Search Results for Data protection. - Narrowed by: Data protection.SirsiDynix Enterprisehttp://katalog.baskent.edu.tr/client/en_US/default/default/qu$003dData$002bprotection.$0026qf$003dSUBJECT$002509Subject$002509Data$002bprotection.$002509Data$002bprotection.$0026ic$003dtrue$0026ps$003d300?dt=list2026-05-07T21:59:19ZData protection and the cloud-are you really managing the risks?ent://SD_ILS/0/SD_ILS:11470762026-05-07T21:59:19Z2026-05-07T21:59:19Zby Ticher, Paul, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5796955">Click to View</a><br/>Format: Electronic Resources<br/>Data protection and the cloud : are the risks too great?ent://SD_ILS/0/SD_ILS:10538352026-05-07T21:59:19Z2026-05-07T21:59:19Zby Ticher, Paul, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=2192125">Click to View</a><br/>Format: Electronic Resources<br/>Microsoft Data Protection Manager 2010 a practical step-by-step guide to planning deployment, installation, configuration, and troubleshooting of Data Protection Manager 2010ent://SD_ILS/0/SD_ILS:9970422026-05-07T21:59:19Z2026-05-07T21:59:19Zby Buchanan, Steve.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=950601">Click to View</a><br/>Format: Electronic Resources<br/>Data protection and consumer privacy an Emerald guide.ent://SD_ILS/0/SD_ILS:9376152026-05-07T21:59:19Z2026-05-07T21:59:19Zby ProQuest (Firm)<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=282894">Click to View</a><br/>Format: Electronic Resources<br/>KVKK Kişisel Verileri Koruma Kurumu tanıtım kataloğuent://SD_ILS/0/SD_ILS:12230252026-05-07T21:59:19Z2026-05-07T21:59:19Zby Kişisel Verileri Koruma Kurumu<br/>Format: Books<br/>Lessons learned : critical information infrastructure protection : how to protect critical information infrastructureent://SD_ILS/0/SD_ILS:11344332026-05-07T21:59:19Z2026-05-07T21:59:19Zby Viira, Toomas, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5244626">Click to View</a><br/>Format: Electronic Resources<br/>Data hiding techniques in Windows OS : a practical approach to investigation and defenseent://SD_ILS/0/SD_ILS:11177642026-05-07T21:59:19Z2026-05-07T21:59:19Zby Hassan, Nihad Ahmad, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4676113">Click to View</a><br/>Format: Electronic Resources<br/>You : for sale protecting your personal data and privacy onlineent://SD_ILS/0/SD_ILS:10537572026-05-07T21:59:19Z2026-05-07T21:59:19Zby Sumner, Stuart, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=2187472">Click to View</a><br/>Format: Electronic Resources<br/>Nine steps to succes : an ISO 27001: 2013 implementation overviewent://SD_ILS/0/SD_ILS:11111892026-05-07T21:59:19Z2026-05-07T21:59:19Zby Calder, Alan, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4519667">Click to View</a><br/>Format: Electronic Resources<br/>Digital identity managementent://SD_ILS/0/SD_ILS:10473362026-05-07T21:59:19Z2026-05-07T21:59:19Zby Laurent, Maryline, editor.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=2007485">Click to View</a><br/>Format: Electronic Resources<br/>Governance, risk, and compliance handbook for Oracle applicationsent://SD_ILS/0/SD_ILS:10006772026-05-07T21:59:19Z2026-05-07T21:59:19Zby King, Nigel.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1019540">Click to View</a><br/>Format: Electronic Resources<br/>Information security for managementent://SD_ILS/0/SD_ILS:10567932026-05-07T21:59:19Z2026-05-07T21:59:19Zby Iyengar, Venugopal.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3011230">Click to View</a><br/>Format: Electronic Resources<br/>Managing information risk a director's guideent://SD_ILS/0/SD_ILS:9607682026-05-07T21:59:19Z2026-05-07T21:59:19Zby Mitchell, Stewart.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=480407">Click to View</a><br/>Format: Electronic Resources<br/>Engaging privacy and information technology in a digital ageent://SD_ILS/0/SD_ILS:10854052026-05-07T21:59:19Z2026-05-07T21:59:19Zby Waldo, James.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3378264">Click to View</a><br/>Format: Electronic Resources<br/>IBM InfoSphere a platform for big data governance and process data governanceent://SD_ILS/0/SD_ILS:10576962026-05-07T21:59:19Z2026-05-07T21:59:19Zby Soares, Sunil.