Search Results for Control. - Narrowed by: Data protection.
SirsiDynix Enterprise
https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dControl.$0026qf$003dSUBJECT$002509Subject$002509Data$002bprotection.$002509Data$002bprotection.$0026te$003dILS$0026ps$003d300?
2025-12-12T22:34:57Z
Industrial Control Systems Security and Resiliency Practice and Theory
ent://SD_ILS/0/SD_ILS:484767
2025-12-12T22:34:57Z
2025-12-12T22:34:57Z
Author Rieger, Craig. editor. Ray, Indrajit. editor. Zhu, Quanyan. editor. Haney, Michael A. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-18214-4">https://doi.org/10.1007/978-3-030-18214-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Flow Based Security Control Beyond RBAC How to enable fine-grained security policy enforcement in business processes beyond limitations of role-based access control (RBAC)
ent://SD_ILS/0/SD_ILS:198953
2025-12-12T22:34:57Z
2025-12-12T22:34:57Z
Author Fischer-Hellmann, Klaus-Peter. author. Bischoff, Rainer. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-8348-2618-3">http://dx.doi.org/10.1007/978-3-8348-2618-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Networked Services and Applications - Engineering, Control and Management 16th EUNICE/IFIP WG 6.6 Workshop, EUNICE 2010, Trondheim, Norway, June 28-30, 2010. Proceedings
ent://SD_ILS/0/SD_ILS:192508
2025-12-12T22:34:57Z
2025-12-12T22:34:57Z
Author Aagesen, Finn Arve. editor. Knapskog, Svein Johan. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-13971-0">http://dx.doi.org/10.1007/978-3-642-13971-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Mobile Application Development: Practice and Experience 12th Industry Symposium in Conjunction with 18th ICDCIT 2022
ent://SD_ILS/0/SD_ILS:527017
2025-12-12T22:34:57Z
2025-12-12T22:34:57Z
Author Singh, Jagannath. editor. Das, Debasish. editor. Kumar, Lov. editor. Krishna, Aneesh. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-981-19-6893-8">https://doi.org/10.1007/978-981-19-6893-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cyber Security: Analytics, Technology and Automation
ent://SD_ILS/0/SD_ILS:529962
2025-12-12T22:34:57Z
2025-12-12T22:34:57Z
Author Lehto, Martti. editor. Neittaanmäki, Pekka. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-18302-2">https://doi.org/10.1007/978-3-319-18302-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cyber Security Intelligence and Analytics The 5th International Conference on Cyber Security Intelligence and Analytics (CSIA 2023), Volume 2
ent://SD_ILS/0/SD_ILS:526849
2025-12-12T22:34:57Z
2025-12-12T22:34:57Z
Author Xu, Zheng. editor. Alrabaee, Saed. editor. Loyola-González, Octavio. editor. Cahyani, Niken Dwi Wahyu. editor. Ab Rahman, Nurul Hidayah. editor.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-031-31775-0">https://doi.org/10.1007/978-3-031-31775-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cybersecurity and Identity Access Management
ent://SD_ILS/0/SD_ILS:527374
2025-12-12T22:34:57Z
2025-12-12T22:34:57Z
Author Rawal, Bharat S. author. Manogaran, Gunasekaran. author. Peter, Alexender. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-981-19-2658-7">https://doi.org/10.1007/978-981-19-2658-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Advances in Intelligent Information Hiding and Multimedia Signal Processing Proceeding of the 18th IIH-MSP 2022 Kitakyushu, Japan, Volume 2
ent://SD_ILS/0/SD_ILS:527448
2025-12-12T22:34:57Z
2025-12-12T22:34:57Z
Author Kondo, Kazuhiro. editor. Horng, Mong-Fong. editor. Pan, Jeng-Shyang. editor. Hu, Pei. editor. (orcid)0000-0003-3711-4952 SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-981-99-0105-0">https://doi.org/10.1007/978-981-99-0105-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Advances in Intelligent Information Hiding and Multimedia Signal Processing Proceeding of the 18th IIH-MSP 2022 Kitakyushu, Japan, Volume 1
ent://SD_ILS/0/SD_ILS:528126
2025-12-12T22:34:57Z
2025-12-12T22:34:57Z
