Arama Sonuçları Information security. - Daraltılmış: Computer security.
SirsiDynix Enterprise
https://katalog.hacettepe.edu.tr/client/tr_TR/default_tr/default_tr/qu$003dInformation$002bsecurity.$0026qf$003dSUBJECT$002509Konu$002509Computer$002bsecurity.$002509Computer$002bsecurity.$0026ps$003d300?dt=list
2026-01-18T00:32:20Z
Information security fundamentals
ent://SD_ILS/0/SD_ILS:539922
2026-01-18T00:32:20Z
2026-01-18T00:32:20Z
Yazar Peltier, Thomas R.<br/>Yer Numarası QA76.9 .A25<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9780429130281">Taylor & Francis eBooks</a>
Taylor & Francis <a href="https://www.taylorfrancis.com/books/9780429130281">https://www.taylorfrancis.com/books/9780429130281</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Elementary information security
ent://SD_ILS/0/SD_ILS:271272
2026-01-18T00:32:20Z
2026-01-18T00:32:20Z
Yazar Smith, Richard E.<br/>Yer Numarası QA76.9.A25 S652 2013<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>
Information security fundamentals
ent://SD_ILS/0/SD_ILS:545226
2026-01-18T00:32:20Z
2026-01-18T00:32:20Z
Yazar Peltier, Thomas R., author. Peltier, Justin. Blackley, John A.<br/>Yer Numarası QA76.9 .A25 P427 2005<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9781135493738">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>
Information security and optimization
ent://SD_ILS/0/SD_ILS:556640
2026-01-18T00:32:20Z
2026-01-18T00:32:20Z
Yazar Tanwar, Rohit, editor. Choudhury, Tanupriya, editor. Zamani, Mazdak, editor. Gupta, Sunil, 1979- editor.<br/>Yer Numarası QA76.9 .A25 I63 2021<br/>Elektronik Erişim Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003045854">https://www.taylorfrancis.com/books/9781003045854</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Information security risk analysis
ent://SD_ILS/0/SD_ILS:538713
2026-01-18T00:32:20Z
2026-01-18T00:32:20Z
Yazar Peltier, Thomas R., author.<br/>Yer Numarası QA76.9 .A25 P429 2010<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9781439839577">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>
Information security risk analysis
ent://SD_ILS/0/SD_ILS:544821
2026-01-18T00:32:20Z
2026-01-18T00:32:20Z
Yazar Peltier, Thomas R., author.<br/>Yer Numarası QA76.9 .A25 P429 2005<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9781420031195">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>
Information security principles and practice
ent://SD_ILS/0/SD_ILS:298878
2026-01-18T00:32:20Z
2026-01-18T00:32:20Z
Yazar Stamp, Mark.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim Wiley InterScience <a href="http://dx.doi.org/10.1002/9781118027974">An electronic book accessible through the World Wide Web; click for information</a>
Ebook Library <a href="http://public.eblib.com/EBLPublic/PublicView.do?ptiID=738753">http://public.eblib.com/EBLPublic/PublicView.do?ptiID=738753</a>
<a href="http://site.ebrary.com/lib/alltitles/Doc?id=10478419">http://site.ebrary.com/lib/alltitles/Doc?id=10478419</a>
<a href="http://swb.eblib.com/patron/FullRecord.aspx?p=738753">http://swb.eblib.com/patron/FullRecord.aspx?p=738753</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Information security a strategic approach
ent://SD_ILS/0/SD_ILS:249831
2026-01-18T00:32:20Z
2026-01-18T00:32:20Z
Yazar LeVeque, Vincent.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim IEEE Xplore <a href="http://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=5989138">http://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=5989138</a>
IEEE Xplore <a href="http://ieeexplore.ieee.org/servlet/opac?bknumber=5989138">http://ieeexplore.ieee.org/servlet/opac?bknumber=5989138</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Information security principles and practice
ent://SD_ILS/0/SD_ILS:301803
2026-01-18T00:32:20Z
2026-01-18T00:32:20Z
Yazar Stamp, Mark.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://www.contentreserve.com/TitleInfo.asp?ID={310C0D18-7395-435E-BA71-41A0448F3D13}&Format=50">Click for information</a>
Ebook Library <a href="http://public.eblib.com/EBLPublic/PublicView.do?ptiID=240929">http://public.eblib.com/EBLPublic/PublicView.do?ptiID=240929</a>
John Wiley <a href="http://dx.doi.org/10.1002/0471744190">http://dx.doi.org/10.1002/0471744190</a>
<a href="http://www3.interscience.wiley.com/cgi-bin/bookhome/109933408">http://www3.interscience.wiley.com/cgi-bin/bookhome/109933408</a>
HathiTrust Digital Library, Limited view (search only) <a href="http://catalog.hathitrust.org/api/volumes/oclc/57754240.html">http://catalog.hathitrust.org/api/volumes/oclc/57754240.html</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Information security : principles and practice
ent://SD_ILS/0/SD_ILS:109477
2026-01-18T00:32:20Z
2026-01-18T00:32:20Z
Yazar Stamp, Mark.<br/>Yer Numarası QA76.9.A25 S69 2006<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>
Blockchain for information security and privacy
ent://SD_ILS/0/SD_ILS:580861
2026-01-18T00:32:20Z
2026-01-18T00:32:20Z
Yazar Rao, Udai Pratap, editor.<br/>Yer Numarası QA76.9 .B56 B555 2022<br/>Elektronik Erişim Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003129486">https://www.taylorfrancis.com/books/9781003129486</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Building a practical information security program
ent://SD_ILS/0/SD_ILS:459146
2026-01-18T00:32:20Z
2026-01-18T00:32:20Z
Yazar Andress, Jason, author. Leary, Mark, author.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128020425">http://www.sciencedirect.com/science/book/9780128020425</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
The executive MBA in information security
ent://SD_ILS/0/SD_ILS:539948
2026-01-18T00:32:20Z
2026-01-18T00:32:20Z
Yazar Trinckes, John J., author.<br/>Yer Numarası HF5548.37 .T75 2010<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9781439810088">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>
Creating an information security program from scratch
ent://SD_ILS/0/SD_ILS:576963
2026-01-18T00:32:20Z
2026-01-18T00:32:20Z
Yazar Williams, Walter (Telecommunications engineer), author.<br/>Yer Numarası QA76.9 .A25 W55 2022<br/>Elektronik Erişim Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003093688">https://www.taylorfrancis.com/books/9781003093688</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Developments in information security and cybernetic wars
