Search Results for Computer security. - Narrowed by: 2008
SirsiDynix Enterprise
https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dComputer$002bsecurity.$0026qf$003dPUBDATE$002509Publication$002bDate$0025092008$0025092008$0026ic$003dtrue$0026ps$003d300$0026isd$003dtrue?dt=list
2025-12-08T17:40:19Z
Sequrity for computer networks : an introduction to data security in teleprocessing and electronic funds transfer
ent://SD_ILS/0/SD_ILS:62188
2025-12-08T17:40:19Z
2025-12-08T17:40:19Z
Author Davies, Donald Watts, 1924- Price, W. L., ort.yaz.<br/>Preferred Shelf Number TK 5105 D43 1989<br/>Format: Books<br/>Availability Beytepe Library~1<br/>
VizSEC 2007 Proceedings of the Workshop on Visualization for Computer Security
ent://SD_ILS/0/SD_ILS:188061
2025-12-08T17:40:19Z
2025-12-08T17:40:19Z
Author Goodall, John R. editor. Conti, Gregory. editor. Ma, Kwan-Liu. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-540-78243-8">http://dx.doi.org/10.1007/978-3-540-78243-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Visualization for Computer Security 5th International Workshop, VizSec 2008, Cambridge, MA, USA, September 15, 2008. Proceedings
ent://SD_ILS/0/SD_ILS:188815
2025-12-08T17:40:19Z
2025-12-08T17:40:19Z
Author Goodall, John R. editor. Conti, Gregory. editor. Ma, Kwan-Liu. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-540-85933-8">http://dx.doi.org/10.1007/978-3-540-85933-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Computer Safety, Reliability, and Security 27th International Conference, SAFECOMP 2008 Newcastle upon Tyne, UK, September 22-25, 2008 Proceedings
ent://SD_ILS/0/SD_ILS:188894
2025-12-08T17:40:19Z
2025-12-08T17:40:19Z
Author Harrison, Michael D. editor. Sujan, Mark-Alexander. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-540-87698-4">http://dx.doi.org/10.1007/978-3-540-87698-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Computer Security - ESORICS 2008 13th European Symposium on Research in Computer Security, Málaga, Spain, October 6-8, 2008. Proceedings
ent://SD_ILS/0/SD_ILS:189031
2025-12-08T17:40:19Z
2025-12-08T17:40:19Z
Author Jajodia, Sushil. editor. Lopez, Javier. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-540-88313-5">http://dx.doi.org/10.1007/978-3-540-88313-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Advances in Information and Computer Security Third International Workshop on Security, IWSEC 2008, Kagawa, Japan, November 25-27, 2008. Proceedings
ent://SD_ILS/0/SD_ILS:189294
2025-12-08T17:40:19Z
2025-12-08T17:40:19Z
Author Matsuura, Kanta. editor. Fujisaki, Eiichiro. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-540-89598-5">http://dx.doi.org/10.1007/978-3-540-89598-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Proceedings of The Ifip Tc 11 23rd International Information Security Conference IFIP 20th World Computer Congress, IFIP SEC’08, September 7-10, 2008, Milano, Italy
ent://SD_ILS/0/SD_ILS:164757
2025-12-08T17:40:19Z
2025-12-08T17:40:19Z
Author Jajodia, Sushil. editor. Samarati, Pierangela. editor. Cimato, Stelvio. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-0-387-09699-5">http://dx.doi.org/10.1007/978-0-387-09699-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Hardware-based computer security techniques to defeat hackers from biometrics to quantum cryptography
ent://SD_ILS/0/SD_ILS:297432
2025-12-08T17:40:19Z
2025-12-08T17:40:19Z
Author Dube, Roger. Wiley InterScience (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://proquest.safaribooksonline.com/?fpi=9780470193396">Available by subscription from Safari Books Online</a>
John Wiley <a href="http://dx.doi.org/10.1002/9780470425497">http://dx.doi.org/10.1002/9780470425497</a>
MyiLibrary, Table of contents <a href="http://www.myilibrary.com?id=183706&ref=toc">http://www.myilibrary.com?id=183706&ref=toc</a>
Volltext <a href="http://proquest.tech.safaribooksonline.de/9780470193396">http://proquest.tech.safaribooksonline.de/9780470193396</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Digital watermarking and steganography
ent://SD_ILS/0/SD_ILS:146474
2025-12-08T17:40:19Z
2025-12-08T17:40:19Z
