Search Results for Strategic Planning - Narrowed by: Computer security.
SirsiDynix Enterprise
https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dStrategic$002bPlanning$0026qf$003dSUBJECT$002509Subject$002509Computer$002bsecurity.$002509Computer$002bsecurity.$0026ps$003d300$0026isd$003dtrue?
2026-02-27T01:28:27Z
The cybersecurity guide to governance, risk, and compliance
ent://SD_ILS/0/SD_ILS:598945
2026-02-27T01:28:27Z
2026-02-27T01:28:27Z
Author Edwards, Jason (Cybersecurity expert), author. Weaver, Griffin, author.<br/>Preferred Shelf Number HD30.38 .E34 2024<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394250226">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394250226</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Strategic cyber security management
ent://SD_ILS/0/SD_ILS:550021
2026-02-27T01:28:27Z
2026-02-27T01:28:27Z
Author Trim, Peter R. J., author. Lee, Yang-Im, author.<br/>Preferred Shelf Number HF5548.37<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003244295">https://www.taylorfrancis.com/books/9781003244295</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cybertax : managing the risks and results
ent://SD_ILS/0/SD_ILS:567628
2026-02-27T01:28:27Z
2026-02-27T01:28:27Z
Author Tsantes, George K., author. Ransome, James F., author.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003330103">https://www.taylorfrancis.com/books/9781003330103</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Vulnerability management
ent://SD_ILS/0/SD_ILS:545698
2026-02-27T01:28:27Z
2026-02-27T01:28:27Z
Author Foreman, Park., author.<br/>Preferred Shelf Number QA76.9 .A25 F656 2010<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781439801512">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>
Insider computer fraud : an in-depth framework for detecting and defending against insider IT attacks
ent://SD_ILS/0/SD_ILS:544396
2026-02-27T01:28:27Z
2026-02-27T01:28:27Z
Author Brancik, Kenneth C., author.<br/>Preferred Shelf Number QA76.9 .A25 B725 2008<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781420046601">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>
Information security a strategic approach
ent://SD_ILS/0/SD_ILS:249831
2026-02-27T01:28:27Z
2026-02-27T01:28:27Z
Author LeVeque, Vincent.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access IEEE Xplore <a href="http://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=5989138">http://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=5989138</a>
IEEE Xplore <a href="http://ieeexplore.ieee.org/servlet/opac?bknumber=5989138">http://ieeexplore.ieee.org/servlet/opac?bknumber=5989138</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>