Search Results for Information systems. - Narrowed by: Data protection. SirsiDynix Enterprise http://katalog.baskent.edu.tr/client/en_US/default/default/qu$003dInformation$002bsystems.$0026qf$003dSUBJECT$002509Subject$002509Data$002bprotection.$002509Data$002bprotection.$0026ps$003d300?dt=list 2026-05-12T04:21:32Z The information systems security officer's guide : establishing and managing a cyber security program ent://SD_ILS/0/SD_ILS:1105580 2026-05-12T04:21:32Z 2026-05-12T04:21:32Z by&#160;Kovacich, Gerald L., author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4334673">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Finding and fixing vulnerabilities in information systems the vulnerability assessment &amp; mitigation methodology ent://SD_ILS/0/SD_ILS:927792 2026-05-12T04:21:32Z 2026-05-12T04:21:32Z by&#160;Ant&oacute;n, Philip S.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=197482">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Information technology security fundamentals ent://SD_ILS/0/SD_ILS:1102697 2026-05-12T04:21:32Z 2026-05-12T04:21:32Z by&#160;Sagers, Glen., author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4009415">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Advances in artificial intelligence for privacy protection and security ent://SD_ILS/0/SD_ILS:1030272 2026-05-12T04:21:32Z 2026-05-12T04:21:32Z by&#160;Solanas, Agusti.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1679374">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Information security policy, processes, and practices ent://SD_ILS/0/SD_ILS:953297 2026-05-12T04:21:32Z 2026-05-12T04:21:32Z by&#160;Straub, Detmar W.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=435197">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Digital watermarking and steganography ent://SD_ILS/0/SD_ILS:944015 2026-05-12T04:21:32Z 2026-05-12T04:21:32Z by&#160;Cox, I. J. (Ingemar J.)<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=328311">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Digital watermarking and steganography ent://SD_ILS/0/SD_ILS:1189196 2026-05-12T04:21:32Z 2026-05-12T04:21:32Z by&#160;Cox, I. J. (Ingemar J.)<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780123725851">http://www.sciencedirect.com/science/book/9780123725851</a><br/>Format:&#160;Electronic Resources<br/> Digital watermarking ent://SD_ILS/0/SD_ILS:1188154 2026-05-12T04:21:32Z 2026-05-12T04:21:32Z by&#160;Cox, I. J. (Ingemar J.)<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781558607149">http://www.sciencedirect.com/science/book/9781558607149</a><br/>Format:&#160;Electronic Resources<br/> Information security for management ent://SD_ILS/0/SD_ILS:1056793 2026-05-12T04:21:32Z 2026-05-12T04:21:32Z by&#160;Iyengar, Venugopal.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3011230">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Managing information risk a director's guide ent://SD_ILS/0/SD_ILS:960768 2026-05-12T04:21:32Z 2026-05-12T04:21:32Z by&#160;Mitchell, Stewart.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=480407">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Information protection playbook ent://SD_ILS/0/SD_ILS:1019990 2026-05-12T04:21:32Z 2026-05-12T04:21:32Z by&#160;Kane, Greg.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1418381">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Data governance how to design, deploy, and sustain an effective data governance program ent://SD_ILS/0/SD_ILS:1001688 2026-05-12T04:21:32Z 2026-05-12T04:21:32Z by&#160;Ladley, John.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1032951">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Enterprise Identity Management Towards an Investment Decision Support Approach ent://SD_ILS/0/SD_ILS:140435 2026-05-12T04:21:32Z 2026-05-12T04:21:32Z by&#160;Royer, Denis. author.<br/><a href="http://dx.doi.org/10.1007/978-3-642-35040-5">http://dx.doi.org/10.1007/978-3-642-35040-5</a><br/>Format:&#160;Electronic Resources<br/> CMS security handbook the comprehensive guide for WordPress, Joomla!, Drupal, and Plone ent://SD_ILS/0/SD_ILS:979005 2026-05-12T04:21:32Z 2026-05-12T04:21:32Z by&#160;Canavan, Tom.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=706893">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Surveillance as social sorting privacy, risk, and digital discrimination ent://SD_ILS/0/SD_ILS:932478 2026-05-12T04:21:32Z 2026-05-12T04:21:32Z by&#160;Lyon, David, 1948-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=240591">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Surveillance as social sorting : privacy, risk, and digital discrimination ent://SD_ILS/0/SD_ILS:478370 2026-05-12T04:21:32Z 2026-05-12T04:21:32Z by&#160;Lyon, David, 1948-, editor<br/>Format:&#160;Books<br/>