Arama Sonuçları Risk Management - Daraltılmış: Computer security.
SirsiDynix Enterprise
https://katalog.hacettepe.edu.tr/client/tr_TR/default_tr/default_tr/qu$003dRisk$002bManagement$0026qf$003dSUBJECT$002509Konu$002509Computer$002bsecurity.$002509Computer$002bsecurity.$0026ps$003d300?
2026-02-20T22:49:49Z
Optimal spending on cybersecurity measures : risk management
ent://SD_ILS/0/SD_ILS:586024
2026-02-20T22:49:49Z
2026-02-20T22:49:49Z
Yazar Kissoon, Tara, author.<br/>Yer Numarası HF5548.37<br/>Elektronik Erişim Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003404354">https://www.taylorfrancis.com/books/9781003404354</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Optimal spending on cybersecurity measures : risk management
ent://SD_ILS/0/SD_ILS:553885
2026-02-20T22:49:49Z
2026-02-20T22:49:49Z
Yazar Kissoon, Tara, author.<br/>Yer Numarası HF5548.37 .K57 2022<br/>Elektronik Erişim Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003200895">https://www.taylorfrancis.com/books/9781003200895</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Data protection : governance, risk management, and compliance
ent://SD_ILS/0/SD_ILS:543918
2026-02-20T22:49:49Z
2026-02-20T22:49:49Z
Yazar Hill, David G. (David Gary), 1943, author.<br/>Yer Numarası QA76.9 .A25 H52 2009<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9781439806937">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>
Technology, AI, and operational security in banking : mastering cybersecurity and tech risk management
ent://SD_ILS/0/SD_ILS:573707
2026-02-20T22:49:49Z
2026-02-20T22:49:49Z
Yazar Young, Richard Gwashy, author.<br/>Yer Numarası HG1709<br/>Elektronik Erişim Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003654742">https://www.taylorfrancis.com/books/9781003654742</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Optimal spending on cybersecurity measures : third party risk management
ent://SD_ILS/0/SD_ILS:584312
2026-02-20T22:49:49Z
2026-02-20T22:49:49Z
Yazar Kissoon, Tara, author.<br/>Yer Numarası HF5548.37 .K57 2025 EB<br/>Elektronik Erişim Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003587576">https://www.taylorfrancis.com/books/9781003587576</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Information technology security and risk management : inductive cases for information security
ent://SD_ILS/0/SD_ILS:562664
2026-02-20T22:49:49Z
2026-02-20T22:49:49Z
Yazar Wingreen, Stephen C., editor. Samandari, Amelia, editor.<br/>Yer Numarası QA76.9 .A25<br/>Elektronik Erişim Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003264415">https://www.taylorfrancis.com/books/9781003264415</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Cyber security and business intelligence : innovations and machine learning for cyber risk management
ent://SD_ILS/0/SD_ILS:553989
2026-02-20T22:49:49Z
2026-02-20T22:49:49Z
Yazar Abedin, Mohammad Zoynul, editor. Hájek, Petr, editor.<br/>Yer Numarası HD38.7<br/>Elektronik Erişim Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003285854">https://www.taylorfrancis.com/books/9781003285854</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Stepping through cybersecurity risk management : a systems thinking approach
ent://SD_ILS/0/SD_ILS:599021
2026-02-20T22:49:49Z
2026-02-20T22:49:49Z
Yazar Bayuk, Jennifer L., author.<br/>Yer Numarası QA76.9 .A25 B39 2024<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394213986">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394213986</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Effective vulnerability management : managing risk in the vulnerable digital ecosystem
ent://SD_ILS/0/SD_ILS:599047
2026-02-20T22:49:49Z
2026-02-20T22:49:49Z
Yazar Hughes, Chris (Christopher Matthew), author. Robinson, Nikki, author.<br/>Yer Numarası QA76.9 .A25 H84 2024<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394277155">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394277155</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
ORACLE IDENTITY MANAGEMENT : governance, risk, and compliance architecture, third edition.
