Search Results for Risk analysis - Narrowed by: Computer security. SirsiDynix Enterprise https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dRisk$002banalysis$0026qf$003dSUBJECT$002509Subject$002509Computer$002bsecurity.$002509Computer$002bsecurity.$0026ic$003dtrue$0026ps$003d300? 2025-12-26T10:09:21Z Information security risk analysis ent://SD_ILS/0/SD_ILS:538713 2025-12-26T10:09:21Z 2025-12-26T10:09:21Z Author&#160;Peltier, Thomas R., author.<br/>Preferred Shelf Number&#160;QA76.9 .A25 P429 2010<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781439839577">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> Information security risk analysis ent://SD_ILS/0/SD_ILS:544821 2025-12-26T10:09:21Z 2025-12-26T10:09:21Z Author&#160;Peltier, Thomas R., author.<br/>Preferred Shelf Number&#160;QA76.9 .A25 P429 2005<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781420031195">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> Risk analysis and security countermeasure selection ent://SD_ILS/0/SD_ILS:539402 2025-12-26T10:09:21Z 2025-12-26T10:09:21Z Author&#160;Norman, Thomas L., author.<br/>Preferred Shelf Number&#160;HV8290 .N67 2010<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781420078718">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> Handbook of system safety and security : cyber risk and risk management, cyber security, threat analysis, functional safety, software systems, and cyber physical systems ent://SD_ILS/0/SD_ILS:459145 2025-12-26T10:09:21Z 2025-12-26T10:09:21Z Author&#160;Griffor, Edward R., editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128037737">http://www.sciencedirect.com/science/book/9780128037737</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information security fundamentals ent://SD_ILS/0/SD_ILS:539922 2025-12-26T10:09:21Z 2025-12-26T10:09:21Z Author&#160;Peltier, Thomas R.<br/>Preferred Shelf Number&#160;QA76.9 .A25<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9780429130281">Taylor & Francis eBooks</a> Taylor & Francis <a href="https://www.taylorfrancis.com/books/9780429130281">https://www.taylorfrancis.com/books/9780429130281</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> The security risk assessment handbook : a complete guide for performing security risk assessments ent://SD_ILS/0/SD_ILS:539743 2025-12-26T10:09:21Z 2025-12-26T10:09:21Z Author&#160;Landoll, Douglas J., author.<br/>Preferred Shelf Number&#160;HF5548.37 .L358 2011<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781439821497">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> Information security : design, implementation, measurement, and compliance ent://SD_ILS/0/SD_ILS:545839 2025-12-26T10:09:21Z 2025-12-26T10:09:21Z Author&#160;Layton, Timothy P., author.<br/>Preferred Shelf Number&#160;HF5548.37 .L393 2007<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781420013412">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> The security risk assessment handbook : a complete guide for performing security risk assessments ent://SD_ILS/0/SD_ILS:545167 2025-12-26T10:09:21Z 2025-12-26T10:09:21Z Author&#160;Landoll, Douglas J., author.<br/>Preferred Shelf Number&#160;HF5548.37 .L358 2006<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781420031232">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> Assessing and managing security risk in IT systems : a structured methodology ent://SD_ILS/0/SD_ILS:542250 2025-12-26T10:09:21Z 2025-12-26T10:09:21Z Author&#160;McCumber, John, 1956, author.<br/>Preferred Shelf Number&#160;QA76.9 .A25 M4284 2005<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781135488970">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> Information security fundamentals ent://SD_ILS/0/SD_ILS:545226 2025-12-26T10:09:21Z 2025-12-26T10:09:21Z Author&#160;Peltier, Thomas R., author.&#160;Peltier, Justin.&#160;Blackley, John A.<br/>Preferred Shelf Number&#160;QA76.9 .A25 P427 2005<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781135493738">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> A practical guide to security assessments ent://SD_ILS/0/SD_ILS:545277 2025-12-26T10:09:21Z 2025-12-26T10:09:21Z Author&#160;Kairab, Sudhanshu., author.<br/>Preferred Shelf Number&#160;HF5548.32 .K345 2005<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781135500313">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/>