Arama Sonu&ccedil;lar&#305; Computer security -- Management. - Daralt&#305;lm&#305;&#351;: 2013 SirsiDynix Enterprise http://katalog.baskent.edu.tr/client/tr_TR/defaulttr/defaulttr/qu$003dComputer$002bsecurity$002b--$002bManagement.$0026qf$003dPUBDATE$002509Yay$0025C4$0025B1n$002bY$0025C4$0025B1l$0025C4$0025B1$0025092013$0025092013$0026ps$003d300?dt=list 2026-01-06T15:30:52Z Information security management principles ent://SD_ILS/0/SD_ILS:1014889 2026-01-06T15:30:52Z 2026-01-06T15:30:52Z by&#160;Alexander, David.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1213992">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Secure multi-party computation ent://SD_ILS/0/SD_ILS:1009923 2026-01-06T15:30:52Z 2026-01-06T15:30:52Z by&#160;Prabhakaran, Manoj M.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1137458">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> The true cost of information security breaches and cyber crime ent://SD_ILS/0/SD_ILS:1021273 2026-01-06T15:30:52Z 2026-01-06T15:30:52Z by&#160;Krausz, Michael.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1477418">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> IT Security Risk Management Perceived IT Security Risks in the Context of Cloud Computing ent://SD_ILS/0/SD_ILS:140502 2026-01-06T15:30:52Z 2026-01-06T15:30:52Z by&#160;Ackermann, Tobias. author.<br/><a href="http://dx.doi.org/10.1007/978-3-658-01115-4">http://dx.doi.org/10.1007/978-3-658-01115-4</a><br/>Format:&#160;Elektronik Kaynak<br/>