ent://SD_ILS/0/SD_ILS:544833
2026-02-20T22:49:49Z
2026-02-20T22:49:49Z
Yazar POHLMAN, MARLIN B.<br/>Yer Numarası QA76.9 .A25<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9780429117688">Taylor & Francis eBooks</a>
Taylor & Francis <a href="https://www.taylorfrancis.com/books/9780429117688">https://www.taylorfrancis.com/books/9780429117688</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Handbook of system safety and security : cyber risk and risk management, cyber security, threat analysis, functional safety, software systems, and cyber physical systems
ent://SD_ILS/0/SD_ILS:459145
2026-02-20T22:49:49Z
2026-02-20T22:49:49Z
Yazar Griffor, Edward R., editor.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128037737">http://www.sciencedirect.com/science/book/9780128037737</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Security de-engineering : solving the problems in information risk management
ent://SD_ILS/0/SD_ILS:545608
2026-02-20T22:49:49Z
2026-02-20T22:49:49Z
Yazar Tibble, Ian., author.<br/>Yer Numarası HF5548.37 .T53 2011<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9781439868355">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>
Information technology risk management in enterprise environments a review of industry practices and a practical guide to risk management teams
ent://SD_ILS/0/SD_ILS:297862
2026-02-20T22:49:49Z
2026-02-20T22:49:49Z
Yazar Kouns, Jake. Minoli, Daniel, 1952- Wiley InterScience (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim John Wiley <a href="http://dx.doi.org/10.1002/9780470558133">http://dx.doi.org/10.1002/9780470558133</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
AI-Enabled Threat Intelligence and Cyber Risk Assessment
ent://SD_ILS/0/SD_ILS:582312
2026-02-20T22:49:49Z
2026-02-20T22:49:49Z
Yazar Martiri, Edlira, editor Vajjhala, Narasimha, 1978- editor. Dalipi, Fisnik, editor<br/>Yer Numarası QA76.9 .A25<br/>Elektronik Erişim Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003504979">https://www.taylorfrancis.com/books/9781003504979</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Optimal spending on cybersecurity measures : AI and governance
ent://SD_ILS/0/SD_ILS:584311
2026-02-20T22:49:49Z
2026-02-20T22:49:49Z
Yazar Kissoon, Tara, author.<br/>Yer Numarası HF5548.37 .K57 2025 EB<br/>Elektronik Erişim Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003587569">https://www.taylorfrancis.com/books/9781003587569</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Optimum spending on cybersecurity measures : digital privacy and data protection
ent://SD_ILS/0/SD_ILS:574605
2026-02-20T22:49:49Z
2026-02-20T22:49:49Z
Yazar Kissoon, Tara, author.<br/>Yer Numarası HF5548.37<br/>Elektronik Erişim Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003497523">https://www.taylorfrancis.com/books/9781003497523</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Optimal spending on cybersecurity measures : digital privacy and data protection
ent://SD_ILS/0/SD_ILS:572623
2026-02-20T22:49:49Z
2026-02-20T22:49:49Z
Yazar Kissoon, Tara, author.<br/>Yer Numarası HF5548.37<br/>Elektronik Erişim Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003507109">https://www.taylorfrancis.com/books/9781003507109</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Inside cyber : how AI, 5G, IoT, and quantum computing will transform privacy and our security
ent://SD_ILS/0/SD_ILS:599222
2026-02-20T22:49:49Z
2026-02-20T22:49:49Z
Yazar Brooks, Chuck (Writer of Inside cyber), author.<br/>Yer Numarası HC79 .T4 B735 2025<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394310562">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394310562</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Generative AI, cybersecurity, and ethics
ent://SD_ILS/0/SD_ILS:599597
2026-02-20T22:49:49Z
2026-02-20T22:49:49Z
Yazar Islam, Ray (Mohammad Rubyet), author.<br/>Yer Numarası QA76.9 .A25<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394279326">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394279326</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
The cybersecurity control playbook : from fundamentals to advanced strategies
ent://SD_ILS/0/SD_ILS:599789
