Search Results for Risk Management. - Narrowed by: Data protection. SirsiDynix Enterprise https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dRisk$002bManagement.$0026qf$003dSUBJECT$002509Subject$002509Data$002bprotection.$002509Data$002bprotection.$0026ic$003dtrue$0026ps$003d300? 2026-05-11T07:20:18Z Practical risk management for the CIO ent://SD_ILS/0/SD_ILS:541595 2026-05-11T07:20:18Z 2026-05-11T07:20:18Z Author&#160;Scherling, Mark., author.<br/>Preferred Shelf Number&#160;HF5548.37 .S34 2011<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781439856543">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> Optimal spending on cybersecurity measures : risk management ent://SD_ILS/0/SD_ILS:586024 2026-05-11T07:20:18Z 2026-05-11T07:20:18Z Author&#160;Kissoon, Tara, author.<br/>Preferred Shelf Number&#160;HF5548.37<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003404354">https://www.taylorfrancis.com/books/9781003404354</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Optimal spending on cybersecurity measures : risk management ent://SD_ILS/0/SD_ILS:553885 2026-05-11T07:20:18Z 2026-05-11T07:20:18Z Author&#160;Kissoon, Tara, author.<br/>Preferred Shelf Number&#160;HF5548.37 .K57 2022<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003200895">https://www.taylorfrancis.com/books/9781003200895</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Data protection : governance, risk management, and compliance ent://SD_ILS/0/SD_ILS:543918 2026-05-11T07:20:18Z 2026-05-11T07:20:18Z Author&#160;Hill, David G. (David Gary), 1943, author.<br/>Preferred Shelf Number&#160;QA76.9 .A25 H52 2009<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781439806937">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> Optimal spending on cybersecurity measures : third party risk management ent://SD_ILS/0/SD_ILS:584312 2026-05-11T07:20:18Z 2026-05-11T07:20:18Z Author&#160;Kissoon, Tara, author.<br/>Preferred Shelf Number&#160;HF5548.37 .K57 2025 EB<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003587576">https://www.taylorfrancis.com/books/9781003587576</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Total information risk management maximizing the value of data and information assets ent://SD_ILS/0/SD_ILS:306693 2026-05-11T07:20:18Z 2026-05-11T07:20:18Z Author&#160;Borek, Alexander.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780124055476">http://www.sciencedirect.com/science/book/9780124055476</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security de-engineering : solving the problems in information risk management ent://SD_ILS/0/SD_ILS:545608 2026-05-11T07:20:18Z 2026-05-11T07:20:18Z Author&#160;Tibble, Ian., author.<br/>Preferred Shelf Number&#160;HF5548.37 .T53 2011<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781439868355">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> Information Security Risk Management Risikomanagement mit ISO/IEC 27001, 27005 und 31010 ent://SD_ILS/0/SD_ILS:199932 2026-05-11T07:20:18Z 2026-05-11T07:20:18Z Author&#160;Klipper, Sebastian. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-8348-9870-8">http://dx.doi.org/10.1007/978-3-8348-9870-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information technology risk management in enterprise environments a review of industry practices and a practical guide to risk management teams ent://SD_ILS/0/SD_ILS:297862 2026-05-11T07:20:18Z 2026-05-11T07:20:18Z Author&#160;Kouns, Jake.&#160;Minoli, Daniel, 1952-&#160;Wiley InterScience (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;John Wiley <a href="http://dx.doi.org/10.1002/9780470558133">http://dx.doi.org/10.1002/9780470558133</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> The cybersecurity control playbook : from fundamentals to advanced strategies ent://SD_ILS/0/SD_ILS:599789 2026-05-11T07:20:18Z 2026-05-11T07:20:18Z Author&#160;Edwards, Jason (Cybersecurity expert), author.&#160;John Wiley &amp; Sons, publisher.