Search Results for Data protection - Narrowed by: Computer security.
SirsiDynix Enterprise
https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dData$002bprotection$0026qf$003dSUBJECT$002509Subject$002509Computer$002bsecurity.$002509Computer$002bsecurity.$0026ps$003d300?
2025-12-13T04:29:23Z
Internet of Things Security and Data Protection
ent://SD_ILS/0/SD_ILS:485847
2025-12-13T04:29:23Z
2025-12-13T04:29:23Z
Author Ziegler, Sébastien. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-04984-3">https://doi.org/10.1007/978-3-030-04984-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Data protection : governance, risk management, and compliance
ent://SD_ILS/0/SD_ILS:543918
2025-12-13T04:29:23Z
2025-12-13T04:29:23Z
Author Hill, David G. (David Gary), 1943, author.<br/>Preferred Shelf Number QA76.9 .A25 H52 2009<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781439806937">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>
A’dan Z’ye siber güvenlik
ent://SD_ILS/0/SD_ILS:524303
2025-12-13T04:29:23Z
2025-12-13T04:29:23Z
Author Polat, A. Can. Karakaş, Burak.<br/>Preferred Shelf Number QA76.9 P65 2023<br/>Format: Books<br/>Availability Beytepe Library~1<br/>
IT GOVERNANCE AND INFORMATION SECURITY : guides, standards and frameworks.
ent://SD_ILS/0/SD_ILS:549396
2025-12-13T04:29:23Z
2025-12-13T04:29:23Z
Author Maleh, Yassine, 1987- Sahid, Abdelkebir, 1983- Alazab, Mamoun, 1980- Belaissaoui, Mustapha, 1968-<br/>Preferred Shelf Number ONLINE<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003161998">https://www.taylorfrancis.com/books/9781003161998</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Network security and its impact on business strategy
ent://SD_ILS/0/SD_ILS:482213
2025-12-13T04:29:23Z
2025-12-13T04:29:23Z
Author Oncioiu, Ionica, 1972- editor. IGI Global, publisher.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-8455-1">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-8455-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cyber law, privacy, and security : concepts, methodologies, tools, and applications
ent://SD_ILS/0/SD_ILS:482239
2025-12-13T04:29:23Z
2025-12-13T04:29:23Z
Author IGI Global, publisher. Information Resources Management Association, editor.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-8897-9">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-8897-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Security Practice and Experience 15th International Conference, ISPEC 2019, Kuala Lumpur, Malaysia, November 26–28, 2019, Proceedings
ent://SD_ILS/0/SD_ILS:483099
2025-12-13T04:29:23Z
2025-12-13T04:29:23Z
Author Heng, Swee-Huay. editor. (orcid)0000-0003-3627-2131 Lopez, Javier. editor. (orcid)0000-0001-8066-9991 SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-34339-2">https://doi.org/10.1007/978-3-030-34339-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Critical Infrastructure Protection XIII 13th IFIP WG 11.10 International Conference, ICCIP 2019, Arlington, VA, USA, March 11–12, 2019, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:486939
2025-12-13T04:29:23Z
2025-12-13T04:29:23Z
Author Staggs, Jason. editor. Shenoi, Sujeet. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-34647-8">https://doi.org/10.1007/978-3-030-34647-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Global cyber security labor shortage and international business risk
ent://SD_ILS/0/SD_ILS:481810
2025-12-13T04:29:23Z
2025-12-13T04:29:23Z
Author Christiansen, Bryan, 1960- editor. Piekarz, Agnieszka, 1990- editor. IGI Global, publisher.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-5927-6">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-5927-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Advanced methodologies and technologies in system security, information privacy, and forensics
ent://SD_ILS/0/SD_ILS:482009
2025-12-13T04:29:23Z
2025-12-13T04:29:23Z
Author Khosrow-Pour, Mehdi, 1951- editor. IGI Global, publisher.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-7492-7">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-7492-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Applications and Techniques in Information Security 10th International Conference, ATIS 2019, Thanjavur, India, November 22–24, 2019, Proceedings
ent://SD_ILS/0/SD_ILS:483576
2025-12-13T04:29:23Z
2025-12-13T04:29:23Z