2026-02-20T22:49:49Z
2026-02-20T22:49:49Z
Yazar Edwards, Jason (Cybersecurity expert), author. John Wiley & Sons, publisher.<br/>Yer Numarası QA76.9 .A25 E3884 2025<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394331888">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394331888</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Information security and privacy quick reference the essential handbook for every CISO, CSO, and Chief Privacy Officer
ent://SD_ILS/0/SD_ILS:599946
2026-02-20T22:49:49Z
2026-02-20T22:49:49Z
Yazar Chapple, Mike, author. Shelley, Joe. Stewart, James Michael.<br/>Yer Numarası QA76.9 .A25 C43 2025<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394353347">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394353347</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Open-source security operations center (SOC) : a complete guide to establishing, managing, and maintaining a modern SOC
ent://SD_ILS/0/SD_ILS:599434
2026-02-20T22:49:49Z
2026-02-20T22:49:49Z
Yazar Basta, Alfred, author. Basta, Nadine, author. Anwar, Waqar, author. Essar, Mohammad Ilyas, author. John Wiley & Sons, publisher.<br/>Yer Numarası QA76.9 .A25<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394201631">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394201631</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
CYBERSECURITY IN THE TRANSPORTATION INDUSTRY.
ent://SD_ILS/0/SD_ILS:599238
2026-02-20T22:49:49Z
2026-02-20T22:49:49Z
Yer Numarası HE194 .C93 2024<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394204472">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394204472</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
The cybersecurity guide to governance, risk, and compliance
ent://SD_ILS/0/SD_ILS:598945
2026-02-20T22:49:49Z
2026-02-20T22:49:49Z
Yazar Edwards, Jason (Cybersecurity expert), author. Weaver, Griffin, author.<br/>Yer Numarası HD30.38 .E34 2024<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394250226">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394250226</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
The security risk handbook : assess, survey, audit
ent://SD_ILS/0/SD_ILS:574120
2026-02-20T22:49:49Z
2026-02-20T22:49:49Z
Yazar Swanson, Charles (Chartered Security Professional), author.<br/>Yer Numarası HD61.5<br/>Elektronik Erişim Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003186335">https://www.taylorfrancis.com/books/9781003186335</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Cyber security and network security
ent://SD_ILS/0/SD_ILS:597484
2026-02-20T22:49:49Z
2026-02-20T22:49:49Z
Yazar Pramanik, Sabyasachi, editor. Samanta, Debabrata, 1987- editor. Vinay, M., editor. Guha, Abhijit, editor.<br/>Yer Numarası QA76.9 .A25<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119812555">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119812555</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Managing cybersecurity in the process industries
ent://SD_ILS/0/SD_ILS:597508
2026-02-20T22:49:49Z
2026-02-20T22:49:49Z
Yazar American Institute of Chemical Engineers. Center for Chemical Process Safety.<br/>Yer Numarası TP155.7<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119861812">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119861812</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Executive's guide to cyber risk : securing the future today
ent://SD_ILS/0/SD_ILS:597567
2026-02-20T22:49:49Z
2026-02-20T22:49:49Z
Yazar Moyo, Siegfried, author.<br/>Yer Numarası HF5548.37 .M68 2022<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394320578">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394320578</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
The CISO evolution : business knowledge for cybersecurity executives
ent://SD_ILS/0/SD_ILS:597056
2026-02-20T22:49:49Z
2026-02-20T22:49:49Z
Yazar Sharp, Matthew K., author. Lambros, Kyriakos P., author.<br/>Yer Numarası HD30.2 .S5325 2022<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119782513">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119782513</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
The security risk assessment handbook : a complete guide for performing security risk assessments