ent://SD_ILS/0/SD_ILS:482187
2026-01-18T00:32:20Z
2026-01-18T00:32:20Z
Yazar Sarfraz, Muhammad, editor. IGI Global, publisher.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-8304-2">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-8304-2</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Security information and event management (SIEM) implementation
ent://SD_ILS/0/SD_ILS:293279
2026-01-18T00:32:20Z
2026-01-18T00:32:20Z
Yazar Miller, David, 1959 Nov. 5- Harris, Shon. Harper, Allen. VanDyke, Stephen. Blask, Chris.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://mhebooklibrary.com/reader/security-information-event-management-siem-implementation">Subscription required</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Honeypot : a new paradigm to information security
ent://SD_ILS/0/SD_ILS:545590
2026-01-18T00:32:20Z
2026-01-18T00:32:20Z
Yazar Joshi, R. C., author. Sardana, Anjali.<br/>Yer Numarası QA76.9 .A25 J66 2011<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9781439869994">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>
Building an effective information security policy architecture
ent://SD_ILS/0/SD_ILS:540985
2026-01-18T00:32:20Z
2026-01-18T00:32:20Z
Yazar Bacik, Sandy., author.<br/>Yer Numarası QA76.9 .A25 B335 2008<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9781420059069">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>
Zen and the art of information security
ent://SD_ILS/0/SD_ILS:145680
2026-01-18T00:32:20Z
2026-01-18T00:32:20Z
Yazar Winkler, Ira.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491686">http://www.sciencedirect.com/science/book/9781597491686</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Zen and the art of information security
ent://SD_ILS/0/SD_ILS:112214
2026-01-18T00:32:20Z
2026-01-18T00:32:20Z
Yazar Winkler, Ira. ScienceDirect (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491686">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Information security : design, implementation, measurement, and compliance
ent://SD_ILS/0/SD_ILS:545839
2026-01-18T00:32:20Z
2026-01-18T00:32:20Z
Yazar Layton, Timothy P., author.<br/>Yer Numarası HF5548.37 .L393 2007<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9781420013412">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>
Information security best practices 205 basic rules
ent://SD_ILS/0/SD_ILS:254779
2026-01-18T00:32:20Z
2026-01-18T00:32:20Z
Yazar Stefanek, George L.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781878707963">http://www.sciencedirect.com/science/book/9781878707963</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
A practical guide to security engineering and information assurance
ent://SD_ILS/0/SD_ILS:544973
2026-01-18T00:32:20Z
2026-01-18T00:32:20Z
Yazar Herrmann, Debra S., author.<br/>Yer Numarası QA76.9 .A25 H47 2002<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9781420031492">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>
Engineering information security the application of systems engineering concepts to achieve information assurance
ent://SD_ILS/0/SD_ILS:249916
2026-01-18T00:32:20Z
2026-01-18T00:32:20Z
Yazar Jacobs, Stuart.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim IEEE Xplore <a href="http://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=6047604">http://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=6047604</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
THEORISING CYBER (IN)SECURITY information, materiality, and entropic security.
ent://SD_ILS/0/SD_ILS:561001
2026-01-18T00:32:20Z
2026-01-18T00:32:20Z
Yazar Fouad, Noran Shafik.<br/>Yer Numarası QA76.9 .A25<br/>Elektronik Erişim Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003454113">https://www.taylorfrancis.com/books/9781003454113</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Information technology security and risk management : inductive cases for information security
ent://SD_ILS/0/SD_ILS:562664
2026-01-18T00:32:20Z
2026-01-18T00:32:20Z
Yazar Wingreen, Stephen C., editor. Samandari, Amelia, editor.<br/>Yer Numarası QA76.9 .A25<br/>Elektronik Erişim Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003264415">https://www.taylorfrancis.com/books/9781003264415</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
A comprehensive guide to information security management and audit
ent://SD_ILS/0/SD_ILS:581175
2026-01-18T00:32:20Z
2026-01-18T00:32:20Z
Yazar Banoth, Rajkumar, author. Gugulothu, Narsimha, author. Godishala, Aruna Kranthi, author.<br/>Yer Numarası HD38.7<br/>Elektronik Erişim Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003322191">https://www.taylorfrancis.com/books/9781003322191</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Introduction to machine learning with applications in information security
ent://SD_ILS/0/SD_ILS:581034
2026-01-18T00:32:20Z
2026-01-18T00:32:20Z
Yazar Stamp, Mark, author.<br/>Yer Numarası TK5105.59<br/>Elektronik Erişim Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003264873">https://www.taylorfrancis.com/books/9781003264873</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
IT GOVERNANCE AND INFORMATION SECURITY : guides, standards and frameworks.
ent://SD_ILS/0/SD_ILS:549396
2026-01-18T00:32:20Z
2026-01-18T00:32:20Z
Yazar Maleh, Yassine, 1987- Sahid, Abdelkebir, 1983- Alazab, Mamoun, 1980- Belaissaoui, Mustapha, 1968-<br/>Yer Numarası ONLINE<br/>Elektronik Erişim Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003161998">https://www.taylorfrancis.com/books/9781003161998</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
AUDITING INFORMATION AND CYBER SECURITY GOVERNANCE a controls-based approach.
ent://SD_ILS/0/SD_ILS:567234
2026-01-18T00:32:20Z
2026-01-18T00:32:20Z
Yazar Davis, Robert E.<br/>Yer Numarası HF5667<br/>Elektronik Erişim Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003099673">https://www.taylorfrancis.com/books/9781003099673</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
IT GOVERNANCE AND INFORMATION SECURITY : guides, standards and frameworks.
