Arama Sonuçları Information technology. - Daraltılmış: Data protection.SirsiDynix Enterprisehttps://katalog.hacettepe.edu.tr/client/tr_TR/default_tr/default_tr/qu$003dInformation$002btechnology.$0026qf$003dSUBJECT$002509Konu$002509Data$002bprotection.$002509Data$002bprotection.$0026pe$003dd$00253A$0026ps$003d300?dt=list2024-12-26T06:10:29ZInformation Technology - New Generations 15th International Conference on Information Technologyent://SD_ILS/0/SD_ILS:3989482024-12-26T06:10:29Z2024-12-26T06:10:29ZYazar Latifi, Shahram. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-319-77028-4">https://doi.org/10.1007/978-3-319-77028-4</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Smart Trends in Information Technology and Computer Communications Second International Conference, SmartCom 2017, Pune, India, August 18-19, 2017, Revised Selected Papersent://SD_ILS/0/SD_ILS:3995002024-12-26T06:10:29Z2024-12-26T06:10:29ZYazar Deshpande, A.V. editor. Unal, Aynur. editor. Passi, Kalpdrum. editor. Singh, Dharm. editor. Nayak, Malaya. editor.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-981-13-1423-0">https://doi.org/10.1007/978-981-13-1423-0</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Information and Communication Technology International Conference, ICT-EurAsia 2013, Yogyakarta, Indonesia, March 25-29, 2013. Proceedingsent://SD_ILS/0/SD_ILS:3343012024-12-26T06:10:29Z2024-12-26T06:10:29ZYazar Mustofa, Khabib. editor. Neuhold, Erich J. editor. Tjoa, A Min. editor. Weippl, Edgar. editor. You, Ilsun. editor.<br/>Yer Numarası ONLINE(334301.1)<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-36818-9">http://dx.doi.org/10.1007/978-3-642-36818-9</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Information Security Technology for Applications 16th Nordic Conference on Secure IT Systems, NordSec 2011, Tallinn, Estonia, October 26-28, 2011, Revised Selected Papersent://SD_ILS/0/SD_ILS:1967382024-12-26T06:10:29Z2024-12-26T06:10:29ZYazar Laud, Peeter. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-29615-4">http://dx.doi.org/10.1007/978-3-642-29615-4</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Information Security Technology for Applications 15th Nordic Conference on Secure IT Systems, NordSec 2010, Espoo, Finland, October 27-29, 2010, Revised Selected Papersent://SD_ILS/0/SD_ILS:1963032024-12-26T06:10:29Z2024-12-26T06:10:29ZYazar Aura, Tuomas. editor. Järvinen, Kimmo. editor. Nyberg, Kaisa. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-27937-9">http://dx.doi.org/10.1007/978-3-642-27937-9</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Convergence and Hybrid Information Technology 6th International Conference, ICHIT 2012, Daejeon, Korea, August 23-25, 2012. Proceedingsent://SD_ILS/0/SD_ILS:1972502024-12-26T06:10:29Z2024-12-26T06:10:29ZYazar Lee, Geuk. editor. Howard, Daniel. editor. Kang, Jeong Jin. editor. Ślęzak, Dominik. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-32645-5">http://dx.doi.org/10.1007/978-3-642-32645-5</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Convergence and Hybrid Information Technology 6th International Conference, ICHIT 2012, Daejeon, Korea, August 23-25, 2012. Proceedingsent://SD_ILS/0/SD_ILS:1972592024-12-26T06:10:29Z2024-12-26T06:10:29ZYazar Lee, Geuk. editor. Howard, Daniel. editor. Ślęzak, Dominik. editor. Hong, You Sik. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-32692-9">http://dx.doi.org/10.1007/978-3-642-32692-9</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Information Technology Convergence, Secure and Trust Computing, and Data Management ITCS 2012 & STA 2012ent://SD_ILS/0/SD_ILS:2067352024-12-26T06:10:29Z2024-12-26T06:10:29ZYazar Park, Jong Hyuk (James). editor. Kim, Jongsung. editor. Zou, Deqing. editor. Lee, Yang Sun. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-94-007-5083-8">http://dx.doi.org/10.1007/978-94-007-5083-8</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Security Aspects in Information Technology First International Conference, InfoSecHiComNet 2011, Haldia, India, October 19-22, 2011. Proceedingsent://SD_ILS/0/SD_ILS:1956832024-12-26T06:10:29Z2024-12-26T06:10:29ZYazar Joye, Marc. editor. Mukhopadhyay, Debdeep. editor. Tunstall, Michael. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-24586-2">http://dx.doi.org/10.1007/978-3-642-24586-2</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Information technology risk management in enterprise environments a review of industry practices and a practical guide to risk management teamsent://SD_ILS/0/SD_ILS:2978622024-12-26T06:10:29Z2024-12-26T06:10:29ZYazar Kouns, Jake. Minoli, Daniel, 1952- Wiley InterScience (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim John Wiley <a href="http://dx.doi.org/10.1002/9780470558133">http://dx.doi.org/10.1002/9780470558133</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Future Generation Information Technology First International Conference, FGIT 2009, Jeju Island, Korea, December 10-12,2009. Proceedingsent://SD_ILS/0/SD_ILS:1913892024-12-26T06:10:29Z2024-12-26T06:10:29ZYazar Lee, Young-hoon. editor. Kim, Tai-hoon. editor. Fang, Wai-chi. editor. Ślęzak, Dominik. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-10509-8">http://dx.doi.org/10.1007/978-3-642-10509-8</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Information Security Education. Education in Proactive Information Security 12th IFIP WG 11.8 World Conference, WISE 12, Lisbon, Portugal, June 25–27, 2019, Proceedingsent://SD_ILS/0/SD_ILS:4834772024-12-26T06:10:29Z2024-12-26T06:10:29ZYazar Drevin, Lynette. editor. (orcid)0000-0001-9370-8216 Theocharidou, Marianthi. editor. (orcid)0000-0002-8870-1746 SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-030-23451-5">https://doi.org/10.1007/978-3-030-23451-5</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Histories of Computing in Eastern Europe IFIP WG 9.7 International Workshop on the History of Computing, HC 2018, Held at the 24th IFIP World Computer Congress, WCC 2018, Poznań, Poland, September 19–21, 2018, Revised Selected Papersent://SD_ILS/0/SD_ILS:4853652024-12-26T06:10:29Z2024-12-26T06:10:29ZYazar Leslie, Christopher. editor. Schmitt, Martin. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-030-29160-0">https://doi.org/10.1007/978-3-030-29160-0</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Critical Infrastructure Protection XIII 13th IFIP WG 11.10 International Conference, ICCIP 2019, Arlington, VA, USA, March 11–12, 2019, Revised Selected Papersent://SD_ILS/0/SD_ILS:4869392024-12-26T06:10:29Z2024-12-26T06:10:29ZYazar Staggs, Jason. editor. Shenoi, Sujeet. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-030-34647-8">https://doi.org/10.1007/978-3-030-34647-8</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Critical Infrastructure Protection XII 12th IFIP WG 11.10 International Conference, ICCIP 2018, Arlington, VA, USA, March 12-14, 2018, Revised Selected Papersent://SD_ILS/0/SD_ILS:4001262024-12-26T06:10:29Z2024-12-26T06:10:29ZYazar Staggs, Jason. editor. Shenoi, Sujeet. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-030-04537-1">https://doi.org/10.1007/978-3-030-04537-1</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Trust Management XII 12th IFIP WG 11.11 International Conference, IFIPTM 2018, Toronto, ON, Canada, July 10–13, 2018, Proceedingsent://SD_ILS/0/SD_ILS:4020072024-12-26T06:10:29Z2024-12-26T06:10:29ZYazar Gal-Oz, Nurit. editor. Lewis, Peter R. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-319-95276-5">https://doi.org/10.1007/978-3-319-95276-5</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Critical Infrastructure Protection VII 7th IFIP WG 11.10 International Conference, ICCIP 2013, Washington, DC, USA, March 18-20, 2013, Revised Selected Papersent://SD_ILS/0/SD_ILS:3352092024-12-26T06:10:29Z2024-12-26T06:10:29ZYazar Butts, Jonathan. editor. Shenoi, Sujeet. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE(335209.1)<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-45330-4">http://dx.doi.org/10.1007/978-3-642-45330-4</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Policies and Research in Identity Management Third IFIP WG 11.6 Working Conference, IDMAN 2013, London, UK, April 8-9, 2013. Proceedingsent://SD_ILS/0/SD_ILS:3343992024-12-26T06:10:29Z2024-12-26T06:10:29ZYazar Fischer-Hübner, Simone. editor. Leeuw, Elisabeth. editor. Mitchell, Chris. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE(334399.1)<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-37282-7">http://dx.doi.org/10.1007/978-3-642-37282-7</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Advances in Digital Forensics IX 9th IFIP WG 11.9 International Conference on Digital Forensics, Orlando, FL, USA, January 28-30, 2013, Revised Selected Papersent://SD_ILS/0/SD_ILS:3350632024-12-26T06:10:29Z2024-12-26T06:10:29ZYazar Peterson, Gilbert. editor. Shenoi, Sujeet. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE(335063.1)<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-41148-9">http://dx.doi.org/10.1007/978-3-642-41148-9</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Trust Management VII 7th IFIP WG 11.11 International Conference, IFIPTM 2013, Malaga, Spain, June 3-7, 2013. Proceedingsent://SD_ILS/0/SD_ILS:3345822024-12-26T06:10:29Z2024-12-26T06:10:29ZYazar Fernández-Gago, Carmen. editor. Martinelli, Fabio. editor. Pearson, Siani. editor. Agudo, Isaac. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE(334582.1)<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-38323-6">http://dx.doi.org/10.1007/978-3-642-38323-6</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Information Assurance and Security Education and Training 8th IFIP WG 11.8 World Conference on Information Security Education, WISE 8, Auckland, New Zealand, July 8-10, 2013, Proceedings, WISE 7, Lucerne Switzerland, June 9-10, 2011, and WISE 6, Bento Gonçalves, RS, Brazil, July 27-31, 2009, Revised Selected Papersent://SD_ILS/0/SD_ILS:3347942024-12-26T06:10:29Z2024-12-26T06:10:29ZYazar Dodge, Ronald C. editor. Futcher, Lynn. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE(334794.1)<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-39377-8">http://dx.doi.org/10.1007/978-3-642-39377-8</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>ICT Critical Infrastructures and Society 10th IFIP TC 9 International Conference on Human Choice and Computers, HCC10 2012, Amsterdam, The Netherlands, September 27-28, 2012. Proceedingsent://SD_ILS/0/SD_ILS:1973572024-12-26T06:10:29Z2024-12-26T06:10:29ZYazar Hercheui, Magda David. editor. Whitehouse, Diane. editor. McIver, William. editor. Phahlamohlaka, Jackie. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-33332-3">http://dx.doi.org/10.1007/978-3-642-33332-3</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Advances in Digital Forensics VIII 8th IFIP WG 11.9 International Conference on Digital Forensics, Pretoria, South Africa, January 3-5, 2012, Revised Selected Papersent://SD_ILS/0/SD_ILS:1974492024-12-26T06:10:29Z2024-12-26T06:10:29ZYazar Peterson, Gilbert. editor. Shenoi, Sujeet. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-33962-2">http://dx.doi.org/10.1007/978-3-642-33962-2</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Critical Infrastructure Protection VI 6th IFIP WG 11.10 International Conference, ICCIP 2012, Washington, DC, USA, March 19-21, 2012, Revised Selected Papersent://SD_ILS/0/SD_ILS:1976382024-12-26T06:10:29Z2024-12-26T06:10:29ZYazar Butts, Jonathan. editor. Shenoi, Sujeet. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-35764-0">http://dx.doi.org/10.1007/978-3-642-35764-0</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Critical Infrastructure Protection V 5th IFIP WG 11.10 International Conference on Critical Infrastructure Protection, ICCIP 2011, Hanover, NH, USA, March 23-25, 2011, Revised Selected Papersent://SD_ILS/0/SD_ILS:1957722024-12-26T06:10:29Z2024-12-26T06:10:29ZYazar Butts, Jonathan. editor. Shenoi, Sujeet. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-24864-1">http://dx.doi.org/10.1007/978-3-642-24864-1</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Trust Management III Third IFIP WG 11.11 International Conference, IFIPTM 2009, West Lafayette, IN, USA, June 15-19, 2009. Proceedingsent://SD_ILS/0/SD_ILS:1902022024-12-26T06:10:29Z2024-12-26T06:10:29ZYazar Ferrari, Elena. editor. Li, Ninghui. editor. Bertino, Elisa. editor. Karabulut, Yuecel. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-02056-8">http://dx.doi.org/10.1007/978-3-642-02056-8</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>iNetSec 2009 – Open Research Problems in Network Security IFIP WG 11.4 International Workshop, Zurich, Switzerland, April 23-24, 2009, Revised Selected Papersent://SD_ILS/0/SD_ILS:1912702024-12-26T06:10:29Z2024-12-26T06:10:29ZYazar Camenisch, Jan. editor. Kesdogan, Dogan. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-05437-2">http://dx.doi.org/10.1007/978-3-642-05437-2</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Emerging Challenges for Security, Privacy and Trust 24th IFIP TC 11 International Information Security Conference, SEC 2009, Pafos, Cyprus, May 18–20, 2009. Proceedingsent://SD_ILS/0/SD_ILS:1899282024-12-26T06:10:29Z2024-12-26T06:10:29ZYazar Gritzalis, Dimitris. editor. Lopez, Javier. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-01244-0">http://dx.doi.org/10.1007/978-3-642-01244-0</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>The Future of Identity in the Information Society 4th IFIP WG 9.2, 9.6/11.6, 11.7/FIDIS International Summer School, Brno, Czech Republic, September 1-7, 2008, Revised Selected Papersent://SD_ILS/0/SD_ILS:1905882024-12-26T06:10:29Z2024-12-26T06:10:29ZYazar Matyáš, Vashek. editor. Fischer-Hübner, Simone. editor. Cvrček, Daniel. editor. Švenda, Petr. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-03315-5">http://dx.doi.org/10.1007/978-3-642-03315-5</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>IT auditing using controls to protect information assetsent://SD_ILS/0/SD_ILS:2932622024-12-26T06:10:29Z2024-12-26T06:10:29ZYazar Davis, Chris (Christopher Michael) Schiller, Mike. Wheeler, Kevin.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://mhebooklibrary.com/reader/auditing-using-controls-to-protect-information-assets-2nd-edition">Subscription required</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Büyük veri uygulamalarında kişisel veri mahremiyeti : uzmanlık tezient://SD_ILS/0/SD_ILS:4246382024-12-26T06:10:29Z2024-12-26T06:10:29ZYazar Akıncı, Ayşe Nur.<br/>Yer Numarası JC571 A35 2019<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>Global cyber security labor shortage and international business riskent://SD_ILS/0/SD_ILS:4818102024-12-26T06:10:29Z2024-12-26T06:10:29ZYazar Christiansen, Bryan, 1960- editor. Piekarz, Agnieszka, 1990- editor. IGI Global, publisher.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-5927-6">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-5927-6</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Total information risk management maximizing the value of data and information assetsent://SD_ILS/0/SD_ILS:3066932024-12-26T06:10:29Z2024-12-26T06:10:29ZYazar Borek, Alexander.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780124055476">http://www.sciencedirect.com/science/book/9780124055476</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Engineering information security the application of systems engineering concepts to achieve information assuranceent://SD_ILS/0/SD_ILS:2499162024-12-26T06:10:29Z2024-12-26T06:10:29ZYazar Jacobs, Stuart.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim IEEE Xplore <a href="http://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=6047604">http://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=6047604</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Auditing cloud computing a security and privacy guideent://SD_ILS/0/SD_ILS:2992632024-12-26T06:10:29Z2024-12-26T06:10:29ZYazar Halpert, Ben, 1986-<br/>Yer Numarası ONLINE<br/>Elektronik Erişim Image <a href="http://images.contentreserve.com/ImageType-100/0128-1/{F889EE2A-CF12-4647-85E0-03258F227FC1}Img100.jpg">http://images.contentreserve.com/ImageType-100/0128-1/{F889EE2A-CF12-4647-85E0-03258F227FC1}Img100.jpg</a>
Books24x7 <a href="http://www.books24x7.com/marc.asp?bookid=44303">http://www.books24x7.com/marc.asp?bookid=44303</a>
John Wiley <a href="http://dx.doi.org/10.1002/9781118269091">http://dx.doi.org/10.1002/9781118269091</a>
OverDrive (PDF) <a href="http://www.contentreserve.com/TitleInfo.asp?ID={F889EE2A-CF12-4647-85E0-03258F227FC1}&Format=50">http://www.contentreserve.com/TitleInfo.asp?ID={F889EE2A-CF12-4647-85E0-03258F227FC1}&Format=50</a>