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3015277">Click to View</a><br/>Format: Electronic Resources<br/>Network backup with Bacula how-to create and autonomous backup solution for your computer network using practical, hands-on recipesent://SD_ILS/0/SD_ILS:10049602026-05-07T21:59:19Z2026-05-07T21:59:19Zby Pankov, Eugene.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1085229">Click to View</a><br/>Format: Electronic Resources<br/>Data governance how to design, deploy, and sustain an effective data governance programent://SD_ILS/0/SD_ILS:10016882026-05-07T21:59:19Z2026-05-07T21:59:19Zby Ladley, John.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1032951">Click to View</a><br/>Format: Electronic Resources<br/>Netcat power toolsent://SD_ILS/0/SD_ILS:11897042026-05-07T21:59:19Z2026-05-07T21:59:19Zby Kanclirz, Jan.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597492577">https://www.sciencedirect.com/science/book/9781597492577</a><br/>Format: Electronic Resources<br/>Security and privacy in cyber-physical systems : foundations, principles, and applicationsent://SD_ILS/0/SD_ILS:11290492026-05-07T21:59:19Z2026-05-07T21:59:19Zby Song, Houbing, editor.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4987646">Click to View</a><br/>Format: Electronic Resources<br/>Security in the digital world : for the home user, parent, consumer and home officeent://SD_ILS/0/SD_ILS:11337122026-05-07T21:59:19Z2026-05-07T21:59:19Zby Day, Graham, 1945- author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5211340">Click to View</a><br/>Format: Electronic Resources<br/>The information systems security officer's guide : establishing and managing a cyber security programent://SD_ILS/0/SD_ILS:11055802026-05-07T21:59:19Z2026-05-07T21:59:19Zby Kovacich, Gerald L., author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4334673">Click to View</a><br/>Format: Electronic Resources<br/>Big data and ethics : the medical datasphereent://SD_ILS/0/SD_ILS:11115382026-05-07T21:59:19Z2026-05-07T21:59:19Zby Béranger, Jérôme, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4529549">Click to View</a><br/>Format: Electronic Resources<br/>Security leader insights for information protection : lessons and strategies from leading security professionalsent://SD_ILS/0/SD_ILS:10322652026-05-07T21:59:19Z2026-05-07T21:59:19Zby Fahy, Bob, editor.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1699254">Click to View</a><br/>Format: Electronic Resources<br/>Information security management principlesent://SD_ILS/0/SD_ILS:10148892026-05-07T21:59:19Z2026-05-07T21:59:19Zby Alexander, David.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1213992">Click to View</a><br/>Format: Electronic Resources<br/>Data hiding exposing concealed data in multimedia, operating systems, mobile devices, and network protocolsent://SD_ILS/0/SD_ILS:10039162026-05-07T21:59:19Z2026-05-07T21:59:19Zby Raggo, Michael T.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1073014">Click to View</a><br/>Format: Electronic Resources<br/>Getting started with FortiGateent://SD_ILS/0/SD_ILS:10234742026-05-07T21:59:19Z2026-05-07T21:59:19Zby Fabbri, Rosato.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1572901">Click to View</a><br/>Format: Electronic Resources<br/>Information security management : concepts and practiceent://SD_ILS/0/SD_ILS:10207472026-05-07T21:59:19Z2026-05-07T21:59:19Zby Raggad, Bel G., author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1449482">Click to View</a><br/>Format: Electronic Resources<br/>The insider threat combatting the enemy withinent://SD_ILS/0/SD_ILS:9607592026-05-07T21:59:19Z2026-05-07T21:59:19Zby Blackwell, Clive.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=480373">Click to View</a><br/>Format: Electronic Resources<br/>The data governance imperative a business strategy for corporate data.ent://SD_ILS/0/SD_ILS:9607692026-05-07T21:59:19Z2026-05-07T21:59:19Zby Sarsfield, Steve.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=480410">Click to View</a><br/>Format: Electronic Resources<br/>Black hat physical device security exploiting hardware and softwareent://SD_ILS/0/SD_ILS:9302092026-05-07T21:59:19Z2026-05-07T21:59:19Zby Miller, Drew.