Arama Sonu&ccedil;lar&#305; Computer security -- Standards. SirsiDynix Enterprise https://katalog.hacettepe.edu.tr/client/tr_TR/default_tr/default_tr/qu$003dComputer$002bsecurity$002b--$002bStandards.$0026ps$003d300?dt=list 2026-01-12T04:41:45Z Health Information Science 4th International Conference, HIS 2015, Melbourne, Australia, May 28-30, 2015, Proceedings ent://SD_ILS/0/SD_ILS:519292 2026-01-12T04:41:45Z 2026-01-12T04:41:45Z Yazar&#160;Yin, Xiaoxia. editor.&#160;Ho, Kendall. editor.&#160;Zeng, Daniel. editor.&#160;Aickelin, Uwe. editor.&#160;Zhou, Rui. editor.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-3-319-19156-0">https://doi.org/10.1007/978-3-319-19156-0</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Security management : a critical thinking approach ent://SD_ILS/0/SD_ILS:539725 2026-01-12T04:41:45Z 2026-01-12T04:41:45Z Yazar&#160;Land, Michael (Industrial engineer), author.&#160;Ricks, Truett A., author.&#160;Ricks, Bob, author.<br/>Yer Numaras&#305;&#160;HD61.5 .L36 2014<br/>Elektronik Eri&#351;im&#160;<a href="https://www.taylorfrancis.com/books/9781466561786">Click here to view.</a><br/>Format:&#160;Kitap<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Information security management handbook. Volume 2 ent://SD_ILS/0/SD_ILS:543942 2026-01-12T04:41:45Z 2026-01-12T04:41:45Z Yazar&#160;Tipton, Harold F.&#160;Krause, Micki.<br/>Yer Numaras&#305;&#160;QA76.9 .A25 I54 2008<br/>Elektronik Eri&#351;im&#160;<a href="https://www.taylorfrancis.com/books/9781420067101">Click here to view.</a><br/>Format:&#160;Kitap<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> 802.1X port-based authentication ent://SD_ILS/0/SD_ILS:544830 2026-01-12T04:41:45Z 2026-01-12T04:41:45Z Yazar&#160;Brown, Edwin Lyle., author.<br/>Yer Numaras&#305;&#160;TK5105.59 .B765 2007<br/>Elektronik Eri&#351;im&#160;<a href="https://www.taylorfrancis.com/books/9781420044652">Click here to view.</a><br/>Format:&#160;Kitap<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Information security architecture : an integrated approach to security in the organization ent://SD_ILS/0/SD_ILS:541238 2026-01-12T04:41:45Z 2026-01-12T04:41:45Z Yazar&#160;Tudor, Jan Killmeyer., author.<br/>Yer Numaras&#305;&#160;QA76.9 .A25 T83 2006<br/>Elektronik Eri&#351;im&#160;<a href="https://www.taylorfrancis.com/books/9780203488751">Click here to view.</a><br/>Format:&#160;Kitap<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Computer science handbook ent://SD_ILS/0/SD_ILS:542261 2026-01-12T04:41:45Z 2026-01-12T04:41:45Z Yazar&#160;Tucker, Allen B.<br/>Yer Numaras&#305;&#160;QA76 .C54755 2004<br/>Elektronik Eri&#351;im&#160;<a href="https://www.taylorfrancis.com/books/9780203494455">Click here to view.</a><br/>Format:&#160;Kitap<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Using the common criteria for IT security evaluation ent://SD_ILS/0/SD_ILS:538965 2026-01-12T04:41:45Z 2026-01-12T04:41:45Z Yazar&#160;Herrmann, Debra S., author.<br/>Yer Numaras&#305;&#160;TK5102.85 .H47 2003<br/>Elektronik Eri&#351;im&#160;<a href="https://www.taylorfrancis.com/books/9781420031423">Click here to view.</a><br/>Format:&#160;Kitap<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> The privacy papers : managing technology, consumer, employee, and legislative action ent://SD_ILS/0/SD_ILS:539954 2026-01-12T04:41:45Z 2026-01-12T04:41:45Z Yazar&#160;Herold, Rebecca.<br/>Yer Numaras&#305;&#160;KF1262 .P754 2002<br/>Elektronik Eri&#351;im&#160;<a href="https://www.taylorfrancis.com/books/9781420000177">Click here to view.</a><br/>Format:&#160;Kitap<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Information security management handbook on CD-ROM ent://SD_ILS/0/SD_ILS:547768 2026-01-12T04:41:45Z 2026-01-12T04:41:45Z Yazar&#160;Nozaki, Micki Krause.&#160;Tipton, Harold F.<br/>Yer Numaras&#305;&#160;QA76.9 .A25 H36 2002<br/>Elektronik Eri&#351;im&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781466515611">https://www.taylorfrancis.com/books/9781466515611</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Secure computers and networks : analysis, design, and implementation ent://SD_ILS/0/SD_ILS:540568 2026-01-12T04:41:45Z 2026-01-12T04:41:45Z Yazar&#160;Fisch, Eric A.&#160;White, Gregory B.<br/>Yer Numaras&#305;&#160;QA76.9 .A25 F5334 2000<br/>Elektronik Eri&#351;im&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9780367802127">https://www.taylorfrancis.com/books/9780367802127</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/>