ent://SD_ILS/0/SD_ILS:567328
2026-01-18T00:32:20Z
2026-01-18T00:32:20Z
Yazar Maleh, Yassine, 1987- Sahid, Abdelkebir, 1983- Alazab, Mamoun, 1980- Belaissaoui, Mustapha, 1968-<br/>Yer Numarası QA76.9 .A25<br/>Elektronik Erişim Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003161998">https://www.taylorfrancis.com/books/9781003161998</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Recent trends in blockchain for information systems security and privacy
ent://SD_ILS/0/SD_ILS:576110
2026-01-18T00:32:20Z
2026-01-18T00:32:20Z
Yazar Tyagi, Amit Kumar, 1988- editor. Abraham, Ajith, 1968- editor.<br/>Yer Numarası QA76.9 .B56<br/>Elektronik Erişim Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003139737">https://www.taylorfrancis.com/books/9781003139737</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Advanced methodologies and technologies in system security, information privacy, and forensics
ent://SD_ILS/0/SD_ILS:482009
2026-01-18T00:32:20Z
2026-01-18T00:32:20Z
Yazar Khosrow-Pour, Mehdi, 1951- editor. IGI Global, publisher.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-7492-7">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-7492-7</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Trusted Computing and Information Security 12th Chinese Conference, CTCIS 2018, Wuhan, China, October 18, 2018, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:482982
2026-01-18T00:32:20Z
2026-01-18T00:32:20Z
Yazar Zhang, Huanguo. editor. Zhao, Bo. editor. Yan, Fei. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-981-13-5913-2">https://doi.org/10.1007/978-981-13-5913-2</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Codes, Cryptology and Information Security Third International Conference, C2SI 2019, Rabat, Morocco, April 22–24, 2019, Proceedings - In Honor of Said El Hajji
ent://SD_ILS/0/SD_ILS:483462
2026-01-18T00:32:20Z
2026-01-18T00:32:20Z
Yazar Carlet, Claude. editor. Guilley, Sylvain. editor. (orcid)0000-0002-5044-3534 Nitaj, Abderrahmane. editor. (orcid)0000-0002-0372-1757 Souidi, El Mamoun. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-030-16458-4">https://doi.org/10.1007/978-3-030-16458-4</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Information Security Practice and Experience 15th International Conference, ISPEC 2019, Kuala Lumpur, Malaysia, November 26–28, 2019, Proceedings
ent://SD_ILS/0/SD_ILS:483099
2026-01-18T00:32:20Z
2026-01-18T00:32:20Z
Yazar Heng, Swee-Huay. editor. (orcid)0000-0003-3627-2131 Lopez, Javier. editor. (orcid)0000-0001-8066-9991 SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-030-34339-2">https://doi.org/10.1007/978-3-030-34339-2</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Information Systems Security and Privacy 4th International Conference, ICISSP 2018, Funchal - Madeira, Portugal, January 22-24, 2018, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:483447
2026-01-18T00:32:20Z
2026-01-18T00:32:20Z
Yazar Mori, Paolo. editor. (orcid)0000-0002-6618-0388 Furnell, Steven. editor. (orcid)0000-0003-0984-7542 Camp, Olivier. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-030-25109-3">https://doi.org/10.1007/978-3-030-25109-3</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Applications and Techniques in Information Security 10th International Conference, ATIS 2019, Thanjavur, India, November 22–24, 2019, Proceedings
ent://SD_ILS/0/SD_ILS:483576
2026-01-18T00:32:20Z
2026-01-18T00:32:20Z
Yazar Shankar Sriram, V. S. editor. (orcid)0000-0001-7870-7944 Subramaniyaswamy, V. editor. Sasikaladevi, N. editor. (orcid)0000-0002-0841-502X Zhang, Leo. editor. Batten, Lynn. editor. (orcid)0000-0003-4525-2423<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-981-15-0871-4">https://doi.org/10.1007/978-981-15-0871-4</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Information Security and Cryptology – ICISC 2018 21st International Conference, Seoul, South Korea, November 28–30, 2018, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:483841
2026-01-18T00:32:20Z
2026-01-18T00:32:20Z
Yazar Lee, Kwangsu. editor. (orcid)0000-0003-1910-8890 SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-030-12146-4">https://doi.org/10.1007/978-3-030-12146-4</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Information Security Theory and Practice 12th IFIP WG 11.2 International Conference, WISTP 2018, Brussels, Belgium, December 10–11, 2018, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:484518
2026-01-18T00:32:20Z
2026-01-18T00:32:20Z
Yazar Blazy, Olivier. editor. (orcid)0000-0001-6205-8249 Yeun, Chan Yeob. editor. (orcid)0000-0002-1398-952X SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-030-20074-9">https://doi.org/10.1007/978-3-030-20074-9</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Information Security Applications 19th International Conference, WISA 2018, Jeju Island, Korea, August 23–25, 2018, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:485283
2026-01-18T00:32:20Z
2026-01-18T00:32:20Z
Yazar Kang, Brent ByungHoon. editor. (orcid)0000-0001-8984-1006 Jang, JinSoo. editor. (orcid)0000-0003-2070-2408 SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-030-17982-3">https://doi.org/10.1007/978-3-030-17982-3</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Information Security and Cryptology 14th International Conference, Inscrypt 2018, Fuzhou, China, December 14-17, 2018, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:485829
2026-01-18T00:32:20Z
2026-01-18T00:32:20Z
Yazar Guo, Fuchun. editor. (orcid)0000-0001-6939-7710 Huang, Xinyi. editor. Yung, Moti. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-030-14234-6">https://doi.org/10.1007/978-3-030-14234-6</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Critical Information Infrastructures Security 13th International Conference, CRITIS 2018, Kaunas, Lithuania, September 24-26, 2018, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:484061
2026-01-18T00:32:20Z
2026-01-18T00:32:20Z
Yazar Luiijf, Eric. editor. (orcid)0000-0002-1821-9890 Žutautaitė, Inga. editor. (orcid)0000-0002-6073-2823 Hämmerli, Bernhard M. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-030-05849-4">https://doi.org/10.1007/978-3-030-05849-4</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Advances in Information and Computer Security 14th International Workshop on Security, IWSEC 2019, Tokyo, Japan, August 28–30, 2019, Proceedings
ent://SD_ILS/0/SD_ILS:484666
2026-01-18T00:32:20Z
2026-01-18T00:32:20Z
Yazar Attrapadung, Nuttapong. editor. (orcid)0000-0003-4116-1751 Yagi, Takeshi. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-030-26834-3">https://doi.org/10.1007/978-3-030-26834-3</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Information Security 22nd International Conference, ISC 2019, New York City, NY, USA, September 16–18, 2019, Proceedings
ent://SD_ILS/0/SD_ILS:484908
2026-01-18T00:32:20Z
2026-01-18T00:32:20Z
