : analysis, design, and implementation ent://SD_ILS/0/SD_ILS:540568 2026-01-22T16:00:51Z 2026-01-22T16:00:51Z Author&#160;Fisch, Eric A.&#160;White, Gregory B.<br/>Preferred Shelf Number&#160;QA76.9 .A25 F5334 2000<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9780367802127">https://www.taylorfrancis.com/books/9780367802127</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/>