Search Results for Policy - Narrowed by: Computer security.
SirsiDynix Enterprise
https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dPolicy$0026qf$003dSUBJECT$002509Subject$002509Computer$002bsecurity.$002509Computer$002bsecurity.$0026ic$003dtrue$0026ps$003d300?
2026-05-15T05:52:02Z
Policy-Based Autonomic Data Governance
ent://SD_ILS/0/SD_ILS:484997
2026-05-15T05:52:02Z
2026-05-15T05:52:02Z
Author Calo, Seraphin. editor. (orcid)0000-0003-4668-3989 Bertino, Elisa. editor. Verma, Dinesh. editor. (orcid)0000-0003-1933-7343 SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-17277-0">https://doi.org/10.1007/978-3-030-17277-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security and policy driven computing
ent://SD_ILS/0/SD_ILS:539761
2026-05-15T05:52:02Z
2026-05-15T05:52:02Z
Author Liu, Lei, 1968, author.<br/>Preferred Shelf Number QA76.9 .A25 L587 2011<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781439825808">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>
Building an effective information security policy architecture
ent://SD_ILS/0/SD_ILS:540985
2026-05-15T05:52:02Z
2026-05-15T05:52:02Z
Author Bacik, Sandy., author.<br/>Preferred Shelf Number QA76.9 .A25 B335 2008<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781420059069">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>
Bring Your Own Device Security Policy Compliance Framework
ent://SD_ILS/0/SD_ILS:607863
2026-05-15T05:52:02Z
2026-05-15T05:52:02Z
Author Palanisamy, Rathika. author. (orcid)0000-0001-6495-1081 Norman, Azah Anir. author. Kiah, Miss Laiha Mat. author. Herawan, Tutut. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-031-86801-6">https://doi.org/10.1007/978-3-031-86801-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
LEADERSHIP FUNDAMENTALS FOR CYBERSECURITY IN PUBLIC POLICY AND ADMINISTRATION lessons for the global south.
ent://SD_ILS/0/SD_ILS:552304
2026-05-15T05:52:02Z
2026-05-15T05:52:02Z
Author Johnson, Donavon.<br/>Preferred Shelf Number ZA5070<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003496250">https://www.taylorfrancis.com/books/9781003496250</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Privacy Technologies and Policy 7th Annual Privacy Forum, APF 2019, Rome, Italy, June 13–14, 2019, Proceedings
ent://SD_ILS/0/SD_ILS:486677
2026-05-15T05:52:02Z
2026-05-15T05:52:02Z
Author Naldi, Maurizio. editor. (orcid)0000-0002-0903-398X Italiano, Giuseppe F. editor. (orcid)0000-0002-9492-9894 Rannenberg, Kai. editor. Medina, Manel. editor. (orcid)0000-0002-1763-1728 Bourka, Athena. editor.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-21752-5">https://doi.org/10.1007/978-3-030-21752-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Privacy Technologies and Policy Second Annual Privacy Forum, APF 2014, Athens, Greece, May 20-21, 2014, Proceedings
ent://SD_ILS/0/SD_ILS:488945
2026-05-15T05:52:02Z
2026-05-15T05:52:02Z
Author Preneel, Bart. editor. Ikonomou, Demosthenes. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-06749-0">https://doi.org/10.1007/978-3-319-06749-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Privacy Technologies and Policy First Annual Privacy Forum, APF 2012, Limassol, Cyprus, October 10-11, 2012, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:487210
2026-05-15T05:52:02Z
2026-05-15T05:52:02Z
Author Preneel, Bart. editor. Ikonomou, Demosthenes. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-642-54069-1">https://doi.org/10.1007/978-3-642-54069-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information security policy development for compliance : ISO/IEC 27001, NIST SP 800-53, HIPAA standard, PCI DSS V2.0, and AUP V5.0
ent://SD_ILS/0/SD_ILS:545128
2026-05-15T05:52:02Z
2026-05-15T05:52:02Z
Author Williams, Barry L., author.<br/>Preferred Shelf Number QA76.9 .A25 .W5495 2013<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781466580596">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>
Open-source security operations center (SOC) : a complete guide to establishing, managing, and maintaining a modern SOC
ent://SD_ILS/0/SD_ILS:599434
2026-05-15T05:52:02Z
2026-05-15T05:52:02Z
Author Basta, Alfred, author. Basta, Nadine, author. Anwar, Waqar, author. Essar, Mohammad Ilyas, author. John Wiley & Sons, publisher.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394201631">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394201631</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Generative AI, cybersecurity, and ethics
ent://SD_ILS/0/SD_ILS:599597
2026-05-15T05:52:02Z
2026-05-15T05:52:02Z
Author Islam, Ray (Mohammad Rubyet), author.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394279326">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394279326</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Stepping through cybersecurity risk management : a systems thinking approach
ent://SD_ILS/0/SD_ILS:599021
2026-05-15T05:52:02Z
2026-05-15T05:52:02Z
Author Bayuk, Jennifer L., author.<br/>Preferred Shelf Number QA76.9 .A25 B39 2024<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394213986">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394213986</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cyber Operations : A Case Study Approach
ent://SD_ILS/0/SD_ILS:599117
2026-05-15T05:52:02Z
2026-05-15T05:52:02Z
Author Couretas, Jerry M., 1966- author.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119712121">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119712121</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Hands on hacking
ent://SD_ILS/0/SD_ILS:596316
2026-05-15T05:52:02Z
2026-05-15T05:52:02Z
Author Hickey, Matthew (Computer security expert), author. Arcuri, Jennifer, author.<br/>Preferred Shelf Number QA76.9 .A25 H53 2020 EB<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119561507">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119561507</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cybersecurity in humanities and social sciences : a research methods approach