Yazar Lin, Zhiqiang. editor. Papamanthou, Charalampos. editor. Polychronakis, Michalis. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-030-30215-3">https://doi.org/10.1007/978-3-030-30215-3</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Innovative Security Solutions for Information Technology and Communications 11th International Conference, SecITC 2018, Bucharest, Romania, November 8–9, 2018, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:486352
2026-01-18T00:32:20Z
2026-01-18T00:32:20Z
Yazar Lanet, Jean-Louis. editor. (orcid)0000-0002-4751-3941 Toma, Cristian. editor. (orcid)0000-0001-9316-7739 SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-030-12942-2">https://doi.org/10.1007/978-3-030-12942-2</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Information and Operational Technology Security Systems First International Workshop, IOSec 2018, CIPSEC Project, Heraklion, Crete, Greece, September 13, 2018, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:486944
2026-01-18T00:32:20Z
2026-01-18T00:32:20Z
Yazar Fournaris, Apostolos P. editor. (orcid)0000-0002-4758-2349 Lampropoulos, Konstantinos. editor. Marín Tordera, Eva. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-030-12085-6">https://doi.org/10.1007/978-3-030-12085-6</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Information Security and Privacy 24th Australasian Conference, ACISP 2019, Christchurch, New Zealand, July 3–5, 2019, Proceedings
ent://SD_ILS/0/SD_ILS:486956
2026-01-18T00:32:20Z
2026-01-18T00:32:20Z
Yazar Jang-Jaccard, Julian. editor. (orcid)0000-0002-1002-057X Guo, Fuchun. editor. (orcid)0000-0001-6939-7710 SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-030-21548-4">https://doi.org/10.1007/978-3-030-21548-4</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Information Security Practice and Experience 14th International Conference, ISPEC 2018, Tokyo, Japan, September 25-27, 2018, Proceedings
ent://SD_ILS/0/SD_ILS:399972
2026-01-18T00:32:20Z
2026-01-18T00:32:20Z
Yazar Su, Chunhua. editor. Kikuchi, Hiroaki. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-319-99807-7">https://doi.org/10.1007/978-3-319-99807-7</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Critical Information Infrastructures Security 12th International Conference, CRITIS 2017, Lucca, Italy, October 8-13, 2017, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:399995
2026-01-18T00:32:20Z
2026-01-18T00:32:20Z
Yazar D'Agostino, Gregorio. editor. (orcid)0000-0003-3657-5335 Scala, Antonio. editor. (orcid)0000-0002-3414-2686 SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-319-99843-5">https://doi.org/10.1007/978-3-319-99843-5</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Information Security 21st International Conference, ISC 2018, Guildford, UK, September 9–12, 2018, Proceedings
ent://SD_ILS/0/SD_ILS:400194
2026-01-18T00:32:20Z
2026-01-18T00:32:20Z
Yazar Chen, Liqun. editor. (orcid)0000-0003-2680-4907 Manulis, Mark. editor. (orcid)0000-0002-1512-9670 Schneider, Steve. editor. (orcid)0000-0001-8365-6993 SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-319-99136-8">https://doi.org/10.1007/978-3-319-99136-8</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Advances in Information and Computer Security 13th International Workshop on Security, IWSEC 2018, Sendai, Japan, September 3-5, 2018, Proceedings
ent://SD_ILS/0/SD_ILS:400111
2026-01-18T00:32:20Z
2026-01-18T00:32:20Z
Yazar Inomata, Atsuo. editor. Yasuda, Kan. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-319-97916-8">https://doi.org/10.1007/978-3-319-97916-8</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Information Security and Cryptology 13th International Conference, Inscrypt 2017, Xi'an, China, November 3–5, 2017, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:400830
2026-01-18T00:32:20Z
2026-01-18T00:32:20Z
Yazar Chen, Xiaofeng. editor. Lin, Dongdai. editor. Yung, Moti. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-319-75160-3">https://doi.org/10.1007/978-3-319-75160-3</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Information Systems Security and Privacy Third International Conference, ICISSP 2017, Porto, Portugal, February 19-21, 2017, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:401486
2026-01-18T00:32:20Z
2026-01-18T00:32:20Z
Yazar Mori, Paolo. editor. Furnell, Steven. editor. (orcid)0000-0003-0984-7542 Camp, Olivier. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-319-93354-2">https://doi.org/10.1007/978-3-319-93354-2</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Information Security and Cryptology – ICISC 2017 20th International Conference, Seoul, South Korea, November 29 - December 1, 2017, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:401614
2026-01-18T00:32:20Z
2026-01-18T00:32:20Z
Yazar Kim, Howon. editor. Kim, Dong-Chan. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-319-78556-1">https://doi.org/10.1007/978-3-319-78556-1</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Information Security Applications 18th International Conference, WISA 2017, Jeju Island, Korea, August 24-26, 2017, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:401682
2026-01-18T00:32:20Z
2026-01-18T00:32:20Z
Yazar Kang, Brent ByungHoon. editor. (orcid)0000-0001-8984-1006 Kim, Taesoo. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-319-93563-8">https://doi.org/10.1007/978-3-319-93563-8</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Practical Information Security A Competency-Based Education Course
ent://SD_ILS/0/SD_ILS:401941
2026-01-18T00:32:20Z
2026-01-18T00:32:20Z
Yazar Alsmadi, Izzat. author. Burdwell, Robert. author. Aleroud , Ahmed. author. Wahbeh, Abdallah. author. Al-Qudah, Mahmoud. author.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-319-72119-4">https://doi.org/10.1007/978-3-319-72119-4</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Information Security and Privacy 23rd Australasian Conference, ACISP 2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings
ent://SD_ILS/0/SD_ILS:401992
2026-01-18T00:32:20Z
2026-01-18T00:32:20Z
Yazar Susilo, Willy. editor. (orcid)0000-0002-1562-5105 Yang, Guomin. editor. (orcid)0000-0002-4949-7738 SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-319-93638-3">https://doi.org/10.1007/978-3-319-93638-3</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Applications and Techniques in Information Security 9th International Conference, ATIS 2018, Nanning, China, November 9–11, 2018, Proceedings
ent://SD_ILS/0/SD_ILS:400376
2026-01-18T00:32:20Z
2026-01-18T00:32:20Z
Yazar Chen, Qingfeng. editor. Wu, Jia. editor. Zhang, Shichao. editor. Yuan, Changan. editor. Batten, Lynn. editor. (orcid)0000-0003-4525-2423<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-981-13-2907-4">https://doi.org/10.1007/978-981-13-2907-4</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Information and Communications Security 19th International Conference, ICICS 2017, Beijing, China, December 6-8, 2017, Proceedings
ent://SD_ILS/0/SD_ILS:400786
2026-01-18T00:32:20Z
2026-01-18T00:32:20Z
Yazar Qing, Sihan. editor. Mitchell, Chris. editor. Chen, Liqun. editor. Liu, Dongmei. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-319-89500-0">https://doi.org/10.1007/978-3-319-89500-0</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Information Security Theory and Practice 11th IFIP WG 11.2 International Conference, WISTP 2017, Heraklion, Crete, Greece, September 28–29, 2017, Proceedings