OverDrive (EPUB) <a href="http://www.contentreserve.com/TitleInfo.asp?ID={F889EE2A-CF12-4647-85E0-03258F227FC1}&Format=410">http://www.contentreserve.com/TitleInfo.asp?ID={F889EE2A-CF12-4647-85E0-03258F227FC1}&Format=410</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Security de-engineering solving the problems in information risk managementent://SD_ILS/0/SD_ILS:2862092024-12-26T06:10:29Z2024-12-26T06:10:29ZYazar Tibble, Ian.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://marc.crcnetbase.com/isbn/9781439868355">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Security strategy from requirements to realityent://SD_ILS/0/SD_ILS:2888512024-12-26T06:10:29Z2024-12-26T06:10:29ZYazar Stackpole, Bill. Oksendahl, Eric.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://marc.crcnetbase.com/isbn/9781439827345">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Practical risk management for the CIOent://SD_ILS/0/SD_ILS:2915712024-12-26T06:10:29Z2024-12-26T06:10:29ZYazar Scherling, Mark.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://marc.crcnetbase.com/isbn/9781439856543">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>The executive MBA in information securityent://SD_ILS/0/SD_ILS:2869312024-12-26T06:10:29Z2024-12-26T06:10:29ZYazar Trinckes, John J.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://marc.crcnetbase.com/isbn/9781439810088">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Information security governance a practical development and implementation approachent://SD_ILS/0/SD_ILS:2977432024-12-26T06:10:29Z2024-12-26T06:10:29ZYazar Brotby, W. Krag.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim Ebook Library <a href="http://public.eblib.com/EBLPublic/PublicView.do?ptiID=433807">http://public.eblib.com/EBLPublic/PublicView.do?ptiID=433807</a>
John Wiley <a href="http://dx.doi.org/10.1002/9780470476017">http://dx.doi.org/10.1002/9780470476017</a>
<a href="http://site.ebrary.com/lib/alltitles/Doc?id=10313652">http://site.ebrary.com/lib/alltitles/Doc?id=10313652</a>
<a href="http://swb.eblib.com/patron/FullRecord.aspx?p=433807">http://swb.eblib.com/patron/FullRecord.aspx?p=433807</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Information warfareent://SD_ILS/0/SD_ILS:3040692024-12-26T06:10:29Z2024-12-26T06:10:29ZYazar Ventre, Daniel.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim John Wiley <a href="http://dx.doi.org/10.1002/9781118381533">http://dx.doi.org/10.1002/9781118381533</a>
<a href="http://lib.myilibrary.com?id=477736">http://lib.myilibrary.com?id=477736</a>
OverDrive (PDF) <a href="http://www.contentreserve.com/TitleInfo.asp?ID={02D73229-3728-4EE5-942B-28D4B82AED18}&Format=50">http://www.contentreserve.com/TitleInfo.asp?ID={02D73229-3728-4EE5-942B-28D4B82AED18}&Format=50</a>
OverDrive (EPUB) <a href="http://www.contentreserve.com/TitleInfo.asp?ID={02D73229-3728-4EE5-942B-28D4B82AED18}&Format=410">http://www.contentreserve.com/TitleInfo.asp?ID={02D73229-3728-4EE5-942B-28D4B82AED18}&Format=410</a>
OverDrive (READ) <a href="http://www.contentreserve.com/TitleInfo.asp?ID={02D73229-3728-4EE5-942B-28D4B82AED18}&Format=610">http://www.contentreserve.com/TitleInfo.asp?ID={02D73229-3728-4EE5-942B-28D4B82AED18}&Format=610</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Data protection governance, risk management, and complianceent://SD_ILS/0/SD_ILS:2897002024-12-26T06:10:29Z2024-12-26T06:10:29ZYazar Hill, David G. (David Gary), 1943-<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://marc.crcnetbase.com/isbn/9781439806937">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>CISO soft skills securing organizations impaired by employee politics, apathy, and intolerant perspectivesent://SD_ILS/0/SD_ILS:2887442024-12-26T06:10:29Z2024-12-26T06:10:29ZYazar Collette, Ronald D. Gentile, Michael. Gentile, Skye.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://marc.crcnetbase.com/isbn/9781420089110">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Information security management metrics a definitive guide to effective security monitoring and measurementent://SD_ILS/0/SD_ILS:2913732024-12-26T06:10:29Z2024-12-26T06:10:29ZYazar Brotby, W. Krag.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://marc.crcnetbase.com/isbn/9781420052862">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Information assurance architectureent://SD_ILS/0/SD_ILS:2911232024-12-26T06:10:29Z2024-12-26T06:10:29ZYazar Willett, Keith D.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://marc.crcnetbase.com/isbn/9780849380686">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>A practical guide to security assessmentsent://SD_ILS/0/SD_ILS:2883062024-12-26T06:10:29Z2024-12-26T06:10:29ZYazar Kairab, Sudhanshu.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://marc.crcnetbase.com/isbn/9780203507230">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>