Author Shankar Sriram, V. S. editor. (orcid)0000-0001-7870-7944 Subramaniyaswamy, V. editor. Sasikaladevi, N. editor. (orcid)0000-0002-0841-502X Zhang, Leo. editor. Batten, Lynn. editor. (orcid)0000-0003-4525-2423<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-981-15-0871-4">https://doi.org/10.1007/978-981-15-0871-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Resilience of Cyber-Physical Systems From Risk Modelling to Threat Counteraction
ent://SD_ILS/0/SD_ILS:483593
2025-12-13T04:29:23Z
2025-12-13T04:29:23Z
Author Flammini, Francesco. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-95597-1">https://doi.org/10.1007/978-3-319-95597-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Critical Infrastructure Security and Resilience Theories, Methods, Tools and Technologies
ent://SD_ILS/0/SD_ILS:484275
2025-12-13T04:29:23Z
2025-12-13T04:29:23Z
Author Gritzalis, Dimitris. editor. Theocharidou, Marianthi. editor. (orcid)0000-0002-8870-1746 Stergiopoulos, George. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-00024-0">https://doi.org/10.1007/978-3-030-00024-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Frontiers in Cyber Security Second International Conference, FCS 2019, Xi'an, China, November 15–17, 2019, Proceedings
ent://SD_ILS/0/SD_ILS:486019
2025-12-13T04:29:23Z
2025-12-13T04:29:23Z
Author Shen, Bazhong. editor. Wang, Baocang. editor. (orcid)0000-0002-2554-4464 Han, Jinguang. editor. (orcid)0000-0002-4993-9452 Yu, Yong. editor. (orcid)0000-0003-0667-077X SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-981-15-0818-9">https://doi.org/10.1007/978-981-15-0818-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Advanced Hybrid Information Processing First International Conference, ADHIP 2017, Harbin, China, July 17–18, 2017, Proceedings
ent://SD_ILS/0/SD_ILS:402205
2025-12-13T04:29:23Z
2025-12-13T04:29:23Z
Author Sun, Guanglu. editor. Liu, Shuai. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-73317-3">https://doi.org/10.1007/978-3-319-73317-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Research and Practical Issues of Enterprise Information Systems 12th IFIP WG 8.9 Working Conference, CONFENIS 2018, Held at the 24th IFIP World Computer Congress, WCC 2018, Poznan, Poland, September 18–19, 2018, Proceedings
ent://SD_ILS/0/SD_ILS:399694
2025-12-13T04:29:23Z
2025-12-13T04:29:23Z
Author Tjoa, A Min. editor. (orcid)0000-0002-8295-9252 Raffai, Maria. editor. (orcid)0000-0001-6934-6366 Doucek, Petr. editor. (orcid)0000-0002-5647-661X Novak, Niina Maarit. editor. (orcid)0000-0003-4352-7534 SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-99040-8">https://doi.org/10.1007/978-3-319-99040-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Network Intrusion Detection using Deep Learning A Feature Learning Approach
ent://SD_ILS/0/SD_ILS:399859
2025-12-13T04:29:23Z
2025-12-13T04:29:23Z
Author Kim, Kwangjo. author. Aminanto, Muhamad Erza. author. Tanuwidjaja, Harry Chandra. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-981-13-1444-5">https://doi.org/10.1007/978-981-13-1444-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Versatile Cybersecurity
ent://SD_ILS/0/SD_ILS:399974
2025-12-13T04:29:23Z
2025-12-13T04:29:23Z
Author Conti, Mauro. editor. (orcid)0000-0002-3612-1934 Somani, Gaurav. editor. Poovendran, Radha. editor. (orcid)0000-0003-0269-8097 SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-97643-3">https://doi.org/10.1007/978-3-319-97643-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Critical Infrastructure Protection XII 12th IFIP WG 11.10 International Conference, ICCIP 2018, Arlington, VA, USA, March 12-14, 2018, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:400126
2025-12-13T04:29:23Z
2025-12-13T04:29:23Z
Author Staggs, Jason. editor. Shenoi, Sujeet. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-04537-1">https://doi.org/10.1007/978-3-030-04537-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cloud Computing, Security, Privacy in New Computing Environments 7th International Conference, CloudComp 2016, and First International Conference, SPNCE 2016, Guangzhou, China, November 25–26, and December 15–16, 2016, Proceedings
ent://SD_ILS/0/SD_ILS:400508
2025-12-13T04:29:23Z
2025-12-13T04:29:23Z
Author Wan, Jiafu. editor. Lin, Kai. editor. Zeng, Delu. editor. Li, Jin. editor. Xiang, Yang. editor.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-69605-8">https://doi.org/10.1007/978-3-319-69605-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Advanced Monitoring in P2P Botnets A Dual Perspective