<br/>Preferred Shelf Number&#160;QA76.9 .A25 E3884 2025<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394331888">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394331888</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Human Aspects of Information Security and Assurance 18th IFIP WG 11.12 International Symposium, HAISA 2024, Sk&ouml;vde, Sweden, July 9-11, 2024, Proceedings, Part I ent://SD_ILS/0/SD_ILS:606216 2026-05-11T07:20:18Z 2026-05-11T07:20:18Z Author&#160;Clarke, Nathan. editor. (orcid)0000-0002-3595-3800&#160;Furnell, Steven. editor. (orcid)0000-0003-0984-7542&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-72559-3">https://doi.org/10.1007/978-3-031-72559-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Human Aspects of Information Security and Assurance 18th IFIP WG 11.12 International Symposium, HAISA 2024, Sk&ouml;vde, Sweden, July 9-11, 2024, Proceedings, Part II ent://SD_ILS/0/SD_ILS:606217 2026-05-11T07:20:18Z 2026-05-11T07:20:18Z Author&#160;Clarke, Nathan. editor. (orcid)0000-0002-3595-3800&#160;Furnell, Steven. editor. (orcid)0000-0003-0984-7542&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-72563-0">https://doi.org/10.1007/978-3-031-72563-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cyber Resilience: Applied Perspectives ent://SD_ILS/0/SD_ILS:609353 2026-05-11T07:20:18Z 2026-05-11T07:20:18Z Author&#160;Linkov, Igor. editor.&#160;Kott, Alexander. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-90109-6">https://doi.org/10.1007/978-3-031-90109-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Risks and Security of Internet and Systems 19th International Conference, CRiSIS 2024, Aix-en-Provence, France, November 26-28, 2024, Proceedings ent://SD_ILS/0/SD_ILS:608228 2026-05-11T07:20:18Z 2026-05-11T07:20:18Z Author&#160;Collart-Dutilleul, Simon. editor. (orcid)0000-0003-4292-6584&#160;Ouchani, Samir. editor. (orcid)0000-0002-7997-8225&#160;Cuppens, Nora. editor. (orcid)0000-0001-8792-0413&#160;Cuppens, Fr&eacute;d&eacute;ric. editor. (orcid)0000-0003-1124-2200&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-89350-6">https://doi.org/10.1007/978-3-031-89350-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Research Challenges in Information Science 19th International Conference, RCIS 2025, Seville, Spain, May 20-23, 2025, Proceedings, Part II ent://SD_ILS/0/SD_ILS:608494 2026-05-11T07:20:18Z 2026-05-11T07:20:18Z Author&#160;Grabis, J&#257;nis. editor. (orcid)0000-0003-2196-0214&#160;Vos, Tanja E. J. editor. (orcid)0000-0002-6003-9113&#160;Escalona, Maria Jos&eacute;. editor. (orcid)0000-0002-6435-1497&#160;Pastor, Oscar. editor. (orcid)0000-0002-1320-8471&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-92471-2">https://doi.org/10.1007/978-3-031-92471-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Research Challenges in Information Science 19th International Conference, RCIS 2025, Seville, Spain, May 20-23, 2025, Proceedings, Part I ent://SD_ILS/0/SD_ILS:608495 2026-05-11T07:20:18Z 2026-05-11T07:20:18Z Author&#160;Grabis, J&#257;nis. editor. (orcid)0000-0003-2196-0214&#160;Vos, Tanja E. J. editor. (orcid)0000-0002-6003-9113&#160;Escalona, Maria Jos&eacute;. editor. (orcid)0000-0002-6435-1497&#160;Pastor, Oscar. editor. (orcid)0000-0002-1320-8471&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-92474-3">https://doi.org/10.1007/978-3-031-92474-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Optimal spending on cybersecurity measures : digital privacy and data protection ent://SD_ILS/0/SD_ILS:572623 2026-05-11T07:20:18Z 2026-05-11T07:20:18Z Author&#160;Kissoon, Tara, author.<br/>Preferred Shelf Number&#160;HF5548.37<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003507109">https://www.taylorfrancis.com/books/9781003507109</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Optimal spending on cybersecurity measures : AI and governance ent://SD_ILS/0/SD_ILS:584311 2026-05-11T07:20:18Z 2026-05-11T07:20:18Z Author&#160;Kissoon, Tara, author.