Search Results for information analysis. - Narrowed by: Data protection. SirsiDynix Enterprise https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dinformation$002banalysis.$0026qf$003dSUBJECT$002509Subject$002509Data$002bprotection.$002509Data$002bprotection.$0026ps$003d300$0026isd$003dtrue? 2026-01-21T18:18:57Z Information security risk assessment toolkit practical assessments through data collection and data analysis ent://SD_ILS/0/SD_ILS:145470 2026-01-21T18:18:57Z 2026-01-21T18:18:57Z Author&#160;Talabis, Mark.&#160;Martin, Jason.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597497350">http://www.sciencedirect.com/science/book/9781597497350</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Critical Infrastructure Protection Information Infrastructure Models, Analysis, and Defense ent://SD_ILS/0/SD_ILS:196564 2026-01-21T18:18:57Z 2026-01-21T18:18:57Z Author&#160;Lopez, Javier. editor.&#160;Setola, Roberto. editor.&#160;Wolthusen, Stephen D. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-28920-0">http://dx.doi.org/10.1007/978-3-642-28920-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Soft Computing for Security Applications Proceedings of ICSCS 2022 ent://SD_ILS/0/SD_ILS:526883 2026-01-21T18:18:57Z 2026-01-21T18:18:57Z Author&#160;Ranganathan, G. editor.&#160;Fernando, Xavier. editor.&#160;Piramuthu, Selwyn. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-19-3590-9">https://doi.org/10.1007/978-981-19-3590-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Technological Trends in the AI Economy International Review and Ways of Adaptation ent://SD_ILS/0/SD_ILS:527596 2026-01-21T18:18:57Z 2026-01-21T18:18:57Z Author&#160;Makarenko, Elena N. editor.&#160;Vovchenko, Natalia G. editor.&#160;Tishchenko, Evgeny N. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-19-7411-3">https://doi.org/10.1007/978-981-19-7411-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cyber Security Intelligence and Analytics The 5th International Conference on Cyber Security Intelligence and Analytics (CSIA 2023), Volume 1 ent://SD_ILS/0/SD_ILS:526850 2026-01-21T18:18:57Z 2026-01-21T18:18:57Z Author&#160;Xu, Zheng. editor.&#160;Alrabaee, Saed. editor.&#160;Loyola-Gonz&aacute;lez, Octavio. editor.&#160;Cahyani, Niken Dwi Wahyu. editor.&#160;Ab Rahman, Nurul Hidayah. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-31860-3">https://doi.org/10.1007/978-3-031-31860-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advanced Computational and Communication Paradigms Proceedings of ICACCP 2023 ent://SD_ILS/0/SD_ILS:528431 2026-01-21T18:18:57Z 2026-01-21T18:18:57Z Author&#160;Borah, Samarjeet. editor.&#160;Gandhi, Tapan K. editor.&#160;Piuri, Vincenzo. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-99-4284-8">https://doi.org/10.1007/978-981-99-4284-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Proceedings of International Conference on Recent Innovations in Computing ICRIC 2022, Volume 1 ent://SD_ILS/0/SD_ILS:529010 2026-01-21T18:18:57Z 2026-01-21T18:18:57Z Author&#160;Singh, Yashwant. editor.&#160;Singh, Pradeep Kumar. editor.&#160;Kolekar, Maheshkumar H. editor.&#160;Kar, Arpan Kumar. editor.&#160;Gon&ccedil;alves, Paulo J. Sequeira. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-19-9876-8">https://doi.org/10.1007/978-981-19-9876-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information security fundamentals ent://SD_ILS/0/SD_ILS:539922 2026-01-21T18:18:57Z 2026-01-21T18:18:57Z Author&#160;Peltier, Thomas R.<br/>Preferred Shelf Number&#160;QA76.9 .A25<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9780429130281">Taylor & Francis eBooks</a> Taylor & Francis <a href="https://www.taylorfrancis.com/books/9780429130281">https://www.taylorfrancis.com/books/9780429130281</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Trusted Computing for Embedded Systems ent://SD_ILS/0/SD_ILS:530149 2026-01-21T18:18:57Z 2026-01-21T18:18:57Z Author&#160;Candaele, Bernard. editor.&#160;Soudris, Dimitrios. editor.&#160;Anagnostopoulos, Iraklis. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-09420-5">https://doi.org/10.1007/978-3-319-09420-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Enterprise architecture and information assurance : developing a secure foundation ent://SD_ILS/0/SD_ILS:538768 2026-01-21T18:18:57Z 2026-01-21T18:18:57Z Author&#160;Scholz, James A., author.<br/>Preferred Shelf Number&#160;QA76.9 .D314 S34 2014<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781439841600">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> Responsive Security ent://SD_ILS/0/SD_ILS:542438 2026-01-21T18:18:57Z 2026-01-21T18:18:57Z Author&#160;Kang, Meng-Chow, author.<br/>Preferred Shelf Number&#160;HF5548.37<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781315145907">https://www.taylorfrancis.com/books/9781315145907</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> The security risk assessment handbook : a complete guide for performing security risk assessments ent://SD_ILS/0/SD_ILS:539743 2026-01-21T18:18:57Z 2026-01-21T18:18:57Z Author&#160;Landoll, Douglas J., author.<br/>Preferred Shelf Number&#160;HF5548.37 .L358 2011<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781439821497">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> Information security : design, implementation, measurement, and compliance ent://SD_ILS/0/SD_ILS:545839 2026-01-21T18:18:57Z 2026-01-21T18:18:57Z Author&#160;Layton, Timothy P., author.<br/>Preferred Shelf Number&#160;HF5548.37 .L393 2007<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781420013412">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> The security risk assessment handbook : a complete guide for performing security risk assessments ent://SD_ILS/0/SD_ILS:545167 2026-01-21T18:18:57Z 2026-01-21T18:18:57Z Author&#160;Landoll, Douglas J., author.<br/>Preferred Shelf Number&#160;HF5548.37 .L358 2006<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781420031232">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> Information security fundamentals ent://SD_ILS/0/SD_ILS:545226 2026-01-21T18:18:57Z 2026-01-21T18:18:57Z Author&#160;Peltier, Thomas R., author.&#160;Peltier, Justin.&#160;Blackley, John A.<br/>Preferred Shelf Number&#160;QA76.9 .A25 P427 2005<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781135493738">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> A practical guide to security assessments ent://SD_ILS/0/SD_ILS:545277 2026-01-21T18:18:57Z 2026-01-21T18:18:57Z Author&#160;Kairab, Sudhanshu., author.<br/>Preferred Shelf Number&#160;HF5548.32 .K345 2005<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781135500313">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> Assessing and managing security risk in IT systems : a structured methodology ent://SD_ILS/0/SD_ILS:542250 2026-01-21T18:18:57Z 2026-01-21T18:18:57Z Author&#160;McCumber, John, 1956, author.<br/>Preferred Shelf Number&#160;QA76.9 .A25 M4284 2005<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781135488970">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/>