Search Results for Security -- Technology. - Narrowed by: Computer security.SirsiDynix Enterprisehttps://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dSecurity$002b--$002bTechnology.$0026qf$003dSUBJECT$002509Subject$002509Computer$002bsecurity.$002509Computer$002bsecurity.$0026ps$003d300?2025-12-29T15:13:12ZCyber Security: Power and Technologyent://SD_ILS/0/SD_ILS:4010032025-12-29T15:13:12Z2025-12-29T15:13:12ZAuthor Lehto, Martti. editor. Neittaanmäki, Pekka. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-75307-2">https://doi.org/10.1007/978-3-319-75307-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Enhancing computer security with smart technologyent://SD_ILS/0/SD_ILS:5448232025-12-29T15:13:12Z2025-12-29T15:13:12ZAuthor Vemuri, V. Rao.<br/>Preferred Shelf Number TK5105.59 .E62 2005<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781420031225">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>Innovative Security Solutions for Information Technology and Communications 11th International Conference, SecITC 2018, Bucharest, Romania, November 8–9, 2018, Revised Selected Papersent://SD_ILS/0/SD_ILS:4863522025-12-29T15:13:12Z2025-12-29T15:13:12ZAuthor Lanet, Jean-Louis. editor. (orcid)0000-0002-4751-3941 Toma, Cristian. editor. (orcid)0000-0001-9316-7739 SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-12942-2">https://doi.org/10.1007/978-3-030-12942-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Information and Operational Technology Security Systems First International Workshop, IOSec 2018, CIPSEC Project, Heraklion, Crete, Greece, September 13, 2018, Revised Selected Papersent://SD_ILS/0/SD_ILS:4869442025-12-29T15:13:12Z2025-12-29T15:13:12ZAuthor Fournaris, Apostolos P. editor. (orcid)0000-0002-4758-2349 Lampropoulos, Konstantinos. editor. Marín Tordera, Eva. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-12085-6">https://doi.org/10.1007/978-3-030-12085-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Women in Security Changing the Face of Technology and Innovationent://SD_ILS/0/SD_ILS:4022742025-12-29T15:13:12Z2025-12-29T15:13:12ZAuthor Christofferson, Debra A. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-57795-1">https://doi.org/10.1007/978-3-319-57795-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Global cyber security labor shortage and international business riskent://SD_ILS/0/SD_ILS:4818102025-12-29T15:13:12Z2025-12-29T15:13:12ZAuthor Christiansen, Bryan, 1960- editor. Piekarz, Agnieszka, 1990- editor. IGI Global, publisher.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-5927-6">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-5927-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>SECURITY STRATEGY : from requirements to reality.ent://SD_ILS/0/SD_ILS:5450982025-12-29T15:13:12Z2025-12-29T15:13:12ZAuthor STACKPOLE, BILL.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9780429152160">Taylor & Francis eBooks</a>
Taylor & Francis <a href="https://www.taylorfrancis.com/books/9780429152160">https://www.taylorfrancis.com/books/9780429152160</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Information security science : measuring the vulnerability to data compromisesent://SD_ILS/0/SD_ILS:4589682025-12-29T15:13:12Z2025-12-29T15:13:12ZAuthor Young, Carl S., author.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128096437">http://www.sciencedirect.com/science/book/9780128096437</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Collaboration with cloud computing : security, social media, and unified communicationsent://SD_ILS/0/SD_ILS:3558292025-12-29T15:13:12Z2025-12-29T15:13:12ZAuthor Messier, Ric, author.<br/>Preferred Shelf Number ONLINE(355829.1)<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780124170407">http://www.sciencedirect.com/science/book/9780124170407</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>What every engineer should know about cyber security and digital forensicsent://SD_ILS/0/SD_ILS:5397262025-12-29T15:13:12Z2025-12-29T15:13:12ZAuthor DeFranco, Joanna F., author.<br/>Preferred Shelf Number TK5105.59 .D44 2014<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781466564541">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>Security without obscurity : a guide to confidentiality, authentication, and integrityent://SD_ILS/0/SD_ILS:5441182025-12-29T15:13:12Z2025-12-29T15:13:12ZAuthor Stapleton, Jeffrey James, author.<br/>Preferred Shelf Number QA76.9 .A25 S734 2014<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781466592155">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>Reliability and availability of cloud computingent://SD_ILS/0/SD_ILS:2493832025-12-29T15:13:12Z2025-12-29T15:13:12ZAuthor Bauer, Eric. Adams, Randee. Wiley InterScience (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access IEEE Xplore <a href="http://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=6266788">http://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=6266788</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Engineering information security the application of systems engineering concepts to achieve information assuranceent://SD_ILS/0/SD_ILS:2499162025-12-29T15:13:12Z2025-12-29T15:13:12ZAuthor Jacobs, Stuart.