ent://SD_ILS/0/SD_ILS:402215
2026-01-18T00:32:20Z
2026-01-18T00:32:20Z
Yazar Hancke, Gerhard P. editor. Damiani, Ernesto. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-319-93524-9">https://doi.org/10.1007/978-3-319-93524-9</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Information security science : measuring the vulnerability to data compromises
ent://SD_ILS/0/SD_ILS:458968
2026-01-18T00:32:20Z
2026-01-18T00:32:20Z
Yazar Young, Carl S., author.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128096437">http://www.sciencedirect.com/science/book/9780128096437</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Information security analytics finding security insights, patterns, and anomalies in big data
ent://SD_ILS/0/SD_ILS:355388
2026-01-18T00:32:20Z
2026-01-18T00:32:20Z
Yazar Talabis, Mark, author. McPherson, Robert, author. Miyamoto, I, author. Martin, Jason L., author.<br/>Yer Numarası ONLINE(355388.1)<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128002070">http://www.sciencedirect.com/science/book/9780128002070</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Information Security and Cryptology 9th International Conference, Inscrypt 2013, Guangzhou, China, November 27-30, 2013, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:489108
2026-01-18T00:32:20Z
2026-01-18T00:32:20Z
Yazar Lin, Dongdai. editor. Xu, Shouhuai. editor. (orcid)0000-0001-8034-0942 Yung, Moti. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-319-12087-4">https://doi.org/10.1007/978-3-319-12087-4</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Information Security 17th International Conference, ISC 2014, Hong Kong, China, October 12-14, 2014, Proceedings
ent://SD_ILS/0/SD_ILS:485793
2026-01-18T00:32:20Z
2026-01-18T00:32:20Z
Yazar Chow, Sherman S.M. editor. Camenisch, Jan. editor. Hui, Lucas C.K. editor. Yiu, Siu Ming. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-319-13257-0">https://doi.org/10.1007/978-3-319-13257-0</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
ISSE 2014 Securing Electronic Business Processes Highlights of the Information Security Solutions Europe 2014 Conference
ent://SD_ILS/0/SD_ILS:487216
2026-01-18T00:32:20Z
2026-01-18T00:32:20Z
Yazar Reimer, Helmut. editor. Pohlmann, Norbert. editor. Schneider, Wolfgang. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-658-06708-3">https://doi.org/10.1007/978-3-658-06708-3</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Applications and Techniques in Information Security International Conference, ATIS 2014, Melbourne, Australia, November 26-28, 2014. Proceedings
ent://SD_ILS/0/SD_ILS:488011
2026-01-18T00:32:20Z
2026-01-18T00:32:20Z
Yazar Batten, Lynn. editor. Li, Gang. editor. (orcid)0000-0003-1583-641X Niu, Wenjia. editor. Warren, Matthew. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-662-45670-5">https://doi.org/10.1007/978-3-662-45670-5</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Human Aspects of Information Security, Privacy, and Trust Second International Conference, HAS 2014, Held as Part of HCI International 2014, Heraklion, Crete, Greece, June 22-27, 2014, Proceedings
ent://SD_ILS/0/SD_ILS:488930
2026-01-18T00:32:20Z
2026-01-18T00:32:20Z
Yazar Tryfonas, Theo. editor. Askoxylakis, Ioannis. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-319-07620-1">https://doi.org/10.1007/978-3-319-07620-1</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Advances in Cryptology -- ASIACRYPT 2014 20th International Conference on the Theory and Application of Cryptology and Information Security, Kaoshiung, Taiwan, China, December 7-11, 2014, Part II
ent://SD_ILS/0/SD_ILS:488956
2026-01-18T00:32:20Z
2026-01-18T00:32:20Z
Yazar Sarkar, Palash. editor. Iwata, Tetsu. editor. (orcid)0000-0002-4729-0979 SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-662-45608-8">https://doi.org/10.1007/978-3-662-45608-8</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Information Security and Cryptology -- ICISC 2013 16th International Conference, Seoul, Korea, November 27-29, 2013, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:488986
2026-01-18T00:32:20Z
2026-01-18T00:32:20Z
Yazar Lee, Hyang-Sook. editor. Han, Dong-Guk. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-319-12160-4">https://doi.org/10.1007/978-3-319-12160-4</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Advances in Cryptology -- ASIACRYPT 2014 20th International Conference on the Theory and Application of Cryptology and Information Security, Kaoshiung, Taiwan, China, December 7-11, 2014, Proceedings, Part I
ent://SD_ILS/0/SD_ILS:489016
2026-01-18T00:32:20Z
2026-01-18T00:32:20Z
Yazar Sarkar, Palash. editor. Iwata, Tetsu. editor. (orcid)0000-0002-4729-0979 SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-662-45611-8">https://doi.org/10.1007/978-3-662-45611-8</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Availability, Reliability, and Security in Information Systems IFIP WG 8.4, 8.9, TC 5 International Cross-Domain Conference, CD-ARES 2014 and 4th InternationalWorkshop on Security and Cognitive Informatics for Homeland Defense, SeCIHD 2014, Fribourg, Switzerland, September 8-12, 2014. Proceedings
ent://SD_ILS/0/SD_ILS:489055
2026-01-18T00:32:20Z
2026-01-18T00:32:20Z
Yazar Teufel, Stephanie. editor. A Min, Tjoa. editor. You, Illsun. editor. Weippl, Edgar. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-319-10975-6">https://doi.org/10.1007/978-3-319-10975-6</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Information Security Practice and Experience 10th International Conference, ISPEC 2014, Fuzhou, China, May 5-8, 2014, Proceedings
ent://SD_ILS/0/SD_ILS:485513
2026-01-18T00:32:20Z
2026-01-18T00:32:20Z
Yazar Huang, Xinyi. editor. Zhou, Jianying. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-319-06320-1">https://doi.org/10.1007/978-3-319-06320-1</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Information Security Applications 14th International Workshop, WISA 2013, Jeju Island, Korea, August 19-21, 2013, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:486887
2026-01-18T00:32:20Z
2026-01-18T00:32:20Z
Yazar Kim, Yongdae. editor. Lee, Heejo. editor. Perrig, Adrian. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-319-05149-9">https://doi.org/10.1007/978-3-319-05149-9</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Information Security and Privacy 19th Australasian Conference, ACISP 2014, Wollongong, NSW, Australia, July 7-9, 2014. Proceedings
ent://SD_ILS/0/SD_ILS:487278
2026-01-18T00:32:20Z
2026-01-18T00:32:20Z
Yazar Susilo, Willy. editor. (orcid)0000-0002-1562-5105 Mu, Yi. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-319-08344-5">https://doi.org/10.1007/978-3-319-08344-5</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Advances in Information and Computer Security 9th International Workshop on Security, IWSEC 2014, Hirosaki, Japan, August 27-29, 2014. Proceedings
ent://SD_ILS/0/SD_ILS:487372
2026-01-18T00:32:20Z