ent://SD_ILS/0/SD_ILS:549829
2026-02-20T22:49:49Z
2026-02-20T22:49:49Z
Yazar Landoll, Douglas J., author.<br/>Yer Numarası HF5548.37 .L358 2021 EB<br/>Elektronik Erişim Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003090441">https://www.taylorfrancis.com/books/9781003090441</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Privacy, regulations, and cybersecurity : the essential business guide
ent://SD_ILS/0/SD_ILS:596472
2026-02-20T22:49:49Z
2026-02-20T22:49:49Z
Yazar Moschovitis, Christos J. P., author.<br/>Yer Numarası HD61.5 .M675 2021 EB<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119660156">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119660156</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Security risk models for cyber insurance
ent://SD_ILS/0/SD_ILS:574860
2026-02-20T22:49:49Z
2026-02-20T22:49:49Z
Yazar Ríos Insua, David, 1964- editor. Baylon, Caroline, editor. Vila, Jose, editor.<br/>Yer Numarası HG9963.5<br/>Elektronik Erişim Taylor & Francis <a href="https://www.taylorfrancis.com/books/9780429329487">https://www.taylorfrancis.com/books/9780429329487</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Cybersecurity and decision makers : data security and digital trust
ent://SD_ILS/0/SD_ILS:595943
2026-02-20T22:49:49Z
2026-02-20T22:49:49Z
Yazar Fréminville, Marie de, author.<br/>Yer Numarası HF5548.37 .F74 2020<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119720362">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119720362</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Cyber-vigilance and digital trust : cyber security in the era of cloud computing and IoT
ent://SD_ILS/0/SD_ILS:595279
2026-02-20T22:49:49Z
2026-02-20T22:49:49Z
Yazar Tounsi, Wiem, editor.<br/>Yer Numarası QA76.9 .A25 C93 2019 EB<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119618393">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119618393</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Tribe of hackers : cybersecurity advice from the best hackers in the world
ent://SD_ILS/0/SD_ILS:595418
2026-02-20T22:49:49Z
2026-02-20T22:49:49Z
Yazar Carey, Marcus J. (Cybersecurity professional), author. Jin, Jennifer, author.<br/>Yer Numarası QA76.9 .A25 C37 2019 EB<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119643395">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119643395</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
An introduction to cyber modeling and simulation
ent://SD_ILS/0/SD_ILS:594699
2026-02-20T22:49:49Z
2026-02-20T22:49:49Z
Yazar Couretas, Jerry M., 1966- author.<br/>Yer Numarası QA76.9 .C65<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119420842">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119420842</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Information security fundamentals
ent://SD_ILS/0/SD_ILS:539922
2026-02-20T22:49:49Z
2026-02-20T22:49:49Z
Yazar Peltier, Thomas R.<br/>Yer Numarası QA76.9 .A25<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9780429130281">Taylor & Francis eBooks</a>
Taylor & Francis <a href="https://www.taylorfrancis.com/books/9780429130281">https://www.taylorfrancis.com/books/9780429130281</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
DNS security management
ent://SD_ILS/0/SD_ILS:593802
2026-02-20T22:49:49Z
2026-02-20T22:49:49Z
Yazar Dooley, Michael, 1962- author. Rooney, Timothy, 1962- author.<br/>Yer Numarası QA76.9 .A25<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119328292">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119328292</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Measuring and managing information risk : a FAIR approach
ent://SD_ILS/0/SD_ILS:355576
2026-02-20T22:49:49Z
2026-02-20T22:49:49Z
Yazar Freund, Jack, author. Jones, Jack, author.<br/>Yer Numarası ONLINE(355576.1)<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780124202313">http://www.sciencedirect.com/science/book/9780124202313</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Security management : a critical thinking approach
ent://SD_ILS/0/SD_ILS:539725
2026-02-20T22:49:49Z
2026-02-20T22:49:49Z
