Arama Sonuçları Computer security. - Daraltılmış: Data protection.SirsiDynix Enterprisehttps://katalog.hacettepe.edu.tr/client/tr_TR/default_tr/default_tr/qu$003dComputer$002bsecurity.$0026qf$003dSUBJECT$002509Konu$002509Data$002bprotection.$002509Data$002bprotection.$0026ps$003d300?dt=list2024-11-29T04:40:22ZElements of Computer Securityent://SD_ILS/0/SD_ILS:1683932024-11-29T04:40:22Z2024-11-29T04:40:22ZYazar Salomon, David. author. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-0-85729-006-9">http://dx.doi.org/10.1007/978-0-85729-006-9</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>The Art of War for Computer Securityent://SD_ILS/0/SD_ILS:4838082024-11-29T04:40:22Z2024-11-29T04:40:22ZYazar Madsen, Tom. author. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-030-28569-2">https://doi.org/10.1007/978-3-030-28569-2</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Big Data Technologies for Monitoring of Computer Security: A Case Study of the Russian Federationent://SD_ILS/0/SD_ILS:4019072024-11-29T04:40:22Z2024-11-29T04:40:22ZYazar Petrenko, Sergei. author. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-319-79036-7">https://doi.org/10.1007/978-3-319-79036-7</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Security in Computer and Information Sciences First International ISCIS Security Workshop 2018, Euro-CYBERSEC 2018, London, UK, February 26-27, 2018, Revised Selected Papersent://SD_ILS/0/SD_ILS:4027362024-11-29T04:40:22Z2024-11-29T04:40:22ZYazar Gelenbe, Erol. editor. (orcid)0000-0001-9688-2201 Campegiani, Paolo. editor. Czachórski, Tadeusz. editor. Katsikas, Sokratis K. editor. (orcid)0000-0003-2966-9683 Komnios, Ioannis. editor.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-319-95189-8">https://doi.org/10.1007/978-3-319-95189-8</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Advances in Information and Computer Security 8th International Workshop on Security, IWSEC 2013, Okinawa, Japan, November 18-20, 2013, Proceedingsent://SD_ILS/0/SD_ILS:3350982024-11-29T04:40:22Z2024-11-29T04:40:22ZYazar Sakiyama, Kazuo. editor. Terada, Masayuki. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE(335098.1)<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-41383-4">http://dx.doi.org/10.1007/978-3-642-41383-4</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Computer Security – ESORICS 2013 18th European Symposium on Research in Computer Security, Egham, UK, September 9-13, 2013. Proceedingsent://SD_ILS/0/SD_ILS:3349092024-11-29T04:40:22Z2024-11-29T04:40:22ZYazar Crampton, Jason. editor. Jajodia, Sushil. editor. Mayes, Keith. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE(334909.1)<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-40203-6">http://dx.doi.org/10.1007/978-3-642-40203-6</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Computer Safety, Reliability, and Security 32nd International Conference, SAFECOMP 2013, Toulouse, France, September 24-27, 2013. Proceedingsent://SD_ILS/0/SD_ILS:3350052024-11-29T04:40:22Z2024-11-29T04:40:22ZYazar Bitsch, Friedemann. editor. Guiochet, Jérémie. editor. Kaâniche, Mohamed. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE(335005.1)<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-40793-2">http://dx.doi.org/10.1007/978-3-642-40793-2</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Computer Security – ESORICS 2012 17th European Symposium on Research in Computer Security, Pisa, Italy, September 10-12, 2012. Proceedingsent://SD_ILS/0/SD_ILS:1973292024-11-29T04:40:22Z2024-11-29T04:40:22ZYazar Foresti, Sara. editor. Yung, Moti. editor. Martinelli, Fabio. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-33167-1">http://dx.doi.org/10.1007/978-3-642-33167-1</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Computer Safety, Reliability, and Security SAFECOMP 2012 Workshops: Sassur, ASCoMS, DESEC4LCCI, ERCIM/EWICS, IWDE, Magdeburg, Germany, September 25-28, 2012. Proceedingsent://SD_ILS/0/SD_ILS:1974192024-11-29T04:40:22Z2024-11-29T04:40:22ZYazar Ortmeier, Frank. editor. Daniel, Peter. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-33675-1">http://dx.doi.org/10.1007/978-3-642-33675-1</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Computer Safety, Reliability, and Security 31st International Conference, SAFECOMP 2012, Magdeburg, Germany, September 25-28, 2012. Proceedingsent://SD_ILS/0/SD_ILS:1974202024-11-29T04:40:22Z2024-11-29T04:40:22ZYazar Ortmeier, Frank. editor. Daniel, Peter. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-33678-2">http://dx.doi.org/10.1007/978-3-642-33678-2</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Computer Network Security 6th International Conference on Mathematical Methods, Models and Architectures for Computer Network Security, MMM-ACNS 2012, St. Petersburg, Russia, October 17-19, 2012. Proceedingsent://SD_ILS/0/SD_ILS:1974252024-11-29T04:40:22Z2024-11-29T04:40:22ZYazar Kotenko, Igor. editor. Skormin, Victor. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-33704-8">http://dx.doi.org/10.1007/978-3-642-33704-8</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Advances in Information and Computer Security 7th International Workshop on Security, IWSEC 2012, Fukuoka, Japan, November 7-9, 2012. Proceedingsent://SD_ILS/0/SD_ILS:1974752024-11-29T04:40:22Z2024-11-29T04:40:22ZYazar Hanaoka, Goichiro. editor. Yamauchi, Toshihiro. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-34117-5">http://dx.doi.org/10.1007/978-3-642-34117-5</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Recent Trends in Computer Networks and Distributed Systems Security International Conference, SNDS 2012, Trivandrum, India, October 11-12, 2012. Proceedingsent://SD_ILS/0/SD_ILS:1974792024-11-29T04:40:22Z2024-11-29T04:40:22ZYazar Thampi, Sabu M. editor. Zomaya, Albert Y. editor. Strufe, Thorsten. editor. Alcaraz Calero, Jose M. editor. Thomas, Tony , 1927-1977 editor.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-34135-9">http://dx.doi.org/10.1007/978-3-642-34135-9</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Advances in Information and Computer Security 6th International Workshop, IWSEC 2011, Tokyo, Japan, November 8-10, 2011. Proceedingsent://SD_ILS/0/SD_ILS:1958562024-11-29T04:40:22Z2024-11-29T04:40:22ZYazar Iwata, Tetsu. editor. Nishigaki, Masakatsu. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-25141-2">http://dx.doi.org/10.1007/978-3-642-25141-2</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Computer Safety, Reliability, and Security 30th International Conference,SAFECOMP 2011, Naples, Italy, September 19-22, 2011. Proceedingsent://SD_ILS/0/SD_ILS:1955862024-11-29T04:40:22Z2024-11-29T04:40:22ZYazar Flammini, Francesco. editor. Bologna, Sandro. editor. Vittorini, Valeria. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-24270-0">http://dx.doi.org/10.1007/978-3-642-24270-0</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Computer Safety, Reliability, and Security 29th International Conference, SAFECOMP 2010, Vienna, Austria, September 14-17, 2010. Proceedingsent://SD_ILS/0/SD_ILS:1930402024-11-29T04:40:22Z2024-11-29T04:40:22ZYazar Schoitsch, Erwin. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-15651-9">http://dx.doi.org/10.1007/978-3-642-15651-9</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Advances in Information and Computer Security 5th International Workshop on Security, IWSEC 2010, Kobe, Japan, November 22-24, 2010. Proceedingsent://SD_ILS/0/SD_ILS:1934222024-11-29T04:40:22Z2024-11-29T04:40:22ZYazar Echizen, Isao. editor. Kunihiro, Noboru. editor. Sasaki, Ryoichi. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-16825-3">http://dx.doi.org/10.1007/978-3-642-16825-3</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Computer Security – ESORICS 2009 14th European Symposium on Research in Computer Security, Saint-Malo, France, September 21-23, 2009. Proceedingsent://SD_ILS/0/SD_ILS:1909502024-11-29T04:40:22Z2024-11-29T04:40:22ZYazar Backes, Michael. editor. Ning, Peng. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-04444-1">http://dx.doi.org/10.1007/978-3-642-04444-1</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Computer Safety, Reliability, and Security 28th International Conference, SAFECOMP 2009, Hamburg, Germany, September 15-18, 2009. Proceedingsent://SD_ILS/0/SD_ILS:1909602024-11-29T04:40:22Z2024-11-29T04:40:22ZYazar Buth, Bettina. editor. Rabe, Gerd. editor. Seyfarth, Till. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-04468-7">http://dx.doi.org/10.1007/978-3-642-04468-7</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Advances in Information and Computer Security 4th International Workshop on Security, IWSEC 2009 Toyama, Japan, October 28-30, 2009 Proceedingsent://SD_ILS/0/SD_ILS:1910782024-11-29T04:40:22Z2024-11-29T04:40:22ZYazar Takagi, Tsuyoshi. editor. Mambo, Masahiro. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-04846-3">http://dx.doi.org/10.1007/978-3-642-04846-3</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Advances in Computer Science - ASIAN 2009. Information Security and Privacy 13th Asian Computing Science Conference, Seoul, Korea, December 14-16, 2009. Proceedingsent://SD_ILS/0/SD_ILS:1914252024-11-29T04:40:22Z2024-11-29T04:40:22ZYazar Datta, Anupam. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-10622-4">http://dx.doi.org/10.1007/978-3-642-10622-4</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Advances in Information and Computer Security Third International Workshop on Security, IWSEC 2008, Kagawa, Japan, November 25-27, 2008. Proceedingsent://SD_ILS/0/SD_ILS:1892942024-11-29T04:40:22Z2024-11-29T04:40:22ZYazar Matsuura, Kanta. editor. Fujisaki, Eiichiro. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-540-89598-5">http://dx.doi.org/10.1007/978-3-540-89598-5</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Computer Safety, Reliability, and Security 27th International Conference, SAFECOMP 2008 Newcastle upon Tyne, UK, September 22-25, 2008 Proceedingsent://SD_ILS/0/SD_ILS:1888942024-11-29T04:40:22Z2024-11-29T04:40:22ZYazar Harrison, Michael D. editor. Sujan, Mark-Alexander. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-540-87698-4">http://dx.doi.org/10.1007/978-3-540-87698-4</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Proceedings of The Ifip Tc 11 23rd International Information Security Conference IFIP 20th World Computer Congress, IFIP SEC’08, September 7-10, 2008, Milano, Italyent://SD_ILS/0/SD_ILS:1647572024-11-29T04:40:22Z2024-11-29T04:40:22ZYazar Jajodia, Sushil. editor. Samarati, Pierangela. editor. Cimato, Stelvio. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-0-387-09699-5">http://dx.doi.org/10.1007/978-0-387-09699-5</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Advances in Information and Computer Security Second International Workshop on Security, IWSEC 2007, Nara, Japan, October 29-31, 2007. Proceedingsent://SD_ILS/0/SD_ILS:1874672024-11-29T04:40:22Z2024-11-29T04:40:22ZYazar Miyaji, Atsuko. editor. Kikuchi, Hiroaki. editor. Rannenberg, Kai. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-540-75651-4">http://dx.doi.org/10.1007/978-3-540-75651-4</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Advances in Computer Science – ASIAN 2007. Computer and Network Security 12th Asian Computing Science Conference, Doha, Qatar, December 9-11, 2007. Proceedingsent://SD_ILS/0/SD_ILS:1877272024-11-29T04:40:22Z2024-11-29T04:40:22ZYazar Cervesato, Iliano. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-540-76929-3">http://dx.doi.org/10.1007/978-3-540-76929-3</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Computer Network Security Fourth International Conference on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2007 St. Petersburg, Russia, September 13–15, 2007 Proceedingsent://SD_ILS/0/SD_ILS:1870232024-11-29T04:40:22Z2024-11-29T04:40:22ZYazar Gorodetsky, Vladimir. editor. Kotenko, Igor. editor. Skormin, Victor A. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-540-73986-9">http://dx.doi.org/10.1007/978-3-540-73986-9</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Digital watermarking and steganographyent://SD_ILS/0/SD_ILS:1464742024-11-29T04:40:22Z2024-11-29T04:40:22ZYazar Cox, I. J. (Ingemar J.)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780123725851">http://www.sciencedirect.com/science/book/9780123725851</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Advanced methodologies and technologies in system security, information privacy, and forensicsent://SD_ILS/0/SD_ILS:4820092024-11-29T04:40:22Z2024-11-29T04:40:22ZYazar Khosrow-Pour, Mehdi, 1951- editor. IGI Global, publisher.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-7492-7">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-7492-7</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Information Security Practice and Experience 15th International Conference, ISPEC 2019, Kuala Lumpur, Malaysia, November 26–28, 2019, Proceedingsent://SD_ILS/0/SD_ILS:4830992024-11-29T04:40:22Z2024-11-29T04:40:22ZYazar Heng, Swee-Huay. editor. (orcid)0000-0003-3627-2131 Lopez, Javier. editor. (orcid)0000-0001-8066-9991 SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-030-34339-2">https://doi.org/10.1007/978-3-030-34339-2</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Applications and Techniques in Information Security 10th International Conference, ATIS 2019, Thanjavur, India, November 22–24, 2019, Proceedingsent://SD_ILS/0/SD_ILS:4835762024-11-29T04:40:22Z2024-11-29T04:40:22ZYazar Shankar Sriram, V. S. editor. (orcid)0000-0001-7870-7944 Subramaniyaswamy, V. editor. Sasikaladevi, N. editor. (orcid)0000-0002-0841-502X Zhang, Leo. editor. Batten, Lynn. editor. (orcid)0000-0003-4525-2423<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-981-15-0871-4">https://doi.org/10.1007/978-981-15-0871-4</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Frontiers in Cyber Security Second International Conference, FCS 2019, Xi'an, China, November 15–17, 2019, Proceedingsent://SD_ILS/0/SD_ILS:4860192024-11-29T04:40:22Z2024-11-29T04:40:22ZYazar Shen, Bazhong. editor. Wang, Baocang. editor. (orcid)0000-0002-2554-4464 Han, Jinguang. editor. (orcid)0000-0002-4993-9452 Yu, Yong. editor. (orcid)0000-0003-0667-077X SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-981-15-0818-9">https://doi.org/10.1007/978-981-15-0818-9</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Global cyber security labor shortage and international business riskent://SD_ILS/0/SD_ILS:4818102024-11-29T04:40:22Z2024-11-29T04:40:22ZYazar Christiansen, Bryan, 1960- editor. Piekarz, Agnieszka, 1990- editor. IGI Global, publisher.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-5927-6">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-5927-6</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Resilience of Cyber-Physical Systems From Risk Modelling to Threat Counteractionent://SD_ILS/0/SD_ILS:4835932024-11-29T04:40:22Z2024-11-29T04:40:22ZYazar Flammini, Francesco. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-319-95597-1">https://doi.org/10.1007/978-3-319-95597-1</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Critical Infrastructure Security and Resilience Theories, Methods, Tools and Technologiesent://SD_ILS/0/SD_ILS:4842752024-11-29T04:40:22Z2024-11-29T04:40:22ZYazar Gritzalis, Dimitris. editor. Theocharidou, Marianthi. editor. (orcid)0000-0002-8870-1746 Stergiopoulos, George. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-030-00024-0">https://doi.org/10.1007/978-3-030-00024-0</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Critical Infrastructure Protection XIII 13th IFIP WG 11.10 International Conference, ICCIP 2019, Arlington, VA, USA, March 11–12, 2019, Revised Selected Papersent://SD_ILS/0/SD_ILS:4869392024-11-29T04:40:22Z2024-11-29T04:40:22ZYazar Staggs, Jason. editor. Shenoi, Sujeet. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-030-34647-8">https://doi.org/10.1007/978-3-030-34647-8</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Network security and its impact on business strategyent://SD_ILS/0/SD_ILS:4822132024-11-29T04:40:22Z2024-11-29T04:40:22ZYazar Oncioiu, Ionica, 1972- editor. IGI Global, publisher.