Author Weng, Shaowei. editor. Shieh, Chin-Shiuh. editor. (orcid)0000-0003-3187-458X Tsihrintzis, George A. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-981-99-0605-5">https://doi.org/10.1007/978-981-99-0605-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Intelligent Computing and Applications Proceedings of ICDIC 2020
ent://SD_ILS/0/SD_ILS:528678
2025-12-12T22:34:57Z
2025-12-12T22:34:57Z
Author Rao, B. Narendra Kumar. editor. Balasubramanian, R. editor. Wang, Shiuh-Jeng. editor. Nayak, Richi. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-981-19-4162-7">https://doi.org/10.1007/978-981-19-4162-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information security fundamentals
ent://SD_ILS/0/SD_ILS:539922
2025-12-12T22:34:57Z
2025-12-12T22:34:57Z
Author Peltier, Thomas R.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9780429130281">Taylor & Francis eBooks</a>
Taylor & Francis <a href="https://www.taylorfrancis.com/books/9780429130281">https://www.taylorfrancis.com/books/9780429130281</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Digital Defense A Cybersecurity Primer
ent://SD_ILS/0/SD_ILS:530403
2025-12-12T22:34:57Z
2025-12-12T22:34:57Z
Author Pelton, Joseph. author. Singh, Indu B. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-19953-5">https://doi.org/10.1007/978-3-319-19953-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Total information risk management maximizing the value of data and information assets
ent://SD_ILS/0/SD_ILS:306693
2025-12-12T22:34:57Z
2025-12-12T22:34:57Z
Author Borek, Alexander.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780124055476">http://www.sciencedirect.com/science/book/9780124055476</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information security policy development for compliance : ISO/IEC 27001, NIST SP 800-53, HIPAA standard, PCI DSS V2.0, and AUP V5.0
ent://SD_ILS/0/SD_ILS:545128
2025-12-12T22:34:57Z
2025-12-12T22:34:57Z
Author Williams, Barry L., author.<br/>Preferred Shelf Number QA76.9 .A25 .W5495 2013<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781466580596">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>
Infosecurity 2008 threat analysis
ent://SD_ILS/0/SD_ILS:145541
2025-12-12T22:34:57Z
2025-12-12T22:34:57Z
Author Clark, Champ, III.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492249">http://www.sciencedirect.com/science/book/9781597492249</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Surveillance studies : an overview
ent://SD_ILS/0/SD_ILS:134494
2025-12-12T22:34:57Z
2025-12-12T22:34:57Z
Author Lyon, David.<br/>Preferred Shelf Number JC596 .L96 2007<br/>Format: Books<br/>Availability Beytepe Library~1<br/>
Information security : design, implementation, measurement, and compliance
ent://SD_ILS/0/SD_ILS:545839
2025-12-12T22:34:57Z
2025-12-12T22:34:57Z
Author Layton, Timothy P., author.<br/>Preferred Shelf Number HF5548.37 .L393 2007<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781420013412">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>
Intrusion prevention and active response deploying network and host IPS
ent://SD_ILS/0/SD_ILS:254017
2025-12-12T22:34:57Z
2025-12-12T22:34:57Z
Author Rash, Michael (Michael Brandon)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781932266474">http://www.sciencedirect.com/science/book/9781932266474</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information security fundamentals
ent://SD_ILS/0/SD_ILS:545226
2025-12-12T22:34:57Z
2025-12-12T22:34:57Z
Author Peltier, Thomas R., author. Peltier, Justin. Blackley, John A.<br/>Preferred Shelf Number QA76.9 .A25 P427 2005<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781135493738">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>
A practical guide to security engineering and information assurance
ent://SD_ILS/0/SD_ILS:544973
2025-12-12T22:34:57Z
2025-12-12T22:34:57Z
Author Herrmann, Debra S., author.<br/>Preferred Shelf Number QA76.9 .A25 H47 2002<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781420031492">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>