Arama Sonu&ccedil;lar&#305; Information technology -- Security measures. SirsiDynix Enterprise http://katalog.baskent.edu.tr/client/tr_TR/defaulttr/defaulttr/qu$003dInformation$002btechnology$002b--$002bSecurity$002bmeasures.$0026ic$003dtrue$0026ps$003d300? 2026-01-14T12:46:49Z Once more unto the breach : managing information security in an uncertain world ent://SD_ILS/0/SD_ILS:1050521 2026-01-14T12:46:49Z 2026-01-14T12:46:49Z by&#160;Simmons, Andrea C., author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=2069450">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Collaboration with cloud computing : security, social media, and unified communications ent://SD_ILS/0/SD_ILS:1029961 2026-01-14T12:46:49Z 2026-01-14T12:46:49Z by&#160;Messier, Ric, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1675198">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Emerging trends in ICT security ent://SD_ILS/0/SD_ILS:1022938 2026-01-14T12:46:49Z 2026-01-14T12:46:49Z by&#160;Akhgar, Babak.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1562332">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> IT disaster recovery planning for dummies ent://SD_ILS/0/SD_ILS:944364 2026-01-14T12:46:49Z 2026-01-14T12:46:49Z by&#160;Gregory, Peter H.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=331530">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Trusted computing : principles and applications ent://SD_ILS/0/SD_ILS:1132518 2026-01-14T12:46:49Z 2026-01-14T12:46:49Z by&#160;Feng, Dengguo, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5157487">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> ISO 37001 : an introduction to anti-bribery management systems : doing the right things ent://SD_ILS/0/SD_ILS:1133711 2026-01-14T12:46:49Z 2026-01-14T12:46:49Z by&#160;Field, Alan, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5211339">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Learning Puppet Security : secure your IT environments with the powerful secuity tools of Puppet ent://SD_ILS/0/SD_ILS:1046962 2026-01-14T12:46:49Z 2026-01-14T12:46:49Z by&#160;Slagle, Jason, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=2000943">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Advances in artificial intelligence for privacy protection and security ent://SD_ILS/0/SD_ILS:1030272 2026-01-14T12:46:49Z 2026-01-14T12:46:49Z by&#160;Solanas, Agusti.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1679374">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Data stewardship : an actionable guide to effective data management and data governance ent://SD_ILS/0/SD_ILS:1019986 2026-01-14T12:46:49Z 2026-01-14T12:46:49Z by&#160;Plotkin, David.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1418375">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Information security science : measuring the vulnerability to data compromises ent://SD_ILS/0/SD_ILS:1113500 2026-01-14T12:46:49Z 2026-01-14T12:46:49Z by&#160;Young, Carl S., author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4567434">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Multilingual dictionary of IT security : English, German, French, Spanish, Italian ent://SD_ILS/0/SD_ILS:1102640 2026-01-14T12:46:49Z 2026-01-14T12:46:49Z by&#160;Vollnhals, Otto, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4008251">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Dictionary of information security ent://SD_ILS/0/SD_ILS:934743 2026-01-14T12:46:49Z 2026-01-14T12:46:49Z by&#160;Slade, Robert.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=266208">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> IT-sicherheit : Konzepte - Verfahren - protokolle ent://SD_ILS/0/SD_ILS:1041200 2026-01-14T12:46:49Z 2026-01-14T12:46:49Z by&#160;Eckert, Claudia, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1867185">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Security the human factor ent://SD_ILS/0/SD_ILS:973059 2026-01-14T12:46:49Z 2026-01-14T12:46:49Z by&#160;Kearney, Paul.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=647939">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Technology disaster response and recovery planning : a LITA guide ent://SD_ILS/0/SD_ILS:1050465 2026-01-14T12:46:49Z 2026-01-14T12:46:49Z <a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=2068199">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Governance and internal controls for cutting edge IT ent://SD_ILS/0/SD_ILS:1013314 2026-01-14T12:46:49Z 2026-01-14T12:46:49Z by&#160;Worstell, Karen F.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1186301">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Risk management framework a lab-based approach to securing information systems ent://SD_ILS/0/SD_ILS:1007622 2026-01-14T12:46:49Z 2026-01-14T12:46:49Z by&#160;Broad, James.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1115181">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> The definitive guide to the C&amp;A transformation the first publication of a comprehensive view of the C&amp;A transformation ent://SD_ILS/0/SD_ILS:965453 2026-01-14T12:46:49Z 2026-01-14T12:46:49Z by&#160;Mehan, Julie E.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=547041">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Managing the human factor in information security how to win over staff and influence business managers ent://SD_ILS/0/SD_ILS:954208 2026-01-14T12:46:49Z 2026-01-14T12:46:49Z by&#160;Lacey, David.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=437522">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Enterprise information security and privacy ent://SD_ILS/0/SD_ILS:956331 2026-01-14T12:46:49Z 2026-01-14T12:46:49Z by&#160;Axelrod, C. Warren.