Arama Sonuçları Business - Daraltılmış: Data protection.SirsiDynix Enterprisehttps://katalog.hacettepe.edu.tr/client/tr_TR/default_tr/default_tr/qu$003dBusiness$0026qf$003dSUBJECT$002509Konu$002509Data$002bprotection.$002509Data$002bprotection.$0026ic$003dtrue$0026ps$003d300?2024-09-21T14:16:28ZOnline Business Security Systemsent://SD_ILS/0/SD_ILS:1666412024-09-21T14:16:28Z2024-09-21T14:16:28ZYazar Williams, Godfried B. author. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-0-387-68850-3">http://dx.doi.org/10.1007/978-0-387-68850-3</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Global cyber security labor shortage and international business riskent://SD_ILS/0/SD_ILS:4818102024-09-21T14:16:28Z2024-09-21T14:16:28ZYazar Christiansen, Bryan, 1960- editor. Piekarz, Agnieszka, 1990- editor. IGI Global, publisher.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-5927-6">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-5927-6</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Network security and its impact on business strategyent://SD_ILS/0/SD_ILS:4822132024-09-21T14:16:28Z2024-09-21T14:16:28ZYazar Oncioiu, Ionica, 1972- editor. IGI Global, publisher.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-8455-1">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-8455-1</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>ISSE 2013 Securing Electronic Business Processes Highlights of the Information Security Solutions Europe 2013 Conferenceent://SD_ILS/0/SD_ILS:3352922024-09-21T14:16:28Z2024-09-21T14:16:28ZYazar Reimer, Helmut. editor. Pohlmann, Norbert. editor. Schneider, Wolfgang. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE(335292.1)<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-658-03371-2">http://dx.doi.org/10.1007/978-3-658-03371-2</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Smart Mobile Apps Mit Business-Apps ins Zeitalter mobiler Geschäftsprozesseent://SD_ILS/0/SD_ILS:1949662024-09-21T14:16:28Z2024-09-21T14:16:28ZYazar Verclas, Stephan. editor. Linnhoff-Popien, Claudia. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-22259-7">http://dx.doi.org/10.1007/978-3-642-22259-7</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Trust, Privacy and Security in Digital Business 9th International Conference, TrustBus 2012, Vienna, Austria, September 3-7, 2012. Proceedingsent://SD_ILS/0/SD_ILS:1972022024-09-21T14:16:28Z2024-09-21T14:16:28ZYazar Fischer-Hübner, Simone. editor. Katsikas, Sokratis. editor. Quirchmayr, Gerald. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-32287-7">http://dx.doi.org/10.1007/978-3-642-32287-7</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>E-Business and Telecommunications International Joint Conference, ICETE 2011, Seville, Spain, July 18-21, 2011, Revised Selected Papersent://SD_ILS/0/SD_ILS:1976362024-09-21T14:16:28Z2024-09-21T14:16:28ZYazar Obaidat, Mohammad S. editor. Sevillano, José L. editor. Filipe, Joaquim. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-35755-8">http://dx.doi.org/10.1007/978-3-642-35755-8</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Information Flow Based Security Control Beyond RBAC How to enable fine-grained security policy enforcement in business processes beyond limitations of role-based access control (RBAC)ent://SD_ILS/0/SD_ILS:1989532024-09-21T14:16:28Z2024-09-21T14:16:28ZYazar Fischer-Hellmann, Klaus-Peter. author. Bischoff, Rainer. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-8348-2618-3">http://dx.doi.org/10.1007/978-3-8348-2618-3</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Business System Management and Engineering From Open Issues to Applicationsent://SD_ILS/0/SD_ILS:1972182024-09-21T14:16:28Z2024-09-21T14:16:28ZYazar Ardagna, Claudio A. editor. Damiani, Ernesto. editor. Maciaszek, Leszek A. editor. Missikoff, Michele. editor. Parkin, Michael. editor.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-32439-0">http://dx.doi.org/10.1007/978-3-642-32439-0</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>ISSE 2010 Securing Electronic Business Processes Highlights of the Information Security Solutions Europe 2010 Conferenceent://SD_ILS/0/SD_ILS:1998912024-09-21T14:16:28Z2024-09-21T14:16:28ZYazar Pohlmann, Norbert. editor. Reimer, Helmut. editor. Schneider, Wolfgang. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-8348-9788-6">http://dx.doi.org/10.1007/978-3-8348-9788-6</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>ISSE 2009 Securing Electronic Business Processes Highlights of the Information Security Solutions Europe 2009 Conferenceent://SD_ILS/0/SD_ILS:1994832024-09-21T14:16:28Z2024-09-21T14:16:28ZYazar Pohlmann, Norbert. editor. Reimer, Helmut. editor. Schneider, Wolfgang. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-8348-9363-5">http://dx.doi.org/10.1007/978-3-8348-9363-5</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Trust, Privacy and Security in Digital Business 6th International Conference, TrustBus 2009, Linz, Austria, September 3-4, 2009. Proceedingsent://SD_ILS/0/SD_ILS:1907252024-09-21T14:16:28Z2024-09-21T14:16:28ZYazar Fischer-Hübner, Simone. editor. Lambrinoudakis, Costas. editor. Pernul, Günther. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-03748-1">http://dx.doi.org/10.1007/978-3-642-03748-1</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>ISSE 2008 Securing Electronic Business Processes Highlights of the Information Security Solutions Europe 2008 Conferenceent://SD_ILS/0/SD_ILS:1994112024-09-21T14:16:28Z2024-09-21T14:16:28ZYazar Pohlmann, Norbert. editor. Reimer, Helmut. editor. Schneider, Wolfgang. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-8348-9283-6">http://dx.doi.org/10.1007/978-3-8348-9283-6</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>E-business and Telecommunications 4th International Conference, ICETE 2007, Barcelona, Spain, July 28-31, 2007, Revised Selected Papersent://SD_ILS/0/SD_ILS:1890982024-09-21T14:16:28Z2024-09-21T14:16:28ZYazar Filipe, Joaquim. editor. Obaidat, Mohammad S. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-540-88653-2">http://dx.doi.org/10.1007/978-3-540-88653-2</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Towards Sustainable Society on Ubiquitous Networks The 8th IFIP Conference on e-Business, e-Services, and e-Society (I3E 2008), September 24–16, 2008, Tokyo, Japanent://SD_ILS/0/SD_ILS:1677882024-09-21T14:16:28Z2024-09-21T14:16:28ZYazar Oya, Makoto. editor. Uda, Ryuya. editor. Yasunobu, Chizuko. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-0-387-85691-9">http://dx.doi.org/10.1007/978-0-387-85691-9</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>E-Business and Telecommunication Networks Third International Conference, ICETE 2006, Setúbal, Portugal, August 7-10, 2006. Selected Papersent://SD_ILS/0/SD_ILS:1860342024-09-21T14:16:28Z2024-09-21T14:16:28ZYazar Filipe, Joaquim. editor. Obaidat, Mohammad S. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-540-70760-8">http://dx.doi.org/10.1007/978-3-540-70760-8</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Trust, Privacy and Security in Digital Business 5th International Conference, TrustBus 2008 Turin, Italy, September 4-5, 2008 Proceedingsent://SD_ILS/0/SD_ILS:1887652024-09-21T14:16:28Z2024-09-21T14:16:28ZYazar Furnell, Steven. editor. Katsikas, Sokratis K. editor. Lioy, Antonio. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-540-85735-8">http://dx.doi.org/10.1007/978-3-540-85735-8</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Trust, Privacy and Security in Digital Business 4th International Conference, TrustBus 2007, Regensburg, Germany, September 3-7, 2007. Proceedingsent://SD_ILS/0/SD_ILS:1871462024-09-21T14:16:28Z2024-09-21T14:16:28ZYazar Lambrinoudakis, Costas. editor. Pernul, Günther. editor. Tjoa, A Min. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-540-74409-2">http://dx.doi.org/10.1007/978-3-540-74409-2</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>E-business and Telecommunication Networks Second International Conference, ICETE 2005, Reading, UK, October 3-7, 2005. Selected Papersent://SD_ILS/0/SD_ILS:1875552024-09-21T14:16:28Z2024-09-21T14:16:28ZYazar Filipe, Joaquim. editor. Coelhas, Helder. editor. Saramago, Monica. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-540-75993-5">http://dx.doi.org/10.1007/978-3-540-75993-5</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Information Systems: Research, Development, Applications, Education 12th SIGSAND/PLAIS EuroSymposium 2019, Gdansk, Poland, September 19, 2019, Proceedingsent://SD_ILS/0/SD_ILS:4870382024-09-21T14:16:28Z2024-09-21T14:16:28ZYazar Wrycza, Stanisław. editor. (orcid)0000-0001-7699-6631 Maślankowski, Jacek. editor. (orcid)0000-0003-0357-2736 SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-030-29608-7">https://doi.org/10.1007/978-3-030-29608-7</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Research and Practical Issues of Enterprise Information Systems 12th IFIP WG 8.9 Working Conference, CONFENIS 2018, Held at the 24th IFIP World Computer Congress, WCC 2018, Poznan, Poland, September 18–19, 2018, Proceedingsent://SD_ILS/0/SD_ILS:3996942024-09-21T14:16:28Z2024-09-21T14:16:28ZYazar Tjoa, A Min. editor. (orcid)0000-0002-8295-9252 Raffai, Maria. editor. (orcid)0000-0001-6934-6366 Doucek, Petr. editor. (orcid)0000-0002-5647-661X Novak, Niina Maarit. editor. (orcid)0000-0003-4352-7534 SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-319-99040-8">https://doi.org/10.1007/978-3-319-99040-8</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Evaluation of Electronic Voting Requirements and Evaluation Procedures to Support Responsible Election Authoritiesent://SD_ILS/0/SD_ILS:1900782024-09-21T14:16:28Z2024-09-21T14:16:28ZYazar Volkamer, Melanie. author. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-01662-2">http://dx.doi.org/10.1007/978-3-642-01662-2</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Enterprise architecture and information assurance : developing a secure foundationent://SD_ILS/0/SD_ILS:2899952024-09-21T14:16:28Z2024-09-21T14:16:28ZYazar Scholz, James A., author.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://marc.crcnetbase.com/isbn/9781439841600">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Total information risk management maximizing the value of data and information assetsent://SD_ILS/0/SD_ILS:3066932024-09-21T14:16:28Z2024-09-21T14:16:28ZYazar Borek, Alexander.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780124055476">http://www.sciencedirect.com/science/book/9780124055476</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Human Aspects of Information Security, Privacy, and Trust First International Conference, HAS 2013, Held as Part of HCI International 2013, Las Vegas, NV, USA, July 21-26, 2013. Proceedingsent://SD_ILS/0/SD_ILS:3347862024-09-21T14:16:28Z2024-09-21T14:16:28ZYazar Marinos, Louis. editor. Askoxylakis, Ioannis. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE(334786.1)<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-39345-7">http://dx.doi.org/10.1007/978-3-642-39345-7</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Information Security and Privacy 18th Australasian Conference, ACISP 2013, Brisbane, Australia, July 1-3, 2013. Proceedingsent://SD_ILS/0/SD_ILS:3347202024-09-21T14:16:28Z2024-09-21T14:16:28ZYazar Boyd, Colin. editor. Simpson, Leonie. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE(334720.1)<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-39059-3">http://dx.doi.org/10.1007/978-3-642-39059-3</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Financial Cryptography and Data Security 17th International Conference, FC 2013, Okinawa, Japan, April 1-5, 2013, Revised Selected Papersent://SD_ILS/0/SD_ILS:3348632024-09-21T14:16:28Z2024-09-21T14:16:28ZYazar Sadeghi, Ahmad-Reza. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE(334863.1)<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-39884-1">http://dx.doi.org/10.1007/978-3-642-39884-1</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Digital Forensics and Cyber Crime 4th International Conference, ICDF2C 2012, Lafayette, IN, USA, October 25-26, 2012, Revised Selected Papersent://SD_ILS/0/SD_ILS:3348642024-09-21T14:16:28Z2024-09-21T14:16:28ZYazar Rogers, Marcus. editor. Seigfried-Spellar, Kathryn C. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE(334864.1)<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-39891-9">http://dx.doi.org/10.1007/978-3-642-39891-9</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Computer Security – ESORICS 2013 18th European Symposium on Research in Computer Security, Egham, UK, September 9-13, 2013. Proceedingsent://SD_ILS/0/SD_ILS:3349092024-09-21T14:16:28Z2024-09-21T14:16:28ZYazar Crampton, Jason. editor. Jajodia, Sushil. editor. Mayes, Keith. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE(334909.1)<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-40203-6">http://dx.doi.org/10.1007/978-3-642-40203-6</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Availability, Reliability, and Security in Information Systems and HCI IFIP WG 8.4, 8.9, TC 5 International Cross-Domain Conference, CD-ARES 2013, Regensburg, Germany, September 2-6, 2013. Proceedingsent://SD_ILS/0/SD_ILS:3349582024-09-21T14:16:28Z2024-09-21T14:16:28ZYazar Cuzzocrea, Alfredo. editor. Kittl, Christian. editor. Simos, Dimitris E. editor. Weippl, Edgar. editor. Xu, Lida. editor.<br/>Yer Numarası ONLINE(334958.1)<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-40511-2">http://dx.doi.org/10.1007/978-3-642-40511-2</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Security in Computing and Communications International Symposium, SSCC 2013, Mysore, India, August 22-24, 2013. Proceedingsent://SD_ILS/0/SD_ILS:3349722024-09-21T14:16:28Z2024-09-21T14:16:28ZYazar Thampi, Sabu M. editor. Atrey, Pradeep K. editor. Fan, Chun-I. editor. Perez, Gregorio Martinez. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE(334972.1)<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-40576-1">http://dx.doi.org/10.1007/978-3-642-40576-1</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Service-Oriented and Cloud Computing Second European Conference, ESOCC 2013, Málaga, Spain, September 11-13, 2013. Proceedingsent://SD_ILS/0/SD_ILS:3349832024-09-21T14:16:28Z2024-09-21T14:16:28ZYazar Lau, Kung-Kiu. editor. Lamersdorf, Winfried. editor. Pimentel, Ernesto. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE(334983.1)<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-40651-5">http://dx.doi.org/10.1007/978-3-642-40651-5</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Introduction to Public Key Infrastructuresent://SD_ILS/0/SD_ILS:3349842024-09-21T14:16:28Z2024-09-21T14:16:28ZYazar Buchmann, Johannes A. author. Karatsiolis, Evangelos. author. Wiesmaier, Alexander. author. SpringerLink (Online service)<br/>Yer Numarası ONLINE(334984.1)<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-40657-7">http://dx.doi.org/10.1007/978-3-642-40657-7</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Radio Frequency Identification Security and Privacy Issues 9th International Workshop, RFIDsec 2013, Graz, Austria, July 9-11, 2013, Revised Selected Papersent://SD_ILS/0/SD_ILS:3350902024-09-21T14:16:28Z2024-09-21T14:16:28ZYazar Hutter, Michael. editor. Schmidt, Jörn-Marc. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE(335090.1)<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-41332-2">http://dx.doi.org/10.1007/978-3-642-41332-2</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Frontiers in Internet Technologies Second CCF Internet Conference of China, ICoC 2013, Zhangjiajie, China, July 10, 2013, Revised Selected Papersent://SD_ILS/0/SD_ILS:3352252024-09-21T14:16:28Z2024-09-21T14:16:28ZYazar Su, Jinshu. editor. Zhao, Baokang. editor. Sun, Zhigang. editor. Wang, Xiaofeng. editor. Wang, Fei. editor.<br/>Yer Numarası ONLINE(335225.1)<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-53959-6">http://dx.doi.org/10.1007/978-3-642-53959-6</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Data Privacy Management and Autonomous Spontaneous Security 7th International Workshop, DPM 2012, and 5th International Workshop, SETOP 2012, Pisa, Italy, September 13-14, 2012. Revised Selected Papersent://SD_ILS/0/SD_ILS:3340782024-09-21T14:16:28Z2024-09-21T14:16:28ZYazar Pietro, Roberto. editor. Herranz, Javier. editor. Damiani, Ernesto. editor. State, Radu. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE(334078.1)<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-35890-6">http://dx.doi.org/10.1007/978-3-642-35890-6</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Network and System Security 7th International Conference, NSS 2013, Madrid, Spain, June 3-4, 2013. Proceedingsent://SD_ILS/0/SD_ILS:3346382024-09-21T14:16:28Z2024-09-21T14:16:28ZYazar Lopez, Javier. editor. Huang, Xinyi. editor. Sandhu, Ravi. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE(334638.1)<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-38631-2">http://dx.doi.org/10.1007/978-3-642-38631-2</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>PRAGMATIC security metrics applying metametrics to information securityent://SD_ILS/0/SD_ILS:2899742024-09-21T14:16:28Z2024-09-21T14:16:28ZYazar Brotby, W. Krag. Hinson, Gary. Kabay, Michel E.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://marc.crcnetbase.com/isbn/9781439881538">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Enterprise Identity Management Towards an Investment Decision Support Approachent://SD_ILS/0/SD_ILS:3339232024-09-21T14:16:28Z2024-09-21T14:16:28ZYazar Royer, Denis. author. SpringerLink (Online service)<br/>Yer Numarası ONLINE(333923.1)<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-35040-5">http://dx.doi.org/10.1007/978-3-642-35040-5</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Topics in Cryptology – CT-RSA 2013 The Cryptographers’ Track at the RSA Conference 2013, San Francisco,CA, USA, February 25-March 1, 2013. Proceedingsent://SD_ILS/0/SD_ILS:3341222024-09-21T14:16:28Z2024-09-21T14:16:28ZYazar Dawson, Ed. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE(334122.1)<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-36095-4">http://dx.doi.org/10.1007/978-3-642-36095-4</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Radio Frequency Identification. Security and Privacy Issues 8th International Workshop, RFIDSec 2012, Nijmegen, The Netherlands, July 2-3, 2012, Revised Selected Papersent://SD_ILS/0/SD_ILS:3341322024-09-21T14:16:28Z2024-09-21T14:16:28ZYazar Hoepman, Jaap-Henk. editor. Verbauwhede, Ingrid. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE(334132.1)<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-36140-1">http://dx.doi.org/10.1007/978-3-642-36140-1</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Principles of Security and Trust Second International Conference, POST 2013, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2013, Rome, Italy, March 16-24, 2013. Proceedingsent://SD_ILS/0/SD_ILS:3343052024-09-21T14:16:28Z2024-09-21T14:16:28ZYazar Basin, David. editor. Mitchell, John C. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE(334305.1)<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-36830-1">http://dx.doi.org/10.1007/978-3-642-36830-1</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Detection of Intrusions and Malware, and Vulnerability Assessment 9th International Conference, DIMVA 2012, Heraklion, Crete, Greece, July 26-27, 2012, Revised Selected Papersent://SD_ILS/0/SD_ILS:3344032024-09-21T14:16:28Z2024-09-21T14:16:28ZYazar Flegel, Ulrich. editor. Markatos, Evangelos. editor. Robertson, William. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE(334403.1)<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-37300-8">http://dx.doi.org/10.1007/978-3-642-37300-8</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Detection of Intrusions and Malware, and Vulnerability Assessment 10th International Conference, DIMVA 2013, Berlin, Germany, July 18-19, 2013. Proceedingsent://SD_ILS/0/SD_ILS:3347602024-09-21T14:16:28Z2024-09-21T14:16:28ZYazar Rieck, Konrad. editor. Stewin, Patrick. editor. Seifert, Jean-Pierre. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE(334760.1)<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-39235-1">http://dx.doi.org/10.1007/978-3-642-39235-1</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Communications and Multimedia Security 14th IFIP TC 6/TC 11 International Conference, CMS 2013, Magdeburg, Germany, September 25-26, 2013. Proceedingsent://SD_ILS/0/SD_ILS:3350022024-09-21T14:16:28Z2024-09-21T14:16:28ZYazar Decker, Bart. editor. Dittmann, Jana. editor. Kraetzer, Christian. editor. Vielhauer, Claus. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE(335002.1)<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-40779-6">http://dx.doi.org/10.1007/978-3-642-40779-6</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Research in Attacks, Intrusions, and Defenses 16th International Symposium, RAID 2013, Rodney Bay, St. Lucia, October 23-25, 2013. Proceedingsent://SD_ILS/0/SD_ILS:3350852024-09-21T14:16:28Z2024-09-21T14:16:28ZYazar Stolfo, Salvatore J. editor. Stavrou, Angelos. editor. Wright, Charles V. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE(335085.1)<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-41284-4">http://dx.doi.org/10.1007/978-3-642-41284-4</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Public-Key Cryptography – PKC 2013 16th International Conference on Practice and Theory in Public-Key Cryptography, Nara, Japan, February 26 – March 1, 2013. Proceedingsent://SD_ILS/0/SD_ILS:3341842024-09-21T14:16:28Z2024-09-21T14:16:28ZYazar Kurosawa, Kaoru. editor. Hanaoka, Goichiro. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE(334184.1)<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-36362-7">http://dx.doi.org/10.1007/978-3-642-36362-7</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Provable Security 7th International Conference, ProvSec 2013, Melaka, Malaysia, October 23-25, 2013. Proceedingsent://SD_ILS/0/SD_ILS:3350772024-09-21T14:16:28Z2024-09-21T14:16:28ZYazar Susilo, Willy. editor. Reyhanitabar, Reza. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE(335077.1)<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-41227-1">http://dx.doi.org/10.1007/978-3-642-41227-1</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Financial Cryptography and Data Security FC 2013 Workshops, USEC and WAHC 2013, Okinawa, Japan, April 1, 2013, Revised Selected Papersent://SD_ILS/0/SD_ILS:3350882024-09-21T14:16:28Z2024-09-21T14:16:28ZYazar Adams, Andrew A. editor. Brenner, Michael. editor. Smith, Matthew. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE(335088.1)<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-41320-9">http://dx.doi.org/10.1007/978-3-642-41320-9</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Modern Cryptography Primer Theoretical Foundations and Practical Applicationsent://SD_ILS/0/SD_ILS:3350992024-09-21T14:16:28Z2024-09-21T14:16:28ZYazar Kościelny, Czesław. author. Kurkowski, Mirosław. author. Srebrny, Marian. author. SpringerLink (Online service)<br/>Yer Numarası ONLINE(335099.1)<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-41386-5">http://dx.doi.org/10.1007/978-3-642-41386-5</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Security de-engineering solving the problems in information risk managementent://SD_ILS/0/SD_ILS:2862092024-09-21T14:16:28Z2024-09-21T14:16:28ZYazar Tibble, Ian.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://marc.crcnetbase.com/isbn/9781439868355">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Auditing cloud computing a security and privacy guideent://SD_ILS/0/SD_ILS:2992632024-09-21T14:16:28Z2024-09-21T14:16:28ZYazar Halpert, Ben, 1986-<br/>Yer Numarası ONLINE<br/>Elektronik Erişim Image <a href="http://images.contentreserve.com/ImageType-100/0128-1/{F889EE2A-CF12-4647-85E0-03258F227FC1}Img100.jpg">http://images.contentreserve.com/ImageType-100/0128-1/{F889EE2A-CF12-4647-85E0-03258F227FC1}Img100.jpg</a>
Books24x7 <a href="http://www.books24x7.com/marc.asp?bookid=44303">http://www.books24x7.com/marc.asp?bookid=44303</a>
John Wiley <a href="http://dx.doi.org/10.1002/9781118269091">http://dx.doi.org/10.1002/9781118269091</a>
OverDrive (PDF) <a href="http://www.contentreserve.com/TitleInfo.asp?ID={F889EE2A-CF12-4647-85E0-03258F227FC1}&Format=50">http://www.contentreserve.com/TitleInfo.asp?ID={F889EE2A-CF12-4647-85E0-03258F227FC1}&Format=50</a>