Yazar Land, Michael (Industrial engineer), author. Ricks, Truett A., author. Ricks, Bob, author.<br/>Yer Numarası HD61.5 .L36 2014<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9781466561786">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>
The security risk assessment handbook : a complete guide for performing security risk assessments
ent://SD_ILS/0/SD_ILS:539743
2026-02-20T22:49:49Z
2026-02-20T22:49:49Z
Yazar Landoll, Douglas J., author.<br/>Yer Numarası HF5548.37 .L358 2011<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9781439821497">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>
Adaptive security management architecture
ent://SD_ILS/0/SD_ILS:541852
2026-02-20T22:49:49Z
2026-02-20T22:49:49Z
Yazar Tiller, James S., author.<br/>Yer Numarası QA76.9 .A25 T55 2011<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9781420013375">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>
Vulnerability management
ent://SD_ILS/0/SD_ILS:545698
2026-02-20T22:49:49Z
2026-02-20T22:49:49Z
Yazar Foreman, Park., author.<br/>Yer Numarası QA76.9 .A25 F656 2010<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9781439801512">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>
Security software development : assessing and managing security risks
ent://SD_ILS/0/SD_ILS:543836
2026-02-20T22:49:49Z
2026-02-20T22:49:49Z
Yazar Ashbaugh, Douglas A., author.<br/>Yer Numarası QA76.9 .A25 A8246 2009<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9781420063813">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>
Information security management metrics : a definitive guide to effective security monitoring and measurement
ent://SD_ILS/0/SD_ILS:546952
2026-02-20T22:49:49Z
2026-02-20T22:49:49Z
Yazar Brotby, W. Krag., author.<br/>Yer Numarası HD30.2 .B78 2009<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9781420052862">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>
Digital privacy : theory, technologies, and practices
ent://SD_ILS/0/SD_ILS:547774
2026-02-20T22:49:49Z
2026-02-20T22:49:49Z
Yazar Acquisti, Alessandro.<br/>Yer Numarası QA76.9 .A25 D528 2008<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9781420052183">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>
Information security : design, implementation, measurement, and compliance
ent://SD_ILS/0/SD_ILS:545839
2026-02-20T22:49:49Z
2026-02-20T22:49:49Z
Yazar Layton, Timothy P., author.<br/>Yer Numarası HF5548.37 .L393 2007<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9781420013412">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>
Security convergence managing enterprise security risk
ent://SD_ILS/0/SD_ILS:149080
2026-02-20T22:49:49Z
2026-02-20T22:49:49Z
Yazar Tyson, Dave.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim Volltext <a href="http://www.sciencedirect.com/science/book/9780750684255">http://www.sciencedirect.com/science/book/9780750684255</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Security convergence managing enterprise security risk
ent://SD_ILS/0/SD_ILS:112198
2026-02-20T22:49:49Z
2026-02-20T22:49:49Z
Yazar Tyson, Dave. ScienceDirect (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780750684255">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
The security risk assessment handbook : a complete guide for performing security risk assessments
ent://SD_ILS/0/SD_ILS:545167
2026-02-20T22:49:49Z
2026-02-20T22:49:49Z
Yazar Landoll, Douglas J., author.<br/>Yer Numarası HF5548.37 .L358 2006<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9781420031232">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>
Information security risk analysis
ent://SD_ILS/0/SD_ILS:544821
2026-02-20T22:49:49Z
2026-02-20T22:49:49Z
Yazar Peltier, Thomas R., author.<br/>Yer Numarası QA76.9 .A25 P429 2005<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9781420031195">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>
Information security fundamentals
ent://SD_ILS/0/SD_ILS:545226
2026-02-20T22:49:49Z
2026-02-20T22:49:49Z
Yazar Peltier, Thomas R., author. Peltier, Justin. Blackley, John A.<br/>Yer Numarası QA76.9 .A25 P427 2005<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9781135493738">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>