Search Results for Information technology -- Security measures.
SirsiDynix Enterprise
https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dInformation$002btechnology$002b--$002bSecurity$002bmeasures.$0026ps$003d300$0026isd$003dtrue?dt=list
2026-01-11T05:09:27Z
Secure detection and control in cyber-physical systems : working in the presence of malicious data
ent://SD_ILS/0/SD_ILS:574476
2026-01-11T05:09:27Z
2026-01-11T05:09:27Z
Author Yan, Jiaqi, author. Mo, Yilin, author. Wen, Changyun, 1963- author.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003409199">https://www.taylorfrancis.com/books/9781003409199</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Quantum algorithms for enhancing cybersecurity in computational intelligence in healthcare
ent://SD_ILS/0/SD_ILS:589137
2026-01-11T05:09:27Z
2026-01-11T05:09:27Z
Author Singhal, Prateek, editor. Mishra, Pramod Kumar, editor. Hasan, Mokhtar Mohammed, editor.<br/>Preferred Shelf Number R858<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003597414">https://www.taylorfrancis.com/books/9781003597414</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information technology security and risk management : inductive cases for information security
ent://SD_ILS/0/SD_ILS:562664
2026-01-11T05:09:27Z
2026-01-11T05:09:27Z
Author Wingreen, Stephen C., editor. Samandari, Amelia, editor.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003264415">https://www.taylorfrancis.com/books/9781003264415</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Artificial intelligence technology in healthcare : security and privacy issues
ent://SD_ILS/0/SD_ILS:574411
2026-01-11T05:09:27Z
2026-01-11T05:09:27Z
Author Sharma, Neha (Computer scientist), editor. Srivastava, Durgesh (Computer scientist), editor. Sinwar, Deepak, editor.<br/>Preferred Shelf Number R859.7 .A78<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003377818">https://www.taylorfrancis.com/books/9781003377818</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
A guide to using the anonymous web in libraries and information organizations : enhancing patron privacy and information access
ent://SD_ILS/0/SD_ILS:576054
2026-01-11T05:09:27Z
2026-01-11T05:09:27Z
Author Lund, Brady, 1994- author. Beckstrom, Matthew, author.<br/>Preferred Shelf Number ZA4237<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003093732">https://www.taylorfrancis.com/books/9781003093732</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Dijital güvenlik : dijital ortamlarda güvenle var olmak
ent://SD_ILS/0/SD_ILS:517179
2026-01-11T05:09:27Z
2026-01-11T05:09:27Z
Author Özer, Fatih. Şahin, Yusuf Levent, editör<br/>Preferred Shelf Number QA76.9.E74 O94 2022<br/>Format: Books<br/>Availability Beytepe Library~1<br/>
Information security and optimization
ent://SD_ILS/0/SD_ILS:556640
2026-01-11T05:09:27Z
2026-01-11T05:09:27Z
Author Tanwar, Rohit, editor. Choudhury, Tanupriya, editor. Zamani, Mazdak, editor. Gupta, Sunil, 1979- editor.<br/>Preferred Shelf Number QA76.9 .A25 I63 2021<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003045854">https://www.taylorfrancis.com/books/9781003045854</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information security and employee behaviour : how to reduce risk through employee education, training and awareness
ent://SD_ILS/0/SD_ILS:590294
2026-01-11T05:09:27Z
2026-01-11T05:09:27Z
Author McIlwraith, Angus, author.<br/>Preferred Shelf Number HD30.38<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9780429281785">https://www.taylorfrancis.com/books/9780429281785</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Global cyber security labor shortage and international business risk
ent://SD_ILS/0/SD_ILS:481810
2026-01-11T05:09:27Z
2026-01-11T05:09:27Z
Author Christiansen, Bryan, 1960- editor. Piekarz, Agnieszka, 1990- editor. IGI Global, publisher.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-5927-6">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-5927-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cybersecurity education for awareness and compliance
ent://SD_ILS/0/SD_ILS:482092
2026-01-11T05:09:27Z
2026-01-11T05:09:27Z
Author Vasileiou, Ismini, 1980- editor. Furnell, Steven, 1970- editor. IGI Global, publisher.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-7847-5">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-7847-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
SECURITY STRATEGY : from requirements to reality.