OverDrive (EPUB) <a href="http://www.contentreserve.com/TitleInfo.asp?ID={F889EE2A-CF12-4647-85E0-03258F227FC1}&Format=410">http://www.contentreserve.com/TitleInfo.asp?ID={F889EE2A-CF12-4647-85E0-03258F227FC1}&Format=410</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Security strategy from requirements to realityent://SD_ILS/0/SD_ILS:2888512024-09-21T14:16:28Z2024-09-21T14:16:28ZYazar Stackpole, Bill. Oksendahl, Eric.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://marc.crcnetbase.com/isbn/9781439827345">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>The security risk assessment handbook a complete guide for performing security risk assessmentsent://SD_ILS/0/SD_ILS:2888902024-09-21T14:16:28Z2024-09-21T14:16:28ZYazar Landoll, Douglas J.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://marc.crcnetbase.com/isbn/9781439821497">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Information technology risk management in enterprise environments a review of industry practices and a practical guide to risk management teamsent://SD_ILS/0/SD_ILS:2978622024-09-21T14:16:28Z2024-09-21T14:16:28ZYazar Kouns, Jake. Minoli, Daniel, 1952- Wiley InterScience (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim John Wiley <a href="http://dx.doi.org/10.1002/9780470558133">http://dx.doi.org/10.1002/9780470558133</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Information security management metrics a definitive guide to effective security monitoring and measurementent://SD_ILS/0/SD_ILS:2913732024-09-21T14:16:28Z2024-09-21T14:16:28ZYazar Brotby, W. Krag.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://marc.crcnetbase.com/isbn/9781420052862">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Information warfareent://SD_ILS/0/SD_ILS:3040692024-09-21T14:16:28Z2024-09-21T14:16:28ZYazar Ventre, Daniel.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim John Wiley <a href="http://dx.doi.org/10.1002/9781118381533">http://dx.doi.org/10.1002/9781118381533</a>
<a href="http://lib.myilibrary.com?id=477736">http://lib.myilibrary.com?id=477736</a>
OverDrive (PDF) <a href="http://www.contentreserve.com/TitleInfo.asp?ID={02D73229-3728-4EE5-942B-28D4B82AED18}&Format=50">http://www.contentreserve.com/TitleInfo.asp?ID={02D73229-3728-4EE5-942B-28D4B82AED18}&Format=50</a>
OverDrive (EPUB) <a href="http://www.contentreserve.com/TitleInfo.asp?ID={02D73229-3728-4EE5-942B-28D4B82AED18}&Format=410">http://www.contentreserve.com/TitleInfo.asp?ID={02D73229-3728-4EE5-942B-28D4B82AED18}&Format=410</a>
OverDrive (READ) <a href="http://www.contentreserve.com/TitleInfo.asp?ID={02D73229-3728-4EE5-942B-28D4B82AED18}&Format=610">http://www.contentreserve.com/TitleInfo.asp?ID={02D73229-3728-4EE5-942B-28D4B82AED18}&Format=610</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>CISO soft skills securing organizations impaired by employee politics, apathy, and intolerant perspectivesent://SD_ILS/0/SD_ILS:2887442024-09-21T14:16:28Z2024-09-21T14:16:28ZYazar Collette, Ronald D. Gentile, Michael. Gentile, Skye.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://marc.crcnetbase.com/isbn/9781420089110">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Information assurance architectureent://SD_ILS/0/SD_ILS:2911232024-09-21T14:16:28Z2024-09-21T14:16:28ZYazar Willett, Keith D.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://marc.crcnetbase.com/isbn/9780849380686">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Information security design, implementation, measurement, and complianceent://SD_ILS/0/SD_ILS:2884902024-09-21T14:16:28Z2024-09-21T14:16:28ZYazar Layton, Timothy P.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://marc.crcnetbase.com/isbn/9781420013412">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>The security risk assessment handbook a complete guide for performing security risk assessmentsent://SD_ILS/0/SD_ILS:2847902024-09-21T14:16:28Z2024-09-21T14:16:28ZYazar Landoll, Douglas J.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://marc.crcnetbase.com/isbn/9781420031232">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>A practical guide to security assessmentsent://SD_ILS/0/SD_ILS:2883062024-09-21T14:16:28Z2024-09-21T14:16:28ZYazar Kairab, Sudhanshu.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://marc.crcnetbase.com/isbn/9780203507230">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>