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-8455-1">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-8455-1</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Cyber law, privacy, and security : concepts, methodologies, tools, and applicationsent://SD_ILS/0/SD_ILS:4822392024-11-29T04:40:22Z2024-11-29T04:40:22ZYazar IGI Global, publisher. Information Resources Management Association, editor.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-8897-9">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-8897-9</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Introduction to Security Reductionent://SD_ILS/0/SD_ILS:3992112024-11-29T04:40:22Z2024-11-29T04:40:22ZYazar Guo, Fuchun. author. Susilo, Willy. author. (orcid)0000-0002-1562-5105 Mu, Yi. author. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-319-93049-7">https://doi.org/10.1007/978-3-319-93049-7</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Network Intrusion Detection using Deep Learning A Feature Learning Approachent://SD_ILS/0/SD_ILS:3998592024-11-29T04:40:22Z2024-11-29T04:40:22ZYazar Kim, Kwangjo. author. Aminanto, Muhamad Erza. author. Tanuwidjaja, Harry Chandra. author. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-981-13-1444-5">https://doi.org/10.1007/978-981-13-1444-5</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Versatile Cybersecurityent://SD_ILS/0/SD_ILS:3999742024-11-29T04:40:22Z2024-11-29T04:40:22ZYazar Conti, Mauro. editor. (orcid)0000-0002-3612-1934 Somani, Gaurav. editor. Poovendran, Radha. editor. (orcid)0000-0003-0269-8097 SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-319-97643-3">https://doi.org/10.1007/978-3-319-97643-3</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Advanced Monitoring in P2P Botnets A Dual Perspectiveent://SD_ILS/0/SD_ILS:4007672024-11-29T04:40:22Z2024-11-29T04:40:22ZYazar Karuppayah, Shankar. author. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-981-10-9050-9">https://doi.org/10.1007/978-981-10-9050-9</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Security and Privacy in Communication Networks SecureComm 2017 International Workshops, ATCS and SePrIoT, Niagara Falls, ON, Canada, October 22–25, 2017, Proceedingsent://SD_ILS/0/SD_ILS:4008462024-11-29T04:40:22Z2024-11-29T04:40:22ZYazar Lin, Xiaodong. editor. Ghorbani, Ali. editor. Ren, Kui. editor. Zhu, Sencun. editor. Zhang, Aiqing. editor.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-319-78816-6">https://doi.org/10.1007/978-3-319-78816-6</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Digital Forensics and Cyber Crime 9th International Conference, ICDF2C 2017, Prague, Czech Republic, October 9-11, 2017, Proceedingsent://SD_ILS/0/SD_ILS:4019482024-11-29T04:40:22Z2024-11-29T04:40:22ZYazar Matoušek, Petr. editor. Schmiedecker, Martin. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-319-73697-6">https://doi.org/10.1007/978-3-319-73697-6</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Advanced Hybrid Information Processing First International Conference, ADHIP 2017, Harbin, China, July 17–18, 2017, Proceedingsent://SD_ILS/0/SD_ILS:4022052024-11-29T04:40:22Z2024-11-29T04:40:22ZYazar Sun, Guanglu. editor. Liu, Shuai. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-319-73317-3">https://doi.org/10.1007/978-3-319-73317-3</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Cloud Computing, Security, Privacy in New Computing Environments 7th International Conference, CloudComp 2016, and First International Conference, SPNCE 2016, Guangzhou, China, November 25–26, and December 15–16, 2016, Proceedingsent://SD_ILS/0/SD_ILS:4005082024-11-29T04:40:22Z2024-11-29T04:40:22ZYazar Wan, Jiafu. editor. Lin, Kai. editor. Zeng, Delu. editor. Li, Jin. editor. Xiang, Yang. editor.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-319-69605-8">https://doi.org/10.1007/978-3-319-69605-8</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Security and Privacy in Communication Networks 13th International Conference, SecureComm 2017, Niagara Falls, ON, Canada, October 22–25, 2017, Proceedingsent://SD_ILS/0/SD_ILS:4009492024-11-29T04:40:22Z2024-11-29T04:40:22ZYazar Lin, Xiaodong. editor. Ghorbani, Ali. editor. Ren, Kui. editor. Zhu, Sencun. editor. Zhang, Aiqing. editor.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-319-78813-5">https://doi.org/10.1007/978-3-319-78813-5</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Mobile Internet Security First International Symposium, MobiSec 2016, Taichung, Taiwan, July 14-15, 2016, Revised Selected Papersent://SD_ILS/0/SD_ILS:4010002024-11-29T04:40:22Z2024-11-29T04:40:22ZYazar You, Ilsun. editor. Leu, Fang-Yie. editor. Chen, Hsing-Chung. editor. Kotenko, Igor. editor. (orcid)0000-0001-6859-7120 SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-981-10-7850-7">https://doi.org/10.1007/978-981-10-7850-7</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Introductory Computer Forensics A Hands-on Practical Approachent://SD_ILS/0/SD_ILS:3989662024-11-29T04:40:22Z2024-11-29T04:40:22ZYazar Lin, Xiaodong. author. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-030-00581-8">https://doi.org/10.1007/978-3-030-00581-8</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Honeypot Frameworks and Their Applications: A New Frameworkent://SD_ILS/0/SD_ILS:3992502024-11-29T04:40:22Z2024-11-29T04:40:22ZYazar NG, Chee Keong. author. Pan, Lei. author. Xiang, Yang. author. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-981-10-7739-5">https://doi.org/10.1007/978-981-10-7739-5</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Research and Practical Issues of Enterprise Information Systems 12th IFIP WG 8.9 Working Conference, CONFENIS 2018, Held at the 24th IFIP World Computer Congress, WCC 2018, Poznan, Poland, September 18–19, 2018, Proceedingsent://SD_ILS/0/SD_ILS:3996942024-11-29T04:40:22Z2024-11-29T04:40:22ZYazar Tjoa, A Min. editor. (orcid)0000-0002-8295-9252 Raffai, Maria. editor. (orcid)0000-0001-6934-6366 Doucek, Petr. editor. (orcid)0000-0002-5647-661X Novak, Niina Maarit. editor. (orcid)0000-0003-4352-7534 SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-319-99040-8">https://doi.org/10.1007/978-3-319-99040-8</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Critical Infrastructure Protection XII 12th IFIP WG 11.10 International Conference, ICCIP 2018, Arlington, VA, USA, March 12-14, 2018, Revised Selected Papersent://SD_ILS/0/SD_ILS:4001262024-11-29T04:40:22Z2024-11-29T04:40:22ZYazar Staggs, Jason. editor. Shenoi, Sujeet. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-030-04537-1">https://doi.org/10.1007/978-3-030-04537-1</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Privacy and Identity Management. The Smart Revolution 12th IFIP WG 9.2, 9.5, 9.6/11.7, 11.6/SIG 9.2.2 International Summer School, Ispra, Italy, September 4-8, 2017, Revised Selected Papersent://SD_ILS/0/SD_ILS:4014912024-11-29T04:40:22Z2024-11-29T04:40:22ZYazar Hansen, Marit. editor. Kosta, Eleni. editor. Nai-Fovino, Igor. editor. Fischer-Hübner, Simone. editor. (orcid)0000-0002-6938-4466 SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-319-92925-5">https://doi.org/10.1007/978-3-319-92925-5</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Future Network Systems and Security 4th International Conference, FNSS 2018, Paris, France, July 9–11, 2018, Proceedingsent://SD_ILS/0/SD_ILS:4017342024-11-29T04:40:22Z2024-11-29T04:40:22ZYazar Doss, Robin. editor. (orcid)0000-0001-6143-6850 Piramuthu, Selwyn. editor. Zhou, Wei. editor. (orcid)0000-0002-9965-9870 SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-319-94421-0">https://doi.org/10.1007/978-3-319-94421-0</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Trust Management XII 12th IFIP WG 11.11 International Conference, IFIPTM 2018, Toronto, ON, Canada, July 10–13, 2018, Proceedingsent://SD_ILS/0/SD_ILS:4020072024-11-29T04:40:22Z2024-11-29T04:40:22ZYazar Gal-Oz, Nurit. editor. Lewis, Peter R. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-319-95276-5">https://doi.org/10.1007/978-3-319-95276-5</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Foundations and Practice of Security 10th International Symposium, FPS 2017, Nancy, France, October 23-25, 2017, Revised Selected Papersent://SD_ILS/0/SD_ILS:4020172024-11-29T04:40:22Z2024-11-29T04:40:22ZYazar Imine, Abdessamad. editor. Fernandez, José M. editor. (orcid)0000-0001-9836-3595 Marion, Jean-Yves. editor. Logrippo, Luigi. editor. (orcid)0000-0001-8804-0450 Garcia-Alfaro, Joaquin. editor. (orcid)0000-0002-7453-4393<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-319-75650-9">https://doi.org/10.1007/978-3-319-75650-9</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Mobile data loss : threats and countermeasuresent://SD_ILS/0/SD_ILS:4587292024-11-29T04:40:22Z2024-11-29T04:40:22ZYazar Raggo, Michael T.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="https://www.sciencedirect.com/science/book/9780128028643">https://www.sciencedirect.com/science/book/9780128028643</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Measuring and managing information risk : a FAIR approachent://SD_ILS/0/SD_ILS:3555762024-11-29T04:40:22Z2024-11-29T04:40:22ZYazar Freund, Jack, author. Jones, Jack, author.<br/>Yer Numarası ONLINE(355576.1)<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780124202313">http://www.sciencedirect.com/science/book/9780124202313</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Unauthorized access the crisis in online privacy and securityent://SD_ILS/0/SD_ILS:2853212024-11-29T04:40:22Z2024-11-29T04:40:22ZYazar Sloan, Robert H. Warner, Richard, 1946-<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://marc.crcnetbase.com/isbn/9781439830147">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Information security fundamentalsent://SD_ILS/0/SD_ILS:3425842024-11-29T04:40:22Z2024-11-29T04:40:22ZYazar Peltier, Thomas R., author.<br/>Yer Numarası ONLINE(342584.1)<br/>Elektronik Erişim <a href="http://marc.crcnetbase.com/isbn/9781439810637">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Anonymous communication networks : protecting privacy on the webent://SD_ILS/0/SD_ILS:3566572024-11-29T04:40:22Z2024-11-29T04:40:22ZYazar Peng, Kun, author.<br/>Yer Numarası ONLINE(356657.1)<br/>Elektronik Erişim <a href="http://marc.crcnetbase.com/isbn/9781439881606">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Information security policy development for compliance ISO/IEC 27001, NIST SP 800-53, HIPAA standard, PCI DSS V2.0, and AUP V5.0ent://SD_ILS/0/SD_ILS:2881732024-11-29T04:40:22Z2024-11-29T04:40:22ZYazar Williams, Barry L.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://marc.crcnetbase.com/isbn/9781466580596">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>The complete book of data anonymization from planning to implementationent://SD_ILS/0/SD_ILS:2890652024-11-29T04:40:22Z2024-11-29T04:40:22ZYazar Raghunathan, Balaji.