ent://SD_ILS/0/SD_ILS:400767
2025-12-13T04:29:23Z
2025-12-13T04:29:23Z
Author Karuppayah, Shankar. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-981-10-9050-9">https://doi.org/10.1007/978-981-10-9050-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security and Privacy in Communication Networks SecureComm 2017 International Workshops, ATCS and SePrIoT, Niagara Falls, ON, Canada, October 22–25, 2017, Proceedings
ent://SD_ILS/0/SD_ILS:400846
2025-12-13T04:29:23Z
2025-12-13T04:29:23Z
Author Lin, Xiaodong. editor. Ghorbani, Ali. editor. Ren, Kui. editor. Zhu, Sencun. editor. Zhang, Aiqing. editor.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-78816-6">https://doi.org/10.1007/978-3-319-78816-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security and Privacy in Communication Networks 13th International Conference, SecureComm 2017, Niagara Falls, ON, Canada, October 22–25, 2017, Proceedings
ent://SD_ILS/0/SD_ILS:400949
2025-12-13T04:29:23Z
2025-12-13T04:29:23Z
Author Lin, Xiaodong. editor. Ghorbani, Ali. editor. Ren, Kui. editor. Zhu, Sencun. editor. Zhang, Aiqing. editor.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-78813-5">https://doi.org/10.1007/978-3-319-78813-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Future Network Systems and Security 4th International Conference, FNSS 2018, Paris, France, July 9–11, 2018, Proceedings
ent://SD_ILS/0/SD_ILS:401734
2025-12-13T04:29:23Z
2025-12-13T04:29:23Z
Author Doss, Robin. editor. (orcid)0000-0001-6143-6850 Piramuthu, Selwyn. editor. Zhou, Wei. editor. (orcid)0000-0002-9965-9870 SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-94421-0">https://doi.org/10.1007/978-3-319-94421-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Mobile Internet Security First International Symposium, MobiSec 2016, Taichung, Taiwan, July 14-15, 2016, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:401000
2025-12-13T04:29:23Z
2025-12-13T04:29:23Z
Author You, Ilsun. editor. Leu, Fang-Yie. editor. Chen, Hsing-Chung. editor. Kotenko, Igor. editor. (orcid)0000-0001-6859-7120 SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-981-10-7850-7">https://doi.org/10.1007/978-981-10-7850-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Big Data Technologies for Monitoring of Computer Security: A Case Study of the Russian Federation
ent://SD_ILS/0/SD_ILS:401907
2025-12-13T04:29:23Z
2025-12-13T04:29:23Z
Author Petrenko, Sergei. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-79036-7">https://doi.org/10.1007/978-3-319-79036-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Introductory Computer Forensics A Hands-on Practical Approach
ent://SD_ILS/0/SD_ILS:398966
2025-12-13T04:29:23Z
2025-12-13T04:29:23Z
Author Lin, Xiaodong. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-00581-8">https://doi.org/10.1007/978-3-030-00581-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Honeypot Frameworks and Their Applications: A New Framework
ent://SD_ILS/0/SD_ILS:399250
2025-12-13T04:29:23Z
2025-12-13T04:29:23Z
Author NG, Chee Keong. author. Pan, Lei. author. Xiang, Yang. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-981-10-7739-5">https://doi.org/10.1007/978-981-10-7739-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Introduction to Security Reduction
ent://SD_ILS/0/SD_ILS:399211
2025-12-13T04:29:23Z
2025-12-13T04:29:23Z
Author Guo, Fuchun. author. Susilo, Willy. author. (orcid)0000-0002-1562-5105 Mu, Yi. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-93049-7">https://doi.org/10.1007/978-3-319-93049-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Privacy and Identity Management. The Smart Revolution 12th IFIP WG 9.2, 9.5, 9.6/11.7, 11.6/SIG 9.2.2 International Summer School, Ispra, Italy, September 4-8, 2017, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:401491
2025-12-13T04:29:23Z
2025-12-13T04:29:23Z
Author Hansen, Marit. editor. Kosta, Eleni. editor. Nai-Fovino, Igor. editor. Fischer-Hübner, Simone. editor. (orcid)0000-0002-6938-4466 SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-92925-5">https://doi.org/10.1007/978-3-319-92925-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Trust Management XII 12th IFIP WG 11.11 International Conference, IFIPTM 2018, Toronto, ON, Canada, July 10–13, 2018, Proceedings
ent://SD_ILS/0/SD_ILS:402007
2025-12-13T04:29:23Z