<br/>Preferred Shelf Number&#160;HF5548.37 .K57 2025 EB<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003587569">https://www.taylorfrancis.com/books/9781003587569</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Optimum spending on cybersecurity measures : digital privacy and data protection ent://SD_ILS/0/SD_ILS:574605 2026-05-11T07:20:18Z 2026-05-11T07:20:18Z Author&#160;Kissoon, Tara, author.<br/>Preferred Shelf Number&#160;HF5548.37<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003497523">https://www.taylorfrancis.com/books/9781003497523</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cybersecurity Awareness ent://SD_ILS/0/SD_ILS:606958 2026-05-11T07:20:18Z 2026-05-11T07:20:18Z Author&#160;Pils, Martin. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-658-46683-1">https://doi.org/10.1007/978-3-658-46683-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> The AI Act and The Agile Safety Plan ent://SD_ILS/0/SD_ILS:607067 2026-05-11T07:20:18Z 2026-05-11T07:20:18Z Author&#160;Myklebust, Thor. author. (orcid)0000-0002-9283-092X&#160;St&aring;lhane, Tor. author.&#160;Vatn, Dorthea Mathilde Kristin. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-80504-2">https://doi.org/10.1007/978-3-031-80504-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Bring Your Own Device Security Policy Compliance Framework ent://SD_ILS/0/SD_ILS:607863 2026-05-11T07:20:18Z 2026-05-11T07:20:18Z Author&#160;Palanisamy, Rathika. author. (orcid)0000-0001-6495-1081&#160;Norman, Azah Anir. author.&#160;Kiah, Miss Laiha Mat. author.&#160;Herawan, Tutut. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-86801-6">https://doi.org/10.1007/978-3-031-86801-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cyber Resilience Fundamentals ent://SD_ILS/0/SD_ILS:602876 2026-05-11T07:20:18Z 2026-05-11T07:20:18Z Author&#160;Tjoa, Simon. author.&#160;Gafi&#263;, Melisa. author.&#160;Kieseberg, Peter. author. (orcid)0000-0002-2847-2152&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-52064-8">https://doi.org/10.1007/978-3-031-52064-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cyber Security Intelligence and Analytics The 5th International Conference on Cyber Security Intelligence and Analytics (CSIA 2023), Volume 2 ent://SD_ILS/0/SD_ILS:526849 2026-05-11T07:20:18Z 2026-05-11T07:20:18Z Author&#160;Xu, Zheng. editor.&#160;Alrabaee, Saed. editor.&#160;Loyola-Gonz&aacute;lez, Octavio. editor.&#160;Cahyani, Niken Dwi Wahyu. editor.&#160;Ab Rahman, Nurul Hidayah. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-31775-0">https://doi.org/10.1007/978-3-031-31775-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Executive's guide to cyber risk : securing the future today ent://SD_ILS/0/SD_ILS:597567 2026-05-11T07:20:18Z 2026-05-11T07:20:18Z Author&#160;Moyo, Siegfried, author.<br/>Preferred Shelf Number&#160;HF5548.37 .M68 2022<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394320578">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394320578</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Privacy, regulations, and cybersecurity : the essential business guide ent://SD_ILS/0/SD_ILS:596472 2026-05-11T07:20:18Z 2026-05-11T07:20:18Z Author&#160;Moschovitis, Christos J. P., author.<br/>Preferred Shelf Number&#160;HD61.5 .M675 2021 EB<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119660156">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119660156</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cyber intelligence-driven risk : how to build and use cyber intelligence for business risk decisions ent://SD_ILS/0/SD_ILS:596265 2026-05-11T07:20:18Z 2026-05-11T07:20:18Z Author&#160;Moore, Richard O., III, 1971- author.