Author Cox, I. J. (Ingemar J.)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780123725851">http://www.sciencedirect.com/science/book/9780123725851</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information assurance dependability and security in networked systems
ent://SD_ILS/0/SD_ILS:145553
2025-12-08T17:40:19Z
2025-12-08T17:40:19Z
Author Qian, Yi, 1962-<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780123735669">http://www.sciencedirect.com/science/book/9780123735669</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information security management handbook
ent://SD_ILS/0/SD_ILS:539793
2025-12-08T17:40:19Z
2025-12-08T17:40:19Z
Author Tipton, Harold F. Nozaki, Micki Krause.<br/>Preferred Shelf Number QA76.9 .A25 I54165 2007<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781439893159">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>
Information security management handbook
ent://SD_ILS/0/SD_ILS:542831
2025-12-08T17:40:19Z
2025-12-08T17:40:19Z
Author Tipton, Harold F. Krause, Micki.<br/>Preferred Shelf Number QA76.9 .A25 I54165 2003<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781420003406">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>
Information security management handbook
ent://SD_ILS/0/SD_ILS:538782
2025-12-08T17:40:19Z
2025-12-08T17:40:19Z
Author Tipton, Harold F. Nozaki, Micki Krause.<br/>Preferred Shelf Number QA76.9 .A25 I54165<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781439853467">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>
Human-computer interaction. Design issues, solutions, and applications
ent://SD_ILS/0/SD_ILS:541058
2025-12-08T17:40:19Z
2025-12-08T17:40:19Z
Author Sears, Andrew. Jacko, Julie A.<br/>Preferred Shelf Number QA76.9 .H85 H8564 2009<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781420088861">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>
Information security management handbook
ent://SD_ILS/0/SD_ILS:546827
2025-12-08T17:40:19Z
2025-12-08T17:40:19Z
Author Tipton, Harold F. Krause, Micki.<br/>Preferred Shelf Number QA76.9 .A25 I54165 2007<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781420090956">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>
Netcat power tools
ent://SD_ILS/0/SD_ILS:146277
2025-12-08T17:40:19Z
2025-12-08T17:40:19Z
Author Kanclirz, Jan. Baskin, Brian.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492577">http://www.sciencedirect.com/science/book/9781597492577</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
No tech hacking a guide to social engineering, dumpster diving, and shoulder surfing
ent://SD_ILS/0/SD_ILS:146362
2025-12-08T17:40:19Z
2025-12-08T17:40:19Z
Author Long, Johnny. Mitnick, Kevin D. (Kevin David), 1963-<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492157">http://www.sciencedirect.com/science/book/9781597492157</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Microsoft forefront security administration guide
ent://SD_ILS/0/SD_ILS:146369
2025-12-08T17:40:19Z
2025-12-08T17:40:19Z
Author Varsalone, Jesse.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492447">http://www.sciencedirect.com/science/book/9781597492447</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Network security know it all
ent://SD_ILS/0/SD_ILS:146401
2025-12-08T17:40:19Z
2025-12-08T17:40:19Z
Author Joshi, James B. D.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780123744630">http://www.sciencedirect.com/science/book/9780123744630</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
OS X exploits and defense
ent://SD_ILS/0/SD_ILS:148242
2025-12-08T17:40:19Z
2025-12-08T17:40:19Z
Author Baccas, Paul. Finisterre, Kevin.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492546">http://www.sciencedirect.com/science/book/9781597492546</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Check Point NGX R65 security administration
ent://SD_ILS/0/SD_ILS:148746
2025-12-08T17:40:19Z
2025-12-08T17:40:19Z
Author Bonnell, Ralph.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492454">http://www.sciencedirect.com/science/book/9781597492454</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Securing Windows server 2008 prevent attacks from outside and inside your organization.