2026-01-18T00:32:20Z
Yazar Yoshida, Maki. editor. Mouri, Koichi. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-319-09843-2">https://doi.org/10.1007/978-3-319-09843-2</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Information Theoretic Security 7th International Conference, ICITS 2013, Singapore, November 28-30, 2013, Proceedings
ent://SD_ILS/0/SD_ILS:489420
2026-01-18T00:32:20Z
2026-01-18T00:32:20Z
Yazar Padró, Carles. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-319-04268-8">https://doi.org/10.1007/978-3-319-04268-8</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Information Security Theory and Practice. Securing the Internet of Things 8th IFIP WG 11.2 International Workshop, WISTP 2014, Heraklion, Crete, Greece, June 30 - July 2, 2014, Proceedings
ent://SD_ILS/0/SD_ILS:489541
2026-01-18T00:32:20Z
2026-01-18T00:32:20Z
Yazar Naccache, David. editor. Sauveron, Damien. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-662-43826-8">https://doi.org/10.1007/978-3-662-43826-8</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Information Systems Security 10th International Conference, ICISS 2014, Hyderabad, India, December 16-20, 2014. Proceedings
ent://SD_ILS/0/SD_ILS:489545
2026-01-18T00:32:20Z
2026-01-18T00:32:20Z
Yazar Prakash, Atul. editor. Shyamasundar, Rudrapatna. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-319-13841-1">https://doi.org/10.1007/978-3-319-13841-1</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Information security policy development for compliance : ISO/IEC 27001, NIST SP 800-53, HIPAA standard, PCI DSS V2.0, and AUP V5.0
ent://SD_ILS/0/SD_ILS:545128
2026-01-18T00:32:20Z
2026-01-18T00:32:20Z
Yazar Williams, Barry L., author.<br/>Yer Numarası QA76.9 .A25 .W5495 2013<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9781466580596">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>
PRAGMATIC security metrics : applying metametrics to information security
ent://SD_ILS/0/SD_ILS:541797
2026-01-18T00:32:20Z
2026-01-18T00:32:20Z
Yazar Brotby, W. Krag., author. Hinson, Gary. Kabay, Michel E.<br/>Yer Numarası HD30.38 .B76 2013<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9781439881538">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>
The basics of information security understanding the fundamentals of InfoSec in theory and practice
ent://SD_ILS/0/SD_ILS:145371
2026-01-18T00:32:20Z
2026-01-18T00:32:20Z
Yazar Andress, Jason.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597496537">http://www.sciencedirect.com/science/book/9781597496537</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Security de-engineering : solving the problems in information risk management
ent://SD_ILS/0/SD_ILS:545608
2026-01-18T00:32:20Z
2026-01-18T00:32:20Z
Yazar Tibble, Ian., author.<br/>Yer Numarası HF5548.37 .T53 2011<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9781439868355">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>
Information security management metrics : a definitive guide to effective security monitoring and measurement
ent://SD_ILS/0/SD_ILS:546952
2026-01-18T00:32:20Z
2026-01-18T00:32:20Z
Yazar Brotby, W. Krag., author.<br/>Yer Numarası HD30.2 .B78 2009<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9781420052862">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>
Information assurance dependability and security in networked systems
ent://SD_ILS/0/SD_ILS:145553
2026-01-18T00:32:20Z
2026-01-18T00:32:20Z
Yazar Qian, Yi, 1962-<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780123735669">http://www.sciencedirect.com/science/book/9780123735669</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Intelligence and security informatics for international security : information sharing and data mining
ent://SD_ILS/0/SD_ILS:119786
2026-01-18T00:32:20Z
2026-01-18T00:32:20Z
Yazar Chen, Hsinchun.<br/>Yer Numarası QA76.76.E95 C44 2006<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>
Information security architecture : an integrated approach to security in the organization
ent://SD_ILS/0/SD_ILS:541238
2026-01-18T00:32:20Z
2026-01-18T00:32:20Z
Yazar Tudor, Jan Killmeyer., author.<br/>Yer Numarası QA76.9 .A25 T83 2006<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9780203488751">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>
Information security architecture : an integrated approach to security in the organization
ent://SD_ILS/0/SD_ILS:110865
2026-01-18T00:32:20Z
2026-01-18T00:32:20Z
Yazar Tudor, Jan Killmeyer.<br/>Yer Numarası QA76.9.A25 T83 2006<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>
Information security and ethics social and organizational issues
ent://SD_ILS/0/SD_ILS:152966
2026-01-18T00:32:20Z
2026-01-18T00:32:20Z
Yazar Quigley, Marian.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim EBSCOhost <a href="http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=108396">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=108396</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Implementing database security and auditing a guide for DBAs, information security administrators and auditors
ent://SD_ILS/0/SD_ILS:253860
2026-01-18T00:32:20Z
2026-01-18T00:32:20Z
Yazar Ben-Natan, Ron.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781555583347">http://www.sciencedirect.com/science/book/9781555583347</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Database and applications security : integrating information security and data management
ent://SD_ILS/0/SD_ILS:540220
2026-01-18T00:32:20Z
2026-01-18T00:32:20Z
Yazar Thuraisingham, Bhavani M., author.<br/>Yer Numarası QA76.9 .D314 T47 2005<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9780203486061">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>
Information security policies and procedures : a practitioner's reference
ent://SD_ILS/0/SD_ILS:547228
2026-01-18T00:32:20Z
2026-01-18T00:32:20Z
Yazar Peltier, Thomas R., author.<br/>Yer Numarası QA76.9 .A25 P428 2004<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9780203488737">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>
Information security policies, procedures, and standards : guidelines for effective information security management
ent://SD_ILS/0/SD_ILS:546817
2026-01-18T00:32:20Z
2026-01-18T00:32:20Z
Yazar Peltier, Thomas R., author.<br/>Yer Numarası QA76.9 .A25 P46 2002<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9780849390326">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>
Information security architecture : an integrated approach to security in the organization
ent://SD_ILS/0/SD_ILS:544953
2026-01-18T00:32:20Z
2026-01-18T00:32:20Z
Yazar Tudor, Jan Killmeyer.<br/>Yer Numarası QA76.9 .A25<br/>Elektronik Erişim Taylor & Francis <a href="https://www.taylorfrancis.com/books/9780429131790">https://www.taylorfrancis.com/books/9780429131790</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Versatile Cybersecurity
ent://SD_ILS/0/SD_ILS:399974
2026-01-18T00:32:20Z
2026-01-18T00:32:20Z