2025-12-13T04:29:23Z
Author Gal-Oz, Nurit. editor. Lewis, Peter R. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-95276-5">https://doi.org/10.1007/978-3-319-95276-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Foundations and Practice of Security 10th International Symposium, FPS 2017, Nancy, France, October 23-25, 2017, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:402017
2025-12-13T04:29:23Z
2025-12-13T04:29:23Z
Author Imine, Abdessamad. editor. Fernandez, José M. editor. (orcid)0000-0001-9836-3595 Marion, Jean-Yves. editor. Logrippo, Luigi. editor. (orcid)0000-0001-8804-0450 Garcia-Alfaro, Joaquin. editor. (orcid)0000-0002-7453-4393<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-75650-9">https://doi.org/10.1007/978-3-319-75650-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Digital Forensics and Cyber Crime 9th International Conference, ICDF2C 2017, Prague, Czech Republic, October 9-11, 2017, Proceedings
ent://SD_ILS/0/SD_ILS:401948
2025-12-13T04:29:23Z
2025-12-13T04:29:23Z
Author Matoušek, Petr. editor. Schmiedecker, Martin. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-73697-6">https://doi.org/10.1007/978-3-319-73697-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Unauthorized Access : The Crisis in Online Privacy and Security.
ent://SD_ILS/0/SD_ILS:543688
2025-12-13T04:29:23Z
2025-12-13T04:29:23Z
Author Sloan, Robert, author. CRC Press LLC.<br/>Preferred Shelf Number TK5105.878 .S59 2017<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9780429093791">https://www.taylorfrancis.com/books/9780429093791</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
SECURITY STRATEGY : from requirements to reality.
ent://SD_ILS/0/SD_ILS:545098
2025-12-13T04:29:23Z
2025-12-13T04:29:23Z
Author STACKPOLE, BILL.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9780429152160">Taylor & Francis eBooks</a>
Taylor & Francis <a href="https://www.taylorfrancis.com/books/9780429152160">https://www.taylorfrancis.com/books/9780429152160</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information security fundamentals
ent://SD_ILS/0/SD_ILS:539922
2025-12-13T04:29:23Z
2025-12-13T04:29:23Z
Author Peltier, Thomas R.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9780429130281">Taylor & Francis eBooks</a>
Taylor & Francis <a href="https://www.taylorfrancis.com/books/9780429130281">https://www.taylorfrancis.com/books/9780429130281</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Mobile data loss : threats and countermeasures
ent://SD_ILS/0/SD_ILS:458729
2025-12-13T04:29:23Z
2025-12-13T04:29:23Z
Author Raggo, Michael T.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="https://www.sciencedirect.com/science/book/9780128028643">https://www.sciencedirect.com/science/book/9780128028643</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Measuring and managing information risk : a FAIR approach
ent://SD_ILS/0/SD_ILS:355576
2025-12-13T04:29:23Z
2025-12-13T04:29:23Z
Author Freund, Jack, author. Jones, Jack, author.<br/>Preferred Shelf Number ONLINE(355576.1)<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780124202313">http://www.sciencedirect.com/science/book/9780124202313</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security without obscurity : a guide to confidentiality, authentication, and integrity
ent://SD_ILS/0/SD_ILS:544118
2025-12-13T04:29:23Z
2025-12-13T04:29:23Z
Author Stapleton, Jeffrey James, author.<br/>Preferred Shelf Number QA76.9 .A25 S734 2014<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781466592155">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>
Information protection playbook
ent://SD_ILS/0/SD_ILS:306649
2025-12-13T04:29:23Z
2025-12-13T04:29:23Z
Author Kane, Greg, editor of compilation. Koppel, Lorna, editor of compilation.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780124172326">http://www.sciencedirect.com/science/book/9780124172326</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Data hiding exposing concealed data in multimedia, operating systems, mobile devices and network protocols
ent://SD_ILS/0/SD_ILS:147602
2025-12-13T04:29:23Z
2025-12-13T04:29:23Z
Author Raggo, Michael T. Hosmer, Chet.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597497435">http://www.sciencedirect.com/science/book/9781597497435</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information security policy development for compliance : ISO/IEC 27001, NIST SP 800-53, HIPAA standard, PCI DSS V2.0, and AUP V5.0