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://marc.crcnetbase.com/isbn/9781439877319">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Information protection playbookent://SD_ILS/0/SD_ILS:3066492024-11-29T04:40:22Z2024-11-29T04:40:22ZYazar Kane, Greg, editor of compilation. Koppel, Lorna, editor of compilation.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780124172326">http://www.sciencedirect.com/science/book/9780124172326</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>PRAGMATIC security metrics applying metametrics to information securityent://SD_ILS/0/SD_ILS:2899742024-11-29T04:40:22Z2024-11-29T04:40:22ZYazar Brotby, W. Krag. Hinson, Gary. Kabay, Michel E.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://marc.crcnetbase.com/isbn/9781439881538">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Data hiding exposing concealed data in multimedia, operating systems, mobile devices and network protocolsent://SD_ILS/0/SD_ILS:1476022024-11-29T04:40:22Z2024-11-29T04:40:22ZYazar Raggo, Michael T. Hosmer, Chet.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597497435">http://www.sciencedirect.com/science/book/9781597497435</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Information security risk assessment toolkit practical assessments through data collection and data analysisent://SD_ILS/0/SD_ILS:1454702024-11-29T04:40:22Z2024-11-29T04:40:22ZYazar Talabis, Mark. Martin, Jason.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597497350">http://www.sciencedirect.com/science/book/9781597497350</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Engineering information security the application of systems engineering concepts to achieve information assuranceent://SD_ILS/0/SD_ILS:2499162024-11-29T04:40:22Z2024-11-29T04:40:22ZYazar Jacobs, Stuart.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim IEEE Xplore <a href="http://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=6047604">http://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=6047604</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Security strategy from requirements to realityent://SD_ILS/0/SD_ILS:2888512024-11-29T04:40:22Z2024-11-29T04:40:22ZYazar Stackpole, Bill. Oksendahl, Eric.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://marc.crcnetbase.com/isbn/9781439827345">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>The security risk assessment handbook a complete guide for performing security risk assessmentsent://SD_ILS/0/SD_ILS:2888902024-11-29T04:40:22Z2024-11-29T04:40:22ZYazar Landoll, Douglas J.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://marc.crcnetbase.com/isbn/9781439821497">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Security de-engineering solving the problems in information risk managementent://SD_ILS/0/SD_ILS:2862092024-11-29T04:40:22Z2024-11-29T04:40:22ZYazar Tibble, Ian.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://marc.crcnetbase.com/isbn/9781439868355">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Security in computingent://SD_ILS/0/SD_ILS:3132972024-11-29T04:40:22Z2024-11-29T04:40:22ZYazar Pfleeger, Charles P., 1948-<br/>Yer Numarası QA76.9 A25 P45 2011<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>Auditing cloud computing a security and privacy guideent://SD_ILS/0/SD_ILS:2992632024-11-29T04:40:22Z2024-11-29T04:40:22ZYazar Halpert, Ben, 1986-<br/>Yer Numarası ONLINE<br/>Elektronik Erişim Image <a href="http://images.contentreserve.com/ImageType-100/0128-1/{F889EE2A-CF12-4647-85E0-03258F227FC1}Img100.jpg">http://images.contentreserve.com/ImageType-100/0128-1/{F889EE2A-CF12-4647-85E0-03258F227FC1}Img100.jpg</a>
Books24x7 <a href="http://www.books24x7.com/marc.asp?bookid=44303">http://www.books24x7.com/marc.asp?bookid=44303</a>
John Wiley <a href="http://dx.doi.org/10.1002/9781118269091">http://dx.doi.org/10.1002/9781118269091</a>
OverDrive (PDF) <a href="http://www.contentreserve.com/TitleInfo.asp?ID={F889EE2A-CF12-4647-85E0-03258F227FC1}&Format=50">http://www.contentreserve.com/TitleInfo.asp?ID={F889EE2A-CF12-4647-85E0-03258F227FC1}&Format=50</a>
OverDrive (EPUB) <a href="http://www.contentreserve.com/TitleInfo.asp?ID={F889EE2A-CF12-4647-85E0-03258F227FC1}&Format=410">http://www.contentreserve.com/TitleInfo.asp?ID={F889EE2A-CF12-4647-85E0-03258F227FC1}&Format=410</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>IT auditing using controls to protect information assetsent://SD_ILS/0/SD_ILS:2932622024-11-29T04:40:22Z2024-11-29T04:40:22ZYazar Davis, Chris (Christopher Michael) Schiller, Mike. Wheeler, Kevin.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://mhebooklibrary.com/reader/auditing-using-controls-to-protect-information-assets-2nd-edition">Subscription required</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Practical risk management for the CIOent://SD_ILS/0/SD_ILS:2915712024-11-29T04:40:22Z2024-11-29T04:40:22ZYazar Scherling, Mark.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://marc.crcnetbase.com/isbn/9781439856543">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>The executive MBA in information securityent://SD_ILS/0/SD_ILS:2869312024-11-29T04:40:22Z2024-11-29T04:40:22ZYazar Trinckes, John J.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://marc.crcnetbase.com/isbn/9781439810088">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Information technology risk management in enterprise environments a review of industry practices and a practical guide to risk management teamsent://SD_ILS/0/SD_ILS:2978622024-11-29T04:40:22Z2024-11-29T04:40:22ZYazar Kouns, Jake. Minoli, Daniel, 1952- Wiley InterScience (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim John Wiley <a href="http://dx.doi.org/10.1002/9780470558133">http://dx.doi.org/10.1002/9780470558133</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Information warfareent://SD_ILS/0/SD_ILS:3040692024-11-29T04:40:22Z2024-11-29T04:40:22ZYazar Ventre, Daniel.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim John Wiley <a href="http://dx.doi.org/10.1002/9781118381533">http://dx.doi.org/10.1002/9781118381533</a>