Yazar Conti, Mauro. editor. (orcid)0000-0002-3612-1934 Somani, Gaurav. editor. Poovendran, Radha. editor. (orcid)0000-0003-0269-8097 SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-319-97643-3">https://doi.org/10.1007/978-3-319-97643-3</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Network Science and Cybersecurity
ent://SD_ILS/0/SD_ILS:484756
2026-01-18T00:32:20Z
2026-01-18T00:32:20Z
Yazar Pino, Robinson E. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-1-4614-7597-2">https://doi.org/10.1007/978-1-4614-7597-2</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Cyber Defense and Situational Awareness
ent://SD_ILS/0/SD_ILS:485697
2026-01-18T00:32:20Z
2026-01-18T00:32:20Z
Yazar Kott, Alexander. editor. Wang, Cliff. editor. Erbacher, Robert F. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-319-11391-3">https://doi.org/10.1007/978-3-319-11391-3</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
The Hash Function BLAKE
ent://SD_ILS/0/SD_ILS:488367
2026-01-18T00:32:20Z
2026-01-18T00:32:20Z
Yazar Aumasson, Jean-Philippe. author. Meier, Willi. author. Phan, Raphael C.-W. author. Henzen, Luca. author. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-662-44757-4">https://doi.org/10.1007/978-3-662-44757-4</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Cybersecurity Systems for Human Cognition Augmentation
ent://SD_ILS/0/SD_ILS:488504
2026-01-18T00:32:20Z
2026-01-18T00:32:20Z
Yazar Pino, Robinson E. editor. Kott, Alexander. editor. Shevenell, Michael. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-319-10374-7">https://doi.org/10.1007/978-3-319-10374-7</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Touchless Palmprint Recognition Systems
ent://SD_ILS/0/SD_ILS:488861
2026-01-18T00:32:20Z
2026-01-18T00:32:20Z
Yazar Genovese, Angelo. author. Piuri, Vincenzo. author. Scotti, Fabio. author. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-319-10365-5">https://doi.org/10.1007/978-3-319-10365-5</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Data warehousing and data mining techniques for cyber security
ent://SD_ILS/0/SD_ILS:110434
2026-01-18T00:32:20Z
2026-01-18T00:32:20Z
Yazar Singhal, Anoop, 1958-<br/>Yer Numarası QA76.9.A25 S563 2007<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>
Hacker techniques, tools, and incident handling
ent://SD_ILS/0/SD_ILS:271438
2026-01-18T00:32:20Z
2026-01-18T00:32:20Z
Yazar Oriyano, Sean-Philip. Gregg, Michael (Michael C.)<br/>Yer Numarası TK5105.59 O786 2011<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>
Vulnerability management
ent://SD_ILS/0/SD_ILS:545698
2026-01-18T00:32:20Z
2026-01-18T00:32:20Z
Yazar Foreman, Park., author.<br/>Yer Numarası QA76.9 .A25 F656 2010<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9781439801512">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>
Privacy in practice : establish and operationalize a holistic data privacy program
ent://SD_ILS/0/SD_ILS:560699
2026-01-18T00:32:20Z
2026-01-18T00:32:20Z
Yazar Tang, Alan, (Information Security), author.<br/>Yer Numarası HF5548.37<br/>Elektronik Erişim Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003225089">https://www.taylorfrancis.com/books/9781003225089</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Handbook of system safety and security : cyber risk and risk management, cyber security, threat analysis, functional safety, software systems, and cyber physical systems
ent://SD_ILS/0/SD_ILS:459145
2026-01-18T00:32:20Z
2026-01-18T00:32:20Z
Yazar Griffor, Edward R., editor.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128037737">http://www.sciencedirect.com/science/book/9780128037737</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Auditing IT infrastructures for compliance
ent://SD_ILS/0/SD_ILS:271151
2026-01-18T00:32:20Z
2026-01-18T00:32:20Z
Yazar Weiss, Martin M. Solomon, Michael G.<br/>Yer Numarası QA76.9.A25 W428 2011<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>
Security policies and implementation issues
ent://SD_ILS/0/SD_ILS:271534
2026-01-18T00:32:20Z
2026-01-18T00:32:20Z
Yazar Johnson, Rob (Robert) Merkow, Mark S.<br/>Yer Numarası QA76.9.A25 J64 2011<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>
Security strategies in Linux platforms and applications
ent://SD_ILS/0/SD_ILS:271539
2026-01-18T00:32:20Z
2026-01-18T00:32:20Z
Yazar Jang, Michael H.<br/>Yer Numarası QA76.76.O63 J3638 2011<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>
Cybercrime and Internet technology : theory and practice--the computer network infostructure and computer security, cybersecurity laws, internet of things (IoT), and mobile devices
ent://SD_ILS/0/SD_ILS:553601
2026-01-18T00:32:20Z
2026-01-18T00:32:20Z
Yazar Alexandrou, Alex (Professor of information technology security), author.<br/>Yer Numarası HV6773<br/>Elektronik Erişim Taylor & Francis <a href="https://www.taylorfrancis.com/books/9780429318726">https://www.taylorfrancis.com/books/9780429318726</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Secure detection and control in cyber-physical systems : working in the presence of malicious data
ent://SD_ILS/0/SD_ILS:574476
2026-01-18T00:32:20Z
2026-01-18T00:32:20Z
Yazar Yan, Jiaqi, author. Mo, Yilin, author. Wen, Changyun, 1963- author.<br/>Yer Numarası QA76.9 .A25<br/>Elektronik Erişim Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003409199">https://www.taylorfrancis.com/books/9781003409199</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Quantum algorithms for enhancing cybersecurity in computational intelligence in healthcare
ent://SD_ILS/0/SD_ILS:589137
2026-01-18T00:32:20Z
2026-01-18T00:32:20Z
Yazar Singhal, Prateek, editor. Mishra, Pramod Kumar, editor. Hasan, Mokhtar Mohammed, editor.<br/>Yer Numarası R858<br/>Elektronik Erişim Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003597414">https://www.taylorfrancis.com/books/9781003597414</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Artificial intelligence technology in healthcare : security and privacy issues
ent://SD_ILS/0/SD_ILS:574411
2026-01-18T00:32:20Z
2026-01-18T00:32:20Z
Yazar Sharma, Neha (Computer scientist), editor. Srivastava, Durgesh (Computer scientist), editor. Sinwar, Deepak, editor.<br/>Yer Numarası R859.7 .A78<br/>Elektronik Erişim Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003377818">https://www.taylorfrancis.com/books/9781003377818</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Zero trust journey across the digital estate
ent://SD_ILS/0/SD_ILS:560700
2026-01-18T00:32:20Z
2026-01-18T00:32:20Z
Yazar Pillai, Binil, author. Kudrati, Abbas, author.<br/>Yer Numarası TK5105.59<br/>Elektronik Erişim Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003225096">https://www.taylorfrancis.com/books/9781003225096</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Global cyber security labor shortage and international business risk
ent://SD_ILS/0/SD_ILS:481810
2026-01-18T00:32:20Z
2026-01-18T00:32:20Z
Yazar Christiansen, Bryan, 1960- editor. Piekarz, Agnieszka, 1990- editor. IGI Global, publisher.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-5927-6">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-5927-6</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
SECURITY STRATEGY : from requirements to reality.
