Search Results for Risk Management. - Narrowed by: Computer security. SirsiDynix Enterprise https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dRisk$002bManagement.$0026qf$003dSUBJECT$002509Subject$002509Computer$002bsecurity.$002509Computer$002bsecurity.$0026ic$003dtrue$0026te$003dILS$0026ps$003d300? 2024-11-11T16:23:06Z Data protection governance, risk management, and compliance ent://SD_ILS/0/SD_ILS:289700 2024-11-11T16:23:06Z 2024-11-11T16:23:06Z Author&#160;Hill, David G. (David Gary), 1943-<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781439806937">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Handbook of system safety and security : cyber risk and risk management, cyber security, threat analysis, functional safety, software systems, and cyber physical systems ent://SD_ILS/0/SD_ILS:459145 2024-11-11T16:23:06Z 2024-11-11T16:23:06Z Author&#160;Griffor, Edward R., editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128037737">http://www.sciencedirect.com/science/book/9780128037737</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security de-engineering solving the problems in information risk management ent://SD_ILS/0/SD_ILS:286209 2024-11-11T16:23:06Z 2024-11-11T16:23:06Z Author&#160;Tibble, Ian.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781439868355">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information technology risk management in enterprise environments a review of industry practices and a practical guide to risk management teams ent://SD_ILS/0/SD_ILS:297862 2024-11-11T16:23:06Z 2024-11-11T16:23:06Z Author&#160;Kouns, Jake.&#160;Minoli, Daniel, 1952-&#160;Wiley InterScience (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;John Wiley <a href="http://dx.doi.org/10.1002/9780470558133">http://dx.doi.org/10.1002/9780470558133</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Oracle identity management governance, risk, and compliance architecture ent://SD_ILS/0/SD_ILS:287794 2024-11-11T16:23:06Z 2024-11-11T16:23:06Z Author&#160;Pohlman, Marlin B.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781420072488">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Measuring and managing information risk : a FAIR approach ent://SD_ILS/0/SD_ILS:355576 2024-11-11T16:23:06Z 2024-11-11T16:23:06Z Author&#160;Freund, Jack, author.&#160;Jones, Jack, author.<br/>Preferred Shelf Number&#160;ONLINE(355576.1)<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780124202313">http://www.sciencedirect.com/science/book/9780124202313</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Adaptive security management architecture ent://SD_ILS/0/SD_ILS:288451 2024-11-11T16:23:06Z 2024-11-11T16:23:06Z Author&#160;Tiller, James S.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781420013375">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> The security risk assessment handbook a complete guide for performing security risk assessments ent://SD_ILS/0/SD_ILS:288890 2024-11-11T16:23:06Z 2024-11-11T16:23:06Z Author&#160;Landoll, Douglas J.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781439821497">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Vulnerability management ent://SD_ILS/0/SD_ILS:287895 2024-11-11T16:23:06Z 2024-11-11T16:23:06Z Author&#160;Foreman, Park.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781439801512">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security software development assessing and managing security risks ent://SD_ILS/0/SD_ILS:286016 2024-11-11T16:23:06Z 2024-11-11T16:23:06Z Author&#160;Ashbaugh, Douglas A.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781420063813">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security convergence managing enterprise security risk ent://SD_ILS/0/SD_ILS:112198 2024-11-11T16:23:06Z 2024-11-11T16:23:06Z Author&#160;Tyson, Dave.&#160;ScienceDirect (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780750684255">An electronic book accessible through the World Wide Web; click for information</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security convergence managing enterprise security risk ent://SD_ILS/0/SD_ILS:149080 2024-11-11T16:23:06Z 2024-11-11T16:23:06Z Author&#160;Tyson, Dave.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;Volltext <a href="http://www.sciencedirect.com/science/book/9780750684255">http://www.sciencedirect.com/science/book/9780750684255</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/>