ent://SD_ILS/0/SD_ILS:545098
2026-01-11T05:09:27Z
2026-01-11T05:09:27Z
Author STACKPOLE, BILL.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9780429152160">Taylor & Francis eBooks</a>
Taylor & Francis <a href="https://www.taylorfrancis.com/books/9780429152160">https://www.taylorfrancis.com/books/9780429152160</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information security science : measuring the vulnerability to data compromises
ent://SD_ILS/0/SD_ILS:458968
2026-01-11T05:09:27Z
2026-01-11T05:09:27Z
Author Young, Carl S., author.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128096437">http://www.sciencedirect.com/science/book/9780128096437</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security without obscurity : a guide to confidentiality, authentication, and integrity
ent://SD_ILS/0/SD_ILS:544118
2026-01-11T05:09:27Z
2026-01-11T05:09:27Z
Author Stapleton, Jeffrey James, author.<br/>Preferred Shelf Number QA76.9 .A25 S734 2014<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781466592155">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>
The frugal CISO : using innovation and smart approaches to maximize your security posture
ent://SD_ILS/0/SD_ILS:542652
2026-01-11T05:09:27Z
2026-01-11T05:09:27Z
Author Anderson, Kerry Ann, author.<br/>Preferred Shelf Number HD30.2 .A532 2014<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781482220087">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>
Collaboration with cloud computing : security, social media, and unified communications
ent://SD_ILS/0/SD_ILS:355829
2026-01-11T05:09:27Z
2026-01-11T05:09:27Z
Author Messier, Ric, author.<br/>Preferred Shelf Number ONLINE(355829.1)<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780124170407">http://www.sciencedirect.com/science/book/9780124170407</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Total information risk management maximizing the value of data and information assets
ent://SD_ILS/0/SD_ILS:306693
2026-01-11T05:09:27Z
2026-01-11T05:09:27Z
Author Borek, Alexander.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780124055476">http://www.sciencedirect.com/science/book/9780124055476</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
The basics of information security : understanding the fundamentals of InfoSec in theory and practice
ent://SD_ILS/0/SD_ILS:355770
2026-01-11T05:09:27Z
2026-01-11T05:09:27Z
Author Andress, Jason, author.<br/>Preferred Shelf Number ONLINE(355770.1)<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128007440">http://www.sciencedirect.com/science/book/9780128007440</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Responsive Security
ent://SD_ILS/0/SD_ILS:542438
2026-01-11T05:09:27Z
2026-01-11T05:09:27Z
Author Kang, Meng-Chow, author.<br/>Preferred Shelf Number HF5548.37<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781315145907">https://www.taylorfrancis.com/books/9781315145907</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
The benefits and security risks of web-based applications for business trend report
ent://SD_ILS/0/SD_ILS:306640
2026-01-11T05:09:27Z
2026-01-11T05:09:27Z
Author Kotwica, Kathleen.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780124170018">http://www.sciencedirect.com/science/book/9780124170018</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
FISMA and the risk management framework the new practice of federal cyber security
ent://SD_ILS/0/SD_ILS:145936
2026-01-11T05:09:27Z
2026-01-11T05:09:27Z
Author Gantz, Stephen D. Philpott, Daniel R.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597496414">http://www.sciencedirect.com/science/book/9781597496414</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information security for managers
ent://SD_ILS/0/SD_ILS:516570
2026-01-11T05:09:27Z
2026-01-11T05:09:27Z
Author Workman, Michael D., 1957-. Phelps, Daniel C. Gathegi, John N.<br/>Preferred Shelf Number HF5548.37 W67 2013<br/>Format: Books<br/>Availability Beytepe Library~1<br/>
Information security governance simplified : from the boardroom to the keyboard
ent://SD_ILS/0/SD_ILS:541952
2026-01-11T05:09:27Z
2026-01-11T05:09:27Z
Author Fitzgerald, Todd., author.<br/>Preferred Shelf Number TK5105.59 .F58 2012<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781439811658">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>
Asset protection through security awareness
ent://SD_ILS/0/SD_ILS:546687
2026-01-11T05:09:27Z
2026-01-11T05:09:27Z
Author Speed, Tyler Justin., author.<br/>Preferred Shelf Number TK5105.59 .S643 2012<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781439809839">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>
Security de-engineering : solving the problems in information risk management
ent://SD_ILS/0/SD_ILS:545608
2026-01-11T05:09:27Z
2026-01-11T05:09:27Z
