Search Results for Publications. - Narrowed by: Computer security. SirsiDynix Enterprise https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dPublications.$0026qf$003dSUBJECT$002509Subject$002509Computer$002bsecurity.$002509Computer$002bsecurity.$0026pe$003dd$00253A$0026ps$003d300?dt=list 2025-01-01T13:25:57Z Delivering London 2012 ICT implementation and operations ent://SD_ILS/0/SD_ILS:509889 2025-01-01T13:25:57Z 2025-01-01T13:25:57Z Author&#160;IET, ed.<br/>Preferred Shelf Number&#160;XX(509889.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1049/PERICP2E">http://dx.doi.org/10.1049/PERICP2E</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Resilience, Security &amp; Risk in Transport ent://SD_ILS/0/SD_ILS:509892 2025-01-01T13:25:57Z 2025-01-01T13:25:57Z Author&#160;IET, ed.<br/>Preferred Shelf Number&#160;XX(509892.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1049/PERRSR3E">http://dx.doi.org/10.1049/PERRSR3E</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cyber security essentials ent://SD_ILS/0/SD_ILS:287980 2025-01-01T13:25:57Z 2025-01-01T13:25:57Z Author&#160;Graham, James (James J.)&#160;Howard, Richard, 1959-&#160;Olson, Ryan, 1981-<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781439851265">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Official (ISC)2&#700; guide to the ISSMP&#700; CBK&#700; ent://SD_ILS/0/SD_ILS:286114 2025-01-01T13:25:57Z 2025-01-01T13:25:57Z Author&#160;Tipton, Harold F.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781420094442">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Adaptive security management architecture ent://SD_ILS/0/SD_ILS:288451 2025-01-01T13:25:57Z 2025-01-01T13:25:57Z Author&#160;Tiller, James S.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781420013375">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information security risk analysis ent://SD_ILS/0/SD_ILS:288856 2025-01-01T13:25:57Z 2025-01-01T13:25:57Z Author&#160;Peltier, Thomas R.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781439839577">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Profiling hackers the science of criminal profiling as applied to the world of hacking ent://SD_ILS/0/SD_ILS:291412 2025-01-01T13:25:57Z 2025-01-01T13:25:57Z Author&#160;Chiesa, Raoul, 1973-&#160;Ducci, Stefania.&#160;Ciappi, Silvio, 1965-<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781420086942">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security software development assessing and managing security risks ent://SD_ILS/0/SD_ILS:286016 2025-01-01T13:25:57Z 2025-01-01T13:25:57Z Author&#160;Ashbaugh, Douglas A.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781420063813">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Digital privacy theory, technologies, and practices ent://SD_ILS/0/SD_ILS:286824 2025-01-01T13:25:57Z 2025-01-01T13:25:57Z Author&#160;Acquisti, Alessandro.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781420052183">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Insider computer fraud an in-depth framework for detecting and defending against insider IT attacks ent://SD_ILS/0/SD_ILS:291349 2025-01-01T13:25:57Z 2025-01-01T13:25:57Z Author&#160;Brancik, Kenneth C.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781420046601">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Building an effective information security policy architecture ent://SD_ILS/0/SD_ILS:290577 2025-01-01T13:25:57Z 2025-01-01T13:25:57Z Author&#160;Bacik, Sandy.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781420059069">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Mechanics of user identification and authentication fundamentals of identity management ent://SD_ILS/0/SD_ILS:286830 2025-01-01T13:25:57Z 2025-01-01T13:25:57Z Author&#160;Todorov, Dobromir.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781420052206">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information security design, implementation, measurement, and compliance ent://SD_ILS/0/SD_ILS:288490 2025-01-01T13:25:57Z 2025-01-01T13:25:57Z Author&#160;Layton, Timothy P.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781420013412">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security in distributed, grid, mobile, and pervasive computing ent://SD_ILS/0/SD_ILS:287492 2025-01-01T13:25:57Z 2025-01-01T13:25:57Z Author&#160;Xiao, Yang, 1966-<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9780849379253">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Software deployment, updating, and patching ent://SD_ILS/0/SD_ILS:289409 2025-01-01T13:25:57Z 2025-01-01T13:25:57Z Author&#160;Stackpole, Bill.&#160;Hanrion, Patrick.