Search Results for Risk assessment. - Narrowed by: Computer security. SirsiDynix Enterprise https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dRisk$002bassessment.$0026qf$003dSUBJECT$002509Subject$002509Computer$002bsecurity.$002509Computer$002bsecurity.$0026pe$003dd$00253A$0026ps$003d300?dt=list 2024-12-28T19:39:33Z The security risk assessment handbook a complete guide for performing security risk assessments ent://SD_ILS/0/SD_ILS:288890 2024-12-28T19:39:33Z 2024-12-28T19:39:33Z Author&#160;Landoll, Douglas J.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781439821497">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> The security risk assessment handbook a complete guide for performing security risk assessments ent://SD_ILS/0/SD_ILS:284790 2024-12-28T19:39:33Z 2024-12-28T19:39:33Z Author&#160;Landoll, Douglas J.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781420031232">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Resilience, Security &amp; Risk in Transport ent://SD_ILS/0/SD_ILS:509892 2024-12-28T19:39:33Z 2024-12-28T19:39:33Z Author&#160;IET, ed.<br/>Preferred Shelf Number&#160;XX(509892.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1049/PERRSR3E">http://dx.doi.org/10.1049/PERRSR3E</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cybersecurity for industrial control systems SCADA, DCS, PLC, HMI, and SIS ent://SD_ILS/0/SD_ILS:286140 2024-12-28T19:39:33Z 2024-12-28T19:39:33Z Author&#160;Macaulay, Tyson.&#160;Singer, Bryan.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781439801987">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Risk analysis and security countermeasure selection ent://SD_ILS/0/SD_ILS:288785 2024-12-28T19:39:33Z 2024-12-28T19:39:33Z Author&#160;Norman, Thomas L.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781420078718">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information security risk analysis ent://SD_ILS/0/SD_ILS:288856 2024-12-28T19:39:33Z 2024-12-28T19:39:33Z Author&#160;Peltier, Thomas R.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781439839577">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security software development assessing and managing security risks ent://SD_ILS/0/SD_ILS:286016 2024-12-28T19:39:33Z 2024-12-28T19:39:33Z Author&#160;Ashbaugh, Douglas A.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781420063813">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information security design, implementation, measurement, and compliance ent://SD_ILS/0/SD_ILS:288490 2024-12-28T19:39:33Z 2024-12-28T19:39:33Z Author&#160;Layton, Timothy P.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781420013412">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information security risk analysis ent://SD_ILS/0/SD_ILS:284764 2024-12-28T19:39:33Z 2024-12-28T19:39:33Z Author&#160;Peltier, Thomas R.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781420031195">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Assessing and managing security risk in IT systems a structured methodology ent://SD_ILS/0/SD_ILS:285488 2024-12-28T19:39:33Z 2024-12-28T19:39:33Z Author&#160;McCumber, John, 1956-<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9780203490426">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/>