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=222851">Click to View</a><br/>Format: Electronic Resources<br/>Solving cyber risk : protecting your company and societyent://SD_ILS/0/SD_ILS:11439482026-05-07T21:59:19Z2026-05-07T21:59:19Zby Coburn, Andrew (Andrew W.), author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5614240">Click to View</a><br/>Format: Electronic Resources<br/>Big data e privacy by design : anonimizzazione pseudonimizzazione sicurezzaent://SD_ILS/0/SD_ILS:11241552026-05-07T21:59:19Z2026-05-07T21:59:19Zby D'Acquisto, Giuseppe, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4818389">Click to View</a><br/>Format: Electronic Resources<br/>Cloud storage security : a practical guideent://SD_ILS/0/SD_ILS:10512992026-05-07T21:59:19Z2026-05-07T21:59:19Zby Wheeler, Aaron, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=2084976">Click to View</a><br/>Format: Electronic Resources<br/>Information security policy, processes, and practicesent://SD_ILS/0/SD_ILS:9532972026-05-07T21:59:19Z2026-05-07T21:59:19Zby Straub, Detmar W.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=435197">Click to View</a><br/>Format: Electronic Resources<br/>Papers from the first European workshop on technological & security issues in digital rights management (EuDiRights)ent://SD_ILS/0/SD_ILS:9391602026-05-07T21:59:19Z2026-05-07T21:59:19Zby Yagüe, Mariemma.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=291585">Click to View</a><br/>Format: Electronic Resources<br/>A practical guide to managing information securityent://SD_ILS/0/SD_ILS:9312912026-05-07T21:59:19Z2026-05-07T21:59:19Zby Purser, Steve.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=231645">Click to View</a><br/>Format: Electronic Resources<br/>A process for developing a common vocabulary in the information security areaent://SD_ILS/0/SD_ILS:9434782026-05-07T21:59:19Z2026-05-07T21:59:19Zby NATO Advanced Research Workshop on a Process for Developing a Common Vocabulary in the Information Security Area (2006 : Moscow, Russia)<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=320313">Click to View</a><br/>Format: Electronic Resources<br/>Information assurance and computer securityent://SD_ILS/0/SD_ILS:9381762026-05-07T21:59:19Z2026-05-07T21:59:19Zby NATO Advanced Research Workshop on Information Assurance and Computer Security (2005 : T?etouan, Morocco)<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=287000">Click to View</a><br/>Format: Electronic Resources<br/>Managing catastrophic loss of sensitive data : a guide for IT and security professionalsent://SD_ILS/0/SD_ILS:11891192026-05-07T21:59:19Z2026-05-07T21:59:19Zby Photopoulos, Constantine.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597492393">https://www.sciencedirect.com/science/book/9781597492393</a><br/>Format: Electronic Resources<br/>Application of big data for national security : a practitioner's guide to emerging technologiesent://SD_ILS/0/SD_ILS:10457702026-05-07T21:59:19Z2026-05-07T21:59:19Zby Akhgar, Babak, editor.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1962519">Click to View</a><br/>Format: Electronic Resources<br/>Pragmatic security metrics applying metametrics to information securityent://SD_ILS/0/SD_ILS:10109722026-05-07T21:59:19Z2026-05-07T21:59:19Zby Brotby, W. Krag.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1153198">Click to View</a><br/>Format: Electronic Resources<br/>Implementing database security and auditingent://SD_ILS/0/SD_ILS:9380792026-05-07T21:59:19Z2026-05-07T21:59:19Zby Ben-Natan, Ron.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=286701">Click to View</a><br/>Format: Electronic Resources<br/>Privacy protection and computer forensicsent://SD_ILS/0/SD_ILS:9310512026-05-07T21:59:19Z2026-05-07T21:59:19Zby Caloyannides, Michael A.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=227692">Click to View</a><br/>Format: Electronic Resources<br/>Finding and fixing vulnerabilities in information systems the vulnerability assessment & mitigation methodologyent://SD_ILS/0/SD_ILS:9277922026-05-07T21:59:19Z2026-05-07T21:59:19Zby Antón, Philip S.