Search Results for Computer security -- Standards.SirsiDynix Enterprisehttps://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dComputer$002bsecurity$002b--$002bStandards.$0026ps$003d300?2024-11-06T15:44:43ZHealth Information Science 4th International Conference, HIS 2015, Melbourne, Australia, May 28-30, 2015, Proceedingsent://SD_ILS/0/SD_ILS:5192922024-11-06T15:44:43Z2024-11-06T15:44:43ZAuthor Yin, Xiaoxia. editor. Ho, Kendall. editor. Zeng, Daniel. editor. Aickelin, Uwe. editor. Zhou, Rui. editor.<br/>Preferred Shelf Number XX(519292.1)<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-19156-0">https://doi.org/10.1007/978-3-319-19156-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>802.1X port-based authenticationent://SD_ILS/0/SD_ILS:2913222024-11-06T15:44:43Z2024-11-06T15:44:43ZAuthor Brown, Edwin Lyle.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781420044652">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Information security architecture an integrated approach to security in the organizationent://SD_ILS/0/SD_ILS:2901762024-11-06T15:44:43Z2024-11-06T15:44:43ZAuthor Tudor, Jan Killmeyer.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9780203488751">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Using the common criteria for IT security evaluationent://SD_ILS/0/SD_ILS:2904422024-11-06T15:44:43Z2024-11-06T15:44:43ZAuthor Herrmann, Debra S.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781420031423">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>