Search Results for Strategy - Narrowed by: Computer security.SirsiDynix Enterprisehttps://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dStrategy$0026qf$003dSUBJECT$002509Subject$002509Computer$002bsecurity.$002509Computer$002bsecurity.$0026ps$003d300?dt=list2024-11-28T18:55:10ZModern Data Strategyent://SD_ILS/0/SD_ILS:4017922024-11-28T18:55:10Z2024-11-28T18:55:10ZAuthor Fleckenstein, Mike. author. Fellows, Lorraine. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-68993-7">https://doi.org/10.1007/978-3-319-68993-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Security strategy from requirements to realityent://SD_ILS/0/SD_ILS:2888512024-11-28T18:55:10Z2024-11-28T18:55:10ZAuthor Stackpole, Bill. Oksendahl, Eric.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781439827345">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Network security and its impact on business strategyent://SD_ILS/0/SD_ILS:4822132024-11-28T18:55:10Z2024-11-28T18:55:10ZAuthor Oncioiu, Ionica, 1972- editor. IGI Global, publisher.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-8455-1">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-8455-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>