Search Results for Risk Assessment - Narrowed by: Business -- Data processing -- Security measures. SirsiDynix Enterprise https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dRisk$002bAssessment$0026qf$003dSUBJECT$002509Subject$002509Business$002b--$002bData$002bprocessing$002b--$002bSecurity$002bmeasures.$002509Business$002b--$002bData$002bprocessing$002b--$002bSecurity$002bmeasures.$0026ic$003dtrue$0026ps$003d300? 2024-09-15T02:05:51Z The security risk assessment handbook a complete guide for performing security risk assessments ent://SD_ILS/0/SD_ILS:288890 2024-09-15T02:05:51Z 2024-09-15T02:05:51Z Author&#160;Landoll, Douglas J.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781439821497">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> The security risk assessment handbook a complete guide for performing security risk assessments ent://SD_ILS/0/SD_ILS:284790 2024-09-15T02:05:51Z 2024-09-15T02:05:51Z Author&#160;Landoll, Douglas J.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781420031232">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information security design, implementation, measurement, and compliance ent://SD_ILS/0/SD_ILS:288490 2024-09-15T02:05:51Z 2024-09-15T02:05:51Z Author&#160;Layton, Timothy P.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781420013412">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/>