<br/>Preferred Shelf Number&#160;HD61.5 .M66 2021<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119676942">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119676942</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> The security risk assessment handbook : a complete guide for performing security risk assessments ent://SD_ILS/0/SD_ILS:549829 2026-05-11T07:20:18Z 2026-05-11T07:20:18Z Author&#160;Landoll, Douglas J., author.<br/>Preferred Shelf Number&#160;HF5548.37 .L358 2021 EB<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003090441">https://www.taylorfrancis.com/books/9781003090441</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Tribe of hackers : cybersecurity advice from the best hackers in the world ent://SD_ILS/0/SD_ILS:595418 2026-05-11T07:20:18Z 2026-05-11T07:20:18Z Author&#160;Carey, Marcus J. (Cybersecurity professional), author.&#160;Jin, Jennifer, author.<br/>Preferred Shelf Number&#160;QA76.9 .A25 C37 2019 EB<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119643395">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119643395</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Resilience and Risk Methods and Application in Environment, Cyber and Social Domains ent://SD_ILS/0/SD_ILS:612480 2026-05-11T07:20:18Z 2026-05-11T07:20:18Z Author&#160;Linkov, Igor. editor. (orcid)0000-0002-0823-8107&#160;Palma-Oliveira, Jos&eacute; Manuel. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-94-024-1123-2">https://doi.org/10.1007/978-94-024-1123-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Privacy Technologies and Policy 5th Annual Privacy Forum, APF 2017, Vienna, Austria, June 7-8, 2017, Revised Selected Papers ent://SD_ILS/0/SD_ILS:613645 2026-05-11T07:20:18Z 2026-05-11T07:20:18Z Author&#160;Schweighofer, Erich. editor.&#160;Leitold, Herbert. editor.&#160;Mitrakas, Andreas. editor.&#160;Rannenberg, Kai. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-67280-9">https://doi.org/10.1007/978-3-319-67280-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information security fundamentals ent://SD_ILS/0/SD_ILS:539922 2026-05-11T07:20:18Z 2026-05-11T07:20:18Z Author&#160;Peltier, Thomas R.<br/>Preferred Shelf Number&#160;QA76.9 .A25<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9780429130281">Taylor & Francis eBooks</a> Taylor & Francis <a href="https://www.taylorfrancis.com/books/9780429130281">https://www.taylorfrancis.com/books/9780429130281</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security and Trust Management 13th International Workshop, STM 2017, Oslo, Norway, September 14-15, 2017, Proceedings ent://SD_ILS/0/SD_ILS:616653 2026-05-11T07:20:18Z 2026-05-11T07:20:18Z Author&#160;Livraga, Giovanni. editor.&#160;Mitchell, Chris. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-68063-7">https://doi.org/10.1007/978-3-319-68063-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> ICT Systems Security and Privacy Protection 32nd IFIP TC 11 International Conference, SEC 2017, Rome, Italy, May 29-31, 2017, Proceedings ent://SD_ILS/0/SD_ILS:611573 2026-05-11T07:20:18Z 2026-05-11T07:20:18Z Author&#160;De Capitani di Vimercati, Sabrina. editor. (orcid)0000-0003-0793-3551&#160;Martinelli, Fabio. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-58469-0">https://doi.org/10.1007/978-3-319-58469-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cyber Security Cryptography and Machine Learning First International Conference, CSCML 2017, Beer-Sheva, Israel, June 29-30, 2017, Proceedings ent://SD_ILS/0/SD_ILS:613097 2026-05-11T07:20:18Z 2026-05-11T07:20:18Z Author&#160;Dolev, Shlomi. editor.&#160;Lodha, Sachin. editor. (orcid)0000-0001-5771-4977&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-60080-2">https://doi.org/10.1007/978-3-319-60080-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Risk Assessment and Risk-Driven Quality Assurance 4th International Workshop, RISK 2016, Held in Conjunction with ICTSS 2016, Graz, Austria, October 18, 2016, Revised Selected Papers ent://SD_ILS/0/SD_ILS:613620 2026-05-11T07:20:18Z 2026-05-11T07:20:18Z Author&#160;Gro&szlig;mann, J&uuml;rgen. editor.&#160;Felderer, Michael. editor.&#160;Seehusen, Fredrik. