Arama Sonu&ccedil;lar&#305; Business&mdash;Data processing. - Daralt&#305;lm&#305;&#351;: Computer security. SirsiDynix Enterprise https://katalog.hacettepe.edu.tr/client/tr_TR/default_tr/default_tr/qu$003dBusiness$0025E2$002580$002594Data$002bprocessing.$0026qf$003dSUBJECT$002509Konu$002509Computer$002bsecurity.$002509Computer$002bsecurity.$0026ps$003d300?dt=list 2025-12-05T17:55:59Z SECURITY STRATEGY : from requirements to reality. ent://SD_ILS/0/SD_ILS:545098 2025-12-05T17:55:59Z 2025-12-05T17:55:59Z Yazar&#160;STACKPOLE, BILL.<br/>Yer Numaras&#305;&#160;QA76.9 .A25<br/>Elektronik Eri&#351;im&#160;<a href="https://www.taylorfrancis.com/books/9780429152160">Taylor & Francis eBooks</a> Taylor & Francis <a href="https://www.taylorfrancis.com/books/9780429152160">https://www.taylorfrancis.com/books/9780429152160</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Service-Oriented and Cloud Computing Third European Conference, ESOCC 2014, Manchester, UK, September 2-4, 2014, Proceedings ent://SD_ILS/0/SD_ILS:489000 2025-12-05T17:55:59Z 2025-12-05T17:55:59Z Yazar&#160;Villari, Massimo. editor.&#160;Zimmermann, Wolf. editor.&#160;Lau, Kung-Kiu. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-3-662-44879-3">https://doi.org/10.1007/978-3-662-44879-3</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Future Business Software Current Trends in Business Software Development ent://SD_ILS/0/SD_ILS:489323 2025-12-05T17:55:59Z 2025-12-05T17:55:59Z Yazar&#160;Brunetti, Gino. editor.&#160;Feld, Thomas. editor.&#160;Heuser, Lutz. editor.&#160;Schnitter, Joachim. editor.&#160;Webel, Christian. editor.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-3-319-04144-5">https://doi.org/10.1007/978-3-319-04144-5</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Security information and event management (SIEM) implementation ent://SD_ILS/0/SD_ILS:293279 2025-12-05T17:55:59Z 2025-12-05T17:55:59Z Yazar&#160;Miller, David, 1959 Nov. 5-&#160;Harris, Shon.&#160;Harper, Allen.&#160;VanDyke, Stephen.&#160;Blask, Chris.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://mhebooklibrary.com/reader/security-information-event-management-siem-implementation">Subscription required</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> The security risk assessment handbook : a complete guide for performing security risk assessments ent://SD_ILS/0/SD_ILS:539743 2025-12-05T17:55:59Z 2025-12-05T17:55:59Z Yazar&#160;Landoll, Douglas J., author.<br/>Yer Numaras&#305;&#160;HF5548.37 .L358 2011<br/>Elektronik Eri&#351;im&#160;<a href="https://www.taylorfrancis.com/books/9781439821497">Click here to view.</a><br/>Format:&#160;Kitap<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> CISO soft skills : securing organizations impaired by employee politics, apathy, and intolerant perspectives ent://SD_ILS/0/SD_ILS:544153 2025-12-05T17:55:59Z 2025-12-05T17:55:59Z Yazar&#160;Collette, Ronald D., author.&#160;Gentile, Michael.&#160;Gentile, Skye.<br/>Yer Numaras&#305;&#160;HF5548.37 .G462 2009<br/>Elektronik Eri&#351;im&#160;<a href="https://www.taylorfrancis.com/books/9781420089110">Click here to view.</a><br/>Format:&#160;Kitap<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Information security : design, implementation, measurement, and compliance ent://SD_ILS/0/SD_ILS:545839 2025-12-05T17:55:59Z 2025-12-05T17:55:59Z Yazar&#160;Layton, Timothy P., author.<br/>Yer Numaras&#305;&#160;HF5548.37 .L393 2007<br/>Elektronik Eri&#351;im&#160;<a href="https://www.taylorfrancis.com/books/9781420013412">Click here to view.</a><br/>Format:&#160;Kitap<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> The security risk assessment handbook : a complete guide for performing security risk assessments ent://SD_ILS/0/SD_ILS:545167 2025-12-05T17:55:59Z 2025-12-05T17:55:59Z Yazar&#160;Landoll, Douglas J., author.<br/>Yer Numaras&#305;&#160;HF5548.37 .L358 2006<br/>Elektronik Eri&#351;im&#160;<a href="https://www.taylorfrancis.com/books/9781420031232">Click here to view.</a><br/>Format:&#160;Kitap<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> A practical guide to security assessments ent://SD_ILS/0/SD_ILS:545277 2025-12-05T17:55:59Z 2025-12-05T17:55:59Z Yazar&#160;Kairab, Sudhanshu., author.<br/>Yer Numaras&#305;&#160;HF5548.32 .K345 2005<br/>Elektronik Eri&#351;im&#160;<a href="https://www.taylorfrancis.com/books/9781135500313">Click here to view.</a><br/>Format:&#160;Kitap<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/>