Author Tibble, Ian., author.<br/>Preferred Shelf Number HF5548.37 .T53 2011<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781439868355">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>
Auditing cloud computing a security and privacy guide
ent://SD_ILS/0/SD_ILS:299263
2026-01-11T05:09:27Z
2026-01-11T05:09:27Z
Author Halpert, Ben, 1986-<br/>Preferred Shelf Number ONLINE<br/>Electronic Access Image <a href="http://images.contentreserve.com/ImageType-100/0128-1/{F889EE2A-CF12-4647-85E0-03258F227FC1}Img100.jpg">http://images.contentreserve.com/ImageType-100/0128-1/{F889EE2A-CF12-4647-85E0-03258F227FC1}Img100.jpg</a>
Books24x7 <a href="http://www.books24x7.com/marc.asp?bookid=44303">http://www.books24x7.com/marc.asp?bookid=44303</a>
John Wiley <a href="http://dx.doi.org/10.1002/9781118269091">http://dx.doi.org/10.1002/9781118269091</a>
OverDrive (PDF) <a href="http://www.contentreserve.com/TitleInfo.asp?ID={F889EE2A-CF12-4647-85E0-03258F227FC1}&Format=50">http://www.contentreserve.com/TitleInfo.asp?ID={F889EE2A-CF12-4647-85E0-03258F227FC1}&Format=50</a>
OverDrive (EPUB) <a href="http://www.contentreserve.com/TitleInfo.asp?ID={F889EE2A-CF12-4647-85E0-03258F227FC1}&Format=410">http://www.contentreserve.com/TitleInfo.asp?ID={F889EE2A-CF12-4647-85E0-03258F227FC1}&Format=410</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Engineering information security the application of systems engineering concepts to achieve information assurance
ent://SD_ILS/0/SD_ILS:249916
2026-01-11T05:09:27Z
2026-01-11T05:09:27Z
Author Jacobs, Stuart.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access IEEE Xplore <a href="http://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=6047604">http://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=6047604</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
IT security metrics a practical framework for measuring security & protecting data
ent://SD_ILS/0/SD_ILS:293294
2026-01-11T05:09:27Z
2026-01-11T05:09:27Z
Author Hayden, Lance.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://mhebooklibrary.com/reader/security-metrics-practical-framework-for-measuring-protecting-data">Subscription required</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
The basics of information security understanding the fundamentals of InfoSec in theory and practice
ent://SD_ILS/0/SD_ILS:145371
2026-01-11T05:09:27Z
2026-01-11T05:09:27Z
Author Andress, Jason.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597496537">http://www.sciencedirect.com/science/book/9781597496537</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Practical risk management for the CIO
ent://SD_ILS/0/SD_ILS:541595
2026-01-11T05:09:27Z
2026-01-11T05:09:27Z
Author Scherling, Mark., author.<br/>Preferred Shelf Number HF5548.37 .S34 2011<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781439856543">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>
The executive MBA in information security
ent://SD_ILS/0/SD_ILS:539948
2026-01-11T05:09:27Z
2026-01-11T05:09:27Z
Author Trinckes, John J., author.<br/>Preferred Shelf Number HF5548.37 .T75 2010<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781439810088">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>
Vulnerability management
ent://SD_ILS/0/SD_ILS:545698
2026-01-11T05:09:27Z
2026-01-11T05:09:27Z
Author Foreman, Park., author.<br/>Preferred Shelf Number QA76.9 .A25 F656 2010<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781439801512">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>
Information technology risk management in enterprise environments a review of industry practices and a practical guide to risk management teams
ent://SD_ILS/0/SD_ILS:297862
2026-01-11T05:09:27Z
2026-01-11T05:09:27Z
Author Kouns, Jake. Minoli, Daniel, 1952- Wiley InterScience (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access John Wiley <a href="http://dx.doi.org/10.1002/9780470558133">http://dx.doi.org/10.1002/9780470558133</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Data protection : governance, risk management, and compliance
ent://SD_ILS/0/SD_ILS:543918
2026-01-11T05:09:27Z
2026-01-11T05:09:27Z
Author Hill, David G. (David Gary), 1943, author.<br/>Preferred Shelf Number QA76.9 .A25 H52 2009<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781439806937">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>
CISO soft skills : securing organizations impaired by employee politics, apathy, and intolerant perspectives
ent://SD_ILS/0/SD_ILS:544153
2026-01-11T05:09:27Z
2026-01-11T05:09:27Z
Author Collette, Ronald D., author. Gentile, Michael. Gentile, Skye.<br/>Preferred Shelf Number HF5548.37 .G462 2009<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781420089110">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>
Information warfare
ent://SD_ILS/0/SD_ILS:304069
2026-01-11T05:09:27Z
2026-01-11T05:09:27Z