ent://SD_ILS/0/SD_ILS:545128
2025-12-13T04:29:23Z
2025-12-13T04:29:23Z
Author Williams, Barry L., author.<br/>Preferred Shelf Number QA76.9 .A25 .W5495 2013<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781466580596">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>
The complete guide to physical security
ent://SD_ILS/0/SD_ILS:545960
2025-12-13T04:29:23Z
2025-12-13T04:29:23Z
Author Baker, Paul, 1958, author. Benny, Daniel J.<br/>Preferred Shelf Number HV8290 .B34 2013<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781420099645">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>
The complete book of data anonymization : from planning to implementation
ent://SD_ILS/0/SD_ILS:540169
2025-12-13T04:29:23Z
2025-12-13T04:29:23Z
Author Raghunathan, Balaji., author.<br/>Preferred Shelf Number QA76.9 .A25 R338 2013<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781439877319">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>
PRAGMATIC security metrics : applying metametrics to information security
ent://SD_ILS/0/SD_ILS:541797
2025-12-13T04:29:23Z
2025-12-13T04:29:23Z
Author Brotby, W. Krag., author. Hinson, Gary. Kabay, Michel E.<br/>Preferred Shelf Number HD30.38 .B76 2013<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781439881538">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>
IT auditing using controls to protect information assets
ent://SD_ILS/0/SD_ILS:293262
2025-12-13T04:29:23Z
2025-12-13T04:29:23Z
Author Davis, Chris (Christopher Michael) Schiller, Mike. Wheeler, Kevin.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://mhebooklibrary.com/reader/auditing-using-controls-to-protect-information-assets-2nd-edition">Subscription required</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security information and event management (SIEM) implementation
ent://SD_ILS/0/SD_ILS:293279
2025-12-13T04:29:23Z
2025-12-13T04:29:23Z
Author Miller, David, 1959 Nov. 5- Harris, Shon. Harper, Allen. VanDyke, Stephen. Blask, Chris.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://mhebooklibrary.com/reader/security-information-event-management-siem-implementation">Subscription required</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Engineering information security the application of systems engineering concepts to achieve information assurance
ent://SD_ILS/0/SD_ILS:249916
2025-12-13T04:29:23Z
2025-12-13T04:29:23Z
Author Jacobs, Stuart.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access IEEE Xplore <a href="http://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=6047604">http://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=6047604</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security in computing
ent://SD_ILS/0/SD_ILS:313297
2025-12-13T04:29:23Z
2025-12-13T04:29:23Z
Author Pfleeger, Charles P., 1948-<br/>Preferred Shelf Number QA76.9 A25 P45 2011<br/>Format: Books<br/>Availability Beytepe Library~1<br/>
Security de-engineering : solving the problems in information risk management
ent://SD_ILS/0/SD_ILS:545608
2025-12-13T04:29:23Z
2025-12-13T04:29:23Z
Author Tibble, Ian., author.<br/>Preferred Shelf Number HF5548.37 .T53 2011<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781439868355">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>
Security and policy driven computing
ent://SD_ILS/0/SD_ILS:539761
2025-12-13T04:29:23Z
2025-12-13T04:29:23Z
Author Liu, Lei, 1968, author.<br/>Preferred Shelf Number QA76.9 .A25 L587 2011<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781439825808">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>
The security risk assessment handbook : a complete guide for performing security risk assessments
ent://SD_ILS/0/SD_ILS:539743
2025-12-13T04:29:23Z
2025-12-13T04:29:23Z
Author Landoll, Douglas J., author.<br/>Preferred Shelf Number HF5548.37 .L358 2011<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781439821497">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>
Information technology risk management in enterprise environments a review of industry practices and a practical guide to risk management teams
ent://SD_ILS/0/SD_ILS:297862
2025-12-13T04:29:23Z
2025-12-13T04:29:23Z
Author Kouns, Jake. Minoli, Daniel, 1952- Wiley InterScience (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access John Wiley <a href="http://dx.doi.org/10.1002/9780470558133">http://dx.doi.org/10.1002/9780470558133</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