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=456886">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Strategic security management a risk assessment guide for decision makers ent://SD_ILS/0/SD_ILS:937534 2026-01-14T12:46:49Z 2026-01-14T12:46:49Z by&#160;Vellani, Karim H., 1971-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=282098">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Information security and employee behaviour how to reduce risk through employee education, training and awareness ent://SD_ILS/0/SD_ILS:951869 2026-01-14T12:46:49Z 2026-01-14T12:46:49Z by&#160;McIlwraith, Angus.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=429792">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Security and control in information systems a guide for business and accounting ent://SD_ILS/0/SD_ILS:932451 2026-01-14T12:46:49Z 2026-01-14T12:46:49Z by&#160;Hawker, Andrew.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=240531">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Total information risk management : maximizing the value of data and information assets ent://SD_ILS/0/SD_ILS:1019072 2026-01-14T12:46:49Z 2026-01-14T12:46:49Z by&#160;Borek, Alexander.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1386476">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> FISMA and the risk management framework the new practice of federal cyber security ent://SD_ILS/0/SD_ILS:1004011 2026-01-14T12:46:49Z 2026-01-14T12:46:49Z by&#160;Gantz, Stephen D.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1074427">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Toward better usability, security, and privacy of information technology report of a workshop ent://SD_ILS/0/SD_ILS:1085815 2026-01-14T12:46:49Z 2026-01-14T12:46:49Z by&#160;National Research Council (U.S.). Steering Committee on the Usability, Security, and Privacy of Computer Systems.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3378675">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Information warfare ent://SD_ILS/0/SD_ILS:1006247 2026-01-14T12:46:49Z 2026-01-14T12:46:49Z by&#160;Ventre, Daniel.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1106528">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Information security a manager's guide to thwarting data thieves and hackers ent://SD_ILS/0/SD_ILS:945288 2026-01-14T12:46:49Z 2026-01-14T12:46:49Z by&#160;Alexander, Philip, 1963-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=339307">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> The basics of information security understanding the fundamentals of InfoSec in theory and practice ent://SD_ILS/0/SD_ILS:133592 2026-01-14T12:46:49Z 2026-01-14T12:46:49Z by&#160;Andress, Jason.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597496537">http://www.sciencedirect.com/science/book/9781597496537</a><br/>Format:&#160;Elektronik Kaynak<br/> The basics of information security : understanding the fundamentals of InfoSec in theory and practice ent://SD_ILS/0/SD_ILS:1183815 2026-01-14T12:46:49Z 2026-01-14T12:46:49Z by&#160;Andress, Jason.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597496537">https://www.sciencedirect.com/science/book/9781597496537</a><br/>Format:&#160;Elektronik Kaynak<br/> Asset protection through security awareness ent://SD_ILS/0/SD_ILS:987451 2026-01-14T12:46:49Z 2026-01-14T12:46:49Z by&#160;Speed, Tyler Justin.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=826927">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Information security governance simplified from the boardroom to the keyboard ent://SD_ILS/0/SD_ILS:987453 2026-01-14T12:46:49Z 2026-01-14T12:46:49Z by&#160;Fitzgerald, Todd.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=826929">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Strategic security management : a risk assessment guide for decision makers ent://SD_ILS/0/SD_ILS:1187027 2026-01-14T12:46:49Z 2026-01-14T12:46:49Z by&#160;Vellani, Karim H., 1971-<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780123708977">http://www.sciencedirect.com/science/book/9780123708977</a><br/>Format:&#160;Elektronik Kaynak<br/> How to cheat at managing information security ent://SD_ILS/0/SD_ILS:1186421 2026-01-14T12:46:49Z 2026-01-14T12:46:49Z by&#160;Osborne, Mark.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597491105">https://www.sciencedirect.com/science/book/9781597491105</a><br/>Format:&#160;Elektronik Kaynak<br/> Information security ent://SD_ILS/0/SD_ILS:1185399 2026-01-14T12:46:49Z 2026-01-14T12:46:49Z by&#160;Zelkowitz, Marvin V., 1945-<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9780120121601">https://www.sciencedirect.com/science/book/9780120121601</a> ScienceDirect <a href="https://www.sciencedirect.com/science/bookseries/00652458/60">https://www.sciencedirect.com/science/bookseries/00652458/60</a> ScienceDirect <a href="https://www.sciencedirect.com/science/publication?issn=00652458&volume=60">https://www.sciencedirect.com/science/publication?issn=00652458&volume=60</a><br/>Format:&#160;Elektronik Kaynak<br/> Health care information systems : a practical approach for health care management ent://SD_ILS/0/SD_ILS:1123828 2026-01-14T12:46:49Z 2026-01-14T12:46:49Z by&#160;Wager, Karen A., 1961- author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4815068">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Assessing Data Security Risks Associated with Emergence of Information Technology in Health Care Industry ent://SD_ILS/0/SD_ILS:680554 2026-01-14T12:46:49Z 2026-01-14T12:46:49Z by&#160;Jones, Julius, Jr., author.<br/><a href="http://gateway.proquest.com/openurl?url_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:dissertation&res_dat=xri:pqm&rft_dat=xri:pqdiss:10810173">http://gateway.proquest.com/openurl?url_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:dissertation&res_dat=xri:pqm&rft_dat=xri:pqdiss:10810173</a><br/>Format:&#160;Kitap<br/> Information assurance : dependability and security in networked systems ent://SD_ILS/0/SD_ILS:1189195 2026-01-14T12:46:49Z 2026-01-14T12:46:49Z by&#160;Qian, Yi, 1962-<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9780123735669">https://www.sciencedirect.com/science/book/9780123735669</a><br/>Format:&#160;Elektronik Kaynak<br/>