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781420013290">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Data-driven block ciphers for fast telecommunication systems ent://SD_ILS/0/SD_ILS:287763 2025-01-01T13:25:57Z 2025-01-01T13:25:57Z Author&#160;Moldovyan, Nick.&#160;Moldovyan, Alex.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781420054125">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information security architecture an integrated approach to security in the organization ent://SD_ILS/0/SD_ILS:290176 2025-01-01T13:25:57Z 2025-01-01T13:25:57Z Author&#160;Tudor, Jan Killmeyer.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9780203488751">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> The security risk assessment handbook a complete guide for performing security risk assessments ent://SD_ILS/0/SD_ILS:284790 2025-01-01T13:25:57Z 2025-01-01T13:25:57Z Author&#160;Landoll, Douglas J.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781420031232">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Enhancing computer security with smart technology ent://SD_ILS/0/SD_ILS:284793 2025-01-01T13:25:57Z 2025-01-01T13:25:57Z Author&#160;Vemuri, V. Rao.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781420031225">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> The CISO handbook a practical guide to securing your company ent://SD_ILS/0/SD_ILS:290416 2025-01-01T13:25:57Z 2025-01-01T13:25:57Z Author&#160;Gentile, Michael.&#160;Collette, Ronald D.&#160;August, Thomas D.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781420031379">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Database and applications security integrating information security and data management ent://SD_ILS/0/SD_ILS:284552 2025-01-01T13:25:57Z 2025-01-01T13:25:57Z Author&#160;Thuraisingham, Bhavani M.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9780203486061">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> A practical guide to security assessments ent://SD_ILS/0/SD_ILS:288306 2025-01-01T13:25:57Z 2025-01-01T13:25:57Z Author&#160;Kairab, Sudhanshu.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9780203507230">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information security risk analysis ent://SD_ILS/0/SD_ILS:284764 2025-01-01T13:25:57Z 2025-01-01T13:25:57Z Author&#160;Peltier, Thomas R.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781420031195">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Curing the patch management headache ent://SD_ILS/0/SD_ILS:284778 2025-01-01T13:25:57Z 2025-01-01T13:25:57Z Author&#160;Nicastro, Felicia M.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781420031294">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Assessing and managing security risk in IT systems a structured methodology ent://SD_ILS/0/SD_ILS:285488 2025-01-01T13:25:57Z 2025-01-01T13:25:57Z Author&#160;McCumber, John, 1956-<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9780203490426">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information security fundamentals ent://SD_ILS/0/SD_ILS:289155 2025-01-01T13:25:57Z 2025-01-01T13:25:57Z Author&#160;Peltier, Thomas R.&#160;Peltier, Justin.&#160;Blackley, John A.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9780203488652">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Public key infrastructure building trusted applications and Web services ent://SD_ILS/0/SD_ILS:290108 2025-01-01T13:25:57Z 2025-01-01T13:25:57Z Author&#160;Vacca, John R.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9780203498156">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information security policies and procedures a practitioner's reference ent://SD_ILS/0/SD_ILS:290137 2025-01-01T13:25:57Z 2025-01-01T13:25:57Z Author&#160;Peltier, Thomas R.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9780203488737">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Investigator's guide to steganography ent://SD_ILS/0/SD_ILS:286402 2025-01-01T13:25:57Z 2025-01-01T13:25:57Z Author&#160;Kipper, Gregory.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9780203504765">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Building a global information assurance program ent://SD_ILS/0/SD_ILS:287473 2025-01-01T13:25:57Z 2025-01-01T13:25:57Z Author&#160;Curts, Raymond J.&#160;Campbell, Douglas E., 1954-<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9780203997550">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information security policies, procedures, and standards guidelines for effective information security management ent://SD_ILS/0/SD_ILS:290209 2025-01-01T13:25:57Z 2025-01-01T13:25:57Z Author&#160;Peltier, Thomas R.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9780849390326">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/>