The executive MBA in information security
ent://SD_ILS/0/SD_ILS:539948
2025-12-13T04:29:23Z
2025-12-13T04:29:23Z
Author Trinckes, John J., author.<br/>Preferred Shelf Number HF5548.37 .T75 2010<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781439810088">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>
CISO soft skills : securing organizations impaired by employee politics, apathy, and intolerant perspectives
ent://SD_ILS/0/SD_ILS:544153
2025-12-13T04:29:23Z
2025-12-13T04:29:23Z
Author Collette, Ronald D., author. Gentile, Michael. Gentile, Skye.<br/>Preferred Shelf Number HF5548.37 .G462 2009<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781420089110">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>
Information security management metrics : a definitive guide to effective security monitoring and measurement
ent://SD_ILS/0/SD_ILS:546952
2025-12-13T04:29:23Z
2025-12-13T04:29:23Z
Author Brotby, W. Krag., author.<br/>Preferred Shelf Number HD30.2 .B78 2009<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781420052862">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>
Infosecurity 2008 threat analysis
ent://SD_ILS/0/SD_ILS:145541
2025-12-13T04:29:23Z
2025-12-13T04:29:23Z
Author Clark, Champ, III.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492249">http://www.sciencedirect.com/science/book/9781597492249</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Digital watermarking and steganography
ent://SD_ILS/0/SD_ILS:146474
2025-12-13T04:29:23Z
2025-12-13T04:29:23Z
Author Cox, I. J. (Ingemar J.)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780123725851">http://www.sciencedirect.com/science/book/9780123725851</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information assurance architecture
ent://SD_ILS/0/SD_ILS:539830
2025-12-13T04:29:23Z
2025-12-13T04:29:23Z
Author Willett, Keith D., author.<br/>Preferred Shelf Number QA76.9 .A25 W5487 2008<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9780849380686">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>
Digital privacy : theory, technologies, and practices
ent://SD_ILS/0/SD_ILS:547774
2025-12-13T04:29:23Z
2025-12-13T04:29:23Z
Author Acquisti, Alessandro.<br/>Preferred Shelf Number QA76.9 .A25 D528 2008<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781420052183">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>
FISMA certification & accreditation handbook
ent://SD_ILS/0/SD_ILS:145876
2025-12-13T04:29:23Z
2025-12-13T04:29:23Z
Author Taylor, Laura. Shepherd, Matthew.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491167">http://www.sciencedirect.com/science/book/9781597491167</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security in computing
ent://SD_ILS/0/SD_ILS:110682
2025-12-13T04:29:23Z
2025-12-13T04:29:23Z
Author Pfleeger, Charles P., 1948-<br/>Preferred Shelf Number QA76.9.A25 P45 2007<br/>Format: Books<br/>Availability Beytepe Library~1<br/>
FISMA certification & accreditation handbook
ent://SD_ILS/0/SD_ILS:112169
2025-12-13T04:29:23Z
2025-12-13T04:29:23Z
Author Taylor, Laura. Shepherd, Matthew. ScienceDirect (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491167">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information security : design, implementation, measurement, and compliance
ent://SD_ILS/0/SD_ILS:545839
2025-12-13T04:29:23Z
2025-12-13T04:29:23Z
Author Layton, Timothy P., author.<br/>Preferred Shelf Number HF5548.37 .L393 2007<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781420013412">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>
Insider threat protecting the enterprise from sabotage, spying, and theft
ent://SD_ILS/0/SD_ILS:253661
2025-12-13T04:29:23Z
2025-12-13T04:29:23Z
Author Cole, Eric. Ring, Sandra.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access Volltext <a href="http://www.sciencedirect.com/science/book/9781597490481">http://www.sciencedirect.com/science/book/9781597490481</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
The security risk assessment handbook : a complete guide for performing security risk assessments
ent://SD_ILS/0/SD_ILS:545167
2025-12-13T04:29:23Z
2025-12-13T04:29:23Z
Author Landoll, Douglas J., author.<br/>Preferred Shelf Number HF5548.37 .L358 2006<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781420031232">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>