ent://SD_ILS/0/SD_ILS:148982
2025-12-08T17:40:19Z
2025-12-08T17:40:19Z
Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492805">http://www.sciencedirect.com/science/book/9781597492805</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security and Quality of Service in Ad Hoc Wireless Networks
ent://SD_ILS/0/SD_ILS:237801
2025-12-08T17:40:19Z
2025-12-08T17:40:19Z
Author Mishra, Amitabh.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1017/CBO9780511619755">Access by subscription</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Integrating ISA Server 2006 with Microsoft Exchange 2007
ent://SD_ILS/0/SD_ILS:145628
2025-12-08T17:40:19Z
2025-12-08T17:40:19Z
Author Strachan, Fergus.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492751">http://www.sciencedirect.com/science/book/9781597492751</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Practical embedded security building secure resource-constrained systems
ent://SD_ILS/0/SD_ILS:147416
2025-12-08T17:40:19Z
2025-12-08T17:40:19Z
Author Stapko, Timothy John.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780750682152">http://www.sciencedirect.com/science/book/9780750682152</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Malware forensics investigating and analyzing malicious code
ent://SD_ILS/0/SD_ILS:147914
2025-12-08T17:40:19Z
2025-12-08T17:40:19Z
Author Aquilina, James M. Casey, Eoghan. Malin, Cameron H.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492683">http://www.sciencedirect.com/science/book/9781597492683</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Google hacking for penetration testers. Volume 2
ent://SD_ILS/0/SD_ILS:148029
2025-12-08T17:40:19Z
2025-12-08T17:40:19Z
Author Long, Johnny.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491761">http://www.sciencedirect.com/science/book/9781597491761</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
SonicWALL secure wireless network integrated solutions guide
ent://SD_ILS/0/SD_ILS:148562
2025-12-08T17:40:19Z
2025-12-08T17:40:19Z
Author Levy, Joe.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491938">http://www.sciencedirect.com/science/book/9781597491938</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Reverse engineering code with IDA Pro
ent://SD_ILS/0/SD_ILS:149020
2025-12-08T17:40:19Z
2025-12-08T17:40:19Z
Author Ferguson, Justin. Kaminsky, Dan.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492379">http://www.sciencedirect.com/science/book/9781597492379</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Securing Citrix XenApp Server in the enterprise
ent://SD_ILS/0/SD_ILS:149050
2025-12-08T17:40:19Z
2025-12-08T17:40:19Z
Author Bin Azad, Tariq. Wilson, Connie. Wright., Michael.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492812">http://www.sciencedirect.com/science/book/9781597492812</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
How to cheat at securing Linux
ent://SD_ILS/0/SD_ILS:145540
2025-12-08T17:40:19Z
2025-12-08T17:40:19Z
Author Krishnamurthy Madwachar, Mohan.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492072">http://www.sciencedirect.com/science/book/9781597492072</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Infosecurity 2008 threat analysis
ent://SD_ILS/0/SD_ILS:145541
2025-12-08T17:40:19Z
2025-12-08T17:40:19Z
Author Clark, Champ, III.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492249">http://www.sciencedirect.com/science/book/9781597492249</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Nmap in the enterprise your guide to network scanning
ent://SD_ILS/0/SD_ILS:146442
2025-12-08T17:40:19Z
2025-12-08T17:40:19Z
Author Orebaugh, Angela. Pinkard, Becky.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492416">http://www.sciencedirect.com/science/book/9781597492416</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Kismet hacking
ent://SD_ILS/0/SD_ILS:147861
2025-12-08T17:40:19Z
2025-12-08T17:40:19Z
Author Haines, Brad. Schearer, Michael J. Thornton, Frank (Thorn)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491174">http://www.sciencedirect.com/science/book/9781597491174</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
OSSEC host-based intrusion detection guide
ent://SD_ILS/0/SD_ILS:148333
2025-12-08T17:40:19Z
2025-12-08T17:40:19Z
Author Hay, Andrew. Cid, Daniel. Bray, Rory.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492409">http://www.sciencedirect.com/science/book/9781597492409</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Scene of the cybercrime
ent://SD_ILS/0/SD_ILS:148955
2025-12-08T17:40:19Z
2025-12-08T17:40:19Z
Author Cross, Michael, 1965- Shinder, Debra Littlejohn. Scene of the cybercrime.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492768">http://www.sciencedirect.com/science/book/9781597492768</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security in wireless ad hoc and sensor networks