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=197482">Click to View</a><br/>Format: Electronic Resources<br/>Techniques and applications of digital watermarking and content protectionent://SD_ILS/0/SD_ILS:9309492026-05-07T21:59:19Z2026-05-07T21:59:19Zby Arnold, Michael (Michael Konrad), 1964-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=227587">Click to View</a><br/>Format: Electronic Resources<br/>Data stewardship : an actionable guide to effective data management and data governanceent://SD_ILS/0/SD_ILS:10199862026-05-07T21:59:19Z2026-05-07T21:59:19Zby Plotkin, David.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1418375">Click to View</a><br/>Format: Electronic Resources<br/>Information security, coding theory and related combinatorics information coding and combinatoricsent://SD_ILS/0/SD_ILS:9761542026-05-07T21:59:19Z2026-05-07T21:59:19Zby Crnković, Dean.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=682727">Click to View</a><br/>Format: Electronic Resources<br/>Digital watermarking and steganographyent://SD_ILS/0/SD_ILS:9440152026-05-07T21:59:19Z2026-05-07T21:59:19Zby Cox, I. J. (Ingemar J.)<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=328311">Click to View</a><br/>Format: Electronic Resources<br/>Measuring and managing information risk : a FAIR approachent://SD_ILS/0/SD_ILS:10362502026-05-07T21:59:19Z2026-05-07T21:59:19Zby Freund, Jack, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1772300">Click to View</a><br/>Format: Electronic Resources<br/>Technology and privacy the new landscapeent://SD_ILS/0/SD_ILS:10811092026-05-07T21:59:19Z2026-05-07T21:59:19Zby Agre, Philip.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3338469">Click to View</a><br/>Format: Electronic Resources<br/>Oracle Data Guard 11gR2 administration beginner's guide learn how to build and maintain Data Guard configurations with real-life, practical examplesent://SD_ILS/0/SD_ILS:10138262026-05-07T21:59:19Z2026-05-07T21:59:19Zby Baransel, Emre.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1192652">Click to View</a><br/>Format: Electronic Resources<br/>İdari usul ve kişisel verilerin korunmasıent://SD_ILS/0/SD_ILS:1300062026-05-07T21:59:19Z2026-05-07T21:59:19Zby Akıllıoğlu, Tekin<br/>Format: Books<br/>Sağlıkta sır saklama ve veri paylaşımı.ent://SD_ILS/0/SD_ILS:2821832026-05-07T21:59:19Z2026-05-07T21:59:19ZFormat: Books<br/>Gözetim çalışmaları : genel bir bakışent://SD_ILS/0/SD_ILS:4880202026-05-07T21:59:19Z2026-05-07T21:59:19Zby Lyon, David<br/>Format: Books<br/>Fikir ve sanat eserlerinin korunması : (protection of intellectual property rights)ent://SD_ILS/0/SD_ILS:1233462026-05-07T21:59:19Z2026-05-07T21:59:19Zby Sert, Selin<br/>Format: Books<br/>Loseless information : hiding in imagesent://SD_ILS/0/SD_ILS:11206462026-05-07T21:59:19Z2026-05-07T21:59:19Zby Lu, Zhe-Ming, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4743573">Click to View</a><br/>Format: Electronic Resources<br/>PCI DSS 3.1 : the standard that killed SSLent://SD_ILS/0/SD_ILS:11034162026-05-07T21:59:19Z2026-05-07T21:59:19Zby Williams, Branden R., author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4053870">Click to View</a><br/>Format: Electronic Resources<br/>An introduction to information security and ISO27001:2013 : a pocket guideent://SD_ILS/0/SD_ILS:10209922026-05-07T21:59:19Z2026-05-07T21:59:19Zby Watkins, Steve G.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1463578">Click to View</a><br/>Format: Electronic Resources<br/>ISO27001 / ISO27002 : a pocket guideent://SD_ILS/0/SD_ILS:10209932026-05-07T21:59:19Z2026-05-07T21:59:19Zby Calder, Alan.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1463579">Click to View</a><br/>Format: Electronic Resources<br/>For the record protecting electronic health informationent://SD_ILS/0/SD_ILS:10830692026-05-07T21:59:19Z2026-05-07T21:59:19Zby ProQuest (Firm)<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3375671">Click to View</a><br/>Format: Electronic Resources<br/>Sosyal mühendislik, bilgi güvenliği ve endüstri 4.0ent://SD_ILS/0/SD_ILS:12347392026-05-07T21:59:19Z2026-05-07T21:59:19Zby Özmen, Cevdet, Dr., yazar.