<a href="http://lib.myilibrary.com?id=477736">http://lib.myilibrary.com?id=477736</a>
OverDrive (PDF) <a href="http://www.contentreserve.com/TitleInfo.asp?ID={02D73229-3728-4EE5-942B-28D4B82AED18}&Format=50">http://www.contentreserve.com/TitleInfo.asp?ID={02D73229-3728-4EE5-942B-28D4B82AED18}&Format=50</a>
OverDrive (EPUB) <a href="http://www.contentreserve.com/TitleInfo.asp?ID={02D73229-3728-4EE5-942B-28D4B82AED18}&Format=410">http://www.contentreserve.com/TitleInfo.asp?ID={02D73229-3728-4EE5-942B-28D4B82AED18}&Format=410</a>
OverDrive (READ) <a href="http://www.contentreserve.com/TitleInfo.asp?ID={02D73229-3728-4EE5-942B-28D4B82AED18}&Format=610">http://www.contentreserve.com/TitleInfo.asp?ID={02D73229-3728-4EE5-942B-28D4B82AED18}&Format=610</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>CISO soft skills securing organizations impaired by employee politics, apathy, and intolerant perspectivesent://SD_ILS/0/SD_ILS:2887442024-11-29T04:40:22Z2024-11-29T04:40:22ZYazar Collette, Ronald D. Gentile, Michael. Gentile, Skye.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://marc.crcnetbase.com/isbn/9781420089110">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Data protection governance, risk management, and complianceent://SD_ILS/0/SD_ILS:2897002024-11-29T04:40:22Z2024-11-29T04:40:22ZYazar Hill, David G. (David Gary), 1943-<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://marc.crcnetbase.com/isbn/9781439806937">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Information security management metrics a definitive guide to effective security monitoring and measurementent://SD_ILS/0/SD_ILS:2913732024-11-29T04:40:22Z2024-11-29T04:40:22ZYazar Brotby, W. Krag.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://marc.crcnetbase.com/isbn/9781420052862">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Information security governance a practical development and implementation approachent://SD_ILS/0/SD_ILS:2977432024-11-29T04:40:22Z2024-11-29T04:40:22ZYazar Brotby, W. Krag.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim Ebook Library <a href="http://public.eblib.com/EBLPublic/PublicView.do?ptiID=433807">http://public.eblib.com/EBLPublic/PublicView.do?ptiID=433807</a>
John Wiley <a href="http://dx.doi.org/10.1002/9780470476017">http://dx.doi.org/10.1002/9780470476017</a>
<a href="http://site.ebrary.com/lib/alltitles/Doc?id=10313652">http://site.ebrary.com/lib/alltitles/Doc?id=10313652</a>
<a href="http://swb.eblib.com/patron/FullRecord.aspx?p=433807">http://swb.eblib.com/patron/FullRecord.aspx?p=433807</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Information assurance architectureent://SD_ILS/0/SD_ILS:2911232024-11-29T04:40:22Z2024-11-29T04:40:22ZYazar Willett, Keith D.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://marc.crcnetbase.com/isbn/9780849380686">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Infosecurity 2008 threat analysisent://SD_ILS/0/SD_ILS:1455412024-11-29T04:40:22Z2024-11-29T04:40:22ZYazar Clark, Champ, III.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492249">http://www.sciencedirect.com/science/book/9781597492249</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Netcat power toolsent://SD_ILS/0/SD_ILS:1462772024-11-29T04:40:22Z2024-11-29T04:40:22ZYazar Kanclirz, Jan. Baskin, Brian.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492577">http://www.sciencedirect.com/science/book/9781597492577</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Information security design, implementation, measurement, and complianceent://SD_ILS/0/SD_ILS:2884902024-11-29T04:40:22Z2024-11-29T04:40:22ZYazar Layton, Timothy P.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://marc.crcnetbase.com/isbn/9781420013412">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>FISMA certification & accreditation handbookent://SD_ILS/0/SD_ILS:1458762024-11-29T04:40:22Z2024-11-29T04:40:22ZYazar Taylor, Laura. Shepherd, Matthew.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491167">http://www.sciencedirect.com/science/book/9781597491167</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Security in computingent://SD_ILS/0/SD_ILS:1106822024-11-29T04:40:22Z2024-11-29T04:40:22ZYazar Pfleeger, Charles P., 1948-<br/>Yer Numarası QA76.9.A25 P45 2007<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>FISMA certification & accreditation handbookent://SD_ILS/0/SD_ILS:1121692024-11-29T04:40:22Z2024-11-29T04:40:22ZYazar Taylor, Laura. Shepherd, Matthew. ScienceDirect (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491167">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Insider threat protecting the enterprise from sabotage, spying, and theftent://SD_ILS/0/SD_ILS:2536612024-11-29T04:40:22Z2024-11-29T04:40:22ZYazar Cole, Eric. Ring, Sandra.