Author Ventre, Daniel.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access John Wiley <a href="http://dx.doi.org/10.1002/9781118381533">http://dx.doi.org/10.1002/9781118381533</a>
<a href="http://lib.myilibrary.com?id=477736">http://lib.myilibrary.com?id=477736</a>
OverDrive (PDF) <a href="http://www.contentreserve.com/TitleInfo.asp?ID={02D73229-3728-4EE5-942B-28D4B82AED18}&Format=50">http://www.contentreserve.com/TitleInfo.asp?ID={02D73229-3728-4EE5-942B-28D4B82AED18}&Format=50</a>
OverDrive (EPUB) <a href="http://www.contentreserve.com/TitleInfo.asp?ID={02D73229-3728-4EE5-942B-28D4B82AED18}&Format=410">http://www.contentreserve.com/TitleInfo.asp?ID={02D73229-3728-4EE5-942B-28D4B82AED18}&Format=410</a>
OverDrive (READ) <a href="http://www.contentreserve.com/TitleInfo.asp?ID={02D73229-3728-4EE5-942B-28D4B82AED18}&Format=610">http://www.contentreserve.com/TitleInfo.asp?ID={02D73229-3728-4EE5-942B-28D4B82AED18}&Format=610</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information security governance a practical development and implementation approach
ent://SD_ILS/0/SD_ILS:297743
2026-01-11T05:09:27Z
2026-01-11T05:09:27Z
Author Brotby, W. Krag.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access Ebook Library <a href="http://public.eblib.com/EBLPublic/PublicView.do?ptiID=433807">http://public.eblib.com/EBLPublic/PublicView.do?ptiID=433807</a>
John Wiley <a href="http://dx.doi.org/10.1002/9780470476017">http://dx.doi.org/10.1002/9780470476017</a>
<a href="http://site.ebrary.com/lib/alltitles/Doc?id=10313652">http://site.ebrary.com/lib/alltitles/Doc?id=10313652</a>
<a href="http://swb.eblib.com/patron/FullRecord.aspx?p=433807">http://swb.eblib.com/patron/FullRecord.aspx?p=433807</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information security management metrics : a definitive guide to effective security monitoring and measurement
ent://SD_ILS/0/SD_ILS:546952
2026-01-11T05:09:27Z
2026-01-11T05:09:27Z
Author Brotby, W. Krag., author.<br/>Preferred Shelf Number HD30.2 .B78 2009<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781420052862">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>
Transportation infrastructure security utilizing intelligent transportation systems
ent://SD_ILS/0/SD_ILS:297684
2026-01-11T05:09:27Z
2026-01-11T05:09:27Z
Author Fries, Ryan Nicholas. Chowdhury, Mashrur A. Brummond, Jeffrey. Wiley InterScience (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access John Wiley <a href="http://dx.doi.org/10.1002/9780470432853">http://dx.doi.org/10.1002/9780470432853</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Strategic security management a risk assessment guide for decision makers
ent://SD_ILS/0/SD_ILS:112201
2026-01-11T05:09:27Z
2026-01-11T05:09:27Z
Author Vellani, Karim H., 1971- ScienceDirect (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780123708977">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Strategic security management a risk assessment guide for decision makers
ent://SD_ILS/0/SD_ILS:306471
2026-01-11T05:09:27Z
2026-01-11T05:09:27Z
Author Vellani, Karim H., 1971-<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780123708977">http://www.sciencedirect.com/science/book/9780123708977</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Strategic security management a risk assessment guide for decision makers
ent://SD_ILS/0/SD_ILS:148661
2026-01-11T05:09:27Z
2026-01-11T05:09:27Z
Author Vellani, Karim H., 1971-<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780123708977">http://www.sciencedirect.com/science/book/9780123708977</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
How to cheat at managing information security
ent://SD_ILS/0/SD_ILS:253677
2026-01-11T05:09:27Z
2026-01-11T05:09:27Z
Author Osborne, Mark. Summitt, Paul M.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491105">http://www.sciencedirect.com/science/book/9781597491105</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
A practical guide to security assessments
ent://SD_ILS/0/SD_ILS:545277
2026-01-11T05:09:27Z
2026-01-11T05:09:27Z
Author Kairab, Sudhanshu., author.<br/>Preferred Shelf Number HF5548.32 .K345 2005<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781135500313">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>
Security assessment case studies for implementing the NSA IAM
ent://SD_ILS/0/SD_ILS:254030
2026-01-11T05:09:27Z
2026-01-11T05:09:27Z
Author Rogers, Russ.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781932266962">http://www.sciencedirect.com/science/book/9781932266962</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Multilingual dictionary of IT security : English, German, French, Spanish, Italian
ent://SD_ILS/0/SD_ILS:78796
2026-01-11T05:09:27Z
2026-01-11T05:09:27Z
Author Vollnhals, Otto.<br/>Preferred Shelf Number REF/QA 76.9.A25 V887 1999<br/>Format: Books<br/>Availability Beytepe Library~1<br/>