The CISO handbook : a practical guide to securing your company
ent://SD_ILS/0/SD_ILS:539204
2025-12-13T04:29:23Z
2025-12-13T04:29:23Z
Author Gentile, Michael., author. Collette, Ronald D. August, Thomas D.<br/>Preferred Shelf Number HF5548.37 .G46 2006<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781420031379">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>
Implementing database security and auditing a guide for DBAs, information security administrators and auditors
ent://SD_ILS/0/SD_ILS:253860
2025-12-13T04:29:23Z
2025-12-13T04:29:23Z
Author Ben-Natan, Ron.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781555583347">http://www.sciencedirect.com/science/book/9781555583347</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Assessing and managing security risk in IT systems : a structured methodology
ent://SD_ILS/0/SD_ILS:542250
2025-12-13T04:29:23Z
2025-12-13T04:29:23Z
Author McCumber, John, 1956, author.<br/>Preferred Shelf Number QA76.9 .A25 M4284 2005<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781135488970">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>
Building a global information assurance program
ent://SD_ILS/0/SD_ILS:543357
2025-12-13T04:29:23Z
2025-12-13T04:29:23Z
Author Curts, Raymond J., author. Campbell, Douglas E., 1954- author.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9780429225215">https://www.taylorfrancis.com/books/9780429225215</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information security fundamentals
ent://SD_ILS/0/SD_ILS:545226
2025-12-13T04:29:23Z
2025-12-13T04:29:23Z
Author Peltier, Thomas R., author. Peltier, Justin. Blackley, John A.<br/>Preferred Shelf Number QA76.9 .A25 P427 2005<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781135493738">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>
A practical guide to security assessments
ent://SD_ILS/0/SD_ILS:545277
2025-12-13T04:29:23Z
2025-12-13T04:29:23Z
Author Kairab, Sudhanshu., author.<br/>Preferred Shelf Number HF5548.32 .K345 2005<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781135500313">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>
Investigator's guide to steganography
ent://SD_ILS/0/SD_ILS:541281
2025-12-13T04:29:23Z
2025-12-13T04:29:23Z
Author Kipper, Gregory., author.<br/>Preferred Shelf Number QA76.9 .A25 K544 2004<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9780203504765">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>
Information security policies and procedures : a practitioner's reference
ent://SD_ILS/0/SD_ILS:547228
2025-12-13T04:29:23Z
2025-12-13T04:29:23Z
Author Peltier, Thomas R., author.<br/>Preferred Shelf Number QA76.9 .A25 P428 2004<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9780203488737">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>
Information security policies, procedures, and standards : guidelines for effective information security management
ent://SD_ILS/0/SD_ILS:546817
2025-12-13T04:29:23Z
2025-12-13T04:29:23Z
Author Peltier, Thomas R., author.<br/>Preferred Shelf Number QA76.9 .A25 P46 2002<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9780849390326">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>
A practical guide to security engineering and information assurance
ent://SD_ILS/0/SD_ILS:544973
2025-12-13T04:29:23Z
2025-12-13T04:29:23Z
Author Herrmann, Debra S., author.<br/>Preferred Shelf Number QA76.9 .A25 H47 2002<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781420031492">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>
Digital watermarking
ent://SD_ILS/0/SD_ILS:253889
2025-12-13T04:29:23Z
2025-12-13T04:29:23Z
Author Cox, I. J. (Ingemar J.) Miller, Matthew L. Bloom, Jeffrey A. (Jeffrey Adam), 1964-<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781558607149">http://www.sciencedirect.com/science/book/9781558607149</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Technology and privacy : the new landscape
ent://SD_ILS/0/SD_ILS:112999
2025-12-13T04:29:23Z
2025-12-13T04:29:23Z
Author Agre, Philip. Rotenberg, Marc.<br/>Preferred Shelf Number QA76.9.A25 T43 2001<br/>Format: Books<br/>Availability Beytepe Library~1<br/>
Data privacy in the information age
ent://SD_ILS/0/SD_ILS:135125
2025-12-13T04:29:23Z
2025-12-13T04:29:23Z
Author Klosek, Jacqueline.<br/>Preferred Shelf Number QA76.9.A25 K57 2000<br/>Format: Books<br/>Availability Beytepe Library~1<br/>