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim Volltext <a href="http://www.sciencedirect.com/science/book/9781597490481">http://www.sciencedirect.com/science/book/9781597490481</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>The security risk assessment handbook a complete guide for performing security risk assessmentsent://SD_ILS/0/SD_ILS:2847902024-11-29T04:40:22Z2024-11-29T04:40:22ZYazar Landoll, Douglas J.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://marc.crcnetbase.com/isbn/9781420031232">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>The CISO handbook a practical guide to securing your companyent://SD_ILS/0/SD_ILS:2904162024-11-29T04:40:22Z2024-11-29T04:40:22ZYazar Gentile, Michael. Collette, Ronald D. August, Thomas D.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://marc.crcnetbase.com/isbn/9781420031379">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Implementing database security and auditing a guide for DBAs, information security administrators and auditorsent://SD_ILS/0/SD_ILS:2538602024-11-29T04:40:22Z2024-11-29T04:40:22ZYazar Ben-Natan, Ron.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781555583347">http://www.sciencedirect.com/science/book/9781555583347</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Intrusion prevention and active response deploying network and host IPSent://SD_ILS/0/SD_ILS:2540172024-11-29T04:40:22Z2024-11-29T04:40:22ZYazar Rash, Michael (Michael Brandon)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781932266474">http://www.sciencedirect.com/science/book/9781932266474</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Assessing and managing security risk in IT systems a structured methodologyent://SD_ILS/0/SD_ILS:2854882024-11-29T04:40:22Z2024-11-29T04:40:22ZYazar McCumber, John, 1956-<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://marc.crcnetbase.com/isbn/9780203490426">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>A practical guide to security assessmentsent://SD_ILS/0/SD_ILS:2883062024-11-29T04:40:22Z2024-11-29T04:40:22ZYazar Kairab, Sudhanshu.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://marc.crcnetbase.com/isbn/9780203507230">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Information security fundamentalsent://SD_ILS/0/SD_ILS:2891552024-11-29T04:40:22Z2024-11-29T04:40:22ZYazar Peltier, Thomas R. Peltier, Justin. Blackley, John A.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://marc.crcnetbase.com/isbn/9780203488652">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Investigator's guide to steganographyent://SD_ILS/0/SD_ILS:2864022024-11-29T04:40:22Z2024-11-29T04:40:22ZYazar Kipper, Gregory.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://marc.crcnetbase.com/isbn/9780203504765">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Information security policies and procedures a practitioner's referenceent://SD_ILS/0/SD_ILS:2901372024-11-29T04:40:22Z2024-11-29T04:40:22ZYazar Peltier, Thomas R.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://marc.crcnetbase.com/isbn/9780203488737">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Surviving security how to integrate people, process, and technologyent://SD_ILS/0/SD_ILS:2845832024-11-29T04:40:22Z2024-11-29T04:40:22ZYazar Andress, Amanda.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://marc.crcnetbase.com/isbn/9780203501405">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Building a global information assurance programent://SD_ILS/0/SD_ILS:2874732024-11-29T04:40:22Z2024-11-29T04:40:22ZYazar Curts, Raymond J. Campbell, Douglas E., 1954-<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://marc.crcnetbase.com/isbn/9780203997550">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Information security policies, procedures, and standards guidelines for effective information security managementent://SD_ILS/0/SD_ILS:2902092024-11-29T04:40:22Z2024-11-29T04:40:22ZYazar Peltier, Thomas R.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://marc.crcnetbase.com/isbn/9780849390326">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>A practical guide to security engineering and information assuranceent://SD_ILS/0/SD_ILS:2904612024-11-29T04:40:22Z2024-11-29T04:40:22ZYazar Herrmann, Debra S.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://marc.crcnetbase.com/isbn/9781420031492">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Digital watermarkingent://SD_ILS/0/SD_ILS:2538892024-11-29T04:40:22Z2024-11-29T04:40:22ZYazar Cox, I. J. (Ingemar J.) Miller, Matthew L. Bloom, Jeffrey A. (Jeffrey Adam), 1964-<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781558607149">http://www.sciencedirect.com/science/book/9781558607149</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Technology and privacy : the new landscapeent://SD_ILS/0/SD_ILS:1129992024-11-29T04:40:22Z2024-11-29T04:40:22ZYazar Agre, Philip. Rotenberg, Marc.<br/>Yer Numarası QA76.9.A25 T43 2001<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>Data privacy in the information ageent://SD_ILS/0/SD_ILS:1351252024-11-29T04:40:22Z2024-11-29T04:40:22ZYazar Klosek, Jacqueline.<br/>Yer Numarası QA76.9.A25 K57 2000<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>