Arama Sonu&ccedil;lar&#305; Data protection. - Daralt&#305;lm&#305;&#351;: Database security. SirsiDynix Enterprise https://katalog.hacettepe.edu.tr/client/tr_TR/default_tr/default_tr/qu$003dData$002bprotection.$0026qf$003dSUBJECT$002509Konu$002509Database$002bsecurity.$002509Database$002bsecurity.$0026ic$003dtrue$0026ps$003d300?dt=list 2025-12-05T20:38:48Z Enterprise architecture and information assurance : developing a secure foundation ent://SD_ILS/0/SD_ILS:538768 2025-12-05T20:38:48Z 2025-12-05T20:38:48Z Yazar&#160;Scholz, James A., author.<br/>Yer Numaras&#305;&#160;QA76.9 .D314 S34 2014<br/>Elektronik Eri&#351;im&#160;<a href="https://www.taylorfrancis.com/books/9781439841600">Click here to view.</a><br/>Format:&#160;Kitap<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> The complete book of data anonymization : from planning to implementation ent://SD_ILS/0/SD_ILS:540169 2025-12-05T20:38:48Z 2025-12-05T20:38:48Z Yazar&#160;Raghunathan, Balaji., author.<br/>Yer Numaras&#305;&#160;QA76.9 .A25 R338 2013<br/>Elektronik Eri&#351;im&#160;<a href="https://www.taylorfrancis.com/books/9781439877319">Click here to view.</a><br/>Format:&#160;Kitap<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Information security risk assessment toolkit practical assessments through data collection and data analysis ent://SD_ILS/0/SD_ILS:145470 2025-12-05T20:38:48Z 2025-12-05T20:38:48Z Yazar&#160;Talabis, Mark.&#160;Martin, Jason.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597497350">http://www.sciencedirect.com/science/book/9781597497350</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> IT auditing using controls to protect information assets ent://SD_ILS/0/SD_ILS:293262 2025-12-05T20:38:48Z 2025-12-05T20:38:48Z Yazar&#160;Davis, Chris (Christopher Michael)&#160;Schiller, Mike.&#160;Wheeler, Kevin.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://mhebooklibrary.com/reader/auditing-using-controls-to-protect-information-assets-2nd-edition">Subscription required</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Security de-engineering : solving the problems in information risk management ent://SD_ILS/0/SD_ILS:545608 2025-12-05T20:38:48Z 2025-12-05T20:38:48Z Yazar&#160;Tibble, Ian., author.<br/>Yer Numaras&#305;&#160;HF5548.37 .T53 2011<br/>Elektronik Eri&#351;im&#160;<a href="https://www.taylorfrancis.com/books/9781439868355">Click here to view.</a><br/>Format:&#160;Kitap<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Infosecurity 2008 threat analysis ent://SD_ILS/0/SD_ILS:145541 2025-12-05T20:38:48Z 2025-12-05T20:38:48Z Yazar&#160;Clark, Champ, III.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492249">http://www.sciencedirect.com/science/book/9781597492249</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Implementing database security and auditing a guide for DBAs, information security administrators and auditors ent://SD_ILS/0/SD_ILS:253860 2025-12-05T20:38:48Z 2025-12-05T20:38:48Z Yazar&#160;Ben-Natan, Ron.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781555583347">http://www.sciencedirect.com/science/book/9781555583347</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/>