Arama Sonuçları Compliance. - Daraltılmış: Computer security.SirsiDynix Enterprisehttps://katalog.hacettepe.edu.tr/client/tr_TR/default_tr/default_tr/qu$003dCompliance.$0026qf$003dSUBJECT$002509Konu$002509Computer$002bsecurity.$002509Computer$002bsecurity.$0026ps$003d300?2024-11-13T03:14:31ZAuditing IT infrastructures for complianceent://SD_ILS/0/SD_ILS:2711512024-11-13T03:14:31Z2024-11-13T03:14:31ZYazar Weiss, Martin M. Solomon, Michael G.<br/>Yer Numarası QA76.9.A25 W428 2011<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>Auditing IT infrastructures for complianceent://SD_ILS/0/SD_ILS:2701642024-11-13T03:14:31Z2024-11-13T03:14:31ZYazar Weiss, Martin M. Solomon, Michael G.<br/>Yer Numarası QA76.9.A25 W428<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>Data protection governance, risk management, and complianceent://SD_ILS/0/SD_ILS:2897002024-11-13T03:14:31Z2024-11-13T03:14:31ZYazar Hill, David G. (David Gary), 1943-<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://marc.crcnetbase.com/isbn/9781439806937">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Information security design, implementation, measurement, and complianceent://SD_ILS/0/SD_ILS:2884902024-11-13T03:14:31Z2024-11-13T03:14:31ZYazar Layton, Timothy P.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://marc.crcnetbase.com/isbn/9781420013412">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Information security policy development for compliance ISO/IEC 27001, NIST SP 800-53, HIPAA standard, PCI DSS V2.0, and AUP V5.0ent://SD_ILS/0/SD_ILS:2881732024-11-13T03:14:31Z2024-11-13T03:14:31ZYazar Williams, Barry L.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://marc.crcnetbase.com/isbn/9781466580596">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Oracle identity management governance, risk, and compliance architectureent://SD_ILS/0/SD_ILS:2877942024-11-13T03:14:31Z2024-11-13T03:14:31ZYazar Pohlman, Marlin B.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://marc.crcnetbase.com/isbn/9781420072488">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Official (ISC)2ʼ guide to the ISSMPʼ CBKʼent://SD_ILS/0/SD_ILS:2861142024-11-13T03:14:31Z2024-11-13T03:14:31ZYazar Tipton, Harold F.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://marc.crcnetbase.com/isbn/9781420094442">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Adaptive security management architectureent://SD_ILS/0/SD_ILS:2884512024-11-13T03:14:31Z2024-11-13T03:14:31ZYazar Tiller, James S.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://marc.crcnetbase.com/isbn/9781420013375">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Information security architecture an integrated approach to security in the organizationent://SD_ILS/0/SD_ILS:2901762024-11-13T03:14:31Z2024-11-13T03:14:31ZYazar Tudor, Jan Killmeyer.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://marc.crcnetbase.com/isbn/9780203488751">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>