<br/>Format: Books<br/>ISO 37001 : an introduction to anti-bribery management systems : doing the right thingsent://SD_ILS/0/SD_ILS:11337112026-05-07T21:59:19Z2026-05-07T21:59:19Zby Field, Alan, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5211339">Click to View</a><br/>Format: Electronic Resources<br/>Technology disaster response and recovery planning : a LITA guideent://SD_ILS/0/SD_ILS:10504652026-05-07T21:59:19Z2026-05-07T21:59:19Z<a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=2068199">Click to View</a><br/>Format: Electronic Resources<br/>Introduction to cyber-warfare a multidisciplinary approachent://SD_ILS/0/SD_ILS:10076092026-05-07T21:59:19Z2026-05-07T21:59:19Zby Shakarian, Paulo.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1115159">Click to View</a><br/>Format: Electronic Resources<br/>Information protection playbookent://SD_ILS/0/SD_ILS:10199902026-05-07T21:59:19Z2026-05-07T21:59:19Zby Kane, Greg.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1418381">Click to View</a><br/>Format: Electronic Resources<br/>Internet and surveillance the challenges of Web 2.0 and social mediaent://SD_ILS/0/SD_ILS:9990432026-05-07T21:59:19Z2026-05-07T21:59:19Zby Fuchs, Christian, 1976-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=981641">Click to View</a><br/>Format: Electronic Resources<br/>WordPress 3 ultimate security protect your WordPress site and its networkent://SD_ILS/0/SD_ILS:9967892026-05-07T21:59:19Z2026-05-07T21:59:19Zby Connelly, Olly.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=948509">Click to View</a><br/>Format: Electronic Resources<br/>CMS security handbook the comprehensive guide for WordPress, Joomla!, Drupal, and Ploneent://SD_ILS/0/SD_ILS:9790052026-05-07T21:59:19Z2026-05-07T21:59:19Zby Canavan, Tom.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=706893">Click to View</a><br/>Format: Electronic Resources<br/>Advances in artificial intelligence for privacy protection and securityent://SD_ILS/0/SD_ILS:10302722026-05-07T21:59:19Z2026-05-07T21:59:19Zby Solanas, Agusti.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1679374">Click to View</a><br/>Format: Electronic Resources<br/>The definitive guide to the C&A transformation the first publication of a comprehensive view of the C&A transformationent://SD_ILS/0/SD_ILS:9654532026-05-07T21:59:19Z2026-05-07T21:59:19Zby Mehan, Julie E.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=547041">Click to View</a><br/>Format: Electronic Resources<br/>Enterprise information security and privacyent://SD_ILS/0/SD_ILS:9563312026-05-07T21:59:19Z2026-05-07T21:59:19Zby Axelrod, C. Warren.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=456886">Click to View</a><br/>Format: Electronic Resources<br/>Active Directory disaster recoveryent://SD_ILS/0/SD_ILS:9998812026-05-07T21:59:19Z2026-05-07T21:59:19Zby Rommel, Florian.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=995561">Click to View</a><br/>Format: Electronic Resources<br/>Intelligent watermarking techniquesent://SD_ILS/0/SD_ILS:9312692026-05-07T21:59:19Z2026-05-07T21:59:19Zby Pan, Jeng-Shyang.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=231561">Click to View</a><br/>Format: Electronic Resources<br/>Crackproof your software the best ways to protect your software against crackersent://SD_ILS/0/SD_ILS:9365642026-05-07T21:59:19Z2026-05-07T21:59:19Zby C̆ervĕn, Pavol.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=273482">Click to View</a><br/>Format: Electronic Resources<br/>Total information risk management : maximizing the value of data and information assetsent://SD_ILS/0/SD_ILS:10190722026-05-07T21:59:19Z2026-05-07T21:59:19Zby Borek, Alexander.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1386476">Click to View</a><br/>Format: Electronic Resources<br/>G3P : good privacy protection practice in clinical research : principles of pseudonymization and anonymizationent://SD_ILS/0/SD_ILS:10314752026-05-07T21:59:19Z2026-05-07T21:59:19Zby Schriever, K.-H., 1948- author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1685362">Click to View</a><br/>Format: Electronic Resources<br/>Use of risk analysis in computer-aided persuasionent://SD_ILS/0/SD_ILS:9883622026-05-07T21:59:19Z2026-05-07T21:59:19Zby Duman, Ekrem.