Search Results for TAYLOR - Narrowed by: Computer security.SirsiDynix Enterprisehttps://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dTAYLOR$0026qf$003dSUBJECT$002509Subject$002509Computer$002bsecurity.$002509Computer$002bsecurity.$0026ps$003d300?2024-12-14T06:52:34ZFISMA certification & accreditation handbookent://SD_ILS/0/SD_ILS:1121692024-12-14T06:52:34Z2024-12-14T06:52:34ZAuthor Taylor, Laura. Shepherd, Matthew. ScienceDirect (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491167">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>FISMA certification & accreditation handbookent://SD_ILS/0/SD_ILS:1458762024-12-14T06:52:34Z2024-12-14T06:52:34ZAuthor Taylor, Laura. Shepherd, Matthew.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491167">http://www.sciencedirect.com/science/book/9781597491167</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Handbook of Software Engineeringent://SD_ILS/0/SD_ILS:4840242024-12-14T06:52:34Z2024-12-14T06:52:34ZAuthor Cha, Sungdeok. editor. Taylor, Richard N. editor. Kang, Kyochul. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-00262-6">https://doi.org/10.1007/978-3-030-00262-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Deep Learning in Medical Image Analysis and Multimodal Learning for Clinical Decision Support 4th International Workshop, DLMIA 2018, and 8th International Workshop, ML-CDS 2018, Held in Conjunction with MICCAI 2018, Granada, Spain, September 20, 2018, Proceedingsent://SD_ILS/0/SD_ILS:4005752024-12-14T06:52:34Z2024-12-14T06:52:34ZAuthor Stoyanov, Danail. editor. Taylor, Zeike. editor. Carneiro, Gustavo. editor. (orcid)0000-0002-5571-6220 Syeda-Mahmood, Tanveer. editor. Martel, Anne. editor.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-00889-5">https://doi.org/10.1007/978-3-030-00889-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Introduction to modern cryptographyent://SD_ILS/0/SD_ILS:3643152024-12-14T06:52:34Z2024-12-14T06:52:34ZAuthor Katz, Jonathan, 1974- Lindell, Yehuda.<br/>Preferred Shelf Number QA76.9.A25 K36 2015<br/>Format: Books<br/>Availability Beytepe Library~2<br/>Secret history : the story of cryptologyent://SD_ILS/0/SD_ILS:3652582024-12-14T06:52:34Z2024-12-14T06:52:34ZAuthor Bauer, Craig P.<br/>Preferred Shelf Number QA76.9.A25 B384 2013<br/>Format: Books<br/>Availability Beytepe Library~1<br/>Machine learning forensics for law enforcement, security, and intelligenceent://SD_ILS/0/SD_ILS:2852212024-12-14T06:52:34Z2024-12-14T06:52:34ZAuthor Mena, Jesus.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781439860700">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Security strategy from requirements to realityent://SD_ILS/0/SD_ILS:2888512024-12-14T06:52:34Z2024-12-14T06:52:34ZAuthor Stackpole, Bill. Oksendahl, Eric.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781439827345">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Data mining and machine learning in cybersecurityent://SD_ILS/0/SD_ILS:2907432024-12-14T06:52:34Z2024-12-14T06:52:34ZAuthor Dua, Sumeet. Du, Xian.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781439839430">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Data protection governance, risk management, and complianceent://SD_ILS/0/SD_ILS:2897002024-12-14T06:52:34Z2024-12-14T06:52:34ZAuthor Hill, David G. (David Gary), 1943-<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781439806937">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Architecting secure software systemsent://SD_ILS/0/SD_ILS:2887492024-12-14T06:52:34Z2024-12-14T06:52:34ZAuthor Talukder, Asoke K. Chaitanya, Manish.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781420087857">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>