Search Results for Information security. - Narrowed by: 2010SirsiDynix Enterprisehttps://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dInformation$002bsecurity.$0026qf$003dPUBDATE$002509Publication$002bDate$0025092010$0025092010$0026ps$003d300?2026-01-20T17:45:36ZElectronic Healthcare Information Securityent://SD_ILS/0/SD_ILS:1677532026-01-20T17:45:36Z2026-01-20T17:45:36ZAuthor Shoniregun, Charles A. author. Dube, Kudakwashe. author. Mtenzi, Fredrick. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-0-387-84919-5">http://dx.doi.org/10.1007/978-0-387-84919-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Information security management handbookent://SD_ILS/0/SD_ILS:5428312026-01-20T17:45:36Z2026-01-20T17:45:36ZAuthor Tipton, Harold F. Krause, Micki.<br/>Preferred Shelf Number QA76.9 .A25 I54165 2003<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781420003406">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>Information security management handbookent://SD_ILS/0/SD_ILS:5397932026-01-20T17:45:36Z2026-01-20T17:45:36ZAuthor Tipton, Harold F. Nozaki, Micki Krause.<br/>Preferred Shelf Number QA76.9 .A25 I54165 2007<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781439893159">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>Information security management handbookent://SD_ILS/0/SD_ILS:5387822026-01-20T17:45:36Z2026-01-20T17:45:36ZAuthor Tipton, Harold F. Nozaki, Micki Krause.<br/>Preferred Shelf Number QA76.9 .A25 I54165<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781439853467">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>Information security risk analysisent://SD_ILS/0/SD_ILS:5387132026-01-20T17:45:36Z2026-01-20T17:45:36ZAuthor Peltier, Thomas R., author.<br/>Preferred Shelf Number QA76.9 .A25 P429 2010<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781439839577">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>Economics of Information Security and Privacyent://SD_ILS/0/SD_ILS:1727362026-01-20T17:45:36Z2026-01-20T17:45:36ZAuthor Moore, Tyler. editor. Pym, David. editor. Ioannidis, Christos. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-1-4419-6967-5">http://dx.doi.org/10.1007/978-1-4419-6967-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>CyberForensics Understanding Information Security Investigationsent://SD_ILS/0/SD_ILS:1750482026-01-20T17:45:36Z2026-01-20T17:45:36ZAuthor Bayuk, Jennifer. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-1-60761-772-3">http://dx.doi.org/10.1007/978-1-60761-772-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Handbook of Information and Communication Securityent://SD_ILS/0/SD_ILS:1908412026-01-20T17:45:36Z2026-01-20T17:45:36ZAuthor Stavroulakis, Peter. editor. Stamp, Mark. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-04117-4">http://dx.doi.org/10.1007/978-3-642-04117-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>The executive MBA in information securityent://SD_ILS/0/SD_ILS:5399482026-01-20T17:45:36Z2026-01-20T17:45:36ZAuthor Trinckes, John J., author.<br/>Preferred Shelf Number HF5548.37 .T75 2010<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781439810088">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>Information security management handbook. Volume 4ent://SD_ILS/0/SD_ILS:5400342026-01-20T17:45:36Z2026-01-20T17:45:36ZAuthor Tipton, Harold F. Krause, Micki.<br/>Preferred Shelf Number QA76.9 .A25 I54 2010<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781439819036">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>Security for Microsoft Windows System Administrators introduction to key information security conceptsent://SD_ILS/0/SD_ILS:1491222026-01-20T17:45:36Z2026-01-20T17:45:36ZAuthor Rountree, Derrick.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495943">http://www.sciencedirect.com/science/book/9781597495943</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Critical Information Infrastructures Security 4th International Workshop, CRITIS 2009, Bonn, Germany, September 30 - October 2, 2009. Revised Papersent://SD_ILS/0/SD_ILS:1926342026-01-20T17:45:36Z2026-01-20T17:45:36ZAuthor Rome, Erich. editor. Bloomfield, Robin. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-14379-3">http://dx.doi.org/10.1007/978-3-642-14379-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Information, Security and Cryptology – ICISC 2009 12th International Conference, Seoul, Korea, December 2-4, 2009, Revised Selected Papersent://SD_ILS/0/SD_ILS:1926492026-01-20T17:45:36Z2026-01-20T17:45:36ZAuthor Lee, Donghoon. editor. Hong, Seokhie. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-14423-3">http://dx.doi.org/10.1007/978-3-642-14423-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Information Theoretic Security 4th International Conference, ICITS 2009, Shizuoka, Japan, December 3-6, 2009. Revised Selected Papersent://SD_ILS/0/SD_ILS:1926732026-01-20T17:45:36Z2026-01-20T17:45:36ZAuthor Kurosawa, Kaoru. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-14496-7">http://dx.doi.org/10.1007/978-3-642-14496-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Progress in Cryptology – LATINCRYPT 2010 First International Conference on Cryptology and Information Security in Latin America, Puebla, Mexico, August 8-11, 2010, proceedingsent://SD_ILS/0/SD_ILS:1927452026-01-20T17:45:36Z2026-01-20T17:45:36ZAuthor Abdalla, Michel. editor. Barreto, Paulo S. L. M. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-14712-8">http://dx.doi.org/10.1007/978-3-642-14712-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Security and Privacy – Silver Linings in the Cloud 25th IFIP TC-11 International Information Security Conference, SEC 2010, Held as Part of WCC 2010, Brisbane, Australia, September 20-23, 2010. Proceedingsent://SD_ILS/0/SD_ILS:1929112026-01-20T17:45:36Z2026-01-20T17:45:36ZAuthor Rannenberg, Kai. editor. Varadharajan, Vijay. editor. Weber, Christian. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-15257-3">http://dx.doi.org/10.1007/978-3-642-15257-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Computational Intelligence in Security for Information Systems 2010 Proceedings of the 3rd International Conference on Computational Intelligence in Security for Information Systems (CISIS’10)ent://SD_ILS/0/SD_ILS:1933592026-01-20T17:45:36Z2026-01-20T17:45:36ZAuthor Herrero, Álvaro. editor. Corchado, Emilio. editor. Redondo, Carlos. editor. Alonso, Ángel. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-16626-6">http://dx.doi.org/10.1007/978-3-642-16626-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Advances in Cryptology - ASIACRYPT 2010 16th International Conference on the Theory and Application of Cryptology and Information Security, Singapore, December 5-9, 2010. Proceedingsent://SD_ILS/0/SD_ILS:1935822026-01-20T17:45:36Z2026-01-20T17:45:36ZAuthor Abe, Masayuki. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-17373-8">http://dx.doi.org/10.1007/978-3-642-17373-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Security Technology, Disaster Recovery and Business Continuity International Conferences, SecTech and DRBC 2010, Held as Part of the Future Generation Information Technology Conference, FGIT 2010, Jeju Island, Korea, December 13-15, 2010. Proceedingsent://SD_ILS/0/SD_ILS:1936532026-01-20T17:45:36Z2026-01-20T17:45:36ZAuthor Kim, Tai-hoon. editor. Fang, Wai-chi. editor. Khan, Muhammad Khurram. editor. Arnett, Kirk P. editor. Kang, Heau-jo. editor.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-17610-4">http://dx.doi.org/10.1007/978-3-642-17610-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Information Security Theory and Practices. Security and Privacy of Pervasive Systems and Smart Devices 4th IFIP WG 11.2 International Workshop, WISTP 2010, Passau, Germany, April 12-14, 2010. Proceedingsent://SD_ILS/0/SD_ILS:1919732026-01-20T17:45:36Z2026-01-20T17:45:36ZAuthor Samarati, Pierangela. editor. Tunstall, Michael. editor. Posegga, Joachim. editor. Markantonakis, Konstantinos. editor. Sauveron, Damien. editor.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-12368-9">http://dx.doi.org/10.1007/978-3-642-12368-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>ISSE 2009 Securing Electronic Business Processes Highlights of the Information Security Solutions Europe 2009 Conferenceent://SD_ILS/0/SD_ILS:1994832026-01-20T17:45:36Z2026-01-20T17:45:36ZAuthor Pohlmann, Norbert. editor. Reimer, Helmut. editor. Schneider, Wolfgang. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-8348-9363-5">http://dx.doi.org/10.1007/978-3-8348-9363-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Information Security and Assurance 4th International Conference, ISA 2010, Miyazaki, Japan, June 23-25, 2010. Proceedingsent://SD_ILS/0/SD_ILS:1923122026-01-20T17:45:36Z2026-01-20T17:45:36ZAuthor Bandyopadhyay, Samir Kumar. editor. Adi, Wael. editor. Kim, Tai-hoon. editor. Xiao, Yang. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-13365-7">http://dx.doi.org/10.1007/978-3-642-13365-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Information Security and Privacy 15th Australasian Conference, ACISP 2010, Sydney, Australia, July 5-7, 2010. Proceedingsent://SD_ILS/0/SD_ILS:1925442026-01-20T17:45:36Z2026-01-20T17:45:36ZAuthor Steinfeld, Ron. editor. Hawkes, Philip. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-14081-5">http://dx.doi.org/10.1007/978-3-642-14081-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Information Security and Digital Forensics First International Conference, ISDF 2009, London, United Kingdom, September 7-9, 2009, Revised Selected Papersent://SD_ILS/0/SD_ILS:1917142026-01-20T17:45:36Z2026-01-20T17:45:36ZAuthor Weerasinghe, Dasun. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-11530-1">http://dx.doi.org/10.1007/978-3-642-11530-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Information Security, Practice and Experience 6th International Conference, ISPEC 2010, Seoul, Korea, May 12-13, 2010. Proceedingsent://SD_ILS/0/SD_ILS:1921232026-01-20T17:45:36Z2026-01-20T17:45:36ZAuthor Kwak, Jin. editor. Deng, Robert H. editor. Won, Yoojae. editor. Wang, Guilin. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-12827-1">http://dx.doi.org/10.1007/978-3-642-12827-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Advances in Information and Computer Security 5th International Workshop on Security, IWSEC 2010, Kobe, Japan, November 22-24, 2010. Proceedingsent://SD_ILS/0/SD_ILS:1934222026-01-20T17:45:36Z2026-01-20T17:45:36ZAuthor Echizen, Isao. editor. Kunihiro, Noboru. editor. Sasaki, Ryoichi. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-16825-3">http://dx.doi.org/10.1007/978-3-642-16825-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Security and Privacy in Mobile Information and Communication Systems Second International ICST Conference, MobiSec 2010, Catania, Sicily, Italy, May 27-28, 2010, Revised Selected Papersent://SD_ILS/0/SD_ILS:1936202026-01-20T17:45:36Z2026-01-20T17:45:36ZAuthor Schmidt, Andreas U. editor. Russello, Giovanni. editor. Lioy, Antonio. editor. Prasad, Neeli R. editor. Lian, Shiguo. editor.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-17502-2">http://dx.doi.org/10.1007/978-3-642-17502-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Information and Communications Security 12th International Conference, ICICS 2010, Barcelona, Spain, December 15-17, 2010. Proceedingsent://SD_ILS/0/SD_ILS:1936662026-01-20T17:45:36Z2026-01-20T17:45:36ZAuthor Soriano, Miguel. editor. Qing, Sihan. editor. López, Javier. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-17650-0">http://dx.doi.org/10.1007/978-3-642-17650-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Managing an information security and privacy awareness and training programent://SD_ILS/0/SD_ILS:5389472026-01-20T17:45:36Z2026-01-20T17:45:36ZAuthor Herold, Rebecca., author.<br/>Preferred Shelf Number QA76.9 .A25 H46 2010<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781439815465">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>Network Intrusion Detection and Prevention Concepts and Techniquesent://SD_ILS/0/SD_ILS:1679062026-01-20T17:45:36Z2026-01-20T17:45:36ZAuthor Ghorbani, Ali A. author. Lu, Wei. author. Tavallaee, Mahbod. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-0-387-88771-5">http://dx.doi.org/10.1007/978-0-387-88771-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Adaptive Cryptographic Access Controlent://SD_ILS/0/SD_ILS:1726542026-01-20T17:45:36Z2026-01-20T17:45:36ZAuthor Kayem, Anne V. D. M. author. Akl, Selim G. author. Martin, Patrick. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-1-4419-6655-1">http://dx.doi.org/10.1007/978-1-4419-6655-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Insider Threats in Cyber Securityent://SD_ILS/0/SD_ILS:1727822026-01-20T17:45:36Z2026-01-20T17:45:36ZAuthor Probst, Christian W. editor. Hunker, Jeffrey. editor. Gollmann, Dieter. editor. Bishop, Matt. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-1-4419-7133-3">http://dx.doi.org/10.1007/978-1-4419-7133-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Efficient Secure Two-Party Protocols Techniques and Constructionsent://SD_ILS/0/SD_ILS:1926082026-01-20T17:45:36Z2026-01-20T17:45:36ZAuthor Hazay, Carmit. author. Lindell, Yehuda. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-14303-8">http://dx.doi.org/10.1007/978-3-642-14303-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Advanced Statistical Steganalysisent://SD_ILS/0/SD_ILS:1926112026-01-20T17:45:36Z2026-01-20T17:45:36ZAuthor Böhme, Rainer. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-14313-7">http://dx.doi.org/10.1007/978-3-642-14313-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Locally Decodable Codes and Private Information Retrieval Schemesent://SD_ILS/0/SD_ILS:1926262026-01-20T17:45:36Z2026-01-20T17:45:36ZAuthor Yekhanin, Sergey. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-14358-8">http://dx.doi.org/10.1007/978-3-642-14358-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Towards Hardware-Intrinsic Security Foundations and Practiceent://SD_ILS/0/SD_ILS:1926592026-01-20T17:45:36Z2026-01-20T17:45:36ZAuthor Sadeghi, Ahmad-Reza. editor. Naccache, David. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-14452-3">http://dx.doi.org/10.1007/978-3-642-14452-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Encryption for Digital Contentent://SD_ILS/0/SD_ILS:1718502026-01-20T17:45:36Z2026-01-20T17:45:36ZAuthor Kiayias, Aggelos. author. Pehlivanoglu, Serdar. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-1-4419-0044-9">http://dx.doi.org/10.1007/978-1-4419-0044-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Cyber Situational Awareness Issues and Researchent://SD_ILS/0/SD_ILS:1718742026-01-20T17:45:36Z2026-01-20T17:45:36ZAuthor Jajodia, Sushil. editor. Liu, Peng. editor. Swarup, Vipin. editor. Wang, Cliff. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-1-4419-0140-8">http://dx.doi.org/10.1007/978-1-4419-0140-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Practical Signcryptionent://SD_ILS/0/SD_ILS:1892642026-01-20T17:45:36Z2026-01-20T17:45:36ZAuthor Dent, Alexander W. editor. Zheng, Yuliang. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-540-89411-7">http://dx.doi.org/10.1007/978-3-540-89411-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>The LLL Algorithm Survey and Applicationsent://SD_ILS/0/SD_ILS:1902782026-01-20T17:45:36Z2026-01-20T17:45:36ZAuthor Nguyen, Phong Q. editor. Vallée, Brigitte. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-02295-1">http://dx.doi.org/10.1007/978-3-642-02295-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Vulnerability managementent://SD_ILS/0/SD_ILS:5456982026-01-20T17:45:36Z2026-01-20T17:45:36ZAuthor Foreman, Park., author.<br/>Preferred Shelf Number QA76.9 .A25 F656 2010<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781439801512">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>Advances in cross-cultural decision makingent://SD_ILS/0/SD_ILS:5460962026-01-20T17:45:36Z2026-01-20T17:45:36ZAuthor Schmorrow, Dylan, 1967- Nicholson, Denise, 1967-<br/>Preferred Shelf Number BF448 .A377 2011<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781439834961">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>Urbanization, policing, and security : global perspectivesent://SD_ILS/0/SD_ILS:5414222026-01-20T17:45:36Z2026-01-20T17:45:36ZAuthor Cordner, Gary W. Cordner, AnnMarie. Das, Dilip K., 1941-<br/>Preferred Shelf Number HT361 .U727 2010<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781420085587">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>Information technology risk management in enterprise environments a review of industry practices and a practical guide to risk management teamsent://SD_ILS/0/SD_ILS:2978622026-01-20T17:45:36Z2026-01-20T17:45:36ZAuthor Kouns, Jake. Minoli, Daniel, 1952- Wiley InterScience (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access John Wiley <a href="http://dx.doi.org/10.1002/9780470558133">http://dx.doi.org/10.1002/9780470558133</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Border security in the Al-Qaeda eraent://SD_ILS/0/SD_ILS:5385712026-01-20T17:45:36Z2026-01-20T17:45:36ZAuthor Winterdyk, John. Sundberg, Kelly W.<br/>Preferred Shelf Number K3265 .B67 2010 EB<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781420085464">https://www.taylorfrancis.com/books/9781420085464</a>
Taylor & Francis <a href="https://www.taylorfrancis.com/books/9780367802899">https://www.taylorfrancis.com/books/9780367802899</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Handbook of aviation human factorsent://SD_ILS/0/SD_ILS:5421332026-01-20T17:45:36Z2026-01-20T17:45:36ZAuthor Wise, John A., 1944- Hopkin, V. David. Garland, Daniel J.<br/>Preferred Shelf Number TL553.6 .H35 2010<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781420063578">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>Critical infrastructure : homeland security and emergency preparednessent://SD_ILS/0/SD_ILS:5454032026-01-20T17:45:36Z2026-01-20T17:45:36ZAuthor Radvanovsky, Robert., author. McDougall, Allan.<br/>Preferred Shelf Number UA927 .R34 2010<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781420095289">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>Airport and aviation security : U.S. policy and strategy in the age of global terrorisment://SD_ILS/0/SD_ILS:5393992026-01-20T17:45:36Z2026-01-20T17:45:36ZAuthor Elias, Bartholomew., author.<br/>Preferred Shelf Number TL725.3 .S44 E45 2010<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781420070309">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>Official (ISC)2 guide to the CISSP CBKent://SD_ILS/0/SD_ILS:5406902026-01-20T17:45:36Z2026-01-20T17:45:36ZAuthor Tipton, Harold F.<br/>Preferred Shelf Number QA76.3 .T565 2010<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781439809600">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>