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=836226">Click to View</a><br/>Format: Electronic Resources<br/>Information warfareent://SD_ILS/0/SD_ILS:10062472026-05-07T21:59:19Z2026-05-07T21:59:19Zby Ventre, Daniel.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1106528">Click to View</a><br/>Format: Electronic Resources<br/>Information security a manager's guide to thwarting data thieves and hackersent://SD_ILS/0/SD_ILS:9452882026-05-07T21:59:19Z2026-05-07T21:59:19Zby Alexander, Philip, 1963-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=339307">Click to View</a><br/>Format: Electronic Resources<br/>The death of the Internetent://SD_ILS/0/SD_ILS:9898072026-05-07T21:59:19Z2026-05-07T21:59:19Zby Jakobsson, Markus.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=848529">Click to View</a><br/>Format: Electronic Resources<br/>Insider threat : protecting the enterprise from sabotage, spying, and theftent://SD_ILS/0/SD_ILS:11882592026-05-07T21:59:19Z2026-05-07T21:59:19Zby Cole, Eric.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490481">http://www.sciencedirect.com/science/book/9781597490481</a><br/>Format: Electronic Resources<br/>Protecting your library's digital sources the essential guide to planning and preservationent://SD_ILS/0/SD_ILS:9300962026-05-07T21:59:19Z2026-05-07T21:59:19Zby Kahn, Miriam (Miriam B.)<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=218937">Click to View</a><br/>Format: Electronic Resources<br/>Surveillance as social sorting privacy, risk, and digital discriminationent://SD_ILS/0/SD_ILS:9324782026-05-07T21:59:19Z2026-05-07T21:59:19Zby Lyon, David, 1948-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=240591">Click to View</a><br/>Format: Electronic Resources<br/>Surveillance as social sorting : privacy, risk, and digital discriminationent://SD_ILS/0/SD_ILS:4783702026-05-07T21:59:19Z2026-05-07T21:59:19Zby Lyon, David, 1948-, editor<br/>Format: Books<br/>Digital privacy in the marketplace : perspectives on the information exchangeent://SD_ILS/0/SD_ILS:10449122026-05-07T21:59:19Z2026-05-07T21:59:19Zby Milne, George R., author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1920895">Click to View</a><br/>Format: Electronic Resources<br/>Enterprise Identity Management Towards an Investment Decision Support Approachent://SD_ILS/0/SD_ILS:1404352026-05-07T21:59:19Z2026-05-07T21:59:19Zby Royer, Denis. author.<br/><a href="http://dx.doi.org/10.1007/978-3-642-35040-5">http://dx.doi.org/10.1007/978-3-642-35040-5</a><br/>Format: Electronic Resources<br/>Digital watermarking and steganographyent://SD_ILS/0/SD_ILS:11891962026-05-07T21:59:19Z2026-05-07T21:59:19Zby Cox, I. J. (Ingemar J.)<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780123725851">http://www.sciencedirect.com/science/book/9780123725851</a><br/>Format: Electronic Resources<br/>Infosecurity 2008 threat analysisent://SD_ILS/0/SD_ILS:11900002026-05-07T21:59:19Z2026-05-07T21:59:19Zby Clark, Champ, III.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597492249">https://www.sciencedirect.com/science/book/9781597492249</a><br/>Format: Electronic Resources<br/>Information technology security fundamentalsent://SD_ILS/0/SD_ILS:11026972026-05-07T21:59:19Z2026-05-07T21:59:19Zby Sagers, Glen., author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4009415">Click to View</a><br/>Format: Electronic Resources<br/>FISMA certification & accreditation handbookent://SD_ILS/0/SD_ILS:11882772026-05-07T21:59:19Z2026-05-07T21:59:19Zby Taylor, Laura.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491167">http://www.sciencedirect.com/science/book/9781597491167</a><br/>Format: Electronic Resources<br/>Implementing database security and auditing : a guide for DBAs, information security administrators and auditorsent://SD_ILS/0/SD_ILS:11881152026-05-07T21:59:19Z2026-05-07T21:59:19Zby Ben-Natan, Ron.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781555583347">http://www.sciencedirect.com/science/book/9781555583347</a><br/>Format: Electronic Resources<br/>Digital watermarkingent://SD_ILS/0/SD_ILS:11881542026-05-07T21:59:19Z2026-05-07T21:59:19Zby Cox, I. J. (Ingemar J.)<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781558607149">http://www.sciencedirect.com/science/book/9781558607149</a><br/>Format: Electronic Resources<br/>