ent://SD_ILS/0/SD_ILS:297789
2025-12-08T17:40:19Z
2025-12-08T17:40:19Z
Author Çayirci, E. (Erdal) Levi, Albert, 1969- Wiley InterScience (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access John Wiley <a href="http://dx.doi.org/10.1002/9780470516782">http://dx.doi.org/10.1002/9780470516782</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
IPTV security protecting high-value digital contents
ent://SD_ILS/0/SD_ILS:302654
2025-12-08T17:40:19Z
2025-12-08T17:40:19Z
Author Ramirez, David. Wiley InterScience (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access John Wiley <a href="http://dx.doi.org/10.1002/9780470727201">http://dx.doi.org/10.1002/9780470727201</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
ICT futures delivering pervasive, real-time and secure services
ent://SD_ILS/0/SD_ILS:302768
2025-12-08T17:40:19Z
2025-12-08T17:40:19Z
Author Warren, Paul (Paul W.) Davies, J. (N. John) Brown, David, 1954- Wiley InterScience (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access John Wiley <a href="http://dx.doi.org/10.1002/9780470758656">http://dx.doi.org/10.1002/9780470758656</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Secure computer and network systems modeling, analysis and design
ent://SD_ILS/0/SD_ILS:296665
2025-12-08T17:40:19Z
2025-12-08T17:40:19Z
Author Ye, Nong. Wiley InterScience (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access Contributor biographical information <a href="http://catdir.loc.gov/catdir/enhancements/fy0833/2007037133-b.html">http://catdir.loc.gov/catdir/enhancements/fy0833/2007037133-b.html</a>
John Wiley <a href="http://dx.doi.org/10.1002/9780470023273">http://dx.doi.org/10.1002/9780470023273</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Digital systems and applications
ent://SD_ILS/0/SD_ILS:539508
2025-12-08T17:40:19Z
2025-12-08T17:40:19Z
Author Oklobdzija, Vojin G.<br/>Preferred Shelf Number TK7885 .D56 2008<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781315222219">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>
Information assurance architecture
ent://SD_ILS/0/SD_ILS:539830
2025-12-08T17:40:19Z
2025-12-08T17:40:19Z
Author Willett, Keith D., author.<br/>Preferred Shelf Number QA76.9 .A25 W5487 2008<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9780849380686">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>
ISA server 2006
ent://SD_ILS/0/SD_ILS:115080
2025-12-08T17:40:19Z
2025-12-08T17:40:19Z
Author İnan, Yüksel. Demirli, Nihat.<br/>Preferred Shelf Number TK5105.59 .I536 2008<br/>Format: Books<br/>Availability Beytepe Library~2<br/>
Building an effective information security policy architecture
ent://SD_ILS/0/SD_ILS:540985
2025-12-08T17:40:19Z
2025-12-08T17:40:19Z
Author Bacik, Sandy., author.<br/>Preferred Shelf Number QA76.9 .A25 B335 2008<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781420059069">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>
Information security management handbook. Volume 2
ent://SD_ILS/0/SD_ILS:543942
2025-12-08T17:40:19Z
2025-12-08T17:40:19Z
Author Tipton, Harold F. Krause, Micki.<br/>Preferred Shelf Number QA76.9 .A25 I54 2008<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781420067101">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>
Effective leadership skills for the CISO
ent://SD_ILS/0/SD_ILS:543829
2025-12-08T17:40:19Z
2025-12-08T17:40:19Z
Author Fitzgerald, Todd. Krause, Micki.<br/>Preferred Shelf Number QA76.9 .A25 E385 2008<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9780849379444">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>
Insider computer fraud : an in-depth framework for detecting and defending against insider IT attacks
ent://SD_ILS/0/SD_ILS:544396
2025-12-08T17:40:19Z
2025-12-08T17:40:19Z
Author Brancik, Kenneth C., author.<br/>Preferred Shelf Number QA76.9 .A25 B725 2008<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781420046601">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>
How to achieve 27001 certification : an example of applied compliance management
ent://SD_ILS/0/SD_ILS:545954
2025-12-08T17:40:19Z
2025-12-08T17:40:19Z
Author Arnason, Sigurjon Thor., author. Willett, Keith D.<br/>Preferred Shelf Number QA76.3 .A77 2008<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781420013139">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>
Digital privacy : theory, technologies, and practices
ent://SD_ILS/0/SD_ILS:547774
2025-12-08T17:40:19Z
2025-12-08T17:40:19Z
Author Acquisti, Alessandro.<br/>Preferred Shelf Number QA76.9 .A25 D528 2008<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781420052183">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>