ent://SD_ILS/0/SD_ILS:596373
2026-05-15T05:52:02Z
2026-05-15T05:52:02Z
Author Loiseau, Hugo, editor. Ventre, Daniel, editor. Aden, Hartmut, editor.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119777588">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119777588</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cyber security in parallel and distributed computing : concepts, techniques, applications and case studies
ent://SD_ILS/0/SD_ILS:595099
2026-05-15T05:52:02Z
2026-05-15T05:52:02Z
Author Le, Dac-Nhuong, 1983- editor. Kumar, Raghvendra, 1987- editor. Mishra, Brojo Kishore, 1979- editor. Khari, Manju, editor. Chatterjee, Jyotir Moy, editor.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119488330">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119488330</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cybersecurity blue team toolkit
ent://SD_ILS/0/SD_ILS:595209
2026-05-15T05:52:02Z
2026-05-15T05:52:02Z
Author Tanner, Nadean H., author.<br/>Preferred Shelf Number QA76.9 .A25 T36 2019 EB<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119552963">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119552963</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
We have root : even more advice from Schneier on security
ent://SD_ILS/0/SD_ILS:595432
2026-05-15T05:52:02Z
2026-05-15T05:52:02Z
Author Schneier, Bruce, 1963- author.<br/>Preferred Shelf Number QA76.9 .A25 S36 2019<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119653554">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119653554</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
The Digital Big Bang : the Hard Stuff, the Soft Stuff, and the Future of Cybersecurity
ent://SD_ILS/0/SD_ILS:595435
2026-05-15T05:52:02Z
2026-05-15T05:52:02Z
Author Quade, Phil.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119617396">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119617396</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Digital forensics
ent://SD_ILS/0/SD_ILS:593346
2026-05-15T05:52:02Z
2026-05-15T05:52:02Z
Author Årnes, André, 1976- editor.<br/>Preferred Shelf Number HV8079 .C65<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119262442">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119262442</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cybersecurity in Germany
ent://SD_ILS/0/SD_ILS:399230
2026-05-15T05:52:02Z
2026-05-15T05:52:02Z
Author Schallbruch, Martin. author. Skierka, Isabel. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-90014-8">https://doi.org/10.1007/978-3-319-90014-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
The Huawei and Snowden Questions Can Electronic Equipment from Untrusted Vendors be Verified? Can an Untrusted Vendor Build Trust into Electronic Equipment?
ent://SD_ILS/0/SD_ILS:402451
2026-05-15T05:52:02Z
2026-05-15T05:52:02Z
Author Lysne, Olav. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-74950-1">https://doi.org/10.1007/978-3-319-74950-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
An introduction to cyber modeling and simulation
ent://SD_ILS/0/SD_ILS:594699
2026-05-15T05:52:02Z
2026-05-15T05:52:02Z
Author Couretas, Jerry M., 1966- author.<br/>Preferred Shelf Number QA76.9 .C65<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119420842">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119420842</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Hacking the hacker : learn from the experts who take down hackers
ent://SD_ILS/0/SD_ILS:593636
2026-05-15T05:52:02Z
2026-05-15T05:52:02Z
Author Grimes, Roger A., author.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119396260">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119396260</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information security fundamentals
ent://SD_ILS/0/SD_ILS:539922
2026-05-15T05:52:02Z
2026-05-15T05:52:02Z
Author Peltier, Thomas R.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9780429130281">Taylor & Francis eBooks</a>
Taylor & Francis <a href="https://www.taylorfrancis.com/books/9780429130281">https://www.taylorfrancis.com/books/9780429130281</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Risk analysis and security countermeasure selection
ent://SD_ILS/0/SD_ILS:539402
2026-05-15T05:52:02Z
2026-05-15T05:52:02Z
Author Norman, Thomas L., author.<br/>Preferred Shelf Number HV8290 .N67 2010<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781420078718">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>
Digital privacy : theory, technologies, and practices
ent://SD_ILS/0/SD_ILS:547774
2026-05-15T05:52:02Z
2026-05-15T05:52:02Z
Author Acquisti, Alessandro.<br/>Preferred Shelf Number QA76.9 .A25 D528 2008<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781420052183">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>
Information security : design, implementation, measurement, and compliance
ent://SD_ILS/0/SD_ILS:545839
2026-05-15T05:52:02Z
2026-05-15T05:52:02Z
Author Layton, Timothy P., author.<br/>Preferred Shelf Number HF5548.37 .L393 2007<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781420013412">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>
Database and applications security : integrating information security and data management
ent://SD_ILS/0/SD_ILS:540220
2026-05-15T05:52:02Z
2026-05-15T05:52:02Z
Author Thuraisingham, Bhavani M., author.<br/>Preferred Shelf Number QA76.9 .D314 T47 2005<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9780203486061">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>
Information security policies, procedures, and standards : guidelines for effective information security management
ent://SD_ILS/0/SD_ILS:546817
2026-05-15T05:52:02Z
2026-05-15T05:52:02Z
Author Peltier, Thomas R., author.<br/>Preferred Shelf Number QA76.9 .A25 P46 2002<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9780849390326">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>