Search Results for TAYLOR - Narrowed by: Computer security. SirsiDynix Enterprise https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dTAYLOR$0026qf$003dSUBJECT$002509Subject$002509Computer$002bsecurity.$002509Computer$002bsecurity.$0026ps$003d300? 2024-12-14T06:52:34Z FISMA certification &amp; accreditation handbook ent://SD_ILS/0/SD_ILS:112169 2024-12-14T06:52:34Z 2024-12-14T06:52:34Z Author&#160;Taylor, Laura.&#160;Shepherd, Matthew.&#160;ScienceDirect (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491167">An electronic book accessible through the World Wide Web; click for information</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> FISMA certification &amp; accreditation handbook ent://SD_ILS/0/SD_ILS:145876 2024-12-14T06:52:34Z 2024-12-14T06:52:34Z Author&#160;Taylor, Laura.&#160;Shepherd, Matthew.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491167">http://www.sciencedirect.com/science/book/9781597491167</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Handbook of Software Engineering ent://SD_ILS/0/SD_ILS:484024 2024-12-14T06:52:34Z 2024-12-14T06:52:34Z Author&#160;Cha, Sungdeok. editor.&#160;Taylor, Richard N. editor.&#160;Kang, Kyochul. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-00262-6">https://doi.org/10.1007/978-3-030-00262-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Deep Learning in Medical Image Analysis and Multimodal Learning for Clinical Decision Support 4th International Workshop, DLMIA 2018, and 8th International Workshop, ML-CDS 2018, Held in Conjunction with MICCAI 2018, Granada, Spain, September 20, 2018, Proceedings ent://SD_ILS/0/SD_ILS:400575 2024-12-14T06:52:34Z 2024-12-14T06:52:34Z Author&#160;Stoyanov, Danail. editor.&#160;Taylor, Zeike. editor.&#160;Carneiro, Gustavo. editor. (orcid)0000-0002-5571-6220&#160;Syeda-Mahmood, Tanveer. editor.&#160;Martel, Anne. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-00889-5">https://doi.org/10.1007/978-3-030-00889-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Introduction to modern cryptography ent://SD_ILS/0/SD_ILS:364315 2024-12-14T06:52:34Z 2024-12-14T06:52:34Z Author&#160;Katz, Jonathan, 1974-&#160;Lindell, Yehuda.<br/>Preferred Shelf Number&#160;QA76.9.A25 K36 2015<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~2<br/> Secret history : the story of cryptology ent://SD_ILS/0/SD_ILS:365258 2024-12-14T06:52:34Z 2024-12-14T06:52:34Z Author&#160;Bauer, Craig P.<br/>Preferred Shelf Number&#160;QA76.9.A25 B384 2013<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Machine learning forensics for law enforcement, security, and intelligence ent://SD_ILS/0/SD_ILS:285221 2024-12-14T06:52:34Z 2024-12-14T06:52:34Z Author&#160;Mena, Jesus.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781439860700">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security strategy from requirements to reality ent://SD_ILS/0/SD_ILS:288851 2024-12-14T06:52:34Z 2024-12-14T06:52:34Z Author&#160;Stackpole, Bill.&#160;Oksendahl, Eric.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781439827345">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Data mining and machine learning in cybersecurity ent://SD_ILS/0/SD_ILS:290743 2024-12-14T06:52:34Z 2024-12-14T06:52:34Z Author&#160;Dua, Sumeet.&#160;Du, Xian.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781439839430">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Data protection governance, risk management, and compliance ent://SD_ILS/0/SD_ILS:289700 2024-12-14T06:52:34Z 2024-12-14T06:52:34Z Author&#160;Hill, David G. (David Gary), 1943-<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781439806937">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Architecting secure software systems ent://SD_ILS/0/SD_ILS:288749 2024-12-14T06:52:34Z 2024-12-14T06:52:34Z Author&#160;Talukder, Asoke K.&#160;Chaitanya, Manish.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781420087857">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/>