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access IEEE Xplore <a href="http://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=6047604">http://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=6047604</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Hacking exposed wireless wireless security secrets & solutionsent://SD_ILS/0/SD_ILS:2933002025-12-29T15:13:12Z2025-12-29T15:13:12ZAuthor Cache, Johnny. Wright, Joshua. Liu, Vincent.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://mhebooklibrary.com/reader/hacking-exposed-wireless-second-edition">Subscription required</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>The basics of information security understanding the fundamentals of InfoSec in theory and practiceent://SD_ILS/0/SD_ILS:1453712025-12-29T15:13:12Z2025-12-29T15:13:12ZAuthor Andress, Jason.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597496537">http://www.sciencedirect.com/science/book/9781597496537</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Security patch managementent://SD_ILS/0/SD_ILS:5427632025-12-29T15:13:12Z2025-12-29T15:13:12ZAuthor Nicastro, Felicia M., author.<br/>Preferred Shelf Number QA76.9 .A25 N53 2011<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781439825006">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>Security de-engineering : solving the problems in information risk managementent://SD_ILS/0/SD_ILS:5456082025-12-29T15:13:12Z2025-12-29T15:13:12ZAuthor Tibble, Ian., author.<br/>Preferred Shelf Number HF5548.37 .T53 2011<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781439868355">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>Information technology risk management in enterprise environments a review of industry practices and a practical guide to risk management teamsent://SD_ILS/0/SD_ILS:2978622025-12-29T15:13:12Z2025-12-29T15:13:12ZAuthor Kouns, Jake. Minoli, Daniel, 1952- Wiley InterScience (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access John Wiley <a href="http://dx.doi.org/10.1002/9780470558133">http://dx.doi.org/10.1002/9780470558133</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>The executive MBA in information securityent://SD_ILS/0/SD_ILS:5399482025-12-29T15:13:12Z2025-12-29T15:13:12ZAuthor Trinckes, John J., author.<br/>Preferred Shelf Number HF5548.37 .T75 2010<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781439810088">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>Vulnerability managementent://SD_ILS/0/SD_ILS:5456982025-12-29T15:13:12Z2025-12-29T15:13:12ZAuthor Foreman, Park., author.<br/>Preferred Shelf Number QA76.9 .A25 F656 2010<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781439801512">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>Data protection : governance, risk management, and complianceent://SD_ILS/0/SD_ILS:5439182025-12-29T15:13:12Z2025-12-29T15:13:12ZAuthor Hill, David G. (David Gary), 1943, author.<br/>Preferred Shelf Number QA76.9 .A25 H52 2009<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781439806937">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>CISO soft skills : securing organizations impaired by employee politics, apathy, and intolerant perspectivesent://SD_ILS/0/SD_ILS:5441532025-12-29T15:13:12Z2025-12-29T15:13:12ZAuthor Collette, Ronald D., author. Gentile, Michael. Gentile, Skye.<br/>Preferred Shelf Number HF5548.37 .G462 2009<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781420089110">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>Information security management metrics : a definitive guide to effective security monitoring and measurementent://SD_ILS/0/SD_ILS:5469522025-12-29T15:13:12Z2025-12-29T15:13:12ZAuthor Brotby, W. Krag., author.<br/>Preferred Shelf Number HD30.2 .B78 2009<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781420052862">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>Insider computer fraud : an in-depth framework for detecting and defending against insider IT attacksent://SD_ILS/0/SD_ILS:5443962025-12-29T15:13:12Z2025-12-29T15:13:12ZAuthor Brancik, Kenneth C., author.<br/>Preferred Shelf Number QA76.9 .A25 B725 2008<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781420046601">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>A practical guide to security assessmentsent://SD_ILS/0/SD_ILS:5452772025-12-29T15:13:12Z2025-12-29T15:13:12ZAuthor Kairab, Sudhanshu., author.<br/>Preferred Shelf Number HF5548.32 .K345 2005<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781135500313">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>Security assessment case studies for implementing the NSA IAMent://SD_ILS/0/SD_ILS:2540302025-12-29T15:13:12Z2025-12-29T15:13:12ZAuthor Rogers, Russ.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781932266962">http://www.sciencedirect.com/science/book/9781932266962</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Information security policies, procedures, and standards : guidelines for effective information security managementent://SD_ILS/0/SD_ILS:5468172025-12-29T15:13:12Z2025-12-29T15:13:12ZAuthor Peltier, Thomas R., author.<br/>Preferred Shelf Number QA76.9 .A25 P46 2002<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9780849390326">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>Securing e-business applications and communicationsent://SD_ILS/0/SD_ILS:5458212025-12-29T15:13:12Z2025-12-29T15:13:12ZAuthor Held, Jonathan S., author. Bowers, John R.<br/>Preferred Shelf Number QA76.9 .A25 H435 2001<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781420031553">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>