ent://SD_ILS/0/SD_ILS:545098
2026-01-18T00:32:20Z
2026-01-18T00:32:20Z
Yazar STACKPOLE, BILL.<br/>Yer Numarası QA76.9 .A25<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9780429152160">Taylor & Francis eBooks</a>
Taylor & Francis <a href="https://www.taylorfrancis.com/books/9780429152160">https://www.taylorfrancis.com/books/9780429152160</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Collaboration with cloud computing : security, social media, and unified communications
ent://SD_ILS/0/SD_ILS:355829
2026-01-18T00:32:20Z
2026-01-18T00:32:20Z
Yazar Messier, Ric, author.<br/>Yer Numarası ONLINE(355829.1)<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780124170407">http://www.sciencedirect.com/science/book/9780124170407</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Cyber threat! : how to manage the growing risk of cyber attacks
ent://SD_ILS/0/SD_ILS:342020
2026-01-18T00:32:20Z
2026-01-18T00:32:20Z
Yazar Ulsch, N. MacDonnell, 1951-<br/>Yer Numarası ONLINE(342020.1)<br/>Elektronik Erişim ebrary <a href="http://alltitles.ebrary.com/Doc?id=10895757">An electronic book accessible through the World Wide Web; click to view</a>
Ebook Library <a href="http://public.eblib.com/choice/publicfullrecord.aspx?p=1742833">http://public.eblib.com/choice/publicfullrecord.aspx?p=1742833</a>
John Wiley <a href="http://dx.doi.org/10.1002/9781118915028">http://dx.doi.org/10.1002/9781118915028</a>
MyiLibrary <a href="http://www.myilibrary.com?id=629214">http://www.myilibrary.com?id=629214</a>
Cover <a href="http://swbplus.bsz-bw.de/bsz410564842cov.htm">http://swbplus.bsz-bw.de/bsz410564842cov.htm</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Security management : a critical thinking approach
ent://SD_ILS/0/SD_ILS:539725
2026-01-18T00:32:20Z
2026-01-18T00:32:20Z
Yazar Land, Michael (Industrial engineer), author. Ricks, Truett A., author. Ricks, Bob, author.<br/>Yer Numarası HD61.5 .L36 2014<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9781466561786">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>
What every engineer should know about cyber security and digital forensics
ent://SD_ILS/0/SD_ILS:539726
2026-01-18T00:32:20Z
2026-01-18T00:32:20Z
Yazar DeFranco, Joanna F., author.<br/>Yer Numarası TK5105.59 .D44 2014<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9781466564541">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>
Security without obscurity : a guide to confidentiality, authentication, and integrity
ent://SD_ILS/0/SD_ILS:544118
2026-01-18T00:32:20Z
2026-01-18T00:32:20Z
Yazar Stapleton, Jeffrey James, author.<br/>Yer Numarası QA76.9 .A25 S734 2014<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9781466592155">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>
The security risk assessment handbook : a complete guide for performing security risk assessments
ent://SD_ILS/0/SD_ILS:539743
2026-01-18T00:32:20Z
2026-01-18T00:32:20Z
Yazar Landoll, Douglas J., author.<br/>Yer Numarası HF5548.37 .L358 2011<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9781439821497">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>
Security patch management
ent://SD_ILS/0/SD_ILS:542763
2026-01-18T00:32:20Z
2026-01-18T00:32:20Z
Yazar Nicastro, Felicia M., author.<br/>Yer Numarası QA76.9 .A25 N53 2011<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9781439825006">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>
Information technology risk management in enterprise environments a review of industry practices and a practical guide to risk management teams
ent://SD_ILS/0/SD_ILS:297862
2026-01-18T00:32:20Z
2026-01-18T00:32:20Z
Yazar Kouns, Jake. Minoli, Daniel, 1952- Wiley InterScience (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim John Wiley <a href="http://dx.doi.org/10.1002/9780470558133">http://dx.doi.org/10.1002/9780470558133</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Data protection : governance, risk management, and compliance
ent://SD_ILS/0/SD_ILS:543918
2026-01-18T00:32:20Z
2026-01-18T00:32:20Z
Yazar Hill, David G. (David Gary), 1943, author.<br/>Yer Numarası QA76.9 .A25 H52 2009<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9781439806937">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>
CISO soft skills : securing organizations impaired by employee politics, apathy, and intolerant perspectives
ent://SD_ILS/0/SD_ILS:544153
2026-01-18T00:32:20Z
2026-01-18T00:32:20Z
Yazar Collette, Ronald D., author. Gentile, Michael. Gentile, Skye.<br/>Yer Numarası HF5548.37 .G462 2009<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9781420089110">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>
Insider computer fraud : an in-depth framework for detecting and defending against insider IT attacks
ent://SD_ILS/0/SD_ILS:544396
2026-01-18T00:32:20Z
2026-01-18T00:32:20Z
Yazar Brancik, Kenneth C., author.<br/>Yer Numarası QA76.9 .A25 B725 2008<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9781420046601">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>
Security in Distributed, Grid, Mobile, and Pervasive Computing.
ent://SD_ILS/0/SD_ILS:544847
2026-01-18T00:32:20Z
2026-01-18T00:32:20Z
Yer Numarası QA76.9<br/>Elektronik Erişim Taylor & Francis <a href="https://www.taylorfrancis.com/books/9780429119347">https://www.taylorfrancis.com/books/9780429119347</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
The security risk assessment handbook : a complete guide for performing security risk assessments
ent://SD_ILS/0/SD_ILS:545167
2026-01-18T00:32:20Z
2026-01-18T00:32:20Z
Yazar Landoll, Douglas J., author.<br/>Yer Numarası HF5548.37 .L358 2006<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9781420031232">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>
Assessing and managing security risk in IT systems : a structured methodology
ent://SD_ILS/0/SD_ILS:542250
2026-01-18T00:32:20Z
2026-01-18T00:32:20Z
Yazar McCumber, John, 1956, author.<br/>Yer Numarası QA76.9 .A25 M4284 2005<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9781135488970">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>
A practical guide to security assessments
ent://SD_ILS/0/SD_ILS:545277
2026-01-18T00:32:20Z
2026-01-18T00:32:20Z
Yazar Kairab, Sudhanshu., author.<br/>Yer Numarası HF5548.32 .K345 2005<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9781135500313">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>
Codes : the guide to secrecy from ancient to modern times
ent://SD_ILS/0/SD_ILS:546062
2026-01-18T00:32:20Z
2026-01-18T00:32:20Z
Yazar Mollin, Richard A., 1947, author.<br/>Yer Numarası QA76.9 .A25 M67 2005<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9781420035087">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>
Security assessment case studies for implementing the NSA IAM
ent://SD_ILS/0/SD_ILS:254030
2026-01-18T00:32:20Z
2026-01-18T00:32:20Z
Yazar Rogers, Russ.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781932266962">http://www.sciencedirect.com/science/book/9781932266962</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Nessus network auditing
ent://SD_ILS/0/SD_ILS:253991
2026-01-18T00:32:20Z
2026-01-18T00:32:20Z
Yazar Deraison, Renaud. Syngress Media, Inc.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836081">http://www.sciencedirect.com/science/book/9781931836081</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Secure computers and networks : analysis, design, and implementation
ent://SD_ILS/0/SD_ILS:540568
2026-01-18T00:32:20Z
2026-01-18T00:32:20Z
Yazar Fisch, Eric A. White, Gregory B.<br/>Yer Numarası QA76.9 .A25 F5334 2000<br/>Elektronik Erişim Taylor & Francis <a href="https://www.taylorfrancis.com/books/9780367802127">https://www.taylorfrancis.com/books/9780367802127</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>