Search Results for Information systems. - Narrowed by: Data protection.SirsiDynix Enterprisehttp://katalog.baskent.edu.tr/client/en_US/default/default/qu$003dInformation$002bsystems.$0026qf$003dSUBJECT$002509Subject$002509Data$002bprotection.$002509Data$002bprotection.$0026ps$003d300?dt=list2026-05-12T04:21:32ZThe information systems security officer's guide : establishing and managing a cyber security programent://SD_ILS/0/SD_ILS:11055802026-05-12T04:21:32Z2026-05-12T04:21:32Zby Kovacich, Gerald L., author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4334673">Click to View</a><br/>Format: Electronic Resources<br/>Finding and fixing vulnerabilities in information systems the vulnerability assessment & mitigation methodologyent://SD_ILS/0/SD_ILS:9277922026-05-12T04:21:32Z2026-05-12T04:21:32Zby Antón, Philip S.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=197482">Click to View</a><br/>Format: Electronic Resources<br/>Information technology security fundamentalsent://SD_ILS/0/SD_ILS:11026972026-05-12T04:21:32Z2026-05-12T04:21:32Zby Sagers, Glen., author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4009415">Click to View</a><br/>Format: Electronic Resources<br/>Advances in artificial intelligence for privacy protection and securityent://SD_ILS/0/SD_ILS:10302722026-05-12T04:21:32Z2026-05-12T04:21:32Zby Solanas, Agusti.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1679374">Click to View</a><br/>Format: Electronic Resources<br/>Information security policy, processes, and practicesent://SD_ILS/0/SD_ILS:9532972026-05-12T04:21:32Z2026-05-12T04:21:32Zby Straub, Detmar W.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=435197">Click to View</a><br/>Format: Electronic Resources<br/>Digital watermarking and steganographyent://SD_ILS/0/SD_ILS:9440152026-05-12T04:21:32Z2026-05-12T04:21:32Zby Cox, I. J. (Ingemar J.)<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=328311">Click to View</a><br/>Format: Electronic Resources<br/>Digital watermarking and steganographyent://SD_ILS/0/SD_ILS:11891962026-05-12T04:21:32Z2026-05-12T04:21:32Zby Cox, I. J. (Ingemar J.)<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780123725851">http://www.sciencedirect.com/science/book/9780123725851</a><br/>Format: Electronic Resources<br/>Digital watermarkingent://SD_ILS/0/SD_ILS:11881542026-05-12T04:21:32Z2026-05-12T04:21:32Zby Cox, I. J. (Ingemar J.)<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781558607149">http://www.sciencedirect.com/science/book/9781558607149</a><br/>Format: Electronic Resources<br/>Information security for managementent://SD_ILS/0/SD_ILS:10567932026-05-12T04:21:32Z2026-05-12T04:21:32Zby Iyengar, Venugopal.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3011230">Click to View</a><br/>Format: Electronic Resources<br/>Managing information risk a director's guideent://SD_ILS/0/SD_ILS:9607682026-05-12T04:21:32Z2026-05-12T04:21:32Zby Mitchell, Stewart.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=480407">Click to View</a><br/>Format: Electronic Resources<br/>Information protection playbookent://SD_ILS/0/SD_ILS:10199902026-05-12T04:21:32Z2026-05-12T04:21:32Zby Kane, Greg.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1418381">Click to View</a><br/>Format: Electronic Resources<br/>Data governance how to design, deploy, and sustain an effective data governance programent://SD_ILS/0/SD_ILS:10016882026-05-12T04:21:32Z2026-05-12T04:21:32Zby Ladley, John.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1032951">Click to View</a><br/>Format: Electronic Resources<br/>Enterprise Identity Management Towards an Investment Decision Support Approachent://SD_ILS/0/SD_ILS:1404352026-05-12T04:21:32Z2026-05-12T04:21:32Zby Royer, Denis. author.<br/><a href="http://dx.doi.org/10.1007/978-3-642-35040-5">http://dx.doi.org/10.1007/978-3-642-35040-5</a><br/>Format: Electronic Resources<br/>CMS security handbook the comprehensive guide for WordPress, Joomla!, Drupal, and Ploneent://SD_ILS/0/SD_ILS:9790052026-05-12T04:21:32Z2026-05-12T04:21:32Zby Canavan, Tom.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=706893">Click to View</a><br/>Format: Electronic Resources<br/>Surveillance as social sorting privacy, risk, and digital discriminationent://SD_ILS/0/SD_ILS:9324782026-05-12T04:21:32Z2026-05-12T04:21:32Zby Lyon, David, 1948-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=240591">Click to View</a><br/>Format: Electronic Resources<br/>Surveillance as social sorting : privacy, risk, and digital discriminationent://SD_ILS/0/SD_ILS:4783702026-05-12T04:21:32Z2026-05-12T04:21:32Zby Lyon, David, 1948-, editor<br/>Format: Books<br/>