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-57858-3">https://doi.org/10.1007/978-3-319-57858-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Technology in Disaster Risk Reduction First IFIP TC 5 DCITDRR International Conference, ITDRR 2016, Sofia, Bulgaria, November 16-18, 2016, Revised Selected Papers ent://SD_ILS/0/SD_ILS:617657 2026-05-11T07:20:18Z 2026-05-11T07:20:18Z Author&#160;Murayama, Yuko. editor. (orcid)0000-0003-0414-1356&#160;Velev, Dimiter. editor.&#160;Zlateva, Plamena. editor.&#160;Gonzalez, Jose J. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-68486-4">https://doi.org/10.1007/978-3-319-68486-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Fundamentals of Secure System Modelling ent://SD_ILS/0/SD_ILS:617827 2026-05-11T07:20:18Z 2026-05-11T07:20:18Z Author&#160;Matulevi&#269;ius, Raimundas. author. (orcid)0000-0002-1829-4794&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-61717-6">https://doi.org/10.1007/978-3-319-61717-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Decision and Game Theory for Security 8th International Conference, GameSec 2017, Vienna, Austria, October 23-25, 2017, Proceedings ent://SD_ILS/0/SD_ILS:618258 2026-05-11T07:20:18Z 2026-05-11T07:20:18Z Author&#160;Rass, Stefan. editor.&#160;An, Bo. editor.&#160;Kiekintveld, Christopher. editor.&#160;Fang, Fei. editor.&#160;Schauer, Stefan. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-68711-7">https://doi.org/10.1007/978-3-319-68711-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cyber and Chemical, Biological, Radiological, Nuclear, Explosives Challenges Threats and Counter Efforts ent://SD_ILS/0/SD_ILS:613224 2026-05-11T07:20:18Z 2026-05-11T07:20:18Z Author&#160;Martellini, Maurizio. editor.&#160;Malizia, Andrea. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-62108-1">https://doi.org/10.1007/978-3-319-62108-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Risks and Security of Internet and Systems 10th International Conference, CRiSIS 2015, Mytilene, Lesbos Island, Greece, July 20-22, 2015, Revised Selected Papers ent://SD_ILS/0/SD_ILS:611128 2026-05-11T07:20:18Z 2026-05-11T07:20:18Z Author&#160;Lambrinoudakis, Costas. editor. (orcid)0000-0003-3101-5347&#160;Gabillon, Alban. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-31811-0">https://doi.org/10.1007/978-3-319-31811-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Secure IT Systems 21st Nordic Conference, NordSec 2016, Oulu, Finland, November 2-4, 2016. Proceedings ent://SD_ILS/0/SD_ILS:616019 2026-05-11T07:20:18Z 2026-05-11T07:20:18Z Author&#160;Brumley, Billy Bob. editor.&#160;R&ouml;ning, Juha. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-47560-8">https://doi.org/10.1007/978-3-319-47560-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Availability, Reliability, and Security in Information Systems IFIP WG 8.4, 8.9, TC 5 International Cross-Domain Conference, CD-ARES 2016, and Workshop on Privacy Aware Machine Learning for Health Data Science, PAML 2016, Salzburg, Austria, August 31 - September 2, 2016, Proceedings ent://SD_ILS/0/SD_ILS:618332 2026-05-11T07:20:18Z 2026-05-11T07:20:18Z Author&#160;Buccafurri, Francesco. editor. (orcid)0000-0003-0448-8464&#160;Holzinger, Andreas. editor.&#160;Kieseberg, Peter. editor.&#160;Tjoa, A Min. editor.&#160;Weippl, Edgar. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-45507-5">https://doi.org/10.1007/978-3-319-45507-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Data Privacy Management and Security Assurance 11th International Workshop, DPM 2016 and 5th International Workshop, QASA 2016, Heraklion, Crete, Greece, September 26-27, 2016, Proceedings ent://SD_ILS/0/SD_ILS:613262 2026-05-11T07:20:18Z 2026-05-11T07:20:18Z Author&#160;Livraga, Giovanni. editor.&#160;Torra, Vicen&ccedil;. editor.&#160;Aldini, Alessandro. editor. (orcid)0000-0002-7250-5011&#160;Martinelli, Fabio. editor.&#160;Suri, Neeraj. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-47072-6">https://doi.org/10.1007/978-3-319-47072-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information and Communications Security 18th International Conference, ICICS 2016, Singapore, Singapore, November 29 - December 2, 2016, Proceedings ent://SD_ILS/0/SD_ILS:616049 2026-05-11T07:20:18Z 2026-05-11T07:20:18Z Author&#160;Lam, Kwok-Yan. editor. (orcid)0000-0001-7479-7970&#160;Chi, Chi-Hung. editor.&#160;Qing, Sihan. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-50011-9">https://doi.org/10.1007/978-3-319-50011-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Measuring and managing information risk : a FAIR approach ent://SD_ILS/0/SD_ILS:355576 2026-05-11T07:20:18Z 2026-05-11T07:20:18Z Author&#160;Freund, Jack, author.&#160;Jones, Jack, author.<br/>Preferred Shelf Number&#160;ONLINE(355576.1)<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780124202313">http://www.sciencedirect.com/science/book/9780124202313</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Enterprise architecture and information assurance : developing a secure foundation ent://SD_ILS/0/SD_ILS:538768 2026-05-11T07:20:18Z 2026-05-11T07:20:18Z Author&#160;Scholz, James A., author.<br/>Preferred Shelf Number&#160;QA76.9 .D314 S34 2014<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781439841600">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> Responsive Security ent://SD_ILS/0/SD_ILS:542438 2026-05-11T07:20:18Z 2026-05-11T07:20:18Z Author&#160;Kang, Meng-Chow, author.<br/>Preferred Shelf Number&#160;HF5548.37<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781315145907">https://www.taylorfrancis.com/books/9781315145907</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> The security risk assessment handbook : a complete guide for performing security risk assessments ent://SD_ILS/0/SD_ILS:539743 2026-05-11T07:20:18Z 2026-05-11T07:20:18Z Author&#160;Landoll, Douglas J., author.<br/>Preferred Shelf Number&#160;HF5548.37 .L358 2011<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781439821497">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> Information security management metrics : a definitive guide to effective security monitoring and measurement ent://SD_ILS/0/SD_ILS:546952 2026-05-11T07:20:18Z 2026-05-11T07:20:18Z Author&#160;Brotby, W. Krag., author.<br/>Preferred Shelf Number&#160;HD30.2 .B78 2009<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781420052862">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> Information security : design, implementation, measurement, and compliance ent://SD_ILS/0/SD_ILS:545839 2026-05-11T07:20:18Z 2026-05-11T07:20:18Z Author&#160;Layton, Timothy P., author.<br/>Preferred Shelf Number&#160;HF5548.37 .L393 2007<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781420013412">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> The security risk assessment handbook : a complete guide for performing security risk assessments ent://SD_ILS/0/SD_ILS:545167 2026-05-11T07:20:18Z 2026-05-11T07:20:18Z Author&#160;Landoll, Douglas J., author.<br/>Preferred Shelf Number&#160;HF5548.37 .L358 2006<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781420031232">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> Information security fundamentals ent://SD_ILS/0/SD_ILS:545226 2026-05-11T07:20:18Z 2026-05-11T07:20:18Z Author&#160;Peltier, Thomas R., author.&#160;Peltier, Justin.&#160;Blackley, John A.<br/>Preferred Shelf Number&#160;QA76.9 .A25 P427 2005<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781135493738">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> Surviving security : how to integrate people, process, and technology ent://SD_ILS/0/SD_ILS:547266 2026-05-11T07:20:18Z 2026-05-11T07:20:18Z Author&#160;Andress, Amanda., author.<br/>Preferred Shelf Number&#160;QA76.9 .A25 A545 2003<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9780203501405">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/>