Arama Sonuçları Compliance. - Daraltılmış: Data protection.SirsiDynix Enterprisehttps://katalog.hacettepe.edu.tr/client/tr_TR/default_tr/default_tr/qu$003dCompliance.$0026qf$003dSUBJECT$002509Konu$002509Data$002bprotection.$002509Data$002bprotection.$0026ps$003d300$0026isd$003dtrue?2024-12-02T01:13:23ZData protection governance, risk management, and complianceent://SD_ILS/0/SD_ILS:2897002024-12-02T01:13:23Z2024-12-02T01:13:23ZYazar Hill, David G. (David Gary), 1943-<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://marc.crcnetbase.com/isbn/9781439806937">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Information security design, implementation, measurement, and complianceent://SD_ILS/0/SD_ILS:2884902024-12-02T01:13:23Z2024-12-02T01:13:23ZYazar Layton, Timothy P.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://marc.crcnetbase.com/isbn/9781420013412">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Information security policy development for compliance ISO/IEC 27001, NIST SP 800-53, HIPAA standard, PCI DSS V2.0, and AUP V5.0ent://SD_ILS/0/SD_ILS:2881732024-12-02T01:13:23Z2024-12-02T01:13:23ZYazar Williams, Barry L.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://marc.crcnetbase.com/isbn/9781466580596">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Das IT-Gesetz: Compliance in der IT-Sicherheit Leitfaden für ein Regelwerk zur IT-Sicherheit im Unternehmenent://SD_ILS/0/SD_ILS:1990842024-12-02T01:13:23Z2024-12-02T01:13:23ZYazar Grünendahl, Ralf Torsten. author. Steinbacher, Andreas F. author. Will, Peter H.L. author. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-8348-8283-7">http://dx.doi.org/10.1007/978-3-8348-8283-7</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Metriken – der Schlüssel zum erfolgreichen Security und Compliance Monitoring Design, Implementierung und Validierung in der Praxisent://SD_ILS/0/SD_ILS:1990282024-12-02T01:13:23Z2024-12-02T01:13:23ZYazar Sowa, Aleksandra. author. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-8348-8194-6">http://dx.doi.org/10.1007/978-3-8348-8194-6</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Das IT-Gesetz: Compliance in der IT-Sicherheit Leitfaden für ein Regelwerk zur IT-Sicherheit im Unternehmenent://SD_ILS/0/SD_ILS:1996702024-12-02T01:13:23Z2024-12-02T01:13:23ZYazar Grünendahl, Ralf-T. author. Steinbacher, Andreas F. author. Will, Peter H. L. author. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-8348-9559-2">http://dx.doi.org/10.1007/978-3-8348-9559-2</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>