Search Results for Methodology. - Narrowed by: Data protection. SirsiDynix Enterprise https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dMethodology.$0026qf$003dSUBJECT$002509Subject$002509Data$002bprotection.$002509Data$002bprotection.$0026ps$003d300?dt=list 2026-03-28T01:15:05Z Assessing and managing security risk in IT systems : a structured methodology ent://SD_ILS/0/SD_ILS:542250 2026-03-28T01:15:05Z 2026-03-28T01:15:05Z Author&#160;McCumber, John, 1956, author.<br/>Preferred Shelf Number&#160;QA76.9 .A25 M4284 2005<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781135488970">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> Fundamentals of Digital Forensics A Guide to Theory, Research and Applications ent://SD_ILS/0/SD_ILS:602993 2026-03-28T01:15:05Z 2026-03-28T01:15:05Z Author&#160;K&auml;vrestad, Joakim. author.&#160;Birath, Marcus. author. (orcid)0000-0001-5692-4008&#160;Clarke, Nathan. author. (orcid)0000-0002-3595-3800&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-53649-6">https://doi.org/10.1007/978-3-031-53649-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Emerging Trends in Expert Applications and Security Proceedings of 2nd ICETEAS 2023, Volume 2 ent://SD_ILS/0/SD_ILS:527993 2026-03-28T01:15:05Z 2026-03-28T01:15:05Z Author&#160;Rathore, Vijay Singh. editor.&#160;Piuri, Vincenzo. editor.&#160;Babo, Rosalina. editor.&#160;Ferreira, Marta Campos. editor. (orcid)0000-0001-9505-5730&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-99-1946-8">https://doi.org/10.1007/978-981-99-1946-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in IoT and Security with Computational Intelligence Proceedings of ICAISA 2023, Volume 1 ent://SD_ILS/0/SD_ILS:528440 2026-03-28T01:15:05Z 2026-03-28T01:15:05Z Author&#160;Mishra, Anurag. editor.&#160;Gupta, Deepak. editor.&#160;Chetty, Girija. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-99-5085-0">https://doi.org/10.1007/978-981-99-5085-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Risks and Security of Internet and Systems 11th International Conference, CRiSIS 2016, Roscoff, France, September 5-7, 2016, Revised Selected Papers ent://SD_ILS/0/SD_ILS:611536 2026-03-28T01:15:05Z 2026-03-28T01:15:05Z Author&#160;Cuppens, Fr&eacute;d&eacute;ric. editor.&#160;Cuppens, Nora. editor.&#160;Lanet, Jean-Louis. editor.&#160;Legay, Axel. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-54876-0">https://doi.org/10.1007/978-3-319-54876-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> E-Technologies: Embracing the Internet of Things 7th International Conference, MCETECH 2017, Ottawa, ON, Canada, May 17-19, 2017, Proceedings ent://SD_ILS/0/SD_ILS:612980 2026-03-28T01:15:05Z 2026-03-28T01:15:05Z Author&#160;A&iuml;meur, Esma. editor.&#160;Ruhi, Umar. editor.&#160;Weiss, Michael. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-59041-7">https://doi.org/10.1007/978-3-319-59041-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Resilience and Risk Methods and Application in Environment, Cyber and Social Domains ent://SD_ILS/0/SD_ILS:612480 2026-03-28T01:15:05Z 2026-03-28T01:15:05Z Author&#160;Linkov, Igor. editor. (orcid)0000-0002-0823-8107&#160;Palma-Oliveira, Jos&eacute; Manuel. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-94-024-1123-2">https://doi.org/10.1007/978-94-024-1123-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Hardware IP Security and Trust ent://SD_ILS/0/SD_ILS:614176 2026-03-28T01:15:05Z 2026-03-28T01:15:05Z Author&#160;Mishra, Prabhat. editor.&#160;Bhunia, Swarup. editor.&#160;Tehranipoor, Mark. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-49025-0">https://doi.org/10.1007/978-3-319-49025-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Guide to Digital Forensics A Concise and Practical Introduction ent://SD_ILS/0/SD_ILS:617855 2026-03-28T01:15:05Z 2026-03-28T01:15:05Z Author&#160;K&auml;vrestad, Joakim. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-67450-6">https://doi.org/10.1007/978-3-319-67450-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Smart Grid Inspired Future Technologies First International Conference, SmartGIFT 2016, Liverpool, UK, May 19-20, 2016, Revised Selected Papers ent://SD_ILS/0/SD_ILS:618319 2026-03-28T01:15:05Z 2026-03-28T01:15:05Z Author&#160;Hu, Jia. editor.&#160;Leung, Victor C. M. editor.&#160;Yang, Kun. editor.&#160;Zhang, Yan. editor.&#160;Gao, Jianliang. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-47729-9">https://doi.org/10.1007/978-3-319-47729-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Graphical Models for Security Second International Workshop, GraMSec 2015, Verona, Italy, July 13, 2015, Revised Selected Papers ent://SD_ILS/0/SD_ILS:611037 2026-03-28T01:15:05Z 2026-03-28T01:15:05Z Author&#160;Mauw, Sjouke. editor.&#160;Kordy, Barbara. editor.&#160;Jajodia, Sushil. editor. (orcid)0000-0003-3210-558X&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-29968-6">https://doi.org/10.1007/978-3-319-29968-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> The Privacy Engineer's Manifesto Getting from Policy to Code to QA to Value ent://SD_ILS/0/SD_ILS:618599 2026-03-28T01:15:05Z 2026-03-28T01:15:05Z Author&#160;Dennedy, Michelle. author.&#160;Fox, Jonathan. author.&#160;Finneran, Tom. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-1-4302-6356-2">https://doi.org/10.1007/978-1-4302-6356-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Responsive Security ent://SD_ILS/0/SD_ILS:542438 2026-03-28T01:15:05Z 2026-03-28T01:15:05Z Author&#160;Kang, Meng-Chow, author.<br/>Preferred Shelf Number&#160;HF5548.37<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781315145907">https://www.taylorfrancis.com/books/9781315145907</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information security : design, implementation, measurement, and compliance ent://SD_ILS/0/SD_ILS:545839 2026-03-28T01:15:05Z 2026-03-28T01:15:05Z Author&#160;Layton, Timothy P., author.<br/>Preferred Shelf Number&#160;HF5548.37 .L393 2007<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781420013412">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/>